Cyber Ethics + Bop

  • Uploaded by: Cristine Camille Valenzona
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cyber Ethics + Bop as PDF for free.

More details

  • Words: 28,937
  • Pages: 109
TITLE: The Market at the Bottom of the Pyramid (Chapter 1) AMAZON LINK: http://www.amazon.com/Fortune-Bottom-PyramidEradicatingPublishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981& sr=1-1 QUOTATION: Contrary to the popular view, BOP consumers are getting connected and networked. They are rapidly exploiting the benefits of information networks. LEARNING EXPECTATIONS: -

I want to know to what market is portrayed for the bottom of the pyramid.

-

I want to learn how to have a market at the bottom of the pyramid.

-

I want to learn the key or strategic key for establishing a market at the bottom of the pyramid.

REACTION: I am bothered with the status of the financial crisis in the country, not only in the Philippines, but also to the different countries over the world who suffers in great poverty. When I have seen the campaigns to help those people who live on far less than $2 a day, I have these confusion in mind and the question of why. Well, I cannot blame myself because I have different opinion on that side. I think people given chance to offer a help in any form such as donation is just an abuse in their selves. As I remember with what we tackle in my earlier subjects, it is good to give but keep in mind that you are helping wisely. Upon reading this chapter, I was amazed. It has presented a wiser way of helping people in need not by giving them donations. As stated in this chapter, “The purpose of this book is to change that familiar image on TV.” It is really true because there are different interpretations in any matters but through explaining and defending an opinion things become clearer to one’s mind, just like me. “What is needed is a better approach to help the poor, an approach that involves partnering with them to innovate and achieve sustainable win-win scenarios where the poor are actively engaged and, at the same time, the companies providing products and services to them are profitable.” I think it is the best line I have read from business books especially for establishing goals of a business with incline to the poor. It is really true. In

order to help both parties, the poor and the growth of the companies, it is best to build programs, services or promos that are really in for them that will give them chance to experience those certain services which will not deprive their dignity as a person. There are three assumptions discuss to understand how establishing a market for the bottom of the pyramid made possible. It just helps us to have more ideas on how the market have generated from this great opinion based on the following assumptions. 1.) The poor cannot participate in the benefits of the globalization without an active engagement and without access to products and services that represent global quality standards. 2.) The BOP, as a market, provides a new growth opportunity for the private sector and a forum for innovations. 3.) BOP markets must become an integral part of the work of the private sector. There are still different interesting topics in this chapter such as the notions that BOP are brand conscious, BOP is connected, BOP consumers accept advanced technology readily and other stuff that describes the aspects connected to BOP. LESSONS LEARNED: -

I learned that BOP is really a market to focus on because most of the population in any countries belongs in here.

-

I have discover that the notion of brand conscious are especially pertains to the BOP but not to those people who belong in the upper level of the pyramid.

-

I understand now that all of the people are important in any market.

INTEGRATIVE QUESTIONS: 1. What is the effect of the collaboration of poor, civil society organizations, governments, and large firms? 2. How can the distribution of wealth and the capacity to generate income in the world be captured? 3. What does urban concentration represents? 4. How can the BOP convert into a consumer market? 5. What are the Three A’s?

TITLE: Products and Services for the BOP (Chapter 2) AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1 -1 QUOTATION: The poor as a market are 5 billions strong. This means that solutions that we develop cannot be based on the same patterns of resource use that we expect to use in developed countries. Solutions must be sustainable and ecologically friendly. LEARNING EXPECTATIONS: -

I want to know more about the BOP.

-

I want to know the different products and services for the BOP.

-

I want to understand how companies generate their ideas of creating products and services for consumers that belong in BOP.

REACTION: Considering the different products and services that are been derived today it is very difficult to distinguish which is which for those customers who can avail it according to what category they involved or belonged to. Different portfolios of products and services have been generated which sometimes design just for the Western markets. As we all know, the Western markets are those people who belong in the upper level of the pyramid. BOP markets become more emerge with the different possibilities of replicating the developed country models which result to unsatisfactory results. The sustainability of the different facilities for operating the completion of certain products and services in the Western are no longer existing because of the unaffordable expenses in continuing the operation of the business especially Western. In creating a strategy for BOP market as a target, a company must score there certain programs to a certain criteria which if it scored 7 or greater than 7 then the program or strategy will surely succeed in targeting the BOP market. There are twelve principles of innovation for BOP markets and inputs from me to express how I understand each principles of innovation: 1.) Price Performance – Mostly market is very careful in choosing certain products and services which is nowadays applied because of the financial crisis in which the price is carefully and reasonably for anything. A certain market wants to assure that whatever they

purchase is worth for their money and become valuable for mostly BOP market. 2.) Innovation – People do resist changing especially for new system but the market especially BOP become more optimistic and requires innovation which is because they want to still be with the technology. This is the reason why there are people or certain companies who developed and manufactured products and services with innovative value added. 3.) Scale of Operations – Target market is dependent on the volume which becomes a basis for returns on investment. Mostly BOP markets are poor and small yet there are only few BOP markets that are large and big enough. 4.) Sustainable Development – The solution that we develop cannot be based on the same patterns of resources use that we expect to use in developed countries. 5.) Identifying Functionality – Functionality are required in products and services in the market especially the BOP market which might be different from that available in the developed market. 6.) Process Innovation – It is a critical step in making products and services affordable for the poor. It answers the question how to deliver which is important than what to deliver. 7.) Deskilling of Work – There is a shortage of talent which means in a company’s products and services it does not require much of talent, skills and knowledge before you can use or acquire certain functionality of certain products and services. 8.) Education of Customers – Innovation in BOP markets requires significant investments in educating customers on the appropriate use and the benefits of specific products and services. 9.) Designing for Hostile Infrastructure – Mostly, BOP markets exists in a hostile infrastructure because the products and services you offer to market must fit to their environment. 10.) Interfaces – In any aspect today, interface especially design must be carefully thought through to encourage the BOP market because interface is the key for the market to embrace your products and services offered. 11.) Distribution – A way to reach your products and services to market especially BOP market is a challenged to corporation because there are different factors why the access on customer or markets have certain problems encountered.

12.) Challenges the Conventional Wisdom – The success in BOP markets will break the existing paradigms. In all aspect every success in a certain goal will affect not only the existing paradigm but also creates new paradigm. These twelve principles of innovation for BOP markets can be used in determining whether a certain program is fit for the BOP markets which can help corporations or companies to have a strong determination and guide in constructing a certain strategy for the BOP. It will help all individuals not only corporation or big company to construct or develop a strategy for the BOP market. LESSONS LEARNED: -

I discovered that products and services rendered by the market are still considered or affected by the levels of the pyramid.

-

I learned the twelve principles of innovation for BOP markets.

INTEGRATIVE QUESTIONS: 1. What is the effect of involvement in BOP markets? 2. What are the twelve principles of innovation for BOP markets? 3. What does the new philosophy of innovation for the BOP market requires? 4. What can be an effect of active participation in BOP markets? 5. How is the design of interface important to be considering carefully?

TITLE: BOP: A Global Opportunity (Chapter 3) AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1 -1 QUOTATION: The benefits of operating at the BOP, therefore, do not just accrue in local markets. LEARNING EXPECTATIONS: -

I want to know the opportunities presented or developed for BOP.

-

I want to learn the different ways in determining opportunities especially for BOP.

-

I want to understand how BOP becomes a global opportunity.

REACTION: In this chapter, it states that because of certain events that yield to emerging evidence, it formulates or identifies four distinct sources of opportunity for a large firm which invests time and energy to comprehend and cater to the BOP market: 1. Some BOP markets are large and attractive as stand-alone entities. 2. Many local innovations can be leveraged across other BOP markets, creating a global opportunity for local innovations. 3. Some innovations from the BOP markets will find applications in developed markets. 4. Lessons from the BOP markets can influence the management practices of global firms. Large firms have two ways to engage the BOP market which are either through a traditional approach and developed approach. In the traditional approach, it is to start from the business model honed in the developed markets which result in fine-tuning current products and services and management practices. The developed approach is to start from a deep understanding of the nature and the requirements of the BOP and then architect the business models and the management processes around these requirements. In BOP market, there is a concept of learning to grow in which through time the products and services also technologies and the concepts of systems changes. In many issues, change is constant so in BOP market, the effect of change is in the growing stage. Comparing the different

curve from time to time, before it is “S” curve which it is a model for the diffusion of new products and services in the developed countries in the world. But, now, the “I” curve challenges the status quo and the entire management process in most large firms is geared for slow growth. LESSONS LEARNED: -

I learned the four distinct opportunities that the BOP offers to big firms today.

-

I learned the different approach as well as the curve that exist in the system today.

-

I learned the lessons from the BOP markets.

-

I learned the three premises in the system.

INTEGRATIVE QUESTIONS: 1. What are the four distinct sources of opportunity for a large firm? 2. What are the two ways in which large firms tend to engage the BOP market? 3. What is the difference of the “S” curve from the “I” curve? 4. What are the three premises of the system? 5. What are the lessons for MCNs from the BOP markets?

TITLE: The Ecosystem for Wealth Creation (Chapter 4) AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1 -1 QUOTATION: A market-based ecosystem is a framework that allows private sector and social actors to act together and create wealth in a symbiotic relationship. LEARNING EXPECTATIONS: -

I want to know the ecosystem for wealth creation.

-

I want to learn the different components of an ecosystem.

-

I want to understand when an ecosystem is considered for wealth creation.

REACTION: In this chapter, it states that in the previous chapter of the BOP there is a need for building an ecosystem for wealth creation and social development at the BOP. It shows few attempts to focus on the symbiotic nature of the relationships between various private sector and social institutional players which can lead to a rapid development of markets at the BOP. The author states that a market-based ecosystem is a framework that allows private sector and social actors to act together and create wealth in a symbiotic relationship. It discusses that an ecosystem should consist of a wide variety of institutions coexisting and complementing each other; each constituent has a role to play and dependent to each other. Yet in different countries there are different ecosystems because of the various components to define an ecosystem. Ecosystem for developing country are affected by competitive conditions, availability of new technologies, nature of resource endowments and educational infrastructure which works differently to have a developed country such as a country of India, a company does not have a legal control over the entire ecosystem nor does have direct influence on all the elements of the system. However, a company provides the framework, the intellectual direction, and the processes by which the system is governed and operated. This chapter illustrates three steps in creating a governance capacity based on the marketing ecosystem,:

transaction

1. Help the poor understand that there is a win-win situation for them and the firm by respecting contracts. 2. The private sector can reduce the asymmetries in information, choice, ability to enforce contracts, and social standing. 3. The companies start with understanding the rationale for the contracting system: how and why it reduces transaction costs and reduces the cost of capital as well as increases access to capital. In any development, the goal is to bring as many as possible to enjoy the benefits of an inclusive market. The impact of the market-based ecosystem and the role of the nodal company can be very important in developing the disciplines of the market. LESSONS LEARNED: -

I learned how they define the ecosystem.

