Vous êtes sur la page 1sur 1

Computer Ethics FOR EMPOWERMENT TECNOLOGY

1. You shall not use a computer to harm other people.


- It is wrong to use a computer and steal/access/destroy their personal information.

2. You shall not interfere with other people’s computer work.


- Generating and consciously spreading computer viruses is unethical.

3. You shall not snoop around in other people’s computer files.


-Reading other people’s e-mail messaged is a bad as opening and reading their letters. This is
invading their privacy.

4. You shall not use a computer to steal


-Using a computer to break into accounts of a company or a ban and transferring money should be
judged the same way as robbery.

5. You shall not use a computer to bear false witness


-The internet can spread untruth as fast as it can spread truth.
-Putting out false information to the world is bad.

6. You shall not copy or user proprietary software for which you have not paid (without
permission)
- Software is an intellectual product.
- It is like a book: Obtaining illegal copies of copyrighted software is a bad as photocopying a
copyrighted book.
-
7. You shall not use other people’s computer resources without authorization or proper
compensation
- - Hacking a system to break and bypass the authorization is unethical
-
8. You shall not appropriate other people’s intellectual output.
- - Copying somebody else’s program without proper authorization is software piracy and is
unethical.
-
9. You shall think about the social consequences of the program you are writing or the
system you are designing.
- - You have to think about computer issues in a more general social framework:
-
10. You shall always use a computer in ways that ensure consideration and respect for
your fellow humans.
- -The fact that you cannot see the people you are interacting with does not mean that you can
be rude to them.

TECHNOLOGY USED BY WEB 3.0

1. RDF - Resource Description Framework


2. XML –Extensible Markup Language
3. XFN XHTML Friends Network
4. OWL Web Ontology Language
5. API Application Programming Interface
6. . XRI Extensible Resource Identifier
7. . XDI extensible Data Interchange
8. . URI Uniform Resource Identifier
9. . SWRL Semantic Web Rule Language
10. . SPARQL Protocol and RDF Query Language
11. . OAUTH- Open Authentication