Fundamentals of Ethics Ethics: Moral principles that govern a person's behavior or the conducting of an activity. Personal Ethics: Individual moral principles guiding personal decisions. Professional Ethics: Moral principles guiding behavior in a professional context (e.g., engineering, medicine). Civic Virtue: Moral duties and obligations as a citizen (e.g., integrity, responsibility to community). Respect for Others: Acknowledging the inherent dignity and rights of all individuals. Profession & Professionalism: A vocation requiring specialized knowledge and adherence to ethical standards. Professionalism is the conduct, aims, or qualities that characterize or distinguish a profession or a professional person. Ingenuity, Diligence, Responsibility: Key qualities in ethical practice. Ingenuity: Cleverness, originality, and inventiveness. Diligence: Careful and persistent work or effort. Responsibility: Being accountable for one's actions. Integrity in Design, Development, and Research Integrity: A foundational ethical principle across all engineering and scientific disciplines, meaning acting with honesty, responsibility, and professionalism at every stage. Integrity in Design Definition: Maintaining honesty, transparency, and ethical standards during conceptualization and creation. Key Elements: Honesty: No falsified data, test results, or misleading claims. Safety & Reliability: Designs must protect human life, property, and environment. Accountability: Engineers take responsibility for their work, including mistakes. Transparency: Clear communication of risks, assumptions, and limitations. Compliance: Follow relevant standards, laws, codes, and best practices. Sustainability: Consider long-term environmental, social, economic impact. Example: Refusing to reduce safety margins in a building design, even under budget pressure. Integrity in Development Definition: Ethical behavior during the implementation or manufacturing phase. Key Aspects: Adherence to specifications: No substitutions with inferior parts without proper testing/approval. Testing and validation: Results should not be manipulated or ignored. Documentation: Clear, complete, and truthful reporting of processes, changes, and problems. Respect for intellectual property: No plagiarism or unauthorized use of proprietary technology. Example: Reporting a hardware failure during prototyping instead of hiding it to meet a deadline. Integrity in Research Definition: Commitment to ethical standards while conducting scientific inquiry or technological investigation. Key Aspects: Honest data reporting: No data fabrication, falsification, or selective omission. Proper attribution: Acknowledge contributions and avoid plagiarism. Transparency: Clearly state limitations, assumptions, and conflicts of interest. Human/animal ethics: Adherence to ethical guidelines when working with subjects. Example: Publishing negative experimental results rather than suppressing them to protect a hypothesis. Why Integrity Matters Across All Domains Domain Without Integrity... Design Unsafe, unreliable products; legal & ethical failure Development System failures, product recalls; reputational damage Research Misleading science, wasted funding; public distrust Plagiarism What is Plagiarism? Presenting someone else's work, ideas, or words as your own without proper credit. A serious ethical violation. Types of Plagiarism: Type Description Direct Plagiarism Copying text word-for-word without attribution. Self-Plagiarism Reusing your previously submitted work without disclosure. Paraphrasing Plagiarism Rewriting someone's idea in your own words but not citing the source. Mosaic (Patchwork) Mixing copied text from multiple sources without proper citation. Accidental Plagiarism Forgetting to cite or quoting improperly, even without intent. Consequences of Plagiarism: Field Potential Consequences Academia Expulsion, degree revocation, failing grades. Research Paper retraction, funding loss, blacklisting. Industry Job loss, legal penalties, loss of credibility. How to Avoid Plagiarism: Cite your sources (books, articles, websites, etc.). Use quotation marks for direct quotes. Paraphrase properly with attribution. Use plagiarism checkers. Keep track of all sources during research and writing. Legal Outlook on Plagiarism: Not always illegal unless it violates copyright law. Legal implications depend on jurisdiction and context. Legal Instruments Involved: Copyright Law: Protects original expressions of ideas. Academic Codes: Universities impose penalties (expulsion, degree revocation). Publishing Ethics: Journals may retract articles, ban authors, sue for damages. Professional Standards: Disciplinary actions in journalism, law, research. Challenges in Addressing Plagiarism: Detection Challenges: Difficult to trace paraphrased or translated