CS 192-Computer Ethics & Tech. Manual Preparation

Ambitions in Life as a Computer Science Student

Friday, December 16, 2011

Module 6 - If you are to choose your top 3 difficult-to-follow computer ethics commandments, what are these? Explain why.

If I were to choose top three computer ethics commandments that are difficult-to-follow, these would be the following:

·        Thou shalt not snoop around other people’s files.

 This is because sometimes, my curiosity would really come out and so making me snoop and browse on other people's file. But as of now; I am trying myself not to do this thing anymore since I know that this act is unethical.

·        Thou shalt not use or copy software for which you have not paid.

As a student, sometimes we have to do this because of the need to have one. Since we cannot still afford to buy the licensed one, but little by little I'm trying hard to adapt and have the Open Source Software.

·        Thou shalt not use other people’s computer resources without authorization.

  Sometimes, I use computer resources from other people without asking them first permission if I can do so. But now, I see to it that I ask them first to show respect.

 



Module 6 - Suppose you are to add 2 more commandments to the existing 10 commandments of computer ethics, what are these? Are these 2 new commandments of equal importance to the existing ones? Discuss.

1. Thou shalt use the computer for the purpose of benefiting others by making their works easy and not the other way around.
2. Thou shalt not use computer to engaged in any computer-related crimes.

Module 6 - What is ransomware? Which of the 10 computer ethics commandments is/are violated by ransomware?


Ransomware is a type of  malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm. (http://whatis.techtarget.com/definition/0,,sid9_gci1180020,00.html)
The computer ethics commandments which are violated by ransomeware are the following:

·        Thou shalt not use a computer to harm other people.

·        Thou shalt not interfere with other people’s computer work.

·        Thou shalt not use a computer to steal.

·        Thou shalt not appropriate other people’s intellectual output.

·        Thou shalt use a computer in ways that show consideration and respect.