Saturday, March 3, 2012

Evoldahc On eCommerce Crimes

Module 13-14:
Research on ten Philippine e-commerce related crimes that were successfully solved by the government. State the crime committed, name of criminals, court's decision and include the source of your information.

1.
Crime: DVD/CD Piracy
Criminal(s): Jaime Chan and Maria Cristina Chan
Verdict: Guilty: A fine of P50,000.00 each and imprisonment of 3 months and 1 day to 1 year.
Reference: http://news.google.com/

2.
Crime:  Illegally accessing in 2004 the PABX of Trend Micro Inc. 
Criminal(s) : Edraline M. Ycot
Verdict: Guilty:  2 year prison term and a P100,000 fine
Reference: http://www.philstar.com/

3.
Crime: Credit Card Fraud
Criminal(s): Lim King and Leung Hung Ying
Verdict: Guilty: Each was sentenced 3 years imprisonment and a fine of P121,738.
Reference: http://www.philstar.com/


4.
Crime: Hacking and Credit Card Fraud
Criminal(s): Jeffric Carlos Abiera
Verdict: Guilty: Minimum imprisonment of 1 - 2 years plus a fine of P100,000
Reference: http://emailspotting.wordpress.com/


5.
Crime: Credit Card Fraud
Criminal(s): Wu Yen Jung
Verdict: Guilty: Deportation after serving sentence
Reference: http://immigration.gov.ph/


6.
Crime: Video and Audio Piracy
Criminal(s): Wang Ching Hau, Xiao Han Ying, Hu Fei Xiong, Lu Zon Wu, Susan Wong, Tan Hai Pen, Willy Tan, Goyoli Go, Agus Sutayto, Moulyuno Gouw, Hendri Djap, Satrisno Bong
Verdict: Guilty: Each meted a six-month jail term and ordered to pay a total fine of P1.4 million.
Reference: http://www.philstar.com/


7.
Crime: Hacking the gov.ph portal
Criminal(s): JJ Maria Giner
Verdict: Guilty: 1 - 2 years imprisonment and a P100,000 fine.
Reference: http://www.crime-research.org/


8.
Crime: Two Counts of Software Piracy
Criminal(s): Nestor Yao
Verdict: Guilty: 1 year imprisonment for one case and 3 - 6 years imprisonment for the other, and a P200,000 fine.
Reference: http://www.ulop.net/


9.
Crime: Piracy
Criminal(s): Raffy Bitancor
Verdict: Guilty: 1 year imprisonment and a P50,000 fine.
Reference: http://www.philstar.com/


10.
Crime: Film Piracy
Criminal(s): Joshua Chen, Lee Hokbeng, Johan Ang, Uang Zhu Sy, Wen Jhong, William Tan, Kim Diang and Ong Wen San
Verdict: Guilty: Each 3 months and 1 day prison terms and a P500,000 fine each, with subsidiary imprisonment in case of insolvency.
Reference: http://www.philstar.com/

Tuesday, February 14, 2012

Evoldahc On Intellectual Property

Module 12

Question: 

What is there for to rejoice if you have the intellectual property on something? Would it be a great instrument to the economic growth of the country? Or you are just the sole beneficiary of the fruits you have reaped from what you have sowed? Explain.

Answer:

The benefits one can enjoy if he/she has the intellectual property on something include, but is not limited to:
1. Royalty Income - If a person owns the intellectual property on something that in turn is bought and used by commercial companies, he/she will earn a percentage share from the profit.\
2. Protection - If a person owns the intellectual property on something then he/she can be sure that any replication of the property by other parties can be considered illegal and he/she can pursue them and demand payment for damages.
3. Recognition - If a person owns the intellectual property on something then he/she will enjoy the honor and dignity from owning the said property. He/she will be known to the world and will have, most likely, no trouble finding a job and recognition.

Would it be a great instrument to the economic growth of the country? Or you are just the sole beneficiary of the fruits you have reaped from what you have sowed?

