You are on page 1of 101

qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjk

lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiop
lzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiop
asdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmq
A Compilation of Three Ethical
wertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklz
Books
for ethical enthusiasts readers
xcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopa
4/15/2009

Marlo la O’

sdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwe
rtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcv
bnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdf
bnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopas
This work is licensed under a Creative Commons
Attribution-Noncommercial-Share Alike 3.0

dfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwer
Philippines License.

tyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcv
tyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcv
i

bnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdf
Table of Contents
Preface

Dedication

The Fortune at the Bottom of the Pyramid


Chapters:
 The Market at the Bottom of the Pyramid
 Products and Services for the BOP
 BOP: A Global Opportunity
 The Ecosystem for Wealth Creation
 Reducing Corruption: Transaction Governance Capacity
 Development as Social Transformation

The Handbook of Information and Computer Ethics


Chapters:
 Foundations of Information Ethics
 Milestones in the History of Information and Computer Ethics
 Moral Methodology and Information Technology
 Value Sensitive Design and Information Systems
 Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual
Property
 Informational Privacy: Concepts, Theories, and Controversies
 Online Anonymity
 Ethical Issues Involving Computer Security: Hacking, Hacktivism, and
Counterhacking
 Information Ethics and the Library Profession
 Ethical Interest in Free and Open Source Software
 Internet Research Ethics: The Field and Its Critical Issues
 Health Information Technology: Challenges in Ethics, Science, and Uncertainty
 Ethical Issues of Information and Business
 Responsibilities for Information on the Internet
 Virtual Reality and Computer Simulation
 Genetic Information: Epistemological and Ethical Issues
 The Ethics of Cyber Conflict
 A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection
 Regulation and Governance of the Internet
 Information Overload
 Email Spam
 The Matter of Plagiarism: What, Why, and If
 Intellectual Property: Legal and Moral Challenges of Online File Sharing
 Censorship and Access to Expression
 The Gender Agenda in Computer Ethics
ii
 The Digital Divide: A Perspective for the Future
 Intercultural Information Ethics

Cyber Ethics
Chapters:
 Ethics and the Information Revolution
 Ethics On-Line
 Reason, Relativity, and Responsibility in Computer Ethics
 Disclosive Computer Ethics
 Gender and Computer Ethics
 Is the Global Information Infrastructure a Democratic Technology
 Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key
Problems and Challenges
 Just Consequentialism and Computing
 The Internet as Public Space: Concepts, Issues, and Implications in Public Policy
 The Laws of Cyberspace
 Of Black Holes and Decentralized Law-Making in Cyberspace
 Fahrenheit 451 2: Is Cyberspace Burning
 Filtering the Internet in the USA: Free Speech Denied
 Censorship, the Internet, and the Child Pornography Law of 1996: A Critique
 PICS: Internet Access Controls Without Censorship
 Internet Service Providers and Defamation: New Standards of Liability
 Digital Millennium Copyright Act
 Note on the DeCSS Trial
 A Politics of Intellectual Property: Environmentalism for the Net
 Intellectual Property, Information, and the Common Good
 Is Copyright Ethical An Examination of the Theories, Laws, and Practices
Regarding the Private
 On the Web, Plagiarism Matters More Than Copyright Piracy
 An Ethical Evaluation of Web Site Linking
 The Cathedral and the Bazaar
 Towards A Theory of Piracy for the Information Age
 The Structure of Rights in Directive 95 46 EC
 Privacy Protection, Control of Information, and Privacy-Enhancing Technologies
 Toward an Approach to Privacy in Public: Challenges of Information Technology
 KDD, Privacy, Individuality, and Fairness
 Data Mining and Privacy
 Workplace Surveillance, Privacy, and Distributive Justice
 Privacy and Varieties of Informational Wrongdoing
 PICS: Internet Access Controls Without Censorship
 Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in
Cyberspace
 Terrorism or Civil Disobedience: Toward a Hacktivist Ethic
 Web Security and Privacy: An American Perspective
 The Meaning of Anonymity in an Information Age

iii
 Written on the Body: Biometrics and Identity
 Ethical Considerations for the Information Professions
 Software Engineering Code of Ethics: Approved
 No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All
 Subsumption Ethics
 Ethical Issues in Business Computing
 The Practitioner from Within: Revisiting The Virtues

iv
Preface
This is a book review which I have made for my ITETHIC class. As a third year
student I have never done this in my entire life and I am really surprised and at the same
time really happy that I was able to submit a book review on four book mainly about
ethics and applying it to IT, which is basically right know the concept
of my course that I am right know taking.

This is just a book review of three books: The Fortune at the bottom of the
Pyramid, The Handbook of Information and Computer Ethics, and Cyber Ethics. Out of
the three books the Cyber Ethics is the longest and discusses mainly about the right and
wrong stuffs about the cyber world and it is really about. The second book if about
applying ethics and the right information into the computer, basically it also tells the
same thing about the right thing to do and what not to do, and to avoid doing.

My favorite one is the book BOP or also known as The Fortune at the Bottom of
the Pyramid, and that title is self just sound already interesting for me. Did not curiosity
cross your mind about what really the book is all about? Well, the first thing that usually
comes to people’s mind when they hear abut the title is the word fortune that it’s
highlighted well to some extent it its quite true the book tell us about what we are
missing at the bottom of the pyramid, and why the bottom most part is so big and wide
compared to the top or at the pick of the pyramid, only a sharp point. Well I don’t want
to spoil you, just read my reviews about it, or better yet read the book it will be fun!

Hope you enjoy reading!

v
Dedication

To My Family
Who has always been there for me and supported me on anything I want, and
appreciates for who and what I am, and for wanting only what is best for me. Thank you
so much!

To God
Who is always by my side, the most parent father I have that is always willing to
give what I also best for me. He has always been merciful and shows kindness towards
me, and never fails to forgive me. Thank you so much!

To My Friends
Who were always there for me when ever I need a help and there for me when
ever I have a problem. They are the one’s who shows me what true friendship really ism
that nothing can be impossible as long as I believe in my self. Thank you so much for
everything and for appreciating who I am!

To Sir Pajo
Thank you so much for everything; even though this was a very hard task the
reward was great! You really know how to test our limits as your students and having
faith in us at the same time that we can submit to you the requirements.

vi
A Compilation of Three Ethical Books

The Fortune at the Bottom of the Pyramid

Book Title
The Fortune at the Bottom of the Pyramid by C.K. Prahalad

Chapter Book Review


The Market at the Bottom of the Pyramid

Library Reference: N/A

Amazon Link: http://www.amazon.com/Fortune-at-


BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2

Quote
“The dominant assumption it that the poor have no purchasing power and therefore do not
represent a viable market”

What I expected to learn


The opportunities that awaits opening the fortunes at the bottom of the pyramid.

Chapter Review
We are all victims of being poisoned by the power of our own dominant logic. We never
tend to explore what is outside of our “own world” that we rely on and are comfortable on we tend
to stay at our own “comfort zone” and we are a firm believer by our own belief the things we hear
everyday and the values we also learn. We never open our minds to the capabilities of the power
the people at the most bottom part of the pyramid are able to do. Their number in quantity is far
greater than the number of quantity at most top part of the pyramid. Their potentials as market
consumers and buyers has to be unlock. One reason their purchasing power is very minimum is
the fact that they only earn less than $2 a day. The poor are also brand conscious yet they know
how to save their income to survive and provide the basic needs at the end of the day. Large
markets should make it accessible. If you look at it closely you can see that they are willing
enough to make a change to their lifestyle, by just given the chance to do so. Some that live in
the rural places have less no access to any sort of media or communication, unlike the rich
people that live in the urban place have wireless networks, are familiar with the use of an internet
as there source of world wide web or “library”. If the poor are only given the access to these
things it could improve their livelihood better then we imagine, including their logistics, they could
have access to different stores and also countries around the world. They will not be afraid to try
new things or technologies. You can picture the poor people as like babies interested to this
technology and how it works; they the poor people will not be afraid to make mistakes. Given the
opportunity also by multinational companies to trust this people, they can be an asset to their
income. Providing affordable prices to their product the poor people can have access to, and at
the same time spreading out their branches to different sectors of the world or country, or to the
places of their own rural places. Little by little people I the urban sector will be unfamiliar with the
new product that they can have access to, and will be able to buy them for a cheap cost. BOP’S
are also smart business people if only given the chance and the right equipment to start their own
jobs. A good example is how farmers could improve their logistics by given them a computer to
be able to access different markets around the world to have a glimpse of what is happening
around the world, and being able to have an idea on how to sell their products and at what cost to
place in the market. This could also improve a lot on their logistics and on there selling strategy.
First of all the multinational companies must learn how to earn the trust of these people in order
to become and generate good team play with them. Making product small enough and therefore
affordable for the poor is the obvious logic, because the poor can not strategies on what to buy

7
A Compilation of Three Ethical Books

for a more convenient inventory space. While, the rich can afford even the large number of
quantities to be able to save enough space for their inventory, single-served packages has
become a trend to poor people to be able the have access to large quantities of products and at
the same time being conservative to their usage of money. Making quality and the same time
healthy food and beverages for the poor is also a big help for them. Because if you live with them
for only a week and you are among the elite members or at the most top part of the pyramid, you
will be shocked on the livelihood the people at the bottom of the pyramid are eating and drinking
everyday. While, you as a member of the elite could afford to buy expensive healthy food and
drinks, these poor people you will see can only afford to buy enough or even not being able to eat
three time day, and just get left over foods from garbage’s in the streets, that were just thrown
away by the rich people. These people also deserve health and good quality products at a cheap,
and affordable price for them to be able to buy.

Lesson Learned

I have learned that there are people out there especially the one's at the bottom of the
pyramid who are determined to learn and change thkeir own loves if given the cahnce to have a
better life. To be able to have just even the basic necessity in life like food to eat, shelter, cloth to
wear all these three basic neccessities, becaues there are people out there that are just
neglected and are not given the chance to live abetter life, and to see the whole world if they are
given technologies the they could have access to and communicate world wide. It is true that they
are the one's unfamiliar with technology, but if you give them a a cellphone for example they will
not be afirad to try out different things, because they are unfamiliar with it they are like a baby
curious of what it can do, and does not care if they make a mistake or even break it just to
explore what it can really do.

Integrative Questions:

1. What is Dominant Logic?


2. Are people at the bottom of the pyramid treated fairly and equally as the one's at the top of
the pyramid?
3. What is BOP?
4. Can you survive given only $2 dollars a day, provided you have a family to feed?
5. Is Wifi accessible in the urban places?

8
A Compilation of Three Ethical Books

Book Title
The Fortune at the Bottom of the Pyramid by C.K. Prahalad

Chapter Book Review


Products and Services for the BOP

Library Reference: N/A

Amazon Link: http://www.amazon.com/Fortune-at-


BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2

Quote
“By its very nature, success in BOP markets will break existing paradigms”

What I Expect to Learn


Knowing the right product and services need by the BOP market to help them grow.

Chapter Review
Billions of money were wasted by the developmental countries just trying to treat the
water of the western part, and only resulted to a failure because of lack of electricity supply,
chemical and spare parts just to operate the machine. Finding the right technology for the right
market may be a little challenging to the MNC managers. The twelve principles require significant
adaptation, prioritizing which principle to use. Bop market can represent an opportunity to create
an economic value in a fundamental new way. Imagine lowering the price a bit, more people are
willing to enter your market. If you let the BOP markets have access to surgical care for only $50
dollars rather than $300 dollars, and give them access to financial services, giving them a new
idea of saving their own money in the bank. Thinning of the BOP market expectation in large-
volume, low-risk, and high-return-on-capital employed business can open you doors to plenty of
opportunities. BOP markets also need state of the art technologies that are advanced and
existing infrastructures. With the help of these hybrid technologies farmers like in the urban
places can becomes part of a global network without leaving their homes. Both the NGO and
MNC need to work together produce systems or operations that are scalable for the BOP market,
not just in one country in should be for the whole BOP market globally and the operations should
be flexible. Comparing a population of at least 5 billion people, solutions should be ecologically
friendly. Making your design flexible to different kinds of markets and at the same time long
lasting, and cheap for the BOP to afford these prices, will be a great accomplishment. BOP can
be a source of surprise on how rapidly new technologies are acceptable and assimilated.

Lessoned Learned
The effort put p and all the energy boasted to provide innovation for the BOP market will
be definitely rewarding in the end. Helping to innovate the BOP market will not only critical but it
has become a must. This will us change the way we think and challenge our way of thinking also.
The price of the product is equally important with the performance associated with the price.
Word of mouth is so powerful that the costumers seem to have found an efficient process for
evaluating price-performance options available to them. Serving the BOP markets is what I
believed will bring more innovative and sustainable solutions. The key to success is a careful
consideration of process innovation maintaining the local infrastructure and bringing the most
advanced facilities. Going to a simple, an uneducated place like a place where they know the
causes of diarrhea because they don’t know how to look out for germs, and teaching them the
values and the essence of the causes of bacteria could change the way they live their life. doing
research about a particular place before giving out your idea would be a more practical approach
then saying this is better because this is what is use, you should consider other facts such as the
place itself is this technology is suitable for that place or not, and what is the right approach to
make a better change in helping the life of the people there.

5
A Compilation of Three Ethical Books

Integrative Questions
1. What is innovation?
2. What are the 12 principles of innovation?
3. Is philosophy helpful giving the twelve principles?
4. What is price performance envelope?
5. What is a hybrid product?

6
A Compilation of Three Ethical Books

Book Title
The Fortune at the Bottom of the Pyramid by C.K. Prahalad

Chapter Book review


BOP: A Global Opportunity

Library Reference: N/A

Amazon Link: http://www.amazon.com/Fortune-at-


BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2

Quote
“What is a local innovation can bring fame and fortune and become a global opportunity.”

What I expected to learn


How can a local innovations turn into a global opportunity?

Chapter Review
Before we make suggestions on what product to sell or put n the BOP market, and what
technology to implement, we must consider the fact that the traditional approach honed in the
developed markets; the top of the pyramid and their comfort zone will not work in the BOP
market. MNCs have to change their way of managing they must understand first the nature and
the requirements of the BOP. Creating a system that is cheaper and at the same time better in
quality. Changes in new product and services that played out over 15 years in the developed
markets must be collapse into a shorter period for the BOP market to just a limit of 5 years.
Manager have o cope with the “I” curve instead of the traditional “S” curve. Since the BOP market
forces an extraordinary emphasis on price performance and the efficiency of capital usage, MNCs
must there way of managing systems in the BOP market, they must focus on the operations on
cost. The judicious use of capital is a critical element of success in BOP markets. The important
part is to know how to separate gross margins form the return on capital employed (ROCE). We
must put into considerations that the resources in the BOP market are scarce and expensive,
thus BOP customers are much attuned to the total cost of ownership. MNCs must find solutions
to these problems. BOP direct their attention to the objective and subjective performance of the
product and services this means that innovation must be value-oriented and form the customers
point of view. An example of good cost managing is the ICICI bank; they have built an
organization system that is quite unique. They have coordinate employees who helped project
managers with the approval of loans and developing new SHGs. The coordinators oversee the
performance of the promoters, because the responsibility of the promoters is to form 20 groups
per year, and their task is not just to understand the village culture but also to become part of it.
By being able to speak the language, and become identifiable by the local communities.
Developing a new relationship between the firm and its customers, knowing her village it can
influence the buying decisions of the villagers.

Lesson Learned
Learning form the different way that we manage in the BOP market can be also be adapt
to the top of the pyramid. Some innovations in the BOP market and also be applicable in the
developed markets. What has been a local innovation in the BOP market has turned out to be a
success in the developed markets. Systems that are simple and device-agnostic, robust, needs
few skills and low-cost has been implemented in the BOP market, and now are also being used
and being globally distributed in the developed markets as well. New business models are
developed from serving the BOP market management systems that are concerned with price
performance level must not be put into consideration when it is in the BOP market because it will
not satisfy the demands of the BOP. Some MNCs have already focused their attention on
examining the implementations of their own operations in the BOP for global operation purposes.

7
A Compilation of Three Ethical Books

Because of the unique management system of the ICICI bank the local communities are able to
make their own decisions, being accountable they feel a sense of self-esteem, and they can deal
with large firms on an equal level.

Integrative Questions
1. What is Voxiva?
2. What is IDD?
3. Where is IDD most common?
4. What is the difference between the “I” curve compared to the “S” curve?
5. What is SHG?

8
A Compilation of Three Ethical Books

Book Title
Fortune at the Bottom of the Pyramid by C.K. Prahalad

Chapter Book Review


The Ecosystem for Wealth Creation

Library Reference: N/A

Amazon Link: http://www.amazon.com/Fortune-at-


BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2

Quote
“A business system is at the heart of the ecosystem for wealth creation”

What I Expect To Learn


How can an ecosystem produce wealth in the BOP sector?

Chapter Review
Each constitution of the system has a role to play lets take a look at the MNCs they are
well-developed and full functioning private sector but they are not oriented into the creation of
wealth towards those living in the BOP. Forming harmony among different “ecosystems” can
generate different tradition, motivations, sizes, and areas of influences acting together and
creating wealth in symbolic relationship. The growth of one ecosystem compared to the other is
entirely different, but the development should not be the focused in why and how it has developed
that should be the focus of an ecosystem. Providing the framework, the intellectual direction, and
the processes on how the system is governed and operated is more important then having legal
control and direct influence on the entire elements of the system. Take HL for example expertise,
technical standards that should be followed are provided by HLL to its ecosystem. HLL also is the
one who set the level of quality and matches those qualities with global standards and local
needs. Educating by helping your won employee is a win-win symbolic relationship for all.
Because of the training and mutual obligations employees follow and respect for contracts given
by the company employees are well informed, educated, and financially successful, they also
seek and have access to similar information on products and features. The ITC greatly benefited
the farmers way of life, and not their life but also their way of thinking the “connectivity” is a must
for them. The e-Choupal system benefited the farmers, by asymmetry in the access o
information, asymmetry in choice, in the ability to enforce contracts, and in the social standing. It
changed the inequalities that the extralegal and quasi-legal systems imposed on BOP consumers
and producers in developing countries. The farmers can independently obtain information

Lesson Learned
It is true when they say that one can not stand alone, that you can not carry the weight of
world all alone you need all the help you can get. Being an owner of the system does not mean
anything unless you have a set of guidelines or rule which you entire ecosystem must abide by.
Access, influence quality standards, and mutual obligations, commitment to contractual
relationships, and set of values are all important factors than showing or having ownership.
Education and well equipped tools for the poor and disadvantage part of the world could give
those great benefits such us connections with the rest of the world in a mutual beneficial and non-
exploitative way. Information is a vital key to doing business, because with information you when,
how, and what to do with your products and your own process.

Chapter Review
1. What is wealth creation?
2. What is a private-sector from a BOP perspective point of view?
3. What is SME?

9
A Compilation of Three Ethical Books

4. What is a market-based ecosystem?


5. What is FMCG?

Book Title
The fortune at the Bottom of the Pyramid by C.K. Prahalad

Chapter Book Review


Reducing Corruption: Transaction Governance Capacity.

Library Reference: N/A

Amazon Link: http://www.amazon.com/Fortune-at-


BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2

Quote
“With great power comes great responsibility”

What I Expect to Learn


How can we solve corruption or lessen it.

Review
I would agree the poor countries are poor because of their poor capital, but has is rich in
assets. But these can change if the law of contracts has a clear legal law, and clearly states the
ownership of assets, if this concept if applied then legal ownership will convert their assets into
capitals. Laws are made, are written and are implemented but it is how they are implemented
through a system of micro regulations that matters. And these regulations are interpreted by the
bureaucrats, thus if these micro regulations are increased then it is good as saying that laws are
underdeveloped because it is corrupted by the governments it self, unless these rules are
transparent, clearly stated and understood, and transactions in the process are clear and not
ambiguous. Eliminating uncertainty and risk in commercial transactions should be one of our
goals; automating system of services to avoid corruptions in the process might be the key to
solve unfair treatments of citizens by the government. But the system it self need the trust of the
people and there further enhance their confidence they must be also able to see that it is cheaper
to be inside the system than outside the system. The assurance of high quality in the service is a
must see and must be believed and showed to the citizen, once the whole process of the system
is adjusted to an automated process.

Lesson Learned
I guess if we see the whole process itself on how they are done and understand them
clearly then maybe we can as a citizen reduce corruption itself. Because for me the only reason
why the government is corrupted is because he is the one who makes the law and enforces it to
us citizens. If we can learn to trust the automated systems then maybe it would also help us, if we
suggest better automated systems to reduce corruption it would be better for us citizens. It is a
shame that even the BOP markets are being scammed by the officials of higher “power” or
positions. Like farmers are being cheated on the price for a certain weight for example of their
products that they bring to the market

Integrative Questions
1. What is TGC?
2. How can inside the system > outside the system?
3. How can CGG help monitor the PMS?
4. What is PMS?
5. what is the Andhra Pradesh company all about?

