Professional Documents
Culture Documents
Quan Zhou
8/12/2009
2
Preface
This book has been designed to provide every students and readers about the
comprehensive introduction of ethics. Each chapter includes stories and explanations by the
greatest philosophers in our era. They compiled their ideas and thoughts to compose informative
schemes. In terms of cyber world in our generation, ethics played a big role by its historical
stories and evolution. The author has written this book to be primarily focused on the ethics of
computer which is taught to the educate every students.
By finishing the book, the reader will be awarded by being able to read several longer
chapters which reflect the affluent history of ethics and the importance out of it.
Table of Contents
CyberEthics
3
Dedication…………………………………………………………………………………………………………………………………………2
Preface…………………………………………………………………………………………………………………………………………….3
Ethics On-Line…………………………………………………………………………………………………………………………………….9
Fahrenheit 451.2…………………………………………………………………………………………………………………………………..20
4
Web Security and Privacy………………………………………………………………………………………………….…..………….……..43
No, PAPA: Why Incomplete Codes of Ethics Are Worse Than None at All ……………………………………….………………………..49
Online Anonymity………………………………………………………………………………………………………………………………..65
Internet Research Ethics: The Field and Its Critical Issues ………………………………………………………………………………….69
Intellectual Property: Legal and Moral Challenges of Online File Sharing ………………………………………………………………...81
6
Cyber Ethics
Book Review:
7
I learned about the information technology and human values which
will help us to develop knowledge in computer. I have also learned about the
history of Computer Technology in 1940s ,1950s ,1960s ,1970s ,1980s and
1990s. This chapter has thought me on how to redefine the field of computer
ethics. It has five different attempts to define a field which were explained by
many authors like Walter Maner, Deborah Johnson, James Moor, Terrell Ward
Bynum and Donald Gotterbarn. There are also sample topics in computer
ethics which are computer in the workplace, computer security, software
ownership and professional responsibility. In addition, there are also global
information ethics such as Global Laws, Global Cyberbusiness and Global
Education.
I have learned about the different attempts to define a field which are
explained by various programmers
Integrity Questions:
Quote:
8
“Law and technology will never be enough to solve behavioral problems on-
line.”
Expectation:
Book Review:
I have learned about the importance of on-line communications and its value
in the future.
Integrity Questions:
9
Title: Reason Relativity, and Responsibility in Computer Ethics
Quote:
Expectations:
Book Review:
Integrity Questions:
10
Title: Disclosive Computer Ethics
Quote:
Expectation:
Book Review:
Integrity Questions:
11
Title: Is the Global Infrastructure a Democratic Technology?
Quote:
“Democracy is a value in the sense that when individuals make claims about
the Internet or the GII being democratic…”
Expectation:
Book Review:
Integrity Questions:
• What is democracy?
12
• What is GII? And who are them?
• What is the starting place for power and insularity? Who will benefit for
it?
13
Title: Gender and Computer Ethics
Quote:
Expectation:
Book Review:
This chapter talks about the rights of women in computer ethics. It also
tackled about the gender and computer ethics and gender in computer
ethics. The women are being criticized in technical skills. People in the
society thinks men are better than women in programming and analyzing
because men are more trained than women in this kind of field. Some people
believes that women are fruitful in the Information Technology because of
their reading skills.
Integrity Questions:
14
Title: Applying Ethical and Moral Concepts and theories to IT Contexts: Some
Key Problems and Challenges
Quote:
Expectation:
Book Review:
Integrity Questions:
15
3.) What are social contexts?
Quote:
Expectation
Book Review:
Integrity Questions:
Quote:
Expectation:
Book Review:
Internet has spread around the public places. We can easily access
internet because we already have wifi. In this chapter, the rules and
regulation of internet are being tackled. Normal citizen can express their idea
about a certain topic which they can’t do in real life. Internet is worldwide so
it has different cultures. I learned from this chapter to learn to respect others
about their ideas and their cultures. We also should be aware of the sites
that are not allowed by children. We, as an IT programmer in the future,
should help our parents to disable the parental site in the computer. In small
ways, we can help our brothers and sisters to grow normally.