plagiarism; limited scope of tools. Ambiguity in Legal Protection: Not all plagiarized content is protected by copyright; idea vs. expression dichotomy. Enforcement Issues: Legal action is expensive, time-consuming; inconsistent academic responses. Case Studies: Jonah Lehrer (USA): Science journalist reused own material, fabricated quotes. Outcome: Public disgrace, lost job. Chemistry Professor (Sri Venkateswara University): Accused of plagiarizing over 70 articles. Banned from research guidance and examination work. Prof. B.S. Rajput: Accused of copying research paper. Resigned as Vice-Chancellor after investigation. Conclusion: Plagiarism is a multifaceted issue at the intersection of ethics, law, and education. Requires clear legal frameworks, education on citation norms, and a culture of integrity. Technology and Digital Revolution Technology: Tools, machines, systems, and methods developed using scientific knowledge to solve problems or make life easier. Examples: Wheel, electricity, telephones, computers, AI. Digital Revolution: Rapid transformation where analog systems were replaced by digital ones (1970s-1980s onwards). Rise of: Personal computers, digital communication (emails, mobile phones), the Internet, social media, cloud computing, AI & Big Data. Data, Information, Knowledge Hierarchy (DIKW) Data - Raw facts: Unprocessed facts and figures collected from various sources. Has no meaning on its own. Example: Numbers from sensors: $35, 46, 98$. Information - Processed data: Data that has been organized, processed, or analyzed so that it has meaning. Example: Numbers from a temperature sensor processed and converted to temperature in degree Celsius or Fahrenheit. Knowledge: Understanding gained by using information to make decisions, solve problems, or predict outcomes. Involves experience, context, and judgment. Example: A business uses customer behavior data to personalize ads. Cybersecurity What is Cybersecurity? Practice of protecting computers, networks, programs, and data from unauthorized access, damage, or attacks. Safeguards digital devices, personal information, and online activity. Main Goal: Ensure Confidentiality, Integrity, and Availability of digital data (the CIA Triad). The CIA Triad: Confidentiality: Ensuring sensitive information is accessed only by authorized individuals. Integrity: Maintaining accuracy and reliability of data; ensuring it is not altered or tampered with. Availability: Ensuring information and resources are accessible to authorized users when needed. Types of Cybersecurity: Network Security: Protecting networks from unauthorized access, data breaches (Firewalls, VPNs, antivirus). Application Security: Securing software applications and preventing vulnerabilities (secure coding, updates, application-level firewalls). Data Security: Safeguarding sensitive data from unauthorized access, disclosure, alteration, destruction (Encryption, Access controls, DLP). Cloud Security: Defending cloud storage and applications (securing data, applications, infrastructure on cloud platforms like AWS, Azure). Endpoint Security: Protecting individual devices like laptops, phones, IoT devices (antivirus, IPS, device encryption, software updates). Operational Security: Managing internal security protocols, processes, and policies (access controls, risk management, employee training). Internet of Things (IoT) Security: Protecting internet-connected devices from cyber threats (smart homes, wearables, connected cars). Why is Cybersecurity Important? To protect sensitive data (passwords, banking info, medical records). To prevent hacking, phishing, ransomware, and data leaks. To secure national infrastructure, businesses, and personal devices. Types of Cyber Attacks: Phishing: Hackers trick users into revealing sensitive data via fake emails/messages (social engineering, malicious links). Distributed Denial of Service (DDoS): Hackers flood a website/server with traffic, causing it to slow down or crash. Cyber Trust Definition: Confidence individuals and organizations have in the security, privacy, and reliability of the digital world (internet, online services, devices, software). Example: Trusting Google Pay with bank account details because it's perceived as safe. Key Components of Cyber Trust: Security: Is the system protected from hackers, malware? Privacy: Is personal data collected, used, stored responsibly? Transparency: Do I know how my data is used? Are terms clear? Reliability: Will the service perform as expected without failure? Accountability: Can people/companies be held responsible if something goes wrong? Relationship Between Cyber Trust and Cybersecurity: Cybersecurity Cyber Trust Technical tools & methods Social and ethical belief in the system Protects data and systems Builds user confidence Includes encryption, firewalls Includes