Martes, Mayo 27, 2014

The Ten Commandments of Computer Ethics

1. Thou shalt not use a computer in ways that harm people there.



Simply put: Do not use a computer in ways that harm other people have.
Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It Includes corrupting or harming other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. 
2. Thou shalt not interfere with other people's computer work.

Simply put: Do not use computer technology to cause interference in other users' work.
Explanation: Computer software can be used in ways that disturb other users or disrupt THEIR work. Viruses, for example, are programs meant to harm Useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. 

3. Thou shalt not snoop around in other people's computer files.
Simply put: Do not spy on another person's computer data.
Explanation: We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of His privacy. 
4. Thou shalt not use a computer to steal.

Simply put: Do not use computer technology to steal information.
Explanation: Stealing leaking sensitive information or confidential information is as good as robbery. It is wrong to Acquire personal information of employees from an employee or patient history database from a hospital database or Such other information that is meant to be confidential. 

5. Thou shalt not use a computer to bear false witness

Simply put: Do not contribute to the spread of misinformation using computer technology.
Explanation: Spread of information has Become viral today, Because of the Internet. Means also that this false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. 

6. Thou shalt not copy or use proprietary software are priority for you have not paid.

Simply put: Refrain from copying software or buying pirated copies. Pay for software unless it is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in His name.Copyright holds true unless its creators announce it is not. Obtaining illegal copies of copyrighted software is unethical.

7. Thou shalt not use other people's computer resources without authorization or proper compensation.

Simply put: Do not use someone else's computer resources unless authorized to.
Explanation: Multi-user systems have user specific passwords. Breaking into some other user's password, thuS intruding His private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system.

8. Thou shalt not Appropriate other people's intellectual output.

Simply put: It is wrong to claim ownership on a work are priority is the output of someone else's intellect.
Explanation: Programs developed by a software developer are His / her property. If he is working with an organization, the organization's They are property. Copying them and propagating them in one's own name is unethical. This applies to any creative work, design or program. Establishing ownership on a work are priority is not yours is ethically wrong.

9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.

Simply put: Before developing a software, think about the social impact it can have.
Explanation: Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games or educational software and animations can have a social impact on THEIR users. When working on animation films or designing video games, for example, it is the programmer's responsibility to understand His target audience / users and have the effect it has on them.

10. Thou shalt always use a computer in ways that Ensure 
consideration and respect for your fellow HUMANS.

Simply put: In using computers for communication, be respectful and courteous with the fellow members.
Explanation: The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, Should one treat others with respect. One Should not intrude others' private space, use abusive language, make false statements or pass Irresponsible remarks about others.