Integrity Questions:
Quote:
“Cyberspace is unavoidable.”
Expectation:
I expect to learn about the importance and meaning of cyberspace.
Book Review:
In this chapter, it talks about the evolution of cyberspace. A long time
ago in Russia, their country is using a system of internal passports which
most of them hate it. This kind of passport can determine which country you
want to go and who will associate you. It is an alternative of access of one
country to another country. As this evolves, the age of the cyber-libertarian
has caught the cyberspace publicity. It is unstoppable at this time and
unbalance. We also admit that no nation can live without it and no nation can
avoid it in spreading. Cyberspace is the place where each people are free to
control the real space rulers. There are no laws and rules in cyberspace, all
individual can explore things they want to explore and things they want to
discover.
Integrity Questions:
• What is cyberspace?
• What is the importance of cyberspace?
18
• Who benefits in cyberspace?
• What are the two ideas of the author?
Quote:
“One chooses to define better than available alternatives.”
Expectation:
I expect that I will learn about the laws and policies in cyberspace as
well its order and disorder functions.
Book Review:
There are various laws and policies discussed in this chapter. The
thought came from two competing factors such as order and disorder but it
gives new shape in cyberspace. The author tackled different suggestions
for the law-making in cyberspace. First is the incident, these are events that
are unanticipated. Second is the explanation, these are ideas to deal with in
the cyberspace. Third is the question, these are things that have to be asked
and understand especially the functions of cyberspace. Last is the debate,
these are the interesting and important facts that have to be debated and
give a bright idea. These are the four important things that need to be
understood and remembered.
Integrity Questions:
19
• What is cyberspace?
• What are the laws and policies that have been applied?
• What are the suggestions of the author?
• What are the important things to be remembered about cyberspace?
Quote:
Expectation:
I expect to learn the self regulation in the internet and explore new things in
the cyberspace.
Book Review:
This chapter talks about that the internet needs to be treated like
books and other printed matters when it comes to value. It is worthy of the
same high level of free speech protection. This article also asked if
cyberspace is really burning, no it is not according to the author. There are
also several announcements that have been raised by the White House like
Netscape plans to join Microsoft. Second is IBM is making a large amount of
money grant to Recreational Software Advisory Council. Next are the four
major search engines like Google planned to cooperate to the “Self-
regulation” promotion of the internet. Lastly, Sen. Murray imposed civil and
criminal penalties on those who degrade a site. The author also gave
recommendations and principles like internet users know the best, default
setting on free speech, letting the buyers to be aware, prohibit coercion or
censorship and let the libraries to be a free zone.
There are also six reasons why self-rating schemes are wrong for the
internet, first one is because it will just cause controversial speech to be
20
censored. Secondly, self-rating is burdensome, unwieldy and costly. Third is
all conversations are cannot be rated. Fourth, it will just create “Fortress
America” on the Internet. Fifth is it will only encourage, not prevent,
government regulations. Finally, it will turn the Internet into a homogenized
medium dominated by commercial speakers.
Integrity Questions:
• What are the six reasons why self-rating schemes are wrong for the
Internet?
• What are the problems with user-based blocking software in the home?
I have learned the reasons why self-rating schemes are wrong for the
internet and the problems with user-based blocking software in the home. It
helped me also to get an idea in blocking software.
21
Title: Filtering the Internet in the USA: Free Speech Denied?
Quote:
Expectations:
Book Review:
Integrity Questions:
Title: Censorship, the Internet, and the Child Pornography Law of 1996: A
Critique
Quote:
Expectation
Book Review:
In this chapter, child protections are the main goal because they are
the future. We should stop showing child pornography which will ruin their
life. The government has made a law for that which is The Child Pornography
Prevention Act of 1996. This act tells us not to sell, reproduce, sent, receive,
any child pornography. The victim of child pornography is a long term effect.
They would feel tremble fear and social dimension.
Integrity Questions:
23
Title: PICS: Internet Access Controls Without Censorship
Quote:
Expectation
Book Review:
Integrity Questions:
Quote:
“Malice is defined as reckless disregard of the publisher regarding the
truth…”
Expectation
Book Review:
Integrity Questions:
25
1.) What are legal precedents?
