lmorano.blogspot.com
Lenny's Web Page: 02/13/2005 - 02/20/2005
http://lmorano.blogspot.com/2005_02_13_archive.html
This web page is primarily used for IS 201 (Computer Ethics). Saturday, February 19, 2005. 2 Think of an act, other than those already discussed in this module that would constitute a violation of privacy in computing. Explain. Stalking has often been described as an issue of control: their control of you. Today, there is an increasing number of cases where the stalking of a person begins through the Internet and eventually escalates into real world stalking. This involves cyber stalking. Word of the Day.
lmorano.blogspot.com
Lenny's Web Page: SAQ 1-1 Applied Ethics
http://lmorano.blogspot.com/2005/01/saq-1-1-applied-ethics.html
This web page is primarily used for IS 201 (Computer Ethics). Monday, January 24, 2005. SAQ 1-1 Applied Ethics. SAQ 1-1 Applied Ethics. Hippocratic Oath (400 BC). Honor instructors in the medical arts. Pass on the Art only to those bound by the Oath. Practice for the benefit of patients; "do no harm". Give no deadly medicine or substance to produce abortion. Enter homes for the benefit of the sick. Abstain from mischief and corruption. Principles of medical ethics. IV A physician shall respect the rights...
lmorano.blogspot.com
Lenny's Web Page: 03/20/2005 - 03/27/2005
http://lmorano.blogspot.com/2005_03_20_archive.html
This web page is primarily used for IS 201 (Computer Ethics). Wednesday, March 23, 2005. 1From the cases summarized above, explain what constitutes a computer crime. Computer crime can be defined as unlawful acts wherein the computer is either a tool or a target or both. Credit card fraud and stock fraud are examples of financial crimes that occur when a computer is used as a tool to aid criminal activity. It is also called crimes facilitated by a computer. Unauthorized access to a computer or network.
lmorano.blogspot.com
Lenny's Web Page: 02/06/2005 - 02/13/2005
http://lmorano.blogspot.com/2005_02_06_archive.html
This web page is primarily used for IS 201 (Computer Ethics). Saturday, February 12, 2005. B Pick three of the precepts on computer use discussed above and briefly explain each precept in terms of the theory of ethics and the ethical concepts that underpin it. Thou shalt not use a computer to harm others. Thou shalt not snoop around in other people's files. Thou shalt not use a computer to steal. It is not good to steal in any means. It violates the Moral law and Divine law. Computer privacy is ethical i...
lmorano.blogspot.com
Lenny's Web Page: Activity 9-1 No. 1
http://lmorano.blogspot.com/2005/03/activity-9-1-no-1.html
This web page is primarily used for IS 201 (Computer Ethics). Tuesday, March 22, 2005. Activity 9-1 No. 1. 1Choose one of the social justice issues in computing discussed above and find out to what extent it is an issue in the Philippines. Then find out what is being done to address it in specific countries. The prevention measures are:. 1the use of ergonomics keyboard and monitor screen filter. 2the proper body position. 3increase the font sizes. 4use a light touch. 6hold the mouse lightly.
antoini.blogspot.com
ecHoseRa dAy & niGhT.: March 2009
http://antoini.blogspot.com/2009_03_01_archive.html
EcHoseRa dAy and niGhT. I'm on the Philippine Photo Gallery. March 28, 2009. Realizing the purpose of this blog, I've ventured out into something for my photographs. I've recently joined the Philippine Photo Galleries. There I have my own gallery and I really found it nice because it gives me a sort of interaction with the works of other photographers, not only in Iloilo City but the entire country as well. Please visit this link. To see my gallery and the rest of this. Which David is more convincing?
lmorano.blogspot.com
Lenny's Web Page: SAQ 8
http://lmorano.blogspot.com/2005/02/saq-8.html
This web page is primarily used for IS 201 (Computer Ethics). Saturday, February 19, 2005. 2 Think of an act, other than those already discussed in this module that would constitute a violation of privacy in computing. Explain. Stalking has often been described as an issue of control: their control of you. Today, there is an increasing number of cases where the stalking of a person begins through the Internet and eventually escalates into real world stalking. This involves cyber stalking. Word of the Day.
lmorano.blogspot.com
Lenny's Web Page: Activity 12-1
http://lmorano.blogspot.com/2005/03/activity-12-1.html
This web page is primarily used for IS 201 (Computer Ethics). Wednesday, March 23, 2005. 1From the cases summarized above, explain what constitutes a computer crime. Computer crime can be defined as unlawful acts wherein the computer is either a tool or a target or both. Credit card fraud and stock fraud are examples of financial crimes that occur when a computer is used as a tool to aid criminal activity. It is also called crimes facilitated by a computer. Unauthorized access to a computer or network.