Complete

  • Uploaded by: Rocky
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Complete as PDF for free.

More details

  • Words: 17,890
  • Pages: 105
Ethic Reader Rocky L. Ho 9/2/2009

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License.

Dedication To my parents: Ho Kam Ming, Elizabeth Lo To my siblings: Michelle Ho, Evelyn Ho, Irene Ho To my friends and fellow classmate. To my future thesis mate

Preface This is a compilation of discussions and book reviews, integrative questions, questions that serves as guide questions and help the readers to further understand or polish their reading skills.

Table Of Content

The Fortune at the Bottom of the Pyramid……………………………………………… …………………………page1 Products and Services for the BOP……………………………………………………… ……………………………..page2 A Global Opportunity?...................................................................................................... ....page3 The Ecosystem for Wealth Creation……………………………………………………… ……………………………page4 Reducing Corruption: Transaction Governance Capacity…………………………… ……………………….page5 Ethics and the Information Revolution………………………………………………………….page7 Foundations of Information Ethics……………………………………………………………………... page8

Reason, Relativity and Responsibility in Computer Ethics…………………………………… …………………………page9 Disclosive Computer Ethics………………………………………………………………………… ………………………………….page10 Gender and computer ethics………………………………………………………………………… ……………………………….page11

Is the global information infrastructure a democratic technology……………… …………………….page12

Applying ethical and moral concepts and theories to IT contexts: Some key problems and challenges…………………………………………………………………………… ………………………………………………………..page13 Just Consequentialism and computing…………………………………………………………… ………………………………page14 The internet as Public Space: Concepts, Issues, and Implications in Public Policy…… …………………..…page15 The Laws of cyberspace……………………………………………………………………………… …………………………………page16 Of the black holes and decentralized law-making in cyberspace………………………… …………………………page17 Is Cyberspace Burning………………………………………………………………………………… …………………………………page18 Filtering the internet in the USA: Free speech Denied………………………………………… …………………………page19 Cencorship, the internet, and the child pornography law of 1996: a critique………… ………………………page20 Access Controls Without Censorship……………………………………………………………… ……………………………..page21 Internet Service Providers and Defamation: New Strands of Liability…………………… ……………………….page22 A Politics of Intellectual Property: Environmentalism for the Net………………………… ………………………..page23 Intellectual Property, Information, and the Common Good………………………………… …………………………page24

Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in United States………………………………… …………………………………………page25 On the Web, Plagiarism Matters More than Copyright Piracy……………………………… ………………………..page26

An Ethical Evaluation of Web Site-Linking……………………………………………… ………………………..page27 The Cathedral and the Bazaar…………………………………………………………… ……………………………..page28 Towards a Theory of Privacy for the Information Age……………………………………..page29 The Structure of Rights in Directive 95/46EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data………………………..page30 Privacy Protection, Control of Information, and Privacy- Enhancing Technologies………page31 Toward an Approach to Privacy in Public Challenges of Information Technology……….page32 KDD, Privacy, Individuality, and Fairness………………………………………………………… ……………………………page33 Data Mining and Privacy……………………………………………………………………………… ………………………………page34

Workplace, Surveillance, Privacy and Distributive Justice……………………………...…page35 Privacy and the Varieties of Informational Wrongdoing…………………………………...page36 Defining the Boundaries of Computer Crime: Piracy, Breaks-Ins, and Sabotage in Cyberspace… ……………………………………………………………………………….page37 Terrorism or Civil Disobedience: Toward a Hacktivist Ethic………………………………page38 Web Security and Privacy: An American Perspective……………………………………..page39

Terrorism or Civil Disobedience: Toward a Hacktivist Ethic……………………………...page40 Web Security and Privacy: An American Perspective……………………………………...page41 The Meaning of Anonymity in an Information Age…………………………………………… …………………………page42

Double Encryption of Anonymized Electronic Data Incharge……………………………..page43 Written on the Body: Biometrics and Identity……………………………………………...page44 Ethical Considerations for the Information Professions……………………………………page45 Software Engineering Code of Ethics: Approved…………………………………………..page46 No, PAPA: Why Incomplete Codes of Ethics Are Worse Than None at All………………page47 Subsumption Ethics…………………………………………………………………………………… ……………………………….page48

Ethical Issues in Business Computing……………………………………………………...page49 The Practitioner from Within: Revisiting the Virtues………………………………………page50 Foundations of Information Ethics………………………………………………………… …………………………page51 Milestones in the History of Information and Computer Ethics…………………… …………………..page52 Moral Methodology and Information Technology……………………………………… ……………………page53 Value Sensitive Design and Information Systems…………………………………… ………………………..page55

Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property………………………………………………………………………………………… …………………………………page56 Informational Privacy: Concepts, Theories, and Controversies…………………… ……………………page58 Online Anonymity……………………………………………………………………………… …………………………….page59 Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking………………………………………………………………………………… ……………………………..page61 Information Ethics and the Library Profession………………………………………… ……………………….page62 Ethical Interest in Free and Open Source Software…………………………………… ……………………..page64 Internet Research Ethics: The Field and Its Critical Issues………………………… ………………………page65 Health Information Technology: Challenges in Ethics, Science, and Uncertainty……………..page67 Ethical Issues of Information and Business…………………………………………… ………………………….page69 Responsibilities for Information on the Internet……………………………………… ……………………….page70 Virtual Reality and Computer Simulation……………………………………………… ………………………….page71 Genetic Information: Epistemological and Ethical Issues…………………………… …………………….page72 The Ethics of Cyber Conflict………………………………………………………………… …………………………..page73 A Practical Mechanism for Ethical Risk Assessment — A SoDIS Inspection…… ………………….page74

Regulation and Governance of the Internet…………………………………………… ………………………..page75 Information Overload………………………………………………………………………… ……………………………page76 Email Spam……………………………………………………………………………………… ………………………………page77 The Matter of Plagiarism: What, Why, and If…………………………………………… ……………………..page78 Intellectual Property: Legal and Moral Challenges of Online File Sharing……… ………………….page79 Censorship and Access to Expression…………………………………………………… ………………………….page80 The Gender Agenda in Computer Ethics………………………………………………… ………………………..page81 Digital Divide: A Perspective for the Future…………………………………………… ………………………..page82 Code of Ethic…………………………………………………………………………………… ………………………………page85

Rocky L. Ho Chapter 1 Title: The Fortune at the Bottom of the Pyramid-KC Prahalad

Quote: “The rural poor represent a different problem” Expectations: I expect to learn the importance of the Fortune at the Bottom of the Pyramid.

Book Review: The author of this book KC Prahalad, discussed the meaning of once life in a society, where some of the people living with only two dollars per day, some of them has family which needed to be raised, but they can’t do it due to lack of income. Since the upper most part of the pyramid has the ability to earn money, they can at least earn twenty thousand dollars per day. Most of the people with good company and has the ability to earn big money, see the poor people as low rated person, because they don’t have money. There are several cases happened where in a shopping mall where there are lots of people, but they are not buying, it means that they don’t have the money to afford the item which they need, so they would just hang or shop around the mall just for them to past time.

Things I have learned: I learned that not all people have the money and power to have everything they want in this world.

Integrity Questions: 1.)What are the differences among the level of the pyramid? 2.)What does “The market at the bottom of the pyramid” talks about? 3.)What is “The power of dominant logic” says? 4.)What is the nature of the BOP Market? 5.)What is the significance of the market at the bottom of the pyramid?

Page 1

Chapter 2 Title: Products and Services for the BOP-KC Prahalad

Quote: “The conditions of sanitary and medical care in such camps cannot be controlled as well as they can be in specially designed hospitals developed for this purpose.”

Expectations: I expect to learn the meaning and significance of this chapter where products and services are in the line.

Book Review: The author of this book KC Prahalad, discussed the continuation from the previous chapter. After carefully examining their previous years, they managed to see the differences between the ranges in prices and services. The 12 principles of innovation for BOP market talks about how they can improve their sales for better service and selling their product for the consumers. The topic which I have read is the part where the jaipur foot, it is the easiest topic to understand, it is said that every year, there are over millions of people which are born in a country in this world. Some country have less than 1 million because it was set by their law, example china. In china they can have 1-2 child per family, because of their growth rate, china would be invaded by their own kind if they did not apply that law, decause china is one of the largest country.

Things I have learned: I learned that the 12 principles of innovation for BOP market talks about the how to increase the price and service for customers for better improvement.

Integrity Questions: 1.)What is sustainable development? 2.)What is price performance? 3.)What is innovation? 4.)What is scale of operation? 5.)What is process innovation?

Page 2

Chapter 3

Title: BOP: A Global Opportunity? –KC Prahalad Quote: “The basic nit of analysis is the SGH with 20 members.” Expectations I expect to learn the benefits of this chapter.

Book Review: The BOP market has developed their companies to increase their rate of succession. The author of this chapter has discussed that the companies can gain benefit within or among themselves. The BOP has lots of benefits among the companies. Example is when in the market, if they have complete technology, gadgets, and resources, they can also increase the man-power, when these requirements are attained, they can surely increase the company’s fame and name.

Things I have learned: I learned how this chapter complies with the benefit of BOP.

Integrity Questions: 1.)What is the cost of managing talks about? 2.)What is SGH? 3.)What does this chapter give as advantage to others? 4.)What is local growth opportunities? 5.)What is capital intensity?

Page 3

Chapter 4

Title: The Ecosystem for Wealth Creation –KC Prahalad Quote: “Underpinning this ecosystem is education across all levels.” Expectations I expect to learn how ecosystem for wealth creation helps us and the significant about it.

Book Review: From what I have read, the market-oriented ecosystem is being built by small companies, they conduct different traditions and motivations to other individuals. This would represent the flexibility of their people who works hard for them. On the same time, the ecosystems for a developing country talks about how significant the previous year where the economy has been improving with the help of technologies.

Things I have learned: The market-oriented ecosystem helps us to increase the popularity and help them to afford their basic needs of life.

Integrity Questions: 1.)What is ITC? 2.)What is the evolution of SGH talks about? 3.)What is MNC? 4.)What does this chapter refer to? 5.)What is market-oriented ecosystem?

Page 4

Chapter 5

Title: Reducing Corruption: Transaction Governance Capacity-KC Prahalad Quote: “Laws do not exist and laws that do exist are not enforced” Expectations: I expect to learn the importance of the Corruption. Book Review: The author of this book KC Prahalad, discussed the poor where I have understand that the poor is not actually poor but instead they are being no money due to the government or the rise of the prices in their country. If their government has been improving, they can reduce the poverty in their country. If poverty has been reduced, they can achieve education, health care for themselves. If they have loaned money from other country, they should have do something to pay it back as soon as possible, because the interest would kill them.

Things I have learned: I have learned and understood the lesson of corruption and governance.

Integrity Questions: 1.)What are corruption? 2.)What is e-governance? 3.)What is eSeva? 4.)What are the advantages can we get from this topic of this chapter? 5.)What do you mean by poor?

