Professional Documents
Culture Documents
TECHOLOGY
ETHIC’s Book
THE BOOK IS
DEDICATED TO
MYSELF FOR ONCE I
AM NOT LAZY AND TO
MY PARENTS FAMILY
AND FRIENDS
2
PREFACE
3
Cyber Ethics Chapter 1
“Be unselfish. That is the first and final commandment for those
Who would be useful and happy in their usefulness.
If you think of yourself only, you cannot develop
Because you are choking
The source of development, which is spiritual
Expansion through thought for others.”
- Charles William Eliot
I expect to learn things that would help me understand and get the mature thinking
about the revolution of ethics and information technology.
I selected this quote because the quote is perfect match for the information
revolution. Being selfish would not help anyone. We need to learn how to be unselfish.
We should learn how to appreciate other people as well.
Review:
The Information technology grew. It was a big boom not only today, but also in
the future. Every person wants to be in the trend of the new technology. The trend in
which every person would or is benefiting. Information Technology grows not only a tiny
step day by day. But it takes a giant step forward and it progresses in to more powerful
technology. It’s like foreseeing the future. We create and upgrade everything. There is a
sad part though. People tend to become more greedy this days. As technology grows evil
grows with it. People abuse information technology they create such things as viruses and
spywares that infect other computers that they steal or destroy the other computer. People
need to have the proper state of mind or the proper morality within one self’s. We need to
put the bad side away. We need to improve the ethical attitude of people supporting this
growth.
4
What I learned:
Integrative Questions:
1. Why does information rapidly grow?
2. Would this growth stop?
3. What are the four parts of global information ethics?
4. Why are people creating viruses and spywares?
5. Why shouldn’t be software owner ship be allowed according to people like Richard
Stallman?
5
Cyber Ethics Chapter 2
Quote:
I expect to learn and know what the right and wrong decisions are when
information technology is dissected with ethics.
The quotes explains that everything we should do is for the good of mankind. We
should change the way we think. We should be smart enough to know what is helpful to
the world and which is not.
Review:
The chapter discusses the difference between the law, information, and
communication. People can tend to be ethical by following the law. But are we sure that
following that law is ethical? In some cases the law can be determined as a bad part of
morality. Some laws are bad. It depends on how ethics is implemented and it depends on
the culture. The information we get nowadays are so broad. Everywhere you go you
would have a great chance of getting that specific info you would need. Library these
days are things of the past, with the world wide web and cyber world. The information
grows and improves. Before I remember when I was a kid if you need to research you
would have to go to the library, these days open up Mozilla and you would have all the
things you would need in the browser. But what I also noticed people doing those things
are forgetting something. They are forgetting to give credit to the people who did the
work. There forget to give the reference and citation to the author. Same with the
software’s that is being created now. He licensed software’s are being pirated and being
sold by the people of the ghetto market. Like I said information is needed by people
everyday and every moment in order to survive this time in our world.
6
Things that I have learned:
♦ Technology is everywhere.
♦ The three characteristics of communication in networks.
Integrative Questions:
7
Cyber Ethics Chapter 3
Quote:
“Injustice, poverty, slavery, ignorance –
these may be cured by reform or revolution.
But men do not live only by
fighting evils. They live by positive goals,
individual and collective, a vast variety of them,
seldom predictable, at times incompatible.”
– Isaiah Berlin
What does Reason and Relativity have to with responsibility in Computer Ethics.
The quote explains that Being selfish and doing injustice actions are things we
should avoid in order to have a better life. Men should act like real men, God created us
not to fight not to be selfish. He created us to be a better person knowing united we can
be a better human beings.
Review:
Revolution and evolution sounds so near but yet the meaning so far. These two
words are basically on the opposite side but the meaning may have the same direction or
point. A revolution wants a new beginning. An evolution wants to upgrade into
something new. Information technology is evolving and revolutionizing faster than the
speed of light. We Should know the right things. We should know what the wrongs thing
is and what the right thing is while we are growing. We should set aside the bad deeds in
order for us to win this. We should always be honest. Being greedy nor being selfish
would not help a person. It is better to be a kind hearted and know the good things. Than
being someone elite who is doing something below the table.
8
Things that I have learned:
Integrative Question:
9
Cyber Ethics Chapter 4
Quote:
“A man is ethical only when life, as such,
is sacred to him, that of plants and animals as
that of his fellow men, and when he devotes
himself helpfully to all life that
is in need of help.”
-Albert Schweitzer
Being able to learn ethical principles in which we can use as a professional in the
industry.
A man should not be selfish. He should learn how to be a person who is willing to
do good things for others. A man’s life is not about himself. It is about ethical things that
happened in his life.
Review:
The chapter is basically about computer ethics. It says the technology should
grow with moral ethics. People would learn to follow policies if they are not only
implemented properly but also if they are given a proper introduction. We need to have
another approach in which ethics would be given a better understanding.
♦ Justice
♦ Autonomy
♦ Democracy
♦ Privacy
♦ Computer ethics
♦ Morality
10
Integrative Questions:
11
Cyber Ethics Chapter 5
Quote:
- Thomas Jefferson
The quote explains that every person has his right to be equal. Every person is the
same as any other individual.
Review:
The chapter tells how gender discrimination still occurs in the information
technology department. It is hard to say what I am about to say because I am a man.
Many men think that women are only good for household work. For me I agree but, if
you make a man work with a woman, the work would be way much better. Women are
not only good at household work but actual work also. We need to learn how to be fair.
Its unethical to discriminate gender.
12
Integrative Questions:
13
Cyber Ethics Chapter 6
Quote:
- Bertrand Russell
The quote states that a person has two sides. One side is his pride in which he
boasts about which he is so proud. The other side is the side in which when he makes
mistakes it is hidden.
Review:
Values play an important role in information technology. Values are the standards
we follow in everyday life we need to adopt the right values. This is being passed on
from one generation to another generation. We have to know what would be right and
what would be wrong in such actions we do.
14
Integrative Questions:
15
Cyber Ethics Chapter 7
Chapter: Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key
Problems and Challenges
Quote:
- Henri Nouwen
The quote states that things we do is not for ourselves, things we do is for all the
people we love. There would be no one alone in the world. We have a friend who would
be there when we need him or her.
Review:
We need to apply our lives with ethical thinking. Sometimes we don’t know or we
are just ignorant in doing something wrong. In the software industry sharing is ok as long
as the software maker allows it, but what if it is not. Here come the pirates who sales the
software’s in the black market in order for them to gain money, what happens to the
original maker of the software bankrupt. Profit shares would not go back to them. We
need to learn how to stop if we already have enough. People need to work together in
order for us to have a better information technology life.
