IS 201 Computer Ethics

Saturday, March 26, 2005

MODULE 13 SAQ 1

1. Are you in favor of the enactment and enforcement of laws that will regulate and control the use of computer technology? Why or why not? Defend your answer.

Yes, I am in favor for having an enactment and enforcement of law to regulate and control the use of technology because it will give guidelines to follow by the user and it will give sign of boundary or limitation of the user in using a computer technology. Some cases in computing are because of lack of rules and regulation regarding of what is the proper way of using computer technology. That is why they have so many violation committed by the users, it is because of the late action regarding the use of our computer technology. Like for example, the students who made the I LOVE YOU virus, before this happen the government have no given rule.


2. If you were to decide the case of Landmark Hacking, what will be your judgment? Support your answer.

If I were to decide the case, since Cesar Mañalac is the reason why Leilani Garcia have an access with the Thames International Business School, the fault of Thames International Business School is that they way of accessing Mr. Mañalac since he is no longer connected to the said school. If the company is too large and has a lot of confidential matters, the key/password in accessing must be restricted to the authorized person and if the employee or personnel is no longer working it is automatically he/she have no access at any transaction to the company. It is responsibility of the company check time to time to the employees connections. Hacking is somewhere out there, we cannot control them, in this situation the only thing we can control is the things in our hand.

MODULE 12 Activity 1 & 2

1. From the cases summarized above, explain what constitute a computer crime.

Computers and computer networks create new categories of crimes that did not exist in the pre-computer age. While technology has advanced quickly, the law has not. New crimes often do not fit the parameters of the preexisting legal framework. The widespread use of computers has resulted in a new challenge for law enforcement- computer crime. A computer crime can be said to occur when a computer is the target of the offense, that is, when the actor’s conduct is designed to steal information from, or cause damage to, a computer or computer network. Some computer crime definitions also include cases in which the computer is an integral tool in committing an offense. For example, a bank teller might write a computer program to skim small amounts of money from a large number of accounts. Although this might constitute a computer crime, such conduct is prohibited by traditional criminal laws, and could be charged accordingly.

2. Discuss at least three other examples of computer crimes.

The three given examples are only a part of millions computing problems. Today, it is quite difficult for a common user to determine where from and how his computer system can be attacked. More often it could be a virus attack, internet worms , spam, causing a denial of service, restricted information theft and, finally, internal threats.
Example#1:
Former IT Manager of Software Firm Indicted on Computer Crime Charges
The United States Attorney's Office for the Northern District of California announced that the former Information Technology Manager of Creative Explosions, Inc., a Silicon Valley software firm, was indicted today by a federal grand jury on charges that he gained unauthorized access to the computer system of his former employer, reading email of the company's president and damaging the company's computer network. Creative Explosions, Inc., is based in Scotts Valley, California.
The indictment charges Roman Meydbray, 27, of San Jose, California, with two counts of unlawful access to stored communications and one count each of intentionally causing damage to a computer and unauthorized access to a computer, recklessly causing damage. An affidavit filed in support of a search warrant alleges that Mr. Meydbray deleted a domain page of Creative Explosions and made configuration changes to email servers that caused e-mail to be rejected.
According to the indictment, Mr. Meydbray was employed by Creative Explosions from November 2001 to November 7, 2003, originally as Information Technology Manager and then as Network Manager. Creative Explosions is a software development company that produces and sells software programs that enable users to create high quality multimedia websites. The indictment alleges that less than two weeks after the company terminated his employment, Mr. Meydbray gained unauthorized access into Creative Explosions' computer system to change passwords on email accounts, read email of its president, and intentionally and recklessly cause damage.
The maximum statutory penalty for the counts of unlawful access to stored communications and causing reckless damage on a computer is five years in prison. The maximum penalty for intentionally causing damage to a computer is ten years in prison. Each offense also carries a maximum fine of $250,000 or twice the gross gain or loss whichever is greater; a three year term of supervised release; and $100 mandatory special assessment. An indictment simply contains allegations against an individual and, as with all defendants, Mr. Meydbray must be presumed innocent unless and until convicted.
Mr. Meydbray is expected to make his initial appearance in February 2005 before a U.S. Magistrate Judge in San Jose, but a date has not been set yet.
The prosecution is the result of an investigation by the Federal Bureau of Investigation's Cyber Crime Squad in Oakland. The investigation was overseen by the Computer Hacking and Intellectual Property (CHIP) Unit of the United States Attorney's Office for the Northern District of California. Mark L. Krotoski is the Assistant U.S. Attorney from the CHIP Unit who is prosecuting the case.
A copy of this press release may be found on the U.S. Attorney's Office's website at www.usdoj.gov/usao/can. Related court documents and information may be found on the District Court website at www.cand.uscourts.gov or on http://pacer.cand.uscourts.gov.
All press inquiries to the U.S. Attorney's Office should be directed to Assistant U.S. Attorney Christopher P. Sonderby, Chief of the CHIP Unit, at (408) 535-5037, or Luke Macaulay at (415) 436-6757 or by email at Luke.Macaulay3@usdoj.gov.
SOURCE: http://www.usdoj.gov/criminal/cybercrime/cccases.html

