Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

CE8xx

Download as pdf or txt
Download as pdf or txt
You are on page 1of 80

Respecting Intellectual Property in the Digital Era: Insights

from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[2] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
2 ID: CE801

now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[3] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[4] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[5] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[6] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[7] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of
infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommu-
nications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
The Eighth Commandment of Computer Ethics – ID: CE801 3

Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[8] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[9] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[10] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[11] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal
of Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[12] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[13] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
4 ID: CE801

,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[14] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[15] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.
[2] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
2 ID: CE802

and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.

[3] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.

[4] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.

[5] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.

[6] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York:
Oxford University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare,
where the U.S. military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified
by incidents like Stuxnet and Chinese cyberattacks aimed at stealing U.S. government data. In this
book, Peter W. Singer and Allan Friedman examine the evolution of military cybernetics, the
challenges of defending cyberspace, and recent security developments. The book explores modern
conflict dynamics and offers strategies for individuals and governments to protect themselves.

[7] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
The Eighth Commandment of Computer Ethics – ID: CE802 3

[8] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[9] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and
Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[10] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[11] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[12] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[13] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
4 ID: CE802

principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[14] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[15] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N.
Le, and N. Thoai, “AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the
2022 International Conference on Advanced Computational and Analytical Methods (ACOMPA),
Ho Chi Minh City, Vietnam, Oct. 2022, pp. 34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since
tremendous numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered
several challenges in fully understanding and effectively dealing with problems of urban traffic for
the past few decades. If successful, it will make a positive impact on urban aesthetics and helps
reduce traffic accidents. Software-based solutions are proper and dramatically necessary, currently.
The paper mainly concentrates on traffic counting problems during the outbreak of the Covid-19
pandemic from June 2021.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[2] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
2 ID: CE803

[3] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[4] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[5] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and
Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[6] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[7] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
The Eighth Commandment of Computer Ethics – ID: CE803 3

ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[8] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[9] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal
of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.
[10] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute,
vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[11] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection,
and defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS),
Berlin, Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[12] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
4 ID: CE803

role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[13] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
[14] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview,
security intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
[15] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in
Vietnam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[2] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
2 ID: CE804

[3] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and


Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[4] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[5] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[6] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
[7] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.
[8] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
The Eighth Commandment of Computer Ethics – ID: CE804 3

,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[9] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[10] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[11] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[12] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York:
Oxford University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare,
where the U.S. military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified
by incidents like Stuxnet and Chinese cyberattacks aimed at stealing U.S. government data. In this
book, Peter W. Singer and Allan Friedman examine the evolution of military cybernetics, the
challenges of defending cyberspace, and recent security developments. The book explores modern
conflict dynamics and offers strategies for individuals and governments to protect themselves.
[13] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
4 ID: CE804

,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[14] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[15] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[2] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
2 ID: CE805

detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[3] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[4] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and
Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[5] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[6] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal
of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.
[7] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
The Eighth Commandment of Computer Ethics – ID: CE805 3

Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[8] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy
protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[9] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[10] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N.
Le, and N. Thoai, “AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the
2022 International Conference on Advanced Computational and Analytical Methods (ACOMPA),
Ho Chi Minh City, Vietnam, Oct. 2022, pp. 34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since
tremendous numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered
several challenges in fully understanding and effectively dealing with problems of urban traffic for
the past few decades. If successful, it will make a positive impact on urban aesthetics and helps
reduce traffic accidents. Software-based solutions are proper and dramatically necessary, currently.
The paper mainly concentrates on traffic counting problems during the outbreak of the Covid-19
pandemic from June 2021.
[11] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[12] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[13] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal
of Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
4 ID: CE805

financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[14] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York:
Oxford University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare,
where the U.S. military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified
by incidents like Stuxnet and Chinese cyberattacks aimed at stealing U.S. government data. In this
book, Peter W. Singer and Allan Friedman examine the evolution of military cybernetics, the
challenges of defending cyberspace, and recent security developments. The book explores modern
conflict dynamics and offers strategies for individuals and governments to protect themselves.
[15] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[2] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
2 ID: CE806

‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[3] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[4] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[5] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy
protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[6] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N.
Le, and N. Thoai, “AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the
2022 International Conference on Advanced Computational and Analytical Methods (ACOMPA),
Ho Chi Minh City, Vietnam, Oct. 2022, pp. 34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since
tremendous numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered
several challenges in fully understanding and effectively dealing with problems of urban traffic for
the past few decades. If successful, it will make a positive impact on urban aesthetics and helps
reduce traffic accidents. Software-based solutions are proper and dramatically necessary, currently.
The paper mainly concentrates on traffic counting problems during the outbreak of the Covid-19
pandemic from June 2021.
[7] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
The Eighth Commandment of Computer Ethics – ID: CE806 3

[8] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[9] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of
Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[10] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[11] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
[12] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[13] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[14] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
4 ID: CE806

news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[15] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
[2] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York:
Oxford University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare,
where the U.S. military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified
by incidents like Stuxnet and Chinese cyberattacks aimed at stealing U.S. government data. In this
book, Peter W. Singer and Allan Friedman examine the evolution of military cybernetics, the
challenges of defending cyberspace, and recent security developments. The book explores modern
conflict dynamics and offers strategies for individuals and governments to protect themselves.
2 ID: CE807

[3] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.

[4] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.

[5] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.

[6] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal


of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.

[7] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer


Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
The Eighth Commandment of Computer Ethics – ID: CE807 3

[8] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and


Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.

[9] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.

[10] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection,


and defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS),
Berlin, Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.

[11] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.

[12] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.

[13] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
4 ID: CE807

,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[14] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in
Vietnam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[15] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[2] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
2 ID: CE808

[3] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of
Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[4] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[5] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy
protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[6] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of
infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommu-
nications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[7] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[8] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[9] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
The Eighth Commandment of Computer Ethics – ID: CE808 3

,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[10] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.
[11] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[12] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[13] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[14] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in
Vietnam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
4 ID: CE808

Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[15] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview,
security intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[2] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
2 ID: CE809

[3] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal


of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.
[4] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[5] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[6] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[7] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
The Eighth Commandment of Computer Ethics – ID: CE809 3

as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[8] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy
protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[9] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[10] N. P. Nguyen, H. M. Nguyen, H.-L. La, T. T. T. Thi, N. H. Duong, T. S. Le, D. L. N.
Le, and N. Thoai, “AI-based traffic counting: A Case Study in Vietnam”, in Proceedings of the
2022 International Conference on Advanced Computational and Analytical Methods (ACOMPA),
Ho Chi Minh City, Vietnam, Oct. 2022, pp. 34–39.
,→ Ho Chi Minh City, particularly Vietnamese cities in general, is so busy and crowded since
tremendous numbers of motorbikes move on roads. Ho Chi Minh City leaders have encountered
several challenges in fully understanding and effectively dealing with problems of urban traffic for
the past few decades. If successful, it will make a positive impact on urban aesthetics and helps
reduce traffic accidents. Software-based solutions are proper and dramatically necessary, currently.
The paper mainly concentrates on traffic counting problems during the outbreak of the Covid-19
pandemic from June 2021.
[11] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[12] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
4 ID: CE809

nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[13] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[14] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[15] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
[2] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
2 ID: CE810

[3] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of


infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommu-
nications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[4] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[5] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[6] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and
Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[7] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
The Eighth Commandment of Computer Ethics – ID: CE810 3

,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[8] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[9] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[10] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[11] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[12] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal
of Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[13] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection,
and defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS),
Berlin, Germany, 2012, pp. 1–17.
4 ID: CE810

,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[14] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview,
security intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
[15] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
T
. O DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[2] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
2 ID: CE811

[3] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of
Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[4] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[5] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[6] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[7] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[8] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
The Eighth Commandment of Computer Ethics – ID: CE811 3

[9] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York:
Oxford University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare,
where the U.S. military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified
by incidents like Stuxnet and Chinese cyberattacks aimed at stealing U.S. government data. In this
book, Peter W. Singer and Allan Friedman examine the evolution of military cybernetics, the
challenges of defending cyberspace, and recent security developments. The book explores modern
conflict dynamics and offers strategies for individuals and governments to protect themselves.
[10] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[11] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[12] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.
[13] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
4 ID: CE811

