10commandments of Computer EThics
10commandments of Computer EThics
10commandments of Computer EThics
1) Thou shalt not use a computer to harm other people: If it is unethical to harm
people by making a bomb, for example, it is equally bad to write a program that handles
the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other
peoples books and notebooks, it is equally bad to access and destroy their files.
2) Thou shalt not interfere with other people's computer work: Computer viruses are
small programs that disrupt other peoples computer work by destroying their files, taking
huge amounts of computer time or memory, or by simply displaying annoying messages.
Generating and consciously spreading computer viruses is unethical.
3) Thou shalt not snoop around in other people's files: Reading other peoples e-mail
messages is as bad as opening and reading their letters: This is invading their privacy.
Obtaining other peoples non-public files should be judged the same way as breaking into
their rooms and stealing their documents. Text documents on the Internet may be
protected by encryption.
4) Thou shalt not use a computer to steal: Using a computer to break into the accounts
of a company or a bank and transferring money should be judged the same way as
robbery. It is illegal and there are strict laws against it.
5) Thou shalt not use a computer to bear false witness: The Internet can spread untruth
as fast as it can spread truth. Putting out false "information" to the world is bad. For
instance, spreading false rumors about a person or false propaganda about historical
events is wrong.
6) Thou shalt not use or copy software for which you have not paid: Software is an
intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted
software is as bad as photocopying a copyrighted book. There are laws against both.
Information about the copyright owner can be embedded by a process
called watermarking into pictures in the digital format.
7) Thou shalt not use other people's computer resources without
authorization: Multiuser systems use user ids and passwords to enforce their memory
and time allocations, and to safeguard information. You should not try to bypass this
authorization system. Hacking a system to break and bypass the authorization is
unethical.
8) Thou shalt not appropriate other people's intellectual output: For example, the
programs you write for the projects assigned in this course are your own intellectual
output. Copying somebody elses program without proper authorization is software