16
What I have learned:
Integrative Questions:
17
Cyber Ethics Chapter 8
Quote:
- Edmund Burke
I expect to learn how an individual can act as a man wit ethical thinking in the
information technology world.
The quote says that we cannot change ourselves to a better person if we would not
follow rules regulations that we imply. We need to follow the policies we create in order
for us to be a well organized person.
Review:
18
Integrative Questions:
1. Define consequentialism?
2. What are the combined notions of human life?
3. What is computing in uncharted waters?
4. If the ends don’t justify the means what would?
5. Define consequentialism constrained justice?
19
Cyber Ethics Chapter 9
Chapter: The Internet as Public Space: Concepts, Issues, and Implications in Public
Policy
Quote:
- Michael Jordan
The quote states that in every action we do we have an intention of doing it for
ourselves only. But once we have done it we should learn not to raise our heads high, we
need to learn how to be humble. If you become rich, learn how to reach out to the poor
people.
Review:
Nobody ones the internet but everyone has his rights over it. The internet is made
for the public, made for everyone in short. The internet not only removes communication
gaps between people but it helps us to learn and understand certain things we need or
want to gain knowledge about. We should always remember that we need to make the
internet a better place for everyone, people who makes the viruses and spywares are
selfish people who wants to destroy the happy community of the internet. Where ethics in
their minds? They don’t have values.
20
Integrative Question:
21
Cyber Ethics Chapter 10
Quote:
The quote states that everyone, who ever you are wherever you are you have
freedom. You gain it with what actions you do.
Review:
People are starting to disobey rules. One good example is rules implemented in
the cyberspace and in the information technology world. People tend not to follow these
rules because they want to be something other people can not be. People these days are
full of pride in which they grow their heads. I know rules are to be followed, I would be
honest most of the times I don’t follow them, but after realizing that rules are made to
make our world a better place. Not only for me but for everyone also. For us.
22
What I have learned:
Integrative Questions
23
Cyber Ethics Chapter 11
Quote:
- Bill Gates
I expect to learn and understand the concept of black holes in the cyberspace
The quotes says that everyone is affected by spam and everyone is not safe from
it.
Review:
Why do people spam? People do this in order for them to gain profit. Actually for
me it is already forcing. They forcing people to do this do that blah blah. They are
dictating the lives of people. They shouldn’t be doing dat. They have no moral dignity.
They just endanger people more. What they do is not true or in short fake. Do you think it
is right? Hell no right. People need to stop doing this bad act. As an Information
technology student I know things or methods to ignore this spam. To bad some people are
confused and they get lured to the spam messages they waste money waste time because
of the spam message. This act has to stop.
♦ The Debate
♦ The Question
♦ The Explanation
♦ The Incident
24
Integrative Questions:
25
Cyber Ethics Chapter 12
Quote:
- Bruce Sterling
Review:
The Cyberspace is burning. Burning because of how fast it improves day in night
out. We think the good technology is the only technology improving in the cyberspace,
but we are wrong. Bad people have gained power and knowledge about this. The half of
the cyberspace is in bad hands. People should learn how to be smart in operating the
cyberspace. I would tell you its becoming nasty, yes nasty because of the scams being
created on it.
♦ Cyberspace growth
♦ Rethinking the rush to rate
♦ Free speech online
♦ Third party rating as the answer
26
Integrative Questions:
27
Cyber Ethics Chapter 13
Quote:
- Leonardo Cohen
A person would not change no matter what happens unless he really changes.
Same with a nation, if the people living on that nation have a certain attitude it would be
hard to change the attitude of that nation. It is already carved within them it is already
what they call their trade mark.
Review:
People nowadays are bothered by pop-ups, spam and other unwanted things in the
internet like viruses and spy wares. We are invaded by bad people. People who have
selfish desires in which they want to gain the upper hand in life. We need to filter this.
Even if such things are filtered those bad people still find a way to crack the filter. We
should have a law passed that this people should be sent to jail. Its impossible not to find
this people with the technology we have tracking their IP address is one of the solution in
order to catch these filthy people.
What I learned:
28
Integrative questions:
1. Define filtering?
2. How does filtering work?
3. What are the problems encountered in filtering?
4. What are the two libraries given in the chapter that uses filtering?
5. What are the problems in blocking?
29
Cyber Ethics Chapter 14
Chapter: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique
Quote:
The quote explains that evil and bad things are happening right now, a good
example is the scamming over the cyberspace we cannot win unless we go on an all out
war against these people who always do bad things such as cyber crimes and illegal
activities. We should have the truth.
Review:
A lot of bad people are taking advantage of the cyber world they are doing illegal
activities in the cyber world. These people are people who take advantage of other
people’s weaknesses. We want our cyber space to be clean and filtered. Do you think this
I right? Child pornography? That’s already over the limit. They have no dignity and
respect.
30
Integrative questions:
1. Define argument 1?
2. Explain argument 2?
3. What is argument 3?
4. Explain censorship?
5. Explain what is child pornography and why is it illegal?
31
Cyber Ethics Chapter 15
Quote:
- Richard Burr
The quote defines that changes alone cannot change something. There should be
dedication and will to change.
Review:
We need to protect the cyber world. We should free them from all the bad things
moving around this place. We ourselves should know what is right and wrong. We
should fight together as a team to fight and prevent this. These people destroying or
creating chaos in our world should be stopped. The most affected would be the youth,
am not saying we are safe. We can also be easy target for them no one is safe. It turned
into an ugly world.
♦ PICS
♦ Flexible blocking
♦ PICS specifications
32
Integrative Questions:
1. What is PICS?
2. What are the specifications of PICS?
3. What is flexible blocking?
4. Explain the supervisor?
5. Explain the context?
33
Cyber Ethics Chapter 16
Quotes:
- Shunryu Suzuki
The quote says that we must be ready for change. I know a lot of people
misunderstand change. Change has benefits. Change is needed not only when a bad thing
or things happen. Change is also beneficiary to people who want to improve.
Review:
The chapter says that change is needed. Like what people say change is beneficial
to all of us. We need to improve information technology from further abuse the hackers
and other bad people do. We need to dominate it this time to determine what change we
need to have. We better have this change now, rather than regretting this in the future.
