You are on page 1of 9

CHAPTER I

I.

Introduction

The Internet now is no longer safe for our software files whether we are in offices or at home as long as we have internet connection there is a possibility that our important software files might get steal by other persons online especially for those who are using illegal internet connection and it can also generate some virus, malware, Trojan and etc. that might affect your P.C performance to become slow. Many people are depending on their illegal internet connection because its free and friendly in the way they use it even thou the risk that it can cause because of having weak internet security and showing your computer mac address or I.P from the other unknown computers or person where your computer is connected if you are using third party softwares or using your neighbour Wi Fi for your internet use.

People might notice that they having a very slow internet connection without knowing that another computer is sharing to their internet connection this will come up into illegal internet connection where other computer is sharing to another computer connection without knowing from the side of legitimate user internet. Some of illegal internet connection are not only for stealing internet connection to your neighbours because there are different ways or different kind of illegal internet connections some are bypassing where you are trying to exceed from the limit of your consumable broadband registered promo and some are using third party connection where you are trying to tunnelling from your Internet Service Provider to other third party connection.

As of now different countries experiencing illegal internet connection to their Internet Service Providers especially in the Philippines GLOBE Telecom and SMART Telecom experiencing some difficulties to their services because of internet hacking. Illegal users or
1

not legitimate users using their services out of the limit because of having infinite use of internet services that cannot provide by the Internet Service Providers which cause slow internet service for those who are legitimate users in fact because of illegal internet connection the spreading of illegal cloned modem devices like WIMAX and SIM Cards are increasing because of purchasing these illegal devices for illegal use of internet connection.

Although Internet Service Providers like GLOBE pledge for the security of services and SMART Fair Use Policy is not enough to have a better network security to avoid illegal internet connection, to have a good services and to prevent illegal internet connection. GLOBE SECURITY AND SERVICE Globe Telecom utilizes several security measures to help safeguard the confidentiality of your personal identifiable information. These practices include, but are not limited to firewalls, username and password authentication, 128-bit Secure Socket Layers (SSL) encryption, data encryption, and other industry standard practices.

ABOUT SMART PREPAIDS USE POLICY As part of its continuing commitment to provide high-quality service to its subscribers, Smart is putting forth the Fair Use Policy for Call & Text Services. This ensures that commercially available voice & SMS products are used properly to preserve the integrity of the Smart network in order to provide ALL subscribers with the best call & text services.

CONDITIONS OF THE FAIR USE POLICY Smarts Fair Use Policy promotes pleasant use of call and text and aims to avoid t he following:

Activities that may cause network congestion and those that can adversely impact the overall quality of service experienced by other subscribers Any unlawful, invasive or fraudulent purposes that violate the legal rights of other subscribers Any manner which affects the Companys ability to provide and maintain the quality of its network and services Any means aimed towards exploitation of mobile usage that may cause any loss or damage to the Company

ENSURING FAIR USAGE FOR ALL Smart reserves the right to disallow, suspend or terminate service of customers whose improper or abusive use of call & text services may jeopardize our ability to deliver the best customer experience to the other subscribers. Smart also reserves the right to modify the FAIR USE POLICY without prior notice in order to maintain the integrity of its network services.

1.1 Rationale for this research

This research intends to understand different effects of having illegal internet connection from the people who use it, to computers, important documents, privacy of the victims and to your Internet Service Providers services. Because of this research we can open the eyes of the people who are blind into this kind of topic and to inform them about this kind of problem by showing them the details and different information about this problem to understand it well. The research also trying to explain and discuss the spreading of illegal devices use in having illegal internet connection and the major effects of having illegal internet connection because there are many effects cause by having illegal internet connection not only in your Internet Service Providers services but also in other people who are experiencing, surprisingly many people experiencing it and many Internet Service Providers suffering from it they spend more money only to fix their systems monthly.

1.2. Statement of the problem

Wondering on why I have a very slow internet connection whether I have a very good Internet Service Provider for my internet connection.

We all know that not all people are familiar with illegal internet connection because some of them are not open into this kind of problem.

Your identity could be at risk when stealing an Internet connection. According to CNN Money, there is the "possibility that someone could have set up the unsecured connection as a trap." This means that all your personal information such as your name, address, social security number and bank account number could be at risk. Not only is your identity at risk, but the network subscriber that you are stealing Internet from could have access to your computer. He could read your email and access private information on his computer. This is a quick and easy way of losing your identity through the Internet.

Stealing Internet is not only unethical but also illegal. According to CNN Money, "there is a federal law on the books that ostensibly prohibits using someone's access point without their permission." In 2006 an Illinois man was arrested and charged $250 for stealing an Internet connection without the network subscriber's permission. Another man in Michigan was charged in May 2007 with "fraudulent access to computers, computer systems, and computer networks" for stealing Internet connection while parked in his car in front of a restaurant, according to ARS Technical, a website dedicated to technological information. Stealing Internet is unethical and illegal and could cost you jail time and money.

Stealing Internet can be unreliable in the long run. If you are using the Internet to work from home, do school work or for usage, relying on an open Internet connection could be a bad idea. At any moment the network subscriber could shut off his Internet connection or the signal could go bad. For reliability reasons, it is a better idea to pay for your own Internet connection. Also when there is an open Internet connection, it can be assumed that you are not the only one stealing a
4

connection. The more users on a network, the more bandwidth being used, which equals speed problems. Without having to pay monthly bills, the users are no longer (recorded as) Globe subscribers, Gonzales said. The telecom company filed a complaint after losing around P10 million in revenues due to the modus operandi.

This study aims to understand the effects of illegal internet connection to the users, legitimate users, and to the company or the Internet Service Providers. This can research can also help them to determine the possible solutions and actions regarding on the problem. The innocent people will now informed about this to prevent this kind of problem.

1.3. Objectives

To inform people about this problem especially for those who are not familiar with this kind of problem.

To understand the major effects of having illegal internet connection not only for the victims but also for the users.

To understand the risk of having illegal internet connection. To open the mind of the people about illegal internet connection thus they will become aware of this problem.

To contribute information of what have been searched before regarding in this topic illegal internet connection.

To know the different effects of illegal internet connection. To stop illegal internet connection.

Significance of study

The significance of this study is to provide information for the people who are not familiar in the issue of Illegal Internet Connection and also to help them understand the risk of using it. This research will help them to know the cause and effects of having illegal internet connection to prevent this problem produce more victims and also to help innocent people who are involved in this problem not only the users but also the victims of illegal internet connection.

The people will benefit from the result of this study by:

1. Understand the effects of illegal internet connection. Because of this research people can now understand the effects of illegal internet connection to warn them about this kind of problem.

2. Inform people about this kind of problem. Because of this research people now are informed about this kind of problem, they can easily understand its risk.

3. May have an idea on what are the possible solutions into this kind of problem. Because of this research people can now think the possible ideas that can help them to prevent this problem.

4. Decrease the problem of illegal internet connection because people are now informed about the problem. Because of this research people can now avoid using of illegal internet connection because they are now informed about this problem.

5. Can help Internet Service Providers to reduce cost of maintenance to their system because people now are well informed about the problem. Because of this research different Internet Service Providers will lessen their problems for the maintenance of their system.

6. Can help people to choose the best solutions into this kind of problem. Because of this research people now can easily determine the best solution for this problem.

7. Stop the illegal internet connection. Because of this research people now can prevent the illegal internet connection.

1.4. Methods

I will be using step by step procedure to gain more information about my research and to make it organize so that I can determine my scope and timeline. The timeline should be a work schedule for my research to find and read sources, to collect notes from sources, prepare a rough draft, revising and incorporating source material and citations, and preparing the final draft. I can also write a research questions that will guide me to my readings and the questions will reminds me of what I want to find and read. I will look for the useful sources with the internet and reading materials like books, magazines or journals, encyclopaedias, reference books, newspapers, letters, interview, blogs, and I will look also to any academic school or university library because they do contain information and sources not generally or easily available on the internet, and reference librarians who can help me. Collect some possible sources by locating material to read like chapters, paragraphs, sections, sentences that cover my topic, reading in detail by focusing in my research question and find information that illuminates it, explains, describes, analyses, contrasts, or gives expert opinion and viewpoints on it. I will consider new sources while reading by finding new information, or questions on a topic that I need to read, broaden my research to check
7

on details, possible errors, corroborating or conflicting evidence, and the context of an article, expert or paper. Evaluate my source because source must be credible in terms of the author, location of publication, date publisher, etc. Write my first draft this is when I will start writing what I have learned, what I feel about my topic and research. Then I will revise it by checking the content of my paper and making sure the research is developed, the content matches my research, there is enough material, it is in a logical order, nothing off topic is included, and the writing flows smoothly. After that I will now prepare my final draft which includes title, page, page setup and numeration, in text citations, reference list, inclusion of visuals, sections and titles, etc.

1.5 Structure of the research I. Title Page The title page should contain the: 1. 2. 3. 4. 5. 6. name(s) of the author(s) name and position of the mentor name of the program or course in which the research was completed department in which the research was conducted contact information of both author(s) and mentor(s) date of completion

II.

Abstract It has the following: 1. 2. 3. 4. problem to be investigated purpose of the study methods major results
8

5.

interpretations and implications of the results

II.

Introduction My introduction will provide the reader with all the background information needed to understand the paper. With this I can will explain key terms, give historical information on the problem studied, and cite other studies that have obtained relevant results.

IV.

Body This section contains the core of the paper. It is broken down into sections such as methods and materials, results, discussion, and conclusion.

V.

References My references page will acknowledge all the resources used for obtaining information. The resource will be cited according to either APA or CBE guidelines.

VI.

Acknowledgements This section is devoted to thanking any persons or institutions that made the research possible.

You might also like