...1. Thou shall not use a computer to harm other people. Example: A person should do something which could cause any type of harm to others like cyber bullying, publishing false information about a person, harassment, etc. 2. Thou shall not interfere with other people's computer work. Example: I believe this could mean two things - the first one being that one should not develop programs or systems which could cause damage to a persons computer and disable it from fully functioning, such as malicious viruses and spreading them. Secondly, this commandment could mean that a person should not modify a persons work and shouldn't snoop around in it. 3. Thou shall not snoop around in other people's computer files. Example: If a person is logged into a website and you happen to be using the computer, it would be polite to log out. Also, one should never browse through a persons email, data and/or files (pictures, documents, etc.) without exclusive permission from the other person whom it belongs to. 4. Thou shall not use a computer to steal. Example: Although unethical, it is also unlawful to steal in any way shape, form or fashion. This would include, computer-hacking with the intent of secretly collecting personal information or running scams in order to benefit while conning the victim. Piracy is also a form of stealing which should be avoid. 5. Thou shall not use a computer to bear false witness. Example: To “bear false witness” is to lie, so a person should...
Words: 654 - Pages: 3
...be used as guidelines for generating an ethical culture. Ethics also refers to the specific values, standards, rules, and agreements people adopt for conducting their lives. Among the many facets that comprise the total human experience, ethical frameworks mold and shape the character and the conduct of each individual within both their personal and professional lives. There are many sets of rules that attempt to define and regulate ethical behavior. Religions based in Judeo-Christian tradition have the Ten Commandments (Exodus 20), which are: 1. I am the Lord, your God. 2. Thou shall bring no false idols before me. 3. Do not take the name of the Lord in vain. 4. Remember the Sabbath and keep it holy. 5. Honor thy father and thy mother. 6. Thou shall not kill. 7. Thou shall not commit adultery. 8. Thou shall not steal. 9. Thou shall not bear false witness against your neighbor. 10. Thou shall not covet your neighbor's wife (or anything that belongs to your neighbor). Other faiths have codes similar to the Ten Commandments. Many include the worship of a specific deity, but they often can be summed up by the simple but powerful “Golden Rule” which essentially is: “Do unto others as you would have them do unto you.” This concept was integrated into Christian thought. As Puka (n.d.)...
Words: 290 - Pages: 2
...1. Thou shall not use a computer in ways that may harm people. The commandment of Computer Ethics states that it is dishonest to use a computer or other smart devices in practices like hacking, spamming, phishing, piracy or cyber bullying. It is unethical to use computer for accessing private files in order to steal information and use it in harmful matters. Similarly, it is unethical to design programs or applications that lead to unsolicited and unauthorized access to personal data. Designing harmful programs and using applications to manipulate and destroy information is wrong and, in many cases, illegal. Nowadays, almost everyone is accessible online, constantly inputting and downloading information. Facebook, Tweeter and Instagram are perfect examples of people sharing everyday data about their lives and exposing themselves to others. With ease of finding information, we are all widely exposed to fraud, cyber-stocking and cyber-bulling. Unfortunately, such exposure may lead not only to mental, but also physical pain, resulting in suicidal or bullied teenagers, silly prank makers and sexual criminal charges of a promising Texas college student. In my opinion, people should get educated on how to use a computer and protect themselves online. Just like it is not a common practice to leave an unlocked car parked on a busy street with a ”key inside” note on a window, it shouldn’t be that easy to record personal information online for everyone to see, share, misuse or judge...
Words: 1524 - Pages: 7
...ETHICS from the Computer Ethics Institute 1. Thou shall not use a computer to harm other people. * Follow the Golden Rule * Do not be offensive. Follow the moral standards that guide your everyday life. 2. Thou shall not interfere with other people’s computer work. * Do not tamper with other people’s computer settings, folders, and files. * Generating and consciously spreading computer viruses is unethical. 3. Thou shall not snoop around in other people’s files. * Respect other people’s privacy. * Hacking, spyware * Obtaining other people’s non-public files (e.g. letters, documents) 4. Thou shall not use a computer to steal. * Using a computer to break into the accounts = robbery. * Use and respect the use of passwords * Cyber crimes, e.g. identify theft and illegal use of personal accounts (i.e. Internet access, email account, financial accounts) 5. Thou shall not use a computer to bear false witness. * Maligning or spreading untruths * Always check the reliability of your information 6. Thou shall not use or copy software for which you have not paid. * Observe Copyright Laws. Anti-Piracy. * Cracking registration codes. * Shareware vs. Freeware 7. Thou shall not use other people’s computer resources without authorization. * Common courtesy: get permission * Authorization system/hierarchy for multi-user systems 8. Thou shall not appropriate other people’s intellectual output...