10
A Compilation of Three Ethical Books

Book Title
The fortune at the Bottom of the Pyramid by C.K. Prahalad

Book Review Chapter


Development as Social Transformation

Library Reference: N/A

Amazon Link: http://www.amazon.com/Fortune-at-


BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2

Quote
“More important, social transformation is about the number of people who believe that
they can aspire to the middle class lifestyle.”

Learning Expectation
What it means to transform the society and elevate the BOP.

Chapter Review
There are three transitions that stated in this chapter, first, we demonstrated that the BOP
the poor can be a market. Second, once we accept the BP markets as a market, the only way to
serve that market is to innovate. The BOP demands a range of innovations in products and
services, business models, and management processes. Third, these innovations must be
accompanied by increased TGC, making the government accountable to the citizens ad making
it accessible and transparent. As Bop consumers get an opportunity to participate in a benefit
from the choices of products and services made available through market mechanisms, the
accompanying social and economic transformation can be very rapid. The reason for this is that
BOP consumers are very entrepreneurial and can easily imagine ways in which they can use
their newly found access to information, choice and infrastructure. One of the common problems
for those at the BOP is that they have no 'identity”. Often they are the fringe of society and do not
have a “legal identity” including voter registration, drivers license or birth certificate. the
instruments of legal identity that we take for granted---be it a passport or a Social Security
Number are denied to them. For all purposes they do not exist as legal entities. Because they do
not have legal existence, they cannot be the beneficiaries of a society. The importance of legal
identity cannot be underestimated. Without it, BOP consumers cannot access we take for
granted. The important social transformation is about the number of people who believe that they
can aspire to middle class lifestyle. It is the growing evidence of opportunity, role models, and real
signals of change that allow people to change their aspirations.

Learning Expectation
People in the BOP now have greater chances to upgrade their livelihoods with the help of
us contributing to their daily lives, making changes that will last a long time. New opportunities are
given to them, they can now have access to legal identities and participate in the society without
being discriminated and being looked down on. The emancipation of women is an important part
of building markets at BOP. Empowered, organized, networked, and active women are changing
the social fabric of society.

Integrative Questions:
1. How will these changes impact life of BOP?
2. If the involvement of the private sector in BOP markets can have such significant impact
on social transformation, do we need check ad balance ?
3. What is really Social Transformation?
4. If we follow the approach what will be the impact will it have on the BOP consumer?
5. How will the lives of Bop consumers change if they will follow the approach?

11
A Compilation of Three Ethical Books

Book Title
The fortune at the Bottom of the Pyramid by C.K. Prahalad

Chapter Book Review


Reducing Corruption: Transaction Governance Capacity.

Library Reference: N/A

Amazon Link: http://www.amazon.com/Fortune-at-


BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2

Quote
“With great power comes great responsibility”

What I Expect to Learn


How can we solve corruption or lessen it.

Review
I would agree the poor countries are poor because of their poor capital, but has is rich in
assets. But these can change if the law of contracts has a clear legal law, and clearly states the
ownership of assets, if this concept if applied then legal ownership will convert their assets into
capitals. Laws are made, are written and are implemented but it is how they are implemented
through a system of micro regulations that matters. And these regulations are interpreted by the
bureaucrats, thus if these micro regulations are increased then it is good as saying that laws are
underdeveloped because it is corrupted by the governments it self, unless these rules are
transparent, clearly stated and understood, and transactions in the process are clear and not
ambiguous. Eliminating uncertainty and risk in commercial transactions should be one of our
goals; automating system of services to avoid corruptions in the process might be the key to
solve unfair treatments of citizens by the government. But the system it self need the trust of the
people and there further enhance their confidence they must be also able to see that it is cheaper
to be inside the system than outside the system. The assurance of high quality in the service is a
must see and must be believed and showed to the citizen, once the whole process of the system
is adjusted to an automated process.

Lesson Learned
I guess if we see the whole process itself on how they are done and understand them
clearly then maybe we can as a citizen reduce corruption itself. Because for me the only reason
why the government is corrupted is because he is the one who makes the law and enforces it to
us citizens. If we can learn to trust the automated systems then maybe it would also help us, if we
suggest better automated systems to reduce corruption it would be better for us citizens. It is a
shame that even the BOP markets are being scammed by the officials of higher “power” or
positions. Like farmers are being cheated on the price for a certain weight for example of their
products that they bring to the market

Integrative Questions
6. What is TGC?
7. How can inside the system > outside the system?
8. How can CGG help monitor the PMS?
9. What is PMS?
10. what is the Andhra Pradesh company all about?

12
A Compilation of Three Ethical Books

The Handbook of Information and Computer Ethics

Book Title
The Handbook of Informastion and Computer Ethics

Book Review Chapter


Foundations of Information Ethics

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know and gain knowledge about Foundations of Information Ethics

Chapter Review
This chapter of the book is called Foundations of Information Ethics. I would like to say
this part “An information ethics should be able to address and solve the ethical challenges arising
in the infosphere.” I think this is somewhat right because we are in the information age but
nothing is what is seems. Because as said in the book the more the better or such as information
is given to you, like in some government movies for example “A Few Good Men by Aaron Sorkin”
jack Nicholson said “you want the truth, you can’t handle the truth”. Back to the book, to much
information is not good to your health because some information might be useless or some are in
a grave importance. My point is. Like Einstein’s letters “A human being is part of the whole, called
by us ‘universe,’ a part limited in time and space. He experiences himself, his thoughts and
feelings, as something separated from the rest, a kind of optical delusion of his consciousness.
This delusion is a kind of prison for us, restricting us to our personal desires and to affection for a
few persons close to us. Our task must be to free ourselves from our prison by widening our circle
of compassion to embrace all humanity and the whole of nature in its beauty.” It saying that
beauty can be appreciated but not alone can we see it but sometimes we need some others point
of view to see what is really the beauty that can be seen. I believe that all people want to have
company and don’t want to be alone. As stated in virtue ethics what is right and wrong depends
on the teaching.

Lessons Learned
• IE as an ethic of informational resources, products and environment
• The limits of any micrometrical approach to information ethics
• Information Ethics as a Macroethics
• Moral Agents
• The Responsibilities of Human Agents
• Four Moral Principles

Integrative Questions:
1. Does it Make Sense to Talk of Informational Entities and Agents?
2. Is IE Inapplicable?
3. What is information ethics?
4. What are the four moral principles?
5. What are the Responsibilities of Human Agents?

13
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Milestones in the History of Information and Computer Ethics

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
The history of computer ethics how it all began.

Chapter Review
This chapter of the book is called Milestones in the History of Information and Computer
Ethics. The thought of information by Wiener was really extraordinary who too think that a man in
the time of world war two. But as said in the book “The academic field of information ethics was
born—unintentionally and almost Accidentally” saying it was accidentally but it really revolutionize
today’s times. Wiener revolutionizes the world of information and computer because he was the
one who created it. People at that time didn’t recognize the genius that he had developed, not
until decades and decades until our times have come. As the world grows, the world changes as
stated by Wiener “enormous potential for good and for evil” it will continue to give great strength
to the people at this information age and also weakness depending on the use. People only react
when they are affected if they don’t act meaning they don’t notice or they are ignoring it but
sometimes when people are greatly affected they tend to react. So they have notice the changes
because people through time grow or evolve into more. Information changes and grows or
evolves; the only constant in this world is change.

Lessons Learned
• The history of Information and Computer Ethics
• Norbert Wiener.s Account of a Good Life
• Norbert Wiener.s Information Ethics Methodology
• The development of initiative computer ethics during the reign of Norbert Wiener and
Walter Maner
• The start of the “uniqueness debate”
• The classic paper and influential theory of James Moor
• Donald Gotterbarn’s approach on professional ethics
• The values in humans and their relation to computers
• Luciano Floridi’s theory of information ethics
• The exponential growth of computer ethics

Integrative Questions:
1. Who is Norbert Wiener?
2. Who is James Moore?
3. Who is Walter Maner?
4. Who is Luciano Floridi?
5. Who is Deborah Johnson.?

14
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics
Book review Chapter
Moral Methodology and Information Technology

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn about what moral methodology is all about when applied to computer ethics.

Chapter Review
This topic Chapter talks about Moral Methodology and Information Technology.
Moral methodology talks are related to pastoral responsiveness but were not talking about that.
The discussion of moral methodology is kind of hard to understand but as the discussion moves
forward it goes to the topic of information technology. As I have learned moral methodology is
closely related to computer information technology. Depending on your own point of view on how
you will define moral methodology it is mostly about IT. I think this topic talks about IT and when
to use morality because as stated in this chapter there are many issues in IT that we have to
understand. It’s more of a virtue ethics by Aristotle that the right and wrong depends on the
decision but how it will act. The Ten Commandments’ of computer ethics severs as some what
our guidance in the IT world when we are professional IT’s. Because in the decision what is right
and what is wrong is more of moral but in IT we use guide lines to prove what is right and wrong
for me that is. Like for copyright infringement and stealing there is a great difference but there are
guidelines to prove what will be the verdict.

Lessons Learned
• Moral Methodology
• Applied Ethics
• What Particularism is all about
• Reflective Equilibrium
• Value sensitive design
• PACS
• Sinks
• Real-Time Emergency Medicine

Integrative Questions:
1. What is Moral Methodology?
2. What is Applie Ethics?
3. What is Generalism?
4. What is PACS?
5. What is SINKS?

15
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Value Sensitive Design and Information Systems

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn about what value sensitive design is all about when applied to information.

Chapter Review
Values Sensitive Design is all about the throughout design process of a theoretically
grounded approach to the design of technology that accounts for human values in a principal and
comprehensive manner. Having moral values when crating a design for a specific technology or
software is not the least of our worries but rather it should be what we should focus on all about
because based on how I have, design if not all about how the look on your system will look like
when it is finish but rather on how fast can the user understand what your system is all about,
when that user has no background on the computer, but nevertheless with the help Value
Sensitive Design the user will easily figure out how friendly you design is and wont have any hard
time working around on your design. We will be the ones who will develop the technology for the
benefit of humankind but it’s more of morality and conscience again virtue ethics. From the value
sensitive design when you define it it’s sensitive design to value what you are developing or
somewhat like that. When you design your system or technology, you should also think from the
users own perspective point of view, if the user will easily and right away get the feel of your
system by just looking at you design. It not a contest on the best design but rather it is all about
you and a designer and a developer making harmony with your user

Lesson Learned
• Value Sensitive Design
• Different approaches to system design and values of design
• The Tripartite Methodology are composed of the conceptual, empirical, and the technical
investigations
• Multiple Empirical Methods
• The consolations of features when implementing Value Sensitive Design
• Practical suggestion on Values Sensitive Design

Integrative Questions:
1. What is Value Sensitive Design?
2. Define Value?
3. What is tripartite methodology all about?
4. What is the practical suggestion on values sensitive design?
5. What is the difference between conceptual, empirical, and technical investigations?

16
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know what rule-utilitarian is all about.

Chapter Review
This chapter talks about Personality-Based, Rule-Utilitarian, and Lockean Justifications of
Intellectual Property. Intellectual Property is the ownership of something thought in the mind.
Intellectual property can both be artistic in the sense that it is form your own creative mind and
can also be commercially shown to the world. Meaning when it is form you who crated it, you
have the right to do what ever you want from it, you can sue anyone who made a copyright of you
work without your consent, as long as you have proper evidence to justify that it is truly your.
Under intellectual property law, owners are granted certain exclusive rights to a variety of
intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions;
and words, phrases, symbols, and designs. Common types of intellectual property include
copyrights, trademarks, patents, industrial design rights and trade secrets.” As I figured out right
now this topic talks about copyright. As said by Adam Moore that pirating or other forms of
intellectual property stating that authors and inventors who better our lives by creating intellectual
works have rights to control what they produce. This topic as I have said talks about Intellectual
Property and how to protect the rights of the developer or creator.

Lessons Learned
• Intellectual Property
• Personality-Based justifications of Intellectual Property
• What the Rule-Utilitarianism is all about
• Problems for the Rule-Utilitarian Incentives Based Argument
• Alternatives to Copyrights
• Alternatives to Patents
• Trade Secret and Social Utility
• The Utilitarian Rejoinder
• The Lockean Justification of Intellectual Property
• Pareto-Based Proviso

Integrative Questions:
1. What is Utilitarian Rejoiner?
2. What is Intellectual Property?
3. Who is Adam Moore?
4. What is Personality-Based all about?
5. What does Rule Utilitarian mean?

17
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Informational Privacy: Concepts, Theories, and Controversies

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know what is informational privacy all about.

Review:
This Chapter talks about Informational Privacy: Concepts, Theories, and Controversies.
This topic talks particularly talks about privacy. Differentiating being left alone and having privacy,
such example given by this topic in the book, here are the major topics in this chapter. Physical
privacy as the freedom a person enjoys from sensory intrusion, which is “achieved thanks to
restrictions on others, Ability to have bodily interactions with a person.” Decisional privacy is
achieved thanks to the exclusion of others from decisions and is almost the same as freedom
from procedural interference. Examples are like education, health care, career, work, marriage,
faith. Psychological privacy or mental privacy is somewhat the description of freedom in
psychological interference. Informational Privacy is private data like medical, records and etc. that
only people who are authorized can view it.
Also these topics were discussed lightly. I will quote the parts were in it was emphasized
“We also examined some ways in which some relatively recent information/computer
technologies have introduced informational privacy concerns that affect four broad categories:
consumer privacy, medical privacy, employee privacy, and location privacy. Finally, we
considered some proposals for comprehensive policies that aim at protecting informational
privacy.”

Lessons Learned:
• Physical privacy
• Decisional privacy
• Psychological privacy
• Informational Privacy
• Unitary, Derivative, and Cluster Definitions of Privacy
• Interest-Based Conceptions versus Rights-Based Conceptions of Privacy
• Four kinds of privacy: Accessibility, Decisional, Mental, and Information Privacy
• Theories of Informational Privacy
• The Restricted Access Theory
• The Control Theory
• Three ‘‘Benchmark Theories” of Informational Privacy
• An “Ontological Interpretation” of Informational Privacy
• Categorial Privacy

Integrative Questions:
1. Why is Decisional Privacy?
2. What kind of value is Privacy?
3. What is Physical privacy?
4. What is Psychological privacy?

18
A Compilation of Three Ethical Books

5. What is Informational Privacy?

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Online Anonymity

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
What online anonymity is all about?

Review:
Anonymity is derived from the Greek word meaning "without a name" or "namelessness".
In colloquial use, the term typically refers to a person, and often means that the personal identity
or personally identifiable information of that person is not. Basically it talks about having privacy
or protecting your identity by not being seen by another party form who you are talking about you
can be anyone you want. With anonymity for the sake of enabling action the action could be
good, bad, or neutral, and presumably ethical evaluation of any given case will depend on the
particular action or range of action that anonymity enables. Meaning the people who has
Anonymity doesn’t want to be recognizing by their action even if it’s a good motives. Anonymity
could also serve the primary purpose of preventing actions by others or more generally protecting
the anonymous person from being the recipient of actions by others, hence, for short, “recipient
anonymity. These protect people from discrimination because some people become racist or
when you have a disease the person will be treated unfairly. It is for the sake of preserving the
validity of a process. This is the type of case where the anonymity is primarily or also for the
purpose of some other goal than enabling or protecting particular person form being seen. This is
for protecting people who are without bias and without taking sides.

What I’ve learned:


• Online Anonymity
• The feature of anonymity as a social complex structure.
• The issues of anonymity regarding the usage of information system by users.
• Data Mining, Tracking, and User’s Presumption of Anonymity
• Anonymity and Attribution Bias
• The enabling of expressing one’s self by being anonymous
• Anonymity and Identity Theft

Integrative Questions:
1. What is Online Anonymity?
2. Who is Luciano Floridi?
3. What is data mining?
4. What is Identity Theft?
5. What is the Concept of Anonymity?

19
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterkacking

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
The issues regarding computer hacking and security.

Chapter Review
This Chapter talks about Computer Security: Hacking, Hacktivism, and Counterkacking. I
think this is one of the key topics of this book because as we all know there are type of hacker for
example the hacktivist, ethical hackers and so on and so on. We all know trespassing is against
the law but is trespassing in your computer or so call hacking to your computer is bad. It said in
the book that it depends on the situation why are you hacking. If you’re hacking to get some or
prove justice then you’re a white hacker but if you’re doing it for self interest then otherwise. The
whole idea of this topic that cyber trespassing is bad as the same as trespassing physically. Civil
Disobedience (CD) is spreading as people said CD there is nothing wrong on doing this because
some government are just to tight that even some small features for example Friendster in china
it is banned. So in some areas hacking is not a crime or evil but it discusses the morality of what
you are doing, depending on what you are doing. People should take responsibility for their own
action. They should states what they are whether they are crackers or a cyber terrorist.

Lessons Learned:
• The Prima Facie case
• The Social Benefits of Benign Intrusions
• Benign Intrusions as Preventing Waste
• Benign Intrusions as Exercising the Right to a Free Flow of Content
• Hacktivism: Hacking as politely motivated activism and Civil Disobedience
• Civil Disturbance and Morality
• Hacktivism morally justified as CD
• Hacking Back: active responses to computer intrusions
• The Active Response Spectrum
• A Principle Allowing Force in Defense of Self and Others

Integrative Questions:
1. Define Hacktivism?
2. What is Hacktivism?
3. What is CD?
4. What are the Relevant Moral Principles?
5. What is a cracker?

20
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book review Chapter


Information Ethics and the Library Profession

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn about what a library profession is.

Review:
A librarian is one who organizing and colleting information or a librarian could also be as
usually pictured by majority of people it is an employee in a public or private library depending on
what king of library he or she is working at. In short librarian gives information to people who are
looking for knowledge. Because people go to libraries to seek knowledge about something they
are doing research on. Some may portray a librarian the one that collects information and stores
it in his library. To put short librarians are the one who stores knowledge and to preserve,
especially very old documents. Some documents found by historians is their escapade are placed
in the library or in the museum for people to also see and marvel at this findings. This means not
only by storing knowledge but preserving it. The concept of it is the librarian task is different that
defining it there are many kinds of librarian and has many definitions. Public librarian also are
affected by ethical issues same as the other. I will also give the five laws of library science.
Freedom of information in necessary in the library because this where people look for information
they cannot find else where in there school, home, or even at work.

Lessons Learned
What is the library all about, and the basic job of a librarian to its citizens. That a library is
somewhere I use to gain more knowledge about something that interests me, to be amazed at
how many relevant information the library keeps, whether old or new information. Whether there
are selections and biases as a librarian, a librarian should serve as just an information guide, not
only to give away information right away but to also give the right knowledge whether it is an adult
or a child.

Integrative Questions:
1. What is a Library Profession?
2. What is a Librarian?
3. What is the difference of a public librarian and corporate librarian?
4. What are the five laws of library science?

21
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Ethical Interest in Free and Open Source Software

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
The proper and ethical use of open source software.

Chapter Review:
The definition of an Open Source Software is that it is open to all and easily accessible
and can be copied as long as you follow the copyright law dictated by the original user or
developer of the Open Source. It is free to be grabbed by anyone, it has no price it is for all to
benefit and learn form it. Some consider open source as one of various possible design
approaches, while others consider it a critical strategic element of their operations.
Free software is a software that can be used, studied, and modified without restriction,
and which can be copied and redistributed in modified or unmodified form either without
restriction, or with minimal restrictions only to ensure that further recipients can also do these
things and to prevent consumer-facing hardware manufacturers from preventing user
modifications to their hardware. Free software is available gratis (free of charge) in most cases.
Richard Stallman was the developer of FS but people are criticizing both FS and OS. I think this
topic is more about the money but Richard stressed out that programmers have the duty to write
free software that selling those is morally wrong and that is what he meant when he said “people
who make their profit out of the programs their created making other people not share their
programs. Personally I have heard that programming was at first was just a game but many
people take it as a career for profit but Richard Stallman said that if you profit from this it lowers
the sympathy for knowledge and humane.

Lessons Learned
• The History of Free and Open Source Software
• Critiques of Free and Open Source Software
• The Controversy Regarding GPL Version 3
• WHY OSS flourishes
• The Motivations of OSS Developers
• Autonomy
• The Ethical Responsibilities of Software Developers
• The Quality of OSS

Integrative Questions:
1. What is a Free Software?
2. What is an Open Source Software?
3. What is Autonomy?
4. Who are Eric Raymond and Bruce Perens?
5. Who is OSS?

