Professional Documents
Culture Documents
ETHICS READER
BOOK REVIEW
COMPILATION
Created by:
Amazon: N/A
This quote that I have found in the chapter talks about human beings own
decision because as we know that it is a free country or a free world so that is
why decisions of people are very well been just for them alone.
Learning Expectation:
Review:
To start of with the chapter the chapter first talks about computers and
how computers can help people in there every day life.
Computers are logically malleable in that they can be shaped and molded
to do any activity that can be characterized in terms of inputs, outputs and
connecting logical operation. Because logic applies everywhere, the potential
applications of computer technology appear limitless. The computer is the
nearest thing we have to a universal tool. Indeed, the limits of computers are
largely the limits of our own creativity.
Integrative Questions:
BS-IS/ IT-ETHICS
Amazon: N/A
The quote that I have just created is a quote that is very important in life
because ethics is very important in life because without ethics people will just
what ever that they want without even knowing that they are doing things in the
wrong ways,
Learning Expectation:
Plus I also believe that in real life I will be able to use the information that
is given in the book for me to learn lots more information about technology.
Review:
The chapter talks about computer ethics and also show how important it is
for people to follow good computer ethics at all times. If people don't obey these
basic rules, the Internet will become either an anarchic wasteland, or a super
regulated government tool without the freedom that the
Internet needs to grow and improve. The Internet is a useful tool, and
amazing communication device, but it will only stay this way with good computer
ethics. It is important that all of us, and regular users of the Internet, obey
computer ethics and make sure that it will continue to stay such a wonderful
place for years to come.
What I’ve learned:
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
Integrative Questions:
Amazon: N/A
This quote tells about the in appropriate use of ethics in the computer
ethics field because some point in time ethics is not used by people because all
they want to do is are things that they want to do, like just to make money.
Learning Expectation:
Review:
If one starts from the vantage point of technology, for example, one is
drawn to the uniqueness of many of the features of computers. On the other
hand, if one starts with ethics, one focuses more broadly on human behavior and
human values. What brings the two starting points together, she argues, is the
recognition that technology provides the instrumentation of human action
Integrative Questions:
Amazon: N/A
The quote is saying that women are equal to men in term of work skills,
sometimes it is true that women are more mature of a thinker than men, but skill
the skill level of a man is more of dominant than females.
Learning Expectation:
Because as we know that men are more dominant than women so that is
why men often get good futures than women.
Review:
However I argue that calls for ethical conduct in relation to women's issues
will not carry the debate as far as it could fruitfully be taken. A potentially more far
reaching approach would be to ask how far the development of feminist ethics
could be applied to computer ethics, to use feminist ethics to criticize the
traditional ethical view implicit in computer ethics
What I’ve learned:
Integrative Questions:
Amazon: N/A
The quote that I just created is mainly about the chapter because as we
know that the chapter that is on review is about the law making in cyberspace,
the law is very important because without the law people will just may trouble and
will not be that disciplined .
Learning Expectation:
Review:
This chapter talks about the importance of computer ethics show how
important it is for people to follow good computer ethics at all times. If people
don't obey these basic rules, the Internet will become either an anarchic
wasteland, or a super regulated government tool without the freedom that the
Internet needs to grow and improve. The Internet is a useful tool, and amazing
communication device, but it will only stay this way with good computer ethics. It
is important that all of us, and regular users of the Internet, obey computer ethics
and make sure that it will continue to stay such a wonderful place for years to
come.
Also this chapter talks about the individuals to stop prying into other
peoples' business. If people respect the online privacy of others, there would be
no need for encryption or fear. This is where the question of ethics comes up. It
is important that private emails sent online stay private, or else the Internet will
be a much more fearful and less useful tool.
What I’ve learned:
Integrative Questions:
BS-IS/ IT-ETHICS
Book review: Applying ethical and moral concepts and theories to IT Contexts:
Key Problems and Challenges
Amazon: N/A
Learning Expectation:
Review:
This chapter talks about Even when a job is not eliminated by computers,
it can be radically altered. For example, airline pilots still sit at the controls of
commercial airplanes; but during much of a flight the pilot simply watches as a
computer flies the plane. Similarly, those who prepare food in restaurants or
make products in factories may still have jobs; but often they simply push buttons
and watch as computerized devices actually perform the needed tasks.
Plus in this chapter in this way, it is possible for computers to cause “de-
skilling” of workers, turning them into passive observers and button pushers.
Again, however, the picture is not all bad because computers also have
generated new jobs which require new sophisticated skills to perform
Integrative Questions:
Amazon: N/A
Well this quote talks about the different kinds of computer ethics because
as we know that people doesn’t value ethics anymore I can understand them
because life is very hard now, so that is why people are being practical in life
were they get the opportunity, they will definitely grab it.
Money is always the objects in life, as we know that money can move
mountains and definitely can move people, so here ethics comes into place
people should be well trained in ethics while they are young to avoid people who
doesn’t even value there ethics.
Learning Expectation:
Plus to learn more about ethics especially the kinds of ethics that can
move people to inspire them not to do bad things.
Review:
Well this chapter is saying that, there is nothing new or special about
ethical issues involving the use of computers. Proponents of this view claim that
privacy violations are privacy violations and that theft is theft whether or not the
particular privacy violations or particular thefts happen to involve the use of
computers. At the other extreme are those such as Walter Maner who hold that
computer use has generated a series of new and unique ethical issues that could
not have existed if computer technology had not been invented. Maner argues
that the "failure to find satisfactory non-computer analogies" for moral issues
involving computers "testifies to the uniqueness of computer ethics."
Plus this chapter also talks about the new policies in response to certain
vacuums generated by computing technology. On Moor’s analysis, then,
computer ethics is the specialized field of identifying policy vacuums created by
computers, clarifying conceptual confusions surrounding those issues, and then
formulating and justifying new policies for those areas in which either there are
no existing policies or where existing policies cannot be adequately extended.
Integrative Questions:
Book review: The internet as public space: Concepts Issues and Implications in
Public Policy.
Amazon: N/A
Well this quote talks about the internet being open to the public as we all
know that it is true because, internet and internet information is very open to the
public due to the reason of privacy but there some sites that do not give access
to the public, but for example for the company alone.
But generally the internet and all of its information is open to the public,
this is why people can easily research about the projects and just lets the internet
do the research for them, rather than going to the library to research they it can
take you ages trying to research about it.
Learning Expectation:
My learning expectation in this chapter based from the title I would expect
to learn more about the internet and the concepts and issues behind it, plus more
knowledge about public policy, with the internet.
Especially to learn why the internet is very open to the public, and also
what are its advantages and disadvantages.
Review:
The chapter talks about the various points of convergence, finally, make it
possible to begin articulating a series of guidelines for Internet research that
appear to reflect both shared agreements on basic norms and values and a
recognition of the ethical legitimacy of more than one interpretation or application
of those norms and values.
Integrative Questions:
Amazon: N/A
As we know that the law is very important in our lives because without the
law people will just cause trouble and with that there will just be chaos in world
because of people who are not using the law properly.
The law is important because it is the reason for people to become more
discipline, and to learn more things about the law, the can make people follow
other people.
Learning Expectation:
Plus to learn more information about the internet and also cyberethics to
help me in my growth for the better good.
Review:
This chapter seems pretty clear that the applicants knew -- or reasonably
should have known that they weren't supposed to see the status of their
applications, and that the portion of the ApplyYourself website they went to
wasn't supposed to be accessed by the public. In that regard, not only did they
open themselves up to ethical retribution, but to potential criminal prosecution
under both federal and local law. But that doesn't answer the entire question.
Plus the chapter talks about website developer may know what he or she
wants to be available to the public, this may not always be the same as what had
been made available to the public.
Integrative Quesitons:
Amazon: N/A
The quote that I just created is mainly about the chapter because as we
know that the chapter that is on review is about the law making in cyberspace,
the law is very important because without the law people will just may trouble and
will not be that disciplined .
