Computer Ethics
Computer Ethics is described as knowing the difference between right and wrong based on the approved standards of social and professional behavior. Are you choosing to do what is right?
1. Describe what the article is about? (Explain in full detail)
2. Are you securing private information and following the rules of confidentiality? (Why or Why not)
3. Now that you know the proper computer ethics what changes are you going to make? (Why)(Explain in detail)

1) This article talks about a variety of different moral issues with computers, including copyrights, personal data protection, and proper use of resources. It also does a really crappy attempt at creating essentially a Ten Commandments of the internet, this is blasphemy.
ReplyDelete2) Yes, I don't put personal information where I don't need it and in the event of a data breach I make sure my accounts are secure.
3) None, I already did most of these things, as a child can understand these rules, which I assume is what the website/article is for judging by its format. Or maybe it was even made by a child.
1. Describe what the article is about? (Explain in full detail.) This article is talking about moral principles that an individual or a group of people on what is acceptable behaviour while using a computer and what I am trying to say is that we have a responsibility to follow the rules on how we use the computer at school or at work and it explain what is computer Ethics and show how anyone can be responsibil on the computer.
ReplyDelete2. Are you securing private information and following the rules of confidentiality? (Why or Why not) Why not because one time I went on one of my friends gmail while he was atomatic sign in so I changed his background and added some apps on his gmail and look at his own junk mail and then sign out but he was ok with and I just help him a little bit with it and he told me it was ok for what I did to his gmail and that’s all really.
3. Now that you know the proper computer ethics what changes are you going to make? (Why)(Explain in detail) Well I wouldn’t go to any of friends email and read his or hers email and change anyone’s background on anyone's gmail and try not to copy any one's work from the internet.
1. The article “Internet Ethics” is a guide to a moral and ethical code when using the internet. Certain topics include cyber safety, cyber security, file-sharing, and what is okay to share online and what isn’t. The article also talks about what it means to be nice online and what Privacy Policies mean and should contain.
ReplyDelete2. Admittedly, I am pretty open online. I usually go by my real nickname and do sometimes reveal my age to close online friends who I can trust. I talk about my real life but am careful to not reveal specific details such as phone number, address, school name, and names of my family members. However, when using public services I do clear my searches which pertain to anything personal and only use my school account for school-related activities and assignments.
3. I find computer ethics to be apart of common sense, but I think this just comes from the fact that I am part of the generation growing up with advanced technology. My mother was pretty adamant with teaching me basic moral ethics from a young age, so I don’t think I need to make any specific changes or improvements.
1. The article discusses the proper usage of the internet through the lens of creating a "code of conduct" for people to follow when using the internet. It gives a sort of "ten commandments" to using the internet, mostly as they apply to schools, such as "no harming others" or "no tampering with others' work", even "no pirating" and "no doxxing" (in much more layman's terms).
ReplyDelete2. Any time another person has been signed onto a computer when I found it, I have simply sent them a message to themselves notifying them that they forgot to sign out and then signed out for them. I have never once decided to look through another person's private files when I have not had permission.
3. I already follow all of the rules listed by this resource on my own. I would definitely work to instill these sorts of values in my own children, if I even allow them onto the internet in the first place. If I did allow internet access, I would make sure that I knew exactly what their devices could do to get around any defensive measures I had set up, at least until they get to a certain age.
1. This article was about ethical use of computer technology and the internet. It goes over several examples of violating and following basic ethical computer use. The article also investigates reasons for being ethical in the way it suggests such as breaking the law, morals, and safety.
ReplyDelete2. In general, I think that I do secure my private information and follow the rules of confidentiality. Any username or account information that one could look up about me, nothing really comes up on google as I usually don't even use social media. The most that ever comes up is perhaps one picture of me and some video game statistics. When using public computer networks and systems, I usually browse anonymously unless it is at school. I am looking into learning Linux extensively and may make the switch to the secure platform that it offers.
3. Most of the information presented in the article seems to be common sense that I follow in my everyday use of the internet. However, the ethical guideline of not pretending to be someone else seemed relevant to me as I have done so as a joke before on Discord. Other than that I seem to follow the ethics presented here so no changes need to be made in my computer behavior.
1. This article is talking about the things you shouldn't do to on your computer. It talks about plagiarism, copyright, improper uses of the computer, rules for computer users and rules of computer ethics, etc. Overall, you shouldn't do these things and need to know the overall basics of computer rules. A lot of people user plagiarism when they're writing about something which isn't allowed.
ReplyDelete2. Yes, I keep most of my social media private and only accept the friend/follow requests of people I know.
