Sunday, 30 December 2012

Additional Task: Answering Question

Question 1

In the studies of Social Contract Theory ethical principle, the terms positive and negative rights are used. Compare and contrast these rights.

The Social Contract Theories are systems of rights-based social framework, from which you make decisions about how a country or organization will be run. Thomas Hobbes, in 1651, developed his social contract that stipulated that each person gives up some natural, or negative, rights in order to have more important natural rights protected by the government. These protected natural rights would become the standard by which the government would be judged effective by the people. They would also serve as the guiding moral agent for the government's decisions.


Comparison:



POSITIVE RIGHT
NEGATIVE RIGHT
A right obligating others to do something on your behalf
A right that another can guarantee by leaving you alone
Positive rights tend to be more limited
    Negative rights tends to be      more absolute



Question 2

Explanation:

Identity theft happens when someone accesses essential elements of a person’s identifying information in order to commit theft. This information includes name, address, Social Security number, date of birth and mother’s maiden name. Many identity thieves use this personal information in order to open credit card accounts, obtain loans and even mortgages in the victim’s name.

Example:

Fraudulent  Use of User Personal Information
Once thieves steal your personal information, they assume your identity to commit fraud, such as:
  •  Call your card issuer; ask to change the mailing address on your card account and request that a new card be sent to the new address. The imposter then runs up charges on your account.
  •  Open a new credit card account, using your name, date of birth and Social Security number.  Establish phone or wireless service in your name.
  • Open a bank account in your name to write bad checks.
  • File for bankruptcy under your name to avoid paying debts they’ve incurred under your name or to avoid eviction.
  • Buy cars by taking out auto loans in your name.
  • Give your name to the police during an arrest.



How to know if a User is a victim of Identify Theft?

An identity thief can strike even if you’ve been very careful with your personal information. Some indications of identity theft may include:

  • Failing to receive bills or other mail signaling an address change by the identity thief
  • Receiving cards or billing statements for accounts for which you did not apply
  • Receiving calls from debt collectors of companies about merchandise or services you didn’t buy.
  • If you think you may be a victim, you can obtain a copy of your credit report from each of the three major credit bureaus.
  • If it’s accurate and includes only those activities you’ve authorized, chances are you’re not a victim of identity theft.


Question 3

1. Renting
Renting software can be happen via online and offline. Online rental of software is emerging as a new way of dissemination for several major software firms. Compared to outright selling, the renting scheme delivers the software as a service instead of a physical good. Renting software involves someone renting out a copy of software for temporary use, without the permission of the copyright holder like you would a movie, was made illegal in the Malaysia and you renting it without permission to get profit. While libraries and educational institutions can purchase special licenses to rent some types of software, renting software in general is illegal and a form of software piracy.

2. Softlifting
It occurs when a purchased make by a person using a single licensed copy of software program. The pirated copy of software are then loads into several machine. Examples of softlifiting include sharing a software with friends and co-workers. The sharing method such as installing software on home or computers if they are not allowed to do it using licensed. Softlifting in corporate environment will mostly exposed to software piracy where the use of unauthorized or reproduction of copyrighted. An illegal purchased sometimes people take it as small harm but this action become very common where contribute a great amount of damage in software piracy.   

3. Uploading an downloading


This piracy allowed end user easily get the free copyrighted of software. It also enable the users get the modem connection to get online service providers. they no need to take a long way to purchase the software without having a license and waste their money. 

4. Software counterfeiting

Selling illegal software duplicate that looks nearly the same as legitimate software.


5. Hard disk loading

An illegal copy of the software installed on personal computers by most end users. They obtained a copy of the software with ease and price cheaper than a certain appliance dealer.

Question 4

Global digital divide

The global digital divide is the global disparities between developed and developing countries in regards to access to the modern information technology such as Internet, information, as well as the opportunities derived from this. Moreover, global divide also can be access higher where IT infrastructure good and where literacy is higher such as America and Europe’s. Furthermore, global divide also can be affected by the languages that use for the countries because global divide can be access higher in English-speaking countries. Lastly, global divide can be accessed higher where it is culturally value in the countries.



