You are on page 1of 3

UNIVERSITY OF THE IMMACULATE CONCEPTION

Information Technology Education Program


Center of Development for IT Education (COD - ITE) in Region XI
PAASCU Level II Accredited
CCNA Local Academy

IT ERA

PERIODIC EXAMINATION (MIDTERM)

CASE STUDY (CYBERCRIME)


Name : _________________________________________________________

Description:

Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be
defined as: "Offences that are committed against individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to
the victim directly or indirectly, using modern telecommunication networks such as Internet (networks
including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".

Objectives:

The idea of the entire examination is enabling the students to:

1. Analyze scenarios / case studies and determine the specific cybercrime committed.
2. Evaluate scenarios / case studies and distinguish the legal implication(s) of the incident.
3. Synthesize solution(s) that may prevent the cybercrime specified in each scenario.
4. Cite specific examples happened in the real world related to the cybercrime determined for
each scenario given. Include sources for each example.

Project Specifications:

1. The activity should be done individually.


2. The students should analyze, evaluate, formulate solution, and conduct research for each case
study determined in the examination.
3. The output should follow the following format / paper requirements:
a. Font Style: Calibri
b. Font Size: 12 px
c. Single Spacing
d. Page Size: 8.5“x 11.5“
e. Margins: Normal (Top: 2.54 cm, Left: 2.54 cm, Right: 2.54 cm, Bottom: 2.54 cm)
4. Submit your files following this naming convention: Lastname_MidtermExam.docx

Case Studies:

Scenario 1:

You shared the post of the person who posted a bullying status online. Are you liable to the said crime?
Prove your point.
- Cite similar cases (at least 2)
- Discuss the penalty of cyberbullying. (laws and penalties)
- Reflection (points to ponder)
- How do you protect or prevent yourself from being bullied online?
UNIVERSITY OF THE IMMACULATE CONCEPTION
Information Technology Education Program
Center of Development for IT Education (COD - ITE) in Region XI
PAASCU Level II Accredited
CCNA Local Academy

IT ERA

PERIODIC EXAMINATION (MIDTERM)


Scenario 2:

A Dutch hacker who copied patient files from a University of Washington medical center (and was not
caught) said in an online interview that he did it to publicize the system’s vulnerability, not to use the
information. He disclosed portions of the files to a journalist after the medical center said no patient files
had been copied (Base 2003).

1. Was this honorable whistle-blowing or irresponsible hacking?


2. What arguments and good reasons would you give for your answers? ( include laws or cases
that would support your answer)
3. What ethical theories and principles could you draw to analyze this case?

Scenario 3:
A lecturer puts some journal articles on reserve in the library and makes them assigned reading for her
class. These articles are copyrighted material. Some students in the class complain that they cannot get
access to the articles because they are always on loan to other students. The professor scans them and
posts them on her website. The professors gives the students in the class the password they need to
access the articles. What factors need to be considered in deciding whether this constitutes “ fair use” of
copyrighted material?

*rephrase your answers (do not copy and paste from the source)

Scenario 4: 

Search actual case 


Discuss the crime committed and the actions taken by the victim in regards with Malicious
scandal spread online.

Grade
Category
0 1 2 3
Does not identify Identifies and Identifies and Identifies and
nor demonstrate demonstrates a demonstrates demonstrates a
understanding of weak acceptable sophisticated
the understanding understanding understanding of
Identification of Main
issues/problems of some of the of some of the the main
Issues / Problems
in the case study. issues/problems issues/problems issues/problems in
in the case in the case the case study.
study. study.

Presents an Presents Presents a Presents an


incomplete superficial thorough insightful and
Analysis and analysis of some analysis of some analysis of most thorough analysis
Evaluation of the identified of the identified of the issues of all identified
issues. issues. identified. issues/problems.

Recommendations on No action Little action Supports Supports diagnosis


Effective suggested and suggested diagnosis and and opinions with
Solutions/Strategies inappropriate and/or opinions with strong arguments
solutions inappropriate limited and well-
proposed to the solution reasoning and documented
issues in the case proposed to the evidence; evidence; presents
UNIVERSITY OF THE IMMACULATE CONCEPTION
Information Technology Education Program
Center of Development for IT Education (COD - ITE) in Region XI
PAASCU Level II Accredited
CCNA Local Academy

IT ERA

PERIODIC EXAMINATION (MIDTERM)


study. issues in the presents a a balanced and
case study. somewhat one- critical view;
sided argument; interpretation is
demonstrates a both reasonable
little and objective
engagement
with ideas
presented.

Student does not Student uses For the most Student uses
use proper inconsistent part, the proper grammar,
grammar, uses proper student uses punctuation, and
punctuation, or grammar, proper spelling and writes
spelling punctuation, or grammar, effective sentences
throughout the spelling punctuation, that make logical
paper. Many of throughout the and spelling and sense. Has a proper
the sentences are paper. Some of writes academic style that
ineffective and the sentences reasonably is void of clichés
do not make are ineffective effective and informal,
logical sense. and do not sentences that colloquial phrases
Does not have a make logical generally make and language.
proper academic sense. Does not logical sense. Writing is well-
Writing Mechanics
style and often have a proper Has a proper organized and
uses clichés or academic style academic style logically coherent.
overly informal and often uses that generally
or colloquial clichés or overly avoids clichés
language. Writing informal or and informal,
is not well colloquial colloquial
organized and language. phrases and
not logically Writing is not language.
consistent. well organized Writing is well-
Writing is and not logically organized and
rambling consistent. generally
logically
consistent.
Missing all paper Missing 3-4 Missing 1-2 All paper
requirements. paper paper requirements are
Paper Requirements
requirements. requirements. correctly met.

Total 15 points

Deadline for submission will be on SEPT. 19, 2019 at 8am (SOFT COPY AND HARD COPY) .

Prepared By:

CRIS JOHN DAVID MANERO/MA. NANETTE CASQUEJO/HARROLD U. BELTRAN

You might also like