Preview

Essay for the the 10 Commandments of Computer Ethics

Good Essays
Open Document
Open Document
647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Essay for the the 10 Commandments of Computer Ethics
The Ten Commandments of Computer Ethics

1) Thou shalt not use a computer to harm other people:
If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. 2) Thou shalt not interfere with other people's computer work:
Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses are unethical work. 3) Thou shalt not snoop around in other people's files:
Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption. 4) Thou shalt not use a computer to steal:
Using a computer to break into the accounts of a company or a bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5) Thou shalt not use a computer to bear false witness:
The Internet can spread untruth as fast as it can spread truth. Putting out false "information" to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. 6) Thou shalt not use or copy software for which you have not paid:
Software is an intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in

You May Also Find These Documents Helpful

  • Good Essays

    It Ethics Study Guide

    • 429 Words
    • 2 Pages

    Semiconductor containing transistors, capacitors, and resistors. Invented at Fairchild Semiconductor and Texas Instruments. Smaller, faster, more reliable, and less expensive.…

    • 429 Words
    • 2 Pages
    Good Essays
  • Better Essays

    ETH 301 Case Module 1

    • 860 Words
    • 3 Pages

    According to (Standler, 1998), “Reading e-mail during storage on a computer system is prohibited by federal statute, 18 U.S.C. § 2701-2711, Title II of the Electronic Communications Privacy Act (ECPA), provided that the system is "providing an electronic communication service to the public." This means, among other…

    • 860 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    The CNC Machinist: Quiz

    • 7255 Words
    • 53 Pages

    Pirated software is the unauthorized use, duplication, distribution, or sale of copyrighted software. Software piracy costs businesses billions of dollars a year in lost revenue. Question 5…

    • 7255 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Companies like Google are straying away from the once popular Virtual Reality, in favor of what they are calling “Augmented Reality”, or AR. According to Merriam-Webster, AR is “an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device (as a smartphone camera); also: the technology used to create augmented reality.” (Merriam-Webster, n.d.) In order to “augment” our realities, these technologies are recording, storing, altering, and displaying information in real time. The information they use can be anything, but with products like Google Glass, wearable technology can now modify what and how we see objects, people, or data, in real time.…

    • 874 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    As technology becomes increasingly available in today’s society, so too are technological users, digitally stored information as well as computer programmers. The more one knows about technology, they more they are can take advantage of its efficiency as well as suffer some of its draw backs or manipulate technology to their own advantage. The invention of the computer brought about a whole new way to transmit and store information. It is still so new, in fact, that users are still muddled about the ethics behind the use of technology. Richard Spinello, author of CyberEthics: Morality and Law in Cyberspace, introduces some varying ideas of ethics and applies them to modern technology. In particular, several ethic models that he uses will be…

    • 1459 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Acceptable Use Policy

    • 1915 Words
    • 8 Pages

    You must respect the integrity of computing and network systems; for example, you shall not intentionally develop or use programs that harass other users or infiltrate a computer, computing system or network and/or damage or alter the software components of a computer, computing system or network.…

    • 1915 Words
    • 8 Pages
    Better Essays
  • Good Essays

    1984 Fake News

    • 943 Words
    • 4 Pages

    Bad information has always been online. Angie Holan explains, in her article called “2016 Lie of the Year: Fake news,” that before there was “fake news” there were other ways bad information was spread around. Holan goes on to state that, “Electronic message boards where people shared conspiracy theories…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Social media can and has spread fake news. Do you remember Ebola? Many people overreacted and made a big deal out of something minor in the U.S. Fake news can cause a whole country to act up. Lack of knowledge is dangerous too. Look at North Korea, they are under oppression. Also, Amanda Todd got cyber bullied and committed suicide. “Control your own mind, and you may never be controlled by the mind of another,” Napoleon Hill said. This quote is amazing at describing bullying situations.…

    • 428 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Hacktivism Ethics

    • 7214 Words
    • 29 Pages

    M. Manion and A. Goodrum, "Terrorism or Civil Disobedience: Toward a Hacktivist Ethic," in ACM SIGCAS, vol. 30, 2000, pp. 14-19.…

    • 7214 Words
    • 29 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Computer Ethics

    • 897 Words
    • 4 Pages

    Another ethical problem with computers is hacking. Hacking is the computer equivalent of breaking and entering. A computer hacker uses his or her skills to gain unauthorized access to another computer or computer network and, once inside, can wreak havoc by altering important information, deleting essential files, or just crashing the whole system. Many hackers who break into commercial Web sites are looking for…

    • 897 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Porfirio Barroso Asenjo: Key Ethical Concepts for the Internet and for Ethical Codes of Computer Professionals…

    • 5093 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    I believe the way people use computers and information play a big role in the social benefits. People and corporations alike use computers and information as a tool for more information or for leverage. What users do not often understand is that “they also have a responsibility to consider the ramifications of their actions and to behave accordingly”(Herold, 2006). Software piracy and plagiarism are examples of what happens when computer users decide to ignore ethics and use the computer and information for their own personal gains and/or pleasure. Hackers believe that it’s acceptable to do anything with a computer as long as the purpose is to learn. This utilitarian way of thinking, that anything is ok as long as it is for the greater good (Beauchamp, Bowie, Arnold, 2009),…

    • 631 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Ethics

    • 437 Words
    • 2 Pages

    The enthusiasm was evident in social networks by the entry of Google Street View. For many of us was practical for others this development can mean a violation of privacy. The pictures of house numbers, which are taken from doors and fences on its Street View mapping service, appear on Google’s websites. According to the article of Consumer Affairs Editor (Hall, 2012), campaign groups said that the use of pictures of real house numbers presents “serious” security issues, and accused the internet company of being “underhand and crude”.…

    • 437 Words
    • 2 Pages
    Good Essays