Thursday, March 24, 2005

Activity 12-1

1. From the cases summarized above, explain what constitues acomputer crime.


Computer crimes accomplished through the use of computer systems, especially with intent to defraud, destroy, or make unauthorized use of computer system resources. Computer crimes vary from territory to territory. Laws against computer abuses must first be institute before it becomes a computer crime.

Computer crime can involve criminal activities that are traditional in nature, such as theft, fraud, forgery and mischief, all of which are generally subject everywhere to criminal sanctions. The computer has also created a host of potentially new misuses or abuses that may, or should, be criminal as well.


2. Discuss at least three other examples of computer crimes.


Computer EmbezzlementIt is defined as "the fraudulent conversion of property of another by a person in lawful possession of that property". Crimes of this nature generally have involved a relationship of trust and confidence, such as an agent, fiduciary, trustee, treasurer, or attorney.

Software applications like QuickBooks and other accounting management systems have become the industry standard because of their ease of use, efficiency and powerful reporting capabilities. However, disgruntled or dishonest employees who are believed to be trustworthy can also abuse these popular business systems. Embezzlements from business are on the rise and the evidence of such crimes is usually in the form of computer related evidence.

In most states in the United States embezzlement is a crime. Under acts of Congress, stealing of letters by postmasters, clerks, and letter carriers is considered embezzlement.


Child Pornography
Pornography is any written or visual material that depicts nudity and/or sexually explicit activity for the purpose of causing sexual arousal. Of course, not all descriptions or photographs of nudity, sexual organs, and sexual activity (such as those found in educational material or medical textbooks) are pornographic. What makes material pornographic is its calculated intent to cause sexual arousal.

In the United States, viewing child pornography of any kind, including the various pictures or movies on the Internet, is indeed a computer crime. Several laws in this country prohibit the sale, distribution, viewing, and making of child pornography. The U.S. government regards any person under the age of 18 to be a child, so therefore pictures of a naked 17 year old are still considered child pornography.


Software CrackingIt is a software hacking in order to remove the encoded copy protection. Distribution of cracked software (warez) is generally an illegal (or more recently, criminal) act of copyright infringement.
Software cracking is most often done by software reverse engineering.
The passage of the Digital Millennium Copyright Act made software cracking, as well as the distribution of information, which enables software cracking, illegal in the United States.
A good example would be a "No CD" crack, which edits the program so that the CD is no longer needed to execute the program. Another example occurs when businesses break the copy protection of programs that they have legally purchased but that are keyed to particular hardware, so that there is no chance of downtime due to hardware failure.



References:
http://www.answers.com/topic/software-cracking
www-staff.mcs.uts.edu.au/~jim/cit2/cit2-99/legal/LegalIssue.html#What%20is%20computer
http://en.wikipedia.org/wiki/Computer_crime
http://www.crime-research.org/library/Introduction.htm
http://en.wikipedia.org/wiki/Pornography
http://en.wikipedia.org/wiki/Embezzlement
http://legal.laborlawtalk.com/EMBEZZLEMENT

Monday, March 21, 2005

Activity 10-1

Discuss one of the issues taken up in this module from the point of view of the preliminary and finalist theories discussed in Modules 3 and 4. Note that you must discuss the issue you choose from six perspectives (three preliminary theories and three finalist theories). To put it another way, you must come up with six perspectives on the issue.

Pornography

Ethical Relativism
We all know that pornography threatens families especially children. It is considered as a violation of decency, morality and could corrupt the viewer’s mind and soul. On the other hand, some invoke their freedom of speech and expression especially in the form of arts and human anatomy. This explains why pornography in the net is tolerated in some country while banned in other countries.

Also, these differences does not limit to countries to countries only but due to diverse cultural heritage, varied religious affiliations, different prevailing social norms and even distinct individual preferences as well.

Ethical Absolutism
Divine law is the law above all laws. “The laws of nature and all other laws, would fall under divine law as it encompasses and governs not only human actions but also the entire universe” (Computer Ethics – Albacea, Payongayong and Pinpin).

