itethic reader v2
TRANSCRIPT
-
8/9/2019 Itethic Reader v2
1/53
ITETHIC Reader:
Version 2
Created by:
Chino S. Apoloni
This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License.
PREFACE
1
-
8/9/2019 Itethic Reader v2
2/53
This second book of mine was done in a complex way. It
is complex because this term is overloaded. The time
when I was doing this book is also the time that I had a
lot of projects and thesis. With all of those challenges thatconfronted me, still I was able to finish my second book. I
was able to manage my time very well because of the
help of my family, friends and God. It was really a
pleasure for me to do this book. This book is very
important for me because it helps and affects the people
around the world. There are a lot of lessons and issues
that you will learn as you read this book. I would like to
thank Mr. Paul Pajo because he once again, gave me an
opportunity to create and annotate another book about
Ethics.
2
-
8/9/2019 Itethic Reader v2
3/53
DEDICATION
Family
For giving me the strength and willingness tounderstand reality in the world today
For giving me inspiration with regards to the
importance of education
Friends
For providing guidance all throughoutProfessor
For giving me another chance to create and annotate
a book
God
For giving me the spirit and enlightenment
3
-
8/9/2019 Itethic Reader v2
4/53
TABLE OF CONTENTS
Preface p.2
Dedication p.3
The Fortune at the Bottom of the Pyramid p6-12
The Handbook of Computer and Information Ethics
p14-50
4
-
8/9/2019 Itethic Reader v2
5/53
The Fortune at the
Bottom of the Pyramid
5
-
8/9/2019 Itethic Reader v2
6/53
Chapter 1: The Market at the bottom of the pyramid
Library Reference: N/A
Quote: The dominant assumption is that the poor have no purchasing
power and therefore do not represent a viable market
Learning expectations:
To understand who are being referred at the bottom of the pyramid
To know if there is really a fortune at that level
To understand the reality in our society
Review:
In this chapter, the topic is about the sector at the bottom of the pyramid.
The sector that I am talking about is the poor people. As said in the book,
there are 4 billion people who belong or who are in that sector. Also stated in
the book that aside from them having a 4 billion population, they only gain
$2 per day. With that statement, yes, there really is poverty on that area or
into that place. I cannot imagine where and what you can eat with that $2
per day money. With that, I assume that many children do not have the
capacity to study. It is because of the poverty spreading all over the sector,
which for me is a thing or a matter which should be prioritized. Education is
one of the most important activities a child or a human being must do. It will
affect their life positively when a particular person or a human is well
educated. For me, I value education very well. I think that when you are
educated, you can pursue your dreams. You can live and have a great
lifestyle. So with that, to sum up my review, at this point in time, there
should be a better approach which should help the poor people who are at
the bottom of the pyramid. The government should now move and to their
tasks. They should identify opportunities, innovations so that these people in
the sector should rise up and become equal as to what an ordinary people isdoing or aspiring.
Lessons learned:
There is money at the bottom of the pyramid
People should value education
6
-
8/9/2019 Itethic Reader v2
7/53
The pyramid structure
Integrative questions:
Who are at the bottom of the pyramid
What can be reason/s why they were put there?
What is the meaning of dominant logic?
How is the BOP market connected?
What can be ways to solve the crises?
Chapter 2: Products and services for the BOP
Library Reference: N/A
Quote: See and hear, not read
Learning expectations:
To know the products and services available at the BOP
To know the ways on how BOP can rise
To understand the reality in our society
Review:
In this chapter, the topic is about the products and services for the bottom
of the pyramid sector. As I have said in the previous chapter, the people at
the bottom of the pyramid are really at risk. They are in need because they
are so plenty and at the same time they do not have money. Thegovernment should move and prioritize them. With that, as C.K Prahalad
stated, the bottom of the pyramid sector can be a viable growth market.
There can be many opportunities founded there. Also, C.K Prahalad taught
the 12 principles of innovation for the bottom of the pyramid markets. There
should be price performance, Innovation hybrids, scale of operations, eco-
friendly developments, functionalities, process innovation, work deskilling,
7
-
8/9/2019 Itethic Reader v2
8/53
education of customers, infrastructures interfaces, distribution and
conventional wisdom for products and services. With that, I can say that it
really is an opportunity that should be done in that sector. What we need is
the government support, the government giving financial support. Another
thing that we need is cooperation from companies, industries and the market
itself. The last thing that we need to complete the process is the cooperation
of the people there. The more people that will help the faster will be the
development. To sum it all up, the key word is cooperation. It will be the
key to overcome the crises that is happening at the bottom of the pyramid. If
all of those said participants will do their duty or tasks, then definitely there
will be a change.
Lessons learned:
12 principles of innovation
Philosophy for developing products and services
The importance of the word cooperation
Integrative questions:
What are the 12 principles of innovation?
What are reasons why there can be market opportunities at BOP?
What is price performance?
What is an interface?
What is deskilling of work?
Chapter 3: BOP: A Global Opportunity
Library Reference: N/A
Quote: Social enterprise
Learning expectations:
To understand what are these opportunities
To know if it will be helpful
To understand the reality in our society
8
-
8/9/2019 Itethic Reader v2
9/53
Review:
In this chapter, the topic is about the global opportunities available for the
people at the bottom of the pyramid. As stated in the book, there are
reasons why there are global and market opportunities at the bottom of the
pyramid sector. First is that BOP markets are large and attractive and theycan be a stand-alone entities. Many local innovations can be done across the
Bop markets. They are also to find applications in developed markets. Lastly,
lessons from the BOP markets can influence the management practices of
global firms. Definitely it is good news for the people at the bottom of the
pyramid. All they have to do is cooperate so that development will be in a
faster manner. I have an example with regards to the development of a
place like the story of BOP. In our market place here in Pasig City, during the
early years, according to the old people I know, they told me that the Pasig
City market is like Divisoria. It is a smelly place with a very crowded person
and every store is unorganized. As time passes by, due to the cooperation of
the Pasig City government and the market industry, the Pasig City market
undergoes renovation. The places were cleaned, re-built, stores were
arranged accordingly and people who sell and buy were lectured on how to
maintain the place. This goes the same for the BOP sector. If they will follow
and cooperate the same as to our Pasig market, then they will have no
problem to encounter.
Lessons learned:
Local growth opportunities
Capital intensity
Reasons for having global opportunities at BOP
Integrative questions:
What is capital intensity?
What are the costs of managing?
What do you mean by living in a network of relationships?
What is a sustainable development?
What can be local growth opportunities?
Chapter 4: The Ecosystem for Wealth Creation
9
-
8/9/2019 Itethic Reader v2
10/53
Library Reference: N/A
Quote: I did not even know how to hold a mouse
Learning expectations:
To know the relation of ecosystem in the BP
To know more concepts
To understand the reality in our society
Review:
In this chapter, the topic is about Ecosystem. From wikipedia, the term
ecosystem refers to the combined physical and biological components of an
environment. An ecosystem is generally an area within the natural
environment in which physical factors of the environment together along
with interdependent organisms. In this chapter, it is not only the term
ecosystem which is fully talked about, another concept talked about is the
market-oriented ecosystem. Based from my understanding, a market-
oriented ecosystem is a binding between the private sector, the people at
the bottom of the pyramid and the social actors. What I meant by bind is that
they act together, they create wealth together for the development of the
people bottom of the pyramid. A concrete example of a market-oriented
ecosystem is Divisoria. In that said place, vendors are all over. Even if they
are plenty, they bind, they work together for all of them to survivefinancially. For me, that can be a market-oriented ecosystem. As long as
everyone helps, as long as everyone cooperates, there will be a continuous
improvement and development for all of them. To end up or to sum up this
case, the key words for people at the bottom of the pyramid are cooperation,
perseverance and motivation. Those words are the ones which will lead them
to growth and survival. I just hope that not only the people at the bottom of
the pyramid are the ones who are cooperating, but also the government,
private sectors and every community globally.
