Thursday, March 1, 2012

Group Report Summary

Report Chapter 4

Members:

Cabusora, Allan

Gonzales, Mark Bryan

Inte, Melchor Jr.

Rabaja, Beverly

Monday, February 20, 2012

Blog Entry No.8

Ethical Dilemma Chapter 11

Approximately one year ago an editor of this book carried out an informal survey among his academic colleagues who were members of the BCS. He approached each and asked if they could state two points contained within the BCS Code of Conduct. Two of these people responded by indicating that they did not know that the BCS had a professional code of conduct. Two indicated that while they knew the code of conduct existed, they had never look at it. The remaining two - who indicated their awareness of the code of conduct and recalled having looked at it - stated that they could not recall its contents.

These were clearly dismal results, particularly as the questions were asked of people who have been members for some time.

In this book we have discussed the BCS Code of Conduct in some detail - to what extent do you believe this code of conduct is important and/or relevant? Why would YOU join the BCS? If you are a student of a university department studying Computer Science or IT, have you been offered a BCS membership application form? Are you aware of the opportunities of networking, and for joining special interest groups? These are certainly good reasons to join the BCS - but on the other hand, during your professional career, do you believe that the framework defined within the BCS Code of Conduct is likely to be relevant and/or useful?

Incoming IT professional and the IT professional must know the BCS code of conduct. It is a must to every IT students and professionals, for them to be able to understand their role in the society. Possessing the code of conduct, you can absolutely exercise personal judgment as an individual. Follow its standard form and abide the requirements placed on all of the society’s member and everyone working on behalf of the society. Joining the BCS, has a great impact, this enhances our capabilities and knowledge and leads to change in the standing of the IT profession by understanding the requirements needed to have a successful project.

Monday, February 13, 2012

Blog Entry No.7

Ethical Dilemma Chapter 9

A couple years ago Patricia returned to the UK to take up an academic position at a British University. She had been out in UK for over 20 years working for universities at number of countries, and had a good professional employment record. She decided to open a bank account with one of the large banks that had branch on the campus.

She met the bank manager, was given the necessary forms, duly completed them. A few days later she returned to the bank to open her account. Much to her surprise, she was told that she could only have cash account, i.e., she not be given any bank cards, cheque book, or the like, nor could she have any overdraft facility.

Patricia again met with the bank manager as she naturally felt there must have been some misunderstanding. Key points here are that she already had a bank account in the UK since her student days (although this had been largely unused during her years away), she owed no money on credit cards or the like, was UK citizen, and had a good track record with bank overseas. In addition, her salary from the university was to be paid into her account each month.

Despite her explaining these points, the bank manager was adamant that she could only have cash accounts. When asked to explain this decision, the bank manager indicated that it was not in fact her decision, but a decision made by an expert system. The bank always used this computer technology when making decisions about opening accounts for new clients, and in fact the bank manager could not overrule the restrictions that the expert systems imposed. In short, the expert system was empowered in the decision-making process to such an extent that it actually replaced the human decision-making process. The bank manager went on to explain that the problem was that the expert system had not previously encountered a person with Patricia’s particular background. And the key point to the computer was the extensive years of residency outside the UK.

To what extent do you think it is appropriate to replace the human decision-making process with the computer technologies such as expert systems?

If the decisions to be made involve emotional feelings or considerations from the user then computer technologies such as expert systems are not appropriate to replace human decision-making process because unlike human expert systems cannot give or respond to any considerations to a user's request. Computer technologies such as the expert system give probabilistic results that came from expert persons. It gathers facts with the experts and result to a decision for a certain process. Once the expert system comes up with the result or decision, it then should be considered as final and be implemented. For a human decision making, a favorable decision can be given to the requester. So, computer technologies like expert system are not intended for transactions that will involve any emotional feelings or considerations from the user depending on the situation. Unlike human, expert system cannot give or respond to any considerations to your request.

During the conversation Patricia asked the bank manager whether she felt that it was appropriate for the expert system to be empowered in this way. The response she obtained was that it was a great idea because computers do not make mistakes. What do you think about this comment? Do computers make mistakes? Is any computerized system free from mistakes? Should we be educating people to believe that computers are infallible are computers infallible? What do you think are the ramifications of believing in infallible computerized systems?

Computer doesn't make any mistake and it was true, but in the consideration of the system's programmer that the said system is free from all bugs that might harm the entire functionality. In Patricia's case, it is an opportunity to inform the entire client, users and all the citizen of the web that computer reliability has its own limitations.