Page 5 BOP chapter 6

1.)Who built Casas Bahia? 2.)Describe the management style of Casas Bahia. 3.)Describe Agressiveness. 4.)What is the role of Casas Bahia? 5.)What is training? 6.)What is cash management? 7.)What is products? 8.)What is distribution? 9.)What is delivery drivers? 10.)What is the process of delivery? 11.)What is stores and storefronts? 12.)What is marketing? 13.)What is technology? -

14.)What is uniqueness? 15.)What is the future of Casas Bahia? -

Page 6

Rocky L. Ho Chapter 1 Title: “Ethics and the Information Revolution” by: Terrel Ward Bynum Quote: “Malicious software, or “programmed threats”, provide a significant challenge to computer security.”

Expectations: Since this is the first chapter of cyberethics, I would like to all about the ethics and information revolution deeper.

Book Review: The author of this chapter is Terrel Ward Bynum, he defined the information revolution as powerful technology. In the IT and human world, there are over millions of people who uses computers for some reason, or they use it for their own purpose. It has become one of the most important thing in the world nowadays, because it has a lot of uses, like in the world government, they use computer to communicate with the high positioned authority, and many more. During the 1940’s to 1950’s, they use computer as a tool for studying, making antiaircraft during the world war 2. Computer ethnics was founded by Norbert wiener. Global information ethics is evolving when days, months years passes, it evolves to a border, and also becomes an important field.

Things I have learned:

I learned that by examining the computer evolution, it grows into better use.

Integrity Questions: 1.)What is global laws? 2.)What is software ownership? 3.)What is computer security? 4.)What is the significance of this chapter? 5.)Who is the author of this chapter?

Page 7

Rocky L. Ho Part 1: Handbook of information and computer ethics. Chapter 1 Title: “Foundations of Information Ethics” by Luciano Floridi

Quote: “The information society has been made possible by a cluster of information and communication technologies infrastructures.”

Expectations: I expect to learn a lot from this chapter since it is the first part of the handbook.

Book Review: The author of this chapter is Luciano Floridi. IE was one of the topic which was discussed, it is said that the IE is the ethics for information resources. ERPT was also discussed, which means external, resource, product, target, and it is a model. There were stages that were mention in this chapter. The stages talks about how the environment evolves when time passes. Technology were produced to help us guide ourselves in our work.

Things I have learned: I learned that the organization policy drives information technology development.

Integrity Questions: 1.) What is ECPT? 2.) What IE? 3.) What are the limitations that were discussed? 4.) Who is Luciano Floridi? 5.) What do we get from this chapter?

Page 8

Chapter 3 Title: “Reason, Relativity and Responsibility in Computer Ethics” by James H. Moor

Quote: “Computers are also enriching , because of their logical malleability, computers are put to many uses in diverse activities.”

Expectations: I expect to learn about the nature of computer ethics. Book Review: The author of this chapter is James H. Moor, has said that the “computer revolution has life of its own”, this sentence made me think how could a computer have a life of its own, how come it was said it that way, for some reason, it is kind of weird, because computer has no life, it can’t breathe, sense, see, hear, and taste, it is still a non-living thing, so does it still count that has life? I guess not. Maybe the author said that because, it gets electricity, to be able to operate, it will go on if it was turned on. There are some rules and regulation when it comes to web sites, stated in the materials first, “Destroy information on the user’s hard disk by leaving a time bomb on the user’s desk”, second, “remote information from the user’s hard disk without the user’s knowledge”, third, “leave a cookie”, fourth, “leave a cookie on users desk to inform”, fifth, “do not take or leave any permanent information on the user’s desk”, lastly, “Give the user the information and ability to accept or decline cookies”.

Things I have learned: I learned that the special nature of computer ethics is to maintain the computer ethics in their own special fields.

Integrity Questions: 1.)Who is the author of this chapter? 2.)What are core values? 3.)What is responsibility? 4.)What is resolution? 5.)What is residue?

Page 9

Chapter 4 Title: “Disclosive Computer Ethics” by Philip Brey Quote: “The above remarks about non-neutrality of many technologies and techniques point to a second limitation of mainstream computer ethics.”

Expectations: I expect to learn about hidden morality of computer ethics. Book Review: The author of this chapter is Philip Brey, he defined the limitations of mainstream computer ethics according to the book, “it is a name that will be used in essay for approaches that currently make up the mainstream in the computer ethics.” He said that “mainstream computer ethics will take as its point of departure a particular model of applied ethic that may be called standard model.”

Things I have learned: I learned the limitations of mainstream computer ethics.

Integrity Questions: 1.)Who is the author of this chapter? 2.)What is justice? 3.)What is autonomy? 4.)What is democracy? 5.)What is privacy?

Page 10

Chapter 5 Title: “Gender and computer ethics” by Alison Adam Quote: “One cannot help but that interviewing and participant observation are not only much more time consuming techniques.”

Expectations: I expect to learn the basic needs for this chapter. Book Review: The author of this chapter is Alison Adam. In this chapter Alison Adam said that he has explored the research in the gender and computer ethics. He said “the first strand can be viewed as a spillover from information system and computing research on barriers and pipelines, which tends to see the gender and ict problem as one of women’s access to icts and their continuing low representation in computing all the wall through the educational process through to the world of work.”

Things I have learned:

I have learned about the men and women

moral decision making.

Integrity Questions: 1.)What is gender and computer ethics? 2.)What is student population? 3.)What is quantitative research methodology? 4.)What is qualitative research methodology? 5.)Who is the author of this chapter?

Page 11

Chapter 6 Title: “Is the global information infrastructure a democratic technology?” by Deborah G. Johnson

Quote: “”

Expectations:I expect to learn in this chapter everything that is relevant in this chapter that I can use in my professional career, mainly about the information ethics area. Plus also to learn in this chapter what is global information infrastructure and the democratic technology, to know the difference between them and what are they for in information ethics. Also to learn the contributions of deborag g. Johnson in information ethics

Book Review: To start with the chapter, the chapter is emphasizing about the global infrastructure in computer ethics, and what the reasons behind the global infrastructure and what are there purpose in computer ethics. Also stated in this chapter is what are the technological values that are needed in information ethics plus the other features that are related in computer ethics. And the main components that are needed to establish good and moral computer ethical values.

Things I have learned: here in this chapter there are lots of moral and ethical values that I have learned and can be applied in my daily life as a future information systems professional because as I’ve learned ethics is important to all people because people now a day does not values the word ethics anymore. For me I must save myself from that mentality, because I want to live a quiet and normal life as a professional because karma always comes into place with people that does not have ethical values.

Integrity Questions: 1.)What is technology? 2.)What is power to many? 3.)What is joint deliberation? 4.)What is insularity?

5.)What is values?

Page 12

Chapter 7 Title: “Applying ethical and moral concepts and theories to IT contexts: Some key problems and challenges” by Frans A.J Baier

Quote: “An automatization expert advises on changes of an organizational practice in which the expert generally has not .”

Expectations: I expect to learn about the importance of the role of experts in computer ethics.

Book Review: The author of this chapter is Frans Baier. He discussed the theories to IT concepts. If I apply this to my daily living, I can come up many ways to improve my skills as a student who is currently taking information technology course. It gives me some ideas on how to apply them in my work. When coming up some plans to back-up my work, to impress someone else when it comes to information technology, it can help us to give out information for us to absorb it and we can decide to teach it or keep it for ourselves.

Things I have learned: I learned the ways on how an experts automatization gives out advices to change an organization.

Integrity Questions: 1.)Who is the author of this chapter? 2.)What is social context? 3.)What are the role of experts? 4.)What are the advantages after reading this chapter? 5.)What is computer ethics?

Page 13

Chapter 8 Title: “Just Consequentialism and computing” by James Moor Quote: “The malleability of computers allows them to be used in novel and unexpected ways, ways for which we frequently do not have formulated policies for controlling their use..”

Expectations: I expect to learn how computing is applied to our needs when it comes to information technology.

Book Review: The author of this chapter is James Moor, he discussed how computing helps ups in the real world. There are rules that should be followed, in the stated article in the chapter, it is said that when a person is into some problematic situation, he or she will not care for the others, but instead to care for themselves. I think it is true, because when time comes, and it happens to me, I can say that I would protect first myself, and after I am secured, I can help the others. To relate it in my life as an information technology person, to assure that all work has been done and submitted your work to your supervisor is the most important thing, then if someone else needs your help, you can guide them through their problems.

Things I have learned: I learned that when it comes to computing terms of policies is important.

Integrity Questions: 1.)What do you mean by “the good as the enemy of the just”? 2.)What is uncharted waters? 3.)Who is James Moor? 4.)What did James Moor contributed in this chapter? 5.)What do you mean by computer and information ethics?

Page 14

Chapter 9 Title: “The internet as Public Space: Concepts, Issues, and Implications in Public Policy” by Jean Camp and Y.T. Chien

Quote: “There are evolutionary changes in conventional media types that preceded the internet as a new entity.”

Expectations: I expect to learn about the basic needs of the internet for us.

Book Review: The author of this chapter are Jean Camp and Y.T Chien, is says that internet has many uses. It can help our life easier and make us know many things. Who uses internet? Almost everybody uses the internet for fun, studies or to gain more knowledge. Even the libraries, Universities, Hospitals, International Marketplace, Schools, Government, Society uses internet. Because nowadays, internet is the center of attraction for us. Just be reminded that not all that is written in the internet are true, correct or fact. There are possibilities that they give out false information about some specific topics.

Things I have learned: I

learned not to trust everything what is given in the internet, there are many false information given.

Integrity Questions: 1.)What is internet? 2.)Is internet harmful? 3.)What can we get by using the internet?

4.)Who uses internet? 5.)What are the basic needs of internet?

Page 15

Chapter 10 Title: “The Laws of cyberspace” by Larry Lessig Quote: “The substance of the constraints of code in cyberspace vary.” Expectations: I expect to learn about more about the work of Larry Lessig.

Book Review: The author of this chapter is Larry Lessig. Stated in the handouts, during the revolution, in Russia, they had a system for the passports, this passport will serve as the ticket or proof, so that we can get in or out of a country. The passport serves as your identity whenever you go to other country. As for ethics, cyberspace used for the information technology part which helps us to lessen the hassle of the work. It gives out information for us to use in an instant. Aside from the positive side, of course it has the negative side, like when virus attacks our computer and without saving or creating a back-up copy, you may lose your files forever and cannot be retrieve it.

Things I have learned: I

learned how important the computer is for our life nowadays. It lessen the hassle for us when it comes to information technology part.

Integrity Questions: 1.)Who is the author of this chapter? 2.)What is passport? 3.)What can a passport do?

4.)Who uses passport? 5.)What are the requirements in having a passport?

Page 16

Chapter 11 Title: “Of the black holes and decentralized law-making in cyberspace” by David Post

Quote: “the fewer third party ratings products available, the greater the potencial for arbitrary cencorship.”