[14] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis


of infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecom-
munications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[15] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview,
security intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References

.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[2] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
2 ID: CE812

assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[3] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[4] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York:
Oxford University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare,
where the U.S. military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified
by incidents like Stuxnet and Chinese cyberattacks aimed at stealing U.S. government data. In this
book, Peter W. Singer and Allan Friedman examine the evolution of military cybernetics, the
challenges of defending cyberspace, and recent security developments. The book explores modern
conflict dynamics and offers strategies for individuals and governments to protect themselves.
[5] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and
Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[6] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[7] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[8] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
The Eighth Commandment of Computer Ethics – ID: CE812 3

,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.

[9] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.

[10] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal


of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.

[11] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection,


and defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS),
Berlin, Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.

[12] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.

[13] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis


of infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecom-
munications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
4 ID: CE812

Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[14] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[15] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[2] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
2 ID: CE813

Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[3] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[4] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of
infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommu-
nications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[5] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[6] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[7] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[8] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
The Eighth Commandment of Computer Ethics – ID: CE813 3

,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[9] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal
of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.
[10] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[11] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[12] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.
4 ID: CE813

[13] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[14] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[15] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, se-
curity intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
[2] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
2 ID: CE814

and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.

[3] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.

[4] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.

[5] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.

[6] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.

[7] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The Eighth Commandment of Computer Ethics – ID: CE814 3

The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[8] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal
of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.
[9] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of
infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommu-
nications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[10] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection,
and defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS),
Berlin, Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[11] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[12] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute,
vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
4 ID: CE814

[13] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[14] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal
of Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[15] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References

.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.

[1] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.

[2] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
2 ID: CE815

global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[3] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[4] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[5] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
[6] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[7] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[8] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
The Eighth Commandment of Computer Ethics – ID: CE815 3

increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[9] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[10] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[11] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis
of infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecom-
munications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[12] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and
privacy protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[13] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[14] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in
Vietnam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
4 ID: CE815

and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[15] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal
of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
T
. O DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
2 ID: CE816

iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[2] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[3] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of
Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[4] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[5] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[6] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[7] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
The Eighth Commandment of Computer Ethics – ID: CE816 3

,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[8] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[9] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[10] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis
of infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecom-
munications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[11] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[12] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview,
security intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
[13] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
4 ID: CE816

,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[14] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and
privacy protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[15] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References

.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[2] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
2 ID: CE817

global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[3] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[4] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy
protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[5] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[6] J. J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity”, Journal
of Computer and System Sciences, vol. 80, no. 5, pp. 973–993, 2014.
,→ The rise of Internet connectivity has triggered a surge in cyberattacks, with malware ex-
ploiting vulnerabilities or leveraging emerging technologies. Beyond traditional methods, new at-
tack patterns are emerging in areas like social media, cloud computing, smartphones, and critical
infrastructure. These attacks exploit unique traits such as data centralization in the cloud, the per-
vasive use of mobile devices, and the interconnectivity of critical systems, presenting unprecedented
challenges.
[7] P. W. Singer and A. Friedman, Cybersecurity: What Everyone Needs to Know. New York:
Oxford University Press, 2014.
,→ Dependence on computers has profoundly impacted human society, especially in warfare,
where the U.S. military is highly reliant on advanced systems. The rise of cyberwarfare is exemplified
by incidents like Stuxnet and Chinese cyberattacks aimed at stealing U.S. government data. In this
book, Peter W. Singer and Allan Friedman examine the evolution of military cybernetics, the
challenges of defending cyberspace, and recent security developments. The book explores modern
conflict dynamics and offers strategies for individuals and governments to protect themselves.
[8] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
The Eighth Commandment of Computer Ethics – ID: CE817 3

assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[9] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[10] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[11] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection,
and defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS),
Berlin, Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[12] H. Le and T. Vu, “Cybersecurity law and intellectual property rights in Vietnam: Progress
and challenges”, Vietnam Law Review, vol. 12, no. 3, pp. 45–65, 2020.
,→ This study examines Vietnam’s legislative efforts in the digital economy, particularly in
copyright and intellectual property rights protection. It highlights the interplay between national and
international regulations, focusing on measures to address unauthorized distribution and safeguard
creators’ rights. The article emphasizes the importance of adapting legal frameworks to the demands
of the digital era.
[13] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute,
vol. 27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[14] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal
of Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
4 ID: CE817