transparency, user awareness Engineers build it Users feel it Example (UPI Payment App): Cybersecurity encrypts data & verifies transactions. Cyber trust means you trust the app to keep your money safe, which is why you use it. Data Collection and Management Data Collection: Process of gathering raw facts and figures from various sources for analysis and decision-making. Data Management: How we store, organize, protect, and use collected data efficiently and securely. Why It Is Important: Informed decisions: Businesses, governments, researchers use data for better decisions. Personalization: Apps/websites tailor experiences (e.g., YouTube recommendations). Security: Proper management prevents data loss, theft, misuse. Legal compliance: Follows data protection laws (GDPR, HIPAA). Data Life Cycle: Collection: Sources (Surveys, sensors, social media, databases), Types (Text, images, video, numbers, biometrics). Storage: Databases, cloud storage. Cleaning: Removing duplicates, fixing errors, formatting. Organization: Sorting and structuring data for easy access. Analysis: Using tools (Excel, SQL, Python, AI) to find patterns/insights. Sharing/Reporting: Creating dashboards, reports, visualizations. Security & Privacy: Encryption, access control, backups. Disposal: Secure deletion of outdated or unnecessary data. Example in Real Life: Online Shopping: Collection: User clicks, purchases, search history recorded. Storage: Data saved on e-commerce servers. Cleaning: Removing faulty or repeated logs. Analysis: What items are most viewed/purchased? Personalization: Recommendations based on behavior. Security: Encrypting user info (passwords, card data). High Technologies: Connecting People and Places What It Means: Advanced tools and systems relying on modern science and engineering that help connect people, places, and information regardless of physical distance. How High Technology Connects Us: Communication Technology: Examples: Smartphones, internet, email, social media, video calls (Zoom, WhatsApp). Impact: Instantly connects people across the globe. Benefit: Real-time communication and collaboration for friends, families, businesses, students. Transportation Technology: Examples: High-speed trains, electric vehicles, air traffic control systems. Impact: Physical movement of people and goods becomes faster and safer. Benefit: Connects remote areas with cities; supports global trade and tourism. Geospatial Technology: Examples: Google Maps, GIS (Geographic Information Systems). Impact: Helps understand, map, and manage locations and environments. Benefit: Used in agriculture, disaster relief, city planning, navigation. Internet of Things (IoT): Examples: Smart homes, wearable health devices, connected cars. Impact: Devices talk to each other and send information over the internet. Benefit: Improves efficiency, health, safety, and daily life convenience. E-commerce & Digital Platforms: Examples: Amazon, Flipkart, Uber, Zomato. Impact: Businesses and services reach people in different cities or villages. Benefit: Local sellers can sell nationwide or globally. Real-World Effects of High Technology: Area How It Connects People & Places Education Online learning, global courses Healthcare Telemedicine, remote diagnosis tools Business Remote work, international collaboration Culture Social media spreads art, language, and ideas Environment Tech tracks pollution, climate, and disasters Conclusion: High technologies shrink distances and empower progress, but must be used ethically and inclusively. Accessibility – Making Technology Usable for Everyone What is Accessibility? Designing products, services, or environments so that everyone, including people with disabilities or limitations, can use them easily and equally. Who Benefits from Accessibility? People with physical disabilities (e.g., wheelchairs). People with sensory impairments (e.g., blind, deaf, colorblind). People with cognitive challenges (e.g., learning difficulties, memory loss). Elderly users, or anyone in temporary conditions (e.g., a broken arm). Examples of Accessibility Features: Feature How It Helps Screen readers Read out text for blind users Voice commands Allow hands-free control Subtitles / Captions Help deaf users understand audio content Color contrast settings Aid people with color blindness Ramps and auto doors Improve access in physical buildings Keyboard shortcuts Help users who can't use a mouse Social Impacts of Technology What Are Social Impacts? Positive or negative effects technology has on how people live, work, communicate, learn, and interact in society. Positive Social Impacts: Area Example Education Online learning platforms reach rural and remote students Healthcare Telemedicine helps people in remote areas access doctors Communication Social media connects people worldwide Employment Remote