lecture-1

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

Lecture1ComputerethicsGoodmorning.DidanyonehearthenewsabouttheteenagerinNewYorkwhohackedintoabank’sdatabaseandstoleabout30,000creditcardnumbersovertheweekend?Hackingisrelatedtocomputerethics.Computerethicsdealswiththeproperuseofinformationtechnology,suchascomputersandtheInternet.Byproperuse,Imeansociallyresponsibleuse.We’llfirsttalkaboutwhatethicalbehaviorisandthenhowthisappliestocomputeruse.Ethicsisaboutrightandwrongoritdealswithmoraljudgment,withwhatisacceptableorunacceptabletodo.Nowwelearnideasaboutwhatisrightandwrongfromourfamilies,ourfriends,andfromtheculturewelivein.Becauseofdifferencesinourbackgrounds,wemaynotalwaysagreeonwhatisrightandwrong.However,forourdiscussiontoday,IwilldefineforyouwhatImeanbyanethicalaction.Anethicalactionissomethingsomeonedoesthatbenefitssomeoneanddoesn’thurtanyone.So,forexample,ifyouseeamandropsomemoneyandyoupickthemoneyupandgiveittohim,thisisanethicalaction.Ontheotherhand,ifyoupickupthemoneyanddon’tgiveitbacktotheman,thisbenefitsyou,buthurtstheman.Thisisnotanethicalaction.Nowwhataboutcomputers?WhataretheethicalboundariesforusingcomputersandInternet?Mostpeopleagreethatitiswrongtostealfromastore.Wouldtheyalsosayit’swrongtocopymusicfilesfromtheInternet?Or,totakeanotherexample,mostpeopleagreethatitiswrongtoopenanenvelopeandreadalettertosomeoneelse.Wouldtheyalsosayit’swrongtoreadsomeoneelse’semail?Inthepastdecadeorso,manymorepeoplehavestartedusingcomputersandtheInternet,sotheseissueshavebecomeimportant.In1992,theComputerEthicsInstitutewasfoundedintheUnitedStates.Thisisaresearch,education,andpolicystudygroupwhosegoalistoincreaseawarenessoftheethicalissuesthatarelikelytocomeupastechnologydevelops.OneconcepttheComputerEthicsInstitutehasdevelopedistheTenCommandmentsofComputerEthics.TheserulesareimportantguidelinestheInstitutethinksallcomputerusersshouldfollow.NowsomeofyoumaybefamiliarwiththeTenCommandmentsfromtheBible,like,uh,“Thoushaltnotkill.”or“Thoushalthonorthyfatherandthymother.”TheTenCommandmentsofComputerEthicshavebeenwritteninthesamestyleoflanguageusedintheTenCommandmentsfromtheBible.Forexample,theyusethephrase“Thoushaltnot”,“Thoushaltnot”means“don’t”or“youshouldn’t”.Let’slookateachcommandmentorrule.Thefirstcommandmentsays:Thoushaltnotuseacomputertoharmotherpeople.Simpleenough,right?NumberTwo:Thoushaltnotinterferewithotherpeople’scomputerwork.Iinterpretthistomeandon’tuseacomputerinanywaythatwillaffectorchangetheworksomeoneelseisdoing.Don’tmoveoreditsomeoneelse’sfileswithouttellingthem.NumberThree:Thoushaltnotsnoopinotherpeople’sfiles.Tosnoopmeanstotrytofindoutsomethingwithoutanotherpersonknowingit.Ifyoulookatsomeoneelse’sfilesonthecomputerorreadtheiremail,you’resnooping.Respectotherpeople’sprivacy.NumberFour:Thoushaltnotuseacomputertosteal.TherearesituationsontheInternetinwhichyouhavetodecideifyouarestealingornot,likedownloadingmusicfiles,asImentionedearlier.NumberFive:Thoushaltnotuseacomputertosaythingsthatareuntrue.Itisuptoyoutobetruthfulinyourwebsite,inyoure-business,andinyouremail.NumberSix:Thoushaltnotusesoftwareforwhichyouhavenotpaid.Inotherwords,ifthesoftwareisfreeontheInternet,it’sokaytodownloadanduseit.However,itisnotokaytocopysoftwarefromafriend,becauseyoudidn’tpayforit.NumberSeven:Thoushaltnotuseotherpeople’scomputerresourceswithouttellingthem,orwithoutpayingthem.Forexample,youshouldn’tusesomeoneelse’scomputer,password,orInternetconnectionwithoutaskingthemfirst.NumberEight:Thoushaltnotappropriatesomeoneelse’sideas.Appropriatemeanstotakewordssomeoneelsewroteandsaythey’reyours.Uh,forexample,youhavetowriteareportforschool.IfyoucopyatermpaperfromtheInternetandhanditin,you’rebreakingtherule.CopyingevenafewsentencesofftheInternetandpresentingthemasyourownisbreakingtherule.NumberNine:Theninthcommandmentsays:Thoushaltthinkaboutthesocialconsequencesoftheprogramyouarewriting.Now,thisappliesmostlytocomputerprogrammers.Socialconsequencesmeanshowtheprogramyou’rewritingmightaffectothersinsociety.Couldhackerspossiblyuseyourprogramtoillegallygainaccesstoacomputersystem?Skillfulhackerscanhackintobanksandintocreditcardcompanies;theycanalteraccountsandstealmoney.Theycanalsocreatevirusesthatcancausebillionsofdollarsofdamageworldwide.NumberTen,Thetenthcommandmentsays:Thoushaltalwaysuseacomputerinwaysthatarerespectfulofothers.Forexample,sendingunfriendlyemailtosomeoneoraboutsomeoneorcreatingwebsiteswithnegativemessagesareexamplesofbreakingthisrule.OK,theComputerEthicsInstitutehassenttheseguidelinestomanylargecompaniesandtoschoolsacrosstheUnitedStates.However,there’snowaytoenforcetheserules.Nevertheless,theywouldliketoseeschools,inparticular,utilizetheserulestohelpstudentsdevelopastrongsenseofcomputerethics.Well,therearealotofrules,buttheyallboildowntoacoupleofprinciples:respectandfairness.Respectwhatbelongstoothersanduseresourcesfairly.Nowlet’sgobacktoethics.Nowincreasingly,schoolsareseeingthatstudentsneedtobetaughtcomputerethicsaspartoftheschoolcurriculum.Someschoolshavecomeupwithacceptable-usepolicies,orrulesaboutwhatisorisn’tOKforstudentstodoregardingcomputeruse.ThisishowtheComputer

1 / 2
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功