Ethical Use of Computers

Ethical Use of Computers in United States

Ethical Use of Computers

Overview of Ethical Use of Computers in relation to cyber crime: [1] The first users of computers faced many unprecedented challenges having to do with network access along with the use and exchange of data. As computer use and complexity increased, opportunities arose that allowed even more and comparatively unrestricted access to information via the Internet. Over time users were empowered with newer technologies and also were conditioned to access and respond to information in a variety of ways, according to their own interests, often with little adult or managerial oversight. Consider the modern practice of ”flaming” that occurs when people disrespectfully interact with each other online. Frequently this happens when a person comments or posts something in a defamatory, insulting, or hostile manner about another person or organization only to have it negatively reacted to. Such online ”shouting” can disrupt chat forums, blogs, and other online community exchanges, causing emotional harm or worse to people or organizations involved or named.

Resources

Notes and References

  1. By Andrew Perry

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Bynum, Terrell Ward, and Simon Rogerson. (2003). Computer Ethics and Professional Responsibility. New York: Wiley-Blackwell Publishing; Computer and Technology Ethics Case Studies at Vanderbilt University Center for Ethics Web site: http://www.vanderbilt.edu/CenterforEthics/cases.html; Computer Usage Policy of the University of Virginia Web page: http://itc.virginia.edu/policy/ ethics.html; Computer Professionals for Social Responsibility Web site: http:// www.cpsr.org/issues/ethics/cei; Editorial Board of the Stanford University Encyclopedia of Philosophy (2001 onward), at http://plato.stanford.edu/board.html; Johnson, Deborah G. State of New Jersey Department of Education Web site: http:// www.nj.gov/education/techno/htcrime/info.htm.


Posted

in

,

by

Tags: