Monday, 19 March 2012

Part 2 : The Case Study



 

Muhammad Izzat Farid bin Musaddin
Sw 083270
Question : 1
Muhammad Khairi bin Noor Hazizi
Is 081746
Question : 2
Muhammad Hazwan bin Kamarudin
Gm 083818
Question : 3
Muhammad Khaidzir Shah Bin Hizar Shah
Gm 083341
Question : 4

Wednesday, 7 March 2012

Chapter 6 Assignment 2: Email Spam


Email SPAM – Group 1 


What is it? What is the main purpose of sending it?

What is it?
Email spam, which is also called junk email or unsolicited bulk email (UBE), is a form of electronic spam involving nearly identical messages sent to numerous recipients by email. Definitions of spam usually include the aspect that email is unsolicited and sent in bulk. Email SPAM is a message that is sent to a large group of individual with a purpose to force the message onto people who have no other choice to receive it.

Purpose sending it:
The purpose of this Email SPAM is for advertizing. Most companies use this method to spread their products and offers by putting the Email with a URL to their website. Email SPAM is also used for frauds and scam. Some people use this Email SPAM to trick people into giving money by making people entering their personal on a fake Web site using email forged to look like email from bank and formal organization so that people will enter their personal information. There are also a type of scam where people make advance payment for a product but never gets it.


1. How the sender gets the email address?

There are a few method that the sender can use to get email address which is they collect the email addresses from chatrooms, website, customer lists, newsgroups, and viruses which harvest users address book. Some might even but it from other sender. Sender also use a method known as “email appending” or “epending” where known information about their target (such as postal address) is used to search for targets email address.


2. CAN SPAM Act of 2003

CAN SPAM Act of 2003 stand for “Controlling the Non-Solicited Pornography and Marketing Act of 2003”. This bill content does not legitimize email spam but it pre-empt laws that allow easier prosecution and rights to private action. The content of this bill permits senders to send email as long as it follows the 3 basic rules of defined in the CAN SPAM Act of 2003 which is unsubscribe compliance, content compliance and behaviour compliance. There is also no restriction against a company to send email to existing customer or anyone that has inquired about their companies’ product. With this bill, senders do not require permission to send marketing messages or advertisements. It also prevents the receiver from suing the sender.  Receivers of email can choose not to receive more email form the companies and the companies will be given 10 day to cease sending more emails. This also prevents the companies from selling or transferring the email address of the receiver that choose this option. CAN SPAM Act prohibit sending sexually-oriented spam without the label later determined by the Federal Trade Commission (FTC) of "SEXUALLY EXPLICIT." It also disallow email with falsified header information and email that contain hacking possibilities such as harvesting, dictionary attacks, IP address spoofing, hijacking computers trough Trojan horses or worms.



The following are the contents of CAN SPAM Act of 2003:
Unsubscribe compliance
§ A visible and operable unsubscribe mechanism is present in all emails.
§  Consumer opt-out requests are honoured within 10 days.
§ Opt-out lists also known as Suppression lists are only used for compliance purposes.

Content compliance
§ Accurate from lines (including "friendly forms")
§ Relevant subject lines (relative to offer in body content and not deceptive)
§ A legitimate physical address of the publisher and/or advertiser is present.
§ A label is present if the content is adult.

Sending behaviour compliance
§ A message cannot be sent through an open relay
§ A message cannot contain a false header

Content is exempt if it consists of:
§ Religious messages
§ Political messages
§ Content that broadly complies with the marketing mechanisms specified in the law
§ National security messages.


