Knowledge

Ten Commandments of Computer Ethics

Source 📝

50:
The commandments have been widely quoted in computer ethics literature but also have been criticized by both the hacker community and some in academia. For instance, Dr. Ben Fairweather of the "Centre for Computing and Social Responsibility" has described them as "simplistic" and overly restrictive.
31:. The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the 227: 321: 243: 57:, one of the thought leaders in the information security industry, has referred to the commandments in developing its own ethics rules. 253: 198: 316: 326: 269: 36: 224: 331: 112: 341: 28: 90:
Thou shalt think about the social consequences of the program you are writing or the system you are designing.
336: 301: 162: 84:
Thou shalt not use other people's computer resources without authorization or proper compensation.
81:
Thou shalt not copy or use proprietary software for which you have not paid (without permission).
93:
Thou shalt always use a computer in ways that ensure consideration and respect for other humans.
249: 194: 140: 44: 40: 24: 213: 310: 231: 39:
from 1987. The Ten Commandments of Computer Ethics copies the archaic style of the
296: 32: 167: 54: 117: 87:
Thou shalt not appropriate other people's intellectual output.
225:
CCSR:Commentary on the 'Ten Commandments for Computer Ethics'
72:
Thou shalt not snoop around in other people's computer files.
69:
Thou shalt not interfere with other people's computer work.
141:"In pursuit of 'Ten Commandments' for Computer Ethics" 78:
Thou shalt not use a computer to bear false witness.
66:
Thou shalt not use a computer to harm other people.
295:The Ten Commandments of Computer Ethics listed at 113:"That Twitter account might not be who you think" 297:Computer Professionals for Social Responsibility 191:Ethics in Public Relations: Responsible Advocacy 302:Centre for Computing and Social Responsibility 189:Kathy Fitzpatrick, Carolyn Bronstein (2006). 8: 270:"The Ten Commandments of Computer Ethics" 37:Internet Advisory Board's memo on ethics 103: 75:Thou shalt not use a computer to steal. 61:The Ten Commandments of Computer Ethics 245:Official (ISC)2 Guide to the CISSP CBK 163:"The Internet and the death of ethics" 161:O'Reilly, Dennis (October 12, 2010). 7: 35:use of computers." They follow the 21:Ten Commandments of Computer Ethics 193:. Sage Publications. p. 116. 14: 139:Barquin, Ramon C. (May 7, 1992). 16:Code for ethical use of computers 322:Ethics of science and technology 248:. CRC Press. November 14, 2006. 111:Leopold, Todd (April 9, 2013). 1: 214:Computer Ethics – Lecture 10 23:were created in 1992 by the 143:. Computer Ethics Institute 358: 29:Computer Ethics Institute 317:Computing and society 327:Professional ethics 349: 332:Codes of conduct 283: 282: 280: 279: 274: 266: 260: 259: 240: 234: 222: 216: 211: 205: 204: 186: 180: 179: 177: 175: 158: 152: 151: 149: 148: 136: 130: 129: 127: 125: 108: 45:King James Bible 41:Ten Commandments 25:Washington, D.C. 357: 356: 352: 351: 350: 348: 347: 346: 342:Internet ethics 307: 306: 292: 287: 286: 277: 275: 272: 268: 267: 263: 256: 242: 241: 237: 223: 219: 212: 208: 201: 188: 187: 183: 173: 171: 160: 159: 155: 146: 144: 138: 137: 133: 123: 121: 110: 109: 105: 100: 63: 17: 12: 11: 5: 355: 353: 345: 344: 339: 337:1992 documents 334: 329: 324: 319: 309: 308: 305: 304: 299: 291: 290:External links 288: 285: 284: 261: 254: 235: 230:2012-07-22 at 217: 206: 199: 181: 153: 131: 102: 101: 99: 96: 95: 94: 91: 88: 85: 82: 79: 76: 73: 70: 67: 62: 59: 15: 13: 10: 9: 6: 4: 3: 2: 354: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 314: 312: 303: 300: 298: 294: 293: 289: 271: 265: 262: 257: 255:9780849382314 251: 247: 246: 239: 236: 233: 232:archive.today 229: 226: 221: 218: 215: 210: 207: 202: 200:1-4129-1798-0 196: 192: 185: 182: 174:September 30, 170: 169: 164: 157: 154: 142: 135: 132: 124:September 30, 120: 119: 114: 107: 104: 97: 92: 89: 86: 83: 80: 77: 74: 71: 68: 65: 64: 60: 58: 56: 52: 48: 46: 42: 38: 34: 30: 26: 22: 276:. Retrieved 264: 244: 238: 220: 209: 190: 184: 172:. Retrieved 166: 156: 145:. Retrieved 134: 122:. Retrieved 116: 106: 53: 49: 20: 18: 311:Categories 278:2012-05-22 147:2013-08-17 98:References 43:from the 228:Archived 33:ethical 252:  197:  27:based 273:(PDF) 250:ISBN 195:ISBN 176:2015 168:CNET 126:2015 55:ISC2 19:The 118:CNN 313:: 165:. 115:. 47:. 281:. 258:. 203:. 178:. 150:. 128:.

Index

Washington, D.C.
Computer Ethics Institute
ethical
Internet Advisory Board's memo on ethics
Ten Commandments
King James Bible
ISC2
"That Twitter account might not be who you think"
CNN
"In pursuit of 'Ten Commandments' for Computer Ethics"
"The Internet and the death of ethics"
CNET
ISBN
1-4129-1798-0
Computer Ethics – Lecture 10
CCSR:Commentary on the 'Ten Commandments for Computer Ethics'
Archived
archive.today
Official (ISC)2 Guide to the CISSP CBK
ISBN
9780849382314
"The Ten Commandments of Computer Ethics"
Computer Professionals for Social Responsibility
Centre for Computing and Social Responsibility
Categories
Computing and society
Ethics of science and technology
Professional ethics
Codes of conduct
1992 documents

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.