Example#2:
Internet Hoax

From: "Ruben" Add to Address Book
To:voelardo@yahoo.com
Subject:The Best Choice in Life
Date:Sun, 6 Mar 2005 07:54:03 +0800
HELLO,Are you ready for some good news???Wanting to have your own business? How bout having your own onlinebusiness? Imagine this! My upline earned $1000 in 2 months time and is now averaging a thousand dollars a month!!! Amazing ? Because it's doneonline, you have the WORLD as your potential market. This is what you call real "OPPORTUNITY" So don't delay... the sooner you act, the sooner you can start enjoying the kind of financial reward that many Internet marketers are now experiencing. Don't miss this GREAT opportunity of being part of the ONE POWERLINESYSTEM!!!! You currently have 2 choices now, Its EITHER YOU go on with your normallife now, OR discover a new life while achieving your financial goals with just a click of the link below. It's your choice! It's your life… "Register for a free demo" (see details below) and discover the answers To the questions that are starting to build up in your mind now. PS. what's good about this is that it offers 30-day money back as long As you have not use their service. For complete details about this incredible offer, please SEND email toaddincome1@lycos.com with the subject "MORE INFO..." in the subject line with your personal info below.
First Name:
Last Name:
Country:
Thank you.Ruben If you have no need of owning online business or wish to not receivefurther emails, simply replies to this email with remove in the subjectline.
Example#3:
Internet Hoax
Date: ed, 19 Jan 2005 01:11:56 -0800 (PST)
From:"VICKY ELARDO" View Contact Details
Subject: will cry with laughter! Lol
To: "Roda Lopez" ohda19@yahoo.com

[This is a joke that is really funny and it works!]
An old lady walked into a Grocery Store.
She wanted to buy the best dog food in the world for her little puppy.
She went up to the cash register to buy the food.
The sales-lady told her that the store did not allow old ladies to buy animal food unless they show the actual animal because a lot of old ladies like to eat the animal food themselves.
So the old lady went home, got her dog and went back to the store to buy her dog food.
The next day she came back to buy the best cat food around But the Saleslady told her the same thing, so the old lady went back home and brought her cat to the Grocery Store to buy the cat food.
The next day the old lady went to the Grocery Store again carrying a big container. She went up to the sales lady and said, "Put your hand inside here". The Saleslady shook her head.. "NO", she said, "there is probably something in there that will bite me!" "I promise you that there is nothing in here that will bite you". the old lady said. So the Saleslady stuck her hand inside the container and screamed.
To find out what was inside the container you must send this to at least 10 people, when it says, your mail has been sent...instead of clicking OK, hit ALT-8 and the container will pop up on your screen.


MODULE 11 Activity 1

1. Account for the court ruling in the four cases discussed above on ethical grounds. That is, explain from an ethics standpoint the court ruling in each case.


CASE#1: Whelan vs. Jaslow case
The ethics standpoint Jaslow has the right to take a legal action because even a Whelan produce another system in different programming languages the owning of a patent on a computer algorithm and flow of the program will have the same output.

CASE#2: Computer Associates vs. Altai
In this case, Altai’s had no case of infringement because they have one programmer who made their program. It has a big possibility of having a similar output, it is because of the idea of the programmer. It is hard for the programmer to get another idea if they have the same initial problem, automatically same procedure or processing that the programmer will use.

CASE#3: Apple vs. Microsoft

In this case, the “look and feel” of a program, which is the way the program appears on the screen and interfaces with users, is also considered as part of ownership trade secrets and patent. For my judgment in this case, maybe they have similar in attraction and color combination but not the way of program it presented. I am agree with the decision of the court regarding the case because they only have a similarity, means it’s not exactly the same.


CASE#4: Lotus look and feel suit
In this kind of case, I ask my self why they have different policy, rules and regulation or even decision since they are in one country which is US. The Lotus won consecutive cases and they have the right of appealing the case but, why Borland won in the US first Circuit Court? And another question in my mind is, why does the US Supreme Court did nit finalize the case since they are the one who will close the issue and give enlightenment for the companies involved? I think the problem is in the part of their government. I can not see the dignity and honor of the person in the US Supreme Court, maybe this is the virtue of ethics needed on their position.



MODULE 10 Activity 1 & 2

1. Discuss one of the issues taken up in this module from the point of view of the preliminary and finalist theories discussed in Module 3 and 4. Note that you must discuss the issue you choose from six perspectives (three preliminary theories and three finalist theorist). To put it another way, you must come up with six-perspective on the issue.

Issue regarding PORNOGRAPHY

PRELIMINARY THEORIES
Ethical Relativism
In this part of moral principle, pornography can be considered as immoral for us and it may not immoral for them. This moral principle determines the nature of moral actions, a certain acts that are usually consider morally bad may be morally permissible under certain circumstances or exceptional cases. Pornography may not be morally bad in all cases, as nudity of the human body may be considered artistic. In some countries, the display of vulgar and indecent materials is not considered immoral by itself, Hence, pornography in the net is tolerated. In other countries, pornography is considered a violation of decency and morality, and hence, frowned upon. This notion of relative morality also explains why in some countries censorship is legal while in other countries censorship is frowned upon.
Ethical Absolutism
Ethical absolutism asserts that there should be fixed or rigid factors in evaluating actions and must follow a consistent ethical standard. Pornography is morally bad if we talk about the natural law, Plato likewise regards natural law as a discipline that every human being must observed and adhere to go that the individual and the common good may be realized or attained. From these precepts, the principles of law are derived. The laws that govern computing may very well be considered as being derived from natural law. This is because computer abuse, piracy, plagiarism and pornography are human actions that violate righteousness, justice, equity and fairness.
Ethical Egoism & Ethical Altruism
Ethical egoism is one of the principles of morality that usually use to support certain ethical judgment. In the pornography issues, ethical egoism shows the feeling of satisfaction of the one who made it maybe he/she feels of being superior over others in terms of new ideas, presentation, showing skills and other field of expertise. On the other hand, altruism also determined the pleasure felt by the person doing it but more pleasure for the other. In pornography issues, the one who make it maybe feels that he/she give a contribution to the computer users who look for a pornography site sample.


