You are on page 1of 98

ITETHIC

Quan Zhou

8/12/2009

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0


Philippines License.
Dedication
To my parents: Johnny Valentino Sermonia, Zheng Jian Hua

To my Siblings: Wen Ya Zhou, Kimberly Anne Sermonia

To my girlfriend: Lynette Marie Tan

To my thesismate: Christopher Sison, Seaian Villanueva, Adrian Jonathan de


Leon

To my classmate and friends

2
Preface
This book has been designed to provide every students and readers about the
comprehensive introduction of ethics. Each chapter includes stories and explanations by the
greatest philosophers in our era. They compiled their ideas and thoughts to compose informative
schemes. In terms of cyber world in our generation, ethics played a big role by its historical
stories and evolution. The author has written this book to be primarily focused on the ethics of
computer which is taught to the educate every students.

By finishing the book, the reader will be awarded by being able to read several longer
chapters which reflect the affluent history of ethics and the importance out of it.

Table of Contents

CyberEthics

3
Dedication…………………………………………………………………………………………………………………………………………2

Preface…………………………………………………………………………………………………………………………………………….3

Ethics and the Information Revolution………………………………………………………………………………………………………….8

Ethics On-Line…………………………………………………………………………………………………………………………………….9

Reason, Relatively, and Responsibility in Computer Ethics………………………………………………………………………………….10

Disclosive Computer Ethics………………………………………………………………………………………………………………………11

Gender and Computer Ethics…………………………………………………………………………………………………………………….12

Is the Global Information Infrastructure a Democratic Technology…………………………………………………………………………..14

Applying Ethical and Moral Concepts and Theories to IT Contexts………………………………………………………………………….15

Just Consequentialism and Computing…………………………………………………………………………………………………………16

The Internet and Public Space…………………………………………………………………………………………………………………...17

The Laws of Cyberspace………………………………………………………………………………………………………………………….18

Of Black Holes and Decentralized Law-making in Cyberspace………………………………………………………………………………19

Fahrenheit 451.2…………………………………………………………………………………………………………………………………..20

Filtering the Internet in the USA………………………………………………………………………………………………………………….22

Censorship, the Internet, and the Child Pornography Law of 1996………………………………………………………………………….23

PICS: Internet Access Controls Without Censorship………………………………………………………………………………………….24

Internet Service Providers and Defamation…………………………………………………………………………………………………….25

A Politics of Intellectual Property…………………………………………………………………………………………………………………26

Intellectual Property, Information, and the Common Good……………………………………………………………………………………27

Is Copyright Ethical? ............................................................................................................................................................................28

On the Web, Plagiarism Matters More than Copyright Piracy………………………………………………………………………………..29

An Ethical Evaluation of Web Site-Linking……………………………………………………………………………………………………..30

The Cathedral and the Bazaar…………………………………………………………………….…………………………………………..…31

Towards a Theory of Privacy for the Information Age…………………………………………..…………………………………………….32

The Structure of Rights in Directive 95/46EC…………………………………………………………………………………………………33

Privacy Protection, Control of Information, and Privacy- Enhancing Technologies……………………………………………………..34

Toward an Approach to Privacy in Public Challenges of Information Tevhnology………………………………………………………35

KDD, Privacy, Individuality, and Fairness…………………………………………………………………………………………………….36

Data Mining and Privacy………………………………………………………………………………………………………………………..37

Workplace, Surveillance, Privacy and Distributive Justice…………………………………………………………………………….….....38

Privacy and the Varieties of Informational Wrongdoing………………………………………………………….…………………….……..40

Defining the Boundaries of Computer Crime…………………………………………………………………………………….…….………41

Terrorism or Civil Disobedience……………………………………………………………………………………………..…..…………….…42

4
Web Security and Privacy………………………………………………………………………………………………….…..………….……..43

The Meaning of Anonymity……………………………………………………………………………………………………………………….44

Double Encryption of Anonymized Electronic Data Incharge………………………………………………………………………………...45

Written on the Body: Biometrics and Identity…………………………………………………………………………….………………….….46

Ethical Considerations for the Information Professions ……………………………………………………………….………………….…..47

Software Engineering Code of Ethics: Approved …………………………………………………………………….………………………..48

No, PAPA: Why Incomplete Codes of Ethics Are Worse Than None at All ……………………………………….………………………..49

Subsumption Ethics ……………………………………………………………………………………………………....………………………50

Ethical Issues in Business Computing ……………………………………………………………………………….…..………………….…51

The Practitioner from Within: Revisiting the Virtues ……………………………………………………………….……………………….…52

ACM Code of Ethics and Professional Ethics……………………………………………………………………….……..………………….53

The Institute of Electrical and Electronics Engineers, Inc. Code of Ethics……………………………………….…………………………54

The Handbook of Information and Computer Ethics


Foundations of Information Ethics …………………………………………………………………………………………………………...56

Milestones in the History of Information and Computer Ethics ……………………………………………………………………………57

Moral Methodology and Information Technology ……………………………………………………………………………………………59

Value Sensitive Design and Information System ……………………………………………………………………………………………60

Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property ……………………………………………….62

Informational Privacy: Concepts, Theories, and Controversies…………………………………………………………………………….64

Online Anonymity………………………………………………………………………………………………………………………………..65

Ethical Issues Involving Computer Security: Hacking,Hacktivism, and Counterhacking…………………………………………………66

Information Ethics and the Library Profession ………………………………………………………………………………………………..67

Ethical Interest in Free and Open Source Software ………………………………………………………………………………………….68

Internet Research Ethics: The Field and Its Critical Issues ………………………………………………………………………………….69

Health Information Technology: Challenges in Ethics, Science,and Uncertainty ………………………………………………………….70

Ethical Issues of Information and Business ……………………………………………………………………………………………………71

Responsibilities for Information on the Internet ……………………………………………………………………………………………….72

Virtual Reality and Computer Simulation ………………………………………………………………………………………………………73

Genetic Information: Epistemological and Ethical Issues …………………………………………………………………………………….74

The Ethics of Cyber Conflict ………………………………………………………………………..……………………………………………75

A Practical Mechanism for Ethical Risk Assessment …………………………………………………………………………………………76

Regulation and Governance of the Internet ……………………………………………………………………………………………………77

Information Overload …………………………………………………………………………………………………………………………….78


5
Email Spam ……………………………………………………………………………………………………………………………………….79

The Matter of Plagiarism: What, Why, and If ………………………………………………………………………………………………….80

Intellectual Property: Legal and Moral Challenges of Online File Sharing ………………………………………………………………...81

Censorship and Access to Expression ………………………………………………………………………………………………………....82

The Gender Agenda in Computer Ethics ……………………………………………………………………………………………………….83

The Digital Divide: A Perspective for the Future ………………………………………………………………………………………………84

Intercultural Information Ethics ………………………………………………………………………………………………………………….85

The Fortune at the Bottom of the Pyramid

The Market at the Bottom of the Pyramid………………………………………………………………………………………………………87

Products and Services of BOP………………………………………………………………………………………………………………….89

BOP: A Global Opportunity………………………………………………………………………………………………………………………91

The Ecosystem for wealth Creation…………………………………………………………………………………………………………,,,.92

Reducing Corruption: Transaction Governance Capacity……………………………………………………………………………………93

Development as Social Transformation…………………………………………………………………………………………………….....95

6
Cyber Ethics

Title: Ethics and the Information Revolution

Quote: “Million of tasks are now routinely performed by computers.”

Expectation: I expect to learn more about technology.

Book Review:
7
I learned about the information technology and human values which
will help us to develop knowledge in computer. I have also learned about the
history of Computer Technology in 1940s ,1950s ,1960s ,1970s ,1980s and
1990s. This chapter has thought me on how to redefine the field of computer
ethics. It has five different attempts to define a field which were explained by
many authors like Walter Maner, Deborah Johnson, James Moor, Terrell Ward
Bynum and Donald Gotterbarn. There are also sample topics in computer
ethics which are computer in the workplace, computer security, software
ownership and professional responsibility. In addition, there are also global
information ethics such as Global Laws, Global Cyberbusiness and Global
Education.

What I have learned:

I have learned about the history of IT.

I have learned about the different attempts to define a field which are
explained by various programmers

Integrity Questions:

1.) What are the five different attempts to define a field?

2.) Who are the programmers?

3.) What is the history of IT?

Title: Ethics On-Line

Quote:

8
“Law and technology will never be enough to solve behavioral problems on-
line.”

Expectation:

I expect to learn more about on-line communications and its anonymities.

Book Review:

Generally, this chapter explains about the future of our on-line


communications. It also illustrates the different special characteristics of
communication in networks which are the scope, anonymity, and
reproducibility. These characteristics are very important and have a big role
in technology. Anonymity is known as a problem in networks and this may
seem to have many reasons. It creates the process more difficult to find the
criminals and it also lacks information in integrity.

Things I have learned:

I have learned about the importance of on-line communications and its value
in the future.

Integrity Questions:

1.) What is on-line communication?

2.) What are the advancements of on-line communication in the future?

3.) What is anonymity?

4.) What the different anonymity?

9
Title: Reason Relativity, and Responsibility in Computer Ethics

Quote:

“Computer are also informationally enriching.”

Expectations:

I expect to learn about the reason and responsibility of programmers.

Book Review:

This chapter tells about the logical malleability and informational


enrichment. In this chapter, it also tackled about the special nature. It also
specializes on some special topics like reasons within relative frameworks.
This tells about the shortcoming and difficulties in ethics. Above all topics,
core values are very important to each and every one of us. This is not only
for computer programmers but also to every individual .Responsibility is one
of the core values which everyone needs to understand. This will helps us to
know how to judge others.

Things I have learned:

I have learned the core values of ethics.

Integrity Questions:

1.) What are the core values?

2.) What are the reasons for framework?

3.) What are the logical malleability and information enrichment?

10
Title: Disclosive Computer Ethics

Quote:

“Privacy is often taken to be an aspect of autonomy.”

Expectation:

I expect to learn about the disclosive in computer ethics.

Book Review:

This chapters talks about the limitation of mainstream computer ethics


which takes the point in applied ethics. I have learned that the two important
interrelated limitations. First, it tends to focus too narrowly on publicity
recognized moral dilemmas. Second, it tends to downplay computer
technology itself as an object of moral analysis. This chapter also tackles
about the hidden morality and disclosive computer ethics. The importances
of key values as departure points for analysis are the justice, autonomy
which is freedom, democracy, and privacy.