Learning Expectation:
Review:
This chapter talks about the importance of computer ethics show how
important it is for people to follow good computer ethics at all times. If people
don't obey these basic rules, the Internet will become either an anarchic
wasteland, or a super regulated government tool without the freedom that the
Internet needs to grow and improve. The Internet is a useful tool, and amazing
communication device, but it will only stay this way with good computer ethics. It
is important that all of us, and regular users of the Internet, obey computer ethics
and make sure that it will continue to stay such a wonderful place for years to
come.
Also this chapter talks about the individuals to stop prying into other
peoples' business. If people respect the online privacy of others, there would be
no need for encryption or fear. This is where the question of ethics comes up. It
is important that private emails sent online stay private, or else the Internet will
be a much more fearful and less useful tool.
What I’ve learned:
Integrative Questions:
BS-IS/ IT-ETHICS
Amazon: N/A
Well in this quote it is telling us people that cyberspace has its limits
because as I’ve been though in my subject last term that the internet is only
limited I didn’t quite recall the term used but it is said that the internet can loss its
hosting some point in time.
Plus the internet is very useful to us people because the internet is the life
now of the world because communication, information can be gathered using the
internet, even entertainment can be used in the internet, the internet has many
functions and people will just have to develop its functions for people to use it as
publicly as possible.
Learning Expectation:
Review:
The chapter noted that Federal and state governments are already
vigorously enforcing existing obscenity, child pornography, and child solicitation
laws on the Internet. In addition, Internet users must affirmatively seek out
speech on the Internet; no one is caught by surprise.
Also in this chapter tells that Many sites offering commercial transactions
on the Net contain warnings concerning the security of Net information. Sites
containing sexually explicit material often begin with a statement describing the
adult nature of the material. Chat rooms and newsgroups have names that
describe the subject being discussed. Even individual e-mail messages contain a
subject line.
What I’ve learned.
Integrative Questions:
Amazon: N/A
Well this quote talks about the freedom of every person to do actions that
are not against the law, it is true because people should definitely fight for there
rights because it is Gods given grace that every people has the right for there
rights.
If people doesn’t practice using there rights they will just be ended up
being bullied by lots of people because people that does not practice there rights
will just be outcast, they must learn to fight for there rights.
Learning Expectation:
Plus ways and explanation in dealing with the internet and the content that
they don’t what lastly, ethical theories about the internet and how to resolve it.
Review:
This chapter tells about our privacy is motivated mainly by the increasing
competition among various entities who view us mainly as consumers of their
products or services.
Thus the internet is still at its infancy; and yet, if you look closely, you will
find that the "800-pound gorillas" in each sector of the industry want to annihilate
the competition.
Lasly this chapter talks about the freedom to speak our mind also requires
the responsibility to be sensitive to the feelings and rights of others. We forgot
that we exist not solely as individuals but also as members of a community.
Integrative Questions:
Book review: Censorship: The Internet and the Child Pornography Law of 1996:
A Critique
Amazon: N/A
Plus people should teach there children proper sex education for there
children not to end up in, sexually active children
Learning Expectation:
My learning expectation in this chapter is how people can censor this kind
of mentality, and how people can avoid pornography, plus how people can adopt
to the law without pornography.
Review:
The chapter tells that the telephone communications analogy was the one
most often cited by the judges in the Supreme Court and in the earlier district
court case. The reason for the use of this analogy over the other was the
acceptance that clicking on a hyperlink is like dialing a telephone number; in
other words, positive steps on the part of a person must be made to access the
information.
This analogy also leaves the option open that the Internet could be
regulated as a common carrier, that is, as a telephone company.
The law was attached to the Telecommunications Reform Act of 1996 and
passed by congress on February 1st of the same year. It was signed by President
Clinton the following week.
On the same day the bill was signed the American Civil Liberties Union
filed suit in Philadelphia on the ground that that the statute banned speech
protected by the First Amendment and subjected the Internet to restrictions that
were out of line with regulations faced by other mediums.
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
By then Since that time, many of the original PICS advocates have
become alarmed by the extent to which PICS makes the Web censor friendly.
Increasingly, PICS is said to be the devil.
Then the chapter tells about by late 1997, PICS developers had become
less inclined to attempt to gloss over the fact that PICS provides a helpful tool for
government censorship. Nevertheless some, if not all, of those people regard the
issue as being neither their concern nor responsibility. That, however, is cold
comfort to the people who are forced to use the technology they have created.
Lastly this chapter tells that less than twelve months after PICS was
announced, indications arose in Australia and shortly thereafter in the UK, that
governments would enforce or coerce the use of PICS facilitated systems. The
probability of mandatory self-rating and prosecution for inadvertently mislabeling,
or failing to label, became obvious.
What I’ve learned:
I learned about PICC and how people can control censorship, and how
internet access can be controlled.
Plus I learned a lot of things in how the people can control the internet and
how they can block certain sites in the internet to protect there privacy and also
mainly to protect there children from bad education.
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
The chapter is telling that the institution has taken reasonable care in
relation to publication of the statement in question, the defense is likely to be
available to the institution. Upon receipt of notice of a claimed defamation, the
institution should, of course, remove the posting straight away.
Plus the internet service provider liability overview paper considers the
extent to which institutions are responsible for content which is made available
on their computer systems.
Integrative questions:
Amazon: N/A
In this quote it is saying that people can always be good or bad, but
information will always be information, but still people should always accept the
fact that information weather in real life or in cyberspace, it can always be good
or bad.
Information must always be for the common good, and people should
always respect the fact that people can only accept always the good part in life.
Learning Expectation:
Review:
The chapter talks about the labor theory is often used today, implicitly at
least, to justify claims to intellectual property rights. For example software
developers who want to discredit "pirates" who use their products without paying,
cite the enormous time and effort that goes into developing a piece of
commercial software and the unfairness of others benefiting from it without
compensating the developer.
But still in the chapter it is saying that the extension is obvious. It takes
much thought, time and effort to create a book, a musical composition, or a
computer program. Those who worked to create it have the strongest claim to the
benefits of its use, over anyone else who contributed nothing to the project.
Plus the product becomes his. He can use it as he wants, whether to sell
or to heat his house, and, more importantly, he can exclude others from its use.
This theory works well in a commercial environment. Not only does it offer a
credible justification for private property, but it also provides incentives for people
to work hard and therefore create wealth.
What I’ve learned:
I learned about the different information to do the common good, and
mainly about more about ethics online, and what and what not to do about ethics,
especially in real life.
Integrative Questions:
1. What is Hegelian?
5. What is information?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS
Amazon: N/A
Plus people will definitely value ethics because in some point in time
ethics is like a success tool in life because if people value ethics they can
definitely be a success person in the near future.
Learning Expectation:
Review:
The chapter talk about copyright has never protected facts or ideas. It only
protects expression. Therefore a scholar who has labored for years to research a
subject such as Lincoln’s death may find his work utilized without credit and have
no recourse under law
Also this chapter conclude, in view of the findings we must hold there was
not a sufficient copying to amount to an infringement.” In short, plagiarism may
be unethical but it is not illegal if it can be justified by fair use, which does not
specify that the source of work used by must be cited
Plus the chapter talks about while many circuit courts incorrectly
interpreted the 1909 Copyright Act as protecting compilations of information
based on labor this was clearly found unconstitutional by the Supreme Court in
Feist v. Rural Telephone ,
Integrative Questions:
Amazon: N/A
Plagiarism is a crime that almost every people in the right mind already
committed, because people doesn’t some times noticed that they are doing
plagiarism, like for example for students plagiarism is very rampant especially in
examinations in quizzes etc.
Same situation goes for the I.T practitioners plagiarism is definitely a crime
but for them they value the copyright piracy issue, people in the it industry never
forgets to copyright there works because without copyright people will just easily
plagiarize there works and say that they are the people who originally created the
piece of work.
Learning Expectation:
Review:
This chapter talks about that there are always questions about the
reliability and the precision of those figures as they are usually exaggerated.