Monday, February 6, 2012

Blog Entry No.6

Ethical Dilemma Chapter 7

Computer Technologies: Accessibility Issues

*How do you perceive the ramifications of computer-based technologies, and the current pace of change impacting on older people?

For the new generation of humanity, the mainstream of this society has quickly adopted computer - based technology as part of everyday life. Computer based Technology are always at outside for instant access from simple things up to complicated bits and bytes of communication. Computer based Technology have changed the simple life of our grandpa and grandma's, most of the time computer technology helps older people to perform different task. However, some older people need some assistance regarding with this matter. There are still barriers that keep them from learning this new innovation. Most common barriers are the unfamiliarity and fear that leading them into lacking of skills, missing background knowledge for accessing devices may lead them into the inaccessible spot.

* To what extent are they becoming increasingly isolated?

Older people may be isolated in a way that they can't easily understand the complicated operation of computer based technology. Lacking confidence is one of the many factor why older people isolate there selves to become proficient and as a result they become incompetent with particular innovations.

*Is direct personal contact being gradually eroded?

As technology experience progress, various form of high - tech devices (phones, laptop, and iPhones) have definitively influenced the communication process in such a vital way. However this progress, the communication stream adopt the both positive and negative feedback.

Perhaps discuss these issues with an older person that you know, such as family members. Identify key issues.

My mother doesn't know how to use computer. She can't even search on Google by himself. Me and my sister always at her side, giving her a hand in whatever she ask regarding with the searching problem on Google.

Have these people gained as a consequence of the proliferation of and reliance we place upon computer-based technologies and the pace of change that has ensued?

Maybe yes, it depends on their own perspective to adopt technology.

Monday, January 16, 2012

Blog Entry No.5

Ethical Dilemma Chapter 6

Consider the scenario in which a group of your fellow students approach you to see whether you are interested in participating in a project that is intended to be a commercial venture. The group has come up with a novel approach to obtaining large numbers of e-mail addresses. This requires the development of some software, and once this is used it will be possible to develop a very extensive e-mail address list. Subsequently, this information is to be sold to companies involved in spam advertising. You voice some initial reservations based upon your concern that this may not be entirely legal/ethical. However, you are normally based overseas – specifically in third world countries. Since the team is to be based in the UK and the software is going to be used to locate e-mail addresses that are normally based outside the UK, you are assured that you will be breaking no UK law.

How would you proceed? Do you consider that this is a legal/ethical undertaking? In the case that you are not entirely happy with the possible ethical aspects of this venture(but are satisfied that you will not be breaking UK law), would you still be willing to participate if the level of remuneration is sufficient? At what point would personal remuneration override any ethical reservations that you may have?

Let us suppose that you do become involved in this undertaking but that you subsequently find that the software that you helped to develop is not being used to locate e-mail addresses that are normally based outside the UK, but in addition e-mail address within the UK, and these are being sold on to companies who specialize in spam advertising? Does this compromise your legal position?

Commercial venture is a great opportunity to enhance skills in terms of software development although the term commercial venture is business enterprise involving some risk in expectation of gain. It is good to be involved in opportunities such as handling large email list together with expert developers, experience like this is a rewarding gain for programmers because it can boost skills in software development. However, considering that spam advertising is a threat to the privacy and security of web users, as a programmer and developer i would not rather to be involved in such business venture, unethical activity may cause trouble to my professionalism and conscience. Through spam advertising, it would harm legitimate account due to the effect of flooding. Doing unethical activity for self interest is a big "NO", this must be the stand for professional who against unethical doings. Since spam is a global threat to the web citizens, participating in said business venture some law will be violated and every personnel behind it will suffer the consequences.

Blog Entry No.4

Ethical Dilemma Chapter 4

Question 1: Consider a case of Alice who was writing a textbook, She wishes to include in her book material from various sources – particularly a few key diagrams that have previously been. In the case of old books, should publishers require significant fees to be paid to them if material from one of their books is reproduced elsewhere? To what extent should this be underpinned by consideration of fair use? Is it reasonable for publishers to require significant amounts of money to be paid in relation to the production of materials from an old book – particularly when they know that this will not be passed on to the author, or their estate? To what extent is it appropriate to simply make modifications of diagram, and therefore avoid the payments of permission fees? By way of simple example, consider Figure 4.3. Let us suppose that this is ‘edited’ by Alice and reproduced in her book in the form illustrated in Figure 4.4. To what extent (if any) is Alice guilty of plagiarism? One point to note by not paying permission fees, it follows that the author will not acknowledge the original source of the diagram – thus, the original creative person does not receive any credit.

