Tuesday, December 10, 2019

Computer Ethics Code Of Ethic Example For Students

Computer Ethics : Code Of Ethic Philosophy and computers do not seen like they would have much relevance to each other but in actuality they coincide with one another through ethics. Ethics are the general principles that outlines the basic standard of what is right and what is wrong. They are the moral philosophy that people live and abide by in their everyday lives. Computer ethics are a more specific realm of ethics. They are the basic principles that â€Å"regulate the use of computers† and uses computing in an appropriate manner (Computer Ethics). This include privacy concerns, intellectual property rights, and the effects of how the computer effects our society (Computer Ethics). It is important to keep and healthy learning and working environment and that is why a specific set of ethics should be followed in the computer industry. Code of Ethic The Association for Computing Machinery (ACM) abides by a code of ethic which is to be followed by every member and employee of the association. There are eight outlining rules that create the overall acceptable professional work environment (Computer Ethics). These rules are not only important but should be followed in every learning, professional, or work environment. The first rule is â€Å"contribute to society and human well-being.† This rule recognize the respecting different types of people, diversity, backgrounds that are all brought together in a working environment. It also highlights the importance of respecting everyone’s ideas and avoiding any potential harm that can jeopardize the overall welfare of people. It also holds the personal responsibility of the awareness of the environment and spreading this information to others in that same environment. The next code the ACM follows is to â€Å"avoid harm to others.† Harm is referred to as more than jus t in a physical aspect. Harm can be information loss, viruses on computers, spreading of personal information, and anything else that can indicate danger to someone. Since technology deals with a lot of information is imperative to make sure that everyone’s information is protected at all times. The next code of ethics is about being trustworthy and honest. In a work place trust is what makes the company functional. Lots of information will be shared and swapped and that’s why it’s important to be careful of this information. The four code is â€Å"be fair and take actions not to discriminate.† Diversity is a necessary attribute to any workplace and despite anyone’s race, sexuality, disability, age, or anything else considered â€Å"different† must always be accepted and respected amongst all members (Computer Ethics). The next code to follow deals with copyrighting. There should never be a time that any member takes credit for someone else’s work. Any violation of this rule will not be tolerated. Next is â€Å"give proper credit for intellectual property†. In every instance, when doing work that involves someone else’s material you must always give proper credit for it. Also when doing your own work be sure to patent any necessary work. The next code is respecting everyone’s privacy. This rule is important because in some cases a person can have access to personal information and in order to respect that person, one cannot look at that information. Unless there was given consent to view that information beforehand, that data must be left alone. The eighth rule is to â€Å"honor confidentiality.† This means that certain information cannot be shared with the public, even people that are close like spouses and family. As long as the company states that specific info rmation cannot be shared, it must always be kept within proper confinements (Computer Ethics). Personal Code of Ethics Scarlet Letter Literary Criticism EssayCase Violation 2 In 2013 twenty six year old Mathew Keys was arrested for violating the 1984 Computer Fraud and Abuse Act (Chozick, Savage). The twenty six year old was working for a local news station that is owned by a company that also owns the Los Angeles Times in Sacrament, California. Keys gave a username and password to a group of hackers who then changed the title of a Los Angeles article from â€Å"Pressure Builds in House to Pass Tax-Cut Package† to â€Å"Pressure Builds in House to Elect CHIPPY 1337† which was sending a message to another hacking group. (Chozick, Savage). Of course, Keys was soon arrested and hit with multiple fines for his violation of the law. In this case, Keys violated three rules of the ACM code of ethics. The first rule Keys violates is being trustworthy. Keys did not follow this rule because he did not take care of the information that he was in charge of. The next rule that the twenty six year old violates is respecting the privacy of others. Keys gav e out someone else’s personal password and username and did not have permission to do so. The last code of ethics that Keys violated is honoring confidentiality. I would assume that the username and password of whoever’s account that was given out was not to be shared with anyone other than a specific realm of people. Conclusion The ACM ethical codes are important to follow because it will create a healthy environment. Many times in the field of Computer Science, you have to work with many people and the only way to get those things done is to have a healthy environment. If people are in situations that feel uncomfortable or not welcoming, they tend to not work as well together. The ACM ethical codes help people to give a broad but accurate outline of what is wrong in right in the fields of Computing and Technology. Reference Association for Computing Machinery. (1992, October 16). Retrieved November 1, 2015. Balachandra, M. (2015, April 9). The Satyam scandal: How India’s biggest corporate fraud unfolded. Retrieved November 1, 2015. Chozick, A., Savage, C. (2013, March 17). Hacker Case Leads to Calls for Better Law. Retrieved November 2, 2015. Computer Ethics. (n.d.). Retrieved November 2, 2015.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.