Wednesday, November 30, 2005

MoDuLe 7 AnD 8

Please bear with my opinions. I know it's not that great but i still hope you'll learn something from it. Enjoy! :-)

COMPUTER ABUSES. There are some activities however that most educators would agree are misuses of computer technology in a school environment. They include: profanity and obscenity, harassment, hacking, spamming, password sharing/"sniffing", deploying, viruses/trojan horses/worms, copying copyrighted software and inappropriate virtual interaction with minor children. Other grayer areas of computer misuse might include: use of internet filters, restricting free speech, commercialism, political content, art/health issues vs. obscenity and sharing files via peer-to-peer networks.

"Data Diddling" - Probably the most common method used to commit computer crime because it does not require sophisticated technical knowledge and is relatively safe. Information is changed at the time of input to the computer or during output. For example, at input, documents may be forged, valid disks exchanged, and data falsified.
"Browsing" - Another common method of obtaining information which can lead to crime. Employees looking in others' files have discovered personal information about coworkers. Ways to gain access to computer files or alter them have been found in trash containers by persons looking for such information. Disks left on desks have been read, copied, and stolen. The very sophisticated browser may even be able to look for residual information left on the computer or on a storage media after the completion of a job.
"Trojan Horse" - This method assumes that no one will notice that a computer program was altered to include another function before it was ever used. A computer program with a valid, useful function is written to contain additional hidden functions that exploit the security features of the system.
"Trap Door" - This method relies on a hidden software or hardware mechanism that permits system protection methods to be circumvented. The mechanism is activated in some nonapperent manner. Sometimes the program is written so that a specific event, e.g., number of transactions processed or a certain calender date, will cause the unauthorized mechanism to function.
"Salami Technique" - So named because this technique relies on taking slices so small that the whole is not obviously affected. This technique is usually accomplished by altering a computer program. For example, benefit payments may be rounded down a few cents and these funds, which can be considerable in the aggregate, diverted to a fraudulent account.
"Supperzapping" - Named after the program used in many computer centers which bypasses all system controls and is designed to be used in time of an emergency. Possession of this "master key" gives the holder opportunity to access, at any time, the computer and all of its information.

PRIVACY ISSUES. Yes. Many people expect that their online activities are anonymous. They are not. It is possible to record virtually all online activities, including which newsgroups or files a subscriber accesses and which web sites are visited. This information can be collected by a subscriber's own ISP and by web site operators.

Cookies. When you "surf" the web, many web sites deposit data about your visit, called "cookies," on your hard drive When you return to that site, the cookie data will reveal that you've been there before. The web site might offer you products or ads tailored to your interests, based on the contents of the cookie data.
Most cookies are used only by the web site that placed it on your computer. But some, called third-party cookies, communicate data about you to an advertising clearinghouse which in turn shares that data with other online marketers. Your web browser and some software products enable you to detect and delete cookies, including third-party cookies.

Web Bugs. A web bug is a graphic in a web site or an "enhanced" e-mail message that enables a third party to monitor who is reading the page or message. The graphic may be a standard size image that is easily seen, or it may be a nearly invisible one-pixel graphic. E-mail messages that include graphic displays like web sites are known as enhanced messages, also called stylized or HTML e-mail. The web bug can confirm when the message or web page is viewed and record the IP address of the viewer. The IP address is a multi-digit number that uniquely identifies a computer or other hardware device (such as a printer) attached to the Internet.
You can defeat web-bugs by reading your email while offline, an option on most email programs. You can also install a software program that detects web bugs. To learn more about web bugs, visit http://www.bugnosis.org/. This site offers a free bug detection program. Many software products that detect and delete third-party cookies are also able to detect web bugs. The latest version of Microsoft Internet Explorer enables users to turn off third-party cookies and disable web bugs.

Marketing uses and "spam." Records of browsing patterns are a potentially valuable source of revenue for online services and commercial web site operators. Direct marketers can use such data to develop targeted lists of online users with similar likes and behaviors. Such data can also lead to unsolicited e-mail, known as "spam." Additionally, browsing data may prove embarrassing for users who have accessed sensitive or controversial materials online.

Browsers. It's important to be aware of the information transmitted to remote computers by the software you use to browse web sites. The major browsers are Netscape Navigator and Microsoft Internet Explorer.
Most web browsers invisibly provide web site operators with information about your ISP as well as information about other web sites you have visited. Some web browsers, particularly if they have not been updated with security fixes, may be tricked into reporting the user's default e-mail address, phone number, and other information in the "address book" if the browser also handles your e-mail. (See the demonstration in Additional Resources to learn more about the information transmitted by your browser.)

