Skip to content

Commit

Permalink
Merge pull request #79 from CaptainSifff/68-ethics
Browse files Browse the repository at this point in the history
on ethics and values
  • Loading branch information
CaptainSifff authored Aug 14, 2023
2 parents ac625d1 + 9074151 commit b9b8161
Show file tree
Hide file tree
Showing 2 changed files with 149 additions and 9 deletions.
93 changes: 86 additions & 7 deletions bibliography.bib
Original file line number Diff line number Diff line change
Expand Up @@ -833,6 +833,14 @@ @Article{Cosden2022b
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
}

@misc{CouncilOfEuropeProtocol1988,
title = {Protocol to the {Convention} for the {Protection} of {Human} {Rights} and {Fundamental} {Freedoms} ({European} {Convention} on {Human} {Rights}) as amended by {Protocol} {No}. 11},
publisher = {Council of Europe},
author = {{Council of Europe}},
year = {1988},
note = {Place: Strasbourg Publication Title: Council of Europe Treaty Series 155},
}

@Article{Crick2017,
author = {Crick, Tom and Hall, Benjamin A. and Ishtiaq, Samin},
title = {Reproducibility in Research: Systems, Infrastructure, Culture},
Expand Down Expand Up @@ -1371,6 +1379,24 @@ @Article{GonzalezBarahona2022
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
}

@article{Gotterbarn1999,
author = {Gotterbarn, Don and Miller, Keith and Rogerson, Simon},
title = {Software Engineering Code of Ethics is Approved},
year = {1999},
issue_date = {Oct. 1999},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {42},
number = {10},
issn = {0001-0782},
url = {https://doi.org/10.1145/317665.317682},
doi = {10.1145/317665.317682},
journal = {Commun. ACM},
month = {oct},
pages = {102–107},
numpages = {6}
}

@InCollection{Grant2016,
author = {Grant, Sheryl},
title = {Building Collective Belief in Badges: Designing Trust Networks},
Expand Down Expand Up @@ -1630,6 +1656,23 @@ @Article{Higashi2020
publisher = {American Psychological Association ({APA})},
}

@book{Hirvela2022,
edition = {1},
title = {Right to {Respect} for {Private} and {Family} {Life},
{Home} and {Correspondence}: {A} {Practical} {Guide}
to the {Article} 8 {Case}-{Law} of the {European}
{Court} of {Human} {Rights}},
isbn = {978-1-83970-323-2},
shorttitle = {Right to {Respect} for {Private} and {Family} {Life}, {Home} and {Correspondence}},
url = {https://www.cambridge.org/core/product/identifier/9781839703232/type/book},
urldate = {2023-08-09},
publisher = {Intersentia},
author = {Hirvelä, Päivi and Heikkilä, Satu},
month = oct,
year = {2022},
doi = {10.1017/9781839703232},
}

@online{HPCCFCompetencies,
author = {{The HPC Certification Forum}},
title = {Competencies},
Expand Down Expand Up @@ -1904,7 +1947,7 @@ @Article{Kunkel2020d
journal = {The Journal of Computational Science Education},
year = {2019},
volume = {10},
number = {1},
number = {1},
month = jan,
pages = {88--89},
issn = {2153-4136},
Expand Down Expand Up @@ -2376,7 +2419,7 @@ @InProceedings{Moldon2021
title = {How Gamification Affects Software Developers: Cautionary Evidence from a Natural Experiment on {G}it{H}ub},
booktitle = {Proceedings of the 2021 {IEEE}/{ACM} 43\textsuperscript{rd} International Conference on Software Engineering ({ICSE})},
year = {2021},
month = may,
month = may,
publisher = {IEEE},
doi = {10.1109/icse43902.2021.00058},
eventdate = {2021-05-25/2021-05-28},
Expand Down Expand Up @@ -3131,6 +3174,16 @@ @Article{Smith2021
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
}

@misc{StackOverflow2022,
title = {Stack {Overflow} {Developer} {Survey} 2022},
url = {https://survey.stackoverflow.co/2022#developer-profile-demographics},
language = {en},
urldate = {2023-08-10},
journal = {Stack Overflow},
author = {{Stack Overflow}},
year = {2022},
}

@misc{StackOverflowPortuguese,
author = {Popper, Ben},
title = {{S}tack {O}verflow in {P}ortugese: now with less beta!},
Expand Down Expand Up @@ -3228,6 +3281,24 @@ @Online{SusTrainable
urldate = {2023-07-12},
}

@article{Sweeney2002,
title = {k-{ANONYMITY}: {A} {MODEL} {FOR} {PROTECTING} {PRIVACY}},
volume = {10},
issn = {0218-4885},
shorttitle = {k-{ANONYMITY}},
url = {https://www.worldscientific.com/doi/abs/10.1142/S0218488502001648},
doi = {10.1142/S0218488502001648},
number = {05},
urldate = {2023-08-09},
journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems},
author = {Sweeney, Latanya},
month = oct,
year = {2002},
note = {Publisher: World Scientific Publishing Co.},
keywords = {Data anonymity, data fusion, data privacy, privacy, re-identification},
pages = {557--570},
}

@Article{Tan2009,
author = {Tan, Tin Wee and Lim, Shen Jean and Khan, Asif M. and Ranganathan, Shoba},
title = {A proposed minimum skill set for university graduates to meet the informatics needs and challenges of the ``-omics'' era},
Expand Down Expand Up @@ -3627,7 +3698,7 @@ @Article{Wilson2016a
month = jan,
doi = {10.12688/f1000research.3-62.v2},
publisher = {F1000 Research Ltd},
}
}