Things I have learned:

I have learned the key values in making points for analysis.

Integrity Questions:

1.) What are the two interrelated limitations?

2.) What are the limitations of mainstream?

11
Title: Is the Global Infrastructure a Democratic Technology?

Quote:

“Democracy is a value in the sense that when individuals make claims about
the Internet or the GII being democratic…”

Expectation:

I expect to learn more ideas about the global infrastructure as a democratic


technology. I also anticipate learning more about their different meanings.

Book Review:

It is said that the global infrastructure is often a democratic technology.


The goal of this chapter is to explore what are these that might help in
approaching the GII. Technology has a big role in our daily lives. The higher
the technology is the higher is the growth of the economy. But many scholars
said that technology never embodied values and it only highlights that value
arise when technology is used. The author gave many ways to explain the
embedded values in technology, first is the moral or metaphysical meaning
of embedded values. Second, the support meaning of embedded values.
Third, the material meaning of embedded values. Last is the expensive
meaning of embedded values. The starting place of power and insularity is
democracy according to this chapter and it gives power to the majority of
people. Finally, the most important in democracy is the idea of joint
deliberation.

What I have learned:

I have learned so many things about democracy in technology and how


important is the global technology to us.

Integrity Questions:

• What is democracy?
12
• What is GII? And who are them?

• Global technology, is it a democratic technology?

• What are the different ways of explaining the embedded values in


technology?

• What is the starting place for power and insularity? Who will benefit for
it?

• What is joint deliberation?

• How important is the global technology?

13
Title: Gender and Computer Ethics

Quote:

“From the manager viewpoint, men may be influenced more effectively


through statements of what is legal or not.”

Expectation:

I expect to learn more about the rights of women.

Book Review:

This chapter talks about the rights of women in computer ethics. It also
tackled about the gender and computer ethics and gender in computer
ethics. The women are being criticized in technical skills. People in the
society thinks men are better than women in programming and analyzing
because men are more trained than women in this kind of field. Some people
believes that women are fruitful in the Information Technology because of
their reading skills.

Things I have learned:

I have learned to understand others from different kinds of view.

Integrity Questions:

1.) What are the gender and computer ethics?

2.) What are the critics about women?

14
Title: Applying Ethical and Moral Concepts and theories to IT Contexts: Some
Key Problems and Challenges

Quote:

“There are good reasons to distinguish between ethics in a narrow sense.

Expectation:

I expect to learn more about ethical and moral concepts.

Book Review:

In this chapter, it helps us to more socialize than other people. Privacy


is an issue here in chapter 7 because privacy is very important to each and
every one of us. The author of this book is Frans A.J. Birrer. I have learned
from him that there are always a key to an obstacle. In this chapter, it also
tackled about the Connecting ethics and social contexts. Actions and
consequences are being tackled in ethics and social context. The computer
ethics and role of experts are some problems that are being taken for
granted.

Things I have learned:

I have learned not to take things for granted.

Integrity Questions:

1.) Who is Frans AJ Birrer?

2.) What is ethics?

15
3.) What are social contexts?

4.) What are the problems in this chapter?

5.) What is privacy?

Title: Just Consequentialism and Computing

Quote:

“Policies are rules of conduct ranging from formal laws to informal”

Expectation

I expect to learn about the consequentialism

Book Review:

This chapter is written by James H. Moor. In this chapter, it tackled


about the benefits and harm of consequences. It also tackled about the good
as the enemy of just. This topic talks about that we should give more
considerations and benefits to others. The things that I learned here I can
use it in my future work because it will helps me a lot in my human
management skills and IT.

Things I have learned:

I have learned to cooperate and understand other people.

Integrity Questions:

1.) Who is James H. Moor

2.) What is the meaning of good as the enemy of just?

3.) What is the meaning of computing in uncharted waters

4.) What is justice?


16
5.) What is consequences?

Title: The Internet as Public Space: Concepts, Issues, and Implications in


public policy

Quote:

“The internet has long been identified as an information agora.”

Expectation:

I expect to learn where internet has touch people lives.

Book Review:

Internet has spread around the public places. We can easily access
internet because we already have wifi. In this chapter, the rules and
regulation of internet are being tackled. Normal citizen can express their idea
about a certain topic which they can’t do in real life. Internet is worldwide so
it has different cultures. I learned from this chapter to learn to respect others
about their ideas and their cultures. We also should be aware of the sites
that are not allowed by children. We, as an IT programmer in the future,
should help our parents to disable the parental site in the computer. In small
ways, we can help our brothers and sisters to grow normally.

Things I have learned:

I have learned the rules and regulation of internet.

Integrity Questions:

1.) What is internet?

2.) What are the places that usually have internet?

3.) What is the importance of internet?


17
4.) What does internet changes Universities?

5.) Does internet helps Hospital in their record?

Title: The Law of Cyberspace

Quote:
“Cyberspace is unavoidable.”

Expectation:
I expect to learn about the importance and meaning of cyberspace.

Book Review:
In this chapter, it talks about the evolution of cyberspace. A long time
ago in Russia, their country is using a system of internal passports which
most of them hate it. This kind of passport can determine which country you
want to go and who will associate you. It is an alternative of access of one
country to another country. As this evolves, the age of the cyber-libertarian
has caught the cyberspace publicity. It is unstoppable at this time and
unbalance. We also admit that no nation can live without it and no nation can
avoid it in spreading. Cyberspace is the place where each people are free to
control the real space rulers. There are no laws and rules in cyberspace, all
individual can explore things they want to explore and things they want to
discover.

What I have learned:


I have learned about the cyberspace evolution and it importance.

Integrity Questions:
• What is cyberspace?
• What is the importance of cyberspace?

18
• Who benefits in cyberspace?
• What are the two ideas of the author?

Title: Of Black Holes and Decentralized Law-Making in Cyberspace

Quote:
“One chooses to define better than available alternatives.”

Expectation:
I expect that I will learn about the laws and policies in cyberspace as
well its order and disorder functions.

Book Review:
There are various laws and policies discussed in this chapter. The
thought came from two competing factors such as order and disorder but it
gives new shape in cyberspace. The author tackled different suggestions
for the law-making in cyberspace. First is the incident, these are events that
are unanticipated. Second is the explanation, these are ideas to deal with in
the cyberspace. Third is the question, these are things that have to be asked
and understand especially the functions of cyberspace. Last is the debate,
these are the interesting and important facts that have to be debated and
give a bright idea. These are the four important things that need to be
understood and remembered.

What I have learned:


I have learned more about cyberspace and its laws and policies. I have
also learned the four suggestions of the author.

Integrity Questions:
19
• What is cyberspace?
• What are the laws and policies that have been applied?
• What are the suggestions of the author?
• What are the important things to be remembered about cyberspace?

Title: Fahrenheit 451.2: Is Cyberspace Burning?

Quote:

“…where there is smoke, there is fire.”

Expectation:

I expect to learn the self regulation in the internet and explore new things in
the cyberspace.

Book Review:

This chapter talks about that the internet needs to be treated like
books and other printed matters when it comes to value. It is worthy of the
same high level of free speech protection. This article also asked if
cyberspace is really burning, no it is not according to the author. There are
also several announcements that have been raised by the White House like
Netscape plans to join Microsoft. Second is IBM is making a large amount of
money grant to Recreational Software Advisory Council. Next are the four
major search engines like Google planned to cooperate to the “Self-
regulation” promotion of the internet. Lastly, Sen. Murray imposed civil and
criminal penalties on those who degrade a site. The author also gave
recommendations and principles like internet users know the best, default
setting on free speech, letting the buyers to be aware, prohibit coercion or
censorship and let the libraries to be a free zone.

There are also six reasons why self-rating schemes are wrong for the
internet, first one is because it will just cause controversial speech to be
20
censored. Secondly, self-rating is burdensome, unwieldy and costly. Third is
all conversations are cannot be rated. Fourth, it will just create “Fortress
America” on the Internet. Fifth is it will only encourage, not prevent,
government regulations. Finally, it will turn the Internet into a homogenized
medium dominated by commercial speakers.

Integrity Questions:

• Is really the cyberspace burning?

• What are the six reasons why self-rating schemes are wrong for the
Internet?

• What are the problems with user-based blocking software in the home?

• What are the disadvantages of having a third-party rating?

• Why blocking software should not be used by public libraries?

• What is Free Speech Online?

Things I have learned:

I have learned the reasons why self-rating schemes are wrong for the
internet and the problems with user-based blocking software in the home. It
helped me also to get an idea in blocking software.

21
Title: Filtering the Internet in the USA: Free Speech Denied?

Quote:

“How to distinguish “good” sex (or violence) from “bad”?”

Expectations:

I expect to learn what internet can do.

Book Review:

In this chapter, Examples of problems with blocking and filtering


program are being tackled. One example of those is child’s pornography. It
makes the parents worry so much because internet can either be deadly or
helpful. In this chapter it also talks about using filtering program which will
help many children to access parental guidance site. The censorship must be
implemented and watch carefully. In this way, we, as a student, can avoid
pornography.

Things I have learned:

I have learned to take things into consideration

Integrity Questions:

1.) Who is Richard S. Rosenberg?


22
2.) What is Filtering program?

3.) What can a library do to make difference?

4.) What are the website suggestions?

5.) Who control the censorship?

Title: Censorship, the Internet, and the Child Pornography Law of 1996: A
Critique

Quote:

“When law speaks universally, then a case arises on it….”

Expectation

I expect to learn about internet child abuse.

Book Review:

In this chapter, child protections are the main goal because they are
the future. We should stop showing child pornography which will ruin their
life. The government has made a law for that which is The Child Pornography
Prevention Act of 1996. This act tells us not to sell, reproduce, sent, receive,
any child pornography. The victim of child pornography is a long term effect.
They would feel tremble fear and social dimension.

Things I have learned:

I have learned to respect others.

Integrity Questions:

1.) What is CPPA?

2.) What is Child Pornography?

3.) What are the laws for Child Pornography?

4.) Who is Jacques N Catudal?

5.) What are the effects of Child Porno?

