SlideShare a Scribd company logo
1 of 4
Download to read offline
The 10 Commandments of
Computer Ethics
Ethics is a branch of philosophy that deals with determining what is right from wrong.
When computers first began to be used in society at large, the absence of ethical standards
about their use and related issues caused some problems. People rely on computers to
handle the more tedious details of their social, business, and financial lives.
Imagine what would happen if an enemy or a
business competitor got access to your email
account, bank account, Facebook profile, and
company website? They could destroy your
reputation in a matter of hours. As the use of computers became widespread in every facet
of our lives, discussions in computer ethics resulted in some kind of a consensus.
The idea of Computer Ethics
was invented in 1950 by MIT
professor Norbert Wiener.
Today, many of these rules
have been formulated as laws,
either national or
international.
Computer crimes and
computer fraud are now
common terms. There are laws
against them, and everyone is
responsible for knowing what
constitutes computer crime
and computer fraud.
The main concerns of computer ethics are:
Internet privacy, cracking, copyright
infringement, and Internet control.
INTRODUCTION
Ethics deals with placing a “value” on acts according
to whether they are “good” or “bad”. Every society has
its rules about whether certain acts are ethical or not.
These rules have been established as a
result of consensus in society and are often
written into laws.
When computers first began to be used in society at
large, the absence of ethical standards about their use and related issues caused some
problems.
However, as their use became widespread in every facet of our lives, discussions in computer
ethics resulted in some kind of a consensus. Today, many of these rules have been formulated
as laws, either national or international.
Computer crimes and computer fraud are now common terms. There are laws against
them, and everyone is responsible for knowing what constitutes computer crime and computer
fraud.
Thou shalt not use a computer to harm other people.
Messaging a friend that they are fat and
ugly, programming a robot to kill people,
make viruses, or weapons of mass
destruction and writing a program that
handles the timing of a bomb.
Thou shalt not interfere with other people’s
computer work.
Generating and consciously spreading computer viruses
is unethical. Changing your classmate's computer files
is wrong. One must not take an action that could give
an obstacle or destruction to anybody's work.
im not
fat
Thou shalt not snoop around in other people’s
computer files.
One should not peep into other people’s files
like reading other people’s e-mail messages.
Sneaking into your friend’s computer and
watching his/her private videos without
permission. This is invading one’s privacy.
Thou shalt not use a computer to steal.
Computers should NOT be used as a tool to take
another's property, wrongfully earn money, and
steal someone's works or ideas. Using a computer
to break into the accounts of a bank and
transferring money should be judged the same way
as robbery.
Thou shalt not use a computer
to bear false witness.
The computer should not be used in giving
wrong statements against a certain thing,
event, or person. For instance, spreading false
rumors about a person or false propaganda
about historical events is wrong.
Thou shalt not copy or use
proprietary software for which
you have not paid.
Software is an intellectual product. Obtaining
illegal copies of copyrighted software is as bad
as photocopying a copyrighted book. It is a
wrongful act for you not to give what is due to
the owner of the software.
Thou shalt not use
other people’s
computer resources
without authorization
or proper
compensation.
Hacking a system to break and bypass the authorization is unethical.
Thou shalt not appropriate other
people’s intellectual output.
copying and pasting your friend's paper
without proper authorization is plagiarism, and
is unethical. Intellectual property is a form of
ownership, and maybe protected by copyright
laws.
Thou shalt think about the social
consequences of the program you
are writing or the system you are
designing.
Do not write or create softwares that will allow people to steal, kill, spy, gamble, or spread
pornography.
Thou shalt always use a
computer in ways that
insure consideration and
respect for your fellow
humans.
Use computers in a favorable manner.
Enjoy the use of computers while giving
respect to other users.

