Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
“May we continue discovering the true meaning of happiness and contentment together.”
2
Preface
Ethicified may contain points that might seem irrelevant to others but my
standard to this book is to express an enlightened student’s point of view and to
reach out to those who were like me before the composition of this book, those
who thought that ethics is a mere individual judgment and by which no other
standard may be considered depending on the nature of living and circumstances.
3
Table of Contents
Cyber Ethics
4
Software Engineering Code of Ethics: Approved ……………………………………………………………………………………. 85
No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All ……………………………………………….. 87
Subsumption Ethics ……………………………………………………………………………………………………………………………….. 89
Ethical Issues in Business Computing …………………………………………………………………………………………………….. 91
The Practitioner from Within: Revisiting The Virtues ……………………………………………………………………………... 93
5
Cyber Ethics
6
Cyber Ethics
Quote:
The world is very close to having technology that can provide electronic
privacy and security on the Internet sufficient to safely conduct
international business transactions. Once this technology is in place, there
will be rapid expansions of Global Cyberbusiness. Nations with a
technological infrastructure is already in place will enjoy rapid economic
growth, while the rest of the world lags behind. What will be the political
and economic fallout from the rapid growth of global Cyberbusiness? Will
accepted business practices in one part of the world be perceived as
“cheating” or “fraud” in other parts of the world? Will a few wealthy
nations widen the already big gap between rich and poor? Will political
and even military confrontations emerge?
To know the basic principles of ethical thinking that can be applied in our nature of
business as an Information Systems student.
Review:
7
What I learned:
Integrative Questions:
1. What are the four (4) global issues mentioned in the book?
2. What is known to be one of the more controversial areas of computer Ethics?
3. He has been a strong advocate for a different approach in defining the field of
Computer Ethics. Who is he?
4. What are the five (5) aspects of logical security?
5. It is an aspect of security that ensures data that we see today will be seen again
tomorrow. What is it?
8
Cyber Ethics
Quote:
Review:
This chapter covered mostly issues about being ethical with information that is open
for public or private use on-line.
Being a student nowadays involves massive research work and as a student now, I
know that the library, in some situations, is not the best place to look for a single
word you need to have meaning to. Would anyone even go to a library that can be
huge as a post office just to define or answer homework such as “can you define the
hidden issues in the well-known holocaust?” I know right! That is not a logical
approach to such homework because you have to search through the million books
available with the word “war” or “holocaust” in them just to connect the ideas and
get the real facts. You can ask any student you know how they get answers to their
homework or research papers and they will all say that it is that they got it from
some online source because how hard is it to type in a few words from your
homework in a search engine? That is literally no hassle because all you have to
think about is if you got the spelling correctly. It is not really the usual way but it is
the best and fastest way to get results and get answers – by looking for it online.
The information available is just so massive and robust that it cannot even be
compiled one by one in a single website because the information made available
online is the biggest source you can ever experience. It is a precious gift given to us
by people who cannot do anything in a day that discovered they can put information
online for everyone to use. I’m not advocating that the use of the resources of
libraries are obsolete but there is a better way – the fastest way through online
technology.
9
What I learned:
Integrative Questions:
10
Cyber Ethics
Quote:
To have an idea what are the responsibilities connected to the growth of computer
ethics
Review:
There are different ways of looking at things. For example, I am the user of a
website. Of course, how the website works, how it scans through the list of its
products and how it calculates my overall checkout cost is not my concern but its
effectiveness is that truly counts for me but that do not stop there. The use of online
information, as an example, is not just simple copying and pasting information from
a website to a word document then to be submitted the day after. There are stated
rules or policies, as respect for some, that much be strictly followed. But is it really
being abided by people who take the benefits of such feature? I even know people
that ALMOST got suspended because they failed to put source in their final research
paper. I know that the usual answer of students to such situation is “What?
Suspension because there is no source?” okay, that response might seem nonsense
to professors but look at the most obvious part of that reaction, that information is
available online so why bother source it? Why not just put “I got it online, okay?”
and the main reason to that is because it is something that is supposed to be
sourced, something that we value where in we need to credit the author, it is
something made for us to be accessible so a simple sourcing should not be a big
deal.
Remember, there are reasons why we have to comply to policies that are made
available for us to read through. It is not really something to just scan through
11
because how in the world will we get the truth in things if we don’t even take time to
understand it?
What I learned:
Integrative Questions:
12
Cyber Ethics
Quote:
The world is very close to having technology that can provide electronic
privacy and security on the Internet sufficient to safely conduct
international business transactions. Once this technology is in place, there
will be a rapid expansions of Global Cyberbusiness. Nations with a
technological infrastructure is already in place will enjoy rapid economic
growth, while the rest of the world lags behind. What will be the political
and economic fallout from the rapid growth of global Cyberbusiness? Will
accepted business practices in one part of the world be perceived as
“cheating” or “fraud” in other parts of the world? Will a few wealthy
nations widen the already big gap between rich and poor? Will political
and even military confrontations emerge?
To know the basic principles of ethical thinking that can be applied in our nature of
business as an Information Systems student.
Review:
One thing I lime when I read this part of the chapter one, I finally read something
that deviates from the typical computer ethics and it is this disclosive type of
computer ethics.
The main issues that disclosive computer ethics target to affect directly are not the
typical programming style or issues in the development stage which is most typically
addressed by ethical policies. It deviates from something that is common, something
that requires us to be aware. It is much broader yet it is detailed in a way that it
involves something that we are mot concern about without use really knowing it.
Honestly, after reading through all these by now, I realized that policies is not hard
to comply to but rather, people has tendencies to need more information about
something that they should be concerned about so I just hope it all goes well for
both users and developers soon so that we reach the mean of our actions.
What I learned:
13
Integrative Questions:
14
Cyber Ethics
Quote:
Review:
Honestly I was shocked when I read the first few parts of this chapter. I didn’t really
consider gender as an issue when it to the topic of computer ethics because in all
I’ve been through so far, academically, I haven’t felt as though I was deprived of
anything such as freedom, autonomy, whatsoever that has something to do with me,
being a girl.
I remeber a funny incident that my professor told us in one of our classes. He said
that in his workplace, the men and women are separated in a way that men have
different and a very particular job which is not for women and as I remember, he
specifically told us that once you take the job where women are mostly assigned to
means you’re gay or something. I know right? Isn’t it weird how men often consider
themselves more capable than women?
What I learned:
15
• Plea for Feminisy Ethics
Integrative Questions:
16
Cyber Ethics
Quote:
Review:
The values stated are complicated to explain but one way or the other, this chapter
just means that there are given values that we have the option to follow when it
comes to global information structure.
What I learned:
17
• Democracy as the Starting Place: Power and Insularity
o Power to the Many
o Joint Deliberation
Integrative Questions:
18
Cyber Ethics
Chapter: Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key
Problems and Challenges
Quote:
In the wake of the Enlightenment the emphasis in ethical theory has been
for a long time on systems and rules. Almost invariably, these rules were
derived from some supposed “ethically perfect world.” But ideal rules may
workout very differently in (non-ideal) practice. That is, it may be the case
that such a rule will give rise to gliding scales, e.g., “ethical” and
“unethical” cases ate so hard to separate by observable criteria that it is
better to forbid some cases that such a rule will give rise to gliding scales.
Review:
Stating a single problem being faced today in terms of computer ethics is impossible
because new ones sprout out of nowhere everyday which makes it hard for one to
focus on the existing or to move on to another problem.
The real problem here is determining the problems that the IT industry is now and
will face. How? That I am not really sure of because come to think of it, it is
something we can’t fully predict but that alone is a problem. You know what I think
the industry should do? They should just let it come to them. It is like the movie I
recently watched, “Underworld: The Rise of the Lycans”, where in they waited for
Lucian to get back to them, not them looking for him because like the old saying
goes, “It is hard to find someone who does not want to be found”. Let us just think
of the movie and connect that to how the IT industry should handle such problem.
We have no idea what will happen tomorrow so why try right? We try because we
want to be prepared and we want it to be aware that we know what will happen.
Some kind of threat that is! Anyway, the IT industry should just focus on what is
happening now and fix what had already happened because that way, they can place
themselves in a place where both them and the users can benefit from because it is
a two way street and if it is not, then no one will even consider thinking about having
a computer and connecting online because they will be afraid of what might be
gotten out from them.
What I learned:
19
Integrative Questions:
20
Cyber Ethics
Quote:
Policies are rules of conduct ranging from formal laws to informal, implicit
guidelines for action. Policies recommend kinds of actions that are
sometimes contingent upon different situations. “Turn off your computer
when you are finished” is a policy, though probably one without much
ethical significance. “Don’t steal computer chips” is another policy with
more obvious ethical content. Even when policies are the policies of
others, they can help us to regulate our lives. We know what to expect
and can react accordingly. If a restaurant has the policy of waiting caller
ID to capture the numbers of incoming phone calls, then, if we don’t want
to have our phone number known by the restaurant, we can block the
caller ID system or use another restaurant. In this discussion our concern
is with those computing policies that make an ethical difference and how
to evaluate them properly.
To know the basic principles of ethical thinking that can be applied in our nature of
business as an Information Systems student.
Review:
Both as a developer and a user, I have the idea already what the other users want
and how hard it is to develop. Prior to that decision, I have to consider how much
impact it may cause change to the online user experience of whatever I'm trying to
do because of course, I want to be sensitive of what I'm going to develop, I want it
comply to the ethical rules in computer ethics.
I see this as more of a professional conflict than a personal one because it is really
taking a stand of what you believe in and not forgetting that you are a human being
who is capable of making decisions and having individual beliefs so no need to be
forced in doing something you are not fond of. It is like snapping but first using your
head to know which side to fall on to because if you don’t use your head and just
continue doing whatever is asked for you to make even if it is against the law then
21
you are not being professional but rather a sissy that just follows whatever the boss
says and you will eventually turn to a person that has been overcame by greed.
What I learned:
Integrative Questions:
1. What is consequentialism?
2. What are humans not concerned of based on this chapter?
3. What are the combined notions of human life?
4. Why is consequentialism constrained justice?
5. What are the uncharted waters?
22
Cyber Ethics
Chapter: The Internet as Public Space: Concepts, Issues, and Implications in Public Policy
Quote:
There has been much recent debate about what the internet really is – its
role in society – as it rapidly moves from a pure academic interest into the
public domain. Of particular internet when it comes to characterizing
cyberspace is the way we look at the public services that are being
created with the internet. Naturally, since the internet is part of the
national and global telecommunications infrastructure, many tend to
classify the internet’s services into traditional media types. One of the
earlier voices in this debate (Camp and Riley, 1996) argues, however, that
this classification hardly works well. In fact, previous work illustrates,
using events at several universities that neither create protected spaces
nor encourage open dialogue. A different model, based on treating virtual
spaces as their physical counterparts, would better serve both the
organizations and the individuals (Camp and Riley, 1996). We extend this
work by focusing on the internet’s public spaces, and the threats and
promises of mapping physical spatial models onto virtual space.
Review:
Internet is definitely a public space. I already mentioned this last time that the
internet present so many possibilities especially when it comes to giving people a
voice for everyone to listen to. Remember the day you updated your social network
profile? Understand that there was a rush; a rush of you becoming anxious to what
people might think of you or what their impression of you might be for them once
they read your profile. That is the reason why people have voice oneline – they get
to express their true self online compared to what they can do in person because
once you’re online, no one can hurt you by saying mean things because all of you
are doing the same, or even some of you have the same profile designs. The least
person you expect you seem alike to might be that single person that understands
you adn your blogs. The internet is the best thing God permitted us to discover –
might even be a way for all of us to understand each other again in a global sense.
What I learned:
23
o International Marketplaces
o Schools
o The digital stump
o The marketplace
• Implications in Public Policy
o Governance of internet use
o Impact on social capital and society leadership
o Impact on social well-being
Integrative Questions:
24
Cyber Ethics
Quote:
The reason for this freedom was a decision by the administration. For the
Provost University of Chicago is Geof Stone, a former dean of the
University of Chicago Law School, and a prominent free speech scholar.
When the university was designing its net, the technicians asked the
provost whether anonymous communication should be permitted. The
provost, citing a principle that the rules regulating speech at the university
would be as protective of the free speech as the first amendment, said
yes. One would have the right to communicate at the university
anonymously, because the first amendment to the constitution would
guarantee the same right vis-a-vis the government. From that policy
decision flowed the architectural design of the University of Chicago’s net.
Review:
There is a reason why people are taking up law – we need people to know the laws
around here.
I know it may seem nonsense for some of us to even think of the idea of reading a
12-inch book of by-laws but stop and think that for us to follow the law and comply,
someone has to explain it first because you know how smart people may tend to be.
We need people to constantly remind us of the right and wrong thing to do and that
also applies in computer ethics that for us to truly be aware, understand, and apply
the laws of computer ethics, someone has to study it first and hopefully, that
“someone” will be the instrument for us to listen.
I am not in the position to criticize but think about how the world of computer
technology will function if no person will comply to online rules and regulations?
What if everything is just allowed to be done online? I bet that will be the ugliest
place for the new generation to visit because it will cause them to not change how it
is going but become one of those people that becomes affected and useless once this
lawless phenomenon breaks loose. It is like summoning freedom for the good and
evil in one accessible medium for everyone. True that we will never know and true
that it is still people’s choice to whether or not comply to the laws implied but we can
change it one way or the other especially if we allow it to sip in and be absorbed by
our reality.
25
What I learned:
Integrative Questions:
26
Cyber Ethics
Quote:
Review:
Spam has been around like years ago but why is it bothering us now? Why does it
continue to bother us even when contents are actually relevant? Here is the thing, it
is actually not relevant, why? Because it is just a random electronic mail for
everyone to open and read and take note, it may even contain malwares, virus, etc.
