- Ten Commandments of Computer Ethics
The Ten Commandments of Computer Ethics were created in 1992 by the
Computer Ethics Institute . The commandments were introduced in the paper "In Pursuit of a 'Ten Commandments' for Computer Ethics" by Ramon C. Barquin as a means to create "a set of standards to guide and instruct people in theethical use of computers." [ [http://www.brookings.edu/its/cei/papers/Barquin_Pursuit_1992.htm In pursuit of 'Ten Commandments' for Computer Ethics] ] The Ten Commandments of Computer Ethics copies the style of theTen Commandments fromThe Bible and uses the archaic "thou shalt" and "thou shalt not" found in the King James version.The commandments have been widely quoted in computer ethics literature [cite book
title = Ethics in Public Relations: Responsible Advocacy
author = Kathy Fitzpatrick, Carolyn Bronstein
date = 2006
isbn = 1412917980
publisher = Sage Publications
page = p. 116] but also have been criticized by both the hacker community [ [http://www.cmpe.boun.edu.tr/~say/c150/intro/lit10.html Computer Ethics - Lecture 10 ] ] and some in academia. For instance, Dr. Ben Fairweather of theCentre for Computing and Social Responsibility has described them as "simplistic" and overly restrictive. [ [http://www.ccsr.cse.dmu.ac.uk/resources/professionalism/codes/cei_command_com.html CCSR:Commentary on the 'Ten Commandments for Computer Ethics' ] ]The
CISSP — an organization of computer security professionals — has used the commandments as a foundation for its own ethics rules. [ [http://books.google.com/books?id=RbihG-YALUkC&pg=PA79&dq=%22Ten+Commandments+of+Computer+Ethics%22&ei=8LbIR6CSBYuWtgPklZHOAw&sig=CrOkKh0RvVlbBgWrAHiDc-BELqk Official (ISC)2 Guide to the CISSP CBK] ]The Commandments
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear false witness.
6. Thou shalt not use or copy software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you write.
10. Thou shalt use a computer in ways that show consideration and respect.
See also
*
Cyberethics
*Computer ethics
*Hacker ethic sExternal links
* The Ten Commandments of Computer Ethics listed at [http://www.cpsr.org/issues/ethics/cei Computer Professionals for Social Responsibility]
* [http://www.computerethicsinstitute.org The Computer Ethics Institute]
* [http://www.ccsr.cse.dmu.ac.uk/ Centre for Computing and Social Responsibility]References
Wikimedia Foundation. 2010.