SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Ten Commandments of Computer Ethics
The Ten Commandments of Computer Ethics were
created in 1992 by the Computer Ethics Institute. The
commandments were introduced in the paper “In Pursuit
of a 'Ten Commandments’ for Computer Ethics” by Ra-
mon C. Barquin as a means to create “a set of standards to
guide and instruct people in the ethical use of computers.”
[1]
The Ten Commandments of Computer Ethics copies
the style of the Ten Commandments from The Bible and
uses the archaic “thou shalt” and “thou shalt not” found
in the King James version.
The commandments have been widely quoted in com-
puter ethics literature [2]
but also have been criticized by
both the hacker community [3]
and some in academia. For
instance, Dr. Ben Fairweather of the “Centre for Com-
puting and Social Responsibility” has described them as
“simplistic” and overly restrictive.[4]
The CISSP — an organization of computer security pro-
fessionals — has used the commandments as a foundation
for its own ethics rules.[5]
1 The Ten Commandments
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s com-
puter work.
3. Thou shalt not snoop around in other people’s com-
puter files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not copy or use proprietary software for
which you have not paid.
7. Thou shalt not use other people’s computer re-
sources without authorization or proper compensa-
tion.
8. Thou shalt not appropriate other people’s intellectual
output.
9. Thou shalt think about the social consequences of
the program you are writing or the system you are
designing.
10. Thou shalt always use a computer in ways that ensure
consideration and respect for your fellow humans.
[Sic. The confusion of “thou” and
“you” is in the original.[6]
]
2 The Ten Commandments
1. Do not use a computer to harm others
2. Do not interfere with other people’s computer work.
3. Do not snoop around in other people’s computer
files.
4. Do not use a computer to steal.
5. Do not use a computer to bear false witness
6. Do not copy or use proprietary software for which
you have not paid.
7. Do not use other people’s computer resources with-
out authorization or proper compensation.
8. Do not appropriate other people’s intellectual out-
put.
9. Do think about the social consequences of the pro-
gram you are writing or the system you are design-
ing.
10. Do always use a computer in ways that ensure con-
sideration and respect for your fellow humans.
2.1 Exegesis
• Commandment 1
Simply put: Do not use the computer in
ways that may harm other people.
Explanation: This commandment says
that it is unethical to use a computer
to harm another user. It is not limited
to physical injury. It includes harming
or corrupting other users’ data or files.
The commandment states that it is wrong
to use a computer to steal someone’s
personal information. Manipulating or
destroying files of other users is ethi-
cally wrong. It is unethical to write pro-
grams, which on execution lead to steal-
ing, copying or gaining unauthorized ac-
cess to other users’ data. Being in-
volved in practices like hacking, spam-
ming, phishing or cyber bullying does
not conform to computer ethics.
• Commandment 2
1
2 2 THE TEN COMMANDMENTS
Simply put: Do not use computer tech-
nology to cause interference in other
users’ work.
Explanation: Computer software can be
used in ways that disturb other users or
disrupt their work. Viruses, for exam-
ple, are programs meant to harm use-
ful computer programs or interfere with
the normal functioning of a computer.
Malicious software can disrupt the func-
tioning of computers in more ways than
one. It may overload computer memory
through excessive consumption of com-
puter resources, thus slowing its func-
tioning. It may cause a computer to func-
tion wrongly or even stop working. Us-
ing malicious software to attack a com-
puter is unethical.
• Commandment 3
Simply put: Do not spy on another per-
son’s computer data.
Explanation: We know it is wrong to
read someone’s personal letters. On the
same lines, it is wrong to read some-
one else’s email messages or files. Ob-
taining data from another person’s pri-
vate files is nothing less than breaking
into someone’s room. Snooping around
in another person’s files or reading some-
one else’s personal messages is the inva-
sion of his privacy. There are exceptions
to this. For example, spying is necessary
and cannot be called unethical when it is
done against illegitimate use of comput-
ers. For example, intelligence agencies
working on cybercrime cases need to spy
on the internet activity of suspects.
• Commandment 4
Simply put: Do not use computer tech-
nology to steal information.
Explanation: Stealing sensitive informa-
tion or leaking confidential information
is as good as robbery. It is wrong to
acquire personal information of employ-
ees from an employee database or patient
history from a hospital database or other
such information that is meant to be con-
fidential. Similarly, breaking into a bank
account to collect information about the
account or account holder is wrong. Ille-
gal electronic transfer of funds is a type
of fraud. With the use of technology,
stealing of information is much easier.
Computers can be used to store stolen in-
formation.
• Commandment 5
Simply put: Do not contribute to the
spread of misinformation using com-
puter technology.
Explanation: Spread of information has
become viral today, because of the In-
ternet. This also means that false news
or rumors can spread speedily through
