ALL >> Computer-Programming >> View Article
Ten Commandments Of Computer Ethics
Computer ethics is a philosophy that includes a set of ethical values that a computer user should adhere to. The Ten Commandments of Computer Ethics establish guiding principles to be followed while using computer technology. Here they are.
A Quick Look
#1. Thou shalt not use a computer to harm other people.
#2. Thou shalt not interfere with other people's computer work.
#3. Thou shalt not snoop around in other people's files.
#4. Thou shalt not use a computer to steal.
#5. Thou shalt not use a computer to bear false witness.
#6. Thou shalt not use or copy software for which you have not paid.
#7. Thou shalt not use other people's computer resources without authorization.
#8. Thou shalt not appropriate other people's intellectual output.
#9. Thou shalt think about the social consequences of the program you write.
#10. Thou shalt use a computer in ways that show consideration and respect.
The Explanation
With the development and widespread use of technology, there arose a need to distinguish between the right and wrong ways of harnessing it. Increased ...
... accessibility to information had its advantages but unauthorized access was a threat to data security. Communication became faster. Important messages could span huge distances within seconds but so could rumors. Advancements in technology redefined accessibility. The line between the good and bad use of technology blurred and there was a need to establish a code of ethics for its users. Realizing this need, the Computer Ethics Institute came up with The Ten Commandments of Computer Ethics in 1992. Dr. Ramon C. Barquin, for the first time presented these commandments as a part of his research paper. Their intent was to address the gray area between the ethical and unethical use of computer technology.
Commandment 1
Simply put: Do not use a computer in ways that may harm other people.
Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics.
Commandment 2
Simply put: Do not use computer technology to cause interference in other users' work.
Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical.
Company: Electro Computer Warehouse
Address: 1575 Sis met Rd, Unit # 1 & 2 Mississauga, ON - L4W 1P9
Zip code: L4W 1P9
Contact person: http://www.electrocomputerwarehouse.com
Phone: 905-290-0677
Email: fed.pats@gmail.com
More information can be found online at: http://www.electrocomputerwarehouse.com
Add Comment
Computer Programming Articles
1. Dynamics 365 Human Resources Capabilities Organizations Managing A Growing Workforce Often Face Challenges Such As Disconnected Hr Systems, Manual ReAuthor: brainbell10
2. Market Forecast: Ai Native Networking Platform
Author: Umangp
3. Microsoft Dynamics 365 Sales Module Features
Author: brainbell10
4. Tvos Apps Development Services
Author: davidjohansen
5. Esp Signature Vs Esp Ultimate: A Strategic Breakdown
Author: ECF Data
6. Javascript Tutorial For Students: Step-by-step Learning With Practical Examples
Author: Tech Point
7. Jquery Tutorial: A Complete Guide For Beginners To Advanced Learning
Author: Tech Point
8. Dynamics 365 Implementation Best Practices Guide
Author: brainbell10
9. Sql Server Development Services In Usa
Author: davidjohansen
10. Tableau Consulting & Data Visualization Services
Author: brainbell10
11. Why Startups Should Use Laravel For Ai Product Development
Author: Melisa Hope
12. Custom Snowflake Data Solutions
Author: brainbell10
13. Sketch Digital Design & Product Experience Services
Author: brainbell10
14. Artificial Neural Network Tutorial: Step-by-step Guide To Understanding Neural Networks
Author: Tech Point
15. Sitecore Development Top App Development
Author: brainbell10