Words: 692 - Pages: 3
...Barquin (1992), cyber ethic guidelines consist of Ten Commandments which are: (1) Thou shall not use a computer to harm others, (2) Thou shall not interfere with others computer work (3) Thou shall not snoop around in others computers files, (4) Thou shall not use computer to steal, (5) Thou shall not to bare fall witness, (6) Thou shall not copy or use proprietary software you have not paid for, (7) Thou shall not use others computers resources without authorization or proper compensation, (8) Thou shall not appropriate other people’s intellectual property, (9) Thou shall think about the social consequences of the program you are writing or the system you are designing (10) Thou shall use a computer in ways that ensure consideration and respect for your fellow humans. These commandments or rules need to be obeyed by everyone who utilizes the cyber space facility in order to maintain the tranquility of cyber world. However, not everyone concern about these rules as we seen nowadays. In order to prevent plague from spreading and become worse in future, we have to identified the root cause of the problem and define how to solve it. The first commandment explained that it is not ethical to harm another user by using computer and it is not limited to physical injuries but also harming or damaging other user data or files. It is unethical to create a programmed that deliberately allows someone to steal, copy, or gaining unauthorized access to others data. The waywardness to this...
Words: 3045 - Pages: 13
...2700 B.C., the epic of Gilgamesh is about Gilgamesh, king of Uruk. Gilgamesh was a cruel ruler of Uruk. He starts his progression to change when he meets Enkidu, who is half God, half animal. They go on a journey in which Gilgamesh changes spiritually, mentally, and physically. Throughout this epic, it shows death and the fear of death, gateways or openings, and the role of the serpent. Death and the fear of death is seen many times throughout the epic of Gilgamesh. From the death of Humbaba to Gilgamesh’s own death, its seen a lot. Death is inevitable. It’s no way to avoid it. Everyone dies. “And the Lord God commanded the man, saying, Of every tree of the garden thou mayest freely eat: But of the tree of the knowledge of good and evil, thou shalt not eat of it: for in the day that thou eatest thereof thou shalt surely die.” (Genesis 2;16-17 King James Version). What Gilgamesh was seeking throughout this journey was immortality. When the journey was complete, he finally realized that death is inevitable and is bound to happen. Throughout the epic of Gilgamesh, there were many gateways or openings. From Gilgamesh and Enkidu’s journey through the forest to Gilgamesh’s journey to the underworld, these were all openings to a new chapter in Gilgamesh life one way or another. One eample of an opening in the epic of Gilgamesh is when Gilgamesh went to the underworld in search for Utnpishtim to grant him everlasting life, only to return to Uruk and eventually dying. Study the...
Words: 1016 - Pages: 5
...lead them to the promise land. The Ten Commandments are laws for the Judaism religion. The Ten Commandments are in the Torah which is in the tanakh. A tanakh is a biblical Hebrew bible. The first commandment listed in the Torah is “I am the Lord, your God” which means worship one God. The second commandment is “Thou shall not bring no false idols before me” which means put no one or thing before God. The third commandment is “Do not take the name of the Lord in vain” which means don’t misuse the Lord’s name. The fourth commandment is “Remember the Sabbath and keep it holy” which means the seventh day to rest from our work and worship him. The fifth commandment is “Honor thy father and thy mother” The sixth commandment is “Thou shall not kill/murder” which means don’t kill anyone. The seventh commandment is “Thou shall not commit adultery” which means do not have relations with someone outside of your marriage. The eighth commandment is “Thou shall not steal” which means don’t take something that does not belong to you. The ninth amendment is “Thou shall not bear false witness against your neighbor” which means do not falsely accuse anyone. The tenth amendment is “Thou shall not cover your neighbor’s wife (or anything that belongs to your neighbor)” which means do not envy what someone else has (“The Ten...
Words: 843 - Pages: 4
...ABE School of Business Main Campus, Manila A Research Presented to Mr. Arnel A. Cueto Instructor In Partial Fulfillment of the Requirements for the Subject Computer Ethics Perspectives Presented By: Patrick Troy R. Luberio Meghan Magcuro Jeffrey b. Santos Xavier Ray C. Yunzal Nichael Bonn S. Corpus August 2014 Time: 4:00-9:00PM Introduction In the industrialized world computers are changing everything: from education to health, from voting to making friends or making war. Developing countries can also fully participate in cyberspace and make use of opportunities offered by global networks. We are living a technological and informational revolution. It is therefore important for policy makers, leaders, teachers, computer professionals and all social thinkers to get involved in the social and ethical impacts of this communication technology. The origins of computer ethics can be traced to the 1940s to the time at which cybernetics and digital computers were first developed. These developments prompted Wiener (1948) to recognize both the good and evil inherent in these artificial machines. Since then, attempts have progressively been made to explore computer ethics from a variety of perspectives including that of computer ethics as not a real discipline, as a pedagogical methodology, as a unique discipline, as applied ethics, and as employing information ethics as the foundation of computer ethics the increasing integration of information and...