More Related Content

Similar to Ten commandments of computing

Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
Amplephi
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
ayerssaa
 

Similar to Ten commandments of computing (19)

Nfwordle
NfwordleNfwordle
Nfwordle
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
ethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdfethicsincyberspace2-130423152958-phpapp02.pdf
ethicsincyberspace2-130423152958-phpapp02.pdf
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.Social, Legal & Ethical Aspects of Computing.
Social, Legal & Ethical Aspects of Computing.
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
The 10 Commandments of Computer Ethics
The 10 Commandments of Computer EthicsThe 10 Commandments of Computer Ethics
The 10 Commandments of Computer Ethics
 
Computer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing PlatformsComputer Ethics and Content Marketing Platforms
Computer Ethics and Content Marketing Platforms
 
Issues with computers
Issues with computersIssues with computers
Issues with computers
 
Social media
Social mediaSocial media
Social media
 
Cyber Law and Cyber Crime
Cyber Law and Cyber CrimeCyber Law and Cyber Crime
Cyber Law and Cyber Crime
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 

Recently uploaded

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
AS
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
ayvbos
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
apekaom
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
AS
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
hfkmxufye
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 

Recently uploaded (20)

20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理一比一原版英国格林多大学毕业证如何办理
一比一原版英国格林多大学毕业证如何办理
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
一比一原版(USYD毕业证书)悉尼大学毕业证原件一模一样
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
[Hackersuli] Élő szövet a fémvázon: Python és gépi tanulás a Zeek platformon
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样原版定制英国赫瑞瓦特大学毕业证原件一模一样
原版定制英国赫瑞瓦特大学毕业证原件一模一样
 
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
如何办理(UCLA毕业证)加州大学洛杉矶分校毕业证成绩单本科硕士学位证留信学历认证
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 

Ten commandments of computing

  • 1. The 10 Commandments of Computer Ethics Ethics is a branch of philosophy that deals with determining what is right from wrong. When computers first began to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. People rely on computers to handle the more tedious details of their social, business, and financial lives. Imagine what would happen if an enemy or a business competitor got access to your email account, bank account, Facebook profile, and company website? They could destroy your reputation in a matter of hours. As the use of computers became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. The idea of Computer Ethics was invented in 1950 by MIT professor Norbert Wiener. Today, many of these rules have been formulated as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and everyone is responsible for knowing what constitutes computer crime and computer fraud. The main concerns of computer ethics are: Internet privacy, cracking, copyright infringement, and Internet control. INTRODUCTION
  • 2. Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws. When computers first began to be used in society at large, the absence of ethical standards about their use and related issues caused some problems. However, as their use became widespread in every facet of our lives, discussions in computer ethics resulted in some kind of a consensus. Today, many of these rules have been formulated as laws, either national or international. Computer crimes and computer fraud are now common terms. There are laws against them, and everyone is responsible for knowing what constitutes computer crime and computer fraud. Thou shalt not use a computer to harm other people. Messaging a friend that they are fat and ugly, programming a robot to kill people, make viruses, or weapons of mass destruction and writing a program that handles the timing of a bomb. Thou shalt not interfere with other people’s computer work. Generating and consciously spreading computer viruses is unethical. Changing your classmate's computer files is wrong. One must not take an action that could give an obstacle or destruction to anybody's work. im not fat
  • 3. Thou shalt not snoop around in other people’s computer files. One should not peep into other people’s files like reading other people’s e-mail messages. Sneaking into your friend’s computer and watching his/her private videos without permission. This is invading one’s privacy. Thou shalt not use a computer to steal. Computers should NOT be used as a tool to take another's property, wrongfully earn money, and steal someone's works or ideas. Using a computer to break into the accounts of a bank and transferring money should be judged the same way as robbery. Thou shalt not use a computer to bear false witness. The computer should not be used in giving wrong statements against a certain thing, event, or person. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. Thou shalt not copy or use proprietary software for which you have not paid. Software is an intellectual product. Obtaining illegal copies of copyrighted software is as bad as photocopying a copyrighted book. It is a wrongful act for you not to give what is due to the owner of the software.
  • 4. Thou shalt not use other people’s computer resources without authorization or proper compensation. Hacking a system to break and bypass the authorization is unethical. Thou shalt not appropriate other people’s intellectual output. copying and pasting your friend's paper without proper authorization is plagiarism, and is unethical. Intellectual property is a form of ownership, and maybe protected by copyright laws. Thou shalt think about the social consequences of the program you are writing or the system you are designing. Do not write or create softwares that will allow people to steal, kill, spy, gamble, or spread pornography. Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans. Use computers in a favorable manner. Enjoy the use of computers while giving respect to other users.