23
Title: PICS: Internet Access Controls Without Censorship

Quote:

“Not every material is appropriate for every audience.”

Expectation

I expect to learn to how to maintain porno site.

Book Review:

In this chapter, website blocking is being tackled. Pornography is easily


access nowadays. I think that are government should do something about it
by teaching the parents the appropriate way to block a site. Flexible blocking
is also being discussed in this chapter. Not all the people are not banned
from watching pornography or violence. That’s why we have to know which
people are not allowed to. PICS don’t specify the selection software or rating
services work.

Things I have learned:

I have learned to do what I should do.

Integrity Questions:

1.) What is Pornography

2.) What is PICS?


24
3.) What is website blocking?

4.) Who is Paul Resnick?

5.) Who is James Miller?

Title: Internet Service Providers and Defamation: New Standard of Liability

Quote:
“Malice is defined as reckless disregard of the publisher regarding the
truth…”

Expectation

I expect to learn about the Internet service providers.

Book Review:

In this chapter, it talks about the legal definitions and standards. It


also talks about the internet service provider and internet defamation. This
gives the customer easy access to the internet. I also learned that legal
precedents for ISP liability. This talks about the liability of the service center
concerning about their client. It also debates about the cyberspace alter the
need for Libel laws. It also tackled about the moral perspective.

Things I have learned:

I have learned about the service provider.

Integrity Questions:

25
1.) What are legal precedents?

2.) What is ISP?

3.) Who is Richard?

4.) What are the legal definitions and standard?

5.) What is internet defamation?

Title: A Politics of Intellectual Property: Environmentalism for the Net?

Quote:

“Code is Code.”

Expectation

I expect to learn about the intellectual Property.

Book Review:

In this chapter, it talks that we need politics. Politics is for human being to
obey and to follow. Without these things, we could not live nicely. We should thank
our government for doing a good job rather than rallying in the street. Copyright is
another topic in this chapter. We should do our own work and not copy other people.

Things I have learned:

I have learned about the law in internet and copyrights.

Integrity Questions:

1.) Who is James Boyle?

2.) What is copyright?

3.) What are the violations in technological measures?


26
4.) Who is politics?

5.) What is “code is code”?

Title: Intellectual Property, Information, and the Common Good

Quote:

“What does it mean to “own” an idea?”

Expectation

I expect to learn about the common good and intellectual property.

Book Review:

In this chapter, it talks about the conflicts over the intellectual property
which has five cases. Plagiarism is one of the cases. This is about copying
others work. Second, software piracy is the stealing of other work and mass
produce it. Third, repackaging data and database is not for commercial use.
The company can sue you if you use it without permission. The fourth one is
reverse engineering Computer software. Lastly, it is the copying in
transmission.

Things I have learned:

I have learned to obey the five laws.

Integrity Questions:
27
1.) What is Plagiarism?

2.) What is software piracy?

3.) What is repackaging data and database?

4.) What is reverse engineering Computer software?

5.) What is copying in transmission?

Title: Is Copyright Ethical? An Examination of the Theories, Laws, and Practices


Regarding the Private Ownership of Intellectual Work in United States

Quote:

“The traditional legal basis for property is well defined….”

Expectation:

I expect to learn about the Law in ethics.

Book Review:

In this chapter, it talks about the constitution of US that helps the author to
have their rights in their work. It debates about the rights and how to do they arise.
Property rights also are another important topic in this chapter. They are also
theories of intellectual property and copyright coming out. History of copyright in US
is also being discussed. Their past may serve a good example. It also tells what
copyright doesn’t cover.

Things I have learned:

I have learned to learn about the copyright.

28
Integrity Questions:

1.) What is copyright?

2.) What is property rights?

3.) What is the constitution that helps the author?

4.) Who is Shelly Warwick?

5.) What is Copyright Ethical?

Title: On the Web, Plagiarism Matters More than Copyright Piracy

Quote:

“It would be plagiarism but not piracy…”

Expectation:

I expect to learn about the web plagiarism.

Book Review:

In this chapter, it talks about plagiarism and piracy. Plagiarism is the


disappointment for not letting the true owner to have the credit. On the
other hand, piracy is literally getting the file or infringement of a copyright.
In this chapter, it talks about what are the harms of plagiarism. The author is
the victim of plagiarism because they are the one who thinks the work or the
idea. It also talks about the use of copyright. The use of copyright is for you
to own a work or material.

Things I have learned:

I have learned about plagiarism and piracy.


29
Integrity Questions:

1.) What is Plagiarism?

2.) What is piracy?

3.) What is the use of copyright?

4.) Who is the victim of plagiarism?

5.) Who is John W. Snapper?

Title: An Ethical Evaluation of Web Site-Linking

Quote:

“The site containing the hypertext link will be called the ‘source site’.”

Expectation

I expect to learn about the link in website.

Book Review:

In this chapter, it talks about the technical aspects of web site linking.
The web site linking is multiple sites in a main page of a website. They are a
lot of harm in deep link those are the lost in advertising revenues and
property rights are being broken. It also talks about the ownership. Who has
the rights to edit and own a website is being discussed.

Things I have learned:

I have learned about the website and deep link.

Integrity Questions:

1.) What is website linking?


30
2.) What is deep link?

3.) What is a website?

4.) Who is Richard A. Spinello?

5.) What is Ethical Evaluation?

Title: The Cathedral and the Bazaar

Quote:
“Given enough eyeballs, all bugs are shallow.”

Expectation

I expect to learn about the cathedral and the bazaar.

Book Review:

In this chapter, it tackled about the mail must get through. They give
us good lessons which are “every good work of software starts by scratching
a developer’s personal itch and good programmers knows what to write and
great ones know what to rewrite.”“ The quote is according to The Cathedral
and the Bazaar. It also talks about the importance of having a user. Without
the user, the company won’t get any profit and the bugs are hard to detect
because no one use it.

Things I have learned:

I have learned to be a good developer.


31
Integrity Questions:

1.) Who is Eric Raymond?

2.) What is Cathedral?

3.) What is Bazaar?

4.) What is the importance of the users?

5.) What do you mean by “ the mail must get through”?

Title: Towards A Theory of Privacy for the Information Age

Quote:

“Privacy is a curious value.”

Expectation:

I expect to learn more about the ethical theory of privacy for the information
age today.

Book Review:

This chapter discussed about the theory of privacy, it is important


especially in problems that involves computations. Computers have big roles
in our lives like in manipulating information, storing endless information, in
sorting efficiently and locating effortlessly. We all appreciate the easy way in
accessing a computer because all of our works will be effortlessly done in
time. We also like the advantage of speedy and computerized information in
the computer. From the view of ethical theory, privacy is an individual

32
preference. There are also two standard ways of justifying privacy that
describe the limitations of these approaches.

Things I have learned:

I have learned the theory of privacy and the standard ways of justifying
privacy.

Integrity Questions:

1. Who is James H. Moor?

2. What is the theory of privacy?

3. What are the two standard ways of privacy?

4. What is the importance of computer?

5. What are the functions of computer?

Title: The Structure of Rights in Directive 95/46EC on the Protection of


Individuals with Regard to the Processing of Personal Data and the Free
Movement of Such Data

Quote:

“Personal data must be collected for specified, explicit and legitimate


purposes and not further processed in a way that is incompatible with those
purpose.”

Expectation:I expect to learn about the implemented form of national


legislation in Europe.

Book Review:

33
Generally, this chapter explains about the structure rights on
protecting the individuals with regards to the processing of personal data. It
was implemented in the form of national legislation in Europe. This will help
the government in shaping the European standard concerning privacy rights.
These are the important things to remember in processing personal data,
data quality, legitimate purposes, sensitive data, the right to be informed,
data subject’s right to access and to object, the reprocessing of personal
data and using personal data for a different purpose. There is also some data
protection and philosophy of privacy that have been discussed and privacy
as restricted access.

Things I have learned:

I have learned that this helped the government in shaping the European
standard concerning privacy rights.

Integrity Questions:

1. Who is Dag Elgesem?

2. What is the law in Europe?

3. What is the importance of this legislative?

4. What are the important things to remember in processing personal


data?

5. What is the protection and philosophy of privacy?

Title: Privacy Protection, Control of Information, and Privacy-Enhancing


Technologies

Quote:

“….to have personal privacy is to have the ability to consent to the


dissemination of personal information.”

34
Expectation:

I expect to learn about the privacy protection.

Book Review:

In this chapter, I learned about the theory of piracy and the role of
control in the theory of piracy. It talks about the protection of own work. I
should say that piracy should be stop so that no one will be hurt or victim in
the process. We should do our own work and not copy from other people
ideas. It is good to create our own ideas rather than copying others work. It
makes me feel that I am contented with myself.

Things I have learned:

I have learned to create my own ideas rather than copying others work.

Book Review:

1.) Who is Herman T. Tavani?

2.) Who is James H. Moor?

3.) What is the theory of piracy?

4.) What are the roles of control in the theory of piracy?

5.) Is piracy affecting other people life?

Title: Toward an Approach to Privacy in Public: Challenges of Information


Technology

Quote:

“At the heart of the concern to protect “privacy” lies a conception of the
individual….”

35
Expectation:

I expect to learn the ways to prevent piracy.

Book Review:

In this chapter, it talks about the privacy and the personal realm. This
is a protection against those who follow the rules in Information Technology.
It also discuss about the implications for a theory of privacy. This talks about
the piracy that is being done. Don’t let others to mislead us. It is best that we
do our own work honestly.

Things I Have learned:

I have learned that privacy is a important thing.

Integrity Questions:

1.) Who is Helen Nissenbaum?

2.) What do you mean by personal realm?

3.) How does Helen react to privacy?

4.) What is privacy?

5.) What is the implications for a theory of privacy?

Title: KDD, Privacy, Individuality, and Fairness

Quote:

“The analytical and distinctive evaluative potential of our privacy vocabulary


can perhaps be improved by introducing the notion of categorical privacy.”

