Preview

10 Commandments in Computer Ethics

Good Essays
Open Document
Open Document
1105 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
10 Commandments in Computer Ethics
The 10 commandments in computer ethics 1. Thou shall not use a computer to harm other people. * In the age of information and/or the digital age, more and more personal information is available online. From financial to personal, information online is the property of the individual and entities that they share it with and no others. 2. Thou shall not interfere with other people's computer work. * With greater and higher speed access the user is to benefit and incorporate these advances in technology for the betterment of their work and for the collaboration with others. 3. Thou shall not snoop around in other people's computer files. * Again with the increase in speed and access it is left to the user to continue their use in an ethical manner. 4. Thou shall not use a computer to steal. * With other commandments and with the advancement of technologies it is to the user to utilize equipment in a manner in which benefits the Web 2.0 community. 5. Thou shall not use a computer to bear false witness. * Computers, cell phones, chat rooms, instant messaging, blogs, wikis…. Daily there are multiple means and options to post information for the global community to see. It is the responsibility of the user to utilize these powerful tools to benefit this global community. 6. Thou shall not copy or use proprietary software for which you have not paid. * For those looking for “free” software and applications, Web 2.0 applications provide users with “free” and “open” applications which users can utilize in an ethical manner and at no cost. 7. Thou shall not use other people's computer resources without authorization or proper compensation. * With the drop of costs and the increase in capabilities computer access in more common than ever. Even with an atmosphere of openness users must remember to simply ask permission when using equipment. 8. Thou shall not appropriate other people's intellectual output.

You May Also Find These Documents Helpful

  • Better Essays

    Copyright Laws

    • 2082 Words
    • 9 Pages

    Computer programs and cyber space usage has become a major part of our every day lives. Nearly everyone has to use a computer at some point, and for some it may be an all day every day affair. This being the case, every one should be aware of the laws and boundaries of cyber space usage, copyright infringement on shareware, freeware, and computer software programs. Most of the main legal issues that relate to cyberspace can be listed as: tort issues, contract issues, intellectual property issues, criminal law issues, and constitutional restraint and protections, and securities law issues.…

    • 2082 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______, Lucas D. Introna, Deborah G. Johnson, and Helen Nissenbaum (1999). "Editorial," Ethics and Information Technology, Vol. 1, No. 1, 1–3.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Better Essays

    to respond usefully to what is new in our culture” and use the technology to accomplish…

    • 1399 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    References: Baase, S. (2008). A gift of fire: social, legal, and ethical issues for computing and the internet (3rd ed.). Upper Saddle River, NJ: Pearson…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    "Michael Gorman vs. Web 2.0." Chronical of Higher Education. 53. Internet Publishing and Broadcasting and Web Search Portals, 2007. Web.…

    • 921 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Term Paper

    • 739 Words
    • 3 Pages

    | |advancing everyday but people have to learn to use these devices. As for the internet, I |…

    • 739 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In today’s technology environments, there are types of software that restrict the user’s ability to broaden the software use in many different environments. Closed source software is also known as propriety software. This software is only available without the source code and is licensed under limited rights, which is provided only by the copyright owner of the software. The purchaser of the closed source software is authorized to use the software without the ability to modify, upgrade, update, or make any necessary changes while utilizing software. The propriety…

    • 565 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    GBDA 303 Chapter 7

    • 366 Words
    • 4 Pages

    abilities must be demanded by internet users / society in order to ensure privacy protection.…

    • 366 Words
    • 4 Pages
    Satisfactory Essays
  • Best Essays

    Mr Burak Ceylan

    • 2842 Words
    • 12 Pages

    The advent of the internet and web 2.0 has allowed for millions of consumers to be reached easier than ever before. The social aspect of the internet is now attracting people who wouldn 't otherwise have used the internet on a regular basis for any other purpose.…

    • 2842 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Computer Ethics

    • 897 Words
    • 4 Pages

    As of September 2003, there were approximately 70 million Americans or about 62 percent of the American population had at least one home computer. Another statistic is that about 55% of people also have internet on there home computers. In everyday life it is important for a person to have good ethics; this is also true about computer usage. Due to the fact that more then half of the American population owns computers, computer ethics are a growing concern in a rapidly changing society. Computer ethics can be broken down in to many topics including piracy, hacking, viruses, spam, phishing, and responsibility of use of software, cyber porn, and invasion of privacy and the use of the computer in the work place. Also there are many issues both moral and professional that a person who uses a computer might face.…

    • 897 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The introduction of new information technology has a ripple effect, raising new ethical, social, and political issues that must be dealt with on the individual, social, and political levels. These issues have five moral dimensions: information rights and obligations, property rights and obligations, system quality, quality of life, and accountability and control.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lego Improvements

    • 442 Words
    • 2 Pages

    We live in a world where internet it is taking over more and more space, in our lives, whether we use it to buy , sell , socializes, find things, information, and the list could continue.…

    • 442 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Community Manager

    • 1614 Words
    • 7 Pages

    Another task of the community manager is to escort and moderate web 2.0 relationships and conversations in favor of a brand. Web 2.0 refers to the development to the internet to an interactive medium in which users not only download but also start uploading. With Web 2.0 internet users determine the content that appears on the internet and so they increase the interactive nature of the web. This user-generated content is collected on social networking…

    • 1614 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Web 2.0 can be defined as continuously updated online portals and services in which individuals collaborate to provide, consume and mix data from multiple sources on the basis of participation (O’Reilly 2007). It is called Web 2.0 as it follows Web 1.0 during which the primary use was accessing information in digital portals (elasco, 2018) whereas the use for Web 2.0 technologies is to further online collaboration (Capo & Orellana, 2011). Alexander (2006) outlines the characteristics invloved in Web 2.0, in particular, sharing micro-content (videos, chats, blogs), open contribution and simple-to-use interfaces. Likewise, Birdsall (2007) identifies it as a “qualitatively different experience’’ as the user is the one creating the content within the…

    • 1233 Words
    • 5 Pages
    Good Essays