0% found this document useful (0 votes)
31 views23 pages

The Commandments of Computer Ethics

The document outlines 10 commandments of computer ethics that provide guidelines for ethical computer use. The commandments address issues like harming others, interfering with other's work, privacy, theft, misinformation, unauthorized use of software and resources, intellectual property, responsible design, and treating others with respect online. Examples are given for each commandment to illustrate how they apply to situations involving cyberbullying, hacking, piracy, spreading rumors, software theft, intellectual property infringement, and more.

Uploaded by

Hizola Jaynel A.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views23 pages

The Commandments of Computer Ethics

The document outlines 10 commandments of computer ethics that provide guidelines for ethical computer use. The commandments address issues like harming others, interfering with other's work, privacy, theft, misinformation, unauthorized use of software and resources, intellectual property, responsible design, and treating others with respect online. Examples are given for each commandment to illustrate how they apply to situations involving cyberbullying, hacking, piracy, spreading rumors, software theft, intellectual property infringement, and more.

Uploaded by

Hizola Jaynel A.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

The

Commandments of
Computer Ethics
it is essential to understand the ethical responsibilities
Commandments of
Computer Ethics

• it is essential to understand the ethical


responsibilities
• set of guidelines that help computer users
navigate ethical issues.
• They were first introduced by the Computer
Ethics Institute in 1992
• widely adopted in the field of computer ethics.
1. Thou shalt not use a
computer to harm others.
This commandment prohibits the use
of computers to cause harm to others,
including spreading viruses, hacking,
cyberbullying, and online harassment.
1. Thou shalt not
use a computer to
harm others.
example
Cyberbullying

A high school student creates a fake


social media profile to bully and harass a
classmate online.
2. Thou shalt not interfere with
other people's computer work.
This commandment prohibits the
intentional disruption of other
people's work on a computer, such as
deleting or modifying their files, or
crashing their computer.
2.Thou shalt not interfere with other people's
computer work. Example
Disrupting Computer Systems
A group of activists launches a Distributed
Denial of Service (DDoS) attack on a
government website, causing it to go
offline for several hours.
3. Thou shalt not snoop around in
other people's computer files
This commandment prohibits the
unauthorized access to other people's
computer files, including personal or
confidential information.
Unauthorized Access
An employee at a company uses their
coworker's password to access confidential files
and gain an advantage in a promotion

3. Thou shalt not snoop around in


other people's computer files.
Example
4. Thou shalt not use a
computer to steal.
This commandment prohibits the use
of computers to steal, including
stealing software, music, movies, or
other digital content.
Online Piracy
A person illegally shares copyrighted music
and movies online.

4. Thou shalt not use a computer


to steal. Example
5. Thou shalt not use a
computer to bear false witness.
This commandment prohibits the use
of computers to spread false
information, including spreading
rumors or making false statements
online.
Spreading False Information
A person shares an article on social media
without fact-checking it first, causing
widespread panic and misinformation.

5. Thou shalt not use a computer to


bear false witness. Example
6. Thou shalt not copy or use
proprietary software for which you
have not paid
This commandment prohibits the use
of computers to spread false
information, including spreading
rumors or making false statements
online.
6. Thou shalt not copy or use
proprietary software for which
you have not paid., Example

Software Piracy
A college student downloads and installs
a pirated copy of expensive software that
they need for a class project.
7. Thou shalt not use other people's
computer resources without
authorization.
This commandment prohibits the
unauthorized use of other people's
computer resources, including
bandwidth, storage, or processing
power.
Unauthorized Use of Resources
A person connects to a public Wi-Fi network
and downloads large files, hogging the
network's bandwidth and slowing down the
internet for others.

7. Thou shalt not use other people's


computer resources without
authorization. Example
8. Thou shalt not appropriate
other people's intellectual output.
This commandment prohibits the
unauthorized use of other people's
intellectual property, including
copyrighted material, trademarks,
and patents.
8. Thou shalt not appropriate
other people's intellectual
output. Example
Intellectual Property Infringement
A company uses a logo that closely resembles a
well-known brand's trademarked logo,
potentially confusing customers and diluting
the value of the original brand.
9. Thou shalt think about the social
consequences of the program you are
writing or the system you are designing.

requires software developers and designers


to consider the potential social impact of
their work, including the potential for their
creations to perpetuate bias or harm to
marginalized groups. It emphasizes the
importance of ethical considerations in the
design process and encourages individuals
to take responsibility for the potential
consequences of their work.
9. Thou shalt think about the social
consequences of the program you are
writing or the system you are designing.
Example

Neglecting Cybersecurity
An employee at a company uses a weak
password and clicks on suspicious email
links, putting the company's sensitive
data at risk of being compromised.
10. Thou shalt always use a computer
in ways that ensure consideration and
respect for your fellow humans

This commandment emphasizes the


importance of treating others with
respect and dignity online, including
avoiding cyberbullying, harassment,
and discrimination.
10. Thou shalt always use a computer in ways
that ensure consideration and respect for your
fellow humans

An individual uses social media to


cyberbully and harass a classmate,
causing emotional distress and
potentially long-term harm to the
classmate's mental health and well-being.

You might also like