Sunday, 30 December 2012

additional assignment


1.    In the studies of Social Contract Theory ethical principle, the terms positive and negative rights are used. Compare and contrast these rights.

Social Contract Theory
“Morality consists in the set of rules, governing how people are to treat one another, that rational people will agree to accept, for their mutual benefit, on the condition that others follow those rules as well
Rights
positive rights
negative rights
Description
Obligates other to do something on your behalf, but may be restricted based on circumstances. Positive rights tend to be more limited.
Duty to guarantee that you will be left alone to exercise your rights, guaranteed without exception. Negative rights tend to be more absolute.
Examples
. Rights to free education. Government, teachers, admins must facilitate this right. Provided you meet the requirement set.
Freedom to observe religion practice


2.    Explain Identity Theft and provide example to support your answer.

Identity theft is a type of fraud which involves stealing money or gaining other benefits by pretending to be someone else. Having your identity stolen can be both financially and emotionally devastating. Identity theft can occur in many ways from somebody using your credit card details illegally to make purchases to having your entire identity assumed by another person to open bank accounts, take out loans and conducting illegal business under your name.
Identity theft works in a range of ways from crude methods to well organized scams.
Many of us have a wealth of personal information readily available cards in our wallet, mail, public records, information saved in our computers and information posted on social networking sites. Identity theft can happen easily and quickly. By leaving your personal information readily available, scammers will have easy access to this information. For example, scammers will pay people to rummage through rubbish tips and steal letters (‘dumpster diving’) to collect personal information. However, despite your best efforts, a determined scammer can also create elaborate and cunning plans to trick you into providing your personal details. For example:
  • By sending an email that looks like it comes from your bank, financial institution or telecommunications provider. Known as phishing scams, these emails are all about tricking you into handing over your personal and banking details to scammers. Most work by including special links in the email to take you to a combination of genuine and spoofed websites.
  • Phoney fraud alerts are similar to phishing scams where scammers trick you into handing over your personal details. A common fraud alert involves the scammer pretending to be from your bank informing you that your credit card or account has been cancelled because of suspicious criminal activity (various excuses are used). They will then trick you to provide account details to ‘confirm’ your identity.
  • Bogus job opportunities are usually posted on job websites. The scammer may use or sell your personal information provided in the job application.
Identity theft is a theft of key pieces of personal information to gain access to a person’s financial accounts.
The information that can be theft includes:
        Name
        Address
        Date of birth
        Social Security number
        Passport number
        Driver’s license number
        Mother’s maiden name
         Fastest growing form of fraud in the United States
         Lack of initiative in informing people whose data was stolen
         Phishing
        Attempt to steal personal identity data
        By tricking users into entering information on a counterfeit Web site
        Spear-phishing - a variation in which employees are sent phony e-mails that look like they came from high-level executives within their organization
         Spyware
        Keystroke-logging software
        Enables the capture of:
         Account usernames
         Passwords
         Credit card numbers
         Other sensitive information
        Operates even if an infected computer is not connected to the Internet
         Identity Theft and Assumption Deterrence Act of 1998 was passed to fight fraud

Example Identity theft
Florida Woman Sentenced for Tax Fraud and Identity Theft
on December 12, 2012, in Tampa, Fla., Belinda Brooks, of Tampa, was sentenced to 66 months in prison for stolen identity refund fraud. Brooks was also ordered to pay a money judgment of $118,882, the proceeds of Brooks' criminal activity. She pleaded guilty on May 25, 2012. According to court documents, Brooks stole the names and social security numbers of other individuals in order to file fraudulent tax returns in their names and obtain tax refunds for the tax years 2008 and 2009. In addition, Brooks filed a false tax return for herself.


3.    Describe 5 types of software piracy.

End User Piracy
People in a company reproduce copies of software without authorization. It includes 5 ways to pirate software.To install a program on multiple computers with only one license.Disk copying to install and distribute software;Update a new version of authorized software.Apply demo version or trial version software for commercial use.Exchange disks in or outside the workplace.
Client-Server Overuse
When one copy of a program is using at the same time in a workstation by lots of staffs in a company, there are chancesthat the software is stolen. The company has to authorized the right person and the limited number to use the programon the server.
Online Piracy
The more popular to download software through internet, the more easier to steal a copy of the software. The rulesthat apply to the actual purchase are not sufficient to stop the unauthorized copying.There are 3 ways to get pirated software from internet:
v  Some websites that specially provide free download or in exchange of uploaded software;
v  Internet auction sites that offer counterfeit, illegal-channeled, unauthorized software;
v  Peer-to-Peer network that enables unauthorized transfer of copyrighted programs.




