Friday, February 25, 2005

SAQ10: Free Speech Issues

Pornography (from Greek πορνογραφια pornographia — literally writing about or drawings of harlots) is the representation of the human body or human sexual behaviour with the goal of sexual arousal, similar to, but (according to some) distinct from, erotica. Pornography may use any of a variety of media — written and spoken text, photos, sculpture, drawings, moving images (including animation), and sound such as heavy breathing. Pornographic films combine moving images, spoken erotic text and/or other erotic sounds, while magazines often combine photos and written text. Novels and short stories provide written text, sometimes with illustrations. In addition to media, a live performance may also be called pornographic.In its original meaning, pornography was literally "writing about prostitutes", from the classical Greek roots πορνη and γραφειν. It was, however, a made-up word coined in England about 1850 that had a spurious air of age and scholarship about it. There is no evidence that anyone at that time, or earlier, was writing about prostitutes per se except as they figured as characters in written erotica of that epoch. It quickly came to mean writing about anything sexual, especially in a base manner, when the creation, presentation, or consumption of the material was for sexual stimulation. The term now refers to sexually related material of all kinds, both written and graphical.

Ethical Relativism

There are two distinct forms of moral relativism. The first is individual relativism, which holds that individual people create their own moral standards. As a human being we have our own belief, we have our own standards. The second is cultural relativism which maintains that morality is grounded in the approval of one’s society – and not simply in the preferences of individual people. Although we have individual differences, different cultural heritage, different prevailing social norms and different religious affiliation we must considered the whole society.

We have our own standards regarding pornography. For me pornography is a big No, because many are affected. Not just the women itself but the children and the youth. Pornography is a sin, it is morally wrong. It violates the law of God. Philippines is a Christian country, Pilipino strongly believed that pornography is bad under all circumstances but even we believe it, many of the Pilipino supported this event like accessing the website of it, publishing nude photos and scandals which is unethical. Nude photos of women bring happiness to the men, but disgrace to a woman. Publishing nude photos brings money, they gain profit from it. Some computer café hook nude photos because of money even it is morally wrong because they don’t want to be poor and they don’t want their family to starve to death. Even it’s against to their faith they engage with it, although there are laws prohibiting pornography. Women must be respected not to be abused. If some countries considered it decent and morally good, and nudity of the human body is just an art, I just think that Noah’s day will be repeated. Only few men, women and youth will be inside the ark, but most will be killed by the floods because of immorality. I don’t believe ethical relativism in this case because all the people in the world must be considered.

Ethical Absolutism

I believe ethical absolutism in the case of pornography, that all the actions done in this case is morally wrong under all circumstances, that pornography is considered immoral, that there should be fixed or rigid factors in evaluating such actions. If pornography is morally wrong, then the same should be so in all such incidents. Pornography can’t be considered good in one case and bad in another case. Ones’ an action damage ones reputation, ones right and it is malicious act, then it will be considered morally wrong no matter what the circumstances is. Impact the law of the Bible will agreed on ethical relativism because pornography is really bad and it is a sin against God.

Ethical Egoism and Ethical Altruism

Ethical Altruism in the case of pornography is a pure mask self interest of the publisher; there is no desire to promote the good of others. And besides they promote immorality in the sight of God. Pornography is degrading women reputation. Who will benefit from it? Of course the Publisher and individual users who has self interest. They can use it for flesh or for arousal, black mail, and revenge and gain personal profit; to buy anything they want to. Individual have the capacity to think and discern what is right and wrong but then because of “human needs” or “human lust of the flesh” they did not think. They can’t control their action, that’s why they are doing it to satisfy their needs even they will abused someone’s reputation. I believe Mortiz Schlick of Vienna that “All choices, altruistic ones considered, are determined by the immediate pleasure felt by the person doing it. People have the tendency to lie about their motives in doing certain action or things, in reality they are self seeking”. They are all selfish. In ethical egoism what harms, the whole harms one. Pornography harms others reputation that’s why whatever we post must be taken into account. In the case of Pornography there is no freedom of expression, we don’t have the freedom to publish nude photos because it degrade ones personality and we must be responsible for that.