36
Expectations: I expect to learn the true meaning of KDD, privacy,
individuality and fairness.

Book Review:

This chapter explained about Knowledge Discovery in Database which


they call “KDD”. According to Frawley, Piatetski-Shapiro and Matheus, it is
described as the nontrivial removal of implied information, previously
unfamiliar, and potentially useful information from data. It has personal data,
law and ethics, social consequences and categorical privacy. In personal
data, it is frequently considered to be limited kind of data qualified for
fortification by privacy law and privacy norms. The data that has been used
can have social consequences because not all profiles are always qualified as
personal data. Categorical privacy has many kinds and most conceptions of
individual privacy currently put forward, in law and ethical debate have one
feature in common.

Things I have learned:

I have learned about the meaning of KDD and the importance of privacy,
individuality and fairness to every individual.

Integrity Questions:

1. Who is Anton H. Vedder?

2. What is KDD?

3. What is the importance of KDD?

4. Is KDD, privacy, individuality and fairness are important to every


individual?

5. What are the social consequences that can occur in ones privacy?

Title: Data Mining and Privacy

37
Quote:

“Privacy is invaded when any means are used that bypass the subject’s
consent as manifested by the subject’s observable.”

Expectations:

I expect to learn more about data mining and privacy.

Book Review:

This chapter talks about the data mining, its function is to retrieve
databases in response to a query. Base on the study of Fulda, data mining
using knowledge discovery is very important and useful because the process
of discovering such patterns may classify data into preexisting categories,
cluster data by mapping them into categories created during data analysis
and determined by the data, provide summary of the data, which is useful in
a sense that the raw data are not, describe dependencies between variables,
find links between data fields, use regression to predict future values of data
and model sequential patterns in the data that may indicate revealing
trends.

Things I have learned:

I have learned that data mining and privacy are two very important
things in the cyber world.

Integrity Questions:

1. Who is Joseph S. Fulda?

2. What is data mining?

3. How important is data mining?

4. What are the issues in data mining?

38
5. What are the analysis in data mining and privacy?

Title: Workplace Surveillance, Privacy and Distributive Justice.

Quote:

“Privacy is a matter of justice.”

Expectations:

I expect to learn more about the importance of surveillance and its


limitations.

Book Review:

Surveillance is a continual observation of a person or group, especially


one suspected of doing something illegal. It is often used by our modern
society and has been one of the central issues in our communities. It has a
big role in our government and this chapter discussed about its purpose in
privacy and being distributive in justice. It has a big percent in firms that are
using surveillances because it will help them to monitor such as firm’s
records, employee communications and different activities on the job. In
using surveillance, it also includes phone calls, e-mail and computer files.
The chapter also had surveyed some government firms, officials and some
countries that re using surveillance in their daily lives and regulations. Some
people can resist surveillance in their workplace if they want to have privacy
and it is because privacy is a matter of justice.

Things I have learned:

I have learned that all people can have the right to make their lives
private and it is a matter of justice. I also learned more about the limitations
and importance of surveillance.

Integrity Questions:

39
1. Who is Lucas D. Introna?

2. What is surveillance?

3. What are the limitations of surveillance?

4. What is the importance of surveillance?

5. Is it privacy is a matter of justice? Explain.

6. What are the firms that can use surveillance?

7. What are the functions of surveillance?

40
Title: Privacy and the Varieties of Informational Wrongdoing

Quote:

“Liberalism is plagued by free-rider problems, by people who continue


to enjoy the benefits of membership and identity while no longer
participating in the activities that produce these benefits.”

Expectation:

I expect to learn more about privacy and the varieties of informational


wrongdoing.

Book Review:

This chapter explains about the privacy issues that lie at the center of
an ongoing deliberation in many countries. This article is divided by seven
topics which are panoptic technologies and the public good, information-
based harm, informational inequality, informational injustice, spheres of
access and encroachment on moral anatomy. The privacy issue is more
concerned in questioning how to balance the claims of those who want to
give limitations the availability of personal information in protecting all
individuals. This issue also emerges in many privacy discussions.

Things I have learned:

I have learned more about privacy and its seven discussions on how to
explain the informational wrongdoings.

Integrity Questions:

41
1. Who is Jeroen van den Hoven?

2. What are the varieties of informational wrongdoing?

3. What are the seven divisions that explain privacy?

4. How important is privacy to every individual?

5. How to detect informational wrongdoing?

Title: Defining the boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage
inCyberspace

Quote:

“An attempt is made to establish clear and coherent criteria for


determining which criminal activities involving the use of computer
technology…”

Expectations:I expect to learn more about the different kinds of computer crimes
and how to prevent it.

Book Review:

This chapter talks about the recent criminal cases that can happen in
cyberspace such as piracy, break-ins and sabotaging. Reports have been
recorded in some various cover stories, headlines in newspaper and leading
periodicals. Some categories of computer crime are legal, moral and
information or descriptive. Computer crime can be defined as descriptive
because it reasonably asks what the value would be in pursuing questions.
Establishing clear and coherent criteria and applying our definition to some
specific cases are very important in preventing computer crime. There are
also three types of computer crime; these are software piracy, electronic
break-ins and computer sabotage.

Things I have learned:

42
I have learned more about the three types of computer crimes and its
categories.

Integrity Questions:

1. Who is Herman T. Tavani?

2. What are the three types of computer crimes? Explain each.

3. Why computer crime is defined as descriptive?

4. What are the two important ways in preventing computer crime?

5. What are the categories of computer crime?

Title: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic

Quote:

“In this era of global commerce via the internet, strikes against the
hegemony of bureaucratic capitalism and the commercialization of the Internet will
inevitably be carried out on the World Wide Web.”

Expectations:

I expect to learn more about terrorism and how to prevent hacking.

Book Review:

This article of Manion and Goodrum tackles terrorism or civil disobedience


and in this era of global commerce the population of terrorists has increased. These
hacks lead to extensive rumor regarding the motivation of the doers. There are also
many types of terrorism like electronic civil disobedience, hacktivism and electronic
civil disobedience, hacktivism and cyber terrorism. There are acts that are
considered civilly disobedient such as no damage done to persons or property, non-
violent, not for personal profit, ethical motivation and willingness to accept personal
responsibility for outcome of actions. There are also three principles of hacking like
accessing to computers, all information should be free and mistrust authority.

43
Things I have learned:

I have learned the three principles of hacking and the different types of
terrorism.

Integrity Questions:

1. Who are Mark Manion and Abby Goodrum?


2. What is terrorism or civil disobedience?
3. What are the three principles of hacking?
4. What are the different kinds of terrorism?
5. What are the acts that are considered civilly disobedient?

Title: Web Security and Privacy: An American Perspective

Quote:

“Browsing the Web gives one the heady feeling of walking without footprints
in cyberspace.”

Expectations:

I expect o learn more about web security and its importance.

Book Review:

This chapter is divided to four discussions which are introduction,


definitions, browsing information and legal issues & social implications. It will
take no footprints or any proof that you have browsed the cyber space. It is
told that security is often confused with privacy because security is
concerned with confidentiality while privacy is concerned with the private
lives or information of every person. Security has also three goals which are
integrity, authentication and confidentiality. Authentication is establishing

44
the uniqueness of a user identity while integrity is about honesty and loyalty.
Confidential information given to authorized person only.

Things I have learned:

I have learned the differences between privacy, security and


anonymity and also the three goals of security.

Integrity Questions:

1. Who is L. Jean Camp?


2. What are the differences between the three: privacy, security and
anonymity?
3. What are the three goals of security?
4. What is the importance of web security?
5. What is web security in American perspective?

Title: The Meaning of Anonymity in an Information Age

Quote:

“People are strolling through a foreign city are anonymous because no one
know who they are.”

Expectations:

I expect to learn more about the meaning of anonymity and how to solve it.

Book Review:

Base on the discussion of Nissenbaum, her chapter tackles more about the
meaning of anonymity in an information age. It discussed that anonymity is
conducting oneself without revealing one’s name. Some cases in anonymity are
sending electronic email to an individual without any name of the sender in any part
of the header, taking part in a chat room or electronic forum, or in a game without
one’s given name that will identify them, buying something with the digital
equivalent of cash and visiting web site without having to reveal one’s identity.
45
There are also two methods to solve problems, when the data is sent electronically,
we must have the senders identification to be added to the message automatically.
The second one is to decrypt an encrypted message and we should know the
decryption key of the sender.

Things I have learned:

I have learned how to solve anonymity and I have become more aware in
different cases of anonymity.

Integrity Questions:

1. Who is Helen Nissenbaum?


2. What is anonymity?
3. How to solve anonymity?
4. What are the different cases of anonymity?
5. What are the two methods in solving problems?

Title: Written on the Body: Biometrics and Identity

Quote:

“Biometrics is often described as ‘the next big thing in information


technology’.”

Expectations:

I expect to learn more about biometrics and its importance to


information technology.

Book Review:

This chapter generally discussed about biometrics. It is about the new


invented client identification system for ATM or the Automatic Teller
Machines for banks and institutes. It was also made for other electronic
46
transactions in computer. ATMs were generated by inputting your password
before making any money transactions. Identity is very important in
biometric identification techniques for security of everyone’s account. Van
Kralingen made a discussion about the importance and difference between
determination of identity and verification of identity. Determination of
identity is about the real identity of a person while verification of identity is
verifying if the person is the owner.

Things I have learned:

I have learned many things about biometrics and its importance


especially its two kinds of distinctions which are determination of identity
and verification of identity.

Integrity Questions

1. Who is Irma van der Ploeg?

2. What is the importance of identity in biometric identification


techniques?

3. What is the difference between determination of identity and


verification of identity?

4. What is the importance of biometrics in information technology?

5. What is an ATM and its connection to biometrics?

Title: Written on the Body: Biometrics and Identity

Quote:

“Major buyers of biometric technology can be found in private sector.”

Expectations:

47
I expect to learn about the biometrics.
Book Review:

This chapter is divided into four main topics such as introduction,


identifying biometric identity, Virtual Identities, and Questioning the
Biometric body. Introduction talks about the problem and what did the author
do to solve the problem. Identifying biometric identity talks about the efforts
that can be seen or realize to make a comparable difference. Virtual
identities talks about the abundant privacy literature. Questioning the
biometrics talks about the contrary to what has been written to IT Company.

Things I have learned:

I have learned more about the biometrics.

Integrity Questions:

1.) What is Biometrics?

2.) Who is Irma van der Ploeg?

3.) What is Biometric identity?

4.) What are Virtual identities?