Social divide

The social divide is the gap between a rich and poor information within a society. This is because, social divide can be in specific region of nations that seem being forefront of digital technological advance. The social divide is focus on the individuals in a specific society. Example group of people who will affected to the social divide is people with different level of education, age groups, racial group and others. Issues raised get worse with time  as there are many to see the social inequalities are shortly lived . A better access on internet information would mean the ration of output cost can be more efficient, products quality and services more greater thus the overall will contribute to closing the digital gaps in specific society. 



Sunday, 9 December 2012

TASK 2: ACM Code


Video 1 


Respect The Privacy of Others

Video 2



Be Honest and Trustworthy

Monday, 26 November 2012

TASK 1: CCTV


VIDEO PRESENTATION FROM GROUP 9




Abstract

In recent years a combination of perceptions and fears of increased street crime and advances in technology has seen an upsurge in the use of closed circuit television (CCTV) as a tool in tackling crime in public places.  Many private companies and a number of local government authorities have initiated trials in the use of CCTV, and the technology is also being used in a number of ways in the public transport system. Closed-circuit television (CCTV) is the video cameras use to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast televisions is that the signal is not openly transmitted, though it may be employ point to point (P2P), point to multipoint, or mesh wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, hotels, airports, military installations, convenience stores and many more places. Video telephony  is seldom called "CCTV" but the use of video in distance education , where it is an important tool, is often so called. [1]


Introduction

A closed-circuit television system (CCTV) is used to transmit signals of a video surveillance camera to monitoring devices placed in a separate area. School districts use CCTV to monitor the activity on school campuses. Businesses use CCTV cameras to monitor the behaviour of employees. CCTV can also help retail establishments by providing protection against loss from theft [2]. CCTV camera system is being widely employed as a security system for surveillance in offices as well as homes. Not only in closed or private places, CCTV camera system extends as a security system in public and crowded places like traffic intersections, malls, shops, and so on.  The monitoring devices view the captured images simultaneously, altogether or sequentially depending on the programming. The images can be observed in colour or in black and white while zoom lenses allow images to be observed in broad-view or close-up [3]. However, the use of CCTV surveillance is not without controversy. Each establishment must weigh the benefits and drawbacks to decide if CCTV is the right method of protection.

Advantages of CCTV

Protect Employees
Those who run a business can use CCTV to monitor the activities of their employees to ensure that they are performing their duties perfectly. In the same time, CCTV also can be used by employers to monitor their inventory like office supplies and store merchandise to make sure the employees are not stealing from the company. In the same time, CCTV also can be used by employers to monitor their inventory like office supplies and store merchandise to make sure the employees are not stealing from the company [4].
From other perception, customer service employees are often required to handle not satisfied or frustrated customers. Face-to-face interactions with an angry customer can put the customer service employee in physical danger. Therefore, CCTV cameras may save employees from harm by monitoring these volatile situations. They also serve as a deterrent from violent behaviour by these customers and at the same time increasing their confidence to work safely [5].

Reduced Insurance Premiums and Taxes
Video surveillance, Security cameras and allied systems can reduce insurance premiums over a long period depending on contracts drawn up with insurance companies and insurance agents. Public records of these systems can also protect insurance companies from false and fraudulent claims about thefts and robberies. Businesses can claim relevant tax deductions on the purchase of security camera and surveillance systems [6].

