✅ 操作成功!

朗文英语听说教程二听力原文_Unit_08

发布时间:2023-12-25 作者:admin 来源:讲座

2023年12月25日发(作者:)

朗文英语听说教程二听力原文_Unit_08

Unit 8 Right and Wrong on the Net

Introduction

TEACHER: Good morning. Did anyone hear the news about the teenager in New York who hacked

into a bank’s database and stole about 30,000 credit card numbers over the weekend? Hacking is

related to computer ethics-that’s our topic today. Computer ethics deals with the proper use of

information technology, such as computers and the Internet. By proper use, I mean socially responsible

use. We’ll first talk about what ethical behavior is and how this applies to computer use.

Body: Part 1

First, I want to make sure we all know what ethics is. Anyone? Yes, John.

STUDENT l: It’s about right and wrong.

TEACHER: Yes. OK, Jennifer.

STUDENT 2: And it’s about being a good person, doing what’s right.

TEACHER: Yes, ethics includes both of these ideas. It deals with moral judgments, with what is

acceptable or unacceptable to do. Now we learn ideas about what is right and wrong from our families,

our friends, and from the culture we live in. Because of differences in our backgrounds, we may not

always agree on what is right and wrong. However, for our discussion today, I will define for you what

I mean by an ethical action. An ethical action is something someone does that benefits someone and

doesn’t hurt anyone. So, for example, if you see a man drop some money, and you pick the money up

and give it to him, this is an ethical action. On the other hand, if you pick up the money and don’t give

it back to the man, this benefits you, but hurts the man. This is not an ethical action.

Body: Part 2

Now what about computers? What are the ethical boundaries for using computers and the Internet?

Most people agree that it is wrong to steal from a store. Would they also say it’s wrong to copy music

files from the Internet? Or, to take another example, most people agree that it is wrong to open an

envelope and read a letter to someone else. Would they also say it’s wrong to read someone else’s

e-mail? In the past decade or so, many more people have started using computers and the Internet, so

these issues have become important. In 1992, the Computer Ethics Institute was founded in the United

States. This is a research, education, and policy study group whose goal is to increase awareness of the

ethical issues that are likely to come up as technology develops. One concept the Computer Ethics

Institute has developed is the Ten Commandments of Computer Ethics. These rules are important

guidelines the Institute thinks all computer users should follow. Now some of you may be familiar with

the Ten Commandments from the Bible, like, uh, “Thou shalt not kill” or “Thou shalt honor thy father

and thy mother.” The Ten Commandments of Computer Ethics have been written in the same style of

language used in the Ten Commandments from the Bible. For example, they use the phrase “Thou shalt

not.” “Thou shalt not” means don’t or you shouldn’t.

1

Body: Part 3

Let’s look at each commandment or rule. The first commandment says: Thou shalt not use a computer

to harm other people. Simple enough, right? Number Two. Thou shalt not interfere with other people’s

computer work. I interpret this to mean don’t use a computer in any way that will affect or change the

work someone else is doing. Don’t move or edit someone else’s files without telling them. Number

Three. Thou shalt not snoop in other people’s files. To snoop means to try to find out something

without another person knowing it. If you look at someone else’s files on the computer or read their

e-mail, you’re snooping. Respect other people’s privacy. Number Four. Thou shalt not use a computer

to steal. There are situations on the Internet in which you have to decide if you are stealing or not, like

downloading music files, as I mentioned earlier. Number Five. Thou shalt not use a computer to say

things that are untrue. It is up to you to be truthful in your website, in your e-business, and in your

e-mail. Number Six. Thou shalt not use software for which you have not paid. In other words, if the

software is free on the Internet, it’s okay to download and use it. However, it is not okay to copy

software from a friend, because you didn’t pay for it. Number Seven. Thou shalt not use other people’s

computer resources without telling them, or without paying them. For example, you shouldn’t use

someone else’s computer, password, or Internet connection without asking them first. Number Eight.

Thou shalt not appropriate someone else’s ideas. Appropriate is spelled A-P-P-R-O-P-R-I-A-T-E. . . . It

means to take words someone else wrote and say they’re yours. Uh, for example, you have to write a

report for school. If you copy a term paper from the Internet and hand it in, you’re breaking the rule.

Copying even a few sentences off the Internet and presenting them as your own is breaking the rule.

Number Nine. The ninth commandment says: Thou shalt think about the social consequences of the

program you are writing. Now, this applies mostly to computer programmers. Social consequences

means how the program you’re writing might affect others in society. Could hackers possibly use your

program to illegally gain access to a computer system? Skillful hackers can hack into banks and into

credit card companies; they can alter accounts and steal money. They can also create viruses that can

cause billions of dollars of damage worldwide. Number Ten. The tenth commandment says: Thou shalt

always use a computer in ways that are respectful of others. For example, sending unfriendly e-mail to

someone or about someone or creating websites with negative messages are examples of breaking this

rule.

Body: Part 4

OK, the Computer Ethics Institute has sent these guidelines to many large companies and to schools

across the United States. However, there’s no way to enforce these rules. Nevertheless, they would like

to see schools, in particular, utilize these rules to help students develop a strong sense of computer

ethics. OK, any questions or comments at this point?

STUDENT 1: How are we supposed to remember all those rules?

TEACHER: Well, there are a lot of rules, but they all boil down to a couple of principles: respect and

fairness. Respect what belongs to others and use resources fairly. Does that help?

STUDENT 1: Yeah, I guess so.

2

TEACHER: Good. Let’s go back to ethics. Now increasingly, schools are seeing that students need to

be taught computer ethics as part of the school curriculum. Some schools have come up with

acceptable-use policies, or rules about what is or isn’t OK for students to do regarding computer use.

This is how the Computer Ethics Institute would like to see schools utilizing the rules. Generally, it’s

considered wrong to steal someone else’s password or to read someone else’s e-mail. It’s also

considered unacceptable in college classes for a student to download a term paper off the Internet and

pretend that he or she wrote it. This is called “plagiarism,” and it’s a good example of breaking rule

number eight. Students are permitted to use the Internet for research, but are instructed to write the

information in their own words and to explain where they got the information.

Conclusion

Now the ten rules are guidelines for us to follow. These rules help us to be aware of the ethical uses of

technology. Let’s stop here for today. Think about these rules this week and we’ll talk about them. And

read the next two chapters for next week.

3

朗文英语听说教程二听力原文_Unit_08

👁️ 阅读量:0