You are on page 1of 147

The Fortune at the Bottom of the Pyramid

The Handbook of Information and Computer


Ethics

Cyber Ethics

By : Mark Arvin Cembrano

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0


Philippines License.
1
Table of Contents:
The Fortune at the Bottom of the Pyramid

1. The Market at the Bottom of the Pyramid


2. Products and Services for the BOP
3. BOP: A Global Opportunity
4. The Ecosystem for Wealth Creation
5. Reducing Corruption: Transaction Governance Capacity
6. Development as Social Transformation

The Handbook of Information and Computer Ethics

1. Foundations of Information Ethics


2. Milestones in the History of Information and Computer Ethics
3. Moral Methodology and Information Technology
4. Value Sensitive Design and Information Systems
5. Personality-Based, Rule-Utilitarian, and Lockean Justifications of
Intellectual Property
6. Informational Privacy: Concepts, Theories, and Controversies
7. Online Anonymity
8. Ethical Issues Involving Computer Security: Hacking, Hacktivism, and
Counterkacking
9. Information Ethics and the Library Profession
10. Ethical Interest in Free and Open Source Software
11. Internet Research Ethics: The Field and Its Critical Issues
12. Health Information Technology: Challenges in Ethics, Science, and
Uncertainty
13. Ethical Issues of Information and Business
14. Responsibilities for Information on the Internet
15. Virtual Reality and Computer Simulation
16. Genetic Information: Epistemological and Ethical Issues
17. The Ethics of Cyber Conflict
18. A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection
19. Regulation and Governance of the Internet
20. Information Overload

2
21. Email Spam
22. The Matter of Plagiarism: What, Why, and If
23. Intellectual Property: Legal and Moral Challenges of Online File Sharing
24. Censorship and Access to Expression
25. The Gender Agenda in Computer Ethics
26. The Digital Divide: A Perspective for the Future
27. Intercultural Information Ethics

Cyber Ethics

1. Ethics and the Information Revolution


2. Ethics On-Line
3. Reason, Relativity, and Responsibility in Computer Ethics
4. Disclosive Computer Ethics
5. Gender and Computer Ethics
6. Is the Global Information Infrastructure a Democratic Technology
7. Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key
Problems and Challenges
8. Just Consequentialism and Computing
9. The Internet as Public Space: Concepts, Issues, and Implications in Public
Policy
10. The Laws of Cyberspace
11. Of Black Holes and Decentralized Law-Making in Cyberspace
12. Fahrenheit 451 2: Is Cyberspace Burning
13. Filtering the Internet in the USA: Free Speech Denied
14. Censorship, the Internet, and the Child Pornography Law of 1996: A Critique
15. PICS: Internet Access Controls Without Censorship
16. Internet Service Providers and Defamation: New Standards of Liability
17. Digital Millennium Copyright Act
18. Note on the DeCSS Trial
19. A Politics of Intellectual Property: Environmentalism for the Net
20. Intellectual Property, Information, and the Common Good
21. Is Copyright Ethical An Examination of the Theories, Laws, and Practices
Regarding the Private
22. On the Web, Plagiarism Matters More Than Copyright Piracy
23. An Ethical Evaluation of Web Site Linking
24. The Cathedral and the Bazaar
25. Towards A Theory of Piracy for the Information Age
3
26. The Structure of Rights in Directive 95 46 EC
27. : Privacy Protection, Control of Information, and Privacy-Enhancing
Technologies
28. Toward an Approach to Privacy in Public: Challenges of Information
Technology
29. KDD, Privacy, Individuality, and Fairness
30. Data Mining and Privacy
31. Workplace Surveillance, Privacy, and Distributive Justice
32. Privacy and Varieties of Informational Wrongdoing
33. PICS: Internet Access Controls Without Censorship
34. Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage
in Cyberspace
35. Terrorism or Civil Disobedience: Toward a Hacktivist Ethic
36. Web Security and Privacy: An American Perspective
37. The Meaning of Anonymity in an Information Age
38. Written on the Body: Biometrics and Identity
39. Ethical Considerations for the Information Professions
40. Software Engineering Code of Ethics: Approved
41. No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All
42. Subsumption Ethics
43. Ethical Issues in Business Computing
44. The Practitioner from Within: Revisiting The Virtues

4
The Fortune at the Bottom of
the Pyramid

5
Fortune at the Bottom, of the Pyramid, Chapter 1: The Market at the Bottom of the Pyramid

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-
Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1-1

Quote: all of us are prisoners of our own socialization. The lenses through which we perceive
the world are colored by our own ideology, experiences, and established management
practices. Each one of the groups that is focusing on poverty alleviation –the World Bank, rich
countries providing aid, charitable organizations, national governments, and the private sector-
is conditioned by its own dominant logic. Let us, for example; examine the dominant logic of
each group as it approaches the task of eradicating poverty.

What I expect to learn: To gain knowledge about The Market at the Bottom of the Pyramid,
learn and understand The Market at the Bottom of the Pyramid

Review:

This part of the chapter talks about The Market at the Bottom of the Pyramid. I used to
be one of the people who think that poor people can’t buy things because they are too poor but I
was wrong. Wrong to think lowly of the lower classes because they can purchase, we have to
think that the poor are victims or burden. Think of them as normal being that are capable of
being an entrepreneur and one of the great consumers of the product. This topic also discussed
that we have to involve them in activities or give them partnership and etc where they will learn
for it to be a win win situation. This topic also discussed the how the pyramids work
economically where in the upper class is wealthy while the lower class is the poor people.

What I learned:

The power of dominant logic


The influence of dominant logic
The economic pyramid
The nature of the BOP market
There is money at the BOP
The poor and high-cost economic ecosystems
Access to BOP markets
The BOP markets known to be brand-conscious
The BOP market is connected
BOP consumers accept advance technology readily
6
The market development imperative
Creating the capacity to consume
The need for new goods and services
Benefits to the private sector
Integrative Questions:
1. What is the Bottom of the pyramid?
2. What is The Nature of the BOP Market?
3. What is the power of the dominant logic?
4. What is the economic pyramid?
5. Where are the poor in the Economic Pyramid?

7
Fortune at the Bottom, of the Pyramid, Chapter 1: Products and Services for the BOP

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-
Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1-1

Quote: More than 40 percent of India is media-dark, so TV- and radio-based massages are
inappropriate methods to reach these consumers and educate them on product and service
benefits. Not surprisingly, in BOP markets, education is a prerequisite to market development.
Consider, for examples, the incidence of stomach disorders among children, especially
diarrhea. More than 2 million children die of this malady every year, a totally preventable cause
of death.

What I expect to learn: To gain knowledge about Products and Services for the BOP

, learn and understand Products and Services for the BOP

Review:

This part of the chapter talks about Products and Services for the BOP. Focusing on
these 12 principles of innovation for BOP markets.

1. Focus on price performance of products and services


2. Innovation requires hybrid solutions.
3. Scalable and transportable operations across countries, cultures and languages.
4. Reduced resource intensity: eco-friendly products.
5. Radical product redesign from the beginning: marginal changes to existing Western
products will not work.
6. Build logistical and manufacturing infrastructure.
7. Deskill (services) work.
8. Educate (semiliterate) customers in product usage.
9. Products must work in hostile environments: noise, dust, unsanitary conditions,
abuse, electric blackouts, water pollution.
10. Adaptable user interface to heterogeneous consumer bases.
11. Distribution methods should be designed to reach both highly dispersed rural
markets and highly dense urban markets.
12. Focus on broad architecture, enabling quick and easy incorporation of new features.
This was created to make poor people be competitive and to show if it’s for all or to see prove if
it’s for wealthy people or poor people.

8
What I learned:

A philosophy for developing products and services for the BOP


The twelve principles of innovation for BOP markets
Making each of the principles happen
Price performance
Innovation hybrids
Scale of operations
Sustainable development: eco-friendly
Identifying functionality of developed markets
Process innovation
Deskilling of work
Education of customers
Designing for hostile infrastructure
Interfaces
Distribution by accessing the customer

Integrative Questions:

1. Define Price Performance?


2. Define Hybrid Solution?
3. Define Scalability?
4. Define Eco-Friendly?
5. Who is Prahalad?

9
Fortune at the Bottom, of the Pyramid, Chapter 1: A Global Opportunity

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-
Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1-1

Quote: The micro encapsulation of iodine in salt to preserve the iodine in the harsh conditions
of transportation, storage, and cooking in India has found market opportunities, storage, and
cooking in India has found market opportunities in Africa, especially in Ivory Coast Kenya, and
Tanzania. Iodine Deficiency Disorder (IDD) is common across the developing world, and the
solution found in India has been transported across other similar markets with IDD by Uniliver.

What I expect to learn: To gain knowledge about A Global Opportunity, learn and understand
A Global Opportunity

Review:

This part of the chapter talks about A Global Opportunity. This more on discuss the 12
innovative principles, where in it is used by 4 billion people as their livelihood or I guess some
where related to what I have said. It’s targeting the lower classes so they can have affluence.
With this the lower class will have knowledge or develops create more entrepreneurs –it’s like a
win-win situation because the government is handling poverty and by partnering with NGO
causes harmony and awareness to all the people.

What I learned:

Engaging the BOP


Local growth opportunities
Local innovations and global opportunity
BOP solutions for developed markets
Lessons for MNCs from BOP markets
Capital Intensity
Sustainable development
Innovations
The costs of managing
Learning to live in a network of relationships

Integrative Questions:

1. Why is BOP effective?


2. How can BOP become a global opportunity?
10
3. What do you mean by sustainable development?
4. What are those aid agencies helping the society today?
5. What principle is the least important among those 12?

Fortune at the Bottom, of the Pyramid, Chapter 1: The Ecosystem for Wealth Creation

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-
Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1-1

Quote: Underpinning this ecosystem is education across all levels. The individual’s
entrepreneur in the village-the Shakti Amma, for example- is being educated to be a responsible
entrepreneur. She learns about product, price, returns, and being an advisor and helpers to her
customer in the village. When I interviewed one Shakti Amma, who had been an entrepreneur
for less than six months, the impact of being part the ecosystem became obvious.

What I expect to learn: To gain knowledge about The Ecosystem for Wealth Creation, learn
and understand The Ecosystem for Wealth Creation.

Review:

This Part of the chapter talks about The Ecosystem for Wealth Creation. This mainly
discusses the companies that are renowned or so call the private sectors. Mainly talking about
the private sectors that targets profit and share their profit with the less fortunate with programs
like outreach or free etc, some people might think this is just a scam so they can gain profit but I
believe they are really trying to hard to help the poor.

What I learned:

Ecosystems for a developing country


Learning the sanctity of contracts
Reducing inequalities in contracts
Building governance capabilities among the poor
The essence of maturation model.
Organization of the group
Mobilizing the savings
Investing those savings
Access to bank capital
The ecosystem for wealth creation

Integrative Questions:

1. What are private sectors?

11
2. What are social organizations?
3. Examples of social organizations?
4. What was the symptom of a maturing economy?
5. Is it really necessary to mobilize the savings?

Fortune at the Bottom, of the Pyramid, Chapter 1: Reducing Corruption: Transaction


Governance Capacity

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-
Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1-1

Quote: Each country and economy might need a different portfolio of the elements of the TGC:
one size might not fit all. The goal is to increase the elements of the TGC of society in such a
way that a vibrant private sector can flourish. We need to recognize that each country is at a
different starting point.

What I expect to learn: To gain knowledge about Reducing Corruption: Transaction


Governance Capacity, learn and understand Reducing Corruption: Transaction Governance
Capacity.

Review:

That part of the chapter talks about Reducing Corruption: Transaction Governance
Capacity. This topic talks about corruption. My opinion about this is every country has graft and
corruption. No one is free from corruption but if people are corrupt it depends on the level of
corruption. For me it has a level of corruption that is practice for example the corruption in the
Philippines is greatly practice by the officials but in other countries like Singapore they are now
one of the great countries which is blooming. Philippines once was the best countries but it has
sink to its lowest because of corruption. Let me give the definition of Corruption from wikiepedia
- Corruption is essentially termed as an "impairment of integrity, virtue or moral principle;
depravity, decay, and/or an inducement to wrong by improper or unlawful means, a departure
from the original or from what is pure or correct, and/or an agency or influence that corrupts.
Basically that covers it.

What I learned:

Whether the poor are the poor


TGC
Building TGC
The Andhra Pradesh e-Governance Story
Intended transformation to citizen-centric governance

12
Corruption and e-governance
eSeva
centre for good governance
the good governance model
guiding principles of the CGG in Andhra Pradesh

Integrative Questions:

1. How do you define corruption?


2. What is TGC?
3. Are the poor really poor?
4. . How can we stop corruption?
5. What are private sectors?

13
Fortune at the Bottom, of the Pyramid, Chapter 1: Development as Social Transformation

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-
Publishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1-1

Quote: it’s natural for us to ask, “If the involvement of the private sectors in BOP markets can
have such a significant impact on social transformation, do we need check and balances?” Yes.
We need to make sure that no organization abuses its power and influence, be it corrupt
government or large firms. Fortunately, checks and balances are evolving rapidly.

What I expect to learn: To gain knowledge about Development as Social Transformation, learn
and understand Development as Social Transformation

Review:

That part of the chapter talks about Development as Social Transformation. This
chapter talks about change. As we all know corruption is hard to stop because it’s the discipline
of the people starting on oneself but if some how the people change their ways and tried to help
each other the world will be a better place. Also it discusses sector who stops corruption but still
my opinion if their doing their work to stop corruption in the Philippines, shouldn’t be any corrupt
people that will get away with graft but still there are only human. Also mainly the target of this
is the middle class and the lower class. So they would think that it’s better to be at the top of the
pyramid but still the minds of people is still trap that the upper class or the top of the pyramids is
the better life.

What I learned:

The transitions at the private sector and the BOP


Breaking down barriers to communication
BOP consumers upgrade
Gaining access to knowledge
Identity for the individual
Evolving checks and balances
The real test: from the pyramid to the diamond
The shape of rural income distribution

14
Integrative Questions:

1. Why should we alleviate corruption?


2. Where does BOP stand in all of these?
3. What does development as social transformation mean?
4. What are the roles of the business in stopping corruption?
5. Who should enforce the legal actions?

The Handbook of Information and


Computer Ethics

15
Chapter 1: Foundations of Information Ethics

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: Hacking, understood as the unauthorized access to a (usually

Computerized) information system, is another good example because it shows quite clearly the
change in perspective.

What I expect to learn: To know and gain knowledge about Foundations of Information Ethics

Review:

This chapter of the book is called Foundations of Information Ethics. I would like to say
this part “An information ethics should be able to address and solve the ethical challenges
arising in the infosphere.” I think this is somewhat right because we are in the information age
but nothing is what is seems. Because as said in the book the more the better or such as
information is given to you, like in some government movies for example “A Few Good Men by
Aaron Sorkin” jack Nicholson said “you want the truth, you can’t handle the truth”. Back to the
book, to much information is not good to your health because some information might be
useless or some are in a grave importance. My point is. Like Einstein’s letters “A human being is
part of the whole, called by us ‘universe,’ a part limited in time and space. He experiences
himself, his thoughts and feelings, as something separated from the rest, a kind of optical
delusion of his consciousness. This delusion is a kind of prison for us, restricting us to our
personal desires and to affection for a few persons close to us. Our task must be to free
ourselves from our prison by widening our circle of compassion to embrace all humanity and the
whole of nature in its beauty.” It saying that beauty can be appreciated but not alone can we see
it but sometimes we need some others point of view to see what is really the beauty that can be
seen. I believe that all people want to have company and don’t want to be alone. As stated in
virtue ethics what is right and wrong depends on the teaching.

16
What I learned:

IE AS AN ETHICS OF INFORMATIONAL RESOURCES


IE AS AN ETHICS OF INFORMATIONAL PRODUCTS
IE AS AN ETHICS OF THE INFORMATIONAL ENVIRONMENT
THE LIMITS OF ANY MICROETHICAL APPROACH TO INFORMATION ETHICS
INFORMATION ETHICS AS a MACROETHICS
Moral Agents
The Responsibilities of Human Agents
Four Moral Principles
TWO RECURRENT OBJECTIONS AGAINST IE
Is IE Inapplicable?
Does it Make Sense to Talk of Informational Entities and Agents?

Integrative Questions:

1. Does it Make Sense to Talk of Informational Entities and Agents?


2. Is IE Inapplicable?
3. What is information ethics?
4. What are the four moral principles?
5. What are the Responsibilities of Human Agents?

17
Chapter 2: Milestones in the History of Information and Computer Ethics

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: I wish to show that the human individual, capable of vast learning and study, which may
occupy almost half of his life, is physically equipped, as the ant is not, for this capacity. Variety
and possibility are inherent in the human sensorium—and is indeed the key to man’s most noble
flights—because variety and possibility belong to the very structure of the human organism.

What I expect to learn: to gain knowledge about the issue and to know the history of
information and computer ethics.

Review:

This chapter of the book is called Milestones in the History of Information and Computer
Ethics. The thought of information by Wiener was really extraordinary who too think that a man
in the time of world war two. But as said in the book “The academic field of information ethics
was born—unintentionally and almost Accidentally” saying it was accidentally but it really
revolutionize today’s times. Wiener revolutionizes the world of information and computer
because he was the one who created it. People at that time didn’t recognize the genius that he
had developed, not until decades and decades until our times have come. As the world grows,
the world changes as stated by Wiener “enormous potential for good and for evil” it will continue
to give great strength to the people at this information age and also weakness depending on the
use. People only react when they are affected if they don’t act meaning they don’t notice or they
are ignoring it but sometimes when people are greatly affected they tend to react. So they have
notice the changes because people through time grow or evolve into more. Information changes
and grows or evolves; the only constant in this world is change.

What I learned:

History of Information and Computer Ethics


18
NORBERT WIENER.S FOUNDATION OF INFORMATION ETHICS
Wiener.s Account of a Good Life
Wiener.s Information Ethics Methodology
COMPUTER ETHICS DEVELOPMENTS AFTER WIENER AND BEFORE MANER
WALTER MANER.S COMPUTER ETHICS INITIATIVE
DEBORAH JOHNSON.S INFLUENTIAL TEXTBOOK AND THE START OF THE
‘‘UNIQUENESS DEBATE’’
JAMES MOOR.S CLASSIC PAPER AND HIS INFLUENTIAL COMPUTER ETHICS THEORY
THE PROFESSIONAL-ETHICS APPROACH OF DONALD GOTTERBARN
COMPUTING AND HUMAN VALUES
LUCIANO FLORIDI’S INFORMATION ETHICS THEORY
THE EXPONENTIAL GROWTH OF COMPUTER ETHICS

Integrative Questions:

1. Who is NORBERT WIENER?


2. Who is JAMES MOOR?
3. Who is WALTER MANER?
4. Who is LUCIANO FLORIDI?
5. Who is DEBORAH JOHNSON?

19
Chapter 3: Moral Methodology and Information Technology

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: If moral philosophy were to get sidetracked by focusing on these examples in the real
world, it would be surely more interesting to try and think about how we could come up with
alternative designs of the situation and systems so as to prevent (1) loss of lives and (2) tragic
moral dilemmas, instead of looking at actors in tragic and dilemmatic situations where they have
to make choices at gunpoint with very little or no relevant information.

