You are on page 1of 109

TITLE: The Market at the Bottom of the Pyramid (Chapter 1)

AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-


Eradicating-
Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&
sr=1-1

QUOTATION: Contrary to the popular view, BOP consumers are getting


connected and networked. They are rapidly exploiting the benefits of
information networks.

LEARNING EXPECTATIONS:

- I want to know to what market is portrayed for the bottom of the


pyramid.

- I want to learn how to have a market at the bottom of the pyramid.

- I want to learn the key or strategic key for establishing a market at the
bottom of the pyramid.

REACTION:

I am bothered with the status of the financial crisis in the country, not
only in the Philippines, but also to the different countries over the world
who suffers in great poverty. When I have seen the campaigns to help
those people who live on far less than $2 a day, I have these confusion in
mind and the question of why. Well, I cannot blame myself because I
have different opinion on that side. I think people given chance to offer a
help in any form such as donation is just an abuse in their selves. As I
remember with what we tackle in my earlier subjects, it is good to give but
keep in mind that you are helping wisely.

Upon reading this chapter, I was amazed. It has presented a wiser way
of helping people in need not by giving them donations. As stated in this
chapter, “The purpose of this book is to change that familiar image on
TV.” It is really true because there are different interpretations in any
matters but through explaining and defending an opinion things become
clearer to one’s mind, just like me.

“What is needed is a better approach to help the poor, an approach


that involves partnering with them to innovate and achieve sustainable
win-win scenarios where the poor are actively engaged and, at the same
time, the companies providing products and services to them are
profitable.”

I think it is the best line I have read from business books especially for
establishing goals of a business with incline to the poor. It is really true. In
order to help both parties, the poor and the growth of the companies, it is
best to build programs, services or promos that are really in for them that
will give them chance to experience those certain services which will not
deprive their dignity as a person.

There are three assumptions discuss to understand how establishing a


market for the bottom of the pyramid made possible. It just helps us to
have more ideas on how the market have generated from this great
opinion based on the following assumptions.

1.) The poor cannot participate in the benefits of the globalization


without an active engagement and without access to products
and services that represent global quality standards.

2.) The BOP, as a market, provides a new growth opportunity for the
private sector and a forum for innovations.

3.) BOP markets must become an integral part of the work of the
private sector.

There are still different interesting topics in this chapter such as the
notions that BOP are brand conscious, BOP is connected, BOP consumers
accept advanced technology readily and other stuff that describes the
aspects connected to BOP.

LESSONS LEARNED:

- I learned that BOP is really a market to focus on because most of the


population in any countries belongs in here.

- I have discover that the notion of brand conscious are especially


pertains to the BOP but not to those people who belong in the upper
level of the pyramid.

- I understand now that all of the people are important in any market.

INTEGRATIVE QUESTIONS:

1. What is the effect of the collaboration of poor, civil society


organizations, governments, and large firms?

2. How can the distribution of wealth and the capacity to generate


income in the world be captured?

3. What does urban concentration represents?

4. How can the BOP convert into a consumer market?

5. What are the Three A’s?


TITLE: Products and Services for the BOP (Chapter 2)

AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-


Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1
-1

QUOTATION: The poor as a market are 5 billions strong. This means that solutions
that we develop cannot be based on the same patterns of resource use that
we expect to use in developed countries. Solutions must be sustainable and
ecologically friendly.

LEARNING EXPECTATIONS:

- I want to know more about the BOP.

- I want to know the different products and services for the BOP.

- I want to understand how companies generate their ideas of creating


products and services for consumers that belong in BOP.

REACTION:

Considering the different products and services that are been derived
today it is very difficult to distinguish which is which for those customers
who can avail it according to what category they involved or belonged
to. Different portfolios of products and services have been generated
which sometimes design just for the Western markets. As we all know, the
Western markets are those people who belong in the upper level of the
pyramid.

BOP markets become more emerge with the different possibilities of


replicating the developed country models which result to unsatisfactory
results. The sustainability of the different facilities for operating the
completion of certain products and services in the Western are no longer
existing because of the unaffordable expenses in continuing the
operation of the business especially Western.

In creating a strategy for BOP market as a target, a company must


score there certain programs to a certain criteria which if it scored 7 or
greater than 7 then the program or strategy will surely succeed in
targeting the BOP market.

There are twelve principles of innovation for BOP markets and inputs
from me to express how I understand each principles of innovation:

1.) Price Performance – Mostly market is very careful in choosing certain


products and services which is nowadays applied because of the
financial crisis in which the price is carefully and reasonably for
anything. A certain market wants to assure that whatever they
purchase is worth for their money and become valuable for mostly
BOP market.

2.) Innovation – People do resist changing especially for new system but
the market especially BOP become more optimistic and requires
innovation which is because they want to still be with the technology.
This is the reason why there are people or certain companies who
developed and manufactured products and services with innovative
value added.

3.) Scale of Operations – Target market is dependent on the volume


which becomes a basis for returns on investment. Mostly BOP markets
are poor and small yet there are only few BOP markets that are large
and big enough.

4.) Sustainable Development – The solution that we develop cannot be


based on the same patterns of resources use that we expect to use in
developed countries.

5.) Identifying Functionality – Functionality are required in products and


services in the market especially the BOP market which might be
different from that available in the developed market.

6.) Process Innovation – It is a critical step in making products and


services affordable for the poor. It answers the question how to deliver
which is important than what to deliver.

7.) Deskilling of Work – There is a shortage of talent which means in a


company’s products and services it does not require much of talent,
skills and knowledge before you can use or acquire certain
functionality of certain products and services.

8.) Education of Customers – Innovation in BOP markets requires


significant investments in educating customers on the appropriate use
and the benefits of specific products and services.

9.) Designing for Hostile Infrastructure – Mostly, BOP markets exists in a


hostile infrastructure because the products and services you offer to
market must fit to their environment.

10.) Interfaces – In any aspect today, interface especially design must be


carefully thought through to encourage the BOP market because
interface is the key for the market to embrace your products and
services offered.

11.) Distribution – A way to reach your products and services to market


especially BOP market is a challenged to corporation because there
are different factors why the access on customer or markets have
certain problems encountered.
12.) Challenges the Conventional Wisdom – The success in BOP markets
will break the existing paradigms. In all aspect every success in a
certain goal will affect not only the existing paradigm but also creates
new paradigm.

These twelve principles of innovation for BOP markets can be used in


determining whether a certain program is fit for the BOP markets which
can help corporations or companies to have a strong determination and
guide in constructing a certain strategy for the BOP. It will help all
individuals not only corporation or big company to construct or develop
a strategy for the BOP market.

LESSONS LEARNED:

- I discovered that products and services rendered by the market are


still considered or affected by the levels of the pyramid.

- I learned the twelve principles of innovation for BOP markets.

INTEGRATIVE QUESTIONS:

1. What is the effect of involvement in BOP markets?

2. What are the twelve principles of innovation for BOP markets?

3. What does the new philosophy of innovation for the BOP market requires?

4. What can be an effect of active participation in BOP markets?

5. How is the design of interface important to be considering carefully?


TITLE: BOP: A Global Opportunity (Chapter 3)

AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-


Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1
-1

QUOTATION: The benefits of operating at the BOP, therefore, do not just accrue
in local markets.

LEARNING EXPECTATIONS:

- I want to know the opportunities presented or developed for BOP.

- I want to learn the different ways in determining opportunities especially


for BOP.

- I want to understand how BOP becomes a global opportunity.

REACTION:

In this chapter, it states that because of certain events that yield to


emerging evidence, it formulates or identifies four distinct sources of
opportunity for a large firm which invests time and energy to
comprehend and cater to the BOP market:

1. Some BOP markets are large and attractive as stand-alone entities.

2. Many local innovations can be leveraged across other BOP


markets, creating a global opportunity for local innovations.

3. Some innovations from the BOP markets will find applications in


developed markets.

4. Lessons from the BOP markets can influence the management


practices of global firms.

Large firms have two ways to engage the BOP market which are either
through a traditional approach and developed approach. In the
traditional approach, it is to start from the business model honed in the
developed markets which result in fine-tuning current products and
services and management practices. The developed approach is to start
from a deep understanding of the nature and the requirements of the
BOP and then architect the business models and the management
processes around these requirements.

In BOP market, there is a concept of learning to grow in which through


time the products and services also technologies and the concepts of
systems changes. In many issues, change is constant so in BOP market,
the effect of change is in the growing stage. Comparing the different
curve from time to time, before it is “S” curve which it is a model for the
diffusion of new products and services in the developed countries in the
world. But, now, the “I” curve challenges the status quo and the entire
management process in most large firms is geared for slow growth.

LESSONS LEARNED:

- I learned the four distinct opportunities that the BOP offers to big firms
today.

- I learned the different approach as well as the curve that exist in the
system today.

- I learned the lessons from the BOP markets.

- I learned the three premises in the system.

INTEGRATIVE QUESTIONS:

1. What are the four distinct sources of opportunity for a large firm?

2. What are the two ways in which large firms tend to engage the BOP
market?

3. What is the difference of the “S” curve from the “I” curve?

4. What are the three premises of the system?

5. What are the lessons for MCNs from the BOP markets?
TITLE: The Ecosystem for Wealth Creation (Chapter 4)

AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-


Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1
-1

QUOTATION: A market-based ecosystem is a framework that allows private


sector and social actors to act together and create wealth in a symbiotic
relationship.

LEARNING EXPECTATIONS:

- I want to know the ecosystem for wealth creation.

- I want to learn the different components of an ecosystem.

- I want to understand when an ecosystem is considered for wealth


creation.

REACTION:

In this chapter, it states that in the previous chapter of the BOP there is
a need for building an ecosystem for wealth creation and social
development at the BOP. It shows few attempts to focus on the symbiotic
nature of the relationships between various private sector and social
institutional players which can lead to a rapid development of markets at
the BOP.

The author states that a market-based ecosystem is a framework that


allows private sector and social actors to act together and create
wealth in a symbiotic relationship. It discusses that an ecosystem should
consist of a wide variety of institutions coexisting and complementing
each other; each constituent has a role to play and dependent to each
other. Yet in different countries there are different ecosystems because of
the various components to define an ecosystem.

Ecosystem for developing country are affected by competitive


conditions, availability of new technologies, nature of resource
endowments and educational infrastructure which works differently to
have a developed country such as a country of India, a company does
not have a legal control over the entire ecosystem nor does have direct
influence on all the elements of the system. However, a company
provides the framework, the intellectual direction, and the processes by
which the system is governed and operated.

This chapter illustrates three steps in creating a transaction


governance capacity based on the marketing ecosystem,:
1. Help the poor understand that there is a win-win situation for them
and the firm by respecting contracts.

2. The private sector can reduce the asymmetries in information,


choice, ability to enforce contracts, and social standing.

3. The companies start with understanding the rationale for the


contracting system: how and why it reduces transaction costs and
reduces the cost of capital as well as increases access to capital.

In any development, the goal is to bring as many as possible to enjoy


the benefits of an inclusive market. The impact of the market-based
ecosystem and the role of the nodal company can be very important in
developing the disciplines of the market.

LESSONS LEARNED:

- I learned how they define the ecosystem.

- I learned the four sources of friction on the system.

- I learned the different components of ecosystem.

INTEGRATIVE QUESTIONS:

1. What is an ecosystem?

2. What are the different components of ecosystem?

3. What are the four sources of friction in the system?

4. What are the three bases of assumptions in building governance?

5. What are the three steps in creating a transaction governance capacity


based on marketing ecosystem?
TITLE: Reducing Corruption: Transaction Governance Capacity (Chapter 5)

AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-


Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1
-1

QUOTATION: Transaction governance capacity is about making the entire


process as transparent as possible and consistently enforced.

LEARNING EXPECTATIONS:

- I want to learn the ways in reducing corruption in the market or


ecosystem.

- I want to know if there are different factors that lead an ecosystem into
corruption.

- I want to understand how corruption takes place and when does


corruption considered as a corruption.

REACTION:

Corruption takes place not only in the market, as seen from today’s
government, it is really obvious in the society today, especially in our
country: Philippines. From the previous chapter, the author specifies,
there are certain groups of opportunities from the BOP in which
managers of the big corporation has been convinced yet there are still
lingering doubts about the ability of large firms to operate in markets
such as the BOP. As categorized or emphasized by the author in this
market is the CORRUPTION.

As stated in this chapter, developing countries do not fully recognize


the real costs of corruption and its impact on private sector development
and poverty alleviation because those developed countries did not
understand or observe the corruption which I think there is a notion that if
people do not suffer or experienced certain poverty then they did not
observed or intrigue issue of corruption which means there are no rooms
for questions because all are doing great or well as planned due to
prosperity.

In this chapter, it identifies four basic assumptions that have been at


the core of the thinking on poverty reduction and developmental
assistance during the past 30 years:

1. Poor countries are poor because they lack resources.

2. Aid from rich countries to the governments of the poor countries for
specific projects would reduce poverty.
3. Investments in education and health care might have the largest
multipliers per dollar of investment in economic development.

4. The record of aid and loans from the various donor countries and
the World Bank, International Monetary Fund, and other institutions
is at best mixed.

Based on the different scenarios from different countries, conclusions


have been derived which are the following:

1. All forms of foreign investment in poor countries are but a fraction


of the potential for capital that is trapped in these countries.

2. In the absence of enforceable contract law, local commerce is


conducted by a vibrant extra legal or informal sector.

3. There are contract enforcement systems that are local.

This chapter identifies fourfold of specifications for TGC which is about


the creating transparency and eliminating uncertainly and risk in
commercial transactions. There are the four specifications:

1. A system of laws that allows for ownership and transfer of property.

2. A process for changing the laws governing property rights that is


clear and unambiguous.

3. As societies become more complex, a system of regulations that


accommodates complex transactions.

4. Institutions that allows the laws to be implemented fairly, in a timely


fashion and with transparency.

I was stricken in this chapter, the corruption is bound to increase in the


near time, peaking and then steadily declining to near-zero levels. Once
the system is fully operational, it is difficult to change the data in the
system. All entries will leave a trail, indicating who as well as when. This
level of scrutiny and openness will reduce the opportunities for corruption.
I just noticed that there are certain changes in the world today that are
bounded of corruption.

LESSONS LEARNED:

- I learned how they define the ecosystem.

- I learned the four sources of friction on the system.

- I learned the different components of ecosystem.


INTEGRATIVE QUESTIONS:

1. What is an ecosystem?

2. What are the different components of ecosystem?

3. What are the four sources of friction in the system?

4. What are the three bases of assumptions in building governance?

5. What are the three steps in creating a transaction governance capacity


based on marketing ecosystem?
TITLE: Development as Social Transaction (Chapter 6)

AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-


Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1
-1

QUOTATION: It is the growing evidence of opportunity, role models and real


signals of change that allow people to change their aspirations.

LEARNING EXPECTATIONS:

- I want to know why development serves as a social transformation.

- I want to understand how to gain access to knowledge.

- I want to learn why women are critical for development.

- I want to know why it is necessary to break down barriers to


communication.

REACTION:

When the poor at the Bop treated as consumers, they can reap the
benefits of respect, choice and self esteem and have an opportunity to
climb out of the poverty trap. The capabilities also to solve also to solve
the perennial problem of poverty through profitable business at the BOP
are now available to most nations as illustrated in this chapter however
converting the poor into a market will require innovation.

There are three transitions that stated in this chapter, first, we


demonstrated that the BOP the poor can be a market. Second, once we
accept the BP markets as a market, the only way to serve that market is to
innovate. The BOP demands a range of innovations in products and
services, business models, and management processes. Third, these
innovations must be accompanied by increased TGC, making the
government accountable to the citizens’ ad making it accessible and
transparent.

As Bop consumers get an opportunity to participate in a benefit from


the choices of products and services made available through market
mechanisms, the accompanying social and economic transformation
can be very rapid. The reason for this is that BOP consumers are very
entrepreneurial and can easily imagine ways in which they can use their
newly found access to information, choice and infrastructure.

Contrary to the popular belief, BOP consumers are always upgrading


from their existing condition. BOP consumer the newly found choice in an
upgrade from their current state affairs. For the BOP consumers, gaining
access to modern technology and good products designed their needs in
mind enables them to take a huge step in improving their quality of life.

One of the common problems for those at the BOP is that they have
no 'identity”. Often they are the fringe of society and do not have a “legal
identity” including voter registration, drivers license or birth certificate. the
instruments of legal identity that we take for granted---be it a passport or
a Social Security Number are denied to them. For all purposes they do not
exist as legal entities. Because they do not have legal existence, they
cannot be the beneficiaries of a modern society. The importance of legal
identity cannot be underestimated. Without it, BOP consumers cannot
access we take for granted.

The social transformation that is taking place in markets where the


public and the private sectors have been involved at the BOP is quite
impressive. BOP consumers have constantly surprised the elite with their
ability to adapt and their resilience.

More important social transformation is about the number of people


who believe that they can aspire to middle class lifestyle. It is the growing
evidence of opportunity, role models, and real signals of change that
allow people to change their aspirations.

LESSONS LEARNED:

- The emancipation of women is an important part of building markets at


BOP. Empowered, organized, networked, and active women are
changing the social fabric of society.

- We need to make sure that no organization abuses its power and


influence, be it corrupt governments or large firms.