Hard-Disk Loading
A business who sells new computers may load illegal copies of software into the hard disks to attract customers. Thesame concerns and issues apply to resellers that sell or install new software into computers in the workplace.
Software Counterfeiting
It is the illegal duplication and sale of copyrighted program by way of directly imitating the copyrighted software. Peoplecan find counterfeit copies of the CDs incorporating the software programs, as well as related packaging, manuals, license agreements, labels and registration cards.



4.      Explain the two types of digital divide.

The term “digital divide” originally represented the gap in computer ownership between different groups of people. While digital divide refers to the difference between social classes, global digital divide refers to a geographical division in terms of technological access.
v  The Global Digital Divide is a stumbling block inhibiting man’s technological progress. The internet allows for knowledge to be shared widely. A wide variety of talents are available for collaboration. Internet users currently only constitute fifteen to twenty percent of the world’spopulation. There is still a great deal of potential to be had by connecting the other eighty percent of the world. Programs such as the OLPC initiative and Inveneo will help to solve this, to some degree.

v  The social divide is the gap between the information rich and information poor within a society. The social divide can particularly be found in nations that are seen as being in the forefront of digital technological advancements, such as Australia, Canada and the United States. Unlike the digital divide the social divide focuses on the individuals within a specific society and how their access and use of the Internet differs.

Sunday, 4 November 2012

Group Member


Name: alhumaidi,meshari hamad
ID:IS085913
Hand-phone: 0192059096


Name: Mohd Azwan Hafiz Bin Musa 
ID: SW086579
Hand-phone: 0176958955


Name:alrefaei ali 
ID: IS082798
Hand-phone: 0142323162 



Name: mohame ali babiker
ID: SN084842



Name: Ahmad Ibrahim
ID: IS086924
Hand-phone:0129065931




Name: Muhammad khusyairi bin mahazir

ID: SN086684
Hand-phone:0196225135

society’s ethical stance on the use of CCTV in public place


1.0   The concept of CCTV and how is the CCTV work:

Closed Circuit Television, also known by the acronym CCTV, is a private or closed video system where viewing of the video is restricted to a specific group of individuals. Systems can range in size from being within a single building, to a complex of buildings, to large campuses and city centers, and can even span across a continent. Such monitoring of areas and/or activities may be used for security, safety, industrial, or private purposes. The visual images created by a CCTV system may be viewed while an event is happening or recorded for ‘after-the-fact’ review either on-site or off-site. Review is done via the use of VHS videotapes, CD, DVD, and/or other such tape or computer based mediums. Such reviews of prerecorded visual information may also be done ‘remotely’ through the use of telephone lines, fiber optics, microwave, the internet, and/or a host of other such transmission methods according to the design and complexity of the CCTV system. CCTV is a visual surveillance technology designed for monitoring a variety of environments and activities all at the same time. CCTV systems typically involve a dedicated communications link between cameras in the field and monitors at one or more control centers. Systems can be made up of technically mature analog cameras and image storage devices, or newly developed digital cameras and image storage devices, or a mix of the two technologies. CCTV systems may provide real-time, time-lapse, event, or digitally recorded surveillance information to help in detecting, responding to, investigating and providing evidence for security, safety and related incidents. A CCTV system may also be used to prevent security breaches by allowing security personnel to monitor access control systems at entry points to secure areas. A CCTV system usually involves a linked system of cameras able to be viewed and operated from a series of control rooms and/or a central point of operation. Cameras come in many configurations, but can be classified under two general categories; stationary and moving. Stationary cameras are pointed at a specific scene of interest, such as a hallway, and broadcast that one scene to the control site 100% of the time. Stationary cameras can be adjusted to compensate for the specific lighting conditions of that scene. Stationary cameras can be fully exposed, or contained within a large variety of enclosures designed to meet the specific requirements of that site, such as discreteness or vandal resistance. Moving cameras, commonly called PTZ (for pan, tilt, zoom) allow a system operator to move the camera by remote control to follow an object of interest, such as a person or a car, over a large area of interest. This is typically done by use of a joystick in the control center that provides side to side (pan), up and down (tilt) and zoom control. PTZ devices can also be programmed to move in user-defined PTZ sequences to provide general surveillance of areas of interest. PTZ devices can be further programmed to automatically move to areas of interest, such as when a door or gate opens, or when motion is detected. Because the camera can be aimed at scenes with different lighting conditions, these cameras typically have many automated adjustments, such as auto focus and auto iris to keep the image optimized for accurate viewing. Some systems may involve sophisticated technologies or electronic interfaces such as; night vision or low light cameras for operations at night; computer-assisted operation; interfacing with electronic alarm systems; interfacing with electronic access control systems; and much more. For example, a camera that is integrated with a motion detection system would enable alerted security staff to remotely investigate potential security incidents from a central control center as the event is happening. Other sophisticated CCTV systems incorporate technologies that make possible features such as the multiple recording of many cameras, in different locations. CCTV is also sometimes used to capture images for a facial recognition biometric system.
2.0 The impact of CCTV on society:

