| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

case study: pirates

Page history last edited by PBworks 16 years, 4 months ago

 

 Reynaldo Marisagan             John Carlo Ong

ITETHICS

January 22, 2008

Jann Michael Babiera            David Garcia

  

 

Pirates

Company

1. Ethan would take over the office and soon enough he’d start taking over the computer network companies

Ø Commandment 3, thou shall not snoop around in other people’s computer files.

 

1. Media Defender created dummy site MIVI to capture those who will upload files

Ø Commandment 5, Thou shalt not use a computer to bear false witness.

 

2. Figured out how to read media defenders email

Ø Commandment 3, thou shall not snoop around in others people’s computer file.

Ø Commandment 7, thou shall not use other people’s computer resources without authorization or proper compensation.

 

2. Tricks to sabotage downloader including planting booby trapped versions of songs and movies

Ø commandment 2, Thou shall not interfere with other people’s computer work;

3. Listen to its phone calls

Ø Commandment 2, Thou shall not interfere with other people's computer work.

Ø Thou shall not snoop around in other people's computer files.

 

3. Trace people who upload films so they can sue them

Ø Commandment 6, Thou shalt not copy or use proprietary software for which you have not paid.

4. Access just about any of the companies computer

Ø Commandment 3, thou shall not snoop around in others people’s computer file.

Ø Commandment 7, thou shall not use other people’s computer resources without authorization or proper compensation.

 

4. Media defender had created code specifically for hacking into pirates system.

Ø Commandment 2, Thou shalt not interfere with other people's computer work.

Ø Commandment 3, Thou shalt not snoop around in other people's computer files.

5. Uncovered salaries of the top engineers as well as names and contact information

Ø According to Commandment 2, thou shall not interfere with other people’s computer work.

Ø According to Commandment 3, thou shall not snoop around in others people’s computer file.

 

5. Hiring a Hacker to obtain internal documents

Ø Commandment 1,Thou shall not use a computer to harm other people

Ø  

6. Firms pirate fighting software works

Ø commandment 8Thou shalt not appropriate other people's intellectual output

Ø Commandment 6, Thou shalt not use other people's computer resources without authorization or proper compensation.

Ø Commandment 7, Thou shalt not use other people's computer resources without authorization or proper compensation.

 

6. Trace people uploading music so that the trade groups can sue them

Ø Commandment 1,Thou shall not use a computer to harm other people

Ø According to Commandment 3, thou shall not snoop around in others people’s computer file.

 

 

7. “These guys are not right, I’m going to destroy them.” Says Ethan

Ø Commandment 9, thou shall think about the social consequence of the program you are writing or the system you are designing.

Ø Commandment 1,Thou shall not use a computer to harm other people

 

7. Upload a torrent vital file that coordinates he download process

Ø Commandment 1,Thou shall not use a computer to harm other people

 

8. P2p tracks were downloaded became individuals wanted to hear songs before buying it.

Ø Commandment 7, Thou shall not use other people's computer resources without authorization or proper compensation.

 

8. Created code specifically for hacking into the pirate bays system

Ø Commandment 1,Thou shall not use a computer to harm other people

 

9. The practice of using false pretense to get personal information about someone

Ø Thou shall not use a computer to bear false witness.

Ø Commandment 1,Thou shall not use a computer to harm other people

 

9. M.P.A.A. filed a law suit against several websites in 2006.

Ø Commandment 4. Thou shall not use a computer to steal. These websites were sued for stealing other’s property.

Ø Commandment 6. Thou shall not copy or use proprietary software for which you have not paid. These websites did not have any permission from the other websites.

10. Ethan put a link at Digg that led the bloggers accused the company for running a honey pot to trap pirates who were uploading a protected content

Ø Commandment 3, thou shall not snoop around in others people’s computer file.

Ø Commandment 2, thou shall not interfere with other people’s computer work.

Ø Commandment 9, thou shall think about the social consequence of the program you are writing or the system you are designing.

 

 

10. MediaDefender made some tricks to sabotage Pirate Bay, like putting booby trapped version of songs and films that frustrate the down loaders

Ø . Commandment 9, thou shall think about the social consequence of the program you are writing or the system you are designing.

 

 

 

Comments (0)

You don't have permission to comment on this page.