INTEGRATIVE QUESTIONS:

1. How will these changes impact life of BOP?

2. Do we need check and balance for involvement of the private sector in


BOP markets can have such significant impact on social transformation?

3. What is really Social Transformation?

4. If we follow the approach what will be the impact will it have on the BOP
consumer?

5. How will the lives of Bop consumers change if they will follow the
approach?
TITLE: Ethics and the Information Revolution (Chapter 1.1)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Computing technologies is the most powerful and most flexible


technology ever devised. For this reason, computing is changing
everything – where and how we work, where and how we learn, shop,
eat, vote, receive medical care, spend free time, make war, make
friends, make love.

LEARNING EXPECTATIONS:

- I want to know how ethics is applied to the information revolution.

- I want to learn the different factors that affect ethics and information
revolution.

- I want to understand the importance of ethics to information.

REACTION:

Computing technology is the most powerful and most flexible


technology ever devised. In this statement I argue with what the author
says “Computing is changing every time – where and how we work,
where and how we learn, shop, eat, vote, receive medical care, spend
free time, make war, make friends and make love.” I argue with that
statement because computer is made by man which means easy to
destroy. I usually work in my own place. I don’t believe people telling how
to work, how much more to a computer made by men who commit
mistakes. I learn what I know today from school, from people around me
and in the environment. Computer cannot tell me what to do, it will
become just as an aid but not to command or direct me.

Access to cyberspace is much easier than to the world business and


management techniques. I agree to that because of information
technology is like a highway with no end, yes in the developing countries
can truly participate in cyber space and look forward to new
opportunities offered by global networks. The network constitutes the only
reason of freedom in many non-democratic countries.

In 1940 and 1950, the American developed computer for survival from
any attack by the enemy during that time. Adolf Hitler is very interested
about weapon for mass production but because computer was not yet
developed, their first missile testing failed.

By 1960 it is considered the year of rock and roll and revolution many
countries experienced coup d’ tat especially in South America with Bolivia
on top of the list. Computer is also like rock and roll, it’s rocking and rolling,
many people die because of computer. It is a revolution because of
changing the lifestyle of people such as the clothing.

The late 70’s is the prophecy from the Bible that was foretold in the
book of Revelation thousand years ago happen when the beast
developed the MX missile. The Chapter 13:1 says “I stood upon the sand
of the sea, and son of the beast rise up out of the sea having seven heads
and ten horns, and upon his horns ten crowns, and upon his heads the
name of blasphemy.” That was the first beast who gave his power to the
second beast that made the MX missiles.

1980, Computer was use in war. Computer change the people from
work. The engineers, bookkeeper, computer replace thousand of work all
over the world. In 1990, computer was use by greediest people on earth,
which make the world poorer and poorer.

LESSONS LEARNED:

- I learned computing technology has different opinions in each


individual nowadays.

- I learned that even though computers are devised, it does not mean
that they can substitute people.

- I learned and be familiar with the different important events in every


milestone of the information revolution.

INTEGRATIVE QUESTIONS:

1. What is computing technology?

2. What is the effect of Information Computing Technology?

3. Why are computers defined as logically malleable?

4. What are the topics in computer ethics?

5. What are the different global issues?


TITLE: Ethics On-Line (Chapter 1.2)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Computer technology did not come into being in a vacuum. It


was created and shaped in response to pushes and pulls in our way of life,
our culture, politics, and social institutions.

LEARNING EXPECTATIONS:

- I want to know the different issues of ethics online.

- I want to learn any difference in ethics online and offline.

- I want to understand how those issues came up and occur online and
offline.

- I want to gather thoughts on the different issues in the ethical side of


computer.

REACTION:

Today, because of the different scenarios happening to us, there are


visions of a new form of democracy emerging online as political alliances
are formed and social movements gather force without mediation from
mass media. There are visions of the current evolving technology bringing
into our homes the ultimate in the entertainment choice together with the
efficiency of being able to carry on all of our daily interactions with
keystrokes and screens.

The issues and problems in electronic networks are the problems of the
world around them. The problems have to do with who we are and what
we do offline. The problems are the problems of modern, highly
industrialized, democratic societies.

The author simply identifies three special features of online


communication. Communication in computer networks has several
characteristics making it difficult from face-to-face communication and
other forms of technology-mediated communication. These are the
following special characteristics of communications in networks:

1. Scope – Individuals communicating in electronic networks have a


much broader reach than they do offline. A message sent by one
individual can reach vast numbers of individuals around the world,
and may do so very quickly. The combination of factors makes the
scope special.
2. Anonymity- In networks, individuals can communicate without
identity, using pseudonyms and taking on different personas.
Someone may grab someone else’s words and alter them or may
grab someone else’s identity and distribute words as if they were
the words of the other. It creates problems of integrity which
disconnects the words from the person.

3. Reproducibility – Information could be reproduced online without


loss of value and in such a way that the originator or holder of the
information would not notice. There is no loss of value in the process
of reproduction.

These three special features of communication in networks lead, either


directly or indirectly, to problems online. The breadth of scope means that
individuals can do a wide variety of things to one another online that
would be impossible or extremely difficult to do offline.

Anonymity leads to serious problems for the integrity of information


and communication. Reproducibility threatens the integrity of information,
and it means that acts of communication or information have endurance.
Anonymity is problematic in networks and seems to be so for at least three
related reasons:

1. Offline as well as online, anonymity is problematic because it


makes the process of identifying and catching criminals more
difficult.

2. Anonymity is related directly to one of its advantages, it creates a


shroud under which people are not afraid to say what they think.

3. Anonymity contributes to the lack of integrity of online information.

Regarding these three problems stated above, anonymity contributes


to a general situation of diminished trust. One cannot put one’s trust in
information and individuals online for a variety of reasons. We can have a
wide variety of forms of online communication with a high level of trust if
the rules are known or explained to individuals before they enter an
environment.

LESSONS LEARNED:

- I learned the essence of ethics online which is very important to


prevent certain issues especially ethically.

- I learned the different problems that contribute to a general situation


of diminishing trust.

- I learned the three reasons on why anonymity is problematic in


networks.
INTEGRATIVE QUESTIONS:

1. What is anonymity?

2. What is reproducibility?

3. What are the special characteristics of communication in networks?

4. What is diminished trust?

5. What are the effects of anonymity?


TITLE: Reason, Relativity, and Responsibility in Computer Ethics (Chapter 1.3)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: We are entering a generation marked by globalization and


ubiquitous computing. The second generation of computer ethics,
therefore, must be an era of ‘global information ethics’. The stakes are
much higher, and consequently considerations and applications of
Information Ethics must be broader, more profound and above all
effective in helping to realize a democratic and empowering technology
rather than an enslaving or deliberating one.

LEARNING EXPECTATIONS:

- I want to know what is reason, relativity, and responsibility of computer


ethics.

- I want to know what logical malleability is.

- I want to learn about Informational Enrichment.

REACTION:

As computing becomes more prevalent, computer ethics becomes


more difficult and more important. Communication and actions at a
distance have never been easier. We are definitely in a computer
revolution. We are beyond the introduction stage of the revolution in
which computers are curiosities of limited power used only by a few. Now
entire populations of developed countries are in the permeation stage of
the revolution in which computers are rapidly moving to every aspect of
daily life.

Almost everyone would agree that computing is having a significant


impact in the world and that ethical issues about applications of this
surging technology should be raised. Moor has stated two positions which
he argues. Both positions are popular and both of them mislead us about
the real nature of computer ethics and undercut potential for progress in
the field.

According to the Routine Ethics position stated problems in computing


are regarded as no different from ethical problems in any field. We apply
established customs, laws, and norms and assess the situations
straightforwardly. The second view is usually the “Cultural Relativism” in
which it states local customers and laws determine what is right and
wrong. Because computing technology crosses cultural boundaries, the
problems of computer ethics are intractable.
Routine Ethics makes computer ethics trivial and Cultural Relativism
makes it impossible. Both the views of Routine Ethics and Cultural
Relativism are incorporated particularly when used to characterize
computer ethics. The problems of computer ethics are special and exert
pressure on our understanding.

Computers are logically malleable. They can be manipulated to do


any activity that can be characterized in terms of inputs, outputs, and
connecting logical operations. A computer’s performance can be
changed through alterations in its program. A computer may represent
anything one chooses, from the sales of a stock market to the trajectory of
a spacecraft.

Informational enrichment can also affect ethical and legal practices


and concepts. Once data is entered into a computer it can be sorted,
searched, and accessed in extraordinarily easy ways that paper files
cannot be. The activity of storing and retrieving information has been
enhanced to the extent that all of us now have a legitimate basis for
concern about the improper use and release of personal information
through computers.

Moor defines computer ethics having two parts. The first part is the
analysis of the nature and social impact of computer technology. The
second part is the corresponding formulation and justification of policies
for the ethical use of such technology. They will continue to be applied in
unpredictable and novel ways generating numerous policy vacuums for
the foreseeable future.

LESSONS LEARNED:

- The process of informational enrichment is gradual and is more


manifest in some activities than in others.

- Money may come to be conceived as an elaborate computable


function among the people.

INTEGRATIVE QUESTIONS:

1. What are the Core Values?

2. What are Responsibility, Resolution, and Residue?

3. What are the Reasons within Relative Frameworks?

4. What is the Special Nature of Computer Ethics?

5. What are the Responsibilities in Computer Ethics?


TITLE: Disclosive Computer Ethics (Chapter 1.4)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: We are entering a generation marked by globalization and


ubiquitous computing. The second generation of computer ethics,
therefore, must be an era of ‘global information ethics’. The stakes are
much higher, and consequently considerations and applications of
Information Ethics must be broader, more profound and above all
effective in helping to realize a democratic and empowering technology
rather than an enslaving or deliberating one.

LEARNING EXPECTATIONS:

- I want to know the Key Values as Departure Points for Analysis.

- I want to understand the Limitations of Mainstream Computer Ethics.

- I want to learn about the Need for Multi-Level Interdisciplinary


Research.

REACTION:

As an introduction, this section defines disclosive computer ethics as a


concerned with the moral deciphering of embedded values and norms in
computer systems, applications, and practices. Mainstream computer
ethics are approaches that follow what I will call the standard model of
applied ethics.

Brey argue with the mainstream computer ethics takes as its point of
departure a particular model of applied ethics that may be called the
standard model because it is used in the vast majority of work in applied
ethics. Research within this model usually proceeds in three steps:

1. An individual or collective practice is outlined that has been the


topic of moral controversy.

2. An attempt is usually made to clarify and situate the practice


through conceptual analysis and fact-finding.

In this section, the author identifies three features of mainstream


computer ethics which are particularly noteworthy.

- Mainstream computer ethics focuses on existing moral controversies.


Its focus is on issues that are recognized by many as being morally
problematic.
- Mainstream computer ethics focuses on its practices. It aims to
evaluate and devise policies for these practices.

- Mainstream computer ethics focuses usually in is on the use of


computer technology.

Moor explains computer ethics, as discussed in this section, that it is a


typical problem in computer ethics arises because there is a policy
vacuum about how computer technology should be used. Mainstream
computer ethics limits itself to the analysis of morally controversial
practices for which a policy vacuum currently exist. Computer related
practices may be morally opaque because they are unknown or they
have a false appearance of moral neutrality. Moral nontransparency may
arise is when a practice is familiar in its basic form but is not recognized as
having the moral implications that it in fact has.

Technologies are capable of coercing individuals to behave in certain


ways which may provide opportunities and may provide opportunities
and constraints, may affect cultural belief system and may require certain
background conditions for them to function properly.

Disclosive computer ethics constitutes a much needed approach in


computer ethics that deviates from traditional approaches in applied
ethics. It should preferably not be theory-driven, should be multi-level and
interdisciplinary, and should focus on four key values: justice, autonomy,
democracy, and privacy.

LESSONS LEARNED:

- Many values and norms are nonmoral, including values like efficiency
and profit and norms that prescribe the correct usage of words or the
right kind of batteries to use in any appliance.

- Freedom rights protect goods that are fundamental in carrying out


one’s own life plan.

- The notion of justice is usually understood as implying that individuals


should not be advantage or disadvantage unfairly or undeservedly.

INTEGRATIVE QUESTIONS:

1. What is justice?

2. What is Autonomy?

3. What is Democracy?

4. What is Privacy?
5. What is Disclosive Computer Ethics?
TITLE: Gender and Computer Ethics (Chapter 1.5)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: We need to begin the process of exploring the alternative ethics


that feminism can offer ethics.

LEARNING EXPECTATIONS:

- I want to know the relation of Gender and Computer Ethics.

- I want to understand about the Gender and Computer Ethics: Barriers


and Pipeline

- I want to know Gender and Computer Ethics: Men’s and Women’s


Moral Decision.

REACTION:

Gender has been somewhat neglected in computer ethics writing to


date. There is small body of work which takes seriously the point of view
that gender has some bearing on computer ethics problems. In this paper
characterize two strands of writing on gender and computer ethics. The
first focuses on problem of women’s access to computer technology; the
second concentrates on whether there are differences between men
and women’s ethical decision-making in relation to information and
computing technologies.

Computer Ethics research must always maintain a balance between


empirical research and theory, gender and computer ethics research is
long overdue for more substantial theorizing.

Adam explores the two main strands of current research in gender and
computer ethics. The first strand can be viewed as a spillover from
information systems and computing research on barriers and “pipelines”,
which tends to see the gender and ICT problem as one of women’s
access to ICTs and their continuing low representation in computing all
the way through the educational process through to the world of work.

The other strands of research on gender and computer ethics focuses


on concerns more central to computer ethics as a whole, namely the
question of whether there are detectable differences between men’s
and women’s ethical decision making relation to computer ethics.

The author describes a number of empirical studies of gender and


business ethics and gender and computer ethics. Aspects of these studies
and argue that these aspects are problematic. These are the different
aspects presented:

1. Student Population

In every one of the studies detailed before, a student


population was surveyed. We are unable to resist the temptation to
utilize that most captive of audiences which are the students.

2. Quantitative vs. Qualitative Research Monitoring

There are a number of problems with such an approach.


Respondents are not being asked to choose between
categories that are anything like neutral. It is naturally
tempting to cast oneself as more moral in the questionnaire
than one might be in real life.

In performing a quantitative analysis of qualitative elements, the


studies described above appear to be falling prey to the common
assumption prevalent in computing that has been criticized elsewhere.
Feminists has two major roles, according to Adam, which are to challenge
the traditional ethical canon and to develop theoretical ideas derived
from the challenge to mainstream ethics to develop a new ethics with
which to make normative judgments on ethical problems from a wide
range of domains.

LESSONS LEARNED:

- Theorist of Feminist ethics rest on the hypothesis that women’s moral


decision making is different from men’s important ways we need to
understand the implications of this computer ethics.

- Categorical claims that gender either definitely does or definitely does


not make a material difference to moral reasoning relating to the use
of computers somehow misses the point.

INTEGRATIVE QUESTIONS:

1. What is the relation of Gender to Computer Ethics?

2. What is Gender and Computer Ethics: Barriers and Pipeline?

3. What is Gender and Computer Ethics: Men’s and Women’s Moral


Decision?

4. What Critique about the Gender and Computer Ethics Studies?

5. What is Plea for Feminist Ethics?


TITLE: Is the Global Information Infrastructure a Democratic Technology?
(Chapter 1.6)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: At the root of all definitions of democracy, however refined and


complex, lies the idea of popular power, of a situation in which power,
and perhaps authority too, rests with the people. That power or authority is
usually thought of as being political, and it often therefore takes the form
of an idea of popular sovereignty – the people as the ultimate political
authority.

LEARNING EXPECTATIONS:

- I want to know relation of Technology and Values.

- I want to know Values Embedded in Technologies.

- I want to know Values embedded in the global information


Infrastructure.

- I want to know Democracy as Starting Place: Power and Insularity.

- I want to know Joint Deliberation.

REACTION:

The global information infrastructure is often claimed to be a


democratic technology. It is said to create electronic democracy, to
facilitate or enhance democratic processes. Many scholars believed that
technologies did not embody values, and emphasized that values come
into play.

Technology is value neutral rested in part on the alliance between


science and technology, with several ideas about science shaping ideas
about technology. Two tenets now form the foundation of science and
technology studies: that technology shapes social patterns, and that
technology is shaped by its social context.

The social encompasses values. Values are one aspect of the social.
We need to understand more concretely what it could mean to say that
a technology is value-laden or that values are embedded in
technologies.

Winner addressed this matter head on in his famous article, “Do


Artifacts Have Politics?” He distinguishes two reviews. The first is the view
that values are inherent to technology. In contrast, Winner identifies a
second view according to which “a given kind of technology is strongly
compatible with, but does not strictly require, social and political
relationships of a particular stripe.”

He claims that (1) technologies embody values insofar as they have


properties that are linked to social relationships, in particular relationships
involving power and authority; and, (2) technologies may do this in one of
two ways, either by having intractable properties that require particular
types of social relationships and authority, by having flexible properties
compatible with diverse patterns of social organization and authority.

In terms of democracy, a technology may have intractable properties


that require democratic patterns of authority; intractable properties that
require non democratic patterns of authority or flexible properties that are
compatible with either pattern of authority.