Lessons learned:
Opportunities at BOP
Ecosystem at BOP
Key words for BOP people to survive
10
-
8/9/2019 Itethic Reader v2
11/53
Integrative questions:
What is ecosystem?
How is it different from a market-oriented ecosystem?
Who supports the BOP people?
How do you reduce inequities in contracts?
What is asymmetry?
Source:
http://en.wikipedia.org/wiki/Ecosystem
Chapter 5: Reducing Corruption: Transaction Governance Capacity
Library Reference: N/A
Quote: Understood but not explicit
Learning expectations:
To know the concept of corruption
To know who are corrupt
To understand the reality in our society
Review:
In this chapter, the topic is about corruption. This chapter will bemeaningful to me because of the topic. Corruption is so known all around theplanet. It is because of the major impacts it can do to one government or onecountry. To start things of, let us define first what corruption is. Fromwikipedia, Political corruption is the use of legislated powers by governmentofficials for illegitimate private gain. An illegal act by an officeholderconstitutes political corruption only if the act is directly related to their
official duties. All forms of government are susceptible to political corruption.Forms of corruption vary, but include bribery, extortion, cronyism, nepotism,patronage, graft, and embezzlement. Relating it to the story, this may alsobe one of the main reasons why the poor people at the bottom of thepyramid suffered. It can be the corruptions happening within thegovernment. In the story, there were also assumptions why there are poorpeople. One reason based from the book is that the poor people lackresources. Another reason is that the poor people are being left out. With
11
-
8/9/2019 Itethic Reader v2
12/53
these assumptions, they will have a hard time to rise up. To sum up and toend the story, government officials should reduce poverty and corruption.Instead of them being bad and corrupt, they should help the people to riseand survive. They need the help of these politicians so that there will be nomore poor people in the future. Everything will be equal.
Lessons learned:
Corruption
Reasons why there are poor
eSeva
Integrative questions:
What is corruption?
What is eSeva?
What is TGC?
Why are the poor poor?
How do you reduce corruption?
Source:
http://en.wikipedia.org/wiki/Political_corruption
Chapter 6: Development as Social Transformation
Library Reference: N/A
Quote: Should I sell my corn today or hold back
Learning expectations:
To understand more concepts about BOP
To know how can transformation be established
To understand the reality in our society
Review:
12
-
8/9/2019 Itethic Reader v2
13/53
In this chapter, the topic is about development or social transformation.Social transformation, from wikipedia is the process by which an individualalters the socially ascribed social status of their parents into a sociallyachieved status for themselves. However another definition refers to largescale social change as in cultural reforms or transformations. The first occurs
with the individual, the second with the social system. Social transformationis one or can be the most difficult thing a person can do in his life. That isfrom my point of view. I said that because things, talking about big thingswhich will change our whole life due to that decision. It is like turning fromgrade school to college. That is how far the milestone could be in making abig decision like that. Relating it to the story, for the people at the bottom ofthe pyramid, they will have a long transition time if their place will bedeveloped. It can be because of the traditional things that they do. With thisdevelopment, those things that they do traditionally cannot be doneanymore. What they need is time. They will need a longer time for transitionbecause it is not that easy to change from one pace to another.
Lessons learned:
E-Choupal
Importance of social transformation
Importance of contributors
Integrative questions:
What is social transformation?
What is e-Choupal?
What can be outcomes of these transitions?
Why are women critical for development?
Can it be solved?
Source:
http://en.wikipedia.org/wiki/Social_transformation
13
-
8/9/2019 Itethic Reader v2
14/53
The Handbook of
Computer andInformation Ethics
14
-
8/9/2019 Itethic Reader v2
15/53
Chapter 1: Foundation of Information Ethics
Amazon link: N/A
Quote: "Life of Information"
Learning expectation:
- To understand what information ethics means
- To know how it is applicable to the society
- To know if it is really needed
Review:
This chapter talks about the introduction to Information Ethics. Based from
wikipedia, Information ethics is "the field that investigates the ethical issues
arising from the development and application of information technologies. It
provides a critical framework for considering moral issues concerning
informational privacy, moral agency , problems arising from the life-cycle of
information Information Ethics is related to the fields of computer ethics and
the philosophy of information. Dilemmas regarding the life of information are
becoming increasingly important in a society that is defined as "the
information society". Information transmission and literacy are essential
concerns in establishing an ethical foundation that promotes fair, equitable,
and responsible practices. Information ethics broadly examines issues
related to ownership, access, privacy, security, and community. Information
technology affects fundamental rights involving copyright protection,
intellectual freedom, accountability, and security. Professional codes offer a
basis for making ethical decisions and applying ethical solutions to situations
involving information provision and use which reflect an organizations
15
-
8/9/2019 Itethic Reader v2
16/53
commitment to responsible information service. Evolving information formats
and needs require continual reconsideration of ethical principles and how
these codes are applied. Considerations regarding information ethics
influence personal decisions, professional practice, and public policy."
In this chapter, what was talked must about was the RPT model. RPT stands
for resource, product and target model. The RPT model is useful to explain
why any technology that radically modifies the life of information. There
are four stages that composes the RPT model. IE as an information resource,
IE as an information product, IE as an information environment and IE as a
macroethics. To sum it all up, information ethics is important in our lives. It is
important because it contributes a lot to the society. As said by wikipedia, it
promotes fairness, equity and responsible practices.
Lessons learned:
- RPT model
- Information ethics
Integrative questions:
- What is information ethics?
- What is R in RPT?
- What is P in RPT?
- What is T in RPT?
- How many stages are there in the cycle?
Reference:
16
-
8/9/2019 Itethic Reader v2
17/53
http://en.wikipedia.org/wiki/Information_ethics
Chapter 2: Milestones in the History of Information and Computer Ethics
Amazon link: N/A
Quote: "automatic age"
Learning expectation:
- To know what is Information and computer ethics
- To know who Norbert Wiener is
- To understand the history of Information ethics
Review:
This chapter briefly talks about the history of computer ethics. Based
from the reading, the foundation of computer ethics was unintentional. It was
founded during the world war two. The ethical issues that
Norbert Wiener analyzed were computer ethics topics that are still of interest
today. They are computers and unemployment, computers and security,
computers and learning, computers for persons with disabilities, computers
and religion, information networks and globalization, virtual communities,
teleworking, the responsibilities of computer professionals, the merging of
human bodies andmachines, agent ethics and artificial intelligence. Forme, all of these topics are relevant and very important. They are very
important because they are rules which any person should abide with or
follow. There can be consequences if a rule is to be intercepted.
Aside from Norbert Wiener, there are different perspectives and people in
the foundation of computer ethics. They are Walter Maner, Deborah Johnson,
James Moor and Donald Gotterbarn. To sum it all up, whoever's theory is to
be read, the point is that we should follow the right or we should follow the
rules behind information ethics. It is important to have privacy, security,
integrity and credibility when using our computers. Another reason/s why weshould follow information ethics is for us not to be hacked by any other user.
Our works or creation should not be hacked and plagiarized by any other
human. For me, we should not only follow the rules in information ethics, we
should follow the ten commandements of computer ethics.
Lessons learned:
17
-
8/9/2019 Itethic Reader v2
18/53
- reasons to know information ethics
- people who contributed to the history of information ethics
Integrative questions:
- Who is Norbert Wiener?
- Who is Walter Maner?
- Who is Deborah Johnson?
- Who is James Moor?
- What are their similarities?
Reference:
the-handbook-of-information-and-computer-ethics.pdf
Chapter 3: Moral Methodology and Information Technology
Amazon link: N/A
Quote: the very possibility of moral thought and judgment depends on the
provision of a suitable supply of moral principles
Learning expectation:
- To know what is Computer ethics
- To know what is applied ethics
- To understand the meaning of generalism
Review:
This chapter talks about computer ethics. Based from the book, Computer
ethics is a form of applied or practical ethics. It studies the moral questions
that are associated with the development, application, and use of computers
and computer science. For me, this is a good matter to study specially thatwe are into Information Systems. These concepts of computer ethics will
provide us vital data that will guide us through our career. Next term to be
discussed is applied ethics. For me, what i have understand about applied
ethics is that it is an ethics that you know and then you do it actually.
