COMPUTER ETHICS
Computer ethics focuses on concerns relating to computer abuse and how it might be stopped. The ethical use of computing resources is its main requirement. There are ways to prevent the illegal distribution of digital content in it. (Geeks for Geeks, 2021).
- Thou shall not use the computer to harm other people - Avoid using the computer in a way that could endanger others.; for example, by corrupting someone else user data.
- Thou shalt not interfere with other people's computer work - Do not use the computer in a way that can disrupt or disturb someone's work.
- Thou shalt not snoop around in other people's computer files - Do not eavesdrop on another person's emails or private files on their computer.
- Thou shalt not use a computer to steal - Do not steal information using computer technology. Leaking or stealing sensitive information is equivalent to robbing someone.
- Thou shalt not use a computer to bear false witness - Do not use technology to aid in the dissemination of false information.
- Thou shalt not copy or use proprietary software for which you have not paid - Do not purchase or copy software that has been illegally distributed. Unless it is free, pay for the software.
- Thou shalt not use other people's computer resources without authorization or proper compensation - If you haven't been given permission, never utilize another person's computer resources. It is unethical to access data that you are not authorized to access or to get access to another user's computer without his consent.
- Thou shalt not appropriate other people's intellectual output - It is improper to assert ownership over a product of another person's intellect.
- Thou shalt think about the social consequences of the program you are writing or the system you are designing - Before creating software, consider the potential societal effects. A software developer or development company should take into account the potential impact that their code may have on society as a whole.
- Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans - Remember to treat your fellow members with respect and courtesy when communicating over computers.
In accordance with my main project; Commandments 3 & 8 are the commandments that are most important. I would proceed to explain further the impacts it can have.
Commandment 3; A common example of technology done with embedded systems is the camera, so inventing the camera to snoop on people's privacy or eavesdrop on their conversation is an unethical way of using the computer.
Commandment 8; In an embedded system, the development of technology is done for the benefit of mankind, therefore there is a person behind the implementation and invention of the technology which takes a lot of intellectual thinking. When another person claims ownership of the invention it is known as breaching one of the commandments in computer ethics.
Reference list
Geek for Geeks (June 6, 2021). Computer Ethics. https://www.geeksforgeeks.org/computer-ethics/. [Online], (Assessed October 29, 2022).
Milky Jackson (February 26, 2016). Ten commandments of computer ethics. https://prezi.com/yufhwjgtmqtw/10-commandments-of-computer-ethics/. [Online]. (Accessed October 29, 2022).
Comments
Post a Comment