The Ten Commandments of Internet or Computer Ethics were created in 1992 by the Computer Ethics Institute. The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers." They follow the Internet Advisory Board's memo on ethics from 1987. The Ten Commandments of Computer Ethics copies the archaic style of the Ten Commandments from the King James Bible.
The commandments have been widely quoted in computer ethics literature but also have been criticized by both the hacker community and some in academia. For instance, Dr. Ben Fairweather of the "Centre for Computing and Social Responsibility" has described them as "simplistic" and overly restrictive.
Social networking and the internet has such an impact on our generation for a variety of reasons. Online safety has become a concern for almost all users and organizations over the last decade, which can be solely attributed to the ever-increasing scams and cyber-attacks. It’s very difficult to believe that even those tech giants, who are responsible for making the digital world a better place, can fall for such scams. In such uncertain and insecure times, the least that can be done to enjoy anonymous web browsing is to make sure not to leave a digital trail of your activities for hackers and scammers to pick up. Once something is on the internet, it is in so many databases that it never be fully erased.
People rarely take that into account when they announce they use illegal substances, insult other people, or post explicit content.
So, we should be aware of what are we doing. This are the example of Ten Commandments of the Internet Ethics:
1. Thou shall not use the computer in ways that may harm other people.
- This commandment says that it is unethical to use a computer to harm another user. It includes harming or corrupting other users' data or files. The commandment states that it is wrong to use a computer to steal someone's personal information. Manipulating or destroying files of other users is ethically wrong. It is unethical to write programs, which on execution lead to stealing, copying or gaining unauthorized access to other users' data.
2. Thou shall not use computer technology to cause interference in other users' work.
- Computer software can be used in ways that disturb other users or disrupt their work. Viruses, for example, are programs meant to harm useful computer programs or interfere with the normal functioning of a computer. Malicious software can disrupt the functioning of computers in more ways than one. It may cause a computer to function wrongly or even stop working.
3. Thou shall not spy on another person's computer data.
- We know it is wrong to read someone's personal letters. On the same lines, it is wrong to read someone else's email messages or files. Obtaining data from another person's private files is nothing less than breaking into someone's room. Snooping around in another person's files or reading someone else's personal messages is the invasion of his privacy.
4. Thou shall not use computer technology to steal information.
- Stealing sensitive information or leaking confidential information is as good as robbery. It is wrong to acquire personal information of employees from an employee database or patient history from a hospital database or other such information that is meant to be confidential.
5. Thou shall not contribute to the spread of misinformation using computer technology.
- Spread of information has become viral today, because of the Internet. This also means that false news or rumors can spread speedily through social networking sites or emails. Being involved in the circulation of incorrect information is unethical.
6. Refrain from copying software or buying pirated copies. Pay for software unless it is free.
- Like any other artistic or literary work, software is copyrighted. A piece of code is the original work of the individual who created it. It is copyrighted in his/her name. In case of a developer writing software for the organization she works for, the organization holds the copyright for it. Copyright holds true unless its creators announce it is not.
7. Thou shall not use someone else's computer resources unless authorized to.
- Multi-user systems have user specific passwords. Breaking into some other user's password, thus intruding his/her private space is unethical. It is not ethical to hack passwords for gaining unauthorized access to a password-protected computer system.
8. It is wrong to claim ownership on a work which is the output of someone else's intellect.
- Programs developed by a software developer are her property. If he is working with an organization, they are the organization's property. Copying them and propagating them in one's own name is unethical. This applies to any creative work, program or design. Establishing ownership on a work which is not yours is ethically wrong.
9. Before developing a software, think about the social impact it can have.
- Looking at the social consequences that a program can have, describes a broader perspective of looking at technology. A computer software on release, reaches millions. Software like video games and animations or educational software can have a social impact on their users. When working on animation films or designing video games, for example, it is the programmer's responsibility to understand his target audience/users and the effect it may have on them.
10. In using computers for communication, be respectful and courteous with the fellow members.
- The communication etiquette we follow in the real world applies to communication over computers as well. While communicating over the Internet, one should treat others with respect. One should not intrude others' private space, use abusive language, make false statements or pass irresponsible remarks about others. One should be courteous while communicating over the web and should respect others' time and resources. Also, one should be considerate with a novice computer user.
References:
https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
https://www.ccsinet.com/blog/ten-commandments-online-safety/
http://www.nycischool.org/inewsnetwork/?p=1816

Comments
Post a Comment