What I expect to learn: to gain knowledge about the topic and to learn Moral Methodology and
Information Technology

Review:

This topic Chapter talks about Moral Methodology and Information Technology. Moral
methodology talks are related to pastoral responsiveness but were not talking about that. The
discussion of moral methodology is kind of hard to understand but as the discussion moves
forward it goes to the topic of information technology. Defining moral methodology is kind of
your own views of something the combining it with an IT perspective. I think this topic talks
about IT and when to use morality because as stated in this chapter there are many issues in IT
that we have to understand. It’s more of a virtue ethics by Aristotle that the right and wrong
depends on the decision but how it will act. Example of the 10 commandments of computer
ethics is more like guidelines. Because in the decision what is right and what is wrong is more of
moral but in IT we use guide lines to prove what is right and wrong for me that is. Like for
copyright infringement and stealing there is a great difference but there are guidelines to prove
what will be the verdict.

What I learned:

20
Moral Methodology
APPLIED ETHICS
Generalism
Particularism
Reflective Equilibrium
THE DESIGN TURN IN APPLIED ETHICS
VALUE SENSITIVE DESIGN
PACS
Sinks
Real-Time Emergency Medicine
OTHER CONCEPTIONS OF METHOD IN COMPUTER ETHICS

Integrative Questions:

1. What is Moral Methodology?


2. What is APPLIED ETHICS?
3. What is Generalism?
4. Define PACS
5. Define SINKS

21
Chapter 4: Value Sensitive Design and Information Systems

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: In a narrow sense, the word “value” refers simply to the economic worth of an object.
For example, the value of a computer could be said to be $2000. However, in the work
described here, we use a broader meaning of the term wherein a value refers to what a person
or group of people consider important in life.1 In this sense, people find many things of value,
both lofty and mundane: their children, friendship, morning tea, education, art, a walk in the
woods, nice manners, good science, a wise leader, clean air.

What I expect to learn: To gain knowledge about Value Sensitive Design and Information
Systems, learn and understand Value Sensitive Design and Information Systems

Review:

This Chapter talks about Value Sensitive Design and Information Systems. Let’s first
discuss what Value Sensitive Design is, this is the first time I’ve heard about this Value
Sensitive Design. Value Sensitive Design is a theoretically grounded approach to the design of
technology that accounts for human values in a principled and comprehensive manner
throughout the design process. Meaning these talks about when designing o creating a
technology we need to have moral values, because we will be the ones who will develop the
technology for the benefit of humankind but it’s more of morality and conscience again virtue
ethics. From the value sensitive design when you define it it’s sensitive design to value what you
are developing or somewhat like that. When you look the ten commandments of computer
ethics, the 9th and 10th commandments is being portrayed that thou shall think about. . .
meaning thinking about not only for yourself but to the social order of everyone.

What I learned:

VALUE SENSITIVE DESIGN

22
Value
Related Approaches to Values and System Design
THE TRIPARTITE METHODOLOGY: CONCEPTUAL, EMPIRICAL, AND TECHNICAL
INVESTIGATIONS
Conceptual Investigations
Empirical Investigations
Technical Investigations
Multiple Empirical Methods
VALUE SENSITIVE DESIGN.S CONSTELLATION OF FEATURES
PRACTICAL SUGGESTIONS FOR USING VALUE SENSITIVE DESIGN

Integrative Questions:

1. What is Value Sensitive Design?


2. Define Value?
3. What does tripartite mean?
4. What does technical investigation mean?
5. Differentiate CONCEPTUAL, EMPIRICAL, AND TECHNICAL

23
Chapter 5: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual
Property

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: Certainly the promise of huge profits is part of what drives authors and inventors to burn
the midnight oil, but the promise need not be guaranteed by ownership. Fritz Machlup has
argued that patent protection is not needed as an incentive for corporations, in a competitive
market, to invest in the development of new products and processes.

What I expect to learn: To gain knowledge and to understand Justifications of Intellectual


Property, Also to learn Justifications of Intellectual Property.

Review:

This chapter talks about Personality-Based, Rule-Utilitarian, and Lockean Justifications


of Intellectual Property. Intellectual Property is the ownership of something thought in the mind.
It can be artistic and commercial as stated in the Wikipidia. Just to clarify things here the
definition by Wikipedia “Intellectual property (IP) are legal property rights over creations of the
mind, both artistic and commercial, and the corresponding fields of law.[1] Under intellectual
property law, owners are granted certain exclusive rights to a variety of intangible assets, such
as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases,
symbols, and designs. Common types of intellectual property include copyrights, trademarks,
patents, industrial design rights and trade secrets.” As I figured out right now this topic talks
about copyright. As said by adam moore that pirating or other forms of intellectual property
stating that authors and inventors who better our lives by creating intellectual works have rights
to control what they produce. This topic as I have said talks about Intellectual Property and how
to protect the rights of the developer or creator.

What I’ve learned:

Intellectual Property

24
PERSONALITY-BASED JUSTIFICATIONS OF INTELLECTUAL PROPERTY
THE RULE-UTILITARIAN INCENTIVES BASED ARGUMENT FOR INTELLECTUAL
PROPERTY
Problems for the Rule-Utilitarian Incentives Based Argument
Alternatives to Copyrights
Alternatives to Patents
Trade Secret and Social Utility
Long-Term Benefits
The Utilitarian Rejoinder
THE LOCKEAN JUSTIFICATION OF INTELLECTUAL PROPERTY
A Pareto-Based Proviso
Bettering, Worsening, and the Baseline Problem

Integrative Questions:

1. What are the Long-Term Benefits?


2. What is Intellectual Property?
3. Who is Adam Moore?
4. Who is Locke
5. What does Rule Utilitarian mean?

25
Chapter 6: Informational Privacy: Concepts, Theories, and Controversies

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: Philosophers generally distinguish between intrinsic values—that is, where some things
are valued for their own sake—and instrumental values, where things are valued because they
provide a means for achieving some end or end.

What I expect to learn: To Gain knowledge about Informational Privacy and to learn and
understand Informational Privacy

Review:

This Chapter talks about Informational Privacy: Concepts, Theories, and Controversies.
This topic talks particularly talks about privacy. Differentiating being left alone and having
privacy, such example given by this topic in the book, here are the major topics in this chapter.

Physical privacy as the freedom a person enjoys from sensory intrusion, which is
“achieved thanks to restrictions on others, Ability to have bodily interactions with (that person).”

Decisional privacy as “freedom from procedural interference . . . achieved thanks to the


exclusion of others from decisions (concerning, e.g., education, health care, career, work,
marriage, faith).

Psychological privacy (mental privacy”) as to describe “freedom from psychological


interference

Informational Privacy is private data like medical, records and etc. that only people who
are authorized can view it.

Also these topics were discussed lightly. I will quote the parts were in it was emphasized “We
also examined some ways in which some relatively recent information/computer technologies
have introduced informational privacy concerns that affect four broad categories: consumer

26
privacy, medical privacy, employee privacy, and location privacy. Finally, we considered some
proposals for comprehensive policies that aim at protecting informational privacy.”

What I learned:

Physical privacy
Decisional privacy
Psychological privacy
Informational Privacy
THE CONCEPT OF PRIVACY
Unitary, Derivative, and Cluster Definitions of Privacy
Interest-Based Conceptions versus Rights-Based Conceptions of Privacy
FOUR DISTINCT KINDS OF PRIVACY: PHYSICAL/ACCESSIBILITY, DECISIONAL,
PSYCHOLOGICAL/MENTAL, AND INFORMATIONAL PRIVACY
Privacy as Non intrusion involving one’s Physical Space: Physical/Accessibility Privacy
Privacy as Noninterference Involving One’s Choices: Decisional Privacy
Privacy as Non intrusion/Noninterference Involving One’s Thoughts and One’s Personal
Identity: Psychological/Mental Privacy
Privacy as Having Control Over/Limiting Access to One. Personal Information: Informational
Privacy
THEORIES OF INFORMATIONAL PRIVACY
The Restricted Access Theory
The Control Theory
The Restricted Access/Limited Control (RALC) Theory
Three ‘‘Benchmark Theories” of Informational Privacy
Privacy as Contextual Integrity
An “Ontological Interpretation” of Informational Privacy
Categorial Privacy

Integrative Questions:

1. Why is Privacy Valued?


2. What Kind of Value is Privacy?
3. What is Physical privacy?
4. What is Psychological privacy?
5. What are the concepts of CONCEPT OF PRIVACY?

27
Chapter 7: Online Anonymity

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: Anonymity is achievable because there are ways in which persons can deliberately set
up mechanisms by which to block the coordination of their traits with others. But anonymity may
also occur “spontaneously,” as noted earlier. In some contexts, for instance in complex modern
life, where persons may occupy many social orders that do not overlap or are not connected
with one another, traits that identify a person in one social order may not be readily coordinately
with traits that are salient in another social order.

What I expect to learn: to gain knowledge about Online Anonymity, to understand and to learn
Online Anonymity.

Review:

This Chapter talks about Online Anonymity. Let us define first what is Anonymity is
derived from the Greek word meaning "without a name" or "namelessness". In colloquial use,
the term typically refers to a person, and often means that the personal identity, or personally
identifiable information of that person is not known (based on wikipedia) basically it talks about
having privacy or protecting your identity.

(1) Anonymity for the sake of furthering action by the anonymous person, or agent
anonymity;

(2) Anonymity for the sake of preventing or protecting the anonymous person from
actions by others, or recipient anonymity;

(3) Anonymity for the sake of a process, or process anonymity.

This topic was also discussed in the book:

28
(1)With anonymity for the sake of enabling action the action could be good, bad, or
neutral, and presumably ethical evaluation of any given case will depend on the particular action
or range of action that anonymity enables. Meaning the people who has Anonymity doesn’t want
to be recognizing by their action even if it’s a good motives.

(2) Anonymity could serve the primary purpose of preventing actions by others or more
generally protecting the anonymous person from being the recipient of actions by others, hence,
for short, “recipient anonymity. These protect people from discrimination because some people
become racist or when you have a disease the person will be treated unfairly.

(3) Anonymity could also be for the sake of preserving the validity of a process. This is
the type of case where the anonymity is primarily or also for the purpose of some other goal
than enabling or protecting particular (anonymous) person(s). This is for protecting people who
are without bias and without taking sides

What I’ve learned:

Online Anonymity
ANONYMITY AS A FEATURE OF COMPLEX SOCIAL STRUCTURES
THE CONCEPT OF ANONYMITY
ANONYMITY AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY
Data Mining, Tracking, and User’s Presumption of Anonymity
Anonymity and Attribution Bias
Anonymity and Expression of Self
Globalization of Online Activity
Anonymity and Identity Theft
PURPOSES AND ETHICS OF ANONYMITY

Integrative Questions:

1. What is Online Anonymity?


2. Who Luciano Floridi is?
3. What is the purposes anonymity?
4. Define Identity Theft?
5. What is the Concept of Anonymity?

29
Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and
Counterkacking

Quote: Nevertheless, intrusions intended to cause harm out of malice are generally wrong.
Although it is sometimes permissible to inflict harm on another person when necessary to
secure a greater good, a malicious intention does not seek a greater good. This is not to say
that it is necessarily wrong for one party to hack into another party.scomputer for the purpose of
causing harm.

What I expect to learn: to gain knowledge about Computer Security: Hacking, Hacktivism, and
Counterkacking, to learn and understand the issues under Computer Security: Hacking,
Hacktivism, and Counterkacking.

Review:

This Chapter talks about Computer Security: Hacking, Hacktivism, and Counterkacking. I
think this is one of the key topics of this book because as we all know there are type of hacker
for example the hacktivist, ethical hackers and so on and so on. We all know trespassing is
against the law but is trespassing in your computer or so call hacking to your computer is bad. It
said in the book that it depends on the situation why are you hacking. If you’re hacking to get
some or prove justice then you’re a white hacker but if you’re doing it for self interest then
otherwise. The whole idea of this topic that cyber trespassing is bad as the same as trespassing
physically. Civil Disobedience (CD) is spreading as people said CD there is nothing wrong on
doing this because some government are just to tight that even some small features for
example friendster in china it is banned. So in some areas hacking is good but discussing this
morally it goes to depending on what your are doing. People who do hacking should be
accountable for their action. They should states what they are. If they are a cracker or a cyber
terrorist.

What I’ve learned:

THE PRIMA FACIE CASE AGAINST HACKING


OVERCOMING THE PRIMA FACIE CASE: HACKING MOTIVATED BY BENIGN PURPOSES
The Social Benefits of Benign Intrusions
Benign Intrusions as Preventing Waste

30
Benign Intrusions as Exercising the Right to a Free Flow of Content
HACKTIVISM: HACKING AS POLITICALLY MOTIVATED ACTIVISM AND CIVIL
DISOBEDIENCE
CD and Morality
Hacktivism
Hacktivism Morally Justified as CD
HACKING BACK: ACTIVE RESPONSE TO COMPUTER INTRUSIONS
The Active Response Spectrum
Relevant Moral Principles
A Principle Allowing Force in Defense of Self and Others
Integrative Questions:

1. Define Hacktivism?
2. What is Hacktivism?
3. What is CD?
4. What are the Relevant Moral Principles?
5. What is a cracker?

31
Chapter 9: Information Ethics and the Library Profession

Quote: While we do not wish to take a position on the controversies concerning how to define
information, for the purposes of this discussion, we will use information to mean “meaningful
data” (see Fetzer (2004)). Thus, we are not limiting “information” to content that is accurate (see
Floridi (2005)), for this would exclude too much of what information professionals do.

What I expect to learn: to gain knowledge about Information Ethics and the Library Profession,
learn and understand the Information Ethics and the Library Profession.

Review:

This chapter talks about Information Ethics and the Library Profession. Let me first
define what a librarian is. A librarian is one who organizing and colleting information. In short
librarian gives information to people who are looking for knowledge. There was one cartoon that
I watch the old definition of a librarian I think? It was an all knowing being. That he collect
information and stores it in his library. To put short librarians are the one who stores knowledge
and to preserve. This means not only by storing knowledge but preserving it. The concept of it is
the librarian task is different that defining it there are many kinds of librarian and has many
definitions. Public librarian also are affected by ethical issues same as the other. I will also give
the five laws of library science.

(1) Books are for use.

(2) Every person his or her book.

(3) Every book its reader.

(4) Save the time of the reader.

(5) The library is a growing organism.

What I’ve learned:

THE CORE VALUE OF THE LIBRARY PROFESSION


SELECTION, BIAS, AND NEUTRALITY
CLASSIFICATION AND LABELING
32
CHILDREN’S ACCESS TO INFORMATION

Integrative Questions:

1. What is a Library Profession?


2. What is a Librarian?
3. What is the difference of a public librarian and corporate librarian?
4. What are the five laws of library science?
5. What does a librarian do?

Chapter 10: Ethical Interest in Free and Open Source Software

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: The fact that this bazaar style seemed to work, and work well, came as a distinct shock.
As I learned my way around, I worked hard not just at individual projects, but also at trying to
understand why the Linux world not only didn’t fly apart in confusion but seemed to go from
strength to strength at a speed barely imaginable to cathedral-builders.

What I expect to learn: to gain knowledge about Ethical Interest in Free and Open Source
Software, learn and understand Ethical Interest in Free and Open Source Software.

Review:

This Chapter talks about Ethical Interest in Free and Open Source Software.

To start this chapter let first define what open source is, in my own definition it’s for all meaning
all can access but to be more specific here the definition by wikipedia “Open source is an
approach to design, development, and distribution offering practical accessibility to a product's
source (goods and knowledge). Some consider open source as one of various possible design
approaches, while others consider it a critical strategic element of their operations.” Then Free
software “Free software or software libre is software that can be used, studied, and modified
without restriction, and which can be copied and redistributed in modified or unmodified form
either without restriction, or with minimal restrictions only to ensure that further recipients can
also do these things and to prevent consumer-facing hardware manufacturers from preventing
user modifications to their hardware. Free software is available gratis (free of charge) in most
cases. Richard Stallman was the developer of FS but people are criticizing both FS and OS. I
think this topic is more about the money but Richard Stallman said that “the golden rule requires
that if I like a program, I must share it with other people who like it.” He also stressed out that
programmers have the duty to write free software that selling those is morally wrong and that is
33
what he meant when he said “people who make their profit out of the programs their created
making other people not share their programs. Personally I have heard that programming was
at first was just a game but many people take it as a career for profit but Richard Stallman said
that if you profit from this it lowers the sympathy for knowledge and humane. OSS now is Eric
Raymond and Bruce Perens were they are telling the people they are obligated to share their
programs

What I’ve learned:

Opensource
Free Software
The History of Free and Open Source Software
Critiques of Free and Open Source Software
The Controversy Regarding GPL Version 3
WHY OSS FLOURISHES
The Motivations of OSS Developers
Autonomy
Open Source and Accountability
The Ethical Responsibilities of Software Developers
The Quality of OSS

Integrative Questions:

1. What is a Free Software?


2. What is an Open Source Software?
3. What is Autonomy?
4. Who are Eric Raymond and Bruce Perens?
5. who is Richard Stallman

34
Chapter 11: Internet Research Ethics: The Field and Its Critical Issues

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: A key decision for Internet researchers is often discipline based, that is, do we treat our
“subjects” as subjects (as is characteristic of the social sciences) and thereby invoke familiar
human subjects protections, and/or do we treat our “subjects” as posters, as authors (as is
characteristic of the humanities)? If the latter is the case, then far from emphasizing the need for
anonymity and confidentiality, we are rather dealing with posters who intend to act as public
agents online.

What I expect to learn: to gain knowledge about Internet Research Ethics: The Field and Its
Critical Issues learn and understand Internet Research Ethics: The Field and Its Critical Issues.

Review:

This chapter talks about Internet Research Ethics: The Field and Its Critical Issues. This
talks about using IRE for research purposes. From the past that people who doesn’t use internet
to the age of now. Basically people now want to develop to develop more protocols, evaluation
for web based because times have changes and the ethics before need to be modified for the
information age. Also they want to extinct the hard copy information such as book and turn into
soft copy. It’s a known fact it will be close to that, to make it online and virtual accessible to
anyone.

This chapter also talks about our previous topics and the challenges about privacy,
anonymity, copyright and many more.

35
Also this chapter talks about social networks where million and millions of people were
suck into it because games and social interactivity but the question is their privacy protected.

What I’ve learned:

BACKGROUND AND MAJOR ISSUES IN THE LITERATURE


Philosophical Foundations: Sources, Frameworks, and Initial Considerations
Emerging issues
Copyright
Research with Minors
Recruitment
Revealing Identities
Public versus Private Spaces

Integrative Questions:

1. What is Revealing of Identities?


2. What are the emerging issues?
3. What is IRE?
4. What is CFR?
5. What is deontology?

36
Chapter 12: Health Information Technology: Challenges in Ethics, Science, and Uncertainty

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: It is sadly and too often the case that many professionals regard ethics as a source of
codes for the edification of the not-yet-virtuous, as a place where pointy-headed boffins pass
judgment on heathens, as an office to call in search of someone with a horse and a sword to
come .round to smite the evildoers.

What I expect to learn: to gain knowledge about Health Information Technology: Challenges in
Ethics, Science, and Uncertainty, to learn and understand Health Information Technology:
Challenges in Ethics, Science, and Uncertainty.

Review:

This chapter talks about Health Information Technology: Challenges in Ethics, Science,
and Uncertainty. This topic is more of a knowledge seeking. Because some people as we all
know having an edge over people is some perspective. By using this uncertainty reduction,
ethically reasonable principles, and professional standards.

Also Goodman said that ethics or science answers our question depending on what our
perspective is. When science can’t answer it we go to ethics and goes like a circle that
circulates. This improves our understanding of things. As said by Walt Disney “keep moving
forward” as we fail we learn, to gain success is good but we learn nothing.

37
Define what a tool is to be used by people but some people just criticize the value of a
tool. But the tool is still being used even if criticize. It goes to show that even if people judge
things they still look at it blindly that it is still useful.

What I’ve learned:

PRIVACY AND CONFIDENTIALITY


CLINICAL DECISION SUPPORT SYSTEMS
Diagnostic Expert Systems
Prognostic Scoring Systems
‘‘The Standard View” and ‘‘Progressive Caution”
PERSONAL HEALTH RECORDS
Decision support
Status of the professions

Integrative Questions:

1. What is privacy?
2. What is confidentiality?
3. What is the clinical decision support system?
4. What is Decision Support
5. Define Status of the professions?

38
Chapter 13: Ethical Issues of Information and Business

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: One needs to be aware that this is not the only interpretation of the shareholder
concept. An alternative interpretation is that it is meant to strengthen the interest of the
shareholders against the power of management. This can be ethically motivated, and the term
“shareholder value” then stands for a defense against managerial excesses. In public debate
this understanding is not as present as the one outlined above.

What I expect to learn: to gain knowledge about Ethical Issues of Information and Business,
learn and to understand Ethical Issues of Information and Business.

Review:

This chapter talks about Ethical Issues of Information and Business. If you read this part
of the book you can see this is the part of cause and effect of ethics in the business. Privacy is
the big issue and intellectual property, because in IT there is more to it than the gadgets and etc
it revolves in the business, to above the competitors you have to be more self-sufficient and has
a game plan or strategy. According to Bernd Carsten Stahl “ethics is arguably more about
raising questions than giving answers” this means ethics can easily be answer so people think
of question so they can prevent. Being more annalistic meaning you can see more of the big
picture. When you this it raise your awareness about what is happening to your surrounding. In

39
this you use this three central approaches “the corporate social responsibility approach, shared
values and norms, and stakeholder approach.” So with this approaches we increase social
awareness that give idea to people so they can tell what they believe in. meaning it sharpens
their mind and gives open to opinion so they can prove what right and what is wrong.

What I’ve learned:

APPROACHES TO ETHICAL ISSUES IN BUSINESS AND INFORMATION


The Concept of Business
Business Ethics
Shareholders and Stakeholders
Shared Norms and Values
Business Ethics and Computer Ethics
MICROLEVEL INFLUENCE OF BUSINESS ON ETHICS AND INFORMATION
The Impact of Business on Privacy: Employee Surveillance
The Ethical Response to Employee Surveillance
The Three Central Approaches
The Impact of Business on Intellectual Property
The Ethical Response to Intellectual Property Protection
THE MACROLEVEL INFLUENCE OF BUSINESS ON ETHICS AND INFORMATION

Integrative Questions:

1. What is business Ethics?


2. Who is Bernd Carsten Stahl?
3. What are the Three Central Approaches
4. What is Employee Surveillance?
5. What is Computer Ethics?

40
Chapter 14: Responsibilities for Information on the Internet

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: Some purposes and objectives can be presumed to belong to all or most members of
the human species, communities, and groups on the basis of their characteristics and needs.
Thus, information can be functional merely for specific individuals, or it can be functional for
everyone or for groups of people.

What I expect to learn: to gain knowledge about Responsibilities for Information on the
Internet, learn and understand Responsibilities for Information on the Internet.

Review:

This Chapter talks about Responsibilities for Information on the Internet. For me I think
there is still no law for the internet because the law for legal is just being use as guidelines for
the internet. Because still there are some act in the internet that are not tolerated, I know I am
being bias because in legal law there are still act that are not punishable but still in the internet
there are more things that are not tolerated and justified by the law. Again in the 10
commandments of computer the 9th and 10th says thou shall think about meaning it’s still a
decision by the person. Also I will point out the two major problems of reliability.

(a) People lack the necessary expertise to assess information on the basis of content
criteria, and they also lack the necessary expertise to assess information on the basis of
41
pedigree criteria. In this case, the problems are due to a lack of competence of the
users.

(b) People lack the expertise to assess information on the basis of content criteria, and it is
impossible for them to test the information with the help of pedigree criteria. This is the
case when the users are, in principle, competent in using pedigree criteria, but the
information is presented in such a way that there are no indicators or markers of
conformity with pedigree criteria.

Also I would like to point out what to do when encountering incompetent users

(1) The creation of new credibility-conferring systems, such as certification systems, allowing
us to use pedigree criteria with regard to (online) information, when such systems are
lacking.

(2) Raising the visibility of indicators or markers of reliability of information (according to


pedigree criteria).

(3) Raising expertise and background knowledge in all users (to enable them to recognize
reliability on the basis of pedigree criteria).

(4) Raising the awareness of the varying qualities of information.

I pointed this out because some people are just plain stubborn that they just ignore the
information given and blame the system, I am talking based on my experience because some
people just criticize not knowing all the information in short some people are just two judgmental

What I’ve learned:

CONDITIONS OF RESPONSIBILITY
ISPs AND CLEARLY HARMFUL OR OFFENSIVE INFORMATION
INFORMATION IN GENERAL
THE RESPONSIBILITIES INVOLVED

Integrative Questions:

1. What are the conditions for Responsibility?


2. What are the two major problems of reliability?
3. Who is Anton Vedder?
4. What are the responsibilities involved?
5. What is information in general?

42
Chapter 15: Virtual Reality and Computer Simulation

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: In the computer era, the word “virtual” came to refer to things simulated by a computer,
like virtual memory, which is memory that is not actually built into a processor but nevertheless
functions as such. Later, the scope of the term “virtual” has expanded to include anything that is
created or carried by a computer and that mimics a “real” equivalent, like a virtual library and a
virtual group meeting. The computer based meaning of “virtual” conforms more to the traditional
meaning of “virtual” as “practically but not formally real” than with “unreal.

What I expect to learn: to gain knowledge about Virtual Reality and Computer Simulation, to
learn and understand Virtual Reality and Computer Simulation.

Review:

This topic talks about Virtual Reality and Computer Simulation. My opinion for this is
topic extraordinary. The first thing that comes in my mind is that Virtual Reality is like a world
that is another to make it thing simple another world and the computer simulation is the law
inside the virtual reality. Let’s briefly discussed what and the discovery of virtual reality based
from the book - Virtual reality (VR) technology emerged in the 1980s, with the development and
marketing of systems consisting of a head-mounted display (HMD) and data suit or data glove
attached to a computer. These technologies simulated three-dimensional (3D) environments

43
displayed in surround stereoscopic vision on the head-mounted display. The user could
navigate and interact with simulated environments through the data suit and data glove, items
that tracked the positions and motions of body parts and allowed the computer to modify its
output depending on the recorded positions. Basically to define it is just a Sci-Fi where in you
are in a game; you can interact with people or do what ever you want. And this chapter I only
discussed the main topic I didn’t discussed the dark side of Virtual Reality for example Virtual
Pornography and Scamming.

What I’ve learned:

BACKGROUND: THE TECHNOLOGY AND ITS APPLICATIONS


Virtual Reality
Computer Simulation
Applications
The Distinction between the Virtual and the Real
Evaluating the Virtual as a Substitute for the Real

REPRESENTATION AND SIMULATION: ETHICAL ISSUES


Misrepresentations, Biased Representations, and Indecent Representations
Virtual Child Pornography
Depiction of Real Persons
BEHAVIOR IN VIRTUAL ENVIRONMENTS: ETHICAL ISSUES
Avatars, Agency, and Identity
Behavior in Single-User VR
VIRTUAL REALITY, SIMULATION, AND PROFESSIONAL ETHICS
Computer Games and Values

Integrative Questions:

1. What is Virtual Reality


2. What is Computer Simulation?
3. Who is Philip Brey?
4. Virtual Child Pornography
5. What are the Computer Games and Values?

44
Chapter 16: Genetic Information: Epistemological and Ethical Issues

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: In Shannon and Weaver, “Noise” means anything that corrupts information as it moves
along a communication channel. More recently, it has been used to refer to the degradation of
information, not only during transmission, but also during storage, whether in magnetic memory
or in molecules of DNA

(Johnson, 1987).

What I expect to learn: to gain knowledge about Genetic Information: Epistemological and
Ethical Issues learn and understand Genetic Information: Epistemological and Ethical Issues.

Review:

This Chapter Talks about Genetic Information: Epistemological and Ethical Issues. This
topic very complex to explain but Ill gives my best to explain it to put it simple. Based on what
Antonio Marturano said – that if molecular biology is being misused there will be an effect on
people or consequence. Basically in short there is consequence as said. In his own words he
said that - The idea of “genetic information” (Fig. 16.1) is that genes containing an amount of
information (the so-called TACG amino acids sequence) and able to build a human being up is
45
today a seldom challenged triviality. This idea is fundamental to the so called “Central Dogma”
of genetics. The “Central Dogma”, as originally formulated by Crick, is a negative hypothesis,
which states that information cannot flow downward from protein to DNA. This really hard to
understand but base on my intellect that DNA or are so called genetics are information that is
stored but if the technology used to it is bad, the consequence can be very bad. Or some what
like that.

What I’ve learned:

INFORMATION THEORY AND THE NOTION OF GENETIC INFORMATION


The Concept of Information
The Notion of Genetic Information
A SEMANTIC OR A SYNTACTIC THEORY OF GENETIC INFORMATION
THE CELL AS COMPUTER MACHINERY
ETHICAL PROBLEMS OF GENETIC INFORMATION

Integrative Questions:

1. Who is Antonio Marturano?


2. What is “Central Dogma” of genetics?
3. What was formulated by Crick?
4. What does Genetic Information mean?
5. What did Berlinski contribute?

46
Chapter 17: The Ethics of Cyber Conflict

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: The Security Council shall determine the existence of any threat to the peace, breach of
the peace, or act of aggression and shall make recommendations, or decide what measures
shall be taken in accordance with Articles 41 and 42, to maintain or restore international peace
and security.

What I expect to learn: to gain knowledge about The Ethics of Cyber Conflict, learn and
understand The Ethics of Cyber Conflict Ethical Issues.

Review:

This Topic talks about The Ethics of Cyber Conflict. Mainly there are three topics cyber
warfare at the state level, hacktivism conducted by non-state actors, and active response. If you have
watch die hard 3.0 you will know the consequence of this cyber terrorism and etc. lets start with cyber
warfare at the state level, people might say that this treat is minimal that no will get hurt but cyber warfare
at the state level is really a bad things because it would attack you physically but will attack you internally
just like a virus because it’s a crisis not only you but the whole nation will suffer. They would drop bombs
that will kill thousands but the catch is all the people in your country or the world will suffer. The second
topic is hacktivism, let me discuss “Hack back” is a form of active response that uses hacking to counter a

47
cyber attack. Basically it the opposite of hack back is hacktivism. There are two principal two track
hacking. The first involves using invasive tracebacks in order to locate the source of an attack. The
second involves striking back at an attacking machine in order to shut it down or at least cause it to stop
attacking.

What I’ve learned:

CYBER WARFARE AT THE STATE LEVEL


Jus ad Bellum—The Law of Conflict Management
Jus in Bello—the Law of War
CYBER ATTACKS BY NONSTATE ACTORS
Just Cause for Hacktivism
Conduct of Hacktivism
Other Ethical Frameworks for Hacktivism
ACTIVE RESPONSE AND HACK BACK
Hack Back and Force
Conduct of Hack Back

Integrative Questions:

1. What is CYBER WARFARE?


2. What is hacktivism?
3. What is Cyber terrorism?
4. What are the two principles of Back Hack?
5. What is Jus in Bello?

48
Chapter 18: A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: During this phase the Positive Modification Form is revisited to tidy up the positive
suggestions before turning the document over to management for further review. The results of
each inspection are used to modify the inspection process details for subsequent inspections.
The addition of identified concerns to the inspection model for a particular sector, project, or
context is consistent with and supports a continuous process improvement strategy such as the
CMM or CMMI

(Paulk, 1995).

What I expect to learn: to gain knowledge about A Practical Mechanism for Ethical Risk
Assessment—A SoDIS Inspection, learn and understand A Practical Mechanism for Ethical Risk
Assessment—A SoDIS Inspection

Review:

This Chapter talks about A Practical Mechanism for Ethical Risk Assessment—A SoDIS
Inspection. My own principle is we all have a choice but sometimes ironically the choice
chooses for us. This topic talks about developing SoDIS. Let me define SoDIS - Software
49
Development Impact Statement. It was developed because like an environmental impact
statement, is used to identify potential negative impacts of a proposed system and specify
actions that will mediate those impacts a SoDIS is intended to assess impacts arising from both
the software development process and the more general obligations to various stakeholders.

What I’ve learned:

EVOLVING PRACTICES FOR RISK ASSESSMENT


Limitations of the Generic Standards
Ethical Risks
SODIS AUDIT PROCESS
Software Development Impact Statemen
Stakeholder Identification
SoDIS Stakeholders Identification
Identification of Tasks or Requirements
Identify Potential Ethical Issues
RESEARCH PROJECT
The Inspection Process

Integrative Questions:

1. What is SoDIS?
2. What is Risk Assessment?
3. Who is Don Gotterbarn?
4. How do you identify a stake holder?
5. How do you process SoDIS Audit?

50
Chapter 19: Regulation and Governance of the Internet

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: “Never before had the processing of material flows threatened to exceed, in both
volume and speed, the capacity of technology to contain them. For centuries most goods had
moved with the speed of draft animals down roadway and canal, weather permitting. This
infrastructure, controlled by small organizations of only a few hierarchical levels, supported even
national economies. Suddenly—owing to the harnessing of steam power—goods could be
moved at the full speed of industrial production, night and day and under virtually any
conditions, not only from town to town but across entire continents and around the world.”

What I expect to learn: to gain knowledge about Regulation and Governance of the Internet,
learn and understand Regulation and Governance of the Internet.

Review:

This Chapter talks about Regulation and Governance of the Internet. Obviously we have
to know or we have to justify the use of internet. Someone to maintain and govern the internet,
to give justice I think; because without regulation it would be chaos and disaster. Out of the
internet we have rules and regulation to justify the act. We are lid by the president of our

51
country. Same as the internet someone must govern the internet for things that are happening
in the web.

What I’ve learned:


CONTENT REGULATION
EFFECTIVE REGULATION
REGULATION: TECHNICAL ISSUES
THE CURRENT SITUATION
ACROSS BORDERS
INTERNET REGULATION: NORMATIVE ISSUES
CENSORSHIP
REGULATION OF THE INTERNET: MORAL ARGUMENTS
REGULATION AND EFFICIENCY
REGULATION ACROSS LEGAL JURISDICTIONS

Integrative Questions:

1. What is Content Regulation?


2. What is effective regulation?
3. What is Censorship?
4. Why do we need Governance in the internet?
5. What are the technical issues

52
Chapter 20: Information Overload

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: “It is worth noting the terminological anachronism deployed by this group of historians in
the application of the rubric of .information overload. To the early modern period. The word
information. Itself appears little if at all in the sources to which these historians refer. Indeed, the
use of .information. To mean something abstract and quantifiable (rather than particular
knowledge) does not appear until the early twentieth century, and the usage .information
overload. is even later

-Rosenberg

What I expect to learn: to gain knowledge about Information Overload, learn and understand
Information Overload

Review:

This Chapter talks about Information Overload. Let us first define information overload,
for me information overload is you have too much info or to much data that you can’t store it

53
anymore but based on the book Information Overload is Exposure to or provision of too much
information; a problematic situation or state of mental stress arising from this (June 11, 2007)]..
Refers to the state of having too much information to make a decision or remain informed about
a topic. Large amounts of historical information to dig through, a high rate of new information
being added, contradictions in available information, and a low signal-to-noise ratio make it
difficult to identify what information is relevant to the decision. The lack of a method for
comparing and processing different kinds of information can also contribute to this effect.
[Wikipedia, retrieved (June 11, 2007)]. According to David M. Levy that Information overload, as
we have seen, involves more than just the exposure of an agent to excessive amounts of
information: that agent must also suffer certain negative effects as a result. Meaning sometimes
we have to experience to know things.

What I’ve learned:

INFORMATION OVERLOAD
More than Information
A BRIEF HISTORY OF THE PHRASE
CAUSES OF INFORMATION OVERLOAD
CONSEQUENCES OF INFORMATION OVERLOAD

Integrative Questions:

1. WHAT IS INFORMATION OVERLOAD?


2. What is Information?
3. What is Reality?
4. What is Ever-Present Phenomenon?
5. Who is David M. Levy

54
Chapter 21: Email Spam

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: In ethical analysis, there is a three-part division of policies: some that virtually everyone
would impartially accept as an ethical public policy (e.g., sending a friendly birthday email to
one’s parents), some that virtually nobody would accept as an ethical public policy (e.g.,
sending a virus in an email that destroys the receiver’s hard disk), and some about which there
is disagreement as to whether they should be accepted as ethical public policy (e.g., NF-
UCBE).

What I expect to learn: to gain knowledge about Email Spam, learn and understand about
Email Spam.

Review:

This Chapter talks about Email Spam. Based on my experience this is very annoying
and sometimes it just flooding. I don’t really know how the spam was sent to my email but

55
sometimes the reasons is the organization or group was sent by an unknown member. Basically
let’s define Email Spam definition from Wikipedia - also known as junk e-mail, is a subset of
spam that involves nearly identical messages sent to numerous recipients by e-mail. A common
synonym for spam is unsolicited bulk e-mail (UBE). Definitions of spam usually include the
aspects that email is unsolicited and sent in bulk. "UCE" refers specifically to unsolicited
commercial e-mail. As said by Wikipedia it’s junk mail. This chapter also discusses the kinds of
spam more of the content of the spam were in sometimes it may contain junk or useless
information to the user and sometimes a virus that affect your computer. Some spam are
indorsing their product or people but the dark side of that is sometimes of spam mail that gives
information are used for fraud or tricking people. It’s really easy to identify a spam but people
who are not IT oriented can be easily fooled.

What I’ve learned:

A SHORT HISTORY OF THE TERM ‘‘SPAM’’


Intent of the Sender
Consequences to the Receiver
Consent of the Receiver
Relationship between the Sender and the Receiver
Number of Identical Emails Sent
Illegality
ENVISIONING THE SPAM SPACE: SPECIFIC EMAILS EXHIBIT COMBINATIONS OF
CHARACTERISTICS
Deceptive Emails Meant to Defraud Are Condemned, Spam or Not
Emails Between Well-Meaning Friends Are Probably Not Spam
THE ETHICS OF ANTISPAM MEASURES
The Ethics of Doing Nothing
Require Authentication Before Email Is Delivered
Changing the Economics of Email

Integrative Questions:

1. What is Spam?
2. What are the content of Spam?
3. Who is Keith W. Miller?
4. Why do people sent Spam?
5. What the intent of the sender of spam email?