-

I learned the four sources of friction on the system.

-

I learned the different components of ecosystem.

INTEGRATIVE QUESTIONS: 1. What is an ecosystem? 2. What are the different components of ecosystem? 3. What are the four sources of friction in the system? 4. What are the three bases of assumptions in building governance? 5. What are the three steps in creating a transaction governance capacity based on marketing ecosystem?

TITLE: Reducing Corruption: Transaction Governance Capacity (Chapter 5) AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1 -1 QUOTATION: Transaction governance capacity is about making the entire process as transparent as possible and consistently enforced. LEARNING EXPECTATIONS: -

I want to learn the ways in reducing corruption in the market or ecosystem.

-

I want to know if there are different factors that lead an ecosystem into corruption.

-

I want to understand how corruption takes place and when does corruption considered as a corruption.

REACTION: Corruption takes place not only in the market, as seen from today’s government, it is really obvious in the society today, especially in our country: Philippines. From the previous chapter, the author specifies, there are certain groups of opportunities from the BOP in which managers of the big corporation has been convinced yet there are still lingering doubts about the ability of large firms to operate in markets such as the BOP. As categorized or emphasized by the author in this market is the CORRUPTION. As stated in this chapter, developing countries do not fully recognize the real costs of corruption and its impact on private sector development and poverty alleviation because those developed countries did not understand or observe the corruption which I think there is a notion that if people do not suffer or experienced certain poverty then they did not observed or intrigue issue of corruption which means there are no rooms for questions because all are doing great or well as planned due to prosperity. In this chapter, it identifies four basic assumptions that have been at the core of the thinking on poverty reduction and developmental assistance during the past 30 years: 1. Poor countries are poor because they lack resources. 2. Aid from rich countries to the governments of the poor countries for specific projects would reduce poverty.

3. Investments in education and health care might have the largest multipliers per dollar of investment in economic development. 4. The record of aid and loans from the various donor countries and the World Bank, International Monetary Fund, and other institutions is at best mixed. Based on the different scenarios from different countries, conclusions have been derived which are the following: 1. All forms of foreign investment in poor countries are but a fraction of the potential for capital that is trapped in these countries. 2. In the absence of enforceable contract law, local commerce is conducted by a vibrant extra legal or informal sector. 3. There are contract enforcement systems that are local. This chapter identifies fourfold of specifications for TGC which is about the creating transparency and eliminating uncertainly and risk in commercial transactions. There are the four specifications: 1. A system of laws that allows for ownership and transfer of property. 2. A process for changing the laws governing property rights that is clear and unambiguous. 3. As societies become more complex, a system of regulations that accommodates complex transactions. 4. Institutions that allows the laws to be implemented fairly, in a timely fashion and with transparency. I was stricken in this chapter, the corruption is bound to increase in the near time, peaking and then steadily declining to near-zero levels. Once the system is fully operational, it is difficult to change the data in the system. All entries will leave a trail, indicating who as well as when. This level of scrutiny and openness will reduce the opportunities for corruption. I just noticed that there are certain changes in the world today that are bounded of corruption. LESSONS LEARNED: -

I learned how they define the ecosystem.

-

I learned the four sources of friction on the system.

-

I learned the different components of ecosystem.

INTEGRATIVE QUESTIONS: 1. What is an ecosystem? 2. What are the different components of ecosystem? 3. What are the four sources of friction in the system? 4. What are the three bases of assumptions in building governance? 5. What are the three steps in creating a transaction governance capacity based on marketing ecosystem?

TITLE: Development as Social Transaction (Chapter 6) AMAZON LINK: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291/ref=sr_1_1?ie=UTF8&s=books&qid=1234441981&sr=1 -1 QUOTATION: It is the growing evidence of opportunity, role models and real signals of change that allow people to change their aspirations. LEARNING EXPECTATIONS: -

I want to know why development serves as a social transformation.

-

I want to understand how to gain access to knowledge.

-

I want to learn why women are critical for development.

-

I want to know why it is necessary to break down barriers to communication.

REACTION: When the poor at the Bop treated as consumers, they can reap the benefits of respect, choice and self esteem and have an opportunity to climb out of the poverty trap. The capabilities also to solve also to solve the perennial problem of poverty through profitable business at the BOP are now available to most nations as illustrated in this chapter however converting the poor into a market will require innovation. There are three transitions that stated in this chapter, first, we demonstrated that the BOP the poor can be a market. Second, once we accept the BP markets as a market, the only way to serve that market is to innovate. The BOP demands a range of innovations in products and services, business models, and management processes. Third, these innovations must be accompanied by increased TGC, making the government accountable to the citizens’ ad making it accessible and transparent. As Bop consumers get an opportunity to participate in a benefit from the choices of products and services made available through market mechanisms, the accompanying social and economic transformation can be very rapid. The reason for this is that BOP consumers are very entrepreneurial and can easily imagine ways in which they can use their newly found access to information, choice and infrastructure. Contrary to the popular belief, BOP consumers are always upgrading from their existing condition. BOP consumer the newly found choice in an upgrade from their current state affairs. For the BOP consumers, gaining

access to modern technology and good products designed their needs in mind enables them to take a huge step in improving their quality of life. One of the common problems for those at the BOP is that they have no 'identity”. Often they are the fringe of society and do not have a “legal identity” including voter registration, drivers license or birth certificate. the instruments of legal identity that we take for granted---be it a passport or a Social Security Number are denied to them. For all purposes they do not exist as legal entities. Because they do not have legal existence, they cannot be the beneficiaries of a modern society. The importance of legal identity cannot be underestimated. Without it, BOP consumers cannot access we take for granted. The social transformation that is taking place in markets where the public and the private sectors have been involved at the BOP is quite impressive. BOP consumers have constantly surprised the elite with their ability to adapt and their resilience. More important social transformation is about the number of people who believe that they can aspire to middle class lifestyle. It is the growing evidence of opportunity, role models, and real signals of change that allow people to change their aspirations. LESSONS LEARNED: -

The emancipation of women is an important part of building markets at BOP. Empowered, organized, networked, and active women are changing the social fabric of society.

-

We need to make sure that no organization abuses its power and influence, be it corrupt governments or large firms.

INTEGRATIVE QUESTIONS: 1. How will these changes impact life of BOP? 2. Do we need check and balance for involvement of the private sector in BOP markets can have such significant impact on social transformation? 3. What is really Social Transformation? 4. If we follow the approach what will be the impact will it have on the BOP consumer? 5. How will the lives of Bop consumers change if they will follow the approach?

TITLE: Ethics and the Information Revolution (Chapter 1.1) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Computing technologies is the most powerful and most flexible technology ever devised. For this reason, computing is changing everything – where and how we work, where and how we learn, shop, eat, vote, receive medical care, spend free time, make war, make friends, make love. LEARNING EXPECTATIONS: -

I want to know how ethics is applied to the information revolution.

-

I want to learn the different factors that affect ethics and information revolution.

-

I want to understand the importance of ethics to information.

REACTION: Computing technology is the most powerful and most flexible technology ever devised. In this statement I argue with what the author says “Computing is changing every time – where and how we work, where and how we learn, shop, eat, vote, receive medical care, spend free time, make war, make friends and make love.” I argue with that statement because computer is made by man which means easy to destroy. I usually work in my own place. I don’t believe people telling how to work, how much more to a computer made by men who commit mistakes. I learn what I know today from school, from people around me and in the environment. Computer cannot tell me what to do, it will become just as an aid but not to command or direct me. Access to cyberspace is much easier than to the world business and management techniques. I agree to that because of information technology is like a highway with no end, yes in the developing countries can truly participate in cyber space and look forward to new opportunities offered by global networks. The network constitutes the only reason of freedom in many non-democratic countries. In 1940 and 1950, the American developed computer for survival from any attack by the enemy during that time. Adolf Hitler is very interested about weapon for mass production but because computer was not yet developed, their first missile testing failed. By 1960 it is considered the year of rock and roll and revolution many countries experienced coup d’ tat especially in South America with Bolivia on top of the list. Computer is also like rock and roll, it’s rocking and rolling,

many people die because of computer. It is a revolution because of changing the lifestyle of people such as the clothing. The late 70’s is the prophecy from the Bible that was foretold in the book of Revelation thousand years ago happen when the beast developed the MX missile. The Chapter 13:1 says “I stood upon the sand of the sea, and son of the beast rise up out of the sea having seven heads and ten horns, and upon his horns ten crowns, and upon his heads the name of blasphemy.” That was the first beast who gave his power to the second beast that made the MX missiles. 1980, Computer was use in war. Computer change the people from work. The engineers, bookkeeper, computer replace thousand of work all over the world. In 1990, computer was use by greediest people on earth, which make the world poorer and poorer. LESSONS LEARNED: -

I learned computing technology has different opinions in each individual nowadays.

-

I learned that even though computers are devised, it does not mean that they can substitute people.

-

I learned and be familiar with the different important events in every milestone of the information revolution.

INTEGRATIVE QUESTIONS: 1. What is computing technology? 2. What is the effect of Information Computing Technology? 3. Why are computers defined as logically malleable? 4. What are the topics in computer ethics? 5. What are the different global issues?

TITLE: Ethics On-Line (Chapter 1.2) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: Computer technology did not come into being in a vacuum. It was created and shaped in response to pushes and pulls in our way of life, our culture, politics, and social institutions. LEARNING EXPECTATIONS: -

I want to know the different issues of ethics online.

-

I want to learn any difference in ethics online and offline.

-

I want to understand how those issues came up and occur online and offline.

-

I want to gather thoughts on the different issues in the ethical side of computer.

REACTION: Today, because of the different scenarios happening to us, there are visions of a new form of democracy emerging online as political alliances are formed and social movements gather force without mediation from mass media. There are visions of the current evolving technology bringing into our homes the ultimate in the entertainment choice together with the efficiency of being able to carry on all of our daily interactions with keystrokes and screens. The issues and problems in electronic networks are the problems of the world around them. The problems have to do with who we are and what we do offline. The problems are the problems of modern, highly industrialized, democratic societies. The author simply identifies three special features of online communication. Communication in computer networks has several characteristics making it difficult from face-to-face communication and other forms of technology-mediated communication. These are the following special characteristics of communications in networks: 1. Scope – Individuals communicating in electronic networks have a much broader reach than they do offline. A message sent by one individual can reach vast numbers of individuals around the world, and may do so very quickly. The combination of factors makes the scope special.

