The biggest collection of MySpace 2.0 Layouts online
MySpaceLayouts

-->

About Me

My photo
Learn from failure; confirm with success.

Pages

Ethics

Categories of Ethics:

1. Computer Ethics
2. Internet Ethics

1. Computer Ethics
a) What is computer ethics?
  • Computer ethics studies the way in which computers "pose new versions of standard moral problems and moral dilemmas, exacerbating the old problem, and forcing us to apply ordinary moral norms in uncharted realms." (Deborah Johnson, 1985)
  • It is moral guidelines that govern the use of computers, networks and information systems
b) Computer Ethics for Educators (Lecture Note)
  • Do not use a computer to harm other people.
  • Do not interfere with other people's computer work.
  • Do not look at other people's computer files
  • Do not use a computer to steal.
  • Do not use a computer to lie.
  • Do not copy or use software without paying for it.
  • Do not use others' computer resources without authorization.
  • Do not use other people's intellectual output.
  • Thinks about the social impact of the programs he or she creates.
  • Always show respect and consideration for other people when using a computer.
c) Code of Computer Ethics for Educator
  • Respect for Privacy
  • Respect for Ownership
  • Respect for the Network
  • Duty to Educate
  • Acceptable Use Policy
2. Internet Ethics
a) What is Internet Ethics?
  • is the way to seeks and come up with a code of conduct and disclosure obligation for those who communicate on the internet.
b) Examples of unethical and criminal behavior:
  • Stealing copyright and credit for intellectual property.
  • Intercepting private e-mail.
  • Display of pornographically material.
  • Deliberate public misinformation.
  • Misuse of research material.
  • Improper commercial / personal use of network.
  • Stealing credit information.
c) Legal and Ethical Aspects of the internet
  • Protection of intellectual property.
  • Prevention of fraud.
  • Protection of freedom of expression versus problems of defamation.
  • Protection of privacy.
  • Control of internet indecency versus free speech.
  • Control of spamming.