To what extent do such considerations apply to software? For example, is it permissible to take another person’s code, make limited modifications to it, and represent it as one’s own work?

Group's Response:

In the case of old books, should publishers require significant fees to be paid to them if material from one of their books is reproduced elsewhere?

On the case of Alice, it was indicated that the old book that she tried to use as a reference from her and copy a diagram from it, the copyright for the book hasn't expired. In that case, therefore, publishers may require significant fees if a certain material from their book is published elsewhere.

"One of the rights accorded to the owner of copyright is the right to reproduce or to authorize others to reproduce the work in copies or phonorecords."

On the quoted statement above, the publisher can reproduce or authorize others to reproduce the work.

To what extent should this be underpinned by consideration of fair use?

Ethical Dilemma Chapter 5

Question 2: Let us suppose that you are employed by a company that develops websites for clients. One day your boss presents you with a new project. In brief, your company has obtained a contract from a law enforcement agency to develop several websites. These are to act in line with the ‘honeypot’ scenario mentioned in the previous chapter. The project being undertaken by the law enforcement agency is to gather information in relation to individuals who may be ‘interested’ in extreme forms of violence. By developing this website you will be assisting the law enforcement agencies who will gather material in relation to people who peruse the site.

What is your ethical position?

Our ethical position in this scenario is to follow your boss since you are working with him, because as a programmer or an employee you need to do what your boss wants or need to do your job with the company you are employed and to satisfy what your client’s wants. In addition for this situation, we think that this is not an unethical act if you do the websites since your client is from a law enforcement agency, and this agency wants to make a tools to prevent more computer crimes and to track cyber criminals, so in this case, as a programmer you are not just doing an ethical act in terms of doing your job where you are employed but you also do an ethical act to the law enforcement agency and able to help them to track those who are doing computer crimes with the use of that websites.

Do you think this is an appropriate agenda in terms of invisibly policing the internet?

Yes, because through this website, it could prevent more computer crimes and violence such as gathering and unauthorized access of personal information from the internet.

Since your boss has presented you with this brief, in the case that you do not agree with the ramifications of policing the internet in this way, do you have any political alternative but to undertake the work? (Here we assume that your boss is insistent that the work should be carried out by you.) What – if any – real objections do you have?

Since the project website is dealing on gathering individuals information’s who extremely performed violations over the internet in particular with the computer crimes, it maybe become a problem in the future for the developer and the company if anyone would complaint against this form of policing over the internet by gathering information of individuals without knowledge of that individual. In this case this act could be blamed not only to the law enforcement agency but also to the company and the developer. For this situation it is good also to make sure that by doing this project there would be a protection for the company and the developers for any consequences in the future if ever this project will be used. But in terms of the privacy of the users in using the internet this project could be unethical, the project should limit their access to the user’s personal information and should also protect any information they gathered from the users in that case it could prevent violating individuals privacy, however, as we said ,the company always make sure that their clients always satisfies with the output of the project, and always the clients have the right for any modification on the project.

Do you feel this is encroaching upon the liberty of the individual?

Yes, since every individual has their liberty on what they want to do, however if this websites can prevent cyber criminals to make more crimes in the future such as unauthorized use of your personal information and etc., then it is good to support this project so that you are surely secured from any of the computer crimes over the internet.

Are your views influenced by the nature of the content of the website? For example, would your views be any different if the website related directly to terrorism or other forms of political extremism?

Probably yes, as an ethical act, since the content of the project is for the good of every one of us who use the internet which computer crimes are increasing. However as professional programmers, your goal in job is to make your client satisfied to your work, they have the rights on the project they want.

To what extent do you think that the internet is currently being policed – not only in terms of monitoring those who enter particular websites or who enter contentious chat room areas or the like?

Our views about this , is that the internet is not really policed however there are some laws created against the computer crimes in the internet, such as the UK Misuse Act 1990 and US Computer Fraud and Abuse act, which deals with a punishment regarding to the misuse and abuse using computer and internet. In addition internet is wide and in that case it is hard to policed and control all who make computer crimes over the internet.

