Monday, April 27, 2009
2. perpetrator - The entity from the external environment that is taken to be the cause of a risk. An entity in the external environment that performs an attack, ie hacker.
3. cyber criminal - are persons that committed crime using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs.
Sources: http://thefreedictionary.com, www.tsl.state.tx.us/ld/pubs/compsecurity/glossary.html,
Sunday, April 19, 2009
IT tools and applications of Supply Chain Management (SCM) are the focus of this subject. Designed from the perspective of the general manager (who must integrate supplier relations, production and factory floor, operations, financial and human dimensions of the enterprise), this subject examines the processes within the value chain of the company. Students learn how the competitiveness, cost structure and manageability of a firm's operations and markets can be improved through automation, using information and telecommunications networking technologies. Topics include fundamentals of matching supply with demand, incentive alignment and implementation challenges and analytical techniques for supply-chain management. The implementation of Enterprise Resource Planning (ERP) systems is also discussed.
Wednesday, April 15, 2009
The Ten Commandments of Computer Ethics
- Thou shalt not use a computer to harm other people.
- Thou shalt not interfere with other people's computer work.
- Thou shalt not snoop around in other people's computer files.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness.
- Thou shalt not copy or use proprietary software for which you have not paid.
- Thou shalt not use other people's computer resources without authorization or proper compensation.
- Thou shalt not appropriate other people's intellectual output.
- Thou shalt think about the social consequences of the program you are writing or the system you are designing.
- Thou shalt always use a computer in ways that ensure consideration and respect for your fellow humans.
Contact: Stuart Allen
sallen (at) computerethicsinstitute.org
Tuesday, April 14, 2009
2. Kenneth Gabriel Agno
3. Manuel Landicho
4. Zahir Kandog
5. Joan Maganto
6. Marivic Corbita
7. Juvie Mar Pesidas
8. Genrell Darunday
9. Clariza Devila
9. Mylen Andrea
10. Newin Lobo
11. Eric Dave Gallardo
12. Hercy Pedregosa
13. Micheal John Hernaes
14. Zeronda Mae Natibo-oc
15. Julieta Rapas
16. jenelyn orbita
17. John Ray-an Varquez
18. Rose Ann Tabaosarez
19. Liezel Torres
20. Edelyn Duarte
21. Maribeth Calletes
22. Gemma Bañoc
23. Anable Igcalinos
24. Ray Anthony Lariosa
25. Charity Grace Nebres
26. Reymond Jay Biloy
27. Wardy Eliang
28. Gellemar Pelicano
29. Eric Usman
30. Jessie Bingil Jr.
31. Mary Grace Alviso
32. Darwin Cornelio
33.