Well, most of us nowadays have emails right? And I am certain that you already
encountered the dreaded spam emails that are quite irritating especially if they serve
no relevance to your daily life. Even website companies already took action to this
so-called spam because they want full and clean service to be given the their clients
or online customers. I have a yahoo account and a gmail which is why by now, I am
fully aware of the separate spam folder which they automatically detect based on
your options for segregating spam mails to real and valid emails. Cool huh? I love
that feature because obviously, I can just clean up one folder knowing that it
contains all the junk mails I have no time reading.
What I learned:
• The incident
• The explanation
• The question
• The debate
27
Integrative Questions:
28
Cyber Ethics
Quote:
Review:
True, the cyberspace or as what I would like to call it, the world of the great internet
is really burning because of all the contents being present for everyone’s eyes to see.
I know it is a great source of massive information about EVERYTHING but is it really
necessary to put up websites that encourage people to commit an actual sin? Hey, I
won’t sit here and try to elaborate on what I am saying or give details to what sites i
am talking about but I will try to explain why I am absolutely into the fact that
people, particularly parents, should activate their blocking or filtering software on
because of all the dirty websites crawling around the internet for their children to see
which is not at all pretty – believe me.
What I learned:
• cyberspace burning
• Free speech online: a victory under siege
• Rethinking the rush to rate
• Recommendations and principles
• Six reasons why self-rating schemes are wrong for internet
• third-party rating
• The problems with user-based blocking software at home
• Blocking software should not be used by public libraries
• Internet rating systems
29
Integrative Questions:
30
Cyber Ethics
Quote:
Thus, access criteria are preset by the product manufacturer and can be
altered by the regular downloading of updates or even altered, for certain
of the filters, by the active user. Not surprisingly, most users, especially
busy parents, are likely to use the default criteria and therefore have
minimal awareness of which sites and newsgroups are not accessible.
Since blocking and filtering programs are commonly available, the focus of
this paper will be on their use; however, also of importance, and
potentially more dangerous, are rating programs, analogous to systems in
place for movies and television. Two systems are intended to first
encourage and later require websites and newsgroups to rate themselves
along a number of dimensions for example includes nudity, sex, violence,
and language. Browsers and search engines could then be programmed to
return or access sites and newsgroups that satisfy a preset profile. The
dangers associated with self-rating schemes will be discussed later in this
paper.
To know why filtering and blocking are both wrong in some cases
Review:
There are a lot of problems with blocking and filtering contents because such
features restricts access to some content that some people might actually want to
gain access too. For example, just the other day, i saw this kid browsing through the
internet about something that let’s just say, not for his age but then it’s there, it is
there wide and open for the innocent kid to see. That is not for him but how come he
has access to it? Is it the fault of the parent? Or is the browser the one to blame?
Why won’t they activate the filtering feature of the browser? Okay, just thinking
about who is the one to blame or the one who should take action makes me want to
complain my throat out to the parent but what can I say, he’s a kid who is just
randomly searching random sites with explicitly random content.
31
What I learned:
• Definitions
• Examples of Problems with blocking and filtering programs
• Mainstream Loudoun
• Librarians and filtering programs
• Discussion and analysis
Integrative Questions:
32
Cyber Ethics
Chapter: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique
Quote:
Review:
I often wonder why people are doing porn, not just watching, but actually
contributing to the dirty industry of online pornography.
Honestly, I don’t think I have the right to be one-sided on the whole stop-the-
pornography-because-it-harms-children-as-well issue but I have to speak for those
who can’t speak right? It’s wrong! Yes, it is but what can we do about it really? Like
the old saying, “If you can’t stop them, filter them” okay, I changed it a little bit but
I modified it in a good way, for aid my explanation that porn, on my point of view,
definitely allow women in particular to be objectified by no-gooders but what can we
do really? We can’t stop this wide spread porn frenzy so to help us try and be careful
with it for children or people who need not view pornography, blocking and filtering
software are ready for activation even in browsers present at our very homes so
being protected and clean, all we have to do is activate it. It may be a simple action
because a few clicks won’t impale anyone but it will save a kid from this mental harm
it might cause. Some people find porn educational but honestly speaking, it is not for
children. It is something I strongly believe in because I wouldn’t want my younger
sister seeing a pop up that contains explicit content for her eyes to see. It is not
something to be open up for everyone in all ages which is why I am thankful that
laws such as child pornography prevention act is implemented. Although it does not
completely clean out the internet from porn, porn and more porn, it still helps even
just a little.
What I learned:
• Definitions
• Scope
33
• Child pornography prevention act
• Argument 1: CPPA Violates the First Amendment
• Argument 2: CPPA’s protective are inadequate
• Argument 3: CPPA can harm our children
Integrative Questions:
34
Cyber Ethics
Quote:
Review:
So why is it so important to protect online users from all the possible content they
can have access in their own little browsers?
It is not about the websites because the more the merrier but it is about the content
of those websites that often times, can be scary for a responsible adult to think
about especially when they have the responsibility of taking care of a kid. It is tragic
to realize that the more the internet becomes more beneficial, it becomes more and
more dangerous to particular users.
I know it is a bit of a paranoia for parents, that having connection will serve their
children with contents they are not supposed to see but one thing I’m sure of is that
there are options they can use to protect their family.
What I learned:
• Definition of PICS
• The labelling vocabulary
• Granularity
• Creation of labels
• Coverage
• Revenue generation
• Collaborative labelling
• Online journals
• Labelling vocabularies
35
• Privacy vocabularies
• Reputation vocabularies
Integrative Questions:
1. What is PICS?
2. What are the specifications of PICS?
3. How do you make the internet better?
4. What is flexible blocking?
5. Identify ways to do flexible blocking.
36
Cyber Ethics
Quote:
The one ambiguity in all of this is the need to factor into our analysis of
responsibility the difficulties and costs that are involved in preventing
harm or rendering aid to someone else. What are the limits of
responsibility in cases like this one? How much time and money should
ISP’s be expected to spend on investigating allegations of defamation?
These are pertinent questions with no easy answers. However, I would
argue that while it will be somewhat costly to take these investigative
steps promptly and efficiently, economic feasibility does not seem to be
issue at this point unless the incidence of defamation in cyberspace
reaches epidemic proportions. The critical importance of protecting private
reputation must be weighed against the modest cost of post-screening.
Review:
The chapter mostly contains evidence that demonstrate the reasons why a revision is
necessary in policies concerning defamation liability.
What I learned:
37
Integrative Questions:
1. What is ISP?
2. Expound on the idea of legal defamation.
3. Is there such thing as moral perspective? Explain.
4. Why does the cyberspace alter the need for libel laws?
5. What are the legal precedents for ISP liability?
38
Cyber Ethics
Quote:
Review:
I don’t really know how this will eventually be better but one thing I am sure of is
that this digital millennium copyright act will be helpful to both users and developers
because it protects both parties by enabling copyright before use.
Believe it or not, it is necessary to cite your source. I know only few of us heard
about getting in trouble for it but it really is a big deal because one time, I have a
classmate that, well, plagiarized his work but he was able to get away with it. It
might be an encouraging situation to some but it really is insulting to others who do
not plagiarize or at least to some who actually accredit their source because it is
their work and they have to be acknowledged if you are planning to use their idea or
content.
What I learned:
39
o Limitations on liability relating to material online
o System Caching
o Information location tools
o Limitation on liability of non-profit education institutions
• Conditions for eligibility
Integrative Questions:
40
Cyber Ethics
Quote:
Review:
First of all, I can’t be lie and say I have no idea whatsoever about this issue of the
illegal distribution of DeCSS because I know someone who actually have or use it for
decrypting DVDs.
It is for a fact that people want quality in a cheap price, that is how economics work.
Sell it in the lowest price possible and you will get as many buyers as you can
because that way, you can earn profit. Let’s keep this one a secret but I know a
place, a magical place, where DVDs roam free and buyers walk through the garden
of piracy without any care of it violating a major rule. I made it sound like a fairy tale
but you know what is really going on in the world right now? We are surrounded by
piracy because people like it cheap and piracy is cheap which is why it is so hard to
contain it in a jar.
Piracy is all over the internet and the fact that it is makes it more invincible to defeat
because it is in the internet and that is a powerful place for something so in demand.
Frankly, I don’t really think that there can be something to stop the massive growth
of piracy online because everyone feeds the monster a little at a time so if there is
something to stop this madness, I think now is the right time to implement it.
41
What I learned:
• Technical background
• The lawsuit
• The outcome
Integrative Questions:
42
Cyber Ethics
Quote:
Beyond the failures in the decision-making process lie failures in the way
that we think about the issues. The environmental movement gained
much of its persuasive power by pointing out that there were structural
reasons that we were likely to make bad environmental decisions; a legal
legal system based on a particular notion of what “private property”
entailed, and an engineering or scientific system that treated the world as
a simple, linearly, related set of causes and effects. In both of these
conceptual systems, the environment actually disappeared; there was no
place for it in the analysis. Small surprise then that we did not preserve it
very well. I have argued that the same is true about the public domain.
The fundamental aporia in the economic analysis of information issues,
the source-blindness of an “original author” – centered model or property
rights, and the political blindness to the importance of the public domain
disappear, first in concept and then, increasingly, as a reality.
Review:
The chapter was a bit confusing on my part. It expressed an idea of property which I
failed to define in this review because of its complexity and it’s overrated analysis of
information property but of course, I’ll still try my best to explain what I think the
author meant.
True enough, intellectual property is not out of balance because it concerns a lot of
factors. I know I may not be able to speak fully about it because with all honesty, I
find it hard to comprehend what the author meant with his/her two contradicting
thesis confusion but one thing I am sure of is that both the environment and the
economic standing of an area have an effect to a property of a system. It may not be
obvious but it has and which is why so many law had been submitted just to protect
that right of the user and the developer.
What I learned:
43
Integrative Questions:
44
Cyber Ethics
Quote:
Review:
My expectation for this chapter was finally met. I wanted to know a clear and concise
definition of an intellectual property and I got it.
There is numerous type of property but one particular property covered in this
chapter is the intellectual property which is the one thing I am most curious about
since I read the table of contents, why you ask? It is because I found the idea of
owning something intellectually as hollow as a wood; therefore, I try to understand
the true definition of it and I try to really comprehend its relation or its connection in
the computer ethics.
But what is the sense of coining such a term – Intellectual Property – in the world of
computer ethics? Is it something that we need to encounter in our own schools just
to be educated about it? Quite frankly, it’s not because intellectual property just
means owning something that is intangible with tangible benefits such as computer
chips and other components of computer made into one fully functional workstation.
This term can even be related to our real life situations such as love, life and family.
We get tangible benefits but we hold intangible property. I think the main concern
for this intellectual property is its loss of concrete owner. Of course, they might
consider those as something theirs but is it not hard to hold something intangible
and own it as though it is something you can just hold in your hand and flash to your
45
friends. The basic logic of the intellectual property might be something that we know
in ourselves already and it is just a matter of time until we finally realize how and
why it motivates us to own it even without a concrete evidence.
What I learned:
Integrative Questions:
46
Cyber Ethics
Quote:
Review:
After reading this chapter, I realized that are different sides that we need to consider
for considering whether or not copyright is ethical.
As someone who is fond of using sources online, I do find citing my resources time
consuming and somewhat useless because most people don’t go online to look at it
anyway because they will rather search in a search engine themselves than type a
long url in the browser from my paper. I know I am looking at the issue blindly but I
have to admit, most people find sourcing their resources is nonsense.
My stand on this is yes it is tedious to cite but it is necessary to point out your source
because it is a way of thanking the author that their work is essential and it helped
you in some way. It is respect to the source of your idea because that way, you
acknowledge their great contribution in whatever it is you are producing. I suppose
typing down a formal citation would not be as hard as going to the author personally
and thanking them by bringing a pack of fruits and chocolates right? So why not just
cite your resources, by that way, you pay respect, give thanks and acknowledge
their work.
What I learned:
• Brief Definition
• The rights
• The origins of those rights
• Property rights
47
• Theories of intellectual property and copyright
• History of copyright in the United States
• Limitations of copyright
• Ethical manner of copyright
Integrative Questions:
1. What is a copyright?
2. Enumerate the rights of copyrighting.
3. What is the origin of copyright?
4. What are the theories of intellectual property?
5. State the history of copyright in the US.
48
Cyber Ethics
Quote:
Review:
Connecting this chapter to the last one which tackles the ethical way of handling
copyright, plagiarism does matter more than the piracy of copyright.
Okay, so what is the different of piracy and plagiarism? Is it not the same or at least
similar by the nature of copyright? Piracy is infringement of copyright and plagiarism
is failure to give credit to the author of the source. I usually encounter these two
issues online. Don’t even wonder why online because I am certain that you are quite
aware that everything is online and everything being available online can be good if
the user uses it correctly and ethically.
I won’t be a hypocrite and say that “No, I don’t commit any form of piracy... What is
it anyway?” because I myself, benefited from such illegal actions which I will not give
details to anymore. The bottom line is even someone who just connected to the
internet can commit such illegal act without an effort. There are programs that allow
you to download files without copyright such as music, photos, movies, and even
ebooks which is so in demand right now. It may be because of the internet serving
easier and way faster alternatives to retrieve such files that makes piracy
unbelievably difficult to terminate. As for plagiarism, I already encountered this
unethical behaviour before in one of my classes. No, I am not the one who did such
thing but one of my close friends. Our professor asked us to submit a nine page
reaction paper on a movie which is unrealistic because the movie alone is hard to
understand. Going back, one of my friends was laughing at us because he thinks we
are all idiots by thinking and typing something down ourselves without
49
understanding the movie unlike him who just copied and pasted his reaction from an
unknown site. Of course I thought it was unfair on our side and so I asked him if sir
will allow us to use other source and if he did, there is no doubt that we need to site
it but he said that he didn’t cite is so that sir wouldn’t have an idea that he
plagiarized the work of an unknown author.
