Monday, December 24, 2012

Additional Task



 

1.In the studies of Social Contract Theory ethical principle, the terms positive and negative rights are used. Compare and contrast these rights.

Positive rights
Negative rights
-          A right obligating others to do something on your behalf
-          Limited right: A right that may be restricted based on the circumstances
-          Positive rights tend to be more limited

Examples:
-          Rights to free education
-          Right to health care
-          Government exists to administer the      rules

-          A right that a person  can guarantee by leaving you alone
-          Absolute right: A right guaranteed without exception
-          Negative rights tends to be more absolute

Examples
     -          Freedom to observe religion practices
     -      States that a person starving to death has a right to life though the right to life does not entail some other person providing aid to a person in dire need.

• Pros
– Framed in language of rights
– Explains why people act in self-interest without common agreement
– Provides clear analysis of certain citizen/government problems
– Workable ethical theory

• Cons
– No one signed contract
– Some actions have multiple characterizations
– Conflicting rights problem
– May unjustly treat people who cannot uphold contract

2.Explain Identity Theft and provide example to support your answer.

  Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.

Example of identity theft cases are as follows:

Defendant Sentenced for Identity Theft Tax Refund Fraud

On November 19, 2012, in Miami, Fla., Louis Gachelin, of Miami, was sentenced to 28 months in prison and two years of supervised release. Gachelin pleaded guilty on July 13, 2012, to one count of theft of government money and one count of aggravated identity theft. According to court documents and statements made in court, in March and April 2012, Gachelin cashed and attempted to cash 29 fraudulently obtained income tax refund checks totaling approximately $100,000.

Indiana Woman Sentenced for Filing False Claims for Refunds

On October 31, 2012, in Indianapolis, Ind., Lowkeysha Lipscomb was sentenced to 41 months in prison, three years of supervised release and ordered to pay $42,067 in restitution. According to court documents, Lipscomb filed false claims for refunds using the Social Security Numbers of other individuals both living and deceased. Lipscomb and another co-defendant would prepare fraudulent Forms W-2 and used this information to file false tax returns. The tax refunds were deposited in bank accounts and loadable debit card accounts controlled by the defendants. 

3. Describe 5 types of software piracy


 i.End-user piracy. 

It is illegal to copy or possess software without licensing for each copy.Individual users and companies alike must acquire enough licenses to cover their software installations.Volume Licensing applies only to Windows desktop upgrades, not to the full Windows operating system.

ii.Manufacturer piracy.

It is illegal for a computer manufacturer to copy software and preinstall it without permission on more than one computer.To learn how to locate proper license documentation, visit the Certificate of Authenticity site.

iii.Internet piracy.

It is illegal to offer unauthorized copies of software for download over the Internet.If software is available on the Internet, make sure the software publisher has authorized this distribution.

iv.Counterfeiting.

It is illegal to manufacture unauthorized copies of software and distribute those copies in packaging that reproduces or resembles that of the manufacturer.Counterfeit registration cards with unauthorized serial numbers are often included in these packages.

v.Online distributor piracy.

Software counterfeiters will sometimes promote "special deals" they've made with the software publisher, advertise "liquidated inventories," or try to generate interest in software they acquired through "bankruptcy sales."
Watch out for phrases like these. They can lead customers to think they're getting genuine software at a discounted price.

 

4.Explain the two types of digital divide


        The term 'digital divide' is where some people have the access and the capability to modern information technology such as telephone, televison or Internet while others do not. It shows the gap between those two groups. The two types of divisions are global divide and social divide.
            For global divide, the focus is set on global disparities between developed and developing countries in terms of accessing the modern information technology. In global divide, the access of this modern information technology is higher in wealthy countries such as United States where they have enough money to provide or to buy those modern IT things. The access is also higher in where the IT infrastructure is good as this make it easier for them to be able to use and access. Besides that, the access is higher where the literacy is higher and in English-speaking countries because many of this technology operated in English, whether the manual instructions, the communication through it and the command used. The access is also higher where it is culturally valued.
            As for the social divide, the access is higher for young people and well-educated people as these two groups eager to learn new thing and able to adapt to this modern information technology easily. The well-educated people exposed to this technology in their daily life especially in working environment.