The idea of democracy is not merely the idea of individuals’ casting


votes and thereby expressing their desires. Popular sovereignty has meant
the populous getting together as a group or in subgroups for debate and
discussion of issues they face jointly.

LESSONS LEARNED:

- In this chapter, I learned the Moral/Metaphysical Meaning of


Embedded Values.

- I understand about the Support Meaning of Embedded Values and


the Material Meaning of the Embedded Values, as well as the
Expressive Meaning of Embedded Values.

- I learned the power of many and joint deliberation

INTEGRATIVE QUESTIONS:

1. What is GII?

2. What is Democracy?

3. What does it mean to say that a technology carries a value?

4. Is the Global Information infrastructure a democratic technology?

5. What then does it mean to say that values are embedded in


technology?
TITLE: Applying Ethical and Moral Concepts and Theories to IT Contests: Some
Key Problems and Challenges (Chapter 1.7)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The case, mentioned in this chapter, that such a rule will give rise
to gliding scales are so hard to separate by observable criteria that if its
better to forbid some cases that perhaps are not really unethical in order
to prevent the rule from being gradually emptied altogether.

LEARNING EXPECTATIONS:

- I want to know what Connecting Ethics is.

- I want to know untangling Terminological Confusions.

- I want to identify the different Role of Experts.

- I want to understand who are the Experts stated in this chapter.

REACTION:

In this section, it asked and challenged us, if we want to apply ethical


and moral concepts and theories to IT countries, three conditions are to
be met. These are the three conditions that must be met:

1. We must know to what kind of questions such concepts and


theories can be applied, and to what kind of questions such
concepts and theories can be applied and to what they cannot.

2. We must know the limitations of specific concepts and theories.

3. We must have sufficiently detailed knowledge of the domain to


which we want to apply them.

Some remarks are made on the demarcation of the nature of the


notion of computer ethics. It seems to have become a trend to employ
the term “computer ethics for almost anything that used to be called
social issues in computing.

The role of social context which is in more analytical approaches to


ethics have difficulty in handling this social context, whereas narrative
approaches through more sensitive to context have difficulty in providing
guidance when new technologies are concerned.

Birrer draws attention to the very special problems that are posed by
the role of expert advisers. The protocol for joint problem solving process
by expert and client has to be explored in much more detail than is
usually done. There are good reasons to distinguish between ethics in a
narrow sense and a broader category and it is not accidental that many
classical textbooks on ethics only deal with choices by individuals.

The case, mentioned in this chapter, that such a rule will give rise to
gliding scales are so hard to separate by observable criteria that if its
better to forbid some cases that perhaps are not really unethical in order
to prevent the rule from being gradually emptied altogether.

Many ethicists find this abhorrent; they tend to perceive it as an


infringement on the purity of ethical discourse. There has been a revival of
virtue ethics. It considers the search for analytical rules as fruitless and turns
to narratives and virtues as the place where ethics resides.

In modern society, chains between actions and consequences have


become so complicated that they do not allow a direct and simple view
on decision making. Responsibilities inside the institutions are often defined
in an untransparent way. This untransparency leads to all kinds of
subliminal enticement.

Native technological determinism is persuasive, for it makes the picture


a lot simpler. But it is also highly undesirable, since it is a source of self-
fulfilling and self-destroying prophecies. There are strong reasons to
believe that the effect of these theories is no other than reinforcing
already existing socio-political tendencies that drive in exactly the
opposite direction.

LESSONS LEARNED:

- An atomization expert advises on changes of the organizational


practice in which the expert generally has not actually worked herself.

- This dominance of technical knowledge combined with economic


imperatives that drive innovation has led some to believe that
technology is something autonomous.

INTEGRATIVE QUESTIONS:

1. What is Computer Ethics?

2. What is the Role of Experts?

3. What is Connecting Ethics?

4. What is Social Context?

5. What is Demarcation of Computer Ethics?


TITLE: Just Consequentialism and Computing (Chapter 1.8)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Policies are rules of conduct ranging from formal laws to


informal, implicit guidelines for action. Policies recommend kinds of
actions that are sometimes contingent upon different situations.

LEARNING EXPECTATIONS:

- I want to know what Just Consequentialism is.

- I want to understand what is computing based on this chapter.

- I want to identify what is Consequentialism Constrained by Justice.

- I want to identify the Good as the Enemy of the Just.

REACTION:

Computer and information ethics need ethical theories which


coherently unify deontological and consequentialist aspects of ethical
analysis. It makes just consequentialism a practical and theoretically
sound approach to ethical problems of computer and information ethics.

The malleability of computers allows them to be used in novel and


unexpected ways, ways for which we frequently do not have formulated
policies for controlling their use. Policies are rules of conduct ranging from
formal laws to informal, implicit guidelines for action. Policies recommend
kinds of actions that are sometimes contingent upon different situations.

Viewing issues in the ethics of computing in terms of policies is


important. Policies have the right level of generality to consider in
assessing the morality of conduct. We want our policies for computing to
be ethical but what should we look for when constructing ethical
computing policies. Applied ethicists find themselves immersed in ad hoc
analyses of ethical problems and selecting solution from an inconsistent
pile of principles.

The ethical evaluation of a given policy requires the evolution of the


consequences of that policy and often the consequences of the policy
compared with the consequences of other possible policies. Among other
objections, consequentialism seems to be insensitive to issue of justice.

When considering consequences we evaluate the benefits and harms.


Human beings have a common nature. Humans are not necessarily
concerned about the lives, happiness and autonomy of others but they
are concerned on their own. To be ethical one must not inflict unjustified
harm on others.

The fact that humans value and disvalue the same kind of things
suggests that there may be common standards by which humans of
different cultures can evaluate actions and policies.

The combined notions of human life, happiness and autonomy may


not be far from what Aristotle meant be human flourishing. We seek
computing polices that at least protect, if not promote, which is human
flourishing. Justice requires an impartially toward the kinds of policies we
allow. It is unjust for someone to use a kind of policy that he would not
allow others to use.

This chapter encourages us to develop computing policies in such a


way that they are above all just. It may be tempting in some situations to
focus on strikingly good consequences of a policy while ignoring injustice.
We want good computing policies that promote human flourishing but
only as long as the policies themselves remain just. Unjust policies will in the
long run undermine the benefits of these polices no matter how good
they are.

LESSONS LEARNED:

- Humans are not necessarily concerned about the lives, happiness and
autonomy of others, but they are concerned about their own.

- When humans are using computer technology to harm other humans,


there is a burden of justification on those doing the harming.

- When evaluating policies for computing, we need to evaluate the


consequences of the proposed policies.

INTEGRATIVE QUESTIONS:

1. What is Just Consequentialism?

2. What is computing?

3. What is Consequentialism constrained by justice?

4. What are the uncharted waters?

5. What are the combined notions of human life?


TITLE: The Internet as Public Space: Concepts, Issues and Implications in Public
Policy (Chapter 2.1)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Policies are rules of conduct ranging from formal laws to


informal, implicit guidelines for action. Policies recommend kinds of
actions that are sometimes contingent upon different situations.

LEARNING EXPECTATIONS:

- I want to know the reason why internet is more than Multi-Media

- I want to know the Digital Characteristics of a Public space.

- I want to identify the uses of Internet as public space: opportunities


and Barriers.

- I want to be familiar with the different issues on it.

- I want to distinguish on how to consider a place as a public space.

REACTION:

The internet has long been identified as information agora which


serves as a public safety for citizen. It is being shaped by two seemingly
contradictory characteristics: personal and ubiquitous. Cyberspace
enables the citizenry to find new ways to interact economically, politically
and socially. The nature of ubiquity imposes on a variety of individual or
organization rights.

In this section, the goal of Camp and Chien is two fold. It is to help
clarify concepts, old and emerging, and to bring up important issues
involved. And lastly, it is to consider how regulating the Internet as public
space sheds light on public policies of the future regarding Internet
governance.

Chien and Camp presented three issues that must be considered


when regulating electronic spaces which are simultaneously, permeability
and exclusivity. Simultaneously refers to the ability of a person to be two
places at once at work and at a train station. Permeability is the ability of
barriers between spatial, organizational or traditional barriers to be made
less powerful or effective with the adaptation of information technology.
Exclusivity is the nature of one space, perception or activity to prevent
others.
To complete the goal, they describe what the Internet is not which is a
new entrant into media type’s paradigm. The failure of the media
regulatory metaphor has lead to a spatial metaphor. They address the
fundamental policy issues that result from treating the Internet as public
space. They close with the implications with respect to public policy that
are crucial to the continuing development of the Internet as a valuable
viable public space.

Camp and Chien claim a place in it and enjoy the rights associated
with the space. Each of these spaces has implicit, physical definitions of
permeability or exclusivity. The core that must be reconciled is the
relationship of one space to others. The experience of electronic spaces
can be simultaneous. These are the different characteristics presented in
the digital characteristics of a public space:

1. Public and Private – The Internet that connects people, machines


and information resources is at once public and private. This is the
most salient characteristics of the Internet.

2. Global vs Local – An Internet space is globally interconnected, as


by definition, however provides richness and extends it usefulness.

3. Trans-lingual and cross-reference – Surfing the net is like walking in


the streets of a country. Hardly anything you see or hear that is
interesting or relevant is rendered only in English.

4. Connections to the non-public – An Internet space may be


connected to spaces that are of a proprietary nature.

5. Control and/vs Freedom – It is an external issue of governance


which describes above makes it even harder to reach public
consensus in this weird time.

The spatial model would alter perceptions of public policy problems in


comparison to the media type’s perspective. They describe how the
differences simultaneity, permeability and exclusivity between virtual and
real spaces affect governance.

1. Governance of Internet Use – Issues in Internet governance include


security, protection of data and intellectual property rights,
reliability, trust, standards and global power interdependence.
Issues of privacy encryption can be more easily distinguished with a
spatial model than a media model.

2. Impact on Social Capital and Social Leadership – The Internet


enables the formation of social capital which refers to the features
of social organization which facilitates technology innovation.
3. Impact on Social Well-Being – The traditional concept of Universal
Access needs a new definition. The disputes over what is a digital
dial-tone and the definition of broadband on the Internet have
distracted policy makers from the core issues.

The spatial metaphor will help to promote and coordinate work in


standards, rules of governance and ethics of Internet use speech are
judged offline by time, space and content. A regulatory regime that is too
extreme may result in employees limiting employers to private areas on
the Internet.

LESSONS LEARNED:

- I understand the Impact on social capital and society leadership of


internet with respect to public space.

- I learned the different characteristics presented in the digital


characteristics of a public space:

INTEGRATIVE QUESTIONS:

1. What is the impact of public policy of social well-being?

2. What is the impact of public policy of social capital and society


leadership?

3. Which are the establishments that use internet as a public space?

4. What are the digital characteristics of a public space?

5. What is Internet?
TITLE: The Laws on Cyberspace (Chapter 2.2)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Cyberspace is regulated by laws but not just by law. The code
of cyberspace is one of these laws.

LEARNING EXPECTATIONS:

- I want to know what the Laws in Cyberspace are.

- I want to understand what Cyber-libertarian is.

- I want to know the difference between market norms and social


norms.

- I want to know what Laws, Norms, Code and Markets relations are.

REACTION:

Behavior in the real world is regulated by four sorts of constraints. Law is


just one of those four constraints. Law regulates by sanctions imposed ex
post. Social norms are second. They also regulate. Social norms direct and
constrain my behavior in a far wider array of contexts than any law. The
market is a third constraint. It regulates by price. Through the derived
price, the market sets my opportunities and through this range of
opportunities, it regulates. There is the constraint of architecture which it is
the ability to know what is happening on the other side of the room. That
there is no access-ramp to library constraints that access of one bound to
wheel chair.

Behavior in cyberspace, according to this chapter, is regulated by four


sorts of constraints. Law is just one of those constraints, there is law just now
in cyberspace such as copyright law, or defamation law, or sexual
harassment law.

Norms in cyberspace are rules that govern behavior and expose


individuals to sanction from others. They too function in cyberspace as
norms function in real space, threatening punishments ex post by a
community. The market constraints in cyberspace like in a real space.
Change in price of access is the constraint on access differs.

The most significant constraints is the code or the architecture which is


composed of the software and hardware that constituents cyberspace as
it is, the sets of protocols, the set of rules, implemented or codified, in the
software of cyberspace itself which determine how people interact, or
exist, in this space.
Cyberspace is different. The default in cyberspace is anonymity. It is
practically impossible for the laws and norms to apply in cyberspace. One
has to know that it is a kid one is dealing with. But the architecture of the
space simply doesn’t provide this information. The important point is to see
the difference and to identify its source.

The problem with all this is that the net has no nature. There is no single
architecture that is essential to the net’s design. But nothing requires that
these features, or protocols, always continue the net as it always will be.
We celebrate the “inherent” freedom of the net; the architecture of the
net is changing from under us. The architecture is shifting from
architecture of freedom to architecture of control. It is shifting already
without government’s intervention, through government is quickly coming
to see just how it might intervene to speed it up.

Cyberspace is regulated by laws but not just by law. The code of


cyberspace is one of these laws. We must come to see how this code is
an emerging sovereign and that we must develop against this sovereign
the limits that we must develop against this sovereign the limits that we
have developed.

LESSONS LEARNED:

- Cyberspace is regulated by laws but not just law. The code of


cyberspace is one of these laws.

- Sovereign will always say real space as well as cyberspace that limits
and infancies bugs are not necessary.

- Cyberspace is different.

- Code and Market and Norms and law together regulate in


cyberspace as architecture and market and norms and law regulate
in real space

INTEGRATIVE QUESTIONS:

1. What are the laws of “cyberspace”.

2. What is meant by the word “cyberspace”?

3. What factors all together generates the law of cyberspace?

4. What are the real constraints?

5. Is cyberspace really different?


TITLE: Of Black Holes and Decentralized Law-Making in Cyberspace (Chapter
2.3)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The protocols of global network, like the neutral languages they
so closely resemble, emerged from a process that was as it core
unplanned and undirected.

LEARNING EXPECTATIONS:

- I want to understand what Block Holes are.

- I want to know Decentralized Lawmaking in cyberspace.

- I want to understand what RBL is.

REACTION:

There is community of people who spend their time thinking about law
and policy in cyberspace. It is not always characterized in these terms; it
reflects a conflict between competing visions of “order” and “disorder” in
social systems.

In this chapter, the author shares, the managers of MAPS (Mail Abuse
Prevention System) create and maintain what they call the “Realtime
Blackhole List” which consists of a long list of Internet addresses. They
place on the RBL any Internet address from which, to their knowledge,
spam has originated. They also place on the RBL the address of any
network that allows “open-mail relay” or provides “spam support
services”.

The proliferation of unsolicited mass e-mailing operations is a series, or


at least a non-trivial, one. E-mail has become an indispensable form of
communication, of incalculable commercial and non-commercial
importance for a substantial and ever-growing segment of the world
community. Its value is being undermined by a barrage of unwanted and
unsolicited communications.

The MAPS operators propose a norm; a description of behavior that


they consider is unacceptable. It allows open mail real systems or
providing spam support services. They offer to serve as your agent in
identifying those who are violating this norm. They offer to keep you inform
of those identifications.

The protocols of the global network, like the natural languages they so
closely resemble, emerged from a process that was at its once unplanned
and undirected. We can certainly point expose to many individuals and
institutions that played particularly important roles in its emergence, ex
ante there was no one we could have pointed to as charged with
creating the set of rules we now know as the Internet, anymore than we
can point to anyone individual or institution charged with creating the set
of rules for English syntax.

The Internet functions well today are probably not viable over the long
term. We should not wait for it to break down before acting. We should
not move so quickly, or depart so radically from the existing structures,
that we disrupt the functioning of the Internet.

A “stable” Internet is one locked in place, incapable of generating


innovative responses to the very problems to the very problems that it is
itself bringing into existence. The very existence of the Internet should
caution us against diminishing too quickly the notion that there are some
problems that are best solved by these messy, disordered, semi-chaotic,
unplanned, decentralized systems, and that the costs that necessarily
accompany such unplanned disorder may sometimes be worth bearing.

LESSONS LEARNED:

- I learned about the different topics about the incident, the


explanation, the question and the debate.

- I understand about the stable Internet which is a response in


innovation.

INTEGRATIVE QUESTIONS:

1. What is it about regulating the net?

2. What is MAPS?

3. What is RBL?

4. What is CCITT?

5. What is ICANN’s?
TITLE: Fahrenheit 451.2: Is Cyberspace Burning? (Chapter 2.4)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: People from all corners of the globe-people who might


otherwise never connect because of their vast geographical differences
can now communicate on the internet both easily and cheaply

LEARNING EXPECTATIONS:

- I want to learn the six reasons why self rating scheme are wrong for the
internet.

- I want to know what is rethinking the rush rate.

- I want to learn the free speech online: a victory under siege.

- I want to understand more about cyberspace burning.

- I want to learn why blocking software should not be used by public


libraries.

REACTION:

In this chapter, Ray Bradbury describes a function society where books


are outlawed. Fahrenheit 451.2 is the temperature at which books burn.
People censor the printed word by burning books. In the virtual world, one
can use just as easily censor controversial speech by banishing it to the
farthest corners of cyberspace using rating and blocking programs.

