Wednesday, March 16, 2011

CS 192 Chapter 11-13

1. What is computer crime?
  • Computer crime or cybercrime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. It is refers to any crime that involves a computer and a network.
2. Give an example of a computer crime not stated in the Computer Ethics blog.
  • Making and digitally distributing child pornography. Child pornography refers to images or films (also known as child abuse images) and in some cases writings depicting sexually explicit activities involving a child; as such, child pornography is a record of child sexual abuse. Abuse of the child occurs during the sexual acts which are recorded in the production of child pornography, and several professors of psychology state that memories of the abuse are maintained as long as visual records exist, are accessed, and are "exploited perversely."
3. Visit this site. http://www.crime-research.org/news/09.07.2008/3443/
This is the site that features the first Hacking crime being filed in the Philippines.
Question:
What is stated in section 33a of Republic Act 8792?
  • As our technology progress more, people around it and are affected or using it progress in terms of using it and developing it. But there are some people who are accessing the internet or the computer without legal authorization. Some are making applications that will cause damage, accessing accounts without legal permission, or even by distributing pornography of a child photo, etc. These acts are computer crimes. But the most common computer crime is the one called hacking. Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. Hacking could be fixing programs until they work, modifying the computer hardware to make it work better or tuned to the person's wishes or breaking into secure systems to determine their weaknesses and to explore them. Hacking is a punishable offense under section 33a of Republic Act 8792.
4. In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?
  • The office of the Director for Research & Extension (ODREx)
  • Headed by Dr. Othello Capuno

Thursday, January 20, 2011

1.If you are to become a part of the VSU team who will formulate a handbook like that of Virginia University, give at least 2 policies that you want to be implemented in VSU or even just for CS students like you, regarding computing. Also include sanction or sort of punishment to those who will violate the said policy.
  • Downloading of irrelevant videos and internet gaming within classroom hours should be prohibited for it hinders attention to class discussions and it will slow down the system of the computers. Students caught doing so during class hours, for the first time, are to suspended for two days from using the computer facilities of the school. And for the second time, be fined for an appropriate specified amount. 
  • Posting of nasty or scandalous pictures and/or videos that will ruin the reputation of the university should be prohibited and immediately stopped if there is any found out. The team should immediately trace the doer and be warned for expulsion for the first act and be expelled on the next attempt.
2. According to the definition of ethics, it can be connected to the norms or custom of the society. What could be ethical to one, could be unethical to another. If this is the case, in which ethics seem to be subjective in nature, why is there a need to study computer ethics at all? Support your opinion with facts.

  • When one is trying to create a blog for people to comment on things posted which are about things,people, etc. it could be ethical in the sense that you are helping people to express their ideas, but in the other hand, you are trying to establish a conversation where one could hurt the other by their own uncontrolled ideas which the others would possibly consider it wrong, tactless or immoral, which would turn out to be unethical.
          By studying computer ethics, one would be able to understand or know the limits of computer usage
          and even internet usage.

3. There are 4 types of non-jural law. Divine, natural, moral and physical. If you are to practice just one type of the non-jural law for the entire existence of your life, what would it be and why?
  • “Violation on law on intellectual property could be stated as “piracy, or the unauthorized copying, reproduction, dissemination, modification, storage, uploading, downloading, communication, making available to the public, or broadcasting or protected material, electronic signature or copyrighted works including legally protected sound recordings or phonograms or information material on protected works, through the use of telecommunication networks, such as, but not limited to internet…”
        In simple words. The infringement of intellectual property rights has something to do with 
        the act of stealing, theft or robbery.

        “Thou shall not steal…”, stated by the Holy Bible which contains the Holy Writings of
        Christianity. This relates to the above description. Therefore, this law governing computer
        use is under the divine law.
        
        Why this law? Because it is the most self explanatory one for me and I liked how it deeply
        connects with the Bible of which I deeply believe in and include it in my life.

Wednesday, January 5, 2011

Answers to the questions.....

1. What would you like to be 5 years from now? (hopes, aspirations, wishes...)
  • Five years from now is yet unpredictable. Hopes are all that we can do before it comes. As a student now, I always hoped and wished to be successful; an Arm Forces of the Philippines official someday. To be an official is to have a degree. Any degree wouldn't matter for it will only serves as your skill. Apart of being successful is to help other people and to be able to help back my family who are also one of the biggest reasons of my future success.
2. If you will be a full-pledged computer programmer 5 years from now, what program would you do? and why?
  • If I will be a full-pledged computer programmer 5 years from now I would like to create a program that will not only delete and stop computer viruses that always damages our personal computers and even corrupt important files and forever lost it. I would like to create a program that will forever terminate all computer viruses that are being created.
3. If you are a machine, what would you be and why?
  • If I were a machine, I would probably want to be and would be a computer. To be a computer would be a great help to any profession now a days. Since I always wanted to help, I would probably want to be a computer. To be a computer I will be able to know what other programs necessary and I will be able to learn more about computers and how we could use it for the best in the best way.