If someone, say a Filipino,  owns the intellectual property on something then the benefits will not only be enjoyed by the individual but also by the county. This will help the economic growth of the country since the individual is a citizen of the country and therefore pays taxes from the royalty income he earned. Additionaly, the intellectual property is owned by a citizen of the country, thus the companies/individuals interested in buying a license of the said property will also pay taxes due to the country. Lastly, hte recognition enjoyed by the owner of the intellectual property will also be enjoyed by the country since the owner is a citizen.

Evoldahc On Free Speech Issues

Module  11

Question 1:
Facebook’s marketing director, who happens to be Mark Zuckerberg’s sister, proposed last year that banning online anonymity would help curtail cyber-bullying and Internet harassment. Then-Google CEO Eric Schmidt made a similar observation in year 2010, noting that “privacy is incredibly important” but “not the same thing as anonymity.” If banning is already imposed or will be imposed would this stop annoying comments against someone freely posted by an anonymous FB user? Is this ethical? Is this against the freedom of speech? Support your answer.

 Answer:
If banning is already imposed or will be imposed would this stop annoying comments against someone freely posted by an anonymous FB user? I think not, it would not eradicate hate or harassing comments posted by anonymous users but I believe it will somehow lessen the number of people harassing people on social networking sites. Is this ethical? I believe that banning online anonymity can be ethical or unethical, depending on the manner  and scope of its application. Why do I say so? Because their is a scope as to when banning nline anonymity can be considered ethical or unethical. Banning online anonymity, in my opnion, can be considered ethical if the ban will only be imposed to anonymous online accounts who have commited or have records of committing flames, hate comments, cyber-bullying, and other related actions that can be considered degrading to the person the action is done to. On the other hand, banning online anonymity can be considered unethical when the banning is applied to all anonymous accounts regardless of the credibility of the account. Is this against the freedom of speech? Banning online anonymity also can either be pro-freedom-of-speech or anti-freedom-of-speech, depending again on the scope of its application. Banning online anonymity can be considered pro-freedom-of-speech if the banning applies only to select accounts who have records of commiting cyber-bullying, hate/flame comments, and other related actions which can be considered baseless and degrading to the person the action is done to. We must not forget one of the problems presented by our classmate Claudio Galia III in his report on Moral Problems, specifically the Problem of Freedom which states that: "Your freedom ends at the tip of my nose." The aforementioned quote simply means, that relating it to banning online anonymity, our freedom of speech is not abosutely free because we are only free to say as much as we want as long as it does not damage the name, the dignity, and the rights of the person we address it to. On the other hand, banning online anonymity can be considered anti-freedom-of-speech if the banning is applied to all anonymous accounts regardless of the basis of the ban and the credibility of the banned account.
Question 2:
Is it ethical to blog both awful and pleasant experiences with your ex-girlfriend / ex-boyfriend? Discuss.

Answer:

There are certain factors as to when  the blogging of the abovementioned experiences can be considered unethical or ethical. Sharing awful or pleasant experiences with your ex can either be unethical or ethical, depending on the manner of sharing and the implications the action brings to the parties concerned. It can be unethical if you shared pleasant experiences on your blog and you included the name of your ex, not to mention his/her social networking accounts, or if what you shared is too private like for example your intimate moments with your ex. This is also the same with sharing awful experiences, I believe everyone will agree that mentioning the name of ones ex in a blog about shameful experiences is unethical. However, blogging about pleasant as well as awful experiences with one ex can be ethical if the blog protects the identity of the parties concerned and the experiences mentioned on the blog doesn't harass or enshame the persons dignity and name. For all we know, by responsibly sharing our pleasant experiences we might help others to strengthen their relationships. And by responsibly sharing our awful experiences we might be able to save some from pain. In this sense, the measure of how ethical or unethical we are in sharing our experiences depends on how responsibly we do the sharing.


 

Tuesday, January 31, 2012

Evoldahc On Social Justice In Chief Justice Corona's Impeachment Trial

Question:
Is social justice evident in the impeachment trial of Chief Justice Corona? Discuss.


Answer:
In my own idea, I believe that social justice is evident in the impeachment trial of Chief Justice Corona. There's nothing wrong in prosecuting him for tripling his wealth through the years that he has been in public office while failing to provide an accurate Statement of Assets, Liabilities and Net Worth (SALN), not to mention his failure to declare 2 of his properties, and his buying spree despite his doubtful ability to pay based on his current salary. Moreover, his refusal to provide more information about his salary, properties and businesses adds to the growing doubt that he is hiding something fishy.

It is just right that he is being tried so society will know the truth about it all; the reason for his incredibly fast acquisition of wealth, his failure to declare his properties as well as an accurate and honest SALN.

Just my two cents. :)

Evoldahc On Privacy And Social Justice

Question:
 Talking about privacy, how far would you go for the sake of social justice? Justify.

Answer:
By definition, social justice generally refers to the idea of creating a society or institution that is based on the principles of equality and solidarity, that understands and values human rights, and that recognizes the dignity of every human being. In short, social justice promotes the welfare of the people. Privacy, on the other hand, is defined as a person's right to control access to his/her personal information.

More often than not, we get caught between the two and we begin to ask ourselves: How can I promote social justice while protecting my own privacy? The reality is it is very hard to promote social justice while protecting our privacy. So if we want to promote social justice, we should start stopping protecting our privacy. But to what extent?

In my opinion, I believe I can go all the way to promote social justice. By this I mean, I am willing to reveal all my personal information as long as it is within my rights as a citizen of this country and as a human being, and as long as neither the dignity of my loved ones nor mine is slighted.

In the event that intrusion of my privacy is needed to promote social justice, I am most willing to cooperate.
If there is a need to tap my phones, I can live with that.
If there is a need to have CCTVs in my private quarters, I can live with that.
If there is a need that my every move is being watched, I can live with that.
If there is a need that I be X-Rayed to reveal what's under my clothes, I can live with that.
If there is a need to track what websites I visit, restaurants I dine in, hotels I check in, who I date, and even the soap brand I use, I can live with that.

Truth is, I can live a "not-so-private" life. It's okay with me because I also believe that the concept of privacy is subjective, therefore changeable - what we hold private changes with time and place. While some of us thinks nudity is something private, there are others who are okay with public nudity. It is very possible that with time what we hold private now will be a public thing in the future as what was held a public thing by our ancestors we consider private now.

Just my two cents. :)

Tuesday, January 24, 2012

Evoldahc On Computer Abuses


Question:
            What computer abuse would you like to eradicate? How would you do it?

Answer:
            The computer abuse that I would like to eradicate is Internet Hoax. How would I do it? Well, while it is a fact that completely eradicating internet hoaxes is impossible, preventing it from affecting majority of internet users is plausible. Since we have already established the fact that it can’t be eradicated, preventing it from spreading in the web is the next best thing to do. In my own opinion, preventing internet hoaxes to the point that it is almost eradicated can only be achieved through effective information dissemination, user education, and advance warning with the collaboration of both private and government agencies.   
            My contribution in this would be to participate in online communities that aim to educate internet users about internet hoaxes. I could also help spreading the information about these hoaxes simply by sending e-mails to my friends, discussing it in social networking sites, and vocally talking about it in the community. Sending messages could also serve as warnings.

Evoldahc On Misinformation In The World Wide Web


Question:
            There are still enormous sources of misinformation on the World Wide Web, so how can you determine what is good information and what is bad information?

Answer:
          It is true that misinformation reeks throughout the World Wide Web and it can mislead many of us to believing something that is not true or real. The ability to determine good information from bad information is very important in safeguarding ourselves from being bombarded with deceitful information. So how can we determine the gold from the rock?
          Here are some tips that in my opinion can help in finding the correct information:
  1. Use reliable sources in finding the information you need.
This is the best way to avoid misinformation. If you get information from a reliable source, then you can be sure that it is authentic and almost, if not, 100% accurate.
If you might think that wikipedia or other wiki sites are considered reliable sources, then I tell you you’re wrong. By definition, a wiki is a website whose users can add, modify, or delete its content via a web browser. And publicly editable wiki systems could easily be tampered with.  The best way to sift through information provided by wikis is to compare it with other sources to determine its reliability.
Some reliable information can be found on newspaper sites, news channel sites, and international magazine sites.

  1. Compare information from multiple sources.
Comparing the same information from different sources will ensure that the information is reliable. Although it is not perfect, it boosts your chance of getting the correct information. So the next time you search about something, make it a habit to get and compare it from multiple sources.

  1. Avoid suspicious web content.
Spam, internet hoaxes, pop-ups, opinionated information, and flames or hateful information are some of the web contents you should avoid and should always be wary of the information presented by these. So educate your self about these things for a better chance at getting the correct information you need.

Evoldahc On Women Into Online Gold Digging


Question:
Today, it is a fact that a lot of Filipino women are into online GOLD digging. You know what it means, right? Suppose one of them is your sister who happens to be your family's breadwinner. What would you do on this matter?

Answer:
            We know for a fact that it is unethical and immoral but we cannot just base our actions on the matter based only on that fact. We should also look into the factors that made it prevalent here in our country. If we asked this question to someone who has no sister or has a sister but is not in that situation, he/she may think it is bad and would say that if it were his/her sister he/she would tell his/her sister to stop and it would be alright even if they have no food to eat. Don’t you think his/her answer is too ideal? Now, if we asked the same question to someone who really has a gold digger sister who is also their family’s breadwinner, do you think he/she will have the same answer? I believe not, because the one in a similar and real situation as our example will surely think of all the factors why his/her sister is into online gold digging.
            Now, I should be careful in answering the question so as not to be biased against those who are in the situation. So suppose I am in that situation and I have a sister who happens to be a gold digger as well as our family’s breadwinner, what would I do? Since I already said earlier that telling her to “stop and that it is alright even if we can’t eat anymore and that she should just look for a decent job” is too ideal so you can expect I am not going to use that as my answer. My honest to goodness answer would be to advice my sister to try to find a better and more decent way of earning and that she should only continue doing what she’s doing until she finds a way out of it. If she accepts my advice, then it’s good. If she rejects it, then I can do no more. She feeds me anyway.

Friday, December 16, 2011

Evoldahc on Computer Ethics

1. If you are to choose your top 3 difficult-to-follow computer ethics commandments, what are these? Explain why.

If I were to choose my top 3 difficult-to-follow computer ethics commandments, I'd pick the following:

Commandment #3: Thou shalt not snoop around other people's files.
Personally, I find this commandment hard but not impossible to follow. I think so because I am a curious person, at times almost too curious, and I find it hard to resist the temptation of opening or exploring files and folders with enticing names, especially those which says "Don't Touch," or "Don't Delete" or, "Secret."

Commandment #6: Thou shalt not use or copy software for which you have not paid
This commandment is really really really difficult to follow because with the current economic status of our country, licenses for software are way too expensive. It's really hard to pay for a licensed software that costs as much as a brand new personal computer, and what makes it even harder is the rampant sale of pirated software all over the country.

Commandment #7: Thou shalt not use other people's computer resources without authorization.
I find this commandment difficult to follow because as a Computer Science student here in the university, there are times, a lot in fact, when we have nothing to do and it gets so boring that the only way we ease our boredom is by logging on unauthorized to the computers in our classrooms to surf the net or just play or do our assignments.

2. Suppose you are to add 2 more commandments to the existing 10 commandments of computer ethics, what are these? Are these 2 new commandments of equal importance to the existing ones? Discuss.

If I were to add 2 more commandments to the existing 10 commandments of computer ethics, it would be:

Commandment #11: Thou shalt use any computer resource in a productive and responsible manner.
Commandment #12: Thou shalt obey all these commandments with utmost sincerity and diligence.

I believe the above additional commandments are of equal importance to the existing ones because the above commandments guide us and prompt us in being true and honest in obeying the other commandments. These two commandments will measure our sincerity in being ethical.

3. What is ransomware? Which of the 10 computer ethics commandments is/are violated by ransomware?

Ransomware is a computer malware which holds a computer system, or the data it contains, hostage against its user by demanding a ransom for its restoration. Ransomware violates commandments 1, 9, 10, which reads as follows: 

Commandment #1: Thou shalt not use a computer to harm other people.
Commandment #9: Thou shalt think about the social consequences of the program you write.
Commandment #10: Thou shalt use a computer in ways that show consideration and respect.

Tuesday, December 13, 2011

Evoldahc on Nicomachean Ethics

1. How often do you make an effort to practice your strengths and virtues? (A virtue is a trait you cultivate. Ex: patience, generosity kindness). Are these traits key to a happy life? Discuss.

I make it a point to always keep an eye on my efforts in practicing my strengths and virtues. In as much time and as many situations possible, I always do my best to cultivate my virtues. For example, I  try as much as possible to keep a cool head and be patient no matter how stressful and annoying the situation is, albeit there are times when I fail in doing so.

In my own opinion, Virtues and strengths are the keys to a happy life but not until they are exercised and/or cultivated. I believe so because like what Aristotle wrote in his Nicomachean Ethics, real happiness is that which reflects goodness or virtue and which is only achieved through the exercise of such virtues. A person can never be truly happy even if he has goodness/virtue in him, unless he acts on that virtue he has. The virtue of patience, courage, generosity, and friendship can never lead to a happy life without being acted out. So in the end, having these virtues may lead to a happy life if coupled with action.

2. For some, happiness relies on money. In some cases, hacking means money. Would you do hacking it if its outcome is a sure happiness of your family? What particular Aristotle theory contradicts this concept? Discuss.

I wouldn't do hacking even if its outcome is a sure happiness of my family because doing so will not give my family and I real happiness. Such an act, in my own opinion, contradicts with three of Aristotle's theories on happiness. The theories such action contradicts are as follows:

"Happiness is not pleasure, nor is it virtue. It is the exercise of virtue."

It is very obvious why the aforementioned act contradicts the above theory of Aristotle. Hacking for happiness satisfies the pleasures of my family and I, but as mentioned in the given theory "Happiness is not pleasure..." Moreover, it is an obvious fact that hacking is not virtuous nor does it correspond to the exercise of virtue. It is an act against virtue, thus it is an act against real happiness because as mentioned in the theory "happiness is the exercise of virtue." 

"Happiness is the perfection of human nature. Since man is a rational animal, human happiness depends on the exercise of his reason."

Hacking for money contradicts man's exercise of his reason, and reason is human nature and "happiness is the perfection of human nature," therefore hacking contradicts happiness. Hacking for happiness did not and will never go any closer to real happiness because real happiness is achieved through the exercise of one's reason in determining the goodness and correctness of one's actions in the pursuit of real happiness. Hacking for money, will never be an act of goodness nor a correct act because even if it gives happiness, so to say, to the hacker and his family, it does not bring about the welfare of all the parties involved. Real happiness can only be achieved using good and right reason.

"Happiness requires intellectual contemplation, for this is the ultimate realization of our rational capacities."


This is similar to that of the previous theory in that this theory asserts that for one to attain real happiness one must contemplate using his rational capacities in determining if the happiness he aims for is the real happiness. Sadly, hacking for money is an act that has not gone through much intellectual contemplation in the sense that it does not meet what is required in achieving real happiness, which is goodness.

In the end, to achieve Happiness, that is real happiness, one must act in line with virtue and good reason.