What is computer crime?
A computer crime or the cybercrime is simply refers to any crime that involves a computer and a network. The computers may have been used in the commission of a crime, or it may be the target.
Generally, it refers to criminal exploitation of the Internet. Issues surrounding these types of crime have become high-profile, particularly those surrounding with hacking, copyright infringement, child pornography and may more issues. The problem of privacy may also arise when confidential information is lost or intercepted, lawfully or otherwise.
Cyber-crimes are also grouped into three categories. The first are those in which the computer comprises the "object" of a crime and in which the perpetrator targets the computer itself. This includes theft of computer processor time and computerized services. The second category involves those in which the computer forms the "subject" of a crime, either as the physical site of the offense or as the source of some form of loss or damage. This category includes viruses and related attacks. Finally, the third category includes those in which the computer serves as the "instrument" used to commit traditional crimes in cyberspace. This encompasses offenses like cyber-fraud, online harassment, and child pornography.
Give an example of a computer crime not stated in the Computer Ethics blog.
Another example of a computer crime are HARASSMENT and DRUG TRAFFICKING.
HARASSMENT refers to a direct obscenities and derogatory comments at specific individuals focusing on certain issues like for example on gender, religion, nationally, sexual orientation. This type of cyber crime is often occurs in chat rooms or in social networking sites such as in Facebook and twitter. This can be done through newsgroups and sending hate emails to interested parties. Any comment that may be found derogatory or offensive is considered harassment.
DRUG TRAFFICKING drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at internet cafes, use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in restricted-access chat rooms.The rise in Internet drug trades could also be attributed to the lack of face-to-face communication. These virtual exchanges allow more intimidated individuals to more comfortably purchase illegal drugs. The sketchy effects that are often associated with drug trades are severely minimized and the filtering process that comes with physical interaction fades away.
What is stated in section 33a of Republic Act 8792?
Stated in Section 33a of Republic Act 8792 that...
(a) Hacking or crackling with refers to unauthorized access into or interference in a computer system/server or information and communication system; or any access in order to corrupt, alter, steal, or destroy using a computer or other similar information and communication devices, without the knowledge and consent of the owner of the computer or information and communications system, including the introduction of computer viruses and the like, resulting in the corruption, destruction, alteration, theft or loss of electronic data messages or electronic documents shall be punished by a minimum fine of One Hundred Thousand pesos (P 100,000.00) and a maximum commensurate to the damage incurred and a mandatory imprisonment of six (6) months to three (3) years;
In Visayas State University, there is an office that deals with protecting the Intellectual Property Rights (IPR) of those who publish their intellectual output works. What is this office that caters with IPR concerns? Who is the head of this office?
The office who caters with the IPR concerns is the Office of the Director of Research and Extension (ODREx) and the head of the office is Dr. Othello Capuno.