You are on page 1of 53

ITETHIC Reader:

Version 2
Created by:
Chino S. Apoloni

This work is licensed under a Creative Commons Attribution-


Noncommercial-Share Alike 3.0 Philippines License.

PREFACE
1
This second book of mine was done in a complex way. It
is complex because this term is overloaded. The time
when I was doing this book is also the time that I had a
lot of projects and thesis. With all of those challenges that
confronted me, still I was able to finish my second book. I
was able to manage my time very well because of the
help of my family, friends and God. It was really a
pleasure for me to do this book. This book is very
important for me because it helps and affects the people
around the world. There are a lot of lessons and issues
that you will learn as you read this book. I would like to
thank Mr. Paul Pajo because he once again, gave me an
opportunity to create and annotate another book about
Ethics.

2
DEDICATION
Family

 For giving me the strength and willingness to


understand reality in the world today

 For giving me inspiration with regards to the


importance of education
Friends

 For providing guidance all throughout


Professor

 For giving me another chance to create and annotate


a book
God

 For giving me the spirit and enlightenment

3
TABLE OF CONTENTS

Preface p.2

Dedication p.3

The Fortune at the Bottom of the Pyramid p6-12

The Handbook of Computer and Information Ethics


p14-50

4
The Fortune at the
Bottom of the Pyramid

5
Chapter 1: The Market at the bottom of the pyramid

Library Reference: N/A

Quote: “The dominant assumption is that the poor have no purchasing


power and therefore do not represent a viable market”

Learning expectations:

• To understand who are being referred at the bottom of the pyramid

• To know if there is really a fortune at that level

• To understand the reality in our society

Review:

In this chapter, the topic is about the sector at the bottom of the pyramid.
The sector that I am talking about is the poor people. As said in the book,
there are 4 billion people who belong or who are in that sector. Also stated in
the book that aside from them having a 4 billion population, they only gain
$2 per day. With that statement, yes, there really is poverty on that area or
into that place. I cannot imagine where and what you can eat with that $2
per day money. With that, I assume that many children do not have the
capacity to study. It is because of the poverty spreading all over the sector,
which for me is a thing or a matter which should be prioritized. Education is
one of the most important activities a child or a human being must do. It will
affect their life positively when a particular person or a human is well
educated. For me, I value education very well. I think that when you are
educated, you can pursue your dreams. You can live and have a great
lifestyle. So with that, to sum up my review, at this point in time, there
should be a better approach which should help the poor people who are at
the bottom of the pyramid. The government should now move and to their
tasks. They should identify opportunities, innovations so that these people in
the sector should rise up and become equal as to what an ordinary people is
doing or aspiring.

Lessons learned:

• There is money at the bottom of the pyramid

• People should value education

6
• The pyramid structure

Integrative questions:

• Who are at the bottom of the pyramid

• What can be reason/s why they were put there?

• What is the meaning of dominant logic?

• How is the BOP market connected?

• What can be ways to solve the crises?

Chapter 2: Products and services for the BOP

Library Reference: N/A

Quote: “See and hear, not read”

Learning expectations:

• To know the products and services available at the BOP

• To know the ways on how BOP can rise

• To understand the reality in our society

Review:

In this chapter, the topic is about the products and services for the bottom
of the pyramid sector. As I have said in the previous chapter, the people at
the bottom of the pyramid are really at risk. They are in need because they
are so plenty and at the same time they do not have money. The
government should move and prioritize them. With that, as C.K Prahalad
stated, the bottom of the pyramid sector can be a viable growth market.
There can be many opportunities founded there. Also, C.K Prahalad taught
the 12 principles of innovation for the bottom of the pyramid markets. There
should be price performance, Innovation hybrids, scale of operations, eco-
friendly developments, functionalities, process innovation, work deskilling,

7
education of customers, infrastructures interfaces, distribution and
conventional wisdom for products and services. With that, I can say that it
really is an opportunity that should be done in that sector. What we need is
the government support, the government giving financial support. Another
thing that we need is cooperation from companies, industries and the market
itself. The last thing that we need to complete the process is the cooperation
of the people there. The more people that will help the faster will be the
development. To sum it all up, the key word is “cooperation”. It will be the
key to overcome the crises that is happening at the bottom of the pyramid. If
all of those said participants will do their duty or tasks, then definitely there
will be a change.

Lessons learned:

• 12 principles of innovation

• Philosophy for developing products and services

• The importance of the word “cooperation”

Integrative questions:

• What are the 12 principles of innovation?

• What are reasons why there can be market opportunities at BOP?

• What is price performance?

• What is an interface?

• What is deskilling of work?

Chapter 3: BOP: A Global Opportunity

Library Reference: N/A

Quote: “Social enterprise”

Learning expectations:

• To understand what are these opportunities

• To know if it will be helpful

• To understand the reality in our society

8
Review:

In this chapter, the topic is about the global opportunities available for the
people at the bottom of the pyramid. As stated in the book, there are
reasons why there are global and market opportunities at the bottom of the
pyramid sector. First is that BOP markets are large and attractive and they
can be a stand-alone entities. Many local innovations can be done across the
Bop markets. They are also to find applications in developed markets. Lastly,
lessons from the BOP markets can influence the management practices of
global firms. Definitely it is good news for the people at the bottom of the
pyramid. All they have to do is cooperate so that development will be in a
faster manner. I have an example with regards to the development of a
place like the story of BOP. In our market place here in Pasig City, during the
early years, according to the old people I know, they told me that the Pasig
City market is like Divisoria. It is a smelly place with a very crowded person
and every store is unorganized. As time passes by, due to the cooperation of
the Pasig City government and the market industry, the Pasig City market
undergoes renovation. The places were cleaned, re-built, stores were
arranged accordingly and people who sell and buy were lectured on how to
maintain the place. This goes the same for the BOP sector. If they will follow
and cooperate the same as to our Pasig market, then they will have no
problem to encounter.

Lessons learned:

• Local growth opportunities

• Capital intensity

• Reasons for having global opportunities at BOP

Integrative questions:

• What is capital intensity?

• What are the costs of managing?

• What do you mean by living in a network of relationships?

• What is a sustainable development?

• What can be local growth opportunities?

Chapter 4: The Ecosystem for Wealth Creation

9
Library Reference: N/A

Quote: “I did not even know how to hold a mouse”

Learning expectations:

• To know the relation of ecosystem in the BP

• To know more concepts

• To understand the reality in our society

Review:

In this chapter, the topic is about Ecosystem. From wikipedia, the term
ecosystem refers to the “combined physical and biological components of an
environment. An ecosystem is generally an area within the natural
environment in which physical factors of the environment together along
with interdependent organisms”. In this chapter, it is not only the term
ecosystem which is fully talked about, another concept talked about is the
market-oriented ecosystem. Based from my understanding, a market-
oriented ecosystem is a binding between the private sector, the people at
the bottom of the pyramid and the social actors. What I meant by bind is that
they act together, they create wealth together for the development of the
people bottom of the pyramid. A concrete example of a market-oriented
ecosystem is Divisoria. In that said place, vendors are all over. Even if they
are plenty, they bind, they work together for all of them to survive
financially. For me, that can be a market-oriented ecosystem. As long as
everyone helps, as long as everyone cooperates, there will be a continuous
improvement and development for all of them. To end up or to sum up this
case, the key words for people at the bottom of the pyramid are cooperation,
perseverance and motivation. Those words are the ones which will lead them
to growth and survival. I just hope that not only the people at the bottom of
the pyramid are the ones who are cooperating, but also the government,
private sectors and every community globally.

