bayuhan.blogspot.com
bayuhan classroom: July 2005
http://bayuhan.blogspot.com/2005_07_01_archive.html
Put your ideas through the mill. Friday, July 29, 2005. SAQ 6-1 #4 On Ordering Principle. D As a computer user, do you approve of an ordering principle, in the form of legislation, being formulated and enforced to govern computer use? I am a believer of having order through law. It brings about common understanding among its constituents, with consequences for those who do not respect or uphold them. It also prevents ignorance , where people perform acts they are not aware are harmful to others. It focus...
bayuhan.blogspot.com
bayuhan classroom: October 2005
http://bayuhan.blogspot.com/2005_10_01_archive.html
Put your ideas through the mill. Friday, October 07, 2005. Anastacio Code of Ethics. 1 Thou shall use computing technology to promote a positive environment for learning and growth to aid mankind to have a better life. 2 Thou shall use computing technology with responsibility and appropriate accountability. 3 Thou shall not use computing technology to infringe on one’s right to privacy. 4 Thou shall not use computing technology to encroach on other people’s domains. The act of hacking or intruding on oth...
bayuhan.blogspot.com
bayuhan classroom: June 2005
http://bayuhan.blogspot.com/2005_06_01_archive.html
Put your ideas through the mill. Wednesday, June 29, 2005. SAQ 2-1 #1 Relevance of the Study of Concept of Law. Posted by Lani @ 7:21 PM. SAQ 2-1 #3 Case of Melinda. I believe that there’s no question that Melinda has violated the legal (jural) law. In which case, she will be held legally liable for having violated the IP Code. With respect to the non-jural laws, here’s my view on how it applies to Melinda’s case. Posted by Lani @ 7:17 PM. Tuesday, June 21, 2005. This puts social responsibility as part o...
bayuhan.blogspot.com
bayuhan classroom: August 2005
http://bayuhan.blogspot.com/2005_08_01_archive.html
Put your ideas through the mill. Saturday, August 20, 2005. SAQ 8-1 #2 Other Acts of Violation of Privacy. SAQ 8-1 #2 Think of an act, other those already discussed in this module, that would constitute a violation of privacy in computing. Explain. 1] Albacea, Eliezer A., Payongayong, Ma. Theresa T., Pinpin, Arlyn V., University of the Philippines Open University IS 201 Computer Ethics. 2003. 2] Port Scanning. Webopedia. Retrieved on August 19, 2005 from. Posted by Lani @ 6:32 PM. First of all,. Very muc...