Plus more information about plagiarism is talks about that plagiarism presents
claims without any trace to their provenance.
That chapter is telling that this is a form of cheating the public which is
similar to creating false histories. It is easy to see that copyright piracy just harms
the owner alone and for some limited period of time. While plagiarism harms all
the readers and the whole academic and journalistic communities, and the
negative effects may last very long or they even cannot be solved.
Integrative Questions:
Amazon: N/A
This quote talks about the real life importance of theories and privacy
because sometimes in life theories are some what connected with real life even
though people sometimes doesn’t prove the ethical theory but still people can
say that does theories are correct in some point in time.
But still people are still looking for answers about the different theories in
different walks about life and one is the theory of privacy, people and especially
the IT practitioners are looking for answers in the theory of privacy because as
we all know that the privacy theory is very important in life because privacy is a
right that God has given us.
Learning Expectation:
Review:
Integrative Questions:
Amazon: N/A
As we all know that the computer is the one not to blame in internet
hacking because the computer is just a tool in doing those kinds of deeds, that is
why people are so immature to blame the computer for hacking.
Maybe in the near future there will come a time where computers can
think like a human being, but still in our point of time people cannot still have the
right to blame computers for the reason of hacking personal information, hacking
in a series of databases, the one’s that are in really at fault is the people who
uses the computer for there evil intentions.
Learning Expectation:
This chapter has a very long title so that is why I want to learn all about
what the chapter can give to me.
Review:
To give a short history about the chapter I search the internet and found
in wikepedia.org the information that I need to give a short and brief history of
the chapter the information are In 1990 works on relevant directive were
started. They resulted in the issuance of Directive of the European Parliament
and of the Council of 24 October 1995 (95/46/EC) on the protection of
individuals with regard to the processing of personal data and on the free
movement of such data. The deadline for its implementation in the legal orders
of Member States was set for 23 October 1998.
But this chapter talks about however, with time discrepancies in
legislations of particular EU Member States caused the need to harmonise them.
The fundamental task to be fulfilled by this regulation was to ensure minimum
and at the same time uniform for Member States level of protection of personal
data collected in the filing systems and to ensure a free flow of personal data
between Member States.
Integrative Questions:
BS-IS/ IT-ETHICS
Amazon: N/A
Learning Expectation:
Review:
This chapter talks about public information would include any information
observed and recorded in a public place, in keeping with Reiman's suggestion
that the social practice of privacy "does not assert a right never to be seen even
on a crowded street. It would be reasonable to conclude, therefore, that
information harvested in a public place is "up for grabs" and not covered by
norms of privacy.
And also the existing theories that limit the scope of privacy to a personal
zone or to intimate and sensitive information fail to capture elements of common
real-world judgments. Public reaction to Lotus Marketplace: Households and
similar computerized databases of non-sensitive information indicates that, by
contrast, our common notion of privacy is not thus limited.
Lastly neglecting the broader sphere will rob from people the ease and
comfort of anonymity as they stroll through actual town squares as well as
electronic town squares, conduct trade, socialize, and engage in political and
recreational activity both on and off line. It will deprive them of privacy in public.
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
The chapter tells about the meaning of KDD and that is KDD is the
enormous scale on which data can be processed and profiles can be produced.
Relatively new. also, are the ever growing possibilities of discovering hitherto
unnoticed relationships between characteristics and features of persons, created
by KDD.
But however this may be, one can be sure that the profiles will be used
more and more as a basis for policy-making by public and private organizations.
Although many uses of the products o fKDD are morally acceptable, and even
desirable, many other possible applications are at odds with commonly held
values regarding the individuality of human persons.
KDD
PRIVACY
INDIVIDUALITY
FAIRNESS
Integrative Questions:
Amazon: N/A
Quote: “Data mining and Privacy is somewhat connected with each other”
Learning Expectation
Review:
This chapter talks about the privacy concerns, while not originating from
the Internet, can be enhanced by the Internet. On the other hand, certain specific
concerns, which not possible before, now can be made possible by the Internet.
And also the chapter is saying that that the Internet is becoming an
emerging frontier for data mining. Thus, when we consider privacy threats related
to data mining, it is important to explore what characteristics of the Internet
facilitate the process of data mining and how data mining with the Internet can
exacerbate privacy.
2 reasons about data mining and privacy one is fairness and the other is
openness in consent. First, because data subjects are often “not informed” during
the data collection or data mining, sometimes it is impossible for them to set up a
new normatively private situation regarding the data. Secondly,
But also stated in this chapter because the personal data that data
subjects may have willingly granted for use in one context is often subsequently
mined for another context different from the original situation.
What I’ve learned:
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
And also this chapter suggests a strategy for the future of the politics of
intellectual property. In both areas, we seem to have the same recipe for failure
in the structure of the decision-making process. Decisions in a democracy are
made badly when they are primarily made by and for the benefit of a few stake-
holders.
Plus this chapter thinks of the costs and benefits of acid rain producing power-
generation or -- less serious, but surely similar in form -- the costs and benefits of
retrospectively increasing copyright term limits on works for which the copyright
had already expired, pulling them back out of the public domain. There are
obvious benefits to the heirs and assigns of authors whose copyright has
expired, in having the Congress put the fence back up around this portion of the
intellectual commons.
What I’ve learned:
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
This chapter talks about the order to prevent this the 'art of separation' of
spheres has to be practiced and blocked exchanges between them have to be
put in place. If the art of separation is effectively practiced and the autonomy of
the spheres of justice is guaranteed then 'complex equality' is established.
And also this chapter talks about he meaning and value of information is
local, and allocative schemes and local practices that distribute access to
information should accommodate local meaning and should therefore be
associated with specific spheres. Many people do not object to the use of their
personal medical data for medical purposes, whether these are directly related to
their own personal health affairs, to those of their family.
Integrative Questions:
Amazon: N/A
Learning Expectation:
1.) Terrorism
2.) Civil disobedience
3.) Hacktivist
4.) And more information about ethics.
Review:
This chapter talks about the proponents of civil disobedience have offered
a number of reasons for thinking that the law should not, as a general matter,
punish even unjustified acts of civil disobedience. First, acts of civil
disobedience, even unjustified ones, can call attention to laws that ought to be
changed because they are unjust or because they lack sufficient support among
citizens. Like any other form of speech, acts of civil disobedience
Then also talked about in this chapter is the motivation for committing an
act of civil disobedience is typically a laudable one. Since acts of civil
disobedience are characteristically motivated by conscience, it is not entirely
clear what the legitimating point of punishment would be. One might think, for
example, that someone who commits an act of civil disobedience does not need
to be either rehabilitated or segregated for the protection of other people
1) terrorism
2) civil disobedience
3) hacktivist
4) and a lot mo information about ethics
Integrative Questions:
Amazon: N/A
Another is American has also the technology to prove anything that they
have invented because America has the budget to do so.
Learning Expectation:
Review:
The chapter will start with a review of the literature on privacy and
security, which will support the contention that these are ethical concepts. In a
subsequent step it will discuss the concept of ideology and critical research. This
will lead to a critical discourse analysis of a text from a commercial software
vendor, which will provide evidence of the ideological use of the terms privacy
and security
The chapter also discusses about sector because it has the potential to
determine the success or failure of many business ventures, most obviously e-
commerce activities. The location of privacy and security on the fault line of a
variety of discourses is one of the reasons for some of the problematic use of the
concepts that this paper will discuss.
This chapter also talks about the issues of security which have a moral
side. Security in computing is a major cost factor with estimates of overall cost of
security (or lack thereof) varying widely but always ranging in the billions of
Dollars, Euros, Pounds etc. Such costs are of course a moral issue from a
utilitarian point of view and they also prevent society from investing these
resources in other worthy causes. Security issues also play a large role in
computer crime and digital forensics. The ubiquity of computing in modern
society renders them an important ingredient of many types of. Hacking and
viruses are a major concern.
Web security?
More information about privacy
And also to learn more about the American perspective.