Whatever is the rule that you read or understand, you will apply it when you
go out. Another term discussed was generalism. What i have understand in
18
-
8/9/2019 Itethic Reader v2
19/53
generalism is that we treat fairly all the rules that we know. It is not only
about the rules that you know. For me, even if you are not familiar with a
certain provision or rule, still you should follow it and treat it equally. That is
the meaning of it for me. Next term discussed was particularism. For me, this
is in contrast with generalism. Why is it in contrast? It is in contrast because
in particularism, you follow or you only apply the ethic or the conduct that
you think is correct. You do not treat it fairly. Whatever you know, that is the
only conduct that you will follow and apply. It is opposite with generalism. To
sum it all up, we should apply ethics in our everyday lives. We should always
apply the good and correct acts so that we will not violate anything.
Lessons learned:
- meaning of computer ethics
- applied ethics
Integrative questions:
- What is computer ethics?
- What is applied ethics?
- What is generalism?
- What is particularism?
- What is reflective equilibrium?
source:
the-handbook-of-information-and-computer-ethics.pdf
Chapter 4: Value Sensitive Design and Information Systems
Amazon link: N/A
Quote: how will this policy affect me and my family
Learning expectation:
- To know what is value sensitive design
- To know what is value
- To understand the meaning of Information Systems
19
-
8/9/2019 Itethic Reader v2
20/53
Review:
This chapter briefly talks about Value Sensitive Design. Based from the
book, Value Sensitive Design is a theoretically grounded approach to the
design of technology that accounts for humanvalues in a principled and
comprehensive manner throughout the design process. In this process, thereare three stages. For me, this concept is important for people and end-users
to fully understand the system. Design is an important matter because it
determines the willingness of the viewer if he or she would be using the
system because of its functions. If a design it not well made, then might as
well it will not be like by a lot. Nowadays, design is becoming critical. If the
design is not good, eye catching or unique, then expect that the users will
not go through or visit your website. That is how critical a design is in
Information Systems. Another term discussed in this chapter is value. From
wikipedia, value denotes "something's degree of importance, with the aim of
determining what action or life is best to do or live, or at least attempt to
describe the value of different actions. It may be described as treating
actions themselves as abstract objects, putting value to them. It deals with
right conduct and good life, in the sense that a highly, or at least relatively
highly, valuable action may be regarded as ethically good , and an action of
low, or at least relatively low, value may be regarded as bad". To sum it all
up, we should value the things that we do. We should value it because it
reflects our personality. The way we develop things. It is an important tool
for users and viewers.
Lessons learned:
- value sensitive design
- value
Integrative questions:
- What is value sensitive design?
- What is value?
- What are the three stages?
- What is conceptual investigation?
- What is empirical investigation?
source:
20
-
8/9/2019 Itethic Reader v2
21/53
http://en.wikipedia.org/wiki/Value_(ethics)
the-handbook-of-information-and-computer-ethics.pdf
Chapter 5: Personality-Based, Rule-Utilitarian,and Lockean Justifications of
Intellectual Property
Amazon link: N/A
Quote: The person must give himself an external sphere of freedom in
order to have being as Idea.
Learning expectation:
- To know what is an intellectual propoerty
- To know what is its value
- To understand the rights when claiming intellectual propert
Review:
This chapter briefly talks about intellectual propoerty. Based from
wikipedia, Intellectual property is a "term referring to a number of distinct
types of legal monopolies over creations of the mind, both artistic and
commercial, and the corresponding fields of law. Under intellectual property
law, owners are granted certain exclusive rights to a variety of intangible
assets, such as musical, literary, and artistic works; discoveries andinventions; and words, phrases, symbols, and designs. Common types of
intellectual property include copyrights, trademarks, patents, industrial
design rights and trade secrets in some jurisdictions. Although many of the
legal principles governing intellectual property have evolved over centuries,
it was not until the 19th century that the term intellectual property began to
be used, and not until the late 20th century that it became commonplace in
the United States. The British Statute of Anne 1710 and the Statute of
Monopolies 1623 are now seen as the origin of copyright and patent law
respectively."
For me, this really is an important matter. The topic being focused is on
rights. We should all value intellectual property in respect with the person
who owns. This chapter also talked about property rights.Property rights are
important in two ways according to this chapter. One is by controlling and
manipulating objects be it tangible or intangible, we have the right to claim
it. It will be our measure of our freedom. Second is our personality becomes
21
-
8/9/2019 Itethic Reader v2
22/53
infused with an object. The right to claim the work is very important to our
personality.
Lessons learned:
- intellectual property
- property rights
Integrative questions:
- What is intellectual property?
- What is property rights?
- What are the arguments in intellectual property?
- What is rule-utilitiarianism?
- What is a pareto-based proviso?
source:
http://en.wikipedia.org/wiki/Intellectual_property
the-handbook-of-information-and-computer-ethics.pdf
Chapter 6: Informational Privacy: Concepts, Theories, and Controversies
Amazon link: N/A
Quote: we will have to admit that we always have some degree of privacy,
since there will always be billions of people who have physically restricted
access to us.
Learning expectation:
- To know what is privacy
- To know what is privacy in different point of views
- To understand the discussions/arguments about privacy
Review:
This chapter talks about privacy. Based from wikipedia, privacy is the
"ability of an individual or group to seclude themselves or information about
themselves and thereby reveal themselves selectively.The boundaries and
22
-
8/9/2019 Itethic Reader v2
23/53
content of what is considered private differ among cultures and individuals,
but share basic common themes. Privacy is sometimes related to anonymity,
the wish to remain unnoticed or unidentified in the public realm. When
something is private to a person, it usually means there is something within
them that is considered inherently special or personally sensitive. The
degree to which private information is exposed therefore depends on how
the public will receive this information, which differs between places and
over time. Privacy is broader than security and includes the concepts of
appropriate use and protection of information."
In this chapter, not only the generic privavy was taught. Informational
privacy was taught. Again, based from wikipedia, Data privacy refers to "the
evolving relationship between technology and the legal right to, or public
expectation of privacy in the collection and sharing of data about one's self.
Privacy concerns exist wherever uniquely identifiable data relating to a
person or persons are collected and stored, in digital form or otherwise." For
me, whatever perspective of privacy you know, just do what is right. Do not
let yourself get into situations where you can be liable to court for damages.
Do the right thing so that you will not be in danger. The lesson learned here
is for you to respect your own individual. Whether it is information, sexual or
political privacy, still it is PRIVACY. Just respect. Period.
Lessons learned:
- privacy
- types of privacy
Integrative questions:
- What is privacy?
- What is informational privacy?
- What are the four kinds of privacy?
- Are they the same or different?
- How does Thomson define privacy?
source:
http://en.wikipedia.org/wiki/Privacy#Informational
the-handbook-of-information-and-computer-ethics.pdf
23
-
8/9/2019 Itethic Reader v2
24/53
Chapter 7: Online Anonymity
Amazon link: N/A
Quote: non-coordinatability of traits in a given respect
Learning expectation:
- To know what is anonymity
- To know what is/are its effect to the Information technology
Review:
Now, this chapter talks about online anonymity. What is online anonymity?
Based from my research in wikipedia, Anonymity is "without a name or
namelessness. In colloquial use, anonymous typically refers to a person, and
often means that the personal identity, or personally identifiable information
of that person is not known. Anonymity is a result of not having identifying
characteristics disclosed. This can occur from a lack of interest in learning
the nature of such characteristics, or through intentional efforts to hide these
characteristics. An example of the former would include a brief encounter
with a stranger, when learning the other person's name is not deemed
necessary. An example of the latter would include someone hiding behind
clothing that covers identifying features like hair color, scars, or tattoos, in
order to avoid identification."