Expectations: I expect to get more ideas on how to get softwares to use for free speech online.

Book Review: The author of this chapter is David Post. Computer ethics is a information technology base used term, RBL(real blackhole list) it is consist of an internet based address, it can basically spam support services. People have adopt the global language, to solve everything without authorization or authority, within a period of time. www was mentioned, which is the basic of all basic that has been used for several years in the internet, www means world wide web, it is used for typing an engine for the web.

Things I have learned: I

learned how important the real blackhole list. How internet is being used in information technology which is based on our course.

Integrity Questions: 1.)What is debate? 2.)What is norms? 3.)What is RBL?

4.)What is ICANN? 5.)What is authority?

Page 17

Chapter 12 Title: “Is Cyberspace Burning?” by ACLU Quote: “Art on the net is a large, non-profit website that hosts online “studios” where hundreds of artists display their work.”

Expectations: I expect to get more knowledge on how to apply the given reasons in the future work and think on how to improve things.

Book Review: This chapter talks about the internet. How do we use the internet? What do internet give us? We use internet as the sources of answer, almost everything can be found in the internet. Internet gives us answers but not all stated in the internet is true, there are some false information which are provided, once we get something from then net, we have to state the sources. Blocking software causes us not to be able to use the software itself. In the public libraries, they block the software because they can find the answer in the internet itself.

Things I have learned: I learned how important the 6 reasons for self-rating schemes when it comes to our course. It helped me a lot just by reading the effects of it. Integrity Questions: 1.)What is cyberspace burning? 2.)What is free-speech online? 3.)What are the 6 reasons why self-rating are wrong for the internet?

4.)What is third-party rating? 5.)What are the problems with the user-based blocking software?

Page 18

Chapter 13 Title: “Filtering the internet in the USA: Free speech Denied?” by Richard Rosemberg

Quote: “The current American political and social climate exhibits a measure of confusion that epitomizes a frantic attempt to solve perceived problems in a largely unprincipled manner.”

Expectations: I expect to learn the meaning of free speech. Book Review: The author of this chapter is Richard Rosemberg. He discussed the public free speech. In the examples of problems with blocking and filtering program, blocking is applied when the program has been censored by other users. There are restrictions for filtering and blocking of software. First is restrict due to internal database for a specific product, second is restrict in database for external product, third is restrict due to ratings by the host site, fourth is restrict due to scanning of products, and the last is to restrict due to the sources of information

Things I have learned: I

learned how the internet was related to free speech any apply it in our course.

Integrity Questions: 1.)What is free speech? 2.)What is filtering programs?

3.)Who is the author of this chapter? 4.)How did the author discussed this chapter? 5.)What are the problem that was caused in this chapter?

Page 19

Chapter 14 Title: “Cencorship, the internet, and the child pornography law of 1996: a critique” by Jacques Catudal

Quote: “In conducting what might otherwise be an abstract, esoteric, and unwieldy discussion of cencorship of the internet, it will be useful to introduce and define a number of key terms and distinctions, not only for achieving greater clarity and control over discussion.”

Expectations: I expect to understand how or why pornography is being censored.

Book Review: The author of this chapter is Jacques Catudal, he discussed the topic of pornography, how pornography is being censored and its reasons. It is to avoid to let the minor to see or watch pornography in such young ages, but we can’t do anything if they want to watch, it’s just self-discipline, parental guidance, it is to avoid the minor to do what they have seen in the show itself, they might cause a big disaster like having a child at such young age.

Things I have learned: I learned how that it is not bad to watch pornography, some would think that it is art, but some has no control over pornography, which they needed it that badly. Integrity Questions:

1.)What is pornography? 2.)Is pornography a bad thing or a good thing? 3.)Why do people put porn in the internet? 4.)How did the author discussed pornography? 5.)What is child pornography?

Page 20

Chapter 15 Title: “Internet Access Controls Without Censorship” by Paul Resnick and James Miller

Quote: “Computer software can implement access controls that take into account all these factors.”

Expectations: I expect learn and understand about this topic interest access controls without censorship.

Book Review: The author of this chapter are Paul Resnick and James Miller. They discussed the parental guidance, where the parents should watch carefully their kids not to be able to be persuade by other people to watch adult movies or videos. If we have the ability to shut down the site where porn has been continuously expanding, there would be people who would really like to shut it. There are cases where it is being posted in the internet even if it is against their will.

Things I have learned: I learned that no matter how we do, there are still censorship would be applied in the internet, due to minors who really wants to watch even though they are not supposed to watch.

Integrity Questions: 1.)What is censorship? 2.)What is parental guidance? 3.)What is flexible blocking? 4.)What is PICS? 5.)What does PICS do?

Page 21

Chapter 16 Title: “Internet Service Providers and Defamation: New Strands of Liability” by Richard A. Spinello

Quote: “The liability imposed upon publishers has changed considerably during the last few decades.”

Expectations: I expect learn and understand about ISP (internet service provider)

Book Review: The author of this chapter is Richard Spinello. Richard Spenello has been emerged in the topic of internet laws, there are issues where the internet service provider and the internet defamation in some various liability that can give access to the internet. There are many companies that uses internet service provider, like prodigy, American online, compuserve and the others that provides internet service provider. What do we mean by internet service provider, I have read the meaning of ISP, it is simply a company that gives access to customers so they can be able to use or access it.

Things I have learned:

I

learned that internet service provider is a company that gives access to customers for them to be able to use the internet.

Integrity Questions: 1.)What is ISP? 2.)What does ISP do or what is it for? 3.)What is internet defamation? 4.)What are the legal precedents for ISP liability? 5.)What is a moral perspective?

Page 22

Chapter 17 Title: “A Politics of Intellectual Property: Environmentalism for the Net?” By James Boyle

Quote: “The process is not a simply a legal one and the overlaps go in both directions.”

Expectations: I expect to learn the environmentalism for the net. Book Review: The author of this chapter is James Boyle, I have learned that the intellectual property is the legal form of the information age, right now in our social economy, it will have the effect on market power where everyone has the right and ability to change the price of their product. I have read the copyright on the net issue, the analogy to environmentalism, the tension in an intellectual property system, it all discussed the importance of the net like how can we avoid to hurt other users.

Things I have learned:

I have learned that the intellectual property is the legal form of the information age.

Integrity Questions: 1.)What do you mean by “code-by-code”? 2.)Who is James Boyle? 3.)What is the intellectual property legal form of the information age? 4.)What is the conceptual structure of an intellectual land grab? 5.)What do you mean by copyright on the net?

Page 23

Chapter 18 Title: “Intellectual Property, Information, and the Common Good” by Michael C. McFarland, SJ

Quote: “In United States and most other countries, the producers of software can copyright it, meaning that they can control its distribution and use it.”

Expectations: I expect to learn the intellectual property, information and the common good.

Book Review: The author of this chapter is Michael C. McFarland, SJ. In the conflicts over intellectual property, there are five cases, first is the issue of plagiarism, we all

know what plagiarism is, it is the copying of others work and claim it as your own without prior authorization from the owner of the work. The second is the software piracy, it is almost like plagiarism, but it is using software as the main issue, to copy a software without buying the original copy of it. Third is the repacking data and data base. Fourth is the reverse engineering. The last is the copying the transmission.

Things I have learned: I learned that the five cases are somehow the basics which a person should know when using the internet as the source of their answer.

Integrity Questions: 1.)What is plagiarism? 2.)What is software piracy? 3.)What is repacking database? 4.)What is reverse engineering? 5.)What is copying transmission?

Page 24

Chapter 19 Title: “Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in United States” by Shelly Warwick

Quote: “The declaration of independence is a clear statement of the liberal philosophy, asserting that rights stem not from a sovereign or state, but from a creator and that they are inalienable, which means that the state cannot subsume these rights.”

Expectations: I expect to learn the intellectual the importance of copyright.

Book Review: The author of this chapter is Shelly Warwick. Copyright was the main topic for this chapter. About copyright, we should have the permission of the owner of the work to be able to use his/her work and apply it in your work. About property rights, according to the book, it is a property that is well defined and discussed by a person name Cohen, and he was the one who explained that the property rights should have a reference

Things I have learned: I learned that copyright could be dangerous when you have not asked permission from the owner of the work, you could give a big amount of money or you can go to jail.

Integrity Questions: 1.)What is property right? 2.)What are the theories of intellectual property and copyright? 3.)What is the history of copyright in the united states? 4.)What is copyright? 5.)Is copyright ethical?

Page 25

Chapter 20 Title: “On the Web, Plagiarism Matters More than Copyright Piracy” by John W. Snapper

Quote: “The obvious candidate for a plagiarism harm is the author who receives no credit.”

Expectations: I expect to learn and understand the meaning of piracy and plagiarism.

Book Review: The author of this chapter is John snapper. John snapper discussed the importance of plagiarism, for plagiarism, it lessen the danger or amount of trouble for a person. If we were to be framed by others, we can show them evidence that we are the one who made the work, if it is really your work, otherwise you can’t do anything but to accept the punishment that was given to you due to copying others work without citation.

Things I have learned: I learned that plagiarism can be lessen when with the use of piracy.

Integrity Questions: 1.)What is piracy? 2.)What is plagiarism? 3.)What is the use of copyright? 4.)How do we apply copyright? 5.)Who makes copyright?

Page 26

Chapter 21 Title: “An Ethical Evaluation of Web Site-Linking” by Richard A. Spinello Quote: “The value social benefits of linking are manifold and beyond dispute.”

Expectations: I expect to learn how to link websites.

Book Review: The author of this chapter is Richard Spinello. He discussed how to link the website to other website. The technical aspects of website linking refers to the link of the site using the world wide web. It is said that each of the website has unique universal resource locator. Websites as intellectual property discusses the possibility of harm by using the sites which was owned by other people and using it as your own or without citation. There were three theories that was mention, first is utilitarianism, second is the lockean or the labor desert theory, third is the personality theory.

Things I have learned: I learned that website linking is easy to understand and us, but there are possible cases that you may get caught using the website.

Integrity Questions: 1.)What is a website? 2.)What is website linking? 3.)What is deep linking? 4.)What is common good? 5.)Explain the two cases for website linking?

Page 27

Chapter 22 Title: “The Cathedral and the Bazaar” by Eric Raymond Quote: “Linux’s innovation wasn’t so much in doing quick-turnaround releases incorporating lots of user feedback but in scaling it up to a level of intensity that matched the complexity of what he was developing.”

Expectations:

I want for further polish my understanding about the article cathedral and the bazaar.

Book Review: The author of this chapter is Eric Raymond. This chapter talks about the Linux which talks about open sources and by using free software as the sources of installer. First things first, I want to explain the meaning of open source. According to Wikipedia “Open source is an approach to the design, development, and distribution of software, offering practical accessibility to a software’s source code. Some consider open source as one of various possible design approaches, while others consider it a critical strategic element of their operations. Before open source became widely adopted, developers and producers used a variety of phrases to describe the concept; the term open source gained popularity with the rise of the Internet, which provided access to diverse production models, communication paths, and interactive communities.”

Things I have learned: I learned that open source is the distribution of software, and I learned that the open source is a widely adopted by other users.

Integrity Questions: 1.)What is CCIL? 2.)What is open-source? 3.)Who is the author of this chapter? 4.)What does this chapter talks about? 5.)What is the importance of having users?

Page 28

Chapter 23 Title: “Towards a Theory of Privacy for the Information Age” by James H. Moor Quote: “One strength of the control theory is that it recognizes the aspect of choice that an individual who as privacy enjoys in being able to grant.”

Expectations: I expect to understand the theories of the privacy and how it can be applied in the world of information technology.

Book Review: Let us discuss the privacy. There are different types of privacy. An example is the personal privacy, workspace privacy, surveillance privacy, and autonomy privacy. The theory of privacy, according to the book which I have read, says that the privacy will eventually evolves and it is based on a personal life, the second is the intrusion of once privacy, then the last is to interfere into somebody else’s affairs.

Things I have learned: I learned the theory of privacy, it simply talks about how we use something very carefully, and not to hurt others.

Integrity Questions: 1.)What is personal privacy? 2.)What are the theory of privacy? 3.)What is data mining? 4.)Define workspace privacy, surveillance, and autonomy? 5.)What are the knowledge discovery process?

Page 29

Chapter 24 Title: “Towards The Structure of Rights in Directive 95/46EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data” by Dag Elgesem

Quote: “The notion of further processing of data in a way that is not incompatible with the purpose for which it was collected is a difficult one to interpret.”

Expectations: I expect to understand the usage of the different types of data.

Book Review: The use of online distribution software such as a Frostwire have been violated by many people, because it is a free distribution software, which should only be use to distribute files that are not copyright by law. But many people use it to download songs, videos that are copyright, and should not be pirated. Thus, many music industries are going bankrupt because of piracy which is spreading very fast. If there were cases that cannot be resolved, we can’t do anything about it anymore unless showed a strong evidence against them.

Things I have learned: I learned the significance of using the different types of data and use it for my own choices when I do some school work.

Integrity Questions: 1.)What is data quality? 2.)What is sensitive data? 3.)What is legitimate purpose? 4.)Discuss the right to be informed? 5.)What is personal data?

Page 30

Chapter 25 Title: “Privacy Protection, Control of Information, and PrivacyEnhancing Technologies” by Herman Tavani and James H. Moor

Quote: “A fundamental problem about defining the concept of privacy in terms of individual control so little.”

Expectations: I expect to learn more about the significance of the topic “privacy”.

Book Review: The author of this chapter is Herman Tavani and James H. Moor, they discussed the use of control in the justification and management of privacy, privacy enhancing technologies, roles of individual choice, in controlling personal information, principle of informed consent, owner beware. They discussed what pet is, they have discussed that the pet can understand the concept of organizations, and they can protect personal identity. What can we get out of pet? First they can be helpful to us when it talking about how tey handle the operating system, they can also give out important informations.

Things I have learned: I learned that the use of control in justification and management of privacy has been separated from the main identity of privacy.

Integrity Questions: 1.)What is PET? 2.)Who is the author of this chapter? 3.)What did the author contribute to this chapter? 4.)What is privacy? 5.)What is privacy enhancing technology?

Page 31

Chapter 26 Title: “Toward an Approach to Privacy in Public Challenges of Information Tevhnology” by Helen Nissenbaum

Quote: “Other philosophical discussions are less motivated by this underlying conception of human need and more perceived need to sharpen the concept and definition of privacy.”

Expectations: I expect to learn the real meaning of privacy.

Book Review: The author of this chapter is Helen Nissenbaum. Helen discussed the background of privacy and the personal realm, how people violate the privacy in public, the two misleading assumptions, the erroneous assumption. This chapter talks about the conception of the privacy, where it can be further more extended throughout of the information, there are computerized database which the information can create contrast, privacy can be protected by gathering more information for the information technology world.

Things I have learned: I learned that if we want to protect our privacy we have to gather more information and secure our own work so that others can’t do anything to get your work.

Integrity Questions: 1.)What is privacy realm? 2.)How can we secure our privacy? 3.)How can other people violate public privacy? 4.)Why do they violate privacy? 5.)How can we prevent others using our privacy?

Page 32

Chapter 27 Title: “KDD, Privacy, Individuality, and Fairness” by Anton Vedder

Quote: “Personal data is often considered to be the exclusive kind of data eligible for protection by privacy law and privacy norms.”

Expectations: I expect to learn personal data, Law, and Ethics.

Book Review: The author of this chapter is Anton Vedder, Anton Vedder discussed the KDD which is the knowledge discovery in databases, the KDD can be divided into three phase, first is the data mining phase, it can collect data, then the second phase is to analyze the data, and the last is to get the result which are interpreted. According to the handout that I read, personal data is where usually the data is considered as the date eligible to protect the privacy law and norms. Social consequences are the used data which profile was created and stored as a personal data. Categorical privacy.

Things I have learned: I learned personal data, law and ethics are very helpful to us for present and future work. It can help us out through all our problems in the information technology world.

Integrity Questions: 1.)What is social consequence? 2.)What is privacy norm? 3.)What is personal data? 4.)What is categorical privacy? 5.)What are the solutions for it?

Page 33

Chapter 28 Title: “Data Mining and Privacy” by Joseph S. Fulda

Quote: “Data mining is most easily accomplished when the data are highly structured and available in many different forms at many different levels in what are known as data warehouse.”

Expectations: I expect to learn more about knowledge discovery and data mining also the important aspect from this chapter.

Book Review: The author of this chapter is Joseph Fulda. From the beginning of this chapter, there are nothing much to read in this chapter, but there are some important things which we all have to understand and put in our mind. Data mining, it is the necessary knowledge discovery process where the work of data is put into patterns and to be used like a tool for our work. It can be easily achieved when data are put into highly structured which can be found in different levels of data warehouses.

Things I have learned: I learned data mining is very useful in our course, it can be the source of information which can give out correct answers and has different strategies.

Integrity Questions: 1.)What is data mining? 2.)Who is the author of this chapter? 3.)What did the author discussed to help us? 4.)What are the advantages of data mining? 5.)What are the advantages of data warehouse?

Page 34

Chapter 29 Title: “Workplace, Surveillance, Privacy and Distributive Justice”

by Lucas Introna

Quote: “The purpose of this paper is not to bemoan surveillance as such.” Expectations: I expect to learn the workspace surveillance , matter of justice, the meaning of privacy, surveillance and distributive justice.

Book Review: The author of this chapter is Lucas Introna. Resisting workspace surveillance, privacy of matter of justice, privacy, surveillance, distributive justice, was discussed in this chapter. According to the book that I have read, surveillance is where issue was been released ever since a topic was given out from certain individual topic. Surveillance technology has been creating the potential for certain facts.

Things I have learned: I learned that surveillance starts from something very small and goes to higher topic that can be observed by other people and make it as an issue.

Integrity Questions: 1.)What is workspace surveillance? 2.)What is resisting workspace surveillance? 3.)What are the privacy as a matter of justice? 4.)What is surveillance? 5.)What is distributive justice?

Page 35

Chapter 30 Title: “Privacy and the Varieties of Informational Wrongdoing”

by Jeroen van den Hoven

Quote: “Free rider problems can only take on socially unacceptable forms if the provider of the public good does not know who rides free and cannot determine who the free riders are.”

Expectations: I expect to learn why people tend to do the wrong doings even though they know that it is wrong still they do it.

Book Review: The author of this chapter is Jeroen van den Hoven. Jeroen discussed the panoptic technologies and the public good, information based harm, informational inequality, informational inequality, informational injustice, spheres of access, encroachment on moral autonomy. This topic talks about the free-rider as a point of problem wherein some of the people who joins in a group and gets all the credit without doing anything to help other members in a project, group work, activities and many more. A solution to get rid of a free rider is to leave them as is, drop them in the group, remove them, if we didn’t do anything, they will just have to free ride all the way till the very end where they get all the credits without doing anything to help out.

Things I have learned: I learned that free riders are the one who doesn’t do anything still gets the reward or credit, we can get rid of them like permanently removing them out of the group.

Integrity Questions: 1.)What is free rider? 2.)What is panoptic technology? 3.)What is informational injustice? 4.)What is informational inequalities? 5.)Who is the author of this chapter? Page 36

Chapter 31

Title: “Defining the Boundaries of Computer Crime: Piracy, Breaks-Ins, and Sabotage in Cyberspace” by Hermani T. Tavani

Quote: “Each of the incidents in the preceding

paragraph would seem to be a genuine instance of computer crime or cybercrime.”

Expectations: I expect to learn about the different kinds of computer crime and ways on how to prevent the computer crime or cyber crime.

Book Review: The author of this chapter is Hermani T. Tavani. Computer viruses can affect every computer, it has big or small effect in every computer, we can suffer a great disadvantage when our computer is affected by it. Our files can be eaten up without any trace. How can we get rid of these problems, first of all we can install an anti-virus for our computer, second we can put up or set the firewall in on mode, third is to reformat our computers. How or where can we get these problems, first is from internet, when we download from the net, we have the possibility of get virus, second is from the other computers, when we plug in the usb drive from the infected computer, then plugged it in our own computer, we can also get virus from them.

Things I have learned: I learned that virus is a scary thing when it happen, we can get a major disadvantage from it.

Integrity Questions: 1.)What is computer virus? 2.)How do computers be affected by computer viruses? 3.)What is computer crime? 4.)What are the categories of computer crime? 5.)Who is the author of this chapter?

Page 37

Chapter 32

Title: “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic” by Mark Manjon and Abby Goodrum

Quote: “The effect of hundreds of persons reloading a targeted page on the internet thousands of times effectively blocks entrance by outsiders and may even shutdown the servers, as occurred in the attacks on the commercial on the websites of yahoo, Amazon, etc.”

Expectations: I expect to learn about the hacktivism and cyberterrorism.

Book Review: The author of this chapter is Mark Manjon and Abby Goodrum. They discussed the world of omputer hacking and computer terrorism, when we say hacking, it is where an unknown person accesses your computer without you knowing it. It is like they can control your computer itself and do whatever they want to. They can copy, mess up your files, or even worst, they can blame you for what they have done. They can claim it as a prize and say anything negative about you for what they have done.

Things I have learned: I learned that hacking and computer terrorism, has to do with computer ethics. Hacking is not always a bad thing to do. There are also advantages when it comes to hacking.

Integrity Questions: 1.)What is hack? 2.)What is cyberterrorism? 3.)How can computer terrorism be affected in computer ethics? 4.)Who is the author of this chapter? 5.)How can hacking be stopped?

Page 38

Chapter 33 Title: “Web Security and Privacy: An American Perspective” by Jean Camp

Quote: “Browsing the web gives one the heady feeling of walking without footprints in cyberspace.”

Expectations: I expect to learn about the web securities and privacy of it.

Book Review: The author of this chapter is Jean Camp. When it comes to internet, we have a lot of advantages, fist, we can get answers to our questions, or we can be the one who can provide answers for other people. Almost everyone in this world uses internet, for companies, for students, for teachers, almost everyone. We can do lots of things in the internet, like chatting, surfing the net, research for our own purposes. It is almost the center of attraction for all people, they make use of their time or make time fly by using the internet, it is educational, that’s why parents let their use it. But there are some important aspect when using the internet, sometimes it is parental guidance, some minors tends to enter some prohibited websites, so parents should watch over their kids.

Things I have learned: I learned that hacking and computer terrorism, has to do with computer ethics. Hacking is not always a bad thing to do. There are also advantages when it comes to hacking.

Integrity Questions: 1.)What is web security? 2.)What can the internet provide us? 3.)Does using the internet a negative thing or a positive thing? 4.)Who usually uses the internet? 5.)Who invented the internet?

Page 39

Chapter 32 Title: “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic” by Mark Manjon and Abby Goodrum

Quote: “The effect of hundreds of persons reloading a targeted page on the internet thousands of times effectively blocks entrance by outsiders and may even shutdown the servers, as occurred in the attacks on the commercial on the websites of yahoo, Amazon, etc.”

Expectations: I expect to learn about the hacktivism and cyberterrorism.

Book Review: The author of this chapter is Mark Manjon and Abby Goodrum. They discussed the world of omputer hacking and computer terrorism, when we say hacking, it is where an unknown person accesses your computer without you knowing it. It is like they can control your computer itself and do whatever they want to. They can copy, mess up your files, or even worst, they can blame you for what they have done. They can claim it as a prize and say anything negative about you for what they have done.

Things I have learned: I learned that hacking and computer terrorism, has to do with computer ethics. Hacking is not always a bad thing to do. There are also advantages when it comes to hacking.

Integrity Questions: 1.)What is hack? 2.)What is cyberterrorism? 3.)How can computer terrorism be affected in computer ethics? 4.)Who is the author of this chapter? 5.)How can hacking be stopped?

Page 40

Chapter 33 Title: “Web Security and Privacy: An American Perspective” by Jean Camp

Quote: “Browsing the web gives one the heady feeling of walking without footprints in cyberspace.”

Expectations: I expect to learn about the web securities and privacy of it.

Book Review: The author of this chapter is Jean Camp. When it comes to internet, we have a lot of advantages, fist, we can get answers to our questions, or we can be the one who can provide answers for other people. Almost everyone in this world uses internet, for companies, for students, for teachers, almost everyone. We can do lots of things in the internet, like chatting, surfing the net, research for our own purposes. It is almost the center of attraction for all people, they make use of their time or make time fly by using the internet, it is educational, that’s why parents let their use it. But there are some important aspect when using the internet, sometimes it is parental guidance, some minors tends to enter some prohibited websites, so parents should watch over their kids.

Things I have learned: I learned that hacking and computer terrorism, has to do with computer ethics. Hacking is not always a bad thing to do. There are also advantages when it comes to hacking.

Integrity Questions: 1.)What is web security? 2.)What can the internet provide us? 3.)Does using the internet a negative thing or a positive thing? 4.)Who usually uses the internet?

5.)Who invented the internet?

Page 41

Chapter 34 Title: “The Meaning of Anonymity in an Information Age” By Helen Nissenbaum

Quote: “The natural meaning of anonymity, as may be reflected in ordinary usage or a dictionary definition, is of remaining nameless, that is to say, conducting one self without revealing one’s name.”

Expectations: I expect to learn about the meaning of anonymity in an information age.

Book Review: The author of this chapter is Helen Nissenbaum. Anonymity was discussed in this chapter, I think anonymity should be protected by all means, because it is and electronic based, communication and interaction for all of us. In the world of information technology was applied in anonymity, it has the possibility to trace things and patches up with something more suitable for computer stuff, the information age has the ability to help out people like us, it is a suitable thing in the information technology world.

Things I have learned: I learned that anonymity and the information age can be somehow comparable.

Integrity Questions: 1.)What is anonymity? 2.)What information age? 3.)What is the meaning of anonymity in an information age? 4.)Who is the author of this chapter? 5.)What does this chapter have to do with IT?

Page 42

Chapter 35 Title: “Double Encryption of Anonymized Electronic Data Incharge” by Albert Vlug and Johan van der Lei

Quote: “Anonymization of the patient means that only a randomized number, sex, insurance, month and year of birth are transmitted.”

Expectations: I expect to learn about the meaning of encryption to the world of information technology.

Book Review: The author of this chapter are Albert Vlug and Johan van der Lei. They discussed how an automated system worked, it is by the electronic from the sender and the possible reaction of the double encryption programs that were made was demonstrated by illustration the possible ways to communicate thru sender and receiver. They also discussed the ways on how to manipulate the IPCI . but there are nobody who is willing to take the risk to show or demonstrate it. At the end they have a solution for it. They just made some prototypes and shown the possible problems in the technical side.

Things I have learned: I learned that anonymity the crime for the data electronic part will change and it will evolve into a better one.

Integrity Questions: 1.)What is data-flow? 2.)What do you mean by double encryption? 3.)What is anonymized sender? 4.)Who is the author of this chapter? 5.)What does this chapter have to do with IT?

Page 43

Chapter 36 Title: “Written on the Body: Biometrics and Identity” by Irma van der Ploeg

Quote: “In order to transmit the data from the GP to the central database of IPCI, we use the edifact standard for electronic messages.”

Expectations: I expect to learn about how biometric and identifying when writing in a body of a work.

Book Review: The author of this chapter is Irma van der ploeg. I would like to learn more on how to identifying the biometric identity. Second is how to virtualize the identities, lastly is questioning the biometric body. For some reason, these are the topic which was discussed in this chapter. When completing a task, there are several tools which we can use in-order we can achieve them. Trying to solve a problem is one of the issue, when completing the task, we can do or use whatever method we can think of. Technology can help us make our work easier to do and faster to finish them. What if we don’t have technology, I can’t think how our life will go further.

Things I have learned: I learned that technology can help us lessen our time to finish our work.

Integrity Questions: 1.)How does technology help us? 2.)What can we do to make our work easier to achieve? 3.)What can we recommend to further increase the success rate of completing the work? 4.)Who is the author of this chapter?

5.)What does this chapter have to do with IT?

Page 44

Chapter 37 Title: “Ethical Considerations for the Information Professions” by Elizabeth A. Buchanan

Quote: “The complement these series of questions, a strategy I suggest to organizations as well as individuals is to journal the response to these questions and have a cooling off period before actions are taken.”

Expectations: I expect to learn about how the world of computer ethics affects in our course.

Book Review: The author of this chapter is Elizabeth Buchanan. Elizabeth discussed how action or inaction of evaluation implements our process of thinking. Ethics can be somehow be related to technologies, it can help us to give out challenges that others cannot give to us. There were some information which can be helpful to us which was given by some of the professors in some of the universities, they teach ethics to other students and let them apply it in the real world. There were some studies which were made and it helped the people to realized something very important.

Things I have learned: I learned that technology can be related to the world of computer ethics and in the IT world.

Integrity Questions: 1.)What is computer ethics? 2.)How can we help others by means of ethics? 3.)What part of the chapter is interesting?

4.)Who is the author of this chapter? 5.)What does this chapter have to do with IT?

Page 45

Chapter 38 Title: “Software Engineering Code of Ethics: Approved!” By Don Gottenbarn, Keith Miller and Simon Rogerson

Quote: “The code emphasizes the professional’s obligation to the public at large.”

Expectations: I expect to learn about how software engineering can be much help for ethics.

Book Review: The author of this chapter is Keith Miller and Simon Rogerson. They discussed the IEEE-CS/ACM joint task force on software engineering ethics and professional practices. It is said that the software engineering for the code of ethics can let other people realize that the ethics can be much help for them. Since I am in the information technology world, I would support ethics as part of my plans for my future. I can be much of a help for the future generation and continue living until the things I have learned was drained due to my knowledge.

Things I have learned: I learned that Software engineering can be a help for the future generation.

Integrity Questions: 1.)What is software engineering? 2.)What is IEEE? 3.)What is CS/ACM?

4.)Who is the author of this chapter? 5.)What does this chapter have to do with IT?

Page 46

Chapter 39 Title: “No, PAPA: Why Incomplete Codes of Ethics Are Worse Than None at All” by Ben Fairwether

Quote: “Many other authors have identified other issues that do not easily fit within the four categories.”

Expectations: I expect to learn about the telecommunication and networking.

Book Review: The author of this chapter is Ben Fairwether. In this chapter, telecommunication and networking, environmental impacts, weapons, how to protect the weak against the strong, how the pressure to look for loopholes in codes, how incomplete moral codes affect some work, how to avoid the accidental incomplete moral codes. I can only say that for moral codes, we should be fully aware on what is happening which may result of an abuse to us. There are some codes which eventually are very simple to understand. There can be ways which moral conditions will strike simply everywhere.

Things I have learned: I learned that moral condition can be a help for those who has moral issues.

Integrity Questions:

1.)What is moral condition? 2.)What is loopholes? 3.)What is telecommunication and telenetworking? 4.)Who is the author of this chapter? 5.)What does this chapter have to do with IT?

Page 47

Chapter 40 Title: “Subsumption Ethics” by David H. Gleason Quote: “The difference between computers and simple machines is the extent to which computer systems design and development decisions over which users have little or no control.”

Expectations: I expect to learn about the system development, ethical frameworks.

Book Review: The author of this chapter is David Gleason. He discussed the standard problems for software system development. It started at the discussions for ethics and how it was described thru subsumption of ethics. I have read that subsumption ethics has to be analyzed when it come to the system design or in the system development. There are cases were there has been releasing of new technology but there are lots of people who doesn’t know about it, we have to always update ourselves for us to know what’s happening in our society.

Things I have learned: I learned that the organization policy drives information technology development.

Integrity Questions: 1.)What is subsumption?

2.)What is system development? 3.)What is ethical framework? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 48

Chapter 41 Title: “Ethical Issues in Business Computing” by Duncan Langford

Quote: “In responding to these points, it is relevant to first consider how unethical business practice is typically determined.”

Expectations: I expect to learn about the meaning and what can business computing do to help us.

Book Review: The author of this chapter is Duncan Langford. Duncan Langford discussed the sizes of the system in the business world can eventually vary from itself, since computer is being used in the world, it can be served as a tool for something we can use to obtain or achieve greater impact for the incoming cases or problems which we have to face.

Things I have learned: I learned that the organization policy drives information technology development.

Integrity Questions: 1.)What is business computing?

