You are on page 1of 155

My INFORMATION

TECHOLOGY
ETHIC’s Book

Are You Moral Enough?

This work is licensed under a Creative Commons Attribution-


Noncommercial-share alike 3.0 Philippines license.
DEDICATION

THE BOOK IS
DEDICATED TO
MYSELF FOR ONCE I
AM NOT LAZY AND TO
MY PARENTS FAMILY
AND FRIENDS

Truly yours the one the only


fuldeep brar

2
PREFACE

Ethics was taught to us in class.


I enjoyed learning it.
Trough the good times.

I would like to thank san Miguel brewery for


making the best beer in the country

3
Cyber Ethics Chapter 1

Chapter: Ethics and the Information Revolution

“Be unselfish. That is the first and final commandment for those
Who would be useful and happy in their usefulness.
If you think of yourself only, you cannot develop
Because you are choking
The source of development, which is spiritual
Expansion through thought for others.”
- Charles William Eliot

What I expect to learn:

I expect to learn things that would help me understand and get the mature thinking
about the revolution of ethics and information technology.

Meaning of the quote:

I selected this quote because the quote is perfect match for the information
revolution. Being selfish would not help anyone. We need to learn how to be unselfish.
We should learn how to appreciate other people as well.

Review:

The Information technology grew. It was a big boom not only today, but also in
the future. Every person wants to be in the trend of the new technology. The trend in
which every person would or is benefiting. Information Technology grows not only a tiny
step day by day. But it takes a giant step forward and it progresses in to more powerful
technology. It’s like foreseeing the future. We create and upgrade everything. There is a
sad part though. People tend to become more greedy this days. As technology grows evil
grows with it. People abuse information technology they create such things as viruses and
spywares that infect other computers that they steal or destroy the other computer. People
need to have the proper state of mind or the proper morality within one self’s. We need to
put the bad side away. We need to improve the ethical attitude of people supporting this
growth.

4
What I learned:

♦ How the information boomed and evolved.


♦ Information technology with values
♦ Information technology of past present and future
♦ What good and bad can happen with information technology.
♦ Being true to oneself eliminates being uneducated with ethics.

Integrative Questions:
1. Why does information rapidly grow?
2. Would this growth stop?
3. What are the four parts of global information ethics?
4. Why are people creating viruses and spywares?
5. Why shouldn’t be software owner ship be allowed according to people like Richard
Stallman?

5
Cyber Ethics Chapter 2

Chapter: Ethics On-Line

Quote:

“The release of atom power has changed everything


Except our way of thinking.
The solution to this problem lies in the heart of mankind.
If only I had known, I should have become a watchmaker.”
- Albert Einstein

What I expect to learn:

I expect to learn and know what the right and wrong decisions are when
information technology is dissected with ethics.

Meaning of the Quote:

The quotes explains that everything we should do is for the good of mankind. We
should change the way we think. We should be smart enough to know what is helpful to
the world and which is not.

Review:

The chapter discusses the difference between the law, information, and
communication. People can tend to be ethical by following the law. But are we sure that
following that law is ethical? In some cases the law can be determined as a bad part of
morality. Some laws are bad. It depends on how ethics is implemented and it depends on
the culture. The information we get nowadays are so broad. Everywhere you go you
would have a great chance of getting that specific info you would need. Library these
days are things of the past, with the world wide web and cyber world. The information
grows and improves. Before I remember when I was a kid if you need to research you
would have to go to the library, these days open up Mozilla and you would have all the
things you would need in the browser. But what I also noticed people doing those things
are forgetting something. They are forgetting to give credit to the people who did the
work. There forget to give the reference and citation to the author. Same with the
software’s that is being created now. He licensed software’s are being pirated and being
sold by the people of the ghetto market. Like I said information is needed by people
everyday and every moment in order to survive this time in our world.

6
Things that I have learned:

♦ Technology is everywhere.
♦ The three characteristics of communication in networks.

Integrative Questions:

1. What is Variety and what is Consent, what are its differences.


2. What can be beneficial in certain contexts?
3. What is diminished trust?
4. What are the three problems of anonymity?
5. Can Information be reproduced without a loss of value? Explain

7
Cyber Ethics Chapter 3

Chapter: Reason, Relativity, and Responsibility in Computer Ethics

Quote:
“Injustice, poverty, slavery, ignorance –
these may be cured by reform or revolution.
But men do not live only by
fighting evils. They live by positive goals,
individual and collective, a vast variety of them,
seldom predictable, at times incompatible.”
– Isaiah Berlin

What I expect to learn:

What does Reason and Relativity have to with responsibility in Computer Ethics.

Meaning of the Quote:

The quote explains that Being selfish and doing injustice actions are things we
should avoid in order to have a better life. Men should act like real men, God created us
not to fight not to be selfish. He created us to be a better person knowing united we can
be a better human beings.

Review:

Revolution and evolution sounds so near but yet the meaning so far. These two
words are basically on the opposite side but the meaning may have the same direction or
point. A revolution wants a new beginning. An evolution wants to upgrade into
something new. Information technology is evolving and revolutionizing faster than the
speed of light. We Should know the right things. We should know what the wrongs thing
is and what the right thing is while we are growing. We should set aside the bad deeds in
order for us to win this. We should always be honest. Being greedy nor being selfish
would not help a person. It is better to be a kind hearted and know the good things. Than
being someone elite who is doing something below the table.

8
Things that I have learned:

♦ Information revolution and evolution


♦ Core Values
♦ Responsibility in computer ethics.
♦ Cultural relativism

Integrative Question:

1. What are the possible policies for a website?


2. What are the core values of Computer ethics?
3. Do computer scientists have disagreements?
4. Enumerate responsibilities in computer ethics
5. Respecting the core values of everyone would give standard?

9
Cyber Ethics Chapter 4

Chapter: Disclosive Computer Ethics

Quote:
“A man is ethical only when life, as such,
is sacred to him, that of plants and animals as
that of his fellow men, and when he devotes
himself helpfully to all life that
is in need of help.”
-Albert Schweitzer

What I expect to learn:

Being able to learn ethical principles in which we can use as a professional in the
industry.

Meaning of the quote:

A man should not be selfish. He should learn how to be a person who is willing to
do good things for others. A man’s life is not about himself. It is about ethical things that
happened in his life.

Review:

The chapter is basically about computer ethics. It says the technology should
grow with moral ethics. People would learn to follow policies if they are not only
implemented properly but also if they are given a proper introduction. We need to have
another approach in which ethics would be given a better understanding.

Things that I have learned:

♦ Justice
♦ Autonomy
♦ Democracy
♦ Privacy
♦ Computer ethics
♦ Morality

10
Integrative Questions:

1. How is democracy defined in the book?


2. Are the limitations of computer ethics justifiable?
3. Give and explain one hidden morality
4. Give the four key values
5. What is disclosive computer ethics?

11
Cyber Ethics Chapter 5

Chapter: Gender and Computer Ethics

Quote:

“Of liberty I would say that, in the whole plenitude


of its extent, it is unobstructed action according to
our will. But rightful liberty is unobstructed action
according to our will within limits drawn around us
by the equal rights of others. I do not add
'within the limits of the law,'
because law is often but the tyrant's will,
and always so when it violates the right of an
individual.”

- Thomas Jefferson

What I expect to learn:

I expect to learn if nowadays discrimination of gender is still in the public and is it


in the information technology sector?

Meaning of the Quote:

The quote explains that every person has his right to be equal. Every person is the
same as any other individual.

Review:

The chapter tells how gender discrimination still occurs in the information
technology department. It is hard to say what I am about to say because I am a man.
Many men think that women are only good for household work. For me I agree but, if
you make a man work with a woman, the work would be way much better. Women are
not only good at household work but actual work also. We need to learn how to be fair.
Its unethical to discriminate gender.

What I have learned:

♦ Barriers and pipelines in computer ethics


♦ Men and women’s moral decision making
♦ Ethical decisions versus ethical process
♦ Lack of theory
♦ Two strands of gender

12
Integrative Questions:

1. What are the two strands of gender and computer ethics?


2. Why do we need to begin exploring the alternative ethics that feminism can offer
computer ethics?
3. How student population does affect computer ethics?
4. In what two areas do computer ethics have gender implications?
5. What is liberalisms connection in gender issues?

13
Cyber Ethics Chapter 6

Chapter: Is the Global Information Infrastructure a Democratic Technology?

Quote:

“We have, in fact, two kinds of morality side


by side: one which we preach but do not
practice, and another which we practice
but seldom preach.”

- Bertrand Russell

What I expect to learn:

I expect to learn things about Global information infrastructure.

Definition of the quote:

The quote states that a person has two sides. One side is his pride in which he
boasts about which he is so proud. The other side is the side in which when he makes
mistakes it is hidden.

Review:

Values play an important role in information technology. Values are the standards
we follow in everyday life we need to adopt the right values. This is being passed on
from one generation to another generation. We have to know what would be right and
what would be wrong in such actions we do.

What I have learned:

♦ Information technology values


♦ Power to many
♦ Joint deliberation
♦ Democracy in information technology
♦ Values embedded in information technology

14
Integrative Questions:

1. What is the idea of joint deliberation?


2. Give the values that are embedded in the global information infrastructure
3. Define embedded values
4. Explain Power to the many
5. Explain how technology and values are alike.

15
Cyber Ethics Chapter 7

Chapter: Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key
Problems and Challenges

Quote:

“When we honestly ask ourselves which person in


our lives means the most us, we often find that it
is those who, instead of giving much advice,
solutions, or cures, have chosen rather to share
our pain and touch our wounds with a gentle
and tender hand. The friend who can be silent with
us in a moment of despair or confusion, who can
stay with us in an hour of grief and bereavement,
who can tolerate not knowing, not curing, not
healing and face with us the reality of our
powerlessness, that is a friend who cares.”

- Henri Nouwen

What I expect to learn:

I expect to learn how to apply ethics and moralities in information technology


problems.

Definition of the quote:

The quote states that things we do is not for ourselves, things we do is for all the
people we love. There would be no one alone in the world. We have a friend who would
be there when we need him or her.

Review:

We need to apply our lives with ethical thinking. Sometimes we don’t know or we
are just ignorant in doing something wrong. In the software industry sharing is ok as long
as the software maker allows it, but what if it is not. Here come the pirates who sales the
software’s in the black market in order for them to gain money, what happens to the
original maker of the software bankrupt. Profit shares would not go back to them. We
need to learn how to stop if we already have enough. People need to work together in
order for us to have a better information technology life.

16
What I have learned:

♦ Ethics in information technology


♦ Connecting ethics and social contexts
♦ Computer ethics and role of experts
♦ Demarcation of computer ethics

Integrative Questions:

1. Define the role of experts


2. What are the reasons to distinguish ethics?
3. What does demarcation of computer ethics mean?
4. What is the resemblance of ethics and social texts?
5. What are the 3 conditions in order to apply ethical and moral concept in
information technology?

17
Cyber Ethics Chapter 8

Chapter: Just Consequentialism and Computing

Quote:

“Justice is itself the great standing policy


of civil society; and any eminent
departure from it, under any circumstances,
lies under the suspicion of being no
policy at all.”

- Edmund Burke

What I expect to learn:

I expect to learn how an individual can act as a man wit ethical thinking in the
information technology world.

Definition of the quote;

The quote says that we cannot change ourselves to a better person if we would not
follow rules regulations that we imply. We need to follow the policies we create in order
for us to be a well organized person.

Review:

I learned that we should be able to nurture the experience we get for us to


determine what concepts or ideas are within our natural state of mind. We should know
the difference of how to do good things and how bad things work. One word RESPECT.
The word respect is perfect for this chapter if we don’t show respect as an information
technology personnel we would not know how to treat a person right with morality and
ethics.

What I have learned:

♦ Consequentialism constrained by justice


♦ The good as the enemy of the just
♦ Computing in uncharted waters

18
Integrative Questions:

1. Define consequentialism?
2. What are the combined notions of human life?
3. What is computing in uncharted waters?
4. If the ends don’t justify the means what would?
5. Define consequentialism constrained justice?