The White House called a summit meeting to encourage Internet users


to self-rate their speech and to urge industry leaders to develop and
deploy the tools for blocking “inappropriate” speech. Industry leaders
responded to the White House call with a barrage of announcements:

- Netscape announced plans to join Microsoft. In adopting PICS


(Platform for Internet Content Selection), the rating standard that
establishes a consistent way to rate and block online content.

- IBM announced it was making $100,000 grant to RSAC


(Recreational Software Advisory Council) to encourage the use of
its RSACi rating system.

- Four of the major search engines announced a plan to cooperate


in the promotion of “self-regulation” of the Internet.
- Following the announcement of proposed legislation by Sen. Patty
Murray which would impose civil and ultimately criminal penalties
on those who mis-rate a site the Online Cooperative Publishing Act.

The Internet will become bland and homogenized. The major


commercials sites will still be readily available. They will have the resources
and inclination to self-rate and third party rating services will be inclined to
give them acceptable ratings. It is a scenario has already been set in
motion. These are the following scenarios:

- The use of PICS becomes universal.

- One or two rating systems dominate the market and become the
de facto standard for the Internet.

- PICS and the dominant rating system are built into Internet software
as an automatic default.

- Unrated speech on the Internet is effectively blocked by defaults.

- Search engines refuse to report on the existence of unrated or


“unacceptably” rated sites.

- Governments frustrated by “indecency” still on the Internet make


self-rating mandatory and mis-rating a crime.

In this chapter, six reasons are given on why self-rating schemes are
wrong for the Internet. These are the six reasons why self-rating schemes
are wrong for the Internet:

- Self-Rating schemes will cause controversial speech to be


censored.

- Self-rating is burdensome, unwieldy and costly

- Conversation cannot be rated.

- Self-rating will create “Fortress America” on the Internet.

- Self-rating will only encourage, not prevent, government regulation

- Self-ratings schemes will turn the internet into a homogenized


medium dominated by commercial speakers.

LESSONS LEARNED:

- I learned the six reasons why self-rating schemes are wrong for internet

- I learn the problems with user-based blocking software at home


- I become educated that blocking software should not be used by
public libraries

INTEGRATIVE QUESTIONS:

1. Why Blocking of software should not be used by public libraries?

2. Is Cyberspace Burning?

3. What are the six reasons why self rating scheme are wrong for the
internet?

4. Is third Party Rating the Answer?

5. What is ALA?
TITLE: Filtering the Internet in the USA: Free Speech Denied (Chapter 2.5)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Filtering or blocking software can be taken to be a mechanism


used to restrict access to Internet content based on an internal database
of the product, through a database maintained external to the product
itself, to certain ratings assigned to host sites by a third party, by scanning
content based on a keyword, phrase or text string or based on the source
of the information.

LEARNING EXPECTATIONS:

- I want to learn more about Filtering the Internet.

- I want to understand more about Blocking in the Internet.

- I want to learn more about Free Speech.

- I want to expose more about librarians and Filtering Programs.

REACTION:

Programs existed to control access at the local level, removing the


need to place the burden on Internet Service Provider (ISPs). Filtering
programs would largely be used in the privacy of one’s home, not in
public institutions such as libraries and community centers.

Filtering or blocking software can be taken to be a mechanism used to


restrict access to Internet content based on an internal database of the
product, through a database maintained external to the product itself, to
certain ratings assigned to host sites by a third party, by scanning content
based on a keyword, phrase or text string or based on the source of the
information.

According to this section, Rosenberg identifies two systems which are


intended to first encourage, and later, require Websites and Newsgroups
to rate themselves along a number of dimensions. These systems are
RSACi (Recreational Software Advisory Council on the Internet) and PICS
(Platform for Internet Content Selection).

When a web search is undertaken, what is not returned is a product of


the inadequacies of the search query, the search engine style, and the
filtering software. Censorship is a constant companion. In this section, the
National Coalition Against Censorship characterizes the problems
associated with such programs as oversimplification, over breadth,
feasibility, subjectivity, full disclosure and security.
Rosenberg shares that CLA (Canadian Library Association) issued a
statement on Internet access in support of its existing position on
intellectual freedom. The following are the two relevant points included as
the CLA encourages libraries to incorporate Internet use principles into
overall policies on access to library resources and to educate their publics
about intellectual freedom principles and the role of libraries in facilitating
access to resources in various forms of media.

He also discussed about NCLIS (National Commission on Libraries and


Information Science) recommends a number of potential solutions for
dealing with a number of recognized “perils” and “policy issues” as the
following goes:

- Separate terminals can be provided for adults and children.

- Libraries can provide Internet training, education, and other


awareness programs to parents and teachers.

- Internet access terminals can be configures with software that can


be turned on or off and restricts access to designated web sites or
specific Internet functions.

If filtering software is going to be used, David Jones strongly suggests,


according to Rosenberg, that the following conditions be included:

- The specific criteria for censoring web sites must be approved by


the Library Board and made available to the public on request.

- The implementation of this censorship must be in control of the


library staff and not someone outside the company.

- The black list of censored websites should not be a secret. It should


be made available to the public on request.

- There should be a procedure for members of the public to ask


library staff to reconsider classifications of websites.

LESSONS LEARNED:

- I know the examples of Problems with blocking and filtering programs.

- I understand the Mainstream Loudoun.

- I identify the librarians and filtering programs

INTEGRATIVE QUESTIONS:

1. What is Free Speech?


2. What is Filtering?

3. What is blocking?

4. What is Librarian Association?

5. What are the filtering problems in the internet?


TITLE: Censorship, the Internet, and the Child Pornography Law of 1996: A
Critique (Chapter 2.6)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: When the law speaks universally, then a case arises on it which is
not covered by the universal statement then it is right where the legislator
fails us and erred by over simplicity to correct the omission –to say what
the legislator himself would have said had he been, and would have put
into his law if he had known

LEARNING EXPECTATIONS:

- I want to know what is Censorship

- I want to know what is Pornography and Child Pornography

- I want to understand what is Child pornography Law

- I want to know what is Censorship in the Internet

- I want to know why it is that Child Pornography cases increases.

REACTION:

In this chapter, Catudal discussed Child Pornography Prevention Act


(CPPA) is an agreement over the proposition that children of protection
against those who would exploit them by producing child pornographic
materials is not sufficient to secure agreement over the means by which
to provide protections.

Catudal have three main objections that are presented against the
CPPA. CPPA is so broad in its proscriptions as to violate the First
Amendment rights of adults; the same protections made available to
children. CPPA altogether fails to provide minors and their legal guardians
with the privacy rights needed to combat the harms associated with
certain classes of prurient material on the Internet. Technological
advances in home computing and Congress failure to appreciate how
prurient material may be accessed over the Internet combine with CPPA
to wrongfully expose an increasing number of individuals to possible
prosecution and personal ruin.

Catudal distinguishes between censorship by suppression and


censorship by deterrence. Both forms of censorship presuppose that some
authorized person or group of persons has judged some text to be
objectionable on moral, political, or other grounds and banned the text
prohibited by law or decree any access to the text.
The difference bears on effecting the prohibition. Censorship by
suppression effects the prohibition by preventing the objectionable
material itself from being revealed, published, or circulated; it may do this
by blocking the material, by removing the material to inaccessible
archives or by destroying the material. Censorship by deterrence does not
prevent material from being published; material may be quite available
to all. The prohibition Is rather effected by threats of arrest, prosecution,
conviction and punishments against those who would make
objectionable material available and against those who would acquire it.

The Act makes it a crime to knowingly send, receive, distribute,


reproduce, sell or possess with intent to sell and makes it a crime to
possess more than three child pornographic images. The Act greatly
broadens the definition of child pornography to include entire categories
of images that many would judge not to be child pornographic and that
some would judge not to be pornographic at all.

The sponsors of the Child Pornography Prevention Act don’t think the
questions fundamentally important or relevant. Their contention is that the
most effective way to protect children against the harms created by child
pornography is to ban any material whose effect would be ‘to whet the
appetites’ of child sexual abusers.

LESSONS LEARNED:

- I become more familiar with the Child Pornography Prevention Act

- I learned the different arguments presented by the author: Argument


1: CPPA Violates the First Amendment, Argument 2: CPPA’s protective
are inadequate and Argument 3: CPPA can harm our children

INTEGRATIVE QUESTIONS:

1. What is Child Pornography?

2. What is Child Pornography act?

3. What is censorship?

4. What is Pornography?

5. Is child pornography be continued or not in the cloud?


TITLE: PICS: Internet Access Controls Without Censorship (Chapter 2.7)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Consumers choose their selection software and their label


sources independently. This separation allows both markets to flourish:
companies that prefer to remain value-neutral can offer selection
software without providing any labels; value-oriented organizations,
without writing software, can create rating services that provide labels.

LEARNING EXPECTATIONS:

- I want to know what Flexible Blocking is.

- I want to become familiar with what is PICS is all about

- I want to learn what the Labels are.

- I want to classify the uses of Labels

- I want to know what is and what re the Label Reading Software

REACTION:

The Internet now faces a problem inherent in all media that serve
diverse audiences. Societies have tailored their responses to the
characteristics of the media. Any rules about the distribution will be too
restrictive from some perspective, yet not restrictive enough from others.
PICS establishes Internet conventions for label formats and distribution
methods while dictating neither a labeling vocabulary not who should
pay attention to which labels.

Not everyone needs to block reception of the same materials. There


should be some way to block only the inappropriate material.
Appropriateness is neither an objective nor a universal measure. It
depends on the following three factors:

1. Supervisor – parenting styles differ, as do philosophies of


management and government

2. Recipient – what is appropriate for one fifteen year old may not be
for an eight-year old

3. Content – a game or chat room that is appropriate to access at


home may be inappropriate at work or school.

There was no standard format for labels, so companies that wished to


provide access control had to both develop the software and provide the
labels. Consumers choose their selection software and their label sources
independently. This separation allows both markets to flourish: companies
that prefer to remain value-neutral can offer selection software without
providing any labels; value-oriented organizations, without writing
software, can create rating services that provide labels.

Information publishers can self-label provided that publishers agree on


a common labeling vocabulary, self-labeling is a simple mechanism well-
matched to the distributed nature and high volume of information
creation on the Internet.

Third party labeling systems can also express features that are of
concern to a limited audience. There are two PICS specification
documents. The most important components are syntax for describing a
rating service, syntax for labels, an embedding labels and the HTML
document format, an extension of the HTTP protocol, and query-syntax for
an on-line database of labels.

PICS do not specify parents or other supervisors set configuration rules.


One possibility is to provide a configuration tool. Labels can be retrieved
in various ways. Some client might choose to request labels each time a
user tries to access a document.

PICS specifies very little about how to run a labeling service beyond
the format of the service description and the labels. Rating services must
make the following choices: labeling vocabulary, granularity, who creates
the labels, coverage and revenue generation.

LESSONS LEARNED:

- I understand what Flexible Blocking is all about.

- I determine what PICS doesn’t Specify

- I learned the uses of Labels

- I determine the two PICS Specifications

INTEGRATIVE QUESTIONS:

1. What is PICS?

2. What are the specifications of PICS?

3. How do you make the internet better?

4. What is flexible blocking?

5. What are the ways to do flexible blocking?


TITLE: Internet Service Providers and Defamation: New Standards of Liability
(Chapter 2.8)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The one ambiguity in all of this is the need to factor into our
analysis of responsibility the difficulties and costs that are involved in
preventing harm or rendering aid to someone else

LEARNING EXPECTATIONS:

- I want to know what is and what are the Internet Service Providers

- I want to know as well what Internet Defamation is.

- I want to learn what the Legal Precedents are for ISP Liability.

- I want to understand what is ISP.

- I want to know does Cyberspace alter the need for libel laws.

REACTION:

The complexity of multi-faceted issue precludes a comprehensive


treatment of Internet defamation. We will thoroughly consider the scope
of an Internet Service Provider liability for defamation in the realm of
cyberspace. Liable means morally responsible or accountable in some
fashion. Mandating ISP liability could have an unwanted chilling effect on
free expression in cyberspace. Failure to require ISP’s to take adequate
measures that will curtail liable is not conducive to civil discourse or the
protection of private reputation.

The Firs Amendment of the Constitutions guarantees freedom of


speech and freedom of the press. Internet has been hailed for promoting
uninhibited speech; there must be limit on speech even in cyberspace.
Defamation, according to Spinello, is a communication that harms the
reputation of another and lowers that person’s esteem in the eyes of the
community.

There are different standards of liability for distributing defamatory


information depending upon the role one plays in the process. Under the
standard of publisher liability, one who repeats or otherwise republishes
defamatory material is subject to liability as if he had originally published
it. Under the standard of common carrier liability, a common carrier has
reason to know that defamation is occurring; it has no liability for
defamatory remarks made by its customers.
ISP liability is one way in which the remarkable ascendancy of the
Internet raises new challenges about the proper assignment of liability.
Cyberspace defamation has provoked considerable confusion for the
American legal system, as evidenced by the conflicting rulings set forth
about ISP liability.

Judges have handed down different rulings regarding ISP liability


depending upon the level of editorial control that an ISP has exercised. In
the first case discussed by Spinello, the court ruled that CompuServe was
not liable for disseminating an electronic newsletter with libelous content.

It would be difficult to screen out most libelous statements since they


often consist of ordinary language. The ill-fated Communications
Decency Act contains which grants broad immunity from liability to ISP’s
that carry content generated by its subscribers. According to Raquillet,
the main argument is that submitting ISP’s to distributor liability would
mean that they would face the liability each time they were noticed of a
potential defamatory statement, the investigation would be burdensome,
and contradict the congressional intent to promote the development of
the Internet.

LESSONS LEARNED:

- I understand the Legal Definitions and standards.

- Internet service providers and legal defamation.

- I learned the legal precedents for ISP liability.

- Cyberspace alters the need for libel laws.

INTEGRATIVE QUESTIONS:

1. What is ISP?

2. What is legal defamation?

3. What is ISP liability?

4. What is Service Provider?

5. What are the legal precedents for ISP liability?


TITLE: Digital Millennium Copyright Act (Chapter 3.1)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The one ambiguity in all of this is the need to factor into our
analysis of responsibility the difficulties and costs that are involved in
preventing harm or rendering aid to someone else

LEARNING EXPECTATIONS:

- I want to be familiar with the Digital Millennium Copyright Act

- I want to understand the section of the Digital Millennium Copyright


Act

REACTION:

No person shall circumvent a technological measure that effectively


control access to a work protected under this title. The prohibition
contained shall not apply to persons who are users of a copyrighted work
which is a particular class of works or are likely to be in the succeeding 3-
year period, adversely affected by virtue of such prohibition in their ability
to make noninfringing uses of that particular class of works under this title.

No person shall manufacture, import, offer to the public, provide or


otherwise traffic in any technology, product, service, device, component,
or part thereof that is primarily designed or produced for the purpose of
circumventing a technological measure that effectively control access to
a work protected under this title, has only limited commercially significant
purpose or use other than to circumvent a technological measure. And is
marked by that person or acting in concert with that person with that
person’s knowledge for use in circumventing a technological measure
that effectively control access to a work protected under this title.

In false copyright management information, it states that no person


shall knowingly and with the intent to induce, enable, facilitate, or
conceal infringement. In removal or alteration of copyright management
information, it discussed that no person shall, without the authority of the
copyright owner or the law. Copyright management information means
any of the following information conveyed in connection in connection
with copies or phone records of a work or performances or displays of a
work, except that such term does not include any personally identifying
information about a user of a work or of a copy.

Limitation on liability of nonprofit educational institutions states that


when a public or other non-profit institution of higher education is a
service provider. In replacement of removed or disabled material and
limitation on other liability, shall not apply with respect to material residing
at the direction of a subscriber of the service provider on a system or to
which access is disabled by the service provider.

Service provider is an entity, as defined in this chapter, offering the


transmission, routing, or providing of connections for digital online
communications of materials of the user’s choosing without modification
to the content of the material as sent or received. Monetary relief means
damages, costs, attorneys’ fees and any other form of monetary
payment.

LESSONS LEARNED:

- I become familiarized with the Public Law 105-304.

- Understand the Sec. 103 Copyright Protection Systems and Copyright


Management

o Definition in general

o In details

INTEGRATIVE QUESTIONS:

1. What is Digital Millennium Copyright Act?

2. Explain the limitations on liability for copyright infringement.

3. Explain the limitations on liability relating to material online.

4. What does Sec 1201 states?

5. What does Sec 103 states?


TITLE: Note on the DeCSS Trial (Chapter 3.2)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The posting of the de-encryption formula is no different from


making and then distributing unauthorized keys to the department store.

LEARNING EXPECTATIONS:

- I want to know what DeCSS trial is.

- I want to know how it is related to DMCA and Its Technical


background.

- I want to be familiar about the lawsuits about it and the outcomes of it.

REACTION:

The DeCSS trial has tested the scope and constitutionality of the anti-
circumvention provision included in Section 1201 of the Digital Millennium
Act. All DVDs contain digital information, and this allows copies of a
motion picture contained on a DVD to be stored on a hard disk drive in
the computer system’s memory to be transmitted over the Internet.