34
Integrative questions:
1. What is ISP?
2. Define moral perspective
3. Why does the cyberspace alter the need for libel laws?
4. Define Decency act
5. How does ISP work?
35
Cyber Ethics Chapter 17
Quote:
- Mark Twain
The quote states that people alter and alter changes made by them, in order to get
new laws about copyright. They cannot be satisfied with what law they make.
Review:
The chapter tells that the digital millennium copyright act would be a better way
to handle copyright laws. This law would be a good idea for all the people who create
and use stuff’s owned by other people. People would learn how to respect others creatin
and appreciate it. Getting other people’s work without giving credit to the creator is not
only stealing but it is also disrespecting the person’s creation or masterpiece.
36
Integrative Questions:
37
Cyber Ethics Chapter 18
Quote:
- Gary Wright
The quotes says that technology nowadays are being abused by greedy people. It
is wrongfully used by these people.
Review:
Piracy kills. Have you ever seen the commercial adds against piracy? Or have you
seen Edu Manzano destroying pirated CD’s and DVD’s? Well I have. The world is full
of pirates not only the Somali pirates(sea pirates) we also have the pirates who destroys
industries. Piracy is a very very good example of how the information technology we
have is being abused by people who wants to gain more money. Yes money money
money. That’s what pirates talk about. More profits for them. Sad to say that many
industries are dying because of this.
♦ Technical background
♦ The lawsuit
♦ The outcome
♦ Piracy
38
Integrative Questions:
1. What is piracy?
2. What does piracy do?
3. What is DeCSS?
4. Explain the outcome.
5. Explain the lawsuit.
39
Cyber Ethics Chapter 19
Quote;
The quote says that we could have been helpful if we were not too arrogant and
cheap. I can relate the quote to information technology because it matches. We could
have saved earth if we were not cheap, in Information technology we could have saved
the industry if we did not buy cheap CD’s. which we all know are pirated.
Review:
The chapter is almost the same as the previous chapter about piracy, but it added
some extra features, in which you only can get in a original DVD. Just kidding. Well it
actually has added information in which we need to put values in. The environment refers
to the information technology, in which we abuse just like mother earth right?
40
Integrative Questions:
41
Cyber Ethics Chapter 20
Quote:
- Sigmund Freud
The quote explains that minds can be similar. Even with the age gap. Men can
think like kids, kids can think like men.
Review:
This chapter has connections with the previous chapter and its issues. People steal
nowadays, especially work of other people. There is what we call intellectual property.
This property is being stolen nowadays.
42
Integrative Questions:
43
Cyber Ethics Chapter 21
Quote:
The quotes say that the people we expect to have morals are the persons who
really are hiding their true color.
Review:
The chapter talks about how copyright becomes ethical. It does not become
ethical if you are stealing it. You should be able to give respect to the person you are
getting information at. It is actually disrespecting if you just get them. You have to cite,
give credit and thanks to them. You don’t really need to spend money, just say thank you.
And its free, no more headaches of plagiarism right?
♦ Property rights
♦ Theories of intellectual property and copyright
♦ Copyright
44
Ethical Questions:
1. What is copyright?
2. How does one violate copyright policies?
3. What are the theories of intellectual property and copyright?
4. What are the rights of copyright?
5. Is copyright ethical?
45
Cyber Ethics Chapter 22
Quote:
- Zelda Fitzgerald
The quote is very true and right. Plagiarism starts from our home, actually within
us. It spreads faster than the light.
Review:
This chapters tells me that plagiarism is stealing, disrespecting and killing the
creator of the object. Most of the people lack knowledge about giving citation people
should respect other people’s work. To those who know how to cite the source we should
teach other people about it. We need to stop plagiarism.
♦ Plagiarism
♦ What’s the harm in plagiarism
♦ What’s the use of copyright
♦ Bring it all together
46
Integrative Questions:
1. What is plagiarism?
2. Where does plagiarism move around?
3. What’s the use of copyright?
4. What is the outcome of we would be using plagiarized work?
5. Would you plagiarize?
47
Cyber Ethics Chapter 23
Quote:
- Peter Singer
The quote says that everything has ethics in it. We should no ignore ethics we
should apply it in every aspect we do.
Review:
The chapter explains Website linking and ethical evaluation of it. Deep linking
could be harmful as said in the book. They say that this could lead to advertising
revenues of some people. And do you know who those people are? Drum rolls please…..
the spammers, the virus builders, hackers and the pirates! Hahaha. Those are the people
who would target such things. We need to be aware of the scenario.
48
Integrative Questions:
49
Cyber Ethics Chapter 24
Quote:
- Mohandas Gandhi
The quote says that we don’t get satisfied with what we have, it’s not about a
simple thing being enough. It is about how the simple thing would be enough.
Review:
The chapter tells us the story of the cathedral and bazaar. What I mean is the rise
of Linux as an open source. We should know very well that most of the things we need
nowadays are being paid and its no longer free. That’s why they created the open source.
It helps developers develop and create at the same time helps people who could not
afford programs.
50
Integrative Questions:
51
Cyber Ethics Chapter 25
Quote:
- Timothy Leary
The quote is actually funny but so true. The quote explains that information age is
growing rapidly. If Aristotle was here would have done a talk show like Oprah and The
tonight show. Because of the power of information age.
Review:
The chapter says that information age is really being abused by people.
Information age is supposed to help us. Guide us and make our lives easier. But here
comes the…. Drum rolls please again.. pirates! Argh shiver me timber. Hahaha, well
actually they are the stars of the show. For me if you download a song its ok, but if you
sell it or gain profit from it, that’s piracy already. Learn the difference of sharing and
gaining profit.
♦ Greased Data
♦ Grounding Piracy
♦ The nature of piracy
♦ Setting and adjusting policies for private situations
52
Integrative questions:
53
Cyber Ethics Chapter 26
Quote:
The quote says that every person is being brainwashed by greediness. We should
open our eyes to reality
Review:
The chapter is about restrictions. In the information technology world and in the
real world everything has its restriction. The world wide web is a very very very big
place, did I mention it is really big? I know you get a lot of info and resources from it but
there are restrictions to it. It has limits also.
54
Integrative Questions:
55
Cyber Ethics Chapter 27
Quote:
- Edward P. Morgan
The quote says that a man who enters a certain risk or gamble in his life has no
more privacy. In which a part of his life is gone.
Review:
56
♦ PET owners beware
Integrative Questions:
1. What is PETs?
2. What is the theory of privacy?
3. Why should PET owners beware?
4. Define Privacy enhancing technologies in an individual choice in controlling
personal information?
