Computer Ethics

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

44 Terms

1
New cards

Ethics

s is derived from the Greek term "ethos", which means character or custom

2
New cards

"mores"

. Its equivalent term in Roman is the word ____, from which words like morality, morals and moral are derived.

3
New cards

Computer Ethics

refers to the guiding precepts and norms that are adopted and applied to regulate and control the use of computers and its applications.

4
New cards

Computer Ethics Institute

came up with The Ten Commandments of Computer Ethics, in 1992.

5
New cards

E-Commerce Law

In the Philippines we have the _____ that defines penalties for computer crimes, hacking, and computer fraud, among others.

6
New cards

Denial of service attack

characterized by an explicit attempt by attackers to prevent or bar legitimate users of computers from availing themselves of computer services

7
New cards

Consumption of scarce, limited or non-renewable resources

This is a type of denial of service attack that targets network connectivity

8
New cards

Destruction or alteration of configuration information

This is a type of denial of service attack that an improperly configured computer may not properly perform well or may not operate at all

9
New cards

Physical destruction or alteration of network components

This is a type of denial of service attack that the primary concern in this type of attack is physical security. -You should guard against unauthorized access to computers, routers, network and other critical components of your network

10
New cards

Hacking

involves unauthorized access to a computer, its files, and programs.

11
New cards

Flaming

sending of abusive emails or messages to other people or newsgroups.

12
New cards

Spamming

sometimes called unsolicited commercial email, is the Internet version of junk mail. It is an attempt to deliver a message over the Internet to someone who would not otherwise choose to receive it.

13
New cards

virus

is a program that reproduces its own code by attaching itself to other executable files in such a way that the code is executed when the infected executable file is executed.

14
New cards

worm

is a self-replicating program designed to spread across a network without requiring any outside actions to take place.

15
New cards

Internet hoaxes

Messages about free money, children in trouble and other items designed to grab your attention and get you to forward the message to everyone you know (chain letters). While these do not automatically infect systems like a virus or Trojan, they are time consuming and costly to remove from all the systems where they exist.

16
New cards

Privacy Issues

In computing, emails and letters, your database, and your personal information are considered private.

17
New cards

Social Justice Issues

s concerned with the promotion of the welfare of the people. In computing, this would pertain to equity of access. Some issues emanating from equity of access involves gender, physical disabilities, language.

18
New cards

Free Speech Issues

The right to freedom of expression is one of the constitutional rights guaranteed by the supreme law of the land. Hence, it is constantly advocated by those who do no want to be subjected to restrictions in their expressions or articulation of their thoughts.

19
New cards

intellectual property

Most countries, including the Philippines, enforce laws that penalize copying or imitation of inventions, identifying symbols, and creative expressions. These laws encompass four separate and distinct types of intangible property namely patents, trademarks, copyrights, and trade secrets, which collectively are referred to as

20
New cards

Patent

used to prevent an invention from being created, sold, or used by another party without permission

21
New cards

Trademark

-a distinctive sign which allows consumers to easily identify the particular goods or services that a company provides. Some examples include McDonald's golden arch, the Facebook logo and so on.

22
New cards

Copyright

-covers "tangible" forms of creations and original work-for example, art, music, architectural drawings, or even software codes.

23
New cards

Trade Secret

-are the secrets of a business. They are proprietary systems, formulas, strategies, or other information that is confidential and is not meant for unauthorized commercial use by others.

24
New cards

Software Piracy

- the act of using software without paying the appropriate license. This is the same as stealing from the software developer. Software pirates not only steal from the companies that make the software; their acts also redound to less money for research and development on new software.

25
New cards

Plagiarism

occurs anytime that a person copies any written work and claims it as its own. With the advent of the Internet, cut-and-paste plagiarism becomes common.

26
New cards

The Intellectual Property Code of the Philippines (Republic Act No. 8293)

declares that computer programs as non-patentable inventions but copyrightable.

27
New cards

The E-Commerce Law of the Philippines (Republic Act No. 8792)

recognizes electronic signatures found in electronic documents as equivalent to signature on a written document.

28
New cards

Electronic Signature

refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.

29
New cards

The E-Commerce Law of the Philippines (Republic Act No. 8792)

Crimes under this law include hacking or cracking, piracy, violation in the Consumer act and other related laws, violation of confidentiality, lawful access, among others.

30
New cards

Cybercrime Prevention Act of 2012(Republic Act No. 10175)

defines internet and computer offenses and it aims to put users of the internet and computers in check by defining violations related to their use.

31
New cards

a) offenses against the confidentiality, integrity and availability of computer data and systems,
b) computer-related offenses, and
c) content-related offenses.

The Cybercrime Prevention Act divides offenses into three categories:

32
New cards

Illegal access

The access to the whole or any part of a computer system without right

33
New cards

Illegal interception

The interception made by technical means without right of any nonpublic transmission of computer data to, from, or within a computer system including electromagnetic emissions from a computer system carrying such computer data

34
New cards

Data Interference

The intentional or reckless alteration, damaging, deletion, or deterioration of computer data, electronic document, or electronic data message, without right, including the introduction or transmission of viruses

35
New cards

System Interference

The intentional alteration or reckless hindering or interference with the functioning of a computer or computer network by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or program, electronic document, or electronic data messages, without right or authority, including the introduction or transmission of viruses

36
New cards

Misuse of devices

The use, production, sale, procurement, importation, distribution, or otherwise making available, without right, of:
a) a device, including a computer program, designed or adapted primarily for the purpose of committing any of the offenses under this Act; or
b) A computer password, access code, or similar data by which the whole or any part of a computer system is capable of being accessed with intent that it be used for the purpose of committing any of the offenses under this Act.

The possession of an item referred to in paragraphs 5(i)(a) or (b) above with the intent to use said devices for the purpose of committing any of the offenses under this section.

37
New cards

The acquisition of domain name over the Internet in bad faith to profit, mislead, destroy reputation, and deprive others from the registering the same, if such a domain name is:
i. Similar, identical, or confusingly similar to an existing trademark registered with the appropriate government agency at the time of the domain name registration;
ii. Identical or in any way similar with the name of a person other than the registrant, in case of a personal name, and
iii. Acquired without right or with intellectual property interests in it.

38
New cards

Computer-related Forgery

i. The input, alteration, or deletion of computer data without right resulting in inauthentic data with the intent that it be considered or acted upon for legal purposes as if it were authentic, regardless whether or not the data is directly readable and intelligible;
or ii. The act of knowingly using computer data, which is the product of computer-related forgery as, defined here, for the purpose of perpetuating a fraudulent or dishonest design.

39
New cards

Computer-related Fraud

The unauthorized input, alteration, or deletion of computer data or program or interference in the functioning of a computer system, causing damage thereby with fraudulent intent; provided that if no damage has yet been caused, the penalty imposed shall be one (1) degree lower.

40
New cards

Computer-related Identity Theft

The intentional acquisition, use, misuse, transfer, possession, alteration or deletion of identifying information belonging to another, whether natural or juridical, without right. Provided, that if no damage has yet been caused, the penalty impose

41
New cards

Cybersex

The willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a computer system, for favor or consideration.

42
New cards

Child Pornography

The unlawful or prohibited acts defined and punishable by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer system.

43
New cards

.Unsolicited Commercial Communications

The transmission of commercial communication with the use of computer system which seek to advertise sell, or offer for sale products and services are prohibited unless:

44
New cards

Libel

The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal Code, as amended committed through a computer system or any other similar means which may be devised in the future.