Words: 1236 - Pages: 5
...Email Assignment |Last Name: Venturino, Jennifer| To complete this Assignment, you will need to use your MyPMI Mail address. If you have not already set up your MyPMI Mail address, please review the Setting up your MyPMI Mail account[->0] document. Complete the tasks below. 1. Type your answer to each question below directly underneath the question. You can look up answers online if you don’t know them.a) Do you have a Facebook account? Why or why not? (1 point)Yes I do have a facebook accountb) List two of the ten commandments of computer use and describe how they could be broken. (4 points) Thou shall not use a computer to steal , thou shall not use a computer to harm people. Breaking them would be to steal through a computer like fraud , harming people with malicious intent would be another broken rule. c) What is a wiki? (1 point) A web site that allows collaborative editing of its content and structure by its usersd) What is a blog? (1 point) A updated website or web page e) What is Pinterest? (1 point) A free website that requires registration to usef) What are the things you need to connect to the Internet? (3 points) A computer, a wifi location g) Why is a wiki or blog not a good source of information for a research paper? (2 points) Anyone can publish a blog on the internet, there is no way to know credentials .h) Define the term Web 2.0 and give two examples of it.(3 points)the second stage of the world wide web . Online banking, digital photo processing2. Once you...
Words: 392 - Pages: 2
...THE SONNETS OF WILLIAM SHAKESPEARE Click here to jump to the Table of Contents COPYRIGHT © 1993 by Adobe Press, Adobe Systems Incorporated. All rights reserved. The actual sonnets of William Shakespeare are public domain. The design and electronic implementation of this book, however, are copyrighted. Reproduction of this electronic work beyond a personal use level, or the display of this work for public consumption or viewing requires prior permission from the publisher. This work is furnished for informational use only and should not be construed as a commitment of any kind by Adobe Systems Incorporated. Adobe Systems Incorporated assumes no responsibilities for any errors or inaccuracies that may appear in this work. The software and typefaces mentioned on this page are furnished under license and may only be used in accordance with the terms of such license. Adobe, the Adobe Press logo, Adobe Acrobat, and Adobe Photoshop are trademarks of Adobe Systems Incorporated which may be registered in certain jurisdictions. This work is electronically mastered in Adobe™ Acrobat™. Text was composed in Minion, 13-point. Illustrations were scanned electronically then manipulated using Adobe Photoshop™. CONTENTS I II III IV Copyright How to Use This Book Introduction Numerical First-line Index Alphabetical First-line Index The Sonnets of William Shakespeare V VI Click any line to jump to that section HOW TO USE THIS BOOK • Click the Bookmarks and Page button...
Words: 21393 - Pages: 86
...Punishment Research Paper Desmarie Guyton SOC/120 December 8, 2013 Dr. March Punishment Research Paper Commandments or laws has been put in place since early BC addressing human behavior, even those that resulted in crime. Commands like thou shall not kill or thou shall steal were put in place to keep order among the people, to prevent any unethical behavior as well as to protect the person who does the crime and make sure that they were offered a fair trial. Within those trials, punishment was the result of those actions which would sometimes resulted in lashes, (a practice by the Romans) exiled to another place or prison, and even death, which still rang true today. According to Macionis (2011) criminal law was the result of criminal behavior is a matter that has been addressed and grounded in the first 10 commandments of the U.S. Constitution adopted into congress in 1791. These laws also offered protection to people who were charge with a crime, which is also referred to as due process. This help to make sure that the people individual rights were protected at the time a trial and the governments’ power was not bias as a result of what the person was accused of. However, if the accusers end result of the trial was guilty, then a punishment was given which reflected the crime. There are four types of punishments that is utilized in our court system today; retribution, deterrence, rehabilitation and societal protection, which some go hand and hand, and...