5. What is normative privacy?
57
Cyber Ethics Chapter 28
Quote:
The quote is true. You have to face you challenges without fear. For every
challenge you go thru, easy way or hard way you get a valuable experience which you
can cherish for the rest of your life.
Review:
58
Integrative questions:
1. What is privacy?
2. Define personal realm background?
3. What are the to misleading assumptions?
4. How do you violate privacy?
5. Explain the privacy violation in the case of lotus marketplace?
59
Cyber Ethics Chapter 29
Quote:
- Felix Adler
Review:
We all know that we are not supposed to be selfish. But in some cases we need to
in order for us to protect our privacy. We need this protection badly. If this selfish
method works for the information technology world why not share it right? Like they say
be selfish now, and share in the appropriate time. You become selfish for the sake of
others; you share what you learned for the sake of others. We need to fight the cyber
crimes together and stop it and prevent it from creating more chaos.
♦ What KDD is
♦ Personal data
♦ Social consequences
♦ Categorial privacy
♦ Solutions
60
Integrative Question:
1. What is KDD?
2. Define personal data?
3. What is a social consequence?
4. Explain Categorial privacy?
5. What is solution in the chapter?
61
Cyber Ethics Chapter 30
Quote:
- Leonardo da Vinci
The quote says that we need to gain strength and knowledge. But we still need to
have ethic and a proper conduct.
Review:
The chapter talks about data mining. So what is data mining for me? It is when
you get date which you would need. This data are useful to you. Its almost the same with
data gathering. The difference is in data mining you will use all your data. It is basically
thinking and loading up your mind with information’s.
62
Inetgrative Questions:
63
Cyber Ethics Chapter 31
Quote:
- Jack Vance
The quotes is true, people are watching you at work, because they want to make
sure everything is still private.
Review:
The chapter says that companies have rights in watching their employee’s. They
do this in order for them to make sure that their information’s would not go to the wrong
hands of the cyber criminals. They are doing it to keep the information safe. Quite
frankly it’s ok to me. Because what if a information goes out and it gets leaked the
company is doomed.
64
Integrative Questions:
65
Cyber Ethics Chapter 32
Quote:
- Micheal Jordan
What I expect to learn:
The quote can relate to the information technology world. How? Its simple you
practice false programming, or you practice hacking and spamming people. Think about
it if you doing it to help other people. How many would benefit? A lot
Review:
The chapter is about wrongdoings. People in the cyber world are affected by the
wrong doings of other people. We should learn the right fundamentals and use it in a
right manner; we should be smart enough to help other people than doing a wrong deed.
66
Integrative Questions:
67
Cyber Ethics Chapter 33
Quote:
- Vilhjalmur Stefansson
-
The quotes says that if your way is ethical be sure what you are doing is also
ethical and it should have the right values.
Review:
The chapter tells me when to stop. The chapter taught me to stop and no longer go
further. We should learn to appreciate what we already have. We should not be greedy
and get more things we want. Everything has a boundary.
What I learned:
68
Integrative Question:
69
Cyber Ethics Chapter 34
Quote:
- Jesse Owens
The quote tells me that in order for me to achieve something’s I should have self
discipline. To be the man you need to have self discipline and effort.
Review:
Hacktivist wow, this people are really going nuts. They use the cyberspace for
their self interest. There are people who are really abusing the information technology
power. They do this for their self interest. Where is ethics in that?
70
Intergrative Questions:
1. Define hacktivism?
2. What is cyber terrorism?
3. What is the ethics of an hacktivist?
4. What is civil disobedience?
5. Describe mistrust authority?
71
Cyber Ethics Chapter 35
Quote:
- Harry A. Blackmun
The quotes states that each individual has his right to have his privacy where ever,
whenever he wants.
Review:
This chapter tells me how American defines privacy. They define it in a simple
term as long as you don’t’ cross the line it is ok. Now a day’s people are abusing other
peoples life. They are messing them even in cyberspace. Some of the new Web 2.0 sites
have privacy settings for example my space, no one can see my profile unless they are
listed as my friend.
♦ Browsing information
♦ Legal Issues and Societal Implications
♦ What are you doing on the web
72
Integrative Questions:
1. What is DNS?
2. What is an IP?
3. What are you doing on the web?
4. What are the legal key issues?
5. What is browsing information?
73
Cyber Ethics Chapter 36
Quote:
- Todd Solondz”
What I expect to learn:
Review:
Anonymity of this information age, ahem ahem. People want their identity to be
kept. That’s why cybername comes out. People now wants to hide who they are in
cyberspace. They have new identities in this world.
♦ Methods
♦ Gate keepers
♦ Results
♦ Encryption
♦ Anonymity
♦ Data flow
74
Integrative Questions:
75
Cyber Ethics Chapter 37
Quote:
- Blaise Pascal”
The quotes says that you need to value your identity. Legacy lives on forever if
your identity is well respected.
Review:
Information technology has many ways of identifying with the use of biometrics.
Our online identities can be an example of this.
♦ Use of biometrics
♦ Identifying biometric identity
♦ Virtual identities
♦ Questioning the biometric body
76
Integrative Questions
1. What is a biometric?
2. How does biometric identify our identity?
3. What is virtual identities?
4. What is biometric body?
5. What is a biometric?
77
Cyber Ethics Chapter 38
Quote:
- Derek Jeter
The quote says that whoever you are, you can achieve, you may not become the
best but you’re hard work pay’s off
Review:
Information technology changes the world. It changed me, once I was illiterate
about computers, I was jealous of my classmates when I was grade 3 who have their own
computers at home, till when I got a computer when I was grade 5. it changed me. I
became an enthusiast of it. My knowledge grew, and it has grown bigger each day. Look
at me now, basketball and computers is my thing. I go online and always find basketball
stuffs on the internet hahaha.
♦ Code of ethics
♦ Philosophical foundations
♦ Major issues
78
Integrative Questions:
79
Cyber Ethics Chapter 39
Quote:
- Larry Bird
Review:
The code of ethic of a software engineer. I salute it. This would help a software
engineer into having values and respect for what he does. His morality would be defined
by his work.
What I learned:
♦ IEEE-CS
♦ ACM
♦ Short version of the software engineering ethics.
♦ Applied principles
♦ Practices
80
Integrative Questions:
1. What is IEEE-CS?
2. What is ACM?
3. Explain the short version of ethics?
4. What is applied principle?
5. Define the preactices?
81
Cyber Ethics Chapter 40
Quote:
- Carol Bellamy
The quote is perfect for this chapter, if you have no education your career might
not be complete, you get education but you don’t complete it its bad.
