Basic Computer Ethics

Author Topic: Basic Computer Ethics  (Read 2958 times)

Offline Golam Kibria

  • Hero Member
  • *****
  • Posts: 1127
  • Working for a better life
    • View Profile
    • Golam Kibria
Basic Computer Ethics
« on: August 10, 2012, 02:25:19 PM »
Advancements in technology bring a set of pros and cons. It is human perception that makes it a boon or a bane. To prevent indifference and for rightful use of computer technology, read on for some basic computer ethics.

Act Responsibly
With great knowledge, comes the great power of using it responsibly. A computer gives you the power and the knowledge of a lot of information about someone else, a product, an organization or a service. This ethic dictates the user to responsibly use this information. Indulging in a crime of slander or defamation over a personal vendetta, just because you could lay hands on this information, is totally incorrect. Unethical use of information to destroy someone's reputation is an act of cowardice and is severely condemned by the computer ethics' rule book.

Avoid Interference
It is tempting to know what lies in the confidential files and folders. However, as a computer user, you do not interfere with personal files, documents, letters, folders and other such information. Failure to comply with non-interference, tantamount to snooping and stealing private information. Using an electronic device to find out classified information about any entity, is equal to robbery and fraud.

Maintain Credibility

As more and more social networking sites, using a computer as a medium of mass communication is very easy. It takes one click to submit a life changing information about a subject on the Internet. If such little effort can change the public sentiment, it must be done with absolute credibility. Giving out incorrect information, will tarnish your image along with the victim's image. Using technology as a devil's advocate, drastically downsizes your credibility.

Prevent Piracy
'Thou shalt not use or copy software for which you have not paid', is the correlating commandment. Just as buying pirated versions of books is a crime, using pirated or duplicated programs is cheating the designer of his/her intellectual copyrights. It is unethical to use a copied version and denying the person of his rightful royalty. Also, promoting these programs in the wrong names, is a selfish act and definitely worth condemning.

Fraudulent Behavior
As computers are used by every organization to ease their work flow, important data is often stored on the same device. Often such workplaces use multi-user systems, which makes it easy to break into each others machines. This makes accessing confidential information easy. However, ethics implies that any information that is acquired secretly and maliciously, it is a fraudulent act.

Ethics form the basis of using computer technology for rightful purposes that bring about social harmony. Every technology comes with a set of pros and cons. It is the human interpretation that makes all the difference. As Albert Einstein aptly said, 'It is not enough that you should understand about applied science in order that your work may increase man's blessings. Concern for man himself and his fate must always form the chief interest of all technical endeavors'.
Golam Kibria
ID:101-11-1373 (BBA)
Asst.Offic, Bangladesh Skill Development Institute
Ex.Lecturer,SEBGC
Email : golam_1373@diu.edu.bd
http://www.golamkibria.com
Mob:01843674226
Digital University: http://www.daffodilvarsity.edu.bd
Bangladeshi Poems, Novels and history: http://www.trulybangladesh.com

Offline Golam Kibria

  • Hero Member
  • *****
  • Posts: 1127
  • Working for a better life
    • View Profile
    • Golam Kibria
Re: Basic Computer Ethics
« Reply #1 on: August 10, 2012, 02:26:49 PM »
Ten Commandments of Computer Ethics

Thou shalt not use a computer to harm other people.

This commandment makes clear that it is unethical to use a computer to harm another user. It includes harming or corrupting some other user's data or files. The commandment states that it is wrong to steal someone's personal information by means of a computer. It is unethical to manipulate or destroy the files of other people through the use of a computer. It iterates the fact that writing a programs intended to bring perform ethically wrong actions, is in itself unethical.

Thou shalt not interfere with other people's computer work.
Viruses are small programs built with intent to harm or disrupt the useful computer programs. Some viruses aim at overloading the computer memory by an excessive use of computer resources. These viruses tend to fail a computer in executing the desired tasks. They lead to the dysfunction of a computer. The development or the spread of such malicious software in unethical.

Thou shalt not snoop around in other people's files.

We know that it is wrong to read another person's letters. On similar lines, it is unethical to read another person's email messages. Obtaining another person's private files is as wrong as breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his/her privacy. In order to protect the information from being attacked, it is ethical to apply encryption schemes to it.

Thou shalt not use a computer to steal.
The stealing of sensitive information such as the personal information of the employees from an employee database, or breaking into bank accounts for the retrieval of confidential information is nothing less than robbery. An illegal electronic transfer of funds is one type of a fraud.

Thou shalt not use a computer to bear false witness.
Computers are the easiest sources of spreading information to the masses by means of Internet. This also means that false news or rumors can spread speedily and easily through the Internet. Being involved in the circulation of incorrect information is unethical. Spreading the wrong information by means of Internet is like taking an undue advantage of technology.

Thou shalt not use or copy software for which you have not paid.
Like any other artists or literary work, software is also subject to copyrights. Software is the outcome of a programmer's intellect and it is important to respect talent and give due regard to his/her rights. Obtaining illegal copies of copyrighted software is unethical.

Thou shalt not use other people's computer resources without authorization.
Multi-user systems are supported by user specific ids and passwords. Breaking into some other user's password, thus indulging into his private space on the network is unethical. It is not ethical to hack passwords for gaining an unauthorized access to a password-protected computer system.

Thou shalt not appropriate other people's intellectual output.

Programs developed by a programmer in an organization are his/her property. Copying them and propagating them in one's own name is unethical. A creative work, a program or a design that a particular employee comes up with, is his/her ownership. It is the output of someone's intellect and efforts. Copying it with selfish intentions is indeed not ethical.

Thou shalt think about the social consequences of the program you write.

Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer program goes a long way to reach homes of the masses. In case a person is working for animation films or he/she is designing a video game, it is the programmers responsibility to pay heed to the effects of his/her creation. In case of software, it is important for the programmer to realize the prospective use of the software. Writing a virus, when one knows that it is going to serve as a malware, is indeed unethical. If a particular content is intended for children or when children are prone to gain access to the content, it is necessary for the creator of such content to be careful about the social consequences it is bound to have.

Thou shalt use a computer in ways that show consideration and respect.

In the real world, we face situation wherein we need to be courteous to our fellow mates. Many times, we need to cooperate with them and give each of the fellow individuals the consideration due. On similar lines, while interacting through a computer, a person needs to be nice to the ones he/she interacts with.

The Ten Commandments of Computer Ethics are the means to build a set of regulations to guide the individual users to base computer related operations on strong ethical values. The commandments are a way to make people understand the ethics involved in the use of technology.
Golam Kibria
ID:101-11-1373 (BBA)
Asst.Offic, Bangladesh Skill Development Institute
Ex.Lecturer,SEBGC
Email : golam_1373@diu.edu.bd
http://www.golamkibria.com
Mob:01843674226
Digital University: http://www.daffodilvarsity.edu.bd
Bangladeshi Poems, Novels and history: http://www.trulybangladesh.com