Crime Prevention
Today, the public used to being watched by surveillance technology in many commercial and semi-public establishments such as banks, convenience stores, and shopping malls. With increased the CCTV, more public order crime may come to the notice of police. Example of mechanism whereby CCTV has the potential to reduce crime is the cameras may be able to assist in the detection and arrest of offenders. This crime prevention mechanism requires that police can respond in a timely manner to any significant incidents identified by camera operators, and that the local criminal justice system can pursue the offenders’ conviction. This mechanism will work if incarcerated offenders are prevented from committing further crimes within the CCTV area (or other local area). The availability of local resources is therefore a factor in the success of this mechanism.
Moreover, CCTV can contribute in a detection role to prevent from crime. There are numerous examples of CCTV tapes aiding in an offender’s conviction. CCTV camera can also become evidence because it can help identify potential witnesses who might not otherwise come forward to police and it can record the crime incident and police respond rapidly and make an arrest within view of the camera (and the offender does not leave the sight of the camera). The potential to assist in police investigations may also drive offenders away from committing offences that take time, as they run a greater risk of capture. [7] Next, Video Surveillance can reduce fear of crime and feel safer, provided they actually know that they are being watched. It also can provide people with an increased sense of security and peace of mind, particularly in areas where the crime-rate is high.
“CCTV is a powerful crime-fighting tool … Police operational experience and various researches show that it deters and detects crime and helps secure convictions. It also reduces fear of crime. We remain committed to the use of CCTV in helping to make communities feel safer.”
— Lord Bach, Justice Minister, House of Lords Debate, June 2009 [8]
Lastly, According to The Scottish Office Central Research Unit (1999), around 3000 people were interviewed in the city centre and the two control areas nine months before and three and fifteen months after installation of the cameras were asked about how effective they thought street cameras were:
·         72% thought CCTV would prevent crime and disorder
·         81% thought it would be effective in catching perpetrators
·         79% thought it would make people feel they would be less likely to become victims of a crime. [9]

Place Management and Monitoring

CCTV can be used for general location management such as manage employee in company, used to look for children, to monitor traffic flow, public meetings and so on. It helps in continuous monitoring every day.
In an organization, CCTV can protect employees. In lots of jobs the employees are vulnerable to either physical or verbal attacks from the public. For example, when a customer has a complaint about your service, there are some doubts and you are not sure who’s in the wrong. Often, in stressful situations, customers will effect company reputation. If the employee knows they are being watched by CCTV camera, he or she will try to minimize these cases and stay calmly deal. Hence, the installation of CCTV cameras may help the employees escape this situation because the customers know very well that their conversations are recorded. Next, it is able to protect the employees against false allegations that might be common in some areas of business. In short, these cameras can help to provide some form of protection to the workers against the customers. [10]

Moreover, Installing a video surveillance system can help you keep eyes on the business while you are not on site and also can help prevent employee theft, fraud, injury, vandalism, trespassing and more at the workplace. Employee theft is a large problem for firms of all sizes, particularly small businesses where profit margins are often very meagre.  It might provide helpful insights to the manager or owner as to how efficient the employees are with their work. It also provides protection against false allegations at work. The findings are based on research by Adrian Beck of the University of Leicester in Leicester, United Kingdom, employees commit fraud when a combination of the following three factors is present
1) A situational pressure (usually a financial need)
2) A perceived opportunity to commit and conceal a crime and
3) A way to rationalize the dishonest act [11]

Furthermore, CCTV greatly enhances the ability of a traffic control centre to deliver the above, bringing benefits to all road users by ensuring consistent journey times, improving the reliability of public transport and making the best use of the resources available. The traffic control cameras are used for traffic monitoring only and help us to assess the efficiency of the system and to make any necessary changes quickly. Also, during unusual circumstances such as a traffic accident, a significant breakdown on a busy road, or an event, the system operators can take control of signals and operate them manually from the control centre. This would be very difficult without the help of the cameras.

Disadvantages of CCTV

Diminish Privacy

Issued on culture of surveillance was issued because it have potential to diminish privacy. Two precedents are involved based on surveillances on criminal procedure to apply. Firstly on the seizure of an object in a plain view doctrine which does not involve the privacy’s intrusion. Secondly, the provision from oft-cited invoked when “actual expectation privacy is exhibited by a person” and the society is one from the expectation are ready to recognize it as reasonable. The issues on diminish privacy. The questions comes on the placement of CCTV cameras, with plain view provided intrudes the area of privacy. Analysis on privacy change, if the monitoring does by a person rather than security personnel or distribution across the internet which have wider access would be available. For example, report in 2007 from United Kingdom shows there are many CCTV who fail to achieve a privacy safeguard where it required namely posting sign age and protections as it against leaking feed to third parties. Even if the society CCTV monitors not looking as government’s agents, the privacy concerns are still questioning. [12]


Status of Person Monitoring

The risk on intended consequences of crime prevention should be look in two consideration. Firstly  a negative behaviours may generated form the society CCTV and it leads to create a problem of perverse incentives. For example, the monitors may involve with voyeuristic behaviours  stalking have potential to record it and make sells on the recording  Secondly, the usage of CCTV monitors are utilize to do a criminals based on their observation while monitoring and have a targeted victims. Anyone who is responsible to do a monitoring has potential to do criminals based on advantages they have and the person also able to close their criminals in the power of monitoring.  [13]

