Computer Ethics 10 Commandments

3 21
Avatar for Bellaaa
3 years ago

1. You shall not use a computer to harm other people

A computer contains a lot of important data and private information. You must be responsible when using a computer by respecting others' privacy and refraining from doing anything that could harm other people's mental health, such as cyberbullying. In ways that may cause harm to others. Also using a computer to harm another user is unethical. It isn't just about physical harm. It includes causing harm to or corrupting the data or files of other users. It is illegal to use a computer to steal another person's personal information.

Manipulation or destruction of other users’ files is unethical. It is also unethical to write programs that, when executed, result in the theft, copying, or unauthorized access to the data of other users. Participating in practices such as hacking, spamming, phishing, or cyberbullying violates computer ethics.

2. You shall not interfere with other people’s computer work.

Take no part in other people’s computer work. Because someone’s ideas may differ from yours, and this may cause that person to lose focus and spend too much time analyzing and completing tasks and works. Computer software can be used in ways that annoy or disrupt other users’ work. Viruses, for example, are programs that are designed to harm useful computer programs or to interfere with a computer’s normal operation.

Malicious software can disrupt computer operations in a variety of ways. It may overburden computer memory by consuming too many computer resources, slowing its operation. It can cause a computer to malfunction or even shut down. It is unethical to use malicious software to attack a computer.

3. You shall not snoop around in other people’s computer files.

Reading information or files on another person's computer is the same as reading and opening another person's personal messages or private letters. Obtaining other people's private files is akin to breaking into their homes and stealing their personal belongings. Reading someone else's email messages or files is also prohibited. Obtaining information from another person's private files is tantamount to breaking into someone's home.

Invading another person's privacy involves snooping around in his or her files or reading his or her personal messages. There are some exceptions to this rule. Spying, for example, is necessary and cannot be considered unethical when used to combat illegitimate computer use. For example, intelligence agencies working on cybercrime cases must spy on suspects' internet activity.

4. You shall not use a computer to steal.

Stealing with a computer is the same as robbery, and robbery is a crime. The use of a computer to transfer funds between bank accounts is fraudulent. Theft of sensitive information or the disclosure of confidential information is just as bad as robbery. It is illegal to obtain personal information about employees from an employee database, patient history from a hospital database, or other confidential information. It is illegal to break into a bank account in order to obtain information about the account or the account holder. Illegal electronic funds transfers are a type of fraud. Theft of information has become much easier with the advancement of technology. Stolen information can be stored on computers.

5. You shall not use a computer to bear false witness.

Spreading false witnesses or false information through the use of a computer is similar to spreading rumors. This can have an impact on other people's beliefs, as well as the affected individual's mental health and life. Because of the Internet, the spread of information has become viral today. This also means that false information or rumors can spread quickly via social networking sites or emails.

It is unethical to be involved in the dissemination of false information. Mails and pop-ups are frequently used to disseminate incorrect information or provide false alerts with the sole purpose of selling products. Mails from untrustworthy sources promoting specific products or disseminating dubious information are not uncommon. Participation in the dissemination of false information, whether direct or indirect, is unethical. Giving incorrect information can cause harm to other parties or organizations affected by that particular theme.

6. You shall not copy or use propriety software for which you have not paid.

Copying or using software for which you have not paid is the same as stealing. This is a violation of copyright law; you must not use or copy anything that is not credited to you, especially if the owner has not given you permission to use their work or software. Avoid copying software or purchasing pirated copies. Unless the software is free, you must pay for it. Software, like any other artistic or literary work, is protected by copyright. A line of code is the original work of the person who wrote it.

It is protected by copyright in his/her name. When a developer creates software for the organization for which she works, the organization owns the copyright to it. Unless its creators state otherwise, copyright is valid. Illegally obtaining copies of copyrighted software is unethical and encourages others to do the same.

7. You shall not use other people’s computer resources without authorization or proper compensation.

Invading other people's computer resources is unethical; keep in mind that everyone's computer is private. We should not use without the owner's permission. Passwords on multi-user systems are unique to each user. Breaking into another user's password and invading his or her personal space is unethical. Hacking passwords to gain unauthorized access to a password-protected computer system is unethical. It is unethical to access data that you are not authorized to access or to gain access to another user's computer without her permission.

8. You shall not appropriate other people’s intellectual output.

Every person has their own set of abilities, and every human being has their own imagination. They are one-of-a-kind because of their creativity. It is incorrect to claim ownership of a work that is the result of someone else's intelligence. A software developer's programs are her property. If he is working for a company, they are the company's property. It is unethical to copy and spread them in one's own name. This holds true for any creative work, program, or design. It is unethical to claim ownership of someone else's work.

9. You shall think about the social consequences of the program you are writing or the system you are designing.

Consider the social impact of your software before developing it. Looking at the social consequences of a program describes a broader perspective on technology. When a piece of software is released, it reaches millions of people. Video games and animations, as well as educational software, can have a social impact on their users.

A computer game for children, for example, should not contain content that could negatively influence them. Similarly, creating malicious software is unethical. A piece of software developer/development firm should consider the influence their code can have on the society at large.

10. Thou shall always use a computer in ways that ensure consideration and respect for other humans.

When using computers for communication, be respectful and courteous to your coworkers. Communication etiquette in the real world applies to computer communication as well. When communicating over the Internet, one should always treat others with dignity. Invading others' private space, using abusive language, making false statements, or making irresponsible remarks about others are all unacceptable. When communicating on the internet, one should be courteous and considerate of others' time and resources. Also, when dealing with a novice computer user, one should exercise caution.

1
$ 0.00
Avatar for Bellaaa
3 years ago

Comments

Great article, keep posting! 👍

$ 0.00
3 years ago

Thankyouuu

$ 0.00
3 years ago

You are welcome😊

$ 0.00
3 years ago