<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar/19411988?origin\x3dhttps://is201-pasco.blogspot.com', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>
Thursday, March 30, 2006 Code of Ethics


Posted by Gadget Guy :: 6:49 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Wednesday, March 08, 2006 The Landmark Hacking Case Goes on Trial

If you were to decide the case of Landmark Hacking, what will be your judgment? Support your answer.

Based on the information presented, I will dismiss the case for lack of merit. The prosecution cannot establish the violation of RA8792 particularly hacking thru the presented evidence (server log and phone number records used to access the system). It is not very clear that Ms. Garcia stole, alter or destroy any information or document while accessing the system. The hacking is not a proper case to be filed, instead, breached of privacy is more appropriate. Also, we cannot consider the unauthorized access because the password was provided by the authorized personnel hired by the plaintiff and the access period happened during the employment of Ms. Garcia.

Posted by Gadget Guy :: 4:17 AM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Laws controling the use of computer technology


Are you in favor of the enactment and enforcement of laws that will regulate and control the use of computer technology?

Degree of regulation plays an important role to preserve order and stability in every country like Philippines. The chaos, unfairness will prevail if we don’t have standards that would regulate the use of computer technology. The computer technology plays an important role in our every day lives and in business operation, that is why we need to establish the rules in up to what extent that action is according to the law. Laws are the foundation of our living. Without such, there will be no guidelines to fall back whenever conflicts arise. It is also our protection for possible infringement of our great ideas and inventions.

Posted by Gadget Guy :: 4:12 AM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Wednesday, March 01, 2006 Social Justice Issue


Digital divide is one of the major problems in our country; we are divided by waters, and islands. The information from central city cannot elevate to the remote area like Mindanao. The amount of information is very limited for the students of this region. The Knowledge Channel, a private entity is the one who campaigning to provide these areas equipment like television set, cable connections to access the latest information available in the Manila. They formed the TEAM Mindanao or Television Education for the Advancement of Muslim Mindanao, and with the help of other country like UNIDO they are hopeful to provide 150 schools in Autonomous Region of Muslim Mindanao equipment and knowledge necessary to achieve a greater level of education. They are also aiming to modernize the schools with latest hardware for education.

In their six years of operation, the foundation achieved the following
Provision of Knowledge Channel to 1,528 public elementary and high schools
Potential reach of 2.67 million public school students and 6 million more viewers in households nationwide
Airing of over 3,000 titles of quality educational video materials based on the Department of Education’s curriculum
10-Year Memorandum of Agreement with the DepEd, mandating the viewing of the channel in all public schools throughout the country
Organized and conducted 94 School Principals’ Orientation Seminars attended by over 7,800 School Principals and Administrators nationwide
Organized and conducted 81 Teachers Training in ETV attended by 7,426 public school teachers nationwide
Partnerships with 111 provincial cable operator partners
Expanded reach in the Mindanao region with the establishment of Television Education for the Advancement of Muslim Mindanao, or TEAM-Mindanao, providing Knowledge Channel to 150 public schools in the Autonomous Region in Muslim Mindanao and the production of 30 episodes of livelihood and advocacy programs for out-of-school youth.
And now, they are aiming to reach every school throughout the country.
Source : The Knowledge Channel (http://www.knowledgechannel.com.ph

Posted by Gadget Guy :: 2:20 AM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Tuesday, February 28, 2006 Computer Crimes

From the cases summarized above, explain what constitutes a computer crime

Computer crime constitutes the following :
1. Stealing of username and password, accessing the victim’s and unauthorized use of a computer.
2. Creating or releasing a malicious computer program (e.g., computer virus, worm, spy ware).
3. Harassment and stalking in cyberspace


Discuss at least three other examples of computer crimes.

1. Altering a Website (Website Hacking)
This is one of the popular computer crime in the internet. The typical attack, the hacker will delete, some pages or graphics, and upload the defaced/altered version of the website with the same as the old name. In this, the hacker can control the message and express what is his sentiment.



2. Denial Of Service or Nuke Attack
In this computer crime, the attacker flood the Internet Server by sending a bogus request for web pages, rejecting the request of authorized user to access the same web page.

3. Cyber Harassment
The harasser intends to cause emotional distress to the victim. The harasser will send continuing e-mails to someone. It includes treats, sexual remarks, pejorative labels.