Lost Sense of Trust towards Others
Usage of CCTV caused the sense of trust to others where the application itself have own integrity. As a person has lost faith in other people to it will automatically affect the motion work. Minor offence committed by a person as a capital offence committed by another person. To rebuild the trust of others is not convenient. For it would take quite a long time. Though others came to believe again, but there is still a sense of doubt is every thing done. May also be blacklisted and lead someone difficult to get a good place in society, their impact limited to a lot of things done.[14]

Conclusion
Ethics is the theory outlined to guide mankind. But we must understand that not all of the outlined theory can be applied in some situations. Sometimes a person is breaking ethics because he was very important to get the benefit of himself. The usage of CCTV itself have own pros and cons towards society. Moreover, not necessarily with the ethical will reap a good profit to the individual. Society look at the concept of universal laws come from the assumption that all rational beings will try to make good decisions and so rational in using CCTV are the ones that can be used in every culture and in every part of the world. Some examples of legal or ethical Kantian universal maxim are: do not lie, do not steal, do not kill, do not break promises, etc. There is no single book that lists all the maxims that exist but we should take very seriously maxims we know and do not break them.[15]


References:   
Date of extraction: 16-Nov 12

 [2] [4]  Jenny E. 2012. The Advantages of CCTV.
Date of extraction: 16-Nov 12

[3] [5]  Jesse Lanclos. 2012. Advantages & Disadvantages of CCTV cameras.
Date of extraction: 16-Nov 12

[6] Pallab Dutta. 2012. Advantages What Are the Benefits of Surveillance Cameras?
Date of extraction: 16-Nov 12

[7] Ratcliffe, J. (2006). Center for Problem-Oriented Policing; Video Surveillance of Public Places. 2012.
Date of extraction: 14 November

[8] Public Policy Exchange. Reducing Crime and the Fear of Crime: The Future of CCTV in Community Safety. Internet: http://publicpolicyexchange.co.uk/events/AF10-PPE.php.
Date of extraction: 14 November 2012


[9] The Scottish Office Central Research Unit (1999). Crime And Criminal Justice Research Findings No 30. Internet: http://www.scotcrim.u-net.com/researchc2.htm.
Date of extraction: 14 November 2012

[10] Word System Inc. Benefits and Drawbacks of CCTV Cameras.
Date of extraction: 14 November 2012

[11]Moorthy, K. (2009).Preventing Employee Theft and Fraud. http://www.eurojournals.com/ejss_12_2_09.pdf
Date of extraction: 14 November 2012.

[12] [13] Citizen Monitors, CCTV, and the Internet: A Combination to Consider
Date of extraction: 14 November 2012
[14] Lost of trust
Date of extraction: 17 November 2012

[15] Ethical issues
Date of extraction: 17 November 2012

IMPORTANCE OF ETHICS AMONG THE IT PROFESSIONALS



TITLE: IMPORTANCE OF ETHICS AMONG THE IT PROFESSIONALS




Abstract

The rapid of development in information technology has created big changes in life especially. In work environment also be effected. Therefore, the company has an ethics to avoid from ethical issues in information technology. Ethics is the common rules or approach for all professionals need to obey in order to achieve a great environment in an organization. Most of people think that ethics and morals is something that share the same meaning but actually they are not. Ethics is not same with morals because morals are towards the personal character, while ethics stress a social system in which those morals are applied. In other words, ethics point to standards or codes of behaviour expected by the group to which the individual belongs. Some examples of ethics are national ethics, social ethics, company ethics, professional ethics, or even family ethics.
The basis of this project was created based on data collection from many sources such as webs, articles, and books. So, this paper describes on the importance of ethics among the IT professionals and it will be explaining the beneficial of applying ethics to IT professionals in an organization.
Keywords: Importance of ethics, Ethics, Morals, IT professionals



Introduction

Referring to The Business Ethics Blog by Chris MacDonald (2010) at his blog “Ethics” can be defined as the critical, structured examination of how we should behave — in particular, how we should constrain the pursuit of self-interest when our actions affect others.