What I learned:
• Plagiarism
• Piracy
• Harm in Plagiarism
• Harm in Piracy
• Use of copyright
• Mix of both concepts
Integrative Questions:
1. What is plagiarism?
2. What is piracy?
3. Explain the harm in plagiarism.
4. Explain the harm in piracy.
5. What are the uses of copyright? Give at least two (2).
50
Cyber Ethics
Quote:
As the World Wide Web has grown in popularity, the property of linking to
other websites has achieved some prominence as an important moral and
legal issue. Hyperlinks represent the essence of Web-based activity, since
they facilitate navigation in a unique and efficient fashion. But the
persuasive activity of linking has generated notable controversies. While
most sites welcome and support incoming links, others block them or seek
to license them in some way. Particularly problematic are so-called “deep
links” which bypass the home page along with the extensive advertising
and promotional material that is usually found there. While some contend
that a site’s mere presence on the web is implicit permission for virtually
any form of linking, others argue that at least in some circumstances deep
linking is unfair and constitutes misappropriation of intellectual property.
Review:
I found it bizarre that in this book, website linking is harmful because it does not
apply now.
Knowing that website linking causes little harm now, I didn’t quite found this chapter
useful at all considering that linking to other websites is often recommended to us
because it can generate revenue and number of clicks.
I suppose I just didn’t get the idea that clearly because of its way of explaining the
concept of such unethical activity. I didn’t even get the idea of respecting the
common good.
What I learned:
51
Integrative Questions:
52
Cyber Ethics
Quote:
The fact that the bazaar style seemed to work, and work well, came as a
distinct shock. As I learned my way around, I worked hard not just at
individual projects, but also at trying to understand why the Linux world
not only didn’t fly apart in confusion but seemed to go from strength at a
speed barely imaginable to cathedral-builders. By mid-1996 I thought I
was beginning to understand. Chance handed me a perfect way to test my
theory in the form of an open-source project that I could consciously try
to run in the bazaar style. So I did – and it was a significant success. This
is the story of that project. I’ll use it to propose some aphorism about
effective open-source development. Not all of these are things I first
learned in a Linux world, but we’ll see how the Linux world gives them
particular point. If I’m correct, they’ll help you understand exactly what it
is that makes the Linux community such a fountain of good software –
and, perhaps, they will help you become more productive yourself.
Review:
I read the book “The Cathedral and the Bazaar” already as one of our requirements
and one thing I got from it is the benefits of open source.
There was a lot of concept I had to understand for this concept to work for me. First
of all is that I need to experience the Linux world myself because i started using
Windows when I was 11 years old and can you imagine how long I have been using
and trusting it? I never even tried any other operating system because I got used to
seeing that colourful window already whenever I my personal computer is starting
up. But it is time to change or at least try something new because if I stay with what
I am using now, I don’t think I will be a versatile developer.
I have got to know Linux before I can totally review what I learned from this chapter
but of course let me explain the use of open source. I love it! Yes, call me an
advocate because I really do use open-source and I am inviting other people to do it
as well because it doesn’t only makes our programming lives easier, it also helps the
original developer by allowing other programmers to help him develop his program
more. It is as though the original developer is trusting other programmers his
complete or incomplete program to be developed more and to be used and reused
because it is how things should work and honestly, that is what I think, the true
sense of creating an object-oriented program because developers can use and reuse
the objects present in an OO program.
53
What I learned:
Integrative Questions:
54
Cyber Ethics
Quote:
I have argued that using the core value framework, privacy can be
grounded both instrumentally and intrinsically – instrumentally, as a
support of all the core values, and intrinsically, as an expression of
security. I am, however, concerned that the traditional
instrumental/intrinsic understanding may be misleading. Traditionally,
instrumental/intrinsic analyses push us in the direction of a search for a
summum bonum, a greatest good. We try to find the one thing to which
all other things lead. In the core value approach that I am advocating,
some values may be more important than others, but there is not a
summum bonum. Rather the model is one of an intersupporting
framework. The core values, as the beams of a truss, are in support of
each other.
Review:
There are a lot to learn with the term “piracy” alone and that is something you can’t
get away from especially if you are conscious about copyright security.
This chapter was particularly enlightening for me due to my surprise to the theory of
piracy. At first I was like “What? Theory of what? I never thought that actually has a
theory” but now I discovered that it should have because if it does not have a theory
of its own, we would speculate for eternity without truly unravelling the concept of
piracy and why people continue to spread that. I am not innocent in this matter
knowing that in this generation, people are smarter than they were ten whole years
ago and it almost seemed as though people discovering fire has the similar impact of
people discovering internet. That is how huge internet is but of course, there is
always that deep dark negative side that we are all fond off – piracy. We all do it.
Come on, don’t even try and refuse answering this question because I know people
downloaded a file or two when copyright was dumped by online users to share files. I
remember the day I first downloaded an unlicensed file. I was just 13 years old when
I experienced the bliss of having a connection and getting music files for me to listen
to. We didn’t know it was wrong for us to do because first I was young and second,
no one told us that such thing even has a theory! ( see kids, that’s the reason why
you go to school, so you get bored and learn new and great things, significant or
not). Imagine that. A thirteen years old kid committed an official crime. Well I guess
“ignorance of the law is REALLY not an excuse”.
55
What I learned:
Integrative Questions:
56
Cyber Ethics
Chapter: The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with
Regard to the Processing of Personal Data and the free Movement of Such
Data
Quote:
Review:
Lucky for me I know this topic already, or at least I heard about it.
I was not surprised that restrictions online came about recently because hello,
people are sprawling on the Net just to get files that are unlicensed and not
copyrighted like crazy.
Surfing the internet and discovering new websites made me realize that the internet
is a huge and fun place for me to go to because it has everything and we have the
access to it. I know we deserve freedom but come on! People, freedom has
limitations you know. Piracy is one of the new laws that was implemented recently
that I think is about time because both the movie and the music industry is suffering
big time (even though there are other industries affected by piracy, the two
mentioned are the most known and abused of). I am advocating that we should
enforce such law because without it, people would not accredit those people who
really did the work resulting to pure plagiarism and even wide spread loss of
earnings from the author themselves.
What I learned:
57
• Introduction to the structure
• The directive on the question of further processing of personal data
• Data quality
• Legitimate purposes
• Sensitive data
• The right to be informed
• Data subject’s right to access and to object
• The reprocessing of personal data
• Using personal data for a different purpose
• Data protection and the philosophy of privacy
o Privacy as restricted access
o Privacy as control
• Channels for the flow of personal information
o Relationship between privacy and data protection in the directive
o Channels for the flow of personal information
o Data protection and the protection of privacy
o The directive and the protection of channels
Integrative Questions:
58
Cyber Ethics
Quote:
Review:
Privacy is a huge topic because it does not tackle only privacy itself but also pulls the
different methods of control and enhancing privacy of one person. I’m sure life is
such a tough place to hide ourselves. I even heard of a saying that “No secret will
remain unknown” which is what we are going to discuss about.
IT may not be obvious but privacy is something essential for our being to be
complete which is why the term “secret” came about – something that we ought to
keep that may make or break us as a human being. In information technology, it’s a
whole different story because in IT, privacy is one of the main concerns of users
leading developers of create programs that will satisfy the users’ need for privacy
like encryption tools, decryption tools, security file managers and a lot more. We
should never mess with someone’s preferred private work because once we did, we
will cause great impact on that person which can also harm him physically or
emotionally. This concept of privacy does not only apply in the IT industry but also
goes well in real life. Knowing that it is, it will allow us to know our limitations and it
will let us discover our need to become someone who does not tinker with someone
else’s work. We learn to accept that all of us deserve privacy and we all deserve it
59
now. It is similar to having a shadow, it’s there sometimes for people to see and
most of the time, it is not there for the world to see.
What I learned:
Integrative Questions:
1. What is PETs?
2. Why is it appealing?
3. Explain the theory of privacy.
4. What do you mean by “informed consent”?
5. What is the normative privacy?
60
Cyber Ethics
Quote:
They did not, however, anticipate the vigorous public outcry against Lotus
Marketplace Households. An estimated 30, 000 letters of protest
expressed its displeasure. Defenders were astonished. How was it possible
to construe Lotus Marketplace as an invasion of privacy when the
information it contained was taken from public sources only and not by
violating any sensitive or personal realms.? It was to be compiled from
information already. “Out there” and would use no intrusive in bedrooms.
Information was to be harvested from public records and from records of
transactions that individuals carried out in the public arena and made no
efforts to hide. No private zones would be breached, the integrity of home
and family would be respected, and embarrassing personal facts would
not be revealed. Defenders argued, furthermore, that opposition to Lotus
Marketplace violated the right of its creators to pursue profitable
enterprise.
Review:
There are numerous challenges that information technology faces today but one
thing for sure is that they try their best to protect each and everyone’s right of
privacy. Why privacy you say? Because privacy is something we should have, it is
something that should be provided to us fully without making a fool of ourselves to
other people because you have to admit, all of us has a dirty secret we would not
want the world, our neighbour, our best friend, our friends, or our families to know
because it can either make you or most of the time, break you. Privacy does not only
mean privacy of oneself but also of one’s work.
61
Information Technology industry is thinking of ways to protect users like me with
their files, their work, and especially, themselves.
What I learned:
• Privacy
• The personal Realm
• Violating privacy in public – the case of Lotus Marketplace: Households
• Two misleading Assumptions
• Erroneous Assumption1
• Erroneous assumption 2
• Implications for a theory of privacy
Integrative Questions:
1. What is privacy?
2. What do you mean by personal realm?
3. Explain the first erroneous assumption.
4. Explain the second erroneous assumption.
5. What is the final implication for the theory of privacy?
62
Cyber Ethics
Quote:
Review:
We all deserve some quality time with ourselves and it is for a fact that that quality
time with ourselves is not something that should be taken away from us by others
nor other parties.
There are problems with KDD because for one thing, it uses personal data
in terms of categorial privacy, and I have indicated the shortcomings of
traditional privacy conceptions. But the primary concern would be the
problems being faced by using KDD. I know privacy is something we all
should attain and something the Information technology industry should
think of ways to protect us but one thing or another personal information
gathering problem. We can work together through the task of getting
those techniques work for everyone. As a matter of fact, we should
consider cooperating with people that can truly help us with our individual
privacy problems such as those geek and loner people wearing
unbelievably large eyeglasses in universities, no, just kidding because we
should consult those who may know the problem we are facing and can
actually help us out. Something will change once cooperation because it
will result into something good considering now, they can hear your side
of the problem and frustration and you can know their guilt and sleepless
night just to develop that anti-virus or descriptor for you to use. It is all
about give and take now and it is all about groups that are information
subjects for a special purpose. From the perspective of others than the
producers and certain users of the profiles, the definition of the
63
information subject will remain hidden because they do not know the
specific purpose of the definition.
What I learned:
• Definition of KDD
• Personal data
• Law
• Ethics
• Social consequences
• Categorial privacy
• Solutions
• Closing remarks
o Acknowledgements
Integrative Questions:
1. What is KDD?
2. Why is there a KDD anyway?
3. What do ethics mean?
4. Define categorial privacy.
5. Enumerate the solutions stated in this chapter.
64
Cyber Ethics
Quote:
If the courts will not protect private data from being associated with each
other and forming new information about an individual, there is a long-
standing set of methodologies, based on cryptographic protocols, which
can provide such protection. Devised by computer scientist David Chaum,
these techniques prevent the dossier society in which computers could be
used to infer individuals’ life styles, habits, whereabouts, and associations
from data collected in ordinary consumer transactions can have a chilling
effect causing the people to alter their observable activities. While
answering the need for organizations to devise more persuasive, efficient
and interlinked computerized record keeping systems so that everything
from consumer credit social services is not abused. Unfortunately, there is
no real incentive for organizations to implement these rather simple
methodologies, despite consumer concern with data collection and mining.
Thus, as long as the law silent on the subject, it appears that existing
non-intrusive technological means of solving this problem will remain
merely a unit in various advanced courses in the computer science
curriculum.
To be aware how data mining is used and how its privacy can be enforced.
Review:
I know, the first I thought when I first heard “data mining” from one of my major
subjects is mining for data and how redundant is that. But no matter how redundant
or non-sense it is, it is the true meaning of “data mining”.
It is the actual straining or filtering of data from a data warehouse. Remember when
your favourite cereal is on the table and the only pieces you prefer are the pink and
yellow ones? That is exactly what exactly how data mining works or at least not in
the literal way. They filter information and get the requested information from the
data warehouse necessary to the company. It may be that obvious that trying to
create something from scratch is a waste of time so the best way is to reuse and
reuse the existing resources within the physical bounds of the company or outside.
Extracting the necessary or the desired information that will be utilized and will
eventually be analyzed for the use of the business is a crucial process. It will also
allow other possible resources to be utilized and not be wasted. One thing I learned
from my production management course, “Never allow something to be a waste.” I
am not saying that we should be cheap about it, I am just saying that it may not be
obvious but saving up and thinking of ways to use “wastes” will really help the
65
company in a whole new different level. Discover all the possibilities and you will be
shocked.
What I learned:
Integrative Questions:
66
Cyber Ethics
Quote:
For the individual, privacy secures autonomy, creates social capital for
intimacy, and forms the basis of structuring many diverse social relations.
It is generally accepted that it is in the interest of the individual to have
maximum control over her privacy – here taken to be the freedom from
the appropriate judgement of others. For the collective or institution,
transparency secures control and thereby efficiency of resource allocation
and utilization as well as creating mechanisms for disciplinary
intervention. It is generally accepted that it is in the interest of the
collective or institution to have maximum control over surveillance – here
taken to mean subjecting all individuals in the institution to reasonable
scrutiny and judgement. If the individuals are given an absolute right to
privacy, they may act only in their own interest and may thereby defraud
the institution.
Review:
Why would anyone want to spy use even during our work hours? – Assurance.
