Computer Ethics: Page - 1
Computer Ethics: Page - 1
Computer technology is used in various applications and computers have become an essential
part of our daily lives. This dependence on computer technology has also created many
problems such as cybercrimes, data theft, etc.
Ethics is a set of moral principles that govern the behaviour of an individual or group
of people.
Computer ethics is a set of moral principles that regulate the use of computers.
Computer ethics is the application of moral principles to the use of computers and
the Internet.
Examples of computer ethics issues include intellectual property rights (such as
copyrighted electronic content), privacy concerns/policies, and online etiquette, or
netiquette and how computers affect society.
Computers make it easy to duplicate and redistribute copyrighted
electronic/digital content, however, it is ethical to respect copyright guidelines as
computer ethics suggest that it is wrong to so without the author’s approval.
It is important to understand and follow the license agreement (SLA) when using
software.
Using commercial software without paying for a license is considered piracy and is a
violation of computer ethics.
Other unethical uses of computers include hacking, cracking and vandalism of
computer hardware.
Computer ethics helps ensure new technologies positively affect society when
considered during the development of the technology, for example, artificial
intelligence is affecting existing jobs and human communication.
The computer world is evolving and computer ethics continues to create ethical
standards that address new issues raised by new technologies
[email protected] Page | 1
Examples of computer ethics
These are some guidelines of computer ethics that can be used as a computer user:
Avoid the use of computer to harm other people such as create a bomb or destroy
other people works.
Users also should not use a computer for stealing activities like breaking in to a bank
or company to steal data.
Make sure a copy of software had been paid by the users before it is used. This is
because software is an intellectual product.
People must also not use other people's computer resources without authorization
because it can be declared as hacking.
Ethical computing is a system of moral principles a person should follow while using a
computer at their home, school, and office. The Computer Ethics Institute has developed the
following Ten Commandments of Computer Ethics that can be used as guidelines of how to
remain ethical when using your computer.
Ten Commandments of Computer Ethics
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not copy or use proprietary software you have not purchased.
7. Thou shalt not use other people's computer resources without authorization or proper
compensation.
8. Thou shalt not appropriate other people’s intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
10. Thou shalt always use a computer in ways that insure consideration and respect for
your fellow humans.
Computer and Information Technology Crime
The ethical spectrum for computer issues runs from that which is ethical, to that which is unethical,
to that which is against the law – computer crime
An illegal entry into a computer system, direct or indirect, for the purpose of personal gain is
considered – FRAUD
Computers can be both an invitation to fraud and a tool to thwart fraud
Not all computer crime is premeditated. Negligence or incompetence can be just as bad for an
organization as a premeditated crime.
[email protected] Page | 2
What is unauthorized access and how is it achieved?
Federal copyright law automatically protects software from the moment of its creation.
The same law protects other Intellectual property (books, films, audio recordings and so on).
Software theft is act of stealing or illegally copying software or intentionally erasing
programs
Software piracy is illegal duplication of copyrighted software
[email protected] Page | 3
When users cannot access the network or specific services provided on the network,
they experience a denial of service.
To make information available to those who need it and who can be trusted with it,
organizations use authentication and authorization.
Authentication is proving that a user is the person he or she claims to be. That proof
may involve something the user knows (such as a password), something the user has
(such as a “smartcard”), or something about the user that proves the person’s identity
(such as a fingerprint).
Authorisation is the act of determining whether a particular user (or computer
system) has the right to carry out a certain activity, such as reading a file or running a
program.
Authentication and authorization go hand in hand – users must be authenticated
before carrying out the activity they are authorized to perform.
Security is strong when the means of authentication cannot later be refuted – the user
cannot later deny that s/he performed the activity.
This is known as nonrepudiation
[email protected] Page | 4