work increases job opportunities across regions Inclusion Assistive tech empowers people with disabilities Negative Social Impacts: Area Example Digital divide Not everyone has access to internet or devices Isolation Too much screen time reduces real-world interactions Privacy issues Personal data may be misused Cyberbullying Harassment through social media or messaging apps Connection Between Accessibility & Social Impact: Making technology accessible: Reduces inequality, improves inclusion, ensures everyone benefits. Neglecting accessibility: Can cause exclusion, frustration, and widen the digital divide. Managing Conflict Definition: Process of identifying and handling disagreements constructively. Aims to resolve disputes peacefully and productively without damaging relationships. What is Conflict? Happens when two or more parties have incompatible goals, needs, values, or beliefs. Types: Internal (within a person), Interpersonal (between people), Organizational (within groups or teams). Why Is Conflict Management Important? Prevents escalation of disputes. Improves relationships. Encourages collaboration and creativity. Builds trust and team morale. Helps in decision-making. Steps in Managing Conflict: Recognize the conflict: Acknowledge its existence. Understand the cause: Identify root problem (miscommunication, personality clash, etc.). Listen actively: Let each party express views without interruption; show empathy. Communicate clearly and respectfully: Use "I" statements, avoid blame. Find common ground: Focus on shared goals or interests. Generate solutions: Brainstorm options that benefit everyone. Agree on action: Decide on way forward, clarify responsibilities. Follow up: Check if solution is working or needs adjustment. Conflict Management Styles (Thomas-Kilmann Instrument - TKI): Competing Style (Win-Lose): High assertiveness, low cooperativeness. Prioritize own goals. Effective in urgent situations, but can strain relationships. Collaborating Style (Win-Win): High assertiveness, high cooperativeness. Seek solutions that benefit all parties. Ideal when goals align. Compromising Style (Balanced Trade-off): Moderate assertiveness & cooperativeness. Find middle ground. Suitable when parties need to move forward. Avoiding Style (No Win - No Lose): Low assertiveness & cooperativeness. Evade conflict. Generally discouraged as it leaves issues unresolved. Accommodating Style (Lose-Win): Low assertiveness, high cooperativeness. Prioritize maintaining relationships and meeting others' needs. Appropriate when preserving relationships is crucial. Collective Bargaining Definition: Negotiation process between employers and a group of employees (usually represented by a trade union) to reach agreements on working conditions. What is Negotiated: Wages, working hours, benefits, job security, workplace safety, other employment terms. Types of Collective Bargaining: Distributive Bargaining: Focuses on dividing limited resources (e.g., salary increases). Integrative Bargaining: Seeks mutual benefits (e.g., better work-life balance). Productivity Bargaining: Links pay to performance or output. Concessionary Bargaining: Workers agree to lower benefits in times of crisis. Composite Bargaining: Covers both monetary and non-monetary issues. Steps in Collective Bargaining Process: Preparation: Parties gather facts, define goals. Negotiation: Open discussions, proposals. Bargaining: Back-and-forth offers and compromises. Agreement: Reaching a mutual understanding. Implementation: Putting agreement into practice. Monitoring: Ensuring contract is followed. Importance of Collective Bargaining: Gives workers a voice in decision-making. Promotes fair wages and safe working conditions. Reduces chance of strikes and disputes. Strengthens employer-employee relationships. Encourages industrial peace. Example: Car manufacturing plant union negotiates for a pay raise, safety measures, paid overtime. After talks, they agree on a 7% raise and new safety protocols. Confidentiality Definition: Keeping information private and secure, especially when shared in trust. Ensures sensitive info is accessible only to authorized people and not disclosed without permission. It is the ethical and legal duty to protect personal, professional, or sensitive information. Confidential Information May Include: Context Confidential Information May Include Healthcare Patient medical records, test results Business Trade secrets, employee data, financial records Education Student grades, personal data Law Client details, case discussions Technology User passwords, personal data collected by apps/websites Why Is Confidentiality Important? Builds trust between individuals and organizations. Protects privacy and rights. Prevents identity theft, fraud, or misuse. Ensures legal compliance. Maintains professional