SlideShare a Scribd company logo
1 of 4
Download to read offline
Ten Commandments of Computer Ethics
The Ten Commandments of Computer Ethics were
created in 1992 by the Computer Ethics Institute. The
commandments were introduced in the paper “In Pursuit
of a 'Ten Commandments’ for Computer Ethics” by Ra-
mon C. Barquin as a means to create “a set of standards to
guide and instruct people in the ethical use of computers.”
[1]
The Ten Commandments of Computer Ethics copies
the style of the Ten Commandments from The Bible and
uses the archaic “thou shalt” and “thou shalt not” found
in the King James version.
The commandments have been widely quoted in com-
puter ethics literature [2]
but also have been criticized by
both the hacker community [3]
and some in academia. For
instance, Dr. Ben Fairweather of the “Centre for Com-
puting and Social Responsibility” has described them as
“simplistic” and overly restrictive.[4]
The CISSP — an organization of computer security pro-
fessionals — has used the commandments as a foundation
for its own ethics rules.[5]
1 The Ten Commandments
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s com-
puter work.
3. Thou shalt not snoop around in other people’s com-
puter files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for
which you have not paid.
7. Thou shalt not use other people’s computer re-
sources without authorization or proper compensa-
tion.
8. Thou shalt not appropriate other people’s intellectual
output.
9. Thou shalt think about the social consequences of
the program you are writing or the system you are
designing.
10. Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans.
[Sic. The confusion of “thou” and
“you” is in the original.[6]
]
2 The Ten Commandments
1. Do not use a computer to harm others
2. Do not interfere with other people’s computer work.
3. Do not snoop around in other people’s computer
files.
4. Do not use a computer to steal.
5. Do not use a computer to bear false witness
6. Do not copy or use proprietary software for which
you have not paid.
7. Do not use other people’s computer resources with-
out authorization or proper compensation.
8. Do not appropriate other people’s intellectual out-
put.
9. Do think about the social consequences of the pro-
gram you are writing or the system you are design-
ing.
10. Do always use a computer in ways that ensure con-
sideration and respect for your fellow humans.
2.1 Exegesis
• Commandment 1
Simply put: Do not use the computer in
ways that may harm other people.
Explanation: This commandment says
that it is unethical to use a computer
to harm another user. It is not limited
to physical injury. It includes harming
or corrupting other users’ data or files.
The commandment states that it is wrong
to use a computer to steal someone’s
personal information. Manipulating or
destroying files of other users is ethi-
cally wrong. It is unethical to write pro-
grams, which on execution lead to steal-
ing, copying or gaining unauthorized ac-
cess to other users’ data. Being in-
volved in practices like hacking, spam-
ming, phishing or cyber bullying does
not conform to computer ethics.
• Commandment 2
1
2 2 THE TEN COMMANDMENTS
Simply put: Do not use computer tech-
nology to cause interference in other
users’ work.
Explanation: Computer software can be
used in ways that disturb other users or
disrupt their work. Viruses, for exam-
ple, are programs meant to harm use-
ful computer programs or interfere with
the normal functioning of a computer.
Malicious software can disrupt the func-
tioning of computers in more ways than
one. It may overload computer memory
through excessive consumption of com-
puter resources, thus slowing its func-
tioning. It may cause a computer to func-
tion wrongly or even stop working. Us-
ing malicious software to attack a com-
puter is unethical.
• Commandment 3
Simply put: Do not spy on another per-
son’s computer data.
Explanation: We know it is wrong to
read someone’s personal letters. On the
same lines, it is wrong to read some-
one else’s email messages or files. Ob-
taining data from another person’s pri-
vate files is nothing less than breaking
into someone’s room. Snooping around
in another person’s files or reading some-
one else’s personal messages is the inva-
sion of his privacy. There are exceptions
to this. For example, spying is necessary
and cannot be called unethical when it is
done against illegitimate use of comput-
ers. For example, intelligence agencies
working on cybercrime cases need to spy
on the internet activity of suspects.
• Commandment 4
Simply put: Do not use computer tech-
nology to steal information.
Explanation: Stealing sensitive informa-
tion or leaking confidential information
is as good as robbery. It is wrong to
acquire personal information of employ-
ees from an employee database or patient
history from a hospital database or other
such information that is meant to be con-
fidential. Similarly, breaking into a bank
account to collect information about the
account or account holder is wrong. Ille-
gal electronic transfer of funds is a type
of fraud. With the use of technology,
stealing of information is much easier.
Computers can be used to store stolen in-
formation.
• Commandment 5
Simply put: Do not contribute to the
spread of misinformation using com-
puter technology.
Explanation: Spread of information has
become viral today, because of the In-
ternet. This also means that false news
or rumors can spread speedily through
social networking sites or emails. Be-
