Strategic Promoting Management Task 2011-2012 Subject: Caf? sobre Coral 21905F/4B Cheung Ho Tang Lau Wing Sze Leung Wing…...Read
The Ten Tips of Computer system Ethics
1) Thou shalt not make use of a computer to harm other people:
In case it is unethical to harm persons by making a bomb, for example , it is evenly bad to create a program that handles the timing from the bomb. Or perhaps, to put it more simply, when it is bad to steal and ruin other people's books and notebooks, it is evenly bad to reach and destroy their data files. 2) Thou shalt certainly not interfere with other people's computer operate: Computer malware are tiny programs that disrupt other people's computer work by eliminating their data, taking vast amounts of15506 computer period or memory, or simply by displaying frustrating messages. Generating and intentionally spreading laptop viruses are unethical function. 3) Thou shalt not snoop around in other people's files:
Reading other people's e-mail communications is as negative as starting and studying their letters: This is entering their privateness. Obtaining other's non-public data files should be evaluated the same way as breaking into their rooms and stealing their particular documents. Textual content documents for the Internet could possibly be protected by simply encryption. 4) Thou shalt not make use of a computer to steal:
Using a computer to break into the accounts of a firm or a traditional bank and copying money needs to be judged the same way as robbery. It is illegitimate and there are rigid laws against it. 5) Thou shalt not make use of a computer to deal with false experience:
The net can distributed untruth as fast as it can spread truth. Creating false " information" to the world is definitely bad. As an example, spreading false rumors of a person or perhaps false divulgacion about historic events is wrong. 6) Thou shalt not work with or duplicate software for which you have not paid out: Software is an intellectual item. In that way, it can be like a publication: Obtaining illegitimate copies of copyrighted applications are as poor as copying a copyrighted book. You will find laws against both. Information about the copyright owner can be inlayed by a process calledВ watermarking in to pictures in the...