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
Integrative Questions:
Amazon: N/A
It is a fact that people can define ones identity with just the use of
biometrics because in the states there are a lot of software that can determine
ones identity, most commonly used are the software in the hospitals in where
there are DNA testing among people, and also the software in IP tracking.
Learning Expectation:
1.) Biometrics
2.) How biometrics can reveal an identity.
Review:
Also talked about in this chapter that biometric systems are already being
compromised. People can easily defeat fingerprint scanners with gelatin or other
substances. Other methods and techniques will arise in the future. Again, the
biggest problem with this is that you cannot change your biometric identity like
you can your forgotten password.
Biometrics may become the future SSN. The problem of the SSN is
magnified with biometrics. Your biometrics will not change no matter how much
you complain. Once your biometrics are compromised, your identity will forever
be untrustworthy to all biometric systems. As with the SSN, you don’t have the
option of changing your DNA once compromised.
Passwords or account numbers are used for the same purposes but when
something goes wrong, they are easily changed. Once your SSN is
compromised, you don’t have the option of clicking on a button that resets your
SSN as you do with a password.
1.) Biometrics
2.) How biometrics can reveal an identity.
Integrative Questions:
1. What is biometrics?
2. How can biometrics reveal a persons identity?
3. What kind of software can use biometrics?
4. What is the meaning of SSN?
5. What is the meaning of DNA?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS
Amazon: N/A
Now in this chapter the quote is saying that software engineering is very
essential in ethics because of the reason of ethics is need everywhere so that is
why people tend to have corruption every where in life so that is why ethics is
very well need in software engineering.
Learning Expectation:
Review:
The chapter talks about the difference between virtue ethics and
right/obligation ethics? Adherence to these behaviors could be clearly
measured. This is the Kantian moral law; moral principles were categorical and
were true and independent of personal or local circumstance.
Then the members of the Center for the Study of Ethics in the Professions
were participant observers, supported by a pilot grant from the National Science
Foundation. After receiving the Call for participation email, CSEP director Vivian
Weil contacted co-chair Donald Gotterbarn of the Software Engineering Ethic
Institute at East Tennessee State University and expressed interest in observing
the process. Gotterbarn assigned the IIT research team of Weil, Michael Davis
CSEP Senior Fellow, and Ilene Burnstein Computer Science, IIT to the
professional competence working group, the group that was to write the first draft
of the code of ethics.
Then this chapter talks about some of the disagreements that arise in
computer ethics are based on approaching ethics from two apparently
contradictory directions; one a virtue based ethics and the other a rights-duty
based ethics.
Integrative Questions:
Amazon: N/A
In this quote it is saying that people can always be good or bad, but
information will always be information, but still people should always accept the
fact that information weather in real life or in cyberspace, it can always be good
or bad.
Information must always be for the common good, and people should
always respect the fact that people can only accept always the good part in life.
Learning Expectation:
Review:
The chapter talks about the labor theory is often used today, implicitly at
least, to justify claims to intellectual property rights. For example software
developers who want to discredit "pirates" who use their products without paying,
cite the enormous time and effort that goes into developing a piece of
commercial software and the unfairness of others benefiting from it without
compensating the developer.
But still in the chapter it is saying that the extension is obvious. It takes
much thought, time and effort to create a book, a musical composition, or a
computer program. Those who worked to create it have the strongest claim to the
benefits of its use, over anyone else who contributed nothing to the project.
Plus the product becomes his. He can use it as he wants, whether to sell
or to heat his house, and, more importantly, he can exclude others from its use.
This theory works well in a commercial environment. Not only does it offer a
credible justification for private property, but it also provides incentives for people
to work hard and therefore create wealth.
What I’ve learned:
I learned about the different information to do the common good, and
mainly about more about ethics online, and what and what not to do about ethics,
especially in real life.
Integrative Questions:
6. What is Hegelian?
Book review: No PAPA: why incomplete codes of ethics are worst than none at
all.
Amazon: N/A
Learning Expectation:
Review:
And also this chapter suggests a strategy for the future of the politics of
intellectual property. In both areas, we seem to have the same recipe for failure
in the structure of the decision-making process. Decisions in a democracy are
made badly when they are primarily made by and for the benefit of a few stake-
holders.
Plus this chapter thinks of the costs and benefits of acid rain producing power-
generation or -- less serious, but surely similar in form -- the costs and benefits of
retrospectively increasing copyright term limits on works for which the copyright
had already expired, pulling them back out of the public domain. There are
obvious benefits to the heirs and assigns of authors whose copyright has
expired, in having the Congress put the fence back up around this portion of the
intellectual commons.
What I’ve learned:
Integrative Questions:
Learning Expectation:
I expect to learn a lot in this chapter especially in the milestones and the
history of the information and computer ethics, I also want to know more about it
because it is in my field or in my career in short it is an obligation for me to know
about it because me as an information management student I must know the
ethics because information technology because for me I need to graduate in
benilde that I have my integrity and my dignity when I go to real world.
Review:
This chapter obviously talks about the information ethics and what it is its
milestones that it has achieved and the history behind it.
Well as I’ve research in the internet about the history of information and
computer ethics Computer ethics as a field of study was founded by MIT
professor Norbert Wiener during World War Two early 1940s while helping to
develop an antiaircraft cannon capable of shooting down fast warplanes. One
part of the cannon had to “perceive” and track an airplane, then calculate its likely
trajectory and “talk” to another part of the cannon to fire the shells. The
engineering challenge of this project caused Wiener and some colleagues to
create a new branch of science, which Wiener called “cybernetics” – the science
of information feedback systems. The concepts of cybernetics, when combined
with the digital computers being created at that time, led Wiener to draw some
remarkably insightful ethical conclusions. He perceptively foresaw revolutionary
social and ethical consequences. In 1948, for example, in his book Cybernetics:
or control and communication in the animal and the machine
With the information gathered I say and also what I’ve read in the chapter
is that it is important for us information systems people to know about the
milestones and the history of computer ethics because with that we have the
foundation that we need to back up our knowledge about information ethics.
Integrative Questions:
Amazon: N/A
But file sharing can be helpful to, like with open source communities, file
sharing is a essential part in the community because with that programmers can
help fellow programmer in fixing bugs in open source software and also in
handing out different ideas In the online community.
Learning Expectation:
Review:
This chapter basically talks about the legal and moral challenges of online
file sharing, this chapter elaborates about the advantages and the disadvantages
of online file sharing and what can happen to people who are not responsible
enough to share files without any talks anymore.
But with online file sharing people can easily gain access to any bit of
information on the internet market for example in the research area people can
easily research in things that they need for there projects and what are the
missing parts of there project also, what information they need to cope up with
the projects that they do in the future.
I learned a lot in this chapter especially in the legal and moral challenges
in the file sharing category, and also I learned about the advantages and
disadvantages of online file sharing.
Integrative Questions:
1. What is a business?
Amazon: N/A
Well this quote talks about the domino effect of people who are morally
good to people and with that it helps people in being more assertive that they will
follow the morally good person in terms of his/her doing because they will be
enlighten because of the graces that the morally good person is having rather
than the person who is not morally good.
Learning Expectation:
The also to learn about the perspective of the future because as we know
we as people have dreams for the future and with that we want to have a good
future for our future family and our future offspring if we were to have.
Review:
This chapter talks about the future and what will likely to happened in the
future if people will stop being responsible in the future and also ethics becomes
a big player in the future because with people who have proper ethics in life
those are the people whom will be successful in the near future because in little
way ethics can be keys for success.
This chapter also gives al thru out discussion about the ethics because as
we know that ethics comes into play many times in life because this chapter also
talks about the poverty issues of people and also the information systems gap in
world.
But still ethics can help people as clearly elaborated in the chapter
because ethics if people can do there ethics well people will likely to survive
because with ethics people will gain more friends and there jobs will still be
there’s because if people will not follow moral ethics people will just likely
become people with no future and just people with no place in the community
because there pride, soul, dignity, integrative will just be eaten by hell.
