itethic reader v2

Upload: chinoapoloni

Post on 30-May-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Itethic Reader v2

    1/53

    ITETHIC Reader:

    Version 2

    Created by:

    Chino S. Apoloni

    This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License.

    PREFACE

    1

  • 8/9/2019 Itethic Reader v2

    2/53

    This second book of mine was done in a complex way. It

    is complex because this term is overloaded. The time

    when I was doing this book is also the time that I had a

    lot of projects and thesis. With all of those challenges thatconfronted me, still I was able to finish my second book. I

    was able to manage my time very well because of the

    help of my family, friends and God. It was really a

    pleasure for me to do this book. This book is very

    important for me because it helps and affects the people

    around the world. There are a lot of lessons and issues

    that you will learn as you read this book. I would like to

    thank Mr. Paul Pajo because he once again, gave me an

    opportunity to create and annotate another book about

    Ethics.

    2

  • 8/9/2019 Itethic Reader v2

    3/53

    DEDICATION

    Family

    For giving me the strength and willingness tounderstand reality in the world today

    For giving me inspiration with regards to the

    importance of education

    Friends

    For providing guidance all throughoutProfessor

    For giving me another chance to create and annotate

    a book

    God

    For giving me the spirit and enlightenment

    3

  • 8/9/2019 Itethic Reader v2

    4/53

    TABLE OF CONTENTS

    Preface p.2

    Dedication p.3

    The Fortune at the Bottom of the Pyramid p6-12

    The Handbook of Computer and Information Ethics

    p14-50

    4

  • 8/9/2019 Itethic Reader v2

    5/53

    The Fortune at the

    Bottom of the Pyramid

    5

  • 8/9/2019 Itethic Reader v2

    6/53

    Chapter 1: The Market at the bottom of the pyramid

    Library Reference: N/A

    Quote: The dominant assumption is that the poor have no purchasing

    power and therefore do not represent a viable market

    Learning expectations:

    To understand who are being referred at the bottom of the pyramid

    To know if there is really a fortune at that level

    To understand the reality in our society

    Review:

    In this chapter, the topic is about the sector at the bottom of the pyramid.

    The sector that I am talking about is the poor people. As said in the book,

    there are 4 billion people who belong or who are in that sector. Also stated in

    the book that aside from them having a 4 billion population, they only gain

    $2 per day. With that statement, yes, there really is poverty on that area or

    into that place. I cannot imagine where and what you can eat with that $2

    per day money. With that, I assume that many children do not have the

    capacity to study. It is because of the poverty spreading all over the sector,

    which for me is a thing or a matter which should be prioritized. Education is

    one of the most important activities a child or a human being must do. It will

    affect their life positively when a particular person or a human is well

    educated. For me, I value education very well. I think that when you are

    educated, you can pursue your dreams. You can live and have a great

    lifestyle. So with that, to sum up my review, at this point in time, there

    should be a better approach which should help the poor people who are at

    the bottom of the pyramid. The government should now move and to their

    tasks. They should identify opportunities, innovations so that these people in

    the sector should rise up and become equal as to what an ordinary people isdoing or aspiring.

    Lessons learned:

    There is money at the bottom of the pyramid

    People should value education

    6

  • 8/9/2019 Itethic Reader v2

    7/53

    The pyramid structure

    Integrative questions:

    Who are at the bottom of the pyramid

    What can be reason/s why they were put there?

    What is the meaning of dominant logic?

    How is the BOP market connected?

    What can be ways to solve the crises?

    Chapter 2: Products and services for the BOP

    Library Reference: N/A

    Quote: See and hear, not read

    Learning expectations:

    To know the products and services available at the BOP

    To know the ways on how BOP can rise

    To understand the reality in our society

    Review:

    In this chapter, the topic is about the products and services for the bottom

    of the pyramid sector. As I have said in the previous chapter, the people at

    the bottom of the pyramid are really at risk. They are in need because they

    are so plenty and at the same time they do not have money. Thegovernment should move and prioritize them. With that, as C.K Prahalad

    stated, the bottom of the pyramid sector can be a viable growth market.

    There can be many opportunities founded there. Also, C.K Prahalad taught

    the 12 principles of innovation for the bottom of the pyramid markets. There

    should be price performance, Innovation hybrids, scale of operations, eco-

    friendly developments, functionalities, process innovation, work deskilling,

    7

  • 8/9/2019 Itethic Reader v2

    8/53

    education of customers, infrastructures interfaces, distribution and

    conventional wisdom for products and services. With that, I can say that it

    really is an opportunity that should be done in that sector. What we need is

    the government support, the government giving financial support. Another

    thing that we need is cooperation from companies, industries and the market

    itself. The last thing that we need to complete the process is the cooperation

    of the people there. The more people that will help the faster will be the

    development. To sum it all up, the key word is cooperation. It will be the

    key to overcome the crises that is happening at the bottom of the pyramid. If

    all of those said participants will do their duty or tasks, then definitely there

    will be a change.

    Lessons learned:

    12 principles of innovation

    Philosophy for developing products and services

    The importance of the word cooperation

    Integrative questions:

    What are the 12 principles of innovation?

    What are reasons why there can be market opportunities at BOP?

    What is price performance?

    What is an interface?

    What is deskilling of work?

    Chapter 3: BOP: A Global Opportunity

    Library Reference: N/A

    Quote: Social enterprise

    Learning expectations:

    To understand what are these opportunities

    To know if it will be helpful

    To understand the reality in our society

    8

  • 8/9/2019 Itethic Reader v2

    9/53

    Review:

    In this chapter, the topic is about the global opportunities available for the

    people at the bottom of the pyramid. As stated in the book, there are

    reasons why there are global and market opportunities at the bottom of the

    pyramid sector. First is that BOP markets are large and attractive and theycan be a stand-alone entities. Many local innovations can be done across the

    Bop markets. They are also to find applications in developed markets. Lastly,

    lessons from the BOP markets can influence the management practices of

    global firms. Definitely it is good news for the people at the bottom of the

    pyramid. All they have to do is cooperate so that development will be in a

    faster manner. I have an example with regards to the development of a

    place like the story of BOP. In our market place here in Pasig City, during the

    early years, according to the old people I know, they told me that the Pasig

    City market is like Divisoria. It is a smelly place with a very crowded person

    and every store is unorganized. As time passes by, due to the cooperation of

    the Pasig City government and the market industry, the Pasig City market

    undergoes renovation. The places were cleaned, re-built, stores were

    arranged accordingly and people who sell and buy were lectured on how to

    maintain the place. This goes the same for the BOP sector. If they will follow

    and cooperate the same as to our Pasig market, then they will have no

    problem to encounter.

    Lessons learned:

    Local growth opportunities

    Capital intensity

    Reasons for having global opportunities at BOP

    Integrative questions:

    What is capital intensity?

    What are the costs of managing?

    What do you mean by living in a network of relationships?

    What is a sustainable development?

    What can be local growth opportunities?

    Chapter 4: The Ecosystem for Wealth Creation

    9

  • 8/9/2019 Itethic Reader v2

    10/53

    Library Reference: N/A

    Quote: I did not even know how to hold a mouse

    Learning expectations:

    To know the relation of ecosystem in the BP

    To know more concepts

    To understand the reality in our society

    Review:

    In this chapter, the topic is about Ecosystem. From wikipedia, the term

    ecosystem refers to the combined physical and biological components of an

    environment. An ecosystem is generally an area within the natural

    environment in which physical factors of the environment together along

    with interdependent organisms. In this chapter, it is not only the term

    ecosystem which is fully talked about, another concept talked about is the

    market-oriented ecosystem. Based from my understanding, a market-

    oriented ecosystem is a binding between the private sector, the people at

    the bottom of the pyramid and the social actors. What I meant by bind is that

    they act together, they create wealth together for the development of the

    people bottom of the pyramid. A concrete example of a market-oriented

    ecosystem is Divisoria. In that said place, vendors are all over. Even if they

    are plenty, they bind, they work together for all of them to survivefinancially. For me, that can be a market-oriented ecosystem. As long as

    everyone helps, as long as everyone cooperates, there will be a continuous

    improvement and development for all of them. To end up or to sum up this

    case, the key words for people at the bottom of the pyramid are cooperation,

    perseverance and motivation. Those words are the ones which will lead them

    to growth and survival. I just hope that not only the people at the bottom of

    the pyramid are the ones who are cooperating, but also the government,

    private sectors and every community globally.