,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[15] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
[2] J. Demmers, W. M. Van Dolen, and J. W. J. Weltevreden, “Handling consumer messages
on social networking sites: customer service or privacy infringement?”, International Journal of
Electronic Commerce, vol. 22, no. 1, pp. 8–35, 2018.
,→ Firms increasingly use social network sites to reach out to customers and proactively in-
tervene with observed consumer messages. Despite intentions to enhance customer satisfaction by
extending customer service, sometimes these interventions are received negatively by consumers.
We draw on privacy regulation theory to theorize how proactive customer service interventions
with consumer messages on social network sites may evoke feelings of privacy infringement. To
2 ID: CE818

practitioners, our findings demonstrate that feelings of privacy are an element to consider when
handling consumer messages on social media, but also that privacy concerns may be overcome if
an intervention is perceived as useful enough.
[3] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[4] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[5] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and
Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[6] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[7] R. C. Barquin, “In Pursuit of a ’Ten Commandments’ for Computer Ethics”, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
The Eighth Commandment of Computer Ethics – ID: CE818 3

role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of avoiding harm to others through the misuse of technology. This is where the ‘Ten
Commandments for Computer Ethics’ was first presented and has since been used by hundreds of
schools and corporations.
[8] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy
protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[9] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
[10] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[11] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[12] R. A. Spinello, Cyberethics: Morality and Law in Cyberspace, 6th ed. Burlington, MA,
USA: Jones & Bartlett Learning, 2017.
,→ Cyberethics: Morality and Law in Cyberspace provides a comprehensive and up-to-date ex-
ploration of the internet’s impact on society, addressing ethical challenges such as information
4 ID: CE818

privacy, cybersecurity, and digital misconduct. By analyzing case studies of data breaches, “fake
news", and online fraud, the book emphasizes the moral responsibilities of internet users and pol-
icymakers. The author proposes that the intersection of technology, law, and public policy offers
pathways to mitigate harm and create a safer cyberspace, fostering ethical practices in the digital
age.
[13] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[14] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[15] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
.TO DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[2] E. K. Clemons, R. V. Waran, S. Hermes, M. Schreieck, and H. Krcmar, “Computing and
Social Welfare: Minimizing societal harm from digital transformation while preserving the benefits
of innovation in online businesses”, Electronic Markets, vol. 32, no. 2, pp. 417–436, 2022.
,→ Social Welfare Computing is an emerging discipline that seeks to direct technology to cause
minimum societal disruption, and in particular seeks to minimize the harm caused directly by
technology itself. Often the companies that create significant value for their users obtain new sources
of wealth and power, which inevitably lead to new forms of abuse of power and new forms of
societal disruption. Societal disruption in turn requires social adaptation, including new regulations
2 ID: CE819

to influence the behavior of firms and to define and to protect the rights of individuals in the
changed society. Social Welfare Computing seeks to guide social adaptation, combining insights
from disciplines as varied as anthropology, business strategy, economics, strategic planning, and
law.
[3] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.
[4] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[5] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal of
Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[6] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and re-
moving vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[7] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and privacy
protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[8] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.
The Eighth Commandment of Computer Ethics – ID: CE819 3

[9] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[10] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in
Vietnam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[11] H. T. Tavani, Ethics and Technology: Controversies, Questions, and Strategies for Ethical
Computing, 4th ed. Hoboken, NJ, USA: Wiley, 2013.
,→ This book introduces readers to a broad range of ethical and social issues within the field of
cyberethics, including those that directly impact professionals in computer and information tech-
nology (IT). Among the topics explored are moral responsibilities, the prevention of harm through
responsible computing, and the broader societal implications of unethical behavior in the digital
realm. It offers strategies to address these challenges, promoting a deeper understanding of ethical
computing practices.
[12] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview,
security intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
[13] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[14] R. C. Barquin, In Pursuit of a ’Ten Commandments’ for Computer Ethics, Computer
Ethics Institute, Washington, DC, USA, 1992.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses the
role the Computer Ethics Institute has played and then leads into the need for a set of standards
to guide and instruct people in the ethical use of computers. Among these commandments is the
principle of respecting intellectual property, which emphasizes avoiding unauthorized use or copying
4 ID: CE819

of proprietary software. This is where the ‘Ten Commandments for Computer Ethics’ was first
presented and has since been used by hundreds of schools and corporations.
[15] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection,
and defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS),
Berlin, Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
Respecting Intellectual Property in the Digital Era: Insights
from the Eighth Commandment of Computer Ethics

