Sunday, 23 December 2012

Final Task



Question 1

In social contract theory, there discussion about negative right and positive right. Negative right is acknowledgement by other people that you can exercises your right at free will. Example of this right is freedom of worship, and private properties. Meanwhile, positive right is a obligation by others to do something on your behalf, but may be restricted based on circumstances. This meaning that, others must the right for once you qualified for the right. Example of this right is military and police protection from violent, health care, and public education. Thus, by comparing the meaning of these rights, both rights are protecting and benefiting to your social care. However, this both can conflicting each others such as a thief may have a negative obligation not to steal, and a police officer may have a negative obligation not to tackle people, but a police officer tackling the thief easily meets the burden of proof that he acted justifiably, since his was a breach of a lesser obligation and negated the breach of a greater obligation.[1]


Question 2

Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held accountable for the perpetrator's actions. Identity theft occurs when someone uses your personally identifying information, like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes. [2]

Example of identity theft:

  • Medical identity theft
    Medical identity theft occurs when someone seeks medical care under the identity of another person. In addition to risks of financial harm common to all forms of identity theft, the thief's medical history may be added to the victim's medical records. Inaccurate information in the victim's records is difficult to correct and may affect future doubt or cause doctors relying on the misinformation to deliver inappropriate medical care.
  • Criminal identity theft
    When a criminal fraudulently identifies himself to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented fake ID. 

Question 3

5 types of software piracy:
  1. Soft-lifting
    purchasing a single licensed copy of software and loading it onto several computers contrary to the license terms. For example, sharing software with friends, co-workers and others.
  2. Uploading and downloading
    making unauthorized copies of copyrighted software available to end users connected by modem to online service providers and/or the Internet.
  3. Software counterfeiting
    illegally duplicating and selling copyrighted software in a form designed to make it appear legitimate.
  4. Hard disk loading
    Installing unauthorized copies of software onto the hard disks of personal computers, often as an incentive for the end user to buy the hardware from that particular hardware dealer.
  5. Renting
    Unauthorized selling of software for temporary use, like you would a video.



Question 4

2 types of digital divide: [3]


  • The digital divide of first degree is a material matter: the absence of physical access to a computer or the internet.
  • The digital divide of the second degree: the social imbalance created by differences in acquired computer skills. 





References:
[1] http://en.wikipedia.org/wiki/Negative_and_positive_rights
[2] http://en.wikipedia.org/wiki/Identity_theft
[3] http://www.samenlevingentechnologie.be/ists/en/projects/allprojects/digital_divide.html

No comments:

Post a Comment