Social and ethical issues is the topic for week 12. There are many copyright right problems on the internet because there are no standards enforceable and anyone can publish anything which can be bias and unethical. The main area where copyright is done is music, movies, images and written information. Plagiarism at university is a serious issue so be sure to reference your work correctly.
Protecting your PC is essential when using the internet as viruses can be time consuming for you, costly and annoying. To avoid viruses start by installing Firewall. Firewall will protect against probes and unsolicited monitoring.
It is also recommended that you install Anitvirus software, but keep it up to date as viruses change and are able to permeate the antivirus software. Viruses are usually contracted by attachment files on chat lines, instant messaging and emails. The high risk attachments include *.doc, *.xls, *.com, just to name a few. The lower risk files include *.jpg and *.pdf, however all are unsafe.
Some tips to minimize the risk:
• When on the internet never give personal information out such as bank details and passwords
• Don’t reply to SPAM mail
• Set online programs such as internet browsers, ICQ and MSN to maximum security settings
• Update your antivirus software weekly
• Always scan documents with antivirus before you open them.
Workshop
The workshop for week 12 gives more information on copywrite. The task is to visit the Australian Copyright Council at www.copyright.org.au. You then have to click on pages containing the information sheets and make a list of the information sheets that are relevant to undergraduate students and then read the information.
The image below is the home page of www.copyright.org.au
Information that's relevant to undergraduate students:
1. Copyright protects Textual material - ie journals, books, websites, articles.
2. Protects artistics works, dramatic works, musical works, films, soundrecordings, broadcasts. Basically anything original is copyright.
3. Copyright does not protect an idea, information, concepts or styles of a person that is supposingly 'unique'.
4. Anyone that wishes to use material that is under copyright cannot unless they seek and recieve permission from the author or artist of suggested material.
5. Most things on the net are copyrighted - this does not make them free. As students, we often think that material on the net is free to use, but it is actually under copyright and you are breaking the law if you do.
You then have to look at the Department of justice's Intellectual Property cases and write a summary of the US vs Sankas case.
Property cases at www.cybercrime.gov/ipcases.htmThe article titled Warez Leader Sentenced to 46 Months the case of a man called John Sankus Jr and his imprisonment for 48 months after being found guilty for conspiring to violating the criminal copyright laws. He was the leader of one of the oldest and largest international software piracy rings on te internet. Another member was sentenced to 33 months in prison. These two sentences are the longest ever imposed for orgainsed crime via the internet.
His online software piracy group was called DrinkOrDie which "cracked" software and then released it on the internet. Sankus's group cracked material from big names such as Microsoft, Adobe, Autodesk, Symantec and Novell. They managed to permanently defeat copyright protections which allowed the software to be illegally reproduced, distributed and used by anyone.
There were 40 people worldwide that were targeted by this undercover operation. Only nine defendants have pleaded guilty and two have been sentenced with another five pleading guilty this week.There were a couple of more sites we were asked to look at and write down in our logs what we can do to protect ourselves from being attacked via the internet, in forms or viruses, hackers and trojans.
Then you need to make a plan to protect yourself from attacks on your privacy and security.
1. Change the system ID- use a better password, not your name or something easily guessed.
2. Disable identifier broadcaster- don't shut to the world you have wireless-its an invitation for hackers.
3. Enable encyption
4. Restrict unnecessary traffic - inbuilt firewalls can help protect you.
5. Change the default administator password- default passwords are easy to get.
6. Patch and protect your PC's- install antivirus software.To protect yourself from viruses, make sure to install antivirus software in you computer.
Readings
There are readings for week 12, however i was unable to access them.
