Transcript Document

 Ethics
 Demonstrate legal and ethical practices when
completing projects/schoolwork
Ethics - placing a value on acts
according to whether they are
good or bad.
 10 Commandments as defined by
the Computer Ethics Institute
1. Thou shalt not harm other people.
It’s bad to destroy or steal someone’s
books and notebooks.
It’s equally bad to access and destroy
their files.
Ethics 10 Commandments
2. Thou shalt not interfere with other people’s
computer work.
Generating or consciously spreading computer viruses
is unethical.
Ethics 10 Commandments
 3. Thou shalt not snoop around in other
people’s files.
 Reading other people’s e-mails on their computers is as bad
as opening and reading their letters.
 Obtaining other people’s non-public files is like breaking into
their rooms and stealing their documents.
Ethics 10 Commandments
 4. Thou shalt not use a computer to steal.
 Using a computer to break into the accounts of a company
or a bank and transferring money is the same as robbery.
Ethics 10 Commandments
 5. Thou shalt not use a computer to bear false
witness.
 Spreading false rumors about a person or false propaganda
about historical events is wrong.
Ethics 10 Commandments
 6. Thou shalt not use or copy software for which you
have not paid.
 Software is an intellectual product.
 Obtaining illegal copies of copyrighted software is against
the law, just like photocopying a copyrighted book is illegal.
 Obtaining other people’s non-public files is like breaking into
their rooms and stealing their documents.
Ethics 10 Commandments
 7. Thou shalt not use other people’s computer
resources without authorization.
 Multiuser systems use user id’s and passwords to safeguard
information.
 Hacking a system to break and bypass the authorization is
unethical.
Ethics 10 Commandments
 8. Thou shalt not appropriate other people’s
intellectual output.
 Copying somebody else’s program without proper
authorization is software piracy and is unethical.
 Intellectual property is a form of ownership and may be
protected by copyright laws.
Ethics 10 Commandments
 9. Thou shalt think about the social consequences of
the program you write.
 Don’t produce anything that could be harmful to someone.
Ethics 10 Commandments
 10. Thou shalt use a computer in ways that show
consideration and respect.
 The fact that you cannot see the people you are interacting
with on the Internet does mean that you can be rude to
them.
References One
 http://www.efuse.com/Plan/copyright2.html#reallife
 http://www.templetons.com/brad/copymyths.html
 http://www.wipo.int/about-ip/en/
 http://www.copyright.gov/title17/92chap12.html#1204
 http://www.efuse.com/Plan/copyright.html
 http://answers.findlaw.com/abaflg/flg-10-4a-1.html
 http://www.washingtonpost.com
 http://otel.uis.edu
References Two
http://www.thestar.com/News/Canada/article/442126
http://fairuse.stanford.edu/Copyright_and_Fair_Use_Overvi
ew/
http://www.ibls.com/internet_law_news_portal_view
http://www.medialawyer.com/lec-copy.htm
http://www.dynamicwebs.com.au/tutorials/copying.htm
http://www.answers.com/topic/plagiarism
http://www.wipo.int
Image Citations One
•http://www.d.umn.edu/~jvileta/images/
•http://www.geoffreyleaver.com/articles/
•http://www.vavros.wz.cz
•http://www.mitpress.mit.edu
•http://usinfo.state.gov/products/pubs/intelprp/
•http://www-scf.usc.edu
•http://www.media-awareness.ca
•http://www.flickr.com
•http://www.watta.co.th
•http://www.technewsworld.com
•www.centerforsocialmedia.org
Image Citations Two
•http://www.toggle.org
•Htt://home.hawaii.rr.com
•http://domain.newmethoddecor.com
•http://www.flickr.com
•http://www.storyboardtoys.com
•http://www.sillyjokes.co.uk
•http://www.discountgolfshoes.com/
•http://www.lugarus.com/music/12
•http://www.greencrazy.com
•http://www.page.auctions.yahoo.com
•http://www.tax-consultants-international.com