Professional Documents
Culture Documents
Ms Pubxcanva
Ms Pubxcanva
Ms Pubxcanva
TOPICS OF
CREATING A SECURITY
TO REDUCE
WORLDS CYBERCRIME
TECHNOLOGY EXPLORE IT NOW.
CSS MAGAZINES
Organizatin of major students
www.@Cyberprevention.com
https://pngtree.com/freepng/technology-global-information-map_5268641.html
TABLE OF CONTENTS:
Cyberbullying........................................................................ 4-5
Melvin Kranzberg law's....................................................6-7
What do you think about it?................................................9
IS HACKING GOOD OR BAD?.......................................10
DEFINITION OF HACKING.............................................11
What is deviance?....................................................................12
What is Crime?..........................................................................12
How do Ebook impact society?........................................13
What is the impact of reading Ebook in
technology?.................................................................................13
All you need to know about the Cybercrime
Prevention Act in the
Philippines..................................................................................14-17
HTTPS://PNGTREE.COM/FREEBACKGROUND/VECTOR-BLUE-TECHNOLOGY-BACKGROUND-CIRCUIT-DIAGRAM_568000.HTML
HTTPS://PNGTREE.COM/FREEBACKGROUND/VECTOR-BLUE-TECHNOLOGY-BACKGROUND-CIRCUIT-DIAGRAM_568000.HTML
''C YBERBULLYING IS THE USE
OF TECHNOLOGY TO HARASS,
THREATEN,EMBARRASS,OR
TARGET ANOTHER PERSON.''
-unknown
HTTPS://PREVIEWS.123RF.COM/IMAGES/BIALASIEWICZ/BIALASIEWICZ1505/BIALASIEWICZ150501445/40342
897-GIRL-SITTING-CURLED-UP-ON-THE-FLOOR.JPG
HTTPS://PREVIEWS.123RF.COM/I MAGES/BIALASIEWICZ/BIALASIE WICZ1505/BIALASIEWICZ150501 445/40342897-GIRL-SITTING- CURLED-UP-ON-THE-FLOOR.JPG
KRANZBERG'S LAWS OF TECHNOLOGY
HTTPS://WWW.GOOGLE.COM/URL?
SA=I&URL=HTTPS%3A%2F%2FWWW.JSTOR.ORG%2FSTABLE%2F3378667&PSIG=AOVVAW
2L3R9J1DMC_XYHVFQIFUUG&UST=1673157043784000&SOURCE=IMAGES&CD=VFE&VE
D=0CBAQJRXQFWOTCJJEW9K_TFWCFQAAAAADAAAAABAJ
That is the six laws of Melvin kranzberg; using The controversy about cybercrime
this information we can gasp keep increasing because during
more about this topic and this is related to a the evolution of technology and
cybercrime that's happening within the technology society at the same time.
society.
HTTPS://I.PINIMG.COM/564X/1F/D4/20/1FD420DF472724E2BF918318E6A019F9.JPG
HTTPS://EN.WIKIPEDIA.ORG/WIKI/MELVIN_KRANZBERG#:~:TEXT=KRANZBERG'S%20LAWS%20OF%20TECHNOLOGY&TEXT=OF%20TECHNOLOGY%20STATE%
3A-,TECHNOLOGY%20IS%20NEITHER%20GOOD%20NOR%20BAD%3B%20NOR%20IS%20IT%20NEUTRAL,PRECEDENCE%20IN%20TECHNOLOGY%2DPOLICY%20D
ECISIONS.
What's
Crime?!
HTTPS://I.PINIMG.COM/564X/50/81/D1/5081D1742D364063A1F995144D6D4262.JPG
Did you heard about it?...
https://i.pinimg.com/564x/d0/41/04/d04104
b3acb95e553359d5bcc40bb805.jpg
It's the different types of crime, and the Does technology create any human rights
crimes that related to technology is the conflict? Yes, it's actually The Digital Divide.
CYBERCRIME
Technology is a tool and tools possess an One traditional human rights concern that
inherent role. For example a Phillips has been aggravated by digital technology is
screwdriver is designed to apply torque via a global inequality. This is caused by the lack of
cross head to another tool the Phillips access to technology, rather than technology
screw/fastener in order to combine materials itself.
(mostly wood) together.
https://i.pinimg.com/564x/4c/65/63/4c65
HTTPS://WWW.KASPERSKY.COM/RESOURCE-CENTER/THREATS/WHAT-IS-CYBERCRIME
IS HACKING
GOOD OR BAD?
There are several types of computer crimes, For that reason, it's very important for any
but some of the most high-profile examples online business to make sure it takes strong
involve hacking. More and more these days, preventative measures by installing quality
data breaches have become daily anti-malware security, spyware removal
occurrences. As this has become more tools, and firewall software defense.
common, hackers have affected everything Customers need to feel secure that online
from the economical (including numerous service providers are protecting their data —
retail businesses) to the political. or they will take their business elsewhere.
Consequently, most people think of hacking But we can't also deny that there's some
as a crime, but the truth is hacking can legally hackers that have an ulterior motive or bad
be a great asset. Ethical hackers, also known intentions, so that's why they're called the
as WHITE HATS use their skills to secure and BLACK HATS HACKERS, are criminals who
improve technology. They provide essential break into computer networks with
services to prevent possible security malicious intent. They may also release
breaches by identifying vulnerabilities. malware that destroys files, holds computers
Companies hire White Hats to stress test hostage, or steals passwords, credit card
their information systems. They run deep numbers, and other personal information.
scans of networks for malware, attempt to
hack information systems using methods
Black Hats would use, and even try to fool
staff into clicking on links that lead to Is hacking positive or negative?
malware infestations.
White Hats are one of the reasons large In a negative sense, hackers are people or
organizations typically have less downtime groups who gain unauthorized access to
and experience fewer issues with their websites by exploiting existing vulnerabilities.
websites. Most hackers know it will be harder In a positive sense, hackers are computer
to get into systems managed by large professionals who discover the weak points
companies than those operated by small in IT applications and help to resolve them.
businesses that probably don't have the
resources to examine every possible security In this kind of society there's no such a
leak. victors and losers there's only a survivors.
HTTPS://WWW.TECHTARGET.COM/SEARCHSECURITY/DEFINITION/CYBERCRIME
HTTPS://I.PINIMG.COM/564X/15/92/5C/15925CAF12F4AF79A500BFF72952889B.JPG
DEFINITION OF
HACKING
Hacking is broadly defined as the act always a malicious activity, but
of breaking into a computer system. the term has mostly negative
Hacking is not always a crime, connotations due to its
however. In "ethical hacking," for association with cybercrime.
example, a hacker is legally permitted
to exploit security networks. In other And because the word CYBERCRIME
words, the hacker has the all we think that hacking is bad or
appropriate consent or authorization always had an bad influence to us.
to do what they are doing. However, but some people practically side with
hacking crosses the criminal line the hacking because they also think
when a hacker accesses someone that hacking is not always a crime
else's computer system without such and also on the other hand some
consent or authority. people siding with it because they've
gain benefits from using it.
Hacking is the act of identifying and so, we know now that it's not the
then exploiting weaknesses technology itself who has a fault
in a computer system or network, because there's a crime;
usually to gain unauthorized access to frantically it is us HUMANS doing a
personal or organizational data. crime or some wrong doing using the
Hacking is not . technology as a weapon against each
other.
HTTPS://I.PINIMG.COM/564X/1A/CA/0C/1ACA0CACF8AF0007CE13BEA577E0AE5F.JPG
HTTPS://WWW.GURU99.COM/WHAT-IS-HACKING-AN-INTRODUCTION.HTML
"All crimes are
deviances, but not
all deviances are
crimes."
What is deviance?
The definition of 'deviance' is acting in a
deviant manner. According to the Merriam-
Webster dictionary, someone is 'deviant' if
they are 'straying or deviating, especially from
an accepted norm'. In sociology, deviance
refers to actions that fall outside the scope of
accepted norms, values, and behaviours. can
be used to describe behaviours that are
socially and morally 'unacceptable'. For this
reason, not everyone will agree on what
constitutes deviant behaviour. Social and
moral values differ according to individuals
Felony includes serious crimes like murder, .
and their cultures.
Some examples include shoplifting,
This is called the context-dependency of
vandalism, indecent exposure in public and
deviance. This refers to the perception of
trespassing. rape and, robbery, which typically
behaviours as deviant (or not), depending on
result in serious punishments.
their social, cultural, moral, and historical
Misdemeanours, on the other hand, refer to
contexts.
comparatively minor crimes with lesser
punishments. Some examples include
shoplifting, vandalism, indecent exposure in
public and trespassing.
What is Crime? Furthermore, criminology is the scientific
study of crimes and criminals. According to
A crime is “an action or omission which some criminologists, crimes can be
constitutes an offence and is punishable by categorized into five categories as violent
law”. In other words, it is an illegal or unlawful crimes, property crimes, white-collar crime,
action that is punishable by law. Moreover, organized crimes and consensual or
there are many types of forms of crimes. In victimless crimes.
criminal law, crimes have two main basic
categories felonies and misdemeanours.
HTTPS://I.PINIMG.COM/564X/E1/C4/3B/E1C43B5380ABFEE4023AF74F3CB87BDE.JPG
HTTPS://KEYDIFFERENCES.COM/DIFFERENCE-BETWEEN-DEVIANCE-AND-CRIME.HTML
What do you
think about this?
How do Ebook impact society?
HTTPS://I.PINIMG.COM/564X/E1/C4/3B/E1C43B5380ABFEE4023AF74F3CB87BDE.JPG
HTTPS://WWW.TEACHWIRE.NET/NEWS/THE-IMPACT-OF-EBOOKS
The Cybercrime
Prevention Act in the
Philippines
The Philippine Congress enacted Republic Act No. of 2012.
10175 or “Cybercrime Prevention Act of 2012” Illegal Access:
which addresses crimes committed against and
Access to a computer or any application
through computer systems on 12 September
without permission.
