Unformatted text preview:

Computers Are Your FutureSlide 2Computer EthicsEthical PrinciplesYour School’s Code of ConductTen Commandments of Computer EthicsSlide 7NetiquetteMailing List NetiquetteE-Mail NetiquetteE-Mail Netiquette (continued)Internet Relay Chat NetiquetteComputer Games: Too Much Violence?Computer Ethics for OrganizationsWhistle-blowingComputer Ethics for Computer ProfessionalsThe ACM Code of ConductSafety FirstIt’s Not Just Unethical, It’s Illegal, TooPlagiarismSlide 21LibelSoftware PiracySoftware and CopyrightsSoftware and Copyrights (continued)Are you guilty of software piracy?File Sharing: Music, Movies, and MoreComputers Are Your Future© 2006Prentice-Hall, Inc.© 2006 Prentice-Hall, IncSlide 2Computers Are Your Future Spotlight 1 Computers Are Your FutureSpotlight 1Ethics© 2006 Prentice-Hall, IncSlide 3Computers Are Your Future Spotlight 1 Computer EthicsComputers cause new ethical problemsComputer ethics uses basic ethical principles to help you make the right decisions© 2006 Prentice-Hall, IncSlide 4Computers Are Your Future Spotlight 1 Ethical PrinciplesEthical principles are tools which are used to think through difficult situationsThree useful ethical principles:An act is ethical if, were everyone to act the same, society benefits from itAn act is ethical if people are treated as ends and not as a means to endsAn act is ethical if it is fair to all parties involved© 2006 Prentice-Hall, IncSlide 5Computers Are Your Future Spotlight 1 Your School’s Code of ConductRead acceptable use policyRespect yourselfRespect othersRespect academic integrity© 2006 Prentice-Hall, IncSlide 6Computers Are Your Future Spotlight 1 Ten Commandments of Computer Ethics1. Don't use a computer to harm other people2. Don't interfere with other people’s computer work3. Don't snoop around in other people’s files4. Don't use a computer to steal5. Don't use a computer to bear false witness© 2006 Prentice-Hall, IncSlide 7Computers Are Your Future Spotlight 1 Ten Commandments of Computer Ethics6. Don't copy or use proprietary software for which you have not paid7. Don't use other people’s computer resources without authorization or proper compensation8. Don't appropriate other people’s intellectual output9. Don’t think about the social consequences of the program you write or the system you design10. Don’t use a computer in ways that show consideration and respect for your fellow humans© 2006 Prentice-Hall, IncSlide 8Computers Are Your Future Spotlight 1 NetiquetteNetiquette refers to the guidelines that involve showing respect for others and yourself while you are online© 2006 Prentice-Hall, IncSlide 9Computers Are Your Future Spotlight 1 Mailing List NetiquetteRead the discussions for the past few days before posting questionsRead the Frequently Asked Questions (FAQs) list before posting questionsDon’t belittle people for grammatical errorsDon’t post inflammatory messagesLearn how to unsubscribe from the list© 2006 Prentice-Hall, IncSlide 10Computers Are Your Future Spotlight 1 E-Mail NetiquettePromptly respond to messagesDelete messages after you read themSpeak of others professionally and courteouslyRun your computer’s anti-virus program on any e-mail received or sent© 2006 Prentice-Hall, IncSlide 11Computers Are Your Future Spotlight 1 E-Mail Netiquette (continued)Keep the message short and to the pointDon’t type in all capital lettersSpell check your message before sending itBe careful with sarcasm and humor in your messageBe mindful of the recipient’s reaction when you request a return receipt; this feature can be annoying and intrusive© 2006 Prentice-Hall, IncSlide 12Computers Are Your Future Spotlight 1 Internet Relay Chat NetiquetteListen to the discussion for a while before joining it Learn the commonly used abbreviationsDon’t flood the channel with textDon’t harass others with unwanted invitationsBe careful if you are asked to type in a command; it may have unexpected resultsUse the ignore command when being bothered© 2006 Prentice-Hall, IncSlide 13Computers Are Your Future Spotlight 1 Computer Games: Too Much Violence?Splatter games emphasize all-out violenceSome say it increases violent behaviorOthers say it provides an outlet for violent feelings© 2006 Prentice-Hall, IncSlide 14Computers Are Your Future Spotlight 1 Computer Ethics for OrganizationsA business must protect its data from:Loss or damageMisuse or errorsUnauthorized accessBackup procedures are used to protect data from lossIt is the organization’s responsibility to ensure that its data is as complete as possibleDivulging customer data without asking permission is considered unethical behavior by privacy advocates© 2006 Prentice-Hall, IncSlide 15Computers Are Your Future Spotlight 1 Whistle-blowingWhistle-blowing refers to employees reporting their company’s dangerous or illegal acts to regulatory agencies or the pressSome laws exist to protect whistle-blowers, but many find themselves unemployed and blacklisted© 2006 Prentice-Hall, IncSlide 16Computers Are Your Future Spotlight 1 Computer Ethics for Computer ProfessionalsThe field of computer ethics specifies ethical codes for computing professionalsThe core of a computer professional’s code of ethics is to preserve and protect human life from harmCODES OF CONDUCT AND GOOD PRACTICE FOR CERTIFIED COMPUTING PROFESSIONALSThe essential elements relating to conduct that identify a professional activity are:· A high standard of skill and knowledge· A confidential relationship with people served· Public reliance upon the standards of conduct in established practice· The observance of an ethical codeExcerpt from the Code of Ethics of the Institute for Certification of Computing Professionals© 2006 Prentice-Hall, IncSlide 17Computers Are Your Future Spotlight 1 The ACM Code of ConductA computing professional:Contributes to society and human well-beingAvoids harm to othersIs honest and trustworthyIs fair and takes action not to discriminate on the basis of race, sex, religion, age, disability, or national originHonors property rights, including copyrights and patentsGives proper credit when using the intellectual property of othersRespects other individuals’ rights to privacyHonors confidentiality© 2006 Prentice-Hall, IncSlide 18Computers Are Your Future


View Full Document

WPU CS 2010 - Computer Ethics

Download Computer Ethics
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Computer Ethics and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer Ethics 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?