The document outlines 10 commandments of computer ethics: 1) Do not use computers to harm people, 2) Do not interfere with others' work, 3) Do not access others' files without permission, 4) Do not use computers for theft, 5) Do not use computers to spread lies, 6) Do not use unlicensed software, 7) Do not use others' resources without authorization, 8) Do not claim others' intellectual work as your own, 9) Consider social impacts of any programs or systems you create, 10) Always use computers respectfully without compromising others. It also defines different types of hackers: white hats work to improve security, black hats exploit vulnerabilities maliciously, and grey hats may
The document outlines 10 commandments of computer ethics: 1) Do not use computers to harm people, 2) Do not interfere with others' work, 3) Do not access others' files without permission, 4) Do not use computers for theft, 5) Do not use computers to spread lies, 6) Do not use unlicensed software, 7) Do not use others' resources without authorization, 8) Do not claim others' intellectual work as your own, 9) Consider social impacts of any programs or systems you create, 10) Always use computers respectfully without compromising others. It also defines different types of hackers: white hats work to improve security, black hats exploit vulnerabilities maliciously, and grey hats may
The document outlines 10 commandments of computer ethics: 1) Do not use computers to harm people, 2) Do not interfere with others' work, 3) Do not access others' files without permission, 4) Do not use computers for theft, 5) Do not use computers to spread lies, 6) Do not use unlicensed software, 7) Do not use others' resources without authorization, 8) Do not claim others' intellectual work as your own, 9) Consider social impacts of any programs or systems you create, 10) Always use computers respectfully without compromising others. It also defines different types of hackers: white hats work to improve security, black hats exploit vulnerabilities maliciously, and grey hats may
1) Thou shalt not use a computer to harm other people.
It is unethical by using computer to harm other people, as a user we should not use the computer with the purpose of hurting or harming other people. 2) Thou shalt not interfere with other people's computer work. A person must not take an action that could give an obstacle to anybody's work and that can destroy anybody using his or her own work (when someone would change and ruin one's computer works). 3) Thou shalt not snoop around in other people's computer files. It may destroy their privacy, reputation and other things they wanted to keep either maybe for their safety or just for privacy. 4) Thou shalt not use a computer to steal. The computer should not be a man's channel or tool to take another's property such as files, using it to wrongfully earn money and stealing someone's works or ideas. Types of Hacker
White hat hacker
o The term "white hat" in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies that ensures the security of an organization's information systems. Black hat hacker o A black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. Grey hat hacker o Is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker. 5) Thou shalt not use a computer to bear false witness. The computer should not be used in giving wrong or false statements to witness or say something about a certain thing, event or person. 6) Thou shalt not copy or use proprietary software for which you have not paid. Copying or using a software of another's property without paying for it is what that sixth commandment is trying to convey. It is a wrongful act for you do not give what is due to the owner and his or her software's usage. 7) Thou shalt not use other people's computer resources without authorization or proper compensation. A person should not benefit or avail of other people's resources without their permission and without giving them due payment or fee for their resources. 8) Thou shalt not appropriate other people's intellectual output. Correcting other's work such as one's intellectual output using the computer is prohibited. This is what the eight commandment is all about. One doesn't have the right to judge and correct anyone for his or her work especially when you are not obliged to do so but correcting it on your own is not the right thing. Everyone of us is free and have different ideas. 9) Thou shalt think about the social consequences of the program you are writing or the system you are designing. When a Persons wants to create or design some programs and write something, he or she should consider first the possible effects or influences it could give to the society or other people before posting, making and sharing it through the computer. The ninth commandment concentrates on the consequences of one's work once it is being shown or shared to others. 10) Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans. The last commandment tells us users about using the computer in a favourable manner. Using the computer not only according to one's own good and need but in a way that one can do both things; enjoying the use of computer while giving respect and being sensitive to others first.