John Stuart Mills Utilitarianism

I don’t believe this finalist theory in the case of pornography. I really doubt that those actions that bring happiness are considered morally right while those actions that inhibit happiness is morally wrong. I know most of men are happy seeing nude photos of women in the internet which is morally wrong for me. But in this theory if we inhibit the happiness of a publisher or user who published nude photos it will be morally wrong. I don’t believe it; since publishing nude photos in the internet is a sin, it will not make me happy. It will bring us doom and we will be out in the sight of God. Happiness in pornography will be considered a yardstick of immorality. It’s alright to be happy if you helped for no reasons, if you helped without exchange, if you don’t degrade ones opinion, if you respect ones right that is the true happiness. But if you will degrade and abused one I don’t think its happiness, I called it self satisfaction and self interest. I just think we need to find the true happiness, the true happiness that God alone can give.

Immanuel Kant’s Categorical Imperatives


I believe Immanuel Kant that only good will be considered good. Pornography is bad under all circumstances. “The acts is good not because of certain consequences that occur on its performances or on the basis of its end result, but because of the willing, that accompanies the act”. In the case of pornography the user who published nude photos has no good intention, that’s why his action is really bad under all circumstances. The intention of the publisher of the nude photos is to gain profit from it, although they know that it will destroy the soul of every human being. Pornography is not an art, but it is a lust of the flesh. It will boost the needs of a man; many are rape because of pornography in the net. I don’t see good things that it will bring to the society. I know that every human being is able to discern and decide whether to obey certain set of laws or not. But because of the free will given to us by God, we choose always the bad things and acted upon, which we think it make us happy although it’s against the law in the land and the law of God. Pornography can’t be considered good; the act of browsing the web of it is really bad. It’s a temptation browsing the net.

Aristotle’s Nicomachean Ethics

Since pornography is a human action, I don’t see moral virtue in pornography or intellectual virtue. It is not righteous, it is not fair and it is not just. Pornography damages the lives of many young people. Yes, human actions in computing are subject to evaluation through certain norms of ethical value. But in the case of pornography the action is lewd, unethical and immoral. In any aspect or situation pornography is bad under all circumstances. Publishing nude photos is just a body pleasure, to gain short time of happiness. We the users of the World Wide Web must discern what is right and garbage what is wrong, but there is no sense if what we discern right is not acted upon. Christian countries like Philippines knows that pornography is bad under all circumstances, we set our mind not to engage with this, but when the body pleasure comes, most of us can’t resist the temptation because it gives happiness to our eyes. Pornography is a sin and doing this is evil. We don’t want to be trap by evil things, and as abiding citizen we must not be engage to this. Temperance is a virtue that we must have as a user. With this virtue, we will be able to regulate our appetite with respect to what would preserve our physical well being. In that case we will not patronize or reproduce pornography.


