Computer Ethics
Computer Ethics
Computer Ethics
Ethics deals with placing a “value” on acts according to whether they are “good” or
“bad”. Every society has its rules about whether certain acts are ethical or not. These
rules have been established as a result of consensus in society and are often written into
laws.
When computers first began to be used in society at large, the absence of ethical
standards about their use and related issues caused some problems. However, as their use
became widespread in every facet of our lives, discussions in computer ethics resulted in
some kind of a consensus. Today, many of these rules have been formulated as laws,
either national or international. Computer crimes and computer fraud are now common
terms. There are laws against them, and everyone is responsible for knowing what
constitutes computer crime and computer fraud.
The Ten Commandments of computer ethics have been defined by the Computer
Ethics Institute. Here is our interpretation of them:
1) Thou shalt not use a computer to harm other people: If it is unethical to harm
people by making a bomb, for example, it is equally bad to write a program that handles
the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other
people’s books and notebooks, it is equally bad to access and destroy their files.
3) Thou shalt not snoop around in other people's files: Reading other people’s e-mail
messages is as bad as opening and reading their letters: This is invading their privacy.
Obtaining other people’s non-public files should be judged the same way as breaking into
their rooms and stealing their documents. Text documents on the Internet may be
protected by encryption.
4) Thou shalt not use a computer to steal: Using a computer to break into the accounts
of a company or a bank and transferring money should be judged the same way as
robbery. It is illegal and there are strict laws against it.
5) Thou shalt not use a computer to bear false witness: The Internet can spread
untruth as fast as it can spread truth. Putting out false "information" to the world is bad.
For instance, spreading false rumors about a person or false propaganda about historical
events is wrong.
6) Thou shalt not use or copy software for which you have not paid: Software is an
intellectual product. In that way, it is like a book: Obtaining illegal copies of copyrighted
software is as bad as photocopying a copyrighted book. There are laws against both.
Information about the copyright owner can be embedded by a process
called watermarking into pictures in the digital format.
8) Thou shalt not appropriate other people's intellectual output: For example, the
programs you write for the projects assigned in this course are your own intellectual
output. Copying somebody else’s program without proper authorization is software
piracy and is unethical. Intellectual property is a form of ownership, and may be
protected by copyright laws.
9) Thou shalt think about the social consequences of the program you write: You
have to think about computer issues in a more general social framework: Can the
program you write be used in a way that is harmful to society? For example, if you are
working for an animation house, and are producing animated films for children, you are
responsible for their contents. Do the animations include scenes that can be harmful to
children? In the United States, the Communications Decency Act was an attempt by
lawmakers to ban certain types of content from Internet websites to protect young
children from harmful material. That law was struck down because it violated the free
speech principles in that country's constitution. The discussion, of course, is going on.
10) Thou shalt use a computer in ways that show consideration and respect: Just like
public buses or banks, people using computer communications systems may find
themselves in situations where there is some form of queuing and you have to wait for
your turn and generally be nice to other people in the environment. The fact that you
cannot see the people you are interacting with does not mean that you can be rude to
them.
See http://www.ccsr.cms.dmu.ac.uk/resources/professionalism/codes/cei_command_com.
html for further comments on the ten commandments.
ADDITIONAL READING:
The following email message was sent to the instructor as a response to the ten
commandments mentioned in this page:
Email
Check your email as much as possible and respond quickly to messages you receive;
your input may be critical to someone else.
Never send anything that you wouldn’t want someone other than the recipient to
read.
Get good virus protection software and make sure it scans your incoming emails.
Don’t open an attachment in an email if:
You don’t know the sender,
The subject line doesn’t make sense or is suspicious in any way,
The attachment name is suspicious, or
The attachment or message text doesn’t make sense or you aren’t expecting them.
Don’t type in all capital letters; it looks like you are screaming.
Try not to use sarcasm or humor, it doesn’t always come across well.
When you’re subscribed to a listproc make sure you reply to one person and not the
whole list, unless you want the whole list to read what you have to say.
If everyone acted the same way you did, would society as a whole benefit?
Would an impartial observer judge that your actions are fair to all parties involved?
Would you be proud to tell your parents/significant other what you are doing?
If you were in another person’s place would you have to admit that what you are doing is
fair? If you did this at work would your employers/customers agree that you did the right
thing? Would you mind reading about your actions on the front page of the Blade?
1. Honesty
2. Respect
3. Confidentiality
4. Professionalism
5. Responsibility
6. Communication
7. Obeying the law Computer Ethics 4
COPYRIGHT
SOFTWARE PIRACY
• Public domain
o Some software is free to use, copy, and/or change, but only do so if there
is written notice that the software is in the public domain. Look for this
notice in the “read me” files that accompany programs.
• General Public License
o GPL software has the same restrictions as public domain software, but
cannot be sold for profit.
• Shareware
o Using shareware programs is free, but it is illegal to copy or modify them
without permission since they are copyrighted. Most shareware programs
are really trial versions of the software, which must be paid for after the
trial period has expired.
When you purchase a copy of a software program you are actually buying a software
license, or in the case of an organization that needs many copies, a site license. A
software license can only be copied for backup purposes while site licenses let the
organization make a specific number of copies to be used within that organization only.
Although it seems common, software piracy is a felony and shouldn’t be taken lightly.
MP3'S
Downloading and/or uploading music is a violation of copyright laws. It is not true that
keeping the file for less than 24 hours is legal and it is a myth that uploading is legal if
you have paid for the original work.
“Fair use” permits the use of a small section of a work if the copyright holder is
reimbursed or has given permission for the use of his or her work. If you use more than
10 percent or 30 seconds of the original work you are participating in copyright
infringement.
Downloading music and other media also makes unfair use of the University’s bandwidth
and can deprive others of Internet access. Computer Ethics 5
PLAG IARISM
Plagiarism is presenting someone else’s work as your own; this includes work
represented in hard copy, on disk, or on the Internet. Do not use “paper mills” or sites
that sell academic papers to students. You can get caught and the penalties are not
lenient.
Make sure you summarize, or at least change the order of the words when using
someone else’s work as a reference. Also be sure to cite that work as something you
have used to gain the information you are presenting. Anything that is directly quoted
from any source must be put in quotation marks and cited as well.
Copyright infringements can get you sued. They encompass anything that anyone has
expressed in any way. A person does not need to express their copyright or even
actually register it, a person’s ideas are their own and it is illegal to pretend that they are
yours. Computer Ethics 6
PRIVACY
Who can you ask questions about uses of BGSU computers or Internet services?
The Student Technology Center, 372-9277
Cindy Fuller, Communications Coordinator, 372-9229
Technology Support Center, 372-0999
Use Your Accounts Wisely, Use Your Equipment Wisely, and Share Our Bandwidth
Responsibly. Computer Ethics 7
INCIDENT RE SPONSE
Depending on the situation, please contact the appropriate office by phone. These
offices will involve the ITS information Security and Privacy Office for technical
assistance as necessary.
A general rule when it comes to computer ethics is respect. Here are some guidelines to
follow when dealing with computers in your academic life; most translate into the
workplace as well:
RESPECT YOURSELF
RESPECT OTHERS
FINAL NOTE
Be aware that under certain new rules promulgated by the United States Government,
the University may be required to reveal information about you, so use common
computers wisely.