hercy

Monday, May 18, 2009

Intellectual property rights?

Intellectual property are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

Thursday, May 14, 2009

What is intellectual property?

These are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.

Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept. [2]

Wednesday, April 29, 2009

What is Cyberteroris

A programmer who breaks into computer systems in order to steal or change or destroy information.
Cyberterrorism is defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” This definition was created by Kevin G. Coleman of the Technolytics Institute.
rious threatormation as a form of cyber-terrorism.

Sunday, April 26, 2009

What is Cybercriminal?
Internet crime is crime committed on the Internet, using the Internet and by means of the Internet.
Computer crime is a general term that embraces such crimes as phishing, credit card frauds, bank robbery, illegal downloading, industrial espionage, child pornography, kidnapping children contacted via chat rooms, harassment, cyber-bullying, scams, cyberterrorism, creation and/or distribution of viruses, spam, identity theft and so on. All such crimes are computer related and facilitated crimes.
According to security firm
Symantec, Internet criminal activities have become a serious commercial activity with selling email addresses, details of bank accounts and credit cards through underworld auction sites on the rise. Some even use trusted websites such as MySpace and Facebook to do this.
Statistics The statistics that have been obtained and reported about demonstrate the seriousness of Internet crimes in the world. Just the "phishing" emails mentioned in a previous paragraph produce one billion dollars for their perpetrators (Dalton 1). In an FBI survey in early 2004, 90 percent of the 500 companies surveyed reported a security breach and 80 percent of those suffered a financial loss (Fisher 22). A national statistic in 2003 stated that four billion dollars in credit card fraud are lost each year. Only two percent of credit card transactions take place over the Internet but fifty percent of the four billion, mentioneipedia, the free encyclopedia © 2001-2006 Wikipedia contributors (Disclaimer)This article is licensed under the GNU Free Documentation License.Last updated on Friday August 29, 2008 at 08:51:14 PDT (GMT -0700)View this article at Wikipedia.org - Edit this article at Wikipedia.org - Donate to the Wikimedia Foundation
d before, are from the transaction online (Burden and Palmer 5). All these finding are just an illustration of the misuse of the Internet and a reason why Internet crime has to be slowed down.
What is Perpetrator?

The parlance of criminal justice, a suspect is a known person suspected of committing a crime.
Police and reporters often incorrectly use the word the suspect when referring to the actor, or perpetrator of the offense (perp for short). The perpetrator is the robber, assailant,
counterfeiter, etc. -the person who actually committed the crime. The distinction between suspect and perpetrator recognizes that the suspect is not known to have committed the offense, while the perpetrator [who may not be a suspect yet] is the one who actually did. The suspect may be a different person from the perpetrator, or there may have been no actual crime, which would mean there is no perpetrator.
A common error in police reports is a witness description of the suspect (as a witness generally describes the perpetrator, while a
mug shot is of the suspect). Frequently it is stated that police are looking for the suspect, when there is no suspect; the police may be looking for a suspect, but they are surely looking for the perpetrator, and very often it is impossible to tell from such a police report whether there is a suspect or not.
Possibly because of the misuse of suspect to mean perpetrator, police have begun to use
person of interest to mean suspect.
Under the judicial systems of the
U.S., once a decision is approved to arrest the suspect or bind him over for trial, either by a prosecutor issuing an information, a grand jury issuing a true bill or indictment, or a judge issuing an arrest warrant, the suspect can then be properly called a defendant, or the accused. Only after being convicted is the suspect properly called the perpetrator.
Word Court
Wikipedia, the free encyclopedia © 2001-2006 Wikipedia contributors (Disclaimer)This article is licensed under the GNU Free Documentation License.Last updated on Wednesday September 10, 2008 at 19:14:37 PDT (GMT -0700)View this article at Wikipedia.org - Edit this article at Wikipedia.org - Donate to the Wikimedia Foundation.

Sunday, April 19, 2009

Are Information Technology(IT)workers Professional?

Yes, they are professionals because they finish their degree to become profesional person in our society. They are those person who are responsible on program writing or designing system and etc where computer is involved. And they are also deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information. Because in our modern world today, computers are the one who works in the some companies and everywhere. And also the school now are in the high-tech level and they will train their studenst well. They are also helping our country to become industrialized and progress.They are professional if they really know their profession, and also if they have the characteristics and qualities of being that. Because in that personality, it shown the integrity and dignity of person to become successful in his choosen career. If example the informational technology workers shown some ellicit actions they are not called professional because they have no ethics in their lives. They should love their work and undergo ethics training,cause it diminish their personality of being professional IT) workers someday.Information Technology is important in this generaztion because many people or programmer that makes latest information by the technlogy today. We have a very high technology discover gadgets like laptop,the newest fashion model of computer unit etc.IT professional a variety of duties that range the installing application to create a computer network and information database.

Tuesday, April 14, 2009

The Ten Commandments for Computer Ethics

1.Thou shalt not use the computer to harm other people.
2.Thou shalt not interface with other people's computer work.

3.Thou shalt not snoop around in other people's files.
4.
Thou shalt not use a computer to steal.
5.
Thou shalt not use a computer to bear false witness.
6.Thou shalt not use or copy software for which you have not paid.
7.
Thou shalt not use other people's computer resources without authorization.
8
.Thou shalt not appropriate other people's intellectual output.
9.
Thou shalt think about the social consequences of the program you write.
10.
Thou shalt use a computer in ways that show consideration and respect.