Benefit from Our Service: Save 25%Along with the first order offer - 15% discount (with the code "get15off"), you save extra 10% since we provide 300 words/page instead of 275 words/page
The Global Chinese Phishing Site Report for the 2nd half of 2012 reveals the statistics of how phishing for personal information such as credit card details, usernames, and passwords for unsuspecting peoples were done by people pretending to be as trusted personalities through electronic communication. This illegal activity has gone beyond targeting emails to currently the social sites, and in most cases the victims suffer identity theft. Based on the statistics provided, the phishing activities are the ones reported to:
(1) the Anti-phishing Alliance of China (APAC),
(2) the attack detected actively by DNSCERT and
(3) the attack reported by the members of Anti-Phishing working group.
The statistics show that phishing use a combination of the host name and the path based on the URL used attackers. This is because:
(1) different brand are targeted with the same hostname,
(2) some pages from rightful sites are subjugated by the phishes and most of the anti-phishing tools block attacks via the full URLs. According to the statistical highlight carried out, the unique phishing sites that targeted Chinese users decreased by 53%, i.e. 7,504 in the 2nd half of 2012 as compared to the attacks in the 1st half of the year.
The top five most targeted brands were: Taobao.com, Alibaba, SINA, TENCENT and CCTV and the top 5 TLDs used for the phishing sites were:.com, .cc, .to, .tk, and .info. The number increased and reached at the peak of the second half year of 2012 in September and globally, 7,504, nearly all these illegal phishing sites were detected in the same year.
According to the report, it was also found out that there were 42 brands that were targeted by the phishing attackers. Out the 42 brands, Taobao was the most targeted with frequency of 48.2% of the total reported attacks. Taobao is followed by Alibaba and Sina respectively in the 2nd half on 2012. It is also noted that only a few phishing websites that gave services through IP address. The majority of sites vulnerable for phishing activities use websites hosted on domain names. It is therefore concluded that a more top-level domains are used for phishing attacks, with .COM, being the mostly used.
Phishing URL Domain Brands Trend
This section reveals that number of unique brand-domain, i.e. the domains controlled by the phishing attackers, is larger than that of unique phishing domains. This leads to the conclusion that attackers tend to use similar phishing domain that guarantees phishing domains usage rate to target multiple phishing brands.
Highlighted in the Whole 2012
In the highlights of 2012, most of the phishing activities occur in the first six months of the year with May, emerging the top in the number of phishing sites discovered. The report indicates attack on 23,122 Chinese sites in 2012, with May recording 3,325 cases discovered. However it is important to note that the number of attacks reduced substantially in the 2nd half from July to December. This may be as a result of the efforts made to minimize the effects of phishing activities. Equally, 82 brands were involved in Chinese phishing attacks. This is a very high number that may result into serious effects when not stopped. Further on, in the same year the report indicates that 130 top-level domains were used in the phishing attacks, with .com, tk, and .cc accounting for 57.2% being the leading three TLDs.
Copyright Violation First-Hand
Copyright violation occurs when an individual ignores the intellectual rights of an author through unapproved reproduction and distributing a persons work without authorization. Such violation infringes the authors by denying the copyrighted benefits (Aufderheide & Jaszi, 2011). This is exactly what happened in this case since students did not buy the book but reproduced.
After discovering the Copyright violation, my first reaction is to let them understand the legal implication of copyright violation which is an illegality punishable in a court of law and that can lead to several years of imprisonment or hefty fines (Aufderheide & Jaszi, 2011). In addition, they students will need to understand the monetary damage they have caused the authors of the work.
Possible Courses of Action
One course of action will be to sue the University for Offering Medical Course without stocking the required books that can be used by their students and allowing their students to use books they dont pay for. Further, the university can be fined. The students may also be sued on their individual capacity and be made to pay for the damages and loss of business they have caused the authors or face criminal sentencing by court of law (Aufderheide & Jaszi, 2011). Another course of action can be out of court settlement where a deal is signed between the University and the authors. This may include being forced to order for books from the same authors to compensate them for their initially lost business. This is after confiscating the bound photocopies of the materials in dispute for the purpose of protecting the Authors work.
Additional Information that might be helpful will be to inquire if the same copyright violation is repeated for other medical books, and in others schools within the university. This informing will be necessary to gauge the extent of damage and the level of the Universitys preparedness to offer courses. It is also important to know the reproduction point to ensure that the photocopy attendants are equally warned or may be further prosecuted.