2. Anonymity- In networks, individuals can communicate without identity, using pseudonyms and taking on different personas. Someone may grab someone else’s words and alter them or may grab someone else’s identity and distribute words as if they were the words of the other. It creates problems of integrity which disconnects the words from the person. 3. Reproducibility – Information could be reproduced online without loss of value and in such a way that the originator or holder of the information would not notice. There is no loss of value in the process of reproduction. These three special features of communication in networks lead, either directly or indirectly, to problems online. The breadth of scope means that individuals can do a wide variety of things to one another online that would be impossible or extremely difficult to do offline. Anonymity leads to serious problems for the integrity of information and communication. Reproducibility threatens the integrity of information, and it means that acts of communication or information have endurance. Anonymity is problematic in networks and seems to be so for at least three related reasons: 1. Offline as well as online, anonymity is problematic because it makes the process of identifying and catching criminals more difficult. 2. Anonymity is related directly to one of its advantages, it creates a shroud under which people are not afraid to say what they think. 3. Anonymity contributes to the lack of integrity of online information. Regarding these three problems stated above, anonymity contributes to a general situation of diminished trust. One cannot put one’s trust in information and individuals online for a variety of reasons. We can have a wide variety of forms of online communication with a high level of trust if the rules are known or explained to individuals before they enter an environment. LESSONS LEARNED: -

I learned the essence of ethics online which is very important to prevent certain issues especially ethically.

-

I learned the different problems that contribute to a general situation of diminishing trust.

-

I learned the three reasons on why anonymity is problematic in networks.

INTEGRATIVE QUESTIONS: 1. What is anonymity? 2. What is reproducibility? 3. What are the special characteristics of communication in networks? 4. What is diminished trust? 5. What are the effects of anonymity?

TITLE: Reason, Relativity, and Responsibility in Computer Ethics (Chapter 1.3) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: We are entering a generation marked by globalization and ubiquitous computing. The second generation of computer ethics, therefore, must be an era of ‘global information ethics’. The stakes are much higher, and consequently considerations and applications of Information Ethics must be broader, more profound and above all effective in helping to realize a democratic and empowering technology rather than an enslaving or deliberating one. LEARNING EXPECTATIONS: -

I want to know what is reason, relativity, and responsibility of computer ethics.

-

I want to know what logical malleability is.

-

I want to learn about Informational Enrichment.

REACTION: As computing becomes more prevalent, computer ethics becomes more difficult and more important. Communication and actions at a distance have never been easier. We are definitely in a computer revolution. We are beyond the introduction stage of the revolution in which computers are curiosities of limited power used only by a few. Now entire populations of developed countries are in the permeation stage of the revolution in which computers are rapidly moving to every aspect of daily life. Almost everyone would agree that computing is having a significant impact in the world and that ethical issues about applications of this surging technology should be raised. Moor has stated two positions which he argues. Both positions are popular and both of them mislead us about the real nature of computer ethics and undercut potential for progress in the field. According to the Routine Ethics position stated problems in computing are regarded as no different from ethical problems in any field. We apply established customs, laws, and norms and assess the situations straightforwardly. The second view is usually the “Cultural Relativism” in which it states local customers and laws determine what is right and wrong. Because computing technology crosses cultural boundaries, the problems of computer ethics are intractable.

Routine Ethics makes computer ethics trivial and Cultural Relativism makes it impossible. Both the views of Routine Ethics and Cultural Relativism are incorporated particularly when used to characterize computer ethics. The problems of computer ethics are special and exert pressure on our understanding. Computers are logically malleable. They can be manipulated to do any activity that can be characterized in terms of inputs, outputs, and connecting logical operations. A computer’s performance can be changed through alterations in its program. A computer may represent anything one chooses, from the sales of a stock market to the trajectory of a spacecraft. Informational enrichment can also affect ethical and legal practices and concepts. Once data is entered into a computer it can be sorted, searched, and accessed in extraordinarily easy ways that paper files cannot be. The activity of storing and retrieving information has been enhanced to the extent that all of us now have a legitimate basis for concern about the improper use and release of personal information through computers. Moor defines computer ethics having two parts. The first part is the analysis of the nature and social impact of computer technology. The second part is the corresponding formulation and justification of policies for the ethical use of such technology. They will continue to be applied in unpredictable and novel ways generating numerous policy vacuums for the foreseeable future. LESSONS LEARNED: -

The process of informational enrichment is gradual and is more manifest in some activities than in others.

-

Money may come to be conceived as an elaborate computable function among the people.

INTEGRATIVE QUESTIONS: 1. What are the Core Values? 2. What are Responsibility, Resolution, and Residue? 3. What are the Reasons within Relative Frameworks? 4. What is the Special Nature of Computer Ethics? 5. What are the Responsibilities in Computer Ethics?

TITLE: Disclosive Computer Ethics (Chapter 1.4) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: We are entering a generation marked by globalization and ubiquitous computing. The second generation of computer ethics, therefore, must be an era of ‘global information ethics’. The stakes are much higher, and consequently considerations and applications of Information Ethics must be broader, more profound and above all effective in helping to realize a democratic and empowering technology rather than an enslaving or deliberating one. LEARNING EXPECTATIONS: -

I want to know the Key Values as Departure Points for Analysis.

-

I want to understand the Limitations of Mainstream Computer Ethics.

-

I want to learn about the Need for Multi-Level Interdisciplinary Research.

REACTION: As an introduction, this section defines disclosive computer ethics as a concerned with the moral deciphering of embedded values and norms in computer systems, applications, and practices. Mainstream computer ethics are approaches that follow what I will call the standard model of applied ethics. Brey argue with the mainstream computer ethics takes as its point of departure a particular model of applied ethics that may be called the standard model because it is used in the vast majority of work in applied ethics. Research within this model usually proceeds in three steps: 1. An individual or collective practice is outlined that has been the topic of moral controversy. 2. An attempt is usually made to clarify and situate the practice through conceptual analysis and fact-finding. In this section, the author identifies three features of mainstream computer ethics which are particularly noteworthy. -

Mainstream computer ethics focuses on existing moral controversies. Its focus is on issues that are recognized by many as being morally problematic.

-

Mainstream computer ethics focuses on its practices. It aims to evaluate and devise policies for these practices.

-

Mainstream computer ethics focuses usually in is on the use of computer technology.

Moor explains computer ethics, as discussed in this section, that it is a typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Mainstream computer ethics limits itself to the analysis of morally controversial practices for which a policy vacuum currently exist. Computer related practices may be morally opaque because they are unknown or they have a false appearance of moral neutrality. Moral nontransparency may arise is when a practice is familiar in its basic form but is not recognized as having the moral implications that it in fact has. Technologies are capable of coercing individuals to behave in certain ways which may provide opportunities and may provide opportunities and constraints, may affect cultural belief system and may require certain background conditions for them to function properly. Disclosive computer ethics constitutes a much needed approach in computer ethics that deviates from traditional approaches in applied ethics. It should preferably not be theory-driven, should be multi-level and interdisciplinary, and should focus on four key values: justice, autonomy, democracy, and privacy. LESSONS LEARNED: -

Many values and norms are nonmoral, including values like efficiency and profit and norms that prescribe the correct usage of words or the right kind of batteries to use in any appliance.

-

Freedom rights protect goods that are fundamental in carrying out one’s own life plan.

-

The notion of justice is usually understood as implying that individuals should not be advantage or disadvantage unfairly or undeservedly.

INTEGRATIVE QUESTIONS: 1. What is justice? 2. What is Autonomy? 3. What is Democracy? 4. What is Privacy?

5. What is Disclosive Computer Ethics?

TITLE: Gender and Computer Ethics (Chapter 1.5) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: We need to begin the process of exploring the alternative ethics that feminism can offer ethics. LEARNING EXPECTATIONS: -

I want to know the relation of Gender and Computer Ethics.

-

I want to understand about the Gender and Computer Ethics: Barriers and Pipeline

-

I want to know Gender and Computer Ethics: Men’s and Women’s Moral Decision.

REACTION: Gender has been somewhat neglected in computer ethics writing to date. There is small body of work which takes seriously the point of view that gender has some bearing on computer ethics problems. In this paper characterize two strands of writing on gender and computer ethics. The first focuses on problem of women’s access to computer technology; the second concentrates on whether there are differences between men and women’s ethical decision-making in relation to information and computing technologies. Computer Ethics research must always maintain a balance between empirical research and theory, gender and computer ethics research is long overdue for more substantial theorizing. Adam explores the two main strands of current research in gender and computer ethics. The first strand can be viewed as a spillover from information systems and computing research on barriers and “pipelines”, which tends to see the gender and ICT problem as one of women’s access to ICTs and their continuing low representation in computing all the way through the educational process through to the world of work. The other strands of research on gender and computer ethics focuses on concerns more central to computer ethics as a whole, namely the question of whether there are detectable differences between men’s and women’s ethical decision making relation to computer ethics. The author describes a number of empirical studies of gender and business ethics and gender and computer ethics. Aspects of these studies

and argue that these aspects are problematic. These are the different aspects presented: 1. Student Population In every one of the studies detailed before, a student population was surveyed. We are unable to resist the temptation to utilize that most captive of audiences which are the students. 2. Quantitative vs. Qualitative Research Monitoring There are a number of problems with such an approach. Respondents are not being asked to choose between categories that are anything like neutral. It is naturally tempting to cast oneself as more moral in the questionnaire than one might be in real life. In performing a quantitative analysis of qualitative elements, the studies described above appear to be falling prey to the common assumption prevalent in computing that has been criticized elsewhere. Feminists has two major roles, according to Adam, which are to challenge the traditional ethical canon and to develop theoretical ideas derived from the challenge to mainstream ethics to develop a new ethics with which to make normative judgments on ethical problems from a wide range of domains. LESSONS LEARNED: -

Theorist of Feminist ethics rest on the hypothesis that women’s moral decision making is different from men’s important ways we need to understand the implications of this computer ethics.

-

Categorical claims that gender either definitely does or definitely does not make a material difference to moral reasoning relating to the use of computers somehow misses the point.

INTEGRATIVE QUESTIONS: 1. What is the relation of Gender to Computer Ethics? 2. What is Gender and Computer Ethics: Barriers and Pipeline? 3. What is Gender and Computer Ethics: Men’s and Women’s Moral Decision? 4. What Critique about the Gender and Computer Ethics Studies?

5. What is Plea for Feminist Ethics?

TITLE: Is the Global Information Infrastructure a Democratic Technology? (Chapter 1.6) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0

QUOTATION: At the root of all definitions of democracy, however refined and complex, lies the idea of popular power, of a situation in which power, and perhaps authority too, rests with the people. That power or authority is usually thought of as being political, and it often therefore takes the form of an idea of popular sovereignty – the people as the ultimate political authority. LEARNING EXPECTATIONS: -

I want to know relation of Technology and Values.

-

I want to know Values Embedded in Technologies.

-

I want to know Values embedded in the global information Infrastructure.

-

I want to know Democracy as Starting Place: Power and Insularity.

-

I want to know Joint Deliberation.

