Computer Ethics in Computer Programming

1) Thou shalt not use a computer to harm other people: If it is unethical to harm people by making a bomb, for example, it is equally bad to write a program that handles the timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other people’s books and notebooks, it is equally bad to access and destroy their files.


8) Thou shalt not appropriate other people's intellectual output: Copying somebody else’s program without proper authorisation is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.


9) Thou shalt think about the social consequences of the program you write or the system you design: You have to think about computer issues in a more general social framework: Can the program you write be used in a way that is harmful to society? For example, if you are working for an animation house, and are producing animated films for children, you are responsible for their contents. Do the animations include scenes that can be harmful to children? In the United States, the Communications Decency Act was an attempt by lawmakers to ban certain types of content from Internet websites to protect young children from harmful material. That law was struck down because it violated the free speech principles in that country's constitution. The discussion, of course, is going on.


(computer skills and research class DMUIC,  2022)


When Coding Is Criminal | WIRED

(Wired, 2023)


The aforementioned commandments are related to what someone with malice inclination would do if they gained access to programming knowledge. Although each of the ten commandments is extremely important, this blog will focus primarily on the three mentioned above.


There are a number of ways in which programmers with bad intents can do harm in a technological environment.

Programming Spyware and Viruses -  There are several reasons why viruses are made. It can be to prove that they are skilled programmers and to gain notoriety. However, the vast majority of viruses are created by criminals. These viruses are made to steal your personal information and utilize it to steal money from you. Your bank account information, passwords, and credit card information can all be obtained using viruses. Viruses can also be utilized to covertly download huge files through your internet connection. This implies that people can see unlawful material without being discovered. (Kaspersky, 2023)


Software Theft - Since someone else had to complete the work and find solutions to the many issues that arose while coding, code theft is unethical and wrong. Therefore, you cannot simply insert that code into your program without first getting permission. Additionally, stealing this code is against the law and is frequently protected by copyright, which could result in legal issues.  (Forester, 1990)


Security Breaches - This is a common sign of bad programming. Software that has been poorly coded may have security vulnerabilities that hackers can exploit, resulting in data breaches, identity theft, and financial losses. Such breaches, which expose a large number of patient health records, cause a significant loss to the healthcare industry (Yeo and Banfield, 2022)


Economic loses - Software that has been improperly programmed may experience system failures, downtime, data loss, and other problems that may have an adverse effect on corporate operations and income (Team, 2022)




Reference list:

Wired.com. (2023). Available at: https://media.wired.com/photos/5cc244cc2c90a35c66b7d930/master/w_2560%2Cc_limit/Coding-Becomes-Criminal.jpg [Accessed 3 May 2023].

Forester, T. (1990). Software theft and the problem of intellectual property rights. ACM SIGCAS Computers and Society, 20(1), pp.2–11. doi:https://doi.org/10.1145/379288.379291.

Kaspersky (2023) What is spyware?www.kaspersky.co.uk. Available at: https://www.kaspersky.co.uk/resource-center/threats/spyware (Accessed: 03 May 2023). 

Yeo, L.H. and Banfield, J. (2022) Human factors in electronic health records cybersecurity breach: An exploratory analysisPerspectives in health information management. Available at: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9123525/ (Accessed: 03 May 2023). 

Team, E. (2022) Businesses losing billions to poor quality software, putting many at risk for 2023Finextra Research. Available at: https://www.finextra.com/blogposting/23308/businesses-losing-billions-to-poor-quality-software-putting-many-at-risk-for-2023 (Accessed: 03 May 2023). 

Comments