56
Chapter 22: The Matter of Plagiarism: What, Why, and If

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: A particularly important form of non infringing plagiarism concerns the use of ideas
when there is no copy of the form of expression. Intrinsic to the theory of copyright law is the
claim that copyrights may not impede the free expression of ideas that, in the United States
anyway, are seen as central to an extremely important right to “free speech.” To take a very
recent example, the author of the popular novel The Da Vinci Code was sued under copyright
law for taking without authorization the plot idea that Jesus Christ fathered children by Mary
Magdalene. But to claim authority to authorize use of this “idea” would restrict that free
discussion of the idea that is seen as a central value of free society. Discussion of this idea
should not be a copyright infringement. But it might be scholarly plagiarism all the same.

What I expect to learn: to gain knowledge about The Matter of Plagiarism: What, Why, and If,
learn and understand about The Matter of Plagiarism: What, Why, and If.

Review:
57
This chapter talks about The Matter of Plagiarism: What, Why, and If. Some people
confuse Plagiarism to Copyright Infringement. They are not the same. Let me first give definition
to the two so we can understand it well. This definition is from wikipedia - Plagiarism is the use
or close imitation of the language and ideas of another author and representation of them as
one's own original work. While Copy Right Infringement is based from Wikipedia again -
Copyright infringement (or copyright violation) is the unauthorized use of material that is covered
by copyright law, in a manner that violates one of the copyright owner's exclusive rights, such as
the right to reproduce or perform the copyrighted work, or to make derivative works. Basically
they two different things, because Plegarism based on the definition is saying that someone
idea or stuff is yours that stealing but copyright infringement is unauthorized use of the material
basically it’s telling us improper use without the author or creators consent is Copyright
infringement but to prove if it’s being infringe there is check list to prove if it’s violate the
copyright law.

What I’ve learned:

THE CONCEPT OF PLAGIARISM


LACK OF AUTHORIZATION—ECONOMIC FOUNDATIONS
LACK OF AUTHORIZATION—NATURAL OR MORAL RIGHTS
LACK OF ACCREDITATION—NONINFRINGING PLAGIARISM
A PERSONAL VIEW OF THE MATTER
LITERATURE REVIEW

Integrative Questions:

1. What is Plagiarism?
2. What is Copyright Infringement?
3. Differentiate Plagiarism and Copyright Infringement?
4. Why do people plagiarize?
5. What could be author’s view in this matter?

58
Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File Sharing

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: all the goods of the Information Age—all of the expressions once contained in books or
film strips or newsletters—will exist as thought or something very much like thought: voltage
conditions darting around the Net at the speed of light, in conditions that one might behold in
effect, as glowing pixels or transmitted sounds, but never touch or claim to “own” in the old
sense of the word.

What I expect to learn: to gain knowledge about Intellectual Property: Legal and Moral
Challenges of Online File Sharing learn and understand about Intellectual Property: Legal and
Moral Challenges of Online File Sharing

Review:

These Chapter talks about Intellectual Property: Legal and Moral Challenges of Online
File Sharing. A question that hit us all would you buy a branded stuff or download it for free

59
basically almost everyone will say get I want it for free. Basically the big thing in this topic is that
some of the stuff from companies or individuals is being downloaded for free or being sold to
society without the knowledge of the creator or getting any profit from it. I first thought of this
issue in my PROGAP class that the evil from this is not the vendor or the application but the
people who are purchasing the product and continues use of it. Some people might say I’m not
stealing I’m just file sharing technically they are both different things. Let me give the definition
of File sharing so we can understand it from wikipedia - File sharing is a method of distributing
electronically stored information such as computer programs and digital media. File sharing can
be implemented in a variety of storage and distribution models. Current common models are the
centralized server-based approach and the distributed peer-to-peer (P2P) networks. Basically
file sharing is sharing of file to make it simple. They say it’s unethical to download or to file share
without the creators are or the author’s permission but you couldn’t blame the people because
all are tempted.

What I’ve learned:

PEER-TO-PEER NETWORKS
SHARING OR THEFT?
SECONDARY LIABILITY
MGM V. GROKSTER: A BRIEF HISTORY
MORAL CONSIDERATIONS

Integrative Questions:

1. What is File Sharing?


2. What are Peer to Peer networks?
3. What is an intellectual property?
4. Who is GROKSTER
5. What are the legal challenges of online file sharing?

60
Chapter 24: Censorship and Access to Expression

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: Freedom of speech, thus, includes the liberty to express one’s point of view to others
and the liberty to receive any such expressions. To censor is to interfere with this liberty by
either suppressing such expressions or preventing the reception of such expressions. In short, a
censor wishes to prevent a willing speaker from speaking to a willing hearer. To censor is to
interfere in an act of communication between consenting individuals.

What I expect to learn: to gain knowledge about Censorship and Access to Expression learn
and understand about Censorship and Access to Expression

Review:

This Chapter talks about Censorship and Access to Expression. Basically our main
topic is Censorship. Let me first define Censorship - restrict or limit access to an expression,
portion of an expression, or category of expression, which has been made public by its author,

61
based on the belief that it will be a bad thing if people access the content of that expression.
Basically Censorship is blocking or preventing access. This is known from private companies
and people. For example blocking of site are of pornography or somewhat related and games at
our school. Depends on the campus and relation but still censoring, for me some things are
needed to be censored but sometimes people tend to over react that they censored almost all.
They should only censor stuff that is relevant to the issue of the company or people.

What I’ve learned:

THE INTEREST IN ACCESS TO EXPRESSION


DEFINING CENSORSHIP
TYPES OF HARM AND ARGUMENTS AGAINST CENSORSHIP
Inherently Harmful Access
Instrumentally Harmful Access

Integrative Questions:

1. What is Censorship?
2. Why do we need Censorship?
3. What are the harms to Censorship?
4. Who is Kay Mathiesen?
5. What is an Instrumentally Harmful Access?

Chapter 25: The Gender Agenda in Computer Ethics

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: While statistical sampling of large populations remains an a important approach toward
understanding some sorts of research questions, there are problematic aspects in all the studies
reported under this banner. In the detailed critique below, I outline the critique in the form of a
set of critical elements. The first two, viz. the question of how appropriate it is to survey a
student audience and the perennial concern of quantitative versus qualitative research, are
research issues that must be addressed by any researcher of business and management
topics. They are not “gendered” issues as such, although I do argue that they reinforce
problematic gender stereotypes

What I expect to learn: to gain knowledge about The Gender Agenda in Computer Ethics,
learn and understand about The Gender Agenda in Computer Ethics

Review:

62
This Chapter talks about The Gender Agenda in Computer Ethics. Wow this topic full of
feminist I guess there is still discrimination among women and men. Basically this topic is
expressing that their should be a women point of view to computer ethics that may give break
through or make difference to what information we have. I think this is just a way to balance
between men and women, basically some people as I’ve said discriminating women that men
are better stuff and etc.

What I’ve learned:

FEMINIST ETHICS
GENDER AND COMPUTER ETHICS—A MALE–FEMALE BINARY?
GENDER AND COMPUTER ETHICS STUDIES
Student Population
Quantitative Versus Qualitative Research Methodologies
What is Ethical Behavior?
The Undertheorizing of Gender and Ethics
WOMEN IN COMPUTING—AN ALTERNATIVE APPROACH
GENDER AND COMPUTER ETHICS—CYBERSTALKING AND HACKING
Are Hacker Communities Egalitarian?
WHAT MIGHT ‘‘FEMINIST COMPUTER ETHICS’’ OFFER FEMINIST ETHICS?

Integrative Questions:

1. Define Feminist Ethics?


2. What is Ethical Behavior?
3. Are Hacker Communities Egalitarian?
4. Who is Alison Adam?
5. What is cyber stalking?

63
Chapter 26: The Digital Divide: A Perspective for the Future

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: These studies show that efforts to bridge the digital divide will not succeed unless
people are properly educated about what these technologies can accomplish economically, and
people must also want to produce those various results. It is important not to dramatically
change the quality and content of cultural attitudes, but at the same time people in absolute
poverty should expect to change their attitudes if they are to fully alleviate the conditions that
perpetuate their misery

What I expect to learn: to gain knowledge about The Digital Divide: A Perspective for the
Future, learn and understand about The Digital Divide: A Perspective for the Future

Review:

This Chapter talks about The Digital Divide: A Perspective for the Future. Topic more
one wealth and poverty, if you read the book called Bottom of the pyramid you will truly

64
understand this chapter, because some people say that the lower class has no buying power
that they tend to take them lightly because they are poor. But of you read the book bottom of the
pyramid you will say the higher class has more buying power but their population is very low
rather than the lower class their population is higher. For example (this example is from my
professor) the higher class has a population of 500 and the lower class has 3000 population. If
your going to sell jewelry that is the price of thousands a few will only buy because they will be
saying I’m in the higher class. But if you sell to the lower class they will say it’s expensive but if
you sell a product that is at the same quality and in a lower price you would sell more. If you do
the math on the pricing of product for example the price of the lower class product is only 500
you will see that the profit is more in lower class target. It goes to show that don’t treat them
lowery we all know that higher class people can gain more but if you treat them with respect and
don’t underestimate them you will see their power.

What I’ve learned:

THE BIDIRECTIONAL RELATIONSHIP BETWEEN ABSOLUTE POVERTY AND THE DIGITAL


AND INFORMATION DIVIDES
THE MORAL BASIS FOR THE IDEA THAT THE VARIOUS DIGITAL DIVIDES SHOULD BE
ELIMINATED
EMPIRICAL SKEPTICISM ABOUT THE RELATIONSHIP BETWEEN DIGITAL DIVIDES AND
ABSOLUTE POVERTY
Meanings
Empirical Studies Illustrating Perceived Failures
Bridges and Questions

Integrative Questions:

1. Who is MARIA CANELLOPOULOU-BOTTIS?


2. Who is KENNETH EINAR HIMMA?
3. What is THE MORAL BASIS FOR THE IDEA THAT THE VARIOUS DIGITAL DIVIDES
SHOULD BE ELIMINATED?
4. What is UNESCO?
5. What is EMPIRICAL SKEPTICISM ABOUT THE RELATIONSHIP BETWEEN DIGITAL
DIVIDES AND ABSOLUTE POVERTY?

65
Chapter 27: Intercultural Information Ethics

Library Reference Number: N/A

Amazon:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Quote: Buddhism, for instance, experiences the world in all its transitoriness in a mood of
sadness and happiness, being also deeply moved by suffering. This mood “opens” the world in
a specific way. According to Baier, there is something common to all human beings in the basic
or deep moods, but at the same time there are specific moods at the beginning of human
cultures, such as astonishment (thaumazein) in the Greek experience of the world.

What I expect to learn: to gain knowledge about Intercultural Information Ethics, learn and
understand about Intercultural Information Ethics

Review:

This chapter talks about Intercultural Information Ethics. Let us define IIE that is
Intercultural Information Ethics according to Capurro is can be defined in a narrow or in a
broad sense. This is more of a summarization of the chapter were in connecting all the

66
issues. Also ICT that is information and communication technology which is define from
wikipedia is - is an umbrella term that includes all technologies for the manipulation and
communication of information. The term is sometimes used in preference to Information
Technology (IT), particularly in two communities: education and government. In the
common usage it is often assumed that ICT is synonymous with IT; ICT in fact
encompasses any medium to record information (magnetic disk/tape, optical disks
(CD/DVD), flash memory etc. and arguably also paper records); technology for
broadcasting information - radio, television; and technology for communicating through
voice and sound or images - microphone, camera, loudspeaker, telephone to cellular
phones.

What I’ve learned:

THE FOUNDATIONAL DEBATE


On the Sources of Morality
On the Foundation of IIE
Toru Nishigaki
Terrell Ward Bynum
Bernd Frohmann
Lorenzo Magnani
Thomas Herdin, Wolfgang Hofkirchner, and Ursula Maier- Rabler
Barbara Paterson

THE IMPACT OF ICT ON LOCAL CULTURES


FROM AN IIE PERSPECTIVE
Asia and the Pacific
Intellectual Property

Integrative Questions:

1. Who is Rafael Capurro?


2. What is intercultural information ethics?
3. What is computer ethics: philosophical enquiry or cepe?
4. Who is Rafael Capurro?
5. Who is Charles Ess?

67
Cyber Ethics
68
Chapter: Ethics and the Information Revolution

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Once this technology is in place, there will be rapid expansions of Global
Cyberbusiness. Nations with a technological infrastructure is already in place will enjoy rapid
economic growth, while the rest of the world lags behind.

What I expect to learn: What to know and gain knowledge about Ethics and the Information
Revolution, learn and understand Ethics and the Information Revolution

Review

Information in fundamentally social and ethical seeping into life unnoticed because of its
flexibility and inexpensiveness. Computer is a universal tool. No peripherals for distant
countries. MIT professor Norbert Wiener was the founder of computer ethics. His ethics was
way ahead of its time and was ignored for decades Donn Parker was the first to find out the
69
illegal usage of computers by many. Joseph Weizenbaum inspired many thinkers and projects
related to computer ethics around the world. Terrell Ward Bynum planned an international
conference on computer ethics, and this conference attracted many that it generated
monographs, video programs, and curriculum material that are now being used by many
universities and campuses around the world. Walter Maner believed that computers created
new moral problems, but Johnson own point of view was that computers gave a whole new twist
to ethical issues that were already well known. Donald Gutterbarn viewed computer ethics as a
standard of practice and codes of conduct of computing professionals. The social problem that
computers generate is unemployment, but information technology should create more jobs then
it eliminates. Computer security is the topic of concern in the field of computer ethics. The
owning of a patent in the computer algorithm has becomes an issue, patents effectively remove
parts of mathematics from the public domain and cripple science. ACM and IEEE have joined
together to make a set of guidelines in computer ethics for colleges around the world. Global
issues arise and become debated about how people communicate around the world. How can
cyberspace reach the poor, and lessen the gap between the rich and the poor. Access to
anything including education can now be available world wide. Computer ethics will evolve into
a system of global ethics applicable around the world in every culture. At the dawn of the 21st
century people will be faced with two different views on ethical relevance of computer
technologies which came form Wiener Manner Gorniak and Deborah Johnson

What I learned:

The information revolution


Information technology and human values
Computer Ethics: some historical milestones
Redefining the field of computer ethics
Some topics in Computer Ethics
Global information ethics
The future of Computer Ethics

Integrative Questions:

1. What is computer ethic?


2. What will the world be without ethics?
3. How can computer make our life easier?
4. What is ACM?
5. What is IEEE?

70
Chapter: Ethics On-Line

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: A copied program or copied data set is perfectly usable, and the reproduction can be
such that there is no evidence that copying has been done; that is, the person who created or
owns the information has no reason to believe it has been copied

What I expect to learn: What to know and gain knowledge about Ethics On-Line learn and
understand Ethics On-Line

Review

This part of the chapter talks about Ethics On-Line. Visions of online communication are
so many yet inevitable, they are visions of a self-filling prophecies that can never become a

71
reality, Nation and Global infrastructure as a global as a triumphant in global economic
competition. The only problem with on-line communication is the way people behave with it,
their way of using it. Because of such behavior our knowledge on how to secure our system to
such attacks like viruses, whether it is tracing or detecting transactions has improved. The
image of computer technology can become may be decided upon our own actions off-line,
because this will serve the backbone of our actions on-line. Not to eliminate anonymity but to
restrict it to prevent other wrongful actions from being done. The difference between
communication off-line and on-line is the reach of the scope doing on-line communication and
the difference in the feel of on-line communication compared to off-line. When we hold
individuals legally liable for their own actions when using powerful technologies, we also expect
them to take greater precautions on their actions. Anonymity is much favored on-line because
the fact that seeing a person face-to-face will be the ultimate test off0line it is not available on-
line, and the fact that on-line an individual is given a generic user ID this cause the individual to
make more efforts in establishing his or her own identity. Problems of integrity are also the
cause of anonymity because you can easily steal someone else’s words and make it look like
your own. The moment you create your own program for example and the moment you post it
on-line you will have no idea on whether your program has been copied when it was it was
copied, and who copied I, there will be no evidence on such things. The moral implications of
reproductively goes counter to our traditional notions of property and personal privacy, because
the possibility of recording and observing the privacy of action in the electronic network are no
long irretrievable, no much like in the real world action are performed and then suddenly gone.
Anonymity brings fair treatment to races, gender and in physical appearance. It is bad to the
affect it has, making stealing, and other illegal acts seems far harder to catch. That sources you
get information form and the sources you trust are completely different and it is hard to develop
a history of experience with the source. Expectations diminish trust to one another. But we can
fix these expectations when we learn to understand how these expectations are made and why
they are formed. It will be disturbing to take into conclusion that we must give up trust in on-line
communication. How about the benefits of on-line communication, do we also have to diminish
these benefits as well? It will be a god lesson to just be precautious of some of the actions we
make on-line and not to trust anyone on-line whom we do not really know. Individual must be
informed on what to expect when they enter into an on-line environment, they must be informed
what they are getting into before they enter. Rules must be set and observed by everyone, and
instructions on what to do and how to do it must also be followed.

What I learned:

Special Characteristics of Communication in Networks


Scope
Anonymity
Reproducibility
Anonymity
Diminished trust
Variety and Consent

72
Integrative Questions:

1. What is the difference in behavior on-line and offline?


2. What is the cause of anonymity on-line?
3. What are the important factors of scope in –line communication?
4. How can trust be built?
5. What is diminished trust?

Chapter: Reason, Relativity, and Responsibility in Computer Ethics

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Computers can be manipulated syntactically and semantically. Syntactically, a


computer’s performance can be changed through alterations in this program. And semantically
that states of a computer may represent anything one choose, from the sales of a stock market
to the trajectory of a spacecraft.

What I expect to learn: What to know and gain knowledge about Reason, Relativity, and
Responsibility in Computer Ethics, learn and understand Reason, Relativity, and Responsibility
in Computer Ethics

73
Review

This part of the chapter talks about Reason, Relativity, and Responsibility in Computer
Ethics. If ethics is the key to our guide for a better world in which we much rely now a days
computer and it has become necessary venues for routine communication James Moor may
have a point about the positions he disagreed on the nature of computer ethics both routine
ethics and cultural revolution makes computer ethics both trivial and impossible to implement.
Because of the computers capabilities of improving overall performance, the gathering of
process information becomes a crucial ingredient in performing manual activities. True enough
that in the age of computer we all live in a different world. Once data has entered into a
computer it can be sorted, search and accessed in extraordinary easy ways and with least
practical amounts of time. The power of information enrichment is so important in virtual world
that information must copyrighted before it is delivered into the computer world because it can
be improperly access, used, and manipulated in such ways that people who were the original
creators and the original owners are not recognized and are their ownership of such object have
been pre-owned by someone else. I may have this notion that computer ethics is all about
ethics being applies to computers, but it is rather special in the sense that considerable
interpretation must be first made before appropriate policies can be formulated and justified,
with a number of evolving situations which are difficult to conceptualize clearly and find justified
ethical policies. It will depend on the subject matter at hand to be discussed. It may be true that
because of the difficulties and shortcoming of Routine Ethics and Cultural Relativism people will
surely have disagreements in their view of ethical judgments. Reasoning with relative values
seems impossible. Different values and different judgment are sometimes nonstop debatable
issues that people have different opinions and views about different things, it all depends on
how one sees and believes on a particular thing. True enough the morality off letting everyone’s
voice be heard over the internet is being discriminated by the algorithms of search engines by
being design by computer professionals in ranking that are based on popularity and largeness
of sties. Why can’t people just advertise or put into public on how to implement or do computer
related practices so that many people using computers will be familiar with some of the
practices. Technologies have the same kind of structural effects as the other elements of social
structure. What helps define or regulate patterns of human interaction can also be identified in
technological artifacts because technological artifacts can also be found in one of the elements
of social structure. Core values are just standards set so that we may have different policies to
evaluate our own basis on different scenarios. Basically what we do and how we ran things are
the outcomes of what computer technology will have on the affect of our future. Because
computers are really dumb, it is only us humans that create computers and if we do not set
standard of ethical policies to follow the uses of computers, the harm technology may also
bounce back to us.