3. Discuss the act of SPAMing from the perspectives of Kantianism

Scenario

Company A give advertisements to user who browse through websites. So what the company does is create a webpage which will pop out or will be triggered when user clicks the link of the created website by Company A. In the webpage, user will be asked to key in their phone number. This is based on the advertisement created where the first 500 people who submit their phone number will receive a grand prize which is one unit of Iphone and one unit of Ipad.
When user keys in their phone number, the following will occur:
In an unethical way, the company will use the user’s phone number to gain personal information of the user such as name, housing address and even their email. This could lead to loads of problems. Bear in mind that spamming is a kind of method that can be used to advertise while doing unethical activity to gain personal benefit.
Based on the 2nd formulation of the Kantianism theory, the activity done by Company A is considered to be unethical. This is because the company uses other people for their own benefit. We can see that the company attracts user’s attention by giving out valuable rewards or prizes to people who are considered the first 500 people to submit their phone number. We can say that company is using other people for their benefit which relates with the 2nd formulation of the Kantianism theory.


Additional Note:
We have left our comment at cisb412jan2012s1g9.blogspot.com/

Saturday, 25 February 2012

THE IMPORTANCE OF ETHICS AMONG IT PROFESSIONALS

1.      INTRODUCTION
We are living in an era where technology is not an unfamiliar thing in one’s life. People at work are using internet for the benefit of obtaining information to complete their daily tasks. Ethics is an important matter in a workers life where it helps in avoiding unethical activities such as hacking and plagiarism to happen. Employees must know what they should and should not do during work. That is why teaching ethics to workers are important since it would bring benefit for the company in terms of productivity.

What is ethics? The definition of ethics by thefreedictionary.com is the rules or standards governing the conduct of a person or the members of a profession. DrResnik(2010) mentions that ethics is a method, procedure or a perspective for deciding how to act and for analyzing complex problems and issues. In other words, ethics is a proper guideline for an employee to refer to and to adhereduring working hours.

Ethics can be a manual to be applied by anyone regardless his or her occupation. Being ethical is an important factor for success among IT workers. Dealing with clients is an example of a situation where IT workers or professionals should be ethical about in a software development point of view. Without ethics inan IT worker, requirements might not be defined clearly thus increasing the possibility of amplifying the damages towards the product.



2.      THE IMPORTANCE OF ETHICS AMONG IT PROFESSIONALS
As mentioned above, ethics is important without regard of one’s field of professionalism. Ethics is very important among IT professional.
With ethics being applied among IT professionals, the process of working together can be improved. IT professionals can create strong bond among members thus producing a better teamwork. DrResnik(2010) mentions in his article:
“ethics is important since research often involvesa great deal of cooperation and coordination among many different people in different disciplines and institutions, ethical standards promote the values that are essential to collaborative work, such as trust, accountability, mutual respect, and fairness.”

In completing a job or work that involves collaboration of other people, requires teamwork. Without teamwork the job will not be done in time since the task has dateline. Being fair in giving tasks by the leader is also a must in collaborative work.  Leaders of IT team must not be discriminative among members in terms of race, age, sex and other factors.

Ethics is applied to almost all type of work in this world. Without ethics, all works will be unorganized, and will cause chaos an organization. To understand ethics, we need to understand the definition of the words itself. Ethics by definition is a moral code, set of rules. It is created to establish boundaries of generally accepted behavior. Different rules often have contradictions. It touches the morality aspect which on social conventions about right and wrong. Now we understand why ethics is crucially important to a working environment. It can bring huge advantage to the organizations and at the same time can bring chaos. It is a high priority issues that need to be address to the employees and cannot be taken lightly.

To IT professionals, ethics is a must. Establishing a code of ethics for information technology professionals encourages an IT worker to behave ethically and responsibly with the tools and information of which his employers have put him/her in control. Information is power. Computers are devices that have some of the most personal information and useful program in them. Some of the issues surrounding ethics for IT professionals include workplace computer use, computer related crimes, privacy, intellectual property and professional responsibility.
A code of ethics reminds IT professionals that they are not to impede or manipulate pre-authorized access to the information or hardware of which they are in control. Without the authorizations of the management, IT professionals can’t just easily use their level of knowledge hacking into the company confidential profile and use it for their own benefits like sell it to other company and get money out of it. They also can’t just simply their skills to pull prank to other people for their own amusement, like hacking into other employees account on Facebook or Twitter.

