Wednesday, January 16, 2013

Presentation, Do's and Don'ts

Presentation


The groups presented about cyber crimes which are rampant in the world of electronics, where people get abused or blackmailed for having a personal video or information posted on a public site. Or where people's identities are stolen and used for illegal activities. Cyber crimes are causing problems in our society today because innocent people who have no idea whats happening get blamed or judged by others because of someone framing or setting them up or even blackmailing them.

The global nature of the Internet has allowed criminals to commit almost any illegal activity anywhere in the world, making it essential for all countries to adapt their domestic offline controls to cover crimes carried out in cyberspace. The use of the Internet by terrorists, particularly for recruitment and the incitement of radicalization, poses a serious threat to national and international security.
In addition, the threat of terrorism forces authorities to address security vulnerabilities related to information technology infrastructure such as power plants, electrical grids, information systems and the computer systems of government and major companies.

Do's and Don'ts

  • 1. “ Ethical Internet Behavior in the Workplace” Cierra Smith Tarnisha Turner December 15, 2008 Ms.Moore
  • 2. Objective The objective of this PowerPoint is to explain the do’s and don’ts of ethical behavior on the internet.
  • 3. Do’s #1 When in the workplace try to stay away from flirting and unfriendly gestures. This is unethical because it can lead you into trouble of getting caught and possibly losing your job.
  • 4. DON’T’S #1 Never use racial slurs in the workplace. This is unethical because people shouldn’t be judged on the color of their skin but by what they offer.
  • 5. DO’S #2 At a workplace make sure that your computer station is clean. This is ethical because this can prevent clutter and disorderliness around your computer area.
  • 6. DON’T’S #2 When your company has the AUP policy (which restrict the ways in which the network or site can be used) you should not be on illegal sites buying products or downloading them at the workplace. This is unethical because your not supposed to be on any sites that don’t have anything to do with what your there for
  • 7. DO’S #3 Make sure that you don’t engage in gossip and avoid talking about other people. This is ethical because you shouldn't be focused on the gossip or what’s new about everyone you should be there on a professional level.
  • 8. DON’T’S #3 Don’t use profane language when expressing yourself. This is unethical because, when you use profanity it makes you look unprofessional and unintelligent.
  • 9. DO’S #4 Come to work everyday on time and dressed appropriately for the occasion. This is ethical because when you come to work dressed for the occasion you can get the job done better and in good time.
  • 10. DON’TS #4 Never steal other people’s work and claim it as yours. This is unethical because, stealing can lead to altercations and altercations can lead to somebody can get dismissed.
  • 11. DO’S #5 Always turn your cell phone’s off to avoid from it going off in the job area. This is ethical because, you should considered your audience and environment and turn off your phone or PDA.
  • 12. DON’TS #5 You should not snoop around in other people’s space when in the workplace area.
  • 13. Summary You should always practice good ethical behavior in the workplace because, honesty and respect will get you farther in life than dishonesty and disrespect. Throughout life you will find that taking responsibility and being trustworthy are good qualities to have, even if you have not obtained these qualities in life practicing will give you a better chance at receiving them. No matter how far in life you want to get having unethical values will not take you far.
  • 14. References The ten commandments for computer ethics. Retrieved December 15, 2008 from Computer Ethics institute. Web site: http://www.tekmom.com/tencommand/index.html Importance of ethical behavior in the workplace. Retrieved December 15, 2008 from Ethics office at Texas Instruments Corporation. Web Site: http://www.onlineethics.org/CMS/workplace/workcases/ti-ethics/ethics_workplace.aspx

Copyright, Patent, and Trademark (Finals)

Finals

This is the time that is most tense for most students. Judgement week for students. All students would hope to pass the term and proceed and most succeed. Before the Final exams we discussed about way to protect intellectual properties from theft by using Copyrights, Patents, and Trademarks. These three thing are different way to keep you're creations or inventions safe from thieves and piracy. They give you the right to legally own you're creations and distribute them to the public usually for a limit time only.


Usually Copyrighted materials is most common for protecting major inventions or creations. The time limit is usually a lifetime with an extension. While a patent protects certain features of an creation. Patents are usually valid for about 10 years. 

Types Of Viruses and Hackers (Midterm)



Midterm

During the middle of the term or midterm period I began to feel more confotable in the new enviroment and we started going deeper into the world of computer ethics. We talked about the history of hackers and hacking and the different types of hackers. We also talked about the Viruses that would be created by the hackers and the different types of viruses.

  • Hackers

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.


List of different Hackers:

  • White Hat Hackers
  • Black Hat Hackers.
  • Script Kiddies
  • State Sponsored Hackers
  • Spy Hackers
  • Cyber Terrorists

  • Viruses

A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

Project in computer ethics (Prelim)


Prelim

During the first few weeks of the school term, or prelim, I learned, met, and done alot of new things. This is a critical time where we meet new people and get adjusted to the environment we will be studying in for the rest of the term, which was very interesting for me. As soon as I entered the class of It 108 I was greeted by some old friends and some familiar topics mainly computer ethics, which was what the subject was all about. We started of by learning the basic computer ethics and all about Kantianism and consequentialism.

  • Kantianism
Kantianism is where actions are effected by duty or work. Its not about ones emotions or long term goals. Simply put, this criterion amounts to a through experience: to attempt to universalize the maxim (by imagining a world where all people necessarily acted in this way in the relevant circumstances) and then see if the maxim and its associated action would still be conceivable in such a world.


The Formulation Rule of Kantianism:

  1. Act only according to that maxim by which you can at the same time will that it would become a universal law.
  2. Act so that you always treat others as an end, and never as a means to an end only.

  • Consequentialism

Consequentialism is the class of normative ethical theories holding that the consequences of one's conduct are the ultimate basis for any judgment about the rightness of that conduct. Thus, from a consequentialist standpoint, a morally right act (or omission) is one that will produce a good outcome, or consequence.
It is the results of ones doing or the effect after a cause. Consequentialism usually has a direct effect or an individual or group of individual. Sometimes it has a domino effect which has one event lead to another until it has a end result