What I learned:

Ethics in the global village


Logical malleability and informational enrichment
The special nature of computer ethics

74
Reasons within relative frameworks
Core values
Responsibility, resolution, and residue

Integrative Questions:

1. What is the relevance of information to implement computerized technologies?


2. Why is computer logically malleability?
3. How do you escape the realm of pure facts?
4. What is the importance of core value?
5. Enumerate the possible policies for a Website.

Chapter: Disclosive Computer Ethics

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Once this technology is in place, there will be a rapid expansions of Global
Cyberbusiness. Nations with a technological infrastructure is already in place will enjoy rapid
economic growth, while the rest of the world lags behind.

What I expect to learn: What to know and gain knowledge about Disclosive Computer
Ethicslearn and understand Disclosive Computer Ethics

Review

75
This part of the chapter talks about Disclosive Computer Ethics. Standard model is being
adopted in applied ethics as a way to clarify and evaluate morally conservative practices
through an application and defense of moral principle. The truth about computer technology is
the notion that technologies themselves are worthy objects of moral analysis. The information
capabilities of computer systems constitute more to their capabilities of shaping the society
rather then as a function on background technologies. More precise moral evaluation can be
after a disclosive analysis has been made rather then the opposite way around. Disclosive
analysis are like fishing nets they may bring up items that one was looking for as well as items
that are of no interest. The unjust view of a computer system is favoring only one side and
ignoring the side of the other. Justice is all about the equal distribution of primary social goods in
the society because these are essential for individuals to carrying out their life plans. Policy
recommendation is done through applying distributive justice to argue whether resulting
inequalities are indeed unjust, and the realization of the fact that your life in fulfilling and
meaningful is the reason why the definition of individual autonomy is the ability to construct
one’s own goals and values. The control and ownership of information has become an important
source of political power in society, but the exercise of decision making in which every member
has the opportunity to exert influence over the entire society. New computer technology may
yield new values as well as require the reconsideration of old values. New dilemmas may also
be brought up because of conflicting values that suddenly clash when the new setting and
practices are brought. Thus it is part of the computer ethics to further develop and modify the
existing moral theory when existing theories of are insufficient when new demands are
generated by new practices in the world of computer technology. Moral deliberation takes place
in the level of application. Social science is often needed for the analysis of the way which the
function of the system is dependent on human activities. Moral theory is being applies by
philosophers weighing moral principles against moral judgments philosophers engage in this
field must have a solid gasp of the social, legal, and technical aspects of the technology or
practices in which they are to pas moral judgment because the information must be processed
in a task largely of no philosophical skill. Disclosive computer ethic focuses more on multi-level
and interdisciplinary and focuses of four keys which are justice, privacy, autonomy, and
democracy.

What I learned:

Limitations of mainstream computer ethics


Hidden morality and disclosive computer ethics
Key values as departure points for analysis
Justice
Autonomy
Democracy
Privacy
The need for multi-level interdisciplinary research

Integrative Questions:

76
1. What is justice?
2. What is Disclosive ethic?
3. How do you define core values?
4. Can values be morally wrong or right?
5. How is standard model applied?

Chapter: Gender and Computer Ethics

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: What is often marginalized in the discussion, or left out entirely, is the moral role of the
technology that is being used. That is, the design features of computer systems and software
are often taken as a given in computer ethics.

What I expect to learn: What to know and gain knowledge about Gender and Computer Ethics,
learn and understand Gender and Computer Ethics

Review
77
This part of the chapter talks about Gender and Computer Ethics. The study of this
paper is basically the balance between statistically based empirical research and a more
substantial theoretical understanding of computer and in gender. The author concludes that the
best way to look for theoretical substances is applying feminist theory in the gender based
theory which has long been over due for more substantial theorizing. The combination of
feminist ethics and empirical studies will emphasize moving of gender and ethics onward from
statistical studies of men’s and women’s ethical decisions towards more substantially theorized
studies of areas in computer ethics that have yet been largely unexplored. Women in computing
have been criticized in the past for adopting a traditional, liberal position that characterizes the
gender and computing problem in terms of educating, socializing, and persuading women.
Rather then to challenge the subject matter the liberal argument in leaving the organization of
computing unchallenged does little to alleviate women’s position in relation to computing
education and work. I disagree with his ethical problem that women are not taking up
opportunities being offered to them. But numbers of women at all level of computing remain low;
there must be a reason behind this why women are being excluded form payment in well-paid
and interesting careers. Arriving at different cultures from different countries there is a major
difference between male and female business managers in considering ethical business
decisions. Based on other studies between the comparison on men and women it showed that
appear more ethical than men, however the author made a hypothesis that men tended to
behave of a dubious ethical nature more acceptable than women do. The aim of Khazanchi was
to understand whether gender differences influence the degree to which individual’s recognize
unethical conduct in the use and development of information technology. During the course of
the survey the study showed that women outperformed the men in identifying unethical actions
across all scenarios given. Women also seem to be more considerable toward the feelings of
others. Form a mangers point of view women are more likely to affect by passive deterrents and
men may be influence more likely through statements on what is legal. A hidden power of
relationship variable that need to be point out to be much more aware of power relationships in
computer ethics, such as the relationship between the student and the teacher relationship.
Women’s ability to resist unethical behavior is not really absolute because again no body is
perfect. Gilligan is well known for her work on feminist theory. True enough that women have
different view and expectations regarding computer privacy and other traditional computer
ethnic problems. Feminist ethics form the challenge to main stream ethics to develop a new
ethics with which to make normative judgments on ethical problems from a wide range of
domain.

What I learned:

Gender and Computer Ethics – Barriers and Pipelines


Gender and Computer Ethics – Men’s and Women’s Moral Decision Making
Critique of Gender and Computer Ethics Studies
Student Population
Qualitative vs Qualitative Methodology
Decision vs Ethical Processes
Lack of Theory
Plea for Feminisy Ethics
78
Integrative Questions:

1. Are women more dominant than men in term of ethical views?


2. How are women an asset to the management of businesses?
3. What are the different forms of surveys conducted to students based on gender
analysis?
4. Who is known for her famous work in Feminist theories?
5. How are women different from men when it comes to the goodness of the heart?

Chapter: Is the Global Information Infrastructure a Democratic Technology?

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Mainstream computer ethics focuses on the morality of practice, particularly on the use
of computer technology. What is often marginalized in the discussion, or left out entirely, is the
moral role of the technology that is being used. That is, the design features of computer
systems and software are often taken as a given in computer ethics.

What I expect to learn: What to know and gain knowledge about Is the Global Information
Infrastructure a Democratic Technology?, learn and understand Is the Global Information
Infrastructure a Democratic Technology?

79
Review

This part of the chapter talks about is the Global Information Infrastructure a Democratic
Technology? The GII is said to create electronic democracy to facilitate and enhance
democratic processes. Technology containing favors or facilitates democracy is also the same
as saying values are embedded in technology. Democracy is a value in the sense claims made
by individuals’ states that there is a strong link between the technology and patterns of behavior
associated with democracy and these are considered desirable traits. GII transforms many
aspect of the infrastructure of our daily lives. The new medium has special characteristics that
affect social value I which our bodies live in the world that is different I terms of physical and
geographic aspects. Scholars believe that technologies did not embody values but rather values
come into play only if and when technologies are used, a good example is guns, they don’t kill
but people do! Scholars of STS accept that technologies influence the direction and content of
science socially making them value-laden. By the study of science and technology two tenets
are formed first technologies shapes social patterns, and second, technology is shaped by its
social context. Expecting GII to carry values with whether to shape, enhance or diminish values
this show that we should accept GII has been shaped by social values. Two distinctions about
the properties of technology that Winner makes between intractable properties and flexible
properties, the second distinction is the relationship between properties of the technology and
the social relationship necessitated by the properties. Many who claim that GII is democratic
seem to have in mind that it facilitates unmediated communication between individuals but GII is
also said to be intractable democratic because telecommunication lines connect every individual
to every individual in the world. The social context may have little to do with explicit purpose or
use of technology but the values I technology con only be understood by understanding the
social context of technology. An understanding on the values associated with democracy is
going back to the recent cultures of hackers, where in early history of computers hacker were
not viewed as criminals but rather computer enthusiast who were mainly concern in helping
each other out figuring how to do things with computers, improving with on each others
programs with no interest in who owns what or what credit would be assigned to who. I disagree
with who ever does not know how computers work, will still have the chance to catch up, it just
like a baby not knowing anything the moment it was born, later as the child grows up he or she
learns things more and more and may even reach to the extent that they know more about
something than any of us do not know off.

What I learned:

Technology and Values


Values Embedded in Technologies
The moral metaphysical meaning of embedded values
The support meaning of embedded values
The material meaning of embedded values
Values Embedded in the Global Information Infrastructure
The moral/metaphysicall meaning of embedded values
The support meaning of embedded
The material menaing of embedded values
80
Democracy as the Starting Place: Power and Insularity
Power to the Many
Joint Deliberation

Integrative Questions:

1. What is democracy?
2. What does it mean to say that technology carries a value?
3. What does it mean to say that values are embedded in technology?
4. Is GII compatible both with mediated or unmediated communication?
5. Do artifacts have politics?

Chapter: Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key
Problems and Challenges

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Almost invariably, these rules were derived from some supposed “ethically perfect
world.” But ideal rules may workout very differently in (non-ideal) practice.

What I expect to learn: What to know and gain knowledge about Applying Ethical and Moral
Concepts and Theories to IT Contexts: Some Key Problems and Challenges, learn and
understand the Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key
Problems and Challenges

Review
81
This part of the chapter talks about is the Applying Ethical and Moral Concepts and
Theories to IT Contexts: Some Key Problems and Challenges. The notion of social issues in
computing has become the trend when it comes to employing the word computer ethics. But the
confusion on remarking social issues in computing is by no means all ethical in character. The
dilemma in social context is the different approaches of it according to the author the role of
expert advisers should behave ethically. There is already certain ambivalence in the use of the
word ethics, and sometime choices like individual, collective, or institutional are more or less
excluded, and are left to a field labeled like moral philosophy. Some other disturbing issues
concerning the demarcation of computer ethics are jus merely political and not ethical or eve
moral in the broad sense. Prior regarding the issue of software property rights under the banner
in a quasi self-evident manner, one is inserting a strong assumption without any form of proof.
Moral concepts can at most be invoked in arguing for participative decision making. Privacy turn
out to be a not so debatable “core space” that can be kept sacrosanct under any possible
circumstances; it is always weighting of the various interest of others. Concerning of some
issues is just letting sociological considerations enter the ethical discourse. Narrative forms as
an indispensable mode are the primary source for questions concerning IT. The ironic is taking
into account the complexity of processes generating and succeeding computer design can be
stopped and unethical desirable consequences. A down-to-earth approach is the use of
“negative universalization by Wellner, in this line of thought we can conceive that ethical
discourse as a discourse for identifying what is definitely ethically bad, bases upon what are
suppose to be definitely unacceptable forms of inequality.

What I learned:

Untangling terminological confusion: the demarcation of “computer ethics”


Connecting ethics and social context
Computer ethics and role of experts

Integrative Questions:

1. What are moral Choices?


2. How does individual choice be a concern in computer ethics?
3. Is it ethical to break the law?
4. Does IT propose specific ethical problems?
5. What is discourse ethics?

82
Chapter: Just Consequentialism and Computing

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: “Don’t steal computer chips” is another policy with more obvious ethical content. Even
when policies are the policies of others, they can help us to regulate our lives.

What I expect to learn: What to know and gain knowledge about Just Consequentialism and
Computing, learn and understand Just Consequentialism and Computing

Review

This part of the chapter talks about the Just Consequentialism and Computing.
Consequetialism emphasizes consequences of policies within the constraints of justice making
83
it a practical and theoretically sound approach on ethical problems of computer and information
ethics. Basically the job of a computer ethics is to identify policy needs, clarify related
conceptual confusions, formulate appropriate new policies, and justify them ethically. Evaluating
polices and their ethical differences depending on the use should be our main concern. Every
action may be considered as an instance of policy. Conflicting descriptions form each and every
one makes an incompatible description of certain presuppose object or being that is being
described. Theories arise from the conflicting descriptions made by each one. Humans need
ability, security, knowledge freedom, opportunity, and resources in odder to accomplish their
projects. The protection of fundamental human rights should guide us in shaping ethical policies
for using computer technology. The burden of justification comes in when another human is
harming another human being. It is unjust for some one to use a king of policy which he or she
would not allow others to use, thus justice must require impartially toward the kinds of policies
we allow. A rational person making a policy and allowing others to follow it as well means he or
she accepts that policy, and a rational being would not harm you unless you harm them first.
Whether the policy consists of honesty towards the problem that may be encountering during
the process, it is still a good policy. The blindfold of justice allowing weights to the benefits and
harms, but by removing all knowledge of who will benefit and be harmed by one’s choice, by
applying the blindfold of justice to computer ethics this will provide constraints on
consequetialism and this will lead to an assessment on the merits of various policies using
consequentialist considerations and being able to select goods ones from those that are just.
Making computer policies that avoid unjustifiable harm to others should the main goal when
developing or selecting a good policy. Setting the right policy is just as hard as making the right
decision in which everyone will agree to your own decision.

What I learned:

Consequentialism constrained by justice


The good as the enemy of the just
Computing in uncharted waters

Integrative Questions:

1. What is should we watch out when constructing ethical computing policies?


2. What is a policy?
3. How do we implement a right policy?
4. Is there an approach to justice that will allow us to resolve conflicts of actions or policy
when causing harm seems unavoidable?
5. If a policy was publicly allowed what are the consequences of it?

84
Chapter: The Internet as Public Space: Concepts, Issues, and Implications in Public Policy

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Naturally, since the internet is part of the national and global telecommunications
infrastructure, many tend to classify the internet’s services into traditional media types. One of
the earlier voices in this debate (Camp and Riley, 1996) argues, however, that this classification
hardly works well.

What I expect to learn: What to know and gain knowledge about The Internet as Public Space:
Concepts, Issues, and Implications in Public Policy, learn and understand The Internet as Public
Space: Concepts, Issues, and Implications in Public Policy

Review
85
This part of the chapter talks about The Internet as Public Space: Concepts, Issues, and
Implications in Public Policy. Internet can be anywhere at anytime yet the very nature of its
ubiquity hinders some of the rights of every individual or organization. Internet is like having no
walls around you can have different abilities, even having the ability to be at two places at once.
The information that is broadcast is centrally originated, one to many, and therefore subject to
tight control and stringent liability. Low volume types of carrier are long gone already
considering almost everyone is using the internet and that we are in a global world of cyber
space. The internet is more like a physical space unlike the distinctions of a media is that
functions do not follow form. The internet is like being in a public place but you have your
physical space, but at the same tie adhering with the rules of that place. You are in a public
place but at the same time in a private place. With all the information coming right at your hands
how do you know which one is the right information and which one is fraud information. Laws
have bee implemented by the usage of internets around the world, and still may were also
opposed. The issue of ownership of information has been discussed with the public interest in
mind. I would definitely agree that over reliance on the use of technologies such as internet
threatens the very essence of teaching. It is rally different once you hear some one teaching you
and you are face to face with that person. There is still doubt on the minds of many. The issue
of certification becomes crucial, but issues of content control versus the freedom of access are
not crucial at the level of universities. However the benefits are cross-culture and multi-language
is available in the internet. Vast amount of data may be available but as a human being with no
knowledge on medicine are you really hundred percent sure that you are doing the right thing in
terms of curing your own sickness. But with the access of vast information across the world
treatments can be made and preventable actions can be taken. The internet being brought into
school is also like bringing advertisement into school at the same time. The definition of public
spaces and public roles are a critical step in re-defining civil liberties and other forms of
freedom. Hiding valuable assets and calling them to be secure is absurd when using the spatial
model. The continuum possible with the spatial model would provide greater flexibility with
respect to privacy than the four discrete points of media spectrum. The spatial metaphor will
allow all the possible options to address without confusion and to give meaning to the
meaningless.

What I learned:

The internet is more than multi-media


Digital characteristics of a public space
Uses of Internet as public space: Opportunities and Barriers
Universities
Hospitals
International Marketplaces
Schools
The digital stump
The marketplace
Implications in Public Policy
Governance of internet use
Impact on social capital and society leadership

86
Impact on social well-being

Integrative Questions:

1. What is information agora?


2. What is simultaneity?
3. What do you mean by saying the internet is a public space?
4. How is the internet a public domain?
5. is the internet providing a suitable space for the average citizen to more actively
participate in public affairs?

Chapter: The Laws of Cyberspace

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: When the university was designing its net, the technicians asked the provost whether
anonymous communication should be permitted. The provost, citing a principle that the rules
regulating speech at the university would be as protective of the free speech as the first
amendment, said yes. One would have the right to communicate at the university anonymously,
because the first amendment to the constitution would guarantee the same right vis-a-vis the
government.

What I expect to learn: What to know and gain knowledge about The Laws of Cyberspace,
learn and understand The Laws of Cyberspace

87
Review

This part of the chapter talks about The Laws of Cyberspace Our world as he author
states has four sorts of constraints first the law in which is the prominent of the regulations,
second social norms which guides our behavior. Third, is the market which regulates the price
and sets opportunities through the ranges it regulates, and finally the fourth constraint which
some might call nature, but the authors calls it architecture, which limits our boundaries in which
we live in and not seeing the other part of the wall, it constraints our ability of knowing what is on
the other side. The words of James Boyle are the exact description of the cyber space, you
can’t live without it, but the moment you’ve got it, you can’t live long with it. It is like you are
caught in its addiction of being free from the control of real space sovereigns, yet you can not
control the behavior in it. Different places have different codes of conduct which you can abide
by or must abide by. We are subject to the code and it is not an option whether we choose not
to follow it. All other forms of regulation in real space depend of the most important constraint
the architecture. There is still a critical difference between cyberspace and the real space, when
we tend to follow laws of the real space and apply them to cyberspace. The only information
that the architecture of cyberspace lacks is the knowing of whom you are dealing with, and
because of anonymity being the default in cyberspace law and regulations are practically hard
to apply. The net it self is as independent as it is. Each choice one makes form the architecture
that enables political values is considered political as well. Constitutional values should guide us
in our design. We should also consider other forces that regulate our lives and not just the four
forces of laws. If and when indirection is possible in cyberspace, the people will offer little
protection against the government’s regulations of business. With the power of encryption to
authenticate the identity of a person government’s can recreate the power to control and the
power to regulate.