5.) How to identify biometric?

Title: Ethical Considerations for the Information Professions

Quote:

48
“Information ethics reflects the meeting of the social, the technological, and
the philosophical.”

Expectation:

I expect to learn more about ethical consideration for the professional.

Book Review:

In this chapter, three major topics are being discussed such as


introduction, philosophical foundations and major issues. Introduction talks
about the author and the situation we are in. Philosophical foundations talks
about the three major realms of ethics which are descriptive, normative and
meta-ethics. Major issues talks about the lack of strength we have in the field
of Information technology.

Things I have learned:

I have learned about the three major realms of ethics.

Integrity Questions:

1.) Who is Elizabeth A. Buchanan

2.) What is descriptive?

3.) What is normative?

4.) What is meta-ethics?

5.) What is philosophical foundations?

Title: Software Engineering Code of Ethics: Approved!

Quote:

49
“Ethical tension can be best addressed by thoughtful consideration of
fundamental principles, rather than blind reliance on detailed regulations.”

Expectation:

I expect to learn more about the software engineering code.

Book Review:

In this chapter, the eight principles of soft engineers are being


discussed such as public, client and employer, product, judgment,
management, profession, colleagues, and self. Public means that we should
act according to public interest. Client and employer mean that software
engineers should follow the boss and their client. Product means that it
should be executed excellently. Judgment means that they should know what
is right and wrong. Management means that they should know to manage
their people. Profession means that you should do your job with respect.
Colleagues mean you should be fair with the people around you. Self means
you should always know that what you do is right.

Things I have learned:

I have learned the eight principles of software engineers.

Integrity Questions:

1.) Who is Don Gotterbarn?

2.) Who is Keith Miller?

3.) Who is Simon Rogerson?

4.) What are the eight principles of software engineers?

5.) What are the improved principles?

Title: No PAPA: Why Incomplete Codes of Ethics Are Worse Than None at All

50
Quote:

“Does the code support the weak against the strong?”

Expectation:

I expect to learn how to make a code that would harm less people.

Book Review:

In this chapter, people should be aware of what they do and what they
create. The codes they create may be helpful to others but not always.
Sometimes it can be harm to the poor people or to the rich people. I think in
this chapter we should be more considerate to others and not think of our
personal interest. We should also avoid the incomplete moral code which
means that if we don’t complete it we could harm other people.

Things I have learned:

I have learned to understand how people feel.

Integrity Questions:

1.) Who is N. Ben Fairweather?

2.) What are the problems in this chapter?

3.) What are the incomplete moral codes?

4.) How to avoid incomplete moral codes?

5.) What can you do to solve the problem?

Title: Subsumption Ethics

Quote:
51
“When is a rose not a rose?”

Expectation:

Book Review:

This chapter talks about the Ethical frameworks which are “the Golden
Rule”, “the Golden Means”, “action without desire of aversion”, and “ethical
complexity”. The Golden Rule means that if you want others to be nice to
you, you should also do the same. The Golden Means talks about the route to
happiness and virtue. Action without desire of aversion means that we
should not be greedy and we should not hate others. Ethical complexity talks
about justice that John Rawls illustrate.

Things I have learned:

I have learned the four ethical frameworks.

Integrity Questions:

1.) Who is David Gleason?

2.) What is the Golden Rule?

3.) What is the Golden Mean?

4.) What is the Action without desire of aversion?

5.) What is the Ethical Complexity?

Title: Ethical Issues in Business Computing

Quote:

52
“Do we really have to treat business computing differently from other
aspects of modern business practice?”

Expectation:

I expect to learn more about business computing

Book Review:

In this chapter, it talks about four sizes of issues which are Level One,
Level Two, Level Three, and Level Four. Level One talks about the small
business that uses computer for storing the items that they have. Level Two
talks about the larger business organization and they have one section for
computer. Level Three can hire a computer specialist which can help them
solve. Level Four can have at least one team of computer specialist to help to
solve.

Things I have learned:

I have learned the four level of business computing.

Integrity Questions:

1.) Who is Duncan Langford?

2.) What is Level One in business computing?

3.) What is Level Two in business computing?

4.) What is Level Three in business computing?

5.) What is Level Four in business computing?

Title: The Practitioner from Within: Revisiting the Virtues

53
Quote:

“It is difficult to get youth up a right training for virtue if one has not been
brought up under right laws;”

Expectation:

I expect to learn more about virtue.

Book Review:

In this chapter, it taught me how to be considerate. It tells me that


one should not harm other people core values. We should respect other
people and their core value. It is better to avoid the disagreement about
core values. If we encounter this topic, we should carefully ask them about
how to live their life using the core values that they believe.

Things I Have Learned:

I have learned to respect other people and their core values.

Integrity Questions:

1.) Who is Frances S. Grodzinsky

2.) What is ethic?

3.) What is morality?

4.) What is core value?

5.) Should we judge other people’s core value?

Title:ACM Code of Ethics and Professional Ethics

Quote:
54
“Accept and provide appropriate professional review.”

Expectation:

I expect to learn about the code of ethics and professional ethics.

Book Review:

In this chapter, three major topic are being discussed such as general
moral imperatives, more specific professional responsibilities, and
compliance with the Code. In general moral imperatives, it talks about the
values that we need to have such as being honest and fair. In more specific
professional responsibilities, it talks about the things that we need to follow
such as existing laws and contract. In compliance with the Code, we should
follow the code as Godly laws.

Things I have learned:

I have learned the ACM ways.

Integrity Questions:

1.) Who adopted Appendix A?

2.) What are the general moral imperatives?

3.) What are the specific professional responsibilities?

4.) What are the compliance with the code?

5.) What are the three major topic in Appendix A?

Title: The Institute of Electrical and Electronics Engineers, Inc. Code of Ethics

Quote:

“There is something more at work here than just accumulating information.”


55
Expectation:

I expect to learn the laws in appendix b.

Book Review:

In this chapter, I have learned the ten laws of IEEE. The Golden Mean is
applied in the laws of IEEE. Not only are the Golden Mean applied, but also
Aristotle famous work which is the Golden Rule. The complexity supports the
system of IEEE. One of the law that I like is “to reject bribery in all its form”
because I hate cheating.

Things I have learned:

I have learned the ten laws of IEE.

Integrity Questions:

1.) What did the Chapter Appendix B tells us?

2.) What does IEEE do?

3.) What does IEEE mean?

4.) What are the ten laws of IEEE?

5.) Does Golden Rule, Golden Mean have to do with the IEEE?

56
The Handbook of
Information and
Computer Ethics

Title: Foundations of Information Ethics

Quote:

“IE is too philosophical in the worst sense of the world.”

Expectations:

57
I expect to learn more about Information Ethics (IE), its four stages and
four important principles.

Book Review:

This chapter explains about the foundations of information ethics. It


has three different stages; first one is IE as an ethics of informational
resources, secondly, IE as an ethics of informational products. Third stage is
IE as an ethics of the informational environment and lastly is information
ethics as a macro ethics. IE is described as a resource, product, and
environment and has a big role in ethics in this chapter. There are also three
steps that IE needs to climb like bringing together the three informational
arrows, considering the whole information cycle and analyzing all entities
that are involved. IE also have four moral principles which include the dos
and don’ts.

Things I have learned:

I have learned the different stages of IE and its important principles.

Integrity Questions:

1. Who is Luciano Floridi?

2. What is a transition system?

3. What are the four stages of information ethics?

4. What are moral agents and human agents?

5. What are the four moral principles that may guide the actions of homo
poieticus?

6. What are the two recurrent objections against IE?

Title: Milestones in the History of Information and Computer Ethics.

Quote:

“The academic field of information ethics was born unintentionally and


almost accidentally.”
58
Expectations:

I expect to know the history if information ethics and computer ethics


from different veterans in computer.

Book Review:

This book discussed about the information ethics of various computer


philosophers like Norbert Wiener, Walter Maner, Deborah Johnsons, James
Moor, Donald Gotterbarn and Luciano Floridi. First part is discussed by
Wiener’s view on information ethics, his account of a good life, his
information ethics methodology. Maner’s talks about computer ethics
initiatives on his own experiences. Deborah Johnsons illustrated her
influential textbook and the start of the uniqueness debate. James Moor
tackled about his classic paper his influential computer ethics theory. The
professional-ethics approach of Donald Gotterbarn, it is important because it
focuses on professional responsibility. Floridi also showed his information
ethics philosophies.

Things I have learned:

I have learned more about the history of information and computer


ethics from different prestigious philosophers.

Integrity Questions:

1. Who is Terrell Ward Bynum?

2. Who are the different computer philosophers that contributed to the


history of computer ethics?

3. Which of the topics is the most interesting?

4. What is James Moor classic paper?

5. What is Deborah Johnsons’ influential textbook?

6. Why is Gotterbarn’s professional ethics is important?

59
Title: Moral Methodology and Information Technology

Quote:

“Computer ethics is a form of applied and practical ethics.”

Expectations:

60
I expect to learn more about moral methodology and information technology.

Book Review:

Generally, computer ethics is a form of applied ethics. It shows moral


questions that are associated with the development, application and use of
computers and computer science. This chapter discusses the applied ethics, its
generalism and particularism. In applied ethics, it has been in the circulation for
almost 100 years ago and it focuses on questions concerning the meaning of ethical
terms. In generalism, in which justification In morality is construed to explain. Most
of the particularists in ethics resist the search for universally valid moral rules. A
methodological alternative to both pure generalism and pure particularism that
combines the strengths of the rationale for generalizing is called the reflective
equilibrium.

Things I have learned:

I have learned more about information technology as well as moral


methodology and the reflective equilibrium.

Integrity Questions:

1. Who is Jeroen Van Den Hoven?


2. What is reflective equilibrium?
3. How important is information technology in our lives today?
4. What are the two descriptions of ethics?
5. What is applied ethics?
Title: Value Sensitive Design and Information

Quote:

“Start the aspect in the most central to your work and interests.”

