Angelica O. Morillo Bped-2A Assignment

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Angelica O.

Morillo
BPED-2A
Assignment:
Research and discuss the following social and legal issues and provide at least 1 case scenario
for each:

1.1.Online Fraud and Scam

FRAUD
- is huge concern for public by definition involves an element of DECEIT.
-so the victims feel betrayed and embarrassed the things that happen to them.

Online fraud and scam refer to the use of the internet to deceive people into providing sensitive
information or money. It is a form of cybercrime that has become increasingly common in recent
years, as more and more people rely on the internet for various activities such as online
shopping, banking, and socializing.

There are numerous types of online fraud and scam. One of the most common is phishing, where
criminals create a fake website or send emails that appear to be from a legitimate source such as
a bank or online retailer. They then trick people into providing their personal information such as
passwords, credit card numbers, and social security numbers.

Another type of online fraud is identity theft, where criminals steal personal information and use
it for fraudulent purposes such as opening new credit accounts or making purchases in the
victim's name.

To avoid falling victim to online fraud and scam, it is important to be cautious when providing
personal information online. Always use secure websites that have a padlock icon in the address
bar and watch out for suspicious emails or messages asking for personal information. It is also a
good idea to use strong passwords and to monitor your credit reports regularly to detect any
unauthorized activity.

Top SCAMS

 AGENCY – people receive phone call and they are pretending to be a police or member
of agency of a company, bank account, sim card, and etc. They are pretending a good
human and concern about your important information or privacy.
Senario:
-Someone sent you a message with your cellphone number and you don't know who it is, and
what is written in the message is "Hello Ms. Angelica O. Morillo CONGRATULATIONS!!! you
have won 1,000,000.00 pesos in the lottery ticket, just press this link to find out if how do you
get what you won. (But the truth is they will only take the important information of a person
that when you click on the link given to you, what will appear is that you must first log-in your
bank account where they can open it and take the money and what you thought you had they
will deposit the money into your bank account.)

1.2.Online Propaganda: Disinformation and Online


Trolling
- Online propaganda is a term used to describe the use of internet platforms to spread false
information or influence public opinion. Disinformation and online trolling are two common
tactics used in online propaganda.

Disinformation involves the spread of false information with the intent of deceiving people or
manipulating their opinions. It can be spread through social media, news websites, or other
online platforms. Disinformation can be particularly dangerous when it is used to influence
political elections or public health issues.

Online trolling, on the other hand, involves intentionally posting inflammatory or offensive
messages to disrupt online conversations. Trolls may use insults, threats, or other tactics to
provoke emotional responses from other users. This can make it difficult for people to have
productive conversations online.

Both disinformation and online trolling can have a negative impact on society by creating
confusion, sowing discord, and undermining trust in institutions. It is important for individuals to
be aware of these tactics and to take steps to verify information before sharing it online.
Additionally, social media platforms and other online communities can implement policies to
combat disinformation and online trolling.

Scenario:
-Posting personal insults meant to humiliate you in front of others in the discussion. Increasing
verbal aggression when the victim responds. Making unbelievable, outrageous, and ridiculous
statements designed to upset others. Using racist and misogynistic language or making “hate
speech” statements.

1.3. Online Prostitution: Sexting and Pornography

- New technology has made pornography increasingly accessible to young people, and a
growing evidence base has identified a relationship between viewing pornography and violent or
abusive behavior in young men. This article reports findings from a large survey of 4,564 young
people aged 14 to 17 in five European countries which illuminate the relationship between
regular viewing of online pornography, sexual coercion and abuse and the sending and receiving
of sexual images and messages, known as “sexting.” In addition to the survey, which was
completed in schools, 91 interviews were undertaken with young people who had direct
experience of interpersonal violence and abuse in their own relationships. Rates for regularly
viewing online pornography were very much higher among boys and most had chosen to watch
pornography. Boys’ perpetration of sexual coercion and abuse was significantly associated with
regular viewing of online pornography.Viewing online pornography was also associated with a
significantly increased probability of having sent sexual images/messages for boys in nearly all
countries. In addition, boys who regularly watched online pornography were significantly more
likely to hold negative gender attitudes. The qualitative interviews illustrated that, although
sexting is normalized and perceived positively by most young people, it has the potential to
reproduce sexist features of pornography such as control and humiliation. Sex and relationships
education should aim to promote a critical understanding of pornography among young people
that recognizes its abusive and gendered values.
Scenario:
There are people who use apps that are trending today such as LITMATCH, OFO, and etc.
Where you can talk to different people even if you don't know if you're looking for love life or
you want someone to talk to that ends up with what conversation is happening in your
exchange chat. Someone will ask how old you are, where you're from and how many boyfriends
you've had and if you've had experience kissing and having sex before and that's when the two
of you will start talking about sex.

1.4.Intellectual Property, Copyright Infringement, Piracy and Plagiarism

-Intellectual property is a term used to describe intangible creations of the human mind, such as
inventions, literary and artistic works, and symbols, names, and images used in coectualmmerce.

-Copyright infringement occurs when someone uses another person's copyrighted work without
permission.

-Piracy refers to the unauthorized distribution, reproduction, or use of copyrighted materials.

-Plagiarism, on the other hand, refers to the act of using someone else's work or ideas without
giving them proper credit.

All of these issues can have serious legal consequences, and it is important to understand the
differences between them to avoid any potential problems. It is essential to respect the
intellectual property rights of others and to ensure that you are not infringing on those rights
when using or creating content.

In conclusion, it is important to respect intellectual property rights and avoid engaging in


copyright infringement, piracy, or plagiarism. These actions not only have legal consequences
but also harm the individuals and industries that rely on their creations. By properly attributing
sources and obtaining permission for use of copyrighted material, we can ensure a fair and
creative environment for all.
Scenario:

Intellectual Property

- The Intellectual Property Office of the Philippines (IPOPHL) said the use of “CTTO” (credits
to the owner) is considered a violation of intellectual property rights. Individuals who repost
other people's photos or artworks without the proper credit are violating intellectual property
laws, according to IPOPHL.

Copyright infringement

- Modifying an image and then displaying it on your company's website. Creating merchandise
for sale which features copyrighted words or images. Downloading music or films without
paying for their use. Copying any literary or artistic work without a license or written agreement.

Piracy

- Digital piracy refers to the illegal copying or distribution of copyrighted material via the
Internet. It negatively affects the creative industries, including film, TV, publishing, music and
gaming.

Plagiarism

- Copying large pieces of text from a source without citing that source. Taking passages from
multiple sources, piecing them together, and turning in the work as your own. Copying from a
source but changing a few words and phrases to disguise plagiarism.

1.5. Cybercrimes: Cyberespionage, Cyberextortion, Cyberlibel,


Cyberbullying, Cryptojacking, and Identity Theft

 Cybercrimes have become increasingly common in recent years due to the widespread
use of technology in our daily lives. There are various types of cybercrimes, including
cyberespionage, cyberextortion, cyberlibel, cyberbullying, cryptojacking, and identity
theft. In this document, we will discuss each of these types of cybercrimes in more detail.

-Cyberespionage refers to the act of using the internet to gain unauthorized access to
confidential information of a person, organization, or government. This information is then used
for malicious purposes that can cause harm to the victim.

Scenario:

Cyberespionage is a growing threat in today's interconnected world. One possible scenario of


cyberespionage involves a foreign government trying to steal sensitive information from a
corporation or government agency.
First, the attackers would conduct extensive research about their target, including identifying key
employees and their roles within the organization. They may also use social engineering
techniques such as phishing emails to gain access to the network.

Once inside the network, the attackers would use sophisticated malware to steal data and
exfiltrate it to their own servers. They may also use backdoors to maintain ongoing access to the
network for future attacks.

To prevent such attacks, it is important for organizations to implement strong security measures
such as multi-factor authentication, network segmentation, and regular security assessments. It is
also essential to educate employees about the risks of social engineering and how to identify and
report suspicious activity. By taking these steps, organizations can reduce the risk of
cyberespionage and protect their sensitive information from theft.

-Cyberextortion involves the use of the internet to threaten a person or organization into paying
a ransom or risk having their confidential information leaked online.

Scenario:

In the simplest terms, Cyber Extortion is most commonly deployed via email phishing attacks,
where a victim clicks on a link or attachment containing malicious software known as
ransomware. Hackers use ransomware to take a victim's data hostage, demanding payment in
exchange for returning access to it.

-Cyberlibel is the act of spreading false or damaging information about a person or organization
online, which can cause significant harm to their reputation and livelihood.

Scenario:

Cyberlibel refers to the act of defaming someone online through the use of digital media such as
social media platforms, blogs, or websites. One example of a cyberlibel scenario is when an
individual posts false and damaging information about someone on social media.

For instance, imagine a person named John who runs a small business. One day, a disgruntled
customer who was not satisfied with the service they received from John's business takes to
Twitter to vent their frustration. This individual posts a tweet accusing John of being a fraudster
and cheating customers out of their money.

The tweet quickly gains traction, and many people begin to share it. As a result, John's business
suffers, and he starts losing customers. Despite his repeated attempts to clarify the situation and
refute the false accusations, the damage has already been done.

