Wednesday, May 13, 2009

Intellectual Property

1. What is intellectual property?
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Intellectual property is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs.
http://www.wipo.int/about-ip/en/

2. What is intellectual property rights?

Sunday, April 26, 2009

1. What is perpetrator?
ans. Someone who carried out some action, often a bad thing like a crime. A perpetrator is the person who commits the crime; it would be the opposite of a victim.
http://wiki.answers.com/Q/Definition_of_%27perpetrator%27
2. What is cyber-criminal?
ans. When we say cyber-criminal it's generally refers to criminal where a computer or networks is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more. Additionally, although the term cyber criminal are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. As the use of computers has grown, computer crime has become more important.
http://en.wikipedia.org/wiki/Cybercrime


3. What is cyber-terrorist?

ans. As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. When we say cyber-terrorist it is refers to the programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism. And when we say cyber-terrorism it is the leveraging of a target's computers and information , particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.

Wednesday, April 15, 2009

Are Information Technology workers professional ?yes or no?

Yes, because they are also people who work for a job that is not bad and cannot harm other people. I think that every worker is a professional as long as they not doing their jobs in bad purpose. In our generation today there are many IT workers it's because there many technology has been created. Since, they are one of the people who studied about technologies. IT workers are capable to work in a job for technology for they now have a knowledge about it. They analyze how they deal with the threat of technical obsolescence. It was found that most IT workers find it stressful to constantly update their technical skills and they used different ways to cope with. IT products and services and the workers who provide them are found throughout the economy. The largest group is employed in computer services firms, but large fractions also work in manufacturing, financial industries, government, and retail and wholesale trade. That is why the demand for every IT workers are getting higger.

Tuesday, April 14, 2009

THE TEN COMMANDMENTS FOR COMPUTER ETHICS

Courtesy of the Computer Ethics Institute

THE TEN COMMANDMENTS FOR COMPUTER ETHICS

1.

Thou shalt not use a computer to harm other people.

2.

Thou shalt not interfere with other people's computer work.

3.

Thou shalt not snoop around in other people's files.

4.

Thou shalt not use a computer to steal.

5.

Thou shalt not use a computer to bear false witness.

6.

Thou shalt not use or copy software for which you have not paid.

7.

Thou shalt not use other people's computer resources without authorization.

8.

Thou shalt not appropriate other people's intellectual output.

9.

Thou shalt think about the social consequences of the program you write.

10.

Thou shalt use a computer in ways that show consideration and respect.

Published (and reformatted) with the permission of Dr. Ramon Barquin,
President of the Computer Ethics Institute.

You may link to this page, but you may not copy the HTML to use on another website. See No. 8. :-)
Here is a printable version of the 10 Commandments.
Coming next: Commandments in "slide show mode" for use with educators and students grades 5 & up.


TekMom's Ten Commandments Page last updated on October 9, 1999.
Graphics are by TekMom.