Professional Documents
Culture Documents
Computer Ethics
Computer Ethics
e
ture, and apply computers, computer ethics is
a branch of engineering ethics.
V In addition, names such as cyber-ethics" and
"Internet ethics" have been used to refer to
computer ethics issues associated with the
f Internet.
When computers first began to be used in
Internet
epeech
computer.
Some
home'seasilysince
Internet commercial
pornography,
speech,
hateinformation.
including sources of toethics.
One Internet
Internet computer
be, andresponsibleThereCOMmonterms.
crimesand
national
husiasts images been kindsions
on from. set Today,widespreadproblems.about
Societyatlare,
in Free
requires provides are of
onthe ofcontact has
international. speech) control a in their
ny Speech crime laws formulated
consensus.
ternet and issues magnified Or
many
computer
for However,in use
e argue control
texts with and against
computer fraud
and a knowing international. every and the
of
center of
other well computer related'issues absence
e, not that-sources can libel..obscene all ethics facet
them, as
these as
extremely spring issues
trolling
only spam.{unwanted on people what of
be resulted their ofethical
but fraud. and our
free laws,
transmitted
to of in rules GLOBAL
ISSUES
so will use
lives, caused
forms and new
computer constitutes everyone Computer are
a
dificult speech, standards
prove became
in
child either discus some
at free with ways now have some
of is
Theft 1. instrumnent
with The behaviour5.9.1 Broad PROFESSIONAL
V various
the Computer
Computers Those
information
autonomous
computer categories
instrument
installedeact,
Those Internetsuch
principles
steal VirusesInvasion
Privacy Theft
of opportunity.
use Those
Computer
Comnputers Computer
ployer, Hacking help
for of
unethical asfor
a uncontrollabilityETHICS
from of when
computer for could
computerscarrying problem which
on of
utsiders as of freedom, of IN
are is which
Computer
its can as nature one's
computer the
the accessed the be
ENGINEERING
lients activiies out
betoot a sometimes
used unethical
computerthe is to the
instrument of own defraud the
can used are: some associated is
to computers software Ethics ultimategood
and from
computer
get assist where computer
to unethical
ers aact equality
into steal somneone bank Problem
theft. of is such defender
people with object
stolen
afrom unethical or
system activities. as as is
else'swhen ofthe and
made and the the of
an the
an
and em
GLOBAL 1SSUES
In these cases PROFD881ONAL ETHIC8 IN ENGINEERING
theft easier to
computers has only made the 3. Hacking
perpetuate, but
the ethical issues does not alter Hackers by which we mean that
involved.
Stealing whether by way of the minority of computer enthusiasts sometime
or simply by sitting in front of atraditional way called "crackers" who compulsively challenge
ethical computer, the
issues and law is not altered. any comnputer security system
Some carry their art to the point of
2. Invasion of privacy implanting "time bombs" or "Trojan horses"
(unwanted Codes that Copy themselves
Privacy = basic right of an individual to
Control access to and use of information about
into large programs) that will «choke
himself.
.. . networks with dead-end tasks, spew out false
information, erase files and even destroy
V Information (individuals or corporate) gained equipment.
without consent is an invasion of privacy. unauthorized
With Gaining acce_s, to
computers, protecting database, implanting false information in a
privacy has become much more
database or altering existing information and
difficult. Records have been computerized,
disseminating viriuses over the internét.
making retrieval of files much easier, it also In most cases of hacking, . hackers
makes the unauthorized retrieval. of this
simply testing and pushing their skills and
information by others easier. knowledge limits.
.