What I learned:

The laws present and open in “cyberspace”

Integrative Questions:

1. What are internal passports?


2. What is an example of the behavior of a social norm?
3. What are codes? How are they the same from the four constraints in which we have in
our real world?
4. What are the political consequences of the change of the architecture in cyberspace
form freedom to control?
5. What is computing sovereigns?

88
Chapter: Of Black Holes and Decentralized Law-Making in Cyberspace

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: The task of identifying the alternative rule-makers for purposes of normative comparison
is made even more difficult than this because cyberspace, having emerged from decentralized
disorder – from the primordial ooze of the internet engineering task force – many well create
conditions that the favour the growth of powerful centralizing forces.

What I expect to learn: What to know and gain knowledge about Of Black Holes and
Decentralized Law-Making in Cyberspace, learn and understand Of Black Holes and
Decentralized Law-Making in Cyberspace

89
Review

This balckholed of the RBL is not that accurate when checking the senders’ numeric
internet address against the list of blackholed internet address. Email has become an
indispensable form of communication. The email is becoming an incalculable commercial and
non-commercial importance for a substantial and ever-growing segment of the world
community. The value of the email is being undermined by a barrage of unwanted and
unsolicited communications. This topic about the email is an interesting topic about whether the
RBL is the solution. The MAPS proposed a norm about open mail relay systems which they
considered unacceptable. The sanction that MAPS proposed is the Ur-Sanction of informal
social control process: Shunning and they will be the one’s to help you provide a means to
accomplish this sanction. After the cooperative agreement was due to expire, the Commerce
Department made a decision before walking away due to the expiration, it took steps in ensuring
the stability of the internet. Which it created a non-profit organization called the Internet
stakeholders. Shortly, thereafter the system was placed in the hands of a single government-
authorized entity known as Internet Corporation for Assigned Names and Numbers the have
over all responsibility in setting the rule. Efficiency justification rest on the hands of repeated trial
and error and the pull and tug of competing rules and counter rules, and other ways to find
solutions to complex problems, it is therefore obliterate the distinction between the normative
and descriptive aspects of the internet. The word better is always an alternative in cyberspace,
because the condition in cyberspace makes it difficult to specify alternative processes.
Cyberspace makes it even more difficult to identify the alternative rules-makers for purpose of
normative comparison. It is impossible to see the rules of spamming and its variants could
produce, these rules cannot be laid side by side for the purpose of analysis, deliberation, and
debate. The fear of the possibility that the domain name system would lead to a policy-making
catastrophe of significant proportions would be possible, left no one trying to do something
about it. We may never know which problems to fix and how to finding these problems in the
internet but we should keep in mind that there are problems that are best solved that may
sometimes be worth bearing.

What I learned:

The incident
The explanation
The question
The debate

Integrative Questions

1. What does The RBL does?


2. What does the MAPS does?
3. Is the RBL a means of solving the problem like the proliferation of unsolicited mass e-
mail operations?
4. How would we solve the seemingly impossible facing anyone trying to construct that
global network?
90
5. What is ICANN stands for?

Chapter: Fahrenheit 451.2: Is Cyberspace Burning?

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: It does not result in the automatic blocking of speech by an entity other than the speaker
or reader before the speech has ever been viewed. Thus, the very nature of the internet reveals
why more speech is always a better solution than censorship for dealing with speech that
someone may find objectionable.

What I expect to learn: What to know and gain knowledge about Fahrenheit 451.2: Is
Cyberspace Burning? Learn and understand Fahrenheit 451.2: Is Cyberspace Burning?

Review
91
The court said the online speech deserves the same protection as to books and other
printed matters. It may be sooner than we think that we may have a “family friendly” internet
rather than a free speech and democratic cyberspace. It will be unfair to block speeches that
are unrated and yet they do not have harsh words that would require parental guidance at any
word that is being said or read. If it is in the nature of the internet and the quality of speech on
the internet that entitles it tot have the same free speech protections as the same as the books,
magazines, and casual conversations. Being able to have casual conversations with no
censoring makes the internet the most participatory form of mass speech yet developed. Will
the freedom of us users of our own computer be also limited? Rating your own speech on the
internet is like also rating your own speech hen you are just having a casual conversation with
your friend somewhere; in the neighborhood or in your house. Food labels compared to internet
ratings are very different. Rating someone’s own creativity is just like judging someone’s work.
You want to say something that you think would help another person on the net but you cannot
help that person because you conversation would be rated. What would to the possibility of
communication around the world if speeches are being rated.

What I learned:

cyberspace burning
Free speech online: a victory under siege
Rethinking the rush to rate
Recommendations and principles
Six reasons why self-rating schemes are wrong for internet
third-party rating
The problems with user-based blocking software at home
Blocking software should not be used by public libraries
Internet rating systems

Integrative Questions

1. What alarmed the ACLU and the other cyber-liberty communities?


2. Is the internet like televisions and should be rated and censored?
3. What is the difference between the role of the government and the role of the judge in
free speech for the internet?
4. Will other controversial matters become unavailable in the internet soon? How?
5. What is the nature of the internet?

92
Chapter: Filtering the Internet in the USA: free Speech Denied?

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Browsers and search engines could then be programmed to return or access sites and
newsgroups that satisfy a preset profile. The dangers associated with self-rating schemes will
be discussed later in this paper.

What I expect to learn: What to know and gain knowledge about Filtering the Internet in the
USA: free Speech Denied? Learn and understand Filtering the Internet in the USA: free Speech
Denied?

Review

93
Different programs of rating have different type of dimensions which they rate for
example the RSACi rates includes violence, nudity, sex, and language. Users should have
options on whether they want to enter the site or not. If it is true that only some will rate the
content then will the governments and other agencies know about whether this site Is harmful or
not. Makers of filtering internet products claim that information is proprietary and its disclosure
should provide a roadmap to objectionable material. What if blocking images and some
disturbing ideas won’t be able to control by some parents because their some hackers in the
world that are very good at hacking or tampering file which are not theirs. Libraries serve the
commitment to be an open and free inquiry to the public. Why would you filter internet in one’s
home when that serves as the right for one’s property and freedom, there are laws that must be
taken into consideration before filtering or blocking one own home. The separation of adults and
children regarding the use of the internet might be a good idea. Training users with the use of
the internet and what they can get form the perils of the internet. Filtering and blocking
software’s should be able to be turned off and on at anytime.

What I learned:

Definitions
Examples of Problems with blocking and filtering programs
Mainstream Loudoun
Librarians and filtering programs
Discussion and analysis

Integrative Questions

1. What was Judge Leonie Brinkema’s opinion on the U.S. District Court?
2. What are examples of filtering and blocking programs?
3. What did NCLIS proposed?
4. What is the danger of self-rating?
5. Is there any other way to help children form accessing harmful sceneries in the internet
beside filtering and blocking programs?

94
Chapter: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: IT should be clear; however, that in the age of the internet, the problem of child
pornography, like so many others arising in a visual medium, must be construed among the
most basic of the harms we should seek to prevent.

What I expect to learn: What to know and gain knowledge about Censorship, the Internet, and
the Child Pornography Law of 1996: A Critique, Learn and Censorship, the Internet, and the
Child Pornography Law of 1996: A Critique

Review
95
An amended law would provide privacy protections to all identifiable individuals, adults
and minors, by requiring the consent of depicted individuals before any image involving nudity
could be posted to any newsgroup. The judgment as to whether an image depicting an
identifiable individual is or is not of a prurient nature would ultimately reside with the depicted
person. Again, where more than one identifiable individual is depicted, the judgment by any one
individual that the image is prurient would be sufficient to prohibit publication of the image. Here
it may be argued that there would be no issue of requiring the consent of minors, or more
appropriately, of their legal guardians, since prurient images of them remain illegal; however,
since not all photographs of minors involving nudity or prurient, the provision requiring consent
would guard against violations of privacy of a sort closely related to that involved in the non-
consensual publication of prurient images. These features of an amended law represent only a
few of the elements of a more comprehensive and more just approach to dealing with the
problems represented by child pornography and, more generally, by the prurient. Naturally, the
features are not without problems, and a great deal of work remains to be done. It should be
clear, however, in the age if the Internet, the problem of child pornography, like so many other
arising in a visual medium, must be construed to involve violations of privacy; indeed, such
violations should be counted among the most basic of the harms we should seek to prevent.

What I learned:

Definitions
Scope
Child pornography prevention act
Argument 1: CPPA Violates the First Amendment
Argument 2: CPPA’s protective are inadequate
Argument 3: CPPA can harm our children

Integrative Questions

1. What is CPA?
2. What does prurient material mean?
3. What was the bill the Frank, H. R. H. John McCail passed?
4. What is the requirement of the Bill “Safe School Internet Act”?
5. What is Child Pornography?

96
Chapter: PICS: Internet Access Controls Without Censorship

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: A third possibility is to perform the operation somewhere in the network, for example at
a proxy server used in a combination with a firewall. Each alternative affects efficiency, ease of
use, and security. For example, a browser could include nice interface features such as graying
out blocked links., but it would be fairly easy for a child to install a different browser and bypass
the selective blocking. The network implementation may be the most secure, but could create a
performance bottleneck if not implemented carefully.\

97
What I expect to learn: What to know and gain knowledge about PICS: Internet Access
Controls Without Censorship, Learn and Understand PICS: Internet Access Controls Without
Censorship

Review:

This part of the chapter talks about PICS: Internet Access Controls Without Censorship.
This is the issue to prevent children to buy pornographic material and I think it can’t be stop
because the vendors of the product in the physical world it would be sell for a living in the web.
The selling of pornographic material is just a click a way. The government is trying to prevent it
my opinion on this all hope is gone because it’s not going to change the fact that it’s click a way.
For example when you go two a porn site they would just ask you if your under 18 but no that
stupid that they would lie because no one is looking. The reason as to why the government
does not want the child to see a pornographic material is because the government does not
want that the minor to engage in sexual conduct. Also they have discussed the CPPA which an
act to prevent the given topic but again it’s really not taken seriously because the act the
children is on their own and they might orient the children about this but it’s still the act of the
child

What I learned:

Definition of PICS
The labelling vocabulary
Granularity
Creation of labels
Coverage
Revenue generation
Collaborative labelling
Online journals
Labelling vocabularies
Privacy vocabularies
Reputation vocabularies

Integrative Questions

1. What is PICS?
2. What are the specifications of PICS?
3. How do you make the internet better?
4. How would you know that the amended law is effective?
5. What should the government do?

98
Chapter: Internet Service Providers and Defamation: New Standards of Liability

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Indeed, according to HGP researcher John Sulston: “The Human Genome Project and
Celera were not working toward a common goal, since only the former generated a public
sequence. Like everyone else, Celera had free access to all our assembled sequence.

What I expect to learn: What to know and gain knowledge about Internet Service Providers
and Defamation: New Standards of Liability, Learn and Understand Internet Service Providers
and Defamation: New Standards of Liability

99
Review

This part of the chapter talsk about Internet Service Providers and Defamation: New
Standards of Liability. We have sought to demonstrate here that policies and governing
defamation liability on the internet needs substantial revision. The prevailing interpretation of the
Communication Decency Act, which provides absolute immunity for ISP's, is mistaken and
dangerous. Also, those calling for the abolition of libel laws in cyber-space have not taken into
account that not all publishers or speakers there operate from the same level playing field.
Hence, given the continued relevance of libel law and the need to assign liability, we have
sought to articulate a more tenable standard of moral accountability for ISP's. While ISP's do not
cause defamation, they provide an occasion or forum for it, and herein lies the potential for their
vicarious liability. But accountability must be grounded in capability: An agent should only be
held accountable for failing to perform X if it has the power to do X. Technical and economic
factors make it virtually impossible for ISP's to take preventive measures that detect or filter out
defamatory messages. Thus, we cannot hold ISP's responsible for preventing defamation
unless they are indeed acting like publishers and exercising editorial control. We can, however,
hold the accountable for failing to take certain actions once they are informed that a victim has
been defamed. These steps include prompt removal of the defamatory remarks, the issuance of
a retraction on behalf of the victim, and the initiation of a good faith effort to track down the
originator so that the defamation does not reoccur. None of these actions are especially
burdensome, economically unfeasible, or inconsistent with an ISP's capabilities. This standard
of accountability is a reasonable middle ground between the extremes of strict liability and
immunity from all liability. It can therefore serve as a foundation for developing a more sensible
regulatory approach to the matter of ISP liability.

What I learned:

Legal Definitions and standards


Internet service providers and legal defamation
Legal precedents for ISP liability
Cyberspace alter the need for libel laws
Moral perspective

Integrative Questions

1. What is ISP?
2. Why should we not put all the balme on ISP?
3. What are the neccessary steps we can take to acount the failure otehr than ISP?
4. What is good faith?
5. What is liability?
100
Chapter: Digital Millennium Copyright Act

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote A statement under penalty of perjury that the subscriber has a good faith belief that the
material was removed or disabled as a result of mistake or misidentification of the material to be
removed or disabled.

What I expect to learn: What to know and gain knowledge about Digital Millennium Copyright
Act, Learn and Understand Digital Millennium Copyright Act

101
Review

This part of the chapter talks about Digital Millennium Copyright Act. Identification of the
material that has been removed or to which access has been disabled and the location at which
the material appeared before it was removed or access to it was disabled. A statement under
penalty of perjury that the subscriber has a good faith belief that the material was removed or
disabled as a result of mistake or misidentification of the material to be removed or disabled.
The subscriber’s name, address, and telephone number, and a statement that the subscriber
consents to the jurisdiction of federal district court for the juridical district in which the address is
located, or if the subscriber’s address is outside of the united states, for any juridical district in
which the service provider may be found, and that the subscriber will accept service of process
from the person who provided notification under subsection or an agent of such person. I don’t
really know how this will eventually be better but one thing I am sure of is that this digital
millennium copyright act will be helpful to both users and developers because it protects both
parties by enabling copyright before use.

Believe it or not, it is necessary to cite your source. I know only few of us heard about
getting in trouble for it but it really is a big deal because one time, I have a classmate that, well,
plagiarized his work but he was able to get away with it. It might be an encouraging situation to
some but it really is insulting to others who do not plagiarize or at least to some who actually
accredit their source because it is their work and they have to be acknowledged if you are
planning to use their idea or content.

What I learned:

Public Law 105-304

Sec. 103 Copyright Protection Systems and Copyright Management

Sec. 1201 Circumvention of copyright protection systems

Violations regarding circumvention of technical measures

Sec. 1202 Integrity of Copyright management information

Online Copyright infringement liability limitation

Limitations on liability for copyright infringement

Limitations on liability relating to material online

System Caching

Information location tools

Limitation on liability of non-profit education institutions

Conditions for eligibility


102
Integrative Questions:

1. What is the title of section 103?


2. What is the title of section 1201?
3. What is the title of section 1202?
4. Explain the limitations on liability for copyright infringement.
5. Explain the limitations on liability relating to material online.

Chapter: Note on the DeCSS Trial

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

What I expect to learn: What to know and gain knowledge about Intellectual Property,
Information, and the Common Good, Learn and Understand Intellectual Property, Information,
and the Common Good

Review

In the fast-passed world of cyber law the first summer of the new millennium will be remembered
for two controversial cases. The first is the well publicized dispute involving web sites such as Napster
103
and Gnutella which allow users to swap MP3 music files. The music industry has sought an injunction to
prevent Napster, since the subject matter probably seemed more arcane to the general public. Both
cases have the potential to shape the precarious landscape of intellectual property law but the effects of
the DeCSS case. It is for a fact that people want quality in a cheap price, which is how economics work.
Sell it in the lowest price possible and you will get as many buyers as you can because that way, you can
earn profit. Let’s keep this one a secret but I know a place, a magical place, where DVDs roam free and
buyers walk through the garden of piracy without any care of it violating a major rule. I made it sound like
a fairy tale but you know what is really going on in the world right now? We are surrounded by piracy
because people like it cheap and piracy is cheap which is why it is so hard to contain it in a jar.

Piracy is all over the internet and the fact that it is makes it more invincible to defeat because it is
in the internet and that is a powerful place for something so in demand. Frankly, I don’t really think that
there can be something to stop the massive growth of piracy online because everyone feeds the monster
a little at a time so if there is something to stop this madness, I think now is the right time to implement it.

I am not saying that piracy is a good resource; I am just implying that it is a massive tumor that
continues to grow online that allows people to become more and more aware of it which is why if it has to
be stopped, which I know it should be as soon as possible, it should happen now so that the damage to
those affected industries will be minimal.

What I learned:

Technical background

The lawsuit

The outcome

Integrative Questions

1. Explain the technical background of the DeCSS Trial.

2. Explain the lawsuit in the trial.

3. What might be the outcome of the trial?

4. What is the actual outcome of the trial?

5. What is the DeCSS trial?

104
Chapter: A Politics of Intellect Property: Environmentalism For the Net?

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Small surprise then that we did not preserve it very well. I have argued that the same is
true about the public domain. The fundamental aporia in the economic analysis of information
issues, the source-blindness of an “original author” – centered model or property rights, and the
political blindness to the importance of the public domain disappear, first in concept and then,
increasingly, as a reality.

105
What I expect to learn: What to know and gain knowledge about A Politics of Intellect Property:
Environmentalism for the Net? Learn and Understand A Politics of Intellect Property:
Environmentalism For the Net?

Review

This part of the chapter talksa about A Politics of Intellect Property: Environmentalism
For the Net? Apart from the normal presumption in favor of informed democratic participation in
the formation of entire property regimes, it is argued that there are particular reasons why this
comparative political vacuum is particularly unfortunate. Drawing on some prior work, it is
claimed that our intellectual property discourse has structural tendencies towards over-
protection, rather than under-protection. To combat that tendency, as well as to prevent the
formation and rigidification of a set of rules crafted by and for the largest stakeholders, it is
argued that we need a politics of intellectual property. Using the environmental movement as an
analogy, I pointed out that a successful political movement needed both a set of analytical tools
and coalition built around the more general interests those tools revealed. Welfare economics
and the idea of ecology showed that “the environment” literally disappeared as a concept in the
analytical structure of private property claims, simplistic “cause and effect” science, and markets
that do not force the internalization of negative externalities. Similarly, it is claimed that the
“public domain” is disappearing, both conceptually and literally, in an IP system built around the
interests of the current stakeholders, and the notion of the original author, around an over-
deterministic practice of economic analysis and around a “free-speech” community that is
under-sensitation to the dangers of private censorship. In one very real sense, the
environmental movement invented the environment so that farmers, consumers, hunters, and
birdwatchers could all discover themselves as environmentalists. Perhaps we need to invent the
public domain in order to call into being the coalition that might protect it.

What I learned:

Policies of intellectual property

The environment movement

Welfare economics

The disappearance of the public domain

The environment movement

Integrative Questions

1. How will on political movement be successful?


2. What is welfare economics?
3. What is the environment?
4. What are the dangers of private censorship?
5. What is the environment movement?

106
Chapter: Intellectual Property, Information, and the Common Good

Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: If I claim a plot of land as my property, I am saying I can control who has access to that
land and what they do there. I can build a fence around it, rent it out, or drill it for oil on it. If a car
is my property, I get the keys to it. I can exclude others from using it and use it myself for
whatever I want, as long as I do not threaten the lives or property of others.

