General Computer Ethics


Computer Ethics, by definition, is a concept in ethics that addresses the ethical issues and constraints that arise from the use of computers, and how they can be mitigated or prevented (1)
. On this website, a few of the major issues in Computer Ethics will be addressed and discussed for educational purposes as well as furthering awareness of these topics.

The Ten Commandments of Computer Ethics


When referring to Computer Ethics, one may speak of The Ten Commandments of Computer Ethics. These are a few rudimentary principles that people generally follow when considering whether or not their actions on a computer are ethical. They were designed by The Computer Ethics Institute in 1992 to "guide and instruct people." (2)
. Here are the Ten Commandments:
  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people's computer work.
  3. Thou shalt not snoop around in other people's computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness.
  6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).
  7. Thou shalt not use other people's computer resources without authorization or proper compensation.
  8. Thou shalt not appropriate other people's intellectual output.
  9. Thou shalt think about the social consequences of the program you are writing or the system you are designing.
  10. Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans

Hacking


Hacking is an issue commonly associated with ethics, for the pros and cons of it are widely debated as well as the ethical and non-ethical uses of it. Hacking is the unauthorized intrusion into a computer or a network to accomplish a goal that differs from the original purpose of the system, according to Technopedia (3)
.

In many situations hacking is considered justifiable by many security companies and even the FBI, yet it hacking software is frowned upon for its ability to be used incorrectly. In an article from Vox, the FBI has demanded access to such software for an Apple iPhone, the user under the suspicion of illegal activity. Apple argued that by creating hacked software, they would draw the attention of criminals who would go to great lengths to steal the software and have the ability to steal personal data from millions of Apple devices (4)
. Another reason hacking is unethical is because it is illegal. The Computer Fraud and Abuse act of 1984 is the federal anti-hacking statute that prohibits unauthorized access to computers and networks. It is designed to help prevent crimes through invasion of computers unjustifiably. However, lawmakers wrote the law so poorly that creative prosecutors have been abusing it ever since(5)
. It is these faults in laws that need amendment for they enable people to steal information illegally.

Piracy


Piracy, while similar to hacking, is defined as illegally copying software that does not belong to you in a manner that violates the copyright(6)
. For example, if you wanted to watch a film, and did not have Netflix or the hard copy of the film, you may turn to viewing it on an online free movie website. Films on those sites are usually pirated and therefore unlawful. Piracy may also include other forms of music, art, or copyrighted design. It is a major issue in computer ethics because of the illegality and unfairness towards the creator of the work. The film industry is estimated to lose, in the US alone, $52 billion from people pirating films online by 2022(7)
. This staggering number is directly caused by a sharp increase of piracy in recent years due to the ability to access the internet more easily. Another reason could be the decrease in the cost of Wi-fi due to this seemingly unlimited supply of internet.


Some people see piracy as a means of sharing other peoples work and justify their actions as such. Yet, it is evidently theft, for the creator has not given consent to enable the usage of their work with out appropriate payment. In fact, when watching a film a message such as the one on the left may appear. This is to allow the viewer to understand the consquences of stealing another person's creative property.

Questions


  1. Are the 10 commandments of computer ethics reasonable?
  2. Why hacking not justifiable?
  3. How much money was lost in 2016 from pirating?

Answers


(Answers)

Bibliography


  1. What is Computer Ethics? - Definition from Techopedia. (n.d.). Retrieved February 06, 2018, from https://www.techopedia.com/definition/5499/computer-ethics
  2. Ten Commandments of Computer Ethics. (2018, February 01). Retrieved February 06, 2018, from https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
  3. What is Hacking? - Definition from Techopedia. (n.d.). Retrieved February 06, 2018, from https://www.techopedia.com/definition/26361/hacking
  4. Lee, T. B. (2016, February 26). Here's Apple's best argument against hacking the San Bernardino shooter's iPhone. Retrieved February 06, 2018, from https://www.vox.com/2016/2/26/11118342/apple-fbi-san-bernardino
  5. Computer Fraud and Abuse Act. (2018, January 23). Retrieved February 06, 2018, from https://en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act
  6. What is Piracy? - Definition from Techopedia. (n.d.). Retrieved February 06, 2018, from https://www.techopedia.com/definition/5456/piracy
  7. Piracy to cost TV and film industry US$52bn by 2022. (2017, October 30). Retrieved February 06, 2018, from http://www.nexguard.com/2017/10/30/piracy-cost-tv-film-industry-us52bn-2022/

Picture bibliography


Gardner, E. (2012, May 09). FBI Anti-Piracy Warnings: A Graphical History (Photos). Retrieved February 06, 2018, from https://www.hollywoodreporter.com/thr-esq/fbi-anti-piracy-warnings-over-time-pictures-322495 Dejolde, A. (2014, February 04). The Ultimate Guide to Prevent Hacking. Retrieved February 06, 2018, from http://www.lifehack.org/articles/technology/the-ultimate-guide-prevent-hacking.html Kiprono, E. (2012, May 11). Ksh. 50 Bob Movies Piracy Claims Another Victim - Part I. Retrieved February 06, 2018, from http://fenesi.com/ksh-50-bob-movies-piracy-claims-another-victim-part-i/