22
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics
Book Review Chapter
Internet Research Ethics: The Field and Its Critical Issues

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn about the essentials of the field Internet Research Ethics.

Chapter Review:
This chapter talks about Internet Research Ethics: The Field and Its Critical Issues. This
talks about using IRE for research purposes. In the previous years people have developed ethics
on the proper usage of internet. Since time change the evolution of the use of internet, and how
people use it has changed dramatically such as protocols and evaluation for web and the ethics
before need to be modified for the new information age that has risen. Information online is now
available, instead of buying a hardcopy of the book form a store you can now purchase a book
online or can just get it fro free. There is a book I wanted to buy, and I could not find anywhere in
the Philippines so I looked online and found that there is a soft copy of the book, the quality won’t
be the same if you really buy the hard copy but still it is the information and the content that I am
after and that I am sure that the content is the same. The benefits online is so great that I wont
have to travel and pay taxes just to get the book, and also I can get it for free and right away. But
again I should also be aware of copyright law if there is any before I get the softcopy and print for
specific purposes. The critical issue that is discussed is about social networks where million and
millions of people were suck into it because games and social interactivity but the question is their
privacy protected.

Lessons Learned
• Critical issues regarding literature and its background
• Philosophical Foundations: Sources, Frameworks, and Initial Considerations
• Copyright the proper usage of the net when copying others work.
• Emerging Issues
• Recruitment
• Revealing Identities
• Public versus Private Spaces

Integrative Questions:
1. What is Revealing of Identities?
2. What are the emerging issues?
3. What is IRE?
4. What is CFR?
5. What is the difference between private and public space?

23
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Health Information Technology: Challenges in Ethics, Science, and Uncertainty

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know what health information technology is about?

Review:
This chapter talks about Health Information Technology: Challenges in Ethics, Science,
and Uncertainty. There will always be uncertainty on things we encounter, and with certainty
come in science, and its value to provide evidence to the uncertainty. Seeking for knowledge, and
always curious about things you have discovered is the nature of science a never ending quest
for knowledge. Theo more curios people are the more knowledgeable people because they never
tend to just stop at some point but rather they seek more information about something, they use
uncertainty reduction, ethically reasonable principles, and professional standards.
Goodman claims the both ethic and science answers the questions we seldom seek and
sometimes I believe that the answer is just right in front of us. If science cannot provide us the
answers that we are looking for we go to ethics because it might provide us the answers that we
are looking for, adding our knowledge and understanding of what we do not know yet. Failing is
not yet a failure but giving up is when you already have failed.
A tool is still used by many, eve though it has also been criticized by many, for me a tool
is something of importance that can make our lives easier, with the proper knowledge on how to
use the right tool and for the right purposes.

Lessons Learned
• Privacy and Confidentiality
• Clinical Decision Support Systems
• Diagnostic Expert Systems
• Prognostic Scoring Systems
• The Standard View and Progressive Caution
• Personal Health Records
• Decision support

Integrative Questions:
1. What is health information technology?
2. What is confidentiality?
3. What is the clinical decision support system?
4. What is Decision Support
5. Define Status of the professions?

24
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and computer Ethics

Book Review Chapter


Ethical Issues of Information and Business

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn about the issues covering in the world of business together with the use of
ethics.

Chapter Review
The causes and the effect of ethics in the business is mostly discussed in this chapter.
Being in the business you need to be competitive and aksi learn how to be a social business man
at the same time. Rumors about Privacy and intellectual property will always be an issue, many
will criticize your work and some will envy you. It is not just having the latest gadgets but also
being able to stay on top of your competitors you have to be more self-sufficient and has a game
plan or strategy. Using the three central approach Bernd Carsten Stahl claim that ethics is like
science find the answers to the questions you raise, which means that ethics can easily be
answered by thinking of the right question and getting the right answer as follow up to you
question it about being more annalistic, and being open to learn new stuffs and being curious
about them, seeing the world as a whole and not just your own mind set. When you are doing this
it raises your awareness about what is happening to your surrounding. It give an open opinion to
other people sharing their ideas and knowledge to each other, sharing what is both right and
wrong.

Lessons Learned
• Ethical Issues in Business and Information
• The Concept of Business
• Shared Norms and Values
• Business Ethics and Computer Ethics
• Microlevel Influence of Business on Ethics and Information
• The Impact of Business on Privacy: Employee Surveillance
• The Ethical Response to Employee Surveillance
• The Three Central Approaches
• The Impact of Business on Intellectual Property
• The Ethical Response to Intellectual Property Protection

Integrative Questions:
1. What is business Ethics?
2. Who is Bernd Carsten Stahl?
3. What are the differences of each three Central Approaches?
4. What is the issue regarding business and information?
5. What is Intellectual Property Protection?

25
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Responsibilities for Information on the Internet

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn how to be a responsible user of the internet.

Review:
This Chapter talks about Responsibilities for Information on the Internet. The laws
created regarding the use of internet up to know are still not being followed by majority of internet
users. For example anonymity in the internet will never be fixed by the law for me because their
different ways anonymity can be surpassed by the use of the internet, and not all laws will be able
to fix these or will be able to prevent things from happening in the internet. Even thour we have
the 10 commandments to follow, we are still human being and each and every one still tends to
disobey the law or the commandments.
I will point out the two major problems of reliability. People lack the necessary expertise
to assess information on the basis of content criteria, and they also lack the necessary expertise
to assess information on the basis of pedigree criteria. In this case, the problems are due to a
lack of competence of the users. People lack the expertise to assess information on the basis of
content criteria, and it is impossible for them to test the information with the help of pedigree
criteria. This is the case when the users are, in principle, competent in using pedigree criteria, but
the information is presented in such a way that there are no indicators or markers of conformity
with pedigree criteria.

What I’ve learned:


When encountering incompetent users some people are just plain stubborn ignoring the
information that is given to them and put all the blame on the system. People need to have hard
evidence following up their criticism on someone or something. A certification system, the
creation of new credibility-conferring system, allows us to use pedigree criteria to online
information.

Integrative Questions:
1. What is a pedigree criterion?
2. What is a content criteria?
3. Who is Anton Vedder?
4. What is the general definition of resposibility?
5. What is information in general?

26
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics
Book Review Chapter
Virtual Reality and Computer Simulation

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know what virtual reality really is and how it is use in the computer

Chapter Review:
This topic talks about Virtual Reality and Computer Simulation. I find this topic very
interesting. One factor that made it interesting is that I like playing computer games. When you
say virtual the essence of the real world is like placed into something imaginary and you can be
and do anything you want in that imaginary world. For me the only difference between a virtual
world and in the TV is that they are almost the same but one factor is in the virtual world you get
to control your own character as if you are the one that is inside the television itself.
The definition of a computer simulation is that it is a law inside the virtual world. It is like govern
by asset of standards that we must follow and that limits us, the only difference between this and
reality is that the law in reality is a must be followed and you cannot go back to the past to bring
back you mistakes, in the virtual world once you disobey the law it is easy for you to restart your
own world. The book Virtual reality (VR) technology emerged in the 1980s, discuss that these
technologies during the 1980s simulated three-dimensional or3D environments displayed in
surround stereoscopic vision on the head-mounted display or HMD. You can interact with
different people form all over the world!

What I’ve learned:


You can be anyone you want in your own virtual world! You can create your own
character, and play and talk to different people that are laying and also joining your virtual world.
Interactions and being social anonymously is the only difference in the virtual world form the real
world. Because you are in disguise by the character you have created, and it is not totally your
look a like form.

Integrative Questions:
1. What is Virtual Reality
2. What is Computer Simulation?
3. Who is Philip Brey?
4. Virtual Child Pornography
5. What are the Computer Games and Values?

27
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics
Book Review Chapter
Genetic Information: Epistemological and Ethical Issues

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know about what they mean by genetic information, and where it is being used..

Chapter Review
Antonio Marturano claims that if molecular biology is being misused there will be an effect
on people and possible consequence may occur that will be sometimes irreversible. We may
never now these consequences but when they happened we must be prepared and ready to
accept the fact that we are the reasons for these consequences. Because of curiosity and
fascination, and experimentation there will always be a negative and positive effect on the things
we do. The reason why there is what I believe a positive and negative effect is because there
must always be balance in nature.
In Antonio Marturano’s own words he said that today the challenge is to be able to build human
beings, by trying out the idea of generic information that genes conation an amount of information
the so called TACG amino acids sequence. This idea is the basis to the so called negative
hypothesis Central Dogma, which came from Crick stating that information cannot flow downward
from protein to DNA. This just like the movie The Hulk his DNA turned him into a monster, but for
the least worries into a unstoppable monster that no ordinary human could defeat, even with
weapons of destruction, but still he can transform into a monster by the cause of extreme rage.

What I’ve learned:


• The notion of Genetic Information
• The Concept of Information
• A syntactic theory of Genetic Information
• The cell like a computer machine

Integrative Questions
1. Who is Antonio Marturano?
2. What is “Central Dogma” of genetics?
3. What was formulated by Crick?
4. What does Genetic Information mean?
5. What did Berlinski contribute?

28
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


The Ethics of Cyber Conflict

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
What are the conflicts in Cyber Ethics?

Chapter Review
The war in the ethics of the cyberspace is discussed in this chapter. Mainly there are
three topics cyber warfare at the state level, hacktivism conducted by non-state actors, and active
response. If you have watch die hard 3.0 you will know the consequence of this cyber terrorism
and etc. lets start with cyber warfare at the state level, people might say that this treat is minimal
that no will get hurt but cyber warfare at the state level is really a bad things because it would
attack you physically but will attack you internally just like a virus because it’s a crisis not only you
but the whole nation will suffer. They would drop bombs that will kill thousands but the catch is all
the people in your country or the world will suffer. The second topic is hacktivism, let me discuss
“Hack back” is a form of active response that uses hacking to counter a cyber attack. Basically it
the opposite of hack back is hacktivism. There are two principal two track hacking. The first
involves using invasive tracebacks in order to locate the source of an attack. The second involves
striking back at an attacking machine in order to shut it down or at least cause it to stop attacking.

Lessons Learned
• Cyber Warfare the state level
• Jus ad Bellum
• Jus in Bello
• the attack in cyber by nonstate actors
• Just Cause for Hacktivism
• Conduct of Hacktivism
• Ethical Frameworks for Hacktivism
• Hack Back and Force

Integrative Questions
1. What is Cyber Warfare?
2. What is hacktivism?
3. What is Cyber terrorism?
4. What are the two principles of Back Hack?
5. What is Jus in Bello?

29
A Compilation of Three Ethical Books

Book Review
The Handbook of Information and Computer Ethics

Book Review Chapter


A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn about ethical rick assessment

Chapter Review
Developing a practical mechanism for Ethical Risk Assessment, base on my own view of
life, even though this may sound a little of ward, even though we have the freedom to do anything
in life, it does not necessarily mean that we have to abuse it because I believe that pointing a
finger at someone, you do not realize but there are three fingers pointing back at you. Sure you
may create your own destiny in life, but sometime unexpected things happen and those things
are out of our control. This topic talks about developing SoDIS, the plane blank definition of
SoDIS is Software Development Impact Statement. The purpose of its development was to
identify and evaluate the potential risk and impact software may have on the environment,
identifying potential negative effects of the proposed or already developed system and to make
necessary step to prevent those negative impacts or effect. The main intention is to assess the
impacts that might arise from both the software development process and the more general
obligations to various stakeholders. This is an important development Ethical Risk Assessment,
because with this actions can be taken to prevent future impacts on the environment that may
have great consequences on human kind.

Lessons Learned:
• Practices for Risk Assessment
• Limitations of the Generic Standards
• Ethical Risks
• SODIS Audit Process
• Software Development Impact Statement
• SoDIS Stakeholders Identification
• Identify Potential Ethical Issues
• The Inspection Process

Integrative Questions
1. What is SoDIS?
2. What is Ethical Risk Assessment?
3. Who is Don Gotterbarn?
4. How do you identify a stakeholder?
5. How do you process SoDIS Audit?

30
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Regulation and Governance of the Internet

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
What are the regulations in the internet?

Chapter Review
The main topic is about the regulations and the governance in the internet. Is just like
everything else we need to have regulations, so thing s would be in order. But my only comment
if how can the government make assurance that the regulations he or she will place in the
internet it will be followed, and the internet is basically the whole world is online! It is like making a
law for the whole world. What about the different cultures of different people in the world?
Shouldn’t we also consider the different cultures around the world when we are making the law
for the whole world? We can limit the restrictions to our own country, but wouldn’t this limit the
freedom of users in the internet? It will definitely limit the power of the internet and the freedom of
humanity to use it. Censorship is one of the issues related to internet usage, because we should
also consider the minors or children that will use the internet for various reasons, and some
contents are only and strictly for adults. Pornography is one of the issues that children below 18
should not be allowed to see but then again anonymity is another issue regarding the use of
internet.

Lessons Learned
• Internet Regulations: Normative Issues
• Regulation across Legal Jurisdictions
• Content Regulation
• Technical Issues
• Moral Arguments
• Effective Regulation
• Censorship

Integrative Questions
1. What is Content Regulation?
2. What is effective regulation?
3. What is Censorship?
4. Why do we need Governance in the internet?
5. What are the technical issues

31
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Information Overload

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn how to overcome Information Overload.

Chapter Review
This Chapter talks about Information Overload. Let us first define information overload,
for me information overload is you have too much info or to much data that you can’t store it
anymore but based on the book Information Overload is Exposure to or provision of too much
information; a problematic situation or state of mental stress arising from this refers to the state of
having too much information to make a decision or remain informed about a topic. Some times
the cause will lead to mind block which you are no longer conscious on what you are saying or
doing. Form my own pint of view the mind is like a memory once there is too much information in
it you can no longer grasp other incoming information. Large amounts of historical information to
dig through, a high rate of new information being added, contradictions in available information,
and a low signal-to-noise ratio make it difficult to identify what information is relevant to the
decision. David M. Levy states that Information overload involves more than just the exposure of
an agent to excessive amounts of information: that agent must also suffer certain negative effects
as a result. Meaning sometimes we have to experience to know things.

Lessons Learned
• Information Overload
• More than Information
• History of the Phrase
• Causes and consequences of Information Overload

Integrative Questions
1. What is Information Overload?
2. What is the Phrase?
3. What is Reality according to the chapter?
4. What is Ever-Present Phenomenon?
5. Who is David M. Levy?

32
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Chapter Book Review


Email Spam

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
The causes of email spam

Chapter Review
Sometimes called as junk email, commonly calls a unsolicited bulk email. Spam emails
are usually not recognized by the recipient that the sender is on the contacts list on the email of
the recipient. It is a UCE or also known as unsolicited commercial email. A spam may not only be
someone that is unknown to the recipient but also may contain irrelevant information or even
worse hard to detect viruses that were sent to you, by unfamiliar email addresses, that sometimes
plays a trick on other users which is unethical of them to do that. Once you click the email and if it
is a virus it will ruin your OS and soon your system will crush once you do not immediately
counter the virus attack. To be safe form spasm we all need to have anti viruses that we trust, but
we must also remember there are different anti-viruses and also different type of viruses which
means, you should really be careful on the type of anti-virus you have, and the type of virus you
encounter. The best way to combat these spam’s is to just neglect them and delete them right
away, once you receive an email on you bulk folder check it out first if you recognize the email
add then scan it first, but if the email add un not familiar then delete it anyway.

Lessons Learned
• The Ethics of anti spam measure
• Intent of the Sender
• The Ethics of Doing Nothing
• Relationship between the Sender and the Receiver
• Envisioning the Spam Space: Specific emails Exhibit Combination of Characteristics
• Number of Identical Emails Sent
• The history of spam
• Consequences to the Receiver
• Deceptive Emails Meant to Defraud Are Condemned, Spam or Not
• Illegality
• Changing the Economics of Email
• Deceptive Emails Meant to Defraud Are Condemned, Spam or Not

Integrative Questions
1. What is Spam?
2. What is UCE?
3. Who is UBE?
4. What is Spam Space?
5. What are fraud emails?

33
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


The Matter of Plagiarism: What, Why, and If

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To understand what matter of Plagiarism is all about
Review:
There are sometimes the misconceptions of plagiarism to copyright infringement, often
this is the confusion of people, but in fact the y are not the same. Form my own definition
plagiarism is like that one street people usually right on walls using a spray paint to color the wall
and make different images that sometimes cannot be understood by many. It is also a
representation of ones own work because it was his idea in the first place, they are like art, but
people who do this sometimes have to keep their behaviors in the proper order. While Copyright
infringement is the copying of ones work without his or her consent in the first place. You just
copied the work and declared it as you’re won without dictating the name of the original owner
who really made it. It is a violation of the owners’ rights, the right to reproduce and perform the
copyright law. Basically, copyright infringement is an unauthorized act of doing something to
someone. The reason why people do this things is something un acceptable even though there
are different reasons for it. Because it is just literally violating the golden rule, you are doing
something that could offend someone.

Lessons Learned
• The concept of plagiarism
• Lack of Authorization: Economic Foundations
• Lack of Authorization: Natural or Moral Rights
• Lack of Authorization: NONINFRINGING PLAGIARISM
• Literature Review

Integrative Questions
1. What is Plagiarism?
2. What is Copyright Infringement?
3. Differentiate Plagiarism and Copyright Infringement?
4. Why do people plagiarize?
5. What could be author’s view in this matter?

34
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Information Intellectual Property: Legal and Moral Challenges of Online File Sharing

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know more about what file sharing is all about

Chapter Review
Intellectual Property is like somewhat saying you have the right to own that property: File
Sharing is a legal software or open source, but the one who are using it is for illegal purposes.
Like Frostwire it is a free file sharing program but do people use it legally? The answer to that
question is another follow up question would you buy a branded stuff or download it for free
basically almost everyone and get what you want for free. Basically the big thing in this topic is
that some of the stuff from companies or individuals is being downloaded for free or being sold to
society without the knowledge of the creator or getting any profit from it. I learned the concept of
file sharing in my progap1 class my professor said “that the evil from this is not the vendor or the
application but the people who are purchasing the product and continues use of it.” From there he
may have a point but how can we stop temptation? Its like saying if you have the power to be
invincible, would you do it for the common good or for some evil purpose? Some people might
say I’m not stealing I’m just file sharing technically they are both different things! File sharing can
be implemented in a variety of storage and distribution models. Basically file sharing is sharing of
file to make it simple. They say it’s unethical to download or to file share without the creators are
or the author’s permission but you couldn’t blame the people because all are temptations going
through their head. What can we do everybody want an easy life, we are self-centered human
beings

Lessons Learned
• Secondary Liability
• Moral Considerations
• A brief history of MGM V. Grokster
• Peer – Peer networks

Integrative Questions
1. What is File Sharing?
2. What is a Peer to Peer network?
3. What is an intellectual property?
4. What is the challenge in legal file sharing?
5. What are the legal challenges of online file sharing?

35
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Censorship and Access to Expression

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn about Censorship and Access to Expression

Chapter Review
Censorship and Access to the internet is basically the main concern of this chapter,
especially when it comes to minors, and the conflict of free speesh to the restriction being govern
in the internet. From the authors own point of view the definition of censorship is restriction and
limited access to different kinds of expression, mainly portion and category expression, and the
authors believes that this Is very bad for people to access this information which are not their
“intellectual property” but rather they are someone’s else’s, without the owners acknowledgement
and permission to access the information. Basically Censorship is blocking or preventing access.
This is known from private companies and people. A good example blocking of site are of related
to pornography or somewhat related to games are private universities like the College of Saint
Benilde. Other universities also block site from their students because they are the ones
responsible for what ever information their students will be assessing, and they should be a role
model to their students not someone trying to invite them to stealing or watching harmful contents
in the internet. Depends on the campus and relation but I believe that sometime censorship is a
great importance.

Lessons Learned
• Types and harms of Censorship
• The internet as a expression to free speech
• Inherently and Instrumentally Harmful Access
• The definition of Censorship

Integrative Questions
1. Who is Kay Mathiesen?
2. What is Censorship?
3. What are types of Censorship?
4. What is an Instrumentally Harmful Access?
5. Who is Kay Mathiesen?

36
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


The Gender Agenda in Computer Ethics

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To learn what is the agenda about computer ethics

Chapter Review
It been long ago and maybe up to know that female or when it comes to gender that male
are more dominant than female, but we should respect females as well, because in the past there
already has been a female president and the country which she ran was well organized and
flourished during her time of ruling or be in the presidency. Basically this topic is expressing that
their should be a women point of view to computer ethics that may give break through or make
difference to what information we have. I think this is just a way to balance between men and
women, basically some people as I’ve said discriminating women that men are better stuff and
etc. Harmony in men and women, black or white should be our goal in this world because just try
to imagine a world where people get along with each other just fine. No racisms, discrimination,
and no trash talks to each other. There would be peace I the world, n wars will rage on each
other, and more importantly the first amendment will be implemented “freedom to all” or having
the right to be free, because of this people will feel the right toward their own self, more
confidence will arise in every individual.

Lessons Learned
• The definition of ethical behavior
• Feminist Ethics
• An alternative approach to women in computing
• Gender and Computer Ethics: Cyber stalking and hacking
• Gender and Computer Ethics: A Male–Female Binary?
• Student Population
• Quantitative Versus Qualitative Research Methodologies
• The Under theorizing of Gender and Ethics
• Feminist Ethics

Integrative Questions
1. What is the definition Feminist Ethics?
2. Who is Alison Adam?
3. Are Hacker Communities Egalitarian?
4. Who is Ethical Behavior?
5. What is cyber stalking?

37
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Chapter Review


The Digital Divide: A Perspective for the Future

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
The definition of digital divide

Chapter Review
If you have read the book called Bottom of the pyramid I can guarantee you that you will
not only understand this chapter but also learn to appreciate it at the same time. People have in
their mind set the lower class people have no buying power that they tend to take them lightly and
that they are poor, well that might be true but they are also part of our community, and we should
take consideration for them. But the fact is that higher class people have more buying power the
number in population compared to the bottom of the pyramid is very the lower class has a
population that is many time bigger than the upper pyramid. If you sell something at a lower price
with the same quality of the higher price of t he thing that you are selling at a lower price, you will
be amazed at how you will profit greatly by it. Targeting the lower class is more profitable than
targeting the higher class people, you should not look at the price of the product but you should
base in on the number of consumers available and are willing to buy your product.

Lessons Learned
• Empirical Skepticism about the relationship between Digital Divides and Absolute Poverty
• Empirical Studies Illustrating Perceived Failures
• Empirical Studies Illustrating Perceived Failures
• The idea that various Digital Divides should be eliminated
• The bidirectional relationship between Absolute Poverty and the Digital and Information
Divides

Integrative Questions
1. What is the moral basis for the idea that the various Digital Divides should be eliminated?
2. Who is Maria Canellopoulou-Bottis?
3. What is Empirical Skepticism?
4. Who is Kenneth Einar Himma?
5. What is UNESCO?

38
A Compilation of Three Ethical Books

Book Title
The Handbook of Information and Computer Ethics

Book Review Chapter


Intercultural Information Ethics

Library Reference: N/A

Amazon
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1235315924&sr=8-1

Learning Expectation
To know what is Intercultural Information Ethics is all about

Chapter Review
This chapter talks about Intercultural Information Ethics. According to Capuro IIE is
defined as Intercultural Information Ethics and can be defined in a narrow or in a broad sense.
This is more of a summarization of the chapter were in connecting all the issues. ICT also in other
definition is an umbrella term that includes all technologies for the manipulation and
communication of information. The term is sometimes used in preference to Information
Technology, particularly in two communities: education and government. In the common usage it
is often assumed that ICT is synonymous with IT. ICT in fact encompasses any medium to record
information, such as video recording, flash memory etc. and other recordable devices.
Technology for broadcasting information such as radio, television, and technology for
communicating through voice and sound or images like microphone, camera, loudspeaker,
telephone to cellular phones.

Lessons Learned
• The impact of ICT on local cultures
• The Foundational Debate
• An IIE perspective
• On the Sources of Morality
• On the Foundation of IIE

Integrative Questions
1. What is IIE?
2. What is intercultural information ethics?
3. What is computer ethics: philosophical enquiry or cepe?
4. Who is Rafael Capurro?
5. Who is Charles Ess?

39
A Compilation of Three Ethical Books

Cyber Ethics
Book Title
Cyber Ethics

Book Review Chapter


Ethics and the Information Revolution

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What is the impact of computers to our way of living?

Chapter Review
Information in fundamentally social and ethical seeping into life unnoticed because of its
flexibility and inexpensiveness. Computer is a universal tool. No peripherals for distant countries.
MIT professor Norbert Wiener was the founder of computer ethics. His ethics was way ahead of
its time and was ignored for decades
Donn Parker was the first to find out the illegal usage of computers by many. Joseph
Weizenbaum inspired many thinkers and projects related to computer ethics around the world.
Terrell Ward Bynum planned an international conference on computer ethics, and this conference
attracted many that it generated monographs, video programs, and curriculum material that are
now being used by many universities and campuses around the world. Walter Maner believed
that computers created new moral problems, but Johnson own point of view was that computers
gave a whole new twist to ethical issues that were already well known. Donald Gutterbarn viewed
computer ethics as a standard of practice and codes of conduct of computing professionals. The
social problem that computers generate is unemployment, but information technology should
create more jobs then it eliminates. Computer security is the topic of concern in the field of
computer ethics. The owning of a patent in the computer algorithm has becomes an issue,
patents effectively remove parts of mathematics from the public domain and cripple science. ACM
and IEEE have joined together to make a set of guidelines in computer ethics for colleges around
the world. Global issues arise and become debated about how people communicate around the
world. How can cyberspace reach the poor, and lessen the gap between the rich and the poor.
Access to anything including education can now be available world wide. Computer ethics will
evolve into a system of global ethics applicable around the world in every culture. At the dawn of
st
the 21 century people will be faced with two different views on ethical relevance of computer
technologies which came form Wiener Manner Gorniak and Deborah Johnson

Lesson Learned
Computer will change the life of how people live. After the conference held by Bynum the
interest on computer ethics has spread in Europe and Australia The limits of computer are
largely the limits of our won creativity Computers are far more efficient in doing task than human
beings. Health and safety will be affected an example is radiation emanating form computer
monitors. Even though hacking has not done any harm the owner of the computer which you
mingled with has the right to run a thorough investigation of the compromised system. Billions of
dollars are los by large companies because of software piracy. How can local law become
universal in the world of cyber? The World Wide Web is the biggest encyclopedia and dictionary
in the world. Computer Revolution will become global in the sense that it will affect human actions
and relations.

40
A Compilation of Three Ethical Books

Integrative Questions
1. What is computer ethic?
2. What will the world be without ethics?
3. How can computer make our life easier?
4. What is ACM?
5. What is IEEE?

41
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Ethics On-Line

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The difference between the behaviors of people off-line and on-line, can trust on-line be
possible? How?

Chapter Review
Visions of online communication are so many yet inevitable, they are visions of a self-
fulling prophecies that can never become a reality, Nation and Global infrastructure as a global as
a triumphant in global economic competition. The only problem with on-line communication is the
way people behave with it, their way of using it. Because of such behavior our knowledge on how
to secure our system to such attacks like viruses, whether it is tracing or detecting transactions
has improved. The image of computer technology can become may be decided upon our own
actions off-line, because this will serve the backbone of our actions on-line. Not to eliminate
anonymity but to restrict it to prevent other wrongful actions from being done. The difference
between communication off-line and on-line is the reach of the scope doing on-line
communication and the difference in the feel of on-line communication compared to off-line.
When we hold individuals legally liable for their own actions when using powerful technologies,
we also expect them to take greater precautions on their actions. Anonymity is much favored on-
line because the fact that seeing a person face-to-face will be the ultimate test off0line it is not
available on-line, and the fact that on-line an individual is given a generic user ID this cause the
individual to make more efforts in establishing his or her own identity. Problems of integrity are
also the cause of anonymity because you can easily steal someone else’s words and make it look
like your own. The moment you create your own program for example and the moment you post it
on-line you will have no idea on whether your program has been copied when it was it was
copied, and who copied I, there will be no evidence on such things. The moral implications of
reproductively goes counter to our traditional notions of property and personal privacy, because
the possibility of recording and observing the privacy of action in the electronic network are no
long irretrievable, no much like in the real world action are performed and then suddenly gone.
Anonymity brings fair treatment to races, gender and in physical appearance. It is bad to the
affect it has, making stealing, and other illegal acts seems far harder to catch. That sources you
get information form and the sources you trust are completely different and it is hard to develop a
history of experience with the source. Expectations diminish trust to one another. But we can fix
these expectations when we learn to understand how these expectations are made and why they
are formed. It will be disturbing to take into conclusion that we must give up trust in on-line
communication. How about the benefits of on-line communication, do we also have to diminish
these benefits as well? It will be a god lesson to just be precautious of some of the actions we
make on-line and not to trust anyone on-line whom we do not really know. Individual must be
informed on what to expect when they enter into an on-line environment, they must be informed
what they are getting into before they enter. Rules must be set and observed by everyone, and
instructions on what to do and how to do it must also be followed.

Lesson Learned

42
A Compilation of Three Ethical Books

Now is see why people are having hard time trusting computer, because basically people
now a days use computer for on-line purposes, and like me as an example if their is no internet I
find it hard to make use of my own computer. The most impossible action that I think that would
be possible is for everyone in the world to trust the use of a computer, may be in the future when
everything revolves around computers some people will have no choice, but what if there is still
freedom to choose working off-line and working on-line, some physical behaviors off-line will
never be implemented on-line. Trust seems to be the vital issue, but how can one trust another
being when he is not sure of the identity of that person with whom he or she is communicating.
Individual can do a variety of things on-line that would have a different feel and would be
extremely impossible or difficult to do off-line. Different sets of physical behaviors and physical
closeness are the difference on what an individual can do off-line to what an individual can do on-
line. Valuable information and emotional release can be done on-line anonymously. A lesson that
can be applicable to me in the on-line world that made more cautious about my action was
anonymity, when I trusted a friend of mine on-line and his account was hacked by some one, and
I did not, because the way we communicate and his patterns of behavior seems to be the same,
so when I thought this was my friend rather it was someone else, some one I did not know. In the
on-line world you have two choices make it public or private so only a number of people are
allowed to enter.

Integrative Questions
1. What is the difference in behavior on-line and offline?
2. What is the cause of anonymity on-line?
3. What are the important factors of scope in –line communication?
4. How can trust be built?
5. What is a generic ID?

43
A Compilation of Three Ethical Books

Title of Book
Cyber Ethics

Book Review Chapter


Reason, Relativity, and Responsibility in Computer Ethics

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The nature of why computer ethics is crucial in the world of computer technology.

Chapter Review
If ethics is the key to our guide for a better world in which we much rely now a days
computer and it has become necessary venues for routine communication James Moor may have
a point about the positions he disagreed on the nature of computer ethics both routine ethics and
cultural revolution makes computer ethics both trivial and impossible to implement. Because of
the computers capabilities of improving overall performance, the gathering of process information
becomes a crucial ingredient in performing manual activities. True enough that in the age of
computer we all live in a different world. Once data has entered into a computer it can be sorted,
search and accessed in extraordinary easy ways and with least practical amounts of time. The
power of information enrichment is so important in virtual world that information must copyrighted
before it is delivered into the computer world because it can be improperly access, used, and
manipulated in such ways that people who were the original creators and the original owners are
not recognized and are their ownership of such object have been pre-owned by someone else. I
may have this notion that computer ethics is all about ethics being applies to computers, but it is
rather special in the sense that considerable interpretation must be first made before appropriate
policies can be formulated and justified, with a number of evolving situations which are difficult to
conceptualize clearly and find justified ethical policies. It will depend on the subject matter at hand
to be discussed. It may be true that because of the difficulties and shortcoming of Routine Ethics
and Cultural Relativism people will surely have disagreements in their view of ethical judgments.
Reasoning with relative values seems impossible. Different values and different judgment are
sometimes nonstop debatable issues that people have different opinions and views about
different things, it all depends on how one sees and believes on a particular thing. True enough
the morality off letting everyone’s voice be heard over the internet is being discriminated by the
algorithms of search engines by being design by computer professionals in ranking that are
based on popularity and largeness of sties. Why can’t people just advertise or put into public on
how to implement or do computer related practices so that many people using computers will be
familiar with some of the practices. Technologies have the same kind of structural effects as the
other elements of social structure. What helps define or regulate patterns of human interaction
can also be identified in technological artifacts because technological artifacts can also be found
in one of the elements of social structure. Core values are just standards set so that we may have
different policies to evaluate our own basis on different scenarios. Basically what we do and how
we ran things are the outcomes of what computer technology will have on the affect of our future.
Because computers are really dumb, it is only us humans that create computers and if we do not
set standard of ethical policies to follow the uses of computers, the harm technology may also
bounce back to us.

Lesson Learned
The concept on a credit card, tat is inside a credit card is not really money, but the
amount you have in your bank account which is ran by a computer. The winning and loosing in a

44
A Compilation of Three Ethical Books

war is about destruction of information or Intel from an enemy, the importance of information to
implement a going prepared strategy for war. A retreat from the realm of pure fact may be
impossible without the consideration of values surrounding it. Every science rely on value
judgment if for example truth will no be taken as important value by scientist then the enterprise
of science can not begin. Value decision is embed in our everyday lives we may not notice it but
they come to use naturally, they affect the way we make decisions every day. Facts are always in
the escort of values. The standards of discipline may go unnoticed but they will always be there,
used and shared by daily decision in daily human activities. Technology artifact may later become
moral scrutiny. Ranking will always have similar significant positive correlation

Integrative Questions
1. What is the relevance of information to implement computerized technologies?
2. Why is computer logically malleability?
3. How do you escape the realm of pure facts?
4. What is the importance of core value?

45
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Discolsive Computer Ethics

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The theories of disclosive computer ethics apply to computer ethics.

Chapter Review
Standard model is being adopted in applied ethics as a way to clarify and evaluate
morally conservative practices through an application and defense of moral principle. The truth
about computer technology is the notion that technologies themselves are worthy objects of moral
analysis. The information capabilities of computer systems constitute more to their capabilities of
shaping the society rather then as a function on background technologies. More precise moral
evaluation can be after a disclosive analysis has been made rather then the opposite way around.
Disclosive analysis are like fishing nets they may bring up items that one was looking for as well
as items that are of no interest. The unjust view of a computer system is favoring only one side
and ignoring the side of the other. Justice is all about the equal distribution of primary social
goods in the society because these are essential for individuals to carrying out their life plans.
Policy recommendation is done through applying distributive justice to argue whether resulting
inequalities are indeed unjust, and the realization of the fact that your life in fulfilling and
meaningful is the reason why the definition of individual autonomy is the ability to construct one’s
own goals and values. The control and ownership of information has become an important source
of political power in society, but the exercise of decision making in which every member has the
opportunity to exert influence over the entire society. New computer technology may yield new
values as well as require the reconsideration of old values. New dilemmas may also be brought
up because of conflicting values that suddenly clash when the new setting and practices are
brought. Thus it is part of the computer ethics to further develop and modify the existing moral
theory when existing theories of are insufficient when new demands are generated by new
practices in the world of computer technology. Moral deliberation takes place in the level of
application. Social science is often needed for the analysis of the way which the function of the
system is dependent on human activities. Moral theory is being applies by philosophers weighing
moral principles against moral judgments philosophers engage in this field must have a solid
gasp of the social, legal, and technical aspects of the technology or practices in which they are to
pas moral judgment because the information must be processed in a task largely of no
philosophical skill. Disclosive computer ethic focuses more on multi-level and interdisciplinary and
focuses of four keys which are justice, privacy, autonomy, and democracy.

Lesson Learned
It is true that the design of computer systems are more on the favorable side of men
which in return puts discrimination on the opposite side f gender. Making designs without
discrimination to any user and building search engines that enable the freedom of speech might
sound impossible. But based the examples used in disclosive analysis, fair and having the right of
freedom of speech in the internet might well depend on the people accepting the whole entire
system instead on blaming the one who made it be cause we no proper evidence whether it was
intentionally made that way and maybe the one who wrote it or build it never intended it to be
view that way. Freedom and privacy is needed to carrying out one’s life plan, without this two one

46
A Compilation of Three Ethical Books

can not carry out his or hers plans in life. a good example is the use of technology to disturb one’s
own privacy. Computer system or software is analyzed form the point of view of a relevant moral
value like privacy and justice. Research at the disclosure level is a cooperative venture between
computer scientist, social scientists, and philosophers.

Integrative Questions
1. What is justice?
2. What is Disclosive ethic?
3. How do you define core values?
4. Can values be morally wrong or right?
5. How is standard model applied?

47
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Gender and Computer Ethics

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The end of discrimination among genders in the society.

Chapter Review
The study of this paper is basically the balance between statistically based empirical
research and a more substantial theoretical understanding of computer and in gender. The author
concludes that the best way to look for theoretical substances is applying feminist theory in the
gender based theory which has long been over due for more substantial theorizing. The
combination of feminist ethics and empirical studies will emphasize moving of gender and ethics
onward from statistical studies of men’s and women’s ethical decisions towards more
substantially theorized studies of areas in computer ethics that have yet been largely unexplored.
Women in computing have been criticized in the past for adopting a traditional, liberal position
that characterizes the gender and computing problem in terms of educating, socializing, and
persuading women. Rather then to challenge the subject matter the liberal argument in leaving
the organization of computing unchallenged does little to alleviate women’s position in relation to
computing education and work. I disagree with his ethical problem that women are not taking up
opportunities being offered to them. But numbers of women at all level of computing remain low;
there must be a reason behind this why women are being excluded form payment in well-paid
and interesting careers. Arriving at different cultures from different countries there is a major
difference between male and female business managers in considering ethical business
decisions. Based on other studies between the comparison on men and women it showed that
appear more ethical than men, however the author made a hypothesis that men tended to
behave of a dubious ethical nature more acceptable than women do. The aim of Khazanchi was
to understand whether gender differences influence the degree to which individual’s recognize
unethical conduct in the use and development of information technology. During the course of the
survey the study showed that women outperformed the men in identifying unethical actions
across all scenarios given. Women also seem to be more considerable toward the feelings of
others. Form a mangers point of view women are more likely to affect by passive deterrents and
men may be influence more likely through statements on what is legal. A hidden power of
relationship variable that need to be point out to be much more aware of power relationships in
computer ethics, such as the relationship between the student and the teacher relationship.
Women’s ability to resist unethical behavior is not really absolute because again no body is
perfect. Gilligan is well known for her work on feminist theory. True enough that women have
different view and expectations regarding computer privacy and other traditional computer ethnic
problems. Feminist ethics form the challenge to main stream ethics to develop a new ethics with
which to make normative judgments on ethical problems from a wide range of domain.

Lesson Learned
Based on the research study conducted on students particularly women and men it
showed the women are more ethical than men in relation to computer ethics. People are more
influence strongly by their personal values. Men are more likely to consider a behavior that in
unethical than woman do. Issues of power must be rendered visible to make these and other

48
A Compilation of Three Ethical Books

areas of gender ethics more understandable because feminist ethics brings a direct consideration
of questions of power that are often not present in traditional ethical theories. In order to further
understand the implications of computer ethics we need to understand the moral decision women
makes that is different than the moral decisions men make.

Integrative Questions
1. Are women more dominant than men in term of ethical views?
2. How are women an asset to the management of businesses?
3. What are the different forms of surveys conducted to students based on gender analysis?
4. Who is known for her famous work in Feminist theories?
5. How are women different from men when it comes to the goodness of the heart?

49
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Is the Global Information Infrastructure a Democratic Technology?

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What is the history of GII?

Chapter Review
The GII is said to create electronic democracy to facilitate and enhance democratic
processes. Technology containing favors or facilitates democracy is also the same as saying
values are embedded in technology. Democracy is a value in the sense claims made by
individuals’ states that there is a strong link between the technology and patterns of behavior
associated with democracy and these are considered desirable traits. GII transforms many aspect
of the infrastructure of our daily lives. The new medium has special characteristics that affect
social value I which our bodies live in the world that is different I terms of physical and geographic
aspects. Scholars believe that technologies did not embody values but rather values come into
play only if and when technologies are used, a good example is guns, they don’t kill but people
do! Scholars of STS accept that technologies influence the direction and content of science
socially making them value-laden. By the study of science and technology two tenets are formed
first technologies shapes social patterns, and second, technology is shaped by its social context.
Expecting GII to carry values with whether to shape, enhance or diminish values this show that
we should accept GII has been shaped by social values. Two distinctions about the properties of
technology that Winner makes between intractable properties and flexible properties, the second
distinction is the relationship between properties of the technology and the social relationship
necessitated by the properties. Many who claim that GII is democratic seem to have in mind that
it facilitates unmediated communication between individuals but GII is also said to be intractable
democratic because telecommunication lines connect every individual to every individual in the
world. The social context may have little to do with explicit purpose or use of technology but the
values I technology con only be understood by understanding the social context of technology. An
understanding on the values associated with democracy is going back to the recent cultures of
hackers, where in early history of computers hacker were not viewed as criminals but rather
computer enthusiast who were mainly concern in helping each other out figuring how to do things
with computers, improving with on each others programs with no interest in who owns what or
what credit would be assigned to who. I disagree with who ever does not know how computers
work, will still have the chance to catch up, it just like a baby not knowing anything the moment it
was born, later as the child grows up he or she learns things more and more and may even reach
to the extent that they know more about something than any of us do not know off.