REACTION: The global information infrastructure is often claimed to be a democratic technology. It is said to create electronic democracy, to facilitate or enhance democratic processes. Many scholars believed that technologies did not embody values, and emphasized that values come into play. Technology is value neutral rested in part on the alliance between science and technology, with several ideas about science shaping ideas about technology. Two tenets now form the foundation of science and technology studies: that technology shapes social patterns, and that technology is shaped by its social context. The social encompasses values. Values are one aspect of the social. We need to understand more concretely what it could mean to say that a technology is value-laden or that values are embedded in technologies. Winner addressed this matter head on in his famous article, “Do Artifacts Have Politics?” He distinguishes two reviews. The first is the view that values are inherent to technology. In contrast, Winner identifies a second view according to which “a given kind of technology is strongly

compatible with, but does not strictly require, social and political relationships of a particular stripe.” He claims that (1) technologies embody values insofar as they have properties that are linked to social relationships, in particular relationships involving power and authority; and, (2) technologies may do this in one of two ways, either by having intractable properties that require particular types of social relationships and authority, by having flexible properties compatible with diverse patterns of social organization and authority. In terms of democracy, a technology may have intractable properties that require democratic patterns of authority; intractable properties that require non democratic patterns of authority or flexible properties that are compatible with either pattern of authority. The idea of democracy is not merely the idea of individuals’ casting votes and thereby expressing their desires. Popular sovereignty has meant the populous getting together as a group or in subgroups for debate and discussion of issues they face jointly. LESSONS LEARNED: -

In this chapter, I learned the Moral/Metaphysical Meaning of Embedded Values.

-

I understand about the Support Meaning of Embedded Values and the Material Meaning of the Embedded Values, as well as the Expressive Meaning of Embedded Values.

-

I learned the power of many and joint deliberation

INTEGRATIVE QUESTIONS: 1. What is GII? 2. What is Democracy? 3. What does it mean to say that a technology carries a value? 4. Is the Global Information infrastructure a democratic technology? 5. What then does it mean to say that values are embedded in technology?

TITLE: Applying Ethical and Moral Concepts and Theories to IT Contests: Some Key Problems and Challenges (Chapter 1.7) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The case, mentioned in this chapter, that such a rule will give rise to gliding scales are so hard to separate by observable criteria that if its better to forbid some cases that perhaps are not really unethical in order to prevent the rule from being gradually emptied altogether. LEARNING EXPECTATIONS: -

I want to know what Connecting Ethics is.

-

I want to know untangling Terminological Confusions.

-

I want to identify the different Role of Experts.

-

I want to understand who are the Experts stated in this chapter.

REACTION: In this section, it asked and challenged us, if we want to apply ethical and moral concepts and theories to IT countries, three conditions are to be met. These are the three conditions that must be met: 1. We must know to what kind of questions such concepts and theories can be applied, and to what kind of questions such concepts and theories can be applied and to what they cannot. 2. We must know the limitations of specific concepts and theories. 3. We must have sufficiently detailed knowledge of the domain to which we want to apply them. Some remarks are made on the demarcation of the nature of the notion of computer ethics. It seems to have become a trend to employ the term “computer ethics for almost anything that used to be called social issues in computing. The role of social context which is in more analytical approaches to ethics have difficulty in handling this social context, whereas narrative approaches through more sensitive to context have difficulty in providing guidance when new technologies are concerned. Birrer draws attention to the very special problems that are posed by the role of expert advisers. The protocol for joint problem solving process by expert and client has to be explored in much more detail than is

usually done. There are good reasons to distinguish between ethics in a narrow sense and a broader category and it is not accidental that many classical textbooks on ethics only deal with choices by individuals. The case, mentioned in this chapter, that such a rule will give rise to gliding scales are so hard to separate by observable criteria that if its better to forbid some cases that perhaps are not really unethical in order to prevent the rule from being gradually emptied altogether. Many ethicists find this abhorrent; they tend to perceive it as an infringement on the purity of ethical discourse. There has been a revival of virtue ethics. It considers the search for analytical rules as fruitless and turns to narratives and virtues as the place where ethics resides. In modern society, chains between actions and consequences have become so complicated that they do not allow a direct and simple view on decision making. Responsibilities inside the institutions are often defined in an untransparent way. This untransparency leads to all kinds of subliminal enticement. Native technological determinism is persuasive, for it makes the picture a lot simpler. But it is also highly undesirable, since it is a source of selffulfilling and self-destroying prophecies. There are strong reasons to believe that the effect of these theories is no other than reinforcing already existing socio-political tendencies that drive in exactly the opposite direction. LESSONS LEARNED: -

An atomization expert advises on changes of the organizational practice in which the expert generally has not actually worked herself.

-

This dominance of technical knowledge combined with economic imperatives that drive innovation has led some to believe that technology is something autonomous.

INTEGRATIVE QUESTIONS: 1. What is Computer Ethics? 2. What is the Role of Experts? 3. What is Connecting Ethics? 4. What is Social Context? 5. What is Demarcation of Computer Ethics?

TITLE: Just Consequentialism and Computing (Chapter 1.8) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Policies are rules of conduct ranging from formal laws to informal, implicit guidelines for action. Policies recommend kinds of actions that are sometimes contingent upon different situations. LEARNING EXPECTATIONS: -

I want to know what Just Consequentialism is.

-

I want to understand what is computing based on this chapter.

-

I want to identify what is Consequentialism Constrained by Justice.

-

I want to identify the Good as the Enemy of the Just.

REACTION: Computer and information ethics need ethical theories which coherently unify deontological and consequentialist aspects of ethical analysis. It makes just consequentialism a practical and theoretically sound approach to ethical problems of computer and information ethics. The malleability of computers allows them to be used in novel and unexpected ways, ways for which we frequently do not have formulated policies for controlling their use. Policies are rules of conduct ranging from formal laws to informal, implicit guidelines for action. Policies recommend kinds of actions that are sometimes contingent upon different situations. Viewing issues in the ethics of computing in terms of policies is important. Policies have the right level of generality to consider in assessing the morality of conduct. We want our policies for computing to be ethical but what should we look for when constructing ethical computing policies. Applied ethicists find themselves immersed in ad hoc analyses of ethical problems and selecting solution from an inconsistent pile of principles. The ethical evaluation of a given policy requires the evolution of the consequences of that policy and often the consequences of the policy compared with the consequences of other possible policies. Among other objections, consequentialism seems to be insensitive to issue of justice. When considering consequences we evaluate the benefits and harms. Human beings have a common nature. Humans are not necessarily concerned about the lives, happiness and autonomy of others but they

are concerned on their own. To be ethical one must not inflict unjustified harm on others. The fact that humans value and disvalue the same kind of things suggests that there may be common standards by which humans of different cultures can evaluate actions and policies. The combined notions of human life, happiness and autonomy may not be far from what Aristotle meant be human flourishing. We seek computing polices that at least protect, if not promote, which is human flourishing. Justice requires an impartially toward the kinds of policies we allow. It is unjust for someone to use a kind of policy that he would not allow others to use. This chapter encourages us to develop computing policies in such a way that they are above all just. It may be tempting in some situations to focus on strikingly good consequences of a policy while ignoring injustice. We want good computing policies that promote human flourishing but only as long as the policies themselves remain just. Unjust policies will in the long run undermine the benefits of these polices no matter how good they are. LESSONS LEARNED: -

Humans are not necessarily concerned about the lives, happiness and autonomy of others, but they are concerned about their own.

-

When humans are using computer technology to harm other humans, there is a burden of justification on those doing the harming.

-

When evaluating policies for computing, we need to evaluate the consequences of the proposed policies.

INTEGRATIVE QUESTIONS: 1. What is Just Consequentialism? 2. What is computing? 3. What is Consequentialism constrained by justice? 4. What are the uncharted waters? 5. What are the combined notions of human life?

TITLE: The Internet as Public Space: Concepts, Issues and Implications in Public Policy (Chapter 2.1) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Policies are rules of conduct ranging from formal laws to informal, implicit guidelines for action. Policies recommend kinds of actions that are sometimes contingent upon different situations. LEARNING EXPECTATIONS: -

I want to know the reason why internet is more than Multi-Media

-

I want to know the Digital Characteristics of a Public space.

-

I want to identify the uses of Internet as public space: opportunities and Barriers.

-

I want to be familiar with the different issues on it.

-

I want to distinguish on how to consider a place as a public space.

REACTION: The internet has long been identified as information agora which serves as a public safety for citizen. It is being shaped by two seemingly contradictory characteristics: personal and ubiquitous. Cyberspace enables the citizenry to find new ways to interact economically, politically and socially. The nature of ubiquity imposes on a variety of individual or organization rights. In this section, the goal of Camp and Chien is two fold. It is to help clarify concepts, old and emerging, and to bring up important issues involved. And lastly, it is to consider how regulating the Internet as public space sheds light on public policies of the future regarding Internet governance. Chien and Camp presented three issues that must be considered when regulating electronic spaces which are simultaneously, permeability and exclusivity. Simultaneously refers to the ability of a person to be two places at once at work and at a train station. Permeability is the ability of barriers between spatial, organizational or traditional barriers to be made less powerful or effective with the adaptation of information technology. Exclusivity is the nature of one space, perception or activity to prevent others.

To complete the goal, they describe what the Internet is not which is a new entrant into media type’s paradigm. The failure of the media regulatory metaphor has lead to a spatial metaphor. They address the fundamental policy issues that result from treating the Internet as public space. They close with the implications with respect to public policy that are crucial to the continuing development of the Internet as a valuable viable public space. Camp and Chien claim a place in it and enjoy the rights associated with the space. Each of these spaces has implicit, physical definitions of permeability or exclusivity. The core that must be reconciled is the relationship of one space to others. The experience of electronic spaces can be simultaneous. These are the different characteristics presented in the digital characteristics of a public space: 1. Public and Private – The Internet that connects people, machines and information resources is at once public and private. This is the most salient characteristics of the Internet. 2. Global vs Local – An Internet space is globally interconnected, as by definition, however provides richness and extends it usefulness. 3. Trans-lingual and cross-reference – Surfing the net is like walking in the streets of a country. Hardly anything you see or hear that is interesting or relevant is rendered only in English. 4. Connections to the non-public – An Internet space may be connected to spaces that are of a proprietary nature. 5. Control and/vs Freedom – It is an external issue of governance which describes above makes it even harder to reach public consensus in this weird time. The spatial model would alter perceptions of public policy problems in comparison to the media type’s perspective. They describe how the differences simultaneity, permeability and exclusivity between virtual and real spaces affect governance. 1. Governance of Internet Use – Issues in Internet governance include security, protection of data and intellectual property rights, reliability, trust, standards and global power interdependence. Issues of privacy encryption can be more easily distinguished with a spatial model than a media model. 2. Impact on Social Capital and Social Leadership – The Internet enables the formation of social capital which refers to the features of social organization which facilitates technology innovation.

3. Impact on Social Well-Being – The traditional concept of Universal Access needs a new definition. The disputes over what is a digital dial-tone and the definition of broadband on the Internet have distracted policy makers from the core issues. The spatial metaphor will help to promote and coordinate work in standards, rules of governance and ethics of Internet use speech are judged offline by time, space and content. A regulatory regime that is too extreme may result in employees limiting employers to private areas on the Internet. LESSONS LEARNED: -

I understand the Impact on social capital and society leadership of internet with respect to public space.

