Wednesday, May 13, 2009

Intellectual Property and Intellectual Property Rights

Intellectual property (IP) - are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets.

The majority of intellectual property rights provide creators of original works economic incentive to develop and share ideas through a form of temporary monopoly.

Although many of the legal principles governing intellectual property have evolved over centuries, it was not until the late 20th century that the term intellectual property began to be used as a unifying concept.

Source: http://en.wikipedia.org/wiki/Intellectual_property


Intellectual Property Rights - means trade and service marks (whether registered or unregistered), registered designs, design rights, copyrights, and any other intellectual property or other rights or any other similar rights in any jurisdiction in the world.

Source: www.fuschiadesigns.co.uk/terms-conditions-i-11.html

Sunday, April 26, 2009

1. Definition of Perpetrator?
- One who perpetrates; esp., one who commits an offense or crime.
Source: http://www.allwords.com/word-perpetrator.html
- Is the robber, assailant, counterfeiter, etc. -the person who actually committed the crime. The distinction between suspect and perpetrator recognizes that the suspect is not known to have committed the offense, while the perpetrator [who may not be a suspect yet] is the one who actually did. The suspect may be a different person from the perpetrator, or there may have been no actual crime, which would mean there is no perpetrator.


2. Definition of Cyber Criminals?
- A person who gains illegal entrance into a computer system or who diverts financial transfers into his or her own account.
Source: http://www.pcmag.com/encyclopedia_term/0,2542,t=cybercriminal&i=40630,00.asp

- A crime is committed online via emails, or chatrooms or any other form of interaction that can take place online. It does not vary much from same criminals misconduct committed in real life.

Cybercrime can take the form of cyber stalking, where they follow you around into various chatrooms and harass you online. This can also be things like a hacker taking control of your computer or someone stealing your identity online. Everything can be destroy by cybercriminals. They can wipe entire hard drives, steal your entire life and everything about it and essentially just mess your entire world.
Source: http://www.articlebase.com/internet-articles/cyber-crime-criminals-and-prevention-575109.html

3. Definition of Cyberterrorist?
-Hacker-- a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
Source: http://wordnetweb.princeton.edu/perl/webwn?s=cyber-terrorist
- is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic.
Source: http://en.wikipedia.org/wiki/Cyberterrorism

Monday, April 20, 2009

Our Beautiful Relationship

When I was younger I dreamed
how a relationship should be
a sharing goals
and lives
a love so strong that
it is always exciting and growing
a blending of two imperfect individuals
into stronger, better people
who laugh more, accomplish more
are happier, more successful
and more at peace...

My dream came to be
because you had the same
dream as I
and I want you to always know
how thankful I am
for our BEAUTIFUL RELATIONSHIP
and how much
I LOVE YOU
-Susan Polis Schutz

Friday, April 17, 2009

My Princess

My princess embrace grabs hold
of something deep within my soul.
Her magic touch soothes my heart
and fills an empty hole.

My princess kisses are so soft and gentle,
more exquisite than fine wine.
Her slender fingers course through my hair,
sending shivers down my spine.

My princess gaze I dare not meet too long,
although it may be bliss.
For in her eyes of ocean blue,
I may fall into the abyss.

My princess an earth bound angel,
whose wings she had to shed.
If my princess be my true love,
then my true love has a very nice smile.

Wednesday, April 15, 2009

Are Information Technology workers (IT) are professional?

Yes, because if we finished our profession and if we will use it for good we will become professional. Almost of the Information Technology workers are knowledgeable of what they are doing or creating a software or a program. In actuality, information technology is the use of computers and software to manage information. Now a days the IT workers is professional because they have a big influence in our society. The Information Technology program has been done in order to create an IT professional. In this field this profession requires a lot of training or program in order to have a big knowledge in the profession he or she took. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems. IT workers are really professional because if there is a virus that's had been made by some person, they can create an anti-virus so that the virus will be gone. IT workers are professional because they have a big role in our community because many businessman use e-mail and without it maybe it will be so hard for them. In this day computers are almost everywhere in our society, it helps the people to make their works become easier.

Monday, April 13, 2009

Ten Commandments of Computer Ethics

1. Thou shall not use a computer to harm other people.
2. Thou shall not interfere with other people's computer work.
3. Thou shall not snoop around in other people's computer files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people's computer resources without authorization or proper compensation.
8. Thou shall not appropriate other people's intellectual output.
9. Thou shall think the social consequences of the program you are writing or the system you are designing.
10. Thou shall always use a computer in ways that insure consideration and respect for your fellow humans.

Source: http://www.tekmom.com/tencommand/index.html
Courtesy of Computer Ethics Institute