Top-Rated Free Essay
Preview

The 10 Commandments of Computer Ethics

Good Essays
967 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The 10 Commandments of Computer Ethics
Computers have evolved in our society to a point where almost everything runs off of them and cannot function without them. The days of balancing a checkbook by putting pen to paper have all but passed, today, there’s an app for that. But as times change and as technology advances, the bounds of limitation increases, and consequently people are able to perform much more devious or conversely much more righteous things. Ethics by itself means: a system of moral principles, or “the rules of conduct recognized in respect to a particular class of human actions or a particular group, culture, etc.” So by extension we can surmise that computer ethics are the set of principles that we should adhere to when engaging in any computer related activity. For example, we know plagiarism to be morally wrong, we understand internet piracy to be morally wrong (although this is a topic of great debate), and we understand that invasion of one’s privacy through “hacking” or “tunneling” (infiltrating a network to snoop around) is inherently wrong. There are actually a set of principles that are universally recognized called “The 10 Commandments of Computer Ethics”. These commandments, listed below, will be further discussed in the following essay.
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Given that computers are, mostly speaking, a common part of everyday use, whether personal or work related, how can anyone realistically govern over all of cyber-spaces “cyber laws”? The short answer, you can’t. The next question becomes: If you cannot control it, how can you prevent abuse, with the caveat that you cannot infringe on people’s rights? (I.e. freedom of speech and expression) Unfortunately there is no clear cut answer to this question either; all we can do is hope to instill a base set of principles that people will carry over into responsible computing practices. While commonly most people will adhere to these guidelines, there are always outliers that will seek to challenge societal norms. Known or unbeknownst to us, we have all experienced or engaged in at one point or another, a morally questionable act. Ever download music from a website? Technically speaking you’ve committed piracy; piracy being when you take something from someone else. In this case, music being downloaded and not purchased reduces the income of the artist(s) and in the larger scheme, the entire music industry. This argument may apply to other niches as well, such as software piracy.
Maybe you’ve lived on the straight and narrow your entire life, and have paid the .99 cents on iTunes every time you wanted to download a song. Well, to the converse of perpetrating a morally questionable act is being the victim of one. Instances of this might include being flooded with pop-up messages, pop-up windows, windows you are unable to close, etc. Or even nastier, automatically downloaded viruses when you come upon a particular website or open an email. While most malware is only meant to be disruptive, today viruses have evolved into ways of stealing personal information, halting and/or adversely affecting processes; recall the STUXNET virus that destroyed dozens of centrifuges in an Iranian nuclear power plant one year ago, had that virus not been caught in time the results could have been catastrophic. When something of this magnitude is perpetrated we all know it to be inherently wrong, but are limited in what we can do about it, the best we can do is to safeguard our hardware with anti-virus programs and engage in more responsible practices.
Ethics are very subjective by nature, and computers only further complicate the matter. The complex nature has led to an array of disputes on varying subject matter, notably, big brother, and as discussed earlier, piracy. “Big brother” is something that most companies and employees are all too familiar with. The company doesn’t know if they can, constitutionally, monitor their employee’s computer activity; and if they are allowed to, should they? Piracy is also difficult to get a bearing on because it’s rooted in sharing. If I purchase a DVD legally, why should I not be allowed to lend it to my friend to watch? Isn’t that essentially what downloading a song is?
While it is impossible to thwart all of what the government deem, irresponsible, there are laws in place meant to keep the spectrum of activity under control; these sanctions are intended to catch anything that is overtly criminal. Computer ethics will never be fully definable, it is best just to say that computer activity, in an ideal world would remain within a given set of parameters, and that people would adhere to these guidelines religiously. However we know this to be untrue, so we have to take the good with the bad, and do the best we can. Technology is constantly moving forward; what’s impossible today might be a reality tomorrow. With this continual evolution comes the advent of many new moral conundrums; ethicalities that we are all presented as a society, to which responding right or wrong is entirely up to you.

You May Also Find These Documents Helpful

  • Powerful Essays

    Mgt7019-5 It Challenges

    • 3406 Words
    • 14 Pages

    |Moor, J. H. (2001). The Future of Computer Ethics: You Ain’t Seen No thin’ Yet! Ethics |…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    I ran into an ethical issue when I worked at a bus manufacturer somewhat similar to what George faced in the “Paramedic Ethics for Computer Professionals” paper. I was the operations supervisor and one of my duties was to execute, monitor and troubleshoot daily, nightly and weekend systems jobs. One of the major jobs was the Material Requirements Planning (MRP) process. The MRP jobs would examine the current and future orders to determine the materials needed for the next three to six months. We ran the job on the weekend and on rare occasions at night during the week. The rare occurrences were generally to take a much further view and see what the requirements would be for the next year to three years based on current and projected orders.…

