Preview

Computer Ethics

Powerful Essays
Open Document
Open Document
1377 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Ethics
Computer Ethics
A Ten Commandments of Computer Ethics (see Appendix A) was first presented by Dr. Ramon C. Barquin 's in his paper for the Computer Ethics Institute of the Brookings Institution entitled, "In Pursuit of a 'Ten Commandments ' for Computer Ethics" in May of 1992.
Computer ethics is about principles related to behavior and decisions made by computer professionals and users, including software engineers, operators, managers, policy makers, as well as educators and students. This means all these people involved should be supported with some "policies for ethical conduct" i.e. policies that guide their actions and increase adequacy of the decisions they make. (Szejko par. 1) With the rapid infusion of computers, software and related technologies into homes, schools and businesses, we initially focused our energies on learning about the technologies and how to use them. We now need to focus our attention on the ethical issues surrounding technology to insure that we and our children understand and practice values important to all of us; respect for others, their property, ownership, and the right to privacy. (Alden par. 4)
There are various interpretations of the term "computer ethics." Computer ethics might be understood in one sense as the efforts of professional philosophers to apply traditional ethical theories and concepts to issues regarding the use of computer technology. However, it is possible to construe computer ethics in another sense to include standards of professional practice, codes of conduct, and aspects of computer law, public policy, and corporate ethics.
Information technology has affected our home life, our business life, and our relationships with others. It has also affected us in regards to education, freedom, and democracy. And the way it has affected us has not always been for the better. That is one of the reasons why it is so important to develop a code of ethics for computers and the IT field.
Use of the Code of Ethics



Cited: Alden, Sally B. Myths and Misperceptions on Computer Ethics. 1990. Computer Learning Foundation. Retrieved 26 Jan. 2007 http://www.computerlearning.org/articles/respmyth.htm Barquin, Ramon. The Ten Commandments of Computer Ethics. 1992. Computer Ethics Institute. Retrieved 22 Jan. 2007 Davis, Michael. "Thinking like an Engineer: The Place of a Code of Ethics in the Practice of a Profession". Philosophy and Public Affairs 20.2 (1991): 150-167. Luegenbiehl, Heinz C. "Codes of Ethics and the Moral Education of Engineers", Business and Professional Ethics Journal 2 (1983): 41-61. Rpt. in Ethical Issues in Engineering . Ed. Deborah G. Johnson. Englewood Cliffs, NJ: Prentice-Hall, 1991. 137-154. Szejko, Stanislaw. Patterns of Ethical Behaviour and Decision Making. 2004. Ethicomp 2004. Retrieved 24 Jan. 2007

You May Also Find These Documents Helpful

  • Powerful Essays

    Mgt7019-5 It Challenges

    • 3406 Words
    • 14 Pages

    |Moor, J. H. (2001). The Future of Computer Ethics: You Ain’t Seen No thin’ Yet! Ethics |…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    It Security

    • 4378 Words
    • 18 Pages

    Bynum, Terrell Ward, A very short history of computer ethics, Southern Connecticut State University, 2008. Computer Security Institute and US FBI, Computer Security Issues & Trends, CSI 2000. Forester, T. and Morrison, P. Computer Ethics, MIT Press, Cambridge, Mass., 1990. Harrington, S.J., The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions, MIS Quarterly, 20, 3 (1996), 257–278. http://www.acm.org/about/code-of-ethics. IEEE code of ethics. http://ieee.org. ISO/IEC 17799 Code of practice for Information Security Management, International Organization for Standardization. Kling, R., Computer abuse and computer crime as organizational activities, Computers and Law J. 2 (Spring 1980). Margaret, A, & Henry, J., Journal of business ethics, Computer Ethics: The Role of Personal, Informal, and Formal Codes, 15(4), 425. Mason, R.O., Four ethical issues of the information age, MIS Quarterly, 10, 1 (1986), 5–12. O 'Brien, J A., Introduction to information systems: essentials for the e-business enterprise, McGraw-Hill, Boston, MA, 2003. Parker, D.B., Swope S., & Baker, B.N., Ethical Conflicts in Information and Computer Science, Technology and Business, 1990, Wellesley, MA: QED Information Sciences. Praveen Dalal, ICT Trends in India, 2006 Wood, W.A., Computer Ethics and Years of Computer Use. Journal of Computer Information Systems, 23- 27, 1993…

    • 4378 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Reynolds, George W. (2012). Ethics in information technology (4th ed.). Independence, KY: Cengage Learning, Inc.…

    • 1478 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Code of Ethics Design

    • 1990 Words
    • 8 Pages

    References: Code of Ethics. 1995. [On-line]. Available gopher: gopher.ala.org:70 / 00 alagophii/ethics.txt Fullinwider, Robert. 1995. Professional codes and moral understanding. Res Publica 4:1-6.…

