Ethics in the Computer Age(1984)
Educational film presenting two mini-dramas about software piracy and computer hacking; released in August 1984.

Movie: Ethics in the Computer Age
Video Trailer Ethics in the Computer Age
Similar Movies
6.4D.A.R.Y.L.(en)
Daryl is a normal 10-year-old boy in many ways. However, unbeknown to his foster parents and friends, Daryl is actually a government-created robot with superhuman reflexes and mental abilities. Even his name has a hidden meaning -- it's actually an acronym for Data Analyzing Robot Youth Life-form. When the organization that created him deems the "super soldier" experiment a failure and schedules Daryl to be disassembled, it is up to a few rogue scientists to help him escape.
6.3F/X2(en)
F/X man Rollie Tyler is now a toymaker. Mike, the ex-husband of his girlfriend Kim, is a cop. He asks Rollie to help catch a killer. The operation goes well until some unknown man kills both the killer and Mike. Mike's boss, Silak says it was the killer who killed Mike but Rollie knows it wasn't. Obviously, Silak is involved with Mike's death, so he calls on Leo McCarthy, the cop from the last movie, who is now a P.I., for help and they discover it's not just Silak they have to worry about.
7.2Captain Blood(en)
Dr. Peter Blood, unjustly convicted of treason and exiled from England, becomes a notorious pirate.
6.6Last Night(en)
Various citizens of Toronto anxiously await the end of the world, which is occurring at the stroke of midnight on New Year's Day.
5.6One Point O(en)
Paranoid computer programmer Simon wakes up to find a package in his room one day. Despite attempts at securing his apartment, the packages keep arriving. While cameras watch Simon's every move, he struggles to find the answers to the mysterious forces taking over his life.
0.0The Egg(en)
A college freshman takes advantage of a rumor, straining the relationships with those around him.
5.9Demon Seed(en)
A scientist creates Proteus, an organic supercomputer with artificial intelligence which becomes obsessed with human beings, and in particular the creator's wife.
7.6Who Am I(de)
Benjamin, a young German computer whiz, is invited to join a subversive hacker group that wants to be noticed on the world's stage.
5.6Welcome to Macintosh(en)
"Welcome to Macintosh" is a documentary that mixes history, criticism and an unapologetic revelry of all things Apple. Whether a long time Mac fanatic or new to computers, Welcome to Macintosh explores the many ways Apple Computer (now Apple, Inc.) has changed the world, from the early days of the Apple-I to the latest the company has to offer.
6.3Steal This Film II(en)
These are strange times indeed. While they continue to command so much attention in the mainstream media, the 'battles' between old and new modes of distribution, between the pirate and the institution of copyright, seem to many of us already lost and won. We know who the victors are. Why then say any more?
6.6Oxygen(fr)
A woman wakes in a cryogenic chamber with no recollection of how she got there, and must find a way out before running out of air.
6.0The Gendarme and the Gendarmettes(fr)
Cruchot's police office moves into a new building. They do not only get high tech equipment, but also four young female police officers to educate. All of them scramble to work with them -- and cause pure chaos while being distracted by the fine ladies. Then they get into real trouble when one after the other of their female colleagues is kidnapped.
6.9Colossus: The Forbin Project(en)
The U.S. has handed over control of its nuclear defense system to the Colossus supercomputer designed by scientist Dr. Charles Forbin. It soon becomes clear, that the now-sentient Colossus is far more intelligent than its creator realized—with the fate of the world hanging in the balance.
5.1WarGames: The Dead Code(en)
Computer hacker Will Farmer engages a government super-computer named Ripley in an online terrorist-attack simulation game. Little does Farmer know that Ripley has been designed to appeal to potential terrorists, and certain software glitches have in turn made him become paranoid.
5.8The Perfect Score(en)
Six high school seniors decide to break into the Princeton Testing Center so they can steal the answers to their upcoming SAT tests and all get perfect scores.
2.5Fisher(en)
In the small town of Eden, Tennessee, a neglected and naive teenage girl named Clara Banks has made a habit of deceiving people online for gifts, a gambit known as "catfishing." She thinks it's all fun and games until she hooks the attention of the wrong person. A short time later, events set into motion spiral out of control as someone begins stalking Clara and her friends. As the consequences of her actions return to haunt her, twisted messages start showing up at Clara's home, causing her to fear for her life. Will she ever feel safe again now that the evil has come knocking?
3.3Lawnmower Man 2: Beyond Cyberspace(en)
After being rescued from the ruins of Virtual Space Industries, Jobe is rebuilt and reconnected to virtual reality by corporate mogul Jonathan Walker. Years later, teenage hacker Peter Parkette helps Jobe locate Benjamin Trace, the original creator of virtual reality, only to uncover Jobe’s plan to launch a new world order using Walker’s tech. Now, Peter, Trace, Cori, and a band of runaways must stop Jobe and Walker before they enslave humanity through cyberspace.
10.0Business Bag(ar)
Under Riyadh’s moonlit hustle, Salim’s routine shatters when mischievous aliens whisk his bag away, launching him into an unexpected adventure.
6.1Jumpin' Jack Flash(en)
Terry works for a bank, and uses computers to communicate with clients all over the world. One day, she gets a strange coded message from an unknown source. After decoding the message, Terry becomes embroiled in an espionage ring. People are killed, and Terry is chased. Throughout, she remains in contact with this mysterious person, who needs Terry's help save his life.