social networking sites or emails. Be-
ing involved in the circulation of incor-
rect information is unethical. Mails and
pop-ups are commonly used to spread
the wrong information or give false alerts
with the only intent of selling products.
Mails from untrusted sources advertis-
ing certain products or spreading some
hard-to-believe information, are not un-
common. Direct or indirect involvement
in the circulation of false information is
ethically wrong.
• Commandment 6
Simply put: Refrain from copying soft-
ware or buying pirated copies. Pay for
software unless it is free.
Explanation: Like any other artistic or
literary work, software is copyrighted. A
piece of code is the original work of the
individual who created it. It is copy-
righted in his name. In case of a devel-
oper writing software for the organiza-
tion he works for, the organization holds
the copyright for it. Copyright holds true
unless its creators announce it is not. Ob-
taining illegal copies of copyrighted soft-
ware is unethical.
• Commandment 7
Simply put: Do not use someone else’s
computer resources unless authorized to.
Explanation: Multi-user systems have
user specific passwords. Breaking into
some other user’s password, thus intrud-
ing his private space is unethical. It is
not ethical to hack passwords for gain-
ing unauthorized access to a password-
protected computer system. Accessing
data that you are not authorized to ac-
cess or gaining access to another user’s
computer without his permission is not
ethical.
• Commandment 8
Simply put: It is wrong to claim own-
ership on a work which is the output of
someone else’s intellect.
3
Explanation: Programs developed by
a software developer are his/her prop-
erty. If he is working with an organi-
zation, they are the organization’s prop-
erty. Copying them and propagating
them in one’s own name is unethical.
This applies to any creative work, pro-
gram or design. Establishing ownership
on a work which is not yours is ethically
wrong.
• Commandment 9
Simply put: Before developing a soft-
ware, think about the social impact it can
have.
Explanation: Looking at the social con-
sequences that a program can have, de-
scribes a broader perspective of look-
ing at technology. A computer soft-
ware on release, reaches millions. Soft-
ware like video games and animations
or educational software can have a so-
cial impact on their users. When work-
ing on animation films or designing video
games, for example, it is the program-
mer’s responsibility to understand his
target audience/users and the effect it
may have on them. For example, a
computer game for kids should not have
content that can influence them nega-
tively. Similarly, writing malicious soft-
ware is ethically wrong. A software
developer/development firm should con-
sider the influence their code can have on
the society at large.
• Commandment 10
Simply put: In using computers for com-
munication, be respectful and courteous
with the fellow members.
Explanation: The communication eti-
quette we follow in the real world ap-
plies to communication over computers
as well. While communicating over the
Internet, one should treat others with re-
spect. One should not intrude others’ pri-
vate space, use abusive language, make
false statements or pass irresponsible re-
marks about others. One should be cour-
teous while communicating over the web
and should respect others’ time and re-
sources. Also, one should be considerate
with a novice computer user.
3 References
[1] Barquin, Ramon C. (May 7, 1992). “In pursuit of 'Ten
Commandments’ for Computer Ethics”. Computer Ethics
Institute. Retrieved 2013-08-17.
[2] Kathy Fitzpatrick, Carolyn Bronstein (2006). Ethics in
Public Relations: Responsible Advocacy. Sage Publica-
tions. p. 116. ISBN 1-4129-1798-0.
[3] Computer Ethics - Lecture 10
[4] CCSR:Commentary on the 'Ten Commandments for
Computer Ethics’
[5] Official (ISC)2 Guide to the CISSP CBK
[6] “The Ten Commandments of Computer Ethics” (PDF).
Retrieved 2012-05-22.
4 External links
• The Ten Commandments of Computer Ethics listed
at Computer Professionals for Social Responsibility
• The Computer Ethics Institute
• Centre for Computing and Social Responsibility
4 5 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES
5 Text and image sources, contributors, and licenses
5.1 Text
• Ten Commandments of Computer Ethics Source: http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics?oldid=
661090539 Contributors: Dcljr, Ijon, DavidCary, Smalljim, Wtmitchell, Sburke, Macaddct1984, Bgwhite, Rsrikanth05, Malcolma, Moe
Epsilon, SmackBot, Jab843, Xaosflux, Gilliam, Hmains, Bluebot, Wizardman, Noah Salzman, CmdrObot, Cydebot, TicketMan, Marsh-
Bot, Rporter-Awilkie, Barek, Anaxial, J.delanoy, KylieTastic, Philip Trueman, Id4abel, Falcon8765, Yintan, Mikazo, Bentogoa, Flyer22,
Allmightyduck, Boreduntil, ClueBot, Rjd0060, Jusdafax, Tarogato, Roberto Mura, Editor2020, DumZiBoT, Enciklo, Plushpower, Addbot,
TheFreeloader, Tide rolls, Yobot, Fraggle81, DemocraticLuntz, Jim1138, Materialscientist, Citation bot, NFD9001, AbigailAbernathy,
JMS Old Al, 9K58 Smerch, I dream of horses, Elockid, Reach Out to the Truth, Super48paul, Minimac’s Clone, Shuipzv3, A930913, L
Kensington, RayneVanDunem, 28bot, ClueBot NG, Gareth Griffith-Jones, Widr, Helpful Pixie Bot, Frze, The Determinator, Teammm,
Pratyya Ghosh, Sanjudutta2006, Suga97, Frosty, Vanamonde93, Eyesnore, Jodosma, JaconaFrere, NQ, LesVegas, Isonison, Neversay-
die123, JOSE Cherian123 and Anonymous: 138
5.2 Images
5.3 Content license
• Creative Commons Attribution-Share Alike 3.0