3. I don't need to make any changes because I already knew most of these before reading the article.
1.) This article explains about the morality aspect when going online or using someone else’s computer. It includes general rules which everyone should know, like not snooping around someone else's device or computers and messing around with their system preferences or internet access. It includes safety tips for when being online such as cyber bullying and making sure not to go on websites that can be potentially harmful or downloading files which can contain malware within. Using someone else's name under your own for social media to go and leave comments on other is a crime which most may not know.
ReplyDelete2.)When using someone else’s device, I am respectful of their content and do not snoop around their phone without their permission. If i request to make a call, that is all I will use their phone for, nothing else. When someone allows me to go on their personal device, I will not change their personal preference, seen what websites they have been to, or use their accounts for social media for this breaks trust and they will not allow me on their devices again. I am aware of the personal information being housed in computer, their photos and documents are something to be kept private, I stray away from using those applications unless I ask permission to do so.
3.) I will allow my devices to be accessed to family without any concern since they are less likely to download corrupted files on purpose. I inform my friends and family about this program I use which allows a guest user to access the device with minimal usage. It limits the device to certain operations leaving the owner of the device continue his day without any worry. Another thing I do is recommend which programs are reliable of downloading files and scans for viruses, thus allowing their computer to have a longer life and run without adding new errors.
1) The article tells you about Copyright and Plagiarism and how it can violate many rules. People copy a lot and sometimes it can be against the law or terms of condition. They keep check on copyrighted items and then remove them because they aren't verified by the owner.
ReplyDelete2) I am not securing private information because I have no actual private network, and I am not following the rules of confidentiality because I always access my brothers browser history and I read all his private information.
3) I'm not really going to change anything because I don't really have anything private so I feel secure about my information and there's not really anything I need hidden, I tend to store my information in a very private file.
1) This article is about not plagiarizing and respect other people on the Internet. It also talks about to follow what copyright says and to keep what you have safe.
ReplyDelete2)Personally, I think I'm doing really well at keeping my info safe because I don't add it up there in the first place.
3)I'm not going to do much because I have already protected myself from all of that and I will attempt to keep at it.
1) This article is about not plagiarizing and respect other people on the Internet. It says not to to say rude things online and to be nice to them as if they were right in front of you. That includes, no saying bad words, no mean emojis, and no spamming. It also talks about to follow what copyright says and to keep what you have safe.
Delete2)Personally, I think I'm doing really well at keeping my info safe because I don't add it up there in the first place.
3)I'm not going to do much because I have already protected myself from all of that and I will attempt to keep at it.
1. Describe what the article is about? (Explain in full detail)
ReplyDeleteThe article is about ethics more importantly the ethics of computer usage.
Ethics are basic rules that should always be followed by all on the internet.
2. Are you securing private information and following the rules of confidentiality? (Why or Why not)
Yes I am I always try to keep my information secure and be safe and be considerate of other people's work and information
3. Now that you know the proper computer ethics what changes are you going to make? (Why)(Explain in detail)
There aren't really any other changes I can make I always follow a certain code of ethics when I am on the internet
1. The article is about computer ethics. It mainly focuses on the stuff that you should not be doing with computers or online. One of the topics is Plagiarism.plagiarism is a crime, it means that you are copying someone else's work without asking them or just stealing someone else's work in general. Another thing that they go over is that it is illegal to download stuff that is supposed to be paid for. People do this all the time and I do not think that this is a big deal but it is still a topic that they are going over.
ReplyDelete2. I have a lot of my information that is already out on the internet right now. I don't really have a problem with my information being out online, I could care less if someone knew my name or the school I go to or even the stuff I do. I of course do not have a credit card so stealing my identity is something that could not happen and I do not have personal information like my social security and my important stuff like that. I would say that I am a person that is almost completely open on the internet.
3.I am not really going to make any changes to be honest, i mean like I did most of this stuff anyway and stuff like downloading movies is not really a problem. I am sure that most of the people reading this article are aware of these rules and realize that they are not that big of a deal till you get older anyways. Most of this information is practically common sense and is something we continue to do on a daily basis anyways. Already now that I should not snoop through someone's files or disrupt someone's project it is basically just common sense.
This comment has been removed by the author.
ReplyDelete1.The article is about all of the social and legal rules on the internet, like pirating software, music, or videos. Stealing information is NOT o.k. Neither is murder... but that's offline.
ReplyDelete2. I am following the rules of the internet and securing information as I never reveal my important stuff unless it is to a trust-able friend.
3.I don't need to change much, because I follow the rules already.1.The article is about all of the social and legal rules on the internet, like pirating software, music, or videos. Stealing information is NOT o.k. Neither is murder... but that's offline.
2. I am following the rules of the internet and securing information as I never reveal my important stuff unless it is to a trust-able friend.
3.I don't need to change much, because I follow the rules already.
1. Throughout the article it talks about computer ethics. It tells us the rules we should follow when we are online. Overall it just talks about activities we should not be doing with our computer or any other computer.