    Lessons learned:

    Opportunities at BOP

    Ecosystem at BOP

    Key words for BOP people to survive

    10

  • 8/9/2019 Itethic Reader v2

    11/53

    Integrative questions:

    What is ecosystem?

    How is it different from a market-oriented ecosystem?

    Who supports the BOP people?

    How do you reduce inequities in contracts?

    What is asymmetry?

    Source:

    http://en.wikipedia.org/wiki/Ecosystem

    Chapter 5: Reducing Corruption: Transaction Governance Capacity

    Library Reference: N/A

    Quote: Understood but not explicit

    Learning expectations:

    To know the concept of corruption

    To know who are corrupt

    To understand the reality in our society

    Review:

    In this chapter, the topic is about corruption. This chapter will bemeaningful to me because of the topic. Corruption is so known all around theplanet. It is because of the major impacts it can do to one government or onecountry. To start things of, let us define first what corruption is. Fromwikipedia, Political corruption is the use of legislated powers by governmentofficials for illegitimate private gain. An illegal act by an officeholderconstitutes political corruption only if the act is directly related to their

    official duties. All forms of government are susceptible to political corruption.Forms of corruption vary, but include bribery, extortion, cronyism, nepotism,patronage, graft, and embezzlement. Relating it to the story, this may alsobe one of the main reasons why the poor people at the bottom of thepyramid suffered. It can be the corruptions happening within thegovernment. In the story, there were also assumptions why there are poorpeople. One reason based from the book is that the poor people lackresources. Another reason is that the poor people are being left out. With

    11

  • 8/9/2019 Itethic Reader v2

    12/53

    these assumptions, they will have a hard time to rise up. To sum up and toend the story, government officials should reduce poverty and corruption.Instead of them being bad and corrupt, they should help the people to riseand survive. They need the help of these politicians so that there will be nomore poor people in the future. Everything will be equal.

    Lessons learned:

    Corruption

    Reasons why there are poor

    eSeva

    Integrative questions:

    What is corruption?

    What is eSeva?

    What is TGC?

    Why are the poor poor?

    How do you reduce corruption?

    Source:

    http://en.wikipedia.org/wiki/Political_corruption

    Chapter 6: Development as Social Transformation

    Library Reference: N/A

    Quote: Should I sell my corn today or hold back

    Learning expectations:

    To understand more concepts about BOP

    To know how can transformation be established

    To understand the reality in our society

    Review:

    12

  • 8/9/2019 Itethic Reader v2

    13/53

    In this chapter, the topic is about development or social transformation.Social transformation, from wikipedia is the process by which an individualalters the socially ascribed social status of their parents into a sociallyachieved status for themselves. However another definition refers to largescale social change as in cultural reforms or transformations. The first occurs

    with the individual, the second with the social system. Social transformationis one or can be the most difficult thing a person can do in his life. That isfrom my point of view. I said that because things, talking about big thingswhich will change our whole life due to that decision. It is like turning fromgrade school to college. That is how far the milestone could be in making abig decision like that. Relating it to the story, for the people at the bottom ofthe pyramid, they will have a long transition time if their place will bedeveloped. It can be because of the traditional things that they do. With thisdevelopment, those things that they do traditionally cannot be doneanymore. What they need is time. They will need a longer time for transitionbecause it is not that easy to change from one pace to another.

    Lessons learned:

    E-Choupal

    Importance of social transformation

    Importance of contributors

    Integrative questions:

    What is social transformation?

    What is e-Choupal?

    What can be outcomes of these transitions?

    Why are women critical for development?

    Can it be solved?

    Source:

    http://en.wikipedia.org/wiki/Social_transformation

    13

  • 8/9/2019 Itethic Reader v2

    14/53

    The Handbook of

    Computer andInformation Ethics

    14

  • 8/9/2019 Itethic Reader v2

    15/53

    Chapter 1: Foundation of Information Ethics

    Amazon link: N/A

    Quote: "Life of Information"

    Learning expectation:

    - To understand what information ethics means

    - To know how it is applicable to the society

    - To know if it is really needed

    Review:

    This chapter talks about the introduction to Information Ethics. Based from

    wikipedia, Information ethics is "the field that investigates the ethical issues

    arising from the development and application of information technologies. It

    provides a critical framework for considering moral issues concerning

    informational privacy, moral agency , problems arising from the life-cycle of

    information Information Ethics is related to the fields of computer ethics and

    the philosophy of information. Dilemmas regarding the life of information are

    becoming increasingly important in a society that is defined as "the

    information society". Information transmission and literacy are essential

    concerns in establishing an ethical foundation that promotes fair, equitable,

    and responsible practices. Information ethics broadly examines issues

    related to ownership, access, privacy, security, and community. Information

    technology affects fundamental rights involving copyright protection,

    intellectual freedom, accountability, and security. Professional codes offer a

    basis for making ethical decisions and applying ethical solutions to situations

    involving information provision and use which reflect an organizations

    15

  • 8/9/2019 Itethic Reader v2

    16/53

    commitment to responsible information service. Evolving information formats

    and needs require continual reconsideration of ethical principles and how

    these codes are applied. Considerations regarding information ethics

    influence personal decisions, professional practice, and public policy."

    In this chapter, what was talked must about was the RPT model. RPT stands

    for resource, product and target model. The RPT model is useful to explain

    why any technology that radically modifies the life of information. There

    are four stages that composes the RPT model. IE as an information resource,

    IE as an information product, IE as an information environment and IE as a

    macroethics. To sum it all up, information ethics is important in our lives. It is

    important because it contributes a lot to the society. As said by wikipedia, it

    promotes fairness, equity and responsible practices.

    Lessons learned:

    - RPT model

    - Information ethics

    Integrative questions:

    - What is information ethics?

    - What is R in RPT?

    - What is P in RPT?

    - What is T in RPT?

    - How many stages are there in the cycle?

    Reference:

    16

  • 8/9/2019 Itethic Reader v2

    17/53

    http://en.wikipedia.org/wiki/Information_ethics

    Chapter 2: Milestones in the History of Information and Computer Ethics

    Amazon link: N/A

    Quote: "automatic age"

    Learning expectation:

    - To know what is Information and computer ethics

    - To know who Norbert Wiener is

    - To understand the history of Information ethics

    Review:

    This chapter briefly talks about the history of computer ethics. Based

    from the reading, the foundation of computer ethics was unintentional. It was

    founded during the world war two. The ethical issues that

    Norbert Wiener analyzed were computer ethics topics that are still of interest

    today. They are computers and unemployment, computers and security,

    computers and learning, computers for persons with disabilities, computers

    and religion, information networks and globalization, virtual communities,

    teleworking, the responsibilities of computer professionals, the merging of

    human bodies andmachines, agent ethics and artificial intelligence. Forme, all of these topics are relevant and very important. They are very

    important because they are rules which any person should abide with or

    follow. There can be consequences if a rule is to be intercepted.

    Aside from Norbert Wiener, there are different perspectives and people in

    the foundation of computer ethics. They are Walter Maner, Deborah Johnson,

    James Moor and Donald Gotterbarn. To sum it all up, whoever's theory is to

    be read, the point is that we should follow the right or we should follow the

    rules behind information ethics. It is important to have privacy, security,

    integrity and credibility when using our computers. Another reason/s why weshould follow information ethics is for us not to be hacked by any other user.

    Our works or creation should not be hacked and plagiarized by any other

    human. For me, we should not only follow the rules in information ethics, we

    should follow the ten commandements of computer ethics.

    Lessons learned:

    17

  • 8/9/2019 Itethic Reader v2

    18/53

    - reasons to know information ethics

    - people who contributed to the history of information ethics

    Integrative questions:

    - Who is Norbert Wiener?

    - Who is Walter Maner?

    - Who is Deborah Johnson?

    - Who is James Moor?

    - What are their similarities?