Quote:
“Code is Code.”
Expectation
Book Review:
In this chapter, it talks that we need politics. Politics is for human being to
obey and to follow. Without these things, we could not live nicely. We should thank
our government for doing a good job rather than rallying in the street. Copyright is
another topic in this chapter. We should do our own work and not copy other people.
Integrity Questions:
Quote:
Expectation
Book Review:
In this chapter, it talks about the conflicts over the intellectual property
which has five cases. Plagiarism is one of the cases. This is about copying
others work. Second, software piracy is the stealing of other work and mass
produce it. Third, repackaging data and database is not for commercial use.
The company can sue you if you use it without permission. The fourth one is
reverse engineering Computer software. Lastly, it is the copying in
transmission.
Integrity Questions:
27
1.) What is Plagiarism?
Quote:
Expectation:
Book Review:
In this chapter, it talks about the constitution of US that helps the author to
have their rights in their work. It debates about the rights and how to do they arise.
Property rights also are another important topic in this chapter. They are also
theories of intellectual property and copyright coming out. History of copyright in US
is also being discussed. Their past may serve a good example. It also tells what
copyright doesn’t cover.
28
Integrity Questions:
Quote:
Expectation:
Book Review:
Quote:
“The site containing the hypertext link will be called the ‘source site’.”
Expectation
Book Review:
In this chapter, it talks about the technical aspects of web site linking.
The web site linking is multiple sites in a main page of a website. They are a
lot of harm in deep link those are the lost in advertising revenues and
property rights are being broken. It also talks about the ownership. Who has
the rights to edit and own a website is being discussed.
Integrity Questions:
Quote:
“Given enough eyeballs, all bugs are shallow.”
Expectation
Book Review:
In this chapter, it tackled about the mail must get through. They give
us good lessons which are “every good work of software starts by scratching
a developer’s personal itch and good programmers knows what to write and
great ones know what to rewrite.”“ The quote is according to The Cathedral
and the Bazaar. It also talks about the importance of having a user. Without
the user, the company won’t get any profit and the bugs are hard to detect
because no one use it.
Quote:
Expectation:
I expect to learn more about the ethical theory of privacy for the information
age today.
Book Review:
32
preference. There are also two standard ways of justifying privacy that
describe the limitations of these approaches.
I have learned the theory of privacy and the standard ways of justifying
privacy.
Integrity Questions:
Quote:
Book Review:
33
Generally, this chapter explains about the structure rights on
protecting the individuals with regards to the processing of personal data. It
was implemented in the form of national legislation in Europe. This will help
the government in shaping the European standard concerning privacy rights.
These are the important things to remember in processing personal data,
data quality, legitimate purposes, sensitive data, the right to be informed,
data subject’s right to access and to object, the reprocessing of personal
data and using personal data for a different purpose. There is also some data
protection and philosophy of privacy that have been discussed and privacy
as restricted access.
I have learned that this helped the government in shaping the European
standard concerning privacy rights.
Integrity Questions:
Quote:
34
Expectation:
Book Review:
In this chapter, I learned about the theory of piracy and the role of
control in the theory of piracy. It talks about the protection of own work. I
should say that piracy should be stop so that no one will be hurt or victim in
the process. We should do our own work and not copy from other people
ideas. It is good to create our own ideas rather than copying others work. It
makes me feel that I am contented with myself.
I have learned to create my own ideas rather than copying others work.
Book Review:
Quote:
“At the heart of the concern to protect “privacy” lies a conception of the
individual….”
35
Expectation:
Book Review:
In this chapter, it talks about the privacy and the personal realm. This
is a protection against those who follow the rules in Information Technology.
It also discuss about the implications for a theory of privacy. This talks about
the piracy that is being done. Don’t let others to mislead us. It is best that we
do our own work honestly.
Integrity Questions:
Quote:
36
Expectations: I expect to learn the true meaning of KDD, privacy,
individuality and fairness.