ethics. How to Maintain Confidentiality: Limit access: Only authorized people view/use information. Use secure systems: Passwords, encryption, locked files. Don't share unnecessarily: Even casual sharing can be a breach. Sign confidentiality agreements: Common in workplaces/legal contexts. Report breaches: Take corrective steps if confidentiality is broken. Example: A nurse discussing a patient's health condition with a friend in public is a violation of confidentiality. Confidentiality in Moral Integrity Role: Plays a crucial role in upholding moral integrity in professional and personal relationships. Reflects honesty, trustworthiness, and respect for others' privacy. What Is Moral Integrity? Doing the right thing even when no one is watching. Includes being truthful, respecting others, keeping promises, acting ethically and consistently. How Confidentiality Supports Moral Integrity: Aspect of Integrity How Confidentiality Reflects It Trustworthiness Keeping information private shows you can be relied upon. Respect for Others Protecting someone's data or secrets respects their dignity. Honesty & Loyalty Not misusing shared information proves moral character. Accountability Taking responsibility if a breach occurs shows integrity. Examples: A teacher not disclosing a student's family problem. A lawyer keeping client discussions private. A friend not sharing someone's personal secret. Code of Ethics Definition: A set of rules and principles that guide how people should behave, especially in professional settings. A formal document outlining ethical standards, values, and expected behavior. Purpose of a Code of Ethics: Promote honesty, fairness, responsibility. Guide decision-making in difficult situations. Prevent misconduct or unethical behavior. Build trust with the public and among colleagues. Uphold the reputation of a profession or organization. Common Values in a Code of Ethics: Value Meaning Integrity Be honest and do the right thing Respect Treat everyone with dignity and fairness Confidentiality Protect private information Accountability Take responsibility for your actions Professionalism Maintain high standards of conduct and performance Examples: Medical Code of Ethics (Hippocratic Oath): Do no harm, respect patient confidentiality. Teacher's Code of Ethics: Treat students fairly, avoid favoritism, maintain professional boundaries. Corporate Code of Ethics: No bribery, follow laws, respect employees and customers. Journalists' Code of Ethics: Report truthfully, avoid plagiarism, protect sources. Benefits of a Code of Ethics: Provides clarity on expected behavior. Reduces conflict of interest. Encourages a positive work culture. Strengthens public confidence. Basic Concepts in Gender Studies Gender Studies: A multidisciplinary field exploring roles, experiences, identities, and inequalities related to gender in society. Sex: Biological and physical characteristics defining humans as male, female, or intersex. Based on: Genitals, chromosomes (XY=male, XX=female), hormones (testosterone, estrogen). Key Point: Assigned at birth based on anatomy; biological, but not always binary (intersex). Gender: Social and cultural meaning given to sex; how people identify themselves and how society expects them to behave based on that identity. Gender Identity: How someone feels inside (man, woman, both, neither). Gender Expression: How someone shows their gender (clothes, behavior, voice). Gender Roles: Social expectations (e.g., "girls play with dolls," "boys don't cry"). Key Points: Not the same as biological sex; can change over time and vary across cultures (e.g., transgender). Sexuality: Who you are romantically or sexually attracted to. Types of Sexual Orientations: Heterosexual, Homosexual, Bisexual, Asexual, Pansexual. Key Points: About attraction, not gender identity or sex. Someone's gender doesn't determine their sexuality. Summary Table: Concept What It Means Based On Examples Sex Biological classification Anatomy, chromosomes Male, Female, Intersex Gender Identity & social roles Self-identification, culture Man, Woman, Non-binary Sexuality Romantic/sexual attraction Feelings and preferences Straight, Gay, Asexual Example of Distinction: Alex is born male (sex), identifies as a woman (gender), and is attracted to women (sexuality: lesbian). Shows distinct but interconnected concepts. Gender Spectrum – Beyond the Binary Gender Spectrum: Idea that gender is not just two categories (male/female) but exists on a continuum with many possible identities. Recognizes gender is diverse, fluid, and socially constructed. Beyond the Binary: Challenges traditional belief of only two genders. Recognizes gender is a wide, diverse spectrum of identities, experiences, and expressions. Identity Types: Identity Type Description Non-binary Someone whose gender is not strictly male or