Lessons Learned
Computers were thought to be natural tools that acquire values only when used for
particular purposes. It is important to note that social encompasses values and values are one
aspect of the social. This means, values shape technology and technology shape values.
Technology embodies a pattern of social relationship connecting all individuals to all others. The
other claims that lead to saying technologies are value-laden is first, the moral or metaphysical
meaning of embedded values. Second, those who use or purchase the technology support the
values that create it. Third, the moral meaning of embedded values, material objects embody

50
A Compilation of Three Ethical Books

values in the sense that they convey values in their design. Values are activities, tasks, or
functions facilitated by the thing. Technologies exhibit superfluous efficacy or polypotency in their
functions, effect, and meaning. A good example is when a man uses an ordinary hummer to
pound nails, while pounding he learns the texture ad structural properties of materials. He
exercises and developed his muscles and improves his hand-eye coordination, and generates
noise all the while stressing and wearing the hummer itself. Because of the symbolic meaning of
such thing in our culture that is the mere reason why we buy them not because of their focal
function, those are just sometimes are lame excuses on why we buy there things. The GII
symbolizes a future in which global scale is being done by individuals engage in working, and
entertainment.

Integrative Questions
1. What is democracy?
2. What does it mean to say that technology carries a value?
3. What does it mean to say that values are embedded in technology?
4. Is GII compatible both with mediated or unmediated communication?
5. Do artifacts have politics?

51
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key Problems
and Challenges

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The problems face when applying together moral concepts theories and applicable
ethical theories to IT concepts.

Chapter Review
The notion of social issues in computing has become the trend when it comes to
employing the word computer ethics. But the confusion on remarking social issues in computing
are by no means all ethical in character. The dilemma in social context is the different approaches
of it according to the author the role of expert advisers should behave ethically. There is already
certain ambivalence in the use of the word ethics, and sometime choices like individual,
collective, or institutional are more or less excluded, and are left to a field labeled like moral
philosophy. Some other disturbing issues concerning the demarcation of computer ethics are jus
merely political and not ethical or eve moral in the broad sense. Prior regarding the issue of
software property rights under the banner in a quasi self-evident manner, one is inserting a strong
assumption without any form of proof. Moral concepts can at most be invoked in arguing for
participative decision making. Privacy turn out to be an not so debatable “core space” that can be
kept sacrosanct under any possible circumstances; it is always weighting of the various interest of
others. Concerning of some issues is just letting sociological considerations enter the ethical
discourse. Narrative forms as an indispensable mode are the primary source for questions
concerning IT. The ironic is taking into account the complexity of processes generating and
succeeding computer design can be stopped and unethical desirable consequences. A down-to-
earth approach is the use of “negative universalization by Wellner, in this line of thought we can
conceive that ethical discourse as a discourse for identifying what is definitely ethically bad,
bases upon what are suppose to be definitely unacceptable forms of inequality.

Lesson Learned
Sometime people tend to give no decisive clue as to what the precise content of
decisions or laws should be made they just sometimes want these and that, but they just merely
ask for the delicate balance of various interest form others. The place where ethics resided can
be found in the place of narratives and virtues. Chains of modern actions and consequences are
so complicated now a das that they do not follow a simple view on decision making. By the
patterns of argumentation and interpretation together in thinking of certain inequalities and
acceptance, the negative universalization gives aclues as to how low general ethics claim to be.

Integrative Questions
1. What are moral Choices?
2. How does individual choice be a concern in computer ethics?
3. Is it ethical to break the law?
4. Does IT propose specific ethical problems?
5. What is discourse ethics?

52
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Just Consequetialism and Computing

Learning Expectation
Where will Consequetialism lead to?

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Chapter Review
Consequetialism emphasizes consequences of policies within the constraints of justice
making it a practical and theoretically sound approach on ethical problems of computer and
information ethics. Basically the job of a computer ethics is to identify policy needs, clarify related
conceptual confusions, formulate appropriate new policies, and justify them ethically. Evaluating
polices and their ethical differences depending on the use should be our main concern. Every
action may be considered as an instance of policy. Conflicting descriptions form each and every
one makes an incompatible description of certain presuppose object or being that is being
described. Theories arise from the conflicting descriptions made by each one. Humans need
ability, security, knowledge freedom, opportunity, and resources in odder to accomplish their
projects. The protection of fundamental human rights should guide us in shaping ethical policies
for using computer technology. The burden of justification comes in when another human is
harming another human being. It is unjust for some one to use a king of policy which he or she
would not allow others to use, thus justice must require impartially toward the kinds of policies we
allow. A rational person making a policy and allowing others to follow it as well means he or she
accepts that policy, and a rational being would not harm you unless you harm them first. Whether
the policy consists of honesty towards the problem that may be encountering during the process,
it is still a good policy. The blindfold of justice allowing weights to the benefits and harms, but by
removing all knowledge of who will benefit and be harmed by one’s choice, by applying the
blindfold of justice to computer ethics this will provide constraints on consequetialism and this will
lead to an assessment on the merits of various policies using consequentialist considerations and
being able to select goods ones from those that are just. Making computer policies that avoid
unjustifiable harm to others should the main goal when developing or selecting a good policy.
Setting the right policy is just as hard as making the right decision in which everyone will agree to
your own decision.

Lessons Learned
The malleability of computers allows them to be used in novel and unexpected ways
which we do not have ways of formulated policies on controlling their use. Policies are guideline
of actions which are sometimes contingent upon different situations. Human beings will not
survive long if they do not put high positive values on life, happiness, and autonomy. Setting
ethical policies for computing is somewhat like a sailor charting a course to her destination be
dead reckoning, carefully laying out the course in a straight line on the chart.

Integrative Questions
1. What is should we watch out when constructing ethical computing policies?
2. What is a policy?
3. How do we implement a right policy?

53
A Compilation of Three Ethical Books

4. Is there an approach to justice that will allow us to resolve conflicts of actions or policy
when causing harm seems unavoidable?
5. If a policy was publicly allowed what are the consequences of it?

54
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


The Internet as Public Space: Concepts, Issues, and Implications in Public Policy

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
How are issues regarding the internet as public space being solved?

Chapter Review
Internet can be anywhere at anytime yet the very nature of its ubiquity hinders some of
the rights of every individual or organization. Internet is like having no walls around you can have
different abilities, even having the ability to be at two places at once. The information that is
broadcast is centrally originated, one to many, and therefore subject to tight control and stringent
liability. Low volume types of carrier are long gone already considering almost everyone is using
the internet and that we are in a global world of cyber space. The internet is more like a physical
space unlike the distinctions of a media is that functions do not follow form. The internet is like
being in a public place but you have your physical space, but at the same tie adhering with the
rules of that place. You are in a public place but at the same time in a private place. With all the
information coming right at your hands how do you know which one is the right information and
which one is fraud information. Laws have bee implemented by the usage of internets around the
world, and still may were also opposed. The issue of ownership of information has been
discussed with the public interest in mind. I would definitely agree that over reliance on the use of
technologies such as internet threatens the very essence of teaching. It is rally different once you
hear some one teaching you and you are face to face with that person. There is still doubt on the
minds of many. The issue of certification becomes crucial, but issues of content control versus
the freedom of access are not crucial at the level of universities. However the benefits are cross-
culture and multi-language is available in the internet. Vast amount of data may be available but
as a human being with no knowledge on medicine are you really hundred percent sure that you
are doing the right thing in terms of curing your own sickness. But with the access of vast
information across the world treatments can be made and preventable actions can be taken. The
internet being brought into school is also like bringing advertisement into school at the same time.
The definition of public spaces and public roles are a critical step in re-defining civil liberties and
other forms of freedom. Hiding valuable assets and calling them to be secure is absurd when
using the spatial model. The continuum possible with the spatial model would provide greater
flexibility with respect to privacy than the four discrete points of media spectrum. The spatial
metaphor will allow all the possible options to addressed without confusion and to give meaning
to the meaningless.

Lessons Learned
The internet is both personal and ubiquitous. For each public space there is always a set
of policy issue. Many tend to clarify the internet’s services into traditional media types, which they
should not, because the internet is a mechanism responsible for distributing user generated data,
and it is a common carrier. The public space is distinctive in term of time, space, and manner.
And yet physical spaces are separated by meaningful distances. One of the most salient
characteristics of the internet is every share the same work and place, yet they can carve a piece
of the space and claim it there own. The World Wide Web is the most visible instance of a digital
library. Online education is now possible with the use of internet together with web access. The

55
A Compilation of Three Ethical Books

vast amount of available medical data in the internet is changing the relationship between the
doctor and the patient. Regarding to clearance and settlements of accounts by doing business
globally via the internet, this may engender hostility, widespread fiction, and in the long run abuse
of electronic trust. Prejudice in the internet may narrow the minds of the children. Banner ads are
always available in the internet. Rick assessment is needed when determining the analysis
between risk and threats. The internet is a global connected space yielding more talks. The
history of media is a history of national assets rather than shared common space. Internet may be
also the cause sociological impact such as isolation, loneliness, and depression

Integrative Questions
1. What is information agora?
2. What is simultaneity?
3. What do you mean by saying the internet is a public space?
4. How is the internet a public domain?
5. is the internet providing a suitable space for the average citizen to more actively
participate in public affairs?

56
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


The Laws of Cyberspace

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What are these laws and how are they being crated on what basis?

Chapter Review
Our world as he author states has four sorts of constraints first the law in which is the
prominent of the regulations, second social norms which guides our behavior. Third, is the market
which regulates the price and sets opportunities through the ranges it regulates, and finally the
fourth constraint which some might call nature, but the authors calls it architecture, which limits
our boundaries in which we live in and not seeing the other part of the wall, it constraints our
ability of knowing what is on the other side. The words of James Boyle are the exact description
of the cyber space, you can’t live without it, but the moment you’ve got it, you can’t live long with
it. It is like you are caught in its addiction of being free from the control of real space sovereigns,
yet you can not control the behavior in it. Different places have different codes of conduct which
you can abide by or must abide by. We are subject to the code and it is not an option whether we
choose not to follow it. All other forms of regulation in real space depend of the most important
constraint the architecture. There is still a critical difference between cyberspace and the real
space, when we tend to follow laws of the real space and apply them to cyberspace. The only
information that the architecture of cyberspace lacks is the knowing of whom you are dealing
with, and because of anonymity being the default in cyberspace law and regulations are
practically hard to apply. The net it self is as independent as it is. Each choice one makes form
the architecture that enables political values is considered political as well. Constitutional values
should guide us In our design. We should also consider other forces that regulate our lives and
not just the four forces of laws. If and when indirection is possible in cyberspace, the people will
offer little protection against the government’s regulations of business. With the power of
encryption to authenticate the identity of a person government’s can recreate the power to control
and the power to regulate.

Lessons Learned
Russia had there own system of internal passports, which many of the Russians hated
this system. The fours sorts of constraints that regulates our world limits our freedom form doing
anything we please of. According to the author codes the software and hardware that constitutes
cyberspace as it is, it is how people interact and exist in this space. The most important
constraints in the distributions of porn to kids it not law but rather norms because these norms
does not enforce through some centralized norm enforcer but rather through the understanding
and expectation of everyone within a particular community. The net is as it is its nature will never
change; there is no single architecture that is essential to the net’s design, where technologies
that facilitate and technologies that control has a huge difference. Because there some
universities around the world the use technologies which control, and others technologies which
facilitate, and these machines that are being controlled and monitored are using intranet, but the
underlying protocols are still TCP/IP. The code it self is the constitution. Law can also regulate in
others ways not just through the threat of punishment but also to other modalities of constraints

57
A Compilation of Three Ethical Books

so that norms, market and architecture can be regulated differently. The US is the largest market
of internet products and these standard set by the US becomes the standards set to for the world.

Integrative Questions
1. What are internal passports?
2. What is an example of the behavior of a social norm?
3. What are codes? How are they the same from the four constraints in which we have in
our real world?
4. What are the political consequences of the change of the architecture in cyberspace form
freedom to control?
5. What is computing sovereigns?

58
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Of Black Holes and Decentralized Law-Making in Cyberspace

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What are black holes in cyberspace?

Chapter Review
This balckholed of the RBL is not that accurate when checking the senders’ numeric
internet address against the list of blackholed internet address. Email has become an
indispensable form of communication. The email is becoming an incalculable commercial and
non-commercial importance for a substantial and ever-growing segment of the world community.
The value of the email is being undermined by a barrage of unwanted and unsolicited
communications. This topic about the email is an interesting topic about whether the RBL is the
solution. The MAPS proposed a norm about open mail relay systems which they considered
unacceptable. The sanction that MAPS proposed is the Ur-Sanction of informal social control
process: Shunning and they will be the one’s to help you provide a means to accomplish this
sanction. After the cooperative agreement was due to expire, the Commerce Department made a
decision before walking away due to the expiration, it took steps in ensuring the stability of the
internet. Which it created a non-profit organization called the Internet stakeholders. Shortly,
thereafter the system was placed in the hands of a single government-authorized entity known as
Internet Corporation for Assigned Names and Numbers the have over all responsibility in setting
the rule. Efficiency justification rest on the hands of repeated trial and error and the pull and tug of
competing rules and counter rules, and other ways to find solutions to complex problems, it is
therefore obliterate the distinction between the normative and descriptive aspects of the internet.
The word better is always an alternative in cyberspace, because the condition in cyberspace
makes it difficult to specify alternative processes. Cyberspace makes it even more difficult to
identify the alternative rules-makers for purpose of normative comparison. It is impossible to see
the rules of spamming and its variants could produce, these rules cannot be laid side by side for
the purpose of analysis, deliberation, and debate. The fear of the possibility that the domain name
system would lead to a policy-making catastrophe of significant proportions would be possible,
left no one trying to do something about it. We may never know which problems to fix and how to
finding these problems in the internet but we should keep in mind that there are problems that are
best solved that may sometimes be worth bearing.

Lesson Learned
When Professor Field sent an email and it was refused to be sent to the recipient, and
link was provided, this link will take you directly to Mail Abuse Prevention System. The MAPS are
the ones creating and maintaining what they call the “Realtime Blackhole List” or also known as
RBL, this is where all the spam goes. Before the internet became such a big deal correctly routed
internet messages fell to the Internet Assigned Number Authority. Later when the internet
became explosive the database became hard to manage and the top-level domains where
passed on to the Network Solutions a private firm funded by the US government. Information
does not exist unless and until the process itself generates it. The internet is a messy, disordered,
semi-chaotic, unplanned, decentralized system

59
A Compilation of Three Ethical Books

Integrative Questions
1. What does The RBL does?
2. What does the MAPS does?
3. Is the RBL a means of solving the problem like the proliferation of unsolicited mass e-mail
operations?
4. How would we solve the seemingly impossible facing anyone trying to construct that
global network?
5. What is ICANN stands for?

60
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Fahrenheit 451.2: Is Cyberspace Burning?

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What are ways to make free speech in the internet impossible?

Chapter Review
The court said the online speech deserves the same protection as to books and other
printed matters. It may be sooner than we think that we may have a “family friendly” internet
rather than a free speech and democratic cyberspace. It will be unfair to block speeches that are
unrated and yet they do not have harsh words that would require parental guidance at any word
that is being said or read. If it is in the nature of the internet and the quality of speech on the
internet that entitles it tot have the same free speech protections as the same as the books,
magazines, and casual conversations. Being able to have casual conversations with no censoring
makes the internet the most participatory form of mass speech yet developed. Will the freedom of
us users of our own computer be also limited? Rating your own speech on the internet is like also
rating your own speech hen you are just having a casual conversation with your friend
somewhere; in the neighborhood or in your house. Food labels compared to internet ratings are
very different. Rating someone’s own creativity is just like judging someone’s work. You want to
say something that you think would help another person on the net but you cannot help that
person because you conversation would be rated. What would to the possibility of communication
around the world if speeches are being rated.

Learning Expectation
What alarmed most the ACLU and the other cyber-liberty community was the long term
implications for the internet rating and blocking schemes. Libraries are free speech zones, thus
libraries in the internet should also be free speech zones. The results of rating themselves are all
pejorative by definition. Speeches are entitled to the highest degree of constitutional protection.
The virtue of the internet is that it provides all sorts of communication. The library is the place to
be it is a place of inclusion.

Integrative Questions
1. What alarmed the ACLU and the other cyber-liberty communities?
2. Is the internet like televisions and should be rated and censored?
3. What is the difference between the role of the government and the role of the judge in
free speech for the internet?
4. Will other controversial matters become unavailable in the internet soon? How?
5. What is the nature of the internet?

61
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Filtering the Internet in the USA: free Speech Denied?

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
Will the communication Decency Act of 1996 be diminished for good?

Chapter Review
Different programs of rating have different type of dimensions which they rate for
example the RSACi rates includes violence, nudity, sex, and language. Users should have
options on whether they want to enter the site or not. If it is true that only some will rate the
content then will the governments and other agencies know about whether this site Is harmful or
not. Makers of filtering internet products claim that information is proprietary and its disclosure
should provide a roadmap to objectionable material. What if blocking images and some disturbing
ideas won’t be able to control by some parents because their some hackers in the world that are
very good at hacking or tampering file which are not theirs. Libraries serve the commitment to be
an open and free inquiry to the public. Why would you filter internet in one’s home when that
serves as the right for one’s property and freedom, there are laws that must be taken into
consideration before filtering or blocking one own home. The separation of adults and children
regarding the use of the internet might be a good idea. Training users with the use of the internet
and what they can get form the perils of the internet. Filtering and blocking software’s should be
able to be turned off and on at anytime.

Lessons Learned
The internet is much vaster than the television end the contents are virtually feasible to
be unimaginable. Different readers will still rate the contents differently and most likely only some
will rate that content. Other conservatives groups like religions and some in the politics have
urged the governments to block sexually explicit and possibly controversial internet contents
which are not conservative enough. The libraries must adhere to the principles of intellectual
freedom. The debate between the first Amendment Act and the protection of the children is an
issue which is still not yet solved. Self-rating is destructive of art, quality, and self-respect. The
concern with causing offense or with disturbing established social norms tend to limit expression.

Integrative Questions
1. What was Judge Leonie Brinkema’s opinion on the U.S. District Court?
2. What are examples of filtering and blocking programs?
3. What did NCLIS proposed?
4. What is the danger of self-rating?
5. is there any other way to help children form accessing harmful sceneries in the internet
beside filtering and blocking programs?

62
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Censorship, the Internet, and the Child Pornography Law of 1996: A Critique

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
If censorship would be implemented in the internet would there be still freedom or
democracy regarding the use of internet?

Chapter Review
An amended law would provide privacy protections to all identifiable individuals, adults
and minors, by requiring the consent of depicted individuals before any image involving nudity
could be posted to any newsgroup. The judgment as to whether an image depicting an
identifiable individual is or is not of a prurient nature would ultimately reside with the depicted
person. Again, where more than one identifiable individual is depicted, the judgment by any one
individual that the image is prurient would be sufficient to prohibit publication of the image. Here it
may be argued that there would be no issue of requiring the consent of minors, or more
appropriately, of their legal guardians, since prurient images of them remain illegal; however,
since not all photographs of minors involving nudity or prurient, the provision requiring consent
would guard against violations of privacy of a sort closely related to that involved in the non-
consensual publication of prurient images. These features of an amended law represent only a
few of the elements of a more comprehensive and more just approach to dealing with the
problems represented by child pornography and, more generally, by the prurient. Naturally, the
features are not without problems, and a great deal of work remains to be done. It should be
clear, however, in the age if the Internet, the problem of child pornography, like so many other
arising in a visual medium, must be construed to involve violations of privacy; indeed, such
violations should be counted among the most basic of the harms we should seek to prevent.

Lesson Learned
We, as adults, should always take the precaution of preventing prurient images to be
accessed by minors. We should make it a fact that blocking softwares for prurient contents in the
web should be installed in all libraries and in all public elementary and secondary schools.

Integrative Questions
1. What is CPA?
2. What does prurient material mean?
3. What was the bill the Frank, H. R. H. John McCail passed?
4. What is the requirement of the Bill “Safe School Internet Act”?
5. What is Child Pornography?

63
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


PICS:Internet Access Controls Without Censorship

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
Will PICS really block content in the internet and prevent children form seeing harmful
object in the internet?

Chapter Review
PICS provides a labeling infastructure fo the internet. It is values-neutral: it can
accommodate any set of labeling dimensions, and any criteria for assigning labels. Any PICS-
compatible software can interpret labels from any source, because each source provides a
machine-readable description of its labeling dimensions.
Around the world, governments are considering restrictions on on-line content. Since
children differ, context of use differ, and values differ, blanket restrictions on distribution can
never meet everyone's needs. Selection software can meet diverse needs, by blocking reception,
and labels are the raw materials for implementing context-specific criteria. The availability of large
quantities of labels will also lead to new sorting, searching, filtering, and organizing tools that help
users surf the Internet more efficiently.

Lesson Learned
PICS is a very useful content filter, specially for children. It blocks contents depending on
the user. Not everyone needs to block reception, parents may not want to expose theis kids to
violent images, businesses may want to prevent employees from visiting recreational sites, and
government want to restrict some files from the public. PICS does all simultaniously.

Integrative Questions
1. What is PICS?
2. What are the factors in content filtering?
3. What are labels?
4. What are the four most important components of PICS?
5. What are the choice of service ratings with PICS?

64
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Internet Service Providers and Defamation: New Standards of Liability

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The role of ISP on the internet.

Chapter Review
We have sought to demonstrate here that policies and governing defamation liability on
the internet needs substantial revision. The prevailing interpretation of the Communication
Decency Act, which provides absolute immunity for ISP's, is mistaken and dangerous. Also, those
calling for the abolition of libel laws in cyber-space have not taken into account that not all
publishers or speakers there operate from the same level playing field. Hence, given the
continued relevance of libel law and the need to assign liability, we have sought to articulate a
more tenable standard of moral accountability for ISP's. While ISP's do not cause defamation,
they provide an occasion or forum for it, and herein lies the potential for their vicarious liability.
But accountability must be grounded in capability: An agent should only be held accountable for
failing to perform X if it has the power to do X. Technical and economic factors make it virtually
impossible for ISP's to take preventive measures that detect or filter out defamatory messages.
Thus, we cannot hold ISP's responsible for preventing defamation unless they are indeed acting
like publishers and exercising editorial control. We can, however, hold the accountable for failing
to take certain actions once they are informed that a victim has been defamed. These steps
include prompt removal of the defamatory remarks, the issuance of a retraction on behalf of the
victim, and the initiation of a good faith effort to track down the originator so that the defamation
does not reoccur. None of these actions are especially burdensome, economically unfeasible, or
inconsistent with an ISP's capabilities. This standard of accountability is a reasonable middle
ground between the extremes of strict liability and immunity from all liability. It can therefore serve
as a foundation for developing a more sensible regulatory approach to the matter of ISP liability.

Lessons Learned
The Communication Decency Act provides immunity in the ISP. Instead ISP provides and
an occasion and forum in the cyber-space. We should not always assume and account ISP for
the failure s that occurs in the net. This might be just the cause of someone. The steps to make
for certain action one the certain victim has been defamed, are prompt removal of the defamatory
remarks, the issuance of a retraction on behalf of the victim, and the initiation of a good faith to
track down the originator. This steps wil be a more sensible regulatory approach for ISP liability

Integrative Questions
1. What is ISP?
2. Why should we not put all the blame on ISP?
3. What are the necessary steps we can take to account the failure other than ISP?
4. What is good faith?
5. What is liability?

65
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Digital Millennium Copyright Act

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To define the digital millennium copyright act

Chapter Review
Identification of the material that has been removed or to which access has been
disabled and the location at which the material appeared before it was removed or access to it
was disabled. A statement under penalty of perjury that the subscriber has a good faith belief that
the material was removed or disabled as a result of mistake or misidentification of the material to
be removed or disabled. The subscriber’s name, address, and telephone number, and a
statement that the subscriber consents to the jurisdiction of federal district court for the juridical
district in which the address is located, or if the subscriber’s address is outside of the united
states, for any juridical district in which the service provider may be found, and that the subscriber
will accept service of process from the person who provided notification under subsection or an
agent of such person. I don’t really know how this will eventually be better but one thing I am sure
of is that this digital millennium copyright act will be helpful to both users and developers because
it protects both parties by enabling copyright before use.
Believe it or not, it is necessary to cite your source. I know only few of us heard about
getting in trouble for it but it really is a big deal because one time, I have a classmate that, well,
plagiarized his work but he was able to get away with it. It might be an encouraging situation to
some but it really is insulting to others who do not plagiarize or at least to some who actually
accredit their source because it is their work and they have to be acknowledged if you are
planning to use their idea or content.

Lessons Learned
• Public Law 105-304
• Sec. 103 Copyright Protection Systems and Copyright Management
• Sec. 1201 Circumvention of copyright protection systems
• Violations regarding circumvention of technical measures
• Sec. 1202 Integrity of Copyright management information
• Online Copyright infringement liability limitation
• Limitations on liability for copyright infringement
• Limitations on liability relating to material online
• System Caching
• Information location tools
• Limitation on liability of non-profit education institutions
• Conditions for eligibility

Integrative Questions:
1. What is the title of section 103?
2. What is the title of section 1201?
3. What is the title of section 1202?
4. Explain the limitations on liability for copyright infringement.

66
A Compilation of Three Ethical Books

5. Explain the limitations on liability relating to material online.

Book Title
Cyber Ethics

Book Review Chapter


Note on the DeCSS Trial

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To be aware of the note on the DeCSS Trial

Chapter Review
In the fast-passed world of cyber law the first summer of the new millennium will be
remembered for two controversial cases. The first is the well publicized dispute involving web
sites such as Napster and Gnutella which allow users to swap MP3 music files. The music
industry has sought an injunction to prevent Napster, since the subject matter probably seemed
more arcane to the general public. Both cases have the potential to shape the precarious
landscape of intellectual property law but the effects of the DeCSS case. It is for a fact that
people want quality in a cheap price, which is how economics work. Sell it in the lowest price
possible and you will get as many buyers as you can because that way, you can earn profit. Let’s
keep this one a secret but I know a place, a magical place, where DVDs roam free and buyers
walk through the garden of piracy without any care of it violating a major rule. I made it sound like
a fairy tale but you know what is really going on in the world right now? We are surrounded by
piracy because people like it cheap and piracy is cheap which is why it is so hard to contain it in a
jar.
Piracy is all over the internet and the fact that it is makes it more invincible to defeat
because it is in the internet and that is a powerful place for something so in demand. Frankly, I
don’t really think that there can be something to stop the massive growth of piracy online because
everyone feeds the monster a little at a time so if there is something to stop this madness, I think
now is the right time to implement it.
I am not saying that piracy is a good resource; I am just implying that it is a massive
tumor that continues to grow online that allows people to become more and more aware of it
which is why if it has to be stopped, which I know it should be as soon as possible, it should
happen now so that the damage to those affected industries will be minimal.

Lessons Learned
• Technical background
• The lawsuit
• The outcome

Integrative Questions
1. Explain the technical background of the DeCSS Trial.
2. Explain the lawsuit in the trial.
3. What might be the outcome of the trial?
4. What is the actual outcome of the trial?
5. What is the DeCSS trial?

67
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


A Politics of Intellect Property: Environmentalism For the Net?

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What is the relevance of the environment in the net?

Chapter Review
Apart from the normal presumption in favor of informed democratic participation in the
formation of entire property regimes, it is argued that there are particular reasons why this
comparative political vacuum is particularly unfortunate. Drawing on some prior work, it is claimed
that our intellectual property discourse has structural tendencies towards over-protection, rather
than under-protection. To combat that tendency, as well as to prevent the formation and
ratification of a set of rules crafted by and for the largest stakeholders, it is argued that we need a
politics of intellectual property. Using the environmental movement as an analogy, I pointed out
that a successful political movement needed both a set of analytical tools and coalition built
around the more general interests those tools revealed. Welfare economics and the idea of
ecology showed that “the environment” literally disappeared as a concept in the analytical
structure of private property claims, simplistic “cause and effect” science, and markets that do not
force the internalization of negative externalities. Similarly, it is claimed that the “public domain” is
disappearing, both conceptually and literally, in an IP system built around the interests of the
current stakeholders, and the notion of the original author, around an over-deterministic practice
of economic analysis and around a “free-speech” community that is under-sanitations to the
dangers of private censorship. In one very real sense, the environmental movement invented the
environment so that farmers, consumers, hunters, and birdwatchers could all discover
themselves as environmentalists. Perhaps we need to invent the public domain in order to call
into being the coalition that might protect it.

Lessons Learned
• Policies of intellectual property
• The environment movement
• Welfare economics
• The disappearance of the public domain
• The environment movement

Integrative Questions
1. How will on political movement be successful?
2. What is welfare economics?
3. What is the environment?
4. What are the dangers of private censorship?
5. What is the environment movement?

68
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Chapter Review


Intellectual Property, Information, and the Common Good

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What is the importance of intellectual property and common good?

Chapter Review
Producers of information, who wants to maximize their control over its issue, and
therefore their ability to profit from it, find intellectual property very attractive concept because it
focuses primarily on the producers and their claims of ownership. These claims are not valid. As
we saw there are some convincing justifications for them, but incomplete.
To get a more adequate perspective, we need to step back and ask about the
significance and purpose of this information. When we do this, we gain a very important insight
that tends to be lost when we only think in terms of rights and property. That is that information is
about communication; it is meant to be shared. Ethical policies for the use and distribution of
information must take into account the social nature of information, even as they recognize the
legitimate claims of the producers, it is in this balance, Aristotle's median, that virtue is found.
Admittedly this approach does not lead to any startlingly new conclusions. In a sense it
just tells us what we already know. That is, intellectual property claims can only go so far. They
must be balanced against the common good. Moreover there are different types of intellectual
property and they must be treated differently. But the theory’s consistency with sound common
sense is its virtue. The ultimate standard for ethics is the collective moral wisdom of the
community. If a system gives us the same conclusions as the best minds in our society, it is
probably a pretty good system. That is more than can be said for some of the more extreme
proposals that have been advanced in the name of intellectual property.

Lessons Learned
The two basic justifications for the philosophy of intellectual property is first the Lockean
Justification or also called the labor theory of property. A person may acquire Lockean by
Justification by owning a property from making a claim of something that is not really yours in the
first place.
The Helegian Justification is what you own is your right to sue someone who sold it and
made profit forming it without your consent. Because creative works are an act of self-expression
and self-realization. It does not only belong to the creator of the object but it is part of him, and so
the real owner has the right to have the proper consent regarding what to do with the object that
he or she has created or owns.

Integrative Questions
1. What is Helegian?
2. What is labor theory?
3. What is intellectual property?
4. What is Lockean Justification?
5. Who is Justin Hughes?

69
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the
Private Properties of intellectual work in the United States.

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What were the theories, laws, and practices regarding the private properties in the US?

Chapter Review
United States copyright law is theoretically based on policy created within a framework
that valued the interests of the people as a whole over the interests of an individual creator. The
original framework is being slowly dismantled to give more weight to the interests of individual
creators. This shift in policy is often defended based on the ethics of allowing a creator control
over her work. However, this ethical position does not generally extend to moral rights. Moral
rights, of course, only benefit creators, not publishers or distributors. This calls into question
whether the extension of rights is based on an ethical position or in reaction to pressures exerted
by those whose profits depend on the protections granted by copyright. Copyright was created as
policy not an ethical construct, but many treat the law as if it is, or should be, such a construct.
Copyright law as currently constituted does not appear to have a consistent ethical basis nor to
provide a consistent policy to promote learning and the useful arts. To provide a basis for this
examination, some varying constructions of rights, property, and intellectual property will be
presented along with a brief history of copyright in the United States. The copyright legislation
passed by 105th Congress will be discussed as well as some current international aspects of
intellectual property. Then, with both theory and practice at hand, we will proceed to the ethical
examination. Sadly we will be unable to reach a conclusion on whether all aspects of intellectual
property are the matter of ethics, but we will have found that copyright in the United States is an
economic regime that pays homage to ethics only when it wishes to invoke a higher ground than
economic damages for reasons to obey the copyright law.

Lessons Learned
The implementation of copyright becomes more complex when applied to factual work. It
only protects expression by a certain being regarding the rights to use his or her worked with his
or her proper consent. . One could declare that society owns the economic rights of creative
works. Then society, in the form of the United States government would be taking a consistent
ethical position even if it choose to craft a policy of providing an inducement to create more works
by providing economic incentives in the form of economic copyright protection. There will always
be constitutional problems when trying to protect your own work from being copied by some one
else.

Integrative Questions
1. Why is copyright just an expression and not a fact?
2. What is copyright?
3. What is property right?
4. What does the 1909 Copyright Act states?
5. What is legislation?

70
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Chapter Review


On the Web, Plagiarism Matters More than Copyright Piracy

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The difference between plagiarism and copyright piracy.

Chapter Review
Connecting this chapter to the last one which tackles the ethical way of handling
copyright, plagiarism does matter more than the piracy of copyright.
Okay, so what is the different of piracy and plagiarism? Is it not the same or at least
similar by the nature of copyright? Piracy is infringement of copyright and plagiarism is failure to
give credit to the author of the source. I usually encounter these two issues online. Don’t even
wonder why online because I am certain that you are quite aware that everything is online and
everything being available online can be good if the user uses it correctly and ethically.
I won’t be a hypocrite and say that “No, I don’t commit any form of piracy... What is it
anyway?” because I myself, benefited from such illegal actions which I will not give details to
anymore. The bottom line is even someone who just connected to the internet can commit such
illegal act without an effort. There are programs that allow you to download files without copyright
such as music, photos, movies, and even ebooks which is so in demand right now. It may be
because of the internet serving easier and way faster alternatives to retrieve such files that makes
piracy unbelievably difficult to terminate. As for plagiarism, I already encountered this unethical
behavior before in one of my classes. No, I am not the one who did such thing but one of my
close friends. Our professor asked us to submit a nine page reaction paper on a movie which is
unrealistic because the movie alone is hard to understand. Going back, one of my friends was
laughing at us because he thinks we are all idiots by thinking and typing something down
ourselves without understanding the movie unlike him who just copied and pasted his reaction
from an unknown site. Of course I thought it was unfair on our side and so I asked him if sir will
allow us to use other source and if he did, there is no doubt that we need to site it but he said that
he didn’t cite is so that sir wouldn’t have an idea that he plagiarized the work of an unknown
author.

Lessons Learned
· Plagiarism
· Piracy
· Harm in Plagiarism
· Harm in Piracy
· Use of copyright
· Mix of both concepts

Integrative Questions:
1. What is plagiarism?
2. What is piracy?
3. Explain the harm in plagiarism.
4. Explain the harm in piracy.
5. What are the uses of copyright? Give at least two (2).

71
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


An Ethical Evaluation of Web Site Linking

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What was the output of the evaluation on wed site linking.

Chapter Review
As the World Wide Web has grown in popularity, the property of linking to other websites
has achieved some prominence as an important moral and legal issue. Hyperlinks represent the
essence of Web-based activity, since they facilitate navigation in a unique and efficient fashion.
But the persuasive activity of linking has generated notable controversies. While most sites
welcome and support incoming links, others block them or seek to license them in some way.
Particularly problematic are so-called “deep links” which bypass the home page along with the
extensive advertising and promotional material that is usually found there. While some contend
that a site’s mere presence on the web is implicit permission for virtually any form of linking,
others argue that at least in some circumstances deep linking is unfair and constitutes
misappropriation of intellectual property. Knowing that website linking causes little harm now, I
didn’t quite found this chapter useful at all considering that linking to other websites is often
recommended to us because it can generate revenue and number of clicks.
I suppose I just didn’t get the idea that clearly because of its way of explaining the concept of
such unethical activity. I didn’t even get the idea of respecting the common good.
Lessons Learned:
• The technical aspects of website linking
• Two case studies
• The ticketmaster vs Microsoft Case
• Maria’s online art gallery
• Websites as intellectual property
• Utilitarianism
• Labor-desert theory
• Personality theory
• Revisited deep linking
• Respecting the common good

Integrative Questions:
1. What is website linking?
2. What is deep linking?
3. Explain the harm of deep linking.
4. What are the two case studies covered in this chapter?
5. Is it necessary to gain permission first from a website? Explain your answer.

72
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


The Cathedral and the Bazaar

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To know what is the Cathedral and the Bazaar

Chapter Review
The fact that the bazaar style seemed to work, and work well, came as a distinct shock.
As I learned my way around, I worked hard not just at individual projects, but also at trying to
understand why the Linux world not only didn’t fly apart in confusion but seemed to go from
strength at a speed barely imaginable to cathedral-builders. By mid-1996 I thought I was
beginning to understand. Chance handed me a perfect way to test my theory in the form of an
open-source project that I could consciously try to run in the bazaar style. So I did – and it was a
significant success. This is the story of that project. I’ll use it to propose some aphorism about
effective open-source development. Not all of these are things I first learned in a Linux world, but
we’ll see how the Linux world gives them particular point. If I’m correct, they’ll help you
understand exactly what it is that makes the Linux community such a fountain of good software –
and, perhaps, they will help you become more productive yourself.There was a lot of concept I
had to understand for this concept to work for me. First of all is that I need to experience the
Linux world myself because i started using Windows when I was 11 years old and can you
imagine how long I have been using and trusting it? I never even tried any other operating system
because I got used to seeing that colourful window already whenever I my personal computer is
starting up. But it is time to change or at least try something new because if I stay with what I am
using now, I don’t think I will be a versatile developer.

Lessons Learned
I have got to know Linux before I can totally review what I learned from this chapter but of
course let me explain the use of open source. I love it! Yes, call me an advocate because I really
do use open-source and I am inviting other people to do it as well because it doesn’t only makes
our programming lives easier, it also helps the original developer by allowing other programmers
to help him develop his program more. It is as though the original developer is trusting other
programmers his complete or incomplete program to be developed more and to be used and
reused because it is how things should work and honestly, that is what I think, the true sense of
creating an object-oriented program because developers can use and reuse the objects present
in an OO program.

Integrative Questions:
1. Why should the mail get through?
2. What is the “cathedral” mean?
3. What is the “bazaar” mean?
4. How will you know if one is a good programmer? Give at least two characteristics.
5. Why is it really important to have users?

73
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Towards A Theory of Piracy for the Information Age

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What has happened to piracy during the time of information age.

Chapter Review
I have argued that using the core value framework, privacy can be grounded both
instrumentally and intrinsically – instrumentally, as a support of all the core values, and
intrinsically, as an expression of security. I am, however, concerned that the traditional
instrumental/intrinsic understanding may be misleading. Traditionally, instrumental/intrinsic
analyses push us in the direction of a search for a summum bonum, a greatest good. We try to
find the one thing to which all other things lead. In the core value approach that I am advocating,
some values may be more important than others, but there is not a summum bonum. Rather the
model is one of an intersupporting framework. The core values, as the beams of a truss, are in
support of each other. There are a lot to learn with the term “piracy” alone and that is something
you can’t get away from especially if you are conscious about copyright security.
This chapter was particularly enlightening for me due to my surprise to the theory of
piracy. At first I was like “What? Theory of what? I never thought that actually has a theory” but
now I discovered that it should have because if it does not have a theory of its own, we would
speculate for eternity without truly unravelling the concept of piracy and why people continue to
spread that. I am not innocent in this matter knowing that in this generation, people are smarter
than they were ten whole years ago and it almost seemed as though people discovering fire has
the similar impact of people discovering internet. That is how huge internet is but of course, there
is always that deep dark negative side that we are all fond off – piracy. We all do it. Come on,
don’t even try and refuse answering this question because I know people downloaded a file or
two when copyright was dumped by online users to share files. I remember the day I first
downloaded an unlicensed file. I was just 13 years old when I experienced the bliss of having a
connection and getting music files for me to listen to. We didn’t know it was wrong for us to do
because first I was young and second, no one told us that such thing even has a theory! ( see
kids, that’s the reason why you go to school, so you get bored and learn new and great things,
significant or not). Imagine that. A thirteen years old kid committed an official crime. Well I guess
“ignorance of the law is REALLY not an excuse”.

Lessons Learned
• The definition of Greased Data
• Grounding Piracy
• The nature of piracy
• Setting and adjusting policies for private situations
• Publicity principle
• The rules and conditions of governing private situations

Integrative Questions:
1. What is the adjustment principle?
2. What is the definition of greased data?

74
A Compilation of Three Ethical Books

3. Explain the concept of Grounding piracy.


4. What is the setting of policies for private situations?
5. What is the justification of exceptions principle?

Title of Book
Cyber Ethics

Book Review Chapter


The structure of rights in directive 95/46/EC

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The protection of individuals with regards to the processing of their personal data
according to Directive 95/46/EC

Chapter Review
The Directive 95/46/EC of the European Parliament is the law being passed around
pertaining to the protection of individuals concerning the processing of their personal data and its
free movement through cyberspace and in the natural world. Basically , the processing of
personal data is only allowed if given consent by the owner . The directive starts off with a simple
sentence that states: personal data shall not be further processed in ways that are incomparable
to the purpose for which they were originally processed. From this we can derive that there are no
immediate specifics to what are the incomparable purposes are. Under what circumstances is it
legitimate to process personal data that are collected for different reasons and purpose, if these
purposes are morally and ethically right. According to the directive, there are 6 legitimate
purposes for gathering personal data. These are a)the data subject unambiguously gave his/her
consent. b)processing is necessary for the performance of a contract to which the data subject is
a part of. C) processing is necessary for compliance of legal obligation to which the owner is
subjected to. D) processing is necessary in order to protect the vital interests of the data subject.
E) processing is necessary for the performance of a task carried out in public interest. F)
Processing is necessary for the purposes of legitimate interests pursued by the controller or
owner. Again from these so called legitimate purposes, there are no clear limits to the processing
of data. But the last two is worth noting because it has specific conditions on when processing is
legitimate. There are cases when even if purposes are legitimate, processing is still not permitted
due to the personal data being of sensitive nature. Sensitive nature meaning racial or ethnic
origin of the subject, political opinions, religious beliefs, health and sex life, these are considered
sensitive topics or special categories of data for they can be very harmful to the subject and his
interests. The processing of these special categories are prohibited and only permitted if subject
has given his explicit consent. When processing has been permitted though, the subject has the
right to be informed and is entitled to information about the identity of the controller, purpose of
processing, and recipients of his data. He can add or change parts of his data according to what
is needed. And in addition, subject can rectify data if concerning himself if found that purposes
are incomparable or illegitimate. Still the directive has a lot of loopholes that any one can contest.
No clear limitations, no specific incomparable and illegitimate purpose makes this law easy to
bypass. Still the decision to process personal data remains on the hands of the subject, be the
purpose morally correct or wrong.

75
A Compilation of Three Ethical Books

Lesson learned
The idea of this directive 95/46/EC is for a better cause which is trying to protect our
personal data from being processed and passed. But the way it was written and presented was
so faulty that it is hard to differentiate black and white. When It comes to laws there can be no
gray area, and that is where this is faulty. How can you know if the purpose is wrong or right if
there wasn’t anything specific stated in the directive. This directive still cannot protect anyone’s
private or personal data. Right now, the only one that can protect personal data is oneself.

Integrative questions
1. What is the directive 95/46/EC of the European parliament?
2. What are the six (6) legitimate purposes for processing personal data?
3. Why racial or ethnic origins are considered sensitive data?
4. What is reprocessing of data?
5. What is the philosophical view on privacy?

76
A Compilation of Three Ethical Books

Title of Book
Cyber Ethics

Book Review Chapter


Privacy protection, control of information, and privacy enhancing technologies

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The roles and effect of control of information and privacy enhancing technologies

Chapter Review
In our daily lives we try to control information about ourselves. Things that can help us
progress, embarrassing things, and things that can eventually hurt us. It expresses itself by
choice, consent, and correction. The proper ways of controlling information are knowing to what
extent about oneself. In effect we can say that by controlling how much information we circulate,
we can lessen anything that can harm us or we can increase or progress the things that can aid
us in everyday life. A straight forward justification of privacy is that the protection it provides us
give us time to plan our lives, deciding what benefits we seek, harms we want to avoid. It gives us
a chance to decide what we want to undertake and risks we assume. Basically, the direct effect of
privacy is that it dictates most if not all decisions we make in our daily lives, how to create close
personal relationships, buying habits, or how and when to seek medical help. It’s a direct effect of
privacy. Control and privacy ultimately leads us to a greatly increased human happiness and
autonomy. Privacy enhancing technologies, or PETs, is specific online tools that individuals use
to control the amount of information share in an online community or activity. The reason why
PETs are so appealing and widely accepted is that it provides its users with control of their
information. It gives us the option of what information we send out. Nobody would deny the fact
that PETs are a valuable commodity nowadays in the cyber world. But still for all they’re worth,
PETs are still tools with limitations. Some have noted that anonymizing tools do not always
ensure total anonymity through out cyberspace. And government officials have stated that PETs
can harmful to national security be it carrying out criminal activities online or terrorists
communicating via encrypted messages can be hardly decoded by law enforcement agencies. It
is still up to the user if he/she would use these PETs or would he rather do individual control of
information.

Lesson learned
Controlling our private information helps us every day, its just that people don’t usually
see it. Control of information and helps the very foundation of our daily lives. Helping us decide
the things we want to do or things we want to avoid. Ultimately it leads us to reach the higher
level we want in life. Along with PETs, it really helps us control and maintain the most important
thing we have which is our personal information. Even if there are downsides to PETs, the help it
gives to the common man is far greater.

Integrative questions
1. What are PETs?
2. What is the difference between normative and descriptive privacy?
3. What is the control of information?
4. What are the downsides of PETs?
5. What is the use of control in the justification and management in privacy

77
A Compilation of Three Ethical Books

Title of Book
Cyber Ethics

Book Review Chapter


Toward an approach to privacy in public: challenges of information technology

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
Solving contemporary privacy problems

Chapter review
Privacy is important because it renders possible important human relationships. It
provides us the necessary context or tools for relationships which we’d be hardly human if we had
to do without. It’s how we create the relationship of love, friendship and trust. And still the
important thing is that, as humans, we still have some information that we protect. Namely
information about our personal and intimate aspects of life, intimacy could not exist if people
didn’t have the chance or opportunity for privacy. Having to exclude outsiders and resenting their
uninvited intrusions are very big parts of having an intimate relationship. Privacy between two
people is important. Having privacy is the most crucial and important part of forming relationships.
Without privacy, there can be no intimate moment. There can be no special moment in which only
the two people concerned would know about. The purpose of privacy is to insulate an individual’s
beliefs and objectives from social scrutiny. Thus, protecting the person and the reality of his
persona. As we urge conception of privacy that would extend consideration to all information,
including information gathered in the so called public realms. If successful, it would block the two
wrong assumptions that both explicitly and implicitly invoked by those who justify the compilation
of complex databases of the non intimate form of information. Other existing theories limit the
scope of privacy to the personal or intimate and then sensitive information relatively fails to
capture other elements of the common real judgments.

Lesson learned
Privacy is an intrical part of forming man’s basic necessities, relationships with others
people. With no privacy, then no relationship can ever transpire. Because those who are
concerned will have nothing special to share. Another benefit of privacy is that it can protect
someone from the scrutiny or discriminations of society. By protecting someone from scrutiny and
discrimination, it saves him his reality and his persona.

Integrative questions
1. What is the case of the lotus marketplace?
2. What are the two misleading assumptions?
3. What is in the category of information about people that is perfectly public or “up for
grabs”.
4. Explain erroneous assumption 2.
5. Can intimacy exist if there is no privacy?explain

78
A Compilation of Three Ethical Books

Title of Book
Cyber Ethics

Book Review Chapter


KDD, privacy, individuality, and fairness

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The negative social impact of groups profiling through KDD

Chapter review
Again according to directive 95/46/EC, processing of personal data and free movement of
such data is prohibited when the purpose for collecting the data is incomparable or illegitimate.
When data is gathered in an area, there can be social consequences as a result of unfair
treatment of the collected data. Generalization is one example of the social consequences that
can result due to mistreatment of data. When one person in a community has given out his/her
data, those who collected the data may use it as reference for the entire community. Hence
resulting in generalization. Getting denied provisions, insurances, loans, and jobs. Many will get
outraged by this thinking that it is discrimination. Prejudice towards a different race or ethnic
group, or even religious and morale beliefs. In the long run, unfairness in social interactions will
arise. There will be significant defiance from each and every one in the community. It should be
observed that group profiles do not give justice or respect individual privacy regarding the
protection of his/her personal data. Regarding the privacy of an individual subject, the reference
group as a whole, one might think that perhaps they could be saved by a notion of collective
privacy. However, the notion of collective privacy will not do the right job for it is easily associated
with collective rights. This is where categorical privacy. Categorical privacy is strongly connected
to individual privacy for the values that oppose individual privacy, equally oppose infringements of
categorical privacy. Unlike collective privacy, categorical privacy has its strong points in protecting
and respecting the individual rather than protecting the group to which the individual Is a part of.

Lesson learned
I learned that the negative impacts of group profiling can be easily avoided if those
processing the data would just be a little more careful in handling it. Generalizations, prejudice,
and discrimination can be avoided when those who collect the data carefully profiles each and
every individual in the community. Carefully collecting, processing, analyzing, and interpreting of
data will overwhelmingly eliminate any chance of negative social impacts by group profiling.

Integrative questions
1. What is the KDD?
2. What are the social consequences of group profiling?
3. How can these social consequences be avoided?
4. What is collective privacy?
5. Differentiate collective and categorical privacy

79
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Data Mining and Privacy

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation

Chapter Review
Patterns that are found when data mining have much useful knowledge discovery
process example, providing summary to the data is a very important and useful practice. The
practice of data mining prevents data from being interrupted and being pirated. Privacy is invaded
only if and when and means that bypassed the subject’s consent is manifested by the observable
behavior and the reasonable interprets of the subject. Privacy is thus broken when a government
actor acting without a search warrant is a violation of one’s own privacy. Even though something
already published is considered private it is a good moral to still ask permission form the owner
that you are going to borrow or take a look at his or her work because the fact that the former is in
the latter the association is still considered as private. Consider the fact that a mail man delivered
a letter the letter may not be private, but the address and the property of the home or lot is
considered private by who ever owns it and thus has the right to prevent someone form looking at
the mail publicly.

Lessons Learned
Ordinary information retrieval from the database returns database records is different
from the data mining technique which is discovering patterns which are implicit in the data and
can be used for either descriptive or predictive purposes. Data mining can be easily accomplish
with data warehousing; when data are highly structured, available in many different forms, and at
different levels. In the authors won point of view the thrust of the law protecting abstract property
form circumvention measures is philosophically motivated. Nothing publish can be considered
private anymore. Trying to find associations between two data and individual are all pre-
technological forms of data mining. Data mining is indeed a violation of privacy because no
technology can make something right from what is already wrong in the first place. Based on
cryptographic protocols there is a long standing set of methodologies which can provide such
protection if the court will not protect private data from being associated with each other and
forming new information about an individual.

Integrative Questions
1. What is data mining?
2. What is a data warehouse?
3. What is anti-circumvention rule?
4. How do you determine if you have legitimate rights of privacy on your own property?
5. Who is David Chaum?

80
A Compilation of Three Ethical Books

Book Title
Cyber Ethic

Book Review Chapter


Workplace Surveillance, Privacy, and Distributive Justice

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning expectation
The cause’s surveillance to the society

Chapter Review
Surveillance is more close and continuous than any human supervisor could be.
Employees have the right to their own privacy, and they have very good reasons for not trusting
the management of the company. Two major trends became the backbone for the contemporary
workplace surveillance. The first was the increasing challenges by the employees of their
conditions to work. The second trend was the rapid development of surveillance technology. Why
would you allow something to be monitored given your consent to someone, if you now that what
they might monitor in you is something you consider to be your own privacy that would be
absurd? It is true on other cases that what you will monitor besides having some valid reason,
you will not only monitor for that reason. It will be also hard to imagine assuming there is an
explicit monitoring policy, the sort of resources an individual employee will use to generate a
reasonable expectation of privacy. Surveillance may cause unfair allocation of blame, stress,
mistrust, a lost of dignity in one’s sense. Posner argues that is rather the choices, both explicit
and implicit the may lead to the mistrust of each other. Judging one own action or portraying one
own ability is the main concern of everyone, we can consider the fact the there will always be a
judgment my by someone to somebody. The issue of workplace is a legitimate concern for justice
in a context in which the employee is in a severe power of asymmetry. Privacy should be argued
based not on personal space but rather on fairness and organizational justice. I will never
understand the difference in the rights of an individual compared to the rights of an institution
regarding one’s own privacy.

Lessons Learned
Despite the establishment of liberal democracy the balance of power is still in the hands
of the employer. There is no legal obligation on employees to ensure the monitoring would be fair.
As less than 20% of office work in the US is unionized, it seems that decisions about work
monitoring are made solely at the discretion of employees. The lack of legislation in other
countries indicates that workplace monitoring is still largely viewed as a right of employee with the
burden of proof on the employee to show that it is invasive, unfair, or stressful. Like power
“surveillance passes through the hands of the mastered no less than through the hands of the
masters.” We are only surrounded by our won world we should learn how to let go of what we
believe and the values that are stuck in us and consider the fact that there are more out there
then we assume. We should be open minded individuals.

Integrative Questions
1. What is the use of surveillance?
2. Why surveillance is considered diminishing one’s own privacy?
3. Is the surveillance of an individual would lead to long term productivity improvements?
4. What is Denning’s well known quality dictum?
5. What did Posner argued about surveillance?

81
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Privacy and the Varieties of Informational Wrongdoing

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation

Chapter Review
The fact that personal information is used to inflict harm or cause serious disadvantages
to individuals does not necessarily make such uses violations of a moral right to privacy. Cyber
criminals and malevolent hackers are known to have used computerized databases and the
Internet to get information on their victims in order to prepare and stage their crimes. The most
important moral problem with 'identity theft' for example is the risk of financial and physical
damages. One's bank account may get plundered and one's credit reports may be irreversible
tainted so as to exclude one from future financial benefits and services. Stalkers and rapists have
used the Net and on-line databases to track down their victims and they could not have done
what they did without tapping into these resources. In information society there is a new
vulnerability to information-based harm. The prevention of information-based harm provides
government with the strongest possible justification for limiting the freedom of individual citizens.
Policies that encourage rigorous security measures must be put in place to protect citizens
against information-based harm. This seems to be a matter of security and not of privacy. No
other moral principle than John Stuart Mill's Harm Principle is needed to justify limitations of the
freedom of persons who cause, threaten to cause, or are likely to cause, information-based
harms to people. Protecting personal information, instead of leaving it in the open, diminishes the
likelihood that people will come to harm, analogous to the way in which restricting the access to
fire arms diminishes the likelihood that people will get shot in the street. We know that if we do
not establish a legal regime that constrains citizens' access to weapons, the likelihood that
innocent people will get shot increases. In information societies, information is comparable to
guns and ammunition.

Learning Expectation
Political Philosopher Michael Walzer states that liberalism is a plague by free-rider
problems. In contrast communitarians is a dream of a perfect free-ride. The logic of public goods
problem that contributes to the initial plausibility of the inspirations are information technologies
applications.

Integrative Questions
1. What did political philosopher Michael Walzer observed?
2. What is the definition of a free-rider?
3. What are the problems of a free-rider?
4. What is a Prisoners Dilemma?

82
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


PICS: Internet Access Controls without Censorship

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To know what PICS is all about.

Chapter Review
With its recent explosive growth, the internet now faces a problem inherent in all media
that serve diverse audiences; not all material is appropriate for every audience. Societies have
tailored their responses to the characteristic of the media. In most countries, there are more
restrictions on broadcasting than on the distribution of the printed materials. Any rules about
distribution however will be too restrictive from some perspective, yet not restrictive enough from
others.
On the internet, we can do still better, with richer labels that reflect diverse view points
and more flexible selection criteria. PIC, the Platfrom for Internet Content Selection, establishes
internet conventions for label formats and distribution methods while dictating neither a label
vocabulary nor who should pay attention to which labels. It is an analogous to specify where on a
package a label should appear and in what font it should be printed, without specifying what it
should say.
PIC provides a common format labels so that any PICS compliant selection software can
process any PICS compliant label. A single site or document may have many labels provided by
different organization. It also provides a labeling infrastructure for the Internet. It is values neutral
it can accommodate any set of labeling dimensions, and any criteria for assigning labels. Any
PICS compatible software can interpret labels from any source because each source provides a
machine readable description of its labeling dimensions.

Lessons Learned
• Flexible Blocking
• What PICS doesn’t Specify
• Uses of Labels
• 2 PICS Specifications
• Labe l Reading Software

Integrative Questions
1. What is PICS?
2. What are the specifications of PICS?
3. How do you make the internet better?
4. What is flexible blocking?
5. Identify ways to do flexible blocking.

83
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Defining the Boundaries of Computer Crime: Piracy, Break-Ins, Sabotage in Cyberspace

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To learn about the different types of computer crime.

Chapter Review
What this chapter discussed was if it was necessary to have a category for computer
crime. Following the first question is whether it is even needed. Albeit one might conclude that
there is no reasonable ground for having a separate category for computer crime. The three
perspectives of computer crime are legal, moral, and informational. In a legal angle, computer
crime might be seen as a useful category for persecuting certain kinds of crime. Arguments were
raised whether it is useful to have a distinct legal category of computer crime as a moral category.
Another said that having a category for computer crime as a descriptive category could help us
gain a certain level of clarity and precision in analyzing crimes involving the use of computer
technology. With such category will help us enable better to determine which characteristic
currently used to link together crimes associated with computer is relevant and which are not. By
showing why there is a need for separate category is justifiable on pragmatic grounds; one can
start noting that computers make possible certain kinds of criminal activities that had not been
possible before. Also having a category would enabled us to resolve some of the conceptual
Confusions and other crimes involving computers, would eventually help us frame some coherent
normative and policies regarding computer crime. The three types of computer crime are crimes
that can be done only with the use of computer technology. These are software privacy,
electronic break-ins and computer sabotage. One propose of this study is to determine whether a
coherent definition of computer crime can be framed.

Lesson Learned
I learned about the different kinds of computer crimes and what makes them so. It was
also emphasize whether or not there is a need for category in computer crime. We saw that
having a category could help to eliminate some of the predicament associated with computer
technology. We saw that for certain illegal activities at first may seem like a criminal act but a
closer look it is not, at least now in a strict in the strict sense of category criminal activity. I learned
to establish criteria for computer crime as a descriptive category. We consider descriptive than
legal or moral is to gain a clearer understanding of those conditions that separates computer
crime from activities using the computer.

Integrative Questions
1. What are the three perspectives of computer crime?
2. Is it needed to have a computer crime as a descriptive category? Why.
3. What were Morrison and Forester suggesting in establishing a clear and coherent
criteria.
4. What is Moor’s insight regarding certain “conceptual muddles?”
5. What are the three types of computer crime?

84
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Terrorism or Civil Disobedience: Toward a Hacktivist Ethic

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
Is hacking a form of terrorism or civil disobedience?

Chapter Review
Hackers are seen as marauders who vandalize, terrorize, and sabotage. No one has
seen them as electronic activists or “hacktivist.” These attacks are evidence of a new form of civil
disobedience. They can possibly play an active and constructive role in the over coming of
political injustice, to educate them, inform, and be genuine agent of positive political and social
change. Hacktivism is defined as the use of computer hacking to help advance political causes in
secret. It is also to go against corporate domination, rapid expansion of dataveillance, and the
hegemonic intrusion. The two institutional forces that hacktivist protests are the commodification
on the Internet held by corporate profiteer and violations of human rights at the hands of
oppressive governments. Hacktivism poses potential threats at two levels: the private industry
property level and the national government security level. Peaceful breaking of unjust laws is
entailed by civil disobedience. It does not allow destructive acts but focuses instead on nonviolent
means to expose wrongs, raise awareness, and prohibit the implementation of perceived
unethical laws by individuals, government, corporations, or organizations. By drawing attention to
a problem indirectly, symbolic acts of civil disobedience are done. Examples of symbolic acts of
civil disobedience are: sit-ins, other forms of blockage, and trespass. Electronic civil disobedience
on the other hand ranges from conserving acts like sending an email and publishing Web sites, to
breaking into computer systems. Most ECD is to disrupt the flow of information in and out of
institutional computer system. To be able to justify hacktivism’s direct action and to theorize
foundation, there are two things that must be demonstrated. One is it must be shown that
hacktivism is not the work of curious teenagers with advance knowledge of technology and a
curiosity for infiltrating computer networks. Crackers are those who break into systems for money
or vandalism while cyberterrorists are those who use computer technology with intentions of
causing harm. Two is that politicized hacking must be shown some form of civil disobedience, a
way that is morally justified. Penalties for civil disobedience is mild compared to hacking.
Penalties for hacking are seen with the same degree of force as of hacking in general, despite of
motivation. Hackitivism is no to be identified with cyberterrorism as acts of hacktivism are more
similar to acts of civil disobedience than of terrorism. The three core principles of the hacker
ethics are: access to computers. All information, and mistrust authority. Hacktivist concentrate on
freedom on information and are suspicious of centralized control over or private ownership of
information. Because of their ethics, hackers are directly confronted with comer-industrial
complex that wishes to control and own the Internet.

Lesson Learned
I have learned a better understanding of what a hacker is, I was given a clear view of
what is considered civil disobedience and which is terrorism. I learned that steps must be made to
separate political direct action to organized criminality or cyberterrorism. For hacktivism to be
legitimate protest it must be provided sound ethical foundations meaning expanding the ethical
justification of civil disobedience to include acts of hacktivism.

85
A Compilation of Three Ethical Books

Integrative Questions
1. Define hacktivism.
2. Give examples for symbolic acts of civil disobedience.
3. Give examples of civil disobedience that are considered?
4. What are crackers?
5. What are the three core principles of the hacker ethic according to Steven Levy?

86
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Web Security and Privacy: An American Perspective

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To know what is an American’s view about web security and privacy.

Chapter Review
From an American perspective, the legal tradition focuses on a right to privacy than a
need for data protection. The American common law was based upon the case law from the
United Kingdom. But this has changed in sync with the time modern times. In the Unites States
the right to privacy remains the dominant issue while in Europe focuses on data protection. Even
though in the US, there is no current legal protection for web privacy, the right to privacy in the
analog equivalents to web-based actions has been recognized in the American legal tradition.
Privacy needs security. For without the ability to control access and distribution of information,
privacy cannot be protected. If the owner of information can control the information then it is
secured. The same goes for with the subject if information. Anonymous information has no
subject therefore it is private. Anonymity needs security but guarantees privacy. Privacy is often
mixed up with confidentiality.
Integrity, authentication, and confidentiality are the three goals of security. Integrity
means that information is not changed; meaning that what is received is exactly what was sent. It
also means that during storage, information is not changed. Authentication needs establishing
user identity or other interests. Authentication is needed for access control for it enables it.
Access control can protect privacy by keeping records of who used the data about a certain
person. This way it increases patient control of data, which leads to the possibility of increase
patient privacy. Cryptography is a tool of computer security. The three types of cryptographic
tools are hash values, public key cryptography, and private key cryptography. Hash function
compresses information and provides the ability to verify unpredictable values. There are two
types of cryptography for encryption: public key and private key. In private key there is one key
shared between different parties while in private key there is a set of keys, the owner holds one
set and the other used by various people. Looking for information depends on the policies,
physical configuration, and practices of the user’s Internet Service Provider. The ISP affects what
information is made available when the person connects to the web. ISP services include
fingered and plan generation. The type and version of costumer’s browser is what information
availability depends upon. In legal terms the Europe and Canada have principles of data
protection while US is based on privacy.
There are two sets of rights to the American right to privacy: privacy to autonomy and
rights to seclusion. There are four types of privacy rights access: intrusion upon selection,
appropriation of name and likeness, false light, and the public disclosure of private facts.
Autonomy is where the constitution was based.

Lesson Learned
I learned about the American’s view about web security and privacy. Even though it was
based from the United Kingdom it was still molded to fit the American tradition. I learned about
the ways and kinds that information is protected.

87
A Compilation of Three Ethical Books

Integrative Questions
1. What is the difference between the United Kingdom and United States in terms of legal
consideration?
2. What are security’s three goals?
3. What are the three types of cryptographic tools?
4. What are the four kinds of privacy right cases?
5. What does the first, third, fourth, fifth, and ninth amendment state?

88
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


The Meaning of Anonymity in an Information Age

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
How long can a person stay anonymous and its ways.

Chapter Review
Using the dictionary meaning of anonymity, it means not identified by name; of unknown
name. Another is having no outstanding, individual, or unusual features; unremarkable or
impersonal. And behavior to indicate the confidentiality maintained. Before people think that it
would be enough to not include your name in to remain anonymous. But now people could find
you with even the slightest hint. By giving small information about yourself they could narrow it
down until you are spotted. A technique marketers use to look for possible targets. A possible
reason why people want to be anonymous is because it gives us freedom. Freedom of thoughts
and expression without the feeling that someone might come banging at your door demanding an
apology. Also by remaining anonymous they could prevent the fear of reprisal and ridicule. And
anonymity could allow people to reach out and help. Being unreachable is what at stake in
anonymity. To secure being unreachable one must encourage in understanding and to pursue
advocacy. Opaque identifier is a technique of defying anonymity. It is a sign linking reliably to
person. The opaque identifier holds no clue on who this person it and how to reach him/her. But
opaque identity could be compromise as sometimes pseudonyms have patterns. It is important
that people should understand a level on integrity for each level of opaque expectation.

Lesson Learned
I learned that the value of being anonymous does not lay on staying nameless but in the
possibility of interacting while remaining unreachable. Being unreachable means one would go to
your house demanding an answers and so forth. I learned that you must have an accurate
knowledge of the existing level of integrity. I also learned that anonymity is not a all-or-nothing but
can be achieved in degrees and through layers of cloaking.

Integrative Questions
1. What does it take to be anonymous in an information age?
2. What are the benefits of being anonymous?
3. What are the reasons that people would like to remain nameless?
4. What is the difference between an opaque identifier and a natural occurring one?
5. What is “opaque” identifier?

89
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Written on the Body: Biometrics and Identity

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To know what is biometrics and it’s relevance to cyber ethics.

Chapter Review
Protection of information is taken to another level with biometrics. Biometrics is usually
described as the next big thing in information technology. It involves the collection with a
censoring device of digital representations of physical features that is unique to an individual and
the typical behavior patterns. Van Kralingen gave an answer to the question, what kind of identity
is biometrics identity? Van made a distinction between determination of identity and verification of
identity. Determination of identification refers to a process involving investigations into a range of
personal data while verification involves the comparison of two dates to determine if they belong
to the same person. Identity as a self-knowledge is different for it refers to the beliefs, values, and
desires. Biometrics as authors say it is not just about identity check. It is about establishing the
sameness of the individual than affecting the issue of what makes this person unique and
different. At first one will think that biometrics is an innocent technological practice that only in a
trivia sense is personal identity concerned. However there are reasons that say no to trusting the
accounts to easily. One is the traditional stress in philosophical accounts of identity. In the matter
of identity as being uniqueness of a person the body has disappeared completely replaced by a
disembodied kind of self-reflexivity and subjectivity. The second is that relativities the
philosophical distinction between the two concepts of identity which is the difference between the
concept of identity as sameness of the person, and identity as the object of self-knowledge about
an individual’s values, beliefs, and desires. Expressing the difference would be to characterize
the former as a perspective of a third-person and the latter as a first-person perspective. But
there are problems with this, thus the assumption that biometrics is only concerned with the third
person. The reasons are first; social and cultural dimension in identity becomes ignored and
second; the performance occurs in a cultural, social, and material world where technology forms
an increasingly significant, constitutive self. According to a representative of the Committee on
Banking and Financial Services they are gathering medical information; it is not just about
biometrics. Biometric data are seen as very sensitive information.

Lesson Learned
Sometimes people get to caught up with their cyber self that they forget who they really
are. In was argued why it was not healthy for users to leave their body behind and let their
imagination run wild. Problems that rose are first the assumption that the body is irrelevant and
second the assumption that in electronic interaction the body is left behind. Its still warns us to be
careful of the ease with personal information for anybody who is interested enough could find us.

Integrative Questions
1. Describe biometrics.
2. What are the two concepts of identity?
3. Explain the reasons why biometrics is not easily accepted.

90
A Compilation of Three Ethical Books

4. Name at least three people who contributed to virtual identities through research.
5. Give examples of virtual identity.
Book Title
Cyber Ethics

Book Review Chapter


Ethical Considerations for the Information Professions

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To learn what is expected of information professional.

Chapter Review
The field of information ethics is relatively new. According to Walter Maner “information
ethics” reflects the meeting of the social, the technological, and the philosophical. It is defined as
the philosophical study of moral behavior, of moral decision-making, or how to lead a “good life.”
There are three major realms: descriptive-focusing on situations and conditions; normative-
focusing on what ought to be and lastly meta-ethics –the logical analysis of moral languages and
the aim to make precise the meaning of moral terms and clarify arguments that are at stake.
Theories of ethics include universalism and relativism. One of the major issues discussed it
consumerism. The example given in this chapter is the information online that has payments. In
would be unfair for those who do not have the resources to buy these information. Another are
those who make the information, they must be charged with a responsibility to provide resources
and services that do not disrupt cultural traditions. They should follow theories of cultural
relativism to avoid colonialism. Information professional should know where else to get
information or else they will be getting information from the same mainstream. A scarcity of
selection is an ethic dilemma, as information continues to be centralized. And this can result to
erasure or adaptation of historical record. Information professionals must teach about the
responsible, use, understanding, evaluation, and preservation of information. They must also
understand intellectual property laws and the ethical under printings in order to teach others of
these responsibilities. They have to educate the public about ethics and be better equipped to
recognize, understand, and react professionally in complicated situations.
The code of ethics comes in many forms. Some can be extremely detailed while some are in a
form of conceptual ideas. But in general it can be understood as a set of “best practices.” It must
give guidelines for justice, beneficence, independence, objectivity, and professionalism. It must
be descriptive and demonstrates the guiding ethical principle. There are four channels in which
professional codes should be judged: obligations to society, obligation to employer, obligation to
clients, and obligation to colleagues and organization. As information professional it is their
responsibility to defend principles of social, personal and organization responsibility.

Lesson Learned
I have learned all the responsibility of the being an information professional to the public.
As someone who specializes in information, you have to look for other ways of obtaining
information. The information that you write in the other hand must be unbiased, not centralized
and as much as possible available to all.

Integrative Questions
1. What are the three major realms of ethics?

91
A Compilation of Three Ethical Books

2. What should a professional verse?


3. What the things an information professional should be able to educate the public?
4. What are the four channels which professional codes should be judged?
5. Name the two phases of question that is used for evaluating and justifying behavior
Book Title
Cyber Ethics

Book Review Chapter


Software Engineering Code of Ethics: Approved!
IEEE-CS/ACM Joint Task Force on Software
Engineering Ethics and Professional Practices

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To know what is expected of a software engineer.

Chapter Review
Since version 3.0 and 5.2, there have been many changes. The eight Principles were
reordered to reflect in which software professionals should consider most important. 3.0’s first
Principle was the Product while 5.2’s first Principle is the Public. A shortened version was added
to the full for clear guidance for the application of these principals. The Preamble to the code
includes specific ethical standards to help professional make ethical decisions and emphasizes
the obligation to the public at large. The ‘Public Interest’ is central to this code meaning the
primacy of well being and the quality of life of the public, all decisions related to software
engineering is emphasized. The Code contains clauses against using prejudices in any decision
to be open minded, thus taking care of new social concerns that may arise. The purpose of the
Code is to document the ethical and professional responsibilities and obligations of software
engineers and informs the public about the responsibilities that are important to this profession.
The code instructs practitioners about the standards the society is expecting of them as well as
their own peers. A project has been made by ACM and the Computer Society to support the
professionalism of Software Engineering. 5.0 is recommended by the IEEE-CS/ACM Joint Task
Force on Software Engineering Ethics and Professional Practices as well as the ACM and the
IEEE-CS as the standard for teaching and practicing software engineering. The short version of
the code summarizes aspiration in a high degree of abstraction. It says that software engineers
shall commit themselves to making the analysis, specification, design, development, testing, and
maintenance of software a beneficial and respected profession. In the full version contains eight
Principles related to the behavior of and decisions made by professional software engineers and
those who are in the same field.

Lesson Learned
I learned that the purpose of developing a Software Engineering Code of Ethics is to
document the ethical and professional responsibilities and obligations of software engineers. It is
intended to educate and inspire software engineers and to inform the public about the
responsibilities that are important to this profession. In situations, the software engineer is
required to use ethical judgment to act in a manner that is most consistent with the code. I
learned what is expected of what it is like to be a software engineers. The code should influence
software engineers to consider who is affected by their work, see if colleagues are treating other
humans with respect, and to see if their acts are would be judged worthy of the ideal professional
working.

92
A Compilation of Three Ethical Books

Integrative Questions
1. Who adopted the code?
2. What id the difference between 3.0 and 5.2
3. What is the purpose of the Software Engineering Code of Ethics?
4. What is the project of ACM about?
5. Enumerate the eight Principles.

Book Title
Cyber Ethics

Book Review Chapter


No PAPA: Why Incomplete Codes of Ethics Are Worst Than None At All.

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
To know why it is better to have no code than an incomplete one.

Chapter Review
According to Richard Mason the ethical issues concerning information age are vast so it
is helpful to focus on just four. The problem with focusing on just four categories, other issues that
could have been important are ignored. Important moral issues were set as examples that not
everything could be put under the PAPA headings. First example is weapons. The question of
whether technology for the use in weaponry ought to be developed. At this informational age it is
an ethical issue, for a large sum of resources are spent by the military for information technology.
Relating weaponry: for being killed violates privacy. Next is environmental impact. By the
materials used in the development of computers, and how they are disposed is the reason for
moral concern. Computer production can help cause pollution for the materials used are harmful
to the environment. Looking at it in a property angle, there will be two tangential relationships to
the environment. Upsurge of Access to computing would result to increase in production that
would then increase environmental degradation. The solution to the development of teleworking
technologies that can redistribute work and wealth, in terms of teleworking or as called in the
USA, telecommuting key moral issues are of isolation and the moral impact of any changes in the
location work. A relocation of work can have consequences because travel to work uses
resources and causes pollution. Peter Davis on the other hand asked if any code supports the
weak against the strong. On some ways all four of PAPA’s issues can be used when it comes to
protecting the weak against the strong. Access considers the position of the weak while
protection of Property usually protects the strong. The PAPA’s code does not give guidance nor
suggests that it would give guidance. Any moral code could be turned to by anybody who is
looking for an easy way out making the code like an excuse for immoral acts. Moral code could
be abused if they are leave themselves open to it. To avoid the criticism discuss issues at a time,
it is a good idea to acknowledge the existence of others.

Lesson Learned
I learned that you have to be careful in writing a moral code for you need to be aware that
it could be abused. There are a lot of people ready to use something that was made of the
welfare of everybody for immoral acts. Now I can see why it would be better to have now code at

93
A Compilation of Three Ethical Books

all than to have one that is incomplete: because it is open to abuse. Based from the previous
chapter it was a handful to remember 80 principles. Ethic, even software ethics, could be vast.

Integrative Questions
1. Who wrote the “Four Ethical Issues of the Information Age?”
2. What does PAPA stand for?
3. What are the two tangential relationships to the environment?
4. According to Kluge what is the best way to develop codes?
5. What can be a way to avoid moral code abuse?

94
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


Subsumption Ethics

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
What is subsumptions ethics all about?

Chapter Review
The difference between a machine and a human is that a machine I controlled by a
human and it will only stop if it is programmed to stop at a certain period, or by manually stopping
it. In others words a machine is just a dumb machine with no mind, the programs that were
designed by humans are basically what commands a machine to do. The enabling technique of
object-oriented programming is just like subsuming a small system into a larger system once that
system is tested and developed consistently. Once a system is subsumed it is already forgotten,
unless it requires attention again. People who design, develop, and use the system have ethical
impacts on it. And the impact is determined on how the subsumed objects or the decisions that
were made during the stage of programming and retrieval of information for the design and
implementation of the system. In order for a design and a development to be effective a
continuous ethical analysis on the subsumtion ethics needs to be implies, and one of the
requirements for this analysis is a ethical framework to be applied. Decisions made for a system
should be without desire and aversion rather is be base on empirical reality. In a project that an IT
is building you should always assume that small changes have major ramifications and major
implications on outcomes. Thus, IT professionals must be experienced, trained, and a careful eye
on the details. The reverse formulation of the golden rule is the basis of the liberal system, which
is why there is a law, saying do not do onto others, what you do not want them to do to you.
Taken to the extreme on following the golden rule you will be the only one to suffer for it. To apply
the golden mean one must learn about the sbject and identify the extreme responses, and after
that only then one can make decision based on reason to seek the mean between extremes.
Because IT evolves fast and sometime is not anymore under anyone’s control, it can be a
destructive and a creative force when joined and the need for subsumtion ethics is most
important for controlling IT.

Lessons Learned
The process of an IT system by nature repeats over and over again like a cycle. The
Greek word ethos if translated means ethics, and can be translated as habit, and these words are
all closely related to subsumtion. Subsumed objects have high determinant value, high invisibility
factor, and the complexity increases over time. The four ethical principles that could provide a
framework for IT decisions is the golden rule, the golden mean by Aristotle, actions without desire
and aversion, ethical complexity

Integrative Questions
1. What are the four ethical principles?
2. What is subsumption ethics?
3. What are subsumed objects?
4. What is Niskama karma?
5. What are the negative effect of the golden rule?

95
A Compilation of Three Ethical Books

Title of Book
Cyber Ethics

Book Review Chapter


Professional Ethics and Codes of Conduct: Ethical Issues in Business Computing

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectation
The aspects and importance of ethics in business computing

Chapter Review
It is recognized today that businesses have turned to using computers in order to be
more efficient. Unfortunately, businesses have turned a blind eye on the possible misuse of
computers and the disadvantages they can affect because of the misuse. It is therefore important
to understand that in introducing this kind of system in handling business, there must also be
proper understanding of the ethics that are necessary for proper management. Business
computing is defined by Langford as “any activity using computers which is undertaken by
business.” With this definition, he goes on to say that ethics differs depending on the size of an
organization or business. He separates them into four levels ranging from the “smallest scale” to
the large companies which necessitate a “team of computer specialists”. Langford explains that
the size of a business greatly affects the kind of ethical issues they might face. Despite this, he
does mention that there are still common issues that all sizes face. He divides these issues as the
“actual manner in which computer systems are employed” and “the use that is made of company-
owned data.” In the “actual manner” he explains that computer systems are used to improve the
efficiency in a business’ data collection. By “use” he means how the business actually
manipulates these data using the system available to them. In conclusion, Langford explains that
the best way to address these ethical issues is to provide adequate knowledge on the proper use
and limitations of these systems, as well as implementation of policies to avoid misuse.

Lesson Learned
1. Business computing is very advantageous in terms of efficiency but with the lack of
adequate knowledge on proper use and the absence of policies, misuse will be
inevitable.
2. Misuse of the data using the systems available to a business could actually be a legal
matter which could cause major problems to a business.
3. Even small-scale businesses need to have policies on the use of business computing.
4. There is a need to understand exactly what the role of a computer system is in a
business before including it in the business operations.
5. No matter what size of business you have, it is impossible not to employ a computer
system into your operations.

Integrative Questions
1. How does Duncan Langford define business computing?
2. According to Langfod, what are the 2 ways of ethical oversight of computer use?
3. What are the 2 categories of data considerations?
4. What are the 4 levels of business computing?
5. How does the size of a company affect business computing?

96
A Compilation of Three Ethical Books

Book Title
Cyber Ethics

Book Review Chapter


The Practitioner from Within: Revisiting the Virtues

Library Reference: N/A

Amazon Link
http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-
keywords=cyber+ethics&x=0&y=0

Learning Expectations
What are virtues?

Chapter Review
As users of computer technology, we are faced with a myriad of ethical problems
generated by computer mediated action. Invasion of privacy, using the internet for pornography
and illegal access to information and systems have become newsworthy as the sex scandals and
more far reaching. The response to these issues, at least in the United States, has been tried to
pass laws to stop the abuse. As we have seen this attempts at regulation are seriously disputed
by those who value the freedom associated with the global information infrastructure and are
hacked around by those with technological expertise.
Traditionally computer ethics texts and courses involve taking students who are not
philosophically trained, exposing them to action guiding theories presenting them with the codes
of ethics of several companies and professional organizations and asking them to make ethical
decisions in scenario based cases.
And so the answer to our mutual concerns lies in open discourse between our groups:
those from without and the practitioners from within. The reality of computer technology is that
sooner or later we will all become practitioners from within on many different levels. We therefore
need a commonality of language that will cross the global infrastructure of information
communication technology. So appreciate the approaching computer ethics through moral
agency does not negate serious attention to action nor concern for objects in the information
infrastructure. Rather it adds one more dimension to a complex field and approaches computer
ethics as the integrative, global field that it is.

Lessons Learned
• Character forming vs. Action guiding theories
• Need for contemporary moral theory
• Revisiting the virtues
• Core vales
• Practitioner from within

Integrative Questions
1. What are the core values and explain each.
2. What do you mean by revisiting the virtues?
3. What virtues are mentioned?
4. What is character forming and action guiding theories.
5. What is ethics?

97

You might also like