Book Review:
I have learned about the meaning of KDD and the importance of privacy,
individuality and fairness to every individual.
Integrity Questions:
2. What is KDD?
5. What are the social consequences that can occur in ones privacy?
37
Quote:
“Privacy is invaded when any means are used that bypass the subject’s
consent as manifested by the subject’s observable.”
Expectations:
Book Review:
This chapter talks about the data mining, its function is to retrieve
databases in response to a query. Base on the study of Fulda, data mining
using knowledge discovery is very important and useful because the process
of discovering such patterns may classify data into preexisting categories,
cluster data by mapping them into categories created during data analysis
and determined by the data, provide summary of the data, which is useful in
a sense that the raw data are not, describe dependencies between variables,
find links between data fields, use regression to predict future values of data
and model sequential patterns in the data that may indicate revealing
trends.
I have learned that data mining and privacy are two very important
things in the cyber world.
Integrity Questions:
38
5. What are the analysis in data mining and privacy?
Quote:
Expectations:
Book Review:
I have learned that all people can have the right to make their lives
private and it is a matter of justice. I also learned more about the limitations
and importance of surveillance.
Integrity Questions:
39
1. Who is Lucas D. Introna?
2. What is surveillance?
40
Title: Privacy and the Varieties of Informational Wrongdoing
Quote:
Expectation:
Book Review:
This chapter explains about the privacy issues that lie at the center of
an ongoing deliberation in many countries. This article is divided by seven
topics which are panoptic technologies and the public good, information-
based harm, informational inequality, informational injustice, spheres of
access and encroachment on moral anatomy. The privacy issue is more
concerned in questioning how to balance the claims of those who want to
give limitations the availability of personal information in protecting all
individuals. This issue also emerges in many privacy discussions.
I have learned more about privacy and its seven discussions on how to
explain the informational wrongdoings.
Integrity Questions:
41
1. Who is Jeroen van den Hoven?
Title: Defining the boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage
inCyberspace
Quote:
Expectations:I expect to learn more about the different kinds of computer crimes
and how to prevent it.
Book Review:
This chapter talks about the recent criminal cases that can happen in
cyberspace such as piracy, break-ins and sabotaging. Reports have been
recorded in some various cover stories, headlines in newspaper and leading
periodicals. Some categories of computer crime are legal, moral and
information or descriptive. Computer crime can be defined as descriptive
because it reasonably asks what the value would be in pursuing questions.
Establishing clear and coherent criteria and applying our definition to some
specific cases are very important in preventing computer crime. There are
also three types of computer crime; these are software piracy, electronic
break-ins and computer sabotage.
42
I have learned more about the three types of computer crimes and its
categories.
Integrity Questions:
Quote:
“In this era of global commerce via the internet, strikes against the
hegemony of bureaucratic capitalism and the commercialization of the Internet will
inevitably be carried out on the World Wide Web.”
Expectations:
Book Review:
43
Things I have learned:
I have learned the three principles of hacking and the different types of
terrorism.
Integrity Questions:
Quote:
“Browsing the Web gives one the heady feeling of walking without footprints
in cyberspace.”
Expectations:
Book Review:
44
the uniqueness of a user identity while integrity is about honesty and loyalty.
Confidential information given to authorized person only.
Integrity Questions:
Quote:
“People are strolling through a foreign city are anonymous because no one
know who they are.”
Expectations:
I expect to learn more about the meaning of anonymity and how to solve it.
Book Review:
Base on the discussion of Nissenbaum, her chapter tackles more about the
meaning of anonymity in an information age. It discussed that anonymity is
conducting oneself without revealing one’s name. Some cases in anonymity are
sending electronic email to an individual without any name of the sender in any part
of the header, taking part in a chat room or electronic forum, or in a game without
one’s given name that will identify them, buying something with the digital
equivalent of cash and visiting web site without having to reveal one’s identity.
45
There are also two methods to solve problems, when the data is sent electronically,
we must have the senders identification to be added to the message automatically.
The second one is to decrypt an encrypted message and we should know the
decryption key of the sender.
I have learned how to solve anonymity and I have become more aware in
different cases of anonymity.
