Computer Ethics FELIX CHING CAPSTONE I OCTOBER 2
Computer Ethics FELIX CHING CAPSTONE I – OCTOBER 2 ND, 2007
ACM Ethic Code emphasis professional responsibilities toward clients and employers, assignments, and people. Some ethic codes include: An ACM member shall act faithfully on behalf of his employers or clients. An ACM member shall preface any partisan statements about information processing by indicating clearly on whose behalf they are made. An ACM member shall properly qualify himself when expressing an opinion outside his areas of competence. A member is encouraged to express his opinion on subjects within his area of competence.
IEEE Code of Ethics In general, IEEE’s codes of ethics aim at self- perfection, professional attitude, technology advancement, and cooperation with others. Some IEEE’s Code of Ethic: to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist. to be honest and realistic in stating claims or estimates based on available data. to reject bribery in all its forms to improve the understanding of technology, its appropriate application, and potential consequences.
Common ethics and responsibilities “Just because you can, doesn’t make it right” Internet created a lot of freedom, including the freedom to do harm to others. Just because internet created the opportunities doesn’t mean the opportunities are ethical. “Those are real people out there” When immersed in the world of cyberspace and only sees words and texts, people tend to forget that on the other side of the computer are real people as well. “Respect the privacy of others” Global internet allows people to access information much easier than before. The information includes personal information, and other users’ personal information. Everyone has the right to privacy; do not access other’s information without legal permission.
- Slides: 4