If I were granted indefinite and unrestricted access to the internet, I will not be interested to join a chat group that hold no barrier as far as free expression and communication are concerned because I’m not fond of chatting and at the same time I’m just wasting my time. I don’t really chat to a stranger whom I don’t really know, besides I’m not ready to hear negative criticism and negative feedbacks regarding my opinion because I’m very emotional person. Yes, we have the freedom to express what is in our hearts and mind and that’s 90% correct, we must respect all the opinion of others and we are just honest with our self. But this freedom give us doom, freedom is only for those abiding citizen and know what is good and bad. Freedom is for those people who respect ones personality, that no one will be hurt and affected. But then, many abused their freedom of expression so as to published nude photos in the internet, published hate speeches and many more. You see if there is no barrier, many will be affected. But then it’s up to us if we will be affected on the issue published in the chat room, it’s really up to us. But the really problem in freedom to express what is inside your heart is the children and youth that will be affected. It’s alright if the entire oldies are affected, because they can resist and deny things that will be bad in their sight, but if it is a child or a youth then it will ruin their lives. I will say that anything to be published in the internet must be ethical, so as to have freedom of expression. Nevertheless, it’s alright for me if I join a chat group that will give me new knowledge and express what my opinion is, but not to the extent that one will be hurt because of hate speeches, and talking sex in the chat room which is “Yak, Kadiri at Bastos”. Pornography, combines images, spoken erotic text and/or other erotic sounds which is a sex crime, violating the law of God and the law in the land. Sex is sacred and it must be done secretly by married couple only. Publishing photos of a naked woman even it is altered is a malicious act. Most men arouse whenever they see nude photos in the internet, they are really amazed. (Oh Eve, your so beautiful). As a user we have the privilege to access the internet but we don’t have the rights to go beyond what is expected. We have given a privilege, don’t try to abuse it. If the topic of the chat group is nasty things like sex or nude photos of a woman or man, then I don’t want to join a chat group that hold no barrier as far as free expression and communication are concerned. Freedom of expression for me is only for those ethical people in the entire world; know that everything he/she published will not affect ones soul neither could not hurt ones opinion, ones belief and others. Also freedom of expression could not be used just to gain profit or personal interest from others. We can speak freely what is in our hearts but we need strategies, good approaches so that no one will be offended. If ever we hate somebody else, we talk to them personally or email them with your opinion, not to the extent that all users of the World Wide Web will read the hate speeches you wrote, because it degrades ones personality. Publishing nude photos and sex scandals in the internet is too ridiculous and very unethical. The users who do things like this are “maniac and selfish”. If freedom of expressions includes pornography and sex scandals, hate speeches and the like, then I will not be interested to join a chat group that hold no barrier as far as free expression and communication are concerned because talking nasty things is very unethical and violate the Law of God. Pornography is a sin, so publishing nude photos in the internet is a sinful act.

Friday, February 18, 2005

Saq9: Social Justice Issues

Social Justice Issue
1. Choose one of the social justice issues in computing discussed above and find out what extent it is an issue in the Philippines.

According to further study of The American Association of American Women's (AAUW) Gender Gaps: Where Schools Still Fail Our Children, http://www/aauw.org •Girls are significantly more likely than boys to enroll in clerical and data-entry classes, the 1990s version of typing. Boys are more likely to enroll in advanced computer science and graphics courses.
•School software programs often reinforce gender bias and stereotypical gender roles.
•Girls consistently rate themselves significantly lower than boys on computer ability, and boys exhibit higher self-confidence and a more positive attitude about computers than do girls.
•Girls use computers less often outside of school. Boys enter the classroom with more prior experience with computers and other technology than girls.
Actually, I just observed that there are no gender gaps here in the Philippines in computing. Since the Philippines is a democratic country, males and females have a freedom to choose their courses. But although males and females enrolled in computer courses, most successful in computing is the male. Upon my observation most computer café are occupied by male. They spend lots of time for playing, researching and exploration; do some sort of programming and many more. The male is always advance in computing rather than female. Although I observed that now days there are many females who enrolled in this course like Computer Science, Programming, Computer Engineering, Computer Secretarial, Computer Management and the like but they are not as good as male. Most successful programmers, analyst and others are occupied by male, mainly because they are exposed earlier in the computer world, plus they always explore new things in the internet and they usually don’t do household chores. Yes, there are many females who enrolled in computing like in Quezon Province or even in the Philippines but almost male are hired related to what they’ve studied. Computer related courses are very in demand in the Philippines because almost company are using computers even the smaller one. But then, even there are many enrolled and graduated from this course most females are hired not related in their course. They are hired for clerical works, office staff and others. Like me I graduated 4 years in Computer Science but my field of work is not related, I’m in the management field. I just ask myself why I graduated from this course, or why did I took up BSCS and yet I will not work as a programmer, system analyst and the like? Maybe I choose the wrong path. Well that’s my perception. Anyway having knowledge in computing helps me a lot to do my reports and others.

