Tuesday, March 15, 2011

CS 192 modules 11-13

1. What is computer crime?

Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. Although there is no clear meaning of what really a computer crime means but for me, when you have done something bad or wrong with the use of a computer, it is considered a computer crime especially when you have violated the commandments in computing.




2. Give an example of a computer crime not stated in the Computer Ethics blog (http://cs192computerethics.blogspot.com/)

  1. Software Cracking
    Software cracking is the process of bypassing the registration and payment options on a software product to remove copy protection safeguards or to turn a demo version of software into a fully functional version without paying for it. Cracking software generally requires loading the executable into a hexadecimal code editor and directly modifying it. The executable is then run in place of the original.

    Software cracking is considered illegal and cracked software is often called pirated software. Cracked software generally has had the executable modified and can cause undesirable behavior.


    1. Cyberstalking

    People leave a lot of information about themselves online. Such information can leave you vulnerable to cyberstalking, a term that essentially refers to using the Internet to stalk someone in the traditional sense.

    Cyber stalking is essentially using the Internet to repeatedly harrass another person. This harassment could be sexual in nature, or it could have other motivations including anger or outright hostility.


    Here are some sites that has informations regarding computer crimes:

    1. http://www.makeuseof.com/tag/top-five-computer-crimes-protect/
    2. http://www.rbs2.com/ccrime.htm




    3. Visit this site. http://www.crime-research.org/news/09.07.2008/3443/
    This is the site that features the first Hacking crime being filed in the
    Philippines.
    Question: 
    What is stated in section 33a of Republic Act 8792

    Philippine Electronic Commerce Act (Republic Act No. 8792) 

    The Act provides specifically that “Hacking or cracking which refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One hundred thousand pesos (P100,000) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years;”
     



    4. In
    Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?

    The office who caters with the IPR concerns is the Office of the Director of Research and Extension (ODREx) and the head of the office is Dr. Othello Capuno. 

    Saturday, January 8, 2011

    module 1 and module 2 assessment questions with answers

    1. If you are to become a part of the VSU team who will formulate a handbook like that of Virginia University, give at least 2 policies that you want to be implemented in VSU or even just for CS students like you, regarding computing. Also include sanction or sort of punishment to those who will violate the said policy.

    If I were a part of VSU team who will formulate policies to be implemented in regarding computing, I will suggest:

    (1)   COMPUTING LAB POLICY - This policy is in place to ensure that the computing labs are kept functioning at an optimal level of effectiveness for all users. Example: (a) Persons using laboratory equipment must have a ID card valid for the current semester. (b) All persons using the lab are responsible for backing up their own data and protecting their own information. (c) Food, beverages, tobacco use, weapons, firearms or animals, except service animals, are prohibited in the labs. (d) Disabling computers by disconnecting cables, removing hardware, applying software locks or locking workstations will be considered vandalism.
    (2)   ACCEPTABLE USE POLICY - Every user of the network has a responsibility to utilize these shared resources in an appropriate manner.

    Network users are expected to respect restrictions on authorized access to network information and resources. Violations of this policy include activities such as:
    ·            use of another user’s password (with or without their knowledge);
    ·            sharing of one’s own password with another user;

    Network users are expected to treat all network hardware with care and are expected to utilize all network resources in ways that respect the other network users.
    The following activities constitute violations of this policy:

    ·         damaging University hardware,
    ·         introducing viruses,
    ·         deliberately slowing a system,
    ·         attempting to crash a system. 
    Violation of these policies may result in loss of computer lab privileges and other disciplinary action as described in the various handbooks issued by the University to students.

    2. According to the definition of ethics, it can be connected to the norms or custom of the society. What could be ethical to one could be unethical to another. If this is the case, in which ethics seem to be subjective in nature, why is there a need to study computer ethics at all? Support your opinion with facts.


    “What could be ethical to one could be unethical to another.” It is true but there is still a need to study computer ethics because doing so will make us behave like responsible professionals, doing so will teach us how to avoid computer abuse and catastrophes, the advance of computing technology will continue to create temporary policy vacuums, the use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study, the use of computing technology creates, and will continue to create, novel ethical issues that require special study; this is according to Walter Maner.



    3. There are 4 types of non-jural law.  Divine, natural, moral and physical. If you are to practice just one type of the non-jural law for the entire existence of your life, what would it be and why?

    For me, I prefer to practice natural law among the 4 types of non-jural law. We must be fair to others and put ourselves in their situation. Like in the issue reproducing copy computer software (piracy) which is unrighteous deeds, we all know that they also took so much time in developing it so we must respect their rights if they want to have payment for its license. I admit even me I sometimes abide those things, since I cannot afford paying the amount. But if only I can afford why not pay that certain amount, as sign of my respect to the developer.