Ethics Challenge
Restart
Next
1/15
Ethics and Professional Conduct
This material was developed with funding from the National Science Foundation 
Ethics
Back
Click to reveal the Code of Ethics
4/15
The Computer Ethics Institute developed a code of ethics. The code is designed to inspire and guide the ethical conduct of all computing professionals including current and aspiring practitioners, instructors, students, influencers, and anyone who uses computing technology in an impactful way. The code includes principles formulated as statesments of responsibility based on the understanding that the public good is always the primary consideration, and it serves as a basis for remediation when violations occur. The accepatance of this Code of Ethics is not universal. The following is an interpretation of the Computer Ethics Institute Code of Ethics.
Code of Ethics
1.   Do not use technology in ways that can harm others 2.   Do not use technology to interfere in other users’ work 3.   Do not spy on another person’s computer data 4.   Do not use computer technology to steal information 5.   Do not contribute to the spread of misinformation       using computer technology 6.   Always pay for software unless in is free and refrain       from using pirated copies 7.   Do not use someone else’s computer resources       unless granted authorization 8.   Do not claim ownership on a work which is the        output of someone else’s intellect 9.   Consider the social impact of programs you develop 10. Be respectful and courtesous to others when using       computers for communication    
Tampering or destroying files, folers or data; gaining unauthorized access to computer resources; creating malicious code, cyber bullying, and spamming or phishing are all examples of using computers and technology against another.
Do not use technology in ways that may harm others
Why are you being mean?
5/15
< Click here - harming others
I don’t like you!
You’re STUPID!
I’m going to spread these computer viruses to everyone and mess with their work life!
6/15
Overwhelming network or computer services (including DoS attacks), improperly scheduling maintenance or system upgrades, performing a production environment test or maintenance without formal permission, monopolizing limited resources without permission, and spreading viruses would all interfere with other users’ work.
< Click here - interfering with others
Do not use technology to interfere in other users’s work
Do not use Technology to spy on another person’s computer data
7/15
< Click here - spying on others
Shoulder surfing, accessing unauthorized data, files or folders, using other users’ devices or systems (including USB drives and laptops), and accessing account information, empoloyment records, or health recorda are all examples of spying on another person’s computer data
Do not use technology to steal others’ information
8/15
Stealing others’ information includes pilfering private or sensitive information from an organization or individual, improperly transferring account information, or using unauthorized copyrighted information, intellectual property, trade secrets, patents, and trademarks.
< Click here - stealing 
Do not use technology to contribute to the spread of misinformation
< Click here - spreading misinformation
False news reports, stories, rumors, and unverified facts are all examples of misinformation. Be careful not to spread unverified information via social media. Do not trust or share emails or information from unknown sources. Do not spread unverified product information.
9/15
You would not believe what I just heard
< Click here -  violating use of intellectual property
Do not use technology to copy or share software, applications and intellectual property not legally purchased
Thanks. That will save me some cash.
You shouldn’t have to pay for this software since I already have it. Take this copy that I make—I found a way to get around the registration code
Using pirated copies of movies, pictures, games, books, applications, or operating systems, improperly using licensed artwork and other software products, and illegal use of licensed software and electronics or printed products all infringe on the proper use of intellectual property.
10/15
11/15
Having your own login credentials for company resources will prevent unauthorized access to systems or applications. Receive formal permission before performing a test or system maintenance. Avoid monopolizing limited resources and make sure your receive permission beforehand.
< Click here - gaining unauthorized access
Do not use someone else’s computer resoures unless granted authorization
I know I’m not supposed to use this printer, but thanks for swiping your authorization card.
12/15
< Click here - wrongfully claiming ownership
Perfect…I need this code to get my application to work.
Do not claim ownership on a work which is the output of someone else’s Intellect
Claiming ownership of someone else’s work without paying and giving them credit is pirating. This is theft, and it is unlawful and unethical. Avoid pirating intellectual property including text, graphics, videos, and even scripts and coding.
Consider the social impact of  programs you develop
13/15
< Click here - harmful social impact
Writing applications or software tha enable others to steal, spy, gamble, or spread objectionable materials can cause harm to others. Make sure the content you produce is appropriate for the ages of the target audience. Share any known vulnerabilities and flaws of the applications you develop, design, and disseminate.
That application can be used to spread fake news and may lead to social unrest. 
Hi Carl, Where the hell is the budget information from your department! This clearly demonstrates your department’s incompetance.
14/15
Always use respectful language in all of your communications. This includes proper computer etiquette in chat rooms and online forums. Fact check before posting. Finally, always respect other users’ privacy.
< Click here - disrespecting others
Be respectful and courteous to others when using computers for communication
The important and enduring beliefs or principles that an indivicual uses to make judgements in life
Good
A discipline or branch of moral philosophy that defines rightness or wrongness of actions, motives, and the results of these actions
Right
Includes personal, cultural or corporate values and can be severely affected by the  emotional state of mind of an individual or group
Ethics and Values
Click each button to learn more
The study of Ethics refers to defining the guidelines for conduct that addresses questions about Decency, fairness and common good
Wrong
The set of rules established by a group or culture that govern the behavior of individuals and communities 
The beliefs for which a person has a persistent preference
Duty
2/15
The principles and ideals that help in making Judgements of what is more important
Ethics and values together lay the foundation for human morality. While they are sometimes used synonymously, they are different. 
Values
Corrupt
Resolves questions of human morality by defining concepts such as good and evil, right and wrong
What is morally correct or incorrent in each situations
Constraints
Definition
Click on each button
Level of importance
Tells
Uniform
Comparing Ethics and Values
What are they?
Guidelines for conduct that address questions about morality
3/15
Consistancy
Purpose
Extent of rightness or wrongness of options
Motivates
What we want to do or achieve
Stimuli for thinking
Systems or moral principles
Determines
Differs from person to person and  between cultures
Principles and ideals that improve the judgement of what is more important
Consistency
Provides constraints and guidance for professional conduct
Submit
Serves as a guideline for conduct
Description
Used to establish the level of importance in an organization
15/15
Test Your Knowledge
Stimuli for think
Given a situation, establishes correct or incorrect decision
For each description, determine if  it falls under ethics or values
Determine