Integrity Questions:
Quote:
Expectations:
Book Review:
Integrity Questions
Quote:
Expectations:
47
I expect to learn about the biometrics.
Book Review:
Integrity Questions:
Quote:
48
“Information ethics reflects the meeting of the social, the technological, and
the philosophical.”
Expectation:
Book Review:
Integrity Questions:
Quote:
49
“Ethical tension can be best addressed by thoughtful consideration of
fundamental principles, rather than blind reliance on detailed regulations.”
Expectation:
Book Review:
Integrity Questions:
Title: No PAPA: Why Incomplete Codes of Ethics Are Worse Than None at All
50
Quote:
Expectation:
I expect to learn how to make a code that would harm less people.
Book Review:
In this chapter, people should be aware of what they do and what they
create. The codes they create may be helpful to others but not always.
Sometimes it can be harm to the poor people or to the rich people. I think in
this chapter we should be more considerate to others and not think of our
personal interest. We should also avoid the incomplete moral code which
means that if we don’t complete it we could harm other people.
Integrity Questions:
Quote:
51
“When is a rose not a rose?”
Expectation:
Book Review:
This chapter talks about the Ethical frameworks which are “the Golden
Rule”, “the Golden Means”, “action without desire of aversion”, and “ethical
complexity”. The Golden Rule means that if you want others to be nice to
you, you should also do the same. The Golden Means talks about the route to
happiness and virtue. Action without desire of aversion means that we
should not be greedy and we should not hate others. Ethical complexity talks
about justice that John Rawls illustrate.
Integrity Questions:
Quote:
52
“Do we really have to treat business computing differently from other
aspects of modern business practice?”
Expectation:
Book Review:
In this chapter, it talks about four sizes of issues which are Level One,
Level Two, Level Three, and Level Four. Level One talks about the small
business that uses computer for storing the items that they have. Level Two
talks about the larger business organization and they have one section for
computer. Level Three can hire a computer specialist which can help them
solve. Level Four can have at least one team of computer specialist to help to
solve.
Integrity Questions:
53
Quote:
“It is difficult to get youth up a right training for virtue if one has not been
brought up under right laws;”
Expectation:
Book Review:
Integrity Questions:
Quote:
54
“Accept and provide appropriate professional review.”
Expectation:
Book Review:
In this chapter, three major topic are being discussed such as general
moral imperatives, more specific professional responsibilities, and
compliance with the Code. In general moral imperatives, it talks about the
values that we need to have such as being honest and fair. In more specific
professional responsibilities, it talks about the things that we need to follow
such as existing laws and contract. In compliance with the Code, we should
follow the code as Godly laws.
Integrity Questions:
Title: The Institute of Electrical and Electronics Engineers, Inc. Code of Ethics
Quote:
Book Review:
In this chapter, I have learned the ten laws of IEEE. The Golden Mean is
applied in the laws of IEEE. Not only are the Golden Mean applied, but also
Aristotle famous work which is the Golden Rule. The complexity supports the
system of IEEE. One of the law that I like is “to reject bribery in all its form”
because I hate cheating.
Integrity Questions:
5.) Does Golden Rule, Golden Mean have to do with the IEEE?
56
The Handbook of
Information and
Computer Ethics
Quote:
Expectations:
57
I expect to learn more about Information Ethics (IE), its four stages and
four important principles.
Book Review:
Integrity Questions:
5. What are the four moral principles that may guide the actions of homo
poieticus?
Quote:
Book Review:
Integrity Questions:
59
Title: Moral Methodology and Information Technology
Quote:
Expectations:
60
I expect to learn more about moral methodology and information technology.
Book Review:
Integrity Questions:
Quote:
“Start the aspect in the most central to your work and interests.”
Expectations:
61
I expect to learn more about value sensitive design and how important
is this in our society.
Book review:
I have learned the true meaning of value sensitive designs and its
eight values. I also learned the different types of investigations and case
62
studies of sensitive designing and I learned more about the methodologies of
tripartite.
