Question 1
In the studies of Social Contract Theory ethical principle, the terms positive and negative rights are used. Compare and contrast these rights.The Social Contract Theories are systems of rights-based social framework, from which you make decisions about how a country or organization will be run. Thomas Hobbes, in 1651, developed his social contract that stipulated that each person gives up some natural, or negative, rights in order to have more important natural rights protected by the government. These protected natural rights would become the standard by which the government would be judged effective by the people. They would also serve as the guiding moral agent for the government's decisions.
Comparison:
POSITIVE RIGHT
|
NEGATIVE RIGHT
|
A right obligating others to do something on
your behalf
|
A right that another can guarantee
by leaving you alone
|
Positive rights tend to be more limited
|
Negative
rights tends to be more absolute
|
Question 2
Explanation:
Identity theft
happens when someone accesses essential elements of a person’s identifying
information in order to commit theft. This information includes name, address, Social
Security number, date of birth and mother’s maiden name. Many identity thieves
use this personal information in order to open credit card accounts, obtain
loans and even mortgages in the victim’s name.
Example:
Fraudulent Use of User Personal Information
Once thieves steal
your personal information, they assume your identity to commit fraud, such as:
- Call your card issuer; ask to change the mailing address on your card account and request that a new card be sent to the new address. The imposter then runs up charges on your account.
- Open a new credit card account, using your name, date of birth and Social Security number. Establish phone or wireless service in your name.
- Open a bank account in your name to write bad checks.
- File for bankruptcy under your name to avoid paying debts they’ve incurred under your name or to avoid eviction.
- Buy cars by taking out auto loans in your name.
- Give your name to the police during an arrest.
How to know if
a User is a victim of Identify Theft?
An identity thief
can strike even if you’ve been very careful with your personal information.
Some indications of identity theft may include:
- Failing to receive bills or other mail signaling an address change by the identity thief
- Receiving cards or billing statements for accounts for which you did not apply
- Receiving calls from debt collectors of companies about merchandise or services you didn’t buy.
- If you think you may be a victim, you can obtain a copy of your credit report from each of the three major credit bureaus.
- If it’s accurate and includes only those activities you’ve authorized, chances are you’re not a victim of identity theft.
Question 3
1. Renting
Renting software can
be happen via online and offline. Online rental of software is emerging as a
new way of dissemination for several major software firms. Compared to outright
selling, the renting scheme delivers the software as a service instead of a
physical good. Renting software involves someone renting out a copy of software
for temporary use, without the permission of the copyright holder like you
would a movie, was made illegal in the Malaysia and you renting it without
permission to get profit. While libraries and educational institutions can
purchase special licenses to rent some types of software, renting software in
general is illegal and a form of software piracy.
2. Softlifting
It occurs when a purchased make by a
person using a single licensed copy of software program. The pirated copy of
software are then loads into several machine. Examples of softlifiting include
sharing a software with friends and co-workers. The sharing method such as
installing software on home or computers if they are not allowed to do it using
licensed. Softlifting in corporate environment will mostly exposed to software
piracy where the use of unauthorized or reproduction of copyrighted. An illegal
purchased sometimes people take it as small harm but this action become very
common where contribute a great amount of damage in software piracy.
3. Uploading an downloading
This piracy allowed end user easily get the free copyrighted of software. It also enable the users get the modem connection to get online service providers. they no need to take a long way to purchase the software without having a license and waste their money.
4. Software counterfeiting
Selling illegal software duplicate that looks nearly the same as legitimate software.
5. Hard disk loading
An illegal copy of the software installed on personal computers by most end users. They obtained a copy of the software with ease and price cheaper than a certain appliance dealer.
3. Uploading an downloading
This piracy allowed end user easily get the free copyrighted of software. It also enable the users get the modem connection to get online service providers. they no need to take a long way to purchase the software without having a license and waste their money.
4. Software counterfeiting
Selling illegal software duplicate that looks nearly the same as legitimate software.
5. Hard disk loading
An illegal copy of the software installed on personal computers by most end users. They obtained a copy of the software with ease and price cheaper than a certain appliance dealer.
Question 4
Global digital divide
The global
digital divide is the global disparities between developed and developing
countries in regards to access to the modern information technology such as
Internet, information, as well as the opportunities derived from this.
Moreover, global divide also can be access higher where IT infrastructure good
and where literacy is higher such as America and Europe’s. Furthermore, global
divide also can be affected by the languages that use for the countries because
global divide can be access higher in English-speaking countries. Lastly,
global divide can be accessed higher where it is culturally value in the
countries.
Social divide
The social divide is the gap between a
rich and poor information within a society. This is because, social divide can
be in specific region of nations that seem being forefront of digital
technological advance. The social divide is focus on the individuals in a
specific society. Example group of people who will affected to the social
divide is people with different level of education, age groups, racial group
and others. Issues raised get worse with time as there are many to see the social
inequalities are shortly lived . A better access on internet information would
mean the ration of output cost can be more efficient, products quality and
services more greater thus the overall will contribute to closing the digital
gaps in specific society.