Intellectual property
- are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.
The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.
Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept.
source: http://en.wikipedia.org/wiki/intellectual_property
Intellectual Property Rights
-- The conditions under which the information created by one party may be appreciated by another party.
Source: http://www.w3.org/People/Berners-Lee/Weaving/glossary.html
_♥♥charity22♥♥_
♥pretty_cure♥
Wednesday, May 13, 2009
Sunday, April 26, 2009
1. Perpetrator
- the one who commits crime or offense.
- is the robber, assailant, counterfeiter, etc. -the person who actually committed the crime. The distinction between suspect and perpetrator recognizes that the suspect is not known to have committed the offense, while the perpetrator [who may not be a suspect yet] is the one who actually did. The suspect may be a different person from the perpetrator, or there may have been no actual crime, which would mean there is no perpetrator.
http://www.allwords.com/word-perpetrator.html
2. Cyber Criminal
- First it is important to understand what cyber crime is. Cyber crime is a crime committed online via emails, or chatrooms or any other form of interaction that can take place online. It does not vary much from the same criminal misconducts committed in real life. The only difference is the fact that it is much harder to pursue these types of criminals, because they transcend the typical borders associated with countries and the jurisdictions of various law enforcement agencies may clash as a result.
Cybercrime can take the form of cyber stalking, where they follow you around into various chat rooms and harass you online. This can also be things like a hacker taking control of your computer or someone stealing your identity online. Everything can be destroyed by cyber criminals. They can wipe entire hard drives, steal your entire life and everything about it and essentially just mess with your entire world.
http://www.articlesbase.com/internet-articles/cyber-crime-cyber-criminals-and-prevention-575109.html
3. Cyber Terrorist
- hacker: a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
http://wordnetweb.princeton.edu/perl/webwn?s=cyber-terrorist
- the one who commits crime or offense.
- is the robber, assailant, counterfeiter, etc. -the person who actually committed the crime. The distinction between suspect and perpetrator recognizes that the suspect is not known to have committed the offense, while the perpetrator [who may not be a suspect yet] is the one who actually did. The suspect may be a different person from the perpetrator, or there may have been no actual crime, which would mean there is no perpetrator.
http://www.allwords.com/word-perpetrator.html
2. Cyber Criminal
- First it is important to understand what cyber crime is. Cyber crime is a crime committed online via emails, or chatrooms or any other form of interaction that can take place online. It does not vary much from the same criminal misconducts committed in real life. The only difference is the fact that it is much harder to pursue these types of criminals, because they transcend the typical borders associated with countries and the jurisdictions of various law enforcement agencies may clash as a result.
Cybercrime can take the form of cyber stalking, where they follow you around into various chat rooms and harass you online. This can also be things like a hacker taking control of your computer or someone stealing your identity online. Everything can be destroyed by cyber criminals. They can wipe entire hard drives, steal your entire life and everything about it and essentially just mess with your entire world.
http://www.articlesbase.com/internet-articles/cyber-crime-cyber-criminals-and-prevention-575109.html
3. Cyber Terrorist
- hacker: a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
http://wordnetweb.princeton.edu/perl/webwn?s=cyber-terrorist
Monday, April 20, 2009
Because I LOVE YOU
Was it just by mistake that we met?
Or is it really meant to be?
To tell you honestly,
I want to see you everyday.
It hurts me when they say,
You're in love with someone already,
I know I could never take it easy,
Tears and heartaches really make me crazy.
I fervently pray to you Dear God,
To let yourself for my hidden LOVE,
time will come,
Our hearts and minds are intermingling as one,
Do love me not just for one,
BECAUSE I LOVE YOU my DEAREST ONE!!!
-cristal joy escaro-
Or is it really meant to be?
To tell you honestly,
I want to see you everyday.
It hurts me when they say,
You're in love with someone already,
I know I could never take it easy,
Tears and heartaches really make me crazy.
I fervently pray to you Dear God,
To let yourself for my hidden LOVE,
time will come,
Our hearts and minds are intermingling as one,
Do love me not just for one,
BECAUSE I LOVE YOU my DEAREST ONE!!!
-cristal joy escaro-
Scientific Love
So many times I tried my dear,
To simplify the way I feel,
To wonder in my world would mean,
The whole of what I feel.
I tried Physics and Calculus,
To evaluate those crazy thoughts,
I also tried Biology,
And attempted Chemistry.
I scanned it all on the drawing board;
To look and find for its magnitude,
But as I plotted the boundary,
I have extended to infinity.
So what I used was ALGEBRA;
To solve it all with a formula,
And through the aid of GEOMETRY;
I got the answer 143...
-valerie-
To simplify the way I feel,
To wonder in my world would mean,
The whole of what I feel.
I tried Physics and Calculus,
To evaluate those crazy thoughts,
I also tried Biology,
And attempted Chemistry.
I scanned it all on the drawing board;
To look and find for its magnitude,
But as I plotted the boundary,
I have extended to infinity.
So what I used was ALGEBRA;
To solve it all with a formula,
And through the aid of GEOMETRY;
I got the answer 143...
-valerie-
Friday, April 17, 2009
Are Informational Technology workers are professional?
Yes, they are professionals because they finish their degree to become profesional person in our society. They are those person who are responsible on program writing or designing system and etc where computer is involved. And they are also deals with the use of electronic computers and computer software to convert, store, protect, process, transmit, and securely retrieve information. Because in our modern world today, computers are the one who works in the some companies and everywhere. And also the school now are in the high-tech level and they will train their studenst well. They are also helping our country to become industrialized and progress.They are professional if they really know their profession, and also if they have the characteristics and qualities of being that. Because in that personality, it shown the integrity and dignity of person to become successful in his choosen career. If example the informational technology workers shown some ellicit actions they are not called professional because they have no ethics in their lives. They should love their work and undergo ethics training,cause it diminish their personality of being professional if they have a bad behavior and also they must love thierselves.
Tuesday, April 14, 2009
Ten Commandments of Computer Ethics
1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people's computer work.
3. Thou shall not snoop around in other people's computer files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people's computer resources without authorization or proper compensation.
8. Thou shall not appropriate other people's intellectual output.
9. Thou shall think the social consequences of the program you are writing or the system you are designing.
10. Thou shall always use a computer in ways that insure consideration and respect for your fellow humans.
Source: http://www.tekmom.com/tencommand/index.html
Courtesy of Computer Ethics Institute
2. Thou shall not interfere with other people's computer work.
3. Thou shall not snoop around in other people's computer files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people's computer resources without authorization or proper compensation.
8. Thou shall not appropriate other people's intellectual output.
9. Thou shall think the social consequences of the program you are writing or the system you are designing.
10. Thou shall always use a computer in ways that insure consideration and respect for your fellow humans.
Source: http://www.tekmom.com/tencommand/index.html
Courtesy of Computer Ethics Institute
Subscribe to:
Posts (Atom)