@Article{Wilson2017a,
author = {Wilson, Greg and Bryan, Jennifer and Cranston, Karen and Kitzes, Justin and Nederbragt, Lex and Teal, Tracy K.},
Expand Down Expand Up @@ -3754,10 +3825,11 @@ @online{UNIVERSEHPC
urldate = {2023-06-16}
}

@online{EXCALIBUR,
author = {ExCALIBUR},
title = {{E}xascale {C}omputing {AL}gorithms \& {I}nfrastructures {B}enefiting {UK} {R}esearch},
url = {https://excalibur.ac.uk},
@online{LRZModernCpp,
organization = {Leibniz Supercomputing Centre},
author = {Iglberger, Klaus},
title= {Modern C++ Software Design},
url = {https://doku.lrz.de/2022-10-26-modern-c++-software-design-hcpa1w22-11497188.html},
urldate = {2023-06-16}
}

Expand Down Expand Up @@ -3789,6 +3861,13 @@ @online{HImaging
urldate = {2023-06-16}
}

@online{CodeRefinery,
organization = {CodeRefinery},
title= {Coderefinery},
url = {https://coderefinery.org},
urldate = {2023-06-16}
}

@online{MIT,
organization = {Massachusetts Institute of Technology},
title = {The Missing Semester of Your CS Education},
Expand Down
65 changes: 63 additions & 2 deletions paper_teaching-learning-RSE.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ author:
- Fredo Erxleben
- Magnus Hagdorn
- Harald von Waldow
- Morith Schwarzmeier
output:
pdf_document:
citation_package: biblatex
Expand Down Expand Up @@ -191,16 +192,76 @@ institutionalised. Finally, the strong emphasis on team-skills allows RSEs to be
very employable in industrial workplaces.

### National Context

Having been developed at a workshop in Paderborn in Germany, naturally a part
of the discussion in this paper focusses on the German academic landscape.
So, although there are Germany specific traits found in this document
we are nevertheless dealing with the education of humans to become RSEs -
A topic that is of major relevance also in an international context.


## Values

The activities of an RSE are guided by ethical values.
A general list of applicable values is given in the Software Engineering Code of Ethics [@Gotterbarn1999].
Central to that code is the RSE's obligation to act in the public interest.
Further values loosely based on that code include the obligations

+ to take great care to develop software that adheres to current best practices,
+ to judge independently and maintain professional integrity,
+ to treat colleagues and collaborators with respect and work towards a fair and inclusive environment, and
+ to promote these values whenever possible and make sure that they are passed on to new practitioners.

RSEs often assume a multifaceted role at the junction of research, software engineering and data management.
They work with a varying and diverse set of colleagues that might include other developers,
support unit staff and academics of different fields and all career-stages.
This situation yields a specific set of challenges RSEs should be aware of
to consciously make ethically sound judgment calls.
We list some example areas that could be addressed in RSE courses or workshops.

### Personal data

Independent from the encoding into the respective national law in an RSE's jurisdiction,
the right to information privacy is internationally recognized as a fundamental human right,
e.g. in the European Convention on Human Rights [@CouncilOfEuropeProtocol1988], [@Hirvela2022].
RSEs need to be aware of this topic's importance
and deal with tensions that might arise with researchers' desire for frictionless sharing of data.
Handling personal data also has ramifications for information security considerations during the software development process.
Data protection is a difficult subject and RSEs should notice when they need to consult external expertise for example when dealing with
special topics such as cryptography or re-identification attacks (e.g. [@Sweeney2002]).

### Mentoring and diversity

RSEs are often experienced professionals who instruct and work closely with early career researches.
Similarly to academic supervisors, they bear a certain responsibility to guide and advise younger colleagues
with respect to career development and the achievement of academic goals.
Software engineering is still strongly dominated by white males [@StackOverflow2022].
In their work RSEs might frequently find themselves in a position
to encourage, mentor and empower people who gravitate towards software-related occupations.
In this capacity they should be aware of the diversity problem and help to mediate it
whenever they have the chance to do so.

### The scientific community

Through writing research software, RSEs have a pivotal position in the process of scientific production.
Their choices might determine whether the respective research is reproducible or not,
whether the results can be re-used, whether future research can build on existing tools or has to start from scratch.
Builders of larger research-infrastructure projects determine to some extent
the possibilities and limitations of future research
and therefore need to be aware of concepts such as Open Science, path dependence and vendor lock-in.

### Emerging challenges

RSEs often operate at the cutting edge of technological development
and therefore might have to deal with technologies of which the dangers and drawbacks are still poorly understood.
A current example is the rush for the application of Large Language Models (LLMs),
where RSEs working in these fields should stay up-to-date and be able to help researchers to assess topics
such as training-data bias, LLM "hallucinations" or malicious use.

*** A SURVEY OF INITIATIVES PROVIDING EDUCATIVE MATERIAL IN THE RSE SPACE ***

### Related Work and Activities
## Related Work and Activities


The challenges of understanding the current state of skills within the research software community and related areas, as well as identifying required competencies, developing training pathways and providing training materials are areas that are being looked at and addressed by various groups and projects. In this section, we highlight some of these other projects and activities.

Expand Down Expand Up @@ -876,7 +937,7 @@ institutions to issue these certificates.
Additionally, it can be excluding capable applicants who already use these
skills but never got a certificate for it.

The possible types of certificates can of course differ.
The possible types of certificates can of course differ.
The [HPC skills and certification] Appendix explores current efforts at creating
a HPC certification program for both academic and industry RSEs. Course attendance
sheets and digital tokens [@Ifenthaler2016; @Chakroun2018; @Fanfarelli2015; @McDaniel2016]
Expand Down

0 comments on commit b9b8161

Please sign in to comment.