Posted by Gadget Guy :: 12:26 AM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Monday, February 27, 2006 Chat Groups and Free Expression

If you were granted indefinite and unrestricted access to the Internet, would you be interested to join a chat group that hold no barrrier as free expression and communicatrion are concerned? Why? Why Not?

If I were granted to access and unrestricted sites and chat groups, I prefer to join in free expressions and communications because it is easy and free for me to share my ideas to others, and to view other perspectives for certain topic. Of course, I will join only on the topics I am interested.

Posted by Gadget Guy :: 6:58 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Search Engine Privacy - Violation of Privacy in Computing

Think of an act, other than those already discussed in this module (Module 8), that would constitute a violation of privacy in computing. Explain.

If we are in the internet, we are inclined in using search engines such as Yahoo, Google, MSN and AOL. You are probably not aware that these search engines gathers and stores our personal information while we are searching for specific word, or sentence. According to them, they never delete the history that you searched for the purpose of their operations. No law in United States (or even in Philippines) prohibits gathering your history of together with your IP address while using the internet. I can consider this as violation of privacy because, you are not protected when these search engines collects your information and later can be used against you. According to CNET News.COM, the prosecutor can demand these search engine companies to provide the words, phrases that you’ve search in relation with your existing criminal or civil case. Since the Electronic Communication Privacy Act of 1986 did not cover the privacy on the search engines, these search engine companies can provide to anybody, from the IP address, your physical address, name, time you search the word/s. We don’t have any power to delete our search history because even these companies don’t have a capability to do that (at their own freewill).
For complete text on how Yahoo, Google, AOL, MSN address this topic, please visit When Google is not your friend.

Reference:
Declan McCullagh (2006). When Google is not your friend. Retrieved February 28, 2006, from CNET News.Com website: http://news.com.com/FAQ+When+Google+is+not+your+friend/2100-1025_3-6034666.html

Posted by Gadget Guy :: 6:18 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Friday, December 23, 2005 Legislation governing computer use


Although, there are already laws on specific fields or services of computer, I still find having a form of legislation to be enforced on computer use not necessary and will not be effective.

It is not necessary because computer usage is global, dynamic or changing. As I view it, computer use is more on our personal behavior and obligation. Computer use is a challenge to our own personal views or reflection than an obligation of the state/country to formulate laws or to have ordering principle. For me, it is more on education that we improve our human behavior and ethical views.

It will not be effective since computer use cannot be quantified and poses many significant technical challenges. Example, when a programmer creates an application for commercial use. The vendors of the application will not provide the source code to the buyers so it will be impossible for the buyers to verify that the application does what was suppose to do. So when failure occurs it will be impossible to assign the blame to the programmer. And also the failure can be blamed to the operating system or the libraries installed on the system.

Posted by Gadget Guy :: 9:50 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Three precepts on computer use



“Thou shalt not use a computer to harm other people.”

I think the ethical theory that underpins this precept is Ethical Absolutism. Ethical Absolutism state that there should be fixed or rigid factors in evaluating actions. Fixed factors are universal, constant and therefore unchanging reasons for judging an action as good or bad, right or wrong, just or unjust, among others. Doing harm to other people is universal or a fixed/rigid factor that can be used to evaluate an action.

“Thou shalt not use a computer to bear false witness.”

Moral law underpins this percept. Moral law dictates what sort of behavior or conduct that may or may not be expressed. It is the realm of generally recognized and desirable ethical norms and principles that control and rule the human conduct. Honesty, integrity and respect are moral conducts.

“Thou shalt not use a computer to steal.”

Utilitarianism underpins this precept. Utilitarianism states that actions that bring happiness are considered morally right while actions that inhibit happiness are considered morally wrong. Stealing is an action that inhibits happiness or stealing will result to pain or the reverse of happiness.

Posted by Gadget Guy :: 9:04 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============

Thursday, December 22, 2005 Most Predominant Theory


I think Immanuel Kant’s Categorical Imperatives is predominant in the computing world. As Kant‘s philosophy goes,

Nothing in the world – indeed nothing even beyond the world – can possibly be conceived which could be called good without qualification except in good will.

I think in the computing world there are ethical norms and laws that computer users are to recognize. We, as computer users and rational beings are able to discern and decide whether to obey these laws or norms. The will and the reason that make us obey these norms is the one that is good.

Posted by Gadget Guy :: 9:45 PM :: 0 comments

Post / Read Comments

=============== e t h i c s ===============