What I’ve learned:
I’ve learn a lot in this chapter especially about ethics because as I learned
ethics is very well needed in life because ethics is a key for success and people
should know that.
Integrative Questions:
4. What is a practitioner?
Amazon: N/A
Quote: “An information ethics should be able to address and solve the ethical
challenges arising in the infosphere”
The quote tells about what will happened if people in the industry don’t
have the knowledge in ethics, because without the ethic knowledge the people
cannot solve the challenges that goes with technology because as we know that
technology always, becomes more and more advanced each and every day
because, people every can acquire more and more new knowledge to other
people.
Learning Expectation:
I expect to learn a lot in this chapter, because the title speaks for itself the
foundation of information ethics, why is that I want to learn ethics in the
technology level because it is related to my course and as we know I can be a
programmer or an analyst one day, with this new knowledge in information ethics
I learn the what and what not to do in the information systems area.
Review:
I’ve learned a lot in this chapter especially the information ethics the us
information systems people needs to life there career with dignity and integrity
especially in our daily lives.
Integrative questions:
Amazon: N/A
Learning Expectation:
I expect to learn a lot in this chapter especially in the milestones and the
history of the information and computer ethics, I also want to know more about it
because it is in my field or in my career in short it is an obligation for me to know
about it because me as an information management student I must know the
ethics because information technology because for me I need to graduate in
benilde that I have my integrity and my dignity when I go to real world.
Review:
This chapter obviously talks about the information ethics and what it is its
milestones that it has achieved and the history behind it.
Well as I’ve research in the internet about the history of information and
computer ethics Computer ethics as a field of study was founded by MIT
professor Norbert Wiener during World War Two early 1940s while helping to
develop an antiaircraft cannon capable of shooting down fast warplanes. One
part of the cannon had to “perceive” and track an airplane, then calculate its likely
trajectory and “talk” to another part of the cannon to fire the shells. The
engineering challenge of this project caused Wiener and some colleagues to
create a new branch of science, which Wiener called “cybernetics” – the science
of information feedback systems. The concepts of cybernetics, when combined
with the digital computers being created at that time, led Wiener to draw some
remarkably insightful ethical conclusions. He perceptively foresaw revolutionary
social and ethical consequences. In 1948, for example, in his book Cybernetics:
or control and communication in the animal and the machine
With the information gathered I say and also what I’ve read in the chapter
is that it is important for us information systems people to know about the
milestones and the history of computer ethics because with that we have the
foundation that we need to back up our knowledge about information ethics.
What I’ve learned:
I learned a lot in this chapter because this chapter can back up our
knowledge in the information systems ethics that we know it can back us up in
the information that we know about ethics in the information systems field, and
also it is important for us to know this because us information systems
practitioners we must know these for us to teach to other people the values of
ethics.
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
In this chapter 1 thing that I’ve noticed is the word Generalism which
means the possibility of a moral though and judgement depend on the provision
of a suitable supply of moral principles, the meaning that I came up with is when I
researched the word on the internet but still it still focuses on the methodology in
information ethics.
Another thing that I noticed in the chapter is that the information that is
gathered in the chapter is that focuses mainly on information and computer
ethics and discusses about the methodology behind it and also discusses about
the cognitive content and truth of meta ethical work with different means those
are what are being emphasized in the chapter.
I’ve learned a lot in this chapter especially the part in where the people
can adopt well in the information and computer ethics field because with that
people can simple look at the internet and research about the methodology of
information and computer ethics and also a new word that is now being added in
my dictionary of words is generalism. And the different cognitive content, and the
truth about the meta ethical work.
Integrative Questions:
Amazon: N/A
Since I didn’t found any quotes in the chapter so I though of a new quote
that I can do.
Learning Expectation:
Review:
The topic mainly in this chapter is the Value Sensitive Design and
Information Systems. Which means about the technological values that people
thought about and created a design with the information system there are many
example in where the design of the people are created with the design of the
people who made the information system value Sensitive design.
Then also involved is the theoretical ground approach which involve the
church or any part of the religion groups because ethics also comes from the
religion in where people treat the design as the 10 commandments because they
also follow it as well as ethics.
I learned a lot in this chapter especially in the value sensitive design and
the information system because, I can really put the learning’s that I got In
reading the chapter to good use because the chapter focuses on the ethics that
people do for a living.
Integrative Questions:
BS-IS/ IT-ETHICS
Amazon: N/A
This line is a powerful line that grants the person using the patent the
copyright that they need to protect there product. And also it is applicable to real
life because people can use this to protect there properties, the book that they
made and the poems the videos the music that they made to clearly state that
they are the people that originally made the piece of art.
Learning Expectation:
I expect to learn a lot in this chapter because I want to know who is Adam
in this chapter and also I noticed that the book is becoming more and more
interesting with that people can really learn what is to become a programmer that
has the copyright law behind them. And also help me to know what is more better
for me in the future, because I can gain more knowledge in this chapter.
Review:
Personality-based, well personality based simply talks about and even just
looks at the personality of the person being looked at
I learn a lot in this chapter because people can now know the value of
ownership because people know has there eyes opened in this kind of matter
because people can just leave there works and other people just fork it, must
know the value of copyright.
Integrative Questions:
Amazon: N/A
This Quote is very striking when I saw this while reading the handbook
because it is a very natural mentality among us people that when our privacy is
invaded we tend to complain because as a matter of fact that our privacy is
invaded that it is a very very big deal to us because every human being has the
right for there own privacy and this goes well also with companies that want to
protect there privacies, especially with very confidential components of there
company that they want to protect.
Learning Expectation:
Review:
The book clearly talks about the Information Privacy, because as I read in
the book and based on my own understanding that privacy is very important
among companies and especially people because every people in his right mind
has the right for there privacy to be protected because it is clearly stated in the
law the people has the right to have there own privacy.
But the chapter talks in a different approach because the book talks about
the privacy of companies, that want to protect the company image and anything
and many more things the companies wants to protect for themselves and don’t
want others to especially there competitors, to know about there products.
And also talked about the chapter are the different theories about the
privacy issue and the different controversies the set aside the privacy issue of the
chapter.
What I’ve learned:
Integrative Questions:
Amazon: N/A
Quote: What is the area, the content of privacy, what is outside that area.
This quote talks about privacy also because in this quote privacy is
emphasized because this quote talks about what privacy is all about because as
we know that privacy is very hidden based from the word itself privacy means
private and that means we don’t know the meaning of the in short it is top secret
confidential etc. so I thought that many people are thinking of new ways to talk
about privacy because privacy is a term the literally means private and people
who only know the meaning of that can be the only people can has the access to
the privacy issue
Learning Expectation:
Review:
And also anonymity, is like being anonymous to put in to short words that
to let people reading your e-mail that has been send to for them not to know who
you are, because you are anonymous
I learned a lot in this chapter because this chapter talks about the different
kinds of anonymity in short it teaches us how to be anonymous in some point in
our lives because keeping your identity secret is very important because mainly
you must always make your identity as clean as possible.
Integrative Questions:
Amazon: N/A
But sometimes hacking is being put to wrong use like when people are
hacking personal information of other people like credit card and ATM numbers
then hacking personal information of other people to black mail the and also
hacking a companies database, because although hacking can be good but the
effect of hacking can be very bad because companies can be bankrupt because
of hacking and people can be accused of offenses that they didn’t even do.
Learning Expectation:
My learning expectation in this chapter is to learn about the good and bad
effects of hacking because as I read some parts of the chapter it just emphasizes
on the different effect of hacking because as we know that hacking has a good
and bad side because hacking have some negative effects on people and some
positive effects on some people because hacking can be good nor bad some
time in life.
Review:
This book clearly talks about hacking, and gives emphasis involving
Computer Security Hacking, hacktivism, and counter hacking this chapter talks
about the different forms of hacking because as we know that this chapter talks
about hacking.
And also talks about the ethics of people in terms of hacking because this
book talks about hacking and with the some people can loose there dignity and
there integrity because they are using hacking to do crimes and to use it just for
themselves
Because as said so in the book the ethics in hacking has a mentality for
people because hacking can be very easy to use it for work for the hacker to gain
recognition.
Integrative questions:
Amazon: N/A
Quote: “An information ethics should be able to address and solve the ethical
challenges arising in the infosphere”
The quote tells about what will happened if people in the industry don’t
have the knowledge in ethics, because without the ethic knowledge the people
cannot solve the challenges that goes with technology because as we know that
technology always, becomes more and more advanced each and every day
because, people every can acquire more and more new knowledge to other
people.
Learning Expectation:
I expect to learn a lot in this chapter, because the title speaks for itself the
foundation of information ethics, why is that I want to learn ethics in the
technology level because it is related to my course and as we know I can be a
programmer or an analyst one day, with this new knowledge in information ethics
I learn the what and what not to do in the information systems area.
Review:
I’ve learned a lot in this chapter especially the information ethics the us
information systems people needs to life there career with dignity and integrity
especially in our daily lives.
Integrative questions:
Amazon: N/A
Even though that I didn’t see any quotation in the chapter I decided to
create my own quote to satisfy the blank that needed to be filled.
So based on the chapter that the chapter discusses is about free or open
source software or information because as we know as programmers open
source software are the best in the market because open source software just
like eclipse and tomcat apache those kinds of open source software has a
community of people that gives continuous development on the system that is
the advantage of open source software than software that is not in open source
category.
Learning Expectation:
Review:
This chapter talks about open source software, from what I’ve read about
open source software is that the community inside the open source category is
very friendly because in the people who blogs a lot and those people who are
also programmers can easily give out what they have recently learned about the
open source software that they have, in particular they can give information
about the bugs that they have encountered while using the software and they can
also give out the source code to people who needs the codes that they have and
use it for future projects
And with the community the different versions of open source systems can
be easily perfected because the programmers for example on ruby on rails the
team of programmers that create ruby on rails. Gets the help of other people that
people can give out there comments and suggestions to the people who are
using the ruby on rails engine to perfect the system.
I’ve learned a lot in this chapter because this chapter talks about the
different open source software in the market and how the open source
community are helping out one another in creating there system of choice to
make it the best open source software in the market.
Integrative Questions:
Book review: Internet Research Ethics: The Field and Its Critical Issues
Amazon: N/A
I made the quote by my self because I didn’t see any striking quotation in
the book because the chapter talks about the field and its critical issues, with the
internet research ethics, because in internet research ethics the chapter talks
about what ethic values will a person will do in order to do what is right while
browsing the internet.
Learning Expectation:
My learning expectation in this chapter is with the title itself I tend to learn
about the meaning of internet research ethics and the fields behind It and also
the critical issues the internet research ethics has
And also I want to learn about this topic because it can affect my growth
for me as a kid in the 21st century its been half of my life that I have been using
the internet for by schooling options especially for researches and project to be
done in school.
Review:
Well to start of with the review of the chapter, I would like to make an
emphasis on the title of the chapter which is internet research ethics because in
this chapter as I read about it in the book cyberethics.
The chapter talks about the ethical values behind the internet research
field the book talks about what and what not to do while researching in the
internet also it talks about the internets flaws as a system and can lead people
into hacking other peoples personal information.
But now because of the internet, people can easily access any given
information in the world wide web.
What I’ve learned:
I learned a lot in reading this chapter because I learned in what and what
not to do in browsing the internet and also I learned the consequences in hacking
other peoples personal information in the world wide web.
Then I also learned how to use the internet more properly in the future
with me as a frequent internet user I now know what and what not to do in the
internet when I am conducting my researches.
Integrative Questions:
Amazon: N/A
I created this quote because I didn’t found any quotes inside the chapter
but instead I created this quote to match the title of the chapter because the
chapter talks about that health information technology is also need in
cyberethics.
Learning Expectation:
Review:
The chapter clearly talks about the health information Technology and
talks also about challenges in ethics, science, and uncertainty behind the health
ethics. Because of these kind of publicity why it is so hard to trust people
nowadays, people can view your profile in your account which can help them
know personal information but also why are you willing to put an information
which you do not want others to see it.
Now with the use of the social networks people can easily look at other
peoples profiles and see what is there status.
I learned a lot in this chapter because nowadays people are being health
conscious because sickness can be easily obtained nowadays in any short in life.
I learned to value my health in the information ethics field and also the
value for the information that I give in the WWW.
Integrative Questions:
Amazon: N/A
I just created this quote because in the chapter there is not striking
quotation that I can find because in the chapter it just talks about everything
usual everything about ethics.
Well to start of ethics has been a big factory in the real life because as we
know that ethics is everywhere as been said so in the quote because ethics has
been found to be needed everywhere to make people learn what and what not to
do in there field of interest weather it is in the business filed in the information
systems field or anywhere else.
Learning Expectation:
Review:
So this chapter basically talks about the different reviews in the business
and information ethics, so it clearly states that the information inside the chapter
talks about business ethics
Also the chapter talks about the 2 kinds of level with pertains to the macro
and micro level
What I’ve learned:
Integrative Questions:
Amazon: N/A
This quote that I found in some part of the chapter is that I learned that
ethics is a major part in using the internet because there are some
responsibilities that is need with using it.
Like in the religious beliefs that porno is bad it goes as well in ethics but in
ethics there are the good and bad ways of using it, for example hacking based
from the word that hacking is bad but in ethics hacking can used for the good and
obviously can be used with the bad, so that is why it is important to have ethics
when using the internet because ethics can be a major role in the internet
industry.
Learning Expectation:
New knowledge that I have acquire in using the internet I can say that I
am now a responsible internet user.
Review:
Integrative Questions:
Amazon: N/A
Quote: What is the area, the content of privacy, what is outside that area.
This quote talks about privacy also because in this quote privacy is
emphasized because this quote talks about what privacy is all about because as
we know that privacy is very hidden based from the word itself privacy means
private and that means we don’t know the meaning of the in short it is top secret
confidential etc. so I thought that many people are thinking of new ways to talk
about privacy because privacy is a term the literally means private and people
who only know the meaning of that can be the only people can has the access to
the privacy issue
Learning Expectation:
Review:
And also anonymity, is like being anonymous to put in to short words that
to let people reading your e-mail that has been send to for them not to know who
you are, because you are anonymous
I learned a lot in this chapter because this chapter talks about the different
kinds of anonymity in short it teaches us how to be anonymous in some point in
our lives because keeping your identity secret is very important because mainly
you must always make your identity as clean as possible.
Integrative Questions:
1. What is Simulation?
2. What is cyberspace?
3. What is Virtual?
4. What is Virtual Reality?
5. What is Computer Simulation?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS
Amazon: N/A
Quote: “the concept of civil disobedience expressly calls for the use of “non-
violent” means.”
Well to put it in lay mans terms that the use of violent means cannot
answer anything, but instead it just make the situation far more worst than it was
before because in my own experience violent means just make the situation
more worst to put in the boys point of view and even worst in the girls point of
view.
But the use of non-violent means is far better than using the violent mean
because using it can save relationships of friends, love ones etc.
Learning Expectation:
Review:
• What is knowledge?
• How is knowledge acquired?
• What do people know?
• How do we know what we know?
• Why do we know what we know?
Well that is the meaning that I found out in researching the meaning well back to
the review the chapter talks about now about knowledge not anymore about
information ethics because now with the knowledge that we have for information
ethics we can now say that it is not enough not just to learn about the information
ethics but it is more likely to be more practical to know the different ethics there
is.
I’ve learned a lot in this chapter especially for me that I learned new words
that words that I don’t even know and words that I have already seen just now
I learned in this chapter the value of knowledge, and also the knowledge
to know everything that I get possibly pick up in my future life.
Integrative Questions:
Amazon: N/A
Quote: What is the area, the content of privacy, what is outside that area.
