110 likes | 545 Views
Ten Commandments of Computer Ethics. By: Kiana Lopez. Ten Commandments of Computer Ethics ( 10-9). Thou shalt not snoop around in other people's files. Thou shalt not appropriate other people's intellectual output.
E N D
Ten Commandments of Computer Ethics By: Kiana Lopez
Ten Commandments of Computer Ethics (10-9) Thou shalt not snoop around in other people's files. Thou shalt not appropriate other people's intellectual output. http://www.google.com/url?sa=i&rct=j&q=snooping&source=images&cd=&cad=rja&docid=LOmLdaxkI_ApCM&tbnid=-Jx1hMRl1TudRM:&ved=0CAQQjB0&url=http%3A%2F%2Fblog.timesunion.com%2Fkristi%2Fara-snooping-and-relationships%2F20002%2F&ei=1g9fUbT_DcvL0gGJ24DQCA&bvm=bv.44770516,d.dmQ&psig=AFQjCNGkK5NvT3O0UU2nBrswZmVvk6SiFg&ust=1365270792665910 http://www.google.com/url?sa=i&rct=j&q=plagerism&source=images&cd=&cad=rja&docid=g4zQ7ZF467sooM&tbnid=y5XWNtB-MVH9jM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.um.edu.mt%2Fict%2FPlagiarism&ei=VBNfUbXKLtDO0QGC34C4BQ&bvm=bv.44770516,d.dmQ&psig=AFQjCNH7DHBiLv85rnzn-i7vIEiHp7SEXg&ust=1365271716614849
Ten Commandments of Computer Ethics (8-7) Thou shalt not interfere with other people's computer work. Thou shalt not use other people's computer resources without authorization. http://www.google.com/imgres?q=using+computer+without+permission&hl=en&safe=active&client=safari&sa=X&rls=en&biw=1665&bih=843&tbm=isch&tbnid=xy2KEpNoS6SU8M:&imgrefurl=http://lifehacker.com/5873538/how-to-find-out-if-someones-secretly-been-using-your-computer&docid=2697JrvN_0vlDM&imgurl=http://img.gawkerassets.com/img/17n1rdm0semwmjpg/medium.jpg&w=300&h=169&ei=XhRfUbT-BYTn0QG46oCIBQ&zoom=1&ved=1t:3588,r:47,s:0,i:234&iact=rc&dur=311&page=2&tbnh=135&tbnw=240&start=28&ndsp=43&tx=52&ty=32 http://www.google.com/url?sa=i&rct=j&q=stealing+information+from+computer&source=images&cd=&cad=rja&docid=gevw9ih7V64PyM&tbnid=JzGWgg4B1yNpkM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.dreamstime.com%2Fstock-photography-hacker-stealing-information-image17839872&ei=IhRfUfyTE4TB0AHpwoHQDg&bvm=bv.44770516,d.dmQ&psig=AFQjCNFYexI53e7Hv4wP_SIAXam3Rfdqng&ust=1365271892309154
Ten Commandments of Computer Ethics (6-5) Thou shalt not use a computer to bear false witness. Thou shalt think about the social consequences of the program you write. Should I write this? http://www.google.com/url?sa=i&rct=j&q=thinking&source=images&cd=&cad=rja&docid=qZvITRJB4QiTnM&tbnid=1XaGns6XftjipM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.schoolofthinking.org%2Fwho%2Fabout%2Ftraining%2F10-dfq%2Fwho%2Fwho-dr-michael-hewitt-gleeson%2F59-second-course-in-thinking%2Fe-s-t-or-escape-search-think%2F&ei=1hJfUcHLOebr0gH1vYGgCQ&bvm=bv.44770516,d.dmQ&psig=AFQjCNH6Zp298SYfn-4LtpgBWRKpUuVFtQ&ust=1365271617812475 http://www.google.com/url?sa=i&rct=j&q=rumors+on+computer&source=images&cd=&cad=rja&docid=gSVw3nzVGWaVSM&tbnid=FaIlISYTZHhz6M:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.capmac.org%2Fiphonesig%2F%3Fm%3D201001%26paged%3D2&ei=cBJfUf2aFMqU0QGV9oGIDw&bvm=bv.44770516,d.dmQ&psig=AFQjCNFmWDCaaJyBvgFOLw0d5g39Cv8heA&ust=1365271515075808
Ten Commandments of Computer Ethics (4-3) Thou shalt not use or copy software for which you have not paid. Thou shalt not use a computer to steal. http://www.google.com/url?sa=i&rct=j&q=stealing+information+from+computer&source=images&cd=&cad=rja&docid=cPITeQEPwdCiVM&tbnid=bxsgVxgdeJAuwM:&ved=0CAQQjB0&url=http%3A%2F%2Fdepositphotos.com%2F12945215%2Fstock-photo-Computer-Hacker-stealing-information-from-a-laptop-isolated-ove.html&ei=MxJfUaytL4uP0QHrqoDwCg&bvm=bv.44770516,d.dmQ&psig=AFQjCNH5wCQB1eZkwfS9otVeSjuz5eMonQ&ust=1365271442373005 http://www.google.com/url?sa=i&rct=j&q=copy+&source=images&cd=&cad=rja&docid=o6vqMe8hWT_-hM&tbnid=h4Dv2WLmpAivtM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.pinoyglobalnetwork.com%2FBurningDatatoCD.aspx&ei=7hFfUa_JFKrK0gG2nIGYDw&bvm=bv.44770516,d.dmQ&psig=AFQjCNFrgdxIensmnjejop6anKNDIWTPNQ&ust=1365271327295369
Ten Commandments of Computer Ethics (2-1) Thou shalt not use a computer to harm other people. Thou shalt use a computer in ways that show consideration and respect. http://www.google.com/url?sa=i&rct=j&q=cyberbullying&source=images&cd=&cad=rja&docid=50GJ4KlyK-TtNM&tbnid=QKLPfId29IL9KM:&ved=0CAQQjB0&url=https%3A%2F%2Fblog.sgrouples.com%2Fwhat-is-cyberbulling%2F&ei=shBfUdaFIo7V0gG-roDgAQ&bvm=bv.44770516,d.dmQ&psig=AFQjCNFO1dw1CNsguOVXwUWSFj0kSFdflA&ust=1365271067335598 http://www.google.com/url?sa=i&rct=j&q=using+computer+properly&source=images&cd=&cad=rja&docid=C_fcCLZRFG50wM&tbnid=ZWSaYFl6e_7cgM:&ved=0CAQQjB0&url=http%3A%2F%2Fwww.hostingreviews.com%2Fcomputer-skills-101-online-resource-guide%2F&ei=EhFfUfblCoa90AG-m4DABA&bvm=bv.44770516,d.dmQ&psig=AFQjCNHqEYnOt9-F8Cr5AQ0f3Z5Y1XT9wg&ust=1365271136150217