Lessons learned:

• Opportunities at BOP

• Ecosystem at BOP

• Key words for BOP people to survive

10
Integrative questions:

• What is ecosystem?

• How is it different from a market-oriented ecosystem?

• Who supports the BOP people?

• How do you reduce inequities in contracts?

• What is asymmetry?

Source:

http://en.wikipedia.org/wiki/Ecosystem

Chapter 5: Reducing Corruption: Transaction Governance Capacity

Library Reference: N/A

Quote: “Understood but not explicit”

Learning expectations:

• To know the concept of corruption

• To know who are “corrupt”

• To understand the reality in our society

Review:

In this chapter, the topic is about corruption. This chapter will be


meaningful to me because of the topic. Corruption is so known all around the
planet. It is because of the major impacts it can do to one government or one
country. To start things of, let us define first what corruption is. From
wikipedia, Political corruption is the “use of legislated powers by government
officials for illegitimate private gain. An illegal act by an officeholder
constitutes political corruption only if the act is directly related to their
official duties. All forms of government are susceptible to political corruption.
Forms of corruption vary, but include bribery, extortion, cronyism, nepotism,
patronage, graft, and embezzlement”. Relating it to the story, this may also
be one of the main reasons why the poor people at the bottom of the
pyramid suffered. It can be the corruptions happening within the
government. In the story, there were also assumptions why there are poor
people. One reason based from the book is that the poor people lack
resources. Another reason is that the poor people are being left out. With

11
these assumptions, they will have a hard time to rise up. To sum up and to
end the story, government officials should reduce poverty and corruption.
Instead of them being bad and corrupt, they should help the people to rise
and survive. They need the help of these politicians so that there will be no
more poor people in the future. Everything will be equal.

Lessons learned:

• Corruption

• Reasons why there are poor

• eSeva

Integrative questions:

• What is corruption?

• What is eSeva?

• What is TGC?

• Why are the poor poor?

• How do you reduce corruption?

Source:

http://en.wikipedia.org/wiki/Political_corruption

Chapter 6: Development as Social Transformation

Library Reference: N/A

Quote: “Should I sell my corn today or hold back”

Learning expectations:

• To understand more concepts about BOP

• To know how can transformation be established

• To understand the reality in our society

Review:

12
In this chapter, the topic is about development or social transformation.
Social transformation, from wikipedia is the “process by which an individual
alters the socially ascribed social status of their parents into a socially
achieved status for themselves. However another definition refers to large
scale social change as in cultural reforms or transformations. The first occurs
with the individual, the second with the social system”. Social transformation
is one or can be the most difficult thing a person can do in his life. That is
from my point of view. I said that because things, talking about “big things”
which will change our whole life due to that decision. It is like turning from
grade school to college. That is how far the milestone could be in making a
big decision like that. Relating it to the story, for the people at the bottom of
the pyramid, they will have a long transition time if their place will be
developed. It can be because of the traditional things that they do. With this
development, those things that they do traditionally cannot be done
anymore. What they need is time. They will need a longer time for transition
because it is not that easy to change from one pace to another.

Lessons learned:

• E-Choupal

• Importance of social transformation

• Importance of contributors

Integrative questions:

• What is social transformation?

• What is e-Choupal?

• What can be outcomes of these transitions?

• Why are women critical for development?

• Can it be solved?

Source:

http://en.wikipedia.org/wiki/Social_transformation

13
The Handbook of
Computer and
Information Ethics

14
Chapter 1: Foundation of Information Ethics

Amazon link: N/A

Quote: "Life of Information"

Learning expectation:

- To understand what information ethics means

- To know how it is applicable to the society

- To know if it is really needed

Review:

This chapter talks about the introduction to Information Ethics. Based from
wikipedia, Information ethics is "the field that investigates the ethical issues
arising from the development and application of information technologies. It
provides a critical framework for considering moral issues concerning
informational privacy, moral agency , problems arising from the life-cycle of
information Information Ethics is related to the fields of computer ethics and
the philosophy of information. Dilemmas regarding the life of information are
becoming increasingly important in a society that is defined as "the
information society". Information transmission and literacy are essential
concerns in establishing an ethical foundation that promotes fair, equitable,
and responsible practices. Information ethics broadly examines issues
related to ownership, access, privacy, security, and community. Information
technology affects fundamental rights involving copyright protection,
intellectual freedom, accountability, and security. Professional codes offer a
basis for making ethical decisions and applying ethical solutions to situations
involving information provision and use which reflect an organization’s

15
commitment to responsible information service. Evolving information formats
and needs require continual reconsideration of ethical principles and how
these codes are applied. Considerations regarding information ethics
influence personal decisions, professional practice, and public policy."

In this chapter, what was talked must about was the RPT model. RPT stands
for resource, product and target model. The RPT model is useful to explain
why any technology that radically modifies the “life of information”. There
are four stages that composes the RPT model. IE as an information resource,
IE as an information product, IE as an information environment and IE as a
macroethics. To sum it all up, information ethics is important in our lives. It is
important because it contributes a lot to the society. As said by wikipedia, it
promotes fairness, equity and responsible practices.

Lessons learned:

- RPT model

- Information ethics

Integrative questions:

- What is information ethics?

- What is R in RPT?

- What is P in RPT?

- What is T in RPT?

- How many stages are there in the cycle?

Reference:

16
http://en.wikipedia.org/wiki/Information_ethics

Chapter 2: Milestones in the History of Information and Computer Ethics

Amazon link: N/A

Quote: "automatic age"

Learning expectation:

- To know what is Information and computer ethics

- To know who Norbert Wiener is

- To understand the history of Information ethics

Review:

This chapter briefly talks about the history of computer ethics. Based
from the reading, the foundation of computer ethics was unintentional. It was
founded during the world war two. The ethical issues that

Norbert Wiener analyzed were computer ethics topics that are still of interest
today. They are computers and unemployment, computers and security,
computers and learning, computers for persons with disabilities, computers
and religion, information networks and globalization, virtual communities,
teleworking, the responsibilities of computer professionals, the merging of
human bodies andmachines, “agent” ethics and artificial intelligence. For
me, all of these topics are relevant and very important. They are very
important because they are rules which any person should abide with or
follow. There can be consequences if a rule is to be intercepted.

Aside from Norbert Wiener, there are different perspectives and people in
the foundation of computer ethics. They are Walter Maner, Deborah Johnson,
James Moor and Donald Gotterbarn. To sum it all up, whoever's theory is to
be read, the point is that we should follow the right or we should follow the
rules behind information ethics. It is important to have privacy, security,
integrity and credibility when using our computers. Another reason/s why we
should follow information ethics is for us not to be hacked by any other user.
Our works or creation should not be hacked and plagiarized by any other
human. For me, we should not only follow the rules in information ethics, we
should follow the ten commandements of computer ethics.

Lessons learned:

17
- reasons to know information ethics

- people who contributed to the history of information ethics

Integrative questions:

- Who is Norbert Wiener?

- Who is Walter Maner?

- Who is Deborah Johnson?

- Who is James Moor?

- What are their similarities?