2.)What are the levels which was mentioned? 3.)What is data considerations? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 49

Chapter 42 Title: “The Practitioner from Within: Revisiting the Virtues” by Frances S. Grodzinsky

Quote: “It is beyond the scope of this paper and its author to develop a detailed integration of ideas of Kant and Aristotle around the virtues.”

Expectations: I expect to learn about the core values.

Book Review: The author of this chapter is Fances Grodzinsky. In this chapter the core values was discussed, also for these following topics were discussed like how the practinioner from within, imagination and narrative genre.

Things I have learned: I learned that the organization policy drives information technology development.

Integrity Questions: 1.)What is business computing? 2.)What are the levels which was mentioned?

3.)What is data considerations? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 50

Rocky L. Ho Part 1: Handbook of information and computer ethics. Chapter 1 Title: “Foundations of Information Ethics” by Luciano Floridi

Quote: “The information society has been made possible by a cluster of information and communication technologies infrastructures.”

Expectations: I expect to learn a lot from this chapter since it is the first part of the handbook.

Book Review: The author of this chapter is Luciano Floridi. IE was one of the topic which was discussed, it is said that the IE is the ethics for information resources. ERPT was also discussed, which means external, resource, product, target, and it is a model. There were stages that were mention in this chapter. The stages talks about how the environment evolves when time passes. Technology were produced to help us guide ourselves in our work.

Things I have learned:

I learned that the organization policy drives information technology development.

Integrity Questions: 6.)What is ECPT? 7.)What IE? 8.)What are the limitations that were discussed? 9.)Who is Luciano Floridi? 10.)What do we get from this chapter?

Page 51

Part 1: Handbook of information and computer ethics. Chapter 2 Title: “Milestones in the History of Information and Computer Ethics” by Terrell Ward Bynum

Quote: “The academic field of information ethics was born unintentionally and almost accidentally in the middle of the second war.”

Expectations: I expect to learn about the milestones in the history of information and computer ethics.

Book Review: The author of this chapter is Terrell Ward Bynum. The topic wiener’s account of a good life was discussed, based on my readings, they say that we have to live well, and we have to be free and be creative as much as possible, because in our generation, being a new model is something that we all must achieve. Next which was discussed was about the information ethics methodology, and it says that people tends to find something which was already discovered or has been found by somebody else. There are information that does not need to be extracted from where it came from.

Things I have learned: I learned that this chapter cares for policies, thus it is very complicated to understand new things.

Integrity Questions: 1.)What is unique? 2.)What is influencial computer ethics theory? 3.)What is ETHICOM96? 4.)Who is the author of this chapter? 5.)What do we get from this chapter? Page 52

Part 1: Handbook of information and computer ethics. Chapter 3 Title: “Moral Methodology and Information Technology” by Jeroen van den Hoven

Quote: “Computer ethics is a form of applied or practical ethics.” Expectations: I expect to learn the moral methodology and information.

Book Review: The author of this chapter is Jeroen van den Hoven. He said that the moral questions was the development of associating and same goes for the applications and the usage of the computers. Since ethics is most likely

talking about the computer based part in the information technology world, it gives out benefits on how to justify our answers. For further information, about ethics, it was given that it is “a responsibility for software error, equal access, and autonomous agents is one thing” it says that for us to be able to get the solutions for our problems, we can guide ourselves by using the given samples.

Things I have learned: I learned that there are processes on how to obtain certain things and patch it up to create a new answer for our problem.

Page 53 Integrity Questions: 1.)What is conceptualization? 2.)What is moral methodologies? 3.)What is applied ethics? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 54

Part 1: Handbook of information and computer ethics. Chapter 4 Title: “Value Sensitive Design and Information Systems” by Batya Friedman, Peter H. Kahn Jr., and Alan Borning

Quote: “It employs an integrative and iterative tripartite methodology, consisting of conceptual, empirical, and technical investigations.”

Expectations: I expect to learn about the values sensitive design and information systems.

Book Review: The authors of this chapter are Batya Friedman, Peter H. Kahn Jr., and Alan Borning. They discussed the same chapter which means that have to agree on something which is based on value sensitive design and

information systems. Value sensitive design was discussed, which means that it is an approach which was made or designed of the technology that will eventually helps human lives and values. There were cases in this chapter were there are people who debates about the usage of the land and transportation, fairness, support on the process of being a diverse range of different consumers or stakeholders.

Things I have learned: I learned that the value sensitive design is the main point of design for technology. It is an interesting topic.

Page55

Integrity Questions: 1.)What is value sensitive design? 2.)What is value? 3.)What is system design? 4.)What is empirical investigations? 5.)What is technical investigations?

Part 2: Handbook of information and computer ethics. Chapter 5 Title: “Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property” by Adam D. Moore

Quote: “Care is needed so that we do not confuse moral claims with legal ones.”

Expectations: I expect to learn about what intellectual property means.

Book Review: The author of this chapter is Adam Moore. The meaning of intellectual property was discussed, it simply means that it is the normal characterized of a generally property which is owned, it is a value which is based on the ideas. The secrets for trading was also discussed, according to the book “consist of any formula, pattern, device, or compilation of information that is used in one’s business”.

Things I have learned: I learned that the meaning of intellectual property can somehow be obtained when we get the respect of other people. Like we give them their own rights.

Page 56

Integrity Questions: 1.)What is intellectual property? 2.)What does the alternatives to patents talks about? 3.)What is copyright? 4.)Who is the author of this chapter? 5.)What is trade secret and social utility?

Page 57

Part 2: Handbook of information and computer ethics. Chapter 6 Title: “Informational Privacy: Concepts, Theories, and Controversies” by Herman T. Tavani

Quote: “it would seem that privacy is not simply a static concept, but instead has a dynamic component.”

Expectations: I expect to learn about the informational privacy, concepts, theories, and controversies.

Book Review: The author of this chapter is Herman Tavani. He discussed the concept of privacy, for what I have understood about this topic, it is the complain of privacy where in it is being used to someone else, and changing the things which does not belong to them. Since it is privacy, they have no right to

intrude into someone else’s stuff, file, projects, etc. since privacy is a big issue for everyone, it can somehow be related to hacking into somebody else’s files and calim it as your own.

Things I have learned: I learned that privacy is a big issue for all of us, because it is the centralized topic which is very important to the one who makes the work done.

Integrity Questions: 1.)What is the concept of privacy? 2.)What unitary? 3.)What is derivative? 4.)What is cluster definition? 5.)What is decisional privacy?

Page 58

Part 2: Handbook of information and computer ethics. Chapter 7 Title: “Online Anonymity” by Kathleen A. Wallace

Quote: “The term anonymity has been used to denote a number of related things: namelessness, detachment, unidentifiability, lack of recognition, loss of sense of identity or sense of self, and so on.”

Expectations: I expect to learn about the topic online anonymity.

Book Review: The author of this chapter is Kathleen Wallace. From the beginning of the chapter, anonymity as a feature of complex social structures was

discussed, according to what I have read “Before turning to a discussion of the concept of anonymity itself, it is worth noting that recent concerns about anonymity may be an expression of a widespread feature of contemporary social organization and of the extent to which technological features of that organization affect with whom we interact, how we interact with one another, and how we think of ourselves as related, socially and ethically, to others” this statement talks about how fast the things can passes, and how others receives the information so fast.

Things I have learned: I learned that anonymity can help us to have a modern life when It comes to ethical world in information technology.

Page 59

Integrity Questions: 1.)What is anonimity? 2.)What is complex social structures? 3.)What is online anonimity? 4.)What is the concept of anonimity? 5.)What is data mining?

Page 60

Part 2: Handbook of information and computer ethics. Chapter 8 Title: “Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking” by Kenneth Einar Himma

Quote: “Certain assumptions about hacker and related terms should be made explicit.”

Expectations: I expect to learn about the ethical issues involving computer security, hacking, hacktivism, and counter hacking.

Book Review: The author of this chapter is Einar Himma. This chapter talks about hacking where people does not have the authority to snoop around other peoples file, as an information technology person, they should know that is is a negative thing to do because it is written in the ten commandments of information technology world. There are also positive things when it comes to hacking. For what I know, there is this guy who hacked the system, luckily he hacked is after that, he was know for some people, what he did was correct.

Things I have learned: I learned that hacking is not always negative thing to do, there are positive sides when it comes to hacking.

Integrity Questions: 1.)What is hacktivism? 2.)What is counter attacking? 3.)Are there limitations when it comes to hacking? 4.)Who was the first person who was known as a hacker? 5.)What do we get from this chapter?

Page 61

Part 3: Handbook of information and computer ethics. Chapter 9 Title: “Information Ethics and the Library Profession” by Kay Mathiesen and Don Fallis

Quote: “We begin this chapter by considering the mission of the librarian as an information provider and the core value that gives this mission its social importance.”

Expectations:

I expect to learn about the information ethics and the library profession.

Book Review: The author of this chapter are Kay Mathiesen and Don Fallis. They discussed the core value of the library profession, selection, bias, neutrality, the classification of labeling, how children gets access to the information that are been made. Several years ago, almost everybody puts newly information in the library. Its like a mission for them to put information. Selection means that they have the ability or right to choose from, bias talks about how other people discriminate other races, and how they treat others unfairly. Neutrality talks about how people treats other people fairly and has the equal rights.

Things I have learned: I learned that computer ethics can be known in the world, we can get the references in the library which supports information for what we need.

Page 62

Integrity Questions: 1.)What is bias? 2.)What is selection? 3.)What is neutrality? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 63

Part 3: Handbook of information and computer ethics. Chapter 10 Title: “Ethical Interest in Free and Open Source Software” by Frances S. Grodzinsky and Marty J. Wolf

Quote: “It is beyond the scope of this paper and its author to develop a detailed integration of ideas of Kant and Aristotle around the virtues.”

Expectations: I expect to learn about the ethical interest in free and open source software.

Book Review: The author of this chapter are Fances Grodzinsky and Marty Wolf. In this chapter the free software and open source software is the main topic. They discussed the importance of open source and free software. We can say that it is a free software if we downloaded it from the internet without paying a single amount of money. It is an open source if it is legal without being hesitated by anyone. We can get free software from the one who made the software himself or herself.

Things I have learned: I learned that not all free things in the world can be easily obtained. There are still prices which we have to pay.

Integrity Questions: 1.)What is free software? 2.)What is open source? 3.)What are the differences among free software and open source? 4.)Who is the author of this chapter? 5.)Where do we get free software and open source?

Page 64

Part 3: Handbook of information and computer ethics. Chapter 11

Title: “Internet Research Ethics: The Field and Its Critical Issues” by Elizabeth A. Buchanan and Charles Ess

Quote: “internet research ethics is an emerging multi and interdisciplinary field that systematically studies the ethical implications that arise from the use of internet as a space or locale of , and/or tool for, research.”

Expectations: I expect to learn about the internet research ethics which discusses the fields and its crucial issues.

