COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Responsible Publication
|
|
Non-Discrimination
|
|
Respect for Colleagues
|
|
Responsible Mentoring
|
Detailed explanation-1: -Researchers must implement specific protections to minimize all forms of discomfort and harm to align with the principle of beneficence. Under the principle of beneficence, researchers must also protect participants from exploitation.
Detailed explanation-2: -Whatever agreed upon with the participants must be actualized. (integrity, legality, social responsibility, responsible publication) 13. The researchers should accept all comments and give considerations. (openness, non-discrimination, responsible mentoring, integrity) 14.
Detailed explanation-3: -Any person should not be coerced to participate in any research undertaking. The participants must remain anonymous throughout the study even to the researchers themselves. Sufficient attribution should NOT be placed when using the ideas of others.