They have been protected with an access control system that


encrypts the contents. This system was developed by Matshusita Electric
Industrial Co. and Toshiba Corporation. The DVD industry has adopted this
standard. According to this chapter, Norway decided that he wanted to
watch DVD movies on a computer that ran the Linux operating system.
Cracking the code was not a major hurdle yet it becomes the birth of the
DeCSS.

According to this chapter, Jack Valenti states that “this is a case of


theft. The posting of the de-encryption formula is no different from making
and then distributing unauthorized keys to a department store. In this
section, author shares, Kaplan issued a preliminary injunction prohibiting
the defendants from posting DeCSS on their respective web sites.

DeCSS simply preserves “fair use” in digital media by allowing DVDs to


work on computer systems that are not running Mac or Windows
operating systems. Consumers should have the right to use these disks on
a Linux system, and this required the development of a program. The
contention was that DeCSS existed to facilitate a reverse-engineering
process that would allow the playing of movies on unsupported systems.

The defense team received considerable support within certain


segments of the academic community. Some scholars were particularly
worried about the effect that would result from the injunction against
hyper linking. This brief also presented arguments supporting the defense
view that DeCSS fits within the reverse engineering exception of the anti-
circumvention provision.

This section presented that there are obviously much larger issues
pertaining to the First Amendment and its apparent conflict with property
rights. This case also epitomizes certain concerns about the DMCA law
itself. This ruling itself appears to make it illegal for someone in an
educational institution.

LESSONS LEARNED:

- I have understood the technical background, the underlying lawsuit


and its corresponding outcomes.

INTEGRATIVE QUESTIONS:

1. What is the DeCSS trial?

2. What is the technical background of the DeCSS Trial?

3. What is the lawsuit in the trial?

4. What about the Lawsuit?

5. What is the actual outcome of the trial?


TITLE: A Politics of Intellectual Property: Environmentalism for the Net?
(Chapter 3.3)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: One basic weakness in conversation system based wholly on


economic motives is that most members of the land community have no
economic value. When one of these non economic categories is
threatened, and if we happen to love it, we invent subterfuges to give it
economic importance…it is painful to read those circumstances today.

LEARNING EXPECTATIONS:

- I want to know more what Intellectual property is.

- I want to understand if it is environmental for the Net

- I want to know the logic of Information Relation

- I want to determine the conceptual structure of an intellectual land-


grab.

- I want to know the tension in an intellectual property system

REACTION:

Boyle, in this article, argues that we need a politics or perhaps a


political economy of intellectual property. Everyone says that the
ownership and control of information is one of the most important forms of
power in contemporary society. The information society exists yet with a
surprisingly little theoretical work.

Cyberpunk science fiction succeeded as a genre largely because it


combined a particular plot aesthetic with a particular conceptual insight.
There have been conferences over the use of the dangers posed by
disparate in particular. They are isolated applications to a new
technology of a familiar political worldview or calculation of self-interest.

One of the root problems is a conceptual one. The economic analysis


of information is beset by internal contradiction and uncertainty;
information is both a component of the perfect market and a good that
must be produced within that market. Information is supposed to move
towards perfection. Information must be commodified so as to give its
producers an incentive to produce.

The Net is the anarchic, according to Boyle, decentralized network of


computers that provides the main locus of digital interchange. Its
distressing tendency to misstate, minimizes, or simply ignores contrary
cases, policy, and legislative history, and its habit of presenting as settled.

The White Paper wants to give expansive intellectual property rights


because it believes that this is the best way to encourage private
companies to fund construction of the information super highway. The
White Paper not only illustrates the pervasive power of baseline fallacies in
information economics, it also shows how the original author vision down
plays the importance of fair use and thus encourages an absolutist rather
than a functional idea of intellectual property.

Decisions in a democracy are made badly when they are primarily


made by and for the benefit of a few stakeholders. The fundamental
aporia in economic analysis of information issues, the source-blindness of
an “original author” and the political blindness to the importance of the
public domain as a whole all come together to make the public domain
disappear.

LESSONS LEARNED:

- I understand the logic of the information relation

- Intellectual property is the legal form of the information age

INTEGRATIVE QUESTIONS:

1. What is Intellectual property?

2. What the logic of information relation?

3. What is the analogy to environmentalism?

4. What is the tension in an intellectual property system?

5. What is the analogy to environmentalism?


TITLE: Intellectual Property, Information and the Common Good (Chapter 3.4)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Intellectual property is an odd notion, almost an oxymoron.


Property usually refers to tangible assets over which someone has or
claims control. The intellectual property in a book is the arrangement of
words that the ink marks on the paper represent.

LEARNING EXPECTATIONS:

- I want to know more about Intellectual property.

- I want to understand more about also information and common good.

- I want to know “a more balance view”

- I want to determine the philosophical justification for intellectual


property.

- I want to identify as well intellectual property.

REACTION:

Intellectual property is an odd notion, almost an oxymoron. Property


usually refers to tangible assets over which someone has or claims control.
The intellectual property in a book is the arrangement of words that the
ink marks on the paper represent. Intellectual property has always been
closely tied to technology. Technology arises from intellectual property in
the form of new inventions.

Computer technology has created a new revolution in how


intellectual property is created, stored, reproduced and disseminated
with that revolution has come new challenges to our understanding of
intellectual property and how to protect it.

The types of claims asserted over intellectual property have been


many and diverse. The following cases give some ideas of the diversity of
such claims:

1. Plagiarism – Students will often take all part of a article or essay that
they have located online and hand it in as their own work with or
without additions or modifications of their own. Plagiarism has been
a problem for a long time but the easy access to vast amounts of
electronic information dramatically increases the possibilities and
the temptation.
2. Software Piracy – The system was set up so that anyone on the
Internet could post a copy of program which was then available
for downloading for free by anyone who chose to do so.

3. Repackaging Data and Databases – There has been much debate


recently about whether databases and the data in them should
receive more protection than currently afforded by copyright law.

4. Reverse Engineering – Computer software never runs in isolation. It


has to interact with hardware, with operating systems, and with
other applications. It is often a necessity for reliable software
design.

5. Copying in Transmission – The Internet uses a so-called “store and


forward” architecture. The copying of messages in transit is
automatic and transparent.

The purpose of these intellectual works is to be communicated and


shared. Not databases or automobile designs but knowing the purpose of
information tells us something very important about the purpose, or the
virtue, of information producers.

LESSONS LEARNED:

- I learned the conflicts over intellectual property: Five Cases

- I know the philosophical justification for intellectual property

INTEGRATIVE QUESTIONS:

1. What is an intellectual property?

2. What is Information?

3. What are the conflicts over intellectual property?

4. What are the philosophical justifications for intellectual property?

5. Why is intellectual property important for the common good?


TITLE: Is Copyright Ethical? An Examination of the Theories, Laws, and
Practices Regarding the Private Ownership of Intellectual Work in the
United States (Chapter 3. 5)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: “The issue before thoughtful people is therefore not the


maintenance or abolition of private property, but the determination of
the precise lines along which private enterprise must be given free scope
and wherein it must be restricted in the interests of the common good.”

LEARNING EXPECTATIONS:

- I want to know what the rights are.

- I want to determine how rights arise.

- I want to determine theories of intellectual property and copyright.

- I want to know the history of copyright in United States.

- I want to determine if copyright is ethical or not

REACTION:

In revising the Copyright Act in 1909, Congress stated that the rights of
copyright holders were solely created by government grant and had no
other basis. It would seem then that copyright law was created by the
government as instrument of policy. Policy is usually based on a choice of
preferred outcomes and that choice may be based on considerations
other than the moral or the ethical.

This paper examines the relationship between intellectual property


rights and ethics, focusing for the most part on copyright. The focus in on
two key questions: what is the relationship between ethics and copyright
law and practice in the United States and is the concept of private
ownership of intellectual property inherently ethical. These questions are
important because access to overwhelming number of elements of daily
life is now controlled by intellectual property law.

The author shares Waldron elaborates right theories as being of two


kinds, those based on some perceived intrinsic quality or on some value
that a society wishes to achieve. He argues that rights cannot be
discussed without considering the topic of political morality which may be
based on rights, duty or goals.

The traditional legal basis for property is discussed by Cohen,


according to Warwick, who defines property rights as the relationship
between individuals in reference to things. He asserts that the owners of all
revenue producing property are granted the power to tax the future of
social product. Four approaches to the development of private property
are presented such as occupation, labor, and personality and economic.

Another detailed discussion of property and rights is presented by


Waldron who poses two questions: what individual interests are served by
the existence of private property and are any of these interests so
important from a moral point of that they justify a government duty to
protect them. Waldron examines utilitarian arguments for private property
which are based on the concept that society will benefit more if material
resources are controlled by individuals than if they were controlled by the
state or the community as a whole.

LESSONS LEARNED:

- I learned the theories of intellectual property and copyright

- I become knowledgeable with the history of copyright in the United


States.

- I determine the different Limitations and Ethical manner of copyright

INTEGRATIVE QUESTIONS:

1. What is a copyright?

2. What are the rights of copyrighting?

3. What is the origin of copyright?

4. What are the theories of intellectual property?

5. What is history of copyright in the US?


TITLE: On the Web, Plagiarism Matters More than Copyright Piracy (Chapter
3.6)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Through the routine gathering of information about transactions,


consumers preferences, and creditworthiness, a harvest of information
about an individual’s whereabouts and movements, tastes, desires,
contacts, friends, associates and patterns of work and recreation become
available in the form of dossiers sold on the tradable information market,
or is endlessly convertible into other form of intelligence through computer
matching.

LEARNING EXPECTATIONS:

- I want to know more about plagiarism.

- I want to determine the relation between plagiarism and copyright


piracy.

REACTION:

According to this chapter, piracy is the infringement of a copyright,


and plagiarism is the failure to give credit. They are confused because the
most common examples of these wrongs involve both sorts of wrongs. But
it is not hard to give examples that separate them. It would be plagiarism
but not piracy for me to take the works of an obscure 19th century poet
and try to pass them off as my own. The issue of copyright on the web has
received considerable attention and plagiarism per se is largely ignored.

The copyright owner suffers from loss of the revenue that is customarily
paid for permission to copy. In this section, Snapper discussed, the
obvious candidate for plagiarism harm is the author who receives no
credit. But it is hard to see what harm that author may have suffered. A
possible loss of potential reputation is hardly sufficient grounds for the
ethical indignation that academics express over incidents of plagiarism.

Another point stretched by the author that I agree is with his


observation that copyright shows concern for the owner rather than the
user and it is only a starting point for a study of the issues regarding
copyrights in web publication. Our copyright policies are legal
conversations that establish the relevant notion of property.

The argument is that a shift from hard-copy publication to Web-based


publication creates a new economic environment in which slightly
weakened copyright protections can still provide an adequate economic
incentive for the publication industry.
Snapper enumerates three important qualifications to the presented
argument. These are the three important qualifications for the argument
stated above:

1. Personal impression that the majority of legal scholars propose


strengthened, rather than weakened, intellectual property
protections for electronic publication.

2. The present paper seems to echo a generally unconvincing


argument presented by Beyer which argues that changes in
technology lowered the cost of publication to the point that most
copyright protections were no longer needed to encourage
publication.

3. Copyright policy has a myriad of social utilities. Its intended utility is


that copyright policy is to promote the progress of science and the
useful arts.

LESSONS LEARNED:

- Piracy is the infringement of a copyright.

- There are three important qualifications to the argument with a Web-


based publication which creates a new economic environment.

INTEGRATIVE QUESTIONS:

1. What is piracy?

2. What are the harmful effects of plagiarism?

3. What is the use of copyright?

4. What are the uses of copyright?

5. How does the threats involved in the free-riding technique in copyright


law?
TITLE: An Ethical Evaluation of Web Site-Linking (Chapter 3.7)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The World Wide Web has grown in popularity; the propriety of linking
to other web sites has achieved some prominence as an important moral
and legal issue. Hyperlinks represent the essence of Web-based activity, since
they facilitate navigation in a unique and efficient fashion involved.

LEARNING EXPECTATIONS:

- I want to know more about plagiarism.

- I want to determine the relation between plagiarism and copyright


piracy.

REACTION:

According to Spinello, World Wide Web has grown in popularity; the


propriety of linking to other web sites has achieved some prominence as
an important moral and legal issue. Hyperlinks represent the essence of
Web-based activity, since they facilitate navigation in a unique and
efficient fashion involved.

He shares that this paper will allow us readers to explore the issue of
deep linking from a distinctly moral vantage point. It raises a plethora of
complex property issues with subtle moral implications and it deserves a
careful scrutiny. It concerns the appropriate scope of property rights for a
web site and how those rights can be properly balanced against the
common good of free and open communications on the web.

A link is a connection within the same web site or between two


different web sites. This practice becomes known as ‘deep linking’. The
hyperlink text itself can appear in many forms. It can be the name of the
linked to web site or a description of what is to be found at the website.

In this section, it introduce that there are two types of link which are
the HREF and IMG. An HREF is a link that instructs the browser to locate
another website and provide its contents for user. An IMG is a link that
instructs to a browser to enhance the text on the user’s web page with an
image contained in a separate file.

Having established that a web site is really property, we consider the


specific rights implied by such ownership. We conclude that on the basis
of those rights, a prima facie case can be made that because of the
potential for negative effects, users should not presume that deep linking
is acceptable unless they first seek out the permission of the target web
site. We also fully appreciate the dangers inherent in exploring the web
and the need to encourage the most flexible forms of linking.

The resolution of the normative one does have the deep thoughts
have tended to know the one of the World Wide Web, and for the
intentions that do seek with the reality that had been allowed with the
three theories that they had encountered: (1) utilitarianism, (2) the locking
or labor-desert theory (3) the personality theory.

LESSONS LEARNED:

- I understand the different issues and problems that spread related web
site.

- I learned the theories that encountered in the World Wide Web.

INTEGRATIVE QUESTIONS:

1. How does Web Site Linking become harmful for target web sites?

2. What is the right to manage in the Web Site Linking

3. What is the meaning of the right to income?

4. What is Web Site as an Intellectual Property?

5. What are the factors in respecting the Common Good in the Web Site
Linking?
TITLE: The Cathedral and the Bazaar (Chapter 3.8)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Given enough eyeballs, all bugs are shallow.

LEARNING EXPECTATIONS:

- I want to understand a more knowledge about hacking concept.

REACTION:

As this first part, obviously it gives us an idea on what the book is all
about. This chapter shows the different things that can be observed in the
book during the entire reading. The topics covered are all about the
information technology: quickly evolving, open source: be resourceful,
computer software and hardware: build by great developers around the
world and the digital age: forming a new industry in the information
technology department.

It also discusses the hackers which if you define is a person who is


proficient at using or programming a computer; a computer buff
(dictionary.com). It discusses what the different branches that a typical
programmer has are. It encompasses the culture, tribe, activities done
and objectives. As stated in the book, it will eventually discuss reasons
and prove something, supported by collections attached, to any readers
who will be interesting to this topic.

I am looking forward to continue enjoying reading this book as Mr.Pajo


shared to us, how lucky we are that we are now given opportunity to read
it and have knowledge regarding this kind of topic where in we ca
establish a good deed in ourselves especially in our industry today

This book is a “must” for anyone who is interested in the future of the
industry of information technology or computers, quick development is
observed. It includes different concepts with the earlier years when
computer technology was been popular to the world. I am glad reading
this book because this book is presented in a simple words which can
easily been understood and can be related by anyone in any means. I
also want this because it simply proves that hacking is not really bad but
there are some benefits from this.

Hacking is done over the internet through open source. Lots of sources
can be used and improved. I am really in the opinion that hacking is
good. I do not think that open source is bad because especially in our
class, IS-EBIZ, we are really hacking through the different ways such as
download the source code or use the web developer plug-ins and a lot
more. We are encouraged to do this to be more challenged to improve
what definitely exists today.

I am not really a good hacker and do not like hacking but after
reading this chapter I am encouraged to be more challenged in this side
because of there is a lot of idea to prove on.

LESSONS LEARNED:

- I learned the different issues and problems that spread related web
site.

- I can determine the theories that encountered in the World Wide Web.

INTEGRATIVE QUESTIONS:

1. What is POP means?

2. When is rose not considered as a rose?

3. What was Linux style of development?

4. How does pop client becomes fetch mail?

5. What are the six lessons in this chapter as enumerated?


TITLE: Towards a Theory of Privacy for the Information Age (Chapter 4.1)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: An individual or group has normative privacy in a situation with


regards to others if and only if that situation the individual or group is
normatively protected from intrusion, interference, and information
accessed by others

LEARNING EXPECTATIONS:

- I want to know what Greased Data is.

- I want to understand about what is Grounding Privacy.

- I want to learn the nature of Privacy.

- I want to determine the setting and adjusting policies from private


situations.

- I want to learn more the theory of privacy for the information age.

REACTION:

According to Moor, Ethical problems involving computing, probably none


is more paradigmatic than the issue of privacy. In this article it argues that
most individual appreciate the easy access of computerized data when
making reservations, using automatic teller machines, buying new products
to the web, or investigating topics in computer databases.

We all know that when information is computerized, it is greased to slide


easily and quickly to many ports of call. This makes information retrieval quick
and convenient. But legitimate concerns about privacy arise when this speed
and convenience lead to improper exposure of information. Greased
information is information that moves like lightning and is hard to hold on to.