For Christians, the Holy Bible, consisting of the old and new testaments, contains the divine law. It is written in the Holy Bible that “lust of the flesh, lust of the eyes and pride of life are sins to God”. Pornography is addictive (1 Corinthians 6:12; 2 Peter 2:19), destructive (Proverbs 6:25-28; Ezekiel 20:30; Ephesians 4:19), and leads to ever-increasing wickedness (Romans 6:19).
Since Divine law is absolute, ethical absolutists consider pornography as morally bad.


Ethical Egoism and Ethical Altruism
In Pornography, there are two parties involved. The audience or the viewer or the reader and the publisher, that includes all the person involves in producing such material.

Egoism portrays individual as terribly self-centered. An entity that promotes it, considers pornography as an object of desire of flesh or information, to the viewer and an object of desire of money or popularity, to the publisher. On the other hand, to some that condemns it, considers pornography as an object of aversion.

There could also be an altruistic act in publishing a pornographic material. Artists, models or producers wants the audience to be informed, educated or satisfied with their urges.


Utilitarianism
Some people that patronize pornography consider it as morally right because such action brings pleasure and happiness. While others that condemn pornography consider it as morally wrong as it may result to corruption of mind and soul, thus this brings unhappiness, pain and problem to their families.


Categorical Imperatives
Many individuals, groups, communities, sects, and countries condemn pornography. With the existence of a contradiction, pornography cannot have moral worth.

To all that patronizes and promotes pornography may think that such action is meant to be good merely as means to something else. Since such action is not good in itself, thus it cannot be applicable to categorical imperatives but to hypothetical imperatives.


Nicomachean Ethics
Pornography is a human action, then it follows that the norms and standards of morality apply to it. Moral ideals such as goodness, righteousness, fairness, and justice apply in the evaluation of pornography as a human action. In this theory, pornography is considered as immoral:

  • It corrupts the mind and the soul of an audience.
  • It seeks to exploit women, men and now young children.
  • It is against the Will of GOD.

Indecency, exploitation and addiction are not the means towards attaining the “good life”.

Reference:
http://www.gotquestions.org/pornography.html

Activity 9-1

Choose one of the social justice issue in computing discussed above and find out to what extent it is an issue in the Philippines. Then find out what is being done to address it in specific countries. For example, in the case of the digital divide due to language differences, Soriano reports the adoption of ‘the Unicode Standard, “a character coding system designed to support the worldwide interchange, processing, and display of the written texts of the diverse languages of the modern world.” Developed, extended and promoted by a non-profit organization, the Unicode Consortium (www.unicode.org), the Unicode Standard makes international communication easier.’


Electronic monitoring. This includes electronic eavesdropping and wire-tapping.

Wire-tapping (definition):
- Cisco Systems defines it as monitoring and recording data that is flowing between two points in a communication system.

After the recent bombings here in the Philippines (Makati, Davao and General Santos), A congressman at the House of Representatives cited the need to hasten passage of anti-terrorism bill.

Malacañang is in favor of including a provision on wire-tapping in the anti-terrorism bill being deliberated in Congress.

In a phone patch interview with National Security Adviser Norberto Gonzales last Feb 16, 2005:

He saw nothing wrong with the method of getting information as long as safeguards were in place to ensure that this would not be used to encroach on the privacy of the individuals.

“Wire-tapping is an accepted tool of intelligence in practically all countries of the world. We should check whether wire-tapping would invade privacy of individuals. We are very particular that that particular provision will not be abused. If it would be included in the law, wire-tapping should be restricted to monitoring activities of criminals and lawless elements.” Interest on the anti-terrorism bill was revived following bomb attacks on Valentine’s Day in the cities of Makati, Davao and General Santos. The House said it would hasten the passage of the measure by June. Asked whether the Palace was supporting the bill, Gonzales said, “It’s about time we have that.”

Technical working group was discussing the bill. Wire-tapping would only be allowed, for as long as there is a court order. Hence, we shouldn’t worry about the concern on proposal to allow the use of electronic surveillance or wire-tapping in cases of sedition, kidnappings, and other criminal cases as it might infringe on the people’s right to privacy.



Source:
Daily Inquirer. Feb 16, 2005 edition.
www.mb.com.ph/OPED2005022329282.html

Thursday, March 10, 2005

SAQ 8-1

2. Think of an act, other than those already discussed in this module, that would constitute a viloation of privacy in computing. Explain.


