THE TEN COMMANDMENTS OF COMPUTER ETHICS
THE TEN COMMANDMENTS OF COMPUTER ETHICS
"information" 1) 10) 2) 3) 4) 5) 6) 7) 8) 9) Act COMMANDMENTS COMPUTER Can Communications Computer Copying Decency Do ETHICS For Generating Hacking If In Information Intellectual Internet It Just Multiuser OF Obtaining Or, Putting Reading Software States, TEN THE Text That The There This Thou United Using You a about access accounts against allocations, amounts an and animated animation animations annoying appropriate are around as assigned attempt authorization authorization: bad bad. ban bank banks, be bear because bomb, bomb. book. book: books both. break breaking buses by bypass called can cannot certain children children, children? communications company computer consciously consequences consideration constitution. content contents. copies copy copyright copyrighted country's course course, destroy destroying digital discussion, displaying disrupt documents documents. does down e-mail else’s embedded encryption. enforce environment. equally events example, fact false fast files files, files. files: films find five for form format. four framework: free from general generally going handles harm harmful have historical house, huge id’s if illegal in include information. instance, intellectual interacting interfere into invading is issues it it. judged law lawmakers laws laws. letters: like making material. may mean memory memory, messages messages. money more nice non-public not notebooks, of on on. one opening or other out output. output: own owner ownership, paid: passwords people people's people: people’s person photocopying pictures piracy principles privacy. process producing product. program programs projects propaganda proper property protect protected public put queuing reading resources respect: responsible robbery. rooms rude rumors safeguard same scenes see shalt should show simply simply, situations six small snoop social society? software some somebody speech spread spreading steal steal: stealing strict struck system system. systems taking that the their them. themselves there think this three time timing to transferring truth. try turn two types unethical unethical. untruth use used user using violated viruses wait was watermarking way way, ways websites where which with without witness: work work. work: working world write write: wrong. you young your
THE TEN COMMANDMENTS OF COMPUTER ETHICS
1) Thou shalt not use a computer to harm other people:
If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files. 2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other people’s computer work by destroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses are unethical work.
3) Thou shalt not snoop around in other people's files:
Reading other people’s e-mail messages is as bad as opening and reading their letters: This is