This quote talks about privacy also because in this quote privacy is
emphasized because this quote talks about what privacy is all about because as
we know that privacy is very hidden based from the word itself privacy means
private and that means we don’t know the meaning of the in short it is top secret
confidential etc. so I thought that many people are thinking of new ways to talk
about privacy because privacy is a term the literally means private and people
who only know the meaning of that can be the only people can has the access to
the privacy issue
Learning Expectation:
Review:
And also anonymity, is like being anonymous to put in to short words that
to let people reading your e-mail that has been send to for them not to know who
you are, because you are anonymous
I learned a lot in this chapter because this chapter talks about the different
kinds of anonymity in short it teaches us how to be anonymous in some point in
our lives because keeping your identity secret is very important because mainly
you must always make your identity as clean as possible.
Integrative Questions:
Amazon: N/A
This quote is very striking because in this quote it talks about public health
and safety and welfare of other people because it is a essential part in life in
where health becomes an issue.
When ethics becomes an issue It goes a long way because there are
different kinds of ethics like ethics in health issues and also ethics in the business
issues and also the ethics in the information systems issue so there are lots of
ethical issues being toggled in the first place.
Learning Expectation:
Review:
Well this book talks about the ethical risk assessment as we know that risk
assessment is very common nowadays because now in life there is always a
choice in weather you will take the risk or not.
And also stated on this chapter is that people must always be ready and
will to be secure to do all of this on hand, because with out safety and always just
taking the risk people can always end up in disasters and event that will not be
good to see.
And also this chapter talks about the health issues in ethics in pertains to
the ethical risk assessment because in risk assessment it teaches us readers
what and what not do in terms of risk management and can lead us to the good
life.
What I’ve learned:
Integrative Questions:
Amazon: N/A
Quote: “Vicarious liability is the imposition of liability on one person for the
actionable conduct of another”
This quote tells about the liability of person in doing one thing that has
been assigned to him because sometimes in life that people are being assessed
with there liability just based from the title of the chapter it keep good and
regulated and good governance over the internet
Learning Expectation:
Review:
This chapter talks about the different regulations and governance of the
internet it give people the knowledge to become more of a responsible user of
the internet because as we know people are just using the internet just for the
sake of fun because internet is very entertain and for children it is okey but for us
adult it is something to be talked about.
Because as we know people now are using internet for evil deeds like
hacking and going to sites that not good to enter and creating viruses to hack
other computers there are lots and lots of things that people especially the
hackers can do with the internet.
But know in the society today, there has been laws and regulations that
people needs to follow in using the internet because the internet is a very
sophisticated type of engine that bad deeds can be done with the help of the
internet.
I learned a lot in this chapter especially the different rules and regulations
behind the internet and also I learned how to become a responsible user of the
internet and also how us the internet in a good and responsible way because
internet I very much need in the society now plus I learned how to give good
governance in the using of internet because internet must be very well looked
upon because bad deeds can be created with the use of the internet.
Integrative Questions:
Amazon: N/A
This quote for me is very useless because as we know that a more faster
approach can lead to a disaster because careful thinking is needed in every step
of the way in life, without careful thinking what will happened to a project it will
just end up in a way that people will not appreciate the output because it was
done as fast as possible and also with that kind of mentality it is better to think
first than to act fast because acting fast can always lead to a big problem in the
future.
Learning Expectation:
Review:
The chapter also talks about how to evade information overload because
with the use of the internet information is unlimited and also discussed in the
chapter about the ethical issues regarding information overload to think of it that
there are ethics behind information overload.
Give also information about real life scenarios of people dealing with the
information overload matrix.
What I’ve learned:
Integrative Questions:
Amazon: N/A
Well now this quote is very striking because in this quote it give out the
gender issues in email spamming because as we know that in spam mail there
are always gay people who sends spam mail to there crushes and people who
are anonymous
This quote also tells about the gender issues that have now been a topic
in this chapter because gender issues are now being discussed in the chapter
because ethics is also involved in the chapter.
Learning Expectation:
And also to know the ethical issues behind genders in spam mails and
also the ethical issues behind it.
Review:
Well spam mail in my on mind is a set of mail that has been errors in the
sending for example you send an e-mail using yahoo mail or google, mail when it
failed the message will become useless and will be lost in the world wide web of
e-mail so that is the mentality in which people always see mails inside there
spam folders.
Then also talked about in the chapter is the real life scenario about e-mails
because the system obviously cannot handle that much e-mails in a day to
tendency there will always be errors in the e-mail so that is why sometimes e-
mails arrive late or sometimes doesn’t even go to the people whom you send you
e-mail.
What I’ve learned:
I’ve learned the importance of e-mail spamming and the ethical issues
behind it and also what people thinks about e-mail spamming
Integrative Questions:
Amazon: N/A
Well as I can say that plagiarism is very bad because it is like violating he
copyright law for people who created there masterpiece in a long period of time
and there will be just one person who will just steal his/her works
Learning Expectation:
Review:
This review is very essential to many people because in the real world
there are lot of people who plagiaries work every day so with this review I can
give people the knowledge that they need In order to avoid using plagiarism.
Then another advantage is people can give you lots of money because
your work will be famous especially if the content is very good
I learned a lot in this chapter especially the ethics behind plagiarism and
also the advantages and disadvantage in plagiarism. I also gained new
knowledge in copy right infringement and also what and what not to do in
plagiarism.
Integrative Questions:
Book review: Intellectual Property: Legal and moral challenges of online file
sharing
Amazon: N/A
But file sharing can be helpful to, like with open source communities, file
sharing is a essential part in the community because with that programmers can
help fellow programmer in fixing bugs in open source software and also in
handing out different ideas In the online community.
Learning Expectation:
Review:
This chapter basically talks about the legal and moral challenges of online
file sharing, this chapter elaborates about the advantages and the disadvantages
of online file sharing and what can happen to people who are not responsible
enough to share files without any talks anymore.
But with online file sharing people can easily gain access to any bit of
information on the internet market for example in the research area people can
easily research in things that they need for there projects and what are the
missing parts of there project also, what information they need to cope up with
the projects that they do in the future.
Another is online file sharing is an advantage especially in the online
community because people can easily gain access on the information about a
certain topic because topics are well organized and just a mouse click away.
I learned a lot in this chapter especially in the legal and moral challenges
in the file sharing category, and also I learned about the advantages and
disadvantages of online file sharing.
Integrative Questions:
Amazon: N/A
Learning Expectation:
Review:
So as we know about censorship is, there are like limitation criteria like in
the movies or in television it blocks the limitation of the movie and does not let
people see things that are not supposed to be shown on television because it is
against the law to show content that are not PG material more over to porno
movies.
Also the chapter talks about the value and importance of censorship today
especially to the minors that love to watch things or minors that are very curious.
What I’ve learned:
I’ve learned a lot in this chapter especially the value of censorship to the
masses, and in the internet world
Integrative Questions:
Amazon: N/A
Well this quote that I have just created speaks for itself because in this
chapter it talks about the gender agenda in computer ethics clearly talking about
women and there characteristics.
Basically as we know that women are caring by nature and that supports
them in the computer ethics field why is that because if a woman in her right
mind has the knowledge about ethics she will tend to value her ethics and
preserve them because as we know that women are caring by nature and it is
there role as women to value information that has been seen on the internet.
Learning Expectation:
Review:
Well the chapter starts over the history of women because as we know
well that women has lesser rights than us men because women are just being
looked like as mothers of people’s offspring and also women rights are lesser in
the old days.
And also this chapter talks about the capabilities of women back in the
days where there power is lesser and just there characteristic of being caring just
been the point of it all
But the chapter talks about everything about women changed because
now in the 21st century women are being some what equal to men because
women can now compete with men in the intellectual level because experts say
that women are more hardworking than men.
Then this chapter also talks about the poverty and many more things
related to the issue of gender issues in computer ethics.
What I’ve learned:
And also I learned that woman are not just caring but nature but they are
smart as us guys and more hard working.
