Thursday, December 15, 2011

Module 6

1.If you are to choose your top 3 difficult-to-follow computer ethics commandments, what are these? Explain why.

My top 3 difficult-to-follow computer ethics commandments are:
·         Thou shalt not use or copy software for which you have not paid.

·         Thou shalt not use other people’s computer resources without authorization.

·         Thou shalt not snoop around other people’s files.

These, for me, are difficult to follow. First, copying software that I have not paid seems to be a common thing here in the Philippines since we can’t afford to buy licensed softwares and thus we resort to what we called “piracy”. And since I am still a student, I can’t absolutely provide myself or buy myself softwares that are licensed. Second, it’s really difficult not to immediately use someone’s computer resources without the proper authorization especially when you urgently need it. But I usually do it on my classmates’ laptops when I happen to not bring my own laptop and I really needed to do something either on the net or on Microsoft word or anything, I usually immediately use their laptops without asking first. But it is only when the owner’s not around and his/her laptop is already available (opened). It’s not good actually but I know my limitations. If my purpose is for only research, I go directly to it and neglect other unwanted activities with his/her resources. Third, snooping around other people’s file may seem to be an evil thing to do, but when you say browsing or looking for movies to copy around someone’s computer is snooping, and then I guess it’s hard for me not to snoop around. I only dare snoop around my classmate’s files when I have the permission to use his/her computer/laptop. And I only dare to browse the file where movies are located. So far, it’s the only thing that interests me to make me snoop around other people’s files. 

2.Suppose you are to add 2 more commandments to the existing 10 commandments of computer ethics, what are these? Are these 2 new commandments of equal importance to the existing ones? Discuss.

·         Thou shalt not use the computer for fraud.
·         Thou shall use a computer for self-development.

A fraud is an intentional deception made for personal gain or to damage another individual. It is similar with commandment number 1, “Thou shalt not use a computer to harm other people.” But the word “intentional” is somewhat the reason for me to put this commandment up. Some harm done using a computer is not that intentional. Some are accidental. It is a bit different now when you say intentional. Second is one should use the computer for developing oneself and for the greater good. For example, an online game causes students to be addicted with it and resulting to failure in academics. We should only use these resources to gain more knowledge about the things happening around and not be a know-nothing individual. There are many things one can learn inside a computer when used only for good reasons. For example, if you want to know more about your worst subject, do some self research and study for you to not flank that subject and repeat. These 2 commandments I have put together is of equal importance to those that already exists since it can bring good to anyone who wishes to use the computer.

3.  What is ransomware? Which of the 10 computer ethics commandments is/are violated by ransomware?

Ransomware is a type of malware used for data kidnapping. It takes your data hostage by encrypting it using supposedly unbreakable encryption algorithms and then demands payment in exchange for the decryption key. The computer ethics commandments that might be violated by ransomware are the following:

·         Thou shalt not use a computer to harm other people.

·         Thou shalt not interfere with other people’s computer work.

·         Thou shalt not use a computer to steal.

It harms the person that owns the files. They use these important files to bribe the owner. They can earn money out of these. Thus, a form of stealing. And whoever encrypted the files can turn out to interfere with other people’s computer works.



No comments:

Post a Comment