References:

http://www.copyright.gov/title17/

http://copyright.lib.utexas.edu/copypol2.html

Friday, December 2, 2011

Blog Entry No.3

Computer Hacking

Activity 2.1 Researching Hacking Cases

Research one of the following hacking cases by either by typing one of the keywords into a search engine, or consulting of the recommended textbooks:

Kevin Mitnick

Raphael Gray

Master of Deception

Mafiaboy

Legion of Doom

Robert Mooris' Internet Worm

From your research, answer the following questions:

What was this case about?

The case is all about the Computer hacking, a computer system was hacked by an 18 years old Raphael Gray, he hacked an e-commerce sites and expose 26,000 credit card numbers.

Raphael Gray - (internet "hacker" exposes Microsoft security weaknesses) Raphael was arrested at his home on the 23 March 2000, he was 18 years old hacker from rural Wales. The case was alleged that he had intruded into nine e-commerce websites in Britain, America, Canada, Thailand and Japan and taken details of some 26,000 credit card numbers and disclosed some of the credit card information on the Internet. When he was interviewed that he had been concerned for some time at the inherent security weakness in one particular make of software called Microsoft Internet Information Server.

What were the protagonist and parties involved?

No protagonists were mentioned. Parties involved were the law enforcement officers, e-commerce sites, and other organizations concerned as well as the owners of credit card information.

Did any prosecution results? If so, what were their outcomes?

It was said that the result of the prosecution was accepting that Raphael’s motivation was he wants to expose and to publish the fact that the e-commerce retailers has a low security measures and it is vulnerable to hacking, and to inform the individuals and users of the e-commerce sites that they should not trust their credit card information to any of the e-commerce retailers sites.

In this case Raphael initially faced a ten count indictment; each count is under section 2 of the Computer Misuse Act 1990 which has intent to use the computer to perform a function to secure unauthorized access.

The case of Raphael Gray result in six initial counts alleging an offence under the Computer Misuse Act 1990 section 2(1), alleging the defendant had committed an offence under section 3(1) of the Computer Misuse Act by doing an act which caused an unauthorized modification of the contents of a computer. The remaining four counts alleged obtaining services by deception on two separate occasions, by using a credit card number he had downloaded to set up two separate websites upon which to display the credit card information. And the related offences under the Computer Misuse Act section 2(1). This result in the third section of Misuse act of 1990 which is unauthorized access.

But on March 28, 2001 the prosecution reduces the first six counts to section 1 charges of simple unauthorized access if the defendant pleaded guilty to the remaining four counts. And after that Raphael was given a two year community rehabilitation order for his case.

What ethical issues are raised by this case?

The ethical issue of this case was Raphael intention was to make the users of the e-commerce site to be aware that there credit card or personal information that they entered in those sites is vulnerable of hacking, and can be used with anyone who has a bad intention. But through this, Raphael Gray also violated the UK Computer Misuse acts, when he exposed this credit card numbers and information in the public. At first place Raphael's intention was good but to the owner of the e-commerce sites and the owner of those credit card basically would say that his act is unethical because he make an unauthorized access to this information.

Activity 2.3 The Computer Fraud And Abuse Act

Find out about the US Computer Fraud and Abuse Act(CFAA).

How does this Act compare with the UK Computer Misuse Act?

The following URL is recommended as a starting point for your research, though you may also want to consult some of the recommended texts and other articles:

www.eff.org/Legislation/CFAA

Activity 2.5 Arguments against Hacking

Write a summary of the main arguments against hacking - from a legal, professional and ethical perspective.

Hacking is argued to be an illegal act since an unauthorized access of a computer material can be considered as an criminal offense (also mentioned in the computer misuse act of 1990). In spite of the fact that it was considered illegal, hackers at some point do this offense in order to disclose information considered by others as "confidential", but the public deserves to know.

On an ethical perspective, hacking is also argued to be an unethical act of trespassing, since it involves an electronic entry to a computer system which is also viewed as a physical entry to an office or home. In this case, if computers are viewed as material possessions.

Hacking is considered as an unprofessional act, since the act of hacking into other's computer systems sometimes leads disruption of businesses and organizations. Though hacking can also be an issue on the professional perspective, since it was allowed on any code of conduct or any professional body, hackers often offered to work as security consultants in information security firms.

References:

http://www.mjreedsolicitors.co.uk/uncategorized/raphael-gray-curador/

http://jadefactura.wordpress.com/2010/12/09/research-hacking-cases-raphael-gray/