FINALIST THEORIES
Utilitarianism
According to Jonh Stuart Mill’s, Utilitarianism is an ethical theory that holds actions which bring happiness considered morally right while those actions that inhibit happiness are considered morally wrong. Those who practicing pornography and they are enjoying while doing and watching it, their actions promotes happiness and pleasure and the consequences of that action are more favorable for them.
Categorical Imperatives
In this ethical theory, that an act is good not because of certain consequences that occur in its performance or on the basis of its end-result but, because of the willingness that accompanies the act. The one who make pornography or a system or a kind of website which caused bad in our sight, some of them are just doing their job and maybe it is because their talent or skills are in-demand in that field, so,, in that way even they did not foresee its en and as long as they give their best and willingness for a good result.
Aristotle’s Nocomachean Ethics
This another ethical theory from Aristotle focused on virtue of ethics. The computer user, as an agent of morality should be in complete control of his/her actions through the use of reason. This means that he/she should be able to act in accord with that which is virtuous without succumbing to influence outside of his/her will. When a computer user does something, he/she does so because he/she willed it. A firm disposition is also called for in order that the agent’s act would not be influence by anything other than his/her own reason. This means, that every situation happen to us it is because we allow it to happen. In connection with the pornography issues, our motive shows in the outcome of our work. Every person that contribute to make this pornography issues spread out has a cleared motive of getting the attentions of very computer user and through the response of the other computer users this pornography issues become a widespread problem especially in our country.

2. If you were granted indefinite and unrestricted access to the Internet, would you be interested to join a chat group that holds no barrier as far as free expression and communication are concerned? Why? Why not?

Chat groups can easily degenerate into a dubious educational tool. One only needs to tune in to a typical chat room to quickly appreciate the banality of the conversation. An important exception is that chat groups can serve as a "live" means of communication during war or large-scale natural disaster when regular news channels may be delayed in reporting information. You may wish to consider developing chat group capability for such events. (Of course, at such times chat groups may do more to contribute to the rapid spread of rumors than much else.) Even if I have given a lot of time to access directly to the internet and to have a chat in a group, still I am not interested because this can be troublesome in an educational setting because real-time conversation can often stray into banal chatter. There is also the risk of becoming a participant in a chat group that is "inappropriate."

Sunday, March 20, 2005

MODULE 9 Activity

1. Choose one of the social justice issues in computing discussed above and find out to what extent it is an issue in the Philippines. Then find out what is being done to address it in specific countries. For example, in the case of the digital divide due to language differences, Soriano reports the adoption of the Unicode Standard, “a character coding system designed to support the word wide interchange, processing, and display of the written tests of the diverse languages of the modern world.” Developed extended and promoted by a non- profit organization, the Unicode Consortium (www.unicode.org), the Unicode Standard makes international communication easier.
3. CURRENT SITUATION OF PERSONS WITH DISABILITIES
3.18 Access to Information and Communication


A Philippine Dictionary of Signs was developed in 1999, including VHS tapes, which is used to standardize sign language for Filipinos with hearing impairments. The Dictionary was funded through a United Nations Development Programme (UNDP) and is circulated in schools and organizations of the deaf and other interest parties. Two national television programs in the country provide sign language interpretation, which include interpreters during national events, conferences and meetings. Closed caption television sets and films with subtitles for people with hearing impairments as well as telecommunication devices (TDD) for people with hearing impairments are available. . Interregional Seminar and Demonstration Workshop on Accessible Information and Communication Technologies for Persons with Disabilities. The workshop was held in March 2003 with the theme "Empowering Persons with Disabilities through IT". The event was funded by UN-DESA in cooperation with the Department of Social Welfare and Development, the National Council for the Welfare of Disabled Persons, the United Nations Development Program and the Department of Foreign Affairs. Two documents were produced as a result of the workshop, "Manila Declaration on Accessible ICT" and Manila Accessible ICT Design Recommendations". Resources for the Blind Inc., (RBI) is a non profit charitable organization that was formed in 1988 to provide a full spectrum of services to blind people throughout the Philippines. Dr. Lown, Director of RBI, translated the Bible into a Tagalog (Filipino) Braille version along with other dialects as well as cassette and large print Bibles. According to the RBI, a half million Filipinos are blind and that the conventional methods of producing Braille materials were not adequate to meet the required needs. Through RBI's Philippine Braille Technology Center, computer technology using small computer driven Braille embossers, has aided in the production of up to one million pages of Braille a year. Through this technology and RBI's resources, they produce two magazines, Insight and Double Yum, which are the only Braille periodicals produced in the Philippines for the blind. Insight Magazine is written for blind adults and is sent out six times a year to 600 Braille subscribers and 100 cassette tape subscribers. Each issue contains tips and techniques for living with blindness, news about the latest technology for the blind, and articles about blind people who are gainfully employed. Each issue contains scripture portions in English, Tagalog, Cebuano, Hiliganyon, and Ilocano dialects. In order to encourage Braille reading skills among children, RBI produces a biweekly Braille childrens reader titled Double Yum. This magazine is sent out to 600 blind children and to classes for blind children around the country. Additionally, RBI provides approximately 5,000 Braille textbooks each year to students. According to RBI, specialized equipment and materials needed by blind people are not readily available in the Philippines. To help meet the needs, RBI imports many items needed by the blind including Braille writing slates, white mobility canes, talking watches, talking calculators, talking blood pressure kits, talking thermometers, Braille typewriters, and special software and hardware to allow a blind person use a computer.
2. Is denial of access in computing a social justice issue? Discuss your answer.
Denial of access in computing can be considered as social injustice issue because this will give interruption of the legal users. From the given definition of denial of access it shows unethical way of using services and from the given definition of social justice, it refers to the promotion of the welfare of the people, in that situation social justice is in reverse of denial of access. It is expected that all staff or members of the company or institution will use resources and facilities in accordance with laws and company or institution rules. Failure to fulfill these responsibilities may lead to the cancellation of your computer account(s), other disciplinary action by the company or institution referral to legal and law enforcement agencies. In that situation social injustice involved. Creating a computer malfunction or interruption of operation or any means of harmful access will lead to denial of access.