Integrity Questions:
1. Who are Batya friedman, Peter H. Kahn Jr. and Alan Borning?
2. What is a value sensitive design?
3. What are the different tripartite methodologies?
4. What are the three types of investigations? Explain each.
5. What are the three cases of value sensitive design?
6. What are the eight values of sensitive designing?
Quote:
“Start the aspect in the most central to your work and interests.”
63
Expectations:
I expect to learn more about value sensitive design and how important
is this in our society.
Book review:
64
I have learned the true meaning of value sensitive designs and its
eight values. I also learned the different types of investigations and case
studies of sensitive designing and I learned more about the methodologies of
tripartite.
Integrity Questions:
1. Who are Batya friedman, Peter H. Kahn Jr. and Alan Borning?
2. What is a value sensitive design?
3. What are the different tripartite methodologies?
4. What are the three types of investigations? Explain each.
5. What are the three cases of value sensitive design?
6. What are the eight values of sensitive designing?
Quote:
65
“We demand recognition of our right to privacy, we complain when
privacy is invaded, yet we encounter difficulties immediately we seek to
explain what we mean by privacy…”
Book Review:
Things I have learned: This chapter talked about the different concepts,
theories and controversies of privacy.
Integrity Questions:
66
Title: Online Anonymity
Quote:
Expectation
Book Review:
In this chapter, I have learned that there are purposes and ethics of
anonymity. According to Kathleen Wallace, “Anonymity may serve for a
variety of purpose or to shield someone from accountability for action, to
ensure privacy…” There are three groups of anonymity which Wallace
suggested. Those three serve for a specific purpose. They gives us guide so
that we can judge correctly.
Integrity Questions:
67
Title: Ethical Issues Involving Computer Security: Hacking,Hacktivism, and
Counterhacking
Quote:
Expectation
Book Review:
Integrity Questions:
68
Title: Information Ethics and the Library Profession
Quote:
Expectation
Book Review:
In this chapter, I have learned the rules and regulation of a library. Here
are the five laws of library – First, books are for use. Second, every person his
or her book. Third, every book its reader. Fourth, save the time of the reader.
Lastly, the library is a growing organism. They have ways of arranging their
material through classification and labelling. It’s great that we have librarian
who keeps the book clean and easy to find.
Integrity Questions
69
Title: Ethical Interest in Free and Open Source Software
Quote:
Expectation
Book Review:
In this chapter, I have learned how the open source software operates.
I have also learned the four freedoms in open source. First, freedom to run
the program, for any purpose. Second, freedom to study how the program
works, and adapt it to your needs. Third, freedom to redistribute copies so
you can help your neighbour. Lastly, freedom to improve the program, and
release your improvements to the public, so that the whole community
benefits. It is great to have open source. It helps us to computer jobs more
easily and provides easy use of computer programming languages.
I have learned the way how they operate a open source software.
Integrity Questions:
Title: Internet Research Ethics: The Field and Its Critical Issues
Quote:
Expectations:
I expect to learn more about Internet research Ethics (IRE) and about
its field and critical issues.
Book Review:
Integrity Questions:
71
4. What are the fields and critical issues in IRE?
5. What are the methodologies in IRE?
Title: Health information Technology: Challenges in Ethics, Science, and
Uncertainty
Quote:
“It is usually and too often the case that many professionals regard ethics as
a source of codes for the edification of the not-yet virtuous, as a place where pointy-
headed boffins pass judgment on heathens…”
Expectations:
I expect to learn more about the health information technology, its systems,
functions and importance.
Book Review:
Integrity Questions:
72
1. Who is Kenneth W. Goodman?
2. What is a Health Information Technology?
3. What is the importance of Health Information Technology?
4. What are the different systems in health Information Technology?
5. What are the different functions of personal health?
Title: Ethical Issues of Information and Business
Quote:
“One needs to be aware that this is not the only interpretation of the
shareholder concept.”
Expectation:
I expect to learn how the business organization will react when they face a
problem.
Book Review:
Integrity Questions:
Quote:
Expectations:
Book Review:
74
I have learned more about the importance and the responsibilities of information on
the internet.