    Reference:

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 3: Moral Methodology and Information Technology

    Amazon link: N/A

    Quote: the very possibility of moral thought and judgment depends on the

    provision of a suitable supply of moral principles

    Learning expectation:

    - To know what is Computer ethics

    - To know what is applied ethics

    - To understand the meaning of generalism

    Review:

    This chapter talks about computer ethics. Based from the book, Computer

    ethics is a form of applied or practical ethics. It studies the moral questions

    that are associated with the development, application, and use of computers

    and computer science. For me, this is a good matter to study specially thatwe are into Information Systems. These concepts of computer ethics will

    provide us vital data that will guide us through our career. Next term to be

    discussed is applied ethics. For me, what i have understand about applied

    ethics is that it is an ethics that you know and then you do it actually.

    Whatever is the rule that you read or understand, you will apply it when you

    go out. Another term discussed was generalism. What i have understand in

    18

  • 8/9/2019 Itethic Reader v2

    19/53

    generalism is that we treat fairly all the rules that we know. It is not only

    about the rules that you know. For me, even if you are not familiar with a

    certain provision or rule, still you should follow it and treat it equally. That is

    the meaning of it for me. Next term discussed was particularism. For me, this

    is in contrast with generalism. Why is it in contrast? It is in contrast because

    in particularism, you follow or you only apply the ethic or the conduct that

    you think is correct. You do not treat it fairly. Whatever you know, that is the

    only conduct that you will follow and apply. It is opposite with generalism. To

    sum it all up, we should apply ethics in our everyday lives. We should always

    apply the good and correct acts so that we will not violate anything.

    Lessons learned:

    - meaning of computer ethics

    - applied ethics

    Integrative questions:

    - What is computer ethics?

    - What is applied ethics?

    - What is generalism?

    - What is particularism?

    - What is reflective equilibrium?

    source:

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 4: Value Sensitive Design and Information Systems

    Amazon link: N/A

    Quote: how will this policy affect me and my family

    Learning expectation:

    - To know what is value sensitive design

    - To know what is value

    - To understand the meaning of Information Systems

    19

  • 8/9/2019 Itethic Reader v2

    20/53

    Review:

    This chapter briefly talks about Value Sensitive Design. Based from the

    book, Value Sensitive Design is a theoretically grounded approach to the

    design of technology that accounts for humanvalues in a principled and

    comprehensive manner throughout the design process. In this process, thereare three stages. For me, this concept is important for people and end-users

    to fully understand the system. Design is an important matter because it

    determines the willingness of the viewer if he or she would be using the

    system because of its functions. If a design it not well made, then might as

    well it will not be like by a lot. Nowadays, design is becoming critical. If the

    design is not good, eye catching or unique, then expect that the users will

    not go through or visit your website. That is how critical a design is in

    Information Systems. Another term discussed in this chapter is value. From

    wikipedia, value denotes "something's degree of importance, with the aim of

    determining what action or life is best to do or live, or at least attempt to

    describe the value of different actions. It may be described as treating

    actions themselves as abstract objects, putting value to them. It deals with

    right conduct and good life, in the sense that a highly, or at least relatively

    highly, valuable action may be regarded as ethically good , and an action of

    low, or at least relatively low, value may be regarded as bad". To sum it all

    up, we should value the things that we do. We should value it because it

    reflects our personality. The way we develop things. It is an important tool

    for users and viewers.

    Lessons learned:

    - value sensitive design

    - value

    Integrative questions:

    - What is value sensitive design?

    - What is value?

    - What are the three stages?

    - What is conceptual investigation?

    - What is empirical investigation?

    source:

    20

  • 8/9/2019 Itethic Reader v2

    21/53

    http://en.wikipedia.org/wiki/Value_(ethics)

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 5: Personality-Based, Rule-Utilitarian,and Lockean Justifications of

    Intellectual Property

    Amazon link: N/A

    Quote: The person must give himself an external sphere of freedom in

    order to have being as Idea.

    Learning expectation:

    - To know what is an intellectual propoerty

    - To know what is its value

    - To understand the rights when claiming intellectual propert

    Review:

    This chapter briefly talks about intellectual propoerty. Based from

    wikipedia, Intellectual property is a "term referring to a number of distinct

    types of legal monopolies over creations of the mind, both artistic and

    commercial, and the corresponding fields of law. Under intellectual property

    law, owners are granted certain exclusive rights to a variety of intangible

    assets, such as musical, literary, and artistic works; discoveries andinventions; and words, phrases, symbols, and designs. Common types of

    intellectual property include copyrights, trademarks, patents, industrial

    design rights and trade secrets in some jurisdictions. Although many of the

    legal principles governing intellectual property have evolved over centuries,

    it was not until the 19th century that the term intellectual property began to

    be used, and not until the late 20th century that it became commonplace in

    the United States. The British Statute of Anne 1710 and the Statute of

    Monopolies 1623 are now seen as the origin of copyright and patent law

    respectively."

    For me, this really is an important matter. The topic being focused is on

    rights. We should all value intellectual property in respect with the person

    who owns. This chapter also talked about property rights.Property rights are

    important in two ways according to this chapter. One is by controlling and

    manipulating objects be it tangible or intangible, we have the right to claim

    it. It will be our measure of our freedom. Second is our personality becomes

    21

  • 8/9/2019 Itethic Reader v2

    22/53

    infused with an object. The right to claim the work is very important to our

    personality.

    Lessons learned:

    - intellectual property

    - property rights

    Integrative questions:

    - What is intellectual property?

    - What is property rights?

    - What are the arguments in intellectual property?

    - What is rule-utilitiarianism?

    - What is a pareto-based proviso?

    source:

    http://en.wikipedia.org/wiki/Intellectual_property

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 6: Informational Privacy: Concepts, Theories, and Controversies

    Amazon link: N/A

    Quote: we will have to admit that we always have some degree of privacy,

    since there will always be billions of people who have physically restricted

    access to us.

    Learning expectation:

    - To know what is privacy

    - To know what is privacy in different point of views

    - To understand the discussions/arguments about privacy

    Review:

    This chapter talks about privacy. Based from wikipedia, privacy is the

    "ability of an individual or group to seclude themselves or information about

    themselves and thereby reveal themselves selectively.The boundaries and

    22

  • 8/9/2019 Itethic Reader v2

    23/53

    content of what is considered private differ among cultures and individuals,

    but share basic common themes. Privacy is sometimes related to anonymity,

    the wish to remain unnoticed or unidentified in the public realm. When

    something is private to a person, it usually means there is something within

    them that is considered inherently special or personally sensitive. The

    degree to which private information is exposed therefore depends on how

    the public will receive this information, which differs between places and

    over time. Privacy is broader than security and includes the concepts of

    appropriate use and protection of information."

    In this chapter, not only the generic privavy was taught. Informational

    privacy was taught. Again, based from wikipedia, Data privacy refers to "the

    evolving relationship between technology and the legal right to, or public

    expectation of privacy in the collection and sharing of data about one's self.

    Privacy concerns exist wherever uniquely identifiable data relating to a

    person or persons are collected and stored, in digital form or otherwise." For

    me, whatever perspective of privacy you know, just do what is right. Do not

    let yourself get into situations where you can be liable to court for damages.

    Do the right thing so that you will not be in danger. The lesson learned here

    is for you to respect your own individual. Whether it is information, sexual or

    political privacy, still it is PRIVACY. Just respect. Period.

    Lessons learned:

    - privacy

    - types of privacy

    Integrative questions:

    - What is privacy?

    - What is informational privacy?

    - What are the four kinds of privacy?

    - Are they the same or different?

    - How does Thomson define privacy?

    source:

    http://en.wikipedia.org/wiki/Privacy#Informational

    the-handbook-of-information-and-computer-ethics.pdf

    23

  • 8/9/2019 Itethic Reader v2

    24/53

    Chapter 7: Online Anonymity

    Amazon link: N/A

    Quote: non-coordinatability of traits in a given respect

    Learning expectation:

    - To know what is anonymity

    - To know what is/are its effect to the Information technology

    Review:

    Now, this chapter talks about online anonymity. What is online anonymity?