Tuesday, January 18, 2005

MODULE 8 SAQs

2. Think of an act, other than those already discussed in this module that
would constitute a violation of privacy in computing. Explain.

ONLINE PRIVACY

The lightweight content management systems known as weblogs or blogs have enjoyed a massive popularity explosion in the past few years, more or less becoming a distinct literary form. But although the blog has proven itself technically capable of meeting the need for many kinds of information dissemination and archiving, numerous social and legal problems have emerged in the practice of real-world blogging. Many of these problems cluster around the almost totally public nature of online expression. Paradoxically, we may be reaching a point where greater expression can only be achieved through greater privacy.
Online privacy is ultimately a matter of law; but the law develops within an understanding of specific technical capabilities. Software implementors can, should, and increasingly do design towards social-engineering goals, such as the ability to resist legal challenge. Design from high-level needs is particularly relevant in the case of blogware, where a large percentage of users are not themselves developers and therefore usability is a primary concern -- perhaps the primary concern. The combination of sophisticated social goal and need for usability means that the state of the law must be baked into blogware tools themselves – a daunting challenge for any development team.

MODULE 7 SAQs


1. What is spamming? Differentiate it from flaming.

Spamming is the process where individuals post identical messages to different newsgroups sometimes with the intent of purposely disrupting ongoing discussions. It also may mean sending mass copies of unsolicited Email to multiple addresses. This action makes it more difficult for receivers to separate personal Email from ‘junk mail’ and maintain on-topic, relevant newsgroup discussions. It may also result in local technical problems such as storage overflow and slow response.
Flaming is a public personal attack against another user (calling another user names). The absence of a social mechanism to correct the behavior and the anonymity of the abusers, may lead to flaming that is initially amusing to bystanders but can quite rapidly get out of control.

2. What are computer worms and viruses? Explain how these operate. Give examples.

A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. Much like human viruses, computer viruses can range in severity; some viruses cause only mildly annoying effects while others can damage your hardware, software, or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.
A worm is similar to a virus by its design, and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the ability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. The biggest danger with a worm is its ability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. Due to the copying nature of a worm and its ability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers, and individual computers to stop responding. In more recent worm attacks such as the much talked about .Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.

3. Choose one example of computer abuse which you think is morally wrong. Explain why you consider it morally wrong using any of the ethical principles you have learned in the earlier modules.

Hacking is one of a computer abuse that is really destructive. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

According to The New Hacker's Dictionary(http://www.logophilia.com/jargon/jargon_toc.html) a hacker can be defined as:
1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.
One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
2. A person capable of appreciating hack value.
3. A person who is good at programming quickly.
4. An expert at a particular program, or one who frequently does work using it or on it.
5. An expert or enthusiast of any kind.
6. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.

Nowadays, a number of issues arise in considering hacking from the educator perspective. First, we need to consider the fact that the public perception of hackers is mixed, and that "hacking" and "being considered a hacker" can be quite appealing to students who are going through developmental periods in which they are defining themselves, as well as challenging authority and rules. There is often a Robin Hood mentality to early actions, though it is unclear exactly who "the poor" are, and how they are "being compensated". Second, the anonymity of actions which hackers perform against others often enhances the severity of actions. For example, an adolescent who would never consider picking someone's pocket or physically damaging someone else's property or home, might be quite willing to steal people's credit card numbers or destroy poorly protected business or government files, since files and credit card numbers are not tangible entities, and the damage is done anonymously.
We studied About different ethical principles, one of the definition stated “Ethics as an concept suggests the notion of correct or incorrect practices relative to various concerns or fields of study” thus hacking is one of the applied ethics that holds the boundaries of the study. Although “hackers” have their own reason in doing such things, the absence of good values, correct practices, and right attitudes point to their job.
We also studied about the different existing laws such as Divine, Natural, Moral and Physical law. Divine law - Allowing evil thoughts can be considered committing a sin, how much more if you put it into action like the job of the hackers. Natural law – according to Plato, we must infatuated the law within our selves and not only the institutional law given by the human beings, it means that every human being must show innate goodness, thus hackers can also apply in their profession.
We also studied the ten commandments for computer ethics. Almost all the given precept violated by the “hackers”.

MODULE 6 SAQs

A. Daan is a computer buff. He loves to surf the Internet and try all available applications. Daan also does web design and programming, among others. In one of his computer explorations, Daan discovered a virus that destroys the computer motherboard. To test his discovery, Daan surreptitiously installed the virus in his friend Kael’s PC. After a week, Kael broke the sad new to Daan. His PC has bogged down and he needs to buy a new motherboard. Daan finds himself torn between whether to tell Kael or not.
1. Which of the 10 commandments on computer use did Daan violates?
1. Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people’s computer work.
7. Thou shalt not use other people’s computer resources without authorization.

2. If you were Daan, will you tell the truth or not? Explain.
Even the damage has been done, I will tell Kael the truth. There is no secret that can keep forever. At least telling the truth will set me free. For me to settle the damaged that I’ve done I will change all the expenses, maybe I will buy a new mother board for him.

3. If you were Kael and Daan told you the truth, what will you do?
At first, it is hard for me to accept the fact that I have a friend that he can do everything for the test of his expertise even unethical way, and the only solution to make my emotions slowdown is to charge all the expenses to Daan. I will tell Daan what I’ve learned about computer ethics and inform him about the existing law regarding computer. In that way, he will be aware with the environment of his field and its limitations.

B. Pick three of the precepts on computer use discussed above and briefly explain each precept in terms of the theory of ethics and the ethical concepts that underpin it.

