The growing use of computers and other technology in today 's generation gives an escalation to the term computer ethics. Ethic is the action of performing in a tolerable manner; according to this concept to computers can aid both the users, and organizations support this quality of life. Although computer ethics can govern a person 's actions, many companies will implement a structural computer ethics guide. This advises employees about their responsibilities or expected behavior regarding the use of computers and other electronic documents owned or created by the company (Bynum et al., 1992). One example of potential computer ethics issue is cyber bullying. During this day of the Internet, cyber bullying has become a well-known threat. Furthermore, recognizing cyber bullying is basically the Internet version of real-world bullying. It can include making threats, and/or hurtful or text messages, chat rooms, message boards, instant messages or slanderous statements via e-mails. As predicted, the only real guidance to follow is to basically ignore the cyber bully. If the bullying is concentrating on you individually and specifically, such via an e-mail or text message, simply do not respond. Understand that you are not going to correct or educate the person on good computer ethnics. You are not going to get the last word in. Even if you respond with kindness, you are not going to get the person to see the error of their behaviors. Recognizably if you receive any very specific threat via any electronic form, you can consider notifying the appropriate law-enforcement officials. Know that unless the threats are very precise, and traceable, and reliable, they will likely not be able to help you. The police will almost surely just tell you not to respond in any way. Remember, the cyber bully is looking for attention in any shape. Even if you
References: Bynum, T. W., Maner, W., Fodor, J. L., Southern Connecticut State University, & National Conference on Computing and Values (1992). Teaching computer ethics. New Haven, CT: Research Center on Computing and Society, Southern Connecticut State University. McLaughlin, M., Moss, K., LaBoucane-Benson, P., Lazarowich, A., Brook, Darian, . . . Alberta Law Foundation (2012). Cyber bullying. Edmonton: Bearpaw Media Productions. Malik, I. (1996). Computer hacking: Detection and protection. Wilmslow, Cheshire: Sigma Press.