Ethics also helps in preventing the IT professionals from behaving in a malicious or harmful manner with company information and equipment. IT professionals should act like a true professional who has swear to protect the information of the company not doing unethical activities which could lead to problems for companies. Hacking is an example of an activity where breaks into computers to obtain data for their own benefit.According to Bynum(2008), a risk to computer security are people called hackers who breaks into an individual’s computer system without permission.  One of the IT professional’s job is to maintain the confidentiality of data not hacking into computers to steal or manipulate them. The equipment also must be taken care in good manner, not vandalize it with their emotions or anger or use it harm other people.

 A code of ethics helps motivate an IT professional to stay current in his/her chosen skill set in order to be more effective on the job for her employer. A motivated IT professional should also be encouraged to learn new skill sets as technology changes. IT professionals have the responsibility, to serve the interest of their employers and their clients with loyalty and diligence.

Thus, ethics is very important for any workers especially to IT professionals to follow in order to maintain their reputation as professionals and for the sake of their employer’s organizations.  The Associations of Computing Machinery (ACM) states that “The future of the computing profession depends on both technical and ethical excellence.” Ethical in information technology needs to be practiced in order to combat the increase incident of computer misused. To develop ethical practice issues among IT Professional and to minimize computer misused, an analysis will help them a lot because from the analysis they will know what they supposed to do and what they suppose not.

The question here is why fostering good IT business ethics is important? It is to gain the goodwill of the community meaning here is to have a good remark upon all of the people. The good reputation can be preserved and the business operation can be performed without any hardship.

Reynolds (2007) mentioned in his book that goodwill that socially responsible activities create can make it easier for corporations to conduct business.

Practicing ethics in a company can create an organization that is being able to operate consistently. By operating a company with honesty, integrity and to stay true to corporate principles is effective to a business to be able to gain trust among co-workers, this could improve the business operation greatly.

Reynolds (2007) also mentioned that good ethics can mean good business. From what it says here, practicing good ethics can contribute to producing safe and effective products, a company could avoid costly recalls and lawsuits. Ethics in business can affect the service of the business towards more positive approach thus the business can maintain its customer and to gain even more customer in the future.




3.      Conclusion
From all of the research that we have done we can conclude that it is not appropriate to judge it simply by saying it is ethical or it is unethical in an IT society. The issues here is very subjective things that a person think is ethical might actually be unethical to others depending on the situation and a person's characteristic.

Practices of ethics in an organization could allow more professionalism in doing a certain business operation whereas attitude plays an important role in maintaining or even improving customer relationship or even with co-workers. Moderation also is important to maintain the ethical practices over doing things might be considered as offense to others.

However despite all of these, Ethics is an important aspect to be implemented in an IT environment to remark a good impact.
References
[1] Definition of ethics - "http://www.thefreedictionary.com/ethics"
[2] Resnik, D, 2010, What is Ethics in Research & Why is it Important?, National Institutes of Health. Retrieved 21 Feb 2012 from
[3] McBride T,2010,The Importance of a Code of Ethics for ITProfessionals, Retrieved 21 Feb 2012from http://www.ehow.com/facts_6060876_importance-code-ethics-professionals.html
[4] Romo S, Importance of a Code of ethics, Retrieved 21 Feb 2012 from
[5] Reynolds G,2007, Ethics in Information Technology, 2nd Edition, Retrieved 21 Feb 2012from
[6] Bynum T, 2008, Computer and Information Ehtics, Retrieved 21 Feb 2012 from


Video Presentation:


Monday, 20 February 2012

Group Introduction

Muhammad Khairi bin Noor Hazizi
Is 081746

Muhammad Izzat Farid bin Musaddin
Sw 083270














Mohammad Idnaan bin Yazid
Is 083330
  
Muhammad Hazwan bin Kamarudin
Gm 083818

 
Muhammad Khaidzir Shah Bin Hizar Shah
Gm 083341