Computer Ethics

Thou shalt not snoop around in other people's files: Reading other people’s e-mail messages is as bad as opening and reading their letters: This is invading their privacy. Obtaining other people’s non-public files should be judged the same way as breaking into their rooms and stealing their documents. Text documents on the Internet may be protected by encryption.

Above we can see one of the Ten Commandments of Computer Ethics. Ethics is the identification of certain actions, by judging whether they are appropriate or inappropriate. Depending on the environment moral principles and social standards are different, therefore, as a result of consensus in a given social circle, they may differ. In the early days of computer history, there were no set laws about what could and could not be done online. With the spread of the Internet and computers, access became the norm for everyone. Nowadays, governments have enacted laws regarding Internet crimes. Because of the anonymity on the Internet, I believe that people will never abide by all the ethical laws that have been established in Computer Ethics. 

Big data collects information about users who use applications, websites or programs of any kind. It creates a profile of the user through the activities the user performs on the network. For example, mobile apps when installed on a phone ask for access to various data, such as phone numbers (contacts), names, file names, pictures, etc. Is not this snooping around in other people's files ? We agree on terms, but do we know what it involves?

Comments

Popular posts from this blog

Initial Project Plan (Gantt Chart)

Major Project Theme

Software Functionality