Review:
It is really better to have no code of ethics than having an incomplete one. You
would just get confused with what is happening and how the rules or codes of ethic work
if it is incomplete.
♦ Weapons
♦ Environmental impacts
♦ PAPA
♦ Teleworking
♦ Telecommunicating
♦ Protecting the weak against the strong
♦ Importance of the PAPA issues
♦ pressures to look for loopholes
♦ Incomplete moral codes
♦ Complete moral codes
♦ Avoiding accidental incomplete moral codes
82
Integrative questions:
1. What is PAPA?
2. Define teleworking?
3. Explain Telecommunicating?
4. Explain incomplete moral codes?
5. Define a complete moral code?
83
Cyber Ethics Chapter 41
Quote:
- Clare W. Graves
Review:
♦ Subsumption ethics
♦ Systems Development
♦ Ethical Framework
♦ The golden mean
♦ The golden rule
84
Integrative Question:
85
Cyber Ethics Chapter 42
Quote:
- Charles Handy
Ethics in business
The quote says that a business must have goals and purpose rather than just
having properties.
Review:
The chapter talks about how business computing are needed nowadays in the
business world. The industry helps other industries. The companies are having a easier
time with business computing rather than going old school. These new methods are really
giving us a better time, headache free computing.
♦ Business computing
♦ Size issues
♦ Level one
♦ Level Two
♦ Level Three
♦ Level four
♦ The tasks of business computing
♦ Data considerations
86
Integrative Questions:
87
Cyber Ethics Chapter 43
Quote:
- Thomas Jefferson
The quote says that without morals a man would not be complete, a man would
not be happy.
Review:
The chapter talks about how to being a person that has virtues, a person who has
ethics and a person who believes in the right morals. In order for the industry to be better,
we need to reconsider studying ourselves first. We need to make ourselves better. We
need to improve our values. We retrace our step on how we are suppose to be.
♦ Ethics
♦ Morality
♦ Values
♦ Character forming vs. Action guiding theories
♦ Need for contemporary moral theory
♦ Core values
♦ Imagination and narrative genre
88
Integrative Questions:
1. What is ethics?
2. what is morality?
3. Give an example of a core value?
4. Explain need for contemporary moral theory?
5. Explain imagination and narrative genre?
89
The Handbook of Information and Computer Ethics Chapter 1
Quote:
- Armstrong Williams
Review:
The chapter tells about how to start from the scratch, you must have these basic
elements in order to start. Just like in basketball you should know the basics. Every thing
starts from the scratch.
What I learned:
90
Integrative Questions:
1. Explain stage 1?
2. explain stage 2?
3. explain stage 3?
4. define moral agents?
5. what are the four moral principles
91
The Handbook of Information and Computer Ethics Chapter 2
Quote:
- James H. Douglas
Review:
The chapter is about the history of the computers. Started from something small,
it grew large to something everybody wants and needs. A new technology is being
developed day by day. Values are being overshadowed by greedy people nowadays who
only think of profits.
92
Integrative Question:
93
The Handbook of Information and Computer Ethics Chapter 3
Quote:
Marcus Aurelius
Review:
The chapter talks about how information technology ethics becomes a practical
ethic. It explains that values in information technology are of the same values with other
fields. It tells that not only good things are created from computers but also bad things.
♦ APPLIED ETHICS
♦ Generalism
♦ Particularism
♦ Reflective Equilibrium
♦ THE DESIGN TURN IN APPLIED ETHICS
♦ VALUE SENSITIVE DESIGN
♦ PACS
♦ Real-Time Emergency Medicine.
♦ OTHER CONCEPTIONS OF METHOD IN COMPUTER ETHICS
94
Integrative Questions:
1. What is generalism?
2. What is the definition of Cyber Ethics?
3. What is the study of moral questions?
4. Does this help solve the problem between determining whether the function of a
computer is for the good or not?
5. What is PACS?
95
The Handbook of Information and Computer Ethics Chapter 4
Quote:
We begin by sketching the key features ofValue Sensitive Design and then describe
its integrative tripartite methodology, which involves conceptual, empirical, and technical
investigations, employed iteratively. Then we explicate Value Sensitive Design
by drawing on three case studies. One involves cookies and informed consent in web
browsers; the second involves HDTV display technology in an office environment;
and the third involves user interactions and interface for an integrated land use,
transportation, and environmental simulation. We conclude with direct and practical
suggestions for how to engage in Value Sensitive Design.
Review:
The chapter talks about ways how you can use information technology with the
approach of values. This chapter shows that we can do our work in a value added work.
In every action we do we must remember our ethics.
96
Integrative questions:
97
The Handbook of Information and Computer Ethics Chapter 5
Quote:
It is important to note that compensation is typically built into the proviso and the
overall account of bettering and worsening. An individual’s appropriation may
actually benefit others and the benefit may serve to cancel the worsening that occurs
from restricted use. Moreover, compensation can occur at both the level of the act and
at the level of the institution.
Review:
98
Integrative Questions:
99
The Handbook of Information and Computer Ethics Chapter 6
Quote:
Thus far, we have examined some ways that RALC improves upon the control and
restricted access theories of informational privacy by incorporating key elements of
both theories. We have also seen how RALC can respond to two kinds of potential
objections from critics.However,muchmore needs to be said aboutRALCand the role
it plays in protecting privacy.We revisit the RALC theory in Section 6.5.3, where we
examine some proposals for framing comprehensive policies that protect informational
privacy.
Review:
This chapter talks about privacy. A person is eligible to have privacy whenever he
wants to have it. It could be with his work or his life. When a person is not in public he is
in private mode. Actually privacy may also tackle information about that person.
100
Integrative Questions:
101
The Handbook of Information and Computer Ethics Chapter 7
Quote:
Review:
The chapter talks about the anonymity of a person, in which his real identity is
hidden. The technology nowadays could really help a lot of people. But cybercrime is
also up and we need to be careful with the anonymous person we see online.
What I learned:
102
Integrative Questions:
1. What is anonymity?
2. Explain the concept of anonymity?
3. Explain identity theft?
4. What are the purpose and ethics of anonymity?
5. What is attribution bias?
103
The Handbook of Information and Computer Ethics Chapter 8
Quote:
One of the key issues in evaluating whether an act of hacktivism is morally justified
is the extent to which the act harms the interests of innocent third parties. In thinking
about this issue, it is important to reiterate that the context being assumed here is a
morally legitimate democratic systemthat protects the right of free expression and thus
affords persons a variety of avenues for expressing their views that do not impact the
interests of innocent third parties.
