aLL aBouT rOwEnA

My photo
A 20 - year old girl from Hilongos. I am a Computer Science student from Visayas State University.

Friday, 2 March 2012

Module 13: Computer Crimes


1. ILOVEYOU VIRUS

Crime Committed:  Violation of RA8484, Access Devices Regulation Act of 1998. Creation of the ILOVEYOU Virus that hit numerous computers in 2000 and sent as an attachment to an email message. It infected 10 percent and causing about $5.5 billion in damage.
Name of Criminals:  Onel de Guzman, Irene de Guzman, Reomel Lamores and Michael Buenafe 
Court’s Decision:  As there were no laws in the Philippines against virus-writing at the time, they were released and the prosecutors dropped all charges against them.

2. Criminal Case No. 419672-CR MTC-Branch 14, Manila

Crime Committed:  Violation of Section 33(a) of the E-Commerce law which involved the act of hacking the government portal “gov.ph” and other government websites like National Economic Development Authority, National Book Development Board, the Philippine Navy, and the web servers or computer systems hosting websites of local Internet service provider Bitstop in Dagupan City and University of the Philippines.
Name of Criminal:  JJ Maria Giner
Court’s Decision:  one to two years of imprisonment and to pay a fine of 100,000 pesos
(archives.rootcon.org/rootcon4/files/ECom%20_Lecture.pdf)

3. Computer Hacking and Stealing Credit Cards

 Crime Committed:  Hacking into the company he worked for and stealing credit card details. He was able to make online purchases worth more than $2,000 through illegal means.
 Name of Criminal:  a Filipino call center agent
 Court’s Decision:  found guilty

4. Computer Hacking
Crime Committed:  Cracked a 100-million peso ($3-million Cdn.) computer hacking ring that had gained access to telephone company lines and sold off cheap phone calls
Name of Criminals:  2 Jordanians and a Filipino
Court’s Decision:  If convicted, those arrested face up to six years in jail and a fine of up to 100,000 pesos ($3,000 Cdn.) each.

5. Theft and libel violation
Crime Committed:  Violating laws on qualified theft, libel and revelation of secrets, which is an offense under article 292 of the Revised Penal Code. The crime was committed sometime in February 2008.
 Name of Criminal: Roschelle Claro, former head of quality control department of Vibelle Manufacturing Corp. (VMC)
Court’s Decision: The case is now under preliminary investigation following the filing of the investigators from the NBI-AFCCD.

6. Video Piracy
Crime Committed: Video Piracy
Name of Criminals:  Jiang Ming Zhi, Jhuang Shang Ti, Zheng Huo Yan, Joshua Chen, Lee Hokbeng, Johan Ang, Uang Zhu Sy, Wen Jhong, William Tan, Kim Diang and Ong Wen San.
Court’s Decision: Guilty beyond reasonable doubt and meted them three months and one day terms and each to pay a fine of P500,000 with subsidiary imprisonment in case of insolvency

7. Film and Video Piracy
Crime Committed: Reproduction and sale of pirated materials
Name of Criminal: Raffy Bitancor
Court’s Decision: Was sentenced to suffer the straight penalty of one year imprisonment and a fine of P50,000 for each of the two offenses.

8. Credit Card Fraud
 Crime Committed:  Credit Card Fraud
 Name of Criminal:  Sophia Roco-Avance, a daughter of the late senator Raul Roco, and her former husband Enrique Avance, a grandson of the late President Manuel Quezon.
 Court’s Decision:  NBI reported that Sophia Roco-Avancehave already been charged in court

9. Hacking 
Crime Committed:  Hacking the PBX (private branch exchange) phone lines of different telecommunications companies, including AT&T.
Name of Criminals: Macnell Gracilla, Francisco Manalac, Regina Balura and Paul Michael Kwan
Court’s Decision: arrested
10. Hacking
Crime Committed: Illegally accessed the school's computer system with a password that was provided to her by Cesar MaƱalac, the former IT support chief of Thames.
Name of Criminals: Leilani Garcia, a former employee of the complainant, Thames International Business School
Court’s Decision:  Is now undergoing preliminary investigation.

Tuesday, 14 February 2012

Module 12: Intellectual Property Rights


What is there for to rejoice if you have the intellectual property on something? Would it be a great instrument to the economic growth of the country? Or you are just the sole beneficiary of the fruits you have reaped from what you have sowed? 

If I have the intellectual property on something of course I must rejoice because I am contributing something for the country and I’ll consider it a big achievement. And yes, it will be a great instrument to the economic growth of the country in such a way that the profit that I am going to earn will benefit not only me but as well as our economy through my tax. And in this way I can say that I am not just the sole beneficiary of what I have achieved because the public will be benefited by having the materials available. And another is that after the expiry of the copyright, the work will be returned to the public domain and anyone could use it as they pleased.

Module 11: Free Speech Issues

If banning is already imposed or will be imposed would this stop annoying comments against someone freely posted by an anonymous FB user? Is this ethical? Is this against the freedom of speech? 