Expectations:

61
I expect to learn more about value sensitive design and how important
is this in our society.

Book review:

This chapter discussed about value sensitive design and according to


the authors, it is a grounded approach to the technology designs for
accounts that has human values in a principle and comprehensive manner
throughout a design process. It is also tackled the approaches to values and
system design and the tripartite methodology of conceptual, empirical and
ethical investigations. There are also three types of investigations which are
Conceptual Investigations, empirical investigations and technical
investigations. It was also discussed the three case studies of value sensitive
design, such as, cookies and informed consent in web browsers that contains
conceptualizing the value and using a conceptual investigation to analyze
existing technical mechanisms. The second case is Room with a View that
uses plasma displays in interior offices that have multimedia methods, direct
and indirect stakeholders, coordinated empirical investigations, multiplicity
of and potential conflicts among human values and technical investigations.
The last case study is Urbanism on integrated land use, transportation and
environmental simulation that includes distinguishing explicitly supported
values from stakeholder values, handling widely divergent and potentially
conflicting stakeholder values, legitimating, technical choices driven by initial
and emergent value considerations and designing for credibility, openness
and accountability.

Things I have learned:

I have learned the true meaning of value sensitive designs and its
eight values. I also learned the different types of investigations and case
62
studies of sensitive designing and I learned more about the methodologies of
tripartite.

Integrity Questions:

1. Who are Batya friedman, Peter H. Kahn Jr. and Alan Borning?
2. What is a value sensitive design?
3. What are the different tripartite methodologies?
4. What are the three types of investigations? Explain each.
5. What are the three cases of value sensitive design?
6. What are the eight values of sensitive designing?

Title: Value Sensitive Design and Information

Quote:

“Start the aspect in the most central to your work and interests.”

63
Expectations:

I expect to learn more about value sensitive design and how important
is this in our society.

Book review:

This chapter discussed about value sensitive design and according to


the authors, it is a grounded approach to the technology designs for
accounts that has human values in a principle and comprehensive manner
throughout a design process. It is also tackled the approaches to values and
system design and the tripartite methodology of conceptual, empirical and
ethical investigations. There are also three types of investigations which are
Conceptual Investigations, empirical investigations and technical
investigations. It was also discussed the three case studies of value sensitive
design, such as, cookies and informed consent in web browsers that contains
conceptualizing the value and using a conceptual investigation to analyze
existing technical mechanisms. The second case is Room with a View that
uses plasma displays in interior offices that have multimedia methods, direct
and indirect stakeholders, coordinated empirical investigations, multiplicity
of and potential conflicts among human values and technical investigations.
The last case study is Urbanism on integrated land use, transportation and
environmental simulation that includes distinguishing explicitly supported
values from stakeholder values, handling widely divergent and potentially
conflicting stakeholder values, legitimating, technical choices driven by initial
and emergent value considerations and designing for credibility, openness
and accountability.

Things I have learned:

64
I have learned the true meaning of value sensitive designs and its
eight values. I also learned the different types of investigations and case
studies of sensitive designing and I learned more about the methodologies of
tripartite.

Integrity Questions:

1. Who are Batya friedman, Peter H. Kahn Jr. and Alan Borning?
2. What is a value sensitive design?
3. What are the different tripartite methodologies?
4. What are the three types of investigations? Explain each.
5. What are the three cases of value sensitive design?
6. What are the eight values of sensitive designing?

Title: Informational Privacy: Concepts, Theories and Controversies

Quote:
65
“We demand recognition of our right to privacy, we complain when
privacy is invaded, yet we encounter difficulties immediately we seek to
explain what we mean by privacy…”

Book Review:

I expect to learn more about the concepts, theories and controversies


about privacy. This chapter also talks about concept of privacy of H.J.
McCloskey, the unitary, derivative and cluster definitions of privacy. It
showed the interest-based conceptions versus right-based conceptions of
privacy. There are four distinct kinds of privacy, such as, physical or
accessibility, decisional, psychological or mental and informational privacy. It
also discussed that privacy is also nonintrusion involving one’s physical
space of physical privacy. It includes Privacy as noninterference involving
one’s choice of decisional privacy, privacy as noninterference involving one’s
thoughts and one’s personal identity of psychological privacy and privacy as
having control over access to one’s personal information of informational
privacy.

Things I have learned: This chapter talked about the different concepts,
theories and controversies of privacy.

Things I have learned:

I have learned so much about informational privacy like its concepts,


theories and controversies.

Integrity Questions:

1. Who is Herman T. Tavani?


2. What is the concept of privacy?
3. What are the different definitions of privacy?
4. What are the four distinct kinds of privacy?
5. What are the theories of informational privacy?

66
Title: Online Anonymity

Quote:

“It is impossible to be mistaken in a belief that there is someone who exists.”

Expectation

I expect to learn more about anonymity.

Book Review:

In this chapter, I have learned that there are purposes and ethics of
anonymity. According to Kathleen Wallace, “Anonymity may serve for a
variety of purpose or to shield someone from accountability for action, to
ensure privacy…” There are three groups of anonymity which Wallace
suggested. Those three serve for a specific purpose. They gives us guide so
that we can judge correctly.

Things I have learned:

I have learned what the three groups of anonymity.

Integrity Questions:

1.) Who is Kathleen Wallace?

2.) What is anonymity?

3.) What does anonymity means?

4.) What does anonymity do?

5.) Does anonymity protect our privacy?

67
Title: Ethical Issues Involving Computer Security: Hacking,Hacktivism, and
Counterhacking

Quote:

“Is hacktivism morally justified?”

Expectation

I expect to learn to secure my computer from hackers

Book Review:

In this chapter, I noticed a lot of ways not to offend others or abuse


their human rights. Here are the six hacker ethics as summarize by Levy
(1984) that touch my life – 1. Access to computers should be unlimited and
total, 2. All information should be free, 3. Mistrust authority, 4.hackers should
be judged by their hacking, not by bogus criteria such as degrees, age, race,
or position, 5. You create art and beauty on a computer, and lastly 6.
Computers can change your life for better. I love the way it was created. It
keeps me motivated.

Things I have learned:

I have learned the six hacker ethics.

Integrity Questions:

1.) Who is Kenneth Einar Himma?

2.) What are the six hacker ethics?

3.) What is Hacktivism?

4.) What is COunterhacking

5.) Is hackers morally justified?

68
Title: Information Ethics and the Library Profession

Quote:

“Libraries by their very nature shape the ways in which we access


information.”

Expectation

I expect to learn the rules and regulation in a library.

Book Review:

In this chapter, I have learned the rules and regulation of a library. Here
are the five laws of library – First, books are for use. Second, every person his
or her book. Third, every book its reader. Fourth, save the time of the reader.
Lastly, the library is a growing organism. They have ways of arranging their
material through classification and labelling. It’s great that we have librarian
who keeps the book clean and easy to find.

Things I have learned:

I have learned how a library operates.

Integrity Questions

1.) Who is Kay Mathiesen?

2.) Who is Don Fallis?

3.) What are the five laws in a library?

4.) Who created the five laws of library?

5.) What does classification and labelling have to do in a library?

69
Title: Ethical Interest in Free and Open Source Software

Quote:

“No covered work constitutes part of an effective technological “protection”


measure.”

Expectation

I expect to learn about the open source software.

Book Review:

In this chapter, I have learned how the open source software operates.
I have also learned the four freedoms in open source. First, freedom to run
the program, for any purpose. Second, freedom to study how the program
works, and adapt it to your needs. Third, freedom to redistribute copies so
you can help your neighbour. Lastly, freedom to improve the program, and
release your improvements to the public, so that the whole community
benefits. It is great to have open source. It helps us to computer jobs more
easily and provides easy use of computer programming languages.

Things I have learned:

I have learned the way how they operate a open source software.

Integrity Questions:

1.) Who is Frances S. Grodzinsky?

2.) Who is Marty J. Wolf?

3.) What is Open Source Software?

4.) What do open sources have to do with us?


70
5.) How can we help the creator of open source software?

Title: Internet Research Ethics: The Field and Its Critical Issues

Quote:

“Internet research is undertaken from a wide range of discipline.”

Expectations:

I expect to learn more about Internet research Ethics (IRE) and about
its field and critical issues.

Book Review:

This chapter generally talks about Internet Research Ethics or IRE. It


has three philosophical foundations which are sources, frameworks and initial
considerations. Researchers have the obligations to respect and protect
these rights. There are also specific issues arising in IRE like it has focused
on several topics in so many decades ago with anonymity and confidentiality.
There are revealing identities, public versus spaces, recruitment, emerging
issues and respect for persons. There are also methodologies and ethics in
researching that implicated by a given ethical problem and the methodology
gives shape the specific research paper.

Things I have learned:

I have learned more about Internet Research Ethics and its


methodologies, fields and issues.

Integrity Questions:

1. Who are Elizabeth A. Buchanan and Charles Ess?


2. What are the philosophical foundations?
3. What is a Global Internet Research Ethics?

71
4. What are the fields and critical issues in IRE?
5. What are the methodologies in IRE?
Title: Health information Technology: Challenges in Ethics, Science, and
Uncertainty

Quote:

“It is usually and too often the case that many professionals regard ethics as
a source of codes for the edification of the not-yet virtuous, as a place where pointy-
headed boffins pass judgment on heathens…”

Expectations:

I expect to learn more about the health information technology, its systems,
functions and importance.

Book Review:

This chapter talks about health information technology and various


challenges in ethics, science and uncertainty. Computer has a big role in our
society especially in the health professions is also indeed a rich source of
ethical issues and challenges. This chapter also looked at these following
issues; privacy and confidentiality, use of decision support systems and
development of personal health records. Health information technology has
also privacy and confidentiality, clinical support systems, diagnostic expert
systems, prognostic scoring systems, the standard view and progressive
caution. The functions of personal health records are to support decisions
and to see the status of the professions.

Things I have learned:

I have gained the knowledge of understanding the health information


technology and especially its importance in our society.

Integrity Questions:

72
1. Who is Kenneth W. Goodman?
2. What is a Health Information Technology?
3. What is the importance of Health Information Technology?
4. What are the different systems in health Information Technology?
5. What are the different functions of personal health?
Title: Ethical Issues of Information and Business

Quote:

“One needs to be aware that this is not the only interpretation of the
shareholder concept.”

Expectation:

I expect to learn how the business organization will react when they face a
problem.

Book Review:

In this chapter, I have learned that business organization have certain


ethics that will help them achieve good goals. The concept of a business is
having two concepts such as mirco and macro levels. I have also learned that
business ethics have certain discipline that helps them evolve to a high
profile company. It is great that we learn how to discipline ourselves.
Following ethics will not only help us to success, but also our own fulfillment.