    Based from my research in wikipedia, Anonymity is "without a name or

    namelessness. In colloquial use, anonymous typically refers to a person, and

    often means that the personal identity, or personally identifiable information

    of that person is not known. Anonymity is a result of not having identifying

    characteristics disclosed. This can occur from a lack of interest in learning

    the nature of such characteristics, or through intentional efforts to hide these

    characteristics. An example of the former would include a brief encounter

    with a stranger, when learning the other person's name is not deemed

    necessary. An example of the latter would include someone hiding behind

    clothing that covers identifying features like hair color, scars, or tattoos, in

    order to avoid identification."

    For me, based from my perpspective, this matter should be focused on

    very well. This matter is not a joke. This matter can do a lot of harm to the

    world of the computer. The same as the previous chapter, privacy should

    also be focused. These matters, privacy and anonymity are both related.

    When wee use the internet for communication, sometimes we do not know

    the exact identity of the person we are talking to. That is harmful because

    they can be hackers. They might be needing a little information about us and

    that's it. After quite some time, we were hacked. To sum it up, we should

    always be careful when giving information to the people we do not know. We

    should not give every important details so that we will not be hacked bysome who wants to try.

    Lesson learned:

    - anonymity

    Integrative questions:

    24

  • 8/9/2019 Itethic Reader v2

    25/53

    - What is anonymity?

    - What are the concerns regarding anonymity?

    - What can be ways to become anonymous?

    - Are they the same or different with privacy?

    - What are the seven dimensions to be considered as anonymous?

    source:

    http://en.wikipedia.org/wiki/Anonymity

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism,

    andCounterhacking

    Amazon link: N/A

    Quote: willingness to accept personal responsibility for outcome of actions

    Learning expectation:

    - To know what is hacking

    - To know what is counter hacking

    Review:

    This case talks about three topics. These topics are hacking, hacktivism

    and counter hacking. Let us start with the first term. Based from wikipedia,

    Hacking refers to the "re-configuring or re-programming of a system to

    function in ways not facilitated by the owner, administrator, or designer. The

    terms have several related meanings in the technology and computer

    science fields, wherein a hack may refer to a clever or quick fix to a

    computer program problem, or to what may be perceived to be a clumsy or

    inelegant solution to a problem." Next term is hacktivism. From wikipedia,

    Hacktivism is the "nonviolent use of illegal or legally ambiguous digital tools

    in pursuit of political ends. These tools include web site defacements,

    redirects, denial-of-service attacks, information theft, web site parodies,

    virtual sit-ins, virtual sabotage, and software development. It is often

    understood as the writing of code to promote political ideology - promoting

    expressive politics, free speech, human rights, or information ethics. Acts of

    hacktivism are carried out in the belief that proper use of code will be able to

    25

  • 8/9/2019 Itethic Reader v2

    26/53

    produce similar results to those produced by regular activism or civil

    disobedience." The last term discussed is counter hacking.

    For me, these first two terms are the most fatal events that can occur to

    the world of information technology. These acts can really destroy an

    organization. These acts can destroy the credibility of a company or a personitself. What i can say is that we users should be very careful on our acts

    when we use the internet. We should be careful what sites we visit and make

    sure you dont make any online enemies. Get your firewall up and scan your

    computer often. These can be the basic rules so that our information cannot

    be stolen by anyone. We should always focus and be careful on what we do.

    Lessons learned:

    - hacking

    - how to counter it

    - hacktivism

    Integrative questions:

    - What is hacking?

    - What is hacktivism?

    - How do we counter hack?

    - Are there consequences?

    - What is Benign Intrusions as preventing waste?

    source:

    http://en.wikipedia.org/wiki/Hack_(technology)

    http://en.wikipedia.org/wiki/Hacktivism

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 9: Information Ethics and the Library Profession

    Amazon link: N/A

    Quote: exposing someone to data might not provide that person with

    information

    26

  • 8/9/2019 Itethic Reader v2

    27/53

    Learning expectation:

    - To know what is a public library

    - To know what is the relation with computer ethics

    Review:

    This case talks about Information Ethics and the Library Profession. I do

    not have an idea on how they are related in the first place. From wikipedia,

    the definition of library is a "collection of sources, resources, and services,

    and the structure in which it is housed; it is organized for use and maintained

    by a public body, an institution, or a private individual. In the more

    traditional sense, a library is a collection of books. It can mean the collection,

    the building or room that houses such a collection, or both. Public and

    institutional collections and services may be intended for use by people who

    choose not to or cannot afford to purchase an extensive collection

    themselves, who need material no individual can reasonably be expected to

    have, or who require professional assistance with their research. In addition

    to providing materials, libraries also provide the services of librarians who

    are experts at finding and organizing information and at interpreting

    information needs."

    For me, what is meant by library here are yahoo, google, wikipedia and

    many more. They are the public libraries because anyone can easily research

    an information that they want. Whatever age you are, wherever you live, you

    can access all of these engine browsers. The problem is that with this easy

    access on them, children can be exposed to violent, sexual and maliciuous

    issues. For me, that is the relation of computer ethics to these libraries. We

    need to apply computer ethics onto these engine browsers so that the

    mindless or the children should not be exposed to the said topics. They can

    be prevented or prohibited.

    Lessons learned:

    - relation of ethics to library

    - 5 laws of library science

    Integrative questions:

    - What is library?

    - What is information ethics?

    27

  • 8/9/2019 Itethic Reader v2

    28/53

    - How are they related?

    - What are the 5 laws of library science?

    - What are samples of these libraries?

    source:

    http://en.wikipedia.org/wiki/Library

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 10: Ethical Interest in Free and Open Source Software

    Amazon link: N/A

    Quote: primarily fighting to protect our way of making software

    Learning expectation:

    - To know what is an OSS

    Review:

    This case talks about free and open source software. Based from my

    research in wikipedia, Free and open source software is "software that is

    liberally licensed to grant the right of users to use, study, change, and

    improve its design through the availability of its source code. This approach

    has gained both momentum and acceptance as the potential benefits havebeen increasingly recognized by both individuals and corporate players. Free

    is intended to refer to the freedom to copy and re-use the software, rather

    than to the price of the software. The Free Software Foundation, an

    organization that advocates for free software, suggests that to understand

    the concept, one should think of free as in free speech, not as in free beer.

    Free and open source software is an inclusive term which covers both free

    software and open source software which, despite describing similar

    development models, have differing cultures and philosophies. Free software

    focuses on the philosophical freedoms it gives to users while open source

    focuses on the perceived strengths of its peer-to-peer development model."

    For me, there is nothing wrong with developing a free and open source

    software. It is because money is not an important factor here. The important

    factor here is your contribution to the people who are in need of it. Generally

    it is your contribution to the whole society. For me, that is the most

    important reason for a programmer or developer to build a software. It will

    28

  • 8/9/2019 Itethic Reader v2

    29/53

    be a big boost to your career if those users or people will like your creation.

    That is one thing for sure.

    Lesson learned:

    - Open source software

    Integrative questions:

    - What is a free sofware?

    - What is an open source software?

    - Do we need to apply ethics in this situation?

    - Who developes the OSS?

    - How does open source originated?

    source:

    http://en.wikipedia.org/wiki/Free_and_open_source_software

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 11: Internet Research Ethics: The Field and Its Critical Issues

    Amazon link: N/A

    Quote: I understand that online communications maybe at greater risk forhacking, intrusions, and other violations. Despite these possibilities, I

    consent to participate.

    Learning expectation:

    - To know what is an IRE

    Review:

    This case talks about Internet Research Ethics. Based from wikipedia,

    Internet research ethics "involves the research ethics of social science,

    humanities and scientific research carried out via the Internet." From the

    book. Internet research ethics is an "emerging multi and interdisciplinary

    field that systematically studies the ethical implications that arise from the

    use of the Internet as a space or locale of, and/or tool for research." In this

    29

  • 8/9/2019 Itethic Reader v2

    30/53

    case, the three sources of Internet research ethics was also discussed. There

    are three sources of IRE. One is professional ethics. This included the codes

    for computer related courses. Second is the social sciences and the

    humanities. Philosophers need to study humanities who used online as

    amateur artists or authors who are using their creative mind to produce a

    work that has a need for copyright protection for people who will be copying

    their work. Third is the growing body of information and computing ethics.

    We all know that there are issues that need to be answered regarding moral

    ethics in having new information technology.