Anonymous1,2
1
Faculty of Computer Science and Engineering, Ho Chi Minh City University of Technology (HCMUT),
Ho Chi Minh City, Vietnam
2
Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam anonymous@hcmut.edu.vn

Digital transformation has introduced new risks and responsibilities for intellectual property.
Computers have revolutionized the way we share and build on knowledge, but this power requires
respecting intellectual property [ ]. As dependence on digital systems grows, cyber attacks like
malware and phishing increasingly threaten sensitive information across individuals, businesses,
and governments [ ]. Addressing these risks is vital to ensure digital technologies foster ethical
progress, not exploitation [ ].
The eighth commandment of the Ten Commandments of Computer Ethics, “Thou shalt not
appropriate other people’s intellectual output”, directly aligns with the challenges discussed here.
Respecting intellectual property is not just a legal duty but a moral imperative in the digital age.
Intellectual property theft is a pressing issue. The 2014 Sony Pictures hack caused significant
financial losses and leaked sensitive data, severely impacting the entertainment industry [ ]. Sim-
ilarly, the 2009 Google trade secret theft revealed risks of internal exploitation, where proprietary
algorithms were stolen and offered to competitors. These cases highlight the severe consequences
of intellectual property theft in the tech industry [ ].
In conclusion, intellectual property theft undermines innovation and trust. The examples of
Sony Pictures and Google illustrate how such actions not only cause financial damage but also
erode the integrity of industries. Upholding ethical standards and respecting intellectual property
ensures that digital technologies foster creativity and societal progress rather than exploitation.

References
T
. O DO. Based on the titles and abstracts of the references provided below, carefully read and
analyze their content to determine the most suitable references. Use the corresponding numbers to
fill in the [ ] in the essay above, ensuring that each citation is relevant and aligns accurately with
the context of the essay.
[1] J. M. Stewart, M. Chapple, and D. Gibson, Certified Information Systems Security Pro-
fessional (CISSP) Official Study Guide, 8th ed., Hoboken, NJ, USA: Wiley, 2018.
,→ This study guide for the CISSP certification covers key concepts in cybersecurity, including
threats like ransomware and their impact on organizations. It delves into security assessment, risk
management, and network protection strategies to prevent data loss and mitigate cyber threats.
The authors integrate real-world scenarios to illustrate the consequences of cyberattacks and the
importance of implementing robust cybersecurity measures.
[2] J. Dietrich, F. Leder, and T. Werner, “Botnets: Detection, measurement, disinfection, and
defence”, in Proceedings of the Conference on Communication and Internet Security (CCIS), Berlin,
Germany, 2012, pp. 1–17.
,→ The growing data volume from Space demands advanced tools and methodologies for effective
management. Automated systems utilizing artificial intelligence and botnets are critical for anomaly
detection and operational integrity. The risks of internal exploitation, as highlighted by the 2009
Google trade secret theft, underscore the importance of safeguarding proprietary technologies. By
integrating DevSecOps and cloud-based solutions, these systems ensure secure and efficient data
handling for scientific, commercial, and exploratory missions.
2 ID: CE820