ing involved in the circulation of incor-
rect information is unethical. Mails and
pop-ups are commonly used to spread
the wrong information or give false alerts
with the only intent of selling products.
Mails from untrusted sources advertis-
ing certain products or spreading some
hard-to-believe information, are not un-
common. Direct or indirect involvement
in the circulation of false information is
ethically wrong.
• Commandment 6
Simply put: Refrain from copying soft-
ware or buying pirated copies. Pay for
software unless it is free.
Explanation: Like any other artistic or
literary work, software is copyrighted. A
piece of code is the original work of the
individual who created it. It is copy-
righted in his name. In case of a devel-
oper writing software for the organiza-
tion he works for, the organization holds
the copyright for it. Copyright holds true
unless its creators announce it is not. Ob-
taining illegal copies of copyrighted soft-
ware is unethical.
• Commandment 7
Simply put: Do not use someone else’s
computer resources unless authorized to.
Explanation: Multi-user systems have
user specific passwords. Breaking into
some other user’s password, thus intrud-
ing his private space is unethical. It is
not ethical to hack passwords for gain-
ing unauthorized access to a password-
protected computer system. Accessing
data that you are not authorized to ac-
cess or gaining access to another user’s
computer without his permission is not
ethical.
• Commandment 8
Simply put: It is wrong to claim own-
ership on a work which is the output of
someone else’s intellect.
3
Explanation: Programs developed by
a software developer are his/her prop-
erty. If he is working with an organi-
zation, they are the organization’s prop-
erty. Copying them and propagating
them in one’s own name is unethical.
This applies to any creative work, pro-
gram or design. Establishing ownership
on a work which is not yours is ethically
wrong.
• Commandment 9
Simply put: Before developing a soft-
ware, think about the social impact it can
have.
Explanation: Looking at the social con-
sequences that a program can have, de-
scribes a broader perspective of look-
ing at technology. A computer soft-
ware on release, reaches millions. Soft-
ware like video games and animations
or educational software can have a so-
cial impact on their users. When work-
ing on animation films or designing video
games, for example, it is the program-
mer’s responsibility to understand his
target audience/users and the effect it
may have on them. For example, a
computer game for kids should not have
content that can influence them nega-
tively. Similarly, writing malicious soft-
ware is ethically wrong. A software
developer/development firm should con-
sider the influence their code can have on
the society at large.
• Commandment 10
Simply put: In using computers for com-
munication, be respectful and courteous
with the fellow members.
Explanation: The communication eti-
quette we follow in the real world ap-
plies to communication over computers
as well. While communicating over the
Internet, one should treat others with re-
spect. One should not intrude others’ pri-
vate space, use abusive language, make
false statements or pass irresponsible re-
marks about others. One should be cour-
teous while communicating over the web
and should respect others’ time and re-
sources. Also, one should be considerate
with a novice computer user.
3 References
[1] Barquin, Ramon C. (May 7, 1992). “In pursuit of 'Ten
Commandments’ for Computer Ethics”. Computer Ethics
Institute. Retrieved 2013-08-17.
[2] Kathy Fitzpatrick, Carolyn Bronstein (2006). Ethics in
Public Relations: Responsible Advocacy. Sage Publica-
tions. p. 116. ISBN 1-4129-1798-0.
[3] Computer Ethics - Lecture 10
[4] CCSR:Commentary on the 'Ten Commandments for
Computer Ethics’
[5] Official (ISC)2 Guide to the CISSP CBK
[6] “The Ten Commandments of Computer Ethics” (PDF).
Retrieved 2012-05-22.
4 External links
• The Ten Commandments of Computer Ethics listed
at Computer Professionals for Social Responsibility
• The Computer Ethics Institute
• Centre for Computing and Social Responsibility
4 5 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
5 Text and image sources, contributors, and licenses
5.1 Text
• Ten Commandments of Computer Ethics Source: http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics?oldid=
661090539 Contributors: Dcljr, Ijon, DavidCary, Smalljim, Wtmitchell, Sburke, Macaddct1984, Bgwhite, Rsrikanth05, Malcolma, Moe
Epsilon, SmackBot, Jab843, Xaosflux, Gilliam, Hmains, Bluebot, Wizardman, Noah Salzman, CmdrObot, Cydebot, TicketMan, Marsh-
Bot, Rporter-Awilkie, Barek, Anaxial, J.delanoy, KylieTastic, Philip Trueman, Id4abel, Falcon8765, Yintan, Mikazo, Bentogoa, Flyer22,
Allmightyduck, Boreduntil, ClueBot, Rjd0060, Jusdafax, Tarogato, Roberto Mura, Editor2020, DumZiBoT, Enciklo, Plushpower, Addbot,
TheFreeloader, Tide rolls, Yobot, Fraggle81, DemocraticLuntz, Jim1138, Materialscientist, Citation bot, NFD9001, AbigailAbernathy,
JMS Old Al, 9K58 Smerch, I dream of horses, Elockid, Reach Out to the Truth, Super48paul, Minimac’s Clone, Shuipzv3, A930913, L
Kensington, RayneVanDunem, 28bot, ClueBot NG, Gareth Griffith-Jones, Widr, Helpful Pixie Bot, Frze, The Determinator, Teammm,
Pratyya Ghosh, Sanjudutta2006, Suga97, Frosty, Vanamonde93, Eyesnore, Jodosma, JaconaFrere, NQ, LesVegas, Isonison, Neversay-
die123, JOSE Cherian123 and Anonymous: 138
5.2 Images
5.3 Content license
• Creative Commons Attribution-Share Alike 3.0