It may not occur or it may not be something you will probably hear every day but
workspace surveillance does happen and is being continuously implemented
especially now. At first, I found it inappropriate because I would not want anyone to
see me while I am working and it will be uncomfortable to have one eye on me 24/7
and redirecting my images to a room with two guys eating doughnuts as though my
live feed is some kind of entertainment. Who in the world would not get irritated with
that? But here is the side of the great company we may eventually work with in the
future, “it’s for your own protection” but the truth is, it is for their protection. I
really don’t think surveillance in everyone’s workspace should be implemented
because it is irritating, uncomfortable, and simply an intrusion of privacy that should
be given by the companies to their employees because they can’t always put an eye
on their employees or else they will feel too strangled with the corporate reasons and
watch that it will become hard for them to work. If the institution I given a complete
right to transparency, it may strip the individual of autonomy and self-
determinations by making inappropriate judgements that only serve its own interest.
What I learned:
67
• Definition of privacy and justice
• Resisting workplace surveillance
• Privacy as a matter of justice
• Privacy, surveillance, and distributive justice
o From individual perspective
o From the perspective of the collective
o Self-interested individuals
• Conclusion
• Some implications
Integrative Questions:
1. What is surveillance?
2. Why do we need workplace surveillance?
3. Is there a need for surveillance in the workspace? Explain.
4. What is justice?
5. What is distributive justice?
68
Cyber Ethics
Quote:
Review:
There are a lot of things that should not or should never be done by anyone online
but still people do it because, honestly, what will happen to them anyway?
It is really a shocker when people starts complaining about those irritating pop ups
that most often than not show up from random sites you visit but that is not really
the thing they should worry about, because they should worry about the fact that
they need to think of ways how to extinguish those recurring pests to stop spamming
them or retrieving information from them in the first place. I know it is tough to
think of such things but it is really just a matter of thinking a smart way of
approaching such problems. I can name more than ten informational wrongdoing
that have been happening online in a consistent basis but I beg to not do so for I do
not want anything to leak out of myself and gets blamed for it so I better research a
little bit more and make sure that what I know is true and what I know are proven
facts. Now once I’ve done my research, maybe I can impart a little of what I learned
so far, no not from class but from tedious research.
I am not kidding. It is really just about life itself for the reason why we need to get
something out of what we already have. Do you get it? No? I don’t get it as well but
I am trying to think. Trying to think of a definition that will best explain that to
people who can’t read or write and hopefully find it as soon as possible so I won’t get
lost with words.
69
What I learned:
• Definition of Privacy
• The different varieties of informational wrongdoing
• Panoptic technologies and the public good
• Information-based harm
• Informational inequality
• Informational injustice
• Spheres of access
• Encroachment on moral autonomy
Integrative Questions:
1. What is privacy?
2. How can you categorize an action to be a “wrongdoing”?
3. What do you mean by informational wrongdoing?
4. What are panoptic technologies?
5. Define the type of wrongdoing that is a harm based on information.
70
Cyber Ethics
Chapter: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in
Cyberspace
Quote:
Review:
Now, having an idea of what are those boundaries, information technology wise, it
will serve as our protection to future harm that we might experience. I actually found
how it becomes almost futile to do something. You see, man does something
because of a feeling that he needs to do it. He can’ give exact reasons and if that’s
the case, he’ll blame his heart but what if it is just plain instincts? Isn’t that worth
something to be accounted for? I know life is just like that. Do this and do that but
setting up your boundary my friend, will truly help you with scope in any project.
Last two terms, I had a classmate who is such a scope creep because he never stop
adding something, a feature or a function in his website which was supposed to have
been launched a week earlier. Of course, being such a scope creep as he is, he never
did finish the project and started blaming his team mates for it because of their loss
in that situation. There are two wrong things in that story I just told you, first is that
he blamed his teammates for something he did to himself and second, he was a
huge scope creep and someone has to stop him. It will be a matter of time until he
realizes that scope will get to him.
What I learned:
71
• Definition of a Computer crime
• The need to know these computer crimes
• Legal categories of computer crime
• Moral categories of computer crime
• Informational/descriptive categories of computer crime
• Computer crime as a descriptive category of crime
• Establishing clear and coherent criteria
• Applying the definition to some specific cases
• The three types of computer crime:
o Piracy
o Break-ins
o sabotage
Integrative Questions:
72
Cyber Ethics
Quote:
To define a hacktivist
Review:
First of all, let me just connect the definition of the word hack. Hack has several
meanings in the technology and computer science fields. It may refer to a clever or
quick fix to a computer program problem, or to a clumsy or inelegant solution to a
problem. The term is also used to refer to a modification of a program or device to
give the user access to features that were otherwise unavailable, such as DIY circuit
bending. So therefore, a hacker is a person who breaks into computers. The
subculture that has evolved around hackers is often referred to as the computer
underground. Proponents claim to be motivated by artistic and political ends, but are
often unconcerned about the use of criminal means to achieve them.
While other uses of the word hacker exist that are not related to computer security
(computer programmer and home computer hobbyists), they are rarely used in
mainstream context.
There are different types of hacker, the one that helps people and the one that
harms them. Similar to pests, some does something good to your plant and some
just eats them away like they haven’t eaten for years. But a hacker is not a
Hacktivist. Based on good ol’ Wikipedia, Hacktivism (a portmanteau of hack and
activism) is "the nonviolent use of illegal or legally ambiguous digital tools in pursuit
of political ends. These tools include web site defacements, redirects, denial-of-
service attacks, information theft, web site parodies, virtual sit-ins, virtual sabotage,
and software development." It is often understood as the writing of code to promote
political ideology - promoting expressive politics, free speech, human rights, or
information ethics. Acts of hacktivism are carried out in the belief that proper use of
code will have leveraged effects similar to regular activism or civil disobedience.
Fewer people can write code, but code affects more people.
Hacktivist activities span many political ideals and issues. Freenet is a prime example
of translating political thought (anyone should be able to speak) into code.
73
Hacktivismo is an offshoot of Cult of the Dead Cow; its beliefs include access to
information as a basic human right. The loose network of programmers, artists and
radical militants 1984 network liberty alliance is more concerned with issues of free
speech, surveillance and privacy in an era of increased technological surveillance.
Essentially, the controversy reflects two divergent philosophical strands within the
hacktivist movement. One strand thinks that malicious cyber-attacks are an
acceptable form of direct action. The other strand thinks that all protest should be
peaceful, refraining from destruction.
What I learned:
• Definition of a hacktivist
• Hacktivist Ethic
• Electronic civil disobedience
• Hacktivism and electronic civil disobedience
• Hacktivism
• Cyberterrorism
• Toward a Hacktivist ethic
o Access to computers
o All information should be free
o Mistrust authority
Integrative Questions:
1. What is a Hacktivist?
2. What is a Hacktivist ethic?
3. What do you mean by electronic civil disobedience?
4. What is Cyberterrorism?
5. Differentiate Hacktivism from Electronic Civil Disobedience.
74
Cyber Ethics
Quote:
Review:
Updates are then shown on the user's home page using a timeline which lists all the
updates received in chronological order, and delivered to other users who have
signed up to receive them. Users can respond to other users' updates from their
timeline through the Plurk.com website, by instant messaging, or by text messaging.
Now I know why my classmates are getting into plurk too much and it is because
plurk allows people to know what their friend, their crush and even their professors
are doing in every hour of every day. It is like, the more you inform people of your
current physical ,emotional, and even spiritual status, the more they get attached to
you and the larger your network gets. The more informed people gets, the more
interested and curious they are of you as a person. I am not saying that this allows
me to become exposed but it just helps people understand me more as a person, a
student and a friend because of my status. It allows them to understand me and at
the same time know what I am doing and what keeps me busy like I can just put
there, “Currently typing my review for itethic” – see how detailed and brief you can
be without giving too much.
What I learned:
75
• A replay attack
• Simple replay attacks fall with public key cryptography
• Browsing information
• Provided technical services
• Browser client connects
• Definition of the following:
o ISP
o IP
o DNS
o Web proxy
o Legal Issues and Societal Implications
o Web activities
Integrative Questions:
76
Cyber Ethics
Quote:
Review:
I have been known in my class to be the very mysterious one. I do talk a lot and
loudly at times but no one really do know me. People and some of my friends already
told me that I should let loose and just, you know, let myself be open to the world,
but that is not me. This is me. I am person who is anonymous. I have to admit, I am
mysterious even to myself because I tend to not talk about things about me that
much considering my interest with other people’s lives. I find my life boring even
though people kept on pushing that I am doing the coolest things because for me,
the hype is not there anymore; it is nonexistent. I am a living breathing proof that
anonymity is supposed to be alive in this world where technology made it almost
impossible to keep something from someone online. It is like people knows what the
other person is doing. An example of an application that does such a thing or aids us
for becoming more informed in other person’s every movement is plurk. I recently
created an account just to see what is the hype all about. To know why my
classmates are creating accounts and having too much fun and you know what? I
finally know why.
What I learned:
77
• Information registration
• Gatekeepers
• Analysis after admission
• Methods
• Anonymity of sender
• First encryption with a public and secure key
• Double encryption twice applied
• Encryption procedure with an anonymity sender
Integrative Questions:
1. What is data-flow?
2. Why do we need information registration?
3. What is a gatekeeper?
4. Is it really necessary to analyze after admission?
5. Explain the encryption procedure with an anonymity sender.
78
Cyber Ethics
Quote:
To know what and how biometrics work and how it identifies one’s identity
Review:
Biometrics is a term I first heard of not from the internet, from our professor, or our
parents but from a classmate of ours who is quite familiar with hardware.
I know this technology is magnificent because it can detect who we are just by
pressing a little hard on a piece of machine that is handy enough to be a pocket. So
anyway, biometric technology is what we are supposed to use for our thesis because
one of the features of our website will be an online attendance record for everyone to
look into, particularly the students. Honestly, I asked my team mates how does
biometrics work because it is amazing how a touch of a finger can literally make your
identity suddenly show up. I know it isn’t really something you want to investigate
on but I came to a decision to work on it because I always am curious and what
better way to lose that curiosity? Feed it! Let us not settle for something irrelevant
and definitely don’t settle for something that is not even worth the time because if
that is the case then you will regret those time wasted on something irrelevant and
wished that you focused yourself into something more necessary in your existence.
Biometrics is cool enough as a word but knowing how it works is way cooler! Never
limit yourself to just one thing because if you do, you will regret it. Explore and
become a risk taker because one thing I have learned in my business finance class is
that higher risk, higher returns so invest in it so you won’t feel neglected or left out
with the bloom of technology nowadays. Don’t be afraid of technology, appreciate it.
What I learned:
• Use of biometrics
• ATMs
79
• Identifying biometric identity
• Virtual identities
• Questioning the biometric body
Integrative Questions:
1. What is a biometric?
2. How can a biometric identify our identity?
3. How did an ATM came about?
4. What do you mean by virtual identities?
5. What do you mean by questioning the biometric body?
80
Cyber Ethics
Quote:
Review:
Just yesterday I stopped at this restaurant and bought something for dinner and as I
was waiting for my take out, I realized that I was buying food in the same place for
the last five years but still, it is the same. Same set of food, same interior design,
same chairs and tables, same menu. Nothing changed. But then, I started noticing
the people within the restaurant. MY attention got first pulled to this rich old guy who
I know a solid fan of this restaurant as well because I’ve been seeing him here since
last year and he changed, not much, but he did. Back then, he just wore shorts and
polo shirt with a baseball cap – very casual – and waits for his order patiently near
the door but now, he always have his iPhone with him since the dreaded iPhone
launch in Hong Kong and he never did stop his fingers from pressing the screen
every time he waits. I always noticed him being rich and all but I never saw him that
attached to a gadget before and plus, he is a friend of my dad so I do know him
outside the restaurant. My dad often tells me that technology changes people’s lives
and I always nod and say, “it will continue to do so” because one thing I am sure of
is that technology grows so fast and it continues to change how we live.
What I learned:
• Philosophical foundations
• Major issues
o Flagrant quantitative imbalance
o Inequality in information resources
o De facto hegemony
o Lack of information in developing countries
o Survival of the colonial era
o An alienating influence in the economic, social and cultural shpres
81
• Code of ethics
o Issue definition and evaluation
o Action/Inaction Evaluation and implementation
Integrative Questions:
82
Cyber Ethics
Quote:
Review:
I read the short version (come on, who wouldn’t read it in the first place? Everyone
is quite curious already) and I found it, for me personally, complete. I would not
really ask to put something more or include another ethical rule in the code of ethics
for software engineers because based on what I am experiencing now in this
industry, or at least within my practice within school bounds, I know these must be
complied and must be followed because without one, there will be imbalance and
with too much, a total wreck. But of course, I am never closing doors on the code of
ethics as is. I want it to grow as well or maybe the detailed version should cover up
something more. Right now, that is fine with me and having read it, it is not only
applicable in the IT industry but also applicable in marketing, HR and other industries
out there because this is a general concern for all and never a template to just one.
What I learned:
83
o Employer
o Product
o Judgment
o Management
o Profession
o Colleagues
o self
• The full version
• The applied principles
Integrative Questions:
84
Cyber Ethics
Chapter: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All
Quote:
Those who write moral codes (or things that could be mistaken for them)
need to be aware of the possibility that they may be abused. Codes that
address some issues but not the others are very common, and particularly
open to such abuse on issues at the edge of their competence. Codes
should make it clear what their area of competence is. More importantly,
thought, authors of codes should always make it clear that their code is no
substitute for careful moral consideration and especially in areas or on
questions where there is no clear guidance in the code.
To be aware how drastic the change my be once the codes of ethics is incomplete
Review:
First of all, I really do not think that it is the question of whether or not the codes of
ethics is complete because one, how can one even determine if it is complete and
two, how can we even complete it in the first place. Knowing the dynamics of
computer ethics will save those who needs codes of ethics because they will have
something to follow through and analyze whether they are doing the right thing or
not but it is something that we cannot really determine or just put into papers –
proper or appropriate code of ethics. Personally, I think there are a lot to consider
especially if the completeness of the code is important such as the nature of work,
the people involved or those people who needs to comply with the codes, the politics
within the organization, and even their common understanding of how crucial a
computer ethics code is in a company. As for those who write moral codes has to
know the possible events that may occur once a moral code is written or not written
done because there might be cases wherein those codes has to strictly follow and
comply to practical actions people actually do. It has to address both common and
one of a kind situations in which they have to build their moral codes around because
if they don’t, they will be left with nothing but moral codes that does not even cover
a little of those situations that might occur and definitely become a waste of time
and waste of moral codes because it won’t even be used.
What I learned:
• Definition of PAPA
• Weapons or the question of whether the technology for use in weapons systems
ought to be developed
• Environmental impact of these systems
• Teleworking
85
• Telecommuting
• Protecting the weak against the strong
• Importance of the PAPA issues
• The pressures to look for loopholes on codes
• Incomplete moral codes
• Complete moral codes
• Avoiding accidental incomplete moral codes
Integrative Questions:
86
Cyber Ethics
Quote:
Review:
Subsumption may occur anytime, anywhere that is why looking into computer
systems and how they get developed should really be a careful task.
As a student, we always get asked to do these group projects that honestly becomes
redundant already so as a solution, I always write how I want to do down. A
situation I applied that is just recently when my professor asked us to develop an HR
(Human Resource) System with typical functionalities. We are used to developing
such systems, quite frankly, that is the one system we’ve been developing since my
first year so that was not so hard at all except that we need to develop it in a
programming language we barely even heard of and so does google. As a solution, I
just put into consideration some of what I heard of from our professor and I took
down the points of my activities such as research and other lab work and just to
make sure that I will develop this project in time, I made sure I put down the norms
I want or I should follow because without it, I am sure is will get bored or just copy
the work from another classmate who knows very well how to develop in that
particular programming language. I am never a cheater and I maintained that since
nursery so I know I won’t start now. This project may be tough but it is a challenge
for me as a developer. It may not be that obvious but writing down what you should
do and taking away those redundant activities during the development phase is a
good thing especially in this industry because that way, we won’t waste both money
and time which are known to be crucial in the IT industry.
What I learned:
• Subsumption ethics
• Systems Development
• Organizational policy drives IT development
• Axious of Subsumption ethics
o Four axioms
87
• Ethical Framework
• Philosophical frameworks applied to subsumption ethics
• Unnecessary complexity to common C programmers
• Popclient becomes fetchmail
• Fetchmail grows up
• Few more lessons from fetchmail
• Necessary preconditions for the bazaar style
• The social context of open-source software
• On management and the maginot line
Integrative Questions:
88
Cyber Ethics
Quote:
Finally, practical use of the systems is not only relevant issue. The actual
material processed by business systems – all ‘data’ entered and generated
– differs greatly. This is particularly important, as the nature of the data
held on company systems must affect the uses to which it may ethically
be put. For example, a list of names and addresses held on computer and
used by a bookshop to mail invoices and statements is surely acceptable.
However, if an identical list of names, addresses and invoice details were
secretly examined and correlated to determine which customers were
buying suspect literature, the ethical position is very different, and the
need for the ethical consideration clear. Such issues need attention.
Review:
There is such a huge need for business computing nowadays that enables modern
companies to become more inclined with what they do best in their existing industry.
There are a lot of advantages but along with it is the long list of disadvantages that
continues to roll itself in that long list which is why companies have to be extra
careful during their implementation process so that they won’t get burned in the end.
Another complication with computerized business process or computing is that they
depend greatly on electricity which will cause the company to not function at all once
the technical aspect of the company is down. I also noticed that there are different
levels wherein the business computing function in a company should be processed.
There are four levels and each level determines how crucial the work function is and
particularly to the divisions of those functions which was also explained in the
entitled subchapter. I have to thank those who first thought of integrating a
computer with business functions because it changed everything. IT did not only
change how the business work but it also change how people interact and how
people see corporations because of the facts that these type of information overload
and accessibility can only be imagined five years ago and now we actually have it. It
is truly a miracle that we can incorporate machines with people and take note, the
people are loving it because they find it easier on their side.
What I learned:
89
• Size issues
o Level one
o Level Two
o Level Three
o Level four
• The tasks of business computing
• Data considerations
• Awareness by stakeholders and users
Integrative Questions:
90
Cyber Ethics
Quote:
Review:
Okay, first of all, the practitioner mentioned here is not a general practitioner, or GP
is a medical practitioner who provides primary care and specializes in family
medicine. A general practitioner treats acute and chronic illnesses and provides
preventive care and health education for all ages and both sexes. They have
particular skills in treating people with multiple health issues and co morbidities. The
term general practitioner is common in Ireland, the United Kingdom, some other
Commonwealth countries, and Bulgaria. In the English-speaking countries the word
medical practitioner is largely reserved for certain other types of medical specialists,
notably in internal medicine. It is specialty in some aspect as similar to what we
already have existing right now. As for the definition of values, again we seek
Wikipedia to give us a brief definition of the term. Virtues can be placed into a
broader context of values. Each individual has a core of underlying values that
contribute to our system of beliefs, ideas and/or opinions (see value in semiotics).
Integrity in the application of a value ensures its continuity and this continuity
separates a value from beliefs, opinion and ideas. In this context a value (e.g., Truth
or Equality or Greed) is the core from which we operate or react. Societies have
values that are shared among many of the participants in that culture. An
individual's values typically are largely, but not entirely, in agreement with their
culture's values. Like what was mentioned, it is broader than values because it
covers values into a whole new different levels in terms of kinds and generality of
the term itself.
What I learned:
• Ethics
• Morality
• Character forming vs. Action guiding theories
• Need for contemporary moral theory
• Revisiting the virtues
• Core vales
• Practitioner from within
• Imagination and narrative genre
91
Integrative Questions:
92
The Handbook of Information and
Computer Ethics
93
The Handbook of Information and Computer Ethics
Quote:
Review:
It may not be obvious but there are a lot to consider when it comes to information
ethics because everyone has a piece of everything. As the chapter mentioned, “The
more the better is not the only, nor always the best, rule of thumb, for the
(sometimes explicit and conscious) withdrawal of information can often makea
significant difference. Amayneed to lack (or preclude herself from accessing) some
information in order to achieve morally desirable goals, such as protecting
anonymity, enhancing fair treatment, or implementing unbiased evaluation.
Famously, Rawls’ “veil of ignorance” exploits precisely this aspect of information-as-
a-resource, in order to develop an impartial approach to justice (Rawls, 1999). Being
informed is not always a blessing and might even be morally wrong or dangerous.”
This is because a human beings is a part of a whole based on Einstein which is called
a universe and if that is the case, we need not to be alone in anything that we do
and we need not be selfish with our actions every now and then. It is true that no
one can achieve such peace and security within oneself when there nothing to follow
in the first place because the beauty of appreciating other things is when you start
appreciating what you have so why bother look for something or someone else to do
things you should have done before? It is because we seek company, inanimate or
not, in order for us to distinguish if we truly are doing the right thing or not.
What I learned:
94
• Moral agents
• The responsibilities of human agents
• Four moral principles
• Two recurrent objections against IE
• Applicability of IE
Integrative Questions:
95
The Handbook of Information and Computer Ethics
Quote:
Review:
The development of information and computers from the time it was first
thought of is overwhelming and at the same time, it is like a tiger you just
want to cuddle and get to know because of the benefits it brought to us
without hesitations. As said in this subchapter “Compared to many other
scholarly disciplines, the field of computer and information ethics is very
young. It has existed only since the mid-1940s when Norbert Wiener
created it. During the first three decades, it grew very little because
Wiener’s insights were far ahead of everyone else’s. In the past 25 years,
however, computer and information ethics has grown exponentially in the
industrialized world, and today the rest of the world has begun to take
notice. As the “information revolution” transforms the world in the coming
decades, computer and information ethics will surely grow and flourish as
well.” Meaning for living a life of intellect, change is necessary and that
change with or with out the benefits will continue to evolve new
advantages as well as disadvantages. Knowing how people react, they
have this notion that once change occurs and without anything else on
hand, they start thinking that it is a bad thing without even considering
the facts that may present themselves in the start of the whole process.
During those time when information was still underdeveloped and still
unreachable for many, we started thinking of ways how to develop the
information more and at the same time, we allowed it to develop all on
itself because information is like human beings, it breathes and it is
bounds to grow.
What I learned:
96
• The principle of freedom
• The principle of equality
• The principle of benevolence
• The principle of minimum infringement of freedom
• Wiener’s information ethics methodology
• Computer ethics developments after Wiener and before manner
• Walter Maner’s computer ethics initiative
• Deborah Johnson’s influential text book and the start of the unique debate
Integrative Questions:
1. What is cybermetics?
2. Who is Deborah Johnson?
3. Who is Walter Manner?
4. Who is Norbert Wiener?
5. Explain the four principles mentioned by Wiener.
97
The Handbook of Information and Computer Ethics
Quote:
Review:
What I learned:
• Applied Ethics
98
• Generalism
• Particularism
• Reflective Equilibrium
• The design turn in applied ethics
• Value sensitive design
• PACS
• Sinks
• Real-time Emergency Medicine
• Other conceptions on method in computer ethics
Integrative Questions:
99
The Handbook of Information and Computer Ethics
Quote:
Review:
I have to be honest here, I have no idea what value sensitive design meant until I
read this part of the book and of course, when I googled it. Here is a definition I
found online which pretty much, similar to the definition given in the book: Value
Sensitive Design (VSD) is a methodological design approach that aims at making
moral values part of technological design, research and development. It assumes
that human values, norms and moral considerations can be imparted to the things
we make and use. It construes information technology (and other technologies for
that matter The idea of Value Sensitive Design has a wider application in all
engineering and design disciplines, but was first proposed and discussed in
connection with information and communication technology and that is still its main
area of application.) as a powerful force which can be used to make the world a
better place, especially when we take the trouble of reflecting on its ethical aspects
in advance. Based from that definition from Wikipedia, value sensitive design is
literally being sensitive to the value fo what you are developing. It is taking
consideration to the moral consideration of both the developer and the society
because it was always taught to us that developing a system is not for money alone
but for the common good. It should be something that will aid the society and not
just a company to accept its benefits like getting people’s money without them being
totally concerned about it etc.
100
What I learned:
Integrative Questions:
101
The Handbook of Information and Computer Ethics
Quote:
Review:
What I learned:
102
• The Personality Theorists’ Rejoinder
• THE RULE-UTILITARIAN INCENTIVES BASED ARGUMENT FOR INTELLECTUAL
PROPERTY
• Problems for the Rule-Utilitarian Incentives Based Argument
• Alternatives to Patents
• Alternatives to Copyrights
• Trade Secret and Social Utility
• Long-Term Benefits
• The Utilitarian Rejoinder
• THE LOCKEAN JUSTIFICATION OF INTELLECTUAL PROPERTY
• A Pareto-Based Proviso
• Bettering, Worsening, and the Baseline Problem
Integrative Questions:
103
The Handbook of Information and Computer Ethics
Quote:
Review:
We all know what privacy is but just if you don’t, Privacy is the ability of an individual
or group to seclude them or information about themselves and thereby reveal
themselves selectively. With that given attention to, it is as though when people hear
that something is for private use or privacy, they will get more curious about it. That
is where hackers or crackers come in. They try to retrieve private information from
different organizations or even single or home workstations just to get a hold of what
you might have. Also mentioned in Wikipedia, “The boundaries and content of what
is considered private differ among cultures and individuals, but share basic common
themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or
unidentified in the public realm. When something is private to a person, it usually
means there is something within them that is considered inherently special or
personally sensitive. The degree to which private information is exposed therefore
depends on how the public will receive this information, which differs between places
and over time. Privacy can be seen as an aspect of security — one in which trade-
offs between the interests of one group and another can become particularly clear.”
What I learned:
104
• Interest-Based Conceptions Versus Rights-Based Conceptions of Privacy
• FOUR DISTINCT KINDS OF PRIVACY: PHYSICAL/ACCESSIBILITY,
• DECISIONAL, PSYCHOLOGICAL/MENTAL, AND INFORMATIONAL
• PRIVACY
• Privacy as Nonintrusion Involving One’s Physical Space: Physical/Accessibility Privacy
• Privacy as Noninterference Involving One’s Choices: Decisional Privacy
• Privacy as Nonintrusion/Noninterference Involving One’s Thoughts and One’s
Personal Identity: Psychological/Mental Privacy
• Privacy as Having Control Over/Limiting Access to One’s Personal Information:
Informational Privacy
• The Restricted Access Theory
• The control Theory
• The Restricted Access/Limited Control (RALC) Theory
• Three ‘‘Benchmark Theories” of Informational Privacy
• Privacy as Contextual Integrity
• An “Ontological Interpretation” of Informational Privacy
Integrative Questions:
105
The Handbook of Information and Computer Ethics
Quote:
Review:
Being anonymous online is definitely possible because you don’t really know who the
person chatting with you across the borders of the pacific just with a click of a
button. Being online affects how we see other people and how we interact with them
in this technological era where people from china can talk with people from Poland
without having to pay tons of money for a single hello. Like I said in my previous
reviews, I find the Web very helpful with our generation because it allows us to be
connected to anyone without boundaries – unless that person doesn’t have a
connection in their place. Just look at me, right now I am at the hospital waiting for
my CVC result and that doesn’t seem to stop me from connecting online to finish my
book reviews right. Also, I can be anonymous in the Web. For example, I can simply
change a little preference in my yahoo messenger for me to activate the chat room
feature and change my nickname to something like “bored_keyboard” or
“sissy_daisy” and no one will even know it is me because one, people in that chat
room are from all over the world meaning someone from New Zealand can read my
messages even without knowing that it is me, that my real identity is not my nick
name in yahoo messenger.
