.

Sunday, March 31, 2019

The Computer Ethics | Essay

The reading processing system ethics EssayThe computer and the network is probably the greatest pecker that throng rely on in the modern world today. However, they atomic number 18 the more or less unrestricted form of technology. Identity theft, stealing, fraud, and plagiarizing goat now be through with(p) electronically and anonymously. at that place are people in the world that imply to hurt opposites through the computer. As such, it is important to not only perceive a edict of ethics to keep on reproaching yourself and opposites, just now to as well build methods to comfort yourself.Code of EthicsIt is unceasingly important that when operating a computer that one does not harm other people. Unethical decisions in the intake of the computer are as varying and unhealthful as acts committed directly against other people. The net income is very vast, and it does contain development and data, but it also provides dangers. There are as many suicidal activi ties through the internet as outside the computer and then some. Viruses, hacking, committing fraud, plagiarizing rear all be done through a computer. Therefore, a code of honor should be established for anyone wishing to use the computer.Ten Commandments of Computer Ethics. The Computer Ethics Institute created the Ten Commandments of Computer Ethics.1. Thou shalt not use a computer to harm other people.2. Thou shalt not interfere with other peoples computer work.3. Thou shalt not snoop somewhat in other peoples computer files.4. Thou shalt not use a computer to steal.5. Thou shalt not use a computer to move over false witness.6. Thou shalt not copy or use trademarked software for which you have not paid.7. Thou shalt not use other peoples computer resources without authorization or right-hand(a) compensation.8. Thou shalt not attach other peoples intellectual output.9. Thou shalt think about the social consequences of the schedule you are writing or the system you are desig ning.10. Thou shalt always use a computer in ways that in reliable rumination and respect for your fellow humans. (Lee)Personal Care. A computer is somebodyal attribute to the owner, and he or she may do as they wish with the computer. However, a computer is the same as any property such as a house or a car. It is important to take distribute of the computer so that it operates safely as long as possible. This pith to avoid any behaviors that would harm the computer or that will harm you. An showcase is giving personal information to sites that should not be certain(p) and could result in identity theft. Maintain an anti-virus software program to pr steadyt virus attacks and always maintain and update the Computer. If a computer was a car, the same rule applies. A car should regularly be analyse and sent for a tune-up.Respect Property. As always, it is important to take dispense of your computer. However, it is just as important to respect and properly use other computers. Th e same old rule applies treat others property as you call for your property to be treated. There are several(prenominal) risky behaviors on the computer that canister harm it, and should be avoided on another persons computer. As a general rule, treat another computer better than your own. non only does this apply to a friends personal computer, but also to the computers at school or at the library that provide public chafe. conceive that access to these computers is a privilege and should be respected.There are several important behaviors to observe when operating a different computer than your own. First, neer operate a computer without permission. There may be particular circumstances that you may be unaware. Second, always take good bring off of the equipment the keyboard, the mouse, CDs, and hard drive itself. Finally, never download material or do anything potentially bruising to the computer. An illegal act could cause trouble for the owner or harm the computer and i nformation it contains.mind PropertyIntellectual property is any creation of the mind. Certain property is protected on a lower floor Copyright Law, such asScientific discoveriesWorks of art or literatureInventionsDesignsFilms or television programsTrademarks and namesComputer programsEntertainmentThe Internet and Intellectual Property. As mentioned several times, the Internet is a source of a vast amount of information. The Internet is not a library or book, the Internet is for the most part unmanaged, unedited, unsupervised anyone can post information on Internet for all to see. (Emmans) Information or creative whole kit and boodle are not limited to copyright protected companies or organizations. Anyone can place information or creative work on the Internet. There are no physical boundaries to protect against the infringement of copyright. With free access to the Internet, any drug user may steal information anonymously and offer it as their own and this makes Intellectual Pro perty almost unenforceable on the Internet.Protecting Against Plagiarism. Fortunately, there are tools functional on the Internet to batten users that they properly give credit to the information on the Internet. First, many sites functional assist students in creating the proper citations for their sources. Good examples of these admit Easybib and Citationmachine. These sites allow the user to enter the information of the source that they utilize, from either the Internet or elsewhere, and the catch creates the proper citation. Jus the same, there are websites available to check the authenticity of a source of information, either a website or another type of information. An example is Turnitin.com, which allows takeers to analyze students work for plagiarized information. Other sites can be used to find if other website is credible or not. Finally, databases are an excellent tool for student or researchers. Databases contain well-documented articles from professional journal s to even whole books, small-arm also providing the source information. Any student should take advantage of the tools available on the Internet to properly constitute information and to find concrete sites.Placing Information on the Internet. When placing items on the Internet always make sure that the source of the information or media is cited. Also, when running a website, always include information to the ownership of the site and when it was updated. In this way, people can cite your website if they wish. Also, when maintaining a website, update regularly and maintain the site constantly. A website that has not been updated in years or does not have the proper golf links does not appear to be a good website.Limiting entrywayFree Speech. In American, everyone has a right to free speech, but where does this amaze the line on the Internet? While people have a freedom of speech, there are limits in the physical world. For example, a person cannot slander or falsify against so meone that will harm them. For example, claiming that a political opponent stole money from the treasury when this is not dependable is illegal. However, in the realm of the Internet, where there are no boundaries or enforcement, anything that can be said is said without punishment.The Internet is an excellent source of information, but as said before, websites should be evaluated before they are considered trustworthy or capable. An excellent example is Wikipedia, a free-access reference site. The site is well hold and there is plenty of information with credible sources. However, anyone can edit a page on Wikipedia, and some of the facts may be false if not blatantly. In addition, on the Internet, there is a large amount of media, music, videos and images, even derogatory images and videos. Given that there is free-access, children may accidentally find these unlike images from innocent searches. shallows and Libraries. Schools and Libraries can help protect students and childr en from unrestricted access to the Internet. School and Library servers can now be fitted with restrictions that will block harmful or inappropriate websites. For students, this is very helpful in keeping them from exploring harmful sites while still having access to find information. In Libraries, it is important to protect the computers and restrictions on the internet help in this task, since many people espouse and go on the computers. (Emmans)Parental Control. Still the best protection for children is enate oversight. Children should not operate the computer or navigate the Internet themselves. This should also be applied to teenagers. Cindy Emman writes, A minor walking into a shop class to try to buy pornography can be stopped a minor logging into the Internet can easily pose as an adult no one is the wiser. Parents should monitor teens use of the computer and teach their children proper use of the internet. (Emmans)ConclusionThere are many concerns for the use of the comp uters. There are many harms that are created by others and there are harms created by the operator. Fortunately, there are methods developing to defend against harmful viruses, internet theft, and plagiarizing. The key for the prosperity of the computer is that each owner of the computer exhibits proper behavior, and anyone can turn to the Ten Commandments of Computer Ethics as a guide. Remember never do anything that would harm another.

No comments:

Post a Comment