Computer education culture discourages girls, survey says

From Staff Reports (Citation and clippings from the internet)
WASHINGTON (CNN) -- The methods used to teach computer programming classes are turning off girls at both the high school and college level, a new report says. As a result, it says, women make up just 20 per cent of the high-tech workforce. The report comes from the American Association of University Women Educational Foundation.
Entitled, Tech-Savvy: Educating Girls in the New Computer Age, it suggests information technology courses need to change in order engage the participation of more girls. The AAUW believes violent video games and programming classes that focus too narrowly on hardware and the mechanics of information technology are leading girls to turn away from pursuing careers in computers. The report suggests teachers need to incorporate technology concepts into more diverse subject areas -- like music, history, or the sciences -- in order to spark girls' interest. The report was authored by the AAUW Educational Foundation Commission on Technology, Gender, and Teacher Education. It includes results from an online survey of 900 teachers, focus group research involving more than 70 girls, and reviews of existing research.
At the high school level, the report indicates only 17% of computer science "Advanced Placement" test takers are girls. At the college level, women receive less than 28% of computer science bachelor degrees, and just 9% of engineering-related bachelor's degrees. The report concludes girls find computer programming classes "tedious and dull" and games "boring, redundant, and violent." The report suggests girls could step in and fill the information technology job shortage if the educational establishment makes computer programming courses more interesting to girls. And it stresses that girls' ability to simply use computers to send e-mail or surf the web is no substitute for comprehensive computer study. "When it comes to today's computer culture, the bottom line is that while more girls are on the train, they aren't the ones driving," said Pamela Haag, the Foundation's director of research.
"To get girls "under the hood" of technology, they need to see that it gets them where they want to go. And for a large part of the population, that process must start in the classroom.

Conclusion

There are many who enrolled in STI, AMA Computer College, Informatics, Enverga University, Sacred Heart College, ABE, and other computer institution that are females here in Quezon Province. But as I can see, most graduate females are not having a job related to what their bachelor is. Yes, they use their skills in computing because most company needs employees who have knowledge in computer using Microsoft Word and Excel or know how to operate the computer or the basic principles of the computer. But most females are bored in computer programming, having difficulty to analyze how the programs will run is a very tedious work. I’m talking as a whole. And in fact nowadays computer world and programs is changing very fast. Computer graduates must know the latest programs every time so that they will be advance, although we need specialization. Girls as a whole are fun of chatting in the internet, although there are some girls interested in programming field and exploration. I do believe Pamela Haag, "When it comes to today's computer culture, the bottom line is that while more girls are on the train, they aren't the ones driving.” Most males are fun of exploring the internet rather than females. Not only in the Philippines but in every country, most of the girls are interested in music, communication like having a job in a call center, managing companies, do clerical works and others but only some are interested in computing field.

What about access to the Internet for those with physical disabilities?

Having physical disabilities is not a big deal to access the internet, although it’s difficult to access the internet with physical disabilities. I don’t think it is a gap between the normal people. Here in Lucena City, we have 2 schools in public for those disable person or special child. They are trained to use or access the computer although they need assistance from their teacher, so they will understand. If I’m not mistaken the Philippines are taking care of the disable person well, they put schools that will teach disable person so that they will be in the computer age. And as far as I know no computer café put signage that disable people can’t be entertained. Disable or not have the same rights.

Are people unable to access the net?

Some Filipinos mostly in provinces, does not access the internet or even use the computer as a means of communication. Maybe because they don’t want to be knowledgeable about it, meaning there are too many things to do rather than use the computer. Some can’t access because their province has no electricity or they are in the middle of the mountain or a sea, and so they need to go down to the mountain and go to a city wherein they can access the computer world. Some don’t know how to access, even they don’t know how to read and write or even understand English language for communication. Some Filipinos are not open-minded and some does not have money to access or even bought computers just for it. Not all can access because not all can afford to buy computers or enrolled to computer subjects and the like. Does the government of the Philippines give projects and trainings to those people in the provinces to teach them how to access the computer world? I just think there is none. Almost 30% of the Filipino people are unaware in the computer world or not aware what is the used of computer. They are not updated.

