IT - Chapter 3 - Reviewer
IT - Chapter 3 - Reviewer
3. Flaming/ Roasting
Chapter 3 a. Abusive emails or messages to other
people
REVIEWER 4. Spamming
a. Unsolicited commercial email
5. Malwares/ Malicious Software
Ethics
a. Intrusive software that steals data or
● Greek term,”ethos” = character/ custom
damage computer systems
● Equivalent term in Roman, “mores”= morality
b. KINDS
● Depends on whether it conform to existing
i. Virus
customs
1. Reproduces its own code
by attaching to a file
Applied Ethics
2. It is executed when the
● Perception of what is right and wrong
infected file is opened
ii. Worm
Computer Ethics
1. Self-replicating
● Guiding percept and norms applied in the
2. Does not require any
regulation and control of control and its application
outside actions
iii. Trojan
10 COMMANDMENTS OF COMPUTER ETHICS iv. Ransomware
1. Thou Shalt Not Use A Computer To Harm Other 1. Can block access to a
People. victims data
2. Thou Shalt Not Interfere With Other People’s v. Spyware
Computer Work. 1. Gathers information
3. Thou Shalt Not Snoop Around In Other People’s without their knowledge
Computer Files. vi. Adware
4. Thou Shalt Not Use A Computer To Steal. 1. More dangerous type of
5. Thou Shalt Not Use A Computer To Bear False spyware
Witness. 2. Controls device without
6. Thou Shalt Not Copy Or Use Proprietary Software their knowledge
For Which You have Not Paid. 6. Internet Hoaxes
7. Thou Shalt Not Use Other People’s Computer a. Chain letters
Resources Without Authorization Or Proper 7. Phishing
Compensation. a. Poses as legitimate institutions to acquire
8. Thou Shalt Not Appropriate Other People’s personal data
Intellectual Output.
9. Thou Shalt Think About The Social Consequences
Of The Program You Are Writing Or The System ISSUES IN COMPUTER ETHICS
You Are Designing.
1. Privacy Issues
10. Thou Shalt Always Use A Computer In Ways That
2. Social Justice Issues
Insure Consideration And Respect For Your Fellow
3. Free Speech Issues
Humans.
CYBERCRIME
COMPUTER ABUSES
Cyber
1. Denial of Service Attack ● Characteristics of the culture of technology
a. Preventing or barring legitimate users of
computers from availing themselves of RELATED PHILIPPINE LAWS
computer services. 1. RA No 10175: Cybercrime Prevention Act of 2012
2. Hacking a. Approved on Sept. 12, 2012
a. Unauthorized access to a computer. 2. RA No. 10173: Data Privacy Act of 2012
3. RA No. 8792: E-Commerce Law of the Phil
INTELLECTUAL PROPERTY
● Exclusive rights on an intangible assets NETIQUETTE
● Set of rules for behaving properly online
RA No. 8293: The Intellectual Property Code of the Phil.
● Comp. programs are non-patentable but 1. Golden Rule
copyrightable 2. Avoid slang, acronyms, and text talk
3. Avoid screaming in types messages
Software Piracy 4. Proofread your messages before sending
● Unauthorized copying or distribution of copyright 5. Exercise good judgment when sharing information
software with others
6. Respect diversity in viewpoints
Copyright
● Protection for original expression on an original 1. Remember the human
work of a creator 2. Adhere to real life standards
● Recorded at the National Library or Supreme Court 3. Know where you are in cyberspace
Library 4. Respect other people's time bandwidth
5. Make yourself look good online
Patent 6. Share expert knowledge
● Exclusive rights granted to an inventor for a limited 7. Help keep flame wars under control
period of time in exchange for the public disclosure 8. Respect other people's privacy
of invention 9. Dons abuse your power
10. Be forgiving of other people's mistakes
Trademark
● Distinctive sign used by an individual or a group
Trade Secret
● Anything that gives a business a unique
competitive advantage over its competitors
● The signing of non-disclosure agreements are
required to protect it.
1. Copyright infringement
2. Plagiarism
3. Phishing
4. Blackmail/ Extortion
5. Hacking
6. Computer-related forgery, fraus, and/ or identity
theft
7. Cyberbullying
8. Electronic Theft
9. Cybersex
10. Child Pornography
11. Cyber Defamation
Cookie
● Stored in the computer's directory, often in a
temporary folder