Sie sind auf Seite 1von 40

Legal, Ethical, &

Societal Issues in
Media & Information
REPUBLIC ACT NO. 10175
CYBERCRIME PREVENTION ACT OF
2012
is a law in the Philippines approved on September 12, 2012
which aims to address legal issues concerning online
interactions and the Internet. Among the cybercrime
offenses included in the bill are cybersex, child
pornography, identity theft, illegal access to data and libel.
What is Cyber?
“Cyber" is a prefix used to describe a
person, thing, or idea as part of the
computer and information age. Taken
from kybernetes, Greek for
"steersman" or "governor“.
CYBERSPACE
Cyberspace refers to the virtual
computer world, and more specifically, is
an electronic medium used to form a
global computer network to facilitate
online communication. It is a large
computer network made up of many
worldwide computer networks that employ
TCP/IP protocol to aid in communication
and data exchange activities.
Cyberspace's core feature is an
interactive and virtual environment for
a broad range of participants.
CYBERCRIME
Cybercrime is any criminal activity
carried out using computers or the
internet.
Cybercrime uses tools like phishing,
viruses, spyware, ransom ware, and
social engineering to break the law.
CYBERBULLYING
Cyberbullying or cyberharassment is a
form of bullying or harassment using
electronic means. Cyberbullying is
when someone, typically teens, bully or
harass others on the internet,
particularly on social media sites.
Harmful bullying behavior can include
posting rumors, threats, sexual
remarks, a victims' personal
information, or pejorative labels (i.e.
hate speech). Bullying or harassment
can be identified by repeated behavior
and an intent to harm.
Hacking
Hacking generally refers to unauthorized
intrusion into a computer or a network.
The person engaged in hacking activities
is known as a hacker. This hacker may
alter system or security features to
accomplish a goal that differs from the
original purpose of the system.

Hacking can also refer to non-malicious


activities, usually involving unusual or
improvised alterations to equipment or
processes.
Phishing
Phishing is a type of social engineering
attack often used to steal user data,
including login credentials and credit
card numbers.
It occurs when an attacker,
masquerading as a trusted entity,
dupes a victim into opening an email,
instant message, or text message. The
recipient is then tricked into clicking a
malicious link, which can lead to the
installation of malware, the freezing of the
system as part of a ransomware attack or
the revealing of sensitive information.
Illegal
Downloading
Illegal downloading is obtaining files
that you don't have the right to use
from the internet. Digital piracy
involves illegally sharing copyrighted
media such as games, music, movies,
TV shows and software.
Identity Theft
Identity theft, also known as identity
fraud, is a crime in which an impostor
obtains key pieces of personally
identifiable information, such as
Social Security or driver's license
numbers, in order to impersonate
someone else.
Cyber
Defamation
It is an unprivileged false statement of
fact which tends to harm the
reputation of a person or company.
2 TYPES OF DEFAMATION:
Libel – written
Slander - verbal
COPYRIGHT
Copyright is the exclusive right given
to the creator of a creative work to
reproduce the work, usually for a
limited time. The creative work may be
in a literary, artistic or musical form.
Copyright is intended to protect the
original expression of an idea in the
form of a creative work, but not the
idea itself.
Copyright owners have the right to
control the reproduction of their work,
including the right to receive payment
for that reproduction.

Violation of a copyright is called


infringement.
PLAGIARISM
an act or instance of using or closely
imitating the language and thoughts
of another author without
authorization; the representation of
that author's work as one's own, as by
not crediting the original author
FAIR USE
Copying of copyrighted material
done for a limited and
“transformative” purpose, such as to
comment upon, criticize, or parody a
copyrighted work. Such uses can be
done without permission from the
copyright owner.
Computer
Addiction
The excessive use of computers to
the extent that it interferes with daily
life. This excessive use may for
example interfere with work or sleep,
result in problems with social
interaction, or affect mood,
relationships and thought processes.
Digital Divide
An economic inequality between
groups in terms of access to, use of,
or knowledge of ICT. The divide
within countries can refer to
inequalities between individuals,
households, businesses, and
geographic areas at different
socioeconomic (and other
demographic) levels.
Virtual Self
The “Virtual Self” or the virtual
representation of an individual over
a new media, particularly the
internet that is being used by an
individual to traverse a virtual common
space.
Netiquette
observing proper etiquette or
behavior as you engage in activities
over the internet.

Das könnte Ihnen auch gefallen