Wednesday, May 6, 2020
Computer Ethics Code Of Ethic Example For Students
Computer Ethics : Code Of Ethic Philosophy and computers do not seen like they would have much relevance to each other but in actuality they coincide with one another through ethics. Ethics are the general principles that outlines the basic standard of what is right and what is wrong. They are the moral philosophy that people live and abide by in their everyday lives. Computer ethics are a more specific realm of ethics. They are the basic principles that ââ¬Å"regulate the use of computersâ⬠and uses computing in an appropriate manner (Computer Ethics). This include privacy concerns, intellectual property rights, and the effects of how the computer effects our society (Computer Ethics). It is important to keep and healthy learning and working environment and that is why a specific set of ethics should be followed in the computer industry. Code of Ethic The Association for Computing Machinery (ACM) abides by a code of ethic which is to be followed by every member and employee of the association. There are eight outlining rules that create the overall acceptable professional work environment (Computer Ethics). These rules are not only important but should be followed in every learning, professional, or work environment. The first rule is ââ¬Å"contribute to society and human well-being.â⬠This rule recognize the respecting different types of people, diversity, backgrounds that are all brought together in a working environment. It also highlights the importance of respecting everyoneââ¬â¢s ideas and avoiding any potential harm that can jeopardize the overall welfare of people. It also holds the personal responsibility of the awareness of the environment and spreading this information to others in that same environment. The next code the ACM follows is to ââ¬Å"avoid harm to others.â⬠Harm is referred to as more than jus t in a physical aspect. Harm can be information loss, viruses on computers, spreading of personal information, and anything else that can indicate danger to someone. Since technology deals with a lot of information is imperative to make sure that everyoneââ¬â¢s information is protected at all times. The next code of ethics is about being trustworthy and honest. In a work place trust is what makes the company functional. Lots of information will be shared and swapped and thatââ¬â¢s why itââ¬â¢s important to be careful of this information. The four code is ââ¬Å"be fair and take actions not to discriminate.â⬠Diversity is a necessary attribute to any workplace and despite anyoneââ¬â¢s race, sexuality, disability, age, or anything else considered ââ¬Å"differentâ⬠must always be accepted and respected amongst all members (Computer Ethics). The next code to follow deals with copyrighting. There should never be a time that any member takes credit for someone elseââ¬â¢s work. Any violation of this rule will not be tolerated. Next is ââ¬Å"give proper credit for intellectual propertyâ⬠. In every instance, when doing work that involves someone elseââ¬â¢s material you must always give proper credit for it. Also when doing your own work be sure to patent any necessary work. The next code is respecting everyoneââ¬â¢s privacy. This rule is important because in some cases a person can have access to personal information and in order to respect that person, one cannot look at that information. Unless there was given consent to view that information beforehand, that data must be left alone. The eighth rule is to ââ¬Å"honor confidentiality.â⬠This means that certain information cannot be shared with the public, even people that are close like spouses and family. As long as the company states that specific info rmation cannot be shared, it must always be kept within proper confinements (Computer Ethics). Personal Code of Ethics Scarlet Letter Literary Criticism EssayCase Violation 2 In 2013 twenty six year old Mathew Keys was arrested for violating the 1984 Computer Fraud and Abuse Act (Chozick, Savage). The twenty six year old was working for a local news station that is owned by a company that also owns the Los Angeles Times in Sacrament, California. Keys gave a username and password to a group of hackers who then changed the title of a Los Angeles article from ââ¬Å"Pressure Builds in House to Pass Tax-Cut Packageâ⬠to ââ¬Å"Pressure Builds in House to Elect CHIPPY 1337â⬠which was sending a message to another hacking group. (Chozick, Savage). Of course, Keys was soon arrested and hit with multiple fines for his violation of the law. In this case, Keys violated three rules of the ACM code of ethics. The first rule Keys violates is being trustworthy. Keys did not follow this rule because he did not take care of the information that he was in charge of. The next rule that the twenty six year old violates is respecting the privacy of others. Keys gav e out someone elseââ¬â¢s personal password and username and did not have permission to do so. The last code of ethics that Keys violated is honoring confidentiality. I would assume that the username and password of whoeverââ¬â¢s account that was given out was not to be shared with anyone other than a specific realm of people. Conclusion The ACM ethical codes are important to follow because it will create a healthy environment. Many times in the field of Computer Science, you have to work with many people and the only way to get those things done is to have a healthy environment. If people are in situations that feel uncomfortable or not welcoming, they tend to not work as well together. The ACM ethical codes help people to give a broad but accurate outline of what is wrong in right in the fields of Computing and Technology. Reference Association for Computing Machinery. (1992, October 16). Retrieved November 1, 2015. Balachandra, M. (2015, April 9). The Satyam scandal: How Indiaââ¬â¢s biggest corporate fraud unfolded. Retrieved November 1, 2015. Chozick, A., Savage, C. (2013, March 17). Hacker Case Leads to Calls for Better Law. Retrieved November 2, 2015. Computer Ethics. (n.d.). Retrieved November 2, 2015.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.