We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

The Ten Commandments of Computer Ethics Essay Sample

essay
The whole doc is available only for registered users OPEN DOC

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

The Ten Commandments of Computer Ethics Essay Sample

1) Thou shalt not use a computer to harm other people:

If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. 2) Thou shalt not interfere with other people’s computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses are unethical work. 3) Thou shalt not snoop around in other people’s files:

Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption. 4) Thou shalt not use a computer to steal:

Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5) Thou shalt not use a computer to bear false witness:

The Internet can spread untruth as fast as it can spread truth. Putting out false “information” to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. 6) Thou shalt not use or copy software for which you have not paid: Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format.

7) Thou shalt not use other people’s computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical. 8) Thou shalt not appropriate other people’s intellectual output: For example, the programs you write for the projects assigned in this course are your own intellectual output. Copying somebody else’s program without proper authorization is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.

9) Thou shalt think about the social consequences of the program you write: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material. That law was struck down because it violated the free speech principles in that country’s constitution. The discussion, of course, is going on.

10) Thou shalt use a computer in ways that show consideration and respect: Just like public buses or banks, people using computer communications systems may find themselves in situations where there is some form of queuing and you have to wait for your turn and generally be nice to other people in the environment. The fact that you cannot see the people you are interacting with does not mean that you can be rude to them.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Copyright Law

COPYRIGHTS: A copyright represents an original and unique work of authorship in a corporeal form. Thus the owner of the copyrighted work has the privileges to copy, prepare variant of, distribute, publicly perform and exhibit the work. Thus the examples of copyrightable subject matter include literary work such as newspaper articles, books, visual creations such as photographs and film, art, dramas, plays, scriptures, musicals or...

Copyrights Paper

A copyright represents an original and unique work of authorship in a corporeal form. Thus the owner of the copyrighted work has the privileges to copy, prepare variant of, distribute, publicly perform and exhibit the work. Thus the examples of copyrightable subject matter include literary work such as newspaper articles, books, visual creations such as photographs and film, art, dramas, plays, scriptures, musicals or other...

Technology Copyright

Google does not violate the rights granted to copyright owners under 17 USC106. The company’s actions with cached links fall within the provisions of this law because it does not distort works in ways that are harmful to reputation or market value. Two rights directly affected by the actions of Google are the first and third cases in 17 USC 106. In regard to the...

OD interventions

1. Company Information Smile N Dance is a shopping and night time entertainment complex opened in the late l970's by Mr. Dan Smile, father of the current president and CEO Dana Smile. Dan had envisioned a simple, clean family place where people would come to unwind, relax, and have fun. Mr. Smile considered his employees and customers as part of his family and at times...

Coconut Telegraph

Coconut Telegraph Corporation (Coconut) is a developer and provider of specialized customer billings and management software and systems. Coconut’s flagship product, the Volcano System, is a customer billings and management system consisting of integrated hardware (user interfaces and consoles) and related software. Coconut has never sold, nor does it offer to sell, the Volcano System without the software since the software is necessary for the...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Couldn't Find What You Looking For?

Get access to our huge knowledge base which is continuously updated

Next Update Will Be About:
14 : 59 : 59
Become a Member