Wednesday, March 16, 2011

Computer Crimes

Module 11-13

1. What is computer crimes?

         Computer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Netcrime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking,copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

        On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Courtamong the few addressing this threat.

2. Give an example of a computer crime not stated in the Computer Ethics blog (http://cs192computerethics.blogspot.com/)

        Cyberstalking
        A Glendale businessman stalked his ex-girlfriend using the GPS tracking device on a cell phone. He purchased a Nextel phone device that has a motion switch on it that turns itself on when it moves. As long as the device was on, it transmitted a signal every minute to the GPS satellite, which in turn sent the location information to a computer. The ex planted the phone underneath her car, paid for a service to send him the information and would log on to a website to monitor her location. The victim would suddenly ‘bump’ into him at the coffee shop, LAX, even the cemetery. She knew something was up — it wasn’t hard to realize as he was also phoning her 200 times a day — but police couldn’t help her. It was only when she called police after seeing him under her car that she got action (he was trying to change the cell phone battery).  

3. Visit this site. http://www.crime-research.org/news/09.07.2008/3443/
This is the site that features the first Hacking crime being filed in the Philippines.
Question: 
What is stated in section 33a of Republic Act 8792?

          Hacking or crackling with refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years.

4. In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?

         Office of the Director of Research and Extension (ODREx) headed by Dr. Othello Capuno. 

Wednesday, January 19, 2011

MIDTERM EXAM

What are the ethical issues that seem to enslave this growing industry?

         The ethical issues that seem to enslave this growing industry are that many Filipinas will have to join this kind of socializing networks especially poor Filipinas. For they do believe that this will be the bridge for their future. It is also their way to rise from poverty.


Is there much of a difference between the mail order brides industry or companies that provide escort services versus meeting someone over the Internet in a chat room?

         In my own theory, there is only a bit of difference between the two. Meeting someone over the Internet in a chat room provides the user, especially the female, to choose who they want to meet. Unlike the mail order brides or escort services, female will be forced to meet with these men because this is they're job even if they don't like it.


Does this industry differs much from arranged marriages that take place in some culture? Or in the case of "female escorts", does this differ from prostitution?


           This industry differs much from arranged marriage because it is based from their culture or religion, especially Royal Bloods such as kings and queens or prince and princess. But in the case of "female escorts" this is just the same as prostitution, in my opinion, because females are force to meet this client even if they don't know or like them. The client can do whatever he wishes to do.

Sunday, January 9, 2011

Handbook.

1. If I will be a part of the team that will formulate the handbook, my 2 policies will be:
        
  • Never abuse the system. The system was created for the students and anyone inside the university for educational purposes. Spamming and doing unrelated things in the system is an annoying and disrespectful deed to be done. The user or the person responsible will be called for a meeting regarding the deed.
  • Hacking and changing the system is prohibited. Many people within the university is capable of doing this since the university offers computer classes. A small change in the system could lead to a chaos for the system is used every second. Suspension for 1 month in computer classes should be given to the responsible person.

2.  According to the definition of ethics, it can be connected to the norms or custom of the society. What could be ethical to one, could be unethical to another. If this is the case, in which ethics seem to be subjective in nature, why is there a need to study computer ethics at all? Support your opinion with facts.

  • Piracy. This has been a major issue in society nowadays. Downloading softwares, music files and manuals through the internet could be ethical to someone. But to the people who are the creator or publisher of the certain file downloaded would think that it is unethical. Yes it may seem good to think that what you're downloading could benefit you but it is quite unfair to the people purchasing the file via cash card or credit card. Computer ethics must be studied to let people know that what they're doing is wrong. Example for this is the movie X-Men Origins: Wolverine. The movie was leaked even though it was not yet finished. Harnesses were still attached and the effects were still dull. Still, many have downloaded it because they are quite excited in the movie resulting for the loss of viewers in the premiere and the loss of profit. 
3. There are 4 types of non-jural law. Divine, natural, moral and physical. If you are to practice just one type of the non-jural law for the entire existence of your life, what would it be and why?
  • Natural Law. In my own perspective, everyone is fair and equal. Everyone should be given the justice they are supposed to have. Just because you are on the top of the society doesn't mean you have all the power in the world. The lower classes in the society should also have the right to seek justice. This is what our country lacks. Since I am to practice the natural law, I would imply the fairness and justice to society through the internet.  

Saturday, January 8, 2011

5 YEARS FROM NOW!!

1. What would you like to be 5 years from now?
Thinking for the future is the best plan for my life. Being a successful man would be great. And 5 years from now, my goal is to be a great programmer. Making and developing new algorithms that I can share for the future. And a business of my own.

2. If you will be a full-pledged computer programmer 5 years from now, what program would you do and why?
A program that would benefit all, such as educational softwares. To share my generosity and knowledge to the students.

3. If you are a machine, what would you be and why?
Computer, it would be odd because I'm a programmer myself. Computer nowadays are mostly used in business, schoolworks and entertainment.

Wednesday, December 15, 2010