Ten Commandements Of Computer Ethics

  • Uploaded by: Maestro Jam
  • 0
  • 0
  • January 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ten Commandements Of Computer Ethics as PDF for free.

More details

  • Words: 1,026
  • Pages: 2
Loading documents preview...
CODE OF ETHICS FOR IT PROFESSIONALS Preamble: I will use my special knowledge and skills for the benefits of the public. I will serve employees and clients with integrity, subject to an overriding responsibility to the public interest, and I will strive to enhance the competence and prestige of the profession. By these means: 1. I will promote public knowledge understanding and appreciation of information technology 2. I will consider general welfare and public good in the performance of my work. 3. I will advertise goods and professional services in a clear and truthful manner 4. I will comply and strictly abide the intellectual property laws, patent laws, and other related laws on respect of information technology. 5. I will accept full responsibility for the work undertaken and utilize skills with competence and professionalism. 6. I will make truthful statement on my areas of competence as well as with capabilities and qualities of my products or services. 7. I will not disclose any confidential information obtained in the course of professional duties with the content of the parties concerned, except when required by law. 8. I will try to obtain the highest quality in both the products and that I offer. 9. I will not knowingly participate in the development of information technology system that promotes the commission of proud and other unlawful acts. 10. I will uphold and improve the IT profession standard through continuing professional development in order to enhance the IT professionals. TEN COMMANDEMENTS OF COMPUTER ETHICS 1. Thou shall not use a computer to harm other people If it is unethical to harm people by making bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, it is equally bad to access and destroy their files. 2. Thou shall not interfere with other people’s computer work Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or simply displaying annoying messages. Generating and consciously spreading computer viruses are unethical. 3. Thou shall not snoop around in other people’s files: reading other people’s e-mail messages is as bad as opening and reading their letters. This is invading their privacy. Obtaining other people’s no-public files should be judged the same ways as breaking into their rooms and stealing their documents. Text documents on the internet may be protected by encryption. 4. Thou shalt not use a computer to steal. Using a computer to break into the accounts of a company or bank and transferring money should be judged the same way as robbery. It is illegal and there are strict laws against it. 5. Thou shalt not use a computer to bear false witness. The internet can spread untruth as fast as it can spread truth. Putting out false “information” to the world is bad. For instance, spreading false rumors about a person or false propaganda about historical events is wrong. 6. Thou shalt not use or copy software for which you have not paid. Software is an intellectual product, I n that way, it is like a book. Obtaining illegal copies of copyrighted software is as bad as photo copying a copyrighted book. There are laws against both. Information about the copyright owner can be embedded by a process called watermarking into pictures in the digital format. 7. Thou shalt not use other people’s computer resources without authorization. Multiuser systems use user id’s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to by pass this authorization system. Hacking a system to break and by pass the authorization is unethical. 8. Thou shalt not appropriate other people’s intellectual output. For example, the programs you write for the projects assigned in this course are your own intellectual output 9. Thou shalt think about the social consequences of the program you write. You have to think about computer issues in a more general social framework. Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? 10. Thou shalt use a computer in ways that show consideration and respect. Just like public buses or banks, people using computer communications systems may find themselves in situation where there is some form of queuing and you have to wait for your turn and generally be nice to other people in environment. The fact that you cannot see the people you are interacting with does not mean that your c an be rude to them

Career in Computing/Information Technology 1. Information System Manager- manager of a department 2. Database Administrator- acts as a file design and database consultant to others in the organization 3. System Analyst-responsible for analyzing how computer data processing can be applied to specific user problems. 4. Programmer  Application Programmer- takes care of the system specifications of analysts and transform them into effective and well documented programs that perform specific task of users  System Programmer- performs support function by maintaining the system software environment in which applications programmers and computer operators work 5. Telecommunications specialist- responsible for the design of internal and external data communications networks that serve their organizations. 6. Computer Operations Personnel  Computer Operator- involves in setting up the processor and related tape and disk drives, starting the program run, checking to ensure proper operation, and unloading equipment at the end of a run.  Data Entry Operator- transcribe data from source documents into a magnetic media form that’s suitable for input into a compute system  Program and Media Librarian- tasked of maintaining and protecting the installation’s programs and data. 7. Knowledge Engineer- work closely with human specialists to translate human expertise into the facts and decision rules that can be placed in the knowledge base of an expert system 8. Technical Writer-produce user manuals and other software documentation 9. Educator- employed to teach computing concepts.

Related Documents

Ten
February 2021 4
Benefits Of Ethics
January 2021 1
Theory Of Computer Science
February 2021 0

More Documents from "Sanyam Sindhu"