Your SlideShare is downloading. ×
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
7 computer ethics
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

7 computer ethics

1,789

Published on

ch7

ch7

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,789
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Computer Ethics Code of Ethics
  • 2. Computer Ethics• deals with how computing professionals should make decisions regarding professional and social conduct.
  • 3. Ten Commandments of Computer Ethics• Commandment - an instruction; a requirement• Ethics – a code of conduct on how a person should live
  • 4. 1. You shall not use a computer to harm other people – Intentionally interfering with other people’s work – Invading the privacy of individuals
  • 5. 2. You shall not interfere with other peoplescomputer work – Degrading or disrupting equipment, software, or system performance. – Using resources to interfere with the proper operation of any computer, or destroy data. – Intentionally interfering with other people’s work – Invading the privacy of individuals
  • 6. 3. You shall not snoop around in other peoplescomputer files. – Using an account owned by another user, or allowing another user to access your account. – Invading the privacy of individuals4. You shall not use a computer to steal. – Using resources in any manner that breaks the law or violates company policy. This can include the unauthorised copying or transmission of software
  • 7. 5. You shall not use a computer to bear falsewitness. – You should not be responsible for creating or forwarding “chain” letters. – You should not download, store, print, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or is aimed at degrading others.
  • 8. 6. You shall not copy or use proprietary softwarefor which you have not paid. – You should not use resources in any manner that violates company policy or breaks the law, including the Copyright, Designs and Patents Act. This means that you should not be copying or transmitting software for which you do not have a licence
  • 9. 7. You shall not use other peoples computerresources without authorisation or propercompensation. – You should not try to pass off information obtained via the Internet or as part of your working life as your own. You should always give proper credit to the source. – You should not post personal communication without the original author’s consent.
  • 10. 8. You shall not appropriate other peoplesintellectual output. – Posting personal communication without the original author’s consent. – Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).
  • 11. 9. You shall think about the social consequencesof the program you are writing or the systemyou are designing. – Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.
  • 12. 10. You shall always use a computer in ways thatshow consideration and respect for your fellowhumans. – Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.

×