<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/19411988?origin\x3dhttp://is201-pasco.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
Tuesday, February 28, 2006 Computer Crimes

From the cases summarized above, explain what constitutes a computer crime

Computer crime constitutes the following :
1. Stealing of username and password, accessing the victim’s and unauthorized use of a computer.
2. Creating or releasing a malicious computer program (e.g., computer virus, worm, spy ware).
3. Harassment and stalking in cyberspace


Discuss at least three other examples of computer crimes.

1. Altering a Website (Website Hacking)
This is one of the popular computer crime in the internet. The typical attack, the hacker will delete, some pages or graphics, and upload the defaced/altered version of the website with the same as the old name. In this, the hacker can control the message and express what is his sentiment.


Example:
NEDA was hacked by a Filipino hacker rebarz99.

2. Denial Of Service or Nuke Attack
In this computer crime, the attacker flood the Internet Server by sending a bogus request for web pages, rejecting the request of authorized user to access the same web page.
Example :
Cyber-attackster Web heavyweights.

3. Cyber Harassment
The harasser intends to cause emotional distress to the victim. The harasser will send continuing e-mails to someone. It includes treats, sexual remarks, pejorative labels.

Posted by Gadget Guy :: 12:26 AM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Monday, February 27, 2006 Chat Groups and Free Expression

If you were granted indefinite and unrestricted access to the Internet, would you be interested to join a chat group that hold no barrrier as free expression and communicatrion are concerned? Why? Why Not?

If I were granted to access and unrestricted sites and chat groups, I prefer to join in free expressions and communications because it is easy and free for me to share my ideas to others, and to view other perspectives for certain topic. Of course, I will join only on the topics I am interested.

Posted by Gadget Guy :: 6:58 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Search Engine Privacy - Violation of Privacy in Computing

Think of an act, other than those already discussed in this module (Module 8), that would constitute a violation of privacy in computing. Explain.

If we are in the internet, we are inclined in using search engines such as Yahoo, Google, MSN and AOL. You are probably not aware that these search engines gathers and stores our personal information while we are searching for specific word, or sentence. According to them, they never delete the history that you searched for the purpose of their operations. No law in United States (or even in Philippines) prohibits gathering your history of together with your IP address while using the internet. I can consider this as violation of privacy because, you are not protected when these search engines collects your information and later can be used against you. According to CNET News.COM, the prosecutor can demand these search engine companies to provide the words, phrases that you’ve search in relation with your existing criminal or civil case. Since the Electronic Communication Privacy Act of 1986 did not cover the privacy on the search engines, these search engine companies can provide to anybody, from the IP address, your physical address, name, time you search the word/s. We don’t have any power to delete our search history because even these companies don’t have a capability to do that (at their own freewill).
For complete text on how Yahoo, Google, AOL, MSN address this topic, please visit When Google is not your friend.

Reference:
Declan McCullagh (2006). When Google is not your friend. Retrieved February 28, 2006, from CNET News.Com website: http://news.com.com/FAQ+When+Google+is+not+your+friend/2100-1025_3-6034666.html

Posted by Gadget Guy :: 6:18 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============