Reference:

the-handbook-of-information-and-computer-ethics.pdf

Chapter 3: Moral Methodology and Information Technology

Amazon link: N/A

Quote: “the very possibility of moral thought and judgment depends on the
provision of a suitable supply of moral principles”

Learning expectation:

- To know what is Computer ethics

- To know what is applied ethics

- To understand the meaning of generalism

Review:

This chapter talks about computer ethics. Based from the book, Computer
ethics is a form of applied or practical ethics. It studies the moral questions
that are associated with the development, application, and use of computers
and computer science. For me, this is a good matter to study specially that
we are into Information Systems. These concepts of computer ethics will
provide us vital data that will guide us through our career. Next term to be
discussed is applied ethics. For me, what i have understand about applied
ethics is that it is an ethics that you know and then you do it actually.
Whatever is the rule that you read or understand, you will apply it when you
go out. Another term discussed was generalism. What i have understand in

18
generalism is that we treat fairly all the rules that we know. It is not only
about the rules that you know. For me, even if you are not familiar with a
certain provision or rule, still you should follow it and treat it equally. That is
the meaning of it for me. Next term discussed was particularism. For me, this
is in contrast with generalism. Why is it in contrast? It is in contrast because
in particularism, you follow or you only apply the ethic or the conduct that
you think is correct. You do not treat it fairly. Whatever you know, that is the
only conduct that you will follow and apply. It is opposite with generalism. To
sum it all up, we should apply ethics in our everyday lives. We should always
apply the good and correct acts so that we will not violate anything.

Lessons learned:

- meaning of computer ethics

- applied ethics

Integrative questions:

- What is computer ethics?

- What is applied ethics?

- What is generalism?

- What is particularism?

- What is reflective equilibrium?

source:

the-handbook-of-information-and-computer-ethics.pdf

Chapter 4: Value Sensitive Design and Information Systems

Amazon link: N/A

Quote: “how will this policy affect me and my family”

Learning expectation:

- To know what is value sensitive design

- To know what is value

- To understand the meaning of Information Systems

19
Review:

This chapter briefly talks about Value Sensitive Design. Based from the
book, Value Sensitive Design is a theoretically grounded approach to the
design of technology that accounts for humanvalues in a principled and
comprehensive manner throughout the design process. In this process, there
are three stages. For me, this concept is important for people and end-users
to fully understand the system. Design is an important matter because it
determines the willingness of the viewer if he or she would be using the
system because of its functions. If a design it not well made, then might as
well it will not be like by a lot. Nowadays, design is becoming critical. If the
design is not good, eye catching or unique, then expect that the users will
not go through or visit your website. That is how critical a design is in
Information Systems. Another term discussed in this chapter is value. From
wikipedia, value denotes "something's degree of importance, with the aim of
determining what action or life is best to do or live, or at least attempt to
describe the value of different actions. It may be described as treating
actions themselves as abstract objects, putting value to them. It deals with
right conduct and good life, in the sense that a highly, or at least relatively
highly, valuable action may be regarded as ethically good , and an action of
low, or at least relatively low, value may be regarded as bad". To sum it all
up, we should value the things that we do. We should value it because it
reflects our personality. The way we develop things. It is an important tool
for users and viewers.

Lessons learned:

- value sensitive design

- value

Integrative questions:

- What is value sensitive design?

- What is value?

- What are the three stages?

- What is conceptual investigation?

- What is empirical investigation?

source:

20
http://en.wikipedia.org/wiki/Value_(ethics)

the-handbook-of-information-and-computer-ethics.pdf

Chapter 5: Personality-Based, Rule-Utilitarian,and Lockean Justifications of


Intellectual Property

Amazon link: N/A

Quote: “The person must give himself an external sphere of freedom in


order to have being as Idea.”

Learning expectation:

- To know what is an intellectual propoerty

- To know what is its value

- To understand the rights when claiming intellectual propert

Review:

This chapter briefly talks about intellectual propoerty. Based from


wikipedia, Intellectual property is a "term referring to a number of distinct
types of legal monopolies over creations of the mind, both artistic and
commercial, and the corresponding fields of law. Under intellectual property
law, owners are granted certain exclusive rights to a variety of intangible
assets, such as musical, literary, and artistic works; discoveries and
inventions; and words, phrases, symbols, and designs. Common types of
intellectual property include copyrights, trademarks, patents, industrial
design rights and trade secrets in some jurisdictions. Although many of the
legal principles governing intellectual property have evolved over centuries,
it was not until the 19th century that the term intellectual property began to
be used, and not until the late 20th century that it became commonplace in
the United States. The British Statute of Anne 1710 and the Statute of
Monopolies 1623 are now seen as the origin of copyright and patent law
respectively."

For me, this really is an important matter. The topic being focused is on
rights. We should all value intellectual property in respect with the person
who owns. This chapter also talked about property rights.Property rights are
important in two ways according to this chapter. One is by controlling and
manipulating objects be it tangible or intangible, we have the right to claim
it. It will be our measure of our freedom. Second is our personality becomes

21
infused with an object. The right to claim the work is very important to our
personality.

Lessons learned:

- intellectual property

- property rights

Integrative questions:

- What is intellectual property?

- What is property rights?

- What are the arguments in intellectual property?

- What is rule-utilitiarianism?

- What is a pareto-based proviso?

source:

http://en.wikipedia.org/wiki/Intellectual_property

the-handbook-of-information-and-computer-ethics.pdf

Chapter 6: Informational Privacy: Concepts, Theories, and Controversies

Amazon link: N/A

Quote: “we will have to admit that we always have some degree of privacy,
since there will always be billions of people who have physically restricted
access to us.”

Learning expectation:

- To know what is privacy

- To know what is privacy in different point of views

- To understand the discussions/arguments about privacy

Review:

This chapter talks about privacy. Based from wikipedia, privacy is the
"ability of an individual or group to seclude themselves or information about
themselves and thereby reveal themselves selectively.The boundaries and

22
content of what is considered private differ among cultures and individuals,
but share basic common themes. Privacy is sometimes related to anonymity,
the wish to remain unnoticed or unidentified in the public realm. When
something is private to a person, it usually means there is something within
them that is considered inherently special or personally sensitive. The
degree to which private information is exposed therefore depends on how
the public will receive this information, which differs between places and
over time. Privacy is broader than security and includes the concepts of
appropriate use and protection of information."

In this chapter, not only the generic privavy was taught. Informational
privacy was taught. Again, based from wikipedia, Data privacy refers to "the
evolving relationship between technology and the legal right to, or public
expectation of privacy in the collection and sharing of data about one's self.
Privacy concerns exist wherever uniquely identifiable data relating to a
person or persons are collected and stored, in digital form or otherwise." For
me, whatever perspective of privacy you know, just do what is right. Do not
let yourself get into situations where you can be liable to court for damages.
Do the right thing so that you will not be in danger. The lesson learned here
is for you to respect your own individual. Whether it is information, sexual or
political privacy, still it is PRIVACY. Just respect. Period.

Lessons learned:

- privacy

- types of privacy

Integrative questions:

- What is privacy?

- What is informational privacy?

- What are the four kinds of privacy?

- Are they the same or different?

- How does Thomson define privacy?

source:

http://en.wikipedia.org/wiki/Privacy#Informational

the-handbook-of-information-and-computer-ethics.pdf

23
Chapter 7: Online Anonymity

Amazon link: N/A

Quote: ““non-coordinatability of traits in a given respect”

Learning expectation:

- To know what is anonymity

- To know what is/are its effect to the Information technology

Review:

Now, this chapter talks about online anonymity. What is online anonymity?
Based from my research in wikipedia, Anonymity is "without a name or
namelessness. In colloquial use, anonymous typically refers to a person, and
often means that the personal identity, or personally identifiable information
of that person is not known. Anonymity is a result of not having identifying
characteristics disclosed. This can occur from a lack of interest in learning
the nature of such characteristics, or through intentional efforts to hide these
characteristics. An example of the former would include a brief encounter
with a stranger, when learning the other person's name is not deemed
necessary. An example of the latter would include someone hiding behind
clothing that covers identifying features like hair color, scars, or tattoos, in
order to avoid identification."