More Related Content

Viewers also liked

Math for 800 10 lines, angles and triangles
Math for 800   10 lines, angles and trianglesMath for 800   10 lines, angles and triangles
Math for 800 10 lines, angles and trianglesEdwin Lapuerta
 
Manners – computer etiquetteamg
Manners – computer etiquetteamgManners – computer etiquetteamg
Manners – computer etiquetteamgsjytech
 
Presentation skills workshop
Presentation skills workshopPresentation skills workshop
Presentation skills workshopJames Prince
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of NetiquetteSakuta Riwsie
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationkatespeach
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 

Viewers also liked (7)

Math for 800 10 lines, angles and triangles
Math for 800   10 lines, angles and trianglesMath for 800   10 lines, angles and triangles
Math for 800 10 lines, angles and triangles
 
Manners – computer etiquetteamg
Manners – computer etiquetteamgManners – computer etiquetteamg
Manners – computer etiquetteamg
 
Presentation skills workshop
Presentation skills workshopPresentation skills workshop
Presentation skills workshop
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of Netiquette
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

More from Mai Ngoc Duc

Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948Mai Ngoc Duc
 
Tony buzan use your head
Tony buzan use your headTony buzan use your head
Tony buzan use your headMai Ngoc Duc
 
Tony buzan mind maps and making notes
Tony buzan   mind maps and making notesTony buzan   mind maps and making notes
Tony buzan mind maps and making notesMai Ngoc Duc
 