What I learned:
106
• Anonymity and Attribution Bias
• Anonymity and Expression of Self
• Globalization of Online Activity
• Anonymity and Identity Theft
• PURPOSES AND ETHICS OF ANONYMITY
Integrative Questions:
1. What is anonymity?
2. What is anonymity as a feature of complex social structures?
3. Define data mining.
4. Define Tracking.
5. Explain globalization of online activity.
107
The Handbook of Information and Computer Ethics
Quote:
At first glance, it might seem obvious that hacking is wrong. Although the more
malicious of these acts involve serious wrongs because of the harm they cause, all
are wrong because they constitute a digital trespass onto the property of another
person. Unauthorized entry into some other person’s computer seems not relevantly
different than uninvited entry onto the land of another person. Real trespass is
morally wrong, regardless of whether it results in harm, because it violates the
owner’s property right to control the uses to which her land is put and hence to
exclude other people from its use. Similarly, digital trespass is wrong, regardless of
whether it results in harm, because it violates the owner’s property right to exclude
other people from the use of her computer, which, like land, is physical (as opposed
to intangible) property.
Review:
Wow, I don’t even know where to start with the ethical issues involving computer
security because there are so many of them. Let me just clear up that there is a
thing called ethics if you guys out there are not familiar because ethics should be
inclined with what you are doing in life. A situation where you can apply this is with
your life alone. If you tend to do things without thinking about ethical concerns the
you are screwed up because in the first place, we need some guidelines ot follow
knowing that freedom is not absolute for if it is, then we will all be bombing each
other’s countries arguing who should have own. Obama or Mc Cain.
Intense concern with my files and my workstation occurred to me after reading this
chapter because it made me realize that there are so many people that can just hack
your private files even when your computer is shut off – yes, it does happen – so I
made a promise to myself that I have to be more careful with where I place my files,
how I transfer them, how strong I encrypt them and how accessible they are
because you will never know what might happen. We cannot really attack someone
just because we think he or she hacked us because hacking is a skill that people
master first before doing it big and publicly so a mere knowledge about computers
like opening programs and deleting files is not enough. Knowledge about IP
addresses, ports, cables, LAN, and other network related functions of your computer
should be well thought of and watched because it can be their access point.
108
What I learned:
Integrative Questions:
1. What is Hacktivism?
2. What is hacking?
3. Enumerate the social benefits of benign intrusions.
4. Is Hacktivism moral?
5. What is The Active Response Spectrum?
109
The Handbook of Information and Computer Ethics
Quote:
Review:
At first, I did not really think that this chapter will focus on the librarian’s profession
but then the first paragraph related it to the rest of the chapter. but why the library
profession? That I can’t really defend but it has something to do with keeping track
with information, knowing what information to retrieve, and managing information.
Here is a part of the chapter that explained library profession involves not only books
but also consideration of its drawbacks with the actual retrieving of information
related to it: But one drawback of the list approach is that it fails to explain how
these different values are related to each other. This is particularly problematic given
that it is possible that pursuing some values, such as confidentiality or preservation,
may conflict with others, such as access. One would need to understand how
preservation is related to access in a structure of values in order to know how such
conflicts should be resolved. A second drawback is that some values are not on this
list, such as a respect for the intellectual property rights of authors and creators.
Finally, in listing values, the theoretical framework that explains and supports these
many values is often left out. Thus, such lists may serve as a starting point, but they
do not take us very far in serious reflection on the core values of librarianship.
What I learned:
110
• THE CORE VALUE OF THE LIBRARY PROFESSION
• SELECTION,
• BIAS, AND
• NEUTRALITY
• CLASSIFICATION AND
• LABELING
• CHILDREN’S ACCESS TO INFORMATION
Integrative Questions:
111
The Handbook of Information and Computer Ethics
Quote:
To know more about ethical interest in free and open source software
Review:
I found something very interesting about free software and open source software in
Wikipedia which I intend to put here as my explanation for this chapter. it is
interesting because there is a part of it in the Wikipedia where in free and open
source are being criticized as something too different to compare. Here is Open
Source vs Free Software as explained in Wikipedia: Critics have said that the term
“open source” fosters an ambiguity of a different kind such that it confuses the mere
availability of the source with the freedom to use, modify, and redistribute it.
Developers have used the alternative terms Free/open source Software (FOSS), or
Free/Libre/open source Software (FLOSS), consequently, to describe open source
software which is also free software. Open source software and free software are
different terms for software which comes with certain rights, or freedoms, for the
user. They describe two approaches and philosophies towards free software. Open
source and free software (or software libre) both describe software which is free
from onerous licensing restrictions. It may be used, copied, studied, modified and
redistributed without restriction. Free software is not the same as freeware, software
available at zero price. The definition of open source software was written to be
almost identical to the free software definition. There are very few cases of software
that is free software but is not open source software, and vice versa. The difference
in the terms is where they place the emphasis. “Free software” is defined in terms of
giving the user freedom. This reflects the goal of the free software movement. “Open
source” highlights that the source code is viewable to all and proponents of the term
usually emphasize the quality of the software and how this is caused by the
development models which are possible and popular among free and open source
software projects.
112
What I learned:
Integrative Questions:
113
The Handbook of Information and Computer Ethics
Chapter: Internet Research Ethics: The Field and Its Critical Issues
Quote:
Review:
I am an advocate that a few years from now, physical books will eventually be gone
or just preserved for scientific purposes and soft copies of those books will be
accessible online. Although I know that is a strong comment on textbooks’ possible
“extinction” in a non-serious manner, I will still include here the definition of what
internet research is. As mentioned, Internet research is the practice of using the
Internet, especially the World Wide Web, for research – see where I got the whole
textbook extinction idea? – To the extent that the Internet is widely and readily
accessible to hundreds of millions of people in many parts of the world, it can
provide practically instant information on most topics, and is having a profound
impact on the way in which ideas are formed and knowledge is created. Research is
a broad term. Here, it is used to mean "looking something up (on the Web)". It
includes any activity where a topic is identified, and an effort is made to actively
gather information for the purpose of furthering understanding. Common
applications of Internet research include personal research on a particular subject
(something mentioned on the news, a health problem, etc), students doing research
for academic projects and papers, and journalists and other writers researching
stories. It should be distinguished from scientific research - research following a
defined and rigorous process - carried out on the Internet; from straightforward
finding of specific info, like locating a name or phone number; and from research
about the Internet.
What I learned:
114
• Revealing Identities
• Public Versus Private Spaces
• Respect for persons
• Recruitment
• Research with Minors
• Emerging issues
• Participant Observation and Discourse Analysis
Integrative Questions:
1. What is copyright?
2. What are the given issues in IRE?
3. Define confidentiality as how it was defined in the chapter.
4. What do you mean by revealing identities?
5. Explain public versus private spaces.
115
The Handbook of Information and Computer Ethics
Quote:
Review:
Isn’t it cool how we can be a part of some kind of experiment? No, I don’t mean
being guinea pigs of some new medical experiment but this, technology. Being the
ones to test new technology that continues to develop nowadays is an honor because
once we are a part of something that will be great in the future for the next
generation.
The chapter even included privacy in health information technology. Privacy is, most
generally, as discussed in the chapter, the right entitlement or reasonable
expectation people have that they are and will be secure from intrusion. Given the
example in the chapter, it is obvious that society values both personal privacy and
the law enforcement but in some cases, the police officer investigating a crime may
and, in fact, must take steps to justify that her official need is worth the intrusion.
“Put differently, privacy rights are not absolute, but may be balanced against other
values. The same is true for confidentiality, which applies to information—medical
records, for instance. Where privacy is customarily about people, confidentiality
applies to information about people. Privacy is also sometimes regarded as including
within its scope people’s concern about protecting confidentiality. Privacy is a
broader concept.” – indeed as a broader concept yet privacy still serve as one of the
most studied factor in information technology and one that is most protected.
What I learned:
116
• Prognostic Scoring Systems
• ‘‘The Standard View” and ‘‘Progressive Caution”
• PERSONAL HEALTH RECORDS
• Decision support
• Status of the professions
Integrative Questions:
117
The Handbook of Information and Computer Ethics
Quote:
Review:
There are a lot of ethical issues in business where in information technology casts on
like the previous chapter involving privacy. In any business, privacy is really
important especially if you want your business to be a significant part of the
industry, not just in it. Realizing that information technology does not revolve only
around computers and cables is critical when trying to relate information technology
in a business because it is more than just cables and ports but it is proposing the
best possible system needed by the business to be placed ahead of its competitors.
What do I really mean by that? Based on what I have been learning for the last three
years of education, a business proposal for information technology is one of the most
beneficial and yet so complex process in software engineering. Before creating the
project proposal, we need to conduct numerous interviews to the business’
stakeholders to truly understand what they want in their system and what needs to
be taken out. Along with that is the pressure of thinking of a way on how to achieve
the business’ goals and objectives without neglecting its norms and society’s
concerns. I guess proposal is truly the toughest part of systems analysis because
once you are done with that, then it is as good as implementation.
What I learned:
• Ethical issues
• APPROACHES TO ETHICAL ISSUES IN BUSINESS AND INFORMATION
• The Concept of Business
• Business Ethics
118
• Shareholders and stakeholders
• Shared Norms and Values
• Corporate responsibility
• Business Ethics and Computer Ethics
• The Business Value of Information
• MICROLEVEL INFLUENCE OF BUSINESS ON ETHICS AND INFORMATION
• The Impact of Business on Privacy: Employee Surveillance
• The Ethical Response to Employee Surveillance
• The Impact of Business on Intellectual Property
• The Ethical Response to Intellectual Property Protection
Integrative Questions:
119
The Handbook of Information and Computer Ethics
Quote:
Unfortunately, the law does not offer many clues as to this question. With
regard to information that is not in itself illegal, the possibilities of
invoking legal regulation are very limited. Traditionally, the law
approaches the problematic consequences of information as a liability
problem. As I suggested already in Section 14.3, this approach is
insufficient. Liability only arises after the harm and offence have really
taken place. Thus, the preventive potential with regard to possible harm
and offence and to risks is severely limited. Establishing liability for
information is further complicated, because of difficulties of identifying
causal relationships, of giving due consideration to the perspectives of
content providers and users, and—sometimes— of balancing the good of
establishing liability against information freedoms.
Review:
True that the law we have now don’t really include electronic information as one of
its focus because information technology back then was not even known to exist.
I know a lot of people who regret doing something online because they had little idea
of what will happen like in my friend’s case, she uploaded a personal picture of her in
her profile the first time she became a member as a private photo without realizing
that the website’s privacy policy and protection application is still less of a help.
Some scary guy saved her picture and started uploading it to his profile and allowing
other people to post rude and appalling comments about her. That alone is a case of
the lack of knowledge about internet.
120
What I learned:
• Conditions of responsibility
• ISPs AND CLEARLY HARMFUL OR OFFENSIVE INFORMATION
• Information in general
• THE RESPONSIBILITIES INVOLVED
o The creation of new credibility-conferring systems, such as certification
systems, allowing us to use pedigree criteria with regard to (online)
information, when such systems are lacking.
o Raising the visibility of indicators or markers of reliability of information
(according to pedigree criteria).
o Raising expertise and background knowledge in all users (to enable them to
recognize reliability on the basis of pedigree criteria).
o Raising the awareness of the varying qualities of information.
Integrative Questions:
121
The Handbook of Information and Computer Ethics
Quote:
Virtual reality and computer simulation have not received much attention
from ethicists. It is argued in this essay that this relative neglect is
unjustified, and that there are important ethical questions that can be
raised in relation to these technologies. First of all, these technologies
raise important ethical questions about the way in which they represent
reality and the misrepresentations, biased representations, and offensive
representations that they may contain. In addition, actions in virtual
environments can be harmful to others and raise moral issues within all
major traditions in ethics, including consequentialism, deontology, and
virtue ethics.
Review:
Whenever I hear the term “virtual reality”, a huge shades with 3D display capabilities
for computer games is the first thing I can imagine. But what is virtual reality?
Now that is the definition from the chapter – any resemblance in mine? – which
pretty much the same thing as how I pictured it. A technology or well, goggles, that
allows people to interact with computer made graphics as though it is happening in
real life. Amazing isn’t it? How technology can do such wonders for our benefits and
allows us to experience something more than what we should have experienced back
then.
What I learned:
122
• Applications
• The Distinction between the Virtual and the Real
• Evaluating the Virtual as a Substitute for the Real
• REPRESENTATION AND SIMULATION: ETHICAL ISSUES
• Misrepresentations, Biased Representations, and Indecent Representations
• Virtual Child Pornography
• Depiction of Real Persons
• Avatars, Agency, and Identity
• Behavior in Single-User VR
• Behavior in Multiuser VR
• Virtual Property and Virtual Economies
• The Goods and Ills of Computer Games
• Computer Games and Values
• Computer Games and Gender
Integrative Questions:
123
The Handbook of Information and Computer Ethics
Quote:
This ethical problem is not directly related to the way biologists use the
notion of information, nonetheless this problem is related to data banks in
which genetic results are stored.17 The controversy between Celera and
the public HGP consortium would provide an example. Indeed, according
to HGP researcher John Sulston: “The Human Genome Project and Celera
were not working toward a common goal, since only the former generated
a public sequence. Like everyone else, Celera had free access to all our
assembled sequence. But Celera also asked us for a personal transfer of
individual nematode sequence reads. To comply would have been a major
distraction from our [HGP] work” (Sulston quoted in Koerner, 2003).
Review:
Big term huh but in this chapter, it was explained “that genetic information is the
genes containing an amount of information (the so-called TACG amino acids
sequence) and able to build a human being up is today a seldom challenged triviality.
This idea is fundamental to the so-called “Central Dogma” of genetics. The “Central
Dogma”, as originally formulated by Crick, is a negative hypothesis, which states
that information cannot flow downward from protein to DNA.” No, DNAs are not
really my professional concern but I am aware that like DNAs, computers withhold an
amazing degree of information no man can memorize but can definitely determine.
Trying to collaborate the human DNA and ethical issues with information technology
will lead to something I am not really sure of so let me just clarify that this chapter
covered the explanation of how information, like DNAs, are being processed and how
it did came about – or so I thought. I am not pushing the idea that I am correct or
my understanding of it is a bit flushed compared to the technical terms placed within
the part of the book but I am determined to believe that DNAs hold great levels of
information about a person just by looking at it, its characteristic of being unique is
taking all my curiosity to the next level.
What I learned:
124
• Maynard Smith: Eggs as Computer Machineries
• USE AND MISUSE OF MODELS
• ETHICAL PROBLEMS OF GENETIC INFORMATION
• Ideological Use of a Model and Ethical Issues in Fund-raising
• Cooperation and Public Access of Data
Integrative Questions:
125
The Handbook of Information and Computer Ethics
Quote:
There are several areas of cyber conflict that the paper does not address.
Besides cyber attacks conducted for pleasure or personal gain, the paper
does not consider revenge attacks by insiders—all of which are generally
regarded as unethical. In addition, the paper does not address methods of
cyber conflict other than cyber attacks, for example, messages
transmitted for the purpose of psychological operations or deception.
Although other types of activity raise important ethical issues, their
treatment is beyond the scope of this paper.
To know more about the ethics of cyber conflict and what the conflicts are
Review:
With the advancing technology, even internet can cause war to countries. It could be
a silent war; no one would get hurt… physically. Cyber conflict may result to chaos to
the concerned parties. Such as what happened in September 2000, wherein Israelite
teenage hackers created a website that successfully jammed six websites in
Lebanon, causing a huge turmoil in different websites in Israel, including those of the
Palestinians and at least one U.S. site. They made two main types of attacks, the
website defacement and distributed denial of service. Website defacement focuses on
high-profile political site such as government sites. Disruption of such site would
cause confusion to the citizens of that country and those other persons that are
connected to them. On the other hand, DDoS or distributed denial of service
concerns shutting down of opposing sites. The Israelites teenage hackers also
assaulted the websites that concerns broadcasting, telecommunication
infrastructures and other websites corning alike. One website that the hacker
attacked was the internet service provider that deals with Israeli senior citizens.
What I learned:
126
o Perfidy.
o Neutrality.
• CYBER ATTACKS BY NONSTATE ACTORS
• Just Cause for Hacktivism
• Conduct of Hacktivism
• Other Ethical Frameworks for Hacktivism
• The Doctrine of Self-Defense
• Hack Back and Force
Integrative Questions:
127
The Handbook of Information and Computer Ethics
Quote:
Amatrix can be set up for each ethical rule such as “Don.t cause harm.”
The column headers of the “Don.t cause harm” matrix are the
stakeholders, such as the “developer” and the “customer,” and there is a
row for each major requirement or task. The SoDIS analyst thenvisits
each cell in the matrix, asking for each requirement whether meeting this
requirement violates that obligation to the stakeholder.
Review:
Everything in this world results from a choice, and comes with risk. Risk that you
need to assess, manage and even diversify. You can never ever do something
without risking something, that’s why you have to weigh up the possible
consequences of decisions. A simple eating of your favorite pie might end you up in a
room in one of the most expensive hospital in our country. A little decision might
cause a million disasters. Disasters that is possibly reduced or diminished when
properly assessed. Analysis of risk in any field is really important, in science, risk can
cause the extinction of human race, in finance, financial crisis, just like what we are
experiencing now, and as to advance technology like internet, invasion of privacy
and furthermore, threat to security.
What I learned:
Integrative Questions:
128
1. What is SoDIS?
2. Explain the SODIS audit process.
3. Explain the concept of risk identification?
4. What is risk assessment?
5. Is risk assessment necessary? Explain.
129
The Handbook of Information and Computer Ethics
Quote:
A strong moral case can be made for regulating the content of the
Internet, but there is also a strong case that such regulation cannot be
very effective and comes at a price in Internet performance. These last
two factors together constitute an argument of considerable weight
against attempting to control Internet content through legislation. So what
should be done? On balance, a case can be made for content regulation,
although that case is probably not as strong as proponents would wish.
That the case can be made can be seen by looking a little more closely at
the two opposing factors just mentioned. First, while in general laws that
are not enforceable to any great extent are to be avoided, in certain
instances they can be useful. Consider illicit drugs, for example.
Review:
Same as to different things, processes and organizations, internet must have their
regulations and must be governed by one only. Without all with regulations,
commotion in cyber space will occur. Humans follow different regulations and
guidelines all their life, since the egg cell and sperm cell formed a zygote in our
mother’s womb. Even from our fore-fathers and in their great, great grandfathers
regulations already exists. And if that’s the case, there’s is no way that we can
eliminate them when it comes to advance technologies such as internet. These
regulations are set to ensure that the primary consumer of such services, products
and innovation would not be violated or harmed and would just receive the best of
what is offered to them. Regulation and governance can be monitored by different
agencies concerning that certain industry.
What I learned:
• Content regulation
• Effective regulation
• Regulation: Technical Issues
• The current situation
• Across borders
• INTERNET REGULATION: NORMATIVE ISSUES
• Censorship
• REGULATION OF THE INTERNET: MORAL ARGUMENTS
• REGULATION AND EFFICIENCY
130
• REGULATION ACROSS LEGAL JURISDICTIONS
Integrative Questions:
131
The Handbook of Information and Computer Ethics
Quote:
Review:
Have you experienced headaches in the middle of your class, thinking what might be
its cause and realizing that your professors have taught you a lot of lessons that
your mind cannot absorb them any more? Then my friend, you might be
experiencing information overload. This commonly occurs when the mind is trying to
grasp so much information that it end up to a point that it cannot understand
anything anymore. Information overload is said to be the side effect of our advancing
technology. This result from the too much availability of information generated
through internet and other channels of communication. A lot of us is curious about
different things happening in our environment, but too much of this curiosity might
also cause harm. Being too exposed to different things in our society that we may
miss the fact of ‘reality’, which we cannot based everything on books, researches
and experiments. Sometimes, we still need to experience them, just as what they all
used to say, experience is the best teacher. Things experienced can never be
compared to things ‘read’. Simple information about some matter would be a great
help for us, but too much of anything can cause trouble. Imagine reading a certain
article about a candy and formulating insights that you realized while reading it, then
disseminating it to others. The person who received the information about the candy
together with your insights can also formulate his own, and after passing it to a few
others, that’s already whole lot of information that you’re not even sure if it’s true or
not, thus, resulting to an information overload over a simple candy.
What I learned:
132
• Definition of information
• More than information
• Perception and reality
• A Novel, Recurrent, or Ever-Present Phenomenon
• History of the phrase
• Causes of information overload
• Consequences of information overload
• Actions to be taken
Integrative Questions:
133
The Handbook of Information and Computer Ethics
Quote:
Review:
All of you who have email addresses would probably know what a spam is. Well
actually, not all because we may have spam mails but we don’t really know how it
got sent to us and why is it sent to us. The definition of spam emails in Wikipedia is
that it is also known as junk e-mail, and is a subset of spam that involves nearly
identical messages sent to numerous recipients by e-mail. A common synonym for
spam is unsolicited bulk e-mail (UBE). Definitions of spam usually include the aspects
that email is unsolicited and sent in bulk "UCE" refers specifically to unsolicited
commercial e-mail. The total volume of spam (over 100 billion emails per day as of
April 2008) has leveled off slightly in recent years, and is no longer growing
exponentially. The amount received by most e-mail users has decreased, mostly
because of better filtering. E-mail spam has steadily, even exponentially grown since
the early 1990s to several billion messages a day. Spam has frustrated, confused,
and annoyed e-mail users. Laws against spam have been sporadically implemented,
with some being opt-out and others requiring opt in e-mail. About 80% of all spam is
sent by fewer than 200 spammers. Botnets, networks of virus-infected computers,
are used to send about 80% of spam. Since the cost of the spam is borne mostly by
the recipient,it is effectively postage due advertising. E-mail addresses are collected
from chatrooms, websites, newsgroups, and viruses which harvest users' address
books, and are sold to other spammers. Much of spam is sent to invalid e-mail
addresses. ISPs have attempted to recover the cost of spam through lawsuits against
spammers, although they have been mostly unsuccessful in collecting damages
despite winning in court.
134
Now you know what spam emails are and thanks to google and wiki for the
definition. Anyway, spam emails is not something we want but it is a method of
some websites to endorse their investors to other people.
What I learned:
Integrative Questions:
1. What is spam?
2. Why is it called spam?
3. Where is spam qualified to?
4. What the intent of the sender of spam email?
5. What is the consequences of the receiver once a spam is received?
135
The Handbook of Information and Computer Ethics
Quote:
As with most ethical concepts, there is plenty of room for debate over the
definition of “plagiarism.”1 Plagiarism will be treated here very broadly as
expression that improperly incorporates existing work either without
authorization or without documentation, or both. The emphasis on
impropriety is important. There are a wide variety of situations where it
seems acceptable to repeat prior expressions while ignoring a possible
attribution and making no attempt to seek permission from a putative
source. We commonly repeat jokes and report established dates for
historical events without citing sources, and we do so without qualms
about plagiarism. An expression is only plagiarism if it is unacceptable on
some established value.
Review:
It was just discussed to us that plagiarism is not infringement of copyright. For those
who thought plagiarism is some disease found only in South East part of the world,
plagiarism is the use or close imitation of the language and ideas of another author
and representation of them as one's own original work. Plagiarism is not copyright
infringement. While both terms may apply to a particular act, they are different
transgressions. Copyright infringement is a violation of the rights of a copyright
holder, when material protected by copyright is used without consent. On the other
hand, plagiarism is concerned with the unearned increment to the plagiarizing
author's reputation that is achieved through false claims of authorship. See, even
Wikipedia can prove why both terms may seem similar but totally different in
definition.
I actually had a classmate that plagiarized already but to the class’ disappointment,
he (a clue! a clue!) was not punished for it. He did not pay for something illegal to do
because you know what he did? He literally just copied and pasted an article
explaining how life is to people in psychology and just put his name for identification.
Wrong move because my professor is very keen with plagiarism but still, trying to
remember the event, I was disappointed because our professor just let it slip
meaning more and more students will eventually do it because they will have an idea
that they won’t be in trouble in the first place. So here is what I think, plagiarism is
definitely wrong because you have a brain and you need to use it, not copy another
man’s ideas COMPLETELY.
136
What I learned:
• Concept of plagiarism
• Lack of authorization – economic foundations
• Lack of authorization – natural or moral rights
• Lack of accreditation – noninfringing plagiarism
• A personal view of matter
• Literature review
Integrative Questions:
137
The Handbook of Information and Computer Ethics
Chapter: Intellectual Property: Legal and Moral Challenges of Online File Sharing
Quote:
Review:
I am guilty to using online file sharing because first of all, it is free and second of all,
it is accessible.
Honestly, for me, that is enough reason for anyone to shift from buying a brand new
album by an indie band to downloading or listening to the whole album for free. Of
course I don’t want you to open your browser just to check out what file sharing is
which is I this is the definition of file sharing in Wikipedia, “File sharing refers to the
providing and receiving of digital files over a network, usually following the peer-to-
peer (P2P) model, where the files are stored on and served by personal computers of
the users. The first file-sharing programs marked themselves by inquiries to a
server, either the data to the download held ready or in appropriate different Peers
and so-called Nodes further-obtained, so that one could download there. Two
examples were Napster (today using a pay system) and eDonkey2000 in the server
version (today, likewise with Overnet and KAD - network decentralized). Another
notable instance of peer to peer file sharing, which still has a free version, is
Limewire.” Of course I know what these software are because yes, I have committed
an unethical approach to technology because back then, five to 7 years back,
downloading something from the internet is not illegal because it is just the concept
of sharing but now, many complained that P2P software ruin the music and movie
industry because of all the files that people can have access to without paying a
cent.
138
What I learned:
• Sharing or theft
• Secondary liability
• MGM V. GROKSTER
• Moral considerations
Integrative Questions:
139
The Handbook of Information and Computer Ethics
Quote:
However, it will not be quite so easy to show that censorship will lead to
less harm overall than allowing access. First, it is worth reminding
ourselves of the central interests in expression, deliberation, and
information, which can only be satisfied when there is a general free flow
of expression. The benefits we receive from having these interests
satisfied (and the harms from not having them satisfied) will not be easily
overridden. Second, we have to ask ourselves not what in principle it
might be good to censor. We have to ask ourselves what in actual practice
would be the consequences of having policies in place that restrict access.
It is at this point that “slippery slope” and “chilling effect” arguments
might have some force.
Review:
We usually encounter the word censorship in movies that are opt to be blocked by
this rectangular black object desperately trying to cover up body parts that are not
supposed to be shown in national television but that is not the case here. Let us first
define what is censorship from our favorite resource, Wikipedia, to truly understand
how this chapter connected this to ethical issues. To my surprise, there are different
kinds of censorship which “is the suppression of speech or deletion of communicative
material which may be considered objectionable, harmful or sensitive, as determined
by a censor.” The real reason behind the concept for censorship is not similar for
numerous types of data that are censored: Moral censorship, is taking away of
materials that censor deems to be obscene or otherwise morally questionable.
Pornography, for example, is often censored under this rationale, especially child
pornography, which is censored in most jurisdictions in the world. In another
example, graphic violence resulted in the censorship of the "culturally, historically, or
aesthetically significant" movie entitled Scarface, originally completed in 1932. I
never realized that there are types of censorship that we need to consider because
we are used to knowing that censorship means that floating black object covering
people’s faces and bodies but I guess I was wrong. Military censorship is the process
of keeping military intelligence and tactics confidential and away from the enemy.
This is used to counter espionage, which is the process of gleaning military
information. Very often, militaries will also attempt to suppress politically
inconvenient information even if that information has no actual intelligence value.
Political censorship occurs when governments hold back information from their
citizens. The logic is to exert control over the populace and prevent free expression
that might forment are bel. Religious censorship is the means by which any material
140
objectionable to a certain faith is removed. This often involves a dominant religion
forcing limitations on less prevalent ones. Alternatively, one religion may shun the
works of another when they believe the content is not appropriate for their faith.
What I learned:
Integrative Questions:
1. What is censorship?
2. Should censorship be implemented? Give at least two reasons.
3. Why are people interested in accessing other people’s computers?
4. Give two types of harm against censorship.
5. What is inherently harmful access?
141
The Handbook of Information and Computer Ethics
Quote:
Review:
Okay, I get it. Back then, women have no rights aside being mothers and I also get
it that up to now, it is still a big deal to other parts of the world but hey, wake up
guys because if you open your eyes wide enough, you will see how many women
showed power and passion to their true beings and demonstrated how it is to truly
be brave and to truly treasure a right. I know I seem upset but who would not be
upset after reading a history book explaining why women have no rights back then
and how they treat women. Now is not the right time to morn about it because it is
done. We are finally saved from all those cultural chains that pulled women away
from their capabilities and justice as a human being.
Ethics of care, I have to admit, obviously means the heart of women and in a good
way. Here is an excerpt from the chapter explaining the relevance of digital divide:
What is the relevance, if any, of the digital divide discourse (e.g., Internet access to
all) with the fact that data is not information, information is not marketable
knowledge, and marketable knowledge is not wisdom? The gaps between these
various notions must be identified to call better attention to how our efforts to bridge
the various gaps should succeed. For example, we must provide education that
enables people to convert data to information, and information to marketable
knowledge. To ensure full human flourishing, we want to ensure that bridging the
digital divide leads not only to ending life-threatening poverty, but also to full
flourishing of human beings, which requires wisdom, aesthetic experience,
philosophical self-reflection, and so on.
What I learned:
• Feminist ethics
• GENDER AND COMPUTER ETHICS—A MALE–FEMALE BINARY
142
• Gender and computer ethics studies
• Student population
• Quantitative Versus Qualitative Research Methodologies
• Ethical behavior
• The Undertheorizing of Gender and Ethics
• Women in computing
• Cyberstalking
• Hacking
• Hacker Communities
Integrative Questions:
143
The Handbook of Information and Computer Ethics
Quote:
The point here is not that global and local poverty are problems of many
dimensions that are extremely difficult to solve, but rather that the moral
importance of the digital divide as a problem that needs to be addressed
is linked to inequalities between the rich and the poor—and especially
wealthy nations and nations in absolute poverty. There may be a case for
thinking that such divides are inherently unjust, but that seems somewhat
implausible: economic injustices are viewed as problematic more because
of the suffering they cause and less because there is some sort of
deontological egalitarian principle that requires absolute equality of
justice.
Review:
Here is something I did not understand even with reading the part twice – poverty in
connection with digital divide. I think it is all about the bridging of the information
gap. And what is that gap? If you really want to know and willing to spend a few
minutes reading, read through this chapter so you will know it better with more
definition and brief examples wand situations why there is a gap and how that gap
even came about. I may not know much nor can I explain much about this so called
gap but I do know that it exists especially after reading this chapter. Technology
should be equal to communication if placed in a mathematical formula because we
developers think of programs, applications or websites that allows everyone to have
a voice. I know, some develops for private companies but still, it is relative to the
point of technology enabling communication whether between two or more people or
two or more other technologies that will change the process of a company with
proper connection and communication of both. That is how technology can change a
simple process. A simple login can be turned into something more and like what they
said, “There is no limitations with imagination” but of course, that does not
completely apply to information technology because with IT, you need to be rational
and be aware as always. In order for you to produce something that will be bought
by consumers and will eventually be used for aiding their own problems.
What I learned:
144
• THE MORAL BASIS FOR THE IDEA THAT THE VARIOUS DIGITAL DIVIDES SHOULD BE
ELIMINATED
• EMPIRICAL SKEPTICISM ABOUT THE RELATIONSHIP BETWEEN DIGITAL DIVIDES
AND ABSOLUTE POVERTY
• Definition and expectations
• Empirical Studies Illustrating Perceived Failures
• Bridges and Questions
Integrative Questions:
145
The Handbook of Information and Computer Ethics
Quote:
Review:
This chapter really did summarize everything because it explained the connection of
all the previous issues mentioned in the book and still, at the same time, opened
new ideas to us in terms of morality and communities. Although this chapter
mentioned the most number of people and defined them each briefly as their
contributions got bigger and more relevant. It is similar to the song I am listening to
right now which explains so much with little time, three minutes ot be exact. IT
tackles the history of information technology, how it got started, how it went on for
years and how will it continue on through the years to come because we all
experience the benefit the great information technology presents to us now,
particularly in this generation. Because like now, it would be hard to type in a
typewriter just to finish your thesis paper. Can you imagine how many hours it will
take you to finish a citation and how huge your callus in your fingers will be
afterwards? Oh man, I can’t even explain how the world will be without technology
helping us around. Heck, I don’t even think the 50% of the population of the world
will survive without technology because we all become dependent to its potentials
which is why trying to detach ourselves from it will be like withdrawing from an
addiction. You will realize how hard things really are once technology is gone so
treasure its presence and realize
146
What I learned:
Integrative Questions:
147
The Fortune at the Bottom of
the Pyramid
148
The Fortune at the Bottom of the Pyramid
Quote:
To define what is it really that secludes the market at the bottom of the pyramid
from those at the top of the economic pyramid.
Review:
It’s cool how crucial it is to really consider the bottom of the pyramid as the first
marketing target for your business. True that it is the biggest area of the marketing
pyramid so targeting that for your products will not only serve great purpose but it
will also become one of the greatest technique you can do especially when you are
just starting out. It may not be obvious but analysis of the market is essential not
only to those who are trying to maintain their stance in the marketing industry but to
those who are planning to start a business of their own. As a student, of course the
thoughts of starting my own business has been roaming around my mind for quite
some time now and all I need to know for me to start my own business is what will
be my business in the first place. Reading this chapter of the book was very helpful
for me not because it pointed out what business I should focus on and pursue but it
helped me focus on the people that I should be targeting to buy my products or
services in the future. This time, I know that I should not consider going to the high
part of the pyramid because it is not the stepping stone of what I should be pursuing
but I should focus on the many, focus on those who has the largest number and
figure out the best things there is to offer for them.
What I learned:
149
• The market development imperative
• Creating the capacity to consume
• The need for new goods and services
• Benefits to the private sector
Integrative Questions:
150
The Fortune at the Bottom of the Pyramid
Quote:
Review:
Now here comes what I have been searching for. Remember I told you that I was
planning to have a business of my own but just don’t know which products or
services to offer? Here comes the chapter that explained what suits the bottom of
the pyramid. I noticed that the BOP is more concerned with practicality because life
should be practical. It shouldn’t cause or base pain to those who just want to start
their own business. It should start naturally. But you know, starting fresh is not so
easy. Yes, you think of the target market then the idea of what to give the market
then just do it but it is a lot more. It is offering what they need not only those that
they don’t need. It is giving the public what they should be buying that will serve
them purpose and value and not just something expensive that will make them
drown in bills. It is becoming someone who understands what the market is looking
for and providing that for them to have it in an accessible manner. It is enabling
ways for them to achieve something more than what they want without really forcing
the idea of earning money for the sake of becoming rich. Yes, money is important
and as an entrepreneur, you will want to earn crazy money in a month or so but is
that really possible? Yes it is but earning that much money in a month or so will not
be easy because you need to become one with the market and you need to become
what they need so every day, they will have to go and run to your store hoping to
buy their favorite shirt that only you have.
What I learned:
151
• Sustainable development: eco-friendly
• Identifying functionality of developed markets
• Process innovation
• Deskilling of work
• Education of customers
• Designing for hostile infrastructure
• Interfaces
• Distribution by accessing the customer
Integrative Questions:
152
The Fortune at the Bottom of the Pyramid
Quote:
In the rural areas of the countries such as Peru, providing high quality
health care is difficult. More difficult is the surveillance of outbreaks of
infectious diseases. These remote regions must be kept under constant
surveillance to avoid the spread of disease, be it cholera or SARS.
However, these locations are not well-connected for constant
communications. PCs are rare and telephone lines are a luxury. The
question for public health professionals in such a situation is simple.
Review:
There is a lot more to BOP than targeting to the majority of the world to earn crazy
money. It is becoming one with the market and becoming an entity which they can
rely on. There is more opportunity at the bottom of the pyramid than in the top part
of the pyramid because of its numbers and of its needs. Once you focus on the
bottom of the pyramid, it is like focusing on eradicating those boundaries that people
tend to experience between something they want but too expensive to actually
attain. I know for a fact that companies should focus more on the bottom of the
pyramid because there are more global opportunities once they did. Just the other
day I was wondering how I can buy a laptop that looks like Mac (slick exterior right?)
but with the price of a netbook which is like half of an average notebook. I know that
will involve great research and cost analysis for the companies but is not worth a try
to just give the people what they want in a much more cheaper price. Obviously, the
majority of the people wants things cheap because if it breaks, then they can just
buy another one without becoming concerned with the waste of money. Who
wouldn’t want a phone that is cheap enough to be replaced one a month? I know it is
something but it so far, the public loves it and that is why they keep on buying to
know how great it is to just be guiltless with something that used to be expensive.
What I learned:
153
• Innovations
• The costs of managing
• Learning to live in a network of relationships
Integrative Questions:
154
The Fortune at the Bottom of the Pyramid
Quote:
Review:
I know you have heard of the great companies we have nowadays. Those companies
that once you hear the name, you will instantly think “stinkin’ rich!” well that is the
essence of having a company in the first place, to be well known and to earn crazy
money. I think serving the bottom of the pyramid what they want and focusing on
that for a long time will really get your company somewhere because just look at
some convenience store we have nowadays. They are like mushrooms in a healthy
season where they just pop out of nowhere. They just can’t resist the itch of selling
to the majority of people in every little place possible because they know, they will
earn. Not because of the high markup which they reject to add in their products but
with the number of people buying in them. That is why I am so amazed with Chinese
business men. They don’t focus on how high they should put markup in their
products because they know if it is too high, the public won’t appreciate it that much,
only few will have the capacity to purchase and figure out the good in their products
but they focus on the bulk of their product hoping to sell as much unit as they can in
a lower price, lower than the most average price offer there is. That is why people
like it low. They like the price low for them to buy more of it whether they need it or
not, they just want the security of having something in the right number without
spending that much.
What I learned:
155
• The essence of maturation model.
• Organization of the group
• Mobilizing the savings
• Investing those savings
• Access to bank capital
• The ecosystem for wealth creation
Integrative Questions:
156
The Fortune at the Bottom of the Pyramid
Quote:
Review:
Now I know you’re wondering why corruption was suddenly brought up in the topic
because I was too when I first read the title but there is a simple explanation to this
and it is “the public.” I know we can’t really reduce reduction by focusing on serving
the bottom of the pyramid but we can reduce corruption by enabling people to take
notice of the bottom of the pyramid which is obviously the bigger part of a country.
Let me just quote something I searched for here in google regarding reducing
corruption in any country, “Make an anti-corruption exhibit for a public fair or
market. A small information booth could offer landowners information on both good
forestry and their legal rights. It could also offer the general public information to
raise awareness of corrupt practices in the forest. A more sophisticated booth at a
trade fair can promote business principles, integrity pacts, and other anti-corruption
tools for the corporation.” See, you need to give notice to the public not just chosen
people to be heard of and for them to be aware that there are actual ways to reduce
corruption in our country. Also, one thing I learned in ITETHIC is having a sense of
responsibility and becoming accountable not for yourself or your family alone, but for
your nation as a country of free will. Philippines is a country with God as its center.
We incorporate our laws, our morals, and our beliefs to how God was explained to us
in the bible. Being accountable for our nation is not covering up for it but it is
becoming responsible for whatever it has done.
What I learned:
157
• Corruption and e-governance
• eSeva
• centre for good governance
• the good governance model
• guiding principles of the CGG in Andhra Pradesh
Integrative Questions:
158
The Fortune at the Bottom of the Pyramid
Quote:
How will these changes impact life at the BOP? As BOP consumers get an
opportunity to participate in and benefit from the choices of products and
services made available through market mechanisms, the accompanying
social and economic transformation can be very rapid. The reason for this
is that BOP consumers are very entrepreneurial and can easily imagine
ways in which they can use their newly found access to information,
choice and infrastructure.
Review:
Becoming a better service to the bottom of the pyramid is being accountable for it
and showing responsibility in a different level. It is causing impact to them where in
consumers, rich or poor but particularly the class B and C, that normally just flows
with what the market throws at them becomes the one that are being followed by
the companies because the bottom of the pyramid are the desirable ones. They are
the ones that should be considered highly knowing their numbers alone. Breaking
the boundaries just to save the majority through social transformation is the most
important thing that an organization can do to a country even without much regard
to it earnings. But why would a company consider the country first before their
income statement? They should consider the nation first because when everything
falls down in the country, the company will fall with it and if their market did not see
that they are not cooperating to the social responsibilities of the country, they ewll
regret it because it will seem as though they don’t care and they are a huge waste of
time on their behalf. It is life becoming good not because you just want to but
because it something you must do for the people to know that you are really worth a
second look. Now contributing to social transformation is not obligatory to companies
but companies should never forget why a company is brought about in the first
place, it is for serving the public with what their hearts desire and at the same time,
earning for it.
What I learned:
159
• Evolving checks and balances
• The real test: from the pyramid to the diamond
• The shape of rural income distribution
Integrative Questions:
160