ยินดีต้อนรับเข้าสู่เว็บไซต์ "จริยธรรมเทคโนโลยีบนโลกดิจิทัล"  

Meaning of ethics

      Ethics The term "ethics" is divided into ethics + morality. The word ethics means behavior or behavior that should be performed. The word morality has many meanings, such as virtue, doctrine of religion, principles of conduct. Both words are combined into "ethics" and therefore has the literal meaning that "Code of Conduct" or "Code of Conduct"

      Ethics should be behaved. That comes from religious teachings or doctrine or anyone who is Have ethics, which the ethics person has the following characteristics

      1. A person who has perseverance and effort to do good deeds. Ashamed of evil practices

      2. Be honest, fair, and kind

      3. Be a wise person always be aware, do not be careless

      4. Being a person who is seeking knowledge Career ability for stability

      5. Being a person who the state can rely on as a core or base for society for any development

      Information technology ethics means various processes. And systems that help obtain the information or news they need, including.

      1. Tools and equipment referring to computers Office supplies Communication equipment various software including both ready-made systems and developed in particular

      2. Process for bringing various tools and equipment the above data is used for data collection, storage, processing and displaying results in various forms of information. That can be used further. Information technology is needed for every organization Information linking via computer makes the most valuable thing of the system is data and information. May be espionage was modified Accessed by unknown owner. Blocked, preventing access to data or destroyed or damaged which can occur easily on the network world especially when staying on the internet Therefore, having morality And ethics in the use of technology is equally important. With details as follows

      - should not give false information

      - Do not distort the accuracy of the information to allow the next recipient to receive incorrect information

      - Should not access other people's information without permission.

      - should not disclose information to unauthorized persons

      - Do not destroy data

      - Not taking part in control of the system or all without permission

      - Do not make the other party understand that they are another person, for example, forging the sender's email to make the recipient misunderstand for misunderstandings or wanting to elicit secrets

      - Interruption of server services by causing the server resources to be used up completely or reaching its limit, for example a web server or an email server the attack is done by opening a connection to the server to the limit of the server. Make other users Unable to use the service

      - Do not release or create malicious programs (Malicious Program), which is abbreviated as (Malware), is a program that was created to disrupt, destroy or damage computer networks, malicious programs currently prevalent are viruses, worms and horses. Trojan

      - Not causing annoyance to others by methods such as spam (sending emails to many users With the purpose of advertising)

      - Do not produce or use spyware (Spyware). Spyware uses an internet connection to secretly send their personal information to a person or organization without the user's knowledge.

      

      

แหล่งเรียนรู้เพิ่มเติม:
https://sites.google.com/
site/satawatkhom/2-criythrrm-keiyw-kab-kar-chi-thekhnoloyi-sarsnthes


จำนวนผู้เข้าชม
website hit counters
 
เว็บไซต์นี้เป็นผลงานรายวิชาโครงการ สาขาคอมพิวเตอร์ธุรกิจ ปีการศึกษา 2562 วิทยาลัยอาชีวศึกษาอุบลราชธานี โดยคุณครูสุดฤดี ประทุมชาติ
z