He added that the greasing information makes information so easy to


access that it can be used again and again. Computers have elephant
memories – big, accurate, and long term. The ability of computers to
remember so well for so long undercuts a human frailty that assists privacy.
We humans forget most things. Most short term memories don’t even make it
to long term memory.

Once information is being captured for whatever purpose, it is greased


and ready to go for any purpose. In computerized world we leave electronic
foot prints everywhere, and data collected for one purpose can be
resurrected and use elsewhere. The problem of the computer privacy is to
keep proper vigilance on where such information can and should go.
Moor discussed that For the most part the need for privacy is like good art,
you know it when you see it. But sometimes our institutions can be misleading
and it is important to become as clear as possible what privacy is, how it is
justified, and how it is applied in ethical situations.

LESSONS LEARNED:

- Some cultures may value privacy and some may not.

- The transmission of knowledge is essential for the survival of every culture,


but it is not the same knowledge that must be transmitted.

- The core values allow us to make trans-cultural judgment.

- The core values are the values we have in common as human beings.

INTEGRATIVE QUESTIONS:

1. What is Greased data?

2. What is Grounding Privacy?

3. What is the nature of Privacy?

4. What is the adjustment privacy?

5. What are Publicity principles?


TITLE: The Structure of Rights in Directive 95/46/EC on the Protection of
Individuals with Regard to the Processing of Personal Data and the Free
Movement of Such Data (Chapter 4.2)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Data quality is the protection of the data subject’s reasonable


expectations concerning the processing of data about him.

LEARNING EXPECTATIONS:

- I want to know the directives on the question of further processing of


personal data.

- I want to know how to use personal data for a different purpose.

- I want to determine the data protection and the philosophy of


privacy.

- I want to identify the channels for the flow of personal information.

- I want to know as well the structures of rights in directives.

REACTION:

According to the author, Elgesem, the Directive 95/46/EC of the


European Parliament and of the Council of 24 October 1995 on the
protection of individuals with regard to the processing of personal data
and the free movement of such data is about to be implemented in the
form of o national legislation all over the Europe.

An analysis of this Directive is indispensable because the first aim of this


paper is to contribute to the interpretation of the Directive; it is a
contribution to the philosophical theory of privacy. Modern data
protection legislation is a central that raises a whole of conceptual and
ethical issues.

This paper, according to Elgesem, here distinct parts. The first part turns
out that an important part of the Directive’s structure of individual rights
has to be brought to bear in order to answer question. In the second part
is all about privacy which should be identified with the individuals control
concerning the flow of personal information. In the last part are the ideas
of Elgesem for a philosophical theory on individual rights in connection
with the processing of personal data.

The bulk of processing of personal data uses information that is already


available as the result of other information processes. The Directive
addresses question where it is stressed that all personal data must be
collected for specified, explicit, and legitimate purposes and not further
processed in a way that is incompatible with those purpose.

In this section, Elgesem stated, the two objectives identified which is to


protect the fundamental rights and freedom of natural persons and in
particular the right to privacy with respect to the processing of personal
data and the protection is meant make the flow of personal information
within the European community easier.

It also illustrates the different channels for the flow of personal of


information. These are the different channels which are the relationship
between privacy and data protection in the directive, channels for the
flow of personal information, data protection and the protection of
privacy, the directive and the protection of channels.

LESSONS LEARNED:

- Privacy a descriptive neutral concept denoting conditions that are


neither always desirable and praise worthy, nor always undesirable
and upraise worthy.

- Privacy is not simply an absence of information about us in the minds


of the other, rather it is the control we have over the information about
ourselves.

- In accordance with the directive, member states shall protect the


fundamental rights and freedom of neutral persons and in particular
right to privacy with respect to the processing of personal data.

INTEGRATIVE QUESTIONS:

1. What conditions is it legitimate to process personal data are collected


from the different purposes?

2. What is Data Protection?

3. What is the Philosophy of Privacy?

4. What it is about the Channels for the flow of the personal information?

5. What is Data Quality?


TITLE: Privacy Protection, Control of Information, and Privacy-Enhancing
Technologies (Chapter 4.3)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Privacy is not simply an absence of information about us in the


minds of others, rather it is the control we have over information about
ourselves.

LEARNING EXPECTATIONS:

- I want to know more the Theory of Privacy.

- I want to understand the Role of Control in the Theory of Privacy.

- I want to determine the similarities and difference about the


Normative Privacy and the Restricted Access Theory.

- I want to know how to use the Control in the Justification and


Management Privacy.

- I want to know Privacy in enhancing Technology.

REACTION:

The present study is organized into two main parts: the theory of
privacy which defends a version of the restricted access theory of privacy,
according to Moor, and the pricy –enhancing technologies which
considers the role of the privacy.

In our private lives we wish to control information about ourselves. We


wish to control information that might be embarrassing or harm us. And
we wish to control information that might increase our opportunities and
allow us to advance our projects. The notion of privacy and the notion of
control fit together. Privacy is the main claim of the individuals, groups or
institutions to determine for themselves when, how to what extent
information about them is communicated to others. According to the
book to have a personal view about personal property is to have the
ability to consent to the dissemination of personal information.

Control of personal information is extremely important as, of course is


privacy. But these concepts according to the book are more useful when
treated as separable, mutually supporting concepts than as one.
Individual control of personal information on the other hand is part of the
justification of privacy and plays a role in the management of privacy.
Privacy and control do fit together naturally, just not in the way people
often state.
Virtually all societies establish normatively private situations, zones of
privacy, which limits access to people or aspects about them under
certain conditions. The details of these normatively private situations vary
somewhat from cultures but they are intended to protect individuals and
foster social relationships whether the individuals have control in the
situations or not. Normative privacy needs to be distinguished from natural
or descriptive privacy. Simply being alone doesn’t provide sufficient claim
to right to privacy anymore than having the right to privacy can
guarantee privacy as matter of fact.

The concept of privacy is defined in terms of restricted acces. Control


has a central role in the justification and management of privacy. One
practical payoff in making this distinction is that one can resist the
temptation to think that because one has increased privacy.

LESSONS LEARNED:

- The adequacy of PETS can be challenged in terms of their


technological effectiveness or on the basis of their security and public
policy implications.

- PETS provide users with control over their own information.

- PETS offer users choices about what information they wish to release.

- PETS give us increased control but it remains an open question whether


privacy is increased.

INTEGRATIVE QUESTIONS:

1. What is the Role of Control in the Theory of Privacy?

2. What is Normative Privacy?

3. What is Restricted Access Theory?

4. What exactly are PETS?

5. Why are PETS appealing?


TITLE: Toward an Approach to Privacy in Public: Challenges of Information
Technology (Chapter 4.4)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: At the heart of the concern to protect ‘privacy’ lies a


conception of the individual and his or her relationship with society. The
idea of private and public spheres or activity assumes a community in
which not only does such a division make sense, but the institutional and
structural agreements that facilitate an organic representation of this kind
are present.

LEARNING EXPECTATIONS:

- I want to know Privacy and the Personal Realm Background

- I want to determine how privacy is being violated in public.

- I want to know the Two Misleading Assumptions.

- I want to determine the Implication for a Theory of Privacy.

- I want to analyze the case study about Lotus Marketplace.

REACTION:

According to the author, Nssenbaum, this article highlights a


contemporary privacy problem that falls outside the scope of dominant
theoretical approaches. Many influential approaches to privacy
emphasize the role of privacy in safe guarding a personal intimate realm
where people may escape the prying and interference of others.

The idea that privacy functions to protect the integrity of a private or


intimate real spans scholarly work in many disciplines, including legal,
political and philosophical discussion of privacy. Privacy is important
because it renders possible important human relationships. Privacy
provides the necessary context for relationship which we could hardly be
human if we had to do without-the relationships of love, friendship and
trust. Privacy as control over all information about oneself, according to
Fried defended a moral and legal right to privacy that extends only over
the far more limited domain of intimate or personal information.

The danger of extending control over too broad spectrum of


information is privacy may then interfere with other social and legal
values. According to Fried the important thing is that there is some
information which is protected, namely information about the personal
and intimate aspects of life. According also to him, the precise content of
the class of protected information will be determined largely by social
and cultural convention. Prevailing social order designates certain areas,
intrinsically no more private that other areas, as symbolic of the whole
institution of privacy, and thus deserving of protection beyond their
particular importance.

The author shares assumptions stands in the way of an adequate


concept of privacy which are there is a realm public information about
persons to which no privacy apply and an aggregation of information
does not violate privacy f s parts, taken individually, do not.

Intimacy simply could not exist unless people had the opportunity for
privacy. Excluding outsiders and resenting their uninvited intrusions are
essential parts of having an intimate relationship.

LESSONS LEARNED:

- Privacy is the condition of not having undocumented personal


knowledge about one possessed by others.

- Parent means fact which most person in a given society choose not to
reveal about them or facts about which a particular individual is acutely
sensitive.

- A person’s right to privacy restricts access by others to this sphere of


personal, undocumented information unless, in any given case, there are
other moral rights that clearly out weight privacy.

INTEGRATIVE QUESTIONS:

1. What is Privacy and Personal Real Background?

2. What are the Two Misleading Assumptions?

3. What is the view of Schoeman, Fried and Gertein?

4. Who is Raymong Wak?

5. What is the Case of Lotus Marketplace is all about?


TITLE: KDD, Privacy, Individuality, and Fairness (Chapter 4.5)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: At the heart of the concern to protect ‘privacy’ lies a


conception of the individual and his or her relationship with society. The
idea of private and public spheres or activity assumes a community in
which not only does such a division make sense, but the institutional and
structural agreements that facilitate an organic representation of this kind
are present.

LEARNING EXPECTATIONS:

- I want to know Privacy and the Personal Realm Background

- I want to understand how Privacy is being violated in public.

- I want to know the Two Misleading Assumptions.

- I want to know the Implication for a Theory of Privacy.

- I want to internalize and analyzed the case study about Lotus


Marketplace.

REACTION:

In this chapter it discusses the personal data as often considered to be


the exclusive kind of data eligible for protection by privacy law and
privacy norms. Personal data is commonly defined as data and
information relating to unidentifiable person; on the protection of the
individuals with regard to the processing of personal data and on the free
movement of such data. Personal data should only be collected for
specified, explicit, legitimate purposes and should not be further
processed in away incompatible with these purposes.

No excessive data should be collected, relative to the purpose for


which the data is collected. Moreover the data should be accurate and,
if applicable, kept up to date. Every reasonable step must be taken to
ensure that inaccurate or incomplete data is either rectified or erased. A
personal data should be kept in a form that permits identification or data
subjects for no longer than is necessary for the purpose for which the data
were collected.

Another point stretched by Vedder is with the application of the


narrow definition of personal data and the protective measures
connected to that definition of KDD process is not without difficulties. Of
course, as long as the process involves personal data in the strict sense of
data relating to an identified or identifiable individual, the principles
applying without reservation; once the data has become anonymous, or
has been processed and generalized, an individual cannot exert any
influence on the processing of data at all. The rights and requirements
make no sense regarding anonymous data and group profile.

In the later part of this chapter it discusses that the data used and the
profiles created do not always qualify as personal data. Nevertheless, the
ways in which the profiles are applied may have a serous impact on the
persons from whom the data was originally taken or, even more for the
matter to whom the profiles are eventually applied.

LESSONS LEARNED:

- Individual is judged and treated on the basis of his, coincidently,


belonging to the wrong category of persons.

- Data can be processed and profiles can be produced.

- Categorical privacy is strongly connected with individual privacy.

- Most conceptions of individual privacy currently put forward in law and


ethical debate have on feature in common.

INTEGRATIVE QUESTIONS:

1. What is KDD?

2. What is Personal Data, law and Ethics?

3. What is Categorical Privacy?

4. What are Social Consequences?

5. What are the Solutions according to this chapter?


TITLE: Data Mining and Privacy (Chapter 4.6)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Devised by computer scientist David Chaum, these techniques


prevent the dossier society in which computers could be used to infer
individuals’ life styles, habits, whereabouts, and associations from data
collected in ordinary consumer transactions can have a chilling effect
causing the people to alter their observable activities

LEARNING EXPECTATIONS:

- I want to know more about Data Mining.

- I want to learn more about Knowledge Discovery.

- I want to know analysis conducted about this chapter.

REACTION:

According to Fulda, as he discussed, Knowledge Discovery using data


mining techniques differs from ordinary information retrieval in that what is
sought and extracted mined – from the data is not explicit in the
database.

Fulda defines data mining as the most easily accomplished when the
data are highly structured and available in many different forms at many
different levels in what are known as data warehouse. The data
warehouse contains integrated data, both detailed and summarized
data, historical data, and metadata.

According to this chapter, points are clarify such as much of the


current concerns about privacy arise because of data mining and more
generally, knowledge discovery. In traditional computer science terms,
data is uninterrupted, while knowledge has a semantics that gives it
meaning.

While the data stored in databases are not truly uninterrupted, the old
legal rule that anything put by a person in the public domain is not legally
protected served well when the data was not mined so as to produced
classifications, clustering, summaries and profiles, dependencies and links
and other patterns.

And so non of the cases according to this book involved technology,


but sifting through a stack of magazines, an archives, or a stack of letters
to find associations between two data and an individual are all pre-
technological forms of data mining, and they are all improper.
Another point stretched by Fulda is that technology cannot make right
what is otherwise wrong, so such data mining is indeed, a violation of
privacy; if data about the individual is mined and implicit knowledge
about him is discovered, an appropriation occurred, and further
disclosure should not be permitted.

LESSONS LEARNED:

- Data Mining is most easily accomplished when the data are highly
structured and available in many different forms at many different
levels in what are known as data warehouse.

- Much of the current concerns about privacy arise because of data


mining and more generally, knowledge discovery. In traditional
computer science terms, data is uninterrupted, while knowledge has a
semantics that gives it meaning.

INTEGRATIVE QUESTIONS:

1. What is Data Mining?

2. What are the Issues about Data Mining?

3. What is the Analysis about Data Mining?

4. What are the benefits of Data Mining?

5. What is the connection between Data Mining and Privacy?


TITLE: Workplace Surveillance, Privacy and Distributive Justice (Chapter 4.7)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Surveillance is no longer an ambiguous tool for control and


social certainty, not it is merely a weight that weighs down on the
employee rather it’s logic and its effects has become increasingly difficult
to see clearly and distinctly.

LEARNING EXPECTATIONS:

- I want to know the reason why Privacy as a Matter of Justice

- I want to understand what is Resisting Workplace Surveillance

- I want to be familiar with what is Distributive Justice all about.

- I want to know the connection between Workplace Surveillance,


Privacy and Distributive Justice.

REACTION:

According to this chapter, Surveillance has become a central issue in


our late modern society. The surveillance of the public spaces by closed
circuit television, the surveillance of consumers through consumers surveys
and point of sale technology, and workplace surveillance, to name but a
few. And so as surveillance increases, more and more questions are being
raised about its legitimacy. Surveillance often functions as resource for the
execution off power, and power is the most effective when it hides itself.

Introna points out the issue of the lack of legislation in other countries
would also indicate that it would be reasonable to conclude that
workplace monitoring is still largely viewed as a right of employers with the
burden of proof in the employee to show that it is invasive, unfair and
stressful. It would seem that a legal correction in the imbalance of power
is not likely to be forthcoming in the near future. There is also
accumulating evidence that surveillance of individuals lead to stress, a
lost of sense of dignity and a general environment of mistrust.

Introna believes that Surveillance is no longer an ambiguous tool for


control and social certainty, not it is merely a weight that weighs down on
the employee rather it’s logic and its effects has become increasingly
difficult to see clearly and distinctly. Surveillance, with modernity has lost
its shine.

In this chapter there is a view or related privacy which states that


privacy is no means an uncontroversial issue; we have to select what to
survey and most importantly, we have to select how to value what we
find in our surveillance. Surveillance is an important part in computer
technology.

LESSONS LEARNED:

- Surveillance is no longer an ambiguous tool for control and social


certainty, not it is merely a weight that weighs down on the employee
rather it’s logic and its effects has become increasingly difficult to see
clearly and distinctly.

- The collective needs to use data collected to coordinate and control


the activities of the individuals for the good of the collective.

- Self-interested individuals would not always to use resources,


allocated by the collective, for the sole purpose of furthering the aims
and objectives of the collective.

INTEGRATIVE QUESTIONS:

1. What is Workplace Surveillance?

2. What is Distributive Justice?

3. What is Privacy as a matter of justice?

4. What are the two major trends to create the background for our
contemporary discussion of workplace surveillance?

5. Why Surveillance become the central issue in our late modern society?
TITLE: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and
Sabotage in Cyberspace (Chapter 5.1)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: When true computer telephony arrives, we may need to re-


examine our proposed definition of computer crime.

LEARNING EXPECTATIONS:

- I want to know what the Boundaries of Computer Crime is.


- I want to measure if we really need a category of computer crime.
- I want to understand what Descriptive categories of computer crime are.
- I want to know the three types of computer crime.
- I want to examine why computer crime as a descriptive category crime.