SOURCE: http://www.privacyrights.org/fs/fs18-cyb.htm

COMMENTS PLEASE..

Wednesday, November 23, 2005

MoDuLe No. 6

1. Pornography
Strictly speaking, I think pornography doesn't violate any of the computer ethics commandments. As what I've said before the action depends on the intention of the person visiting the pornographic sites. But I think I can give an example where pornography violates the several of the commandments. It is the situation in which a person used a computer in editing a picture and making it pornographic. For example, pictures of actors/actresses are attached to naked bodies in such a way that you can barely notice the fraud from the real picture. Advancement in technology is used to achieve this and would very much humiliate the people involved. This would very much violate laws such as thinking of other people's welfare, and using the computer to harm other people.

2. Spamming
Thou Shalt Not Interfere With Other People's Computer Work. This is what I hate specially when using free emails. Spamming involves sending advertisements, announcements, and product endorsements to email accounts in bulk. This violates the commandments especially on the one that involves other people's work. This violates because first it is a burden in erasing thousand of unwanted messages. In my experience, if I go to the Internet café just to check important emails, I ended up using all of my time in deleting these spams. The time I should have spent in reading and replying to important emails was consumed on deleting useless emails. Another violation is the disk space these spam mails are occupying in the email account. This violates the use of other people's resources. Spamming is really not a good thing.

3. Hacking
This situation entails close analysis. This is so complex because of the many sides that we have to look at. For the sake of discussion, we'll take the bad side of hacking, the one which is harmful such as breaking into secured systems just to extract restricted information. Although we know the more appropriate term is "cracking', we also know that these act quite violates many of the existing commandments. First, using the computer to harm other people (this is self-explanatory). Second, snooping in other people's file, and lastly using the computer in stealing. Whatever the motive of hacking, most of the time this involves breaking into other people's computers.

4. Sending chain letter emails(such as prayer and novena)
Just like spam mails, chain letters is another nightmare of people using emails. If you entertain this kind of emails, this is quite a burden because just like the spams, all your time will be spent on forwarding and deleting this mails. Its because these mails contain threatening contents such as bad luck if not forwarded, death to loved ones, years of suffering, death and many more so people have no choice but to concede to these useless emails. Sometimes they even use the Lord in threatening people. Because of this, I think this violates messing other people's work. Also this occupies a lot of disk space so this is another violation, using other people's resources without proper consent.

ADDITIONAL INPUTS:

Viewing this in altruistic point of view, this would violate two strong commandments:

Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. Although this does not necessarily apply to everyone, it can't be denied that there are some people who can't control their lust. Seeing pictures of naked people stirs up their imagination and they end up raping poor victims. This is a bad side of pornography and this would make pornography bad.

Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans. If people continue supporting pornography, this would also promote human trafficking. This is not good especially when we know that there are minors who are involved in this. Because of the difficulty in looking for money, for example here in the Philippines, there are many people that resort to this just to earn a living. They invest their body and their dignity just to earn little amount of money. This is a sad reality in our society especially in our country. If no one supports pornography, there will be no human trafficking and other similar crimes.

Lets now take a look sa hacking in altruistic side.

The best example of hacking in altruistic side is the movie SWORDFISH, starring Hugh Hackman and John Travolta. In the movie, Hugh has already given up on being a cracker for his family but he was searched and blackmailed by John. Amidst his futile attempt to resist, he was forced to break inside one of the government agencies because if he refused to do so his daughter would be killed. I think this does not violate any of the commandment its because what is at stake is not codes or programs. In the movie, what is at stake is the life of Hugh's daughter. I think this is a very good example.


PLEASE SEND SOME COMMENTS. THANKS!

MoDuLe 5

I would choose the problem on freedom.

I think this would summarize all other problems on the morality. As we can see, all other problems will just be a part of the problem on freedom because the other problems are just based on some restrictions, which mean they have no freedom in totality. If we were to ask ourselves what is morally right, what is wrong, it would take time because we have to take many considerations. But what if there were no considerations that we have to base on? What if we can do anything? I think that's what limits man and his actions. If there's nothing that can stop man from doing anything, then they say that he has no morality. Worse, since we people are used to basing our actions on some standard so we can't fully express our feelings of hate, fear, and other struggles in life.

I'm not saying that people should fully express their feelings because if we express our feelings without considering others then we might hurt somebody without we knowing it. As what they say, we are free to do anything to our hearts desire but the question is whether our action is right. We can but is it right? To better understand this we will look at an example.

