Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Group 2
Bisquera, Joy Alexa P. BSA 2-2
Cahatol, Patricia May O. Living in the IT Era
Campos, Kristia U. Written Report
Esquivel, Joshua Rafael V.
- Information technology has been defined as the processing and distribution of data using computer
hardware, software, telecommunications and digital electronics.
- Ethical considerations for ICT related issues first appeared under the topic ‘’information ethics’’ in
the Annual Review of Information Science and Technology in 1992.
- The impact of ICT on human relationship has been tremendous.
a. How genuine are such relationship?
b. What does it portend for individual satisfaction?
- A wide range of new laws, regulations, rules and practices are therefore needed if society is to
manage these workplace and other changes and development brought about by ICT.
- Thus the society need to consider the following ethical and social challenges related to ICT use:
a. Recognition for personal and corporate ethics associated with ICT.
b. Striking a balance between ethical, economic and technological as well as political
considerations.
1. Intellectual property rights issue (trademarks, patents, copyright and trade secrets).
2. Non violation of privacy and associated rights amidst electronic information data
mining.
3. The opportunity to commit crime with ICT (computer crime).
4. Legal issues and limitations.
5. Consequence of using ICT.
6. Professional responsibilities
b. Access Right
Due to the current popularity of international commerce on the Internet, the
topic of computer security and access right has moved quickly from being a low
priority for corporations and government agencies to a high priority.
Without implementation of proper computer security policies and strategies,
network connections on the Internet can’t be made secure from illegal accesses.
c. Harmful action
This means injury or negative consequences, such as undesirable loss of
information, loss of property, property damage, or unwanted environmental
impacts.
This principle prohibits use of computing technology in ways that result in harm
to any of users, the general public, employees, and employers.
Harmful actions include intentional destruction or modification of files and
programs leading to serious loss of resources or unnecessary expenditure of
human resources such as the time and effort required to purge systems from
"computer viruses.
1. PLAGIARISM
- It is where the work of others is copied, but the author presents it as his or her own work.
In other words, plagiarism is an act of fraud. It involves both stealing someone else's work and lying about
it afterward.
Consequences of Plagiarism
- Plagiarism can get you expelled from your course, college and/or university.
- Plagiarism can result in legal action; fines and penalties etc.
2. PIRACY
- Online copyright piracy is the practice of illegally reproducing and sharing information on the internet,
such as music or software.
- Piracy is the unauthorized distribution, theft, reproduction, copying, performance, storage, sale, or other
use of intellectual property (IP) protected under copyright law.
3. HACKING
- Hacking generally refers to unauthorized intrusion into a computer or a network.
- A hacker is an individual who is knowledgeable enough to gain access without authorization to computer
systems to identify security flaws.
Hacking can be undertaken for a variety of reasons, such as the wish to damage a system or the
wish to understand how a system works, so that money can be made out of it. Alternatively, there
might be a desire to alert people to the fact that a system is insecure and needs improving.
Due to this, some argue that there are ‘hacker ethics’. Hacking can present a moral dilemma. This
is because ‘reformed hackers’ sometimes offer their expertise to help organizations protect
themselves against other hackers.
Hackers cannot just wander into a system, as they could into an unlocked door. Instead, it requires
a lot of skill. With this skill hackers can demonstrate that a system is insecure and needs improving.
In this way, it could be argued that hackers play a valuable role. Many argue that hacking might
lead to some improvements, but that it causes such a lot of disruption that it is not worth it in the
long-run.
4. MALICIOUS CODES
- Malicious code attacks include a number of types of computer programs that were created with the
intention of causing data loss or damage.
b. Trojan horse
A Trojan horse is different only in that the entire application was written to look like something
else, when in fact it is an attack tool.
An example of a Trojan horse is a software application that runs a simple game on a workstation.
While the user is occupied with the game, the Trojan horse mails a copy of itself to every address
in the user's address book. The other users receive the game and play it, thereby spreading the
Trojan horse to the addresses in each address book.
c. Worms
Worms are self-contained programs that attack a system and try to exploit a specific vulnerability
in the target.
Upon successful exploitation of the vulnerability, the worm copies its program from the attacking
host to the newly exploited system to begin the cycle again.
Clearly writing and spreading virus programs are unethical acts; they have very serious consequences, and
cause systems to crash and organizations to cease operating for certain periods. One of the most
concerning consequences of such actions is when viruses interrupt the smooth functioning of an
organization which could in extreme cases even cause people to die. Logic bombs are also sometimes
planted. There is obviously a lot of anti-virus software on the market now though that helps to deal with
this ever-growing problem.
5. CYBERCRIME
It is an attack on information about individuals, corporations, or governments. Although the
attacks do not take place on a physical body, they do take place on the personal or corporate
virtual body, which is the set of informational attributes that define people and institutions on
the Internet.
Breach of personal or corporate privacy, such as assaults on the integrity of information held in
digital depositories and the use of illegally obtained digital information to blackmail a firm or
individual.
Highlights the fragility of such seemingly solid facts as individual identity.
Internet offers criminals multiple hiding places in the real world as well as in the network itself.
INTERNATIONAL TREATIES
NOVERMBER 23, 2001 - Council of Europe Cybercrime Convention
USA PATRIOT Act of 2001
TYPES OF CYBERCRIME
1. Identity Theft – unauthorized use of someone’s personal data or documents.
2. Internet Fraud – use of Internet services or software with Internet access to defraud victims or to
otherwise take advantage of them.
