Chapter 4 Web Assignment ETHICS IN BUSINESS WEB ASSIGNMENT

Chapter 4 Web Assignment ETHICS IN BUSINESS / WEB ASSIGNMENT WEB SITE:? http://www.scu.edu/ethics/publications/iie/v1n2/thinking.html Instructions: Go to the?web site?listed above and you will find an article posted on the Web site for the Markkula Center for Applied Ethics at Santa Clara University in Santa Clara, California. The article, entitled \"Thinking Ethically,\" appeared in Volume 1, Number 2, of the Issues in Ethics journal. Read the article and answer the following questions: 1. What do the authors describe as the first step in analyzing moral issues? Why is this important? 2. Describe the \"utilitarian\" approach to ethical reasoning. How should one analyze an ethical issue using the utilitarian approach? 3. Describe the approach to ethical reasoning that is rooted in the philosophy of Immanuel Kant and other philosophers with similar views. What are 4 of the basic rights of human beings according to this approach? 4. Describe the \"fairness\" or \"justice\" approach that has its roots in Aristotelian thought. What is the basic moral question in this approach? 4. The article summarizes these three approaches to ethical decision making and lists three questions that should be asked when trying to resolve a moral issue. What are these questions?

Solution

Below are the ten commandment of computer ethics with example :

1) Thou shalt not use use a computer to harm other poeple :

- Do not use the computer in ways that harm other people, it suggest that it is unethical to use a computer to harm another user. It is like harming or corrupting other users data or files.

Example : sending virus in order to hack personal information and exposing to the others.

2) Thou shalt not interfere with other people\'s computer work .

- Do not use computer technology to cause interference in other user\'s work, computer software can be used in ways that disturbs other users or disrupt their work. Viruses for example are program meant to harm useful computer programs or interfere with the normal functioning of a computer.

Example : Deleting friends essay document and saying i was just playing.

3) Thou shalt not snoop around in other people\'s computer files :

- Do not spy on another person\'s computer data, We know it is wrong to read someones personal letters. On the same lines, it is wrong to read someones else email message or files.

Example : Looking for students grades from the teacher computer.

4) Thou shalt not use a computer to steal :

-Do not use computer technology to steal information, stealing sensitive information or leaking confidential information is as good as robbery.

Example : Taking someones personal information or idea to use without any approval, or let say It is wrong to acquire personal information of employees from an employee database or patient history from hospital database or other such information that is meant to be confidential.

5) Thou shalt not use a computer to bear false witness :

- Do not contribute to the spread of misinformation using computer technology, Being involved in the circulation of incorrect information is unethical. This also means that false news or rumours can spread through social networking sites or emails.

Example : Posting something like \" He or she did ....\" without any proves.

6) Thou shalt not copy or use proprietary software for which you have not paid :

- Refrain from copying software or buying pirated copies, pay for software unless it is free.

Example : cracking demo program and using it forever.

7) Thou shalt not use other peoples computer resources without authorization or proper compensation :

- Do not use someone else computer resources unless authorized to, multi-user systems have user specific passwords, Breaking into some other user password, thus intruding his/her private space is unethical.

Example : Using site\'s information and publishing a book without the source to earn benefit.

8) Thou shalt not appropriate other people intellectual output.

- It is wrong to claim ownership on a work which is the output of someone else intellect, Programs developed by a software are her property. If he is working with an organization, they are the organization property. Copying them and propagating them in one\'s own name is unethical.

Example : Posting new movie that just came out on youtube

9) Thou shalt think about the social consequences of the program you are writing or the system your are designing

- Before developing a software think about the social impact it can have

Example : Making program that can spy on other people computer

10) Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans

Chapter 4 Web Assignment ETHICS IN BUSINESS / WEB ASSIGNMENT WEB SITE:? http://www.scu.edu/ethics/publications/iie/v1n2/thinking.html Instructions: Go to the?we
Chapter 4 Web Assignment ETHICS IN BUSINESS / WEB ASSIGNMENT WEB SITE:? http://www.scu.edu/ethics/publications/iie/v1n2/thinking.html Instructions: Go to the?we

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site