The Computer Ethics Institute has developed the Ten Commandments of Computer Ethics, located on page 53 of our course textbook. Please read the Ethical Computing Guidelines and provide your feedback on the following questions:
What constitutes ethical behavior while using a computer?
Who would be harmed by violating Guideline 6?
How might someone use a computer to commit theft (Guideline 4)?
Is it ethical to run an online business using Internet resources provided by your school or employer (Guideline 7)? What about Peer-to-Peer file sharing?
Social networking is very prevalent in today's society. What action might be considered unethical using social networking/media?


Answer :

The Computer Ethics Institute's Ten Commandments of Computer Ethics provides a framework for ethical behavior while using a computer.

What are the guidelines?

Some key elements of ethical behavior while using a computer include respecting the intellectual property of others, not using a computer to harm others, and being aware of the potential impact of one's actions on others.

Guideline 6 of the Ethical Computing Guidelines states that "one should not use a computer to steal, to appropriate, or to gain access to other people's intellectual property without their permission." Violating this guideline could potentially harm the person or organization whose intellectual property is being stolen or appropriated.

A person might use a computer to commit theft by, for example, hacking into someone else's online bank account and transferring money from that account to their own. This could be considered a violation of guideline 4, which states that "one should not use a computer to harm other people."

It is generally not considered ethical to run an online business using Internet resources provided by your school or employer, as doing so could potentially strain the resources of the school or organization and interfere with their ability to fulfill their mission.

Similarly, peer-to-peer file sharing is generally not considered ethical, as it can potentially violate the intellectual property rights of others.

In the realm of social networking and media, some actions that might be considered unethical include posting false or misleading information, sharing sensitive or private information without consent, and engaging in cyberbullying or other forms of online harassment.

To Know More About Cyber security, Check Out

https://brainly.com/question/24856293

#SPJ4