Tuesday, March 15, 2011

CS 192 modules 11-13

1. What is computer crime?

Computer crimes encompass unauthorized or illegal activities perpetrated via computer as well as the theft of computers and other technological hardware. Although there is no clear meaning of what really a computer crime means but for me, when you have done something bad or wrong with the use of a computer, it is considered a computer crime especially when you have violated the commandments in computing.




2. Give an example of a computer crime not stated in the Computer Ethics blog (http://cs192computerethics.blogspot.com/)

  1. Software Cracking
    Software cracking is the process of bypassing the registration and payment options on a software product to remove copy protection safeguards or to turn a demo version of software into a fully functional version without paying for it. Cracking software generally requires loading the executable into a hexadecimal code editor and directly modifying it. The executable is then run in place of the original.

    Software cracking is considered illegal and cracked software is often called pirated software. Cracked software generally has had the executable modified and can cause undesirable behavior.


    1. Cyberstalking

    People leave a lot of information about themselves online. Such information can leave you vulnerable to cyberstalking, a term that essentially refers to using the Internet to stalk someone in the traditional sense.

    Cyber stalking is essentially using the Internet to repeatedly harrass another person. This harassment could be sexual in nature, or it could have other motivations including anger or outright hostility.


    Here are some sites that has informations regarding computer crimes:

    1. http://www.makeuseof.com/tag/top-five-computer-crimes-protect/
    2. http://www.rbs2.com/ccrime.htm




    3. Visit this site. http://www.crime-research.org/news/09.07.2008/3443/
    This is the site that features the first Hacking crime being filed in the
    Philippines.
    Question: 
    What is stated in section 33a of Republic Act 8792

    Philippine Electronic Commerce Act (Republic Act No. 8792) 

    The Act provides specifically that “Hacking or cracking which refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One hundred thousand pesos (P100,000) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years;”
     



    4. In
    Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?

    The office who caters with the IPR concerns is the Office of the Director of Research and Extension (ODREx) and the head of the office is Dr. Othello Capuno. 

    Saturday, January 8, 2011

    module 1 and module 2 assessment questions with answers

    1. If you are to become a part of the VSU team who will formulate a handbook like that of Virginia University, give at least 2 policies that you want to be implemented in VSU or even just for CS students like you, regarding computing. Also include sanction or sort of punishment to those who will violate the said policy.

    If I were a part of VSU team who will formulate policies to be implemented in regarding computing, I will suggest:

    (1)   COMPUTING LAB POLICY - This policy is in place to ensure that the computing labs are kept functioning at an optimal level of effectiveness for all users. Example: (a) Persons using laboratory equipment must have a ID card valid for the current semester. (b) All persons using the lab are responsible for backing up their own data and protecting their own information. (c) Food, beverages, tobacco use, weapons, firearms or animals, except service animals, are prohibited in the labs. (d) Disabling computers by disconnecting cables, removing hardware, applying software locks or locking workstations will be considered vandalism.
    (2)   ACCEPTABLE USE POLICY - Every user of the network has a responsibility to utilize these shared resources in an appropriate manner.

    Network users are expected to respect restrictions on authorized access to network information and resources. Violations of this policy include activities such as:
    ·            use of another user’s password (with or without their knowledge);
    ·            sharing of one’s own password with another user;

    Network users are expected to treat all network hardware with care and are expected to utilize all network resources in ways that respect the other network users.
    The following activities constitute violations of this policy:

    ·         damaging University hardware,
    ·         introducing viruses,
    ·         deliberately slowing a system,
    ·         attempting to crash a system. 
    Violation of these policies may result in loss of computer lab privileges and other disciplinary action as described in the various handbooks issued by the University to students.

    2. According to the definition of ethics, it can be connected to the norms or custom of the society. What could be ethical to one could be unethical to another. If this is the case, in which ethics seem to be subjective in nature, why is there a need to study computer ethics at all? Support your opinion with facts.


    “What could be ethical to one could be unethical to another.” It is true but there is still a need to study computer ethics because doing so will make us behave like responsible professionals, doing so will teach us how to avoid computer abuse and catastrophes, the advance of computing technology will continue to create temporary policy vacuums, the use of computing permanently transforms certain ethical issues to the degree that their alterations require independent study, the use of computing technology creates, and will continue to create, novel ethical issues that require special study; this is according to Walter Maner.



    3. There are 4 types of non-jural law.  Divine, natural, moral and physical. If you are to practice just one type of the non-jural law for the entire existence of your life, what would it be and why?

    For me, I prefer to practice natural law among the 4 types of non-jural law. We must be fair to others and put ourselves in their situation. Like in the issue reproducing copy computer software (piracy) which is unrighteous deeds, we all know that they also took so much time in developing it so we must respect their rights if they want to have payment for its license. I admit even me I sometimes abide those things, since I cannot afford paying the amount. But if only I can afford why not pay that certain amount, as sign of my respect to the developer.

    Sunday, December 19, 2010

    cs192


    1. What would you like to be 5 years from now? (hopes, aspirations, wishes...)

    5 years from now I would like to be an employed woman in a company (locally or even in other country) where I am contented of the salary. I would like to see myself having a stable job by that time so that I can fulfill my plans for my family and I can go to different places where I wish to go to. I want my family to be happy and experience those things that they didn’t experience before especially my grandmother. That's the time that I would have the chance to make them happy in return for their sacrifices for me. I hope I can fulfill those things even not in the span of 5 years.



    2. If you will be a full-pledged computer programmer 5 years from now, what program would you do? and why?

    If I where a full-pledged computer programmer 5 years from now, I will make a program that is related to Artificial Intelligence because it satisfies the ultimate goal of creating computer programs. AI somewhat summarizes or combines all programming knowledge.

    But practically speaking, if by that time I am working already in a company of creating programs I prefer to do programs that our boss assigned me to do. I rather use my time in making programs that I am paid, for me to have an income.  ^_^



    3. If you are a machine, what would you be and why?

    If I am a machine, I would like to be a robot because a robot can be programmed and/or designed to do many things. People mostly think robot is their slave. But it depends on how people look at it because robot can be an assistant to people, not a slave. People still do work but not the tedious one. People must think that they must not depend always on robots.

    Thursday, December 9, 2010

    My First Blog :)

    weeee.... For the first time i have already a Blog ~",~.. follow daun mga CS 4th year hehehe... gae ko suggestions saon pag panindot ani hehehe tanx