Words: 471 - Pages: 2
...Jenna Erickson BIBL 104-D13 04/17/2015 Old Testament Bible Dictionary Project: Exodus/Moses/Sinai Exodus: Exodus is the second book of five in the Pentateuch or Torah of the Old Testament. It is also the second book in the Hebrew Bible, and is known as V’elleh Shemoth, while in the Greek Bible it is known as Exodus, meaning “departure” or “outgoing”. Moses is believed to be the author of Exodus, and it was most likely written during the forty years of wandering in the wilderness, between 1451 and 1491 BC. Then the Lord said to Moses, “Write this as a memorial in a book and recite it in the ears of Joshua, that I will utterly blot out the memory of Amalek from under heaven” (Exodus 17:14). The main themes of Exodus is God’s covenant with the Hebrew nation, and Moses leading the departure of the Israelites out of Egypt. “And God heard their groaning, and God remembered his covenant with Abraham, with Isaac, and with Jacob. God saw the people of Israel—and God knew” (Exodus 2:24-25). A brief summary of Exodus would include the beginning chapters about; the enslaved Israelites, the birth, education and first leaving of Moses, the 10 plagues set about by God, the first Passover, the Israelites departure (Exodus) from Egypt along with the parting of the Red Sea, and the destruction of the Egypt Army. The middle of the book includes; the journey to Mt. Sinai from the Red Sea, the making of the covenant at Sinai and the writing of the Ten Commandments. And the Lord said to Moses...
Words: 1120 - Pages: 5
...gayer hours She has a voice of gladness, and a smile And eloquence of beauty, and she glides Into his darker musings, with a mild And gentle sympathy, that steals away Their sharpness, ere he is aware. When thoughts Of the last bitter hour come like a blight Over thy spirit, and sad images Of the stern agony, and shroud, and pall, And breathless darkness, and the narrow house, Make thee to shudder, and grow sick at heart;-- Go forth under the open sky, and list To Nature's teachings, while from all around-- Earth and her waters, and the depths of air,-- Comes a still voice--Yet a few days, and thee The all-beholding sun shall see no more In all his course; nor yet in the cold ground, Where thy pale form was laid, with many tears, Nor in the embrace of ocean shall exist Thy image. Earth, that hourished thee, shall claim Thy growth, to be resolv'd to earth again; And, lost each human trace, surrend'ring up Thine individual being, shalt thou go To mix forever with the elements, To be a brother to th' insensible rock And to the sluggish clod, which the rude swain Turns with his share, and treads upon. The oak Shall send his roots abroad, and pierce thy mould. Yet not to thy eternal resting place Shalt thou retire alone--nor couldst thou wish Couch more magnificent. Thou shalt lie down , With patriarchs of the infant world--with kings The powerful of the earth--the wise, the good, Fair forms, and hoary seers of ages past...
Words: 1218 - Pages: 5
...Art Commission Statement #10/Ten Commandments Statue Upon examining the Judaic and Christian faiths one may find there are more differences than simulations between these two, but both base their beliefs on recognizing the existence of one God. This paper will reflect a discussion of the commissioning of a #10 statue, which represents the Ten Commandments, in which the team will place in the foyer of the new Christian and Jewish Interfaith Cultural and Historical Center. This commission proclamation will show how the sculpture characterizes past and current developments pertaining to ethnic patterns and world events in Christianity and Judaism. Team A will elaborate on why the statue is appropriate for placement in the Christian and Jewish Interfaith Cultural and Historical Center’s lobby. The commission proclamation will reflect the team’s belief in how the #10 statue displays the Jewish and Christian concept of man’s connection to nature, and one’s connection to the world and Yahweh. Team A will also examine the worth of commissioning the #10 statue for the foyer, how the figure is anticipated to improve the physical, intellectual, and environments as well, as how the #10 statue exemplifies various aspects of the new Cultural and Historical Center. Judaism and Christianity: World Developments and Cultural Patterns - Past and Present The #10 statue represents how agreement with and adherence to the Ten Commandments has been a prominent feature of both Christianity and...
Words: 1337 - Pages: 6
...Week 1 Reflection Paper Thou shall not kill! Thou shall not steal! Two of the most universally accepted “laws” which have been handed down over the years. These are called Natural Laws which “refer to a body of principles and rules imposed upon individuals by some power higher than man-made law and therefore considered to be uniquely fitting for and binding on any community of rational beings.” (Inciardi, 2010) Natural Laws are the building blocks of the modern criminal justice system. The Code of Hammurabi is a perfect example of Natural Law effecting the legal system. Most of the current code of laws are based on the Code of Hammurabi since the Code of Hammurabi is the first known legal document. The Code of Hammurabi is most notably remembered for the “eye for an eye, tooth for a tooth.” It gives a crime and the punishment for the crime. Many of the 282 crimes are Natural Laws passed on from religious texts. Most industrialized countries have laws that cover the basic Natural Laws in their criminal justice system. The basis of modern society can also be traced back to Natural Laws. If a person commits the offense of rape, murder, or any other of the many violent crimes, then he or she is held accountable and punished accordingly to that crime. It generally does not matter what country you were in if you commit one of these crimes. In the end, it is generally met with a harsh punishment for a heinous crime. In a nut shell, Natural Laws are religious principles...
Words: 392 - Pages: 2