For me, based from my perpspective, this matter should be focused on


very well. This matter is not a joke. This matter can do a lot of harm to the
world of the computer. The same as the previous chapter, privacy should
also be focused. These matters, privacy and anonymity are both related.
When wee use the internet for communication, sometimes we do not know
the exact identity of the person we are talking to. That is harmful because
they can be hackers. They might be needing a little information about us and
that's it. After quite some time, we were hacked. To sum it up, we should
always be careful when giving information to the people we do not know. We
should not give every important details so that we will not be hacked by
some who wants to try.

Lesson learned:

- anonymity

Integrative questions:

24
- What is anonymity?

- What are the concerns regarding anonymity?

- What can be ways to become anonymous?

- Are they the same or different with privacy?

- What are the seven dimensions to be considered as anonymous?

source:

http://en.wikipedia.org/wiki/Anonymity

the-handbook-of-information-and-computer-ethics.pdf

Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism,


andCounterhacking

Amazon link: N/A

Quote: “willingness to accept personal responsibility for outcome of actions”

Learning expectation:

- To know what is hacking

- To know what is counter hacking

Review:

This case talks about three topics. These topics are hacking, hacktivism
and counter hacking. Let us start with the first term. Based from wikipedia,
Hacking refers to the "re-configuring or re-programming of a system to
function in ways not facilitated by the owner, administrator, or designer. The
terms have several related meanings in the technology and computer
science fields, wherein a hack may refer to a clever or quick fix to a
computer program problem, or to what may be perceived to be a clumsy or
inelegant solution to a problem." Next term is hacktivism. From wikipedia,
Hacktivism is the "nonviolent use of illegal or legally ambiguous digital tools
in pursuit of political ends. These tools include web site defacements,
redirects, denial-of-service attacks, information theft, web site parodies,
virtual sit-ins, virtual sabotage, and software development. It is often
understood as the writing of code to promote political ideology - promoting
expressive politics, free speech, human rights, or information ethics. Acts of
hacktivism are carried out in the belief that proper use of code will be able to

25
produce similar results to those produced by regular activism or civil
disobedience." The last term discussed is counter hacking.

For me, these first two terms are the most fatal events that can occur to
the world of information technology. These acts can really destroy an
organization. These acts can destroy the credibility of a company or a person
itself. What i can say is that we users should be very careful on our acts
when we use the internet. We should be careful what sites we visit and make
sure you dont make any online enemies. Get your firewall up and scan your
computer often. These can be the basic rules so that our information cannot
be stolen by anyone. We should always focus and be careful on what we do.

Lessons learned:

- hacking

- how to counter it

- hacktivism

Integrative questions:

- What is hacking?

- What is hacktivism?

- How do we counter hack?

- Are there consequences?

- What is Benign Intrusions as preventing waste?

source:

http://en.wikipedia.org/wiki/Hack_(technology)

http://en.wikipedia.org/wiki/Hacktivism

the-handbook-of-information-and-computer-ethics.pdf

Chapter 9: Information Ethics and the Library Profession

Amazon link: N/A

Quote: “exposing someone to data might not provide that person with
information”

26
Learning expectation:

- To know what is a public library

- To know what is the relation with computer ethics

Review:

This case talks about Information Ethics and the Library Profession. I do
not have an idea on how they are related in the first place. From wikipedia,
the definition of library is a "collection of sources, resources, and services,
and the structure in which it is housed; it is organized for use and maintained
by a public body, an institution, or a private individual. In the more
traditional sense, a library is a collection of books. It can mean the collection,
the building or room that houses such a collection, or both. Public and
institutional collections and services may be intended for use by people who
choose not to or cannot afford to purchase an extensive collection
themselves, who need material no individual can reasonably be expected to
have, or who require professional assistance with their research. In addition
to providing materials, libraries also provide the services of librarians who
are experts at finding and organizing information and at interpreting
information needs."

For me, what is meant by library here are yahoo, google, wikipedia and
many more. They are the public libraries because anyone can easily research
an information that they want. Whatever age you are, wherever you live, you
can access all of these engine browsers. The problem is that with this easy
access on them, children can be exposed to violent, sexual and maliciuous
issues. For me, that is the relation of computer ethics to these libraries. We
need to apply computer ethics onto these engine browsers so that the
mindless or the children should not be exposed to the said topics. They can
be prevented or prohibited.

Lessons learned:

- relation of ethics to library

- 5 laws of library science

Integrative questions:

- What is library?

- What is information ethics?

27
- How are they related?

- What are the 5 laws of library science?

- What are samples of these libraries?

source:

http://en.wikipedia.org/wiki/Library

the-handbook-of-information-and-computer-ethics.pdf

Chapter 10: Ethical Interest in Free and Open Source Software

Amazon link: N/A

Quote: “primarily fighting to protect our way of making software”

Learning expectation:

- To know what is an OSS

Review:

This case talks about free and open source software. Based from my
research in wikipedia, Free and open source software is "software that is
liberally licensed to grant the right of users to use, study, change, and
improve its design through the availability of its source code. This approach
has gained both momentum and acceptance as the potential benefits have
been increasingly recognized by both individuals and corporate players. Free
is intended to refer to the freedom to copy and re-use the software, rather
than to the price of the software. The Free Software Foundation, an
organization that advocates for free software, suggests that to understand
the concept, one should think of free as in free speech, not as in free beer.
Free and open source software is an inclusive term which covers both free
software and open source software which, despite describing similar
development models, have differing cultures and philosophies. Free software
focuses on the philosophical freedoms it gives to users while open source
focuses on the perceived strengths of its peer-to-peer development model."

For me, there is nothing wrong with developing a free and open source
software. It is because money is not an important factor here. The important
factor here is your contribution to the people who are in need of it. Generally
it is your contribution to the whole society. For me, that is the most
important reason for a programmer or developer to build a software. It will

28
be a big boost to your career if those users or people will like your creation.
That is one thing for sure.

Lesson learned:

- Open source software

Integrative questions:

- What is a free sofware?

- What is an open source software?

- Do we need to apply ethics in this situation?

- Who developes the OSS?

- How does open source originated?

source:

http://en.wikipedia.org/wiki/Free_and_open_source_software

the-handbook-of-information-and-computer-ethics.pdf

Chapter 11: Internet Research Ethics: The Field and Its Critical Issues

Amazon link: N/A

Quote: “I understand that online communications maybe at greater risk for


hacking, intrusions, and other violations. Despite these possibilities, I
consent to participate.”

Learning expectation:

- To know what is an IRE

Review:

This case talks about Internet Research Ethics. Based from wikipedia,
Internet research ethics "involves the research ethics of social science,
humanities and scientific research carried out via the Internet." From the
book. Internet research ethics is an "emerging multi and interdisciplinary
field that systematically studies the ethical implications that arise from the
use of the Internet as a space or locale of, and/or tool for research." In this

29
case, the three sources of Internet research ethics was also discussed. There
are three sources of IRE. One is professional ethics. This included the codes
for computer related courses. Second is the social sciences and the
humanities. Philosophers need to study humanities who used online as
amateur artists or authors who are using their creative mind to produce a
work that has a need for copyright protection for people who will be copying
their work. Third is the growing body of information and computing ethics.
We all know that there are issues that need to be answered regarding moral
ethics in having new information technology.

For me, to sum it all up, we should not just copy and paste works from the
net. If we want to copy, then we must source it out. We must include
reference and quotes to justify our work. We should be educated and
disciplined very well about this matter. It is because this is a serious matter
that may lead to plagiarism. It is important that we should be unique of what
we do. People are all unique. We have our own creativity. We should learn
and develop from that.

