0% found this document useful (0 votes)
9 views

Module 8 Week 8 - Commandments of Computer Ethics

Uploaded by

lemoncitojeremy
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Module 8 Week 8 - Commandments of Computer Ethics

Uploaded by

lemoncitojeremy
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

The Ten (10)

Commandments of
Computer Ethics

C O M P R E H E N S I V E D I S C U SS I O N S
R E N AT O V. B A I S A , M B A , I T I L
C O M P U T E R S C I E N C E D E PA RT M E N T
Introduction to the
Computer Ethics
Institute
• What is the Computer Ethics Institute?
- Nonprofit organization founded in 1992 focused on promoting ethical IT use.

• Purpose:
- Guiding ethical use of technology to address its societal impacts.

• Founding Partners:
- Brookings Institution, IBM, Washington Consulting Group.
• Mission:
- Raising awareness on the ethical responsibilities in IT.

• Key Focus Areas:


- Researching IT ethics, providing policy advice, and
promoting responsible use of computer resources.
The Ten
Commandments of
Computer Ethics
• Published in 1992 by CEI.
• A set of ethical guidelines for
responsible computer use.
• Widely cited in academia and the
tech industry.
The Ten
Commandments
1. Thou shalt not use a computer to harm other people.
- This means avoiding activities like cyberbullying, spreading malware,
or any action that can cause physical, financial, or emotional harm.

2. Thou shalt not interfere with other people's computer work.


- Disrupting or corrupting someone else’s work, such as hacking into
their systems, is unethical.

3. Thou shalt not snoop around in other people's files.


- Unauthorized access to files or private information, even out of
curiosity, is a breach of privacy and trust.
The Ten
Commandments
4. Thou shalt not use a computer to steal.
- This includes activities like hacking into accounts, pirating
software, or stealing intellectual property.

5. Thou shalt not use a computer to bear false witness.


- Do not spread false information, engage in identity theft,
or participate in online fraud.
The Ten
Commandments
6. Thou shalt not use or copy software for which you have not paid.
- Respecting intellectual property rights and not using pirated software
falls under this principle.

7. Thou shalt not use other people's computer resources without


authorization or proper compensation.
- Using someone else’s bandwidth, processing power, or storage without
their permission is unethical.

8. Thou shalt not appropriate other people's intellectual output.


- Plagiarism or taking credit for someone else’s work, whether a program,
design, or written content, is wrong.
The Ten
Commandments
9. Thou shalt think about the social consequences of the program
you are writing or the system you are designing.
- Always consider how the technology you create can impact society—
positively or negatively.

10. Thou shalt use a computer in ways that show consideration and
respect for your fellow humans.
- Treat others with respect online, just as you would in person, by
avoiding harmful actions or language.
The Ten Commandments of
Computer Ethics in Relation
to the Appropriate Philippine
Laws
The Importance of
Computer Ethics
• Why is computer ethics important?
- Ensures responsible behavior with technology and data.
- Helps avoid cybercrime, privacy violations, and misuse of intellectual
property.

• Consequences of unethical behavior:


- Erosion of trust, legal consequences, and social harm.
Challenges and
Criticism
• Some critics find the Ten Commandments too simplistic
for complex ethical issues.

• CEI’s perspective:
- They serve as a foundation for ethical reflection and
guide behavior in technology use.
Legacy of the Computer
Ethics Institute
• CEI's Ten Commandments are still widely referenced.
• The principles have influenced codes of conduct in IT professions.
• CEI’s work remains relevant despite limited recent activities.
Conclusion
• Key Takeaways:
- The Computer Ethics Institute has shaped ethical discourse in
computing.
- The Ten Commandments provide a foundation for responsible
technology use.

• Call to Action:
- Apply ethical principles in daily technology interactions.

You might also like