Example. This is a common issue among the youth today and in fact it is very controversial. What I'm talking about is the issue on pornography, such as visiting pornographic sites. Is viewing of pornographic materials in these sites bad or good? If we use computers in the internet café, it is impossible for the café-in-charge to check whether the users are visiting the appropriate websites. The café-in-charge could not accommodate all the users. No matter how many posters are posted which disallows the visiting of pornographic sites it goes to the user, it is the user's decision whether to open it or not. He is of course aware that he can do anything he wills, in other words he has the freedom to do anything. He knows that no one will restrain him but if he is moral, he will not visit these sites. He knows his freedom to do it but he has to ask himself if it is right. As I was saying, this all depends on the person using the café.


PLEASE POST SOME COMMENTS. THANKS!

Thursday, November 17, 2005

EthiCs in The ComPutiNg WoRLd

Based on the lectures, I think it would be the Nicomachean Ethics which dominate the computing world. I want to emphasize that there is no specific theory that will fit computing exactly but I think Nicomachean ethics will describe it in a much large scope. I want to point examples that would make other finalist theories invalid.

BUYING LICENSED SOFTWARES. It was clearly pointed out in the lecture that most people buy licensed not by their own will but in compliance to the law. If people will be given the choice between licensed and pirated, they are more inclined in choosing pirated softwares because of the significant price difference. If this is the case, this defies the theory on categorical imperatives because the theory said an act is good not because of certain consequences that occur in its performance, or on the basis of its end-result, but because of the "will" that accompanies the act. Also because people are suppressed in choosing their own free will, this will also inhibit their happiness. Now based on the utilitarian view, what inhibits happiness is morally wrong which is not true for this case because we all know that piracy is illegal.

DEVELOPING SOFTWARE\PROGRAMS. This will again make categorical imperatives out of the picture because nowadays people make softwares not because they "will" it but because they are paid to do it. For people who develop viruses or other evil softwares it is their happiness to develop such softwares, but this is not morally good because viruses destroy other people's work. This a contradiction to the utilitarianism theory.

Final Word: Man has intellectual capabilities which means that he has been given the choice to do or not to do. The world of computing is so complex in itself so to live in that world, man must weigh the consequences of his action, decide for himself not depending on others and using the arguments of reason he can do things that are morally right. This was described in the Nicomachean Ethics and that based on these arguments, I believe it is the one dominating the computing world.

Wednesday, November 16, 2005

This iS FoR MoDuLe 3..

Module 3 - Preliminary Theories

(hmmmm..Medyo marami marami din ito so please bear with me..hehehe..)

Sticky situation: Fiel designed a computer software that would make detection of enemy codes easier.
Comment: Wo yeah!(Fiel is my name by the way..hehehe!)The emphasis on ethical egoism can be explained if we take Fiel's side in creating this computer software, I think he also thought of taking advantage of his creation. In other words, maybe Fiel created this software to make his work easier in the future because if he suspects invasion in a certain program, he doesn't have to go over long lines of code. He simply have to use his software to confirm his doubts. On the other hand we cannot also eliminate the altruism part, because it is a valid assumption that when he made the program, he was thinking of making other people's work easier. If this is the case then this is ethical altruism.

Sticky situation: Mona plans to buy licensed software in the US using royalties from the sales of her book on computer ethics and donate the software to her alma mater.
Comment: We can think that the hidden purpose of what she is doing maybe is to boost the sales of her book which will show ethical egoism. If she will show people that the sales goes to chartable works, then people will sympathize and will try to buy her book not knowing of her hiiden agenda. For the altruistic side, we can also say that Mona's desire was to donate softwares and she was doing a great favor to her alma mater. Not thinking of her self-interest, she did this promote the good and welfare of her alma mater. This is a clear manifestation of altruism.

Sticky situation: Franchele wants to create a virus that affects only linux O.S.
Comment: For Franchele this would be a great accomplishment for himself 'coz if he can do that he has just surpassed years of making Linux virus-free and secure. This would become his resume surely for in the past decades no one (so far.. I think!) has yet made a virus specifically suited for Linux O.S. If we view this on the altruistic side, we have got to consider two sides, depending on which side Franchele is on. If he is against Linux, then he gives Microsoft a big advantage, coz he will be destroying Linux's reputation of being virus-free. If he is for Linux, then his virus will inspire Linux programmers to work harder on security. His virus will tell them that Linux's security still has room for improvement.

