Ten Commandments of Computer Ethics
The Ten Commandments of Computer Ethics were created in 1992 by the Washington, D.C. based Computer Ethics Institute.[1] The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the ethical use of computers."[2] They follow the Internet Advisory Board's memo on ethics from 1987.[3] The Ten Commandments of Computer Ethics copies the archaic style of the Ten Commandments from the King James Bible.
The commandments have been widely quoted in computer ethics literature[4] but also have been criticized by both the hacker community[5] and some in academia. For instance, Dr. Ben Fairweather of the "Centre for Computing and Social Responsibility" has described them as "simplistic" and overly restrictive.[6]
ISC2, one of the thought leaders in the information security industry, has referred to the commandments in developing its own ethics rules.[7]
The Ten Commandments of Computer Ethics
- Thou shalt not use a computer to harm other people.
- Thou shalt not interfere with other people's computer work.
- Thou shalt not snoop around in other people's computer files.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness.
- Thou shalt not copy or use proprietary software for which you have not paid (without permission).
- Thou shalt not use other people's computer resources without authorization or proper compensation.
- Thou shalt not appropriate other people's intellectual output.
- Thou shalt think about the social consequences of the program you are writing or the system you are designing.
- Thou shalt always use a computer in ways that ensure consideration and respect for other humans.[8]
References
- ↑ Leopold, Todd (April 9, 2013). "That Twitter account might not be who you think". CNN. http://www.cnn.com/2013/04/09/tech/social-media/obama-twitter-account-ethics/.
- ↑ Barquin, Ramon C. (May 7, 1992). "In pursuit of 'Ten Commandments' for Computer Ethics". Computer Ethics Institute. http://computerethicsinstitute.org/barquinpursuit1992.html.
- ↑ O'Reilly, Dennis (October 12, 2010). "The Internet and the death of ethics". CNET. http://www.cnet.com/news/the-internet-and-the-death-of-ethics/.
- ↑ Kathy Fitzpatrick, Carolyn Bronstein (2006). Ethics in Public Relations: Responsible Advocacy. Sage Publications. p. 116. ISBN 1-4129-1798-0.
- ↑ Computer Ethics – Lecture 10
- ↑ CCSR:Commentary on the 'Ten Commandments for Computer Ethics'
- ↑ Official (ISC)2 Guide to the CISSP CBK. CRC Press. November 14, 2006. ISBN 9780849382314. https://books.google.com/books?id=RbihG-YALUkC&dq=%22Ten+Commandments+of+Computer+Ethics%22&pg=PA79.
- ↑ "The Ten Commandments of Computer Ethics". http://www.computerethicsinstitute.org/images/TheTenCommandmentsOfComputerEthics.pdf.
External links
- The Ten Commandments of Computer Ethics listed at Computer Professionals for Social Responsibility
- Centre for Computing and Social Responsibility
it:I dieci comandamenti dell'etica del computer
Original source: https://en.wikipedia.org/wiki/Ten Commandments of Computer Ethics.
Read more |