Integrity Questions:
Expectations:
I expect to learn more about the virtual reality and computer simulation and
its differences.
Book Review:
75
I have learned many things in computer applications, simulation and the
differences between virtual and reality.
Integrity Questions:
Quote:
Expectations:
Book Review:
76
the computer machinery that keeps them alive and useful. There are also
ethical problems in genetic information.
Integrity Questions:
Quote:
Expectation:
Book Review
77
Integrity Questions:
Quote:
Expectation
Book Review:
In this chapter, its talks about the three phases of inspection. First,
Phase 1 talks about the context scooping which are gathered around the
meetings. Second, Phase 2 talks about the Guided SoDIS Audit which is for
analyzing. The Phase 3 talks about the concern clustering which is composed
of six clusters. These are modeling the existing system, data integrity, user
interface, authorizing users, project management, and testing. If we follow all
the rules, we have greater chance of success.
78
I have learned the six clusters.
Integrity Questions:
Quote:
Expectation:
Book Review:
This chapter talks about the rules and regulation for internet.
Censorship is one of the issues here. We should watch our younger siblings
and teach them about what is right and wrong about censorship. China is
one of the strictest countries that prohibit censorship. I think we should
follow what China do in their online controlling because porn are so easily
access here in the Philippines. We should try and adapt for better ways.
Quote:
Expectation
Book Review:
Integrity Questions:
80
1.) Who is David M. Levy?
Quote:
Expectation:
Book Review:
Integrity Questions:
81
2.) What is email spam?
Quote:
Expectation:
Book Review:
Integrity Questions:
82
2.) What is plagiarism?
Title: Intellectual Property: Legal and Moral Challenges of Online File Sharing
Quote:
Expectation:
I expect to learn more about the legal and moral online file sharing.
Book Review:
Integrity Questions:
Quote:
Expectation:
Book Review:
Integrity Questions:
Quote:
Expectation:
Book Review:
Integrity Questions:
Quote:
“In the developing world, poverty and the suffering it causes it considerably
worse.”
Expectation:
Book Review:
Integrity Questions:
Quote:
Expectation:
Book Review:
Integrity Questions:
87
3.) Who is Rafael Capurro?
88
Title: The Market at the Bottom of the Pyramid
Quote:
“The distribution of wealth and the capacity to generate incomes in the world
can be captured in the form of an economic pyramid.”
Expectation:
I expect that I will learn more about the real life of all levels of income of the
economic society.
Book Review:
Both small and large enterprises have begun to build their own
markets at the bottom of the pyramid or the BOP. This chapter also showed
the economic pyramid of the world. This pyramid illustrates the allocation of
wealth and capacity to make incomes in the world. It is because the
distribution of wealth and the ability to produce incomes in the world can be
illustrated by the form of an economic pyramid.
89
One of the topics that he also discussed is the nature of the BOP
market. It has characteristics that are different with each other. These are
the money at the BOP, access to BOP markets, BOP markets are band-
conscious, BOP market is connected and BOP consumers accept advanced
technology readily. The fact is poor people often no power of purchasing,
whereas, they do not stand for a feasible market.
I have learned that mostly poor people are not brand conscious and they are
just value conscious. They live life practically and more simple unlike some
fortunate people who are not yet satisfied on what they already have in life.
Integrity Question:
Quote:
Expectation:
I anticipate learning more about the products and services for the BOP markets.
Book Review:
From the last chapter, we noticed that BOP can be a feasible growth in market and now
this chapter talks about the products and services for the BOP. Each corporate offers different
helpful programs and along with it they also supports products, supplies, and equipment. They
also use the corporate services such as providing meeting place and computer services.
Professional services and employees’ expertise such as in designing, advertizing, promotions,
marketing, legal assistance, tax, business, financial advice and strategic planning are also offered
by various corporations.
There is a philosophy for developing products and services for BPO and it is the market
that will make the challenge for the dominant logic of managers. It is because that the beliefs and
values that the managers are serving will develop the markets. It is also important to be aware in
91
choosing the right technology for the market like computers, telephones, transportation and
credit.