ReplyDelete2. No I am really not securing my information. I am very open on the computer, the only thing that I am secure about is my address. The reason I am not secure is because I want to be recognized for my talents and that is why I put myself out there on the computer. I mean I never really thought of someone stealing my identity. Most people won't think about it until it happens to them.
3. In all honesty, I won't change at all. I know the dangers of the web and everybody is risking their lives everyday. So I feel like things will not change for me. I mean I will remember to not be malicious on the web. The web is no different than real life so I will make sure to be nice.
Egeschwentner september 15 2017 at 1:47
ReplyDeleteThis tells me about the code of ethics for the internet and acceptable web behavior.
I usually do not put any personal info on the web except for my YouTube name. I do not plan on putting anything personal on the internet any time soon.
I am not going to look for a way to get my games for free. I am going to not defame my brother on the internet. I am not going to kill my brother or Noah just for fun anymore.
This comment has been removed by the author.
ReplyDelete1. The article is about computer ethics, the legality of certain actions and best common practices. Specifically explains that there are consequences for all of our actions even online, we can’t steal others work or break copyright laws or use computers in any malicious way. I personally believe everyone should have a look at the Computer Fraud and Abuse Act to be aware of the legality and consequences of certain actions, sometimes they can even result in felonies.
ReplyDelete2. Yes I am, I’ve always valued privacy, especially working in the cyber security industry, hackers are constantly trying to get information of security researchers. Not protecting your personal information can result in blackmail or worse.
3. Not going to change anything, I’ve been aware of the proper computer ethics for years working in the field.
1. The article is about the pros and cons of using a computer like the pro being the apps that you are able to use whilst the cons being you have rules and laws that you must follow so as to protect the rights of the original owner. (The fines for doing the wrong can be outward of hundred of thousands) Basically its the ethics of the internet and how people should keep upkeep them like the rights of the owner of the hardware or software since it counts as private property and how downloading/using without permission is illegal and can be prosecuted.
ReplyDelete2.While in the united states it is common knowledge to follow the rules/laws since the government agencies are real sticklers about private property (Wether IRL or Cyber) meaning that everything you do is seen by them, even writing this blog they see that. But they are protected by many laws making it hard to go against them. So if you cant beat them, join them... I always secure all personal info with basic passwords but nonetheless secured by something. On the other hand anywhere else in the world you are able to do as you please which is why everytime I go to europe i download as much as i can of illegal stuff/ cracked versions so even softwares that cost hundreds of dollars can be easily obtainable
3.Im going to keep things the way that I have up until now since the day that I got into computers the first thing that I got to know was the security part. So I already know the loop which is why I only do illegal stuff in europe because its legal-ish there.
1. The article is about computer ethics and how to properly use computers and other people's property. It went over things such as plagiarism, copyright, and abusing other's property.
ReplyDelete2. I am technically not securing my private information, because I don't tread that carefully (most of the time) and I use the same email and password for everything.
3. I'm probably not going to change anything, I already knew that all the pirating I do is illegal, but I don't got time and money to pay for crunchyroll premium, miss me with that paywall. I’ve already accepted that I’m a pirate, oh well.
1. The article talks about how to practice computer ethics and what computer ethics are. It also talks about how you could harm someone if you were to download their music or videos. The article touches lightly on how to be safe and make sure bad people cannot harm you on the interwebs.
ReplyDelete2. I have the same email and password for most things on the interwebs. Mostly because I'm lazy and I don't think some ones gonna steal my identity. I'm broke, so no one is going to steal anything from me.
3. I'm probably not going to change because I'm really lazy and I don't care.
1. This article talks about computer ethics, which is basically a rule book for people who use or have access to the infinite resources on the Internet.It explains the details of the rule and how each applies in certain circumstances.It also emphasis on what you should do to not violate the rule or let others take advantage of you by violating these rules. The articles also offer further solution to maintaining a safe and healthy online community.
ReplyDelete2. Since this is the first time I have ever read an article like this, so my understanding of the Internet is pretty limited. It is beyond the truth that I have violated somewhat a handful of the rules listed on the list. I have downloaded cracked games on the Internet and copy homework online because I didn't have my own money or credit card, plus laziness. I used to fall for a trick by a person who pretend to be an administrator of a game and I ended up losing my gaming account, which is very frustrating at my age. I didn't realize that an administrator would never just abuse his power like that unless he is a fake so I fall for his trap so easily.
