1. other’s information. You shall not open files

1.      Introduction

 

Computer ethic plays a
main role when it comes to using the internet. Even though it is said to be
important not many people follow these rules and do the right thing. Therefore,
in this assignment I will speak about these subtopics by being simply
ethical.  I will speak about, what are ethics; unethical things users do, Ethical
Behavior, Several organizations that have set rules for ethics in computing, my
Critical evaluation and finally my conclusion. (Ravneet, 2011)

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

2.      What are ethics?

 

Ethics are basic rights
for people in any field there are some rules that should be followed, Ethics
can be considered as the rights and wrongs in human actions or how to live a
good life and the responsibilities of a certain individual. There are some
rules that should right followed by the information system users, for example
person should never use a computer to harm anyone else, a person should respect
another person’sprivacy, never use a computer for false witness, never use a
computer to steal or use a computer in such a way that it will ensure
consideration and respect for the people around you. Never design software’s
that affects the society in a bad way. Ethics should be followed by everyone
otherwise people can go to levels that can’t be stopped. Ethics draws the line
and stops the people before they reach these levels; this will not only keep
people out trouble, but also will help the society. (Ravneet,
2011)

These
are the basic rules that should be followed by information system users:

Never use a computer to harm other users.
Do not use computers to steal other’s information.
You shall not open files without the permission of the owner.
Do not copy copyrighted software without the author’s
permission.
Always respect copyright laws and policies.
Respect the privacy of others, just as you expect others to
respect yours.
Do not use other user’s computer property without their
permission.
Use Internet ethically, don’t do unethical stuff.
Always remember to Complain about unlawful messages and
activities, if found, to Internet service Providers and local law
enforcement authorities.
Users are responsible for protection of their User Id and
Passwords. They should not write them on paper or anywhere else for
tribute.
You should never intentionally use the computers to recover
or amend the information of others, which may include passwords information,
personal documents and files. (ministry
of electronics and information technology government of india, n.d.)

 

 

 

 

3.      Unethical things users do?

 

All users using computer
should follow several rules and regulations. When it comes to keeping data safe
the user should be aware of other uses who are in the internet. They can do
good things as well as bad stuff.

There are several ethics
that users can follow and some of them are described below:

Ø  Plagiarism
–  This is when a user copies another
person’s individual research or copies another’s facts and uses it as their own
work. This is meant to be very unethical because it does not come originally
from them but from another person’s work. However, if the user mentions and
gives credit to the original owner of the information they would not be
considered as wrong, this is ethical behavior, but if they do not then it is
considered to be an unethical action. (ministry of electronics and information
technology government of india, n.d.)

Ø  Stealing
data – This is also similar to plagiarism as many users in the internet tend to
steal data. Users mainly steal data such as movies, music and software
packages. Sometimes this is done unintentionally but when it comes to ethics in
computing it is a very big crime to illegally copyright data , but according to
the country rules and laws differ.

Ø  Property
– Using another’s computer without their permission also falls under a threat
as the owner of the computer will not be pleased to know that someone has
accessed their personal information without their knowledge.

Ø  Unnecessary
content online – this is a very common thing many people in social media sites
do. Individuals tend to put content such as bad language, feminism or sexiest
posts, inappropriate uploads and even offend and make fun of others in public.

Ø  When
using usernames and passwords it is best if the user tries to keep them in
their minds other than writing them down somewhere specially your mail details
or personal computer login details.

Ø  If
the internet usage is given to smaller children, it is always better to keep
watch of what they do as they are very new to the whole concept of it. However,
it is very unethical to see what another person is doing but to look after a
child would not be a bad idea. (ministry
of electronics and information technology government of india, n.d.)

Ø  Sending
threatening emails and sending virus’s to another persons computer as another format
is also an ethical issue and creating fake accounts in social media and sending
friend requests is also very common nowadays.

Ø  Going
through another persons web brower history and leaking it out on social media
can be unethical

Ø  If
we assume that someone is Looking at the keyboard while another is typing there
password can also be unethical if he/she does it intentionally or else it can
be considered as a mistake

 

4.     
How to prevent users
from being attacked

 

Many
users can get attacked at unexpected time but There are some ways to protect
the users files, some of the ways will be stated below:

1.     
Hide personal
information – when talking about personal information it can be the home                 address, phone numbers and
passwords these things should not be sharedamong strangers, because if you do
then they will misuse it without your knowledge to harm your own image.

 

2.      When having an instagram or facebook or any social
media that has and account, when a stranger sends a friend request , its your
responsibility to know who’s friend request to accept and who’s not to ,
because if you allow strangers to follow your then they can upload unwanted
things like racist pictures or racist comments. When something like  this happens you should report it and this
can prevent it from happening.

5.      Ethical Behavior

 

1.    What
is ethical behavior?

 Before using information systems, it is always
better for any user to know basic and several protocols that need to be
followed by anyone. Similar to normal rules and regulations that we follow on
real life when using a computer, internet, or contents we upload and download there
are many laws that we as individuals should follow. Some factors that are
prohibited would be as follows:

·        
Usage of software without proper license.

·        
Making other people on the internet feel
insecure by doing harmful things.

·        
Spying on or exchanging other people’s
files without permission or authority.

·        
Usage of computer methods to steal or corrupt
data.

2.    There
are Several organizations that have set rules for ethics in computing,

All
around the world people consider ethics very important like mentioned before. So
due to that different organizations that are information technology related
have come up with all the previousmethods explained previously. Some of the
organizations are listed below :

·        
Association for Computing
Machinery (ACM)  (ACM council, 1992)

·        
Singapore Computer
Security (SCS) (singapore computer society, 2014)

·        
British Computer
Society (BCS)

·        
Australian
Computer Security (ACS)

·        
Computer Ethics Institute
 

These
would be some of the main ones but there are some more other organizations that
have come up with more rules and regulations. The main reason for why these are
considered important is because different countries have come up with different
protocols to fit in with their countries, cultures and their people.

 

 

6.      Critical evaluation

 

Ethics is the barrier
that stops bad  impacts towards culture,
and environment, If a stranger
sends a friend request to my instagram or facebook or any social media accounts
I have, then , it’s my responsibility to know who’s friend request to accept
and who’s not to , because if I follow allow strangers to follow you then they
can upload unwanted things like racist pictures or racist comments. When
something like this happens you should report it, when I report it to through
the relevant account for example my facebook account then they remove the post
or any unnecessary comment that someone has put in my account.

 

7.      Conclusion

 

In conclusion for
the above assignment, what I understood was that you need ethics to live a good
life anywhere for example Never use a computer to harm other users or Always respect
copyright laws and policies of the specific country you are living in .Use
Internet ethically, don’t do unethical stuff  these rules are some of the most important
ones I came acroos when doing the research 
as I stated above in the basic
right s.and in my belief I
think these laws and rules should be implemented in the countries which doesn’t
have them. Because  ethics
is the barrier that stops bad  impacts
towards society.

 

x

Hi!
I'm Alejandro!

Would you like to get a custom essay? How about receiving a customized one?

Check it out