Sticky situation: Lilian debugged a secret code of NBI and sabotage the whole system as form of revenge for what she considers NBI violation of her human rights.
Comment: The only advantage that behind her act is the satisfaction of her hunger for revenge. Although i couldn't agree with her coz I believe "revenge makes you even with your enemy but forgiving them makes you greater than them". Viewing this in an altruistic view, it will just be the same with the previous situation such that she will be helping NBI unknowingly because by debugging the codes, the NBI still has to do more in keeping their system secure. Their security still has room for improvement.

Sticky situation: Jhong contracted Benson to design the web site of a government agency at the cost of 1 million and added free consultancy service.
Comment: From what I understand of this problem, in exchange of the contract Benson is made to pay 1 million to Jhong. (Hopefully I interpreted this correctly). Based on my intepretation, Jhong showed ethical egoism by giving Benson the contract in exchange for the benefit that he will get which is the 1 million. Not only has he shown egoism but also altruism. I think he used this part to cover up for his motives, (kung baga, ito ang kanyang promo!). He gave Benson a chance to earn money and he also added free consultancy to it. (Hmmm.. I think Jhong is still up to the money)

Hey!I'd love to hear from yah. If you have time, kindly post some comments alright? Thanks for reading my opinions. Jah bless you!

PLEASE SEND COMMENTS..THANKS A LOT..

Wednesday, November 09, 2005

Jake Vs. EtHiCs

CaSe No. 2
Jake bought licensed computer software at MouseNBrowse. Because of the high price he paid for the purchase of the software, Jake thought of reproducing copies of it to be sold to friends and acquaintances. Jake knew he would be violating the law. Nevertheless, he executed his plan and sold pirated software.

My CoMmEnt (HeRe We Go AgAin.. whEw!)
I shall be dividing my comments into four parts. One for each law that we have discussed, as to whether Jake violated or was in conformity wit the said laws.
DIVINE LAW. As we all know, piracy is a punishable crime in our society today because as most people say, it is a form of stealing. Since it is so, stealing computer software or whatever thing is automatically a violation to the divine law because a violation on other laws is a violation of the divine law.
NATURAL LAW. Jake is clearly violating the natural law. Although there is no clear agreement between Jake and the company, as a person Jake should be aware that he is stealing money from the company. It is because the money paid to him should have been used by his friends in purchasing original softwares.
PHYSICAL LAW. Although we can say that physical laws can never be violated, because it is the law running without we being aware of it, I can say that Jake did not violate any physical law. "In every action there is an equal and opposite reaction". Jake did not simply consider the consequences of his act. He did not view the effect of his plan in totality. He only thought of enriching himself, not even thinking of the software company.
MORAL LAW. Stealing is morally bad, Jake was aware of it, yet he still did so. He violated the moral law. Period! No questions asked!

Thanks for reading my blog. Hope you learned something from it. Till next time. Ciao! -ntrl_mystc-

URLs..CheCk ThiS OuT..

LiLian - http://liliangalamiton.blogspot.com
Ruby - http://rawbee4.blogspot.com
SiR MaR - http://lsu-cs192.blogspot.com
Franchele - http://franchele.blogspot.com
Marrisa - http://mariz118.tripod.com
Jonah Flor - http://jonski0718.tripod.com
Joselito - http://gurz7195.tripod.com
Maan - http://marieanyte060785.tripod.com
Dante - http://jhongix.blogspot.com
Marlon - http://marzams11.blogspot.com
JoyCe - http://aileenjoyce1212.blogspot.com
FiEL - http://fcasinillo.blogspot.com
GieBenson - http://gperturbos.blogspot.com
PhoeBe Cates - http://phoebecates11.blogspot.com

EtHiCs Vs. CiNdY'S AcT

CasE No. 1
Cindy is a student from a prestigious university. They were given a case scenario on which they are ask to raise their opinion based on the ethical principles discussed in their ethics class. Cindy was so resourceful that she found quite good opinions and explanations from the internet. Consequently she simply copy- pasted and the online-material. She submitted her output with minor edits on the contents. As the result, her professor was so impressed by her work.

My oPiNiOn (aNd So i ThOuGht..)
This case is a classic example of one of the many world's most debated sentence. "The end does not justify the means". In this case, the end of Cindy's actions is that she impressed her "superb" work when in fact she only copied it from the internet. In the definition of ethics in the class, ethics is an area of philosophy that deals with man's pursuit of the “good life”, such that the attainment of “good life” is predicated upon one's adherence to ethics. This is means that ethics is used as a means to reach a particular end which justifies the “good life”. As we have seen, the means in which Cindy used to achieve "good life" is very much unethical because she gets all the credit when in fact she was not the one who made her work. If we read the case closely, the teacher required the student's opinion, in this case Cindy's, so she got to make her opinion and must not rely on others for her assignment.