Sunday, April 26, 2009
ans. Someone who carried out some action, often a bad thing like a crime. A perpetrator is the person who commits the crime; it would be the opposite of a victim.
http://wiki.answers.com/Q/Definition_of_%27perpetrator%27
2. What is cyber-criminal?
ans. When we say cyber-criminal it's generally refers to criminal where a computer or networks is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more. Additionally, although the term cyber criminal are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. As the use of computers has grown, computer crime has become more important.
http://en.wikipedia.org/wiki/Cybercrime
3. What is cyber-terrorist?
ans. As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. When we say cyber-terrorist it is refers to the programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism. And when we say cyber-terrorism it is the leveraging of a target's computers and information , particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
Wednesday, April 15, 2009
Are Information Technology workers professional ?yes or no?
Tuesday, April 14, 2009
Courtesy of the Computer Ethics Institute
THE TEN COMMANDMENTS FOR COMPUTER ETHICS |
1. | Thou shalt not use a computer to harm other people. |
2. | Thou shalt not interfere with other people's computer work. |
3. | Thou shalt not snoop around in other people's files. |
4. | Thou shalt not use a computer to steal. |
5. | Thou shalt not use a computer to bear false witness. |
6. | Thou shalt not use or copy software for which you have not paid. |
7. | Thou shalt not use other people's computer resources without authorization. |
8. | Thou shalt not appropriate other people's intellectual output. |
9. | Thou shalt think about the social consequences of the program you write. |
10. | Thou shalt use a computer in ways that show consideration and respect. |
President of the Computer Ethics Institute.
You may link to this page, but you may not copy the HTML to use on another website. See No. 8. :-)
Here is a printable version of the 10 Commandments.
Coming next: Commandments in "slide show mode" for use with educators and students grades 5 & up.
TekMom's Ten Commandments Page last updated on October 9, 1999.
Graphics are by TekMom.