19
Cyber Ethics Chapter 9

Chapter: The Internet as Public Space: Concepts, Issues, and Implications in Public
Policy

Quote:

“To be successful you have to be selfish,


or else you never achieve. And once you
get to your highest level, then you
have to be unselfish. Stay reachable.
Stay in touch. Don't isolate.”

- Michael Jordan

What I expect to learn:

I expect to learn how the internet became a public place.

Definition of the quote:

The quote states that in every action we do we have an intention of doing it for
ourselves only. But once we have done it we should learn not to raise our heads high, we
need to learn how to be humble. If you become rich, learn how to reach out to the poor
people.

Review:

Nobody ones the internet but everyone has his rights over it. The internet is made
for the public, made for everyone in short. The internet not only removes communication
gaps between people but it helps us to learn and understand certain things we need or
want to gain knowledge about. We should always remember that we need to make the
internet a better place for everyone, people who makes the viruses and spywares are
selfish people who wants to destroy the happy community of the internet. Where ethics in
their minds? They don’t have values.

What I have learned:

♦ The internet is a big world


♦ Implications in public policy
♦ Uses of internet as a public space
♦ Digital characteristics of a public space.

20
Integrative Question:

1. What are the digital characteristics of a public space?


2. What are the establishments that use internet as a public space?
3. Discuss implications in the public policy
4. Define the impact on social well being
5. Is the internet a public space?

21
Cyber Ethics Chapter 10

Chapter: The Laws of Cyberspace

Quote:

“The sole end for which mankind are warranted,


individually or collectively, in interfering with
the liberty of action of any of their number,
is self-protection. That the only purpose
for which power can be rightfully exercised
over any member of a civilised community, against his will,
is to prevent harm to others. His own good, either
physical or moral, is not sufficient warrant. He cannot rightfully
be compelled to do or forbear because it will be better for him
to do so, because it will make him happier, because, in the
opinion of others, to do so would be wise, or even right...
The only part of the conduct of anyone,
for which he is amenable to society, is that which
concerns others. In the part which merely concerns
himself, his independence is, of right, absolute.
Over himself, over his own body and mind,
the individual is sovereign.”

What I expect to learn:

To more about cyberspace and the laws implemented in it,

Definition of the quote:

The quote states that everyone, who ever you are wherever you are you have
freedom. You gain it with what actions you do.

Review:

People are starting to disobey rules. One good example is rules implemented in
the cyberspace and in the information technology world. People tend not to follow these
rules because they want to be something other people can not be. People these days are
full of pride in which they grow their heads. I know rules are to be followed, I would be
honest most of the times I don’t follow them, but after realizing that rules are made to
make our world a better place. Not only for me but for everyone also. For us.

22
What I have learned:

♦ The laws on cyberspace


♦ Following the law

Integrative Questions

1. What are the laws of cyberspace?


2. What does cyberspace law play an important factor?
3. Define cyberspace
4. Do we need to follow the cyberspace rules?
5. How does one follow the rules?

23
Cyber Ethics Chapter 11

Chapter: Of Black Holes and Decentralized Law-Making in Cyberspace

Quote:

“Like almost everyone who uses e-mail,


I receive a ton of spam every day.
Much of it offers to help me get out
of debt or get rich quick. It would
be funny if it weren't so exciting.”

- Bill Gates

What I expect to learn:

I expect to learn and understand the concept of black holes in the cyberspace

Definition of the quote:

The quotes says that everyone is affected by spam and everyone is not safe from
it.

Review:

Why do people spam? People do this in order for them to gain profit. Actually for
me it is already forcing. They forcing people to do this do that blah blah. They are
dictating the lives of people. They shouldn’t be doing dat. They have no moral dignity.
They just endanger people more. What they do is not true or in short fake. Do you think it
is right? Hell no right. People need to stop doing this bad act. As an Information
technology student I know things or methods to ignore this spam. To bad some people are
confused and they get lured to the spam messages they waste money waste time because
of the spam message. This act has to stop.

What I have learned:

♦ The Debate
♦ The Question
♦ The Explanation
♦ The Incident

24
Integrative Questions:

1. What is the incident?


2. What is the explanation?
3. What is the question?
4. What is the debate?
5. Define order and disorder in social systems

25
Cyber Ethics Chapter 12

Chapter: Fahrenheit 451.2: Is Cyberspace Burning?

Quote:

“I used to think that cyberspace was


fifty years away. What I thought
was fifty years away, was only ten
years away. And what I thought was
ten years away... it was already here.
I just wasn't aware of it yet.”

- Bruce Sterling

What I expect to learn:

I expect to learn and adopt the speed of cyberspace

Definition of the quote:

Cyberspace is growing everyday. Technology matures fast. You sleep tonight


with your beloved technology, you wake up tomorrow with a new technology.

Review:

The Cyberspace is burning. Burning because of how fast it improves day in night
out. We think the good technology is the only technology improving in the cyberspace,
but we are wrong. Bad people have gained power and knowledge about this. The half of
the cyberspace is in bad hands. People should learn how to be smart in operating the
cyberspace. I would tell you its becoming nasty, yes nasty because of the scams being
created on it.

What I have learned:

♦ Cyberspace growth
♦ Rethinking the rush to rate
♦ Free speech online
♦ Third party rating as the answer

26
Integrative Questions:

1. Is the cyberspace really burning?


2. Define third party rating
3. What are the six reasons why self rating schemes in the internet is wrong?
4. What is rush to rate?
5. Define free speech online

27
Cyber Ethics Chapter 13

Chapter: Filtering the Internet in the USA: Free Speech Denied?

Quote:

“Raise a million filters and the rain


will not be clean, until the longing
for it be refined in deep confession.
And still we hear, If only this
nation had a soul, or, Let us
change the way we trade,
or, Let us be proud of our region.”

- Leonardo Cohen

What I expect to learn:

What does freedom of speech have to do with filtering.

Definition of the quote:

A person would not change no matter what happens unless he really changes.
Same with a nation, if the people living on that nation have a certain attitude it would be
hard to change the attitude of that nation. It is already carved within them it is already
what they call their trade mark.

Review:

People nowadays are bothered by pop-ups, spam and other unwanted things in the
internet like viruses and spy wares. We are invaded by bad people. People who have
selfish desires in which they want to gain the upper hand in life. We need to filter this.
Even if such things are filtered those bad people still find a way to crack the filter. We
should have a law passed that this people should be sent to jail. Its impossible not to find
this people with the technology we have tracking their IP address is one of the solution in
order to catch these filthy people.

What I learned:

♦ Problems with blocking and filtering programs


♦ Mainstream Loudoun
♦ Why filter

28
Integrative questions:

1. Define filtering?
2. How does filtering work?
3. What are the problems encountered in filtering?
4. What are the two libraries given in the chapter that uses filtering?
5. What are the problems in blocking?

29
Cyber Ethics Chapter 14

Chapter: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique

Quote:

“The peculiar evil of silencing the expression


of an opinion is, that it is robbing the
human race; posterity as well as the
existing generation; those who dissent
from the opinion, still more than
those who hold it. If the opinion is right,
they are deprived of the opportunity of
exchanging error for truth: if wrong,
they lose, what is almost as great a benefit,
the clearer perception and livelier impression
of truth, produced by its collision with error.”

- John Stuart Mill

What I expect to learn:

I expect to learn about censorship on the internet, and some laws.

Definition of the quote:

The quote explains that evil and bad things are happening right now, a good
example is the scamming over the cyberspace we cannot win unless we go on an all out
war against these people who always do bad things such as cyber crimes and illegal
activities. We should have the truth.

Review:

A lot of bad people are taking advantage of the cyber world they are doing illegal
activities in the cyber world. These people are people who take advantage of other
people’s weaknesses. We want our cyber space to be clean and filtered. Do you think this
I right? Child pornography? That’s already over the limit. They have no dignity and
respect.

What I have learned:

♦ Child pornography prevention act


♦ Argument 1, 2, and 3

30
Integrative questions:

1. Define argument 1?
2. Explain argument 2?
3. What is argument 3?
4. Explain censorship?
5. Explain what is child pornography and why is it illegal?

31
Cyber Ethics Chapter 15

Chapter: PICS: Internet Access Controls Without Censorship

Quote:

“Although we must change the ways


we protect our country, we must also
guard against policies that appear
attractive but offer little real protection
and may even impede our ability to
protect ourselves.”

- Richard Burr

What I expect to learn:

I expect to learn about Internet Access Controls Without Censorship.

Definition of the quote:

The quote defines that changes alone cannot change something. There should be
dedication and will to change.

Review:

We need to protect the cyber world. We should free them from all the bad things
moving around this place. We ourselves should know what is right and wrong. We
should fight together as a team to fight and prevent this. These people destroying or
creating chaos in our world should be stopped. The most affected would be the youth,
am not saying we are safe. We can also be easy target for them no one is safe. It turned
into an ugly world.

What I have learned:

♦ PICS
♦ Flexible blocking
♦ PICS specifications

32
Integrative Questions:

1. What is PICS?
2. What are the specifications of PICS?
3. What is flexible blocking?
4. Explain the supervisor?
5. Explain the context?

33
Cyber Ethics Chapter 16

Chapter: Internet Service Providers and Defamation: New Standards of Liability

Quotes:

“Without accepting the fact that


everything changes, we cannot find
perfect composure. But unfortunately,
although it is true, it is difficult for
us to accept it. Because we cannot
accept the truth of transience,
we suffer.”

- Shunryu Suzuki

What I expect to learn:

I expect to gain knowledge on ISP and defamation.

Definition of the quote:

The quote says that we must be ready for change. I know a lot of people
misunderstand change. Change has benefits. Change is needed not only when a bad thing
or things happen. Change is also beneficiary to people who want to improve.

Review:

The chapter says that change is needed. Like what people say change is beneficial
to all of us. We need to improve information technology from further abuse the hackers
and other bad people do. We need to dominate it this time to determine what change we
need to have. We better have this change now, rather than regretting this in the future.

What I have learned:

♦ Legal Definitions and standards


♦ Internet service providers and legal defamation
♦ Legal precedents for ISP liability
♦ A moral perspective
♦ The need for libel law

34
Integrative questions:

1. What is ISP?
2. Define moral perspective
3. Why does the cyberspace alter the need for libel laws?
4. Define Decency act
5. How does ISP work?

35
Cyber Ethics Chapter 17

Chapter: Digital Millennium Copyright Act

Quote:

"Only one thing is impossible


for God: to find any sense in
any copyright law on the planet . . .
Whenever a copyright law is
to be made or altered,
then the idiots assemble."

- Mark Twain

What I expect to learn:

I want to gain sufficient knowledge about DMC act.

Definition of the quote:

The quote states that people alter and alter changes made by them, in order to get
new laws about copyright. They cannot be satisfied with what law they make.

Review:

The chapter tells that the digital millennium copyright act would be a better way
to handle copyright laws. This law would be a good idea for all the people who create
and use stuff’s owned by other people. People would learn how to respect others creatin
and appreciate it. Getting other people’s work without giving credit to the creator is not
only stealing but it is also disrespecting the person’s creation or masterpiece.

What I have learned:

♦ Violations regarding circumvention of technological measures


♦ Sec. 1202 Integrity of Copyright management information
♦ Elements of notification
♦ Limitations on liability relating to material online

36
Integrative Questions:

1. Give the elements of notification:


2. What is topic sec 1202?
3. Explain Limitations on liability relating to material online
4. What is an information location tool?
5. What is condition for eligibility?

37
Cyber Ethics Chapter 18

Chapter: Note on the DeCSS Trial

Quote:

“The Internet is both great and terrible.


As a source of information, a tool
for delivering music and art,
it's great. But spamming ads and
piracy of music is terrible.
It's stealing.”

- Gary Wright

What I expect to learn:

I expect to learn about DECSS Trial.

Definition of the Quote:

The quotes says that technology nowadays are being abused by greedy people. It
is wrongfully used by these people.

Review:

Piracy kills. Have you ever seen the commercial adds against piracy? Or have you
seen Edu Manzano destroying pirated CD’s and DVD’s? Well I have. The world is full
of pirates not only the Somali pirates(sea pirates) we also have the pirates who destroys
industries. Piracy is a very very good example of how the information technology we
have is being abused by people who wants to gain more money. Yes money money
money. That’s what pirates talk about. More profits for them. Sad to say that many
industries are dying because of this.