107
What I expect to learn: What to know and gain knowledge about Intellectual Property,
Information, and the Common Good, Learn and Understand Intellectual Property, Information,
and the Common Good

Review

This part of the chapter talks about Intellectual Property, Information, and the Common
Good. Producers of information who wants to maximize their control over its issue, and
therefore their ability to profit from it, find intellectual property very attractive concept because it
focuses primarily on the producers and their claims of ownership. These claims are not valid. As
we saw there are some convincing justifications for them, but incomplete.

To get a more adequate perspective, we need to step back and ask about the
significance and purpose of this information. When we do this, we gain a very important insight
that tends to be lost when we only think in terms of rights and property. That is that information
is about communication; it is meant to be shared. Ethical policies for the use and distribution of
information must take into account the social nature of information, even as they recognize the
legitimate claims of the producers, it is in this balance, Aristotle's median, that virtue is found.

Admittedly this approach does not lead to any startingly new conclusions. In a sense it
just tells us what we already know. That is, intellectual property claims can only go so far. They
must be balanced against the common good. Moreover there are different types of intellectual
property and they must be treated differently. But the theory’s consistency with sound common
sense is its virtue. The ultimate standard for ethics is the collective moral wisdom of the
community. If a system gives us the same conclusions as the best minds in our society, it is
probably a pretty good system. That is more than can be said for some of the more extreme
proposals that have been advanced in the name of intellectual property.

What I learned:

Conflicts over intellectual property: Five Cases


Philosophical justification for intellectual property
A more balanced view of the common good

Integrative Questions

1. What is Helegian?
2. What is labor theory?
3. What is intellectual property?
4. What is Lockean Justification?
5. Who is Justin Hughes?

108
Chapter: Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding
the Private Ownership of Intellectual Work in the United States

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Generally the copying of messages in transit is automatic and transparent. The copy is
made by the software as a routine part of the transmission and deleted when the transaction is
complete

109
What I expect to learn: to gain knowledge about “Is Copyright Ethical? An Examination of the
Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the
United States”, learns and understands “Is Copyright Ethical? An Examination of the Theories,
Laws, and Practices Regarding the Private Ownership of Intellectual Work in the United States

Review:

This part of the chapter talks about “Is Copyright Ethical? An Examination of the

Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the
United States”, the issue here is copyright ethical that the law of copyright infringement but
before we talk about that we should discussed that the law is based on United States and I think
our law from the Philippines is based on that law of the US. This issue about copyright is making
really a big impact due to some are pirating products from companies for example Microsoft and
also some other who are stealing authority or so called copyright infringement. I think piracy
cannot be controlled because it’s to much well practice for example video and music is being
pirated and many or consuming this products because it’s cheaper than the original and
somewhat same quality. Mainly this issue says that these things should be free for the public
and if you think this is true, big companies are un ethical because their charging fee for their
product that should be free but in the other hand if they do this they will loose profit but I know of
a company who gives their product for free for example java they give their product for free but
they charge for the services. Basically the point is copyright law is important to recognize the
creators.

What I’ve learned:

The rights
The origins of those rights
Property rights
Theories of intellectual property and copyright
History of copyright in the United States
Limitations of copyright
Ethical manner of copyright

Integrative Questions:

1. Is Copyright Ethical?
2. What is Copyright?
3. What is the extent of copyright?
4. What is the first copyright law in the US?
5. State the history of copyright in the US.

110
Chapter: On the Web, Plagiarism Matters More Than Copyright Piracy

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: well and earns profits for its publisher, even through the industry makes few attempts to
claim on its websites. Projection on the merging industry of electronic book publication also

111
provides evidence on the web-based publication does not need the same level of copy right
protections against piracy as does hard-copy publication

What I expect to learn: to gain knowledge about On the Web, Plagiarism Matters More Than
Copyright Piracy, learns and understands On the Web, Plagiarism Matters More Than Copyright
Piracy

Review:

This part of the chapter talks about “On the web, Plagiarism matters more than copyright
privacy. Basically for I think this two are almost the same and deeply related because their
nature is the same the difference is getting profit from the product and saying that you’re the
owner of the product. To be more specific here the definition from Wikidepia “Plagiarism is the
use or close imitation of the language and ideas of another author and representation of them
as one's own original work.” While Copyright Piracy is based again from “Copyright infringement
(or copyright violation) is the unauthorized use of material that is covered by copyright law, in a
manner that violates one of the copyright owner's exclusive rights, such as the right to
reproduce or perform the copyrighted work, or to make derivative works.” Basically what I said is
just the summarization.

What I’ve learned:

Plagiarism
Piracy
Harm in Plagiarism
Harm in Piracy
Use of copyright
Mix of both concepts

Integrative Questions:

1. What is plagiarism?
2. What is piracy?
3. How does plagiarism and privacy differ from each other?
4. How does plagiarism and privacy similar from each other?
5. What is the use of copyright?

Chapter: An Ethical Evaluation of Web Site Linking

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

112
Quote: Even if a website is a form of intellectual property, what does it mean to say that one
owns this property? What is included in the bundle of rights that belong to a web author? We
cannot assume that justice because someone property claim on the web site that any deep
linking activities involving the morally forbidden.

What I expect to learn: to gain knowledge about An Ethical Evaluation of Web Site Linking,
learns and understands An Ethical Evaluation of Web Site Linking

Review:

This part of the chapter talks An Ethical Evaluation of Web Site Linking. Basically saving
that part and going directly to the site which is said to be bad and harmful because you would
not fully view the content. For me this is just a wise browsing because you would save it save us
time on doing this and being more direct. This topic I think should be taken seriously because
it’s the users ease to be able to maximize the use of the internet but other people are on a rush
so therefore I say it’s wise doing this. If this is bad then why do we have an application on our
computer called favourites where in we save the page which is website linking.

What I’ve learned:

The technical aspects of website linking


Two case studies
The ticketmaster vs Microsoft Case
Maria’s online art gallery
Websites as intellectual property
Utilitarianism
Labor-desert theory
Personality theory
Revisited deep linking
Respecting the common good

Integrative Questions:

1. What is deep linking?


2. What is website linking?
3. Explain the harm of deep linking.
4. What is personal theory?
5. What is Labor-desert theory?

Chapter: The Cathedral and the Bazaar

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

113
Quote: and so I inherited pop client. Just importantly, I inherited popclient’s web base. Users
are wonderful things to have, and not just because to demonstrate that you’re serving your
need, that you’ve done something right. Properly cultivatedm they can become co-developers

What I expect to learn: to gain knowledge about The Cathedral and the Bazaar, learns and
understands The Cathedral and the Bazaar

Review:

This part of the chapter talks The Cathedral and the Bazaar. I have read this before from
my previous subject. This talks about open source. This topic mainly talks about the history of
Linux. If u watch the movie pirates of Silicon Valley where in bill gates stole company secrets
this is it. It also talks about that without the contribution of Linux our technology would not be
close today. They have major contribution like the open source development method and etc.
lets give the definition of open source just to be clear based on Wikipedia “Open source is an
approach to design, development, and distribution offering practical accessibility to a product's
source (goods and knowledge). Some consider open source as one of various possible design
approaches, while others consider it a critical strategic element of their operations. Before open
source became widely adopted, developers and producers used a variety of phrases to describe
the concept; the term open source gained popularity with the rise of the Internet, which provided
access to diverse production models, communication paths, and interactive communities.”.
Basically it’s for all.

What I’ve learned:

The cathedral and the bazaar


Characteristics of a good programmer
Importance of having users
Releasing early and releasing often

Integrative Questions:

1. What is the “cathedral” mean?


2. What is the “bazaar” mean?
3. What do the author mean of hacker?
4. What is a fetchmail?
5. Why is it really important to have users?

Chapter: Towards A Theory of Piracy for the Information Age

Library Reference: Not Applicable

Amazon:

114
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: A control/restricted privacy access conception of privacy has the advantage that polices
for privacy can be fined.

What I expect to learn: to gain knowledge about Towards A Theory of Piracy for the
Information Age, learns and understands Towards A Theory of Piracy for the Information Age

Review:

This part of the chapter talks Towards a Theory of Piracy for the Information Age. Again
this topic main issue is about privacy and piracy. Again we have many technologies because of
that many people are claiming that they have created this and that. We take fore granted the
internet because it’s easy to use but sometimes we don’t recognize the user we just tend to
copy and past and be on our way. We forget to acknowledge and site the one who really
created it. There are two standard ways of privacy. First are instrumental values which mean
that it leads to something that is good. While, intrinsic value means that it is good in them.
Privacy is associated with instrumental value because with the internet that is public, we are
able to know certain information. It sort of we trust because everybody is using it so basically I
agree in this term. The main thought oh this chapter is does not harm you directly. Meaning use
of the information but on your own use and doing define what your privacy will be.

What I’ve learned:

The definition of Greased Data


Grounding Piracy
The nature of piracy
Setting and adjusting policies for private situations
Publicity principle
The rules and conditions of governing private situations

Integrative Questions:

1. What is the publicity principle?


2. What is the adjustment principle?
3. What is the definition of greased data?
4. What are the policies for private situations?
5. What is the definition of privacy of Charles Fried?

Chapter: The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with
Regard to the Processing of Personal Data and the free Movement of Such Data

Library Reference Number: N/A

Amazon:

115
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: The restricted access view is clearly relevant, because the questions of restricted
informational access are quite central in the Directive. In particular, the restrictions on the
processing of sensitive data are concerned with restricting access to the individual. There are,
however, many norms in the directive pertaining to data protection that are not adequately
described as restricting access to individuals.

What I expect to learn: What to know and gain knowledge about The Structure of Rights in
Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal
Data and the free Movement of Such Data, Learn and Understand The Structure of Rights in
Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal
Data and the free Movement of Such Data

Review:

This part of the chapter talks about The Structure of Rights in Directive 95/46/EC on the
Protection of Individuals with Regard to the Processing of Personal Data and the free Movement
of Such Data. The directive has several layers of provision: The data quality should have a
connection with the purpose of collection; it should also be accurate and up to date. The data
should be legitimate; the subject of the data should give his consent with regards to the
information shared. The sensitivity of data is also put into consideration. Personal data which
falls to the special categories of dare including the race, origin, religion, politics, health and sex,
which can be harmful to the subject’s interest one are not permitted, unless a consent is given.
Personal data are used for different purposes. It should not be processed if the subject does not
expect the date collection to take place. Privacy is restricted access, it is a limitation of how
individuals can access other people and that the spread of information can contribute to a loss
of privacy and security.

What I learned:

Introduction to the structure


The directive on the question of further processing of personal data
Data quality
Legitimate purposes
Sensitive data
The right to be informed
Data subject’s right to access and to object
The reprocessing of personal data
Using personal data for a different purpose
Data protection and the philosophy of privacy
Privacy as restricted access
Privacy as control
Channels for the flow of personal information
116
Relationship between privacy and data protection in the directive
Channels for the flow of personal information
Data protection and the protection of privacy
The directive and the protection of channels

Integrative Questions:

1. What is the relationship between privacy and data protection?


2. What do you mean by protection of channels?
3. What are the three aspects of privacy?
4. Is giving out personal information applicable in the Philippines?
5. What are the hindrances or problems that would happen if this giving out personal
information would be implemented?

Chapter: Privacy Protection, Control of Information, and Privacy-Enhancing Technologies

Library Reference Number: N/A

Amazon:

117
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: This tripartite structure of the theory of privacy is important to keep in mind that because
each part of the theory performs a different function. To give an account of one if the parts is not
to give an account of the others. The concept of privacy itself is best defined in terms of
restricted access, not control. Privacy is fundamentally about protection from intrusion and
information gathering by others. Individual control of personal information, on the other hand, is
part of the justification of privacy and plays a role in the management of privacy.

What I expect to learn: What to know and gain knowledge about Privacy Protection, Control of
Information, and Privacy-Enhancing Technologies, Learn and Understand Privacy Protection,
Control of Information, and Privacy-Enhancing Technologies

Review:

This chapter talks about Privacy Protection, Control of Information, and Privacy-
Enhancing Technologies. Mainly two main issues all the criticisms about the control of
information as to the issues about the privacy protection concerned. Second part discusses the
privacy enhancing technology that would control the personal information, if it is effective in
ensuring that our personal information will be secured in that software. Privacy is the big woop
in this topic that it says that we need privacy we like it or not. It talks about how to improve
privacy and maximize. But the problem is our network is to be that sometimes some just hack in
and destroy the privacy that why the topic gives tips on how to strengthen your privacy and
issues about it.

What I learned:

The theory of privacy


Normative privacy and the restricted access theory
The use control in the justification and management of privacy
Privacy-enhancing technologies
PETs
PETs and the role of individual choice in controlling personal information
PETs and the principle of informed consent
PET owners beware

Integrative Questions:

118
1. What is PETs?
2. Why is it appealing?
3. Explain the theory of privacy.
4. What is descriptive privacy?
5. How would you differ normative privacy and descriptive privacy?

Chapter: Toward an Approach to Privacy in Public: Challenges of Information Technology

Library Reference Number: N/A


119
Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: It was to be compiled from information already. “Out there” and would use no intrusive
in bedrooms. Information was to be harvested from public records and from records of
transactions that individuals carried out in the public arena and made no efforts to hide

What I expect to learn: What to know and gain knowledge about Toward an Approach to
Privacy in Public: Challenges of Information Technology Learn and Understand toward an
Approach to Privacy in Public: Challenges of Information Technology

Review:
This part of the chapter talks about Toward an Approach to Privacy in Public: Challenges
of Information Technology. It discusses the scope of privacy that we don’t know how to scale it a
perspective. We all know that people need privacy but sometimes to what level that does
privacy goes. There are two misleading assumptions about privacy. One is there is a realm of
public information about persons to which no privacy norms apply. This are the things that are
known or given information about the person. Second is an aggregation of information does not
violate privacy if its parts, taken individually do not. It’s not our problem because we have to
know what is happening with our circle of friends that we have to know the information for
example would you be friend a person you known has a blood lust for killing you will think about
it but the answer sometimes is always no. Sometimes information is a must

What I learned:

Privacy
The personal Realm
Violating privacy in public – the case of Lotus Marketplace: Households
Two misleading Assumptions
Erroneous Assumption1
Erroneous assumption 2
Implications for a theory of privacy

Integrative Questions:

1. What is privacy?
2. What do you mean by personal realm?
3. Explain the first erroneous assumption.
4. What does this chapter highlights?
5. What the biggest challenge in the information technology?

Chapter: KDD, Privacy, Individuality, and Fairness

Library Reference Number: N/A


120
Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: It should be observed that group profiles may occasionally be incompatible with respect
to individual’s privacy and rules and regulations regarding the protection of personal data, as it
is commonly conceived of. For instance, distributive profiles may sometimes be rightfully
thought of as infringement of individual privacy when the individuals involved can easily be
identified through a combination with other information available to the recipient or through
spontaneous recognition.

What I expect to learn: What to know and gain knowledge about KDD, Privacy, Individuality,
and Fairness, Learn and Understand KDD, Privacy, Individuality, and Fairness

Review:
This part of the chapter talks about KDD, Privacy, Individuality, and Fairness. This
chapter is about knowledge in discovery in database, privacy individuality and fairness. Through
KDD, relevant information from data is gathered. The KDD process includes the collection,
enriching, checking, coding, analyzing and interpretation of the data. Personal date is discussed
as gathered information about the person. Which is protected by the law, The data that should
be gathered must be accurate that prevent mishaps like for example you have an allergy that
trigger a violent disease the doctors must know the information about you so they will know how
to cure if not you will surely die. The subject must give consent for the data processing. The
date subject has the right to his personal data; he has the right to know the information relating
to the data. There is a consequence on privacy conceptions. It makes it hard to label the
problem areas of using personal data of applying it to group profile and it also makes it different
to take in the intensity of these problems.

What I learned:

Definition of KDD
Personal data
Law
Ethics
Social consequences
Categorial privacy
Solutions
Closing remarks
Acknowledgements

Integrative Questions:

121
1. What is KDD?
2. What is distributive justice?
3. What do ethics mean?
4. Define categorial privacy.
5. Enumerate the solutions stated in this chapter.

Chapter: Data Mining and Privacy


122
Library Reference Number: N/A

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Devised by computer scientist David Chaum, these techniques prevent the dossier
society in which computers could be used to infer individuals’ life styles, habits, whereabouts,
and associations from data collected in ordinary consumer transactions can have a chilling
effect causing the people to alter their observable activities.

What I expect to learn: What to know and gain knowledge about Data Mining and Privacy,
Learn and Understand Data Mining and Privacy

Review:
This part of the chapter talks about Data Mining and Privacy. Basically again like the
previous chapter it talks about privacy but emphasizes on data mining. This brief definition of
data mining from Wikipedia to have a clear idea “Data mining is the process of extracting hidden
patterns from large amounts of data. As more data is gathered, with the amount of data
doubling every three years, data mining is becoming an increasingly important tool to transform
this data into information. It is commonly used in a wide range of profiling practices, such as
marketing, surveillance, fraud detection and scientific discover” Basically like it’s said hidden
pattern of data and extracting large amount of data. Some workers worry that their personal
information will be given out by the companies. I believed that it would be unethical if that would
happen. But I don’t think that companies would give out such important information of their
workers since they would also be affected if they will try to do it.. This chapter also suggests the
government to separate privacy and data mining since there is conflicts if those two terms will
be put together.

What I learned:

Knowledge Discovery and Data Mining


The issue
Analysis of the issue
Issues in the first case as well as the second case
Categories in pre-existing data
Cluster data by mapping

Integrative Questions:
123
1. What is data mining?
2. What is data warehouse?
3. What is the first case study of this chapter?
4. How do you analyze an issue?
5. What are the categories of pre-existing data?

124
Chapter: Workplace Surveillance, privacy and distributive justice

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: In each individual case, different tactics will be used by the different parties to secure
interest.

Review:

At this time, most of the employers prefer to have surveillance camera on their
employee’s office. This is because they want to see if their employees were doing things behind
their back for them or doing their responsibilities rights it’s just for their security but what about
these who worked for them? They will feel that they are untrust worthy to be left without
surveillance. For me surveillance camera is fair enough if your employer sees something wrong
about your performance, he will say it, as an employee you have to improve, so that the next
time your employer will do the workplace surveillance he will see that you improved since the
employee is working in ones company. Privacy here is not that necessary. As the quote says” In
each individual case, different tactics will be used by the different parties to secure their interest
not only the interest of the employer but also the employee. I have read that “there is also
accumulating evidence that surveillance of individual leads to stress a last a sense of dignity
and a general environment of mistrust. Why? Because most employer doesn’t know how to talk
to people. Yes! Employers you should treat your employee’s the way you treat yourself. You
sometimes or should I say most of the time shouting at them employer should treat their
employees well and employees should do their very best for the company.

What I’ve learned:

Definition of surveillance in the workspace


Definition of privacy and justice
Resisting workplace surveillance
Privacy as a matter of justice
Privacy, surveillance, and distributive justice
From individual perspective
From the perspective of the collective
Self-interested individuals
Conclusion
Some implications

125
Integrative Questions:

1. What is surveillance?
2. Why do we need workplace surveillance?
3. What is the disadvantage of having surveillance camera?
4. Is surveillance camera ethical or unethical?
5. What does this author mean of surveillance camera?