-

I learned the different characteristics presented in the digital characteristics of a public space:

INTEGRATIVE QUESTIONS: 1. What is the impact of public policy of social well-being? 2.

What is the impact of public policy of social capital and society leadership?

3. Which are the establishments that use internet as a public space? 4. What are the digital characteristics of a public space? 5. What is Internet?

TITLE: The Laws on Cyberspace (Chapter 2.2) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Cyberspace is regulated by laws but not just by law. The code of cyberspace is one of these laws. LEARNING EXPECTATIONS: -

I want to know what the Laws in Cyberspace are.

-

I want to understand what Cyber-libertarian is.

-

I want to know the difference between market norms and social norms.

-

I want to know what Laws, Norms, Code and Markets relations are.

REACTION: Behavior in the real world is regulated by four sorts of constraints. Law is just one of those four constraints. Law regulates by sanctions imposed ex post. Social norms are second. They also regulate. Social norms direct and constrain my behavior in a far wider array of contexts than any law. The market is a third constraint. It regulates by price. Through the derived price, the market sets my opportunities and through this range of opportunities, it regulates. There is the constraint of architecture which it is the ability to know what is happening on the other side of the room. That there is no access-ramp to library constraints that access of one bound to wheel chair. Behavior in cyberspace, according to this chapter, is regulated by four sorts of constraints. Law is just one of those constraints, there is law just now in cyberspace such as copyright law, or defamation law, or sexual harassment law. Norms in cyberspace are rules that govern behavior and expose individuals to sanction from others. They too function in cyberspace as norms function in real space, threatening punishments ex post by a community. The market constraints in cyberspace like in a real space. Change in price of access is the constraint on access differs. The most significant constraints is the code or the architecture which is composed of the software and hardware that constituents cyberspace as it is, the sets of protocols, the set of rules, implemented or codified, in the software of cyberspace itself which determine how people interact, or exist, in this space.

Cyberspace is different. The default in cyberspace is anonymity. It is practically impossible for the laws and norms to apply in cyberspace. One has to know that it is a kid one is dealing with. But the architecture of the space simply doesn’t provide this information. The important point is to see the difference and to identify its source. The problem with all this is that the net has no nature. There is no single architecture that is essential to the net’s design. But nothing requires that these features, or protocols, always continue the net as it always will be. We celebrate the “inherent” freedom of the net; the architecture of the net is changing from under us. The architecture is shifting from architecture of freedom to architecture of control. It is shifting already without government’s intervention, through government is quickly coming to see just how it might intervene to speed it up. Cyberspace is regulated by laws but not just by law. The code of cyberspace is one of these laws. We must come to see how this code is an emerging sovereign and that we must develop against this sovereign the limits that we must develop against this sovereign the limits that we have developed. LESSONS LEARNED: -

Cyberspace is regulated by laws but not just law. The code of cyberspace is one of these laws.

-

Sovereign will always say real space as well as cyberspace that limits and infancies bugs are not necessary.

-

Cyberspace is different.

-

Code and Market and Norms and law together regulate in cyberspace as architecture and market and norms and law regulate in real space

INTEGRATIVE QUESTIONS: 1. What are the laws of “cyberspace”. 2. What is meant by the word “cyberspace”? 3. What factors all together generates the law of cyberspace? 4. What are the real constraints? 5. Is cyberspace really different?

TITLE: Of Black Holes and Decentralized Law-Making in Cyberspace (Chapter 2.3) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The protocols of global network, like the neutral languages they so closely resemble, emerged from a process that was as it core unplanned and undirected. LEARNING EXPECTATIONS: -

I want to understand what Block Holes are.

-

I want to know Decentralized Lawmaking in cyberspace.

-

I want to understand what RBL is.

REACTION: There is community of people who spend their time thinking about law and policy in cyberspace. It is not always characterized in these terms; it reflects a conflict between competing visions of “order” and “disorder” in social systems. In this chapter, the author shares, the managers of MAPS (Mail Abuse Prevention System) create and maintain what they call the “Realtime Blackhole List” which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows “open-mail relay” or provides “spam support services”. The proliferation of unsolicited mass e-mailing operations is a series, or at least a non-trivial, one. E-mail has become an indispensable form of communication, of incalculable commercial and non-commercial importance for a substantial and ever-growing segment of the world community. Its value is being undermined by a barrage of unwanted and unsolicited communications. The MAPS operators propose a norm; a description of behavior that they consider is unacceptable. It allows open mail real systems or providing spam support services. They offer to serve as your agent in identifying those who are violating this norm. They offer to keep you inform of those identifications. The protocols of the global network, like the natural languages they so closely resemble, emerged from a process that was at its once unplanned and undirected. We can certainly point expose to many individuals and

institutions that played particularly important roles in its emergence, ex ante there was no one we could have pointed to as charged with creating the set of rules we now know as the Internet, anymore than we can point to anyone individual or institution charged with creating the set of rules for English syntax. The Internet functions well today are probably not viable over the long term. We should not wait for it to break down before acting. We should not move so quickly, or depart so radically from the existing structures, that we disrupt the functioning of the Internet. A “stable” Internet is one locked in place, incapable of generating innovative responses to the very problems to the very problems that it is itself bringing into existence. The very existence of the Internet should caution us against diminishing too quickly the notion that there are some problems that are best solved by these messy, disordered, semi-chaotic, unplanned, decentralized systems, and that the costs that necessarily accompany such unplanned disorder may sometimes be worth bearing. LESSONS LEARNED: -

I learned about the different topics about the incident, the explanation, the question and the debate.

-

I understand about the stable Internet which is a response in innovation.

INTEGRATIVE QUESTIONS: 1. What is it about regulating the net? 2. What is MAPS? 3. What is RBL? 4. What is CCITT? 5. What is ICANN’s?

TITLE: Fahrenheit 451.2: Is Cyberspace Burning? (Chapter 2.4) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: People from all corners of the globe-people who might otherwise never connect because of their vast geographical differences can now communicate on the internet both easily and cheaply LEARNING EXPECTATIONS: -

I want to learn the six reasons why self rating scheme are wrong for the internet.

-

I want to know what is rethinking the rush rate.

-

I want to learn the free speech online: a victory under siege.

-

I want to understand more about cyberspace burning.

-

I want to learn why blocking software should not be used by public libraries.

REACTION: In this chapter, Ray Bradbury describes a function society where books are outlawed. Fahrenheit 451.2 is the temperature at which books burn. People censor the printed word by burning books. In the virtual world, one can use just as easily censor controversial speech by banishing it to the farthest corners of cyberspace using rating and blocking programs. The White House called a summit meeting to encourage Internet users to self-rate their speech and to urge industry leaders to develop and deploy the tools for blocking “inappropriate” speech. Industry leaders responded to the White House call with a barrage of announcements: -

Netscape announced plans to join Microsoft. In adopting PICS (Platform for Internet Content Selection), the rating standard that establishes a consistent way to rate and block online content.

-

IBM announced it was making $100,000 grant to RSAC (Recreational Software Advisory Council) to encourage the use of its RSACi rating system.

-

Four of the major search engines announced a plan to cooperate in the promotion of “self-regulation” of the Internet.

-

Following the announcement of proposed legislation by Sen. Patty Murray which would impose civil and ultimately criminal penalties on those who mis-rate a site the Online Cooperative Publishing Act.

The Internet will become bland and homogenized. The major commercials sites will still be readily available. They will have the resources and inclination to self-rate and third party rating services will be inclined to give them acceptable ratings. It is a scenario has already been set in motion. These are the following scenarios: -

The use of PICS becomes universal.

-

One or two rating systems dominate the market and become the de facto standard for the Internet.

-

PICS and the dominant rating system are built into Internet software as an automatic default.

-

Unrated speech on the Internet is effectively blocked by defaults.

-

Search engines refuse to report on the existence of unrated or “unacceptably” rated sites.

-

Governments frustrated by “indecency” still on the Internet make self-rating mandatory and mis-rating a crime.

In this chapter, six reasons are given on why self-rating schemes are wrong for the Internet. These are the six reasons why self-rating schemes are wrong for the Internet: -

Self-Rating schemes will cause controversial speech to be censored.

-

Self-rating is burdensome, unwieldy and costly

-

Conversation cannot be rated.

-

Self-rating will create “Fortress America” on the Internet.

-

Self-rating will only encourage, not prevent, government regulation

-

Self-ratings schemes will turn the internet into a homogenized medium dominated by commercial speakers.

LESSONS LEARNED: -

I learned the six reasons why self-rating schemes are wrong for internet

-

I learn the problems with user-based blocking software at home

-

I become educated that blocking software should not be used by public libraries

INTEGRATIVE QUESTIONS: 1. Why Blocking of software should not be used by public libraries? 2. Is Cyberspace Burning? 3. What are the six reasons why self rating scheme are wrong for the internet? 4. Is third Party Rating the Answer? 5. What is ALA?

TITLE: Filtering the Internet in the USA: Free Speech Denied (Chapter 2.5) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Filtering or blocking software can be taken to be a mechanism used to restrict access to Internet content based on an internal database of the product, through a database maintained external to the product itself, to certain ratings assigned to host sites by a third party, by scanning content based on a keyword, phrase or text string or based on the source of the information. LEARNING EXPECTATIONS: -

I want to learn more about Filtering the Internet.

-

I want to understand more about Blocking in the Internet.

-

I want to learn more about Free Speech.

-

I want to expose more about librarians and Filtering Programs.

REACTION: Programs existed to control access at the local level, removing the need to place the burden on Internet Service Provider (ISPs). Filtering programs would largely be used in the privacy of one’s home, not in public institutions such as libraries and community centers. Filtering or blocking software can be taken to be a mechanism used to restrict access to Internet content based on an internal database of the product, through a database maintained external to the product itself, to certain ratings assigned to host sites by a third party, by scanning content based on a keyword, phrase or text string or based on the source of the information. According to this section, Rosenberg identifies two systems which are intended to first encourage, and later, require Websites and Newsgroups to rate themselves along a number of dimensions. These systems are RSACi (Recreational Software Advisory Council on the Internet) and PICS (Platform for Internet Content Selection). When a web search is undertaken, what is not returned is a product of the inadequacies of the search query, the search engine style, and the filtering software. Censorship is a constant companion. In this section, the National Coalition Against Censorship characterizes the problems associated with such programs as oversimplification, over breadth, feasibility, subjectivity, full disclosure and security.

Rosenberg shares that CLA (Canadian Library Association) issued a statement on Internet access in support of its existing position on intellectual freedom. The following are the two relevant points included as the CLA encourages libraries to incorporate Internet use principles into overall policies on access to library resources and to educate their publics about intellectual freedom principles and the role of libraries in facilitating access to resources in various forms of media. He also discussed about NCLIS (National Commission on Libraries and Information Science) recommends a number of potential solutions for dealing with a number of recognized “perils” and “policy issues” as the following goes: -

Separate terminals can be provided for adults and children.

-

Libraries can provide Internet training, education, and other awareness programs to parents and teachers.