[3] I. H. Sarker, M. H. Furhad, and R. Nowrozy, “AI-driven cybersecurity: An overview, se-


curity intelligence modeling and research directions”, SN Computer Science, vol. 2, no. 3, p. 173,
2021.
,→ Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution
(or Industry 4.0), which can be used for the protection of Internet-connected systems from cyber
threats, attacks, damage, or unauthorized access. To intelligently solve today’s various cybersecurity
issues, popular AI techniques involving machine learning and deep learning methods, the concept
of natural language processing, knowledge representation and reasoning, as well as the concept of
knowledge or rule-based expert systems modeling can be used.
[4] M. Akbanov, V. G. Vassilakis, and M. D. Logothetis, “WannaCry ransomware: Analysis of
infection, persistence, recovery prevention and propagation mechanisms”, Journal of Telecommu-
nications and Information Technology, no. 1, pp. 113–124, 2019.
,→ In recent years, we have been experiencing fast proliferation of different types of ransomware
targeting home users, companies and even critical telecommunications infrastructure elements.
Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mech-
anisms. Some recent examples that received significant attention include WannaCry, Petya and
BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand
the characteristics and the behavior of different types of ransomware.
[5] T. Q. Pham and M. N. Dang, “Impact factors of personal digital piracy behavior in Viet-
nam”, Science and Technology Development Journal, vol. 20, no. 1, pp. 45–55, 2017.
,→ This study from VNUHCM - HCMUT examines factors influencing personal digital piracy in
Vietnam and mitigation strategies. Using the Theory of Planned Behavior (TPB) and the Unified
Theory of Acceptance and Use of Technology (UTAUT), the study explores psychological, moral,
and technological dimensions of piracy. Key findings include the role of perceived behavioral control
and risk perception. The paper also references instances where enforcement actions were necessary
to address large-scale piracy issues in the country.
[6] S. J. Harrington, “The effect of codes of ethics and personal denial of responsibility on
computer abuse judgments and intentions”, MIS Quarterly, vol. 20, no. 3, pp. 257–278, 1996.
,→ This research examines the impact of ethical codes on the judgments and intentions of
information systems (IS) employees regarding computer abuse, including deceptive practices like
phishing and other harmful behaviors. The study highlights how ethical codes can clarify individual
responsibilities and reduce rationalizations for unethical actions. It also explores the psychological
trait of responsibility denial, showing its significant role in influencing decisions related to computer
misuse.
[7] P. Zhang and D. S. Lee, “Digital Rights Management (DRM) and software piracy: Strate-
gies and challenges”, Journal of Information Security and Applications, vol. 36, pp. 101–115, 2018.
,→ Digital Rights Management (DRM) systems provide a secure framework to control user
access and actions, crucial in today’s networked environment. They allow file owners to main-
tain control even after distribution, aiding in piracy prevention and protecting sensitive enterprise
documents. DRM operates at various levels, including application (e.g., Apple iTunes), operating
systems (e.g., Microsoft RMS), and hardware (e.g., DVD CSS). However, current DRM systems
often lack interoperability, fail to meet all customer requirements, or aren’t fully secure. This paper
reviews the current DRM landscape, evaluating their strengths and weaknesses, analyzing legal and
technical requirements, and assessing three specific DRM systems against these criteria.
[8] L. Lessig, Free Culture: The Nature and Future of Creativity, Penguin Books, 2004.
,→ Lawrence Lessig, a leading thinker on intellectual property (The New Yorker), warns that
in the digital era, where technology revolutionizes knowledge sharing, control over creativity is
increasingly concentrated in the hands of Big Media. This dominance undermines free markets,
free speech, and the tradition of free culture that fosters innovation. Lessig argues for safeguarding
The Eighth Commandment of Computer Ethics – ID: CE820 3

intellectual property and preserving an open digital ecosystem to protect our freedom to create,
build, and imagine.
[9] R. Barquin, “The ten commandments for computer ethics”, Computer Ethics Institute, vol.
27, 2006.
,→ This paper begins with an overview of what has occurred in the Computer Ethics Conferences
previous to 1992 and reaches the conclusion “that the time is ripe to enter into a normative phase
as we attempt to pursue a ‘ten commandments’ for computer ethics". Ramon Barquin discusses
the role the Computer Ethics Institute has played and then, leads into the need for a set of stan-
dards to guide and instruct people in the ethical use of computers. Barquin calls for the use of the
‘Ten Commandments for Computer Ethics.’ This is where the ‘Ten Commandments for Computer
Ethics’ was first presented and has since been used by hundreds of schools and corporations. The
ninth commandment of the Ten Commandments of Computer Ethics had clearly stated that: "Thou
shalt think about the social consequences of the program you are writing or the system you are de-
signing". This commandment emphasizes the responsibility of developers and designers to consider
the broader impact of their creations.
[10] S. Nguyen, “Copyright and intellectual property protection in Vietnam”, Asian Journal
of Law and Society, vol. 5, no. 2, pp. 200–215, 2019.
,→ This article analyzes intellectual property protection measures in Vietnam, with a focus
on legal frameworks and enforcement challenges. It highlights significant cases that illustrate the
financial and reputational risks of copyright infringement. The paper discusses how these cases
have shaped public awareness and policy adjustments in the evolving digital landscape.
[11] J. Isaak and M. J. Hanna, “User data privacy: Facebook, Cambridge Analytica, and
privacy protection”, Computer, vol. 51, no. 8, pp. 56–59, 2018.
,→ With the revelation that Facebook handed over personally identifiable information of more
than 87 million users to Cambridge Analytica, it is now imperative that comprehensive privacy
policy laws be developed. Technologists, researchers, and innovators should meaningfully contribute
to the development of these policies.
[12] R. von Solms and J. van Niekerk, “From Information Security to Cyber Security”, Com-
puters & Security, vol. 38, pp. 97–102, 2013.
,→ Cyber security and information security are closely related but distinct concepts. Cyber se-
curity extends beyond protecting information resources to safeguarding other assets, including indi-
viduals who may be targets or unwitting participants in cyber attacks. This broader scope introduces
ethical responsibilities, emphasizing the societal duty to protect vulnerable groups, such as children.
Addressing these risks is crucial to ensure digital technologies promote ethical progress rather than
exploitation.
[13] W. Sun, O. Nasraoui, and P. Shafto, “Evolution and impact of bias in human and machine
learning algorithm interaction”, PLOS ONE, vol. 15, no. 8, p. e0235502, 2020.
,→ Recently, algorithms have been receiving data from the general population in the form of
labeling, annotations, etc. The result is that algorithms are subject to bias that is born from in-
gesting unchecked information, such as biased samples and biased labels. Furthermore, people and
algorithms are increasingly engaged in interactive processes wherein neither the human nor the
algorithms receive unbiased data. Algorithms can also make biased predictions, leading to what is
now known as algorithmic bias. On the other hand, human’s reaction to the output of machine
learning methods with algorithmic bias worsen the situations by making decision based on biased
information, which will probably be consumed by algorithms later. Some recent research has focused
on the ethical and moral implication of machine learning algorithmic bias on society. However,
most researchs so far treated algorithmic bias as a static factor, which fails to capture the dynamic
and iterative properties of bias. We argue that algorithmic bias interacts with humans in an it-
erative manner. Based on statistical analyses of the results of several controlled experiments, we
4 ID: CE820

found that the three different iterated bias modes, as well as initial training data class imbalance
and human action, do affect the models learned by machine learning algorithms. We also found that
iterated filter bias, which is prominent in personalized user interfaces, can lead to more inequality
in estimated relevance and to a limited human ability to discover relevant data.
[14] M. Dunn Cavelty, “Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities”, Science and Engineering Ethics, vol. 19, no. 3, pp. 1083–1099, 2013.
,→ Current cyber-security approaches are failing, with increasing vulnerabilities rather than
stronger protections. Overemphasis on national security overlooks individual needs, weakening
global systems. The 2014 Sony Pictures hack exemplifies the consequences, causing significant fi-
nancial losses and leaking sensitive data. A balanced cyber-security policy must address these vul-
nerabilities while protecting privacy and data, ensuring ethical handling of information to prevent
similar incidents.
[15] L. A. Gordon and M. P. Loeb, “The Economics of Information Security Investment”, ACM
Transactions on Information and System Security (TISSEC), vol. 5, no. 4, pp. 438–457, 2002.
,→ As digital dependence grows, cyber threats like malware and phishing pose serious risks to
sensitive information. This article proposes an economic model to optimize security investments by
assessing information vulnerabilities and potential losses. It suggests prioritizing midrange vulnera-
bilities for cost-effective protection and allocating a fraction of expected losses to maximize resource
efficiency in mitigating these risks.

You might also like