Security and Ethics
As every computer system is operated by people, we don’t know if they have bad intentions or not.
To have a successful implementation of a computer system, we need to check some issues to avoid negative effects:
Ten Commandments of Computer Ethics
Created by the Computer Ethics Institute1. Thou Shalt Not Use A Computer To Harm Other People. 2. Thou Shalt Not Interfere With Other People’s Computer Work. 3. Thou Shalt Not Snoop Around In Other People’s Computer Files. 4. Thou Shalt Not Use A Computer To Steal. 5. Thou Shalt Not Use A Computer To Bear False Witness. 6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid. 7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation. 8. Thou Shalt Not Appropriate Other People’s Intellectual Output. 9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. 10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.
Be careful with:
Privacy.
To protect data.
Security.
To control the access to the information.
Ergonomics.
Physical and mental effects.
Environment.
Environment effects.
Privacy
The laws to regulate the computer systems have not been developed as fast as the technology.
The essential element to use a computer is ethics.
The computer ethics will guide what is morally acceptable.
Information Ethics
Infoethics or Information Ethics is the branch of ethics that focuses on the ethical issues generates by the development and application of the information technologies.
Security
Hackers break the systems security just for fun and they don’t cause damage.
Crackers break the systems security and they cause damage.
Manipulate the information.
Ergonomics
Physical health
Eyes and headache
Neck and back pain
Mental Health
Noise
Stress
Environmental Protection
Green Computing is the environmentally responsible use of computers and related resources. Such practices include the implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption and proper disposal of electronic waste (e-waste).
4 ethical issues
Privacy
You are the owner of your information.
Veracity.
The information is true.
Property.
The information owner.
Access.
Who can use the information.