Things I have learned:

I have learned what the real meaning of business ethics.

Integrity Questions:

1.) Who is Bernd Carsten Stahl?

2.) What is Business Ethics?

3.) What are the Business Ethics?


73
4.) What are the two level of concept in a business?

5.) Does organization have their own ethics?

Title: Responsibilities for Information on the Internet

Quote:

“Those who put forward information on the Internet, the so-called


content providers, the organizations that provide the infrastructure for the
dissemination of that information, the so called internet service and access
providers…”

Expectations:

I expect to learn more about the different responsibilities of information on the


internet and its importance.

Book Review:

In this chapter, it discussed about the responsibilities of information on


the internet and there are also many accidents happen in the internet not
just in reality. We should know the responsibilities on how to take care of it
and to understand it. This chapter will also illustrate the accountabilities and
responsibilities that involves in the internet. It also talks about ISP if it is
really harmful or offensive information. Generally, this chapter tackled more
about responsibilities that are relating to all kinds of problems that appear in
the wake of deficiencies regarding the quality of information and
misperceptions of the information quality.

Things I have learned:

74
I have learned more about the importance and the responsibilities of information on
the internet.

Integrity Questions:

1. Who is Anton Vedder?


2. What are the responsibilities for information on the internet?
3. What are the importances of information on the internet?
4. What are the problems that may arise in the internet information?
5. What are the initial cause of the problem?
Title: Virtual Reality and Computer Simulation

Quote: “Virtual things and processes are simulations of real things…”

Expectations:

I expect to learn more about the virtual reality and computer simulation and
its differences.

Book Review:

There are different backgrounds of technology and this chapter also


discussed about its applications. Virtual reality or VR technology simulated
three-dimensional or so called 3D in our generation. It displayed like a reality
and surrounds a stereoscopic vision on the display. Another one is computer
simulation; it is a computer program that contains a model of a particular
system. Computer applications are used to simulate both real and imaginary
environments like arts and entertainment in performing in virtual reality. It is
used in the natural and social sciences to gain insight into the functioning of
natural and social systems. The distinction between the virtual and the real
is also discussed in this chapter. This popular conception of the contrasting
definition of virtuality and reality can be demonstrated incorrectly.

Things I have learned:

75
I have learned many things in computer applications, simulation and the
differences between virtual and reality.

Integrity Questions:

1. Who is Philip Brey?


2. What are the differences between virtual and reality?
3. What is 3D?
4. What is computer simulation?
5. What are the different kinds of application in the computer?

Title: Genetic Information: Epistemological and Ethical Issues

Quote:

“Maynard Smith’s analogy between the genetic code and


human0designed codes is too apparent to require a justification.”

Expectations:

I expect to learn more about genetic information and why it is similar


to computers and ethical issues.

Book Review:

Generally, genetics has developed many concepts from informatics


and these concepts are illustrated in two different levels. Basically, genetics
has taken the very notion of information in the field of informatics. To discuss
with a high definition, molecular biologists claim that cells and molecules are
machinery similar to computers and it contains useful devices to build a
unique biological beings starting from the information stored in a DNA. This
chapter also talks about the concept of information and the notion of genetic
information. Base on Maynard Smith, he discussed that the cell and egg are

76
the computer machinery that keeps them alive and useful. There are also
ethical problems in genetic information.

Things I have learned:

I have learned how to define computers in a high and basic definition.

Integrity Questions:

1. Who is Antonio Marturano?


2. Why are computers similar from genetics?
3. Explain the genetics in a most basic and high definition.
4. What is the concept of information?
5. What is the notion of genetic information?
Title: The Ethics of Cyber Conflict

Quote:

“Threat to the peace.”

Expectation:

I expect to learn the problem in cyber ethics.

Book Review

In this chapter, there are seven laws of Information Conflicts being


discussed such as severity, immediacy, directness, invasiveness,
measurability, presumptive legitimacy, and responsibility. Severity is about
people getting hurt or things being damaged. Directness is about cause and
effect. Invasiveness is about conquering. Measurability is all about effort and
strength. It’s great that we know all our weaknesses.

Things I have learned

I have learned the laws of information conflicts.

77
Integrity Questions:

1.) Who is Dorothy E. Denning?

2.) What is measurability?

3.) What is directness?

4.) What is immediacy?

5.) What is severity?

Title: A Practical Mechanism for Ethical Risk Assessment

Quote:

“The availability of high-quality software is critical for the effective use of


information.”

Expectation

I expect to learn the practical mechanism.

Book Review:

In this chapter, its talks about the three phases of inspection. First,
Phase 1 talks about the context scooping which are gathered around the
meetings. Second, Phase 2 talks about the Guided SoDIS Audit which is for
analyzing. The Phase 3 talks about the concern clustering which is composed
of six clusters. These are modeling the existing system, data integrity, user
interface, authorizing users, project management, and testing. If we follow all
the rules, we have greater chance of success.

Things I have learned:

78
I have learned the six clusters.

Integrity Questions:

1.) Who is Don Gotterbarn?

2.) Who is Tony Clear?

3.) Who is Choon-Tuck Kwan?

4.) How many phases are there in this chapter?

5.) What are the six clusters?

Title: Regulation and Governance of the Internet

Quote:

“Internet governance is the development and application by Governments”

Expectation:

I expect to learn the regulation in internet.

Book Review:

This chapter talks about the rules and regulation for internet.
Censorship is one of the issues here. We should watch our younger siblings
and teach them about what is right and wrong about censorship. China is
one of the strictest countries that prohibit censorship. I think we should
follow what China do in their online controlling because porn are so easily
access here in the Philippines. We should try and adapt for better ways.

Things I have learned:

I have learned about censorship.


79
Integrity Questions:

1.) Who is John Weckert?

2.) Who is Yeslam Al-Saggaf?

3.) What is Censorship?

4.) What is Effective regulation?

5.) What are the internet regulations?

Title: Information Overload

Quote:

“Our contemporary problem is not lack of knowledge or information.”

Expectation

I expect to learn how to counter information overload.

Book Review:

In this chapter, information overload is the main topic. Information


overload is encountering too much information at a same time. In our
society, I think professor should not give too much information to a student
because college student more than three subjects taken in a term. For me, I
think it is better to put more assignments than giving too much lessons. CSB
is a learner center. We should learn on our own.

Things I have learned:

I have learned to overcome information overload.

Integrity Questions:

80
1.) Who is David M. Levy?

2.) What is information overload?

3.) What are the causes of information overload?

4.) What are the solutions for information overload?

5.) What can we do to prevent information overload?

Title: Email Spam

Quote:

“If you take a broad view of spam as “unsolicited electronic messaging.””

Expectation:

I expect to learn ways to prevent email spam.

Book Review:

In this chapter, I have learned how to distinguish an email. It is a spam


if it contains one’s sexual prowess. If the message of an email is short, that’s
probably an invitation from friends. Some spam contains virus that will harm
our hard disc. Worst case scenario, it will destroy the items in our hard disc.
We should learn to be careful. If the sender is unknown, we better just leave
the message.

Things I have learned:

I have learned how to distinguish a spam and a letter.

Integrity Questions:

1.) Who is Keith W. Miller?

81
2.) What is email spam?

3.) Who is James H. Moor?

4.) Is email spam illegal?

5.) How can we prevent it?

Title: The Matter of Plagiarism: What, Why, and If

Quote:

“It is important to distinguish between issues of authorization and


documentation.”

Expectation:

I expect to learn why we plagiarize.

Book Review:

In this chapter, plagiarism is the main topic. Why do we plagiarize? Is it


to lessen our working hours or are we just lazy to think? This chapter will
help us know what went wrong. It is the lack of authorization that’s make one
plagiarize. We should discipline ourselves not to be morally weak. Learn how
to fight temptation. This is what we learned in my ITETHIC class.

Things I have learned:

I have learned to prevent from plagiarize.

Integrity Questions:

1.) Who is John Snapper?

82
2.) What is plagiarism?

3.) What are the concepts of plagiarism?

4.) What is the lack of accreditation?

5.) What is the lack of authorization?

Title: Intellectual Property: Legal and Moral Challenges of Online File Sharing

Quote:

‘“Plagiarism” is not a legal term.”

Expectation:

I expect to learn more about the legal and moral online file sharing.

Book Review:

In this chapter, peer to peer sharing is being discussed. Is it illegal to


share music? This is the questions that I will be sharing in my book review.
PSP games are the easiest to copy. You just have to create a folder and paste
the games there. The main point is “Is it illegal”. Obviously it is. How can we
prevent it, while it is socially benefited? The PSP came up with an answer
they make a blue ray which is very difficult to make a pirated copy.

Things I have learned:

I have learned that it is wrong to copy other’s work.

Integrity Questions:

1.) Who is Richard A. Spinello?


83
2.) Is it wrong to send music file to others?

3.) What is online file sharing?

4.) What is theft?

5.) What is peer to peer sharing?

Title: Censorship and Access to Expression

Quote:

“None wants to be censor.”

Expectation:

I expect to learn more about censorship.

Book Review:

In this chapter, censorship is the main discussion. What do we mean


when we say censorship? Censorship is the limit to enter a file or content. We
do censorship if we think it will be harm to the one being shown. We should
avoid hurting others. We should also know when to ban an object or not
banning them. It will be great help to the society if we know when to ban or
censor a material.

Things I have learned:

I have learned how to control a situation.

Integrity Questions:

1.) What is Censorship?

2.) What is the difference between censorship and ban?


84
3.) Who is Kay Mathiesen?

4.) What are the harms we can get from censorship?

5.) What is the meaning of hostile atmosphere?

Title: The Gender Agenda in Computer Ethics

Quote:

“Computer ethics is a newarea of applied ethics”

Expectation:

I expect to learn how men and women contributed in computer ethics.

Book Review:

In this chapter, feminist ethics are being discussed. Feminist ethics


talks about the care ethics most of the time. Gender and computer ethics are
being studied in this chapter. They talk about the contribution of male and
female in computer ethics. It also talks about ethical behavior. We should
judge the male and female contribution fairly.

Things I have learned:

I have learned the gender and computer ethics.