Unicode could be a great help to those who have knowledge in computer but it can’t be a help to those person who don’t know and understand the computer world. But Unicode is an advantage for us in a way that many people (the whole people of the world) will clearly understand what is in that particular web because Unicode provides a unique number for every character, no matter what the platform, no matter what the program, no matter what the language. Fundamentally, computers just deal with numbers. They store letters and other characters by assigning a number for each one. Before Unicode was invented, there were hundreds of different encoding systems for assigning these numbers. No single encoding could contain enough characters: for example, the European Union alone requires several different encodings to cover all its languages. Even for a single language like English no single encoding was adequate for all the letters, punctuation, and technical symbols in common use. These encoding systems also conflict with one another. That is, two encodings can use the same number for two different characters, or use different numbers for the same character. Any given computer (especially servers) needs to support many different encodings; yet whenever data is passed between different encodings or platforms, that data always runs the risk of corruption. Unicode provides a unique number for every character, no matter what the platform, no matter what the program, no matter what the language.. The emergence of the Unicode Standard, and the availability of tools supporting it, are among the most significant recent global software technology trends.Incorporating Unicode into client-server or multi-tiered applications and websites offers significant cost savings over the use of legacy character sets. Unicode enables a single software product or a single website to be targeted across multiple platforms, languages and countries without re-engineering. It allows data to be transported through many different systems without corruption. http://www.unicode.org

2. Is denial of access in computing a social justice issue? Discuss your answer.

As I’ve said earlier in the course site it depends upon the situation, or it depends upon the users’ belief. In telecommunication, the term access denial (system blocking) has the following meanings:

•Access failure caused by the issuing of a system blocking signal by a communications system that does not have a call-originator camp-on feature.
•Access failure caused by exceeding the maximum access time and nominal system access time fraction during an access attempt.

Access failure: In a communications system, an unsuccessful access that results in termination of an access attempt in any manner other than initiation of user information transfer between the intended source and destination (sink) within the specified maximum access time. Access is also denied if the users attempt to modify or remove something in the web without authorization, Circumventing logon or other security measures, using information systems for any illegal or unauthorized purpose, Sending any fraudulent electronic communication, Violating any software license or copyright without the written authorization of the software owner, using electronic communications to violate the property rights of authors and copyright owners, using electronic communications to harass or threaten others, forging, fraudulently altering or falsifying, to spam or flame, use electronic communications to hoard, damage, launching a computer worm, computer virus, or other rogue program and others.

Access in computing is a privilege not a right. If ever one’s access is denied then we must respect it, because we can’t blame the owner of a particular web for doing this or that because there are many hackers who are snooping around and get information which is illegal. Also, we have our own belief. What we believe or others believe must be respected. Yes, there are web for females only. “That’s pure girls talk”. That’s the way they believe and we must respect it. If you want to access this web and your male, you can’t access the web of course. We must respect the owners of it. Denial of access in computing could be a social justice issue or it could not be a social justice issues. My stand is I’m in the middle.

Thursday, February 03, 2005

Saq8: Privacy Issues

Privacy – according to Webster dictionary privacy is the condition of being private; seclusion; retirement. A matter that is or should be private. The state of being secret; avoidance of display or publicity; secrecy. A place of seclusion and retreat.

