computer ethics further research

 Computer ethics could be defined as the moral concept and principle that is essential to be respected when using a computer. Computer ethics does not introduce any new fundamental morals because it holds the concept of moral issues before the computer was advent (Dunlop, 2003). For example, stealing money which was possible before the computer invention. But now hackers can use computers to steal as well. Therefore, it might not be hard to identify what actions are morally acceptable and which not.


There are ten computer commandments regarding the way the computer must and must not be used. For example, the fourth commandment, "Thou shalt not use a computer to steal." It is illegal to rob a bank; it is illegal to steal using a computer. Thus, breaking into a bank system or individuals' network to transfer money or steal data is unethical. Therefore, there are simple but affected strategies that need to be followed to minimize such a thing. For example, installing computer security measures, such as anti-viruses and anti-malware, with making sure to keep it up to date. Another thing is using sophisticated passwords and make sure not to use the same passwords for all accounts (Kehrer, 2014).


 In this post, I want to focus on the second commandment. "Thou shalt not interfere with other people's computer work," meaning that the computer should not be used to disrupt and destroys other's computers. I have chosen this commandment because it has a huge connection to my research. Moreover, malware is malicious software that is designed by hackers. To steal information or harm the system (Masud et al., 2011).  In other words, malware software is being used to interfere with other people's computer work. Therefore, developing malware to cause malware attacks is unethical. As I mentioned in my research, both individuals and companies need to apply several strategies to minimise such a thing. For example, installing anti-malware.


In conclusion, I think that being behind the screen does not mean that we can harm others . Therefore, it is vital to know the ten commandments with making sure to apply it when using a computer. Moreover, as I said in my research, the most important thing is to pay attention before clicking on a link or open an attachment.

 

 

 

 

References :

Dunlop, C., 2003. Computer Ethics. [ebook] West Sussex: John Wiley and Sons Ltd, pp.354–357. Available at: <https://dl.acm.org/doi/10.5555/1074100.1074254> [Accessed 26 October 2020].

 

Kehrer, D., 2014. 10 Ways To Prevent Employee Theft And Fraud. [online] Score.org. Available at: <https://www.score.org/resource/10-ways-prevent-employee-theft-and-fraud> [Accessed 26 October 2020].

 

 Mattei A., T., 2017. Privacy, Confidentiality, And Security Of Health Care Information: Lessons From The Recent Wannacry Cyberattack. [ebook] Elsevier. Available at: <https://www-sciencedirect-com.proxy.library.dmu.ac.uk/science/article/pii/S1878875017309968> [Accessed 26 October 2020].

Comments

  1. Hi

    You should also put comments (couple of comments should be fine) on posts of other classmates to provide them with peer reviews.
    Blog addresses of your peers are on blackboard.

    Many thanks
    Chirag

    ReplyDelete

Post a Comment

Popular Posts