3. Now that I know about the rules of computer ethics, I will not have to worry about falling for such obvious trap like this . I have already create reinforced password when I created an account for something. I don't just click on links unless it is a reliable sources.Scammer tend to change the link slightly to deceive people who don't pay attention to the link. I have created backup to every file in my computer in case if someone hacked into my computer. I installed the latest virus detector app like Norton, or Avast. Whenever I want to test a new software I downloaded, I always make sure to do it in a sandbox environment created by my computer so that I can avoid leaking info if the software is fake or filled with virus that my detector can't find. Finally, I won't ever again downloaded items from illegal website despite how tempted it is because they are free on those websites.
1. computer ethics and basics
ReplyDelete2. we should so that people cant steel info
3.depends
1.The article is about computer ethics and what you can and can not do on the internet. So the article talks about plagiarism,copyright and ,the ten commandments.
ReplyDelete2.Yea i'm protecting my info fake names,fake pictures,fake everthing. I never give my info out to anyone unless i know them in real life because if they screw me over i'll kick their ass. It ya boy josh aka one punch man.
3.None because i understand what a pedo is and i'm not about that. Also because i don't give info to anyone on the interwebs.
1. The article is about computer ethics- the moral principles needed to follow when people are on the Internet. The main focus of the passage shift from some unethical behaviors when using the Internet to rules that you have to obey. It also discusses how to secure your private information as well as some Internet ethics.
ReplyDelete2. In my opinion, I have always secured my private information and followed the rules of confidentiality.I hardly put my private information in the social media.
3. I am not going to make any changes whilst I am on the Internet since I have already known all the rules and followed it.
This article on computer ethics is about well, computer ethics. Specifically, about
ReplyDeleteknowing the difference between right and wrong based on the approved standards of social and professional behavior. The commandments of computer ethics include common decency such as using a computer to harm others, to not snoop around others computer work, to not use a computer to steal. To not use a computer to bear false witness. To not copy or use proprietary software for which you have not paid (without permission). To not use other people's computer resources without authorization or proper compensation. To not appropriate other people's intellectual output. And think about the social consequences of the program you are writing or the system you are designing. And always use a computer in ways that ensure consideration and respect for your fellow humans.
Id say that i am using confidentiality. I am doing all of the following commandments. In addition I keep all accounts secure with a strong password. Adding on to my correspondence to the rules of confidentiality i also don't go on any sites that have risk for viruses. Going off of that i also don't go on any sites that hackers can easily go on. Correspondingly I dont give any site my social security number as well as not giving any personal information to any survey sites or credit card information to unsecure shopping sites because i dont want to get ripped off.
Now that I know all of this information about computer ethics and confidentiality, I will do all of the following. First, I will not continue to pirate any music on the computer. Secondly I will not use any software or pirate any software on any computer because i know now that its bad and illegal and its unethical. And thats about all i was doing that was bad. I am glad I have read this article and created a better understanding of the computer, thankyou very much for this article.
1. The article is about computer ethics and essentially what isn't acceptable to do on the internet and involving computers. It discuses what is morally right and wrong on the topic of computers. Also it talks about how to keep things of yours private.
ReplyDelete2. I use confidentiality. I keep everything secure and i don't venture off into questionable areas of the internet. I have never posted or shared my passwords.
3. Now that I am aware of computer ethics, it won't change much as I've been following them this whole time.
. The article is about computer ethics and essentially what isn't acceptable to do on the internet and involving computers. It discuses what is morally right and wrong on the topic of computers. Also it talks about how to keep things of yours private. The moral implications attempts to impose 10 rules onto the good people of the internet. The main central reasoning behind them essentially adding up to: do not harm others or their public image, do not invade others privacy, and etc.
Delete2. I use confidentiality. I keep everything secure and i don't venture off into questionable areas of the internet. I have never posted or shared my passwords. It never even was a passing thought in the vast computer known as my mind.
3. Now that I am aware of computer ethics, it won't change much as I've been following them this whole time. Never in my life have I done something damaging via the internet.
1. This article is about computer ethics and what you should and shouldn’t do in the internet. It gives you ten rules to follow that seem logical enough. It just gives you a bunch of rules to follow so you don’t give out your social security number or go to court for plagiarism.
ReplyDelete2. Yes, I am securing my personal information by keeping all my important information, like my birthdate, age, ways of contact, etc. off of the internet because I don’t like people knowing more about me than I do myself.
3. I’m not really going to make changes because I already somewhat follow the rules and instructions to stay safe on the internet, mainly because I don’t want some random person knowing my personal information.
1. this article is about what not to do and how to use computers in a ethical way. the article also specifies a ten commandments of computer ethics. the rules are mostly things that are already illegal like pirating and copyrights.
ReplyDelete2. yes i am very secretive on the internet like the only thing that people know about me online is my name. i don't put where i live, or where i go to school.
3. no im probly not gonna change the way i use the internet because i really don't use the internet in a bad way the only thing i do is stream movies and watch videos, and also i have a meme page go follow me at Insta: grow.dank.smoke.memes