Sunday, 30 December 2012

Additional Task: Answering Question

Question 1

In the studies of Social Contract Theory ethical principle, the terms positive and negative rights are used. Compare and contrast these rights.

The Social Contract Theories are systems of rights-based social framework, from which you make decisions about how a country or organization will be run. Thomas Hobbes, in 1651, developed his social contract that stipulated that each person gives up some natural, or negative, rights in order to have more important natural rights protected by the government. These protected natural rights would become the standard by which the government would be judged effective by the people. They would also serve as the guiding moral agent for the government's decisions.


Comparison:



POSITIVE RIGHT
NEGATIVE RIGHT
A right obligating others to do something on your behalf
A right that another can guarantee by leaving you alone
Positive rights tend to be more limited
    Negative rights tends to be      more absolute



Question 2

Explanation:

Identity theft happens when someone accesses essential elements of a person’s identifying information in order to commit theft. This information includes name, address, Social Security number, date of birth and mother’s maiden name. Many identity thieves use this personal information in order to open credit card accounts, obtain loans and even mortgages in the victim’s name.

Example:

Fraudulent  Use of User Personal Information
Once thieves steal your personal information, they assume your identity to commit fraud, such as:
  •  Call your card issuer; ask to change the mailing address on your card account and request that a new card be sent to the new address. The imposter then runs up charges on your account.
  •  Open a new credit card account, using your name, date of birth and Social Security number.  Establish phone or wireless service in your name.
  • Open a bank account in your name to write bad checks.
  • File for bankruptcy under your name to avoid paying debts they’ve incurred under your name or to avoid eviction.
  • Buy cars by taking out auto loans in your name.
  • Give your name to the police during an arrest.



How to know if a User is a victim of Identify Theft?

An identity thief can strike even if you’ve been very careful with your personal information. Some indications of identity theft may include:

  • Failing to receive bills or other mail signaling an address change by the identity thief
  • Receiving cards or billing statements for accounts for which you did not apply
  • Receiving calls from debt collectors of companies about merchandise or services you didn’t buy.
  • If you think you may be a victim, you can obtain a copy of your credit report from each of the three major credit bureaus.
  • If it’s accurate and includes only those activities you’ve authorized, chances are you’re not a victim of identity theft.


Question 3

1. Renting
Renting software can be happen via online and offline. Online rental of software is emerging as a new way of dissemination for several major software firms. Compared to outright selling, the renting scheme delivers the software as a service instead of a physical good. Renting software involves someone renting out a copy of software for temporary use, without the permission of the copyright holder like you would a movie, was made illegal in the Malaysia and you renting it without permission to get profit. While libraries and educational institutions can purchase special licenses to rent some types of software, renting software in general is illegal and a form of software piracy.

2. Softlifting
It occurs when a purchased make by a person using a single licensed copy of software program. The pirated copy of software are then loads into several machine. Examples of softlifiting include sharing a software with friends and co-workers. The sharing method such as installing software on home or computers if they are not allowed to do it using licensed. Softlifting in corporate environment will mostly exposed to software piracy where the use of unauthorized or reproduction of copyrighted. An illegal purchased sometimes people take it as small harm but this action become very common where contribute a great amount of damage in software piracy.   

3. Uploading an downloading


This piracy allowed end user easily get the free copyrighted of software. It also enable the users get the modem connection to get online service providers. they no need to take a long way to purchase the software without having a license and waste their money. 

4. Software counterfeiting

Selling illegal software duplicate that looks nearly the same as legitimate software.


5. Hard disk loading

An illegal copy of the software installed on personal computers by most end users. They obtained a copy of the software with ease and price cheaper than a certain appliance dealer.

Question 4

Global digital divide

The global digital divide is the global disparities between developed and developing countries in regards to access to the modern information technology such as Internet, information, as well as the opportunities derived from this. Moreover, global divide also can be access higher where IT infrastructure good and where literacy is higher such as America and Europe’s. Furthermore, global divide also can be affected by the languages that use for the countries because global divide can be access higher in English-speaking countries. Lastly, global divide can be accessed higher where it is culturally value in the countries.



Social divide

The social divide is the gap between a rich and poor information within a society. This is because, social divide can be in specific region of nations that seem being forefront of digital technological advance. The social divide is focus on the individuals in a specific society. Example group of people who will affected to the social divide is people with different level of education, age groups, racial group and others. Issues raised get worse with time  as there are many to see the social inequalities are shortly lived . A better access on internet information would mean the ration of output cost can be more efficient, products quality and services more greater thus the overall will contribute to closing the digital gaps in specific society. 



Sunday, 9 December 2012

TASK 2: ACM Code


Video 1 


Respect The Privacy of Others

Video 2



Be Honest and Trustworthy