Miyerkules, Enero 16, 2013

DO's and DONT's



DO's
1. Use computers to expand your knowledge.
Computers are a very good tool for research and exploring although it should always be within the context of computer ethics.
2. Use computers in ways that shows respect and with regard to other people.


3.  you should change your password 2-4 weeks so that the hacker will get a hard time to hack your password.


4. don't give your email address except if it is very important.


5.you should put an anti- virus so that your computer will be not in risk.


6. your passwords should contain 8 characters with numbers.


7. you should follow what your parents rules in using the computer.


8. Do tell your parents immediately if you have encountered any problem while 

using the internet or if you have engaged in an uncomfortable situation. 

9.If you are using instant messaging or entering chat rooms, do stay on public, 

monitored and child-friendly rooms. 

10.Do activate a firewall and make sure it is active at all times when transacting.


DONT's

1. we should not use computer to harm other people. Always remember that we should be responsible in everything that we do. 

2. Never abuse the use of computers. It means that we should never use computers to snoop, steal, destroy, copy, and spread viruses and worms.


3. Never use computers for the intention of gaining more money by stealing and hacking to other computers and by copying files that are confidential and using them for personal gain whether for financial or status gain. 


4. You should not be on sites buying products or downloading them at the workplace because your not supposed to be on any sites that don't have anything to do with what your there for.


5. you should not steal somebodies work or idea and claim it as yours.


6. Cyber-bullying

  • Bullying online is another form of unethical computer use. It is widespread and getting increasing coverage in the media as it becomes a larger problem. Sitting in front of a computer screen takes away the need to bully and harass someone in person and thus makes even worse actions and harassment possible. Additionally, the use of social networking on the computer as a tool for cyber-bullying is growing.
7. Plagiarism
  • Plagiarism is another unethical use of the computer. By going online, it is becoming increasingly easy to find material for plagiarism. The computer also facilitates writing articles through plagiarism by the use of writing programs and simply copying and pasting the words onto a document and taking credit for the work.
8. Cheating
  • Cheating in relationships is made easier through social networking online or the use of emails. Everything is password protected, making users able to be unfaithful in their relationships and even engage in cyber sex without anyone catching on.
    9.  Identity Theft
    • Theft of someone's identity is facilitated by the computer, making it yet another unethical use. If criminals are knowledgeable enough at computer hacking, then it is easy for them to gain access to the personal and financial information of other people and proceed in stealing their identity and ruining their lives.
      10. Pornography
      • Distribution and use of pornography has been greatly facilitated with the use of the computer. Not only is the use of adult pornography widespread with the use of computers, but so is child pornography. Child pornography is one of the most, if not the most, unethical uses of the computer today.
      Source: http://www.ehow.com/info_7806377_five-unethical-uses-computers.html

PRESENTATION(OVERVIEW)



During our presentations about unethical i'm part of the group 3. Our topic is about CYBER BULLYING and UNAUTHORIZED ACCESS.

There was this guy who forgot to log out is account in an Internet Cafe and when the 2 guys who use the computer after him, open his account and make fun with it. So when the guy came to school his friend confront him of what he posted about him and the guy has no idea what his friend was talking about so he came home and check his account and found out what his friend was talking about so he called his mother and told his mother everything and his mother gave him an advice and in the end the guy forgave the 2 guys.

LESSON: we should not access accounts which is not ours and we should always remember to log out our accounts.

FINAL

During FINALs our lessons are about INTELLECTUAL PROPERTY.

COPYRIGHT vs. PATENT vs. TRADEMARK

COPYRIGHT is the legal protection for the original work of an author(owner). It is under SECTION 172. The term of its protection is the life of the author plus 50 years after his death, while PATENT is the protection of the idea or the invention. The term of its protection is 20 years only.and lastly TRADEMARK is a word, symbols or a device that use in indicating the source of goods in trading.

MIDTERM

During MIDTERM period our lessons are about hackers, viruses and computer crimes.

HACKERS- are those who enjoys learning programming languages and computer systems and can often be considered an expert.
CRACKERS- are those who gain unauthorized access to computer systems and steals data.

There are 8 kinds of hackers according to their hats.

*WHITE Hat
*BLACK Hat
*RED Hat
*GREY Hat
*BLUE Hat
*GREEN Hat
*the GHOST Hacker
*the SCRIPT KIDDIE

VIRUSES
There were students assigned to report this and from their report there were so many viruses. Below are some of the viruses that we discussed.

BRAIN VIRUS -- the first computer virus made by the two Pakistani brothers  Amjad and Basit Farooq Alvi. It only affects the boot records.

TROJAN HORSE -- it is used by hackers to copy data from secure files or record information about security measures ;exploit the weakness of a system.

WORMS -- make your system slower.

And lastly we tackle COMPUTER CRIME. I learned that downloading movies, music...etc.  in the internet for free is a violation of copyright laws.

PRELIM



During prelim period our lesson is about computer ethics.

3 properties:
*LOGICAL MALLEABILITY
            -- is the ability of the computer to adopt any changes.
*IMPACT ON SOCIETY
            --changing workplace and the nature of work ; convenience.
*INVISIBILITY FACTOR
            --computer operations are invisible
                  ->INVISIBLE ABUSE - the intentional use of the invisible operations of a computer to engage in unethical conduct; surpassing the limit.
                  ->INVISIBLE PROGRAMMING (VALUES) - it is embedded into a copter program like computer viruses; malicious program.
                  ->INVISIBLE COMPLEX CALCULATION - computer are capable of enormous calculations beyond human comprehension.

                  I learned that computer ethics has no difference with the other kinds of ethics except for their offenses, punishment and approach and we base our judgments by instinct, norms, comon sense and wisdom.

ETHICS -- is the science of morals in human conduct
MORAL -- standards of behavior; good doings

Basis in pursuing action:
* legal and ethical
*not legal but ethical
*not ethical but legal
*not ethical and not legal


TWO THEORIES

* KANTIAN ISM -- is how we behave ethically comes within us
and it has its golden rule "do not do unto others what you don't want others do unto you".

* CONSEQUENTIAL ISM -- talks about the action and the result.

During this discussion we had our Role Play and our last lesson is the PROFESSIONAL
 CODES OF CONDUCT it guides us on how we behave ethically.