Tuesday, March 15, 2011

COMPUTER CRIME

1. What is computer crime?

 Ans. 
   Computer crime, or cyber crime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. With the advent of the computer, criminals have found a new way to commit crimes. A computer crime is any unlawful activity that is done using a computer. This definition can extend to traditional crimes that use a computer, such as counterfeiting money. It also includes more tech-savvy crimes, such as phishing or logic bombs. Using a computer in this way, a criminal may be able to conduct unlawful activity with more anonymity and may be able to get away with more before he is caught.

2. Give an example of a computer crime not stated in the Computer Ethics blog (http://cs192computerethics.blogspot.com/)

Ans.
               Other examples of computer crimes are illegal gambling and storing illegal information.

Illegal Gambling

           Gambling is illegal in many U.S. states, and is prohibited online unless you are physically located in a state that allows it. However, the 2008 Internet Skill Game Licensing and Control Act was introduced to Congress and states that players may participate in skill games, such as mah jong and poker, but not in pure luck games. If the player is under the age of 21, he cannot legally gamble in any state. Games that involve monetary transactions, such as transfers to and from credit cards and bank accounts, are considered illegal, so gamblers cannot legally collect their winnings.

Storing Illegal Information

            Criminals and pedophiles often use the Internet to obtain and transfer illegal images, such as child pornography. Even storing or saving these types of images on a computer is illegal. Other criminals use their computer databases to store illegal information, including confidential intellectual property. 

3. Visit this site. http://www.crime-research.org/news/09.07.2008/3443/
This is the site that features the first Hacking crime being filed in the Philippines.
Question:

What is stated in section 33a of Republic Act 8792?

Ans. 
          It is stated in section 33a of Republic Act 8792 that Hacking or crackling with refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years;

4. In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?

Ans. ODREx Dr. Othello Capuno.  







Saturday, January 8, 2011

ANSWERS!!!!!!!!!

1.      If you are to become a part of the VSU team who will formulate a handbook like that of Virginia University, give at least 2 policies that you want to be implemented in VSU or even just for CS students like you, regarding computing. Also include sanction or sort of punishment to those who will violate the said policy.

                   Ans:
                          The first policy that I want to implement is all students in VSU should have their own moodle account where they can answer their assignments, study lessons and etc.For those who will not follow will be expel from the university.Second the safety,privacy and security of moodle users. For those who will invade the privacy of others, steal others username and password, posting message in the moodle that can harm, threatened the users will be expel from the university.


2.    According to the definition of ethics, it can be connected to the norms or custom of the society. What could be ethical to one, could be unethical to another. If this is the case, in which ethics seem to be subjective in nature, why is there a need to study computer ethics at all? Support your opinion with facts.
                    
                   Ans:
                            For me there's a need to study computer ethics because studying computer ethics  will help you understand that some things are ethical to one could be unethical to another. It will remind you of what is right and wrong for example people are copying, distributing, and using software or games without paying for them. In studying computer ethics you will be reminded that what you are doing is software piracy and it is wrong. Studying computer ethics will served us our guide as computing professionals.

3.   There are 4 types of non-jural law. Divine, natural, moral and physical. If you are to practice just one type of the non-jural law for the entire existence of your life, what would it be and why? 

                Ans:
                      When I first read the question I am so sure of what is my answer it is Divine Law because for me God's Law is the most important of all the laws. We owe our lives to God and it's just right that for the entire existence of my life I will follow,praise, and honor Him.