COMPUTER ETHICS
If you are to choose your top 3 difficult-to-follow computer ethics commandments, what are these? Explain why.
Listed below are my top 3 difficult-to-follow computer ethics commandments:
1. Thou shalt not use or copy software which you have not paid.
It is really hard to follow this commandment for the reason that copyrighted software are very expensive and I can't afford to buy it but can be very useful with regards to my studies and other matters.
2. Thou shalt not snoop around other people's files.
Sometimes it just can't be help not to snoop other people's files because I'm just being curios. Human as we are, we get tempted some time.
3. Thou shalt not appropriate other people's intellectual output.
We need some resources or ideas from the people found in the internet. We use it and sometimes rephrasing it to claim as our own.
Suppose you are to add two more commandments to the existing commandments of computer ethics, what are these? Are these 2 new commandments of equal importance to the existing ones? Discuss?
If I were to add two more commandments of computer ethics that will be:
Commandment # 11: Thou shalt use computer resources in the exercise of virtue.
Commandment # 12: Thou shalt not use the computer in any form of crime.
These two commandments are of equal importance to the existing 10 commandments of computer ethics, it is still encouraging to make use the computer in good reason and in good way.
What is ransomware? Which of the 10 computer ethics commandments is/are violated by ransomware?
Ransomware are computer malware that holds victim's computer system, attackers encrypt files and demands for payment in case the victims ask to restore and ask for the decryption key of the files.
The ransomware clearly violated the following commandments of computer ethics :
1. Thou shalt not use computer to harm other people.
2. Thou shalt not interfere with others people's computer work.
3. Thou shalt not snoop around other people's files.
4. Thou shalt not use a computer to steal.
Ransomware do steal other people computer files and it do harm the victim because it ask and demands for payments from them.
No comments:
Post a Comment