What I Have learned:

♦ Technical background
♦ The lawsuit
♦ The outcome
♦ Piracy

38
Integrative Questions:

1. What is piracy?
2. What does piracy do?
3. What is DeCSS?
4. Explain the outcome.
5. Explain the lawsuit.

39
Cyber Ethics Chapter 19

Chapter: A Politics of Intellectual Property: Environmentalism for the Net?

Quote;

“We could have saved the Earth


but we were too damned
cheap.”
.
- Kurt Vonnegut, Jr.

What I expect to learn:

I expect to learn about Environmentalism for the net.

Definition of the quote:

The quote says that we could have been helpful if we were not too arrogant and
cheap. I can relate the quote to information technology because it matches. We could
have saved earth if we were not cheap, in Information technology we could have saved
the industry if we did not buy cheap CD’s. which we all know are pirated.

Review:

The chapter is almost the same as the previous chapter about piracy, but it added
some extra features, in which you only can get in a original DVD. Just kidding. Well it
actually has added information in which we need to put values in. The environment refers
to the information technology, in which we abuse just like mother earth right?

What I have learned:

♦ Code is Code: The logic of the information relation


♦ Intellectual property is the legal form of the information age
♦ The conceptual structure of an intellectual land-grab
♦ Tensions in an intellectual property system
♦ Copyright on the Net
♦ The analogy to environmentalism

40
Integrative Questions:

1. What is code of code?


2. Explain Copyright in the net?
3. What is the analogy to environmentalism?
4. What is Tensions in an intellectual property system?
5. Explain Intellectual property is the legal form of the information age?

41
Cyber Ethics Chapter 20

Chapter: Intellectual Property, Information, and the Common Good

Quote:

“What a distressing contrast there is


between the radiant intelligence of
the child and the feeble mentality
of the average adult.”

- Sigmund Freud

What I expect to learn:

I expect to gain knowledge in common good, yes I said it common good.

Definition of the quote:

The quote explains that minds can be similar. Even with the age gap. Men can
think like kids, kids can think like men.

Review:

This chapter has connections with the previous chapter and its issues. People steal
nowadays, especially work of other people. There is what we call intellectual property.
This property is being stolen nowadays.

What I have learned:

♦ Conflicts over intellectual property: Five Cases


♦ Philosophical justification for intellectual property
♦ A more balanced view of the common good

42
Integrative Questions:

1. Define Intellectual Property


2. Give the five cases of intellectual properties
3. Explain what is ProCD
4. What happened with the NBA case against STATinc?
5. What is natural law?

43
Cyber Ethics Chapter 21

Chapter: Is Copyright Ethical? An Examination of the Theories, Laws,


and Practices Regarding the Private Ownership of Intellectual
Work in the United States.

Quote:

“It is with flowers, as with moral qualities:


the bright-coloured are sometimes
poisonous; but, I believe, never
the sweet-smelling.”

- Augustus William Hare and Julius Charles Hare

What I expect to learn:

I expect to learn if copyright is ethical.

Definition of the quote:

The quotes say that the people we expect to have morals are the persons who
really are hiding their true color.

Review:

The chapter talks about how copyright becomes ethical. It does not become
ethical if you are stealing it. You should be able to give respect to the person you are
getting information at. It is actually disrespecting if you just get them. You have to cite,
give credit and thanks to them. You don’t really need to spend money, just say thank you.
And its free, no more headaches of plagiarism right?

What I have learned:

♦ Property rights
♦ Theories of intellectual property and copyright
♦ Copyright

44
Ethical Questions:

1. What is copyright?
2. How does one violate copyright policies?
3. What are the theories of intellectual property and copyright?
4. What are the rights of copyright?
5. Is copyright ethical?

45
Cyber Ethics Chapter 22

Chapter: On the Web, Plagiarism Matters More Than Copyright Piracy

Quote:

Mr. Fitzgerald, I believe that is


how he spells his name, seems to believe
that plagiarism begins at home.

- Zelda Fitzgerald

What I expect to learn:

I expect to learn about plagiarism matters

Definition of the quote:

The quote is very true and right. Plagiarism starts from our home, actually within
us. It spreads faster than the light.

Review:

This chapters tells me that plagiarism is stealing, disrespecting and killing the
creator of the object. Most of the people lack knowledge about giving citation people
should respect other people’s work. To those who know how to cite the source we should
teach other people about it. We need to stop plagiarism.

What I have learned:

♦ Plagiarism
♦ What’s the harm in plagiarism
♦ What’s the use of copyright
♦ Bring it all together

46
Integrative Questions:

1. What is plagiarism?
2. Where does plagiarism move around?
3. What’s the use of copyright?
4. What is the outcome of we would be using plagiarized work?
5. Would you plagiarize?

47
Cyber Ethics Chapter 23

Chapter: An Ethical Evaluation of Web Site Linking

Quote:

“I would like us to think about it more


explicitly, and not take our intuitions as
the given of ethics, but rather to
reflect on it, and be more open about the
fact that something is an ethical issues
and thin what we ought to do about it.”

- Peter Singer

What I expect to learn:

I expect to learn about Ethical Evaluation of Web Site Linking.

Definition of the quote:

The quote says that everything has ethics in it. We should no ignore ethics we
should apply it in every aspect we do.

Review:

The chapter explains Website linking and ethical evaluation of it. Deep linking
could be harmful as said in the book. They say that this could lead to advertising
revenues of some people. And do you know who those people are? Drum rolls please…..
the spammers, the virus builders, hackers and the pirates! Hahaha. Those are the people
who would target such things. We need to be aware of the scenario.

What I have learned:

♦ The technical aspects of website linking


♦ Two case studies
♦ Deep linking
♦ Websites as intellectual property
♦ Respecting the common good

48
Integrative Questions:

1. What is deep linking?


2. What are the two case studies given?
3. What is respecting the common good?
4. What is website as intellectual property?
5. What is website linking?

49
Cyber Ethics Chapter 24

Chapter: The Cathedral and the Bazaar

Quote:

“The Roots of Violence:


Wealth without work,
Pleasure without conscience,
Knowledge without character,
Commerce without morality,
Science without humanity,
Worship without sacrifice,
Politics without principles.”

- Mohandas Gandhi

What I expect to learn:

I expect to learn what the cathedral and the bazaar is

Definition of the quote:

The quote says that we don’t get satisfied with what we have, it’s not about a
simple thing being enough. It is about how the simple thing would be enough.

Review:

The chapter tells us the story of the cathedral and bazaar. What I mean is the rise
of Linux as an open source. We should know very well that most of the things we need
nowadays are being paid and its no longer free. That’s why they created the open source.
It helps developers develop and create at the same time helps people who could not
afford programs.

What I have learned:

♦ The cathedral and the bazaar


♦ The mail must get through
♦ Importance of having users
♦ When is a rose not a rose
♦ Popclient becomes fetch mail
♦ Social context of an open source software

50
Integrative Questions:

1. What is the cathedral and the bazaar?


2. What is an open source software?
3. When is a rose not a rose?
4. How did the popclient become a fetch mail?
5. Explain the social context of an open source software

51
Cyber Ethics Chapter 25

Chapter: Towards A Theory of Piracy for the Information Age

Quote:

“In the information age, you don't


teach philosophy as they did after
feudalism. You perform it.
Aristotle were alive today
he'd have a talk show.”

- Timothy Leary

What I expect to learn:

I expect to learn about the theory of piracy in the information age.

Definition of the quote:

The quote is actually funny but so true. The quote explains that information age is
growing rapidly. If Aristotle was here would have done a talk show like Oprah and The
tonight show. Because of the power of information age.

Review:

The chapter says that information age is really being abused by people.
Information age is supposed to help us. Guide us and make our lives easier. But here
comes the…. Drum rolls please again.. pirates! Argh shiver me timber. Hahaha, well
actually they are the stars of the show. For me if you download a song its ok, but if you
sell it or gain profit from it, that’s piracy already. Learn the difference of sharing and
gaining profit.

What I have learned:

♦ Greased Data
♦ Grounding Piracy
♦ The nature of piracy
♦ Setting and adjusting policies for private situations

52
Integrative questions:

1. What is publicity principle.


2. Define greased data?
3. What is a grounding piracy?
4. What is the nature of piracy?
5. Define setting and adjusting policies for private situations

53
Cyber Ethics Chapter 26

Chapter: The Structure of Rights in Directive 95/46/EC on the


Protection of Individuals with Regard to the Processing
of Personal Data and the free Movement of Such Data

Quote:

“ A person is born with desires of the eyes


and ears, and a liking for beautiful
sights and sounds. If he gives way to them,
they will lead him to immorality and lack of
restriction, and any ritual principles and propriety will
be abandoned.”
- Xun Zi

What I expect to learn:

I expect to learn the structure of rights in a directive.

Definition of the quote:

The quote says that every person is being brainwashed by greediness. We should
open our eyes to reality

Review:

The chapter is about restrictions. In the information technology world and in the
real world everything has its restriction. The world wide web is a very very very big
place, did I mention it is really big? I know you get a lot of info and resources from it but
there are restrictions to it. It has limits also.

What I have learned:

♦ The directive on the question of further processing of personal data


♦ Data quality
♦ Legitimate purposes
♦ Sensitive data
♦ The right to be informed
♦ Data subject’s right to access and to object
♦ The reprocessing of personal data
♦ Using personal data for a different purpose
♦ Data protection and the philosophy of privacy

54
Integrative Questions:

1. What is data Quality?


2. Define sensitive data?
3. What is the right to be informed?
4. Give the two examples of data protection?
5. What is reprocessing of personal data?

55
Cyber Ethics Chapter 27

Chapter: Privacy Protection, Control of Information, and


Privacy-Enhancing Technologies

Quote:

“A book is the only place in which you


can examine a fragile thought without breaking it,
or explore an explosive idea without fear it
will go off in your face. It is one of the few
havens remaining where a man's mind
can get both provocation and privacy.”

- Edward P. Morgan

What I expect to learn:

I expect to learn Privacy Protection, Control of Information, and Privacy-


Enhancing Technologies.

Definition of the quote:

The quote says that a man who enters a certain risk or gamble in his life has no
more privacy. In which a part of his life is gone.

Review:

The chapter explains that privacy is very very important in information


technology. People are being deprived of privacy because of the hackers in the world
wide web. These hackers not only hack you but they get your identity also, this is called
identity theft. When this occurs where does your privacy go?

What I have learned:

♦ The theory of privacy


♦ Normative privacy and the restricted access theory
♦ The use control in the justification and management of privacy
♦ Privacy-enhancing technologies
♦ PETs and the role of individual choice in controlling personal
information
♦ PETs and the principle of informed consent

56
♦ PET owners beware

Integrative Questions:

1. What is PETs?
2. What is the theory of privacy?
3. Why should PET owners beware?
4. Define Privacy enhancing technologies in an individual choice in controlling
personal information?
5. What is normative privacy?

57
Cyber Ethics Chapter 28

Chapter: Toward an Approach to Privacy in Public: Challenges


of Information Technology.

Quote:

"Obstacles are like wild animals.


They are cowards but they will
bluff you if they can. If they see
you are afraid of them... they are liable
to spring upon you; but if
you look them squarely in the eye,
they will slink out of sight."

- Orison Swett Marden

What I expect to learn:

I expect to learn the approach to privacy in public.

Definition of the quote:

The quote is true. You have to face you challenges without fear. For every
challenge you go thru, easy way or hard way you get a valuable experience which you
can cherish for the rest of your life.

Review:

The chapter basically talks about challenges information technology is facing in


the real world. Information technology is facing a lot of challenges and it is not easily
backing down. The main challengers are the pirates, hackers and spammers. The
challenge is protecting the privacy of each individual from these people.

What I have learned:

♦ Privacy and personal realm background.


♦ Violating privacy in public – the case of Lotus Marketplace:
Households
♦ Two misleading Assumptions

58
Integrative questions:

1. What is privacy?
2. Define personal realm background?
3. What are the to misleading assumptions?
4. How do you violate privacy?
5. Explain the privacy violation in the case of lotus marketplace?

59
Cyber Ethics Chapter 29

Chapter: KDD, Privacy, Individuality, and Fairness

Quote:

“The hero is one who kindles a great


light in the world, who sets up
blazing torches in the dark streets
of life for men to see by. The saint is the
man who walks through the dark paths
of the world, himself a light.”

- Felix Adler

What I expect to learn:

I expect to learn KDD

Definition of the quote:

The quotes explains that we as an individual can change something. We don’t


need publicity in everything good we do. We need to be simple and helpful.

Review:

We all know that we are not supposed to be selfish. But in some cases we need to
in order for us to protect our privacy. We need this protection badly. If this selfish
method works for the information technology world why not share it right? Like they say
be selfish now, and share in the appropriate time. You become selfish for the sake of
others; you share what you learned for the sake of others. We need to fight the cyber
crimes together and stop it and prevent it from creating more chaos.

What I have learned:

♦ What KDD is
♦ Personal data
♦ Social consequences
♦ Categorial privacy
♦ Solutions

60
Integrative Question:

1. What is KDD?
2. Define personal data?
3. What is a social consequence?
4. Explain Categorial privacy?
5. What is solution in the chapter?

61
Cyber Ethics Chapter 30

Chapter: Data Mining and Privacy

Quote:

“I love those who can smile in trouble,


who can gather strength from distress,
and grow brave by reflection.
Tis the business of little minds to shrink,
but they whose heart is firm, and whose
conscience approves their conduct,
will pursue their principles unto death.”

- Leonardo da Vinci

What I expect to learn:

I expect to learn things about data mining and privacy.

Definition of the quote:

The quote says that we need to gain strength and knowledge. But we still need to
have ethic and a proper conduct.

Review:

The chapter talks about data mining. So what is data mining for me? It is when
you get date which you would need. This data are useful to you. Its almost the same with
data gathering. The difference is in data mining you will use all your data. It is basically
thinking and loading up your mind with information’s.

What I have learned:

♦ Knowledge Discovery and Data Mining


♦ The issue
♦ Analysis

62
Inetgrative Questions:

1. What is knowledge discovery?


2. What is data mining?
3. What is the issue?
4. Define analysis?
5. What is a dossier society?

63
Cyber Ethics Chapter 31

Chapter: Workplace Surveillance, Privacy, and Distributive Justice

Quote:

“It seems to limit you; when you're


working in an office, you're a creature
in a small cell under somebody's
supervision and surveillance.”

- Jack Vance

What I expect to learn:

I expect to learn what work place surveillance is

Definition of the quote:

The quotes is true, people are watching you at work, because they want to make
sure everything is still private.

Review:

The chapter says that companies have rights in watching their employee’s. They
do this in order for them to make sure that their information’s would not go to the wrong
hands of the cyber criminals. They are doing it to keep the information safe. Quite
frankly it’s ok to me. Because what if a information goes out and it gets leaked the
company is doomed.

What I have learned:

♦ Resisting workplace surveillance


♦ Privacy as a matter of justice
♦ Privacy, surveillance, and distributive justice
♦ Conclusion

64
Integrative Questions:

1. Define privacy in a workplace?


2. What is distributive justice?
3. Why people resist workplace surveillance?
4. Do you agree workplace surveillance is good?
5. Is privacy a matter of justice?

65
Cyber Ethics Chapter 32

Chapter: Privacy and Varieties of Informational Wrongdoing

Quote:

“You can practice shooting eight hours


a day, but if your technique is wrong,
then all you become is very good at
shooting the wrong way. Get
the fundamentals down and the
level of everything you do will rise.”

- Micheal Jordan
What I expect to learn:

I expect to learn varieties of informational wrongdoing.

Definition of the quote:

The quote can relate to the information technology world. How? Its simple you
practice false programming, or you practice hacking and spamming people. Think about
it if you doing it to help other people. How many would benefit? A lot

Review:

The chapter is about wrongdoings. People in the cyber world are affected by the
wrong doings of other people. We should learn the right fundamentals and use it in a
right manner; we should be smart enough to help other people than doing a wrong deed.

What I have learned:

♦ Panoptic technologies and the public good


♦ Information-based harm
♦ informational inequality
♦ Informational injustice
♦ Spheres of access
♦ Encroachment on moral autonomy.

66
Integrative Questions:

1. Define moral autonomy?


2. Define spheres of access?
3. Define informational based harm?
4. What is informational Injustice?
5. What is informational inequality.

67
Cyber Ethics Chapter 33

Chapter: Defining the Boundaries of Computer Crime: Piracy,


Break-Ins, and Sabotage in Cyberspace

Quote:

“What is the difference between


unethical and ethical advertising?
Unethical advertising uses falsehoods to
deceive the public; ethical advertising
uses truth to deceive the public.”

- Vilhjalmur Stefansson
-

What I expect to learn:

I expect to learn Sabotage in cyber space.

Definition of the quote:

The quotes says that if your way is ethical be sure what you are doing is also
ethical and it should have the right values.

Review:

The chapter tells me when to stop. The chapter taught me to stop and no longer go
further. We should learn to appreciate what we already have. We should not be greedy
and get more things we want. Everything has a boundary.

What I learned:

♦ Boundaries of Computer Crime


♦ Crime in cyberspace
♦ Abuse in cyberspace
♦ Terrorism in cyberspace
♦ Anonymity and encryption

68
Integrative Question:

1. What is crime in cyberspace?


2. What is Abuse in cyberspace?
3. What is Terrorism in cyberspace?
4. Define anonymity and encryption?
5. Explain the boundaries of computer crimes?

69
Cyber Ethics Chapter 34

Chapter: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic

Quote:

“We all have dreams. But in order to make


dreams come into reality, it takes
an awful lot of determination,
dedication, self-discipline,
and effort.”

- Jesse Owens

What I expect to learn:

I expect to learn civil disobedience in the cyberspace.

Definition of the quote:

The quote tells me that in order for me to achieve something’s I should have self
discipline. To be the man you need to have self discipline and effort.

Review:

Hacktivist wow, this people are really going nuts. They use the cyberspace for
their self interest. There are people who are really abusing the information technology
power. They do this for their self interest. Where is ethics in that?

What I have learned:

♦ Electronic civil disobedience


♦ Hacktivism
♦ Cyber terrorism
♦ Toward a Hacktivist ethic

70
Intergrative Questions:

1. Define hacktivism?
2. What is cyber terrorism?
3. What is the ethics of an hacktivist?
4. What is civil disobedience?
5. Describe mistrust authority?

71
Cyber Ethics Chapter 35

Chapter: Web Security and Privacy: An American Perspective

Quote:

“The right of an individual to


conduct intimate relationships in the
intimacy of his or her own home
seems to me to be the heart of
the Constitution's protection
of privacy.”

- Harry A. Blackmun

What I expect to learn:

I expect to gain knowledge on web security on an American perspective.

Definition of the quote:

The quotes states that each individual has his right to have his privacy where ever,
whenever he wants.

Review:

This chapter tells me how American defines privacy. They define it in a simple
term as long as you don’t’ cross the line it is ok. Now a day’s people are abusing other
peoples life. They are messing them even in cyberspace. Some of the new Web 2.0 sites
have privacy settings for example my space, no one can see my profile unless they are
listed as my friend.

What I have learned:

♦ Browsing information
♦ Legal Issues and Societal Implications
♦ What are you doing on the web

72
Integrative Questions:

1. What is DNS?
2. What is an IP?
3. What are you doing on the web?
4. What are the legal key issues?
5. What is browsing information?

73
Cyber Ethics Chapter 36

Chapter: The Meaning of Anonymity in an Information Age

Quote:

“But anonymity is very important


to me, and I don't want to be
recognized in public more than
I already am.

- Todd Solondz”
What I expect to learn:

I expect o learn the Meaning of Anonymity in an Information Age

Definition of the quote:

The quote is what people need now, being a humble person.

Review:

Anonymity of this information age, ahem ahem. People want their identity to be
kept. That’s why cybername comes out. People now wants to hide who they are in
cyberspace. They have new identities in this world.

What I have learned:

♦ Methods
♦ Gate keepers
♦ Results
♦ Encryption
♦ Anonymity
♦ Data flow

74
Integrative Questions:

1. What is data flow?


2. Describe anonymity?
3. What is encryption?
4. Define the results?
5. What is a Gate Keepers?

75
Cyber Ethics Chapter 37

Chapter: Written on the Body: Biometrics and Identity

Quote:

“Our achievements of today are


but the sum total of our
thoughts of yesterday. You are today
where the thoughts of yesterday have
brought you and you will be tomorrow
where the thoughts of today take you.

- Blaise Pascal”

What I expect to learn:

I expect to learn biometrics and identity.

Definition of the quote:

The quotes says that you need to value your identity. Legacy lives on forever if
your identity is well respected.

Review:

Information technology has many ways of identifying with the use of biometrics.
Our online identities can be an example of this.

What I have learned:

♦ Use of biometrics
♦ Identifying biometric identity
♦ Virtual identities
♦ Questioning the biometric body

76
Integrative Questions

1. What is a biometric?
2. How does biometric identify our identity?
3. What is virtual identities?
4. What is biometric body?
5. What is a biometric?

77
Cyber Ethics Chapter 38

Chapter: Ethical Considerations for the Information Professions

Quote:

“There may be people that have


more talent than you, but
there’s no excuse for anyone
to work harder than you do”

- Derek Jeter

What I expect to learn:

I expect to learn ethical considerations

Definition of the quote:

The quote says that whoever you are, you can achieve, you may not become the
best but you’re hard work pay’s off

Review:

Information technology changes the world. It changed me, once I was illiterate
about computers, I was jealous of my classmates when I was grade 3 who have their own
computers at home, till when I got a computer when I was grade 5. it changed me. I
became an enthusiast of it. My knowledge grew, and it has grown bigger each day. Look
at me now, basketball and computers is my thing. I go online and always find basketball
stuffs on the internet hahaha.

Things that I have learned:

♦ Code of ethics
♦ Philosophical foundations
♦ Major issues

78
Integrative Questions:

1. What are the two phase of computer ethics?


2. Explain the survival of the colonial era?
3. Explain the first phase of computer ethics?
4. Explain the second phase of computer ethics?
5. Define philosophical foundations?

79
Cyber Ethics Chapter 39

Chapter: Software Engineering Code of Ethics: Approved!

Quote:

"A winner is someone who


recognizes his God-given talents,
works his tail off to develop them into
skills, and uses these skills to
accomplish his goals."

- Larry Bird

What I expect to learn:

I expect to learn about the code of ethics of a software engineer

Definition of the quote:

Bird’s Quote is simply true.

Review:

The code of ethic of a software engineer. I salute it. This would help a software
engineer into having values and respect for what he does. His morality would be defined
by his work.

What I learned:

♦ IEEE-CS
♦ ACM
♦ Short version of the software engineering ethics.
♦ Applied principles
♦ Practices

80
Integrative Questions:

1. What is IEEE-CS?
2. What is ACM?
3. Explain the short version of ethics?
4. What is applied principle?
5. Define the preactices?

81
Cyber Ethics Chapter 40

Chapter: No, PAPA: Why Incomplete Codes of Ethics are


Worse than None at All

Quote:

“Here once again education is crucial,


it enables children to be become
more aware of their rights and to exercise them
in a respectful manner which helps
them shape their own future.”

- Carol Bellamy

What I expect to learn:

Why incomplete code of ethics is worse than non at all:

Definition of the quote:

The quote is perfect for this chapter, if you have no education your career might
not be complete, you get education but you don’t complete it its bad.

Review:

It is really better to have no code of ethics than having an incomplete one. You
would just get confused with what is happening and how the rules or codes of ethic work
if it is incomplete.

What I have learned:

♦ Weapons
♦ Environmental impacts
♦ PAPA
♦ Teleworking
♦ Telecommunicating
♦ Protecting the weak against the strong
♦ Importance of the PAPA issues
♦ pressures to look for loopholes
♦ Incomplete moral codes
♦ Complete moral codes
♦ Avoiding accidental incomplete moral codes

82
Integrative questions:

1. What is PAPA?
2. Define teleworking?
3. Explain Telecommunicating?
4. Explain incomplete moral codes?
5. Define a complete moral code?

83
Cyber Ethics Chapter 41

Chapter: Subsumption Ethics

Quote:

“The psychology of the mature human


being is an unfolding, emergent, oscillating,
spiraling process marked by progressive subordination
of older, lower-order behavior systems to newer,
higher-order systems as man's existential
problems change.”

- Clare W. Graves

What I expect to learn:

I am expecting to gain deeper knowledge on Subsumption ethics.

Definition of the quote:

Change always happen. A person’s mood changes, we wouldn’t know if which


side sis he right now.

Review:

This chapter talks about subsumption. Well for me subsumpsion occur


everywhere, as in literally everywhere. As a developer I should know how to develop
properly. I should follow the basic steps in developing in order for my creation to be a
masterpiece.

What I have learned:

♦ Subsumption ethics
♦ Systems Development
♦ Ethical Framework
♦ The golden mean
♦ The golden rule

84
Integrative Question:

1. What is subsumption Ethics?


2. Define system development?
3. What is an ethical framework?
4. Define the golden mean?
5. Explain the golden rule?

85
Cyber Ethics Chapter 42

Chapter: Ethical Issues in Business Computing

Quote:

“In a knowledge economy, a good


business is a community with a
purpose, not a piece of property.”

- Charles Handy

What I expect to learn:

Ethics in business

Definition of the quote:

The quote says that a business must have goals and purpose rather than just
having properties.

Review:

The chapter talks about how business computing are needed nowadays in the
business world. The industry helps other industries. The companies are having a easier
time with business computing rather than going old school. These new methods are really
giving us a better time, headache free computing.

What I have learned:

♦ Business computing
♦ Size issues
♦ Level one
♦ Level Two
♦ Level Three
♦ Level four
♦ The tasks of business computing
♦ Data considerations

86
Integrative Questions:

1. what is business computing?


2. explain level one?
3. explain level two?
4. explain level three?
5. explain level four?

87
Cyber Ethics Chapter 43

Chapter: The Practitioner from Within: Revisiting The Virtues

Quote:

“Morals are too essential to the


happiness of man to be risked on the
uncertain combinations of the head.
She [nature] laid their foundation
therefore in sentiment, not science.”

- Thomas Jefferson

What I expect to learn:

I want to revisit the virtues

Definition of the quote:

The quote says that without morals a man would not be complete, a man would
not be happy.

Review:

The chapter talks about how to being a person that has virtues, a person who has
ethics and a person who believes in the right morals. In order for the industry to be better,
we need to reconsider studying ourselves first. We need to make ourselves better. We
need to improve our values. We retrace our step on how we are suppose to be.

What I have learned:

♦ Ethics
♦ Morality
♦ Values
♦ Character forming vs. Action guiding theories
♦ Need for contemporary moral theory
♦ Core values
♦ Imagination and narrative genre

88
Integrative Questions:

1. What is ethics?
2. what is morality?
3. Give an example of a core value?
4. Explain need for contemporary moral theory?
5. Explain imagination and narrative genre?

89
The Handbook of Information and Computer Ethics Chapter 1

Chapter: Foundations of Information Ethics

Quote:

A belief in God helps provide a


foundation to arbitrate our
decisions. Without this foundation,
we are condemned to live
essentially formless lives.

- Armstrong Williams

What I expect to learn:

I expect to gain knowledge in the foundation of information ethics

Review:

The chapter tells about how to start from the scratch, you must have these basic
elements in order to start. Just like in basketball you should know the basics. Every thing
starts from the scratch.

What I learned:

♦ IE as an ethics of informational resources(1st stage)


♦ IE as an ethics of information products(2nd stage)
♦ IE as an ethics of the informational environment(3rd stage)
♦ Information Ethics as a macroethics
♦ Two recurrent objections
♦ Moral agents
♦ The responsibilities of human agents
♦ Internal Resource Product Target Model
♦ Four moral principles

90
Integrative Questions:

1. Explain stage 1?
2. explain stage 2?
3. explain stage 3?
4. define moral agents?
5. what are the four moral principles

91
The Handbook of Information and Computer Ethics Chapter 2

Chapter: Milestones in the History of Information and Computer Ethics

Quote:

Our deep respect for the land


and its harvest is the legacy of
generations of farmers who put food
on our tables, preserved our landscape,
and inspired us with a powerful work ethic.

- James H. Douglas

What I expect to learn:

I expect to learn the History of Information and Computer Ethics.

Review:

The chapter is about the history of the computers. Started from something small,
it grew large to something everybody wants and needs. A new technology is being
developed day by day. Values are being overshadowed by greedy people nowadays who
only think of profits.

What I have learned:

♦ NORBERT WIENER’S FOUNDATION OF INFORMATION


ETHICS
♦ Wiener's Account of a Good Life
♦ Wiener’s Information Ethics Methodology
♦ COMPUTER ETHICS DEVELOPMENTS AFTER WIENER AND
BEFORE MANER
♦ WALTER MANER.S COMPUTER ETHICS INITIATIVE
♦ DEBORAH JOHNSON’S INFLUENTIAL TEXTBOOK
♦ AND THE START OF THE ‘‘UNIQUENESS DEBATE

♦ THE PROFESSIONAL-ETHICS APPROACH OF DONALD


GOTTERBARN
♦ COMPUTING AND HUMAN VALUES
♦ LUCIANO FLORIDI’S INFORMATION ETHICS THEORY

92
Integrative Question:

1. Explain Wiener's Account of a Good Life


2. explain lucianos theory
3. Define Computing and human values
4. What is Wlater’s initiative?
5. Explain the approach of Donald

93
The Handbook of Information and Computer Ethics Chapter 3

Chapter: Moral Methodology and Information Technology

Quote:

Different things delight different people. But it is my delight


to keep the ruling faculty sound without turning away
either from any man or from any of the things which happen
to men, but looking at and receiving all with welcome eyes
and using everything according to its value.

Marcus Aurelius

What I expect to learn:

Morality in information technology.

Review:

The chapter talks about how information technology ethics becomes a practical
ethic. It explains that values in information technology are of the same values with other
fields. It tells that not only good things are created from computers but also bad things.

What I have learned:

♦ APPLIED ETHICS
♦ Generalism
♦ Particularism
♦ Reflective Equilibrium
♦ THE DESIGN TURN IN APPLIED ETHICS
♦ VALUE SENSITIVE DESIGN
♦ PACS
♦ Real-Time Emergency Medicine.
♦ OTHER CONCEPTIONS OF METHOD IN COMPUTER ETHICS

94
Integrative Questions:

1. What is generalism?
2. What is the definition of Cyber Ethics?
3. What is the study of moral questions?
4. Does this help solve the problem between determining whether the function of a
computer is for the good or not?
5. What is PACS?

95
The Handbook of Information and Computer Ethics Chapter 4

Chapter: Value Sensitive Design and Information Systems

Quote:

We begin by sketching the key features ofValue Sensitive Design and then describe
its integrative tripartite methodology, which involves conceptual, empirical, and technical
investigations, employed iteratively. Then we explicate Value Sensitive Design
by drawing on three case studies. One involves cookies and informed consent in web
browsers; the second involves HDTV display technology in an office environment;
and the third involves user interactions and interface for an integrated land use,
transportation, and environmental simulation. We conclude with direct and practical
suggestions for how to engage in Value Sensitive Design.

What I expect to learn:

Value Sensitive Design.

Review:

The chapter talks about ways how you can use information technology with the
approach of values. This chapter shows that we can do our work in a value added work.
In every action we do we must remember our ethics.

What I have learned:

♦ WHAT IS VALUE SENSITIVE DESIGN?


♦ What is a Value?
♦ Related Approaches to Values and System Design
♦ THE TRIPARTITE METHODOLOGY: CONCEPTUAL,
EMPIRICAL, AND TECHNICAL INVESTIGATIONS
♦ Conceptual Investigations
♦ Technical Investigations
♦ Conceptualizing the Value
♦ Using a Conceptual Investigation to Analyze Existing Technical
Mechanisms

96
Integrative questions:

1. What is value sensitive design?


2. What is conceptual investigations?
3. What is Technical investigations?
4. what is conceptualizing the value?
5. Explain related approach to value and system design.

97
The Handbook of Information and Computer Ethics Chapter 5

Chapter: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual


Property

Quote:

It is important to note that compensation is typically built into the proviso and the
overall account of bettering and worsening. An individual’s appropriation may
actually benefit others and the benefit may serve to cancel the worsening that occurs
from restricted use. Moreover, compensation can occur at both the level of the act and
at the level of the institution.

What I expect to learn:

I expect to gain knowledge about Intellectual property

Review:

This chapter discussed the intellectual properties of individuals. These properties


are copy righted by the owners. The creators have the rights for their work as long as
they have it under a license like creative common. In short if they declared it first.

What I have learned:

♦ WHAT IS INTELLECTUAL PROPERTY?


♦ PERSONALITY-BASED JUSTIFICATIONS OF INTELLECTUAL
PROPERTY
♦ Problems for Personality-Based Justifications of Intellectual Property
♦ The Personality Theorist's Rejoinder
♦ THE RULE-UTILITARIAN INCENTIVES BASED ARGUMENT
FOR INTELLECTUAL PROPERTY
♦ Problems for the Rule-Utilitarian Incentives Based Argument
♦ Alternatives to Patents

98
Integrative Questions:

1. What is intellectual property?


2. explain problems for personality?
3. What is alternatives patents?
4. what are the problems for a rule-utilitarian arguemen?
5. What is personality theorist rejoinder?

99
The Handbook of Information and Computer Ethics Chapter 6

Chapter: Informational Privacy: Concepts, Theories, and Controversies

Quote:

Thus far, we have examined some ways that RALC improves upon the control and
restricted access theories of informational privacy by incorporating key elements of
both theories. We have also seen how RALC can respond to two kinds of potential
objections from critics.However,muchmore needs to be said aboutRALCand the role
it plays in protecting privacy.We revisit the RALC theory in Section 6.5.3, where we
examine some proposals for framing comprehensive policies that protect informational
privacy.

What I expect to learn:

Concept and theories.

Review:

This chapter talks about privacy. A person is eligible to have privacy whenever he
wants to have it. It could be with his work or his life. When a person is not in public he is
in private mode. Actually privacy may also tackle information about that person.

What I have learned:

♦ THE CONCEPT OF PRIVACY


♦ Unitary, Derivative, and Cluster Definitions of Privacy
♦ Interest-Based Conceptions Versus Rights-Based Conceptions of
Privacy
♦ FOUR DISTINCT KINDS OF PRIVACY:
PHYSICAL/ACCESSIBILITY, DECISIONAL,
PSYCHOLOGICAL/MENTAL, AND INFORMATIONAL
PRIVACY
♦ Privacy as Nonintrusion Involving One’s Physical Space:
Physical/Accessibility Privacy
♦ Privacy as Nonintrusion/Noninterference Involving One’s Thoughts
and One’s Personal Identity: Psychological/Mental Privacy

100
Integrative Questions:

1. Define the concept of privacy:


2. what is the cluster definition of pricacy?
3. what are the four distinct kind of privacy?
4. what is the restricted theory?
5. What is the control theory?

101
The Handbook of Information and Computer Ethics Chapter 7

Chapter: Online Anonymity

Quote:

Whatever be the purpose(s) of a given instance of anonymity, it raises the issue of


accountability, whatever other issues, such as attribution bias, noted above, may be
involved or at stake. We might label the issue of accountability the Ring of Gyges
scenario. In Plato.s parable,48 Gyges finds a ring that makes him invisible whenever he
wears it. (I.m not suggesting that we rely on magical means of anonymizing; rather I
am suggesting that Plato.s parable makes vivid the risk in anonymity.) Plato.s point is
that the successfully unjust (immoral or unethical) person seeks and relies on strategies
that enable her to avoid accountability for her actions. The Ring of Gyges scenario is
when someone.s ability to be invisible—anonymous—allows unethical or criminal
action with impunity.

What I expect to learn:

To know what is online anonymity

Review:

The chapter talks about the anonymity of a person, in which his real identity is
hidden. The technology nowadays could really help a lot of people. But cybercrime is
also up and we need to be careful with the anonymous person we see online.

What I learned:

♦ ANONYMITY AS A FEATURE OF COMPLEX SOCIAL


STRUCTURES
♦ Data Mining, Tracking, and User’s Presumption of Anonymity
♦ THE CONCEPT OF ANONYMITY
♦ ANONYMITY AND ETHICAL ISSUES IN INFORMATION
TECHNOLOGY
♦ Anonymity and Attribution Bias
♦ Anonymity and Expression of Self
♦ Anonymity and Identity Theft
♦ PURPOSES AND ETHICS OF ANONYMITY

102
Integrative Questions:

1. What is anonymity?
2. Explain the concept of anonymity?
3. Explain identity theft?
4. What are the purpose and ethics of anonymity?
5. What is attribution bias?

103
The Handbook of Information and Computer Ethics Chapter 8

Chapter: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and


Counterkacking

Quote:

One of the key issues in evaluating whether an act of hacktivism is morally justified
is the extent to which the act harms the interests of innocent third parties. In thinking
about this issue, it is important to reiterate that the context being assumed here is a
morally legitimate democratic systemthat protects the right of free expression and thus
affords persons a variety of avenues for expressing their views that do not impact the
interests of innocent third parties.

What I expect to learn:

Ethical issues involving computer security.

Review:

Well the pirates, spammer, bad hackers are the unethical persons in this chapters.
They are people who are abusing information technology. The world wide web would be
better if these type of people would not exist. These people should be taught of proper
ethics.

What I have learned:

♦ THE PRIMA FACIE CASE AGAINST HACKING


♦ OVERCOMING THE PRIMA FACIE CASE: HACKING
MOTIVATED BY BENIGN PURPOSES
♦ The Social Benefits of Benign Intrusions
♦ Benign Intrusions as Preventing Waste
♦ Benign Intrusions as Exercising the Right to a Free Flow of Content
♦ HACKTIVISM: HACKING AS POLITICALLY MOTIVATED
ACTIVISM AND CIVIL DISOBEDIENCE
♦ CD and Morality
♦ What is Hacktivism?
♦ Is Hacktivism Morally Justified as CD?

104
Integrative questions:

1. Is Hacktivism Morally Justified as CD?


2. What is Hacktivism?
3. explain The Social Benefits of Benign Intrusions?
4. What is civil disobedience?
5. What is benign intrusions?

105
The Handbook of Information and Computer Ethics Chapter 9

Chapter: Information Ethics and the Library Profession

Quote:

At the center of the librarian.s commitment to humanity.s search for truth and
understanding is the goal of remaining always neutral in the battle of competing ideas.
No matter how precious to us any faith or philosophy or social movement might be, we
have to keep our distance and maintain our impartiality as we help to insure that all the
people can hear all the arguments and establish for themselves what is right or true.’

What I expect to learn:

I expect to learn How IE works in Library profession.

Review:

The chapter is about how librarian face proper ethic. These people are
overwhelmed with information ethics. They have power of knowing a person by viewing
their records.

What I have learned:

♦ THE CORE VALUE OF THE LIBRARY PROFESSION


♦ 1) Books are for use.
♦ (2) Every person his or her book.
♦ (3) Every book its reader.
♦ (4) Save the time of the reader.
♦ (5) The library is a growing organism.
♦ SELECTION, BIAS, AND NEUTRALITY
♦ CLASSIFICATION AND LABELING
♦ CHILDREN’S ACCESS TO INFORMATION

106
Integrative Questions:

1. What are the five core value of a librarian?


2. Explain SELECTION, BIAS, AND NEUTRALITY
3. Explain Books are for use?
4. Does a librarian core value need change?
5. Explain the classification and labeling?

107
The Handbook of Information and Computer Ethics chapter 10

Chapter: Ethical Interest in Free and Open Source Software

Quote:

The social pressure in the open source community to avoid code forking provides
incentives for project leaders to ensure that the code is the best it can be. On the
contrary, when an open source developer believes there is too much risk associated
with a particular piece of code, he/she can rewrite it and release it. Although there is a
reputation risk in doing so, there is the opportunity to publicly demonstrate that the
forked product is superior

What I expect to learn:

I want learn about ethical interest in free and open source software.

Review:

This chapter talks about free and open source softwares. The free softwares are
the ones maybe the trials or really free the other one is open source which you can
modify or create. Nonetheless this are free. Yes free so get ready grab a bite!

What I have learned:

♦ ON THE DISTINCTION BETWEEN FS AND OSS


♦ The History of Free and Open Source Software
♦ Free Software
♦ (1) Freedom to run the program, for any purpose.
♦ (2) Freedom to study how the program works, and adapt it to your
needs.
♦ (3) Freedom to redistribute copies so you can help your neighbor.
♦ (4) Freedom to improve the program, and release your improvements
to the public, so that the whole community benefits.
♦ Critiques of Free and Open Source Software
♦ The Controversy Regarding GPL Version 3
♦ WHY OSS FLOURISHES
♦ Economic Foundations for OSS
♦ The Quality of OSS

108
♦ The Ethical Responsibilities of Software Developers
♦ Open Source and Accountability
♦ IS OSS A PUBLIC GOOD?

Integrative Question:

1. Is OSS a public good?


2. What is OSS?
3. what is GPL?
4. Explain the history of free and open source software
5. explain the ethical responsibilities of a developer

109
The Handbook of Information and Computer Ethics Chapter 11

Chapter: Internet Research Ethics: The Field and Its Critical Issues

Quote:

A key decision for Internet researchers is often disciplinebased,


that is, do we treat our “subjects” as subjects (as is characteristic of the social
sciences) and thereby invoke familiar human subjects protections, and/or do we treat
our “subjects” as posters, as authors (as is characteristic of the humanities)? If the latter
is the case, then far from emphasizing the need for anonymity and confidentiality, we
are rather dealing with posters who intend to act as public agents online.

What I expect to learn:

I expect to learn Research ethics and its critical issues:

Review:

Information technology is growing fast. Before I used to borrow books from the
library when I was a kid or research hard, when I got to highschool books were no longer
superior. The world wide web dominated. Till now its dominating more. It is improving
to make our life easier.

What I have learned:

♦ INTRODUCTION TO INTERNET RESEARCH ETHICS:


BACKGROUND AND MAJOR ISSUES IN THE LITERATURE
♦ IRE: A BRIEF HISTORY
♦ Philosophical Foundations: Sources, Frameworks, and Initial
Considerations
♦ Specific IRE Issues
♦ Anonymity/Confidentiality
♦ Copyright
♦ Revealing Identities
♦ Public Versus Private Spaces
♦ Respect for Persons
♦ Recruitment
♦ Research with Minors
♦ Emerging Issues

110
♦ METHODOLOGIES AND ETHICS
♦ Participant Observation and Discourse Analysis

Integrative questions:

1. Define respect for person?


2. What is IRE?
3. what is copyright?
4. What is confidentiality?
5. Explain research with minors.

111
The Handbook of Information and Computer Ethics Chapter 12

Chapter: Health Information Technology: Challenges in Ethics, Science, and Uncertainty

Quote:

To ask if a computer diagnosis increases (or decreases) the risk of diagnostic or other
error is in part to ask whether it will improve patient care. If the answer is that, on
balance,
the tool increases (the risk of) diagnostic error, then we should say it would be unethical
to use it. Significantly, though, what is sought here is an empirical finding or a reasoned
judgment—where such a finding is often lacking or even methodologically hard to come
by; or where such a judgment is based on inadequate epistemic support, at least
according to standards otherwise demanded to justify clinical decisions. . . This means
that we are pressed to answer an ethical question (Is it acceptable to use a decision
support system?) in a context of scientific uncertainty (How accurate is the system?).
Many challenges in contemporary bioethics share this feature, namely, that moral
uncertainty parallels scientific or clinical ignorance. (Goodman, 2007, p. 129).

What I expect to learn

I expect to gain knowledge on challenges in ethics.

Review:

The chapter talks about how the information technology is doing, updating
improving getting better. We are lucky that we are the batch that are trying new things
out with technology. I know in the future it would be way better. But we should always
remember to put values in what we are doing.

What I have learned:

♦ PRIVACY AND CONFIDENTIALITY


♦ CLINICAL DECISION SUPPORT SYSTEMS
♦ Diagnostic Expert Systems
♦ Prognostic Scoring Systems
♦ ‘‘The Standard View” and ‘‘Progressive Caution”
♦ PERSONAL HEALTH RECORDS
♦ Privacy and confidentiality
♦ Decision support
♦ Status of the professions

112
Integrative Questions:

1. What is status of proffesions?


2. Define clinical decision support system?
3. what is diagnostic expert system?
4. what is prognostic scoring system?
5. define standard view?

113
The Handbook of Information and Computer Ethics Chapter 13

Chapter: Ethical Issues of Information and Business

Quote:

Ethical issues enter the debate when the justifications of a possible right to be left
alone (Britz, 1999; Velasquez, 1998) are discussed. In principle, these can be divided
into two streams of debate: one that is concerned with data about customers, the other
which deals with privacy of employees. Companies usually have more power over
their employees than their customers. The arguments in defense of employee privacy
are therefore based on stronger ethical concerns. Within the debate about employee
privacy, one can distinguish three groups of reasons for its support. They deal primarily
with the individual person, with society, and with economic considerations.

What I expect to learn:

I expect to learn ethical issues in information and business

Review:

Business ethics is tackled in this chapter. It is shoed how business woks with
ethics, how you need ethics in business. You would need privacy in running a business
you would need to make you customers details private.

What I have learned:

♦ APPROACHES TO ETHICAL ISSUES IN BUSINESS AND


INFORMATION
♦ The Concept of Business
♦ Business Ethics
♦ Shareholders and Stakeholders
♦ Shared Norms and Values
♦ Corporate Social Responsibility
♦ Business Ethics and Computer Ethics
♦ MICROLEVEL INFLUENCE OF BUSINESS ON ETHICS AND
INFORMATION
♦ The Business Value of Information
♦ The Impact of Business on Privacy: Employee Surveillance
♦ The Ethical Response to Employee Surveillance
♦ The Impact of Business on Intellectual Property
♦ The Ethical Response to Intellectual Property Protection

114
♦ THE MACROLEVEL INFLUENCE OF BUSINESS ON ETHICS
AND INFORMATION
♦ Globalization
♦ Digital Divides
♦ The Ethical Response to Globalization and Digital Divides

Integrative Questions:

1. What is globalization?
2. what is digital divides?
3. define business ethics?
4. what is shared norms and values?
5. define the business value of information?

115
The Handbook of Information and Computer Ethics chapter 14

Chapter: Responsibilities for Information on the Internet

Quotes:

Many problems regarding reliability of online information on the Internet are not
problems of information lacking reliability, but of receivers misperceiving or not
perceiving (un-) reliability. In order to pave thewayto discussing this issue, I will, first,
givesome attention to the dimensions of functionality and significance of information.
These dimensions introduce the users perspective.

What I expect to learn:

I expect to learn about responsibilities of information on the internet

Review:

The chapter talks about responsibilities for information on the internet, right? But
are these responsibilities being done? A lot of people are abusing information in the
internet. They use it to destroy and harm other people. They use it to gain money illegally
from other people. They make information over the internet unsafe.

What I have learned:

♦ CONDITIONS OF RESPONSIBILITY
♦ ISPs AND CLEARLY HARMFUL OR OFFENSIVE
INFORMATION
♦ INFORMATION IN GENERAL
♦ THE RESPONSIBILITIES INVOLVED
♦ (1) The creation of new credibility-conferring systems, such as
certification systems, allowing us to use pedigree criteria with regard
to (online) information, when such systems are lacking.
♦ (2) Raising the visibility of indicators or markers of reliability of
information
♦ (according to pedigree criteria).
♦ (3) Raising expertise and background knowledge in all users (to enable
them to recognize reliability on the basis of pedigree criteria).
♦ (4) Raising the awareness of the varying qualities of information.

116
Integrative Questions:

1. What is ISP?
2. Define conditions of responsibility?
3. What is information in general?
4. What are the responsible involved?
5. explain raising awareness of varying qualities.

117
The Handbook of Information and Computer Ethics Chapter 15

Chapter: Virtual Reality and Computer Simulation

Quote:

Virtual reality and computer simulation will continue to present newchallenges for
ethics because newand more advanced applications are still being developed and their
use is more and more widespread. Moreover, as has been argued, virtual environments
can mimic manyof the properties of real life and, therefore, contain manyof the ethical
dilemmas found in real life. It is for this reason that they will continue to present
new ethical challenges not only for professional developers and users but also for
society at large.

What I expect to learn:

I expect to learn Virtual reality and computer simulation:

Review:

The chapter discuses the history of virtual reality. It is actually one of the
successful machines invented. You would get a 3d look or a view. Its one of the pioneers
of information. Nowadays technology improved changing fast to a better technology.

What I have learned:

♦ BACKGROUND: THE TECHNOLOGY AND ITS APPLICATIONS


♦ Virtual Reality
♦ Computer Simulation
♦ Applications
♦ VIRTUALITY AND REALITY
♦ The Distinction between the Virtual and the Real
♦ Is the Distinction Disappearing?
♦ Evaluating the Virtual as a Substitute for the Real
♦ REPRESENTATION AND SIMULATION: ETHICAL ISSUES
♦ Misrepresentations, Biased Representations, and Indecent
Representations
♦ Virtual Child Pornography
♦ Depiction of Real Persons
♦ BEHAVIOR IN VIRTUAL ENVIRONMENTS: ETHICAL ISSUES

118
♦ Avatars, Agency, and Identity
♦ Behavior in Single-User VR
♦ Behavior in Multiuser VR
♦ Virtual Property and Virtual Economies
♦ THE ETHICS OF COMPUTER GAMES
♦ The Goods and Ills of Computer Games
♦ Computer Games and Values
♦ Computer Games and Gender
♦ VIRTUAL REALITY, SIMULATION, AND PROFESSIONAL
ETHICS

Integrative Questions:

1. What is virtual reality?


2. what is the history of virtual reality?
3. Define computer games and values?
4. what is virtual child pornography?
5. what are avatars, agency and identity?

119
The Handbook of Information and Computer Ethics Chapter 16

Chapter: Genetic Information: Epistemological and Ethical Issues

Quote:

But it was not until 1977 that robust and generally applicable sequencing methods
were developed, and even then the modern bioinformatics techniques of gene
discovery was still years away. Although the development of information/processing
by computers proceeded contemporaneously with progress in research into biological
and biochemical information processing, the trajectories of these two initiatives were
never unified even if they sometimes overlapped at various points.

What I expect to learn:

I want to learn details about Epistemological and Ethical Issues

Review:

The way I understood this chapter is information grows thru its history. It would
continue to grow nonstop. Just like a DNA structure, information has its structure as well.
And the structure of information cannot be altered unless it improves to a new
technology.

What I have learned:

♦ INFORMATION THEORY AND THE NOTION OF GENETIC


INFORMATION
♦ The Concept of Information
♦ The Notion of Genetic Information
♦ A SEMANTIC OR A SYNTACTIC THEORY OF GENETIC
INFORMATION
♦ THE CELL AS COMPUTER MACHINERY
♦ Berlinski: Bacterial Cell as Automata
♦ Maynard Smith: Eggs as Computer Machineries
♦ USE AND MISUSE OF MODELS
♦ ETHICAL PROBLEMS OF GENETIC INFORMATION
♦ Ideological Use of a Model and Ethical Issues in Fund-raising
♦ Cooperation and Public Access of Data
♦ Sequence Patenting and the Open Source Challenge

120
Integrative Questions:

1. Define the concept of information?


2. what is a notion of genetic information?
3. what is cooperation and public access of data?
4. what is ethical problems of genetic information?
5. define information theory?

121
The Handbook of Information and Computer Ethics Chapter 17

Chapter: The Ethics of Cyber Conflict

Quote:

All Members shall refrain in their international relations from the threat or use of force
against the territorial integrity or political independence of any state, or in any other
manner inconsistent with the Purposes of the United Nations

What I expect to learn:

I expect to understand the cyber conflict

Review:

The chapter discusses how cyber conflict could happen. How it would go if a
misunderstanding happens. As we all know most of the war weapons now are being
operated via computers. Technology really boomed after world war II, I mean technology
for self defense.

What I have learned:

♦ CYBER WARFARE AT THE STATE LEVEL


♦ Jus ad Bellum—The Law of Conflict Management
♦ When Does a Cyber Attack Constitute the Use of Force?
♦ Severity
♦ Immediacy
♦ Directness.
♦ Invasiveness
♦ Measurability
♦ Presumptive Legitimacy.
♦ Responsibility.
♦ Jus in Bello—The Law of War

122
Integrative Questions:

1. What is severity?
2. what is directness?
3. what is measurability?
4. what is responsibility?
5. When Does a Cyber Attack Constitute the Use of Force?

123
The Handbook of Information and Computer Ethics chapter 18

Chapter: A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection

Quote:

This quantitative approach is utilitarian. The risks that are addressed are those with
the highest risk exposure. All consequences are given dollar values. Even qualitative
risks are turned into a numerical hierarchy (McFarland, 1990). The resulting risk of the
September 11 disaster was calculated in terms of the number of deaths that occurred on
that day or lifetime dollar earnings potential of those who died.

What I expect to learn:

I want to learn what SoDIS inspection is.

Review:

The chapter talks about how person should decide. His faith is on the line. His
future. Everything for technology is on the line.

What I have learned:

♦ EVOLVING PRACTICES FOR RISK ASSESSMENT


♦ Generic Standards for Risk Analysis Models
♦ The Context
♦ Risk Identification
♦ Risk Analysis
♦ Limitations of the Generic Standards
♦ Ethical Risks
♦ SODIS AUDIT PROCESS
♦ Software Development Impact Statement
♦ Stakeholder Identification
♦ SoDIS Stakeholders Identification
♦ Identification of Tasks or Requirements
♦ Identify Potential Ethical Issues
♦ SODIS INSPECTION MODEL
♦ Improve SoDIS Audit with an Inspection Model

124
♦ THE SODIS AND UK ELECTRONIC VOTING REQUIREMENTS
♦ Lessons Learned from the UK Election
♦ Research Insights from UK e-Voting Analysis
♦ Insights Related to Practice from UK e-Voting Analysis
♦ RESEARCH PROJECT

Integrative Questions:

1. What is a research project?


2. define the context
3. what is a risk identification?
4. what is a risk analysis do?
5. Identity potential ethical issues?

125
The Handbook of Information and Computer Ethics Chapter 19

Chapter: Regulation and Governance of the Internet

Quote:

Is there anything wrong as such with individual countries regulating the content of
the Internet in their country? Content includes things such as libelous material,
material protected by intellectual property laws or privacy laws, cultural material
(should there be free trade in cultural objects?), political material, and pornographic
material. We will consider some problems with this later.

What I expect to learn:

I expect to learn how the internet coup up with the law.

Review:

The internet as of now is not being govern properly. A lot of people are abusing it.
No one can own it. But a lot of people act like they own it. There should be laws
implemented on how the internet should work

What I have learned:

♦ CONTENT REGULATION
♦ EFFECTIVE REGULATION
♦ REGULATION: TECHNICAL ISSUES
♦ THE CURRENT SITUATION
♦ ACROSS BORDERS
♦ INTERNET REGULATION: NORMATIVE ISSUES
♦ CENSORSHIP
♦ REGULATION OF THE INTERNET: MORAL ARGUMENTS
♦ OTHER ARGUMENTS
♦ REGULATION AND EFFICIENCY
♦ REGULATION ACROSS LEGAL JURISDICTIONS
♦ CONCLUSION

126
Integrative Questions

1. What is conclusion?
2. define regulation and efficiency?
3. What is censorship?
4. Define across the border?
5. what is an effective regulation?

127
The Handbook of Information and Computer Ethics Chapter 20

Chapter: Information Overload

Quote:

Much of this linguistic transparency seems to have come from the meaning of the
word “overload,” and its root word “load.” The Oxford English Dictionary defines
“load” as “That which is laid upon a person, beast, or vehicle to be carried; a burden.
Also, the amount which usually is or can be carried; e.g., cart-load, horse-load,
wagon-load,” and it defines “overload” as “An excessive load or burden; too great a
load; the condition of being overloaded.” These core meanings speak to the recognition
that a person or an animal (or by extension, a device such as a cart or wagon) is
capable of carrying physical materials and second, that this capacity is finite and can
be exceeded.

What I expect to learn:

I expect to learn about how information overloads.

Review:

Information overload is when a certain topic is taught to you or you learn in by


yourself and at a certain point you don’t’ get what you are studying because you got pre
occupied with the first topic and you are getting confused with the information being
given to you, that’s information overload. To much at the moment.

What I have learned:

♦ WHAT IS INFORMATION OVERLOAD?


♦ What is Information?.
♦ More than Information
♦ Perception or Reality?
♦ A Novel, Recurrent, or Ever-Present Phenomenon?
♦ A BRIEF HISTORY OF THE PHRASE
♦ CAUSES OF INFORMATION OVERLOAD
♦ CONSEQUENCES OF INFORMATION OVERLOAD
♦ CONCLUSION: WHAT CAN BE DONE?

128
Integrative Questions:

1. What is information?
2. What is information overload?
3. Define perception?
4. define reality?
5. what is a conclusion?

129
The Handbook of Information and Computer Ethics Chapter 21

Chapter: Email Spam

Quote:

The struggle against unwanted emails will continue. Ethical analysis can be
useful in analyzing emerging strategies of email senders and email recipients. In
these analyses, ethicists must be careful to look at individual stakeholders as well
as systematic stakeholders; both micro- and macroissues are important. All such
analyses should start with a clear exposition of the characteristics of the emails that
will be considered “spam.” Only then can we discuss with precision the ethics of
spam.

What I expect to learn;

Spam prevention and safety

Review

Since we are at information age, the smarter the spammers are these days, they
know how to attack you, insurance, car load and other explicit things. Its really annoying
at one point you want to destroy your email. But the spam folder sometimes misses the
spam? What to do? Pray that they would pass a law banning email spam.

What I have learned:

♦ A SHORT HISTORY OF THE TERM ‘‘SPAM’’


♦ SEARCHING FOR A CHARACTERIZATION OF ‘‘SPAM’’
♦ Content of the Email
♦ Intent of the Sender
♦ Consequences to the Receiver
♦ Consent of the Receiver
♦ Relationship Between the Sender and the Receiver
♦ The Accountability of the Sender and the Degree of Deception
♦ Number of Identical Emails Sent
♦ Illegality
♦ Size of the Message
♦ ENVISIONING THE SPAM SPACE: SPECIFIC EMAILS EXHIBIT

130
♦ COMBINATIONS OF CHARACTERISTICS
♦ DeceptiveEmailsMeant to Defraud AreCondemned, SpamorNot
♦ Emails Between Well-Meaning Friends Are Probably Not Spam
♦ Unsolicited Commercial Bulk Emails (UCBE)
♦ THE ETHICS OF ANTISPAM MEASURES
♦ The Ethics of Doing Nothing

Integrative Questions

1. what is spam?
2. why are they spamming you and me?
3. What is the intent of the sender?
4. give a possible content of a spam email
5. Is it illegal to spam?

131
The Handbook of Information and Computer Ethics chapter 22

Chapter: The Matter of Plagiarism: What, Why, and If

Quote:

A debate over whether an expression is plagiarism is,


therefore, a debate over the standards for and values inherent in its condemnation. The
present study is an overview of the variety of standards and values that underlie
accusations of plagiarism, with an emphasis on howcomputer technology has changed
the focus for those accusations.

What I expect to learn:

I expect to learn how plagiarism can be prevented

Review

Plagiarism is really bad in this time of the information age. A lot of people tend to
steal ideas of other people. We can borrow their ideas its for free we just have to give
them credit and cite them. Respect for their work in short.

What I have learned:

♦ THE CONCEPT OF PLAGIARISM


♦ LACK OF AUTHORIZATION—ECONOMIC FOUNDATIONS
♦ LACK OF AUTHORIZATION—NATURAL OR MORAL RIGHTS
♦ LACK OF ACCREDITATION—NONINFRINGING PLAGIARISM
♦ A PERSONAL VIEW OF THE MATTER
♦ LITERATURE REVIEW

132
Integrative Questions:

1. What is plagiarism?
2. Is it legal to plagiarize?
3. I would not get caught if I plagiarize?
4. Define the concept of plagiarism?
5. What is literature review?

133
The Handbook of Information and Computer Ethics Chapter 23

Chapter: Intellectual Property: Legal and Moral Challenges of Online File Sharing

Quote:

. . all the goods of the Information Age—all of the expressions once contained in books
or film strips or newsletters—will exist as thought or something very much like thought:
voltage conditions darting around the Net at the speed of light, in conditions that one
might behold in effect, as glowing pixels or transmitted sounds, but never touch or claim
to “own” in the old sense of the word.

What I expect to learn:

I expect to learn moral challenges

Review:

I would admit I am into file sharing, but I have to say I never gained profit from
file sharing. What I do is for personal use only for example music from peer 2 peer
clients. Its not illegal if you don’t gain profit from it.

What I learned:

 PEER-TO-PEER NETWORKS
 SHARING OR THEFT?
 SECONDARY LIABILITY
 MGM V. GROKSTER: A BRIEF HISTORY
 MORAL CONSIDERATIONS

134
Integrative Questions:

1. What is p2p?
2. Is sharing legal?
3. Is in helpful?
4. Give the history of P2p
5. Give an example of a p2p program

135
The Handbook of Information and Computer Ethics Chapter 24

Chapter: Censorship and Access to Expression

Quote:

Fundamental interests in communicating with others, both as speakers and as


hearers. In addition, we have a fundamental interest in accessing expressions based
on individual and collective deliberative and informational interests. Notice that the
focus here is on the primary importance of the capacity of persons to communicate
with each other, rather than on the interest in the freedom of the speaker to speak.
Standard discussions of free expression focus almost exclusively on the importance
of person.s freedom to engage in acts of expression. However, it is less often noted
that such expressions are fundamentally acts of communication. If persons do not
have the right to receive information so expressed, the act of communication is
prohibited.

What I expect to learn:

Censorship and access in information technology.

Review:

The chapter discusses the censorship. They are blocking or not allowing access.
This may happen to certain sites if you use a proxy setting in a workplace, school or a
restricted area.

What I have learned:

 THE INTEREST IN ACCESS TO EXPRESSION


 DEFINING CENSORSHIP
 TYPES OF HARM AND ARGUMENTS AGAINST CENSORSHIP
 Inherently Harmful Access
 Instrumentally Harmful Access.

136
Integrative Questions:

1. What is censorship?
2. Define censorship?
3. Give the types of harms?
4. Is it harmful?
5. what is censorship for?

137
The Handbook of Information and Computer Ethics Chapter25

Chapter: The Gender Agenda in Computer Ethics

Quote:

These studies belong to a particular genre of research strongly representative of the


business and management literature, a style of research that perpetuates its approach
without substantial inroads from other types of research.

What do you expect to learn:

I expect to learn more details about gender agenda in computer ethics.

Review:

The chapter discussed that no matter what gender you are you are supposed to be
equal with the other person. Everybody has the same rights, male female or of the third
kind. Its ethical to give respect. We should know how to blend with people. After all they
are also human.

What I have learned:

 FEMINIST ETHICS
 GENDER AND COMPUTER ETHICS—A MALE–FEMALE BINARY?
 GENDER AND COMPUTER ETHICS STUDIES
 Student Population
 Quantitative Versus Qualitative Research Methodologies
 What is Ethical Behavior?
 The Undertheorizing of Gender and Ethics
 WOMEN IN COMPUTING—AN ALTERNATIVE APPROACH

138
Integrative Questions:

1. define feminist ethics?


2. Define student population?
3. What is qualitative research?
4. what is quantitative research?
5. Why shouldn’t be there female discrimination?

139
The Handbook of Information and Computer Ethics Chapter 26

Chapter: The Digital Divide: A Perspective for the Future

Quote:

There are gaps in access to information and information communication technologies


within nations and between nations.Within the United States, for example, there are
such gaps between rich and poor citizens, whites and blacks, and urban dwellers and
rural dwellers. According to the U.S. Department of Commerce (1999),

What I expect to learn:

I expect to learn Digital division and perspective for the future:

Review:

People should start making changes, the changes needed in information


technology. The cyberspace really need more people it can help a lot of people still have
not yet touched a computer in their entire life. So we need to reach out to this people
introduce technology to them.

Things that I have learned:

 THE BIDIRECTIONAL RELATIONSHIP BETWEEN ABSOLUTE POVERTY


AND THE DIGITAL AND INFORMATION DIVIDES
 THE MORAL BASIS FOR THE IDEA DIVIDES SHOULD BE ELIMINATED
 EMPIRICAL SKEPTICISM ABOUT THE RELATIONSHIP BETWEEN
DIGITAL DIVIDES AND ABSOLUTE POVERTY
 Meanings
 Expectations
 Empirical Studies Illustrating Perceived Failures
 Bridges and Questions

140
Integrative Questions:

1. Define bridges and questions:


2. Define expectations?
3. what is empirical studies?
4. what is digital divides?
5. Define poverty?

141
The Handbook of Information and Computer Ethics Chapter 27

Chapter: Intercultural Information Ethics

Quote:

Morality is objective in the sense of being true or false in virtue of mindindependent


facts about the world—and not in virtue of what cultures or
individuals think about them (i.e., moral objectivism);

What I expect to learn:

I expect to gain knowledge on inter cultural ethics

What I learned:

This chapter is explains how morality should be implemented when connecting it


with information technology. The whole chapter is actually detailed based on the earlier
chapters. I have to say that we need to step up together to fight against cyber crime
female discrimination and illegal activities.

What I have learned:

 THE FOUNDATIONAL DEBATE


 On the Foundation of IIE
 THE IMPACT OF ICT ON LOCAL CULTURES FROM AN IIE
PERSPECTIVE
 Asia and the Pacific
 SPECIAL ISSUES
 Privacy
 Intellectual Property

142
Integrative Question:

1. Define intellectual property?


2. what is privacy?
3. what is special issues?
4. what is the cultural perspective
5. what is the foundational debate?

143
The Fortune at the Bottom of the Pyramid Chapter 1

Chapter: The Market at the Bottom of the Pyramid

Quote:

Actually they pay the ‘poverty penalty’ of up


to 5 - 25 times; a result of local monopolies,
inadequate access, poor distribution, and strong
traditional intermediaries.

What I expect to learn;

I expect to learn the market at the bottom of the pyramid

Review:

It is quite shocking that the bottom of the pyramid spends a lot more money that
the people at the top. The bottom pyramid has been monopolized and those people
capitalized on their weaknesses. For me if you should target the ghetto market you should
make a reasonable price, I noticed they paid more which is not fair for them.

What I have learned:

 ‘poverty penalty’
 Density of urban settlements
 The challenge lies in making
 aspirational products affordable.
 they are rapidly exploiting the benefits of information networks.
 Creating the capacity to consume
 •Needs to be accessed differently
 Small unit packs, single-serve
 Innovative purchase schemes (credit)
3 simple principles:
 – Affordability
 – Access
 – Availability

144
Integrative Question:

1. Is it fair for the bottom of the pyramid to be treated that way?


2. Define how they spend more?
3. Are they creating a capacity to consume?
4. Can they afford some expensive materials?
5. describe density in urban settlemen

145
The Fortune at the Bottom of the Pyramid Chapter 2

Chapter: Products and Services for the BOP

Quote:

Product development must start from a deep


understanding of functionality, not just form;
marginal changes to products for non-BOP markets
will not do

What I expect to learn:

I expect to learn different innovative products and services at the bottom of the
pyramid.

Review:

It is discussed here that if you were to start a business you should know which
area you should target. You should find your target market by determining what they
want and need. You can determine it by asking canvassing and surveying. Try to
place it in a reasonable price, not to high not to low. I would use that motive if I were
to start my own business

What I have learned

1. Price performance
2. Innovation: hybrids
3. Scale of operations
4. Sustainable development: eco-friendly
5. Identifying functionality: is it different?
6. Process innovations
7. Deskilling of work
8. Education of customers
9. Designing for hostile infrastructure
10.Interfaces
11. Distribution: accessing the customer
12.Challenging conventional wisdom

146
Integrative Question:

1. What are the 12 principles of BOP markets?


2. What is process innovations?
3. what is challenging conventional wisdom
4. define interfaces?
5. what is distribution accessing the customer?

147
The Fortune at the Bottom of the Pyramid Chapter 3

Chapter: BOP: A Global Opportunity

Quote:

We have grown literally afraid to be poor. We despise anyone who elects to be poor
in order to simplify and save his inner life. If he does not join the general scramble
and pant with the money-making street, we deem him spiritless and lacking in
ambition. ~William James

What I expect to learn:

I expect to learn to take advantage of a global opportunity

Review:

This chapters thinking is they would target an opportunity to capitalize on it. Its
like a change why would you let go if it is already. You have to target what people
want and need. A lot of people would not go for the expensive product, but I gurantee
you they would go for the replica.

What I have learned:

 Engaging the BOP


 Local growth opportunities
 Local innovations and global opportunity
 BOP solutions for developed markets
 Innovations
 The costs of managing

148
Integrative Questions:

1. What is bop?
2. Define innovation?
3. define cost of managing?
4. What is local growth opputunities
5. what is local innovation?

149
The Fortune at the Bottom of the Pyramid Chapter 4

Chapter: The Ecosystem for Wealth Creation

Quote:

The poverty of our century is unlike that of any other. It is not, as poverty was before,
the result of natural scarcity, but of a set of priorities imposed upon the rest of the world
by the rich. Consequently, the modern poor are not pitied...but written off as trash. The
twentieth-century consumer economy has produced the first culture for which a beggar is
a reminder of nothing. ~John Berger

What I expect to learn:

I expect to learn about the safety of the ecosystem for wealth creaton.

Review:

This chapter tells that companies are not friendly with the environment. These
company gain big money but what happens to the nature? Nothing the nature is just
destroyed while they are sitting home gaining money and enjoying themselves. Some sell
low quality product. They should satisfy the customer with cleanliness.

What I have learned:

 The ecosystem
 The ecosystem for wealth creation
 Organization of the group
 Learning the sanctity of contracts
 Reducing inequalities in contracts

150
Integrative questions;

1. Is ethics applied to the following chapter?


2. Define the ecosystem
3. what is ecosystem for wealth creation
4. what is organization of the group amongs the poor?
5. Should they reduce inequalities?

151
The Fortune at the Bottom of the Pyramid chapter 5

Chapter: Reducing Corruption: Transaction Governance Capacity

Quote:

However mean your life is, meet it and live it: do not shun it and call it hard names.
Cultivate poverty like a garden herb, like sage. Do not trouble yourself much to get new
things, whether clothes or friends. Things do not change, we change. Sell your clothes
and keep your thoughts

. ~Henry David Thoreau

What I expect to learn:

I expect to learn how to reduce corruption

Review:

The corruption scheme it never goes away. This chapter explains why corruption
should be terminated in order to make the government more trustable. We know that
poverty starts from corruption if we prevent it we may have a better future.

What I have learned:

 TGC
 The Andhra Pradesh e-Governance Story
 Building TGC
 Corruption and e-governance
 principles of the CGG in Andhra Pradesh

152
Integrative Question

1. What is corruption?
2. what is Andhra Pradesh?
3. what is e-governance?
4. what is TGC
5. what is e-governance story

153
The Fortune at the Bottom of the Pyramid chapter 7

Chapter: Development as Social Transformation

Quote:

For each new morning with its light,


For rest and shelter of the night,
For health and food, for love and friends,
For everything Thy goodness sends.

~Ralph Waldo Emerson

What I expect to learn:

I expect to learn development in social transformation.

Review;

The chapter discusses the development of the BOP. If you start the business you
would have to target the lower part of the crowd. You should get close to the crowd and
you should get to know the people on the bottom. You must have balance between the
pyramid, but target the poor area but you have to give a reasonable price.

What I have learned:

 BOP consumers upgrade


 private sector and the BOP
 rural income distribution
 checks and balances

154
Integrative Question;

1. What is consumer upgrade?


2. what is checks?
3. what is balances?
4. does rural income have a factor?
5. who do you target?

155

You might also like