Ethics is one of moral philosophy branch which including things in systemizing, defending and recommending concepts on right or wrong. The words ethics is come from Greek word, ‘ethikos’ where it gives almost same meaning to ethics which is ‘morality’. The word ‘morality’ comes from Latin word and it gives meaning to behaviour. Ethic – moral actions would bring a definition as a set of action by the characters and expressed through behaviours.

Ethics is viewed as a set of standards or code who worked out from human resources and experiences. Ethics also part of human actions that will determine either it is right or wrong actions. Code of principle that most of us use generally refers to ethics. For specific view of IT professionals, ethics is the study of good and bad, just and unjust action of IT professionals.


Improved relationship and decreased Vulnerability.

According to Jackman (2012), ethics are important because it refers to the prescribed standard of conduct that the members of a certain organization and business should apply in their work relationships. Ethics are derived from human values such as respect, responsibility, integrity and the personal behavioural standards a person holds. Upholding ethics in the workplace allows employees to maintain respectable boundaries by respecting the personal space and work space of others. So, it can improve relationship between IT workers with others. First is relationship between IT workers and employee having a critical relationship that requires ongoing effort by both parties to keep it strong. The issues between IT workers and employee include protection of company secrets, vacation policy and use of company resources, including computers and network. Therefore, IT workers must set an example and enforce policies regarding the ethical use of IT to avoid from criminal and unethical act such as unauthorized copying of software by the members.

Secondly, relationship IT works with client/suppliers need ethics in documented in contractual terms. The IT worker and client must trust each other to be successfully. Thus, adherence to a code of ethics enhances trust and respect between them. A code explicitly outlines the rights and responsibilities of staff members and helps guard against capricious and preferential treatment of employees. Moreover, as companies to empower their workforce, it is imperative for them to develop ethics practices that provide the necessary training and tools to assure that their employees throughout the world can make ethical decisions.

In addition, according to RICS, 2000, “the need for professional ethics is based upon the vulnerability of others. The client (and where relevant, opposing negotiators) must be protected from exploitation in a situation in which they are unable to protect themselves because they lack the relevant knowledge to do so. For example, Negotiator ‘A’ would be at an unfair disadvantage if negotiator ‘B’ claimed to have figures supporting his argument that were, in fact, fabricated but which ‘A’ was not able to verify.” This decreases a company's vulnerability to misconduct and the harm it can cause to profitability, brand image and management focus.



Confidential and privacy

Moreover, importance of Ethics among the IT professionals are for confidentially and privacy. The growth of internet will increased the risk that information technology will be use unethically. According to RICS, 2000, Employee also needs to keep the appropriate information top-secret. Every employee is prohibiting disclosure of information to anyone inside or outside our firm without the legal or professional right to know.Here are some problems about the ethical issues such as many employees might have their email and internet accesses monitored while work, as employers their need to manage important company assets and work time with employees’ desire for privacy and self-direction. Another example are violent of copyright laws because millions of people get information through internet and organization usually use email to contact with millions of people worldwide because it is a low-cost marketing approach.

Therefore, a code of ethics helps prevent IT professionals from behaving in a malicious or harmful manner with company information and equipment. IT professionals must adhere to strict confidentiality rules regarding privacy and proprietary matters. Protect confidential communications, such as papers or grants submitted for publication, personnel records, trade or military secrets, and patient records. Lastly, Confidentiality and Access Protection are similar and very important. As an IT professional with professional ethics, customer’s confidential information must be protected because that is customer’s privacy.



Originality of Information Technology

There's no denying the internet can disseminate that information more quickly and instantaneously. Therefore ethics in the world of information technology is very important in keeping the originality and value of such information. In the world of modern technologies, many of the bad that can occur and result in a lot of corporate companies fell due to individual or group of envy.  Things that are often done by the rogue are money extortion and intimidation spread sex video. This blogger writer has expressed some code of ethics in the use of information technology include:
·         Do not use a computer to threaten others.
·         Not disturb other people's computers.
·         Not invade other computer files.
·         Do not use a computer to steal and cheat
·         Not use or copy software not purchased legally.
·         No use of computer resources without authorization.
·         Do not take another's intellectual outcome for yourself.
·         Thinking about the social impact of the program or system.