Innovation for BOP markets has twelve principles; the first one is focusing on the
performance of the price and services. Second, innovation should have hybrid solutions. Third,
developed solutions should be measurable and transportable over the countries, cultures and
languages. Fourth, markets that are being developed are accustomed to resource wastage. Fifth,
the developing of product must start from a deep understanding of its own function and not just
the form. Sixth, the process innovations are likely the critical part of BOP markets as innovation
of the product. Seventh, deskilling work is critical for the BOP markets. Eighth, the key for
product usage is the education of customers. Ninth, products should work in aggressive
environment. Tenth, researching on interfaces is critical because of the nature of the customer’s
population. Eleventh, innovations should reach the consumer and lastly, the features and function
evolution of the market can be very rapid.
In making it happen, we should focus and analyze the price performance of each products
and services. Implementing hybrid solutions are also an important fact for innovation the BOP
market. Analyze the scale of operations and if it is also eco-friendly for the society. Indentify the
functions of each product and not just its forms. Processing the innovation is the next. Deskilling
of work, educating the customers, designing the hostile infrastructure, focusing on interfaces,
distributing the products to the customers and allowing us to challenge the conventional wisdom
in delivery of products and services may be a good process in innovating the BOP market.
I learned about the products and services for the BOP and its twelve principles as well as its
philosophy.
Integrity Questions:
What is the importance of the products and services for the BOP?
92
What are the twelve principles of innovation for BOP markets?
Explain the philosophy for developing products and services for the BOP.
Quote:
“The quality, efficacy, potency, and usability of solutions developed for traditional MNC”
Expectations:
Book Review:
In this chapter we will know how Global competitive business men like to be. They are
aiming for the highest position. They compete in the global market where everybody struggles to
get to the top. They learned to live in a network of relationship where everybody can
communicate well. They developed solutions for markets which will make it more profitable.
They conduct local innovation and global opportunities. They make use the capital wisely which
helps them to earn more profit. They put money on the development of the company which will
help the company to grow faster. They usually upgrade the machinery or improving their
Information technology. They know the risks and they are prepared to face them in case of
emergency.
Integrative Questions:
Quote
Book Review:
I have learned that market-oriented ecosystem for wealth creation has many parts like
extra legal NGO enterprises, micro enterprises, small and medium enterprises, cooperatives,
large local firms MNCs, and NCOs. I have also learned that ecosystems help a lot in a
developing country. I have also learned that it helps build governance capabilities among the
poor which will help the economy. The ecosystem for wealth creation helps the community in
their studies. They build a good education system that will help the government.
I have learned that market-oriented ecosystem for wealth creation helps us in our everyday life.
Integrity Questions:
What is NCO?
94
Title: Reducing Corruption: Transaction Governance Capacity
Quote:
“It is important that the direction of change, the quality of implementation and progress are
measured in every country…”
Expectation:
I expect that I will learn more about the meaning of corruption and some ways on how to reduce
it by looking at the transaction governance capacity.
Book Review:
This chapter talks about corruption and how to reduce it effectively by looking at the
transactions governance capacity. As the private sectors are the major facilitators of poverty
improvement towards the making of markets at the BOP. This chapter will also help us to
understand the differences between corruption and local practices. It also explains the meaning
of transaction governance capacity and it is about making all the process as visible as possible
and consistently implemented.
In order to reduce corruption, we must reduce the frictional losses in doing a business at
the BOP while corruption in different forms includes to this rate of load and business uncertainty.
Many of the developing countries do not fully recognize the real costs of corruption and its
95
impact to the development of private sectors and poverty improvement. The ability to facilitate
profitable transactions is to enforce critical development of the private sector.
We always ask if poor are really that poor but poor countries are just poor because they
are lack of resources. Rich countries to the government are not aware of corruptions and have the
capability to reduce poverty. Investments like in education and health care might have the largest
rate in economic development.
I have learned about reducing the corruption and how to reduce it effectively.
Integrity Question:
What is corruption?
96
Title: CEMEX: innovation in housing for the poor
Quote:
Expectation:
Book Review:
Integrity Questions:
97
What are the CEMEX?
98