Lesson learned:

- IRE

Integrative questions:

- What is Internet Research Ethics in wikpedia?

- What is the principle of justice?

- What is Internet Research Ethics based from the book?

- Why do we need to be educated through this?

- What are the 3 sources of IRE?

source:

http://en.wikipedia.org/wiki/Internet_research_ethics

the-handbook-of-information-and-computer-ethics.pdf

Chapter 12: Health Information Technology: Challenges in Ethics, Science,


and Uncertainty

Amazon link: N/A

Quote: “The Standard View”

30
Learning expectation:

- To know the issues that surround ethics

Review:

This case talks about two terms. Privacy and confidentiality. From
wikipedia, Privacy is the "ability of an individual or group to seclude
themselves or information about themselves and thereby reveal themselves
selectively. The boundaries and content of what is considered private differ
among cultures and individuals, but share basic common themes. Privacy is
sometimes related to anonymity, the wish to remain unnoticed or
unidentified in the public realm. When something is private to a person, it
usually means there is something within them that is considered inherently
special or personally sensitive. The degree to which private information is
exposed therefore depends on how the public will receive this information,
which differs between places and over time. Privacy is broader than security
and includes the concepts of appropriate use and protection of information."
From wikipedia, Confidentiality has been defined by the International
Organization for Standardization as "ensuring that information is accessible
only to those authorized to have access and is one of the cornerstones of
information security. Confidentiality is one of the design goals for many
cryptosystems, made possible in practice by the techniques of modern
cryptography."

For me, privacy and confidentiality are both important and significant for
all. They determine the safety of us users, developers or programmers
depending on how we created the Information System. For me, that is where
health comes in. If people are always being hacked, then what i can say is
that the programs that they use are not healthy. It is not healthy because
their identites are not secured. It will have a bad effect to the organization if
their softwares are not healthy. That is how i relate health and ethics to this
case study.

Lesson learned:

- Privacy

- Confidentiality

Integrative questions:

- What is privacy?

31
- What is confidentiality?

- How will we know health condition is secured?

- Who develops Information Systems?

- What is the standard view?

source:

http://en.wikipedia.org/wiki/Privacy

http://en.wikipedia.org/wiki/Confidentiality

the-handbook-of-information-and-computer-ethics.pdf

Chapter 13: Ethical Issues of Information and Business

Amazon link: N/A

Quote: “Information and communication technologies”

Learning expectation:

- To know CSR

- to know Business ethics

Review:

This case talks more on Business ethics and Corporate social


responsibility. Based from my research in wikipedia, Business ethics is a
"form of applied ethics or professional ethics that examines ethical principles
and moral or ethical problems that arise in a business environment. It applies
to all aspects of business conduct and is relevant to the conduct of
individuals in business and business organizations as a whole. Applied ethics
is a field of ethics that deals with ethical questions in many fields such as
medical, technical, legal and business ethics. Business ethics is a contested
terrain. There are economists and business gurus who claim ethics is
irrelevant to the field of business." From wikipedia, Corporate social
responsibility is a "form of corporate self-regulation integrated into a
business model. Ideally, CSR policy would function as a built-in, self-
regulating mechanism whereby business would monitor and ensure its
adherence to law, ethical standards, and international norms. Business would
embrace responsibility for the impact of their activities on the environment,
consumers, employees, communities, stakeholders and all other members of

32
the public sphere. Business would proactively promote the public interest by
encouraging community growth and development, and voluntarily
eliminating practices that harm the public sphere, regardless of legality."

For me, these terms that i have discussed are all very important. They are
important because it will or it can affect the many. A corporation or any
business should apply these terms that i have discussed. It will be a big
boost or a big impact on their line of business because they affect the
people. Whatever their actions are, good or bad, it refelcts everyone. Not
only to the company, but to all people who are inside it. We should know our
goals and objectives. We should know our mission and vision.

Lesson learned:

- CSR

- Business ethics

Integrative questions:

- What is CSR?

- What is Business ethics

- Are they related?

- What is the microlevel influence of business on ethics?

- What is the aim of business organizations?

source:

http://en.wikipedia.org/wiki/Business_ethics#What_is_Business_Ethics

http://en.wikipedia.org/wiki/Corporate_social_responsibility

the-handbook-of-information-and-computer-ethics.pdf

Chapter 14: Responsibilities for Information on the Internet

Amazon link: N/A

Quote: “Expert information”

Learning expectation:

- Information responsibilites

33
Review:

This case talks about responsibilities for Information on the Internet. From
wikipedia, An Internet service provider , also sometimes referred to as an
Internet access provider, is a company that offers its customers access to
the Internet. The ISP connects to its customers using a data transmission
technology appropriate for delivering Internet Protocol datagrams, such as
dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.
ISPs may provide Internet e-mail accounts to users which allow them to
communicate with one another by sending and receiving electronic
messages through their ISP's servers. ISPs may provide services such as
remotely storing data files on behalf of their customers, as well as other
services unique to each particular ISP. Based from the book, the transactions
and procedures that occurs through the internet are good. I agree with that. I
agree with that because in this generation, almost all information or data you
need are already posted in the net. It is just one click away for you to get
what you want. The problem only is that we are not responsible for our
actions. What am i saying? Whenever we get something from the net or from
google, we do not source it out. We do not put quotes. That can result to
plagiarism. To sum it all up, we users should know the provisions when using
the internet. We should follow all guidelines so that we will not be sued by
the management. It is important so that we will not be liable for our
wrongdoings. We should be creative and unique.

Lesson learned:

- Information responsibilities

Integrative questions:

- What is ISP?

- What are the responsibilities of ISP?

- What did Deborah Johnson comment on ISP?

- What did Milton Friedman comment on ISP?

- Are they relevant?

source:

http://en.wikipedia.org/wiki/Internet_service_provider

34
the-handbook-of-information-and-computer-ethics.pdf

Chapter 15: Virtual Reality and Computer Simulation

Amazon link: N/A

Quote: “rape in cyberspace”

Learning expectation:

- to know about virtual reality

- to know about computer simulation

Review:

In this chapter study, the topics being talked about are Virtual Reality and
Computer simulation. For me, they are new terms. Before we start, let us
define virtual reality. Based from my research in wikipedia, Virtual reality is a
"term that applies to computer-simulated environments that can simulate
places in the real world as well as in imaginary worlds. Most current virtual
reality environments are primarily visual experiences, displayed either on a
computer screen or through special stereoscopic displays, but some
simulations include additional sensory information, such as sound through
speakers or headphones. Some advanced, haptic systems now include tactile
information, generally known as force feedback, in medical and gaming
applications. Users can interact with a virtual environment or a virtual
artifact either through the use of standard input devices such as a keyboard
and mouse, or through multimodal devices such as a wired glove, the
Polhemus boom arm, and omnidirectional treadmills. The simulated
environment can be similar to the real world." The next definiton to be
defined is computer simulation. From wikipedia, A computer simulation, is a
"computer program, or network of computers, that attempts to simulate an
abstract model of a particular system. Computer simulations have become a
useful part of mathematical modeling of many natural systems in physics,
astrophysics, chemistry and biology, human systems in economics,
psychology, and social science and in the process of engineering new
technology, to gain insight into the operation of those."

For me, virtual reality and computer simulation are all good. They are
good because they are unique, they are all very fast and all of them are
useful. The problem is that it will be harmful to minors and to those who are

35
studying due to its being addictive. What i can say is that to those who will
be involving into virtual realities and computer simulation, they should all be
careful so that their studies would not be affected by the games or
application of the said terms. It is alright to play, for as long as you have your
limitations.