Weitere ähnliche Inhalte

Andere mochten auch (7)

Math for 800 10 lines, angles and triangles
Math for 800   10 lines, angles and trianglesMath for 800   10 lines, angles and triangles
Math for 800 10 lines, angles and triangles
 
Manners – computer etiquetteamg
Manners – computer etiquetteamgManners – computer etiquetteamg
Manners – computer etiquetteamg
 
Presentation skills workshop
Presentation skills workshopPresentation skills workshop
Presentation skills workshop
 
10 Rules of Netiquette
10 Rules of Netiquette10 Rules of Netiquette
10 Rules of Netiquette
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 

Mehr von Mai Ngoc Duc (18)

Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
Warren buffett-and-the-interpretation-of-financial-statements-buffett-en-10948
 
Tony buzan use your head
Tony buzan use your headTony buzan use your head
Tony buzan use your head
 
Tony buzan mind maps and making notes
Tony buzan   mind maps and making notesTony buzan   mind maps and making notes
Tony buzan mind maps and making notes
 
Theoretical ecology
Theoretical ecologyTheoretical ecology
Theoretical ecology
 
The equity premium a puzzle
The equity premium a puzzleThe equity premium a puzzle
The equity premium a puzzle
 
Strategic thinking
Strategic thinkingStrategic thinking
Strategic thinking
 
Technology stack
Technology stackTechnology stack
Technology stack
 
Statistical significance
Statistical significanceStatistical significance
Statistical significance
 
Standard deviation
Standard deviationStandard deviation
Standard deviation
 
Lenovo
LenovoLenovo
Lenovo
 
Dell1 1
Dell1 1Dell1 1
Dell1 1
 
Dell1
Dell1Dell1
Dell1
 
Lenovo
LenovoLenovo
Lenovo
 
Ukessays.com marketing mix analysis for dell
Ukessays.com marketing mix analysis for dellUkessays.com marketing mix analysis for dell
Ukessays.com marketing mix analysis for dell
 
Ukessays.com analysis of dell in macro environment
Ukessays.com analysis of dell in macro environmentUkessays.com analysis of dell in macro environment
Ukessays.com analysis of dell in macro environment
 
Ukessays.com the outsourcing fundamentals for dell computers
Ukessays.com the outsourcing fundamentals for dell computersUkessays.com the outsourcing fundamentals for dell computers
Ukessays.com the outsourcing fundamentals for dell computers
 
Financial ratios
Financial ratiosFinancial ratios
Financial ratios
 
Dell 7734
Dell 7734Dell 7734
Dell 7734
 

Kürzlich hochgeladen

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
laloo_007
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Kürzlich hochgeladen (20)

Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Ten commandments of computer ethics