    • 1990 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    References: Bott, F. (2005), Professional Issues in Information Technology, The British Computer Society, Wiltshire. Data Protection (n.d.), http://www.bcu.ac.uk/health/research/ethics-and-indemnity/ethicsapplications/data-protection. Accessed: 05/01/2013. Lee, M. (2012), ‘Professional Computing module’, http://www.cs.bham.ac.uk/ mgl/profcomp/lectures/. Filetype: Pdf, Accessed: 02/01/2013.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Duquenoy, P., Jones, S. & Blundell, B.G. (2008), “Ethical, Legal and Professional Issues in Computing”, Cengage Learning EMEA…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Desai, M. S., & von der Embse, T. J. (2008). Managing electronic information; an ethics perspective. Information Management & Computer Security, 16(1), 20-27. doi:10.1108/09685220810862724…

    • 3978 Words
    • 16 Pages
    Best Essays
  • Best Essays

    Bibliography: Heersmink, R., van den Hoven, J., Jan van Eck, N., van den Berg, J. Bibliometric mapping of computer and information ethics (2011) Springerlink.com…

    • 2391 Words
    • 10 Pages
    Best Essays
  • Better Essays

    As an IT professional it is part of our job to ensure the wellbeing of others through what is created, as well as abiding by the law simultaneously. Several ideas need to be considered when acting morally and ethically, such as following a certain standard (Code of ethics), and morality, based on some sort of ideology of personal beliefs. A case study will be examined to compare what is morally and ethically correct, as opposed to what really happens in the real world because of uncontrolled variables like resources, power, and knowledge. All of which can either cause harm, or good, based on the intentions of the professional.…

    • 786 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    M. Manion and A. Goodrum, "Terrorism or Civil Disobedience: Toward a Hacktivist Ethic," in ACM SIGCAS, vol. 30, 2000, pp. 14-19.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Better Essays

    Making Strong Passwords

    • 1119 Words
    • 5 Pages

    Nemati, H. R. (2008). Information security and ethics: Concepts, methodologies, tools, and applications (Vols. 1-6). Hershey, PA: IGI Global.…

    • 1119 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    When pertaining to ethics it is defined as the principles of right and wrong that individuals, acting as free moral agents, use to make choices to guide their behaviors. Prentice Hall states, “This is truer today than ever due to the challenges posed by the Internet and electronic commerce to the protection of privacy and intellectual property.” Along with this there are more ethical issues that are raised by the broad use of information systems, which include establishment of accountability pertaining to the consequences of information systems, establishing a thorough defense system which protects individuals, and securing values considered essential to the quality of life in an information society. Any business or large company, should be trained on being able to effectively deal with any issues. Firm technologies have made clear ways to assemble, integrate, and distribute information in the protection of personally identifiable information. Examples of these are; if you work in a career field such as finance or accounting, ensure that the information systems used are protected from computer fraud and abuse. In the field of human resources, developing and enforcing an ethics policy and providing special training to sensitize workers to new ethical issues that pertain to information systems. In the information systems field, the insurance of making management aware of the ethical implications of the technologies used and…

    • 1482 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Wearable Technology

    • 3348 Words
    • 12 Pages

    [13] Katina Michael and M G. Michael. "Computing ethics: No limits to watching?" Faculty of Engineering and Information Sciences - Papers (2013): 26-28.…

    • 3348 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Crm Ethics and Solution

    • 1817 Words
    • 8 Pages

    In "10 ethical issues raised by IT capabilities," we examined ethical issues raised by IT capabilities, issues that all of us as technology professionals need to consider as we go about our duties. This time, we take a look at ethical issues more specific to management--and not necessarily just IT management. Once again, one of our themes is that advances in technology, just like advances in any other area of endeavor, can generate societal changes that should cause us to reexamine our behavior. The dynamic nature of civilization means some components of ethical codes that were perfectly appropriate in previous generations may no longer apply. Although space limits us to 10 issues, the ones we examine here are based on five main categories of particular interest to technologists: privacy, ownership, control, accuracy, and security. As in the previous article there are more questions than answers.…

    • 1817 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Computer ethics is a set of moral guidelines of what users should and shouldn’t do when using computers. Through the vast progression of computer, technology and the internet in the last decade, use of computers has had more of an impact on society and there have been a lot of common concerns raised in regards to computing ethics such as; intellectual property, privacy and how computer usage has affected society. An examples of intellectual property may be making copies of copyrighted content in electronic format,(such as a song) it may be a quick easy task to do, but one might argue it is unethical to do so without the owner’s permission. An example of privacy may be accessing one’s personal information on a computer system. A more controversial example of intellectual property may be for one to protect their computer program or code. One may argue that code is not intellectual property as it’s ideas which aren’t owned by anyone but another may argue that it is intellectual property as it is user generated content. There are many complexities in computer ethics, in comparison to real life situations, stealing a physical CD from a high street store is legally and ethically wrong, however when one torrents a mp3 file from the internet, one may deem that is ethical, providing the user is not copying and selling it. The BCS Code of Conduct is the rules and professional standards (which are usually stricter than in the law) set by the British Computer Society (who is the awarding bodies for accrediting IT qualifications) for professional IT members to follow. Breaches of the Code of Conduct can result in expulsion from membership. (Which in turn renders one’s qualifications useless as it won’t be recognised) The…

    • 664 Words
    • 2 Pages
    Good Essays

Related Topics