1. Explain the following types of privacy. Evaluate them by applying an ethical principle for each.

Data base privacy

Every company has their own data base files like my company in a Store Operation Department. We have employee data base file, payroll account database file, transactions data base including transient deliveries in and out, inventory database, payment database file, customers’ data base file, marketing files and planogram data base file. In planogram database file, we use to put our monthly plans or future plans of the store; marketing database files is all about marketing strategy, the brochures, the ads, the mobile we use, the design and others; customers data base files, of course its all about customer files; payment database file is all about the expenses and suppliers payment; inventory database is all about ABC analysis, the items which is moving and non moving, the automatic replenishment, the schedule of deliveries and others; payroll account of course is payment for the whole staff; and lastly is employee database files, the bibliography of the employee is here. That’s all about the database in the store. Mostly database file is hack by those nearly competitors to see what’s new in the organization, to see the plans of that company. If ever they saw it, they will use better plan to boost sales which is merely wrong and unprofessional. Every company must have their own strategy, plans and others even without looking unto the neighbors’ idea. It must be original. Companies’ data base file is very private, meaning strangers or hackers are not allowed to access that file. Even it’s not in computing, we don’t give any information regarding this particular employee or customer because it’s confidential. Ones a file is company owned, or owned by somebody else we must respect it, because it’s private property. See illustration, Lydia is a system administrator of Company A, selling furniture, house ware and computer peripherals. As a system administrator she knows all about the supplier who supplies their items and all of the customers of that company. Because of that she told her best friend to put up business like this, so that their own business will boost and will make a sale. Lydia gets all the files of the supplier and the customer of Company A. She contact the supplier and made some deals that whatever discount the Company A is having will be given to her or may be in the most cheapest way. Plus she told the customer of Company A to buy items in her own store, which the items can be bought in cheaper amount than the Company of A. Because of this, most customer of Company of A goes to her store. Oh money. The love of money is the fruit of evil. Lydia forgot that she is in the Company and must abide the rules and regulation of the company. The company found out that Lydia is the reason why they got very low turn over of sales in the company. That’s why they accused them for imprisonment. Illustration 2: Joseph is a computer genius and hired to be a computer programmer, but then his company is the 3rd top company in the whole America. His boss and the management want to be the top company in America. That’s why he told him to access the files of the 2 company to have an advance idea so that they will have better plans, and so they can achieve the best, to be the number 1 company in America. Because of this, as per instruction of his boss he hack the data base files of their competitors which is against the law in computing. Truly the act of Joseph is unethical and punishable by law. It is morally wrong under all circumstances. I just think that I must sacrifice my work so that I will not violate the law in the land.

E-mail Privacy

I agree that the only sender (Me) and the intended recipient (You), and no body else, should read what I write in my email. That’s e-mail privacy. If ever my email is access and read by the system administrator who has access in my account, then, it is very unethical. My question is that why we have our own email address if all can access that particular email address? Right! What is the important of user id and password if our emails are readable to any body else? What is the use of password, if all can access? It’s useless; I just think that we don’t need password and user Id if there’s no e-mail privacy, because we have freedom to read even it’s not yours. My real opinion is that, I’m very mad to those people who read my email and use my email address without informing me. There must be e-mail privacy. If it is private, then it must be a private property. Here in the Philippines, if one is talking you must listen and wait for your turn to talk, so that you will not be unethical. If someone is in your house or a visitor in your house, and then you pass by, you will say excuse me to be ethical, what more if you and I snoop around in other people files, then it is very unethical. They said that because of curiosity they used to snoop around in other people files, but the right word for me is not curiosity but “Pakialamero”. You and I must not access emails of others. Just mind your own business.

Confirmed Email Privacy Hole at Orkut
For instance, whenever a message is send to anyone in the system that is forwarded by email, in the message headers it will read:
From: "Christopher Allen"
Reply-To: "Christopher Allen" ;
When someone reads the message in their email software, the "From:" line will be Christopher name but with the fake email address of -- however, when you reply to it, it will use the real email address. This appears to happen whether or not you have the privacy settings to reveal the email address.
The second is that, sometimes we the users forgot to sign out with the system or the internet itself. Mostly, if we just rent a PC through Computer Café we forgot to log out, that’s why it’s too easy for them to access our email and sometimes used our e-mail address for their own benefit. Truly e-mail is private, if we access one’s email, then it is very unethical. We must respect the privacy of every user. If ever that other user forgot to log out, just close it and don’t try to read it because it’s against the reputation of others.