In this scenario, the individual who posted the false tweet could be held liable for cyberlibel. It is
important to note that cyberlibel carries legal consequences, and individuals who engage in such
behavior could face civil or criminal charges. Therefore, it is crucial to be cautious and
responsible when using digital media platforms to avoid committing cyberlibel.
-Cyberbullying is a type of cybercrime that involves the use of technology to harass, humiliate,
or intimidate a person. This can take many forms, including sending threatening messages,
sharing embarrassing pictures or videos, or spreading rumors online.

Scenario:

An example of "cyberbullying" is: Constantly instant messaging rude comments to a classmate,


Uploading embarrassing pictures of friends at school without their permission, Spreading rumors
about kids at school using e-mail.

-Cryptojacking is the act of using someone else's computer or mobile device to mine
cryptocurrency without their permission. This can cause the victim's device to slow down or
even crash, and can also lead to the theft of their personal information.

Scenario:

Cryptojacking Attacks in Cloud Native For example, the Romanian hacker group Outlaw
compromises Linux servers and Internet of Things (IoT) devices by using default or stolen
credentials and exploiting known vulnerabilities to launch DDoS attacks or mine Monero
currency.

-Identity theft is a type of cybercrime that involves the unauthorized use of someone else's
personal information, such as their name, address, or social security number, to commit fraud or
other illegal activities. This can have serious consequences for the victim, including financial
loss and damage to their credit score.

Scenario:

Marion Steadman learned she was a victim of identity theft when she received a traffic ticket in
the mail that was addressed to her but had a North Carolina address. She soon discovered the
person opened numerous accounts, had three aliases, and used her social security number.

In conclusion, cybercrimes are a serious threat to our online security and privacy. It is important
to be aware of the different types of cybercrimes and take steps to protect ourselves from them,
such as using strong passwords, avoiding suspicious links and emails, and keeping our personal
information private.

1.6. RA 10173 or the Data Privacy Act of 2012

-RA 10173, also known as the Data Privacy Act of 2012, is a law that aims to protect the
personal information of individuals that is being processed by organizations in the Philippines.
The law mandates that organizations must ensure the confidentiality, integrity, and availability of
personal data that they collect, use, and store. It also requires that organizations obtain consent
from individuals before collecting their personal data and that they notify individuals in case of
data breaches.

Scenario:

Let's imagine a scenario where a company collects personal data from their clients, but fails to
properly secure this information, leading to a data breach.

Under RA 10173 or the Data Privacy Act of 2012, this company is held accountable for the
breach. They are required to notify the affected individuals and the National Privacy
Commission (NPC) of the incident within 72 hours of becoming aware of it. The company must
also conduct an investigation into the cause of the breach and implement measures to prevent it
from happening again in the future.

If the company is found to have violated any provisions of the Data Privacy Act, they may face
fines, imprisonment, or both. The amount of the fine depends on the severity of the violation and
can range from PHP 500,000 to PHP 5,000,000. Aside from the legal consequences, the
company may also face reputational damage due to the negative publicity surrounding the
breach.

To prevent such incidents from happening, companies should ensure that they have proper
security measures in place to protect the personal data they collect. They should also conduct
regular risk assessments and implement a data protection impact assessment to identify and
address potential vulnerabilities. By doing so, they not only comply with the law but also earn
the trust and loyalty of their clients.

1.7. RA 10175 or Cybercrime Prevention Act of 2012

-On the other hand, RA 10175, or the Cybercrime Prevention Act of 2012, is a law that aims to
prevent and punish cybercrimes in the Philippines. It defines cybercrime as any illegal act done
through the use of a computer or the internet such as hacking, identity theft, and cyberbullying.
The law imposes penalties for cybercrimes such as imprisonment and fines. It also provides for
the creation of a Cybercrime Investigation and Coordination Center to coordinate and monitor
cybercrime prevention efforts.

Scenario:

One scenario that could demonstrate the application of the Cybercrime Prevention Act of 2012,
also known as RA 10175, would be the following:

A person, let's call her Maria, creates a fake online profile impersonating another person, let's
call him Juan. Maria uses Juan's name, pictures, and personal information to create a false
identity on social media. She then proceeds to post defamatory statements about Juan, causing
harm to his reputation and personal relationships.
Under the Cybercrime Prevention Act, Maria's actions could be considered a violation of the law.
Specifically, her creation and use of a fake online profile to commit libel against Juan would be
punishable under Section 4(c)(4) of the Act, which prohibits online libel. Maria could be fined
and/or imprisoned for her actions, as stipulated by the law.

This scenario highlights the importance of responsible use of the internet and social media, and
the consequences of engaging in illegal activities online. It also underscores the need for
individuals to be aware of their rights and responsibilities when it comes to online behavior, and
to understand the laws and regulations that govern cyberspace.

You might also like