You are on page 1of 12

COMPUTER ETHICS 1

Prepared by: Aira Mae Alura


TEN COMMANDMENTS 2

1. Thou shalt not use a computer to harm other


people.
Ø Do not use the computer in ways that may
harm other people.
Øharming or corrupting other users' data or files.
Øuse a computer to steal someone's personal
information.
Øhacking, spamming, phishing or cyber bullying
does not conform to computer ethics
Prepared by: Aira Mae Alura
TEN COMMANDMENTS 3

2. Thou shalt not interfere with other people's


computer work.
Ø Do not use computer technology to cause
interference in other users' work
ØViruses - harm useful computer programs or
interfere with the normal functioning of a
computer
ØMalicious software - attack a computer is
unethical.
Prepared by: Aira Mae Alura
TEN COMMANDMENTS 4

3. Thou shalt not snoop around in other people's


computer files.
ØDo not spy on another person's computer data.
Øreading someone else's email messages or files
ØObtaining data from another person's private files
ØSnooping around in another person's files or reading
someone else's personal messages
Øspying
Prepared by: Aira Mae Alura
TEN COMMANDMENTS 5

4. Thou shalt not use a computer to steal.


Øacquire personal information
Øbreaking into a bank account to collect
information
ØComputers can be used to store stolen
information

Prepared by: Aira Mae Alura


TEN COMMANDMENTS 6

5. Thou shalt not use a computer to bear false


witness.
ØDo not contribute to the spread of
misinformation using computer technology.
Øfalse news or rumors
ØBeing involved in the circulation of incorrect
information is unethical
ØMails and pop-ups – commonly used to
spread wrong info.
Prepared by: Aira Mae Alura
TEN COMMANDMENTS 7

6. Thou shalt not copy or use proprietary


software for which you have not paid
(without permission).
ØRefrain from copying software or buying
pirated copies. Pay for software unless it is
free.

Prepared by: Aira Mae Alura


TEN COMMANDMENTS 8

7. Thou shalt not use other people's computer


resources without authorization or proper
compensation.
ØBreaking into some other user's password,
thus intruding his/her private space is
unethical

Prepared by: Aira Mae Alura


TEN COMMANDMENTS 9

8. Thou shalt not appropriate other people's


intellectual output.
ØIt is wrong to claim ownership on a work
which is the output of someone else's
intellect.
ØEstablishing ownership on a work which is
not yours is ethically wrong.
Prepared by: Aira Mae Alura
TEN COMMANDMENTS 10

9. Thou shalt think about the social


consequences of the program you are writing
or the system you are designing.
ØBefore developing a software, think about
the social impact it can have.

Prepared by: Aira Mae Alura


TEN COMMANDMENTS 11

10. Thou shalt always use a computer in ways


that ensure consideration and respect for your
fellow humans
ØIn using computers for communication, be
respectful and courteous with the fellow
members.

Prepared by: Aira Mae Alura


References 12

• What is Computer?
• GCFLearnFree.org
• Understanding PC Hardware (K12). 2017. Jemma
Development Group
• Ten Commandments Retrieved from
http://www.computerethicsinstitute.org/images/TheTenCom
mandmentsOfComputerEthics.pdf
• Images Retrieve from Google Search

Prepared by: Aira Mae Alura

You might also like