Monday, December 10, 2012

PART 2 - ACM SEKTCH PART 2


The  Association for Computing Machinery (ACM) stated that a member should adhere to the following code of conducts :
3 .Be honest and trustworthy.
7. Respect the privacy of others.
    
SUMMARY OF THE SKETCH
          A girl was surfing internet and using Facebook in the lab.Then she trust her classmate who sat beside her and went to toilet by let him to take care of her things which is a purse and a pendrive. The girl's another classmate came and sit at her place while using her facebook account to make a fun of her by posting funny funny comments in her facebook wall. After he did that , he went to his place and sit. While the another friend that she asked to take care of this things take advantages of the situation and steal her pendrive and purse from her. After she back , when she noticed her things have been dissapeared and asked to the guy she asked to take care of her things he pointed the guy that sat at her place just now and said he was the one that took her things. When she asked the guy , the guy first told that he just sat and used facebook nothing else but when she did not believe him , he pointed to another friend that sat beside him . At last she feel sad and was sitting with the guy that stole the things from her. When he walked pass by her, his wallet dropped and he did not noticed but she saw that. She gave the wallet back to him . The guy felt guilty and gave her pendrive and money back to her. This sketch shows the importance of being honest and respect the privacy of others.

Thursday, October 25, 2012

Academic Writing : Society’s Ethical Stance on The Use of CCTV in Public Places



                                Society’s Ethical Stance on The Use of CCTV in Public Places



Introduction

         CCTV stands for Closed-Circuit Television is also known as surveillance camera. Most of the cameras are installed in public places and some of them are hidden. Public places are where the general public is allowed access without any legal barriers. The most obvious example of this would be outdoors, on public-access streets and highways, but this would also apply to such places as shopping mall, schools, office and others. Essentially, this is the state deciding to place CCTV cameras on their own property.



Purposes of Installing CCTV

          Some of purposes of CCTV are to monitor for traffic, to monitor crimes, as to prevent crime from happening, and to facilitate the capture of the guilty after the fact. According to Coretta Phillips (2010), a common goal of most CCTV systems has been the prevention on crime and disorder through deterrence. The CCTV also help catch people who commit crimes, scare off somebody who might commit a crime and as well as to make people feel safe. According to the U.S. Department of Justice (2006), written by Jerry Ratcliffe, CCTV “seeks to change offender perception so the offender believes if he commits a crime, he will be caught.” Usually it is true because with having these cameras, will sort of warn the criminals and that might keep them away from acting their plan. But, the reaction from the public also says that having CCTV and having security guard are not something that can be used independently. Both the security techniques are compliment on each other and should be use together. This is because a security guard might not be able to observe one area for the whole time. As Groombridge and Murji (1994) have warned “CCTV can only ever be a tool, it is not a panacea”. However, the camera recording will definitely offers some good help.