Lessons learned:

- virtual reality

- computer simulation

Integrative questions:

- What is virtual reality?

- What is computer simulation?

- What are the ethical issues regarding virtual reality?

- Who can be affected by virtual reality?

- Are they relevant?

source:

http://en.wikipedia.org/wiki/Virtual_reality

http://en.wikipedia.org/wiki/Computer_simulation

the-handbook-of-information-and-computer-ethics.pdf

Chapter 16: Genetic Information: Epistemological and Ethical Issues

Amazon link: N/A

Quote: “encompasses an account of the cell?s ability to store, express,


replicate, and change information. These are the fundamental features of
life, no less; and a schema that says something interesting about them all
has at least a scope to commend it.”

Learning expectation:

- to know about genetic information

Review:

36
This case study talks about the relation of Information Technology to
Science. The topic focuses more about gentics. From wikipedia, Genetics, a
"discipline of biology, is the science of heredity and variation in living
organisms. The fact that living things inherit traits from their parents has
been used since prehistoric times to improve crop plants and animals
through selective breeding. However, the modern science of genetics, which
seeks to understand the process of inheritance, only began with the work of
Gregor Mendel in the mid-nineteenth century. Although he did not know the
physical basis for heredity, Mendel observed that organisms inherit traits via
discrete units of inheritance, which are now called genes." Whati can say is
that Information Technology and Science are related. They are related in the
sense that scientists can do its experiment as fast as they can because of
the technology or gadget that they use. It is now very fast and easier to
perform. The problem with this is that some of the scientists use the
technology for cloning, DNA testing and many more, which for me is
unethical because we do unjust things to them. We do unjust things to
human beings or to animals. For example, a person kills a dog. The reason
why that dog died is because the cells are needed by a scientist for cloning.
In my opinion, that is so unethical because we risk lives just to make an
experiment. How and what about the value of that animal? Before we
perform such things, we should take note of all the risks of doing an act.
There is/are consequences for every wrong action that is done.

Lesson learned:

- relation of IT to Science

Integrative questions:

- What is genetics?

- What are ethical problems of genetic information?

- What does Maynard Smith says about information?

- What is the mission of human genome project?

- How is science related to IT?

source:

http://en.wikipedia.org/wiki/Genetics

the-handbook-of-information-and-computer-ethics.pdf

37
Chapter 17: The Ethics of Cyber Conflict

Amazon link: N/A

Quote: “threat to the peace”

Learning expectation:

- to know what are the different cyber conflicts

Review:

This case study talks about cyber conflict. As technology grows by, people
who have mastered the use of computers have the power to do unethical
things. The unethical things that i am talking to are the creation of cookies
and viruses. From wikipedia, A computer virus is a "computer program that
can copy itself and infect a computer. The term virus is also commonly but
erroneously used to refer to other types of malware, adware, and spyware
programs that do not have the reproductive ability. A true virus can only
spread from one computer to another when its host is taken to the target
computer; for instance because a user sent it over a network or the Internet,
or carried it on a removable medium such as a floppy disk, CD, DVD, or USB
drive. Viruses can increase their chances of spreading to other computers by
infecting files on a network file system or a file system that is accessed by
another computer." From wikipedia, A cookie is a "small piece of text stored
on a user's computer by a web browser. A cookie consists of one or more
name-value pairs containing bits of information."

With these said things and problems, we should now be careful when we
use the computer. We should make sure that our software is always secured
with anti-virus. Our internet should always be protected. Our anti-virus
program should always be updated so that it will be in good strength to block
viruses. Aside from that, whenever we are visitng sites, we should be careful
when and when not to give our identities to websites. It is because some of
that website can be hackers. Once we give our full identification, then it may
be the start of their harm to our personal computer.

Lesson learned:

- how to protect our own computers

Integrative questions:

- What is a virus?

38
- What is a cookie?

- What is jus in bello?What is jus ad bellum?

- How can we protect our own computers?

source:

http://en.wikipedia.org/wiki/Computer_virus

http://en.wikipedia.org/wiki/HTTP_cookie

the-handbook-of-information-and-computer-ethics.pdf

Chapter 18: A Practical Mechanism for Ethical Risk Assessment—A SoDIS


Inspection

Amazon link: N/A

Quote: “Research in software quality has focused largely on the technical


aspects of quality improvement, while limited attention has been paid to the
organizational and socio-behavioral aspects of quality management.”

Learning expectation:

- to know what are the different ethical risks

Review:

This chapter talks about risk management. In this chapter, the cycle in risk
assessment had also been talked about. Based from wikipedia, Risk
management can therefore be considered the "identification, assessment,
and prioritization of risks followed by coordinated and economical application
of resources to minimize, monitor, and control the probability and/or impact
of unfortunate events or to maximize the realization of opportunities. Risks
can come from uncertainty in financial markets, project failures, legal
liabilities, credit risk, accidents, natural causes and disasters as well as
deliberate attacks from an adversary. Several risk management standards
have been developed including the Project Management Institute, the
National Institute of Science and Technology, actuarial societies, and ISO
standards. Methods, definitions and goals vary widely according to whether
the risk management method is in the context of project management,
security, engineering, industrial processes, financial portfolios, actuarial
assessments, or public health and safety."

39
For me, as an Information Systems student, we should really give focus or
we should really give priority when handling risks. It is because risks can or
may cause the downfall of our Information Systems. For us to prevent that,
we should always first, identify the risk. We should identify the risk so that
we would know how to handle a particular risk. Next step is to analyze the
risk. We should create a plan on how we can prevent that risk. The last step
for me is to evaluate the risk. For me, evaluate is to monitor the status of
that particular risk. After we have identify and analyze, it is time for us to
track whether the risk has been subtracted or lessened. It is important for
every Information System so that we would not have expensive costs during
the run time.

Lesson learned:

- how to handle risks

Integrative questions:

- What is risk management?

- What is the SoDIS approach?

- What are the basic four steps of SoDIS process?

- Are they really needed?

- What is Gert's 10 basic moral rules?

source:

http://en.wikipedia.org/wiki/Risk_management

the-handbook-of-information-and-computer-ethics.pdf

Chapter 19: Regulation and Governance of the Internet

Amazon Link: N/A

Quote:

“the Internet is not spoken about only as a type ofmedium but often as a
living space in which people work, play, shop, socialize, and so on. So to
some extent the argument about controls on Internet content has shifted a
little. Although there is still discussion of pornography, hate language, and

40
the like, there is also discussion of, for example, controlling Internet
gambling and downloadingmusic and movies. So the discussion now is partly
of Internet activity and partly of Internet content.”

Learning Expectation:

- Regulation and Governance of the Internet

Review:

In this chapter of the book they said that “Internet governance is the
development and application by Governments, the private sector and civil
society, in their respective roles, of shared principles, norms, rules, decision-
making procedures, and programs that shape the evolution and use of the
Internet” which for me means that the internet is really important for all the
people because the internet is one of their source of income, information,
and a lot more. It is said that in effective regulation there are two broad
issues regarding the regulation of the content on the Internet: can content
on the Internet be regulated effectively, and should it be regulated. They
have also discussed about across boarders and they have said that Individual
countries, or political entities within countries, apart from blocking, can also
control content through legislation, and this can be relatively effective in
certain circumstances despite the fact that the Internet crosses national
borders. Consider the recent example of Internet gambling in the U.S. Online
gambling has been prohibited in the U.S., but at least one prominent
gambling business, Party Gaming, is based on Gibraltar, where it isimmune
from U.S. legislation.

