ten commandments of computer ethics

6
Ten Commandmen ts of Computer Ethics By: Kiana Lopez

Upload: tovi

Post on 05-Jan-2016

61 views

Category:

Documents


3 download

DESCRIPTION

Ten Commandments of Computer Ethics. By: Kiana Lopez. Ten Commandments of Computer Ethics ( 10-9). Thou shalt not snoop around in other people's files. Thou shalt not appropriate other people's intellectual output. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Ten Commandments of Computer Ethics

Ten Commandments of Computer

Ethics

By: Kiana Lopez

Page 2: Ten Commandments of Computer Ethics

Ten Commandments of Computer Ethics (10-9)

Thou shalt not snoop around in other people's files.

http://www.google.com/url?sa=i&rct=j&q=snooping&source=images&cd=&cad=rja&docid=LOmLdaxkI_ApCM&tbnid=-Jx1hMRl1TudRM:&ved=0CAQQjB0&url=http%3A%2F%2Fblog.timesunion.com%2Fkristi%2Fara-snooping-and-relationships%2F20002%2F&ei=1g9fUbT_DcvL0gGJ24DQCA&bvm=bv.44770516,d.dmQ&psig=AFQjCNGkK5NvT3O0UU2nBrswZmVvk6SiFg&ust=1365270792665910

Thou shalt not appropriate other people's intellectual output.

http://www.google.com/url?sa=i&rct=j&q=plagerism&source=images&cd=&cad=rja&docid=g4zQ7ZF467sooM&tbnid=y5XWNtB-MVH9jM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.um.edu.mt%2Fict%2FPlagiarism&ei=VBNfUbXKLtDO0QGC34C4BQ&bvm=bv.44770516,d.dmQ&psig=AFQjCNH7DHBiLv85rnzn-i7vIEiHp7SEXg&ust=1365271716614849

Page 3: Ten Commandments of Computer Ethics

Ten Commandments of Computer Ethics (8-7)

Thou shalt not interfere with other people's computer work.

Thou shalt not use other people's computer resources without

authorization.

http://www.google.com/url?sa=i&rct=j&q=stealing+information+from+computer&source=images&cd=&cad=rja&docid=gevw9ih7V64PyM&tbnid=JzGWgg4B1yNpkM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.dreamstime.com%2Fstock-photography-hacker-stealing-information-image17839872&ei=IhRfUfyTE4TB0AHpwoHQDg&bvm=bv.44770516,d.dmQ&psig=AFQjCNFYexI53e7Hv4wP_SIAXam3Rfdqng&ust=1365271892309154

http://www.google.com/imgres?q=using+computer+without+permission&hl=en&safe=active&client=safari&sa=X&rls=en&biw=1665&bih=843&tbm=isch&tbnid=xy2KEpNoS6SU8M:&imgrefurl=http://lifehacker.com/5873538/how-to-find-out-if-someones-secretly-been-using-your-computer&docid=2697JrvN_0vlDM&imgurl=http://img.gawkerassets.com/img/17n1rdm0semwmjpg/medium.jpg&w=300&h=169&ei=XhRfUbT-BYTn0QG46oCIBQ&zoom=1&ved=1t:3588,r:47,s:0,i:234&iact=rc&dur=311&page=2&tbnh=135&tbnw=240&start=28&ndsp=43&tx=52&ty=32

Page 4: Ten Commandments of Computer Ethics

Ten Commandments of Computer Ethics (6-5)

Thou shalt not use a computer to bear false witness.

Thou shalt think about the social consequences of the

program you write.

http://www.google.com/url?sa=i&rct=j&q=rumors+on+computer&source=images&cd=&cad=rja&docid=gSVw3nzVGWaVSM&tbnid=FaIlISYTZHhz6M:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.capmac.org%2Fiphonesig%2F%3Fm%3D201001%26paged%3D2&ei=cBJfUf2aFMqU0QGV9oGIDw&bvm=bv.44770516,d.dmQ&psig=AFQjCNFmWDCaaJyBvgFOLw0d5g39Cv8heA&ust=1365271515075808

http://www.google.com/url?sa=i&rct=j&q=thinking&source=images&cd=&cad=rja&docid=qZvITRJB4QiTnM&tbnid=1XaGns6XftjipM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.schoolofthinking.org%2Fwho%2Fabout%2Ftraining%2F10-dfq%2Fwho%2Fwho-dr-michael-hewitt-gleeson%2F59-second-course-in-thinking%2Fe-s-t-or-escape-search-think%2F&ei=1hJfUcHLOebr0gH1vYGgCQ&bvm=bv.44770516,d.dmQ&psig=AFQjCNH6Zp298SYfn-4LtpgBWRKpUuVFtQ&ust=1365271617812475

Should I write this?

Page 5: Ten Commandments of Computer Ethics

Ten Commandments of Computer Ethics (4-3)

Thou shalt not use or copy software for which you

have not paid.

Thou shalt not use a computer to steal.

http://www.google.com/url?sa=i&rct=j&q=copy+&source=images&cd=&cad=rja&docid=o6vqMe8hWT_-hM&tbnid=h4Dv2WLmpAivtM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.pinoyglobalnetwork.com%2FBurningDatatoCD.aspx&ei=7hFfUa_JFKrK0gG2nIGYDw&bvm=bv.44770516,d.dmQ&psig=AFQjCNFrgdxIensmnjejop6anKNDIWTPNQ&ust=1365271327295369

http://www.google.com/url?sa=i&rct=j&q=stealing+information+from+computer&source=images&cd=&cad=rja&docid=cPITeQEPwdCiVM&tbnid=bxsgVxgdeJAuwM:&ved=0CAQQjB0&url=http%3A%2F%2Fdepositphotos.com%2F12945215%2Fstock-photo-Computer-Hacker-stealing-information-from-a-laptop-isolated-ove.html&ei=MxJfUaytL4uP0QHrqoDwCg&bvm=bv.44770516,d.dmQ&psig=AFQjCNH5wCQB1eZkwfS9otVeSjuz5eMonQ&ust=1365271442373005

Page 6: Ten Commandments of Computer Ethics

Ten Commandments of Computer Ethics (2-1)

Thou shalt not use a computer to harm other people.

http://www.google.com/url?sa=i&rct=j&q=cyberbullying&source=images&cd=&cad=rja&docid=50GJ4KlyK-TtNM&tbnid=QKLPfId29IL9KM:&ved=0CAQQjB0&url=https%3A%2F%2Fblog.sgrouples.com%2Fwhat-is-cyberbulling%2F&ei=shBfUdaFIo7V0gG-roDgAQ&bvm=bv.44770516,d.dmQ&psig=AFQjCNFO1dw1CNsguOVXwUWSFj0kSFdflA&ust=1365271067335598

Thou shalt use a computer in ways that show

consideration and respect.

http://www.google.com/url?sa=i&rct=j&q=using+computer+properly&source=images&cd=&cad=rja&docid=C_fcCLZRFG50wM&tbnid=ZWSaYFl6e_7cgM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.hostingreviews.com%2Fcomputer-skills-101-online-resource-guide%2F&ei=EhFfUfblCoa90AG-m4DABA&bvm=bv.44770516,d.dmQ&psig=AFQjCNHqEYnOt9-F8Cr5AQ0f3Z5Y1XT9wg&ust=1365271136150217