-

Internet access terminals can be configures with software that can be turned on or off and restricts access to designated web sites or specific Internet functions.

If filtering software is going to be used, David Jones strongly suggests, according to Rosenberg, that the following conditions be included: -

The specific criteria for censoring web sites must be approved by the Library Board and made available to the public on request.

-

The implementation of this censorship must be in control of the library staff and not someone outside the company.

-

The black list of censored websites should not be a secret. It should be made available to the public on request.

-

There should be a procedure for members of the public to ask library staff to reconsider classifications of websites.

LESSONS LEARNED: -

I know the examples of Problems with blocking and filtering programs.

-

I understand the Mainstream Loudoun.

-

I identify the librarians and filtering programs

INTEGRATIVE QUESTIONS: 1. What is Free Speech?

2. What is Filtering? 3. What is blocking? 4. What is Librarian Association?

5. What are the filtering problems in the internet?

TITLE: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique (Chapter 2.6) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: When the law speaks universally, then a case arises on it which is not covered by the universal statement then it is right where the legislator fails us and erred by over simplicity to correct the omission –to say what the legislator himself would have said had he been, and would have put into his law if he had known LEARNING EXPECTATIONS: -

I want to know what is Censorship

-

I want to know what is Pornography and Child Pornography

-

I want to understand what is Child pornography Law

-

I want to know what is Censorship in the Internet

-

I want to know why it is that Child Pornography cases increases.

REACTION: In this chapter, Catudal discussed Child Pornography Prevention Act (CPPA) is an agreement over the proposition that children of protection against those who would exploit them by producing child pornographic materials is not sufficient to secure agreement over the means by which to provide protections. Catudal have three main objections that are presented against the CPPA. CPPA is so broad in its proscriptions as to violate the First Amendment rights of adults; the same protections made available to children. CPPA altogether fails to provide minors and their legal guardians with the privacy rights needed to combat the harms associated with certain classes of prurient material on the Internet. Technological advances in home computing and Congress failure to appreciate how prurient material may be accessed over the Internet combine with CPPA to wrongfully expose an increasing number of individuals to possible prosecution and personal ruin. Catudal distinguishes between censorship by suppression and censorship by deterrence. Both forms of censorship presuppose that some authorized person or group of persons has judged some text to be objectionable on moral, political, or other grounds and banned the text prohibited by law or decree any access to the text.

The difference bears on effecting the prohibition. Censorship by suppression effects the prohibition by preventing the objectionable material itself from being revealed, published, or circulated; it may do this by blocking the material, by removing the material to inaccessible archives or by destroying the material. Censorship by deterrence does not prevent material from being published; material may be quite available to all. The prohibition Is rather effected by threats of arrest, prosecution, conviction and punishments against those who would make objectionable material available and against those who would acquire it. The Act makes it a crime to knowingly send, receive, distribute, reproduce, sell or possess with intent to sell and makes it a crime to possess more than three child pornographic images. The Act greatly broadens the definition of child pornography to include entire categories of images that many would judge not to be child pornographic and that some would judge not to be pornographic at all. The sponsors of the Child Pornography Prevention Act don’t think the questions fundamentally important or relevant. Their contention is that the most effective way to protect children against the harms created by child pornography is to ban any material whose effect would be ‘to whet the appetites’ of child sexual abusers. LESSONS LEARNED: -

I become more familiar with the Child Pornography Prevention Act

-

I learned the different arguments presented by the author: Argument 1: CPPA Violates the First Amendment, Argument 2: CPPA’s protective are inadequate and Argument 3: CPPA can harm our children

INTEGRATIVE QUESTIONS: 1. What is Child Pornography? 2. What is Child Pornography act? 3. What is censorship? 4. What is Pornography? 5. Is child pornography be continued or not in the cloud?

TITLE: PICS: Internet Access Controls Without Censorship (Chapter 2.7) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Consumers choose their selection software and their label sources independently. This separation allows both markets to flourish: companies that prefer to remain value-neutral can offer selection software without providing any labels; value-oriented organizations, without writing software, can create rating services that provide labels. LEARNING EXPECTATIONS: -

I want to know what Flexible Blocking is.

-

I want to become familiar with what is PICS is all about

-

I want to learn what the Labels are.

-

I want to classify the uses of Labels

-

I want to know what is and what re the Label Reading Software

REACTION: The Internet now faces a problem inherent in all media that serve diverse audiences. Societies have tailored their responses to the characteristics of the media. Any rules about the distribution will be too restrictive from some perspective, yet not restrictive enough from others. PICS establishes Internet conventions for label formats and distribution methods while dictating neither a labeling vocabulary not who should pay attention to which labels. Not everyone needs to block reception of the same materials. There should be some way to block only the inappropriate material. Appropriateness is neither an objective nor a universal measure. It depends on the following three factors: 1. Supervisor – parenting styles management and government

differ,

as

do

philosophies

of

2. Recipient – what is appropriate for one fifteen year old may not be for an eight-year old 3. Content – a game or chat room that is appropriate to access at home may be inappropriate at work or school. There was no standard format for labels, so companies that wished to provide access control had to both develop the software and provide the

labels. Consumers choose their selection software and their label sources independently. This separation allows both markets to flourish: companies that prefer to remain value-neutral can offer selection software without providing any labels; value-oriented organizations, without writing software, can create rating services that provide labels. Information publishers can self-label provided that publishers agree on a common labeling vocabulary, self-labeling is a simple mechanism wellmatched to the distributed nature and high volume of information creation on the Internet. Third party labeling systems can also express features that are of concern to a limited audience. There are two PICS specification documents. The most important components are syntax for describing a rating service, syntax for labels, an embedding labels and the HTML document format, an extension of the HTTP protocol, and query-syntax for an on-line database of labels. PICS do not specify parents or other supervisors set configuration rules. One possibility is to provide a configuration tool. Labels can be retrieved in various ways. Some client might choose to request labels each time a user tries to access a document. PICS specifies very little about how to run a labeling service beyond the format of the service description and the labels. Rating services must make the following choices: labeling vocabulary, granularity, who creates the labels, coverage and revenue generation. LESSONS LEARNED: -

I understand what Flexible Blocking is all about.

-

I determine what PICS doesn’t Specify

-

I learned the uses of Labels

-

I determine the two PICS Specifications

INTEGRATIVE QUESTIONS: 1. What is PICS? 2. What are the specifications of PICS? 3. How do you make the internet better? 4. What is flexible blocking? 5. What are the ways to do flexible blocking?

TITLE: Internet Service Providers and Defamation: New Standards of Liability (Chapter 2.8) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The one ambiguity in all of this is the need to factor into our analysis of responsibility the difficulties and costs that are involved in preventing harm or rendering aid to someone else LEARNING EXPECTATIONS: -

I want to know what is and what are the Internet Service Providers

-

I want to know as well what Internet Defamation is.

-

I want to learn what the Legal Precedents are for ISP Liability.

-

I want to understand what is ISP.

-

I want to know does Cyberspace alter the need for libel laws.

REACTION: The complexity of multi-faceted issue precludes a comprehensive treatment of Internet defamation. We will thoroughly consider the scope of an Internet Service Provider liability for defamation in the realm of cyberspace. Liable means morally responsible or accountable in some fashion. Mandating ISP liability could have an unwanted chilling effect on free expression in cyberspace. Failure to require ISP’s to take adequate measures that will curtail liable is not conducive to civil discourse or the protection of private reputation. The Firs Amendment of the Constitutions guarantees freedom of speech and freedom of the press. Internet has been hailed for promoting uninhibited speech; there must be limit on speech even in cyberspace. Defamation, according to Spinello, is a communication that harms the reputation of another and lowers that person’s esteem in the eyes of the community. There are different standards of liability for distributing defamatory information depending upon the role one plays in the process. Under the standard of publisher liability, one who repeats or otherwise republishes defamatory material is subject to liability as if he had originally published it. Under the standard of common carrier liability, a common carrier has reason to know that defamation is occurring; it has no liability for defamatory remarks made by its customers.

ISP liability is one way in which the remarkable ascendancy of the Internet raises new challenges about the proper assignment of liability. Cyberspace defamation has provoked considerable confusion for the American legal system, as evidenced by the conflicting rulings set forth about ISP liability. Judges have handed down different rulings regarding ISP liability depending upon the level of editorial control that an ISP has exercised. In the first case discussed by Spinello, the court ruled that CompuServe was not liable for disseminating an electronic newsletter with libelous content. It would be difficult to screen out most libelous statements since they often consist of ordinary language. The ill-fated Communications Decency Act contains which grants broad immunity from liability to ISP’s that carry content generated by its subscribers. According to Raquillet, the main argument is that submitting ISP’s to distributor liability would mean that they would face the liability each time they were noticed of a potential defamatory statement, the investigation would be burdensome, and contradict the congressional intent to promote the development of the Internet. LESSONS LEARNED: -

I understand the Legal Definitions and standards.

-

Internet service providers and legal defamation.

-

I learned the legal precedents for ISP liability.

-

Cyberspace alters the need for libel laws.

INTEGRATIVE QUESTIONS: 1. What is ISP? 2. What is legal defamation? 3. What is ISP liability? 4. What is Service Provider? 5. What are the legal precedents for ISP liability?

TITLE: Digital Millennium Copyright Act (Chapter 3.1) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The one ambiguity in all of this is the need to factor into our analysis of responsibility the difficulties and costs that are involved in preventing harm or rendering aid to someone else LEARNING EXPECTATIONS: -

I want to be familiar with the Digital Millennium Copyright Act

-

I want to understand the section of the Digital Millennium Copyright Act

REACTION: No person shall circumvent a technological measure that effectively control access to a work protected under this title. The prohibition contained shall not apply to persons who are users of a copyrighted work which is a particular class of works or are likely to be in the succeeding 3year period, adversely affected by virtue of such prohibition in their ability to make noninfringing uses of that particular class of works under this title. No person shall manufacture, import, offer to the public, provide or otherwise traffic in any technology, product, service, device, component, or part thereof that is primarily designed or produced for the purpose of circumventing a technological measure that effectively control access to a work protected under this title, has only limited commercially significant purpose or use other than to circumvent a technological measure. And is marked by that person or acting in concert with that person with that person’s knowledge for use in circumventing a technological measure that effectively control access to a work protected under this title. In false copyright management information, it states that no person shall knowingly and with the intent to induce, enable, facilitate, or conceal infringement. In removal or alteration of copyright management information, it discussed that no person shall, without the authority of the copyright owner or the law. Copyright management information means any of the following information conveyed in connection in connection with copies or phone records of a work or performances or displays of a work, except that such term does not include any personally identifying information about a user of a work or of a copy. Limitation on liability of nonprofit educational institutions states that when a public or other non-profit institution of higher education is a service provider. In replacement of removed or disabled material and limitation on other liability, shall not apply with respect to material residing

at the direction of a subscriber of the service provider on a system or to which access is disabled by the service provider. Service provider is an entity, as defined in this chapter, offering the transmission, routing, or providing of connections for digital online communications of materials of the user’s choosing without modification to the content of the material as sent or received. Monetary relief means damages, costs, attorneys’ fees and any other form of monetary payment. LESSONS LEARNED: -

I become familiarized with the Public Law 105-304.

