Tuesday, March 15, 2011

CS 192 - Modules 11-13: Answers to Questions

0 comments
1. What is computer crime?
In my opinion, I consider computer abuses as computer crimes when these abuses have gone far beyond the laws of the local or national (or even international) government. Computer crimes are unethical and have broken privacy issues as much as computer abuses. In addition, these involve theft, copyright infringement, and pornography using the information communications technology.

2. Give an example of a computer crime not stated in the Computer Ethics blog. (http://cs192computerethics.blogspot.com)
One example of a computer crime is Cyberstalking. The perpetrator uses the information communications technology to stalk the victim in a way that he invades the privacy of his victim.

Some methods would include gathering personal information about the victim, from social networking sites or even email messages. Most cyberstalkers intend to defame their victim such as creating fake profiles in the name of the victim and claims that are usually degrading to the victim. In some cases, cyberstalkers would blackmail their victims and ask them for money or return of personal affections and the like.

Cyberstalking is very much a computer crime because it is closely related to real life hostage taking and hold-up cases.

3. Visit this site. http://www.crime-research.org/news/09.07.2008/3443/ 
This is the site that features the first Hacking crime being filed in the Philippines.
Question:
What is state in section 33a of Republic Act 8792?
It is stated there that going through sensitive information of a computer system/server using unauthorized access, without the knowledge and consent of the owner, with the pursuit of altering, stealing or destroying the information or server is punishable with a fine of P100,000.00 or 6 months to 3 years imprisonment.

This includes unauthorized hacking and introducing viruses to the system resulting to the corruption, destruction, alteration, theft or loss data within the server.

4. In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of thos who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?
The Office of the Director for Research and Extension or more known as ODREx handles the Intellectual Property Rights of intellectual output works of the university. Specifically, it is in the Intellectual Licensing Office (ILO) where they deal with these concerns. The head of ODREx is Dr. Othello Capuno, the VP for research and extension.

Saturday, January 8, 2011

CS192 - Answers to Questions 2

2 comments
1. Visit this site.
http://www.itc.virginia.edu/pubs/docs/RespComp/rchandbook.html

This is about the student handbook on computing for the students of Virginia University. Read and understand their handbook.

a. If you are to become a part of the VSU team who will formulate a handbook like that of Virginia University, give at least 2 policies that you want to be implemented in VSU or even just for CS students like you, regarding computing. Also include sanction or sort of punishment to those who will violate the said policy.


  • Unless instructed to do so, students or any computer user will refrain from changing the current settings of the computer, such as changing the resolutions, adjusting the colors or any form that will alter the state of the computer. This includes downloading from the internet, and installing and uninstalling software. Any violation against this policy will render one hour of community service.
  • Students will not access files or websites with malicious content using the computer. These are frequently found in pop-up advertisements and spam in e-mails. Any devices to be read by the computer must be scanned and cleaned of suspicious files. This is to avoid corrupted files from harming the computer. The last user of the computer found to be infected with a computer virus will be subjected to questioning. If guilty, the user will pay a percentage for the service fee of repairing the computer.

2. According to the definition of ethics, it can be connected to the norms or custom of the society. What could be ethical to one, could be unethical to another. If this is the case, in which ethics seem to be subjective in nature, why is there a need to study computer ethics at all? Support your opinion with facts.

  • One of the reasons is because studying computer ethics will make us behave like responsible professionals. We still need to contribute to the community and this is one of the least things we can do. By doing so, we can avoid computer abuse and catastrophes. We can protect ourselves from devastating effects of computer technology. Furthermore, because of the involvement of computers in human conduct, there is a creation of new ethical issues, unique to computing, that do not surface in other areas, such as phishing and spamming. If these will not be taken into consideration, then there will be no progress in the community, and the whole realm of computer technology will be lost.

3. There are 4 types of non-jural law. Divine, natural, moral and physical. If you are to practice just one type of the non-jural law for the entire existence of your life, what would it be and why?

  • I would have to choose moral law. I am a human being and I cannot avoid the fact that I make mistakes. However, being able to do the right thing will make me feel better than having to do something which will seem right for others, even if it's a mistake. It does not matter how people will perceive me as long as I know I am doing the right thing to others, and to myself. Pretending not to do something, just for the sake of others is not a good thing. Being myself is a lifestyle that I will have to follow in order to live. As the famous song goes, "Life's not worth a damn, until you can say 'I am what I am.' " However, there is a difference between being myself and being rude. Surely, I can monitor that.