3. Child Pornography – possession of images of children under age 18 engaged in sexual behavior.
4. Digital Piracy – an act of copying a certain product (other than the copyright holders) and resells
it for a fraction of the cost that the legitimate producer charges.
5. Cyberterrorism – use of the Internet to cause public disturbances and even death. Cyberterrorism
focuses upon the use of the Internet by nonstate actors to affect a nation's economic and
technological infrastructure.
2ND - the stolen information will be either sold on illegal markets online where the law of supply and
demand will help determine its real value (for hackers), or modified to create synthetic identities.
3RD - includes the fraud itself, considering that the possession of personal information belonging to third
parties is not considered, by many jurisdictions, as breach of the law.
TYPES OF INFORMATION:
Identifying information - name, age, gender, address, phone number, mother’s maiden name,
social insurance/security number, personal identification number (PIN), income, occupation,
marital status, place of residence, etc.
Buying patterns - stores visited on a regular basis, accounts, assets, liabilities, etc.
Navigation habits - websites visited, frequency of visits, pseudonyms used on forums,
acquaintances on the net, etc.
Lifestyle - hobbies, social networks, travelling behaviour, vacation periods, etc.
Sensitive data - Employment, medical or criminal records
Biological information - blood group, genetic code, fingerprints
7. INTERNET FRAUD
- The term ‘internet fraud’ refers to any type of fraud scheme that uses email, web sites, chat rooms or
message boards to present fraudulent solicitations to prospective victims, to conduct fraudulent
transactions or to transmit the proceeds of fraud to financial institutions or to others connected with the
scheme.
Internet fraud may include spam, scams, spyware, identity theft, phishing or internet banking
fraud.
a. Spam
Spam is a generic term used to describe electronic ‘junk mail’ or unwanted messages sent
to your email account or mobile phone.
These messages vary, but are essentially commercial and often annoying in their sheer
volume. They may try to persuade you to buy a product or service, or visit a website where
you can make purchases; or they may attempt to trick you into divulging your bank
account or credit card details.
b. Scam
The power of the internet and email communication has made it all too easy for email
scams to flourish. These schemes often arrive uninvited by email.
c. Spyware
Spyware is generally considered to be software that is secretly installed on a computer
and takes things from it without the permission or knowledge of the user.
Spyware may take personal information, business information, bandwidth or processing
capacity and secretly gives it to someone else. It is recognized as a growing problem.
d. Phishing
Phishing is a technique used to gain personal information for the purpose of identity theft.
Phishing involves using a form of spam to fraudulently gain access to people’s online
banking details. As well as targeting online banking customers, phishing emails may target
online auction sites or other online payment facilities.
Typically, a phishing email will ask an online banking customer to follow a link in order to
update personal bank account details. If the link is followed the victim downloads a
program which captures his or her banking login details and sends them to a third party.
e. Identity Theft
A large part of online crime is now centered on identity theft which is part of identity
fraud and specifically refers to the theft and use of personal identifying information of an
actual person, as opposed to the use of a fictitious identity.
This can include the theft and use of identifying personal information of persons either
living or dead.
8. CHILD PORNOGRAPHY
- Child pornography is a form of child sexual exploitation. Federal law defines child pornography as any
visual depiction of sexually explicit conduct involving a minor (persons less than 18 years old). Images of
child pornography are also referred to as child sexual abuse images. (USA, Department of Justice)
- However, Child pornography in the Philippines is under the Republic Act No. 9775 - AN ACT DEFINING
THE CRIME OF CHILD PORNOGRAPHY, PRESCRIBING PENALTIES THEREFOR AND FOR OTHER PURPOSES.
This Act shall be known as the “Anti-Child Pornography Act of 2009.”
(a) Any person found guilty of syndicated child pornography as defined in Section 5 of this Act shall suffer
the penalty of reclusion perpetua and a fine of not less than Two million pesos (Php2,000,000.00) but not
more than Five million pesos (Php5,000,000.00);
(b) Any person found guilty of violating Section 4(a), (b) and (c) of this Act shall suffer the penalty of
reclusion temporal in its maximum period and a fine of not less than One million pesos (Php1,000,000.00)
but not more than Two million (Php2,000,000.00);
(c) Any person found guilty of violating Section 4(d), (e) and (f) of this Act shall suffer the penalty of
reclusion temporal in its medium period and a fine of not less than Seven hundred fifty thousand pesos
(Php750,000.00) but not more than One million pesos (Php1,000,000.00); and many more.
The global poll asked 550 experts about the most dangerous countries for women when it came
to healthcare, discrimination, cultural traditions, sexual violence, non-sexual violence, and human
trafficking. The Philippines made it to the top ten of the last category.
https://www.iuokada.edu.ng/journals/5B6AA29B40ADBA7.pdf
https://www.plagiarism.org/article/what-is-plagiarism
https://www.scanmyessay.com/plagiarism/consequences-of-plagiarism.php
https://whatis.techtarget.com/definition/piracy
https://smallbusiness.chron.com/loss-revenue-due-piracy-76178.html
https://www.techopedia.com/definition/26361/hacking
https://insights.samsung.com/2018/07/20/5-easy-ways-to-protect-yourself-from-hackers/
https://www.us-cert.gov/ncas/tips/ST18-271
http://www.site.uottawa.ca/~nelkadri/CSI5389/Papers/8-Aimeur_and_Schonfeld_PST2011.pdf
https://www.fbi.gov/scams-and-safety/common-fraud-schemes/internet-fraud
https://www.yourdictionary.com/digital-piracy