Sunday, September 1, 2019
Ethical Computing
Ethical Computing QBA 362 w/ Burke Ltelatk H. Fritz FRITZ, LTELATK Ethical Computing QBA 362-Spring 2010 E T H I C AL C O MP UT I NG 1. Find a code of ethics from a firm of your choosing (other than the CPSR or the ACM). What do you think are the best five guiding principles from all the tips that you found? http://www. buzzle. com/articles/computer-ethics-code-of-ethics-in-computing. html Code of Ethics ? Information stored on the computer should be treated as seriously as written or spoken word. ? Privacy should not be violated. In case of academic use, it is known plagiarism. ? ? ? Information for public viewing should not be modified or deleted or inaccessible since these are considered as destructive acts. Intrusive software such as ââ¬Å"wormsâ⬠and ââ¬Å"virusesâ⬠which are destructive to the computer system is also illegal. Congesting somebodyââ¬â¢s system with a lot of unwanted information is also unethical. Sending obscene and crude messages through mail or c hat is also forbidden. ? Sending sexually explicit content, message or pictures is also forbidden â⬠¡ I felt the top five codes under Buzzleà ®Ã¢â¬â¢s Code of Ethics were the best. Because in general it covers a broad area of things. Treating information stored on computers as if they were written or spoken words, is like asking users to respect the rights of others, as well as their responsibility towards other peopleââ¬â¢s work. (Individual Responsibility) Leaving other peopleââ¬â¢s work in tact as they areââ¬âwithout modification or deletion, is important because it preserves the other personââ¬â¢s integrity. Itââ¬â¢s kind of the same as walking into (or breaking into ) someoneââ¬â¢s home and rearranging their furniture without their knowledge. Preserving Integrity) â⬠¡ 2 FRITZ, LTELATK Ethical Computing QBA 362-Spring 2010 2. Is forwarding e-mail jokes good or bad? Summarize the opposing arguments you found. â⬠¡ I personally forward e-mail that I think is appropriate for the individual I am sending the message to. However, congesting someoneââ¬â¢s space is considered unethical according to the Buzzleà ® Code of Ethics. â⬠¡ Another factor I was totally oblivious of was the fact that all these peopleââ¬â¢s names and address are forwarded with the mail. My current method of forwarding the message is just to cut the message content and then forward it to friends. Sometimes I insert their address in the blind carbon copy (bcc) area to keep their address private. It is all about respecting someoneââ¬â¢s privacy and integrity. 3. How does anonymous e-mail work and why would you use it? â⬠¡ There are so many sites where you can set up anonymous e-mails, i. e. http://www. sendanonymousemail. net/ or http://www. hidemyass. com/anonymous-email/. But you can just as well set up a bogus account and use it to send anonymous e-mails. There were so many given reasons to use such websites like, ââ¬Å"catching a spouse/partner cheating,â⬠whistle-blowing, reporting illegal activities to the authorities. But I say, if you canââ¬â¢t say it in person, write it in a letter and sign it with your name. Be account for what you believe. It takes guts, but sometimes we just gotta. â⬠¡ 4. What are five ways e-mail use can be unethical? Which do you think is most common? Why? â⬠¡ â⬠¡ â⬠¡ â⬠¡ â⬠¡ â⬠¡ Using e-mail to steal company information. Using e-mail to scam people out of money. Using e-mail to conduct illegal activities, like money laundering, human trafficking, etcâ⬠¦ Using e-mail to ruin someoneââ¬â¢s reputation or ââ¬Å"blastingâ⬠stuff about a foe. Using e-mail in push/mass marketing. (Free Viagra or stuff like that) The most common I used to get is push/mass marketing. I once got my Inbox filled with 10,000 messages in less than a month. 5. Why is deliberate spreading of viruses unethical? Name five reasons. ? ? Intrusive software such as ââ¬Å"wormsâ⬠and ââ¬Å"virusesâ⬠which are destructive to the computer system is also illegal. (Buzzle à ®) Congesting somebodyââ¬â¢s system with a lot of unwanted information is also unethical. Buzzle à ®) ? 1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other peopleââ¬â¢s books and notebooks, it is equally bad to access and destroy their files. (CEI) 3 FRITZ, LTELATK Ethical Computing QBA 362-Spring 2010 ? 2) Thou shalt not interfere with other people's computer work: Computer viruses are small programs that disrupt other peopleââ¬â¢s computer work by estroying their files, taking huge amounts of computer time or memory, or by simply displaying annoying messages. Generating and consciously spreading computer viruses is unethical (CEI) ? 7) Thou shalt not use other people's computer resources without authorization: Multiuser systems use user idââ¬â¢s and passwords to enforce their memory and time allocations, and to safeguard information. You should not try to bypass this authorization system. Hacking a system to break and bypass the authorization is unethical 4
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.