1. Thou shalt not use a computer to harm other people.
In this precept, ethics as the study of morality and human action holds and it also touched the moral and physical law by definition. This precept can be classified as ethical absolutism because there is no such as good actions involved in the word “harm” per se. Since computing is a human action and the said precept in one of the human actions that involved fairness, goodness and justice, the applicable finalist theory is that Aristotle’s Nicomechean ethics.


2. Thou shalt not interfere with other people’s computer work.
In the second precept, ethics basically concerns human action, “Interference” is an action or in other form of collision / obstruction that produces unethical act in field of computing and it is under the study of the morality and human actions, also, it is a violation of moral and physical law.

3. Thou shalt not snoop around in others people’s files.
This precepts deals with the basic principles of right action especially with reference to a particular person and profession because getting an information without permission is an immoral act and unlawful. It pertains with the moral and natural law. Snooping or browsing private information is an ethical absolutism regardless the reason and in the Utilitarianism theory.

C. Cite two ethical issues in computing. Explain how they are ethical in nature.

1. HISTORY - LEXIS-NEXIS P-TRAK SERVICE

Lexis Nexis witnessed one such demand in August 1996 when thousands of consumers called, emailed, and faxed in requests to be removed from the P-Trak service. Services such as P-Trak, which provide "credit header" information, have been available for quite some time, however most consumers are unaware of their existence.
You can choose to opt-out of P-Trak, and other personal locator services, at CDT's Operation Opt-Out web site.
On Friday, September 20, 1996, the Federal Trade Commission recommended that Congress take action to protect the privacy of personal information by amending the Fair Credit Reporting Act (FCRA). The FTC's recommendations -- included in a letter to Senator Richard Bryan (D-NV) -- come on the heels of consumer outrage being expressed over the recently-released online database, P-Trak, offered by the information service Lexis-Nexis.
P-Trak provides personal information on millions of people across the country. For a fee, Lexis-Nexis subscribers can obtain personal information about an individual that can include name, current and prior addresses, maiden names, birth month and year, and current telephone number. In June 1996, Lexis-Nexis stopped displaying Social Security numbers in response to complaints from consumers and privacy advocates about the availability of that information. However, P-Trak users can still search the database by Social Security number.
In response to Sen. Bryan's inquiry, Federal Trade Commission (FTC) Chairman Robert Pitofsky notes in the Sept. 20, 1996, letter that "... the ready availability of this information through the tracking service may facilitate identity fraud, credit fraud, and other illegal activities." Chairman Pitofsky recommends strengthening the Fair Credit Reporting Act to provide protection to information such as social security number, mother's maiden name, prior addresses, and date of birth.
Before it adjourned the 104th Congressional Term in November 1996, Congress added an amendment to the Omnibus Appropriations Bill which directs the Federal Reserve Board to examine whether the sale of "sensitive consumer identification information" creates "an undue potential for fraud."Although this is a half-hearted response to the FTC's recommendations and the public's cry for action, it is a small tribute to the power and importance of the Internet in turning public opinion into action.
Following passage of the bill, Chairman of the Senate Committee on Commerce, Science and Transportation, Sen. Larry Pressler (R-SD), ranking minority member Senator Ernest Hollings (D-SC), and Senator Richard Bryan (D-NV), sent a letter requesting the FTC to conduct a study of online and database privacy issues.
While no legislation was enacted,(pass, ratify, endorse) the outcry (protest) over P-Trak proved useful in two other areas. First, the P-Trak furor (disturbance) may have played a roll in eliminating an industry pushed exemption to the FCRA which would have allowed credit reports to be used to generate target marketing lists -- currently against FTC rules interpreting the FCRA. Second, the recent announcement by "Privacy Assured", a group of Internet companies that include Four11 and I/PRO, to voluntarily comply with a series of privacy protective information practices is clearly tied to a desire to respond to public concerns over individual privacy.
SOURCE: http://www.cdt.org/privacy/issues/pii/
EXPLANATION:
This can be consider as an ethical issue in computing because this will be helpful to those who are with internet transaction and especialy users without deep knowledge in computer.
Consumers are often unaware of the reuse and disclosure of personal information they provide to others during daily transactions. While the Internet and other interactive media are shedding new light on the large market for personal information, consumers are still shocked to learn that information about their activities ranging from online browsing to grocery shopping is used for a variety of purposes and made available to other companies without their permission. When individuals become aware of the availability of personal information, many take steps to protect it.


2. CHAIN LETTERS
A chain letter is a "get rich quick" scheme that promises that your mail box will soon be stuffed full of cash if you decide to participate. You're told you can make thousands of dollars every month if you follow the detailed instructions in the letter.
A typical chain letter includes names and addresses of several individuals whom you may or may not know. You are instructed to send a certain amount of money--usually $5--to the person at the top of the list, and then eliminate that name and add yours to the bottom. You are then instructed to mail copies of the letter to a few more individuals who will hopefully repeat the entire process. The letter promises that if they follow the same procedure, your name will gradually move to the top of the list and you'll receive money -- lots of it.
There's at least one problem with chain letters. They're illegal if they request money or other items of value and promise a substantial return to the participants. Chain letters are a form of gambling, and sending them through the mail (or delivering them in person or by computer, but mailing money to participate) violates Title 18, United States Code, Section 1302, the Postal Lottery Statute. (Chain letters that ask for items of minor value, like picture postcards or recipes, may be mailed, since such items are not things of value within the meaning of the law.)
Recently, high-tech chain letters have begun surfacing. They may be disseminated over the Internet, or may require the copying and mailing of computer disks rather than paper. Regardless of what technology is used to advance the scheme, if the mail is used at any step along the way, it is still illegal.
The main thing to remember is that a chain letter is simply a bad investment. You certainly won't get rich. You will receive little or no money. The few dollars you may get will probably not be as much as you spend making and mailing copies of the chain letter.
Chain letters don't work because the promise that all participants in a chain letter will be winners is mathematically impossible. Also, many people participate, but do not send money to the person at the top of the list. Some others create a chain letter that lists their name numerous times--in various forms with different addressee. So, in reality, all the money in a chain is going to one person.
Do not be fooled if the chain letter is used to sell inexpensive reports on credit, mail order sales, mailing lists, or other topics. The primary purpose is to take your money, not to sell information. "Selling" a product does not ensure legality. Be doubly suspicious if there's a claim that the U.S. Postal Service or U.S. Postal Inspection Service has declared the letter legal. This is said only to mislead you. Neither the Postal Service nor Postal Inspectors give prior approval to any chain letter.
Participating in a chain letter is a losing proposition. Turn over any chain letter you receive that asks for money or other items of value to your local postmaster or nearest Postal Inspector. Write on the mailing envelope of the letter or in a separate transmittal letter, "I received this in the mail and believe it may be illegal."
SOURCE: http://www.usps.com/websites/depart/inspect/chainlet.htm
EXPLANATION:
Another ethical computing issue that inform us in our email contents. This issue will serve as a guide and awareness what we should do if we encounter such chain letter, giving idea the reason behind why they spending time of getting or making this kind of letter, the outcome if you participate in this kind of internet hoaxes.



