Computer Ethics
There are ten(10) commandment of computer ethics that have been defined by the Computer Ethics Institute that was shown in the class which the tutor asked each of the student to select one of the commandment that is related to the main project and discuss about it which i selected this;
Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people's books and notebooks, it is equally bad to access and destroy their files.
Discussion:
Software development life cycle is used to create application to do a specific or multiply task in a device so to abide by the commandment the application created should not be used to steal information, property or people's money. An application can be created to hack into someone's device to get information on it without asking the user can be done if the user is a terrorist or a dead person that have a legit information to give the government.
There are microchips that have been program to do help a spy to steal information from other enemy country e.g camera glass, memory card, recording pen and so on. Tracker chip is a good program equipment use to track down allies location in a battle or comrade. However, it is bad in such a way that is used to find someone's personal life places they visit for relaxation with either family or friends.
Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people's books and notebooks, it is equally bad to access and destroy their files.
Discussion:
Software development life cycle is used to create application to do a specific or multiply task in a device so to abide by the commandment the application created should not be used to steal information, property or people's money. An application can be created to hack into someone's device to get information on it without asking the user can be done if the user is a terrorist or a dead person that have a legit information to give the government.
There are microchips that have been program to do help a spy to steal information from other enemy country e.g camera glass, memory card, recording pen and so on. Tracker chip is a good program equipment use to track down allies location in a battle or comrade. However, it is bad in such a way that is used to find someone's personal life places they visit for relaxation with either family or friends.
Comments
Post a Comment