Book Review: The author of this are Elizabeth Buchanan and Charles Ess. From the beginning of the chapter, they discussed the introduction to the internet which research about the ethics, also the background of all major issues in the literature. Followed by the history of the IRE, next is the philosophical foundations which tackles the sources, frameworks and the initial considerations. Next that was discussed was the specific of IRE issues. Then the definition of revealing identities was next discussed, here in this topic, they said that it is an online identities are very similarly complex. We have to give respect for other person, since we are the same as a human being, we can understand what or how they think.

Things I have learned: I learned that the source, framework and initial considerations are the main topic which usually discussed for this chapter.

Page 65

Integrity Questions: 1.)What is source?

2.)What is framework? 3.)What is initial considerations? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 66

Part 3: Handbook of information and computer ethics. Chapter 12 Title: “Health Information Technology: Challenges in Ethics, Science, and Uncertainty” by Kenneth W. Goodman

Quote: “there is arguably no better trigger for reflection on morality and its relationship to the law and society than privacy and its cousin, confidentiality.”

Expectations: I expect to learn about the health information technology which talks about the challenges in ethics, science and uncertainly.

Book Review: The author of this chapter is Kenneth Goodman. At the beginning of this chapter, the privacy and confidentiality was discussed, inside this topic, the definitions were given and said that there are lots of us who usually violates the right of being a human being, I can relate this to ethics since I am taking up ethics class, I can say that we all have the right to be able to acknowledge things on our own because we have our own life and we can reason out our belief which can be believed by the public.

Things I have learned: I learned that we have our own privacy which others cannot take away from us.

Page 67

Integrity Questions: 1.)What is diagnostic expert systems? 2.)What prognostic scoring systems? 3.)What does the standard view talks about? 4.)Who is the author of this chapter? 5.)What does progressive caution talks about?

Page 68

Part 3: Handbook of information and computer ethics. Chapter 13 Title: “Ethical Issues of Information and Business” by Bernd Carsten Stahl

Quote: “Businesses and the economic system they work in have an important influence on ethical issues arising from information and information and communication technology.”

Expectations: I expect to learn about the ethical issues of information and business.

Book Review: The author of this chapter is Bernd Carsten Stahl. The concept of business was discussed, since the concept of the society which is the main topic which everyone uses as the most count of argument, I can say that it is the liberal democratic states. It can affect the business which can affect our daily lives. Next is the shareholders and the stakeholders, it says that the ethical business can approach the stakeholders. Next is the shared norms and values, this topics says that it can either be democratic or egalitarian as it can be offered by some businessman.

Things I have learned: I learned that the stakeholders and stockholders have the same attributes.

Integrity Questions: 1.)What is stockholders? 2.)What is stakeholders? 3.)What are the differences between stockholders and stakeholders? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 69

Part 4: Handbook of information and computer ethics. Chapter 14 Title: “Responsibilities for Information on the Internet” by Anton Vedder

Quote: “One of the most fascinating aspects of the Internet is that very few accidents happen. This not only holds for the technical infrastructure and maintenance, but also for the communication and information transmitted through the network.”

Expectations: I expect to learn about the responsibilities for information on the internet.

Book Review: The author of this chapter is Anton vedder. The responsibilities for information on the internet was the topic for this chapter, we all know that we all bare responsibilities when it comes to the responsibilities. We can do anything as long as we will not hurt anybody. E can get tons of information in the internet, since the internet is the center of all attraction in our generations today, almost everybody uses it to amaze themselves.

Things I have learned: I learned that the internet can sometimes be harmful to us, it is also the center of all attraction to us.

Integrity Questions: 1.)What is internet? 2.)What can we do with internet? 3.)How can internet harm other people?

4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 70

Part 4: Handbook of information and computer ethics. Chapter 15 Title: “Virtual Reality and Computer Simulation” by Philip Brey

Quote: “Virtual reality and computer simulation have not received much attention from ethicists. It is argued in this essay that this relative neglect is unjustified, and that there are important ethical questions that can be raised in relation to these technologies.”

Expectations: I expect to learn about the virtual reality and computer simulation.

Book Review: The author of this chapter is Philip brey. According to the book which I have read, virtual reality is the technology which was made during 1980, it has been in the market for several years, since it can help us to make time pass faster, we can enjoy it and play with it, not just by playing, we can do anything which we cannot do in the real world, it’s like 3D animation and you may or can think that we are in the game itself, it is also a computer based program.

Things I have learned: I learned that the virtual reality is a computer based program which can be the attraction for our generation.

Integrity Questions: 1.)What is virtual reality?

2.)What is computer simulation? 3.)What are the difference between virtuality and reality? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 71

Part 4: Handbook of information and computer ethics. Chapter 16 Title: “Genetic Information: Epistemological and Ethical Issues” by Antonio Marturano

Quote: “The quantity of information in a system can be understood roughly as the amount of order in that system, or the inverse of the entropy (disorder) that all closed physical systems accumulate over time.”

Expectations: I expect to learn about the genetic information, epistemological and ethical issues.

Book Review: The author of this chapter is Antonio Marturano. This chapter talks about the concept which are being used to genetics for two different levels that can be taken and can be made or extracted to a new information. Since it can transfer information from one place to another, it has the ability to make something extraordinary things. The topic eggs as computer machineries made me think how can eggs be a part of computer machineries.

Things I have learned:

I learned that the computer machineries can be related to computer ethics.

Integrity Questions: 1.)What are the concept of information? 2.)What is genetic information? 3.)What is computer machinery? 4.)Who usually use this theory? 5.)What can we obtain in this chapter?

Page 72

Part 4: Handbook of information and computer ethics. Chapter 17 Title: “The Ethics of Cyber Conflict” by Dorothy E. Denning

Quote: “cyber-terrorism—the integration of cyber attacks with terrorism. Although cyber-terrorism is abhorrent and clearly unethical, hacktivism raises ethical questions.”

Expectations: I expect to learn about the ethics for cyber conflict.

Book Review: The author of this chapter is Dorothy Denning. At the beginning of the reading materials, they said that this chapter talks about the attack of cyber to be able to clearly state the unethical things which is illegal. The attack of computer viruses in our computer is very harmful, it can easily destroy our computer files, sometimes it cannot be returned to you once the virus was already spread. For the time being, we can avoid these sort of things by

setting some samples like putting anti-virus, put on the windows firewall. Viruses are threats for us.

Things I have learned: I learned that the organization computer virus can kill our computer.

Integrity Questions: 1.)What is cyber-terrorism? 2.)What is a virus? 3.)How can we prevent computer virus attacks? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 73

Part 4: Handbook of information and computer ethics. Chapter 18 Title: “A Practical Mechanism for Ethical Risk Assessment — A SoDIS Inspection” by Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan

Quote: “Informaticians have been evolving and refining techniques to mediate risks of developing software products that meet the needs of their clients.”

Expectations: I expect to learn about the practical mechanism for ethical risk assessment.

Book Review: The author of this chapter are Don Gotterbarn, Tony Clear, and ChoonTuck Kwan. Risk management is the main point here in this chapter. Since all of us is in need of budget, we tend to to everything to gain money, to be able

to raise money, we have to have money, in a company, risk management is important, we have to monitor the risk management to lessen the negativity of the company’s profile or the company’s image.

Things I have learned: I learned that the risk management is important in a company to raise the its name.

Integrity Questions: 1.)What is risk? 2.)What is risk management? 3.)How do we get profit? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 74

Part 5: Handbook of information and computer ethics. Chapter 19 Title: “Regulation and Governance of the Internet” by John Weckert and Yeslam Al-Saggaf

Quote: “There are at least two different questions involved in the governance of the Internet: who, if anybody should be in charge, and what, if anything, should be governed or regulated.”

Expectations: I expect to learn about the regulating and governance of the internet.

Book Review: The author of this chapter are John Weckert and Yeslam Al-Saggaf. They discussed the internet governance. According to them “Internet

governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet” for this statement, I can say that internet governance is somehow been able to help us thru our decision making.

Things I have learned: I learned that the internet governance is the aid to our decision making.

Integrity Questions: 1.)What is internet governance? 2.)What WGIG? 3.)What is ICANN? 4.)What is W3C? 5.)What is IAB?

Page 75

Part 5: Handbook of information and computer ethics. Chapter 20 Title: “Information Overload” by David M. Levy

Quote: “It should hardly be surprising if complaints about a flood, a fire hose, or a blizzard of information are not only common but increasing.”

Expectations: I expect to learn about the information overload.

Book Review:

The author of this chapter is David Levy. Some of us does not know that there are limitations for information sending or receiving, it is called information overload. We tend to get information from the internet. For what I know, the most famous search engine is the google, almost everybody get information in google, but for articles, there are lots of us uses Wikipedia, but Wikipedia cannot be trusted since there are most of us use Wikipedia as pranks and put false information.

Things I have learned: I learned that the information overload has its limitations.

Integrity Questions: 1.)What is information overload? 2.)What is information? 3.)What’s the difference between perception and reality? 4.)Who is David Lewy? 5.)What is the history of information overload?

Page 76

Part 5: Handbook of information and computer ethics. Chapter 21 Title: “Email Spam” by Keith W. Miller and James H. Moor

Quote: “The conceptual muddles about defining spam have immediate philosophical and legislative consequences.”

Expectations: I expect to learn about the importance of email spamming.

Book Review: The author of this chapter are Keith W. Miller and James H. Moor. They have discussed the importance and the meaning of email spamming. There are lots of us who tends to spam, it can make our email slow, it is very persistent, so we tend to delete all of the files which was spammed to us, to lessen the hassle during deleting, or reading nonsense email.

Things I have learned: I learned that spamming can cause hassleness to the one whose email was spammed.

Integrity Questions: 1.)What is email spamming? 2.)What are the intensions of other people who tends to spam? 3.)What are the advantages in spamming? 4.)What are the disadvantages in spamming? 5.)What lesson do we get from this chapter?

Page 77

Part 5: Handbook of information and computer ethics. Chapter 22 Title: “The Matter of Plagiarism: What, Why, and If” by John Snapper

Quote: “As with most ethical concepts, there is plenty of room for debate over the definition of “plagiarism.” Plagiarism will be treated here very broadly as expression that improperly incorporates existing work either without authorization or without documentation, or both. The emphasis on impropriety is important.”

Expectations: I expect to learn about the matter of plagiarism.

Book Review: The author of this chapter is John Snapper. In this chapter the topic is plagiarism. There are many of us still doesn’t know what plagiarism is, plagiarism is the act of action where we copy other person’s file and claim it as your own work. Plagiarism is not bad, but we have to put the citations where we copied the file itself. Because once the owner of the file sees his or her work which is being used by other people without citations, he or she will surely be furious, because they made use of the file without the permission of the owner.

Things I have learned: I learned that we have to have the permission of the owner before using the file.