Integrity Questions:

1.) Who is Alison Adam?

2.) What is gender agenda?

3.) What is computer ethics?

4.) What is ethical behaviour?


85
5.) Which is better qualitative or quantitative according to the book?

Title: The Digital Divide: A Perspective for the Future

Quote:

“In the developing world, poverty and the suffering it causes it considerably
worse.”

Expectation:

I expect to learn the meaning of digital divide.

Book Review:

In this chapter, digital divide is being discussed. Digital divide is the


division among rich and poor. Many poor people in undeveloped country face
harassment because of their status in life. According to the book, most of the
people living on earth just earned one dollar a day which is very few for a
living. We should not set our mindset that if you are rich you are the master.
Many nations are applying that. For example, Philippines are following every
order of United States of America. We should know how to stand on our own.

Things I have learned:

I have learned the division between rich and poor.

Integrity Questions:

1.) Who is Maria Canellopoulou-Bottis?

2.) Who is Kenneth Einar Himma ?

3.) What is digital divide?


86
4.) What should we do to avoid the concept of rich and poor?

5.) What is the meaning of digital divide?

Title: Intercultural Information Ethics

Quote:

“The distinction between cognitivism and noncognitivism presupposes that


human

emotions have no cognitive value.”

Expectation:

I expect to learn different cultures.

Book Review:

This chapter talks about international cultures on information ethics. It


also talks about cognitivism and noncognitivism. According to the book, here
are the following example of cognitivism and noncognitivism with regard to
the truth-value of moral claims: 1.) Moral claims lack truth-value and merely
expressive of human emotions of approval or disapproval. (Moral
noncognivitism) 2.) Moral claims to have truth-values. (Moral cognivitism)
This means that human have free will to express their ownselves.

Things I have learned:

I have learned the difference between cognitivism and noncognivitism.

Integrity Questions:

1.) What is cognitivisim?

2.) What is noncognitivisim?

87
3.) Who is Rafael Capurro?

4.) What is IEE?

5.) What is Intercultural ethics?

The Fortune at the


Bottoms of the
Pyramid

88
Title: The Market at the Bottom of the Pyramid

Quote:

“The distribution of wealth and the capacity to generate incomes in the world
can be captured in the form of an economic pyramid.”

Expectation:

I expect that I will learn more about the real life of all levels of income of the
economic society.

Book Review:

This chapter generally illustrates the economy level of every people. In


a pyramid, there will always be people under the center of the pyramid,
some are at the bottom and few are living with fortune in their lives. This
association is consist by poor, civil society organizations, governments and
large firms that can create the world’s growing market rapidly. Being a
businessman or an entrepreneur has a big role in solving poverty.

Both small and large enterprises have begun to build their own
markets at the bottom of the pyramid or the BOP. This chapter also showed
the economic pyramid of the world. This pyramid illustrates the allocation of
wealth and capacity to make incomes in the world. It is because the
distribution of wealth and the ability to produce incomes in the world can be
illustrated by the form of an economic pyramid.

89
One of the topics that he also discussed is the nature of the BOP
market. It has characteristics that are different with each other. These are
the money at the BOP, access to BOP markets, BOP markets are band-
conscious, BOP market is connected and BOP consumers accept advanced
technology readily. The fact is poor people often no power of purchasing,
whereas, they do not stand for a feasible market.

Another dominant assumption is that distributions of the economy


level of different people into the pyramid are complicated and that is
therefore there should be a main obstruction for the input of large firms. Poor
people are also not brand conscious, as long as they have something to wear
and eat they always go for it. They live very practical and not like other
people who are not yet satisfied on their lives. They are just value conscious
by necessity. BOP consumers benefit to the information from different
networks because they have a large opportunity to know it. They also
accept advanced technology readily.

What I have learned:

I have learned that mostly poor people are not brand conscious and they are
just value conscious. They live life practically and more simple unlike some
fortunate people who are not yet satisfied on what they already have in life.

Integrity Question:

What is an economic pyramid?

What are the powers of poor people?

What are the dominant assumptions of the economic pyramid?

What are the characteristics of poor people?

What is the importance of illustrating the economic pyramid?


90
Title: Products and Services for the BOP

Quote:

“The BOP can be a viable growth market”

Expectation:

I anticipate learning more about the products and services for the BOP markets.

Book Review:

From the last chapter, we noticed that BOP can be a feasible growth in market and now
this chapter talks about the products and services for the BOP. Each corporate offers different
helpful programs and along with it they also supports products, supplies, and equipment. They
also use the corporate services such as providing meeting place and computer services.
Professional services and employees’ expertise such as in designing, advertizing, promotions,
marketing, legal assistance, tax, business, financial advice and strategic planning are also offered
by various corporations.

There is a philosophy for developing products and services for BPO and it is the market
that will make the challenge for the dominant logic of managers. It is because that the beliefs and
values that the managers are serving will develop the markets. It is also important to be aware in

91
choosing the right technology for the market like computers, telephones, transportation and
credit.

Innovation for BOP markets has twelve principles; the first one is focusing on the
performance of the price and services. Second, innovation should have hybrid solutions. Third,
developed solutions should be measurable and transportable over the countries, cultures and
languages. Fourth, markets that are being developed are accustomed to resource wastage. Fifth,
the developing of product must start from a deep understanding of its own function and not just
the form. Sixth, the process innovations are likely the critical part of BOP markets as innovation
of the product. Seventh, deskilling work is critical for the BOP markets. Eighth, the key for
product usage is the education of customers. Ninth, products should work in aggressive
environment. Tenth, researching on interfaces is critical because of the nature of the customer’s
population. Eleventh, innovations should reach the consumer and lastly, the features and function
evolution of the market can be very rapid.

In making it happen, we should focus and analyze the price performance of each products
and services. Implementing hybrid solutions are also an important fact for innovation the BOP
market. Analyze the scale of operations and if it is also eco-friendly for the society. Indentify the
functions of each product and not just its forms. Processing the innovation is the next. Deskilling
of work, educating the customers, designing the hostile infrastructure, focusing on interfaces,
distributing the products to the customers and allowing us to challenge the conventional wisdom
in delivery of products and services may be a good process in innovating the BOP market.

What I have learned:

I learned about the products and services for the BOP and its twelve principles as well as its
philosophy.

Integrity Questions:

How important is the BOP market to the economy?

What is the importance of the products and services for the BOP?

92
What are the twelve principles of innovation for BOP markets?

Explain the philosophy for developing products and services for the BOP.

Title: BOP A Global Opportunity

Quote:

“The quality, efficacy, potency, and usability of solutions developed for traditional MNC”

Expectations:

I expect to learn about the global competitiveness of different companies.

Book Review:

In this chapter we will know how Global competitive business men like to be. They are
aiming for the highest position. They compete in the global market where everybody struggles to
get to the top. They learned to live in a network of relationship where everybody can
communicate well. They developed solutions for markets which will make it more profitable.
They conduct local innovation and global opportunities. They make use the capital wisely which
helps them to earn more profit. They put money on the development of the company which will
help the company to grow faster. They usually upgrade the machinery or improving their
Information technology. They know the risks and they are prepared to face them in case of
emergency.

What I have learned:

I have learned to be a competitor and how to handle business wisely.

Integrative Questions:

What is global opportunity?

What is developed Markets?


93
What are the lessons for MNC’s from BOP Markets?

What are the Sustainable Development?

Title: The Ecosystem for Wealth Creation

Quote

“I did not even know how to hold a mouse”

Book Review:

I have learned that market-oriented ecosystem for wealth creation has many parts like
extra legal NGO enterprises, micro enterprises, small and medium enterprises, cooperatives,
large local firms MNCs, and NCOs. I have also learned that ecosystems help a lot in a
developing country. I have also learned that it helps build governance capabilities among the
poor which will help the economy. The ecosystem for wealth creation helps the community in
their studies. They build a good education system that will help the government.

What I have learned:

I have learned that market-oriented ecosystem for wealth creation helps us in our everyday life.

Integrity Questions:

What is market-oriented ecosystem for wealth creation?

What is NCO?

What are the small and medium enterprises?

What are the micro enterprises?

What are the extra legal NGO enterprises?

94
Title: Reducing Corruption: Transaction Governance Capacity

Quote:

“It is important that the direction of change, the quality of implementation and progress are
measured in every country…”

Expectation:

I expect that I will learn more about the meaning of corruption and some ways on how to reduce
it by looking at the transaction governance capacity.

Book Review:

This chapter talks about corruption and how to reduce it effectively by looking at the
transactions governance capacity. As the private sectors are the major facilitators of poverty
improvement towards the making of markets at the BOP. This chapter will also help us to
understand the differences between corruption and local practices. It also explains the meaning
of transaction governance capacity and it is about making all the process as visible as possible
and consistently implemented.

In order to reduce corruption, we must reduce the frictional losses in doing a business at
the BOP while corruption in different forms includes to this rate of load and business uncertainty.
Many of the developing countries do not fully recognize the real costs of corruption and its
95
impact to the development of private sectors and poverty improvement. The ability to facilitate
profitable transactions is to enforce critical development of the private sector.

We always ask if poor are really that poor but poor countries are just poor because they
are lack of resources. Rich countries to the government are not aware of corruptions and have the
capability to reduce poverty. Investments like in education and health care might have the largest
rate in economic development.

What I have learned:

I have learned about reducing the corruption and how to reduce it effectively.

Integrity Question:

What is corruption?

How can we reduce corruption?

What are the differences between corruption and local practice?

Is the strategy in reducing corruption effective?

Are poor really poor?

What are the things that make them poor?

96
Title: CEMEX: innovation in housing for the poor

Quote:

“women are critical for development”

Expectation:

I expect to learn more about the CEMEX

Book Review:

I learned in chapter 6 is that it helps develop the country as social


transformation. It also breaks down barriers to communication which will
helps each one of us to communicate faster. They also upgrade the BOP
Consumers which will help increase the profit in our economy. They also
made the library accessible to everyone. They also want everybody to know
that women are important role in the society which will help build a better
nation.

Things I have learned:

I have learned that women are important in the society.

Integrity Questions:

97
What are the CEMEX?

What is BOP Consumers?

What are the Barriers to communication?

What are the evolving checks and balances?

98

You might also like