female. Agender Someone who identifies with no gender. Bigender Someone who identifies as two genders (either at the same time or at different times). Genderfluid Someone whose gender shifts over time. Why This Concept is Important: Validates all identities. Promotes equality and inclusion. Encourages personal freedom. Examples of Going Beyond the Binary: Language: Using they/them pronouns. Forms: Offering "non-binary" or "prefer not to say" options. Fashion: Clothing styles not restricted to "men's" or "women's." Gender Identity Definition: A person's deeply held sense of their own gender. How someone experiences and labels themselves – as male, female, a mix, neither, or something else entirely. Aspects: Aspect Explanation Internal Feeling It's about how you feel inside, not what others assume. Self-Identification Only you can define your gender identity. Not Always Visible It's not based on appearance or body parts. Can Change Over Time For some people, gender identity is fluid, not fixed. Types of Gender Identity: Identity Description Cisgender Gender identity matches sex assigned at birth. Transgender Gender identity is different from sex assigned at birth. Non-binary Not exclusively male or female. Agender Feels they have no gender. Genderfluid Gender identity changes over time. Bigender Identifies with two genders. Gender Expression Definition: How a person outwardly shows their gender identity – through clothing, hairstyle, voice, behavior, body language, and name or pronouns. What others can see or hear. May not always match gender identity or sex assigned at birth. Key Points: Feature Description Outward It's visible or social (how you present yourself). Cultural What's "masculine" or "feminine" depends on society. Fluid It can change daily, or over time. Personal It's about how a person feels comfortable expressing themselves. Examples: Expression Type May Include Masculine Short hair, deep voice, suits, facial hair, strong posture Feminine Long hair, dresses, makeup, soft tone, graceful movement Androgynous A blend of masculine and feminine traits (e.g., jeans, neutral colors) Fluid Changing expressions on different days or occasions Gender Identity vs Gender Expression: Gender Identity Gender Expression Internal – how you feel External – how you present Can't always be seen Can be observed Examples: cis, trans, non-binary Examples: feminine, masculine, androgynous Gender Stereotypes Definition: Oversimplified and generalized beliefs about how people should behave, based on their gender. Assume all men or women must act, think, or feel in certain ways, even though individuals vary widely. These are social beliefs that limit people, not facts. Common Stereotypes: Gender Common Stereotypes Women Emotional, nurturing, weak, should cook/clean, dependent. Men Strong, aggressive, shouldn't cry, breadwinner. Examples of Stereotypes: Personality Traits: Women are sensitive; men are brave and assertive. Roles at Home/Work: Women care for children; men earn money and lead. Physical Appearance: Women must be pretty and slim; men must be muscular and tall. Impact of Stereotypes: Impact Description Limit potential Prevent people from pursuing interests or careers they truly want. Cause discrimination In schools, jobs, or families based on gender. Affect mental health People feel pressure to conform or hide who they really are. Promote inequality Justifies unequal pay, job roles, or access to opportunities. Gender Disparity and Discrimination Gender Disparity: Unequal outcomes between people of different genders in areas like education, employment, health, and decision-making. Shows the gap/imbalance, even if not always direct discrimination. Examples: Fewer girls in school, women earning less than men, more men in leadership. Gender Discrimination: Unfair or unequal treatment of someone because of their gender. Involves bias, stereotypes, prejudice, leading to or worsening gender disparity. Examples: Not hiring a woman due to potential pregnancy, paying a man more for the same job, expecting only girls to do household chores. In Education: Girls less likely to be enrolled in school in many parts of the world. Cultural beliefs, early marriage, or prioritization of boys' education limit girls' access. Girls may face lower expectations or be steered away from STEM/leadership. LGBTQ+ students may experience bullying, exclusion, lack of support. In Employment: Women underrepresented in leadership and high-paying fields. Significant gender pay gap globally. Women face bias in hiring, promotion, evaluations. "Motherhood penalty" for pregnant women/mothers. In Everyday Life: Women and gender minorities have less say in household/community decisions. Harassment in public spaces, online. Stereotyping (e.g., women emotional, men shouldn't cry). Dress codes, curfews, societal expectations restrict freedom. Example: Woman judged for going out alone at night, man not questioned. History of Women in Science and Technology Overview: A story of resilience, talent, and breaking barriers. Women made significant contributions despite exclusion, bias, and lack of recognition. Often not allowed in universities or scientific societies, contributions sometimes published under male names. 