Review:
Well the pirates, spammer, bad hackers are the unethical persons in this chapters.
They are people who are abusing information technology. The world wide web would be
better if these type of people would not exist. These people should be taught of proper
ethics.
104
Integrative questions:
105
The Handbook of Information and Computer Ethics Chapter 9
Quote:
At the center of the librarian.s commitment to humanity.s search for truth and
understanding is the goal of remaining always neutral in the battle of competing ideas.
No matter how precious to us any faith or philosophy or social movement might be, we
have to keep our distance and maintain our impartiality as we help to insure that all the
people can hear all the arguments and establish for themselves what is right or true.’
Review:
The chapter is about how librarian face proper ethic. These people are
overwhelmed with information ethics. They have power of knowing a person by viewing
their records.
106
Integrative Questions:
107
The Handbook of Information and Computer Ethics chapter 10
Quote:
The social pressure in the open source community to avoid code forking provides
incentives for project leaders to ensure that the code is the best it can be. On the
contrary, when an open source developer believes there is too much risk associated
with a particular piece of code, he/she can rewrite it and release it. Although there is a
reputation risk in doing so, there is the opportunity to publicly demonstrate that the
forked product is superior
I want learn about ethical interest in free and open source software.
Review:
This chapter talks about free and open source softwares. The free softwares are
the ones maybe the trials or really free the other one is open source which you can
modify or create. Nonetheless this are free. Yes free so get ready grab a bite!
108
♦ The Ethical Responsibilities of Software Developers
♦ Open Source and Accountability
♦ IS OSS A PUBLIC GOOD?
Integrative Question:
109
The Handbook of Information and Computer Ethics Chapter 11
Chapter: Internet Research Ethics: The Field and Its Critical Issues
Quote:
Review:
Information technology is growing fast. Before I used to borrow books from the
library when I was a kid or research hard, when I got to highschool books were no longer
superior. The world wide web dominated. Till now its dominating more. It is improving
to make our life easier.
110
♦ METHODOLOGIES AND ETHICS
♦ Participant Observation and Discourse Analysis
Integrative questions:
111
The Handbook of Information and Computer Ethics Chapter 12
Quote:
To ask if a computer diagnosis increases (or decreases) the risk of diagnostic or other
error is in part to ask whether it will improve patient care. If the answer is that, on
balance,
the tool increases (the risk of) diagnostic error, then we should say it would be unethical
to use it. Significantly, though, what is sought here is an empirical finding or a reasoned
judgment—where such a finding is often lacking or even methodologically hard to come
by; or where such a judgment is based on inadequate epistemic support, at least
according to standards otherwise demanded to justify clinical decisions. . . This means
that we are pressed to answer an ethical question (Is it acceptable to use a decision
support system?) in a context of scientific uncertainty (How accurate is the system?).
Many challenges in contemporary bioethics share this feature, namely, that moral
uncertainty parallels scientific or clinical ignorance. (Goodman, 2007, p. 129).
Review:
The chapter talks about how the information technology is doing, updating
improving getting better. We are lucky that we are the batch that are trying new things
out with technology. I know in the future it would be way better. But we should always
remember to put values in what we are doing.
112
Integrative Questions:
113
The Handbook of Information and Computer Ethics Chapter 13
Quote:
Ethical issues enter the debate when the justifications of a possible right to be left
alone (Britz, 1999; Velasquez, 1998) are discussed. In principle, these can be divided
into two streams of debate: one that is concerned with data about customers, the other
which deals with privacy of employees. Companies usually have more power over
their employees than their customers. The arguments in defense of employee privacy
are therefore based on stronger ethical concerns. Within the debate about employee
privacy, one can distinguish three groups of reasons for its support. They deal primarily
with the individual person, with society, and with economic considerations.
Review:
Business ethics is tackled in this chapter. It is shoed how business woks with
ethics, how you need ethics in business. You would need privacy in running a business
you would need to make you customers details private.
114
♦ THE MACROLEVEL INFLUENCE OF BUSINESS ON ETHICS
AND INFORMATION
♦ Globalization
♦ Digital Divides
♦ The Ethical Response to Globalization and Digital Divides
Integrative Questions:
1. What is globalization?
2. what is digital divides?
3. define business ethics?
4. what is shared norms and values?
5. define the business value of information?
115
The Handbook of Information and Computer Ethics chapter 14
Quotes:
Many problems regarding reliability of online information on the Internet are not
problems of information lacking reliability, but of receivers misperceiving or not
perceiving (un-) reliability. In order to pave thewayto discussing this issue, I will, first,
givesome attention to the dimensions of functionality and significance of information.
These dimensions introduce the users perspective.
Review:
The chapter talks about responsibilities for information on the internet, right? But
are these responsibilities being done? A lot of people are abusing information in the
internet. They use it to destroy and harm other people. They use it to gain money illegally
from other people. They make information over the internet unsafe.
♦ CONDITIONS OF RESPONSIBILITY
♦ ISPs AND CLEARLY HARMFUL OR OFFENSIVE
INFORMATION
♦ INFORMATION IN GENERAL
♦ THE RESPONSIBILITIES INVOLVED
♦ (1) The creation of new credibility-conferring systems, such as
certification systems, allowing us to use pedigree criteria with regard
to (online) information, when such systems are lacking.
♦ (2) Raising the visibility of indicators or markers of reliability of
information
♦ (according to pedigree criteria).
♦ (3) Raising expertise and background knowledge in all users (to enable
them to recognize reliability on the basis of pedigree criteria).
♦ (4) Raising the awareness of the varying qualities of information.
116
Integrative Questions:
1. What is ISP?
2. Define conditions of responsibility?
3. What is information in general?
4. What are the responsible involved?
5. explain raising awareness of varying qualities.
117
The Handbook of Information and Computer Ethics Chapter 15
Quote:
Virtual reality and computer simulation will continue to present newchallenges for
ethics because newand more advanced applications are still being developed and their
use is more and more widespread. Moreover, as has been argued, virtual environments
can mimic manyof the properties of real life and, therefore, contain manyof the ethical
dilemmas found in real life. It is for this reason that they will continue to present
new ethical challenges not only for professional developers and users but also for
society at large.
