Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.
~ E ‘_P_MENTS or
 PUTER ETHICS w/ 

  EXAMPLES
‘L ‘J’}o]“t0 U SHALT NOT USE A
L UTER TO HARM
  0 .  *”EaR PEOPLE. 

ning tag order to hack
ersonal information and

_ exp...
THOU SHALT NOT

W 5K. 

q.  Deleting friend's essay
.  ument and saying i was just
‘ " playing.
‘f}J: )l| l SHALT NOT SNOOP
  T ND IN OTHER
P.  :O‘PL it-S COMPUTER

Fmss. 

. . Look for students‘ grades

1. fomqche tea...
Wt F--‘K E . r'%~rr  W” . .  . «,-f%. __ g
4. l H «.2  es la El  «-2 I ll  [C  

  ll/ l’    E  7‘?     .  ll- . 
- Taking...
$

5. T  

if  ' U  H .9» l T"   T" U  F 
   

‘-J  r’-E’

  E       E
 l T  E   . -

— Posting something like "He or

she...
6       mrll“ :  7' T   | -rm-r    

,4  ‘  [ I"  ' “' I-.343!‘

    E      
  F Tl/ ll‘    E E    H l +‘l7.';1 lml”
 F   ...
HOU SHALT NOT USE
.9‘Ji}jE;53  EOPLE'S COMPUTER
"  l RCES WITHOUT
A1lTHRlZ«ATu_)N OR PROPER

C COMPENSATION. 
Using site's...
8 T’ H «>’: ::   H  A l. .'T   T’
 .  T3  E  P  f   E  T” H E 
P E   li- E  ll  T E l. . l.  E  li
  F U" "T. 
- Posting N...
THOU SHALT THINK
 OUT THE SOCIAL
_Q_Ns«E—ggENcEs OF THE
PROGRAM YOU ARE
xv RITING oR THE SYSTEM
 You ARE DESIGNING. 
_ I-‘...
«Io.  T-HOU SHALT ALWAYS
 COMPUTER IN WAYS
THATINSURE
COSNSIDERATION AND
REsPEc'i"*I= oR YOUR

ht —*FELLOW HUMANS. 

 '- ‘...
Nächste SlideShare
Wird geladen in …5
×

10 commandments of computer ethics with example

Compilation from some blogs.
http://settingupourindividualblogs.blogspot.com/2012/02/example-of-ten-commandments-of-computer.html

  • Loggen Sie sich ein, um Kommentare anzuzeigen.

10 commandments of computer ethics with example

  1. 1. ~ E ‘_P_MENTS or PUTER ETHICS w/ EXAMPLES
  2. 2. ‘L ‘J’}o]“t0 U SHALT NOT USE A L UTER TO HARM 0 . *”EaR PEOPLE. ning tag order to hack ersonal information and _ exposing to the others.
  3. 3. THOU SHALT NOT W 5K. q. Deleting friend's essay . ument and saying i was just ‘ " playing.
  4. 4. ‘f}J: )l| l SHALT NOT SNOOP T ND IN OTHER P. :O‘PL it-S COMPUTER Fmss. . . Look for students‘ grades 1. fomqche teachers’ computers.
  5. 5. Wt F--‘K E . r'%~rr W” . . . «,-f%. __ g 4. l H «.2 es la El «-2 I ll [C ll/ l’ E 7‘? . ll- . - Taking someone's personal information or idea to use without any approval.
  6. 6. $ 5. T if ' U H .9» l T" T" U F ‘-J r’-E’ E E l T E . - — Posting something like "He or she did without any proves.
  7. 7. 6 mrll“ : 7' T | -rm-r ,4 ‘ [ I" ' “' I-.343!‘ E F Tl/ ll‘ E E H l +‘l7.';1 lml” F E A Cl E . l‘ E . - Cracking demo program and using it forever.
  8. 8. HOU SHALT NOT USE .9‘Ji}jE;53 EOPLE'S COMPUTER " l RCES WITHOUT A1lTHRlZ«ATu_)N OR PROPER C COMPENSATION. Using site's information and -_ ‘ publishing a book without the ‘source to earn benefit.
  9. 9. 8 T’ H «>’: :: H A l. .'T T’ . T3 E P f E T” H E P E li- E ll T E l. . l. E li F U" "T. - Posting New movie that just came out on Youtube.
  10. 10. THOU SHALT THINK OUT THE SOCIAL _Q_Ns«E—ggENcEs OF THE PROGRAM YOU ARE xv RITING oR THE SYSTEM You ARE DESIGNING. _ I-‘Making program that can spy on other people's computer.
  11. 11. «Io. T-HOU SHALT ALWAYS COMPUTER IN WAYS THATINSURE COSNSIDERATION AND REsPEc'i"*I= oR YOUR ht —*FELLOW HUMANS. '- ‘Chatting with someone using curse words.

×