123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Ten Commandments Of Computer Ethics

Profile Picture
By Author: fed pats
Total Articles: 225
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Computer ethics is a philosophy that includes a set of ethical values that a computer user should adhere to. The Ten Commandments of Computer Ethics establish guiding principles to be followed while using computer technology. Here they are.

A Quick Look

#1. Thou shalt not use a computer to harm other people.
#2. Thou shalt not interfere with other people's computer work.
#3. Thou shalt not snoop around in other people's files.
#4. Thou shalt not use a computer to steal.
#5. Thou shalt not use a computer to bear false witness.
#6. Thou shalt not use or copy software for which you have not paid.
#7. Thou shalt not use other people's computer resources without authorization.
#8. Thou shalt not appropriate other people's intellectual output.
#9. Thou shalt think about the social consequences of the program you write.
#10. Thou shalt use a computer in ways that show consideration and respect.

The Explanation

With the development and widespread use of technology, there arose a need to distinguish between the right and wrong ways of harnessing it. Increased ...
... accessibility to information had its advantages but unauthorized access was a threat to data security. Communication became faster. Important messages could span huge distances within seconds but so could rumors. Advancements in technology redefined accessibility. The line between the good and bad use of technology blurred and there was a need to establish a code of ethics for its users. Realizing this need, the Computer Ethics Institute came up with The Ten Commandments of Computer Ethics in 1992. Dr. Ramon C. Barquin, for the first time presented these commandments as a part of his research paper. Their intent was to address the gray area between the ethical and unethical use of computer technology.

Commandment 1

Simply put: Do not use a computer in ways that may harm other people.
Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data. Being involved in practices like hacking, spamming, phishing or cyber bullying does not conform to computer ethics.

Commandment 2
Simply put: Do not use computer technology to cause interference in other users' work.
Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may overload computer memory through excessive consumption of computer resources, thus slowing its functioning. It may cause a computer to function wrongly or even stop working. Using malicious software to attack a computer is unethical.

Company: Electro Computer Warehouse

Address: 1575 Sis met Rd, Unit # 1 & 2 Mississauga, ON - L4W 1P9


Zip code: L4W 1P9


Contact person: http://www.electrocomputerwarehouse.com


Phone: 905-290-0677


Email: fed.pats@gmail.com

More information can be found online at: http://www.electrocomputerwarehouse.com

Total Views: 541Word Count: 523See All articles From Author

Add Comment

Computer Programming Articles

1. Stop Experimenting, Start Profiting: How Azure Ai 2026 Delivers Real Business Roi
Author: ECF Data

2. Advanced C Programming Tips & Tricks | Programming Classes
Author: TCCI - Tririd Computer Coaching Institute

3. Step-by-step Angular 8 Tutorial: Features, Benefits, And Easy Learning Guide
Author: Tech Point

4. Reactjs Tutorial Explained: Learn Components, State, And Ui Building
Author: Tech Point

5. Python With Django For Backend Development: Best Computer Classes
Author: TCCI - Tririd Computer Coaching Institute

6. Explore Latest Cybersecurity Trends In 2026
Author: Orson Amiri

7. Master Data Structures (dsa) For Coding Tests - Tcci
Author: TCCI - Tririd Computer Coaching Institute

8. Full Stack Web Dev: Mern Stack Course Iskcon Cross Road, Ahmedabad
Author: TCCI - Tririd Computer Coaching Institute

9. Robusta Coffee Beans: The Bold Brew Driving Global Coffee Culture
Author: komal

10. Legacy System Migration: A Comprehensive Guide To Modernization
Author: Tech Gazebos

11. How To Measure The Performance Of Software Developers?
Author: Aimbeat Insights

12. Job-ready Java Course: Spring Framework Training
Author: TCCI - Tririd Computer Coaching Institute

13. How Custom Software Helps Businesses Reduce Manual Work By 60%
Author: Aimbeat Insights

14. Why Is The Pallets Packaging Market Expanding Rapidly?
Author: komal

15. Core Java Classes For Placement: Join Tcci Today
Author: TCCI - Tririd Computer Coaching Institute

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: