Friday, March 21, 2014

Experience In Our Group Case Study

My experience in our case study

Our teacher give to us a topic, a topic named malware or malicious software.  In this topic we come up with the case of a software which target is to spam users. This software is created to create multiple task a multiple task which can harm users. This software targets a social networking site namely Twitter. And this software was created by a Filipino company they named this software as TweetAttacks pro.
                I’ve learned many things about our topic. First, I learned what is malware or malicious software, what those types of malware are, and how they attack. In this topic I’ve come up with a verdict, a verdict that I wouldn’t trust any software that bring those types of malware and software that can harm myself or others. My group and I, we learn that this software was violated many rules like in the terms of service of Twitter, in the ten commandments of computer ethics, on the ACM code of conduct and also to the Republic of the Philippines Law. And then we come up a recommendation to twitter. We therefore recommend that twitter must strengthen their internet defenses and look out for possible spammers. And also look out for offenses that may occur this time because cybercrime law has been passed and for that, internet offenders will be punished when they commit crimes over the internet.

                I therefore conclude that we should know first what we are downloading software, know how it is works, and who is the developer of this software and if this developer or the company reliable? So that we can avoid this kind of case. And don’t ever download a software that can harm other people. And don’t create a software who can manage a crime.

Wednesday, January 1, 2014

Ivory Snow Theory and Releasing Untested Software

In this Ivory Snow Theory states that software (Robotics) are 99 percent pure. It is not a good for the developers to rely on what this theory states. Relying into this theory doesn’t mean that software is not necessary for the testing part. Developers must take to consider the importance of testing in order to know unnecessary things to be fixed before releasing the project (software). This might not devastate the name of the developers but to the company you work on too if there are troubles arises on the software. In this case, do not depend on what a theory says but rather to the result of the test. Therefore, test first before release.                 

Egoless Programming: What if my boss is Randy Samuels?



What if my boss is Randy Samuels? In the first place, a boss should be an open-minded. Listen to your members. There must be an equal say in the decision making process. An effective boss do accepts criticisms. Being faulty is nothing but natural. Without any mistakes happen, you can no longer correct it or better, to improve it. Accept fallibility. In a work, developing software for instance, one must set aside being task-oriented personality. You must get rid of the word “individuality” for the other members not make distance and will not be difficult to others to communicate their concerns and speak what on their minds and there must be openness between each other. In case of Samuels capability it will be good to work with him because of his compassionate in programming aspects. It will be easy for the team to finish project immediately in the sense that the boss and the entire team as a whole fits within each attitudes in programming aspects.

Sunday, December 8, 2013

Code of Conduct...

        
            As a user of computer, there are behavior I should know. Rubrics of being computer user and I should know my precincts and the right manners in using computer. Every one of us must know this behaviors.

  • Be responsible when communicating other people in the Internet.

Be responsible when communicating other people in the Internet. Use appropriate language to the people you were talking online, respond in suitable manner, allow others freedom for their own opinions. Behave properly online.
It is important to stick to the standard of behavior online (or even offline) that you follow in real life at all times.

  • Don’t take advantage to the free software.

Don’t abuse the free software. Even it is said to be free it doesn’t mean that you will distribute it or share it to others.

  • Protect other people(s) privacy.

Don’t distribute to someone else private personal information. Be responsible for someone privacy, it may subjected to unwanted actions or unwanted things and it may subjected to immoral actions in cyber space like cyber-bullying.

  • Respect copyrights.

Respect others work. Technology is said to be easy to borrow by other people(s) work, to use on their own good. While fair-use laws allow people to use small snippets articles. It is vibrant to clearly identify the author who work it and the source where we get it from.


          As a user(s) we need to recognize and practice responsible and appropriate use while accessing, using, and collaborating computer. We need to understand and follow acceptable use guidelines. Practice naming sources of text and digital information and make informed decisions. Recognize the signs and emotional effects, the legal costs and effective clarifications for Cyber-crimes.