Review:
The chapter discuses the history of virtual reality. It is actually one of the
successful machines invented. You would get a 3d look or a view. Its one of the pioneers
of information. Nowadays technology improved changing fast to a better technology.
118
♦ Avatars, Agency, and Identity
♦ Behavior in Single-User VR
♦ Behavior in Multiuser VR
♦ Virtual Property and Virtual Economies
♦ THE ETHICS OF COMPUTER GAMES
♦ The Goods and Ills of Computer Games
♦ Computer Games and Values
♦ Computer Games and Gender
♦ VIRTUAL REALITY, SIMULATION, AND PROFESSIONAL
ETHICS
Integrative Questions:
119
The Handbook of Information and Computer Ethics Chapter 16
Quote:
But it was not until 1977 that robust and generally applicable sequencing methods
were developed, and even then the modern bioinformatics techniques of gene
discovery was still years away. Although the development of information/processing
by computers proceeded contemporaneously with progress in research into biological
and biochemical information processing, the trajectories of these two initiatives were
never unified even if they sometimes overlapped at various points.
Review:
The way I understood this chapter is information grows thru its history. It would
continue to grow nonstop. Just like a DNA structure, information has its structure as well.
And the structure of information cannot be altered unless it improves to a new
technology.
120
Integrative Questions:
121
The Handbook of Information and Computer Ethics Chapter 17
Quote:
All Members shall refrain in their international relations from the threat or use of force
against the territorial integrity or political independence of any state, or in any other
manner inconsistent with the Purposes of the United Nations
Review:
The chapter discusses how cyber conflict could happen. How it would go if a
misunderstanding happens. As we all know most of the war weapons now are being
operated via computers. Technology really boomed after world war II, I mean technology
for self defense.
122
Integrative Questions:
1. What is severity?
2. what is directness?
3. what is measurability?
4. what is responsibility?
5. When Does a Cyber Attack Constitute the Use of Force?
123
The Handbook of Information and Computer Ethics chapter 18
Quote:
This quantitative approach is utilitarian. The risks that are addressed are those with
the highest risk exposure. All consequences are given dollar values. Even qualitative
risks are turned into a numerical hierarchy (McFarland, 1990). The resulting risk of the
September 11 disaster was calculated in terms of the number of deaths that occurred on
that day or lifetime dollar earnings potential of those who died.
Review:
The chapter talks about how person should decide. His faith is on the line. His
future. Everything for technology is on the line.
124
♦ THE SODIS AND UK ELECTRONIC VOTING REQUIREMENTS
♦ Lessons Learned from the UK Election
♦ Research Insights from UK e-Voting Analysis
♦ Insights Related to Practice from UK e-Voting Analysis
♦ RESEARCH PROJECT
Integrative Questions:
125
The Handbook of Information and Computer Ethics Chapter 19
Quote:
Is there anything wrong as such with individual countries regulating the content of
the Internet in their country? Content includes things such as libelous material,
material protected by intellectual property laws or privacy laws, cultural material
(should there be free trade in cultural objects?), political material, and pornographic
material. We will consider some problems with this later.
Review:
The internet as of now is not being govern properly. A lot of people are abusing it.
No one can own it. But a lot of people act like they own it. There should be laws
implemented on how the internet should work
♦ CONTENT REGULATION
♦ EFFECTIVE REGULATION
♦ REGULATION: TECHNICAL ISSUES
♦ THE CURRENT SITUATION
♦ ACROSS BORDERS
♦ INTERNET REGULATION: NORMATIVE ISSUES
♦ CENSORSHIP
♦ REGULATION OF THE INTERNET: MORAL ARGUMENTS
♦ OTHER ARGUMENTS
♦ REGULATION AND EFFICIENCY
♦ REGULATION ACROSS LEGAL JURISDICTIONS
♦ CONCLUSION
126
Integrative Questions
1. What is conclusion?
2. define regulation and efficiency?
3. What is censorship?
4. Define across the border?
5. what is an effective regulation?
127
The Handbook of Information and Computer Ethics Chapter 20
Quote:
Much of this linguistic transparency seems to have come from the meaning of the
word “overload,” and its root word “load.” The Oxford English Dictionary defines
“load” as “That which is laid upon a person, beast, or vehicle to be carried; a burden.
Also, the amount which usually is or can be carried; e.g., cart-load, horse-load,
wagon-load,” and it defines “overload” as “An excessive load or burden; too great a
load; the condition of being overloaded.” These core meanings speak to the recognition
that a person or an animal (or by extension, a device such as a cart or wagon) is
capable of carrying physical materials and second, that this capacity is finite and can
be exceeded.
Review:
128
Integrative Questions:
1. What is information?
2. What is information overload?
3. Define perception?
4. define reality?
5. what is a conclusion?
129
The Handbook of Information and Computer Ethics Chapter 21
Quote:
The struggle against unwanted emails will continue. Ethical analysis can be
useful in analyzing emerging strategies of email senders and email recipients. In
these analyses, ethicists must be careful to look at individual stakeholders as well
as systematic stakeholders; both micro- and macroissues are important. All such
analyses should start with a clear exposition of the characteristics of the emails that
will be considered “spam.” Only then can we discuss with precision the ethics of
spam.
Review
Since we are at information age, the smarter the spammers are these days, they
know how to attack you, insurance, car load and other explicit things. Its really annoying
at one point you want to destroy your email. But the spam folder sometimes misses the
spam? What to do? Pray that they would pass a law banning email spam.
130
♦ COMBINATIONS OF CHARACTERISTICS
♦ DeceptiveEmailsMeant to Defraud AreCondemned, SpamorNot
♦ Emails Between Well-Meaning Friends Are Probably Not Spam
♦ Unsolicited Commercial Bulk Emails (UCBE)
♦ THE ETHICS OF ANTISPAM MEASURES
♦ The Ethics of Doing Nothing
Integrative Questions
1. what is spam?
2. why are they spamming you and me?
3. What is the intent of the sender?
4. give a possible content of a spam email
5. Is it illegal to spam?
131
The Handbook of Information and Computer Ethics chapter 22
Quote:
Review
Plagiarism is really bad in this time of the information age. A lot of people tend to
steal ideas of other people. We can borrow their ideas its for free we just have to give
them credit and cite them. Respect for their work in short.