    • 742 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    w2 bis221 memo

    • 486 Words
    • 3 Pages

    Ethics refers to what is morally good or bad, the division of right and wrong. The increase in ethical issues rises as information technology advances. What is unethical is not necessarily illegal. Therefore, congress is forced to set guidelines protecting consumer’s privacy, accuracy of information, the ownership and value of such information and who has access to it. The Electronic Funds Transfer Act of 1978 and the Health Information Portability and Protection Act of 2006 are just two examples of these types of acts.…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Duquenoy, P., Jones, S. & Blundell, B.G. (2008), “Ethical, Legal and Professional Issues in Computing”, Cengage Learning EMEA…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Cis 324 Computer Ethics

    • 2262 Words
    • 10 Pages

    In the short time that computers and internet have existed in the modern era, the world has seen a complete 360 degree turn and in the various forms of electronic entertainment that people all over the world are now using. In the days before CD’s, DVD’s and the internet, not much was said if a vinyl album (remember these?), VHS cassette (or these?) or an audio cassette was loaned to a friend for their listening / viewing pleasure, but today with the availability of sending an email with three or four megabytes (mb) of information, one can enjoy a borrowed song but is assumed that it is piracy or stealing. Is this a fair assumption? This Author will not give his opinion but rather discuss both sides of the Peer to Peer (P2P) downloading and sharing issues and let the reader form their own opinions.…

    • 2262 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Thou shall not vandalize Web pages. Thou shall not shut down Web sites. Thou shall not covet thy neighbor’s MP3s.…

    • 709 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Both poets present a differing attitude to war through literary techniques. Hardy presents a very jingoistic, patriotic attitude to war through his use of language and repetition. Whereas, Charles Sorely uses a less patriotic tone and focuses more on war being very negative through his use of language, biblical imagery and structure.…

    • 1200 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Code of Ethics Design

    • 1990 Words
    • 8 Pages

    Jones and Bartlett - Morality and Machines, Perspectives on Computer Ethics, Stacey L. Edgar, 1997, , Sudbury, Massachusetts…

    • 1990 Words
    • 8 Pages
    Best Essays
  • Best Essays

    The information technology advancements continue to impact the workplace, societies and cultures. In today’s world, information technology is almost part of every business, educational institute, and even personal activity (Brooks, 2010). Computer and internet access have found their way to households, schools, libraries, people’s cell phones, banks, hospitals, governments, coffee shops, and other public places. As the industry evolves, so do the needs and special niches of society from mainframe systems, to micro systems, to PC-based LAN and WAN systems, to virtual systems and the internet.…

    • 1836 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    My second example is the man who built his house on the rock. It is…

    • 1225 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    and sharing emotion: Psychological, social, and health consequences. In R.O. Hansson & M.S. Stroebe (Eds.), Handbook of…

    • 7134 Words
    • 29 Pages
    Good Essays
  • Better Essays

    Ten Commandments

    • 2668 Words
    • 11 Pages

    The movie the author would like to critique is probably one of the greatest movies of all time. The movie is The Ten Commandments, starring Charlton Heston, Yul Brenner, and Cecil B. DeMille. If the author were a real critic like Gene Siskel, and Roger Ebert, she would give this movie two thumbs up. The author will probably be giving her, interpretation of this movie all the way through this paper because she feels that in order to understand what’s being critiqued you have to understand the movie. Of course this is a movie that the author has seen a number of times, and every time she views it she finds something that she missed. So, now she will try and give her views of probably one of the greatest movies of all times. This is not an easy assignment but the author will try to cover areas that really made this movie the block buster that it became. The areas that will be discussed in this paper are: Storytelling, actors, genre, editing type, costumes, special effects, lighting, cinematography & director, and interpretation.…

    • 2668 Words
    • 11 Pages
    Better Essays
  • Good Essays

    Buzzle Code Of Ethics

    • 828 Words
    • 4 Pages

     1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. (CEI) 3…

    • 828 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer ethics is a set of moral guidelines of what users should and shouldn’t do when using computers. Through the vast progression of computer, technology and the internet in the last decade, use of computers has had more of an impact on society and there have been a lot of common concerns raised in regards to computing ethics such as; intellectual property, privacy and how computer usage has affected society. An examples of intellectual property may be making copies of copyrighted content in electronic format,(such as a song) it may be a quick easy task to do, but one might argue it is unethical to do so without the owner’s permission. An example of privacy may be accessing one’s personal information on a computer system. A more controversial example of intellectual property may be for one to protect their computer program or code. One may argue that code is not intellectual property as it’s ideas which aren’t owned by anyone but another may argue that it is intellectual property as it is user generated content. There are many complexities in computer ethics, in comparison to real life situations, stealing a physical CD from a high street store is legally and ethically wrong, however when one torrents a mp3 file from the internet, one may deem that is ethical, providing the user is not copying and selling it. The BCS Code of Conduct is the rules and professional standards (which are usually stricter than in the law) set by the British Computer Society (who is the awarding bodies for accrediting IT qualifications) for professional IT members to follow. Breaches of the Code of Conduct can result in expulsion from membership. (Which in turn renders one’s qualifications useless as it won’t be recognised) The…

    • 664 Words
    • 2 Pages
    Good Essays