Professional Documents
Culture Documents
Uts Engineer Ethics Marya Noverina
Uts Engineer Ethics Marya Noverina
071001500078
COMPUTER ETHICS
which discuss how to make decisions as computing professionals. The papers I used as references
are “Computer Ethics and IT Professionals” by Aliyu A. O. and “Cyber Crime & Ethics in
Computer Education” by Sunita Verma. Beside the papers, I also read some references by Tom
Forester and E. W. Michael Hoffman. Mainly both of these papers discussed the same subject,
which is the usage of computer technology. However, these two have different way of approaching
the topic. Aliyu’s paper mainly focused on the definition and the role of ethical knowledge on
computing, meanwhile Verma’s paper focused on the problem or violation we may encounter
while using computer technology. These papers discuss the probability of someone penetrate into
our personal data and how to deal or prevent the these problems.
Both of these papers explained the importance of ethics application on computing. Both
Forester and Hoffman mentioned the beneficial of computer technology while also defining what
kind of action that could be considered as a crime. Aliyu indicate the limitation of privacy while
using computer, question such as “is copying software really a form of stealing?” and “does
While Verma explained the serious crime such as hacking or penetrating into company’s personal
data through computer. However, eventhought both of the papers state the crime that could be
done through computer, Verma explained ways to deal with this kind of crime. Meanwhile Aliyu
explained how to educate the ethical knowledge to prevent the crime actions. They discussed the
In conclusion, both of the papers agrees that it’s really important to acknowledge the rules
and limitation before actually using a computer technology. Internet is a risky area which could
easily attract any kind of crimes. However, we can’t really leave the technology of computer and
internet behind in order to avoid the incidents. The data we may receive through the computer
come with it’s own risk we need to be aware of. To prevent the crimes that could be occurred, we
could either taught the ethical knowledge to those who haven’t experienced using computer or
improve security of our personal data. We have to raise our awareness of the importance of
computer ethics. The awareness of this ethical could both improve the safety of our personal
References:
1. Hoffman, E. W. Michael and Jennifel Mills Moore Cambridge, “Ethics and the Management
of Computer Technology”, MA: Oelgeschlager, Gunn & Hain, Publishers, Inc.. 1982.
2. Forester, Tom and Perry Morrison Cambridge, “Computer Ethics”, MA: the MIT Press, 1990.
3. Aliyu, A.O and Adedayo Stephen, “Computer Ethics and IT Professionals”, Energy
4. Verma, Sunita and Rajan Manro, “Cyber Crime & Ethics in Computer Education”, Mandi
Gobindgargh.