For me, based from my perpspective, this matter should be focused on
very well. This matter is not a joke. This matter can do a lot of harm to the
world of the computer. The same as the previous chapter, privacy should
also be focused. These matters, privacy and anonymity are both related.
When wee use the internet for communication, sometimes we do not know
the exact identity of the person we are talking to. That is harmful because
they can be hackers. They might be needing a little information about us and
that's it. After quite some time, we were hacked. To sum it up, we should
always be careful when giving information to the people we do not know. We
should not give every important details so that we will not be hacked bysome who wants to try.
Lesson learned:
- anonymity
Integrative questions:
24
-
8/9/2019 Itethic Reader v2
25/53
- What is anonymity?
- What are the concerns regarding anonymity?
- What can be ways to become anonymous?
- Are they the same or different with privacy?
- What are the seven dimensions to be considered as anonymous?
source:
http://en.wikipedia.org/wiki/Anonymity
the-handbook-of-information-and-computer-ethics.pdf
Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism,
andCounterhacking
Amazon link: N/A
Quote: willingness to accept personal responsibility for outcome of actions
Learning expectation:
- To know what is hacking
- To know what is counter hacking
Review:
This case talks about three topics. These topics are hacking, hacktivism
and counter hacking. Let us start with the first term. Based from wikipedia,
Hacking refers to the "re-configuring or re-programming of a system to
function in ways not facilitated by the owner, administrator, or designer. The
terms have several related meanings in the technology and computer
science fields, wherein a hack may refer to a clever or quick fix to a
computer program problem, or to what may be perceived to be a clumsy or
inelegant solution to a problem." Next term is hacktivism. From wikipedia,
Hacktivism is the "nonviolent use of illegal or legally ambiguous digital tools
in pursuit of political ends. These tools include web site defacements,
redirects, denial-of-service attacks, information theft, web site parodies,
virtual sit-ins, virtual sabotage, and software development. It is often
understood as the writing of code to promote political ideology - promoting
expressive politics, free speech, human rights, or information ethics. Acts of
hacktivism are carried out in the belief that proper use of code will be able to
25
-
8/9/2019 Itethic Reader v2
26/53
produce similar results to those produced by regular activism or civil
disobedience." The last term discussed is counter hacking.
For me, these first two terms are the most fatal events that can occur to
the world of information technology. These acts can really destroy an
organization. These acts can destroy the credibility of a company or a personitself. What i can say is that we users should be very careful on our acts
when we use the internet. We should be careful what sites we visit and make
sure you dont make any online enemies. Get your firewall up and scan your
computer often. These can be the basic rules so that our information cannot
be stolen by anyone. We should always focus and be careful on what we do.
Lessons learned:
- hacking
- how to counter it
- hacktivism
Integrative questions:
- What is hacking?
- What is hacktivism?
- How do we counter hack?
- Are there consequences?
- What is Benign Intrusions as preventing waste?
source:
http://en.wikipedia.org/wiki/Hack_(technology)
http://en.wikipedia.org/wiki/Hacktivism
the-handbook-of-information-and-computer-ethics.pdf
Chapter 9: Information Ethics and the Library Profession
Amazon link: N/A
Quote: exposing someone to data might not provide that person with
information
26
-
8/9/2019 Itethic Reader v2
27/53
Learning expectation:
- To know what is a public library
- To know what is the relation with computer ethics
Review:
This case talks about Information Ethics and the Library Profession. I do
not have an idea on how they are related in the first place. From wikipedia,
the definition of library is a "collection of sources, resources, and services,
and the structure in which it is housed; it is organized for use and maintained
by a public body, an institution, or a private individual. In the more
traditional sense, a library is a collection of books. It can mean the collection,
the building or room that houses such a collection, or both. Public and
institutional collections and services may be intended for use by people who
choose not to or cannot afford to purchase an extensive collection
themselves, who need material no individual can reasonably be expected to
have, or who require professional assistance with their research. In addition
to providing materials, libraries also provide the services of librarians who
are experts at finding and organizing information and at interpreting
information needs."
For me, what is meant by library here are yahoo, google, wikipedia and
many more. They are the public libraries because anyone can easily research
an information that they want. Whatever age you are, wherever you live, you
can access all of these engine browsers. The problem is that with this easy
access on them, children can be exposed to violent, sexual and maliciuous
issues. For me, that is the relation of computer ethics to these libraries. We
need to apply computer ethics onto these engine browsers so that the
mindless or the children should not be exposed to the said topics. They can
be prevented or prohibited.
Lessons learned:
- relation of ethics to library
- 5 laws of library science
Integrative questions:
- What is library?
- What is information ethics?
27
-
8/9/2019 Itethic Reader v2
28/53
- How are they related?
- What are the 5 laws of library science?
- What are samples of these libraries?
source:
http://en.wikipedia.org/wiki/Library
the-handbook-of-information-and-computer-ethics.pdf
Chapter 10: Ethical Interest in Free and Open Source Software
Amazon link: N/A
Quote: primarily fighting to protect our way of making software
Learning expectation:
- To know what is an OSS
Review:
This case talks about free and open source software. Based from my
research in wikipedia, Free and open source software is "software that is
liberally licensed to grant the right of users to use, study, change, and
improve its design through the availability of its source code. This approach
has gained both momentum and acceptance as the potential benefits havebeen increasingly recognized by both individuals and corporate players. Free
is intended to refer to the freedom to copy and re-use the software, rather
than to the price of the software. The Free Software Foundation, an
organization that advocates for free software, suggests that to understand
the concept, one should think of free as in free speech, not as in free beer.
Free and open source software is an inclusive term which covers both free
software and open source software which, despite describing similar
development models, have differing cultures and philosophies. Free software
focuses on the philosophical freedoms it gives to users while open source
focuses on the perceived strengths of its peer-to-peer development model."
For me, there is nothing wrong with developing a free and open source
software. It is because money is not an important factor here. The important
factor here is your contribution to the people who are in need of it. Generally
it is your contribution to the whole society. For me, that is the most
important reason for a programmer or developer to build a software. It will
28
-
8/9/2019 Itethic Reader v2
29/53
be a big boost to your career if those users or people will like your creation.
That is one thing for sure.
Lesson learned:
- Open source software
Integrative questions:
- What is a free sofware?
- What is an open source software?
- Do we need to apply ethics in this situation?
- Who developes the OSS?
- How does open source originated?
source:
http://en.wikipedia.org/wiki/Free_and_open_source_software
the-handbook-of-information-and-computer-ethics.pdf
Chapter 11: Internet Research Ethics: The Field and Its Critical Issues
Amazon link: N/A
Quote: I understand that online communications maybe at greater risk forhacking, intrusions, and other violations. Despite these possibilities, I
consent to participate.
Learning expectation:
- To know what is an IRE
Review:
This case talks about Internet Research Ethics. Based from wikipedia,
Internet research ethics "involves the research ethics of social science,
humanities and scientific research carried out via the Internet." From the
book. Internet research ethics is an "emerging multi and interdisciplinary
field that systematically studies the ethical implications that arise from the
use of the Internet as a space or locale of, and/or tool for research." In this
29
-
8/9/2019 Itethic Reader v2
30/53
case, the three sources of Internet research ethics was also discussed. There
are three sources of IRE. One is professional ethics. This included the codes
for computer related courses. Second is the social sciences and the
humanities. Philosophers need to study humanities who used online as
amateur artists or authors who are using their creative mind to produce a
work that has a need for copyright protection for people who will be copying
their work. Third is the growing body of information and computing ethics.
We all know that there are issues that need to be answered regarding moral
ethics in having new information technology.
For me, to sum it all up, we should not just copy and paste works from the
net. If we want to copy, then we must source it out. We must include
reference and quotes to justify our work. We should be educated and
disciplined very well about this matter. It is because this is a serious matter
that may lead to plagiarism. It is important that we should be unique of what
we do. People are all unique. We have our own creativity. We should learn
and develop from that.
Lesson learned:
- IRE
Integrative questions:
- What is Internet Research Ethics in wikpedia?
- What is the principle of justice?
- What is Internet Research Ethics based from the book?
- Why do we need to be educated through this?
- What are the 3 sources of IRE?
source:
http://en.wikipedia.org/wiki/Internet_research_ethics
the-handbook-of-information-and-computer-ethics.pdf
Chapter 12: Health Information Technology: Challenges in Ethics, Science,
and Uncertainty
Amazon link: N/A
Quote: The Standard View
30
-
8/9/2019 Itethic Reader v2
31/53
Learning expectation:
- To know the issues that surround ethics
Review:
This case talks about two terms. Privacy and confidentiality. From
wikipedia, Privacy is the "ability of an individual or group to seclude
themselves or information about themselves and thereby reveal themselves
selectively. The boundaries and content of what is considered private differ
among cultures and individuals, but share basic common themes. Privacy is
sometimes related to anonymity, the wish to remain unnoticed or
unidentified in the public realm. When something is private to a person, it
usually means there is something within them that is considered inherently
special or personally sensitive. The degree to which private information is
exposed therefore depends on how the public will receive this information,which differs between places and over time. Privacy is broader than security
and includes the concepts of appropriate use and protection of information."
From wikipedia, Confidentiality has been defined by the International
Organization for Standardization as "ensuring that information is accessible
only to those authorized to have access and is one of the cornerstones of
information security. Confidentiality is one of the design goals for many
cryptosystems, made possible in practice by the techniques of modern
cryptography."
For me, privacy and confidentiality are both important and significant forall. They determine the safety of us users, developers or programmers
depending on how we created the Information System. For me, that is where
health comes in. If people are always being hacked, then what i can say is
that the programs that they use are not healthy. It is not healthy because
their identites are not secured. It will have a bad effect to the organization if
their softwares are not healthy. That is how i relate health and ethics to this
case study.
Lesson learned:
- Privacy
- Confidentiality
Integrative questions:
- What is privacy?
31
-
8/9/2019 Itethic Reader v2
32/53
- What is confidentiality?
- How will we know health condition is secured?
- Who develops Information Systems?
- What is the standard view?
source:
http://en.wikipedia.org/wiki/Privacy
http://en.wikipedia.org/wiki/Confidentiality
the-handbook-of-information-and-computer-ethics.pdf
Chapter 13: Ethical Issues of Information and Business
Amazon link: N/A
Quote: Information and communication technologies
Learning expectation:
- To know CSR
- to know Business ethics
Review:
This case talks more on Business ethics and Corporate social
responsibility. Based from my research in wikipedia, Business ethics is a
"form of applied ethics or professional ethics that examines ethical principles
and moral or ethical problems that arise in a business environment. It applies
to all aspects of business conduct and is relevant to the conduct of
individuals in business and business organizations as a whole. Applied ethics
is a field of ethics that deals with ethical questions in many fields such as
medical, technical, legal and business ethics. Business ethics is a contested
terrain. There are economists and business gurus who claim ethics is
irrelevant to the field of business." From wikipedia, Corporate social
responsibility is a "form of corporate self-regulation integrated into a
business model. Ideally, CSR policy would function as a built-in, self-
regulating mechanism whereby business would monitor and ensure its
adherence to law, ethical standards, and international norms. Business would
embrace responsibility for the impact of their activities on the environment,
consumers, employees, communities, stakeholders and all other members of
32
-
8/9/2019 Itethic Reader v2
33/53
the public sphere. Business would proactively promote the public interest by
encouraging community growth and development, and voluntarily
eliminating practices that harm the public sphere, regardless of legality."
For me, these terms that i have discussed are all very important. They are
important because it will or it can affect the many. A corporation or anybusiness should apply these terms that i have discussed. It will be a big
boost or a big impact on their line of business because they affect the
people. Whatever their actions are, good or bad, it refelcts everyone. Not
only to the company, but to all people who are inside it. We should know our
goals and objectives. We should know our mission and vision.
Lesson learned:
- CSR
- Business ethics
Integrative questions:
- What is CSR?
- What is Business ethics
- Are they related?
- What is the microlevel influence of business on ethics?
- What is the aim of business organizations?
source:
http://en.wikipedia.org/wiki/Business_ethics#What_is_Business_Ethics
http://en.wikipedia.org/wiki/Corporate_social_responsibility
the-handbook-of-information-and-computer-ethics.pdf
Chapter 14: Responsibilities for Information on the Internet
Amazon link: N/A
Quote: Expert information
Learning expectation:
- Information responsibilites
33
-
8/9/2019 Itethic Reader v2
34/53
Review:
This case talks about responsibilities for Information on the Internet. From
wikipedia, An Internet service provider , also sometimes referred to as an
Internet access provider, is a company that offers its customers access to
the Internet. The ISP connects to its customers using a data transmissiontechnology appropriate for delivering Internet Protocol datagrams, such as
dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.
ISPs may provide Internet e-mail accounts to users which allow them to
communicate with one another by sending and receiving electronic
messages through their ISP's servers. ISPs may provide services such as
remotely storing data files on behalf of their customers, as well as other
services unique to each particular ISP. Based from the book, the transactions
and procedures that occurs through the internet are good. I agree with that. I
agree with that because in this generation, almost all information or data you
need are already posted in the net. It is just one click away for you to get
what you want. The problem only is that we are not responsible for our
actions. What am i saying? Whenever we get something from the net or from
google, we do not source it out. We do not put quotes. That can result to
plagiarism. To sum it all up, we users should know the provisions when using
the internet. We should follow all guidelines so that we will not be sued by
the management. It is important so that we will not be liable for our
wrongdoings. We should be creative and unique.
Lesson learned:
- Information responsibilities
Integrative questions:
- What is ISP?
- What are the responsibilities of ISP?
- What did Deborah Johnson comment on ISP?
- What did Milton Friedman comment on ISP?
- Are they relevant?
source:
http://en.wikipedia.org/wiki/Internet_service_provider
34
-
8/9/2019 Itethic Reader v2
35/53
the-handbook-of-information-and-computer-ethics.pdf
Chapter 15: Virtual Reality and Computer Simulation
Amazon link: N/A
Quote: rape in cyberspace
Learning expectation:
- to know about virtual reality
- to know about computer simulation
Review:
In this chapter study, the topics being talked about are Virtual Reality and
Computer simulation. For me, they are new terms. Before we start, let usdefine virtual reality. Based from my research in wikipedia, Virtual reality is a
"term that applies to computer-simulated environments that can simulate
places in the real world as well as in imaginary worlds. Most current virtual
reality environments are primarily visual experiences, displayed either on a
computer screen or through special stereoscopic displays, but some
simulations include additional sensory information, such as sound through
speakers or headphones. Some advanced, haptic systems now include tactile
information, generally known as force feedback, in medical and gaming
applications. Users can interact with a virtual environment or a virtual
artifact either through the use of standard input devices such as a keyboard
and mouse, or through multimodal devices such as a wired glove, the
Polhemus boom arm, and omnidirectional treadmills. The simulated
environment can be similar to the real world." The next definiton to be
defined is computer simulation. From wikipedia, A computer simulation, is a
"computer program, or network of computers, that attempts to simulate an
abstract model of a particular system. Computer simulations have become a
useful part of mathematical modeling of many natural systems in physics,
astrophysics, chemistry and biology, human systems in economics,
psychology, and social science and in the process of engineering newtechnology, to gain insight into the operation of those."
For me, virtual reality and computer simulation are all good. They are
good because they are unique, they are all very fast and all of them are
useful. The problem is that it will be harmful to minors and to those who are
35
-
8/9/2019 Itethic Reader v2
36/53
studying due to its being addictive. What i can say is that to those who will
be involving into virtual realities and computer simulation, they should all be
careful so that their studies would not be affected by the games or
application of the said terms. It is alright to play, for as long as you have your
limitations.
Lessons learned:
- virtual reality
- computer simulation
Integrative questions:
- What is virtual reality?
- What is computer simulation?
- What are the ethical issues regarding virtual reality?
- Who can be affected by virtual reality?
- Are they relevant?
source:
http://en.wikipedia.org/wiki/Virtual_reality
http://en.wikipedia.org/wiki/Computer_simulation
the-handbook-of-information-and-computer-ethics.pdf
Chapter 16: Genetic Information: Epistemological and Ethical Issues
Amazon link: N/A
Quote: encompasses an account of the cell?s ability to store, express,
replicate, and change information. These are the fundamental features of
life, no less; and a schema that says something interesting about them all
has at least a scope to commend it.
Learning expectation:
- to know about genetic information
Review:
36
-
8/9/2019 Itethic Reader v2
37/53
This case study talks about the relation of Information Technology to
Science. The topic focuses more about gentics. From wikipedia, Genetics, a
"discipline of biology, is the science of heredity and variation in living
organisms. The fact that living things inherit traits from their parents has
been used since prehistoric times to improve crop plants and animals
through selective breeding. However, the modern science of genetics, which
seeks to understand the process of inheritance, only began with the work of
Gregor Mendel in the mid-nineteenth century. Although he did not know the
physical basis for heredity, Mendel observed that organisms inherit traits via
discrete units of inheritance, which are now called genes." Whati can say is
that Information Technology and Science are related. They are related in the
sense that scientists can do its experiment as fast as they can because of
the technology or gadget that they use. It is now very fast and easier to
perform. The problem with this is that some of the scientists use the
technology for cloning, DNA testing and many more, which for me isunethical because we do unjust things to them. We do unjust things to
human beings or to animals. For example, a person kills a dog. The reason
why that dog died is because the cells are needed by a scientist for cloning.
In my opinion, that is so unethical because we risk lives just to make an
experiment. How and what about the value of that animal? Before we
perform such things, we should take note of all the risks of doing an act.
There is/are consequences for every wrong action that is done.
Lesson learned:
- relation of IT to Science
Integrative questions:
- What is genetics?
- What are ethical problems of genetic information?
- What does Maynard Smith says about information?
- What is the mission of human genome project?
- How is science related to IT?
source:
http://en.wikipedia.org/wiki/Genetics
the-handbook-of-information-and-computer-ethics.pdf
37
-
8/9/2019 Itethic Reader v2
38/53
Chapter 17: The Ethics of Cyber Conflict
Amazon link: N/A
Quote: threat to the peace
Learning expectation:
- to know what are the different cyber conflicts
Review:
This case study talks about cyber conflict. As technology grows by, people
who have mastered the use of computers have the power to do unethical
things. The unethical things that i am talking to are the creation of cookies
and viruses. From wikipedia, A computer virus is a "computer program that
can copy itself and infect a computer. The term virus is also commonly buterroneously used to refer to other types of malware, adware, and spyware
programs that do not have the reproductive ability. A true virus can only
spread from one computer to another when its host is taken to the target
computer; for instance because a user sent it over a network or the Internet,
or carried it on a removable medium such as a floppy disk, CD, DVD, or USB
drive. Viruses can increase their chances of spreading to other computers by
infecting files on a network file system or a file system that is accessed by
another computer." From wikipedia, A cookie is a "small piece of text stored
on a user's computer by a web browser. A cookie consists of one or more
name-value pairs containing bits of information."
With these said things and problems, we should now be careful when we
use the computer. We should make sure that our software is always secured
with anti-virus. Our internet should always be protected. Our anti-virus
program should always be updated so that it will be in good strength to block
viruses. Aside from that, whenever we are visitng sites, we should be careful
when and when not to give our identities to websites. It is because some of
that website can be hackers. Once we give our full identification, then it may
be the start of their harm to our personal computer.
Lesson learned:
- how to protect our own computers
Integrative questions:
- What is a virus?
38
-
8/9/2019 Itethic Reader v2
39/53
- What is a cookie?
- What is jus in bello?What is jus ad bellum?
- How can we protect our own computers?
source:
http://en.wikipedia.org/wiki/Computer_virus
http://en.wikipedia.org/wiki/HTTP_cookie
the-handbook-of-information-and-computer-ethics.pdf
Chapter 18: A Practical Mechanism for Ethical Risk AssessmentA SoDIS
Inspection
Amazon link: N/A
Quote: Research in software quality has focused largely on the technical
aspects of quality improvement, while limited attention has been paid to the
organizational and socio-behavioral aspects of quality management.
Learning expectation:
- to know what are the different ethical risks
Review:
This chapter talks about risk management. In this chapter, the cycle in risk
assessment had also been talked about. Based from wikipedia, Risk
management can therefore be considered the "identification, assessment,
and prioritization of risks followed by coordinated and economical application
of resources to minimize, monitor, and control the probability and/or impact
of unfortunate events or to maximize the realization of opportunities. Risks
can come from uncertainty in financial markets, project failures, legal
liabilities, credit risk, accidents, natural causes and disasters as well as
deliberate attacks from an adversary. Several risk management standards
have been developed including the Project Management Institute, theNational Institute of Science and Technology, actuarial societies, and ISO
standards. Methods, definitions and goals vary widely according to whether
the risk management method is in the context of project management,
security, engineering, industrial processes, financial portfolios, actuarial
assessments, or public health and safety."
39
-
8/9/2019 Itethic Reader v2
40/53
For me, as an Information Systems student, we should really give focus or
we should really give priority when handling risks. It is because risks can or
may cause the downfall of our Information Systems. For us to prevent that,
we should always first, identify the risk. We should identify the risk so that
we would know how to handle a particular risk. Next step is to analyze the
risk. We should create a plan on how we can prevent that risk. The last step
for me is to evaluate the risk. For me, evaluate is to monitor the status of
that particular risk. After we have identify and analyze, it is time for us to
track whether the risk has been subtracted or lessened. It is important for
every Information System so that we would not have expensive costs during
the run time.
Lesson learned:
- how to handle risks
Integrative questions:
- What is risk management?
- What is the SoDIS approach?
- What are the basic four steps of SoDIS process?
- Are they really needed?
- What is Gert's 10 basic moral rules?
source:
http://en.wikipedia.org/wiki/Risk_management
the-handbook-of-information-and-computer-ethics.pdf
Chapter 19: Regulation and Governance of the Internet
Amazon Link: N/A
Quote:
the Internet is not spoken about only as a type ofmedium but often as a
living space in which people work, play, shop, socialize, and so on. So to
some extent the argument about controls on Internet content has shifted a
little. Although there is still discussion of pornography, hate language, and
40
-
8/9/2019 Itethic Reader v2
41/53
the like, there is also discussion of, for example, controlling Internet
gambling and downloadingmusic and movies. So the discussion now is partly
of Internet activity and partly of Internet content.
Learning Expectation:
- Regulation and Governance of the Internet
Review:
In this chapter of the book they said that Internet governance is the
development and application by Governments, the private sector and civil
society, in their respective roles, of shared principles, norms, rules, decision-
making procedures, and programs that shape the evolution and use of the
Internet which for me means that the internet is really important for all the
people because the internet is one of their source of income, information,
and a lot more. It is said that in effective regulation there are two broad
issues regarding the regulation of the content on the Internet: can content
on the Internet be regulated effectively, and should it be regulated. They
have also discussed about across boarders and they have said that Individual
countries, or political entities within countries, apart from blocking, can also
control content through legislation, and this can be relatively effective in
certain circumstances despite the fact that the Internet crosses national
borders. Consider the recent example of Internet gambling in the U.S. Online
gambling has been prohibited in the U.S., but at least one prominent
gambling business, Party Gaming, is based on Gibraltar, where it isimmunefrom U.S. legislation.
For me, whatever our position is, high or low, we should be ethical when
using the internet. We should not take advantage when using it. We should
not use our power or we should not exercise our power over it. The internet
is for all. It is for equal purposes. That is why we should respect and be
disciplined.
Lessons Learned:
- Regulation and Governance of the Internet
Integrative Questions:
- What is Regulation of the internet?
- What is Governance of the internet?
41
-
8/9/2019 Itethic Reader v2
42/53
- What is Censorship?
- Why do we need rules when browsing?
- Is there a consequence when we break the rule?
source:
the-handbook-of-information-and-computer-ethics.pdf
Chapter 20: Information Overload
Amazon Link: N/A
Quote:
Information is supposed to be that which informs, but nothing can inform
without some attentional investment. Alas, there is no evidence that the rateat which a member of our species can spend attentional resources has
increased to any significant degree in the past 10,000 years. As a result,
competition for our limited attention has grown in direct proportion to the
amount of information available. Because information has been proliferating
at such an enormous rate, we have reached the point where attention is an
extremely scarce resource, so scarce that extreme measures from
telemarketing to terrorism have proliferated as fast as information just to
capture a bit of it
Learning Expectation:
- Information Overload
- Advantages
- Disadvantages
Review:
This chapter talks about Information Overload. Based from wikipedia,
Information overload is a "term popularized by Alvin Toffler that refers to thedifficulty a person can have understanding an issue and making decisions
that can be caused by the presence of too much information. The term and
concept precede the Internet. Toffler's explanation of it in his bestselling
book presents information overload as the Information Age's version of
sensory overload, a term that had been introduced in the 1950s. Sensory
overload was thought to cause disorientation and lack of responsiveness.
42
-
8/9/2019 Itethic Reader v2
43/53
Toffler posited information overload as having the same sorts of effects, but
on the higher cognitive functions, writing. More and more people are
considered to be active writers and viewers because of their participation.
This flow has created a new life where we are now in danger of becoming
dependent on this method of access to information. Therefore we see an
information overload from the access to so much information, almost
instantaneously, without knowing the validity of the content and the risk of
misinformation."
For me, I think that Information overload only arises when we are
memorizing. Because when we memorize, sometimes we tend to get
pressured if whether or not we can do it. Unlike if we understand, we do not
have to memorize. With just one snap, we already know and can apply the
concept. When we get to be tired and pressured on memorizing, that is the
time information overload comes. We should understand the concept, not
memorize.
Lessons Learned:
- Information Overload
- Causes of information overload
- Consequences of information overload
Integrative Questions:
- What does it mean to have too much information, and, for that matter?
- What exactly is this substance we can apparently have too much of?
- Is the phenomenon as recent as our anxious complaints suggest, or does it
have a longer history?
- What is Information Overload?
- How does it relate to other seemingly related notions, such as data
overload, information anxiety, information pollution, techno stress, datasmog, and information fatigue syndrome?
source:
http://en.wikipedia.org/wiki/Information_overload
the-handbook-of-information-and-computer-ethics.pdf
43
-
8/9/2019 Itethic Reader v2
44/53
Chapter 21: Email Spam
Amazon Link: N/A
Quote:
"This technique has been tried, and some prominent domestic spammers
have been arrested. However, this has not eliminated the problem of spam
email. One problem is that state or national laws, unlike the Internet, do not
reach across political boundaries. Spammers can effectively avoid anti spam
laws. Another problem is the definitional problem we have discussed
previously. Furthermore, when spammers spoof return addresses or use
drones, this complicates prosecution of the true source of the spam emails."
Learning Expectation:
- Email Spam
- Advantages
- Disadvantages
Review:
In this chapter they have discussed about Email Spam. They said that email
spam is also known as junk mail. Some of the junk mails are virus. Email
spam is an example of a spoiling of the commons; email spammers exploit
the economic model of Internet email and the relative openness of emailprotocols. NF-UCBE shifts the cost of advertising to email recipients, who
must clear out advertisements for products they have no interest in. F-UCBE
uses the Internet to defraud victims. The ethical case against F-UCBE is
straightforward, and the people who are responsible for F-UCBE are
condemned. An ethical analysis of NF-UCBE is more nuanced, since the
economic incentives of current email arrangements make NF-UCBE
attractive.
The end- users or external users of an email should be very careful especially
in reading emails that we dont know if who the recipient is because if weopen it there are a lot of possibilities that your email would face. There are
other spam emails that are asking for money, and telling that you won for a
certain game when in fact you did not join in that game, the others they use
to send you a junk mail so that you will give them information and they can
use it illegally.
44
-
8/9/2019 Itethic Reader v2
45/53
Lessons Learned:
- e-mail
- span
- junk in e-mail
Integrative Questions:
- Is spam harmful?
- How can we ignore it?
- Why is it called or named spam?
- What is a spam?
- What is email spam?
source:
the-handbook-of-information-and-computer-ethics.pdf
Chapter 22: The Matter of Plagiarism: What, Why, and If
Amazon link: N/A
Quote: concealment is at the heart of plagiarism
Learning expectation:
- to know all about Plagiarism
Review:
This chapter talks all about the concept of plagiarism. So, what is
plagiarism all about? Is it good or not? Based from wikipedia, Plagiarism, is
the use or close imitation of the language and thoughts of another author
and the representation of them as one's own original work. Within academia,
plagiarism by students, professors, or researchers is considered academicdishonesty or academic fraud and offenders are subject to academic
censure, up to and including expulsion. In journalism, plagiarism is
considered a breach of journalistic ethics, and reporters caught plagiarizing
typically face disciplinary measures ranging from suspension to termination
of employment. Some individuals caught plagiarizing in academic or
journalistic contexts claim that they plagiarized unintentionally, by failing to
45
-
8/9/2019 Itethic Reader v2
46/53
include quotations or give the appropriate citation. While plagiarism in
scholarship and journalism has a centuries-old history, the development of
the Internet, where articles appear as electronic text, has made the physical
act of copying the work of others much easier. Plagiarism is not the same as
copyright infringement. While both terms may apply to a particular act, they
are different transgressions.
For me, based from the research, we should get in touch with this kind of
activity. It is because you do not create good image to the school, to the
community or to the company. You should be unique when doing something.
You should not copy others work because it definitely looses your image. If
you really want to copy that, you source it out. You should quote it from your
source. Each individual has their uniqueness. We should exercise that
uniqueness within us instead of us cheating and copying others work.
Lesson learned:
- effect of Plagiarism
Integrative questions:
- What is Plagiarism?
- What is lack of authorization?
- What is lack of accreditation?
- What can be effects of plagiarism?
- How can it be prevented?
source:
http://en.wikipedia.org/wiki/Plagiarism
the-handbook-of-information-and-computer-ethics.pdf
Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File
Sharing
Amazon link: N/A
Quote: compensation without control
Learning expectations:
46
-
8/9/2019 Itethic Reader v2
47/53
- to know what Online sharing is
- to know what are the effects of it
Review:
In this case study, the topic talked about was online file sharing. Based
from wikipedia, File sharing is the "practice of distributing or providing
access to digitally stored information, such as computer programs, multi-
media, documents, or electronic books. It may be implemented through a
variety of storage, transmission, and distribution models and common
methods of file sharing incorporate manual sharing using removable media,
centralized computer file server installations on computer networks, World
Wide Web-based hyperlinked documents, and the use of distributed peer-to-
peer networking. File sharing is not in and of itself illegal. However, the
increasing popularity of the mp3 music format in the late 1990s led to therelease and growth of Napster and other software that aided the sharing of
electronic files. This in practice led to a huge growth in illegal file sharing:
the sharing of copyright protected files without authorization."
For me, it is good and at the same time, bad to have an online file sharing.
It is good because it can help students to learn in a fast pace. Students can
learn easily and fast if documents are to be uploaded on an educational
basis. Meanwhile, it is bad it will be used for profit. An example of this would
be limewire. This would be bad if a person will download songs from limewire
and at the same time, that person will burn and sell the pirated songs to theblack market. That can be the downfall for file sharing. So for me, we should
use it in an educational way or use it in a good way.
Lesson learned:
- effects of online sharing
Integrative questions:
- What is online file sharing?
- What is P2P?
- What are the moral considerations?
- Is it sharing or theft already?
- When is it good, and when is it bad?
47
-
8/9/2019 Itethic Reader v2
48/53
source:
http://en.wikipedia.org/wiki/File_sharing
the-handbook-of-information-and-computer-ethics.pdf
Chapter 24: Censorship and Access to Expression
Amazon link: N/A
Quote: thoughts, attitudes, and feelings
Learning expectation:
- to know what censorship means
Review:
This topic focuses on censorship. Again, my beloved and repeated
question in this book, what is censorship? Based from wikipedia, Internet
censorship is "control or suppression of the publishing or accessing of
information on the Internet. The legal issues are similar to offline censorship.
One difference is that national borders are more permeable online: residents
of a country that bans certain information can find it on websites hosted
outside the country. A government can try to prevent its citizens from
viewing these even if it has no control over the websites themselves. Barring
total control on Internet-connected computers, such as in North Korea and
Cuba, total censorship of information on the Internet is very difficult toachieve due to the underlying distributed technology of the Internet.
Pseudonymity and data havens allow unconditional free speech, as the
technology guarantees that material cannot be removed and the author of
any information is impossible to link to a physical identity or organization."
For me, censorship is really one of the best practices that we should follow
on. It is because our personality, identity and all information are secured. If
there will be no censorship, then hackers must be all over the globe. I have
an example for censorship. When a user creates an account on facebook,
friendster, twitter, linkedin, yahoomail, gmail and many more, we usuallyprovide our own passwords. We are provided by usernames and passwords.
For me, that is the censorship. We our restricted to view and to know only
our personal accounts. We are not to know the accounts of the other people
for security purposes.
Lesson learned:
48
-
8/9/2019 Itethic Reader v2
49/53
- advantage of censorship
Integrative questions:
- What is censorship?
- What are the types of harm?
- What are the arguments in censorship?
- What is hostile atmosphere?
- What do we mean by creating a market?
source:
http://en.wikipedia.org/wiki/Censorship#Internet_censorship
the-handbook-of-information-and-computer-ethics.pdf
Chapter 25: The Gender Agenda in Computer Ethics
Amazon link: N/A
Quote: to create a gender-equal ethics, a moral theory that generates
nonsexist moral principles, policies and practices.
Learning expectation:
- to know what is Feminst ethics
Review:
In this case study, the topic is all about gender. The topic mostly focused
about feminist ethics. So, what is feminist ethics? For me, it is again, a new
term. Based from the Standford Encyclopedia of Philosophy, Feminist Ethics
is an "attempt to revise, reformulate, or rethink traditional ethics to the
extent it depreciates or devalues women's moral experience. Among others,
feminist philosopher Alison Jaggar faults traditional ethics for letting women
down in five related ways. First, it shows less concern for women's asopposed to men's issues and interests. Second, traditional ethics views as
trivial the moral issues that arise in the so-called private world, the realm in
which women do housework and take care of children, the infirm, and the
elderly. Third, it implies that, in general, women are not as morally mature or
deep as men.Feminists have developed a wide variety of gender-centered
approaches to ethics, each of which addresses one or more of the five ways
49
-
8/9/2019 Itethic Reader v2
50/53
traditional ethics has failed or neglected women. Some feminist ethicists
emphasize issues related to women's traits and behaviors, particularly their
care-giving ones. In contrast, other feminist ethicists emphasize the political,
legal, economic, and/or ideological causes and effects of women's second-
sex status. "
For me, I really do not understand how the feminist ethics is related to
computer ethics or Information Technology. In my point of view, there should
be no gender issue for this matter. Whether you are male or you are female,
if you commit mistake, then you are liable for it. There are consequences for
every wrong act that we do. That is why for me, there should be no gender
issue in the computer world.
Lesson learned:
- Feminst ethics
Integrative questions:
- What is a Feminist ethics?
- What is a student population?
- What are Quantitative Versus Qualitative Research Methodologies?
- What is Ethical Behavior?
- What is Cyberstalking?
source:
http://plato.stanford.edu/entries/feminism-ethics/
the-handbook-of-information-and-computer-ethics.pdf
Chapter 26: The Digital Divide: A Perspective for the Future
Amazon link: N/A
Quote: wait and see
Learning expectation:
- to know what is Digital Divide
Review:
50
-
8/9/2019 Itethic Reader v2
51/53
In this case study, the topic that was talked about was Digital Divide. What
is it? For me, it is a new term. Based from wikipedia, The digital divide is the
"gap between people with effective access to digital and information
technology and those with very limited or no access at all. It includes the
imbalances in physical access to technology as well as the imbalances in
resources and skills needed to effectively participate as a digital citizen. In
other words, it is the unequal access by some members of society to
information and communication technology, and the unequal acquisition of
related skills. The term is closely related to the knowledge divide as the lack
of technology causes lack of useful information and knowledge. The digital
divide may be classified based on gender, income, and race groups, and by
locations. The term global digital divide refers to differences in technology
access between countries or the whole world."
For me, this gap that they are referring to in this case study can be erased
with the use of this digital divide. I have said that because everything is
connected with technology. With that, the poor and the rich can be
connected literally and figuratively. Figuratively because there are a lot of
computer shops. How much do we pay to rent a computer for one full hour?
It is very cheap. Why not use the computer shop if these poor people cannot
buy their own personal computers? That is my point. It does not need wealth
to connect the rich and the poor. Every will has a way.
Lesson learned:
- Digital Divide
Integrative questions:
- What is Digital Divide?
- What is the basis for digital divide to be eliminated?
- What are the "gaps"?
- What is ICT?
- What are the empirical studies about failure?
source:
http://en.wikipedia.org/wiki/Digital_divide
51
-
8/9/2019 Itethic Reader v2
52/53
the-handbook-of-information-and-computer-ethics.pdf
Chapter 27: Intercultural Information Ethics
Amazon link: N/A
Quote: whether information ethics in this ontological or global sense may
be biased in favor of Western values and interests and whether far-eastern
cultures may provide new perspectives and heuristics for a successful
development of the information society.
Learning expectation:
- to know what is IIE
Review:
This chapter talks about Intercultural Information Ethics. Again, let us go
back to the definition of Information Ethics for things to be clear. Based from
wikipedia, Information ethics is the "field that investigates the ethical issues
arising from the development and application of information technologies. It
provides a critical framework for considering moral issues concerning
informational privacy, moral agency problems arising from the life-cycle of
information. Information Ethics is related to the fields of computer ethics and
the philosophy of information. Dilemmas regarding the life of information are
becoming increasingly important in a society that is defined as the
information society. Information transmission and literacy are essential
concerns in establishing an ethical foundation that promotes fair, equitable,
and responsible practices. Information ethics broadly examines issues
related to ownership, access, privacy, security, and community."
For me, this is an important matter because we deal with a lot of cultures.
A lot of cultures that will or that may affect the world wide web. We should
respect each and every culture so that there will be no conflict onto the
world wide web. Let us follow the ten commandments of the computer, let us
respect the traditions of each and every race. It is important for us to have
ethics so that there would be no harm, there would be no discriminations on
the internet. An example of this would be plagiarism. If you really have
ethics, then you should not copy others activity or work, or if you really want
to copy it, then make sure to source it out so that there would be no conflict.
Lesson learned:
52
-
8/9/2019 Itethic Reader v2
53/53
- IIE
Integrative questions:
- What is IIE?
- Who is Terrell Ward Bynum?
- Who is Bernd Frohmann?
- Who is Lorenzo Magnani?
- Who is Barbara Paterson?
source:
http://en.wikipedia.org/wiki/Information_ethics
the-handbook-of-information-and-computer-ethics.pdf