At one point of time, in an online forum, applicants who were eager to get admission in some of the prestigious institutions of the United States including Harvard Business School found some information about knowing the status of their application before it was announced; whether they have been admitted to the institution or not. The message had several instructions about how one student can find out about his or her admission decision the institution has made.
It was an easy process and the students just had to change the end of the URL of the specific application used by these institutions for applications. Doing so took these students to the page which was inaccessible or restricted in other words and contained the final decision about a candidate's application. No one knew who did this to the software; however, the institutions that used it were unhappy, because it actually told a few students that they have been either tentatively rejected or the other way round (www.ethicsinbusiness.net).
Case 2
Marina and Leona need the benefit of IP rights in other countries in order to operate in their markets successfully. Absent of IP protection can expose a start-up to vulnerable products that can be copied or distributed without its authorization. This form of IP infringement has been a major problem in developing countries; however, it can also be vulnerable for countries like London. Therefore, it is better to protect the IP rights; rather than waiting for a competitor to emerge in the market.
Marina and Leona are particularly exposed to unauthorized IP reproduction or distribution since they may only hold a small number of IP rights. In addition to that, they are often drawn to foreign markets, especially products that can be used in multiple countries and industries that are called as platform technologies. Products that are developed by them are more vulnerable to such risk as these products can easily and effectively be applied to all countries and similar industries. Therefore, Marina and Leona should form a partnership with large corporations who have the means to incorporate the technology into their product lines. The resulting products can then be distributed in a number of different countries (Trost, 2010).Discussion
Internet has become an essential part of our lives these days, and our life has been dependent on the internet. Cyber world has opened numerous opportunities for us, for example, reference material, electronic commerce, email, collaborative computing, information distribution and advertisements etc. Cyber attacks are defined as breaking into some computer which results in undermining of the integrity, availability and confidentiality of the computer or the data saved within it (Carrforeword and Shepherd, 2009).
The most common form of cyber attack is hacking. Hacking can be defined as creative innovation as well as a form of unlawful behaviour. This is a form of activity that has occupied two extreme positions. Hacking is defined as cut chop, something that is used to improve the performance of the battle boredom by the mainframe operators. There are different types of hacking including, software hacking and information hacking etc (Randall, 2000).
Difference between Hackers and Crackers
According to their own definition, hackers are primarily "networks ...