-

Understand the Sec. 103 Copyright Protection Systems and Copyright Management o

Definition in general

o

In details

INTEGRATIVE QUESTIONS: 1. What is Digital Millennium Copyright Act? 2. Explain the limitations on liability for copyright infringement. 3. Explain the limitations on liability relating to material online. 4. What does Sec 1201 states? 5. What does Sec 103 states?

TITLE: Note on the DeCSS Trial (Chapter 3.2) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The posting of the de-encryption formula is no different from making and then distributing unauthorized keys to the department store. LEARNING EXPECTATIONS: -

I want to know what DeCSS trial is.

-

I want to know how it is related to DMCA and Its Technical background.

-

I want to be familiar about the lawsuits about it and the outcomes of it.

REACTION: The DeCSS trial has tested the scope and constitutionality of the anticircumvention provision included in Section 1201 of the Digital Millennium Act. All DVDs contain digital information, and this allows copies of a motion picture contained on a DVD to be stored on a hard disk drive in the computer system’s memory to be transmitted over the Internet. They have been protected with an access control system that encrypts the contents. This system was developed by Matshusita Electric Industrial Co. and Toshiba Corporation. The DVD industry has adopted this standard. According to this chapter, Norway decided that he wanted to watch DVD movies on a computer that ran the Linux operating system. Cracking the code was not a major hurdle yet it becomes the birth of the DeCSS. According to this chapter, Jack Valenti states that “this is a case of theft. The posting of the de-encryption formula is no different from making and then distributing unauthorized keys to a department store. In this section, author shares, Kaplan issued a preliminary injunction prohibiting the defendants from posting DeCSS on their respective web sites. DeCSS simply preserves “fair use” in digital media by allowing DVDs to work on computer systems that are not running Mac or Windows operating systems. Consumers should have the right to use these disks on a Linux system, and this required the development of a program. The contention was that DeCSS existed to facilitate a reverse-engineering process that would allow the playing of movies on unsupported systems. The defense team received considerable support within certain segments of the academic community. Some scholars were particularly worried about the effect that would result from the injunction against

hyper linking. This brief also presented arguments supporting the defense view that DeCSS fits within the reverse engineering exception of the anticircumvention provision. This section presented that there are obviously much larger issues pertaining to the First Amendment and its apparent conflict with property rights. This case also epitomizes certain concerns about the DMCA law itself. This ruling itself appears to make it illegal for someone in an educational institution. LESSONS LEARNED: -

I have understood the technical background, the underlying lawsuit and its corresponding outcomes.

INTEGRATIVE QUESTIONS: 1. What is the DeCSS trial? 2.

What is the technical background of the DeCSS Trial?

3. What is the lawsuit in the trial? 4. What about the Lawsuit? 5. What is the actual outcome of the trial?

TITLE: A Politics of Intellectual Property: Environmentalism for the Net? (Chapter 3.3) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: One basic weakness in conversation system based wholly on economic motives is that most members of the land community have no economic value. When one of these non economic categories is threatened, and if we happen to love it, we invent subterfuges to give it economic importance…it is painful to read those circumstances today. LEARNING EXPECTATIONS: -

I want to know more what Intellectual property is.

-

I want to understand if it is environmental for the Net

-

I want to know the logic of Information Relation

-

I want to determine the conceptual structure of an intellectual landgrab.

-

I want to know the tension in an intellectual property system

REACTION: Boyle, in this article, argues that we need a politics or perhaps a political economy of intellectual property. Everyone says that the ownership and control of information is one of the most important forms of power in contemporary society. The information society exists yet with a surprisingly little theoretical work. Cyberpunk science fiction succeeded as a genre largely because it combined a particular plot aesthetic with a particular conceptual insight. There have been conferences over the use of the dangers posed by disparate in particular. They are isolated applications to a new technology of a familiar political worldview or calculation of self-interest. One of the root problems is a conceptual one. The economic analysis of information is beset by internal contradiction and uncertainty; information is both a component of the perfect market and a good that must be produced within that market. Information is supposed to move towards perfection. Information must be commodified so as to give its producers an incentive to produce. The Net is the anarchic, according to Boyle, decentralized network of computers that provides the main locus of digital interchange. Its

distressing tendency to misstate, minimizes, or simply ignores contrary cases, policy, and legislative history, and its habit of presenting as settled. The White Paper wants to give expansive intellectual property rights because it believes that this is the best way to encourage private companies to fund construction of the information super highway. The White Paper not only illustrates the pervasive power of baseline fallacies in information economics, it also shows how the original author vision down plays the importance of fair use and thus encourages an absolutist rather than a functional idea of intellectual property. Decisions in a democracy are made badly when they are primarily made by and for the benefit of a few stakeholders. The fundamental aporia in economic analysis of information issues, the source-blindness of an “original author” and the political blindness to the importance of the public domain as a whole all come together to make the public domain disappear. LESSONS LEARNED: -

I understand the logic of the information relation

-

Intellectual property is the legal form of the information age

INTEGRATIVE QUESTIONS: 1. What is Intellectual property? 2. What the logic of information relation? 3. What is the analogy to environmentalism? 4. What is the tension in an intellectual property system? 5. What is the analogy to environmentalism?

TITLE: Intellectual Property, Information and the Common Good (Chapter 3.4) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Intellectual property is an odd notion, almost an oxymoron. Property usually refers to tangible assets over which someone has or claims control. The intellectual property in a book is the arrangement of words that the ink marks on the paper represent. LEARNING EXPECTATIONS: -

I want to know more about Intellectual property.

-

I want to understand more about also information and common good.

-

I want to know “a more balance view”

-

I want to determine the philosophical justification for intellectual property.

-

I want to identify as well intellectual property.

REACTION: Intellectual property is an odd notion, almost an oxymoron. Property usually refers to tangible assets over which someone has or claims control. The intellectual property in a book is the arrangement of words that the ink marks on the paper represent. Intellectual property has always been closely tied to technology. Technology arises from intellectual property in the form of new inventions. Computer technology has created a new revolution in how intellectual property is created, stored, reproduced and disseminated with that revolution has come new challenges to our understanding of intellectual property and how to protect it. The types of claims asserted over intellectual property have been many and diverse. The following cases give some ideas of the diversity of such claims: 1. Plagiarism – Students will often take all part of a article or essay that they have located online and hand it in as their own work with or without additions or modifications of their own. Plagiarism has been a problem for a long time but the easy access to vast amounts of electronic information dramatically increases the possibilities and the temptation.

2. Software Piracy – The system was set up so that anyone on the Internet could post a copy of program which was then available for downloading for free by anyone who chose to do so. 3. Repackaging Data and Databases – There has been much debate recently about whether databases and the data in them should receive more protection than currently afforded by copyright law. 4. Reverse Engineering – Computer software never runs in isolation. It has to interact with hardware, with operating systems, and with other applications. It is often a necessity for reliable software design. 5. Copying in Transmission – The Internet uses a so-called “store and forward” architecture. The copying of messages in transit is automatic and transparent. The purpose of these intellectual works is to be communicated and shared. Not databases or automobile designs but knowing the purpose of information tells us something very important about the purpose, or the virtue, of information producers. LESSONS LEARNED: -

I learned the conflicts over intellectual property: Five Cases

-

I know the philosophical justification for intellectual property

INTEGRATIVE QUESTIONS: 1.

What is an intellectual property?

2.

What is Information?

3. What are the conflicts over intellectual property? 4. What are the philosophical justifications for intellectual property? 5. Why is intellectual property important for the common good?

TITLE: Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the United States (Chapter 3. 5) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: “The issue before thoughtful people is therefore not the maintenance or abolition of private property, but the determination of the precise lines along which private enterprise must be given free scope and wherein it must be restricted in the interests of the common good.” LEARNING EXPECTATIONS: -

I want to know what the rights are.

-

I want to determine how rights arise.

-

I want to determine theories of intellectual property and copyright.

-

I want to know the history of copyright in United States.

-

I want to determine if copyright is ethical or not

REACTION: In revising the Copyright Act in 1909, Congress stated that the rights of copyright holders were solely created by government grant and had no other basis. It would seem then that copyright law was created by the government as instrument of policy. Policy is usually based on a choice of preferred outcomes and that choice may be based on considerations other than the moral or the ethical. This paper examines the relationship between intellectual property rights and ethics, focusing for the most part on copyright. The focus in on two key questions: what is the relationship between ethics and copyright law and practice in the United States and is the concept of private ownership of intellectual property inherently ethical. These questions are important because access to overwhelming number of elements of daily life is now controlled by intellectual property law. The author shares Waldron elaborates right theories as being of two kinds, those based on some perceived intrinsic quality or on some value that a society wishes to achieve. He argues that rights cannot be discussed without considering the topic of political morality which may be based on rights, duty or goals. The traditional legal basis for property is discussed by Cohen, according to Warwick, who defines property rights as the relationship

between individuals in reference to things. He asserts that the owners of all revenue producing property are granted the power to tax the future of social product. Four approaches to the development of private property are presented such as occupation, labor, and personality and economic. Another detailed discussion of property and rights is presented by Waldron who poses two questions: what individual interests are served by the existence of private property and are any of these interests so important from a moral point of that they justify a government duty to protect them. Waldron examines utilitarian arguments for private property which are based on the concept that society will benefit more if material resources are controlled by individuals than if they were controlled by the state or the community as a whole. LESSONS LEARNED: -

I learned the theories of intellectual property and copyright

-

I become knowledgeable with the history of copyright in the United States.

-

I determine the different Limitations and Ethical manner of copyright

INTEGRATIVE QUESTIONS: 1. What is a copyright? 2. What are the rights of copyrighting? 3. What is the origin of copyright? 4. What are the theories of intellectual property? 5. What is history of copyright in the US?

TITLE: On the Web, Plagiarism Matters More than Copyright Piracy (Chapter 3.6) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Through the routine gathering of information about transactions, consumers preferences, and creditworthiness, a harvest of information about an individual’s whereabouts and movements, tastes, desires, contacts, friends, associates and patterns of work and recreation become available in the form of dossiers sold on the tradable information market, or is endlessly convertible into other form of intelligence through computer matching. LEARNING EXPECTATIONS: -

I want to know more about plagiarism.

-

I want to determine the relation between plagiarism and copyright piracy.