126
Chapter: Privacy and Varieties of Informational Wrongdoing

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: A person doesn’t stop from learning. They always have necessities? Always not
contented and has a never ending needs. Once it’s not yet found they will search for it. Once
they found it all they will still want more and more they abused it without realizing the side
effects.

What I expect to learn: to gain knowledge about Privacy and Varieties of Informational
Wrongdoing, learn and understand Privacy and Varieties of Informational Wrongdoing

Reviews:

All the things that are to much be not good how the information inequality stops while
there would are people who welcome the benefits that information technology give them in
exchange for he use of their personal data? So this is also the reason why people here in the
Philippines exchange their presidential votes for two cans of sardines, three pillow of rice and a
pack of noodles. In addition to that, government is encouraging establishments to use panoptic
technology such as surveillance camera, and data mining techniques because it is for the public
good. I agree to what the government is doing. They always think of the group of people who
will be benefited and not by individual. I know it is tough to think of such things but it is really just
a matter of thinking a smart way of approaching such problems. I can name more than ten
informational wrongdoing that have been happening online in a consistent basis

What I’ve learned:

Definition of Privacy
The different varieties of informational wrongdoing
Panoptic technologies and the public good
Information-based harm
Informational inequality
Informational injustice
Spheres of access
Encroachment on moral autonomy

Integrative Questions:

1. What is privacy?
2. How can you categorize an action to be a “wrongdoing”?
3. What is informational inequality?
4. What is informational injustice?
5. What does the government encourage the establishments to do?
127
Chapter: Security in Cyberspace

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Stories about criminal activities involving computers have been highly publicized since
the 1970 & 1980, and much has been written about the “hacker culture”

What I expect to learn: to gain knowledge about Security in Cyberspace, learn and understand
Security in Cyberspace.

Review:

There are so many benefits we can get from computers internet. As a student, I can say
that I am lucky to live in computer age. Chatting with friends, listening to music, watching video
clips, playing on line games that are some of the reason I thank those inventors for this amazing
thing. Every person has their own mind. They are free to do what they want but abusing the
cyberspace is not good to those person who is in the right age, what more to children? So I
guess it’s necessary to have security in cyberspace. For their children’s it should be their
parents also for all. It might be broad to say that everyone needs security but it is true that we
need it for protection against the pending harm.

What I’ve learned:

Prevention is better than cure. I cab say this because like illness once it is active, it’s not
that easy to cure. But if you prevent to have illness you don’t have to cure at all. It is like the
crime, abuse and terrorism in cyberspace. Most of the people in the world used computers.
Some are ill and the worst thing is they choose not to cure their sickness.

Integrative Questions:
1. What is security?
2. What is Cyberspace?
3. What is Cyber Terrorism?
4. Who does Cyber Terrorism Prevented?
5. Why do people choose to harm other people?

128
Chapter: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in
Cyberspace

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Considering out analysis thus far, one might be inclined to infer that there are no
legitimate grounds for having separate category of computer crime. But would such an interface
be justified at this point? Putting aside that question for a moment. One still might ask what
practical purpose would be served in our framing such a category of crime.

What I expect to learn: to gain knowledge about defining the Boundaries of Computer Crime:
Piracy, Break-Ins, and Sabotage in Cyberspace, learn and understand Defining the Boundaries
of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace.

Review:

This part of the chapter talks about defining the Boundaries of Computer Crime: Piracy,
Break-Ins, and Sabotage in Cyberspace. There are three types of crime first of is software
piracy which is making profit out of people work without permission for example are the movies,
DVD, and other vend able product. My reaction to this it’s can’t be stop because it’s cheaper
and easier to get rather than the original that is expensive. Second is what they call electronic
break ins. This is more of violating the privacy of the owner or the companies secrets because
programmers will hack the system or companies to get private information. Third is what they
call computer sabotage. This is the most common encounter when I was a newbie because I
tend to go to sites and try out everything not knowing there are viruses that will destroy your
computer. This purpose is they are having the anti virus that they sell it to you or sometimes
they just want to have reckoning.

What I’ve learned:

Boundaries of Computer Crime


Definition of a Computer crime
The need to know these computer crimes
Legal categories of computer crime
Moral categories of computer crime
Informational/descriptive categories of computer crime
Computer crime as a descriptive category of crime
Establishing clear and coherent criteria
Applying the definition to some specific cases
The three types of computer crime:
Piracy
Break-ins
Sabotage

129
Integrative Questions:
1. What is Piracy?
2. What is Brea-ins?
3. What is Sabotage?
4. What is a computer crime?
5. Among the three, which do you find unethical and ethical?

130
Chapter: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in
Cyberspace

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: we strongly appase any attempt to use the power of hacking to threaten or disprog the
information infrastructure of any country fir any reason declaring “was” this has nothing to do
with hacktivism or the hacker ethics and is nothing a hacker can be proud of.

What I expect to learn: to gain knowledge Terrorism or Civil Disobedience: Toward a Hacktivist
Ethic, learn and understand Terrorism or Civil Disobedience: Toward a Hacktivist Ethic.

Review: the law does not support the damaging of other nations computer, networks or system
in any way. Nor will the law use their skills, abilities or connections to take any actions against
the system, network or computers in china or iraq which may damage or make their own way of
operation. Intellectual property is not a tangible material entity. It is nothing more that a violation
volt patern of electros arrayed in pattern of open and closed gates to form intelligible numerical
or textual sysmbols. Information documents and data aside inside computers is a form that can
be stolen ever being removed, indeed without ever being touch by a would be theft or depriving
owner from still using and profiting of the property.

What I’ve learned:

I’ve learned that hacktivism in its infacy but given the ubiquity and democratising
possibility of the internet, we will certainly bear witness to the movement growing pairs and
increasing maturity, one thing is sure hovewer incidents of cyber hactivism are on the rise and
will continue to be the rise in the real future.

1. What is a Hacktivist?
2. What is a Hacktivist ethic?
3. What do you mean by electronic civil disobedience?
4. Is hacktivism ethical or unethical?
5. What is ECD mean?

131
Chapter: Web Security and Privacy: An American Perspective

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: the right of the people to be secure in their persons, houses papers and effect and effect
against unreasonable searches and seizures shall not be violated and so warrants shall issue,
but upon probable supported by death or affirmation particularly describing the place to be
searched and the persons or things to be sized.

What I expect to learn: to gain knowledge about Web Security and Privacy: An American
Perspective, learn and understand Web Security and Privacy: An American Perspective.

Review:

The privacy implications are that people on their surveillance are not likely to express
views an go to assemblies or religious meeting with which the agencies of surveillance are likely
to disagree, the freedom to read is the freedom to read without fear of surveillance the court has
ruled that the right to privacy covers memberships and personal associations confirming the
rights of member to pursue their lawful private interest privately and to associate freely with
others.

What I’ve learned:

There are pracy promises of information technology. Many of the conflits between data
availability and privacy can be resolved.

Access Control List


Definition of security
Definition of integrity
Availability
Private key encryption
A replay attack
Simple replay attacks fall with public key cryptography
Browsing information
Provided technical services
Browser client connects
Definition of the following:
ISP
IP
DNS
Web proxy
Legal Issues and Societal Implications
Web activities

132
Integrative Questions:

1. What does ISP mean?


2. What does IP mean?
3. What does DNS mean?
4. What is Web Proxy?
5. What is the Web Activities Mentioned?

133
Chapter: The Meaning of Anonymity in an Information Age

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: the natural meaning of anonymity as many be reflected in ordinary usage or a dictionary
definition is of remaining nameless that is to say conducting oneself without revealing one’s
name. We easily may be able to identify him without throwing his name although in the past
most dared and effective way of getting at a person was through his offer name.

What I expect to learn: to gain knowledge about The Meaning of Anonymity in an Information
Age, learn and understand The Meaning of Anonymity in an Information Age.

Review:

In the computerized world with the system of information that we currently have in place
namelessness by itself is no larger sufficient for protecting what is at stake in anonymity. If it is
true as I have suggested that one can gain access to a person through bits or constellation of
bits of information then protecting anonymity today amounts to more than merely withholding a
name it meant withholding the information of constellation of information it now takes target at or
get to a person. Anonymity is defined as hiding one true identity.

What I’ve learned:

We must think not only of how a person can prevent his/her name from being developed.
But how a person can prevent all the crucial bits of information from being divulged. Especially
the bits of information that when divulged would enables access to him or her.

Brief definition of anonymity


Data-flow
Information registration
Gatekeepers
Analysis after admission
Methods
Anonymity of sender
First encryption with a public and secure key
Double encryption twice applied
Encryption procedure with an anonymity sender

Integrative Questions:
1. What is Data-flow?
2. Who are the gatekeepers?
3. What is anonymity?
4. Is it really necessary to analyze after admission?
5. Explain the encryption procedure with an anonymity sender.
134
Chapter: Written on the Body: Biometrics and Identity

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: So we are stuck with a riddle” How can a biometric identifier be both identifying and not
saying anything particular about you? I think the key to this riddle may be found in the idea that
meaning is not something intrinsic, but, following determined by use. Following this kind of
reasoning, we should perhaps not expect to be able to determine any intrinsic meaning of
biometric data, or the biometric body in general, but investigate quite specifically what uses and
practices biometrics will become part of.

What I expect to learn: to gain knowledge about Written on the Body: Biometrics and Identity
learn and understand Written on the Body: Biometrics and Identity.

Review:

Biometrics is often described as the next big thing in information technology since the
revolution in IT with all its new forms of communication has change so many aspects of social
and economic life in western countries the new level of complexity call forth a need for new
ways of maintaining order and providing security. major buyers of biometrics technology can be
found in the private sectors particularly among corporation with high security interest and a
limited access areas alike banks and nuclear power plants but important impetus comes from
government and government related department and services. Catering to client populations of
thousands of termillitars of people.

What I’ve learned:

I learned that there are some question in what sense “ identity” is at stakes in biometric
identification techniques. There are some indications that these techniques actively involve
every narrow concepts of identity which may not be very significant from a social theoretical or
philosophical perspective.

Use of biometrics
ATMs
Identifying biometric identity
Virtual identities
Questioning the biometric body

135
Integrative Questions:

1. What is a biometric?
2. How can a biometric identify our identity?
3. What is the reason behind double decryption?
4. Compare emails before and now.
5. What is the process of double decryption?

136
Chapter: Ethical Considerations for the Information Professions

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: Ethics will continue to be put through new tests as technologies race ahead of many
social and cultural conventions and norms.

What I expect to learn: to gain knowledge about Ethical Considerations for the Information
Professions, learn and understand Ethical Considerations for the Information Professions

Review:

This chapter talks about ethical considerations for the professional people. I believed
that this chapter is very significant because this talks about the reason why there is a need to
have code of ethics. In class, I learned that there are many code of ethics. This is maybe the
main reason why it is important. Many businesses nowadays have seen the importance of
having code of ethics and they really implement code of ethics in their business. What is code of
ethics? Code of ethics is to give us a guide to be professional and especially to act as
professional. There is a need for this in order to remind the professional people to act as
professional. There is a big difference to act as a professional and a professional because
sometimes there are professional people, but the important thing for them is money or to earn
money.

What I’ve learned:

Philosophical foundations
Major issues
Flagrant quantitative imbalance
Inequality in information resources
De facto hegemony
Lack of information in developing countries
Survival of the colonial era
Code of ethics
Issue definition and evaluation
Action/Inaction Evaluation and implementation

137
Integrative Questions:

1. What are the ethical considerations for the information profession?


2. Explain the flagrant quantitative imbalance.
3. What is Robert McChesney view?
4. Give some code of ethics.
5. What are the different phases of ethical considerations?

138
Chapter: Software Engineering Code of Ethics: Approved!

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote:

What I expect to learn: to gain knowledge about Software Engineering Code of Ethics:
Approved! Learn and understand Software Engineering Code of Ethics: Approved!

Review:

This part of the chapter talks about Software Engineering Code of Ethics: Approved!
The rules and essential guidelines. For the appropriate use of lousiness computers are
awareness by senior management of the actual. And potential uses of company computer
system is just as important as knowledge of any others activity. The purpose of a business
computer system (and/or application) should be made specific before it is installed. There
should never be unofficial changes in this use. Should changes be later considered essential
discussion and formal agreement are necessary and approval should not be considered
automatic? All use of company computer system should be within these specified rules and
guidelines. It is important that development of company rules is not merely a pape exercise staff
should be trained in both policy and implementation.

What I’ve learned:

I’ve learned computers and computer software develop very rapidly indeed. What is science
fiction today could be practicable tomorrow and maybe common practice the day after,
managers responsible for computers systems need to e aware not only of the current situation.
Of the potential future.

IEEE-CS/ACM Joint task force on software engineering ethics


professional practices
The short version of the software engineering ethics
Public
Client
Employer
Product
Judgment
Management
Profession
Colleagues
self
The full version
The applied principles

139
Integrative Questions:

1. What does IEEE-CS stands for?


2. What does ACM stands for?
3. What is Robert McChesney view?
4. Give some code of ethics.
5. What are the different phases of ethical considerations?

140
Chapter: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: any moral code whether in computing or elsewhere can be turned to by someone
feeling pressure to find a relatively easy way out of a morally thickly situation, thus they any
moral code could be looked at in the hope that it will provide an excuse for potential immoral
acts. It is profitable or we can say good to have moral ethics, or ethical codes `but there are
disadvantages of this. For example giving a code of ethics that is not complete gives some
people groups of organization chance to do the things that is not written in the code of ethics
without violating any form of moral act. There are playing with the law, just like some of our
attorneys here in the Philippines they are finagling out what is not written in the law and taking
that against their and advantages to themselves.

What I expect to learn: to gain knowledge about No, PAPA: Why Incomplete Codes of Ethics
are worse than none at All, Learn and understand No, PAPA: Why Incomplete Codes of Ethics
are worse than none at All

Review:

I think all the computer companies and all of these who have a connection in the
computer word, should be unite there selves to form a complete code of ethics by this
collaboration, they are strengthening the code and putting enough power to it . If this will be
possible this code of ethics will have its weapon to punish violators and the future of the
computer realm orders to every aspect.

What I’ve learned:

I’ve discover that we do not have a complete code of ethics in the computer industry
some of the untackle issues are the possible danger to life a weapon system and whether it
might be increased or reduced by a new system being developed

Definition of PAPA
Weapons or the question of whether the technology for use in weapons systems ought to be
developed
Environmental impact of these systems
Teleworking
Telecommuting
Protecting the weak against the strong
Importance of the PAPA issues
The pressures to look for loopholes on codes
Incomplete moral codes
Complete moral codes

141
Avoiding accidental incomplete moral codes

Integrative Questions:

1. What do you mean by PAPA?


2. Define teleworking.
3. Define telecommuting.
4. What are the strong and weak points?
5. Why it is that incomplete code of ethics are worse than none at all?

142
Chapter: Subsumption Ethics

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: American common law subsumes juridical decisions, and a half dryer subsumes an
electric motor. Subsumption in computers is different because there is so much more
subsumption going on than in simple machines.

What I expect to learn: to gain knowledge about No, PAPA: Why Incomplete Codes of Ethics
are worse than none at All, Learn and understand No, PAPA: Why Incomplete Codes of Ethics
are worse than none at All

Review:

This part of the chapter talks about Subsumption Ethics. This chapter talks about
subsumption ethics. Subsumption ethics means the process in which the decision will be
operated by a machine that would make a decision as to run or to stop it. The difference of
computers and human is that we can make decisions. Computers would only do what the users
wants him to do. We, humans can choose what is best for us. This chapter suggest that
because we are human, we should do the right action and not the wrong action. The issue is
more of a man vs machine like the terminator.

What I learned:

Subsumption ethics
Systems Development
Organizational policy drives IT development
Axious of Subsumption ethics
Four axioms
Ethical Framework
Philosophical frameworks applied to subsumption ethics
Unnecessary complexity to common C programmers
Popclient becomes fetchmail
Fetchmail grows up
Few more lessons from fetchmail
Necessary preconditions for the bazaar style
The social context of open-source software
On management and the maginot line

143
Integrative Questions:

1. What is subsumption ethics?


2. What is systems development?
3. What are the axioms of subsumption ethics?
4. Can you give examples of subsumption ethics?
5. How does subsumption ethics works?

144
Chapter: Ethical Issues in Business Computing

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: all companies of what ever size should be consider their use of computer system. We
should be adopting the words new technologies. The world of offers machine and gadgets to
help us to run more efficiently our business it’s up to us to accept it.

What I expect to learn: to gain knowledge about Ethical Issues in Business Computing, Learn
and understand Ethical Issues in Business Computing

Review:

I’ve heard computers and computers software develop very rapidly indeed. What is
science fiction today could be predictable tomorrow and my be common practice the day after,
managers responsible for computer system need to be aware not only of the current situation,
but of future potentials. First is the nature of data. This means what the data is and what it can
give to me as a person. Second is category. This means the data is in what category. The
questions that will be raised here is “Can I access this kind of data?” The main role of
computers in business is to solve the problems of the business. I agree to it since we should
use its functionality in order to achieve our goal.

What I’ve learned:

Scope of business computing


Business computing itself
Size issues
Level one
Level Two
Level Three
Level four
The tasks of business computing
Data considerations
Awareness by stakeholders and users

Integrative Questions:

1. What is business computing?


2. What is the purpose of a business computing system?
3. What are the penalties for computer misuse?
4. Give examples in level two business.
5. Give examples in level three business.

145
Chapter: The Practitioner from Within: Revisiting The Virtues

Library Reference: Not Applicable

Amazon:
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

Quote: ethical responsibility begins by taking the ethical points of view, we must respect others
and their core values if we can avoid policies that result in significant harm to others that would
be a good beginning toward responsible ethical behaviour. Awareness to others is the key to
this role putting aside your selfish desire and putting your feet in other shoes is very important to
the moral ethics

What I expect to learn: to gain knowledge about The Practitioner from Within: Revisiting the
Virtues, Learn and understand The Practitioner from Within: Revisiting the Virtues

Review:

Western society is confronted with moral and ethical problems on a daily basis tabloids,
soap operas and scandals screams about breaches of ethical, lying ,immoral behaviour etc. that
bounce seriousness’ of the front page information technology, we are faced with a myriad if
ethical problems generated by computer mediated action, invasions of privacy using the internet
for pornography, and illegal to information and system have become as news worthy as the sex
scandals and more far-reaching the response these issues at least in the united states has been
to try to pass laws to stop the abuse, as we have seen these attempts at regulation are
seriously disputed by those who values the freedom associated with the global information
infrastructure and are hacked around by those with technological expertise. The reality of
computers technology is that sooner or later we will all become practitioners from within on
many different levels , we therefore need infrastructure of information and communication
technology, use should through moral agency does not negate serious attention to action nor
concern for objects in the information infrastructure rather it adds one more dimension to a
complex field and approaches computers ethics as the integrative, global field that it is.

What I’ve learned:

Ethics
Morality
Character forming vs. Action guiding theories
Need for contemporary moral theory
Revisiting the virtues
Core vales
Practitioner from within
Imagination and narrative genre

146
Integrative Questions:

1. Enumerate the core values and explain each.


2. What do you mean by revisiting the virtues?
3. What virtues are mentioned?
4. What are their similarities?
5. What do you learn from this chapter?

147

You might also like