    For me, to sum it all up, we should not just copy and paste works from the

    net. If we want to copy, then we must source it out. We must include

    reference and quotes to justify our work. We should be educated and

    disciplined very well about this matter. It is because this is a serious matter

    that may lead to plagiarism. It is important that we should be unique of what

    we do. People are all unique. We have our own creativity. We should learn

    and develop from that.

    Lesson learned:

    - IRE

    Integrative questions:

    - What is Internet Research Ethics in wikpedia?

    - What is the principle of justice?

    - What is Internet Research Ethics based from the book?

    - Why do we need to be educated through this?

    - What are the 3 sources of IRE?

    source:

    http://en.wikipedia.org/wiki/Internet_research_ethics

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 12: Health Information Technology: Challenges in Ethics, Science,

    and Uncertainty

    Amazon link: N/A

    Quote: The Standard View

    30

  • 8/9/2019 Itethic Reader v2

    31/53

    Learning expectation:

    - To know the issues that surround ethics

    Review:

    This case talks about two terms. Privacy and confidentiality. From

    wikipedia, Privacy is the "ability of an individual or group to seclude

    themselves or information about themselves and thereby reveal themselves

    selectively. The boundaries and content of what is considered private differ

    among cultures and individuals, but share basic common themes. Privacy is

    sometimes related to anonymity, the wish to remain unnoticed or

    unidentified in the public realm. When something is private to a person, it

    usually means there is something within them that is considered inherently

    special or personally sensitive. The degree to which private information is

    exposed therefore depends on how the public will receive this information,which differs between places and over time. Privacy is broader than security

    and includes the concepts of appropriate use and protection of information."

    From wikipedia, Confidentiality has been defined by the International

    Organization for Standardization as "ensuring that information is accessible

    only to those authorized to have access and is one of the cornerstones of

    information security. Confidentiality is one of the design goals for many

    cryptosystems, made possible in practice by the techniques of modern

    cryptography."

    For me, privacy and confidentiality are both important and significant forall. They determine the safety of us users, developers or programmers

    depending on how we created the Information System. For me, that is where

    health comes in. If people are always being hacked, then what i can say is

    that the programs that they use are not healthy. It is not healthy because

    their identites are not secured. It will have a bad effect to the organization if

    their softwares are not healthy. That is how i relate health and ethics to this

    case study.

    Lesson learned:

    - Privacy

    - Confidentiality

    Integrative questions:

    - What is privacy?

    31

  • 8/9/2019 Itethic Reader v2

    32/53

    - What is confidentiality?

    - How will we know health condition is secured?

    - Who develops Information Systems?

    - What is the standard view?

    source:

    http://en.wikipedia.org/wiki/Privacy

    http://en.wikipedia.org/wiki/Confidentiality

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 13: Ethical Issues of Information and Business

    Amazon link: N/A

    Quote: Information and communication technologies

    Learning expectation:

    - To know CSR

    - to know Business ethics

    Review:

    This case talks more on Business ethics and Corporate social

    responsibility. Based from my research in wikipedia, Business ethics is a

    "form of applied ethics or professional ethics that examines ethical principles

    and moral or ethical problems that arise in a business environment. It applies

    to all aspects of business conduct and is relevant to the conduct of

    individuals in business and business organizations as a whole. Applied ethics

    is a field of ethics that deals with ethical questions in many fields such as

    medical, technical, legal and business ethics. Business ethics is a contested

    terrain. There are economists and business gurus who claim ethics is

    irrelevant to the field of business." From wikipedia, Corporate social

    responsibility is a "form of corporate self-regulation integrated into a

    business model. Ideally, CSR policy would function as a built-in, self-

    regulating mechanism whereby business would monitor and ensure its

    adherence to law, ethical standards, and international norms. Business would

    embrace responsibility for the impact of their activities on the environment,

    consumers, employees, communities, stakeholders and all other members of

    32

  • 8/9/2019 Itethic Reader v2

    33/53

    the public sphere. Business would proactively promote the public interest by

    encouraging community growth and development, and voluntarily

    eliminating practices that harm the public sphere, regardless of legality."

    For me, these terms that i have discussed are all very important. They are

    important because it will or it can affect the many. A corporation or anybusiness should apply these terms that i have discussed. It will be a big

    boost or a big impact on their line of business because they affect the

    people. Whatever their actions are, good or bad, it refelcts everyone. Not

    only to the company, but to all people who are inside it. We should know our

    goals and objectives. We should know our mission and vision.

    Lesson learned:

    - CSR

    - Business ethics

    Integrative questions:

    - What is CSR?

    - What is Business ethics

    - Are they related?

    - What is the microlevel influence of business on ethics?

    - What is the aim of business organizations?

    source:

    http://en.wikipedia.org/wiki/Business_ethics#What_is_Business_Ethics

    http://en.wikipedia.org/wiki/Corporate_social_responsibility

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 14: Responsibilities for Information on the Internet

    Amazon link: N/A

    Quote: Expert information

    Learning expectation:

    - Information responsibilites

    33

  • 8/9/2019 Itethic Reader v2

    34/53

    Review:

    This case talks about responsibilities for Information on the Internet. From

    wikipedia, An Internet service provider , also sometimes referred to as an

    Internet access provider, is a company that offers its customers access to

    the Internet. The ISP connects to its customers using a data transmissiontechnology appropriate for delivering Internet Protocol datagrams, such as

    dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.

    ISPs may provide Internet e-mail accounts to users which allow them to

    communicate with one another by sending and receiving electronic

    messages through their ISP's servers. ISPs may provide services such as

    remotely storing data files on behalf of their customers, as well as other

    services unique to each particular ISP. Based from the book, the transactions

    and procedures that occurs through the internet are good. I agree with that. I

    agree with that because in this generation, almost all information or data you

    need are already posted in the net. It is just one click away for you to get

    what you want. The problem only is that we are not responsible for our

    actions. What am i saying? Whenever we get something from the net or from

    google, we do not source it out. We do not put quotes. That can result to

    plagiarism. To sum it all up, we users should know the provisions when using

    the internet. We should follow all guidelines so that we will not be sued by

    the management. It is important so that we will not be liable for our

    wrongdoings. We should be creative and unique.

    Lesson learned:

    - Information responsibilities

    Integrative questions:

    - What is ISP?

    - What are the responsibilities of ISP?

    - What did Deborah Johnson comment on ISP?

    - What did Milton Friedman comment on ISP?

    - Are they relevant?

    source:

    http://en.wikipedia.org/wiki/Internet_service_provider

    34

  • 8/9/2019 Itethic Reader v2

    35/53

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 15: Virtual Reality and Computer Simulation

    Amazon link: N/A

    Quote: rape in cyberspace

    Learning expectation:

    - to know about virtual reality

    - to know about computer simulation

    Review:

    In this chapter study, the topics being talked about are Virtual Reality and

    Computer simulation. For me, they are new terms. Before we start, let usdefine virtual reality. Based from my research in wikipedia, Virtual reality is a

    "term that applies to computer-simulated environments that can simulate

    places in the real world as well as in imaginary worlds. Most current virtual

    reality environments are primarily visual experiences, displayed either on a

    computer screen or through special stereoscopic displays, but some

    simulations include additional sensory information, such as sound through

    speakers or headphones. Some advanced, haptic systems now include tactile

    information, generally known as force feedback, in medical and gaming

    applications. Users can interact with a virtual environment or a virtual

    artifact either through the use of standard input devices such as a keyboard

    and mouse, or through multimodal devices such as a wired glove, the

    Polhemus boom arm, and omnidirectional treadmills. The simulated

    environment can be similar to the real world." The next definiton to be

    defined is computer simulation. From wikipedia, A computer simulation, is a

    "computer program, or network of computers, that attempts to simulate an

    abstract model of a particular system. Computer simulations have become a

    useful part of mathematical modeling of many natural systems in physics,

    astrophysics, chemistry and biology, human systems in economics,

    psychology, and social science and in the process of engineering newtechnology, to gain insight into the operation of those."

    For me, virtual reality and computer simulation are all good. They are

    good because they are unique, they are all very fast and all of them are

    useful. The problem is that it will be harmful to minors and to those who are

    35

  • 8/9/2019 Itethic Reader v2

    36/53

    studying due to its being addictive. What i can say is that to those who will

    be involving into virtual realities and computer simulation, they should all be

    careful so that their studies would not be affected by the games or

    application of the said terms. It is alright to play, for as long as you have your

    limitations.

    Lessons learned:

    - virtual reality

    - computer simulation

    Integrative questions:

    - What is virtual reality?

    - What is computer simulation?

    - What are the ethical issues regarding virtual reality?

    - Who can be affected by virtual reality?

    - Are they relevant?

    source:

    http://en.wikipedia.org/wiki/Virtual_reality

    http://en.wikipedia.org/wiki/Computer_simulation

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 16: Genetic Information: Epistemological and Ethical Issues

    Amazon link: N/A

    Quote: encompasses an account of the cell?s ability to store, express,

    replicate, and change information. These are the fundamental features of

    life, no less; and a schema that says something interesting about them all

    has at least a scope to commend it.

    Learning expectation:

    - to know about genetic information

    Review:

    36

  • 8/9/2019 Itethic Reader v2

    37/53

    This case study talks about the relation of Information Technology to

    Science. The topic focuses more about gentics. From wikipedia, Genetics, a

    "discipline of biology, is the science of heredity and variation in living

    organisms. The fact that living things inherit traits from their parents has

    been used since prehistoric times to improve crop plants and animals

    through selective breeding. However, the modern science of genetics, which

    seeks to understand the process of inheritance, only began with the work of

    Gregor Mendel in the mid-nineteenth century. Although he did not know the

    physical basis for heredity, Mendel observed that organisms inherit traits via

    discrete units of inheritance, which are now called genes." Whati can say is

    that Information Technology and Science are related. They are related in the

    sense that scientists can do its experiment as fast as they can because of

    the technology or gadget that they use. It is now very fast and easier to

    perform. The problem with this is that some of the scientists use the

    technology for cloning, DNA testing and many more, which for me isunethical because we do unjust things to them. We do unjust things to

    human beings or to animals. For example, a person kills a dog. The reason

    why that dog died is because the cells are needed by a scientist for cloning.

    In my opinion, that is so unethical because we risk lives just to make an

    experiment. How and what about the value of that animal? Before we

    perform such things, we should take note of all the risks of doing an act.

    There is/are consequences for every wrong action that is done.

    Lesson learned:

    - relation of IT to Science

    Integrative questions:

    - What is genetics?

    - What are ethical problems of genetic information?

    - What does Maynard Smith says about information?

    - What is the mission of human genome project?

    - How is science related to IT?

    source:

    http://en.wikipedia.org/wiki/Genetics

    the-handbook-of-information-and-computer-ethics.pdf

    37

  • 8/9/2019 Itethic Reader v2

    38/53

    Chapter 17: The Ethics of Cyber Conflict

    Amazon link: N/A

    Quote: threat to the peace

    Learning expectation:

    - to know what are the different cyber conflicts

    Review:

    This case study talks about cyber conflict. As technology grows by, people

    who have mastered the use of computers have the power to do unethical

    things. The unethical things that i am talking to are the creation of cookies

    and viruses. From wikipedia, A computer virus is a "computer program that

    can copy itself and infect a computer. The term virus is also commonly buterroneously used to refer to other types of malware, adware, and spyware

    programs that do not have the reproductive ability. A true virus can only

    spread from one computer to another when its host is taken to the target

    computer; for instance because a user sent it over a network or the Internet,

    or carried it on a removable medium such as a floppy disk, CD, DVD, or USB

    drive. Viruses can increase their chances of spreading to other computers by

    infecting files on a network file system or a file system that is accessed by

    another computer." From wikipedia, A cookie is a "small piece of text stored

    on a user's computer by a web browser. A cookie consists of one or more

    name-value pairs containing bits of information."

    With these said things and problems, we should now be careful when we

    use the computer. We should make sure that our software is always secured

    with anti-virus. Our internet should always be protected. Our anti-virus

    program should always be updated so that it will be in good strength to block

    viruses. Aside from that, whenever we are visitng sites, we should be careful

    when and when not to give our identities to websites. It is because some of

    that website can be hackers. Once we give our full identification, then it may

    be the start of their harm to our personal computer.

    Lesson learned:

    - how to protect our own computers

    Integrative questions:

    - What is a virus?

    38

  • 8/9/2019 Itethic Reader v2

    39/53

    - What is a cookie?

    - What is jus in bello?What is jus ad bellum?

    - How can we protect our own computers?

    source:

    http://en.wikipedia.org/wiki/Computer_virus

    http://en.wikipedia.org/wiki/HTTP_cookie

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 18: A Practical Mechanism for Ethical Risk AssessmentA SoDIS

    Inspection

    Amazon link: N/A

    Quote: Research in software quality has focused largely on the technical

    aspects of quality improvement, while limited attention has been paid to the

    organizational and socio-behavioral aspects of quality management.

    Learning expectation:

    - to know what are the different ethical risks

    Review:

    This chapter talks about risk management. In this chapter, the cycle in risk

    assessment had also been talked about. Based from wikipedia, Risk

    management can therefore be considered the "identification, assessment,

    and prioritization of risks followed by coordinated and economical application

    of resources to minimize, monitor, and control the probability and/or impact

    of unfortunate events or to maximize the realization of opportunities. Risks

    can come from uncertainty in financial markets, project failures, legal

    liabilities, credit risk, accidents, natural causes and disasters as well as

    deliberate attacks from an adversary. Several risk management standards

    have been developed including the Project Management Institute, theNational Institute of Science and Technology, actuarial societies, and ISO

    standards. Methods, definitions and goals vary widely according to whether

    the risk management method is in the context of project management,

    security, engineering, industrial processes, financial portfolios, actuarial

    assessments, or public health and safety."

    39

  • 8/9/2019 Itethic Reader v2

    40/53

    For me, as an Information Systems student, we should really give focus or

    we should really give priority when handling risks. It is because risks can or

    may cause the downfall of our Information Systems. For us to prevent that,

    we should always first, identify the risk. We should identify the risk so that

    we would know how to handle a particular risk. Next step is to analyze the

    risk. We should create a plan on how we can prevent that risk. The last step

    for me is to evaluate the risk. For me, evaluate is to monitor the status of

    that particular risk. After we have identify and analyze, it is time for us to

    track whether the risk has been subtracted or lessened. It is important for

    every Information System so that we would not have expensive costs during

    the run time.

    Lesson learned:

    - how to handle risks

    Integrative questions:

    - What is risk management?

    - What is the SoDIS approach?

    - What are the basic four steps of SoDIS process?

    - Are they really needed?

    - What is Gert's 10 basic moral rules?

    source:

    http://en.wikipedia.org/wiki/Risk_management

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 19: Regulation and Governance of the Internet

    Amazon Link: N/A

    Quote:

    the Internet is not spoken about only as a type ofmedium but often as a

    living space in which people work, play, shop, socialize, and so on. So to

    some extent the argument about controls on Internet content has shifted a

    little. Although there is still discussion of pornography, hate language, and

    40

  • 8/9/2019 Itethic Reader v2

    41/53

    the like, there is also discussion of, for example, controlling Internet

    gambling and downloadingmusic and movies. So the discussion now is partly

    of Internet activity and partly of Internet content.

    Learning Expectation:

    - Regulation and Governance of the Internet

    Review:

    In this chapter of the book they said that Internet governance is the

    development and application by Governments, the private sector and civil

    society, in their respective roles, of shared principles, norms, rules, decision-

    making procedures, and programs that shape the evolution and use of the

    Internet which for me means that the internet is really important for all the

    people because the internet is one of their source of income, information,

    and a lot more. It is said that in effective regulation there are two broad

    issues regarding the regulation of the content on the Internet: can content

    on the Internet be regulated effectively, and should it be regulated. They

    have also discussed about across boarders and they have said that Individual

    countries, or political entities within countries, apart from blocking, can also

    control content through legislation, and this can be relatively effective in

    certain circumstances despite the fact that the Internet crosses national

    borders. Consider the recent example of Internet gambling in the U.S. Online

    gambling has been prohibited in the U.S., but at least one prominent

    gambling business, Party Gaming, is based on Gibraltar, where it isimmunefrom U.S. legislation.

    For me, whatever our position is, high or low, we should be ethical when

    using the internet. We should not take advantage when using it. We should

    not use our power or we should not exercise our power over it. The internet

    is for all. It is for equal purposes. That is why we should respect and be

    disciplined.

    Lessons Learned:

    - Regulation and Governance of the Internet

    Integrative Questions:

    - What is Regulation of the internet?

    - What is Governance of the internet?

    41

  • 8/9/2019 Itethic Reader v2

    42/53

    - What is Censorship?

    - Why do we need rules when browsing?

    - Is there a consequence when we break the rule?

    source:

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 20: Information Overload

    Amazon Link: N/A

    Quote:

    Information is supposed to be that which informs, but nothing can inform

    without some attentional investment. Alas, there is no evidence that the rateat which a member of our species can spend attentional resources has

    increased to any significant degree in the past 10,000 years. As a result,

    competition for our limited attention has grown in direct proportion to the

    amount of information available. Because information has been proliferating

    at such an enormous rate, we have reached the point where attention is an

    extremely scarce resource, so scarce that extreme measures from

    telemarketing to terrorism have proliferated as fast as information just to

    capture a bit of it

    Learning Expectation:

    - Information Overload

    - Advantages

    - Disadvantages

    Review:

    This chapter talks about Information Overload. Based from wikipedia,

    Information overload is a "term popularized by Alvin Toffler that refers to thedifficulty a person can have understanding an issue and making decisions

    that can be caused by the presence of too much information. The term and

    concept precede the Internet. Toffler's explanation of it in his bestselling

    book presents information overload as the Information Age's version of

    sensory overload, a term that had been introduced in the 1950s. Sensory

    overload was thought to cause disorientation and lack of responsiveness.

    42

  • 8/9/2019 Itethic Reader v2

    43/53

    Toffler posited information overload as having the same sorts of effects, but

    on the higher cognitive functions, writing. More and more people are

    considered to be active writers and viewers because of their participation.

    This flow has created a new life where we are now in danger of becoming

    dependent on this method of access to information. Therefore we see an

    information overload from the access to so much information, almost

    instantaneously, without knowing the validity of the content and the risk of

    misinformation."

    For me, I think that Information overload only arises when we are

    memorizing. Because when we memorize, sometimes we tend to get

    pressured if whether or not we can do it. Unlike if we understand, we do not

    have to memorize. With just one snap, we already know and can apply the

    concept. When we get to be tired and pressured on memorizing, that is the

    time information overload comes. We should understand the concept, not

    memorize.

    Lessons Learned:

    - Information Overload

    - Causes of information overload

    - Consequences of information overload

    Integrative Questions:

    - What does it mean to have too much information, and, for that matter?

    - What exactly is this substance we can apparently have too much of?

    - Is the phenomenon as recent as our anxious complaints suggest, or does it

    have a longer history?

    - What is Information Overload?

    - How does it relate to other seemingly related notions, such as data

    overload, information anxiety, information pollution, techno stress, datasmog, and information fatigue syndrome?

    source:

    http://en.wikipedia.org/wiki/Information_overload

    the-handbook-of-information-and-computer-ethics.pdf

    43

  • 8/9/2019 Itethic Reader v2

    44/53

    Chapter 21: Email Spam

    Amazon Link: N/A

    Quote:

    "This technique has been tried, and some prominent domestic spammers

    have been arrested. However, this has not eliminated the problem of spam

    email. One problem is that state or national laws, unlike the Internet, do not

    reach across political boundaries. Spammers can effectively avoid anti spam

    laws. Another problem is the definitional problem we have discussed

    previously. Furthermore, when spammers spoof return addresses or use

    drones, this complicates prosecution of the true source of the spam emails."

    Learning Expectation:

    - Email Spam

    - Advantages

    - Disadvantages

    Review:

    In this chapter they have discussed about Email Spam. They said that email

    spam is also known as junk mail. Some of the junk mails are virus. Email

    spam is an example of a spoiling of the commons; email spammers exploit

    the economic model of Internet email and the relative openness of emailprotocols. NF-UCBE shifts the cost of advertising to email recipients, who

    must clear out advertisements for products they have no interest in. F-UCBE

    uses the Internet to defraud victims. The ethical case against F-UCBE is

    straightforward, and the people who are responsible for F-UCBE are

    condemned. An ethical analysis of NF-UCBE is more nuanced, since the

    economic incentives of current email arrangements make NF-UCBE

    attractive.

    The end- users or external users of an email should be very careful especially

    in reading emails that we dont know if who the recipient is because if weopen it there are a lot of possibilities that your email would face. There are

    other spam emails that are asking for money, and telling that you won for a

    certain game when in fact you did not join in that game, the others they use

    to send you a junk mail so that you will give them information and they can

    use it illegally.

    44

  • 8/9/2019 Itethic Reader v2

    45/53

    Lessons Learned:

    - e-mail

    - span

    - junk in e-mail

    Integrative Questions:

    - Is spam harmful?

    - How can we ignore it?

    - Why is it called or named spam?

    - What is a spam?

    - What is email spam?

    source:

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 22: The Matter of Plagiarism: What, Why, and If

    Amazon link: N/A

    Quote: concealment is at the heart of plagiarism

    Learning expectation:

    - to know all about Plagiarism

    Review:

    This chapter talks all about the concept of plagiarism. So, what is

    plagiarism all about? Is it good or not? Based from wikipedia, Plagiarism, is

    the use or close imitation of the language and thoughts of another author

    and the representation of them as one's own original work. Within academia,

    plagiarism by students, professors, or researchers is considered academicdishonesty or academic fraud and offenders are subject to academic

    censure, up to and including expulsion. In journalism, plagiarism is

    considered a breach of journalistic ethics, and reporters caught plagiarizing

    typically face disciplinary measures ranging from suspension to termination

    of employment. Some individuals caught plagiarizing in academic or

    journalistic contexts claim that they plagiarized unintentionally, by failing to

    45

  • 8/9/2019 Itethic Reader v2

    46/53

    include quotations or give the appropriate citation. While plagiarism in

    scholarship and journalism has a centuries-old history, the development of

    the Internet, where articles appear as electronic text, has made the physical

    act of copying the work of others much easier. Plagiarism is not the same as

    copyright infringement. While both terms may apply to a particular act, they

    are different transgressions.

    For me, based from the research, we should get in touch with this kind of

    activity. It is because you do not create good image to the school, to the

    community or to the company. You should be unique when doing something.

    You should not copy others work because it definitely looses your image. If

    you really want to copy that, you source it out. You should quote it from your

    source. Each individual has their uniqueness. We should exercise that

    uniqueness within us instead of us cheating and copying others work.

    Lesson learned:

    - effect of Plagiarism

    Integrative questions:

    - What is Plagiarism?

    - What is lack of authorization?

    - What is lack of accreditation?

    - What can be effects of plagiarism?

    - How can it be prevented?

    source:

    http://en.wikipedia.org/wiki/Plagiarism

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File

    Sharing

    Amazon link: N/A

    Quote: compensation without control

    Learning expectations:

    46

  • 8/9/2019 Itethic Reader v2

    47/53

    - to know what Online sharing is

    - to know what are the effects of it

    Review:

    In this case study, the topic talked about was online file sharing. Based

    from wikipedia, File sharing is the "practice of distributing or providing

    access to digitally stored information, such as computer programs, multi-

    media, documents, or electronic books. It may be implemented through a

    variety of storage, transmission, and distribution models and common

    methods of file sharing incorporate manual sharing using removable media,

    centralized computer file server installations on computer networks, World

    Wide Web-based hyperlinked documents, and the use of distributed peer-to-

    peer networking. File sharing is not in and of itself illegal. However, the

    increasing popularity of the mp3 music format in the late 1990s led to therelease and growth of Napster and other software that aided the sharing of

    electronic files. This in practice led to a huge growth in illegal file sharing:

    the sharing of copyright protected files without authorization."

    For me, it is good and at the same time, bad to have an online file sharing.

    It is good because it can help students to learn in a fast pace. Students can

    learn easily and fast if documents are to be uploaded on an educational

    basis. Meanwhile, it is bad it will be used for profit. An example of this would

    be limewire. This would be bad if a person will download songs from limewire

    and at the same time, that person will burn and sell the pirated songs to theblack market. That can be the downfall for file sharing. So for me, we should

    use it in an educational way or use it in a good way.

    Lesson learned:

    - effects of online sharing

    Integrative questions:

    - What is online file sharing?

    - What is P2P?

    - What are the moral considerations?

    - Is it sharing or theft already?

    - When is it good, and when is it bad?

    47

  • 8/9/2019 Itethic Reader v2

    48/53

    source:

    http://en.wikipedia.org/wiki/File_sharing

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 24: Censorship and Access to Expression

    Amazon link: N/A

    Quote: thoughts, attitudes, and feelings

    Learning expectation:

    - to know what censorship means

    Review:

    This topic focuses on censorship. Again, my beloved and repeated

    question in this book, what is censorship? Based from wikipedia, Internet

    censorship is "control or suppression of the publishing or accessing of

    information on the Internet. The legal issues are similar to offline censorship.

    One difference is that national borders are more permeable online: residents

    of a country that bans certain information can find it on websites hosted

    outside the country. A government can try to prevent its citizens from

    viewing these even if it has no control over the websites themselves. Barring

    total control on Internet-connected computers, such as in North Korea and

    Cuba, total censorship of information on the Internet is very difficult toachieve due to the underlying distributed technology of the Internet.

    Pseudonymity and data havens allow unconditional free speech, as the

    technology guarantees that material cannot be removed and the author of

    any information is impossible to link to a physical identity or organization."

    For me, censorship is really one of the best practices that we should follow

    on. It is because our personality, identity and all information are secured. If

    there will be no censorship, then hackers must be all over the globe. I have

    an example for censorship. When a user creates an account on facebook,

    friendster, twitter, linkedin, yahoomail, gmail and many more, we usuallyprovide our own passwords. We are provided by usernames and passwords.

    For me, that is the censorship. We our restricted to view and to know only

    our personal accounts. We are not to know the accounts of the other people

    for security purposes.

    Lesson learned:

    48

  • 8/9/2019 Itethic Reader v2

    49/53

    - advantage of censorship

    Integrative questions:

    - What is censorship?

    - What are the types of harm?

    - What are the arguments in censorship?

    - What is hostile atmosphere?

    - What do we mean by creating a market?

    source:

    http://en.wikipedia.org/wiki/Censorship#Internet_censorship

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 25: The Gender Agenda in Computer Ethics

    Amazon link: N/A

    Quote: to create a gender-equal ethics, a moral theory that generates

    nonsexist moral principles, policies and practices.

    Learning expectation:

    - to know what is Feminst ethics

    Review:

    In this case study, the topic is all about gender. The topic mostly focused

    about feminist ethics. So, what is feminist ethics? For me, it is again, a new

    term. Based from the Standford Encyclopedia of Philosophy, Feminist Ethics

    is an "attempt to revise, reformulate, or rethink traditional ethics to the

    extent it depreciates or devalues women's moral experience. Among others,

    feminist philosopher Alison Jaggar faults traditional ethics for letting women

    down in five related ways. First, it shows less concern for women's asopposed to men's issues and interests. Second, traditional ethics views as

    trivial the moral issues that arise in the so-called private world, the realm in

    which women do housework and take care of children, the infirm, and the

    elderly. Third, it implies that, in general, women are not as morally mature or

    deep as men.Feminists have developed a wide variety of gender-centered

    approaches to ethics, each of which addresses one or more of the five ways

    49

  • 8/9/2019 Itethic Reader v2

    50/53

    traditional ethics has failed or neglected women. Some feminist ethicists

    emphasize issues related to women's traits and behaviors, particularly their

    care-giving ones. In contrast, other feminist ethicists emphasize the political,

    legal, economic, and/or ideological causes and effects of women's second-

    sex status. "

    For me, I really do not understand how the feminist ethics is related to

    computer ethics or Information Technology. In my point of view, there should

    be no gender issue for this matter. Whether you are male or you are female,

    if you commit mistake, then you are liable for it. There are consequences for

    every wrong act that we do. That is why for me, there should be no gender

    issue in the computer world.

    Lesson learned:

    - Feminst ethics

    Integrative questions:

    - What is a Feminist ethics?

    - What is a student population?

    - What are Quantitative Versus Qualitative Research Methodologies?

    - What is Ethical Behavior?

    - What is Cyberstalking?

    source:

    http://plato.stanford.edu/entries/feminism-ethics/

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 26: The Digital Divide: A Perspective for the Future

    Amazon link: N/A

    Quote: wait and see

    Learning expectation:

    - to know what is Digital Divide

    Review:

    50

  • 8/9/2019 Itethic Reader v2

    51/53

    In this case study, the topic that was talked about was Digital Divide. What

    is it? For me, it is a new term. Based from wikipedia, The digital divide is the

    "gap between people with effective access to digital and information

    technology and those with very limited or no access at all. It includes the

    imbalances in physical access to technology as well as the imbalances in

    resources and skills needed to effectively participate as a digital citizen. In

    other words, it is the unequal access by some members of society to

    information and communication technology, and the unequal acquisition of

    related skills. The term is closely related to the knowledge divide as the lack

    of technology causes lack of useful information and knowledge. The digital

    divide may be classified based on gender, income, and race groups, and by

    locations. The term global digital divide refers to differences in technology

    access between countries or the whole world."

    For me, this gap that they are referring to in this case study can be erased

    with the use of this digital divide. I have said that because everything is

    connected with technology. With that, the poor and the rich can be

    connected literally and figuratively. Figuratively because there are a lot of

    computer shops. How much do we pay to rent a computer for one full hour?

    It is very cheap. Why not use the computer shop if these poor people cannot

    buy their own personal computers? That is my point. It does not need wealth

    to connect the rich and the poor. Every will has a way.

    Lesson learned:

    - Digital Divide

    Integrative questions:

    - What is Digital Divide?

    - What is the basis for digital divide to be eliminated?

    - What are the "gaps"?

    - What is ICT?

    - What are the empirical studies about failure?

    source:

    http://en.wikipedia.org/wiki/Digital_divide

    51

  • 8/9/2019 Itethic Reader v2

    52/53

    the-handbook-of-information-and-computer-ethics.pdf

    Chapter 27: Intercultural Information Ethics

    Amazon link: N/A

    Quote: whether information ethics in this ontological or global sense may

    be biased in favor of Western values and interests and whether far-eastern

    cultures may provide new perspectives and heuristics for a successful

    development of the information society.

    Learning expectation:

    - to know what is IIE

    Review:

    This chapter talks about Intercultural Information Ethics. Again, let us go

    back to the definition of Information Ethics for things to be clear. Based from

    wikipedia, Information ethics is the "field that investigates the ethical issues

    arising from the development and application of information technologies. It

    provides a critical framework for considering moral issues concerning

    informational privacy, moral agency problems arising from the life-cycle of

    information. Information Ethics is related to the fields of computer ethics and

    the philosophy of information. Dilemmas regarding the life of information are

    becoming increasingly important in a society that is defined as the

    information society. Information transmission and literacy are essential

    concerns in establishing an ethical foundation that promotes fair, equitable,

    and responsible practices. Information ethics broadly examines issues

    related to ownership, access, privacy, security, and community."

    For me, this is an important matter because we deal with a lot of cultures.

    A lot of cultures that will or that may affect the world wide web. We should

    respect each and every culture so that there will be no conflict onto the

    world wide web. Let us follow the ten commandments of the computer, let us

    respect the traditions of each and every race. It is important for us to have

    ethics so that there would be no harm, there would be no discriminations on

    the internet. An example of this would be plagiarism. If you really have

    ethics, then you should not copy others activity or work, or if you really want

    to copy it, then make sure to source it out so that there would be no conflict.

    Lesson learned:

    52

  • 8/9/2019 Itethic Reader v2

    53/53

    - IIE

    Integrative questions:

    - What is IIE?

    - Who is Terrell Ward Bynum?

    - Who is Bernd Frohmann?

    - Who is Lorenzo Magnani?

    - Who is Barbara Paterson?

    source:

    http://en.wikipedia.org/wiki/Information_ethics

    the-handbook-of-information-and-computer-ethics.pdf