REACTION:

Tavani, author of this section, says even though concerns about crimes
involving the use of computer technology have received considerable
attention in the popular press as well as in certain scholarly publications,
the criteria used by the news reporters, computer ethicist and legal
analyst for determining what exactly constitutes a computer crime has
been neither clear or nor consistent.
In this chapter he observed based on concerns raised by Gotterbarn
and other critics, we can reasonably ask whether having a separate
category of computer crime is necessary or even useful. It is perhaps also
worth noting that some critics have pointed out that crimes of diverse
types are committed in many different sectors, but we don’t have
separate categories for crimes committed in each of those areas. So it
would certainly seem reasonable for these critics to ask why we need a
separate category of crime for criminal acts involving computer
technology.
Arguments for having a category of computer crime can be
advanced from least three different perspectives: legal, moral and
information and descriptive. We consider arguments for each, beginning
with a look at computer crime as a separate legal category. From a legal
perspective, computer crime might be viewed as a useful category for
prosecuting certain kinds of crimes.
At the outset, one might reasonably ask what the value would be in
pursuing questions about computer crime from the point of view of a
descriptive category. We can also see then, why our existing laws and
policies are not always able to extend to cover adequately at least
certain kind of crimes involving computers.

LESSONS LEARNED:
- Software Piracy is by using computer technology to produce one or more
authorized copies of propriety computer software, distribute unauthorized
software or make copies of that software available for distinction over a
computer network.
- Electronic Break Ins is by using computer technology to gain unauthorized
access.
- Computer Sabotage is by using computer technology to unleash one or
more programs.

INTEGRATIVE QUESTIONS:

1. What is Computer Sabotage?


2. What is Software Piracy?
3. What is Electronic Break Ins?
4. What are the three types of computer crime?
5. Do we need a Category of Computer Crime?
TITLE: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic (Chapter 5.2)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Through the routine gathering of information about transactions,


consumers preferences, and creditworthiness, a harvest of information
about an individual’s whereabouts and movements, tastes, desires,
contacts, friends, associates and patterns of work and recreation become
available in the form of dossiers sold on the tradable information market,
or is endlessly convertible into other form of intelligence through computer
matching.

LEARNING EXPECTATIONS:

- I want to know more what Hacktivism is.

- I want to know what Civil Disobedience is.

- I want to understand what is Hacktivist Ethic.

- I want to become what is Cyber Terrorism.

- I want to understand what is Civil Disobedience.

REACTION:

In this era of global commerce via the internet, strikes against the
hegemony of bureaucratic capitalism and the commercialization of the
internet will inevitably be carried out in the World Wide Web. Numerous
reports in the popular press have portrayed the hackers as vandals,
terrorist and saboteurs, yet no one seems to have considered the
possibility that this might be the work of electronic politician activist or
hacktivist.

Through an investigation of hacktivism, this essay seeks to make clear


the growing tensions between the cooperative and liberal ideology of the
originators of the “electronic frontier”, speaking in the name of social
justice, political decentralization, and freedom of information, and the
more powerful counteracting moves to reduce the internet to one grand
global “electronic marketplace”.

According to the author, Civil Disobedience entails the peaceful


breaking of unjust laws. It does not condone violent or destructive acts
against its enemies, focusing instead on nonviolent means to expose
wrongs, raise awareness, and prohibit ht implementation of perceived
unethical laws by individuals, organizations, corporations or governments.
Symbolic acts of civil disobedience are accomplished by drawing
attention to a problem indirectly. Sit-ins and other forms of blockade and
trespass are examples of symbolic acts of civil disobedience.

Every technology affords opposing possibilities towards emancipation


or domination, and information technology is no different. The new
information technologies are often portrayed as the utopian promise of
total human emancipation and freedom.

Hacktivist prioritize freedom of information and are suspicious of


centralized control over, or private ownership of information. Hackers
questions why a few corporations can own and sell huge databases of
information about the others, as well as control information helpful to the
public at large.

Hacktivism is in its infancy, but, given the ubiquity and democratizing


possibility of the internet, we will certainly bear witnesses to the
movement’s growing pains and increasing maturity. In order for hacktivism
to become a legitimate form of social protest, it must be provided sound
ethical foundations. This, in turn, means expanding the ethical justification
of civil disobedience to include acts of hacktivism.

LESSONS LEARNED:

- Hacktivism is defined as the (sometimes) clandestine use of computer


hacking to help advance political causes.

- Access to computers- and anything that might teach you something


about the way the world works- should be unlimited and total. Always
yield to the Hands- On Imperative

INTEGRATIVE QUESTIONS:

1. What is Electronic Civil Disobedience?

2. What is Hacktivism?

3. What is Cyberterrorism?

4. What is Hacktivist Ethic?

5. What is the connection of Hacktivism and Electronic Civil


Disobedience?
TITLE: Web Security and Privacy: An American Perspective (Chapter 5.3)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Congress shall make no law respecting an establishment of


religion, or prohibiting the free exercise of thereof; or abridging the
freedom of speech, or of the press; or the right of the people peaceably
to assemble, and to petition the government for a redress of grievances.

LEARNING EXPECTATIONS:

- I want to know more Web Security.

- I want to undertsnad what is the American Perspective about Web


Security and Privacy.

- I want to learn more about cryptographic.

- I want to determine the different amendments of the states.

REACTION:

In this section, the author discussed, American legal tradition focuses


on a right to privacy, rather than a need for data protection. Yet
illuminating Web privacy of this particular perspective throws a broader
light on how the fundamental rights of speech, assembly and freedom of
religious inquiry may depend upon electronic privacy in the information
age. The confusion between the privacy and security remains with many
in the computer security community.

Privacy requires security, because without the ability to control access


and distribution of information, privacy cannot be protected. But security
is not privacy. Security can be used to limit privacy by preventing the
subject of information from knowing about the compilation of information,
or to violate privacy by using data in ways in which do not coincide to the
subject’s wishes.

Integrity means that information is not altered. Information has integrity


during the transmission if the recipient can be certain that the information
was not altered in transit. Integrity means that what is received is exactly
what sent. Hash function compress information was.

Cryptography secure, collision-free hash functions provide the ability


to verify information without exposing it. Cryptographically secure hash
functions compress information to unpredictable values. Collision free
hash functions compress data into unique hash values. In public key
cryptography there are two keys. Anything encrypted with one key can
only be decrypted with the other key. One key is held secret, shared with
no one. The other key is widely publicized. Public key cryptography
sometimes called asymmetric cryptography.

The right of people to be secure in their persons, houses, papers, and


effects, against unreasonable sources and seizures, shall not be violated
and no warrants shall be issue, but upon probable cause, supported by
oath or affirmation, and particularly describing the placed to be
searched, and the persons or things to be seized. No person shall be held
to answer for a capital, or otherwise infamous crime, unless a presentment
or indictment of a grand jury, except in cases arising in the land or naval
forces, or in the militia, when in actual service in time of war or public
danger; nor shall any person be subject for the same offense to be twice
put in jeopardy of life or limb; nor shall be compelled in any criminal case
to be a witness against himself, nor be deprived of life, liberty, or property,
without due process of law; nor shall private property be taken for public
use.

LESSONS LEARNED:

- A system that maintains availability while under attack exhibits


survivability.

- Systems with survivability exhibit graceful degradation in the face of


attacks.

- False light is the publication of information that is misleading, and thus


shows an individual in a false light.

INTEGRATIVE QUESTIONS:

1. What is ISP?

2. What is IP?

3. What are you doing on the web?

4. What is the difference between privacy and security?

5. What is anonymity?
TITLE: The Meaning of Anonymity in an Information Age (Chapter 5.4)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Even where fragments of information do not lead to information


that is uniquely identifying, people may be identified with a high degree
of probability when various properties are compounded to include a
smaller and smaller set of individuals who satisfy them all

LEARNING EXPECTATIONS:

- I want to know how Anonymity works in the information age.

- I want to understand if Anonymity is good in all aspect.

- I want to determine how it benefits society.

REACTION:

The natural meaning of Anonymity as may be reflected in ordinary


usage or a dictionary definition is of remaining nameless, that is to say,
conducting oneself without revealing one’s name. a poem or pamphlet is
anonymous when attributable to a named person, a donation is
anonymous when the name of the donor is withheld, people strolling
through a foreign city are anonymous because no one knows who they
are.

Information technology has made it possible to trace people in


historically unprecedented ways. We are targets of surveillance at just
about every turn of our lives. In transactions with retailer, mail-order
companies, medical caregivers, day-care providers, and even beauty
parlors, information’s about us is collected, stored and analyzed, and
sometimes shared.

Our presence on the planet, our notable features and momentous


milestones, are dutifully recorded by agencies of federal, state, and local
government, including birth, marriage, divorce, property ownership,
driver’s licenses, phone number, credit card numbers, social security
number, passport number, level of education and more, we are
described by age, hair color, eye color, height, quality of vision,
purchases, credit card activity, travel, employment and rental history real
estate transactions, change of address, ages and numbers of children,
and magazines descriptions.

The power of information technology to extract or infer identity from


misidentifying signs and information has been inventively applied by
literary scholars to settling disputes and unraveling mysteries of authorship
say to discover whether it was Shakespeare who wrote a given sonnet.
Anonymity may enable people to reach out for help, especially for
socially stigmatized problems like domestic violence, HIV or other sexually
transmitted infection, emotional problems or suicidal thoughts. It offers the
possibility of a protective cloak for children, enabling them to engage in
internet communication without fear of social predation or- perhaps less
ominous but nevertheless unwanted- overtures from commercials
marketers.

The application that does such a thing or aids us for becoming more
informed in other person’s every movement are different social networks
especially Plurk. It keeps me posted with every update to my friends. I
recently created an account just to see what the application is all about.
As a purpose of knowing why my classmates are creating accounts and
having too much fun and even I become addicted to it.

LESSONS LEARNED:

- The value of anonymity lies not in the capacity to be unnamed, but in the
possibility of acting or participating while remaining out of reach,
remaining unreachable.

- Being unreachable means that no one will come knocking on your door
demanding explanations, apologies, answerability, punishment, or
payment.

- To secure the possibility of being unreachable, we need both to promote


understanding and also pursue advocacy.

INTEGRATIVE QUESTIONS:

1. What is Anonymity?

2. What is the purpose of Anonymity?

3. What is the effect of Anonymity?

4. How does Anonymity works in info-age?

5. What is the Social Security System?


TITLE: Double Encryption of Anonymized Electronic Data Interchange
(Chapter 5.5)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The power of information technology to extract or infer identity


from non-identifying signs and information has been inventively applied
by literary scholars to settling disputes and unraveling mysteries of
authorship

LEARNING EXPECTATIONS:

- I want to know what is Double Encryption.

- I want to understand what does the title of this chapter implies.

- I want to learn more about Anonymity.

- I want to know what are the two main problems that needs to solve in
order to keep GP, as a sender anonymized.

REACTION:

We cut his electronic head by creating a Gatekeeper postbox that


forwards all the incoming electronic data, thereby replacing the doctor’s
address with its own address. Furthermore, collecting medical data
electronically require, according to our moral institutions, some kind of
encryption.

To be sure that data are really sent by the sender and received by the
receiver meant by the sender, the double encryption protocol is suitable
and widely used. However, double encryption needs the sender
identification in order to decrypt the message to the sender’s public key,
but the sender’s identification was anonymized by the Gatekeeper
postbox. To use double encryption for anonymized electronic
communication, new requirements must be specified.

The power of information technology to extract or infer identity from


non-identifying signs and information has been inventively applied by
literary scholars to settling disputes and unraveling mysteries of authorship
-- say, to discover whether it was Shakespeare who wrote a given sonnet.
These scholars infer authorship by comparing the stylistic and lexical
features of anonymous text with the known style of authors whose texts
have been analyzed along these same dimensions

Our main data sources are therefore the persons who prescribe drugs.
Using this post marketing surveillance as scientific method, we distinguish
between two phases, the generation of a hypothesis and the evaluation
of the hypothesis. The assistant of the GP will make notes of the referrals to
a specialist and of the treatment summary of the specialist in the patient
record of the GP. In the Netherlands, the number of GP’s using Electronic
Patient Records was growing rapidly from 1988. The central role of the
Dutch GP enables us to follow individual patient. In order to transmit the
data from the GP to the central database of IPCI, we use the edifact
standard for electronic messages. Anonymization of the GP means only a
randomized number and profession type are transmitted.

The problem of replacing a sender’s identity can be done very easily


by introducing an electronic postbox of the Gatekeeper. Instead of
transmitting the messages from the GP to the ICPI postbox directly, the
messages are now sent to the Gatekeeper’s postbox has only one
function, forward every incoming message to the ICPI postbox so that the
original sender is replaced by the new sender, the Gatekeepers identity.

To encrypt an electronic message we chose a double encryption


program with a secret and a public key. Instead of one key, used to
encrypt and decrypt a message, two different keys are generated so that
a message encrypted with one key is decrypted only with the other key
and vice versa. We conclude that it is possible to automatically
anonymize an electronic sender by the introduction of a Gatekeeper’s
postbox. The possibilities of double encryption programs are
demonstrated as a way to be sure about sender and receiver.

LESSONS LEARNED:

- As soon as data are sent electronically, the sender’s identification is


automatically added to the message. To anonymized the sender, an
automatic process of replacing this identification must be implemented.

- To decrypt an encrypted message, one must know the decryption key of


the sender. However, when the sender is anonymized, it is impossible to
select the right key. An automatic process of key-handling and
decryption must also be implemented.

- The Gatekeeper’s postbox intercepts the message, the sender


identification is used to select the sender’s public key, and only then
remove it from the message.

INTEGRATIVE QUESTIONS:

1. What is ICPI?

2. What is GP?

3. What is ERP?

4. What is Meduer format?


5. What is SOAP?
TITLE: Written on the Body: Biometrics and Identity (Chapter 5.6)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Biometrics is often described as `the next big thing in information


technology'. Rather than IT rendering the body irrelevant to identity – a
mistaken idea to begin with – the coupling of biometrics with IT
unequivocally puts the body center stage.

LEARNING EXPECTATIONS:

- I want to know Virtual Identities of Biometrics.

- I want to understand why they are questioning the biometric body.

- I want to determine the different buyers of biometrics.

REACTION:

Generally speaking, biometric technology involves the collection with


a censoring device of digital representations of physical features unique
to an individual, like a fingerprint, pattern of the iris, the retina, the veins of
the hand, physiognomic features, shape of the hand, or voice patterns, it
may also include typical behavioral patterns like typing or writing a
signature. If a matching template is found, the person presenting
themselves is recognized and counts as known to the system.

Major buyers of biometrics technology can be found in the private


sector, particularly among corporations with high security interest and/or
limited access areas like banks and nuclear plants, but an important
impetus comes from governments and government-related departments
and services catering to client populations of thousands, often millions of
people.

Public institution concerned with the distribution of welfare and child


benefits, immigration and applications for political asylum, or the issue of
passports and car licenses and increasingly looking towards biometrics in
order to improve what are perceived as system threatening levels of
fraud. Also, employers interested in keeping track of the whereabouts and
activities of their employees, hospitals and insurance companies in the
process of introducing electronic patient records are among the many
interested parties.

Moreover, with so many forces joining in a coordinated effort to make


it succeed, biometrics can be expected to become one of the dominant
ways for bodies and information systems to connect. In the process, the
very notion of identity is being reconstructed in ways that are highly
relevant for the contemporary philosophical debate on the relation
between the body, identity, and information technology.

Biometrics is often described as `the next big thing in information


technology'. Rather than IT rendering the body irrelevant to identity – a
mistaken idea to begin with – the coupling of biometrics with IT
unequivocally puts the body center stage. The question to be raised
about biometrics is how bodies will become related to identity, and what
the normative and political ramifications of this coupling will be. Unlike the
body rendered knowable in the biomedical sciences, biometrics
generates a readable body: it transforms the body's surfaces and
characteristics into digital codes and ciphers to be read by a machine.

LESSONS LEARNED:

- Biometrics requires a theory of identity that, unlike much of the available


literature, takes the body and the embodied nature of subjectivity fully
into account.

- We need to investigate what kind of body is, by researching the practices


and informational configurations of which the readable biometric body
becomes part.

- Only the former maybe at stake in biometrics, while the latter is taken to
refer to something both authors perceive as true identity.

- The biometrics is not just about as narrow an identity check as some


authors maintain.

INTEGRATIVE QUESTIONS:

1. What is Biometrics?

2. What is the Identity of Biometrics?

3. What is the Virtual Identity of Biometric?

4. Who are the major buyers of biometric?

5. Why are they questioning Biometric Body?


TITLE: Ethical Considerations for the Information Professions (Chapter 6.1)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Morality could exist without ethics (if no one investigated how
morality is done) but there cannot be ethics without morality (we cannot
study morality unless there is morality)…. Morality is like eating; it is an
inevitable part of everyone’s life.

LEARNING EXPECTATIONS:

- I want to understand the different ethical considerations for the


Information Professions

- I want to learn the aspect of ethics in terms of information profession

REACTION:

The field of information ethics is relatively new. The issues specific to


information ethics, however, have certainly been with us for a longer time,
yet continue to gain prominence and complexity in public discourse with
the popularization of information and computer technologies. Information
ethics bridges many disciplines, including library and information science,
computer science, archival science, records management, informatics,
educational media technologies, and more.