  • 1. Ten Commandments of Computer Ethics The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The commandments were introduced in the paper “In Pursuit of a 'Ten Commandments’ for Computer Ethics” by Ra- mon C. Barquin as a means to create “a set of standards to guide and instruct people in the ethical use of computers.” [1] The Ten Commandments of Computer Ethics copies the style of the Ten Commandments from The Bible and uses the archaic “thou shalt” and “thou shalt not” found in the King James version. The commandments have been widely quoted in com- puter ethics literature [2] but also have been criticized by both the hacker community [3] and some in academia. For instance, Dr. Ben Fairweather of the “Centre for Com- puting and Social Responsibility” has described them as “simplistic” and overly restrictive.[4] The CISSP — an organization of computer security pro- fessionals — has used the commandments as a foundation for its own ethics rules.[5] 1 The Ten Commandments 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s com- puter work. 3. Thou shalt not snoop around in other people’s com- puter files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people’s computer re- sources without authorization or proper compensa- tion. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. [Sic. The confusion of “thou” and “you” is in the original.[6] ] 2 The Ten Commandments 1. Do not use a computer to harm others 2. Do not interfere with other people’s computer work. 3. Do not snoop around in other people’s computer files. 4. Do not use a computer to steal. 5. Do not use a computer to bear false witness 6. Do not copy or use proprietary software for which you have not paid. 7. Do not use other people’s computer resources with- out authorization or proper compensation. 8. Do not appropriate other people’s intellectual out- put. 9. Do think about the social consequences of the pro- gram you are writing or the system you are design- ing. 10. Do always use a computer in ways that ensure con- sideration and respect for your fellow humans. 2.1 Exegesis • Commandment 1 Simply put: Do not use the computer in ways that may harm other people. Explanation: This commandment says that it is unethical to use a computer to harm another user. It is not limited to physical injury. It includes harming or corrupting other users’ data or files. The commandment states that it is wrong to use a computer to steal someone’s personal information. Manipulating or destroying files of other users is ethi- cally wrong. It is unethical to write pro- grams, which on execution lead to steal- ing, copying or gaining unauthorized ac- cess to other users’ data. Being in- volved in practices like hacking, spam- ming, phishing or cyber bullying does not conform to computer ethics. • Commandment 2 1
  • 2. 2 2 THE TEN COMMANDMENTS Simply put: Do not use computer tech- nology to cause interference in other users’ work. Explanation: Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for exam- ple, are programs meant to harm use- ful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the func- tioning of computers in more ways than one. It may overload computer memory through excessive consumption of com- puter resources, thus slowing its func- tioning. It may cause a computer to func- tion wrongly or even stop working. Us- ing malicious software to attack a com- puter is unethical. • Commandment 3 Simply put: Do not spy on another per- son’s computer data. Explanation: We know it is wrong to read someone’s personal letters. On the same lines, it is wrong to read some- one else’s email messages or files. Ob- taining data from another person’s pri- vate files is nothing less than breaking into someone’s room. Snooping around in another person’s files or reading some- one else’s personal messages is the inva- sion of his privacy. There are exceptions to this. For example, spying is necessary and cannot be called unethical when it is done against illegitimate use of comput- ers. For example, intelligence agencies working on cybercrime cases need to spy on the internet activity of suspects. • Commandment 4 Simply put: Do not use computer tech- nology to steal information. Explanation: Stealing sensitive informa- tion or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employ- ees from an employee database or patient history from a hospital database or other such information that is meant to be con- fidential. Similarly, breaking into a bank account to collect information about the account or account holder is wrong. Ille- gal electronic transfer of funds is a type of fraud. With the use of technology, stealing of information is much easier. Computers can be used to store stolen in- formation. • Commandment 5 Simply put: Do not contribute to the spread of misinformation using com- puter technology. Explanation: Spread of information has become viral today, because of the In- ternet. This also means that false news or rumors can spread speedily through social networking sites or emails. Be- ing involved in the circulation of incor- rect information is unethical. Mails and pop-ups are commonly used to spread the wrong information or give false alerts with the only intent of selling products. Mails from untrusted sources advertis- ing certain products or spreading some hard-to-believe information, are not un- common. Direct or indirect involvement in the circulation of false information is ethically wrong. • Commandment 6 Simply put: Refrain from copying soft- ware or buying pirated copies. Pay for software unless it is free. Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copy- righted in his name. In case of a devel- oper writing software for the organiza- tion he works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not. Ob- taining illegal copies of copyrighted soft- ware is unethical. • Commandment 7 Simply put: Do not use someone else’s computer resources unless authorized to. Explanation: Multi-user systems have user specific passwords. Breaking into some other user’s password, thus intrud- ing his private space is unethical. It is not ethical to hack passwords for gain- ing unauthorized access to a password- protected computer system. Accessing data that you are not authorized to ac- cess or gaining access to another user’s computer without his permission is not ethical. • Commandment 8 Simply put: It is wrong to claim own- ership on a work which is the output of someone else’s intellect.
  • 3. 3 Explanation: Programs developed by a software developer are his/her prop- erty. If he is working with an organi- zation, they are the organization’s prop- erty. Copying them and propagating them in one’s own name is unethical. This applies to any creative work, pro- gram or design. Establishing ownership on a work which is not yours is ethically wrong. • Commandment 9 Simply put: Before developing a soft- ware, think about the social impact it can have. Explanation: Looking at the social con- sequences that a program can have, de- scribes a broader perspective of look- ing at technology. A computer soft- ware on release, reaches millions. Soft- ware like video games and animations or educational software can have a so- cial impact on their users. When work- ing on animation films or designing video games, for example, it is the program- mer’s responsibility to understand his target audience/users and the effect it may have on them. For example, a computer game for kids should not have content that can influence them nega- tively. Similarly, writing malicious soft- ware is ethically wrong. A software developer/development firm should con- sider the influence their code can have on the society at large. • Commandment 10 Simply put: In using computers for com- munication, be respectful and courteous with the fellow members. Explanation: The communication eti- quette we follow in the real world ap- plies to communication over computers as well. While communicating over the Internet, one should treat others with re- spect. One should not intrude others’ pri- vate space, use abusive language, make false statements or pass irresponsible re- marks about others. One should be cour- teous while communicating over the web and should respect others’ time and re- sources. Also, one should be considerate with a novice computer user. 3 References [1] Barquin, Ramon C. (May 7, 1992). “In pursuit of 'Ten Commandments’ for Computer Ethics”. Computer Ethics Institute. Retrieved 2013-08-17. [2] Kathy Fitzpatrick, Carolyn Bronstein (2006). Ethics in Public Relations: Responsible Advocacy. Sage Publica- tions. p. 116. ISBN 1-4129-1798-0. [3] Computer Ethics - Lecture 10 [4] CCSR:Commentary on the 'Ten Commandments for Computer Ethics’ [5] Official (ISC)2 Guide to the CISSP CBK [6] “The Ten Commandments of Computer Ethics” (PDF). Retrieved 2012-05-22. 4 External links • The Ten Commandments of Computer Ethics listed at Computer Professionals for Social Responsibility • The Computer Ethics Institute • Centre for Computing and Social Responsibility
  • 4. 4 5 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES 5 Text and image sources, contributors, and licenses 5.1 Text • Ten Commandments of Computer Ethics Source: http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics?oldid= 661090539 Contributors: Dcljr, Ijon, DavidCary, Smalljim, Wtmitchell, Sburke, Macaddct1984, Bgwhite, Rsrikanth05, Malcolma, Moe Epsilon, SmackBot, Jab843, Xaosflux, Gilliam, Hmains, Bluebot, Wizardman, Noah Salzman, CmdrObot, Cydebot, TicketMan, Marsh- Bot, Rporter-Awilkie, Barek, Anaxial, J.delanoy, KylieTastic, Philip Trueman, Id4abel, Falcon8765, Yintan, Mikazo, Bentogoa, Flyer22, Allmightyduck, Boreduntil, ClueBot, Rjd0060, Jusdafax, Tarogato, Roberto Mura, Editor2020, DumZiBoT, Enciklo, Plushpower, Addbot, TheFreeloader, Tide rolls, Yobot, Fraggle81, DemocraticLuntz, Jim1138, Materialscientist, Citation bot, NFD9001, AbigailAbernathy, JMS Old Al, 9K58 Smerch, I dream of horses, Elockid, Reach Out to the Truth, Super48paul, Minimac’s Clone, Shuipzv3, A930913, L Kensington, RayneVanDunem, 28bot, ClueBot NG, Gareth Griffith-Jones, Widr, Helpful Pixie Bot, Frze, The Determinator, Teammm, Pratyya Ghosh, Sanjudutta2006, Suga97, Frosty, Vanamonde93, Eyesnore, Jodosma, JaconaFrere, NQ, LesVegas, Isonison, Neversay- die123, JOSE Cherian123 and Anonymous: 138 5.2 Images 5.3 Content license • Creative Commons Attribution-Share Alike 3.0