Integrative Questions:
Amazon: N/A
Well this quote talks about the domino effect of people who are morally
good to people and with that it helps people in being more assertive that they will
follow the morally good person in terms of his/her doing because they will be
enlighten because of the graces that the morally good person is having rather
than the person who is not morally good.
Learning Expectation:
The also to learn about the perspective of the future because as we know
we as people have dreams for the future and with that we want to have a good
future for our future family and our future offspring if we were to have.
Review:
This chapter talks about the future and what will likely to happened in the
future if people will stop being responsible in the future and also ethics becomes
a big player in the future because with people who have proper ethics in life
those are the people whom will be successful in the near future because in little
way ethics can be keys for success.
This chapter also gives al thru out discussion about the ethics because as
we know that ethics comes into play many times in life because this chapter also
talks about the poverty issues of people and also the information systems gap in
world.
But still ethics can help people as clearly elaborated in the chapter
because ethics if people can do there ethics well people will likely to survive
because with ethics people will gain more friends and there jobs will still be
there’s because if people will not follow moral ethics people will just likely
become people with no future and just people with no place in the community
because there pride, soul, dignity, integrative will just be eaten by hell.
What I’ve learned:
I’ve learn a lot in this chapter especially about ethics because as I learned
ethics is very well needed in life because ethics is a key for success and people
should know that.
Integrative Questions:
Amazon: N/A
Quote: “Moral claims lack truth-value and are merely expressive of human
emotions of approval or disapproval”
This quote talks about the moral claims of people and clearly make there
understanding much more broader, and also with the truth0value and the human
emotions, people still needs the approval or disapproval of other people.
Learning Expectation:
Review:
This chapter talks about more clearly about morality because as we know
that ethics really speaks about morality because ethics is need by the society
and more often than that the chapter talks about people in the intercultural level.
This chapter discusses about the different ethics theories and the different
ethics issues being covered in the chapter because as we know the it is an ethics
book so that is why people must know the different theories and different ethical
issues that has be covered in the said chapter.
Plus the different real life scenarios in the chapter is very touching
because with that people can gain the value of ethics more and more because
the examples of the book make the reader feel that they are within reach of the
example.
Then lastly it talks about the pros and the cons of intercultural ethics
based on the title the pros and cons will always be there and also the advantages
and disadvantages of intercultural ethics.
What I’ve learned:
I learned a lot in this chapter especially the value of ethics in the country
and especially in the information and computer ethics area.
I learned the different kind of ethics that people should know in order to be
a moral person and lastly ethics is everywhere.
Integrative Questions:
Amazon: N/A
Well this quote tells us about the big market definitely at the bottom of the
pyramid because every business man who just started his/her business must
accept the fact that he/she will definitely start from the bottom but still the bottom
of the pyramid still has its big player of customers.
Learning Expectation:
Review:
Well first of all the topics in this chapter in the fortune at the bottom of the
pyramid says about the people or the markets at the bottom of the pyramid and
talks about different business strategies in the bottom of the pyramid, and it helps
its reader to gain more knowledge in what to do in the business world.
And also this chapter offers a high variety of strategies to do in the bottom
of the pyramid market, but still gives the enjoyment of reading, plus the chapter
give the proper motivation for future businessmen or even businesswomen, and
gives them tips and tricks in the business world.
Plus this chapter gives readers advices on how will they sell there
products and services to other people give the reader the necessary knowledge
in how make business talks because as we know in every business people
should always start from the bottom,
Because the bottom as said so in the chapter is always the stepping stone
for success.
I learned a lot in this chapter especially in the business area I learned new
knowledge on how people can sell and give out information on there products
and also I learned that the bottom of the pyramid can be the best stepping stone
for a business success.
Integrative Questions:
Amazon: N/A
Well this quote that I just created because I didn’t see any striking
quotations in the said chapter so I created my own quote, so well this quote is
saying sell sell sell because in the minds of a profit based businessman sales the
priority because it is a mentality that why will you open up a business because
you don’t want profit that is just a waste of time.
But now businessmen just think about profit because profit is very much
needed in the business world because without profit and revenue the business
will not be a success.
Learning Expectation:
Review:
Well this chapter talks about the practically of a product and services
because it is telling us reader that if you want to start a new business there
should be practicality like the products and services that is being offered must be
very useful to people.
Because if the products and services is not useful to people chances are
the business will not be a success and with that money will just be wasted and
you will be haunted with the horror of the business being forfeited.
Another thing being talked about in the chapter the issue between
products and services in where which is more successful to sell products or to
sell services but in my own opinion services is the much more successful
business because in service there will be lesser work than in products because
of the inventory delivery rather than in the service field all you new is people just
like in the BPO kind of business.
I learned a lot in this chapter especially in the products and services field
and also I learned that people must be practical in setting up his/her own new
business.
Integrative Questions:
Amazon: N/A
In short people who are risk takers because sometime in life people
should take that risk rather than being stuck to one place to another because risk
sometimes becomes money like if you take the risk in opening a new business in
terrains that have not been ventured and turn out okey then that is a good risk
but if not, try again just never give up
Learning Expectation:
Then to gain new knowledge about the global market for me to know what
and what not to do in the global market.
Review:
Well the main topic of this book really is to hand out knowledge in making
money, in ways that people don’t even think that it is possible now in this chapter
the author is saying that people must try going to new ventures in there business
because to try out new ventures means that there is more risk involved, likely to
happened in every business.
Risk is always a factor in every business so that is why the first two parts
of the book talks about being practical in selling products and services because
that is a stepping stone in a businessman success, a businessman must first be
practical in the product line or the service that he/she offers because if the
products is useless then better go for bankrupts and say that it is a bad way to
waste precious investments.
What I’ve learned:
Integrative Question:
Amazon: N/A
Learning Expectation:
Review:
Well this chapter is all about the ecosystem and how to look at the
ecosystem for wealth creation, and also this chapter talks about how the market
can be caught if the ecosystem of the community will be taken by the
businessman.
And also this chapter talks about the different companies that people set
upped to handle the ecosystem different companies has been made to satisfy the
people of the ecosystem like companies that makes, pig, beef, companies that
produces foods and vegetables and many more.
Then lastly the chapter talks about the pricing of people to satisfy the
peoples budget because as we know people are not all that rich to be able to
afford anything that they want, so that is why it is the job of the company to
satisfy the products and services to people that they are or people will be able to
afford them, because pricing is a critical factor in the business world because if
the pricing is to high tendency is people will not be able to buy there products
and services all the time but if it is low people will be able to buy there products
and service s all of the time.
Integrative Questions:
Amazon: N/A
This quote talks about the corruption that in every business and in every
government always have, as we know that corruption cannot be avoided
corruption is always there even though people or government officials fire or
kicks out the corrupted employee or the official that is corruption other people will
most likely to take there place.
A lesson in this corrupt people will never go away but corruption can
always be lessen because if people have the heart to lessen corruption and just
take small amounts of there kick backs, the company or the government will have
no problems in promoting projects and human resources will be utilitized.
Learning Expectation:
Plus I hope to learn in this chapter the tricks that corrupt people do to get
there kick backs for in the future I know what they are doing.
Review:
To start of with the review I search the internet for the meaning of
corruption and also with the help of wikepedia.org Corruption is essentially
termed as an "impairment of integrity, virtue or moral principle; depravity, decay,
and/or an inducement to wrong by improper or unlawful means, a departure from
the original or from what is pure or correct, and/or an agency or influence that
corrupts, so that is the meaning that I found out in the internet.
1.) Corruption
2.) TGC
3.) Technical side of corruption
4.) Tips and tricks
5.) Corruption governance.
Integrative Questions:
Amazon: N/A
In this quote is just created it because I can’t see any relevant quotes in
the chapter.
Learning Expectation:
Review:
And still business can be successful if the pricing is right and the products
and services is affordable to people in all people classes especially in the C
below level.
Lastly in this chapter it talks about everything from chapter 1 of the bottom
of the pyramid bits and pieces in the chapters are merged in the chapter to give
more and broader meanings to the reader.
What I’ve learned:
Integrative Questions: