Design and implementation of a campus computer ethics policy

نویسنده

  • Michael A. Covington
چکیده

As the set of people using computers becomes larger and less cohesive, it is becoming important to educate users about their ethical responsibilities. Design of an effective campus computer ethics policy requires awareness of numerous cultural, technical, and legal issues. Especially important are the cultural splits between power users and utilitarian users, and between “oldworld” and “newworld” philosophies of computer ethics. This paper discusses those issues and presents the University of Georgia’s ethics policy as a model to aid those developing similar policies at other institutions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need

Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...

متن کامل

Kinematic and Gait Analysis Implementation of an Experimental Radially Symmetric Six-Legged Walking Robot

As a robot could be stable statically standing on three or more legs, a six legged walking robot can be highly flexible in movements and perform different missions without dealing with serious kinematic and dynamic problems. An experimental six legged walking robot with 18 degrees of freedom is studied and built in this paper. The kinematic and gait analysis formulations are demonstrated by an e...

متن کامل

آسیب‌شناسی نظام یادگیری الکترونیکی دانشگاه‌های علوم پزشکی بر اساس مدل خان

Introduction: Information and communication technology has led to emergence of new ways of teaching and learning. E-learning is one of the new ways of learning in the present era. For the e-learning system to be effective, the current e-learning system should be assessed and. The aim of the present study was to investigate the pathology of e-Learning system in Tehran University of Medical Scien...

متن کامل

Examining pornography in cyberspace from the perspective of ethics, spirituality and medicine

Background & Aims: Pornography in cyberspace is one of the emerging and multidimensional challenges in society. Each discipline offers different criteria, reasons, perspectives and solutions according to their point of view; But this multidimensional phenomenon has involved all aspects of human societies in individual and group dimensions and has left negative consequences. The aims of this stu...

متن کامل

The Design, Modeling, and Implementation of Group Scheduling for Isolation of Computations from Adversarial Interference

To isolate computations from denial of service (DoS) attacks and other forms of adversarial interference, it is necessary to constrain the effects of interactions among computations. This paper makes four contributions to research on isolation of computations from adversarial interference: (1) it describes the design and implementation of a kernel level scheduling policy to control the effects ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Internet Research

دوره 5  شماره 

صفحات  -

تاریخ انتشار 1995