Therefore based on that fact, then ethics were necessary to curb human behaviour unpredictable actions.



Authorization in Computing

There are many challenges have to face in ethical issues of information technology.  The information in a nature of minds being expands and increases to achieve certain goal. One of the ethical issues in information technology is about authorization. Authorization is a process giving permission that belongs to a person or system. For a multi user computer system, the administrators will defines who are allowed to access the system.

When it comes to authorization issues in computing, it will be related to concepts of accessibility. Normally, access will be interpreted as restriction to a certain people only to access a material. In access, things that mostly worried are, about access on academic and research in electronic journals. There are 2 academic’s communities who concern on this issue; there are the Scholarly Publishing and Academic Resources Coalition (SPARC) and The Open Archives Initiative.


Intellectual Property Right

Property right in information technology view is known as intellectual property where it is about a unique product of human intellect that has commercial value. Intellectual property right is creation of human’s mind. This property right may include things such as books, songs, drawings, computer program, and inventions.  In ethics side of it, property right is one of the main ethical issues. There are 3 sources of ethical issues which concerns about the pervasive role and capacity of systems for collecting, storing and retrieving information, the information technology complexity and the intangible nature of information and digital goods. The licensed software is one of the intellectual property is clearly protected by several legal mechanism. The common types of protections are copyrights, patents, trademark and trade secret. According to Zwass (2003), argues that major individual rights in democratic societies are the right to life and safety, the right of free consent, right to private property, right of free speech and fair treatment.

Conclusion

In conclusion, ethics very instrumental in ensuring that safeguard human behaviour. Every country there is a law and ethics according to the culture of society own the place. So do not wonder when we are working in a foreign country, there are some things that we consider to violate ethics but not for them. Ethics is also logical to be true but we are the one to determine whether the actions are good or bad. Even though an ethical standards are already exist to have an ethical IT professionals, but there are still disregarded on the ethical standards. Self-awareness should be in each IT professionals to support help in solving the ethical issues. 

References

  1. Originality of Information Technology. [online] Available at http://ipkent.edu.my/ppgbmm1/bidppg/?p=53 [Accessed 30 October 2012].
  2. Authorization in computing. [online] Available at http://kb.iu.edu/data/alql.html [Accessed 31 October 2012].
  3. Concepts of accessibility. [online] Available at http://informationr.net/ir/10-3/paper230.html [Accessed 31 October 2012].
  4. Human intellectual property right. [online] Available at http://informationr.net/ir/10-3/paper230.html [Accessed 31 October 2012].
  5. Jackman, 2012.M10 Ethics: Creating Personal and Professional Boundaries. [online] Available at https://m360.servicecoordinator.org/event/session.aspx?id=59254 [Accessed 30 October 2012].
  6. BSR Education Fund, 1991.The Importance of Being Ethical. [online] Available at:  http://www.inc.com/articles/2000/11/14278.html [Accessed 30 October 2012].
  7. W.Reynolds, 2009.Ethics in Information Technology. [online] Available at:  http://books.google.com.my/books?id=xZhwj4VjHfkC&pg=PA33&source=gbs_toc_r&redir_esc=y#v=onepage&q&f=false> [Accessed 30 October 2012].
  8. RICS, 2000. Professional Ethics Guidance Note: Part 1introduction. [online] Available at: http://www.joinricsineurope.eu/uploads/files/Ethics%20part%201.pdf  [Accessed 30 October 2012].


Sunday, 14 October 2012

Our team members



Name : Muhammad Hafiz Bin Tajuddin
Id   : SW086811
State: Perak Darul Ridzuan
YOS  : 2012/2013






Name : Norazwan Bin Nordin
Id   : SW086491
State: Penang
YOS  : 2012/2013




Name : Ifahlina Bt Suhaimy
Id   : GM085703
State: Malacca
YOS  : 2012/2013






Name : Nur Halilah Bt Ismail
Id   : GM085754
State: Selangor
YOS  : 2012/2013




Name : Syazwani bt Mohd Sabri
Id   : IS085777
State: Kuala Lumpur
YOS  : 2012/2013