Society and CCTV

          In Malaysia, the installation of CCTV in public areas is rising due to the rising statistics in crimes. As according to Hamidi Achin (2008), it is clear the Government is serious about curbing crime when previous Prime Minister Datuk Seri Abdullah Ahmad Badawi’s announcement those CCTVs will be compulsory in crime-prone areas. But somehow, the awareness of the society is still low and because of the number of CCTV is high; some of them are not monitored. Thus, their effectiveness depends on public awareness of the camera, as well as individual offender awareness. A study by Honess and Charman (1999), published in “A Review of CCTV Evaluations: Crime Reduction Effects and Attitudes Toward Its Use” found that 45 percent of people surveyed in a town center did not believe surveillance cameras were effective in reducing fear of crime. In addition, according to the U.S. Department of Justice, the theory behind the effectiveness of surveillance cameras hinges on the rational thinking of potential criminals, who might be mentally ill or under the influence of alcohol or other drugs. Fewer studies of video surveillance have been conducted in the United States than in some other countries, such as the United Kingdom, making it difficult to draw any firm conclusions about its effect on crime prevention. However, studies of closed-circuit television camera systems in Los Angeles and San Francisco, Webb and Laycock (2001), the results of which were published in 2005, revealed little or no statistically significant change in the level of crime before and after the cameras were installed.
Nevertheless, there exist various schemes both locally, national and international which aims at protecting the public from the CCTV cameras. The 2006 privacy international report, states that they are mainly concerned with the privacy protection of the public. According to them, they have stipulated the rise of rules and regulations which aims at protecting individual right and freedom as well as regulate the use and output information captured by such systems.
Existing regulations, schemes or frameworks which aim at protecting the rights of individuals in public include the Data Protection Act 1998, European Convention of Human Rights (ECHR) Article 8, Council of Europe’s guiding principles for video surveillance, International Covenant on Civil and Political Rights (ICCPR) Article 17 and Private Security Industry Act 2001 to name a few.


Implications/Ethical Stances of Society on CCTV

          Some part of our society feel that the uses of video surveillance is as a remedy to crime and disorder in public places, while some of them see it as an invasion of personal privacy. Despite privacy issue in the positive feedback shows that some of the public have no problem on being recorded. To some who do not agree, they feel that with hundreds of CCTV being installed lately have invasion to their privacy. This issue comes into account especially with the installation of CCTV at park and playground. They feel awkward when knowing someone out there is watching them having good time with their family. They also feel that they have their right for privacy especially in office. The right to privacy is basically the right to be left alone and to live the private aspects of one’s life without being subjected to unwarranted, or undesired, publicity or public disclosure.

Let say, in a scenario where person A wants to observe the activity of person B as maybe person B is suspected to have commit a crime. It is okay if the person B is found guilty, but if the accusation is wrong then that would be unethical as person A has invaded the person B’s privacy. So it is quite hard to judge and to tell whether this CCTV usage is ethical or not.

A few studies of CCTV in public places have shown that people react to video surveillance in few ways. According to David Dunning (2010), the majorities of people under video surveillance generally has a reduced fear of crime and feel safer, provided they actually know that they are being watched. Psychological effect on public also happen which makes the public feel safer if they know the area was under CCTV surveillance This may, in turn, cause more people to use the area under surveillance, increasing natural surveillance. However, a sizeable minority of people, about one-third, according to the Center for Problem-Oriented Policing, felt uncomfortable under video surveillance, concluding that the purpose of CCTV was to spy on people and some other factors are:

a)   Lack of privacy protection: There are two kinds of people associated with this point which are, the guilty people, if you commit a crime, or suspected of one, you are a liability to the state, therefore have the right to invade your privacy for investigation. Another kind is the law abiding people, when they are in public they know that they are being watched, therefore CCTV cameras do not fringe the rights of privacy. Some may argue that People who obey the law should have nothing to fear from these cameras.

b)   Property right: the public areas belong to the state and therefore they have the right to put CCTV cameras anywhere they please.


 Conclusion

          In conclusion, it is clear that even though the surveillance installed in public places provide people with both positive and negative consequences and some which however are stack and potentially irreversible, the public has the right to debate or question the surveillance, about privacy, ethics, human rights; its impact on social inclusion and exclusion, power, empowerment, whether the running systems can be held to account. The most important thing the public should keep in mind is that it is possible to regulate surveillance, to keep its negative effects under control as there are many laws and codes of practice for protecting the privacy of the public.



 



Saturday, October 20, 2012

Intro to Members

All the members details updated in the members page ..

Please click the  picture below to view group members profile . Thank you! :)