QBA 362 w/ Burke
Ltelatk H. Fritz
FRITZ, LTELATK
Ethical Computing QBA 362-Spring 2010
E T H I C AL C O MP UT I NG
1. Find a code of ethics from a firm of your choosing (other than the CPSR or the ACM). What do you think are the best five guiding principles from all the tips that you found?
http://www.buzzle.com/articles/computer-ethics-code-of-ethics-in-computing.html
Code of Ethics
Information stored on the computer should be treated as seriously as written or spoken word.
Privacy should not be violated. In case of academic use, it is known plagiarism.
Information for public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts. Intrusive …show more content…
Because in general it covers a broad area of things. Treating information stored on computers as if they were written or spoken words, is like asking users to respect the rights of others, as well as their responsibility towards other people’s work. (Individual Responsibility) Leaving other people’s work in tact as they are—without modification or deletion, is important because it preserves the other person’s integrity. It’s kind of the same as walking into (or breaking into ) someone’s home and rearranging their furniture without their knowledge. (Preserving …show more content…
Why is deliberate spreading of viruses unethical? Name five reasons.
Intrusive software such as "worms" and "viruses" which are destructive to the computer system is also illegal. (Buzzle ®) Congesting somebody’s system with a lot of unwanted information is also unethical. (Buzzle ®)
1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. (CEI) 3
FRITZ, LTELATK
Ethical Computing QBA 362-Spring 2010
2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical (CEI) 7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is