For me, whatever our position is, high or low, we should be ethical when
using the internet. We should not take advantage when using it. We should
not use our power or we should not exercise our power over it. The internet
is for all. It is for equal purposes. That is why we should respect and be
disciplined.

Lessons Learned:

- Regulation and Governance of the Internet

Integrative Questions:

- What is Regulation of the internet?

- What is Governance of the internet?

41
- What is Censorship?

- Why do we need rules when browsing?

- Is there a consequence when we break the rule?

source:

the-handbook-of-information-and-computer-ethics.pdf

Chapter 20: Information Overload

Amazon Link: N/A

Quote:

“Information is supposed to be that which informs, but nothing can inform


without some attentional investment. Alas, there is no evidence that the rate
at which a member of our species can spend attentional resources has
increased to any significant degree in the past 10,000 years. As a result,
competition for our limited attention has grown in direct proportion to the
amount of information available. Because information has been proliferating
at such an enormous rate, we have reached the point where attention is an
extremely scarce resource, so scarce that extreme measures from
telemarketing to terrorism have proliferated as fast as information just to
capture a bit of it”

Learning Expectation:

- Information Overload

- Advantages

- Disadvantages

Review:

This chapter talks about Information Overload. Based from wikipedia,


Information overload is a "term popularized by Alvin Toffler that refers to the
difficulty a person can have understanding an issue and making decisions
that can be caused by the presence of too much information. The term and
concept precede the Internet. Toffler's explanation of it in his bestselling
book presents information overload as the Information Age's version of
sensory overload, a term that had been introduced in the 1950s. Sensory
overload was thought to cause disorientation and lack of responsiveness.

42
Toffler posited information overload as having the same sorts of effects, but
on the higher cognitive functions, writing. More and more people are
considered to be active writers and viewers because of their participation.
This flow has created a new life where we are now in danger of becoming
dependent on this method of access to information. Therefore we see an
information overload from the access to so much information, almost
instantaneously, without knowing the validity of the content and the risk of
misinformation."

For me, I think that Information overload only arises when we are
memorizing. Because when we memorize, sometimes we tend to get
pressured if whether or not we can do it. Unlike if we understand, we do not
have to memorize. With just one snap, we already know and can apply the
concept. When we get to be tired and pressured on memorizing, that is the
time information overload comes. We should understand the concept, not
memorize.

Lessons Learned:

- Information Overload

- Causes of information overload

- Consequences of information overload

Integrative Questions:

- What does it mean to have too much information, and, for that matter?

- What exactly is this substance we can apparently have too much of?

- Is the phenomenon as recent as our anxious complaints suggest, or does it


have a longer history?

- What is Information Overload?

- How does it relate to other seemingly related notions, such as data


overload, information anxiety, information pollution, techno stress, data
smog, and information fatigue syndrome?

source:

http://en.wikipedia.org/wiki/Information_overload

the-handbook-of-information-and-computer-ethics.pdf

43
Chapter 21: Email Spam

Amazon Link: N/A

Quote:

"This technique has been tried, and some prominent domestic spammers
have been arrested. However, this has not eliminated the problem of spam
email. One problem is that state or national laws, unlike the Internet, do not
reach across political boundaries. Spammers can effectively avoid anti spam
laws. Another problem is the definitional problem we have discussed
previously. Furthermore, when spammers spoof return addresses or use
drones, this complicates prosecution of the true source of the spam emails."

Learning Expectation:

- Email Spam

- Advantages

- Disadvantages

Review:

In this chapter they have discussed about Email Spam. They said that email
spam is also known as junk mail. Some of the junk mails are virus. Email
spam is an example of a spoiling of the commons; email spammers exploit
the economic model of Internet email and the relative openness of email
protocols. NF-UCBE shifts the cost of advertising to email recipients, who
must clear out advertisements for products they have no interest in. F-UCBE
uses the Internet to defraud victims. The ethical case against F-UCBE is
straightforward, and the people who are responsible for F-UCBE are
condemned. An ethical analysis of NF-UCBE is more nuanced, since the
economic incentives of current email arrangements make NF-UCBE
attractive.

The end- users or external users of an email should be very careful especially
in reading emails that we don’t know if who the recipient is because if we
open it there are a lot of possibilities that your email would face. There are
other spam emails that are asking for money, and telling that you won for a
certain game when in fact you did not join in that game, the others they use
to send you a junk mail so that you will give them information and they can
use it illegally.

44
Lessons Learned:

- e-mail

- span

- junk in e-mail

Integrative Questions:

- Is spam harmful?

- How can we ignore it?

- Why is it called or named spam?

- What is a spam?

- What is email spam?

source:

the-handbook-of-information-and-computer-ethics.pdf

Chapter 22: The Matter of Plagiarism: What, Why, and If

Amazon link: N/A

Quote: “concealment is at the heart of plagiarism”

Learning expectation:

- to know all about Plagiarism

Review:

This chapter talks all about the concept of plagiarism. So, what is
plagiarism all about? Is it good or not? Based from wikipedia, Plagiarism, is
the use or close imitation of the language and thoughts of another author
and the representation of them as one's own original work. Within academia,
plagiarism by students, professors, or researchers is considered academic
dishonesty or academic fraud and offenders are subject to academic
censure, up to and including expulsion. In journalism, plagiarism is
considered a breach of journalistic ethics, and reporters caught plagiarizing
typically face disciplinary measures ranging from suspension to termination
of employment. Some individuals caught plagiarizing in academic or
journalistic contexts claim that they plagiarized unintentionally, by failing to

45
include quotations or give the appropriate citation. While plagiarism in
scholarship and journalism has a centuries-old history, the development of
the Internet, where articles appear as electronic text, has made the physical
act of copying the work of others much easier. Plagiarism is not the same as
copyright infringement. While both terms may apply to a particular act, they
are different transgressions.

For me, based from the research, we should get in touch with this kind of
activity. It is because you do not create good image to the school, to the
community or to the company. You should be unique when doing something.
You should not copy others work because it definitely looses your image. If
you really want to copy that, you source it out. You should quote it from your
source. Each individual has their uniqueness. We should exercise that
uniqueness within us instead of us cheating and copying others work.

Lesson learned:

- effect of Plagiarism

Integrative questions:

- What is Plagiarism?

- What is lack of authorization?

- What is lack of accreditation?

- What can be effects of plagiarism?

- How can it be prevented?

source:

http://en.wikipedia.org/wiki/Plagiarism

the-handbook-of-information-and-computer-ethics.pdf

Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File
Sharing

Amazon link: N/A

Quote: “compensation without control”

Learning expectations:

46
- to know what Online sharing is

- to know what are the effects of it

Review:

In this case study, the topic talked about was online file sharing. Based
from wikipedia, File sharing is the "practice of distributing or providing
access to digitally stored information, such as computer programs, multi-
media, documents, or electronic books. It may be implemented through a
variety of storage, transmission, and distribution models and common
methods of file sharing incorporate manual sharing using removable media,
centralized computer file server installations on computer networks, World
Wide Web-based hyperlinked documents, and the use of distributed peer-to-
peer networking. File sharing is not in and of itself illegal. However, the
increasing popularity of the mp3 music format in the late 1990s led to the
release and growth of Napster and other software that aided the sharing of
electronic files. This in practice led to a huge growth in illegal file sharing:
the sharing of copyright protected files without authorization."

For me, it is good and at the same time, bad to have an online file sharing.
It is good because it can help students to learn in a fast pace. Students can
learn easily and fast if documents are to be uploaded on an educational
basis. Meanwhile, it is bad it will be used for profit. An example of this would
be limewire. This would be bad if a person will download songs from limewire
and at the same time, that person will burn and sell the pirated songs to the
black market. That can be the downfall for file sharing. So for me, we should
use it in an educational way or use it in a good way.

