Computer Ethics
The tremendous growth in information technology has contributed to the emergence of computer ethics. The creation of the ten commandments has reduced the rate of malicious acts. Nowadays, computers are a significant source of ethics abuse (Weckert, 2007). Social responsibility should be applied to ensure that commandments such as software piracy, stealing, and unauthorized access to computer resources are not violated when using computers.
In the cyber world, copying software without buying it is a violation of computer ethics. Therefore, the employee violated the sixth commandment since the software used was not paid. Creating new software is a challenge due to the high costs and time needed; therefore, the violator should be jailed and terminated (Conrad, Misenar, & Feldman, 2016). Since the software is intellectual property, an individual should ensure that they pay before using it to avoid violating the sixth law.
Assessing a computer lab without permission is unethical behavior. The two students violated the seventh law that emphasizes proper computer resources compensation because the student entered the lab without permission (Conrad, Misenar, & Feldman, 2016). Therefore, the two students should be punished. Authorization of computer resources is essential according to the seventh commandment since valuable information is compromised.
Stealing and snooping around people’s information is a violation of computer ethics. The teller violated the third rule by illegally spying the customer’s account to transfer money. He also broke the fourth commandment by using a computer to steal money from the customer (Conrad, Misenar, & Feldman, 2016). The manager of the bank should fire the teller. Spyware is used to access people’s finances, and this act is misconduct to computer ethics.
Computer ethics mitigation has enabled people’s conduct to be evaluated to protect sinful interests such as stealing, software piracy, and unauthorized access to computer resources. Most people depend on computers to run operations in finance, businesses, and social institutions; hence computer ethics should be obeyed to ensure there are no violations.
References
Conrad, E., Misenar, S., & Feldman, J. (2016). Eleventh Hour CISSP (3rd ed.). Syngress.
Weckert, J. (2007). Computer Ethics. Routledge.