Computer Ethics – The Ten Commandments

Slides:



Advertisements
Similar presentations
for 6th grade Technology
Advertisements

Hart District Acceptable Use Policy Acceptable Use Policy.
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Chapter 1: The Context of SA&D Methods
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
Boyertown Area School District Acceptable Use Policy.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
VISD Acceptable Use Policy
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Computer Viruses. – A computer virus is an application program designed and written to destroy other programs. – It has the ability to:  Link itself.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS. What is Computer Ethics? Ethics is a set of moral principles that govern the behavior of a group or individual. computer ethics is set.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Student Technology Code of Ethics
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
The Legal System and Ethics in Information Security
Unit 3- Introduction to Computer Ethics
Presentation transcript:

Computer Ethics – The Ten Commandments

Ten Commandments of Computer Ethics Commandment: an instruction; a requirement Ethics: a code of conduct; how a person should live.

1. You shall not use a computer to harm other people. Intentionally interfering with other people’s work Invading the privacy of individuals

2. You shall not interfere with other people's computer work. Degrading or disrupting equipment, software, or system performance. Using resources to interfere with the proper operation of any computer, or destroy data. Intentionally interfering with other people’s work Invading the privacy of individuals

3. You shall not snoop around in other people's computer files. Using an account owned by another user, or allowing another user to access your account. Invading the privacy of individuals

4. You shall not use a computer to steal. Using resources in any manner that breaks the law or violates company policy. This can include the unauthorised copying or transmission of software.

5. You shall not use a computer to bear false witness. You should not be responsible for creating or forwarding “chain” letters. You should not download, store, print, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or is aimed at degrading others.

6. You shall not copy or use proprietary software for which you have not paid. You should not use resources in any manner that violates company policy or breaks the law, including the Copyright, Designs and Patents Act. This means that you should not be copying or transmitting software for which you do not have a licence

7. You shall not use other people's computer resources without authorisation or proper compensation. You should not try to pass off information obtained via the Internet or as part of your working life as your own. You should always give proper credit to the source. You should not post personal communication without the original author’s consent.

8. You shall not appropriate other people's intellectual output. Posting personal communication without the original author’s consent. Using information obtained through network and computer resources without giving proper credit to the source (plagiarism).

9. You shall think about the social consequences of the program you are writing or the system you are designing. Downloading, storing, printing, or distributing files or messages that are profane, obscene, threatening, or that use language that offends or tends to degrade others.

 10. You shall always use a computer in ways that show consideration and respect for your fellow humans. Downloading, storing, printing, or distributing files or messages that contain information considered dangerous to the public at large.

References “Ten Commandments of Computer Ethics”. (http://courses.cs.vt.edu/~cs3604/lib/WorldCodes/10.Commandments.html) Computer Ethics Institute, Washington DC. (7 July 2003). Port Byron Central School District Technology Code of Conduct for Students. (Adopted July 2000.)