2012. It includes penal substantive rules,
Illegal Interception:
procedural rules and also rules on international
Interception of any non-public
cooperation.
communication of computer data to, from, or
within a computer system by an unauthorised
Cybercrime also called computer crime is the use
person.
of a computer as an instrument to further illegal
ends such as committing fraud trafficking child
pornography, intellectual property violations,
stealing identities or violation of privacy. The
difference between traditional criminal offences Data Interference:
from cybercrime is the use of the computer in Unauthorized tampering with, destroying,
committing such offences. Majorlycybercrime is deleting, or deteriorating computer data,
an attack on the information of Individuals, electronic documents, or electronic data
governments messages, as well as the introduction or
or corporations. transmission of viruses. This provision can also
To combat and prevent cybercrime, the cover authorised activity if the person’s
government of the Philippines introduced the behaviour went beyond the agreed-upon
Republic Act No.101175 or Cyber Prevention scope and resulted in the damages listed in
Act of 2012. This Act was signed by the President this provision.
of the Philippines Mr. Benigno Aquino on
September 12th of 2012. The
original goal of this Act was to penalize acts like
cybersex, child pornography, identity theft etc.
Child Pornography:
There are sixteen types of cybercrime
covered under the Cybercrime Prevention Act Unlawful or banned activities conducted
through a computer system, as defined and
punished by Republic Act No. 9775 or the Anti-
Child Pornography Act of 2009.
HTTPS://I.PINIMG.COM/564X/26/4D/B0/264DB08FD07670030187533155E470D2.JPG
System Interference: registrant, and trademarks that were
Unauthorized interference with the purchased with intellectual property
operation of a computer or computer network, interests in them. Those who get domain
including the introduction or transmission of names of prominent brands and individuals
viruses, by inputting, transmitting, damaging, who in turn are used to damage their
deleting, reputation can be sued under this provision.
deteriorating, altering, or suppressing computer Note that freedom of expression and
data or programmes, electronic data messages, infringement on trademarks or names of
or by deleting, deteriorating, altering, or persons are usually treated separately. A party
suppressing them. This provision can also cover can exercise freedom of expression without
authorised activity if the person’s behaviour necessarily violating the trademarks of a brand
went beyond the agreed- upon scope and or the names of persons.
resulted in the damages listed in this provision.
HTTPS://WWW.BEHANCE.NET/GALLERY/130541641/SUNLIGHT/MODULES/739478037
writings or other means. Libel committed by
writing, printing, lithography, engraving, radio,
phonograph, painting, theatrical exhibition,
cinematographic exhibition, or any other
similar means is punishable by prison
correctional for the minimum and medium
periods, or a fine ranging from 200 to 6,000
pesos, or both, in addition to any civil action
that the offended party may bring.
(HTTPS://COURSES2.CIT.CORNELL.EDU/SOCIALLAW/STUDENT_PROJECTS/FALSECONFESSION
S.HTML)
Advantages disadvantages
Conclusion
A comparison between the cybercrime prevention acts and the policies of Philippines and India
shows similarities to some extent and at the same time there are slight differences. If the
provision of cyber libel in both countries are compared, it can be seen that both countries
included this provision and immediately attracted the difference of opinion from the netizens. In
India, the Information Technology Act of 2000, Section 66A, defines the penalty for sending
“offensive” messages through the computer, mobile phones, or tablets. Because the government
failed to define the term “offensive,” it began to be used to suppress freedom of speech. In the
year 2015, the Supreme Court overturned this law.
HTTPS://BLOG.IPLEADERS.IN/ALL-YOU-NEED-TO-KNOW-ABOUT-THE-CYBERCRIME-PREVENTION-ACT-IN-THE-
PHILIPPINES/#:~:TEXT=INTRODUCTION,ALSO%20RULES%20ON%20INTERNATIONAL%20COOPERATION.
The art challenges the technology, and
the technology inspires the art.
-JOHN LASSETER (DIRECTOR)
HTTPS://I.PINIMG.COM/564X/FF/C1/32/FFC132C7FC28DD60ADEF416EB390D2B4.JPG
ABOUT THE
CONTRIBUTORS:
Lyssa bas was one of the researcher of this
magazine, she was describe as cheerful and
jolly person. And she is also fond of reading
many novels and love creating a story with
the technology. she have many hobbies and
loves drawing and most of all she is a CSS
LYSSA B. BAS
major student.
www.@PHCyberprevention.com
In the Philippines, the same uproar from the netizens was heard
when the cyber libel was introduced as an offence under the
cyber prevention Act 2012. In Disini v. Secretary of Justice, the
validity of the rule on online libel was challenged (G.R. 203335,
11 February 2014). The Supreme Court, on the other hand,
determined that libel is not protected speech under the
Constitution. As a result, the internet libel is not
unconstitutional. There may be different approaches to the
provisions of the Act by different countries, nevertheless to say
that strict enforcement of the cyber law is essential to combat
cybercrimes. Technology crimes are not just limited to a
geographical
HTTPS://I.PINIMG.COM/564X/25/AB/92/25AB9231FC501C6A1F9ABDE2641D8DD2.JPG
HTTPS://I.PINIMG.COM/564X/A3/15/DA/A315DA6611F1CB94674C82FF1F306BDA.JPG