版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)
文檔簡介
1、1,Unit 8 Computer Ethics,2,Words related,hack into hacker database credit card apply to ethically/legally IT: information technology ethical boundary snoop privacy social consequence be respectful of negative message gain access to download/copy/quote plagiarism software enforce/utilize the rules de
2、velop a strong sense of principle boil down to appropriate curriculum,3,4,Background Information,Searching for Ethics in the Global Village becomes more prevalent, computer ethics becomes more difficult and more important,5,Computer ethics has two parts: the analysis of the nature and social impact
3、of computer technology the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase “computer technology” because I take the subject-matter of the field broadly to include computers and associated technology, including software, hard- ware, and
4、 networks,6,Ethics is the question of right and wrong. We are taught from a young age that plagiarism (copying otherswork) is wrong. One might say, it is like cheating on a test when you burn a CD copy of someone elses music or game. However, most people dont associate copying of songs, games, video
5、s, etc. as being wrong. Just because it is easy and hard to get caught does not make it right. The rights of the creator must be protected if we are going to be a society that is creative and inventive,7,Lets see this as a personal issue.If you let a person borrow your email password or locker combi
6、nation and they share some personal information found in your locker or email with others, without your knowledge, you probably would feel violated and very hurt. Now think of a song writers feeling when an artist performs their song without permission. One step further, you copy that MP3 song from
7、a friend but do not pay for it. It is a copyright violation to take an artists songs and sharing it with your friends without them having to pay for it,8,Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and
8、social conduct,9,Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences,10,1. The individuals own personal code. 2. any informal code of e
9、thical behavior that exists in the work place. 3. exposure to formal codes of ethics,11,Internet Privacy,Internet Privacy is one of the key issues that has emerged since the evolution of the world wide web. Millions of internet users often expose personal information on the internet in order to sign
10、 up or register for thousands of different possible things,12,Copyright infringement,copyright infringement is a critical issue on the internet. The widespread availability to upload or download files and data has given open road to almost anyone to access popular content that may otherwise needed t
11、o be purchased for money. However, with piracy and just peer-to-peer friendly file transfers, many copyright acts have been violated on the internet. How does one address that issue when files are being sent worldwide, from anyone to everyone and back. Do you punish everyone? That is just not possib
12、le. This is a critical problem that dwells on ones own restraint or ethics to decide what is best for them,13,Internet Control,With an explosion of internet popularity, the power struggles of the world have easily transferred onto the internet. Independent users, businesses, search engines, any poss
13、ible source of information is trying to control, manipulate, bias, censor their information on the internet whether they realize it or not,14,Computer Reliability,15,Questions,What is Ethics? Is it ethical to steal from a store? Is it ethical to open an envelope and read a letter to someone else? Wh
14、at is computer ethics? 3. Information about Computer Ethics Institute? When? The goal,16,TEN COMMANDMENTS OF COMPUTER ETHICS- BY COMPUTER ETHICS INSTITUTE,Thou shalt not use a computer to harm other people. Thou shalt not interfere with other peoples computer work. Thou shalt not snoop around in oth
15、er peoples computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness,17,Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other peoples computer resources without authorization or proper compensation. Thou shalt not appropriate other peoples intellectual output. Thou shalt think about the social
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 《密封件基礎(chǔ)知識》課件
- 2024年貴州建設(shè)職業(yè)技術(shù)學(xué)院單招職業(yè)技能測試題庫標(biāo)準(zhǔn)卷
- 單位管理制度集合大全人事管理十篇
- 單位管理制度匯編大全人事管理
- 單位管理制度合并匯編【人員管理】
- 單位管理制度呈現(xiàn)匯編職工管理篇十篇
- 單位管理制度呈現(xiàn)大全人員管理
- 《礦山勞動衛(wèi)生》課件
- 《生活中的問題》課件
- 《安全防護(hù)欄標(biāo)準(zhǔn)》課件
- 2024年加油站的年度工作總結(jié)范文(2篇)
- 甲醇制氫生產(chǎn)裝置計算書
- T-JSREA 32-2024 電化學(xué)儲能電站消防驗收規(guī)范
- 2025年上半年江蘇省常州市文廣旅局下屬事業(yè)單位招聘4人重點基礎(chǔ)提升(共500題)附帶答案詳解
- 2023-2024學(xué)年福建省泉州市石獅市三年級(上)期末數(shù)學(xué)試卷
- 【MOOC】隧道工程-中南大學(xué) 中國大學(xué)慕課MOOC答案
- 紅色經(jīng)典影片與近現(xiàn)代中國發(fā)展學(xué)習(xí)通超星期末考試答案章節(jié)答案2024年
- 劇作策劃與管理智慧樹知到期末考試答案2024年
- 鐵路基礎(chǔ)知識考試題庫500題(單選、多選、判斷)
- 客情關(guān)系的建立和維護(hù)
- 2022年合理使用抗生素試題
評論
0/150
提交評論