CCTV systems have proven to be essential tools in most any surveillance and security application. Just a partial list of applications includes banking, retail, hospital, traffic management, and city centers. In all of these applications, video cameras are used as visual tools of the security staff or security design. CCTV systems greatly increase the geographic areas that can be covered by one security professional. No longer is long, arduous guard tours needed, requiring an individual to walk or drive long distances to provide security. And once an event has transpired, video can be used for investigation and evidence in criminal and civil liability cases. The installation of CCTV security systems thus provides a large deterrence to unlawful activity, and provides a strong sense of security to patrons of facilities that use CCTV. Due to great advances in the controlling or manipulating interfacing systems, video systems can be automated to great degrees. Another impact of CCTV is on monitoring and controlling traffic in the city, the traffic control cameras are used for traffic monitoring only and help us to assess the efficiency of the system and to make any necessary changes quickly. Also, during unusual circumstances such as a traffic accident, a significant breakdown on a busy road, or an event like the Grand National, the system operators can take control of signals and operate them manually from the control centre.  This would be impossible without the help of the cameras.

CCTV assistance in controlling the traffic signals around any city during Grand National event.  With the ability to see all approaches to the various junctions we can manage the traffic more effectively than officers on the ground because of their limited visibility. In other hand, to protect the privacy of individuals, advanced CCTV systems are available with many features designed specifically for this need. PTZ camera systems can be programmed so that specific areas of the viewed scene are overlaid with opaque shapes to prevent viewing of non-public areas, such as into homes through their windows. In addition, control systems can be configured so that only specific security professionals can view video from specific cameras that may be viewing “sensitive” scenes. The net result or effectiveness of any/all CCTV systems is determined by the sophistication of the interfacing modules and to the extent that the system is designed as a visual tool for the security team.

3.0  Ethical stance of CCTV:

According to the rule of act utilitarianism indicates that if the action done accepted in morality and gives benefits for everyone, the action should be acceptable. So, the use of CCTV is an ethical because the majority will be happy and will earn the benefit of using the CCTV.

Many have argued that the act of public video surveillance itself is an invasion of the right to privacy. But most tolerate it as a minor inconvenience they must deal with in order to experience the benefits and assurance gained from the added security achieved. For this reason, video surveillance in public spaces must ensure that:
  • ·      It doesn’t not intrude to an unreasonable extent the recording of an individual’s personal affairs;
  • ·      Efforts should be taken not to include monitoring and recording of private residences or at least seek consent from owners of residence if it is within the camera view; and
  • ·      Cameras are not placed at public facilities such as inside public toilet facilities.

As a guide, consideration is given to allocate video surveillance cameras at the following public spaces:
  • ·      Identified crime hot spots;
  • ·      ATMs and banking institutions;
  • ·      Licensed premises;
  • ·      Bus stops, taxi ranks, car parks and railway stations; and
  • ·      Places frequented by potentially at risk groups such as elderly and young people.