I INF 306 Lecture Notes - Lecture 6: Comprehensive Crime Control Act Of 1984, Computer Ethics, Proprietary Software

39 views10 pages

Document Summary

Information systems professions are too wide ranging: no uniform authority, aba, ama, no binding code, this makes it difficult differentiating , white hats, black hats, grey hats. Thou shalt not use a computer to harm other people. Thou shalt not interfere with other people"s computer work. Thou shalt not snoop around in other people"s computer files. Thou shalt not use a computer to steal. Thou shalt not use a computer to bear false witness. Thou shalt not copy or use proprietary software for which you have not paid. Thou shalt not use other people"s computer resources without authorization or. Thou shalt not appropriate other people"s intellectual output. Thou shalt think about the social consequences of the program you are writing. Or the system you are designing: thou shalt always use a computer in ways that insure consideration and. Who reads these things: creates a contract binding the licensor and licensee, written agreements, click agreements, installation agreements, shrink wrap agreements.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents