1 / 12

The Ten Commandments of Computer Ethics

The Ten Commandments of Computer Ethics. John Winand, Jr. Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people's computer work. Thou shalt not snoop around in other people's computer files. Thou shalt not use a computer to steal.

inoke
Download Presentation

The Ten Commandments of Computer Ethics

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Ten Commandments of Computer Ethics John Winand, Jr.

  2. Thou shalt not use a computer to harm other people.

  3. Thou shalt not interfere with other people's computer work.

  4. Thou shalt not snoop around in other people's computer files.

  5. Thou shalt not use a computer to steal.

  6. Thou shalt not use a computer to bear false witness.

  7. Thou shalt not copy or use proprietary software for which you have not paid.

  8. Thou shalt not use other people's computer resources without authorization or proper compensation.

  9. Thou shalt not appropriate other people's intellectual output.

  10. Thou shalt think about the social consequences of the program you are writing or the system you are designing.

  11. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

  12. The Ten Commandments Written by the Computer Ethics Institute • Thou shalt not use a computer to harm other people. • Thou shalt not interfere with other people's computer work. • Thou shalt not snoop around in other people's computer files. • Thou shalt not use a computer to steal. • Thou shalt not use a computer to bear false witness. • Thou shalt not copy or use proprietary software for which you have not paid. • Thou shalt not use other people's computer resources without authorization or proper compensation. • Thou shalt not appropriate other people's intellectual output. • Thou shalt think about the social consequences of the program you are writing or the system you are designing. • Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.

More Related