1. What is computer crime?: A computer crime is a crime done using a computer through a network or standalone manner but mostly it is a criminal exploitation of the Internet. Most computer crimes are scams, scandals, false information, PIRACY(mostly on movie and music industry), counterfeiting, copyright infringement, terrorism and CRACKING or HACKING.
2.Give an example of a computer crime not stated in the Computer Ethics blog: Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows software and Dictionary attacks on administrator passwords to co-opt machines and link them into a virtual computer that can be commanded remotely by its authors. Conficker has since spread rapidly into what is now believed to be the largest computer worm infection since the 2003 SQL Slammer, with more than seven million government, business and home computers in over 200 countries now under its control. The worm has been unusually difficult to counter because of its combined use of many advanced malware techniques.
3.) Section 33a of Republic Act 8792 states that: Hacking or crackling with refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.
4.)In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?: The Office that hanndles the IPR is the Office of the Director for Research & Extension headed by Dr. Othello Capuno.
Tuesday, March 15, 2011
Sunday, January 9, 2011
January 9.
A.) --Everyone at the University has access to information servers for electronic mail (email) and other Internet services.
--Public computer labs are available for general use at locations around the Grounds. These public computer labs sites provide access to the Internet and essential software for coursework. Some locations have student consultants on duty to help you with your computing questions.
Sanction and Punishment: System administrators will check the computer labs or the public computers, any malicious or not "school related" software installed will be remove and the student who are responsible for the public computer or the computer lab will be suspended for computer 1 month computer access within the university network.
B.) Computer ethics can be ethical to others and not for some individuals or groups. There is a need to study computer ethics to determine what should the user should do or not in such cases,such as to formulate policies to guide our actions. When a law tells us to do or not to do something, it implies that a recognized, established authority has decided that the action the law permits or prohibits is of some benefit to society in some way. It often happens that an ethical principle was the basis for any decision regarding this issue before the law was constructed. The fact that the law is grounded in ethical principles makes law a good point for ethical decision making. So whenconfronted with an ethical decision, research the law’.
C.) I guess physical law, because as cited from the book without constancy, regularity, uniformity and imperativeness, an occurrence or corporeal phenomena cannot be regarded as physical law or law of nature. In this country, there is constancy and regularity reproducing copies of the unlicensed software. So many pirated DVD available in the market. THANK YOU!
--Public computer labs are available for general use at locations around the Grounds. These public computer labs sites provide access to the Internet and essential software for coursework. Some locations have student consultants on duty to help you with your computing questions.
Sanction and Punishment: System administrators will check the computer labs or the public computers, any malicious or not "school related" software installed will be remove and the student who are responsible for the public computer or the computer lab will be suspended for computer 1 month computer access within the university network.
B.) Computer ethics can be ethical to others and not for some individuals or groups. There is a need to study computer ethics to determine what should the user should do or not in such cases,such as to formulate policies to guide our actions. When a law tells us to do or not to do something, it implies that a recognized, established authority has decided that the action the law permits or prohibits is of some benefit to society in some way. It often happens that an ethical principle was the basis for any decision regarding this issue before the law was constructed. The fact that the law is grounded in ethical principles makes law a good point for ethical decision making. So whenconfronted with an ethical decision, research the law’.
C.) I guess physical law, because as cited from the book without constancy, regularity, uniformity and imperativeness, an occurrence or corporeal phenomena cannot be regarded as physical law or law of nature. In this country, there is constancy and regularity reproducing copies of the unlicensed software. So many pirated DVD available in the market. THANK YOU!
Subscribe to:
Posts (Atom)