Computers Are Your FutureSlide 2Computer EthicsEthical PrinciplesYour School’s Code of ConductTen Commandments of Computer EthicsSlide 7NetiquetteMailing List NetiquetteE-Mail NetiquetteE-Mail Netiquette (continued)Internet Relay Chat NetiquetteComputer Games: Too Much Violence?Computer Ethics for OrganizationsWhistle-blowingComputer Ethics for Computer ProfessionalsThe ACM Code of ConductSafety FirstIt’s Not Just Unethical, It’s Illegal, TooPlagiarismSlide 21LibelSoftware PiracySoftware and CopyrightsSoftware and Copyrights (continued)Are you guilty of software piracy?File Sharing: Music, Movies, and MoreComputers Are Your Future© 2006Prentice-Hall, Inc.© 2006 Prentice-Hall, IncSlide 2Computers Are Your Future Spotlight 1 Computers Are Your FutureSpotlight 1Ethics© 2006 Prentice-Hall, IncSlide 3Computers Are Your Future Spotlight 1 Computer EthicsComputers cause new ethical problemsComputer ethics uses basic ethical principles to help you make the right decisions© 2006 Prentice-Hall, IncSlide 4Computers Are Your Future Spotlight 1 Ethical PrinciplesEthical principles are tools which are used to think through difficult situationsThree useful ethical principles:An act is ethical if, were everyone to act the same, society benefits from itAn act is ethical if people are treated as ends and not as a means to endsAn act is ethical if it is fair to all parties involved© 2006 Prentice-Hall, IncSlide 5Computers Are Your Future Spotlight 1 Your School’s Code of ConductRead acceptable use policyRespect yourselfRespect othersRespect academic integrity© 2006 Prentice-Hall, IncSlide 6Computers Are Your Future Spotlight 1 Ten Commandments of Computer Ethics1. Don't use a computer to harm other people2. Don't interfere with other people’s computer work3. Don't snoop around in other people’s files4. Don't use a computer to steal5. Don't use a computer to bear false witness© 2006 Prentice-Hall, IncSlide 7Computers Are Your Future Spotlight 1 Ten Commandments of Computer Ethics6. Don't copy or use proprietary software for which you have not paid7. Don't use other people’s computer resources without authorization or proper compensation8. Don't appropriate other people’s intellectual output9. Don’t think about the social consequences of the program you write or the system you design10. Don’t use a computer in ways that show consideration and respect for your fellow humans© 2006 Prentice-Hall, IncSlide 8Computers Are Your Future Spotlight 1 NetiquetteNetiquette refers to the guidelines that involve showing respect for others and yourself while you are online© 2006 Prentice-Hall, IncSlide 9Computers Are Your Future Spotlight 1 Mailing List NetiquetteRead the discussions for the past few days before posting questionsRead the Frequently Asked Questions (FAQs) list before posting questionsDon’t belittle people for grammatical errorsDon’t post inflammatory messagesLearn how to unsubscribe from the list© 2006 Prentice-Hall, IncSlide 10Computers Are Your Future Spotlight 1 E-Mail NetiquettePromptly respond to messagesDelete messages after you read themSpeak of others professionally and courteouslyRun your computer’s anti-virus program on any e-mail received or sent© 2006 Prentice-Hall, IncSlide 11Computers Are Your Future Spotlight 1 E-Mail Netiquette (continued)Keep the message short and to the pointDon’t type in all capital lettersSpell check your message before sending itBe careful with sarcasm and humor in your messageBe mindful of the recipient’s reaction when you request a return receipt; this feature can be annoying and intrusive© 2006 Prentice-Hall, IncSlide 12Computers Are Your Future Spotlight 1 Internet Relay Chat NetiquetteListen to the discussion for a while before joining it Learn the commonly used abbreviationsDon’t flood the channel with textDon’t harass others with unwanted invitationsBe careful if you are asked to type in a command; it may have unexpected resultsUse the ignore command when being bothered© 2006 Prentice-Hall, IncSlide 13Computers Are Your Future Spotlight 1 Computer Games: Too Much Violence?Splatter games emphasize all-out violenceSome say it increases violent behaviorOthers say it provides an outlet for violent feelings© 2006 Prentice-Hall, IncSlide 14Computers Are Your Future Spotlight 1 Computer Ethics for OrganizationsA business must protect its data from:Loss or damageMisuse or errorsUnauthorized accessBackup procedures are used to protect data from lossIt is the organization’s responsibility to ensure that its data is as complete as possibleDivulging customer data without asking permission is considered unethical behavior by privacy advocates© 2006 Prentice-Hall, IncSlide 15Computers Are Your Future Spotlight 1 Whistle-blowingWhistle-blowing refers to employees reporting their company’s dangerous or illegal acts to regulatory agencies or the pressSome laws exist to protect whistle-blowers, but many find themselves unemployed and blacklisted© 2006 Prentice-Hall, IncSlide 16Computers Are Your Future Spotlight 1 Computer Ethics for Computer ProfessionalsThe field of computer ethics specifies ethical codes for computing professionalsThe core of a computer professional’s code of ethics is to preserve and protect human life from harmCODES OF CONDUCT AND GOOD PRACTICE FOR CERTIFIED COMPUTING PROFESSIONALSThe essential elements relating to conduct that identify a professional activity are:· A high standard of skill and knowledge· A confidential relationship with people served· Public reliance upon the standards of conduct in established practice· The observance of an ethical codeExcerpt from the Code of Ethics of the Institute for Certification of Computing Professionals© 2006 Prentice-Hall, IncSlide 17Computers Are Your Future Spotlight 1 The ACM Code of ConductA computing professional:Contributes to society and human well-beingAvoids harm to othersIs honest and trustworthyIs fair and takes action not to discriminate on the basis of race, sex, religion, age, disability, or national originHonors property rights, including copyrights and patentsGives proper credit when using the intellectual property of othersRespects other individuals’ rights to privacyHonors confidentiality© 2006 Prentice-Hall, IncSlide 18Computers Are Your Future
View Full Document