D. As a computer user, do you approve of an ordering principle, in the form of legislation, being formulated and enforced to govern computer use? Why? Why not? Defend your answer.

Yes, I am agree of the ordering principle from the legislator, since our country is running for the widespread information technology, there should be a complete policies or laws that govern in computer use. All the courses that are Information Technology related should have a subject included in their curriculum. In that way, before they will focus on their field they are already aware in the limitations and the scope of their job. This ordering principle should be imposed to all the computer users even though they are not IT course related as long as they use computer.

MODULE 5 SAQs

A. You became the chief of police in your place after successfully going after big time computer hackers and a syndicate engaged in the production and sale of pirated software. One day, you find out that your eldest son is an active computer hacker. When you confront your son, he tells you that he is sorry and he promises that he will never again engage in activities involving computer crimes. You are now faced with the problem of having to choose between two options: first, as a chief of police, you have a duty to arrest your own son; and seconds, as a parent, you have the duty to protect your son.
ANSWER:
1.
2.
3.
4. The situation illustrates the problem of moral principle.

B. In your own opinion which of the moral problems discussed is the most pervasive? Explain your answer.
ANSWER:
The most spread moral problems through every part is that the moral principle. Principle make human beings having a good decision and right choice in chase of the good life, but the moral principle itself doesn’t have a standard principle for us to opt and to maintain in that level of choice. Most of the time moral principle depends on the situation, person involved, area where action taken, race, gender and thus, also happening in the computing world, some cases depends on the principle of individual. The individual principle will be the guiding method of some of us, especially when the person commit an action is in the higher level in society there is a breach of moral principle.

MODULE 4 SAQs

1. Which of the finalist thoerist appeals to you most?

I am impressed with Aristotle’s Nicomachean Ethics because he explained well every stage or level of attitudes. He point out from the specific to general characteristics of attitudes of human beings. In that sense, you will easily find out the reason behind why other people unethical. In the world of computing, we should have a moral virtue and intellectual virtue for us to attain good life.

2. Which do you think seems to predominant in the worls of computing as you know it?

For me wisdom is the superior power that will guide in human being to produce a good life. Wisdom described as intellectual virtue of thought, where there is wisdom every decision you have an excellent reason and every action you have a deep understanding.

MODULE 3 SAQs

A. How would you classify the moral issues in computing enumerated below? Write your answer in the blank before each item and be ready to support your answers.
MG - morally good under all circumstances
MB - morally bad under all circumstance
MGB - morally good / bad under certain circumstances

1.Software piracy
MGB - since the price of the original software is too expensive, learning computer software become hard for those who cannot afford to buy the original copy.
2.Pornography on the Net
MB – This is morally bad especially for children who already knows searching on the net.
3.Creation of worms and computer viruses
MB - this is destructive to all the computer users.
4.Infringement of intellectual property rights ( of computer programmers)
MGB – Copying, distributing, downloading, and uploading information on the Internet may infringe the copyright for that information. Even an innocent, unintentional infringement violates the law. According to TEACH, the Technology, Education, and Copyright Harmonization Act (TEACH) of 2002 updated federal copyright law to facilitate digital education use of materials without requiring copyright permission, subject to several conditions. TEACH says it is not copyright infringement for teachers and students at an accredited, nonprofit educational institution to transmit performance and displays of copyrighted works as part of a course if certain conditions are met. If these conditions cannot be met, permission from the copyright holder must be obtained. http://www.etsu.edu/students/spectrum/IntellectualProperty.htm
5.Violation of privacy ( in communications via Internet)
MB – Every human being has a right to be secure in everything his owned.
6.Plagiarism
MB- to avoid plagiarism always paraphrase instead of using direct quotes when possible. It is important to learn to express ideas in your own words. But, when you paraphrase an idea or concept that is not common knowledge, you must reference your source directly in your text, or refer to the original author(s) in your paraphrased text.
7.Spamming
MB – Spamming is wasting time with unwanted e-mail, spam also eats up a lot of network bandwidth. Consequently, there are many organizations, as well as individuals, who have taken it upon themselves to fight spam with a variety of techniques.
8.Hacking
MB- Some hackers feel that they are no more than explorers out to see how far they can get into other computer systems. Some of them use their skills to help companies and agencies to find errors in their computer security system. Others, usually known as crackers, are out to find information, change something, or cause damage in other's computer systems. The legal implication of hacking is covered under law Title 18: Crimes and Criminal Procedure: Part 1: Crimes: Chapter 47: Fraud and False Statements: Section 1030: Fraud and related activity in connection with computers. The federal punishment for hacking into computers ranges from a fine or imprisonment for no more than one year to a fine and imprisonment for no more than twenty years. This wide range of punishment depends upon the seriousness of the criminal activity and what damage the hacker has done.
9.Computer abuse
MB – Abuse in all things is not good.
10.Computer crimes in general
MB - Computer crime involves the unauthorized and unlawful use of a computer and these are morally bad.

