50:
The commandments have been widely quoted in computer ethics literature but also have been criticized by both the hacker community and some in academia. For instance, Dr. Ben
Fairweather of the "Centre for Computing and Social Responsibility" has described them as "simplistic" and overly restrictive.
31:. The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in the
227:
321:
243:
57:, one of the thought leaders in the information security industry, has referred to the commandments in developing its own ethics rules.
253:
198:
316:
326:
269:
36:
224:
331:
112:
341:
28:
90:
Thou shalt think about the social consequences of the program you are writing or the system you are designing.
336:
301:
162:
84:
Thou shalt not use other people's computer resources without authorization or proper compensation.
81:
Thou shalt not copy or use proprietary software for which you have not paid (without permission).
93:
Thou shalt always use a computer in ways that ensure consideration and respect for other humans.
249:
194:
140:
44:
40:
24:
213:
310:
231:
39:
from 1987. The Ten
Commandments of Computer Ethics copies the archaic style of the
296:
32:
167:
54:
117:
87:
Thou shalt not appropriate other people's intellectual output.
225:
CCSR:Commentary on the 'Ten
Commandments for Computer Ethics'
72:
Thou shalt not snoop around in other people's computer files.
69:
Thou shalt not interfere with other people's computer work.
141:"In pursuit of 'Ten Commandments' for Computer Ethics"
78:
Thou shalt not use a computer to bear false witness.
66:
Thou shalt not use a computer to harm other people.
295:The Ten Commandments of Computer Ethics listed at
113:"That Twitter account might not be who you think"
297:Computer Professionals for Social Responsibility
191:Ethics in Public Relations: Responsible Advocacy
302:Centre for Computing and Social Responsibility
189:Kathy Fitzpatrick, Carolyn Bronstein (2006).
8:
270:"The Ten Commandments of Computer Ethics"
37:Internet Advisory Board's memo on ethics
103:
75:Thou shalt not use a computer to steal.
61:The Ten Commandments of Computer Ethics
245:Official (ISC)2 Guide to the CISSP CBK
163:"The Internet and the death of ethics"
161:O'Reilly, Dennis (October 12, 2010).
7:
35:use of computers." They follow the
21:Ten Commandments of Computer Ethics
193:. Sage Publications. p. 116.
14:
139:Barquin, Ramon C. (May 7, 1992).
16:Code for ethical use of computers
322:Ethics of science and technology
248:. CRC Press. November 14, 2006.
111:Leopold, Todd (April 9, 2013).
1:
214:Computer Ethics – Lecture 10
23:were created in 1992 by the
143:. Computer Ethics Institute
358:
29:Computer Ethics Institute
317:Computing and society
327:Professional ethics
349:
332:Codes of conduct
283:
282:
280:
279:
274:
266:
260:
259:
240:
234:
222:
216:
211:
205:
204:
186:
180:
179:
177:
175:
158:
152:
151:
149:
148:
136:
130:
129:
127:
125:
108:
45:King James Bible
41:Ten Commandments
25:Washington, D.C.
357:
356:
352:
351:
350:
348:
347:
346:
342:Internet ethics
307:
306:
292:
287:
286:
277:
275:
272:
268:
267:
263:
256:
242:
241:
237:
223:
219:
212:
208:
201:
188:
187:
183:
173:
171:
160:
159:
155:
146:
144:
138:
137:
133:
123:
121:
110:
109:
105:
100:
63:
17:
12:
11:
5:
355:
353:
345:
344:
339:
337:1992 documents
334:
329:
324:
319:
309:
308:
305:
304:
299:
291:
290:External links
288:
285:
284:
261:
254:
235:
230:2012-07-22 at
217:
206:
199:
181:
153:
131:
102:
101:
99:
96:
95:
94:
91:
88:
85:
82:
79:
76:
73:
70:
67:
62:
59:
15:
13:
10:
9:
6:
4:
3:
2:
354:
343:
340:
338:
335:
333:
330:
328:
325:
323:
320:
318:
315:
314:
312:
303:
300:
298:
294:
293:
289:
271:
265:
262:
257:
255:9780849382314
251:
247:
246:
239:
236:
233:
232:archive.today
229:
226:
221:
218:
215:
210:
207:
202:
200:1-4129-1798-0
196:
192:
185:
182:
174:September 30,
170:
169:
164:
157:
154:
142:
135:
132:
124:September 30,
120:
119:
114:
107:
104:
97:
92:
89:
86:
83:
80:
77:
74:
71:
68:
65:
64:
60:
58:
56:
52:
48:
46:
42:
38:
34:
30:
26:
22:
276:. Retrieved
264:
244:
238:
220:
209:
190:
184:
172:. Retrieved
166:
156:
145:. Retrieved
134:
122:. Retrieved
116:
106:
53:
49:
20:
18:
311:Categories
278:2012-05-22
147:2013-08-17
98:References
43:from the
228:Archived
33:ethical
252:
197:
27:based
273:(PDF)
250:ISBN
195:ISBN
176:2015
168:CNET
126:2015
55:ISC2
19:The
118:CNN
313::
165:.
115:.
47:.
281:.
258:.
203:.
178:.
150:.
128:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.