According to Buchanan, the domain of information ethics comprises


all of the ethical issues related to the production, storage, access and
dissemination of information. Similar to the term computer ethics,
information ethics reflects the meeting of the social, the technology, and
the philosophical. Recognizing the importance of the ethical issues
surrounding information assumes a critical role for information workers,
librarians, or computer scientists alike.

This chapter includes a brief introduction to the philosophical


foundations of ethics and morality and an overview of basic principles of
information ethics, describes particular issues and areas of particular
concern to information professionals, and discusses codes of ethics for the
information professions. An abbreviated resource list is included for
additional information and sources.

Ethics is generally defined as the philosophical study of moral


behavior, of moral decision-making, or how to lead a “good life.” Ethics is
the study of morality; the study of what we do. Morality could exist without
ethics but there cannot be ethics without morality. Morality is like eating; it
is an inevitable part of everyone’s life. Ethics, on the other hand, is like
nutrition. It is crucial to living a good life but it is not an inevitable part of
living or an activity engaged in by all.
Information ethics, much like the technologies that continue to
contribute to its complexity, will thrive and present new challenges to all
of us. Ethics will continue to be put through new tests as technologies race
ahead of many social and cultural conventions and norms.

In closing, information ethics must be understood as impacting each


and every member of the “information society.” As such, each member
must accept certain responsibilities and act accordingly. Information
ethics, as with information literacy, must become integral to formal and
informal education. The Kantian categorical imperative reveals promise,
yet once again, as a guiding principle for the information age and as a
critical tenet of information ethics.

LESSONS LEARNED:

- Ethics is the study of morality; the study of what we do.

- Information ethics must be understood as impacting each and every


member of the “information society.”

- The Kantian categorical imperative reveals promise, yet once again,


as a guiding principle for the information age and as a critical tenet of
information ethics

INTEGRATIVE QUESTIONS:

1. What is Information Profession had a great importance in our society.

2. How does philosophical study of moral behavior in the field of


Information profession?

3. Identified the growth of ethical issues in Information Profession

4. What is the function of National Telecommunications and Information


Administration

5. Who are the pioneers of American Library Association?


TITLE: Software Engineering Code of Ethics: Approved! (Chapter 6.2)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: In all these judgments concern for the health, safety and welfare
of the public is primary; that is, the ‘public interest’ is central to this code.

LEARNING EXPECTATIONS:

- I want to know the components of Software Engineering Codes.

- I want to understand the different concepts in the Software


Engineering Code.

- I want to know how the Software Engineering Code has been


approved.

REACTION:

Software Engineering now has its own code of ethics. The code has
been adopted by both the ACM and the IEEE-Computer Society, having
gone through an extensive review process that culminated in the official
unanimous approval by the leadership of both professional organizations.
The preamble to the code was significantly revised. It includes specific
ethical standards to help professional make ethical decisions.

Ethical tensions can best be addressed by thoughtful consideration of


fundamental principles, rather than blind reliance on detailed regulations.
These principles should influence software engineers to consider broadly
who is affected by their work; to examine if they and their colleagues are
treating other human beings with due respect; to consider how the
public, if reasonably well informed, would view their decisions; and to
consider whether their acts would be judged worthy of the ideal
professional working as a software engineer.

The code emphasizes the professional’s obligations to the public at


large. “In all these judgments concern for the health, safety and welfare
of the public is primary; that is, the ‘public interest’ is central to this code.”

The code contains a clause (8.07) against using prejudices or bias in


any decision making. The code includes specific language about the
importance of ethical behavior during the maintenance phase of
software development.

The purpose of developing a software engineering code of ethics is to


document the ethical and professional responsibilities and obligations of
software engineers. The code is unique in that it, unlike other codes, is
intended as the code for a profession and is distinctive in that it has been
adopted by two international computing societies.

The code contains eight principles related to the behavior of and


decisions made by professional software engineers, including
practitioners, educators, managers, supervisors, and policy makers, as well
as trainees and students of the profession.

1. PUBLIC software engineers shall act consistently with the public


interest.

2. CLIENT AND EMPLOYER software engineers shall act in a manner


that is in the best interests of their client and employer, consistent
with the public interest.

3. PRODUCT software engineers shall ensure that their products and


related modifications meet the highest professional standards
possible.

4. JUDGMENT software engineers shall maintain integrity and


independence in their professional judgment.

5. MANAGEMENT software engineering managers and leaders shall


subscribe to and promote an ethical approach to the
management of software development and maintenance.

6. PROFESSION software engineers shall advance the integrity and


reputation of the profession consistent with the public interest.

7. SELF software engineers shall participate in lifelong learning


regarding the practice of their profession and shall promote an
ethical approach to the practice of the profession.

8. COLLEAGUES software engineers shall be fair to and supportive of


their colleagues.

LESSONS LEARNED:

- Ethical tensions can best be addressed by thoughtful consideration of


fundamental principles, rather than blind reliance on detailed
regulations.

- The dynamic and demanding context of software engineering requires a


code that is adaptable and relevant to new situations as the Code
provides support for software engineers and managers of software
engineers who need to take positive action.

INTEGRATIVE QUESTIONS:
1. What are the eight principles that software engineer shall adhere.

2. What is a software engineer?

3. Who is the person who contributed by direct participation or by teaching


fundamental principles?

4. What is the relation of client and employer in software engineer?

5. Does it have a great importance of the Code in the eight principles of a


software engineer?
TITLE: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All
(Chapter 6.3)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: The information age puts new emphasis on some parts of many
older moral questions. The moral issues surrounding the development of
weaponry are thus a few of the very many possible examples of how an
older moral question can take on a new light as technology changes.

LEARNING EXPECTATIONS:

- I want to know the reason why incomplete codes of ethics are worse
than none at all.

- I want to understand how an organization consider or treat a code of


ethics.

- I want to know when code of ethics considered incomplete is.

REACTION:

Condemnation of an immoral act may be so highly distorted as to be


absurd, or a highly immoral act may not be condemned at all, because
the impacts that cause it to be considered immoral do not fit within the
‘PAPA’ formulation. Not all important moral issues in information
technology can be put under the ‘PAPA’ headings.

Accuracy of information systems may be of relevance in weapons


systems, because inaccurate data or processing may cause the wrong
target to be hit. The property issues raised by the production, existence
and use of weaponry are important, but they are not the issues of
intellectual property and ownership of networks. However the possibility
that it might be used, destroying life as well as property, must be factored
into the considerations in a very substantial way.

Privacy and accuracy of computer data and information are issues


essentially unrelated to the environmental impacts of computing. Property
issues in computing will have two tangential relationships to the
environment: The cost of software that respects legal intellectual property
rights, being a significant portion of the cost of computing, tends to inhibit
the increasing use of computers. But the possibility of a return on
development costs induces software developers to produce software that
requires computers with ever greater computing power, causing users to
upgrade hardware far more frequently than wear-and-tear would require.

Most of the moral issues related to teleworking are not, however


privacy or access issues. Those issues that are not privacy or access issues
are not accuracy issues either, thought: The distance between the worker
and the conventional workplace does not introduce significant additional
accuracy issues. The privacy issue that most clearly accompanies
telework is the possible automated collection of data on the employee by
the employer.

Any moral code (whether in computing or elsewhere)can be turned to


by someone feeling pressures to find a relatively easy ‘way out’ of a
morally tricky situation. Thus any moral code could be looked at in the
hope that it will provide an excuse for potential immoral acts. Clearly, the
more obviously relevant, and the more easily a code comes to hand, the
more likely it is that it will be turned to. Further, as we shall see, some
ethical codes are more open to such abuse than others are. Nonetheless,
moral codes in all fields and sub-fields could be abused in this way if they
leave themselves open to it.

Codes should make it clear what their area of competence is(thus a


code of computer ethics may make it clear that it will not cover questions
of how income generated by using computers should be distributed) but
in doing so, it must also make it clear that moral issues outside its area of
competence are still moral issues, and ones that may be of greater
importance than any covered in the code.

Those who write moral codes (or things that could be mistaken for
them) need to be aware of the possibility that they may be abused.
Codes that address some issues but not others are very common, and
particularly open to such abuse on issues at the edge of their
competence. Code should make it clear what their area of competence
is. More importantly, though, authors of code should always make it clear
that their code is no substitute for careful moral consideration, and
especially in areas or on questions where there is no clear guidance in the
code.

LESSONS LEARNED:

- Consequently, information and communication technology (ICT) has


its effect in good ways and bad ways community life, family life,
human relationships, education, careers, freedom, and democracy in
the field of PAPA.

- To avoid the criticism of incompleteness, it is not necessary for a code


to be derived from a consistent set of fundamental ethical principles.

INTEGRATIVE QUESTIONS:

1. What does Privacy, Accuracy, Property and Accessibility related in the


field of ICT?

2. What are the ethical issues in PAPA?


3. What is Richard Mason’s article title stands for?

4. What is the important telework issue?

5. What are the Four Ethical Issues of the Information Age?


TITLE: Subsumption Ethics (Chapter 6.4)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Act in such a way that it is possible for one to will that the maxim of
one’s action should become a universal law.

LEARNING EXPECTATIONS:

- I want to know what subsumption ethics is.

- I want to learn the issues in subsumption ethics.

- I want to understand the underlying concepts of subsumption ethics.

REACTION:

The difference between computers and simple machine is the extent to


which computer systems subsume design and development decisions over
which users have little or no control. Subsumption ethics is the process by
which decisions become incorporated into the operation of information
technology (IT) systems, and subsequently forgotten.

Subsumption is the process of building larger components from smaller


ones. In computer systems, small components are developed and tested,
and once they are working reliably they are subsumed into larger systems.
This is the enabling technique of object-oriented programming. People tend
to think that changes to software should be easy because programming is
just a set of instructions, and not like a building made up of hard materials.
The Greek word ethos, from which we derive “ethics,” can be translated as
“habit.” Habit in general is a subsumption process.

Design and implementation decisions dictate the structure and operation


of systems. Systems ultimately operate according to many such decisions. The
decisions become codified into programming code and information content.
I call segments of this code and content “subsumed objects” (SOs). Design
decisions often have ethical components, whether or not the designer is
explicitly aware of them.

1. The impact of IT is determined by the operation of its subsumed


objects;
2. Subsumed objects have a determinate moral values;
3. The ethical impact of an IT system is the responsibility of the people
who designed, developed, and used it.

There is a close relationship between computer systems and


organizational policy.
There are four axioms of subsumption ethics:

A. Information systems subsume design, policy, and implementation


decisions in programming code and content. Code segments and content
become “subsumed objects.”
B. Assumed objects have determinate moral value.
C. Subsumed objects have a high “invisibility factor.”
D. Subsumptive complexity increases over time.

Subsumption ethics implies a need for continuous ethical analysis during


systems design and development. The first is “the Golden Rule” found in the
bible, in Kant’s categorical imperative, and many other world traditions. nThe
second “the Golden Mean” as explicated by Aristotle. The Third is “action
without desire or aversion” and comes from the philosophy of the east, both
Buddhist and Hindu.The fourth principle is “ethical complexity.”

Subsumption ethics suggests that ethical processes should be applied


continuously during systems development. Impact analysis should be used by
all the members of a project team, including users, management, systems
architects, programmers, and project managers.

The Golden Rule – Application of the golden rule means reviewing each
stakeholder’s needs as decisions are made. While this process is time-
consuming, the result is more successful projects, since the completed
systems have the respect of a broad constituency.

The Golden Mean – Virtuous decisions require informed balance between


extremes. The team must examine both the technical and ethical impacts of
their decisions. Within this framework, ethical impacts become clear.

Niskama Karma – Effective systems development should incorporate


many perspectives. A democratic process of social negotiation, that should
yield a distribution of responsibilities that is fair to all parties involved, and that
satisfies the criteria of practicability, efficiency, and effectiveness.

Complexity – Systems are complex, both in their operation and in their


relationship to organizations. The overall complexity of a project can be
determined by systematically applying SoDIS to the WBS and evaluating
each task as a function of complexity, experience and knowledge. Areas of
inexperience or insufficient knowledge should be addressed quickly and
thoroughly. This process should be iterative as the project matures.

Technology amplifies the actions of individuals, and subsumption ethics


further describes the complex impacts of poor judgments in each of these
cases. Complex systems have always failed---complexity itself makes such
failures inevitable. Inattention to subsumption ethics makes them more likely.

LESSONS LEARNED:
- For the subsumption ethics and describes the four axioms of
subsumption ethics, four ethical frameworks with roots of philosophical
traditions are introduced, including the golden rule: the golden mean,
nishaka karma and complexity

INTEGRATIVE QUESTIONS:
1. What is the process by which decisions become incorporated into the
operation of Information Technology?

2. What is Information Technology?

3. What are the four ethical principles that have roots in antiquity
• Golden rule
• Golden mean
• Action without desire aversion
• Ethical complexity
4. What is Mahabharata which is a part of an ancient Hindu Text?

5. What do we call the third ethical principle?


TITLE: Ethical Issues in Business Computing (Chapter 6.5)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Professionalism is a risk management strategy and in this subject the


emphasis is on applying professionalism in the business context

LEARNING EXPECTATIONS:

- I want to know how computer technology helps the business.

- I want to understand the importance of ethical issues in business


especially in terms of computer technology.

- I want to learn the underlying concepts in ethical issues with regard to


business computing.

REACTION:

Essentially, computers are used in business to solve problems. As I have


remembered in a seminar, a speaker defines Business and IT as this “Business is IT
and IT is business. I became more interesting with the topic and simply defines
that these two different entities have common undertaking to each other.

Business, Legal and Ethical Issues is the first of the core subjects undertaken by
Computer Professional Education Program (CPeP) students in their ongoing
professional development. Professionalism is a risk management strategy and in
this subject the emphasis is on applying professionalism in the business context.

An individual manager, focused on use of a computer for the task in hand,


may understandably lack specialist awareness of wider ethical issues Because of
our new hi-tech technology; computer nowadays was very useful in many ways.
It can also used in business. That is why there are so many businessmen that have
the newest model of computer to use for their businesses.

Nevertheless the overwhelming commercial advantages carried by use of


modern computer systems, their power and distance from common human
experience potentially carry considerable associated disadvantages, and for
the relevant one does developed and maintained in appropriate business
behavior.

The business computing is by no means straightforward, one complication is


that there is no one type of computer or computer system that must be used by
business people, because the nature of properly designed computer systems is
to change and adapt to specific needs.
The PC’s must allow for some generalization, and for the business computing
even physically identical computers become quite different in appearance and
use when dissimilar applications are employed.

LESSONS LEARNED:

- All companies of whatever size should consider their use of computer


systems.

- I learned that the business cannot stand without IT as well as the IT


cannot stand without the business.

- I learned that that there is no one type of computer or computer


system that must be used by business people

INTEGRATIVE QUESTIONS:

1. What is the smallest scale of business computing?

2. What level a business is if it is large enough to employ a designated


computer specialist?

3. What is meant by level two in business computing?

4. What are the tasks of business computing?

5. What is the level where there will be at least one team of computer
specialist?
TITLE: The Practitioner from Within: Revisiting the Virtues (Chapter 6.6)

AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=search-


alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: It is grounded in practical wisdom. It is experiential, learning to


care about the self, others, the community, living the good life, flourishing
and striving for moral excellence. It offers a model for the development of
character and personal ethics which will lead to professional ethics.

LEARNING EXPECTATIONS:

- I want to know the virtues with connection to the revisit.

- I want to understand the concepts in the revisiting virtues.

- I want to know the goal of this section in line with cyber ethics.

REACTION:

In this chapter the author discusses that traditionally the study of


computer ethics involves taking students who are not philosophically trained,
exposing them to action-guiding theories, presenting them with the codes of
ethics of several companies and professional organizations and asking them
to make ethical decisions in scenario-based cases. It is difficult to get from
youth up a right training for virtue if one has not been brought up under right
laws; for to live temperately and hardily is not pleasant to most people
especially when they are young. For this reason their nurture and occupation
should be fixing by law. This approach is deliberately action-based and
focuses on doing. "

The traditional question asked to students. While this pedagogical


methodology forces them to examine situations and argue from a particular
point of view, it does little to influence their character and personality. They
see the utilitarian or deontologist as someone other than themselves.

Here seems to be very little internalization of these action-based theories.


Virtue Ethics offers character-forming theory that has been more successful
with my students than the action-based theories of computer ethics texts.
Why? Virtue Ethics is directed toward character development.

Virtue ethics offers character-forming theory that has been more


successful with the students than the action guiding theories of computer
ethics. One problem of novices in the field of ethics is for the reductionist in
the moral theory underlying the compute ethics, and for the one whose vision
of who are is too important to jettison. Personal intentions and dispositions
guide actions, and people over it are being evaluated with this kind of
virtues.
LESSONS LEARNED:

- In order to encompass with the reality that would deal with the
examining the complex and novel one, and for the issues of computer
technology, and for the one that for life and happiness for humans
and includes other core .

INTEGRATIVE QUESTIONS:

1. What is meant by core values?

2. How the practitioner from within does revisited the virtues from within?

3. How the Imagination and Narrative Genre does take place?

4. What do Ethics mean?

5. Does Ethics and Morality take hand-in-hand in the field of the


computer-mediated action?

You might also like