      For me it is unethical in a way that it is against the freedom of speech. Yes it is true that banning online anonymity would help prevent cyber bullying and Internet harassment but it is not sure that it could really stop annoying comments against someone freely posted by an anonymous FB user. If ever banning is already imposed, could this be of great help to others? No, because it could might bring negative results and consequences to the people. For example, if it already implemented and a certain person posted her/his point of view regarding a certain controversial issue assuming that his/her real name was revealed, it could might bring her/his life in danger. Because there is a possibility that death threats might happen to her/his. So for me, banning anonymity is not that effective. Privacy is still important and people must bear in their minds that it is we, ourselves are responsible for every action we did. And let us just bear in our minds that we must do something that could not hurt others. In other words, we must have that respect at all times. 

Is it ethical to blog both awful and pleasant experiences with your ex-girlfriend/ ex-boyfriend?
 
            In my side, I can’t talk that much about the question that is it ethical to blog both awful and pleasant experiences with your ex-girlfriend / ex-boyfriend because I never had experience to have a boyfriend but I’ll just share my opinion. Well for me, even though doing such thing is a way of showing the freedom of speech but still it is not ethical. Because con­­sidering that both awful and pleasant are to be posted. It is not necessary to post on your blog of what you and your girl/boyfriend are doing so that others will know. Maybe it’s okay with the pleasant ones but what about the awful ones? So, it is better not to post it in your blog.

Tuesday, 31 January 2012

Module 10: Social Justice Issue

Is social justice evident in the impeachment trial of Chief Justice Corona? Discuss.
       
        Yes, social justice is evident in the impeachment trial of Chief Justice Corona. Social justice as defined is the promotion of the welfare of the people. There is social justice in terms of handling an impeachment.What I mean is that any official being accused of any unlawful activity must undergo a certain process which is the impeachment trial. So there is equal treatment and equal execution of the impeachment to all government official. But in the side of Chief Justice Corona, there is no social justice because his other activities are not good for it does not promote the welfare of the other people.  

Module 9: Private Issues

Talking about privacy, how far would you go for the sake of social justice? Justify.

        This question is quit complicated and really needs a brave heart and intelligent decision making. This is so because as of now it is really difficult and not easy to sacrifice your information about you just to promote social justice. But as long as for the sake of other people, I must do it and I have to. Speaking social justice, it is a good virtue that I should promote this in exchange of the exposure of my personal information to the public. Even though it is not easy to take the risk behind it, but I know I can do it. And all I can do is that I shall continue to do good things that will not ruin my image. So that I will not be afraid and will not be shy in revealing all the information related to me in exchange of social justice.     

Tuesday, 24 January 2012

Module 7: Computer Hoax Categories

There are still enormous sources of misinformation on the World Wide Web, so how can you determine what is good information and what is bad information? 
           No matter what the research topic is all about, there are a lot of websites that exist that give us all sorts of information and because of this we find difficulty in determining good information from bad information. So, the following tips and guidelines will be helpful in solving this problem on the World Wide Web:
1. Select sources of information that are likely reliable and of good quality. A good source comes from a good and known websites where information comes from academic journals and academic databases.
2. Select information from trusted authors. One must be sure that the author who wrote the information has actual, reputable credentials.
3. Select information that has credibility. The author or source of the information must show some evidence of being knowledgeable, reliable, and truthful. Like the author’s education, training, contact information, his reputation, and his title or position of employment.
4. Surf over the internet and explore to gather more information.
5. Be aware and be alert….

Module 5: Moral Problems

Today, it is a fact that a lot of Filipino women are into online GOLD digging. You know what it means, right? Suppose one of them is your sister who happens to be your family's breadwinner. What would you do on this matter?
            It is quite difficult to solve this kind of situation in my part because it is a problem on moral principle. The first thing that came out from my mind when I heard the word gold digging is that it has something to do with morality. Assuming that my sister is one of the gold diggers, it really catches my attention .And it is a big deal to me.
 Well as a sister, I have to do something regarding this issue. The first thing I will do is I will talk to her and I WILL give pieces of advices. I will have a heart to heart talk with her. I will discuss to her the good and bad sides of being an online gold digger. But I will explain to her my opinion in regards to that and I will focus more on its disadvantages because for me gold digging is not good. I will really stick to my principle that even how poor or moneyless we are I will never indulge myself on online gold digging for it will lower my morality. And it depends on her decision. And after discussing to her those things I will make a follow up on her activities regarding gold digging. I will continuously advise her until she stops it.
And of course the most powerful technique is PRAYER. I strongly believe that if one wanted to make a good habit, he must pray because prayer changes everything together with FAITH in God.

Module 8: Computer Abuses

What computer abuse would you like to eradicate? How would you do it?

The computer abuse I would like to eradicate is spamming. Spamming as defined in our lecture sometimes called unsolicited commercial email, is the internet version of junk mail. It is an attempt to deliver a message over the Internet to someone who would not otherwise choose to receive it. And in eradicating these spams I will use spam filter software.
Upon opening our emails we can see countless spam messages in our inbox. And we the receiver of spam loses countless hours manually deleting these intrusive messages from our inbox. And spam internet filter can solve this problem. Spam filter software is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox and can reduce the amount of junk mail being delivered.
Like other filtering programs, a spam filter looks for certain criteria. For example, using like that of Microsoft’s Hotmail the simplest version can be set to watch for particular words in the subject line of messages and to exclude these from the user’s inbox. And applying filtering is the best solution in minimizing spamming because the most valuable feature of spam filter software is reliably blocking and filtering spam. With a spam blocker in place, users can spend more time reading valid email instead of wasting time manually filtering unwanted email messages.