Integrity Questions: 1.)What is plagiarism? 2.)What are the concept of plagiarism? 3.)What do we have to do if we copied other persons file? 4.)Who is the author of this chapter? 5.)What is authorization? Page 78

Part 5: Handbook of information and computer ethics. Chapter 23 Title: “Intellectual Property: Legal and Moral Challenges of Online File Sharing” by Richard A. Spinello

Quote: “Lost in the thicket of lawsuits and policy challenges are the ethical issues associated with the use and distribution of file sharing software.”

Expectations: I expect to learn about the intellectual property.

Book Review: The author of this chapter is Richard Spinello. He discussed the file sharing, file sharing can lessen the time where we can transfer files without standing that will cause us our precious time. We just have to use networking to be able to transfer files from a computer to another computer, we can also use email to store files and also to send. We don’t have to use and software to do networking, we just need the internet or a networking cable to be able to transfer files.

Things I have learned: I learned that the networking can do easier task for us.

Integrity Questions: 1.)What is networking? 2.)What is peer to peer network? 3.)What is sharing or theft? 4.)What is secondary liability? 5.)Who is Richard Spinello?

Page 79

Part 6: Handbook of information and computer ethics. Chapter 24 Title: “Censorship and Access to Expression” by Kay Mathiesen

Quote: “One might hope that work in law or philosophy might provide the answer.However, the concept of “censorship” is commonly used in ways that go much beyond the strict

confines of First Amendment law.”

Expectations: I expect to learn about the cencorship and how to access to expression.

Book Review: The author of this chapter is Kay Mathiesen. In this chapter cencorship was discussed, from what I have read, it says that there is no one who wants to be a censor or no one wants to be called as a censor. There are many people who are interested in this topic since it is one of the attraction for them. What does censorship really means, it is the limitation access to a content. Censorship are harmful.

Things I have learned: I learned that censorship is a really bad thing. Can’t really imagine how bad, but based on my readings they said it is really bad.

Integrity Questions: 1.)What is censorship? 2.)Is censorship a bad or a good thing? 3.)What does censorship do? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 80

Part 6: Handbook of information and computer ethics. Chapter 25 Title: “The Gender Agenda in Computer Ethics” by Alison Adam

Quote: “The recognition of continuing differences between men and women lots, at home, in the workplace, and in education, even in societies that have seen considerable opening up of opportunities for women in the space of a generation or so, has been a major force in developing contemporary feminist writing.”

Expectations: I expect to learn about the gender agenda in computer ethics.

Book Review: The author of this chapter is Alison Adam. Based on my understandings, the issue in this chapter is based on gender. It is said that “it is the major way of classifying and ordering our world has been propounded by a number of authors, mainly, although not exclusively, writing from a feminist position”. I can say that it is based on the authors, on how they put everything together and make something out of it.

Things I have learned: I learned that the gender in this chapter is one of the major topic which was discussed.

Integrity Questions: 1.)What does gender have to do in this chapter? 2.)What is feminist ethics? 3.)What are the studies of gender and computer ethics can be related to this chapter? 4.)Who is the author of this chapter? 5.)What do we get from this chapter?

Page 81

Part 6: Handbook of information and computer ethics. Chapter 26

Title: “The Digital Divide: A Perspective for the Future” by Maria Canellopoulou-Bottis and Kenneth Einar Himma

Quote: “In the developing world, poverty and the suffering it causes is considerably worse. Here poverty is characteristically “absolute” in the sense that people do not have enough to consistently meet their basic needs.”

Expectations: I expect to learn about the digital divide which tackles the topic a perspective for the future.

Book Review: The author of this chapter are Maria Canellopoulou-Bottis and Kenneth Einar Himma. They discussed the global distribution which will bother some conscientious individuals. Since the rate of money in our country is not consistent, it would suddenly rise or fall. We have to do something about it, to think carefully what to do in the mere future, being an information technology person can be helpful, we can use our knowledge on what we have learned and apply it to our work to be able to make the money growth normal in our country.

Things I have learned: I learned that the poverty could be such a scary thing if that really happens to us.

Page 82

Integrity Questions:

1.)What is poverty? 2.)What is global distribution? 3.)How can we lessen the poverty? 4.)What can we do to help the poor? 5.)Who is the author of this chapter?

Page 83

Part 6: Handbook of information and computer ethics. Chapter 27

Title: “Intercultural Information Ethics” by Rafael Capurro

Quote: “The distinction between cognitivism and noncognitivism presupposes that human emotions have no cognitive value and, vice versa, that human cognition has a truthvalue if and only if it is free of emotions.”

Expectations: I expect to learn about the intercultural information ethics.

Book Review: The author of this chapter is Rafael Capurro. Rafael discussed the cultural part where intercultural information ethics has been occurred. There were frameworks were the cultured country has been surrounded by the common culture thru experience of existence in the world. They follow some traditions since they were given birth by their ancestors. Computer ethics can be followed in this chapter by means of cultivating plans or by traditions.

Things I have learned: I learned that the culture can be affected by means of computer ethics.

Integrity Questions: 1.)Who is Toru Nishigaki? 2.)What is culture? 3.)Who is Terrell Ward Bynum? 4.)Who is Bernd Frohmann? 5.)Who is Lorenzo Magnani?

Page 84

Our Code of Ethics

No-delegable Quality

1. You shall extend the performance or tasks with the importance of professionalism 2. You shall seek for an excellence work in appropriate level of competence 3. You shall judge ones work in accordance to knowledgeable and technical criticisms 4. You shall setting up your goals through the advance performance 5. Establishing a good reputation to the observation of the others but not to the just perspective of yours 6. Evaluate self performance towards the progress of tasks to lead a breakthrough performance

Traceability, which reduces occasions for wastes and frauds.

6.)Traceability 6.)Traceability, according to the book, the topic which fraud and waste was found in the net, says that it is to track or trace products, while according to the Wikipedia, it says that traceability is “referring to the completeness of the information about every steps in a process chain. It is also an ability to chronologically interrelate the uniquely identify the entities in a way that is verifying something. It is the ability to verify a certain history, location, application of an item by means of documented recorded identification.”

7.)Traceability occasions for waste and fraud.

6.)According to my research, this topic talks about the waste from food which other people may not be thinking what will happen if they go wasting something precious food, materials, or anything which can be useful for us.

8.)Breadth 7.)Breadth is something that can store record and gets all information needed for us. It can grow as a huge corporation. It is a system that excludes many attributes like processing, sale from producer to wholesaler or retailer, transportation, storage, harvest, cultivation, bean.

9.)Depth 8.)It is how the system tracks down the given important information. Examples were given in the class when my professor was discussing. It is better off when it comes to fair-trade than middleman, we can earn more when it is fair-trade. Example, the Starbucks coffee, they rather have fair-trade than going thru the process of middle man.

10.)Precision 9.)Precision talks about the assurance that a system can either be tracked down or can give out specific information for the movement of the productions or the character of the product itself. Respect for privacy and avoidance of conflicts of interest Treating people with respect makes your world a nicer place to live in, whether it's at home, at school, or out in your community. And it's easy - all you have to do is treat people the way you like to have them treat you. We live in a diverse nation made up of many different cultures, languages, races, and backgrounds. That kind of variety can make all our lives a lot more fun and interesting, but only if we get along with each other. And to do that we have to respect each other. In addition to the list above, here are some ways we can respect people who are different from us.

• Try to learn something from the other person. • Never stereotype people.

• Show interest and appreciation for other people's cultures and backgrounds. • Don't go along with prejudices and racist attitudes.

Avoidance of conflicts of interests All persons must avoid conflicts of interest between their private financial activities and their part in the conduct of company business. All should be sensitive to which their actions should not conflict to the jobs of others. There must be communications to every people affecting the cycles of interest. All should treat their job honestly and not being unfair and not taking advantage of other people in their range. If all people should follow this, then conflicts of interest will never be visible. Antidiscrimination which is required by law but inserted to complete the code Duty to the profession

6.)Being an IS professional, you shall not discriminate others by their gender (gay, lesbian, etc.) 7.)You shall take into consideration the upcoming employees personal status 8.)You should not prioritize your relatives, friends , and family member on the field 9.)You shall abide the rules set by the company 10.)You should not use your power/position to accommodate people 11.)You should not use emotions dealing with other people and dealing with decisions 12.)You should treat fairly the disabled person 13.)You should respect other people’s religion 14.)You should practice and respect employees privacy 15.)You shall take into consideration the age of the employees

Empowerment through organizational freedom, responsibility and authority

Empowerment comes in different forms and purposes. An organization needs to be an influence within themselves and externally, by acts of good-faith. Social and economic factors should be considered primarily with these acts. Organizational Freedom

All members of the organization should act on their natural free will that is by positive means. An employee is free to do and think anything that will prove beneficial for the organization. For example, an employee in an IT industry should be free to suggest to the top executives his views on how to improve their service.

Responsibility

All members of the organization are responsible of his and his colleague’s actions. All actions done inside the organization’s boundaries should reflect to all members. For example, an installation of a new hardware in a manufacturing firm should be announced to all members, since that act is all about the organization itself. Authority An organization must not fail to recognize authority. People labeled as an authority must empower his subordinates in good-faith. For example, a manager in an organization must discipline his people accordingly. But he must take ethical considerations in doing so.

True Report

It is important in every individual or groups of people that their reports are true, because naturally nobody wants to receive reports that are known to be untrue. It is also important that the law does not require the individual or group to investigate and prove that their report is false. If a true report is made in bad faith it will nevertheless be in the individual’s interest that the report should be made.

it can gain public interest if a report was reported true and not false 6.)it is in the persons choice whether he/she will report a true report 7.)nobody wants a false report

Integrity

Acording to WikiAnswers, integrity comes from the Greek words 'integritas' and 'integra' meaning whole. It enters into any aspect of one's life. It's belief system without faltering no matter how dangerous, how unpopular the person makes themselves to others. It includes: sincerity, keeping one's word and agreements, honesty, truthfulness, ethics, fairness and justice, punctuality and never faltering for what one believes in. A quote regarding integrity is 'It is better to have an enemy who keeps his word, than a friend who does not..(http://zhou1.pbworks.com/Integrity?edit=1&new=1&referer=http%3A%2F%2Fzhou 1.pbworks.com%2F)

Integrity is very important to every individual because it always brings honesty, truthfulness and honor to you company. In our everyday lives, always look and work at your best because we never know who is going to come and we always carry our company’s name as an accessory. In working to a prestigious company, always protect your company’s confidential information, assets, documents and resources. When at work always prioritize every task that are given to us and work with integrity. At work, integrity is not an accessory that one can put on and take off when it is convenient. Though, our behaviors during work loads are more important than to seem convenient and it plays a large part in working whether people show up in integrity or not. Integrity is to show what kind of attitude you have during work, how people act during work and it seems to change in anyways whether it is convenient.

Related Documents

Complete
November 2019 69
Complete
May 2020 38
Complete
October 2019 57
Complete
May 2020 34
Complete
November 2019 48
Complete
December 2019 39

More Documents from ""