Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

COMPUTER ETHICS

Expected behavior on the digital playing field.


THE TEN COMMANDMENTS
Proposed and created in 1992 by the Computer Ethics Institute by Ramon C. Barquin.
THOU SHALL NOT USE A COMPUTER IN WAYS THAT
MAY HARM PEOPLE.
Dont hurt people.
THOU SHALL NOT INTERFERE WITH OTHER PEOPLE'S
COMPUTER WORK.
Dont stop others from doing work.
THOU SHALL NOT SNOOP AROUND IN OTHER
PEOPLE'S COMPUTER FILES.
Dont spy.
THOU SHALL NOT USE A COMPUTER TO STEAL.
Stealing is stealing- even if its just data.
THOU SHALL NOT USE A COMPUTER TO FALSE WITNESS
Dont spread false information.
THOU SHALL NOT COPY OR USE PROPRIETARY
SOFTWARE FOR WHICH YOU HAVE NOT PAID.
Its still stealing.
THOU SHALL NOT USE OTHER PEOPLE'S COMPUTER RESOURCES
WITHOUT AUTHORIZATION OR PROPER COMPENSATION.
Stealing. Did we mention stealing?
THOU SHALL NOT APPROPRIATE OTHER PEOPLE'S
INTELLECTUAL OUTPUT.
Dont claim ownership over something you didnt create (i.e. text, images, etc)
THOU SHALL THINK ABOUT THE SOCIAL CONSEQUENCES OF THE
PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING.
Think about the social implications of what you create.
THOU SHALL ALWAYS USE A COMPUTER IN WAYS THAT ENSURE
CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS.
Be aware people are behind the computers.
NETIQUETTE
We should all be aware of others
and the things that may or may not
offend or hurt people.

Be responsible for yourself and


your actions.

Remember who you are offline


when online.

Why do we feel more comfortable


online being jerks? Think before
you talk AND type.
GENERAL NETIQUETTE

In general, do not waste other people's time, be


disruptive, or threaten.

Do not take up network storage space with large,


unnecessary files; these should be downloaded.

Do not look at other people's files or use other


systems without permission.

When joining a bulletin board or discussion


group, check the FAQ (frequently asked
questions) file before asking questions.

Remember that on-line communications lack the


nuances of tone, facial expression, and body
language. Write clearly. Try to spell correctly and
to use good grammar.
GENERAL NETIQUETTE
Add emoticons, or Smileys --expressive symbols--to
clarify meaning.

Do not SHOUT needlessly. Capital letters are the on-


line equivalent of shouting.

Use asterisks to give emphasis, but do so *sparingly*.

Sign messages, and include an e-mail address when


writing to strangers, just in case a message's header is
lost.

Personal attacks or complaints are called flaming. Be


discriminate: flaming can turn into flame wars and
disrupt discussion groups.

People who become too obnoxious can be banned


from a system or simply ignored. A "kill file" will
automatically erase messages sent from a person who
has become intolerable.
EXAMPLES OF COMPUTER
ETHICAL DILEMMAS
Is it wrong to steal digital content?

Is it wrong to anonymously bully


or put down someone?

Is it wrong to post information


that could potentially cause harm?

Is it wrong to create a virus?

Is it wrong to replace a physical


worker with someone online?
EXAMPLES OF COMPUTER
ETHICAL DILEMMAS

What should students be allowed


to do with school issued
technology?

What should schools be allowed


to do with school issued
technology?
EXAMPLES OF COMPUTER
ETHICAL DILEMMAS

Computer Ethic Scenarios and


Discussion!

You might also like