B. Discuss how adherents of ethical egoism and latruism would analyze the following situations. Suport your answers.

CASE 1: Roger designed a computer program that would make detection of enemy code easier.
Ethical Egoism: He try if his knowledge is enough to designed a computer program and to be known as a programmer.
Ethical Altruism: Roger wants to share his ability in making a computer program.

CASE 2: Perla plans to buy licensed software in the U.S. using royalties from the sale of her book on computer ethics, and donate the software to her alma mater.
Ethical Egoism: Giving donations will help for advertising her book of computer ethics.
Ethical Altruism: She wants her alma mater be updated using the computer software she bought from the U.S.

CASE 3: Marjo wants to create a virus that would affect only laptop operations.
Ethical Egoism: Marjo wants to be famous in terms of virus creator and also have an income for making a virus scan.
Ethical Altruism: Marjo wants to try if he can do that kind of virus and to prove the effect of his work

CASE 4: Baba debugged a secret code of the NBI that allowed her to access all computer systems of the agency. She plans to sabotage the whole system as a form of revenge for what she considers to be the NBI’s violation of her human rights.
Ethical Egoism: Baba’s believe that revenge is the way to fight for her human rights.
Ethical Altruism: On the other hand, Baba wants that the NBI agents open their eyes and face the consequence of their wrong doings.

CASE 5: Tikya and John-john were contracted to design and develop a website for government agencies in the Philippines at the cost of P1 million. An added feature of the contract is that they would be contracted as computing consultants of the government.
Ethical Egoism: Tikya and John-john seek for security in their job and be a part of a long term period in the company.
Ethical Altruism: they want to focus on the website design and give their effort fully because they believe that this is not only use by the small company but it will be using by different government agencies of the Philippines.


Tuesday, December 07, 2004

MODULE 2 SAQs

1. What relevance, if any, does the study of the concept of alw, in general, have in computing and your study of computer ethics?


In all aspect of study ethics is involve because it serves as guide to follow in achieving the goal. It means that, in all aspect of what you are doing you have to study the coverage, for us to make it easy we have to know the concept of law of the said studies. In computing and studying computer ethics, we, computer users, must have a knowledge regarding the limitations of our studies for us to be able to move freely and without negligence of the others privacy.

2. List down two laws governing computer use and explain what types of non-jural law seem to
underpin these two laws.

Computer Crime Law
Computer crime is an ever-present area of concern for operators of networked computer systems. Operators continuously find themselves needing to devote substantial resources to avoid falling victim to system-crackers and the like. The term "computer crime" covers a variety of offenses, including: unauthorized access to and use of computer resources, data theft, damaging stored data, engaging in service attacks, trafficking in stolen passwords, spreading computer viruses, and a number of other related offenses. All of these activities are often referred to as "hacking."

While the internet has revolutionized business and communication almost overnight, laws regulating its use and misuse haven't developed as swiftly. But in the last few years Congress and the courts have started responding to the threat posed by computer crime. Before 1996--when the Computer Fraud and Abuse Act was amended significantly--prosecutors had to rely on old statutes to make their cases and many of these statutes were inadequate when applied to the new area of computercrime.
SOURCE:

Intellectual Property Law
In the most general sense, encompasses creations of the human intellect (hence the term itself) and their protection, usually by copyright. Copyright is a form of protection provided by laws to the authors of original works, otherwise known as the owners of intellectual property. http://library.thinkquest.org/26658/cgi-bin/2-1.cgi

Computer crime law and intellectual property law are both govern by the moral
law because it holds the definition of moral law.

3. Melinda bought licensed computer software from Cyberzone. Becasue of the high price she paid for the purchase of the software, Melinda though of reproducinf copies of it to be sold to friends and acquintances. Melinda knew she would be violating the law. Nevertheless, she executed her plan and sold pirated software. Comment on this situation with each of the four types of law in mind. That is, to what extent does each of the four types of law apply in this case?

DIVINE LAW
Evil thought can cause sin under the divine law, Melinda thought of reproducing copies of the computer software and to be sold it to her friends and acquaintances, in this situation Melinda committed an illegal act under the Divine law.

NATURAL LAW
God created a man from his image, every human beings created by God has its own freedom to choose what ever decision you might have as long as with in the boundary of the natural act based on your creation. As a human being Melinda violated the natural law by reproducing another copy computer software (piracy) which is unrighteous deeds.

MORAL LAW
Some of us are aware in existing norms that “respect for the rights of owners of intellectual property. Reproducing a copy of computer software without permission to the owner will violating the moral law like Melinda’s did.

PHYSICAL LAW
This law deals with the order of sequence and uniformities involved in the operation of nature. For every country they have a uniform treatment to everyone in a way that every criminal must be put into punishment because violating the given law gives misalignment of having a uniform act for everybody. Like Melinda’s did, she act out of the natural operation which is reproducing a copy of computer software.

Wednesday, November 24, 2004

MODULE 1 SAQs

1. Pick three definitions of ethics from those given and give your own example of each.

Example of definition # 3: Ethics focuses on the care for the soul.

As an instructor, I have many experiences on the students attitude. One time, I’m the proctor of my class for final examination. One student caught on the act of cheating at the middle of two hours. After the examination I decided to talk to the student one-to-one talk, I ask "why did you that?" And the answer simply “Ma’am I am not ready to take the examination due to my work”. I said “It’s good to study while working but it is not good the way you accomplish it”. The action of the student shows unethical.