17th-19th Century: Early Scientists in a Male-Dominated World Margaret Cavendish: Published on physics/natural philosophy during Scientific Revolution, defying norms. Caroline Herschel: First woman to discover a comet; assisted William Herschel in astronomy. Mary Anning: Fossil collector/paleontologist; shaped early ideas of prehistoric life. 20th Century: Breakthroughs and Recognition Begin Marie Curie: First woman to win Nobel Prize (Physics & Chemistry); pioneered radioactivity. Rosalind Franklin: Used X-ray diffraction for DNA structure; data critical but not initially credited. Barbara McClintock: Won Nobel Prize for discovering "jumping genes" in maize genetics. Technology: Ada Lovelace: Wrote first algorithm for a machine (world's first programmer). Grace Hopper: Invented first compiler; key figure in COBOL programming language. Post-War to Modern Times (1950s-Today) Space & Engineering: Katherine Johnson, Dorothy Vaughan, Mary Jackson: Black women mathematicians at NASA (Hidden Figures); contributed to key space missions. Kalpana Chawla (India): First Indian woman in space; role model in aerospace and STEM. Ethical Values and Practices: Gender Equity, Diversity, Justice Gender Equity: Ensuring fair treatment based on gender, using different strategies/resources to address historical/social disadvantages. Ethical Values Involved: Fairness: Giving each individual what they need to succeed. Compassion: Understanding unequal burdens. Responsibility: Leaders must act to close gender gaps. Ethical Practices: Equal access to education/jobs, scholarships for underrepresented genders, maternity/paternity leave. Gender Diversity: Acknowledges and respects a range of gender identities and expressions (male, female, transgender, non-binary). Ethical Values Involved: Respect for Dignity: Everyone has the right to be respected. Inclusion: Actively welcoming people of all gender identities. Equality: No one should be excluded or treated unfairly. Ethical Practices: Inclusive language, gender-neutral forms, anti-discrimination policies. Example: Workplace updates policies for transgender employees, creates safe spaces. Gender Justice: Ending gender-based discrimination, addressing inequalities, ensuring all genders enjoy equal rights, freedoms, and dignity. Ethical Values Involved: Justice: Equal protection, opportunity, freedom. Empowerment: Enabling marginalized genders to speak up/lead. Accountability: Systems must correct injustices. Ethical Practices: Legal frameworks against sexual harassment, gender-sensitive policymaking, gender audits. Example: Company conducts gender audits for fair promotion and salary policies. Gender Policy and Women/Transgender Empowerment Initiatives Gender Policy: Set of principles, rules, and actions promoting gender equality and justice within institutions, governments, or organizations. Objectives of Gender Policy: Eliminate gender-based discrimination. Promote gender equity and inclusion. Ensure equal access to resources, opportunities, rights. Key Principles: Inclusion: All genders represented and respected. Equity: Resources distributed based on needs. Empowerment: Strengthening voice and agency of marginalized genders. Women Empowerment Initiatives in India: Initiative Description Beti Bachao, Beti Padhao (2015) Address declining child sex ratio, promote girl child education. Mahila E-Haat Digital platform to support women entrepreneurs in marketing products. Ujjwala Scheme Provides free LPG connections to reduce health hazards for women using firewood. Sukanya Samriddhi Yojana Savings scheme for girls' education and marriage expenses. Reservation in Panchayats One-third of seats reserved for women in local governance to promote leadership. Transgender Empowerment Initiatives in India: Initiative / Law Description Transgender Persons (Protection of Rights) Act, 2019 Ensures legal recognition and protection from discrimination in education, employment, healthcare. National Transgender Policy Draft (2020) Aims to provide housing, skill development, medical care. SMILE Scheme (2022) Offers support for skill development, shelter homes (Garima Greh), and rehabilitation. NALSA Judgment (2014) Supreme Court recognized transgender as the third gender and affirmed fundamental rights. Conclusion: Gender policy is not just about laws – it's about reshaping society to ensure dignity, opportunity, and safety for every individual, regardless of gender.