Law and ICT

random thoughts on the impact of law and policy on ICT... and vice versa

Thursday, March 15, 2012

Technology and Piracy: Two Sides of the Same Coin

›
With all the laws being passed to protect against piracy, one would think that piracy is necessarily a bad thing. We are taught that pirac...
8 comments:
Wednesday, March 14, 2012

Identity Theft (Credit Card Fraud)

›
What is Identity Theft? Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming...
7 comments:

Another version: Cyber Crimes: Destroy Others, Destroy Yourself

›
Team Members: Jan Bunag, Adrian Bustos, Mary Rhauline Lambino, Entry No. 13
7 comments:

Cyber Crimes: Destroy Others, Destroy Yourself

›
It is undeniable that ICT is now part of a large portion of the world's population's lifestyle. Yet the ordinary person, at least in...
1 comment:

FOE

›
When death becomes a wanted friend, the foe must be a terrifying one. The Internet can be a terrifying foe. By itself, it is largely a neu...

Don't believe everything you see online.

›
Not everything you see or hear online is true. Not all the people you meet can be trusted. There are cyberpredators looking to take advatage...

Group Buying Sites: Secret's Out!

›
Wondering why Deal Grocer can offer a vacation package at almost 70% off? Intrigued about how Metro Deal can offer you a branded watch at al...
1 comment:
›
Home
View web version
Powered by Blogger.