Example of definition # 4 Ethics is an area of philosophy that deals man’s pursuit of the “good life”.

Many inventors that are successfully made their goals, but unfortunately their inventions are not successfully used. Like for example the Television, it was made to have a communication from the media but, instead it is the cause of some immoral things that happen in our environment. Other inventors use their talent, knowledge and everything they can give for the future use, but other people innovate it in destructive way.

Example of definition # 5 Ethics is the study and philosophy of human conduct with emphasis on the determination of right and wrong.

Like in our government, there is a lot of existing policies and laws that must be follow. If you look at the government officials, you will confuse because the one who create and propose the law is also the one who violate it. Let us look at the custom services, we have a policy that if the baggage has no permit it will not be allowed to pass on, but some officials they tolerate the wrong doings of their fellowmen. In this situation, it is hard to determine the right and wrong actions since both (right and wrong doings) actions are acceptable.

2. Pick one area of applied ethics, (e.g nursing ethics) study some of its concerns, and summarize what you find out.

Hacker Ethics
Every profession or trade tends to have an ethical code which suggests that it is capable of self-regulation of its members. The code demonstrates the shared core values necessary for people to practice within the professional community. And it enables the public and the government to have some degree of trust for the profession. Some of these codes may be very ancient and formalized, such as the Hippocratic Oath sworn by physicians. Others may be very modern and legalistic, like the code of ethics for applied or academic anthropologists. Some ethical systems may be "underground," (such as the Pirates' Code of 18th century buccaneers or Mafia oaths of loyalty) enabling members of subcultures or groups to survive, cooperate, and escape outsiders. Yet others like the original Hacker Ethic are very informal and simple - rules of thumb to live by.
Groups employ different means of enforcing their ethical systems. Some provisions are often recognized as simply being archaic and are ignored. This is why most doctors do not heed the prohibitions in the Hippocratic Oath against abortion or euthanasia, yet most (but not all!) believe in the ethical principle of not refusing critical treatment to a patient who is unable to pay. Other groups (such as anthropologists) often devise ethical codes simply because they are forced to by the bad behavior of some of their members in the past, and their provisions are specifically tailored to problems that have arisen. Violating some ethical codes can get you banned from the profession or worse, when professional associations exist to enforce the regulations; with hackers, breaking the Hacker Ethic seems to result mostly in anathema or social ostracization, a time-honored method of social control.
Thus, the ethical principles of the Hacker Ethic suggest it is the ethical duty of the hacker to remove barriers, liberate information, decentralize power, honor people based on their ability, and create things that are good and life-enhancing through computers. It remains an open question as to whether it advocates the free distribution of software, the injunction against using computers for malicious purposes, or the need for secure networks based on trust. Each of these document samples show that new hackers are aware of, and advocate (whether intentionally or accidentally) elements of the original Hacker Ethic.

3. Rona belongs to community A where no law prohibits the reproductive (without the permission of the owner) and trading intellectual property like computer software, and the like. Jojo, on the other hand, belong to community B where the law on infringement of intellectual property rights is being enforced. One day, Rona visits Jojo in his home. Unaware of community B’s law of intellectual property, Rona copies computer software designed by Jojo without the latter’s consent and even reproduces the same in voluminous quantity I with the intention to sell the material in community A). As expected, Jojo gets angry with Rona and files a case against her for transgressing as judge. What would be your judgment? Support your position using any of the definition of ethics discussed in this module.

In very person they have their own principle in life, outlook and behaviour that they get it were they grown up. It also applied in different country, they have also their policy, rules and regulation in every aspect of their lives while they are living. In this situation Rona did an unethical act ( Definition#5: Ethics is the study and philisophy of human conduct with empasis on the determination of right and wrong.) with Jojo because she did beyond the personal principle of Jojo and also beyond the law of Jojo’s country.
Rona can be consider as a "hacker" who breaks into someone's computer system without permission. Some hackers intentionally steal data or commit vandalism, while others merely "explore" the system to see how it works and what files it contains. These "explorers" often claim to be benevolent defenders of freedom and fighters against rip-offs by major corporations or spying by government agents. These self-appointed vigilantes of cyberspace say they do no harm, and claim to be helpful to society by exposing security risks. However every act of hacking is harmful, because any known successful penetration of a computer system requires the owner to thoroughly check for damaged or lost data and programs. Even if the hacker did indeed make no changes, the computer's owner must run through a costly and time-consuming investigation of the compromised system.
4. In your opinion, when does an act become ethical or unethical? Explain your answer. Support it using your own example(s).

The problems of deciding what behavior is ethical or unethical are further complicated when values seem to change across time.

In man’s law, each one of us has their own limitations or capacity to do, as long as the action is not beyond the limitation of every person it considered as an ethical act. Same as the place where you did the action, as long as the action is not against the law of the certain place/country it considered as an ethical act. Meaning, I can say that action is unethical if it is against the individual or group laws, policies or regulations. On the other hand, in religious aspect (Christ believers), we have a divine law that if your deed against with the law of God without considering the place, the race, the understanding of a person it is an unethical.



5. If you will be given the opportunity to formulate at least ethical norms to govern computing, what would they be? Briefly explain each.

If given me a chance..., these are the ethical norms that I would like implement:
1. Privacy and confidentiality – every user must have a legal access and security that will not be accessed by the other people, even the user haven’t enough knowledge in handling computer system ( hardware and software).
2. Integrity - assuring that data and programs are not modified without proper authority.
3. Consistency -- ensuring that the data and behavior we see today will be the same tomorrow and become a reference for future.
4. Controlling access to resources – Every user should have limitations in all informations. They should have a level of access according to individual identitifiaction ( e.g. age, educational attainement, profession).