132
Integrative Questions:
1. What is plagiarism?
2. Is it legal to plagiarize?
3. I would not get caught if I plagiarize?
4. Define the concept of plagiarism?
5. What is literature review?
133
The Handbook of Information and Computer Ethics Chapter 23
Chapter: Intellectual Property: Legal and Moral Challenges of Online File Sharing
Quote:
. . all the goods of the Information Age—all of the expressions once contained in books
or film strips or newsletters—will exist as thought or something very much like thought:
voltage conditions darting around the Net at the speed of light, in conditions that one
might behold in effect, as glowing pixels or transmitted sounds, but never touch or claim
to “own” in the old sense of the word.
Review:
I would admit I am into file sharing, but I have to say I never gained profit from
file sharing. What I do is for personal use only for example music from peer 2 peer
clients. Its not illegal if you don’t gain profit from it.
What I learned:
PEER-TO-PEER NETWORKS
SHARING OR THEFT?
SECONDARY LIABILITY
MGM V. GROKSTER: A BRIEF HISTORY
MORAL CONSIDERATIONS
134
Integrative Questions:
1. What is p2p?
2. Is sharing legal?
3. Is in helpful?
4. Give the history of P2p
5. Give an example of a p2p program
135
The Handbook of Information and Computer Ethics Chapter 24
Quote:
Review:
The chapter discusses the censorship. They are blocking or not allowing access.
This may happen to certain sites if you use a proxy setting in a workplace, school or a
restricted area.
136
Integrative Questions:
1. What is censorship?
2. Define censorship?
3. Give the types of harms?
4. Is it harmful?
5. what is censorship for?
137
The Handbook of Information and Computer Ethics Chapter25
Quote:
Review:
The chapter discussed that no matter what gender you are you are supposed to be
equal with the other person. Everybody has the same rights, male female or of the third
kind. Its ethical to give respect. We should know how to blend with people. After all they
are also human.
FEMINIST ETHICS
GENDER AND COMPUTER ETHICS—A MALE–FEMALE BINARY?
GENDER AND COMPUTER ETHICS STUDIES
Student Population
Quantitative Versus Qualitative Research Methodologies
What is Ethical Behavior?
The Undertheorizing of Gender and Ethics
WOMEN IN COMPUTING—AN ALTERNATIVE APPROACH
138
Integrative Questions:
139
The Handbook of Information and Computer Ethics Chapter 26
Quote:
Review:
140
Integrative Questions:
141
The Handbook of Information and Computer Ethics Chapter 27
Quote:
What I learned:
142
Integrative Question:
143
The Fortune at the Bottom of the Pyramid Chapter 1
Quote:
Review:
It is quite shocking that the bottom of the pyramid spends a lot more money that
the people at the top. The bottom pyramid has been monopolized and those people
capitalized on their weaknesses. For me if you should target the ghetto market you should
make a reasonable price, I noticed they paid more which is not fair for them.
‘poverty penalty’
Density of urban settlements
The challenge lies in making
aspirational products affordable.
they are rapidly exploiting the benefits of information networks.
Creating the capacity to consume
•Needs to be accessed differently
Small unit packs, single-serve
Innovative purchase schemes (credit)
3 simple principles:
– Affordability
– Access
– Availability
144
Integrative Question:
145
The Fortune at the Bottom of the Pyramid Chapter 2
Quote:
I expect to learn different innovative products and services at the bottom of the
pyramid.
Review:
It is discussed here that if you were to start a business you should know which
area you should target. You should find your target market by determining what they
want and need. You can determine it by asking canvassing and surveying. Try to
place it in a reasonable price, not to high not to low. I would use that motive if I were
to start my own business
1. Price performance
2. Innovation: hybrids
3. Scale of operations
4. Sustainable development: eco-friendly
5. Identifying functionality: is it different?
6. Process innovations
7. Deskilling of work
8. Education of customers
9. Designing for hostile infrastructure
10.Interfaces
11. Distribution: accessing the customer
12.Challenging conventional wisdom
146
Integrative Question:
147
The Fortune at the Bottom of the Pyramid Chapter 3
Quote:
We have grown literally afraid to be poor. We despise anyone who elects to be poor
in order to simplify and save his inner life. If he does not join the general scramble
and pant with the money-making street, we deem him spiritless and lacking in
ambition. ~William James
Review:
This chapters thinking is they would target an opportunity to capitalize on it. Its
like a change why would you let go if it is already. You have to target what people
want and need. A lot of people would not go for the expensive product, but I gurantee
you they would go for the replica.
148
Integrative Questions:
1. What is bop?
2. Define innovation?
3. define cost of managing?
4. What is local growth opputunities
5. what is local innovation?
149
The Fortune at the Bottom of the Pyramid Chapter 4
Quote:
The poverty of our century is unlike that of any other. It is not, as poverty was before,
the result of natural scarcity, but of a set of priorities imposed upon the rest of the world
by the rich. Consequently, the modern poor are not pitied...but written off as trash. The
twentieth-century consumer economy has produced the first culture for which a beggar is
a reminder of nothing. ~John Berger
I expect to learn about the safety of the ecosystem for wealth creaton.
Review:
This chapter tells that companies are not friendly with the environment. These
company gain big money but what happens to the nature? Nothing the nature is just
destroyed while they are sitting home gaining money and enjoying themselves. Some sell
low quality product. They should satisfy the customer with cleanliness.
The ecosystem
The ecosystem for wealth creation
Organization of the group
Learning the sanctity of contracts
Reducing inequalities in contracts
150
Integrative questions;
151
The Fortune at the Bottom of the Pyramid chapter 5
Quote:
However mean your life is, meet it and live it: do not shun it and call it hard names.
Cultivate poverty like a garden herb, like sage. Do not trouble yourself much to get new
things, whether clothes or friends. Things do not change, we change. Sell your clothes
and keep your thoughts
Review:
The corruption scheme it never goes away. This chapter explains why corruption
should be terminated in order to make the government more trustable. We know that
poverty starts from corruption if we prevent it we may have a better future.
TGC
The Andhra Pradesh e-Governance Story
Building TGC
Corruption and e-governance
principles of the CGG in Andhra Pradesh
152
Integrative Question
1. What is corruption?
2. what is Andhra Pradesh?
3. what is e-governance?
4. what is TGC
5. what is e-governance story
153
The Fortune at the Bottom of the Pyramid chapter 7
Quote:
Review;
The chapter discusses the development of the BOP. If you start the business you
would have to target the lower part of the crowd. You should get close to the crowd and
you should get to know the people on the bottom. You must have balance between the
pyramid, but target the poor area but you have to give a reasonable price.
154
Integrative Question;
155