Ref Paper Com Ethics

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Christian Jaero P.

Ybañez

Reflection paper about the Ten Commandments of Computer Ethics


These commandments outline the guidelines for using a computer responsibly. It emphasizes not
harming others, interfering with their work, accessing files, stealing, bearing false witness,
copying or using proprietary software without permission, using computer resources without
authorization or proper compensation, appropriate intellectual output, considering social
consequences of programs or systems, and use computers in ways that ensure consideration and
respect for other humans. It also emphasizes the importance of using computers responsibly and
ethically. It's important for a computer user to remember all of these. It's a very important rule.
Thou shalt not use a computer to harm other people. The commandment emphasizes the ethical
guidelines of not causing harm to another user by using a computer and refraining from
interfering with their work. Viruses are malicious programs designed to harm or disrupt
computer programs, often overloading memory and causing dysfunction, leading to unethical
development and spread. Thou shalt not access other people’s computer files. Ethical practices
include not reading others' letters or emails, obtaining files, or reading messages, and applying
encryption schemes to protect information from invasion. Thou shalt not use a computer to steal.
Robbery involves stealing sensitive employee information or breaking into bank accounts for
retrieval, while illegal electronic transfers of funds are considered fraud. Thou shalt not use a
computer to bear false witness. Computers facilitate information dissemination via the internet,
allowing for the spread of false news and rumors, making it unethical to exploit technology to
spread incorrect information. Thou shalt not copy or use proprietary software for which you have
not paid (without permission). Like any other artist or literary work, software is also subject to
copyrights. Software is the outcome of a programmer's intellect and it is important to respect
talent and give due regard to his/her rights. Obtaining illegal copies of copyrighted software is
unethical. Thou shalt not use other people’s computer resources without authorization or proper
compensation. Multi-user systems are supported by user-specific IDs and passwords. Breaking
into some other user's password, and indulging in his private space on the network is unethical. It
is not ethical to hack passwords to gain unauthorized access to a password-protected computer
system. Thou shalt not appropriate other people’s intellectual output. Copying a programmer's
work in one's name is unethical, as it is their property and the output of their intellect and efforts.
Thou shalt think about the social consequences of the program you are writing or the system you
are designing. Programmers must consider the social consequences of their programs, such as
potential viral content or content for children, to avoid unethical practices and ensure the safety
of the masses. Thou shalt always use computers in ways that ensure consideration and respect for
other humans. In both real-world and computer interactions, it's crucial to maintain courtesy,
cooperation, and consideration for others, demonstrating kindness and respect in both
environments.
The Ten Commandments are crucial for ethical computer usage, as they emphasize the
importance of following correct knowledge and not taking actions lightly. These commandments
are not widely known and should be shared with all computer users to ensure they are always
ethical. They provide the correct knowledge to maintain ethical behavior in the digital world.
The Ten Commandments, though not universally known, are a valuable and essential knowledge
that ensures our safety. The Ten Commandments can be followed while using a computer
ethically.

You might also like