Privacy on the web

Really we can’t expect privacy in the web. Yes, we can browse the web freely, but then because of too much freedom in the web we violate it. Most web site collects information, how the information is used and what they do to protect any information they gathered. Washburn University respects the privacy of all Web site visitors to the extent permitted by law. There is a Web Privacy statement intended to inform the users of the ways in which this Web site collects information, how the information is used and what they do to protect any information the user choose to provide Washburn University.

Your rights

Yes, we have the rights under the Privacy Act and the Freedom of Information Act.
Privacy Act
Freedom of Information Act http://www4.law.cornell.edu/uscode/5/552.html>
There are four types of information that may be collected during your visit in a site: network traffic information, Web server statistic logs, cookies, and information voluntarily provided by the user.

Network Traffic

In the course of ensuring network security and consistent service for all users, the University may use software programs to do such things as:
• Analyze network traffic
• Identify unauthorized access
• Detect computer viruses and other software that might damage University
computers or the network
• Monitor and maintain the performance of the University network
In the course of such monitoring, these programs may detect such information as e-mail headers, addresses from network packets and other information. Information from these activities is used solely for the purpose of maintaining the security and performance of the University's networks and computer systems. Personally identifiable information from these activities is not released to external parties unless required by law.
Web Server Logs, the University Web server collects and stores information from Web site visitors to monitor Web site performance and to improve service. This information includes the following:
• Page visited
• Date and time of the visit
• Domain name or IP address of the referring site
• Domain name and IP address from which the access occurred
• Version of browser used and the capabilities of the browser
• Search terms entered into our search engine
The University makes no attempt to identify individual visitors from this information: any personally identifiable information is not released to external parties unless required by law.

Cookies

Cookies are small bits of data stored on your hard drive on behalf of a Web site and returned to the Web site on request. This site may use cookies for two purposes: to carry data about your current session at the site from one Web page to the next, and to identify you to the site between visits. If you prefer not to receive cookies, you may turn them off in your browser, or may set your browser to ask you before accepting a new cookie. Some pages may not function properly if the cookies are turned off. Unless otherwise notified on this site, they will not store data, other than for these two purposes, in cookies. Cookies remain on your computer. University does not forward them to any external parties. Unless otherwise notified on this site, they do not use cookies to track your movement among different Web sites and do not exchange cookies with other entities.
All website are private, we used to browse the web to get idea and information. Website helps us in many ways in the office, in school and others. If ever we don’t like the settings, the information posted in their web, we can post comments. But then we must respect their privacy and that is not to do bad things and published slandering idea or comments in their web. The owner of the website respects their visitor, and so the website visitor must respect also the website he/she is visiting. What ever comments and suggestion that will be posted in the website he/she visiting is a great help for improvement.

2. Think of an act, other than those already discussed in this module that would constitute a violation of privacy in computing. Explain.

Privacy of Intellectual Property or Software Privacy - rights of computer programmers, ones a program has been designed by someone else; we the users must not infringe or copy it nor sell it, neither run the applications, as if were the owner of that program. Just keep in mind, that it’s not yours, so don’t do bad things. We must respect the owner, if he/she allowed us to use this program then it’s good, but if not, just stop it and mind your own business. If you want to be respected, then respect the rights of the others. Always foot yourself on other shoes. Don’t be so ridiculous and don’t be greedy. Greediness is not from God, it’s from the devil. So, if it is private then it must be private, period. Have pity to the owner of the software. If we are going to infringe it, we are just like those criminals who killed innocent people, but in different way. So no to infringement of Intellectual property, it must be a private property.

Communication Privacy (Chat room or Newsgroup)
Mostly unknown users go to the Newsgroup or chat room to intrude, and not just to intrude but then to flame. Flame people and disrespect the opinion in the Newsgroup, bulletin boards and chat room. Most of the time the information is illegal, inaccurate and slanderous resulting miss communication and disrespect. In most cases when one group agreed to chat, to talk to a serious subject, one will appear and join the group for discussion which violates the communication of privacy of others.