Privacy can be pondered of as the power to conceal parts of the truth about oneself, or sometimes the power to control the use of truths about one that other people know. It is something that is not easy to define because it is a subjective matter. Some people have a desire, for personal motives, to move through society without being recognized, non-intervention in their affairs. Others have no problems giving out information about themselves in order to access information, goods, services or memberships. For most people, privacy is an issue of simplicity and security. People want to avail services without complicated forms and reference checks, and may be voluntarily allow information systems tracked their movements or purchases.

"Privacy of communications" refers to cover from interception with communication over the phone or the Internet. Respect for the privacy of communications is an important prerequisite for the maintenance of human relationships via technological communications media. This includes Voice Mail and SMS messages, Internet Relay Chats, Instant Messaging, Phone Conversations (on VoIP, PSTN, and Cellular), etc.

This act is either morally good or morally bad depending on the motive and purpose. It is morally bad because it transgresses the privacy of the concern. On the other hand, it can be morally good because it prevents terroristic activities.



Reference:
http://www.apc.org/english/rights/handbook/ICT_21.shtml
http://archive.cpsr.net/cpsr/privacy/wiretap/wiretap.html

Saturday, March 05, 2005

SAQ 7-1

Choose one example of computer abuse which you think is morally wrong. Explain why you consider it morally wrong. using any of the ethical principles you learned in the earlier modules.


Pornography

Definition : Still or moving images, usually of women, in varying states of nudity, posing or performing erotic acts with men, women, animals, machines, or other props. Some say it degrades women, some say it corrupts young boys (who down-load it from the World-Wide Web or exchange it on floppy disks). Most of it is in the form of JPEG images. There are many sites on the World-Wide Web offering porn of all sorts, almost always for a subscription. It is said that these are a driving force in the evolution of new technology and techniques for the web. Advertisements for them certainly constitute a significant proportion of all spam. There are even pornographic computer games, an early example being Mac Playmate.
- www.hyperdictionary.com/dictionary/pornography

The word, pornography, is drawn from the Greek words porne (female captive, slave or prostitute) and graphos (writing or drawing). Thus the etymology of the word links graphic portrayal of women with bondage and inequality with men. Such material should not be called pornography if it does not serve its purpose.

I consider pornography as morally bad at all times. Under no circumstance that this act becomes morally good:

1. It corrupts the mind and the soul of an audience.
Pornography usually gives the audience the wrong idea about sexuality. It lies about the needs of females and their sexuality. It lies about male sexuality and male talents for sex. It makes every woman a nymphomaniac. It tells a man that rape is a favor to a woman. It is full of these kinds of lies.

2. It seeks to exploit women, men and now young children.
They are displayed like meat at a counter. There are even hints at what the buyer can expect if he were to get lucky. It takes advantage of others to fill a demand that is made by those who want this type of material. Others must be exploited to fill the needs of a very limited group. We must understand, however, that even though one does not "buy these books" it does not mean that we are not allowing exploiting of others when we allow people to buy this material. Pornography is vicious and it must be dealt with viciously.

3. It is against the Will of GOD.
The Bible, in Matthew Chapter 5, tells us much about the sin of "lust in the heart". To look upon a woman with lust is sin. For us to promote or allow the promotion of lust is to neglect our duty as Christians. We must abstain from every form of evil (I Thess. 5:22). We are encouraged to seek that which is honorable, just, pure (Phillippians 4). The things that pornography promotes, uncleanness, fornication, lasciviousness, are all works of the flesh (Gal. 5:18-21). We as Christians can have nothing to do with pornography.

The danger of pornography is in its addictive quality and its power to corrode real flesh-and-blood relationships with objectified, idealized fantasies. Most pornography is designed as a masturbation tool for men, in which the pleasure of sexual stimulation becomes associated with isolation and degrading depictions of women.

Addiction to pornography can be overcome but it is not easy and requires honesty before God and accountability with other Christians.


References:
hyperdictionary.com/dictionary/pornography
sexscience.org/publications/index.php?category_id=440&subcategory_id=336
vogon-computer-evidence.com/electronic-disclosure/computer_abuse_examples.htm
www.bible.ca/s-pornography.htm
www.mcc.org/abuse/pornography/definition.html