From time to time the use of computers and the Internet continues to increase at the current estimate is 150 million people worldwide who use the internet facilities and the growth of the Internet is estimated to reach 10% per month. Goals and behavior also different indeed.
Generally, adults use the Internet as part of the job and to get information, while the children access the Internet for entertainment needs such as gaming, music, hanging out with other people, finding pictures, song lyrics, writing an email, and others. With the number of internet users this can be ascertained there is always positive and negative side.
Generally, adults use the Internet as part of the job and to get information, while the children access the Internet for entertainment needs such as gaming, music, hanging out with other people, finding pictures, song lyrics, writing an email, and others. With the number of internet users this can be ascertained there is always positive and negative side.
Cyberbullying (harassment or behavior disrupt the cyber world) is one of the negative impact that often occurs and the behavior of this survey have the mental teenage children. Therefore we must learn how to have good ethics in using the computer. Here are ten ethical computer use, if implemented by young people and IT professionals would negatively impact from the use of the Internet will be reduced and the level of security and convenience in accessing and using computers and the Internet will become more enjoyable.
10 ethical computer use:
1. Do not use a computer to harm other people
In using a computer we can not harm other people, for example, use a computer to break the bank, using a computer to create a virus, using the computer to damage a security system
2. Do not violate the rights of the computer or another person or the
work other people's computer
For computer users, is not expected to disrupt and use the computer for the rights of others, such as piracy of works to do other people, meginstal a program that is not legal.
3. Do not see the files - files that are not our rights
Snoop, spy and to take other people's data is not right, it should not be done by computer users because it is very harmful, and other activities is usually done by the cracker and Hacker is not responsible.
4. Do not use a computer to steal
This is normally used by the hijacker, a thief and a plunderer of using computers to break a bank's security system, and is used by the terrorists to look for funds with a target break personal identity.
5. Do not use a computer to give false testimony
Using a computer to spread false news and not in accordance with the facts, and interfaces information about someone that all forms of lies, and tend violations of law that is damaging the good name of a person.
6. Do not duplicate or use illegal software
It is possible that the public is usually not a sin to show duplicate the software or data sources to include someone without a capture
7. Do not use the computer resources of others without the owner's
computer
If we want to open a computer with other people, we expected to ask permission from the owner first.
8. Do not steal the intellectual property of others
Like duplicating a software and then commercialize it.
9. Consider the consequences of the program that created or computer system designed
In creating a program should we assess the positive and negative, if we make the program more impact on the poor better we stop making that program.
10. Always consider and put to respect each other when using the
computer
In using the computer we must consider every side of good or bad, until we do not harm others. If each user's computer and the Internet, applying the 10 ethics in berkomputer in using computers or the Internet, we can be sure that the security and comfort for the user and the computer or internet user can be more fun.
resource: www.beritanet.com
10 ethical computer use:
1. Do not use a computer to harm other people
In using a computer we can not harm other people, for example, use a computer to break the bank, using a computer to create a virus, using the computer to damage a security system
2. Do not violate the rights of the computer or another person or the
work other people's computer
For computer users, is not expected to disrupt and use the computer for the rights of others, such as piracy of works to do other people, meginstal a program that is not legal.
3. Do not see the files - files that are not our rights
Snoop, spy and to take other people's data is not right, it should not be done by computer users because it is very harmful, and other activities is usually done by the cracker and Hacker is not responsible.
4. Do not use a computer to steal
This is normally used by the hijacker, a thief and a plunderer of using computers to break a bank's security system, and is used by the terrorists to look for funds with a target break personal identity.
5. Do not use a computer to give false testimony
Using a computer to spread false news and not in accordance with the facts, and interfaces information about someone that all forms of lies, and tend violations of law that is damaging the good name of a person.
6. Do not duplicate or use illegal software
It is possible that the public is usually not a sin to show duplicate the software or data sources to include someone without a capture
7. Do not use the computer resources of others without the owner's
computer
If we want to open a computer with other people, we expected to ask permission from the owner first.
8. Do not steal the intellectual property of others
Like duplicating a software and then commercialize it.
9. Consider the consequences of the program that created or computer system designed
In creating a program should we assess the positive and negative, if we make the program more impact on the poor better we stop making that program.
10. Always consider and put to respect each other when using the
computer
In using the computer we must consider every side of good or bad, until we do not harm others. If each user's computer and the Internet, applying the 10 ethics in berkomputer in using computers or the Internet, we can be sure that the security and comfort for the user and the computer or internet user can be more fun.
resource: www.beritanet.com
5 comments:
November 14, 2008 at 11:12 PM
Abi,,,Add article again,,!!
November 22, 2008 at 12:43 AM
good article, this is help me, thanks guys...
November 28, 2008 at 2:19 AM
oke keren bi
November 30, 2008 at 3:14 AM
http://possnetwork.ugm.ac.id/
December 31, 2008 at 2:52 AM
he he ..
Post a Comment