Lesson learned:

- effects of online sharing

Integrative questions:

- What is online file sharing?

- What is P2P?

- What are the moral considerations?

- Is it sharing or theft already?

- When is it good, and when is it bad?

47
source:

http://en.wikipedia.org/wiki/File_sharing

the-handbook-of-information-and-computer-ethics.pdf

Chapter 24: Censorship and Access to Expression

Amazon link: N/A

Quote: “thoughts, attitudes, and feelings”

Learning expectation:

- to know what censorship means

Review:

This topic focuses on censorship. Again, my beloved and repeated


question in this book, what is censorship? Based from wikipedia, Internet
censorship is "control or suppression of the publishing or accessing of
information on the Internet. The legal issues are similar to offline censorship.
One difference is that national borders are more permeable online: residents
of a country that bans certain information can find it on websites hosted
outside the country. A government can try to prevent its citizens from
viewing these even if it has no control over the websites themselves. Barring
total control on Internet-connected computers, such as in North Korea and
Cuba, total censorship of information on the Internet is very difficult to
achieve due to the underlying distributed technology of the Internet.
Pseudonymity and data havens allow unconditional free speech, as the
technology guarantees that material cannot be removed and the author of
any information is impossible to link to a physical identity or organization."

For me, censorship is really one of the best practices that we should follow
on. It is because our personality, identity and all information are secured. If
there will be no censorship, then hackers must be all over the globe. I have
an example for censorship. When a user creates an account on facebook,
friendster, twitter, linkedin, yahoomail, gmail and many more, we usually
provide our own passwords. We are provided by usernames and passwords.
For me, that is the censorship. We our restricted to view and to know only
our personal accounts. We are not to know the accounts of the other people
for security purposes.

Lesson learned:

48
- advantage of censorship

Integrative questions:

- What is censorship?

- What are the types of harm?

- What are the arguments in censorship?

- What is hostile atmosphere?

- What do we mean by creating a market?

source:

http://en.wikipedia.org/wiki/Censorship#Internet_censorship

the-handbook-of-information-and-computer-ethics.pdf

Chapter 25: The Gender Agenda in Computer Ethics

Amazon link: N/A

Quote: “to create a gender-equal ethics, a moral theory that generates


nonsexist moral principles, policies and practices.”

Learning expectation:

- to know what is Feminst ethics

Review:

In this case study, the topic is all about gender. The topic mostly focused
about feminist ethics. So, what is feminist ethics? For me, it is again, a new
term. Based from the Standford Encyclopedia of Philosophy, Feminist Ethics
is an "attempt to revise, reformulate, or rethink traditional ethics to the
extent it depreciates or devalues women's moral experience. Among others,
feminist philosopher Alison Jaggar faults traditional ethics for letting women
down in five related ways. First, it shows less concern for women's as
opposed to men's issues and interests. Second, traditional ethics views as
trivial the moral issues that arise in the so-called private world, the realm in
which women do housework and take care of children, the infirm, and the
elderly. Third, it implies that, in general, women are not as morally mature or
deep as men.Feminists have developed a wide variety of gender-centered
approaches to ethics, each of which addresses one or more of the five ways

49
traditional ethics has failed or neglected women. Some feminist ethicists
emphasize issues related to women's traits and behaviors, particularly their
care-giving ones. In contrast, other feminist ethicists emphasize the political,
legal, economic, and/or ideological causes and effects of women's second-
sex status. "

For me, I really do not understand how the feminist ethics is related to
computer ethics or Information Technology. In my point of view, there should
be no gender issue for this matter. Whether you are male or you are female,
if you commit mistake, then you are liable for it. There are consequences for
every wrong act that we do. That is why for me, there should be no gender
issue in the computer world.

Lesson learned:

- Feminst ethics

Integrative questions:

- What is a Feminist ethics?

- What is a student population?

- What are Quantitative Versus Qualitative Research Methodologies?

- What is Ethical Behavior?

- What is Cyberstalking?

source:

http://plato.stanford.edu/entries/feminism-ethics/

the-handbook-of-information-and-computer-ethics.pdf

Chapter 26: The Digital Divide: A Perspective for the Future

Amazon link: N/A

Quote: “wait and see”

Learning expectation:

- to know what is Digital Divide

Review:

50
In this case study, the topic that was talked about was Digital Divide. What
is it? For me, it is a new term. Based from wikipedia, The digital divide is the
"gap between people with effective access to digital and information
technology and those with very limited or no access at all. It includes the
imbalances in physical access to technology as well as the imbalances in
resources and skills needed to effectively participate as a digital citizen. In
other words, it is the unequal access by some members of society to
information and communication technology, and the unequal acquisition of
related skills. The term is closely related to the knowledge divide as the lack
of technology causes lack of useful information and knowledge. The digital
divide may be classified based on gender, income, and race groups, and by
locations. The term global digital divide refers to differences in technology
access between countries or the whole world."

For me, this gap that they are referring to in this case study can be erased
with the use of this digital divide. I have said that because everything is
connected with technology. With that, the poor and the rich can be
connected literally and figuratively. Figuratively because there are a lot of
computer shops. How much do we pay to rent a computer for one full hour?
It is very cheap. Why not use the computer shop if these poor people cannot
buy their own personal computers? That is my point. It does not need wealth
to connect the rich and the poor. Every will has a way.

Lesson learned:

- Digital Divide

Integrative questions:

- What is Digital Divide?

- What is the basis for digital divide to be eliminated?

- What are the "gaps"?

- What is ICT?

- What are the empirical studies about failure?

source:

http://en.wikipedia.org/wiki/Digital_divide

51
the-handbook-of-information-and-computer-ethics.pdf

Chapter 27: Intercultural Information Ethics

Amazon link: N/A

Quote: “whether information ethics in this ontological or global sense may


be biased in favor of Western values and interests and whether far-eastern
cultures may provide new perspectives and heuristics for a successful
development of the information society.”

Learning expectation:

- to know what is IIE

Review:

This chapter talks about Intercultural Information Ethics. Again, let us go


back to the definition of Information Ethics for things to be clear. Based from
wikipedia, Information ethics is the "field that investigates the ethical issues
arising from the development and application of information technologies. It
provides a critical framework for considering moral issues concerning
informational privacy, moral agency problems arising from the life-cycle of
information. Information Ethics is related to the fields of computer ethics and
the philosophy of information. Dilemmas regarding the life of information are
becoming increasingly important in a society that is defined as the
information society. Information transmission and literacy are essential
concerns in establishing an ethical foundation that promotes fair, equitable,
and responsible practices. Information ethics broadly examines issues
related to ownership, access, privacy, security, and community."

For me, this is an important matter because we deal with a lot of cultures.
A lot of cultures that will or that may affect the world wide web. We should
respect each and every culture so that there will be no conflict onto the
world wide web. Let us follow the ten commandments of the computer, let us
respect the traditions of each and every race. It is important for us to have
ethics so that there would be no harm, there would be no discriminations on
the internet. An example of this would be plagiarism. If you really have
ethics, then you should not copy others activity or work, or if you really want
to copy it, then make sure to source it out so that there would be no conflict.

Lesson learned:

52
- IIE

Integrative questions:

- What is IIE?

- Who is Terrell Ward Bynum?

- Who is Bernd Frohmann?

- Who is Lorenzo Magnani?

- Who is Barbara Paterson?

source:

http://en.wikipedia.org/wiki/Information_ethics

the-handbook-of-information-and-computer-ethics.pdf

53

You might also like