Theoretical ecology
Theoretical ecologyTheoretical ecology
Theoretical ecologyMai Ngoc Duc
 
The equity premium a puzzle
The equity premium a puzzleThe equity premium a puzzle
The equity premium a puzzleMai Ngoc Duc
 
Strategic thinking
Strategic thinkingStrategic thinking
Strategic thinkingMai Ngoc Duc
 
Statistical significance
Statistical significanceStatistical significance
Statistical significanceMai Ngoc Duc
 
Standard deviation
Standard deviationStandard deviation
Standard deviationMai Ngoc Duc
 
Ukessays.com marketing mix analysis for dell
Ukessays.com marketing mix analysis for dellUkessays.com marketing mix analysis for dell
Ukessays.com marketing mix analysis for dellMai Ngoc Duc
 
Ukessays.com analysis of dell in macro environment
Ukessays.com analysis of dell in macro environmentUkessays.com analysis of dell in macro environment
Ukessays.com analysis of dell in macro environmentMai Ngoc Duc
 
Ukessays.com the outsourcing fundamentals for dell computers
Ukessays.com the outsourcing fundamentals for dell computersUkessays.com the outsourcing fundamentals for dell computers
Ukessays.com the outsourcing fundamentals for dell computersMai Ngoc Duc
 

More from Mai Ngoc Duc (18)

Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
 
Tony buzan use your head
Tony buzan use your headTony buzan use your head
Tony buzan use your head
 
Tony buzan mind maps and making notes
Tony buzan   mind maps and making notesTony buzan   mind maps and making notes
Tony buzan mind maps and making notes
 
Theoretical ecology
Theoretical ecologyTheoretical ecology
Theoretical ecology
 
The equity premium a puzzle
The equity premium a puzzleThe equity premium a puzzle
The equity premium a puzzle
 
Strategic thinking
Strategic thinkingStrategic thinking
Strategic thinking
 
Technology stack
Technology stackTechnology stack
Technology stack
 
Statistical significance
Statistical significanceStatistical significance
Statistical significance
 
Standard deviation
Standard deviationStandard deviation
Standard deviation
 
Lenovo
LenovoLenovo
Lenovo
 
Dell1 1
Dell1 1Dell1 1
Dell1 1
 
Dell1
Dell1Dell1
Dell1
 
Lenovo
LenovoLenovo
Lenovo
 
Ukessays.com marketing mix analysis for dell
Ukessays.com marketing mix analysis for dellUkessays.com marketing mix analysis for dell
Ukessays.com marketing mix analysis for dell
 
Ukessays.com analysis of dell in macro environment
Ukessays.com analysis of dell in macro environmentUkessays.com analysis of dell in macro environment
Ukessays.com analysis of dell in macro environment
 
Ukessays.com the outsourcing fundamentals for dell computers
Ukessays.com the outsourcing fundamentals for dell computersUkessays.com the outsourcing fundamentals for dell computers
Ukessays.com the outsourcing fundamentals for dell computers
 
Financial ratios
Financial ratiosFinancial ratios
Financial ratios
 
Dell 7734
Dell 7734Dell 7734
Dell 7734
 

Recently uploaded

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Recently uploaded (20)

Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

Ten commandments of computer ethics

  • 1. Ten Commandments of Computer Ethics The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The commandments were introduced in the paper “In Pursuit of a 'Ten Commandments’ for Computer Ethics” by Ra- mon C. Barquin as a means to create “a set of standards to guide and instruct people in the ethical use of computers.” [1] The Ten Commandments of Computer Ethics copies the style of the Ten Commandments from The Bible and uses the archaic “thou shalt” and “thou shalt not” found in the King James version. The commandments have been widely quoted in com- puter ethics literature [2] but also have been criticized by both the hacker community [3] and some in academia. For instance, Dr. Ben Fairweather of the “Centre for Com- puting and Social Responsibility” has described them as “simplistic” and overly restrictive.[4] The CISSP — an organization of computer security pro- fessionals — has used the commandments as a foundation for its own ethics rules.[5] 1 The Ten Commandments 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s com- puter work. 3. Thou shalt not snoop around in other people’s com- puter files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people’s computer re- sources without authorization or proper compensa- tion. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. [Sic. The confusion of “thou” and “you” is in the original.[6] ] 2 The Ten Commandments 1. Do not use a computer to harm others 2. Do not interfere with other people’s computer work. 3. Do not snoop around in other people’s computer files. 4. Do not use a computer to steal. 5. Do not use a computer to bear false witness 6. Do not copy or use proprietary software for which you have not paid. 7. Do not use other people’s computer resources with- out authorization or proper compensation. 8. Do not appropriate other people’s intellectual out- put. 9. Do think about the social consequences of the pro- gram you are writing or the system you are design- ing. 10. Do always use a computer in ways that ensure con- sideration and respect for your fellow humans. 2.1 Exegesis • Commandment 1 Simply put: Do not use the computer in ways that may harm other people. Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users’ data or files. The commandment states that it is wrong to use a computer to steal someone’s personal information. Manipulating or destroying files of other users is ethi- cally wrong. It is unethical to write pro- grams, which on execution lead to steal- ing, copying or gaining unauthorized ac- cess to other users’ data. Being in- volved in practices like hacking, spam- ming, phishing or cyber bullying does not conform to computer ethics. • Commandment 2 1
  • 2. 2 2 THE TEN COMMANDMENTS Simply put: Do not use computer tech- nology to cause interference in other users’ work. Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for exam- ple, are programs meant to harm use- ful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the func- tioning of computers in more ways than one. It may overload computer memory through excessive consumption of com- puter resources, thus slowing its func- tioning. It may cause a computer to func- tion wrongly or even stop working. Us- ing malicious software to attack a com- puter is unethical. • Commandment 3 Simply put: Do not spy on another per- son’s computer data. Explanation: We know it is wrong to read someone’s personal letters. On the same lines, it is wrong to read some- one else’s email messages or files. Ob- taining data from another person’s pri- vate files is nothing less than breaking into someone’s room. Snooping around in another person’s files or reading some- one else’s personal messages is the inva- sion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of comput- ers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects. • Commandment 4 Simply put: Do not use computer tech- nology to steal information. Explanation: Stealing sensitive informa- tion or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employ- ees from an employee database or patient history from a hospital database or other such information that is meant to be con- fidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Ille- gal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computers can be used to store stolen in- formation. • Commandment 5 Simply put: Do not contribute to the spread of misinformation using com- puter technology. Explanation: Spread of information has become viral today, because of the In- ternet. This also means that false news or rumors can spread speedily through social networking sites or emails. Be- ing involved in the circulation of incor- rect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertis- ing certain products or spreading some hard-to-believe information, are not un- common. Direct or indirect involvement in the circulation of false information is ethically wrong. • Commandment 6 Simply put: Refrain from copying soft- ware or buying pirated copies. Pay for software unless it is free. Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copy- righted in his name. In case of a devel- oper writing software for the organiza- tion he works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not. Ob- taining illegal copies of copyrighted soft- ware is unethical. • Commandment 7 Simply put: Do not use someone else’s computer resources unless authorized to. Explanation: Multi-user systems have user specific passwords. Breaking into some other user’s password, thus intrud- ing his private space is unethical. It is not ethical to hack passwords for gain- ing unauthorized access to a password- protected computer system. Accessing data that you are not authorized to ac- cess or gaining access to another user’s computer without his permission is not ethical. • Commandment 8 Simply put: It is wrong to claim own- ership on a work which is the output of someone else’s intellect.
  • 3. 3 Explanation: Programs developed by a software developer are his/her prop- erty. If he is working with an organi- zation, they are the organization’s prop- erty. Copying them and propagating them in one’s own name is unethical. This applies to any creative work, pro- gram or design. Establishing ownership on a work which is not yours is ethically wrong. • Commandment 9 Simply put: Before developing a soft- ware, think about the social impact it can have. Explanation: Looking at the social con- sequences that a program can have, de- scribes a broader perspective of look- ing at technology. A computer soft- ware on release, reaches millions. Soft- ware like video games and animations or educational software can have a so- cial impact on their users. When work- ing on animation films or designing video games, for example, it is the program- mer’s responsibility to understand his target audience/users and the effect it may have on them. For example, a computer game for kids should not have content that can influence them nega- tively. Similarly, writing malicious soft- ware is ethically wrong. A software developer/development firm should con- sider the influence their code can have on the society at large. • Commandment 10 Simply put: In using computers for com- munication, be respectful and courteous with the fellow members. Explanation: The communication eti- quette we follow in the real world ap- plies to communication over computers as well. While communicating over the Internet, one should treat others with re- spect. One should not intrude others’ pri- vate space, use abusive language, make false statements or pass irresponsible re- marks about others. One should be cour- teous while communicating over the web and should respect others’ time and re- sources. Also, one should be considerate with a novice computer user. 3 References [1] Barquin, Ramon C. (May 7, 1992). “In pursuit of 'Ten Commandments’ for Computer Ethics”. Computer Ethics Institute. Retrieved 2013-08-17. [2] Kathy Fitzpatrick, Carolyn Bronstein (2006). Ethics in Public Relations: Responsible Advocacy. Sage Publica- tions. p. 116. ISBN 1-4129-1798-0. [3] Computer Ethics - Lecture 10 [4] CCSR:Commentary on the 'Ten Commandments for Computer Ethics’ [5] Official (ISC)2 Guide to the CISSP CBK [6] “The Ten Commandments of Computer Ethics” (PDF). Retrieved 2012-05-22. 4 External links • The Ten Commandments of Computer Ethics listed at Computer Professionals for Social Responsibility • The Computer Ethics Institute • Centre for Computing and Social Responsibility
  • 4. 4 5 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 5 Text and image sources, contributors, and licenses 5.1 Text • Ten Commandments of Computer Ethics Source: http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics?oldid= 661090539 Contributors: Dcljr, Ijon, DavidCary, Smalljim, Wtmitchell, Sburke, Macaddct1984, Bgwhite, Rsrikanth05, Malcolma, Moe Epsilon, SmackBot, Jab843, Xaosflux, Gilliam, Hmains, Bluebot, Wizardman, Noah Salzman, CmdrObot, Cydebot, TicketMan, Marsh- Bot, Rporter-Awilkie, Barek, Anaxial, J.delanoy, KylieTastic, Philip Trueman, Id4abel, Falcon8765, Yintan, Mikazo, Bentogoa, Flyer22, Allmightyduck, Boreduntil, ClueBot, Rjd0060, Jusdafax, Tarogato, Roberto Mura, Editor2020, DumZiBoT, Enciklo, Plushpower, Addbot, TheFreeloader, Tide rolls, Yobot, Fraggle81, DemocraticLuntz, Jim1138, Materialscientist, Citation bot, NFD9001, AbigailAbernathy, JMS Old Al, 9K58 Smerch, I dream of horses, Elockid, Reach Out to the Truth, Super48paul, Minimac’s Clone, Shuipzv3, A930913, L Kensington, RayneVanDunem, 28bot, ClueBot NG, Gareth Griffith-Jones, Widr, Helpful Pixie Bot, Frze, The Determinator, Teammm, Pratyya Ghosh, Sanjudutta2006, Suga97, Frosty, Vanamonde93, Eyesnore, Jodosma, JaconaFrere, NQ, LesVegas, Isonison, Neversay- die123, JOSE Cherian123 and Anonymous: 138 5.2 Images 5.3 Content license • Creative Commons Attribution-Share Alike 3.0