Categorias: Todos - environment - security - access - veracity

por Hany Velázquez 12 anos atrás

370

Security and Ethics

Ethical issues in computing encompass several critical aspects including privacy, veracity, property, and access. The concept of privacy underscores the importance of personal data ownership and protection.

Security and Ethics

Security and Ethics

Big companies collect our information. Personal information and financial data are of great value. Misuse of the information To sell the information False information. False identity

4 ethical issues

Privacy You are the owner of your information. Veracity. The information is true. Property. The information owner. Access. Who can use the information.

Be careful with:

Environmental Protection
Green Computing is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste).
Ergonomics
Physical health Eyes and headache Neck and back pain Mental Health Noise Stress
Security
Hackers break the systems security just for fun and they don’t cause damage. Crackers break the systems security and they cause damage. Manipulate the information.
Information Ethics
Infoethics or Information Ethics is the branch of ethics that focuses on the ethical issues generates by the development and application of the information technologies.
Privacy
The laws to regulate the computer systems have not been developed as fast as the technology. The essential element to use a computer is ethics. The computer ethics will guide what is morally acceptable.
Privacy. To protect data. Security. To control the access to the information. Ergonomics. Physical and mental effects. Environment. Environment effects.

Ten Commandments of Computer Ethics

Created by the Computer Ethics Institute1. Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid. 7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8. Thou Shalt Not Appropriate Other People’s Intellectual Output. 9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.

To have a successful implementation of a computer system, we need to check some issues to avoid negative effects:

As every computer system is operated by people, we don’t know if they have bad intentions or not.