REACTION: According to this chapter, piracy is the infringement of a copyright, and plagiarism is the failure to give credit. They are confused because the most common examples of these wrongs involve both sorts of wrongs. But it is not hard to give examples that separate them. It would be plagiarism but not piracy for me to take the works of an obscure 19th century poet and try to pass them off as my own. The issue of copyright on the web has received considerable attention and plagiarism per se is largely ignored. The copyright owner suffers from loss of the revenue that is customarily paid for permission to copy. In this section, Snapper discussed, the obvious candidate for plagiarism harm is the author who receives no credit. But it is hard to see what harm that author may have suffered. A possible loss of potential reputation is hardly sufficient grounds for the ethical indignation that academics express over incidents of plagiarism. Another point stretched by the author that I agree is with his observation that copyright shows concern for the owner rather than the user and it is only a starting point for a study of the issues regarding copyrights in web publication. Our copyright policies are legal conversations that establish the relevant notion of property. The argument is that a shift from hard-copy publication to Web-based publication creates a new economic environment in which slightly weakened copyright protections can still provide an adequate economic incentive for the publication industry.

Snapper enumerates three important qualifications to the presented argument. These are the three important qualifications for the argument stated above: 1. Personal impression that the majority of legal scholars propose strengthened, rather than weakened, intellectual property protections for electronic publication. 2. The present paper seems to echo a generally unconvincing argument presented by Beyer which argues that changes in technology lowered the cost of publication to the point that most copyright protections were no longer needed to encourage publication. 3. Copyright policy has a myriad of social utilities. Its intended utility is that copyright policy is to promote the progress of science and the useful arts. LESSONS LEARNED: -

Piracy is the infringement of a copyright.

-

There are three important qualifications to the argument with a Webbased publication which creates a new economic environment.

INTEGRATIVE QUESTIONS: 1. What is piracy? 2. What are the harmful effects of plagiarism? 3. What is the use of copyright? 4. What are the uses of copyright? 5. How does the threats involved in the free-riding technique in copyright law?

TITLE: An Ethical Evaluation of Web Site-Linking (Chapter 3.7) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The World Wide Web has grown in popularity; the propriety of linking to other web sites has achieved some prominence as an important moral and legal issue. Hyperlinks represent the essence of Web-based activity, since they facilitate navigation in a unique and efficient fashion involved. LEARNING EXPECTATIONS: -

I want to know more about plagiarism.

-

I want to determine the relation between plagiarism and copyright piracy.

REACTION: According to Spinello, World Wide Web has grown in popularity; the propriety of linking to other web sites has achieved some prominence as an important moral and legal issue. Hyperlinks represent the essence of Web-based activity, since they facilitate navigation in a unique and efficient fashion involved. He shares that this paper will allow us readers to explore the issue of deep linking from a distinctly moral vantage point. It raises a plethora of complex property issues with subtle moral implications and it deserves a careful scrutiny. It concerns the appropriate scope of property rights for a web site and how those rights can be properly balanced against the common good of free and open communications on the web. A link is a connection within the same web site or between two different web sites. This practice becomes known as ‘deep linking’. The hyperlink text itself can appear in many forms. It can be the name of the linked to web site or a description of what is to be found at the website. In this section, it introduce that there are two types of link which are the HREF and IMG. An HREF is a link that instructs the browser to locate another website and provide its contents for user. An IMG is a link that instructs to a browser to enhance the text on the user’s web page with an image contained in a separate file. Having established that a web site is really property, we consider the specific rights implied by such ownership. We conclude that on the basis of those rights, a prima facie case can be made that because of the potential for negative effects, users should not presume that deep linking is acceptable unless they first seek out the permission of the target web

site. We also fully appreciate the dangers inherent in exploring the web and the need to encourage the most flexible forms of linking. The resolution of the normative one does have the deep thoughts have tended to know the one of the World Wide Web, and for the intentions that do seek with the reality that had been allowed with the three theories that they had encountered: (1) utilitarianism, (2) the locking or labor-desert theory (3) the personality theory. LESSONS LEARNED: -

I understand the different issues and problems that spread related web site.

-

I learned the theories that encountered in the World Wide Web.

INTEGRATIVE QUESTIONS: 1. How does Web Site Linking become harmful for target web sites? 2. What is the right to manage in the Web Site Linking 3. What is the meaning of the right to income? 4. What is Web Site as an Intellectual Property? 5. What are the factors in respecting the Common Good in the Web Site Linking?

TITLE: The Cathedral and the Bazaar (Chapter 3.8) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Given enough eyeballs, all bugs are shallow. LEARNING EXPECTATIONS: -

I want to understand a more knowledge about hacking concept.

REACTION: As this first part, obviously it gives us an idea on what the book is all about. This chapter shows the different things that can be observed in the book during the entire reading. The topics covered are all about the information technology: quickly evolving, open source: be resourceful, computer software and hardware: build by great developers around the world and the digital age: forming a new industry in the information technology department. It also discusses the hackers which if you define is a person who is proficient at using or programming a computer; a computer buff (dictionary.com). It discusses what the different branches that a typical programmer has are. It encompasses the culture, tribe, activities done and objectives. As stated in the book, it will eventually discuss reasons and prove something, supported by collections attached, to any readers who will be interesting to this topic. I am looking forward to continue enjoying reading this book as Mr.Pajo shared to us, how lucky we are that we are now given opportunity to read it and have knowledge regarding this kind of topic where in we ca establish a good deed in ourselves especially in our industry today This book is a “must” for anyone who is interested in the future of the industry of information technology or computers, quick development is observed. It includes different concepts with the earlier years when computer technology was been popular to the world. I am glad reading this book because this book is presented in a simple words which can easily been understood and can be related by anyone in any means. I also want this because it simply proves that hacking is not really bad but there are some benefits from this. Hacking is done over the internet through open source. Lots of sources can be used and improved. I am really in the opinion that hacking is good. I do not think that open source is bad because especially in our class, IS-EBIZ, we are really hacking through the different ways such as download the source code or use the web developer plug-ins and a lot

more. We are encouraged to do this to be more challenged to improve what definitely exists today. I am not really a good hacker and do not like hacking but after reading this chapter I am encouraged to be more challenged in this side because of there is a lot of idea to prove on. LESSONS LEARNED: -

I learned the different issues and problems that spread related web site.

-

I can determine the theories that encountered in the World Wide Web.

INTEGRATIVE QUESTIONS: 1. What is POP means? 2. When is rose not considered as a rose? 3. What was Linux style of development? 4. How does pop client becomes fetch mail? 5. What are the six lessons in this chapter as enumerated?

TITLE: Towards a Theory of Privacy for the Information Age (Chapter 4.1) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: An individual or group has normative privacy in a situation with regards to others if and only if that situation the individual or group is normatively protected from intrusion, interference, and information accessed by others LEARNING EXPECTATIONS: -

I want to know what Greased Data is.

-

I want to understand about what is Grounding Privacy.

-

I want to learn the nature of Privacy.

-

I want to determine the setting and adjusting policies from private situations.

-

I want to learn more the theory of privacy for the information age.

REACTION: According to Moor, Ethical problems involving computing, probably none is more paradigmatic than the issue of privacy. In this article it argues that most individual appreciate the easy access of computerized data when making reservations, using automatic teller machines, buying new products to the web, or investigating topics in computer databases. We all know that when information is computerized, it is greased to slide easily and quickly to many ports of call. This makes information retrieval quick and convenient. But legitimate concerns about privacy arise when this speed and convenience lead to improper exposure of information. Greased information is information that moves like lightning and is hard to hold on to. He added that the greasing information makes information so easy to access that it can be used again and again. Computers have elephant memories – big, accurate, and long term. The ability of computers to remember so well for so long undercuts a human frailty that assists privacy. We humans forget most things. Most short term memories don’t even make it to long term memory. Once information is being captured for whatever purpose, it is greased and ready to go for any purpose. In computerized world we leave electronic foot prints everywhere, and data collected for one purpose can be resurrected and use elsewhere. The problem of the computer privacy is to keep proper vigilance on where such information can and should go.

Moor discussed that For the most part the need for privacy is like good art, you know it when you see it. But sometimes our institutions can be misleading and it is important to become as clear as possible what privacy is, how it is justified, and how it is applied in ethical situations. LESSONS LEARNED: -

Some cultures may value privacy and some may not.

-

The transmission of knowledge is essential for the survival of every culture, but it is not the same knowledge that must be transmitted.

-

The core values allow us to make trans-cultural judgment.

-

The core values are the values we have in common as human beings.

INTEGRATIVE QUESTIONS: 1. What is Greased data? 2. What is Grounding Privacy? 3. What is the nature of Privacy? 4. What is the adjustment privacy? 5. What are Publicity principles?

TITLE: The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data (Chapter 4.2) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Data quality is the protection of the data subject’s reasonable expectations concerning the processing of data about him. LEARNING EXPECTATIONS: -

I want to know the directives on the question of further processing of personal data.

-

I want to know how to use personal data for a different purpose.

-

I want to determine the data protection and the philosophy of privacy.

-

I want to identify the channels for the flow of personal information.

-

I want to know as well the structures of rights in directives.

REACTION: According to the author, Elgesem, the Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and the free movement of such data is about to be implemented in the form of o national legislation all over the Europe. An analysis of this Directive is indispensable because the first aim of this paper is to contribute to the interpretation of the Directive; it is a contribution to the philosophical theory of privacy. Modern data protection legislation is a central that raises a whole of conceptual and ethical issues. This paper, according to Elgesem, here distinct parts. The first part turns out that an important part of the Directive’s structure of individual rights has to be brought to bear in order to answer question. In the second part is all about privacy which should be identified with the individuals control concerning the flow of personal information. In the last part are the ideas of Elgesem for a philosophical theory on individual rights in connection with the processing of personal data. The bulk of processing of personal data uses information that is already available as the result of other information processes. The Directive addresses question where it is stressed that all personal data must be

collected for specified, explicit, and legitimate purposes and not further processed in a way that is incompatible with those purpose. In this section, Elgesem stated, the two objectives identified which is to protect the fundamental rights and freedom of natural persons and in particular the right to privacy with respect to the processing of personal data and the protection is meant make the flow of personal information within the European community easier. It also illustrates the different channels for the flow of personal of information. These are the different channels which are the relationship between privacy and data protection in the directive, channels for the flow of personal information, data protection and the protection of privacy, the directive and the protection of channels. LESSONS LEARNED: -

Privacy a descriptive neutral concept denoting conditions that are neither always desirable and praise worthy, nor always undesirable and upraise worthy.

-

Privacy is not simply an absence of information about us in the minds of the other, rather it is the control we have over the information about ourselves.

-

In accordance with the directive, member states shall protect the fundamental rights and freedom of neutral persons and in particular right to privacy with respect to the processing of personal data.

INTEGRATIVE QUESTIONS: 1. What conditions is it legitimate to process personal data are collected from the different purposes? 2. What is Data Protection? 3. What is the Philosophy of Privacy? 4. What it is about the Channels for the flow of the personal information? 5. What is Data Quality?

TITLE: Privacy Protection, Control of Information, and Privacy-Enhancing Technologies (Chapter 4.3) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Privacy is not simply an absence of information about us in the minds of others, rather it is the control we have over information about ourselves. LEARNING EXPECTATIONS: -

I want to know more the Theory of Privacy.

-

I want to understand the Role of Control in the Theory of Privacy.

-

I want to determine the similarities and difference about the Normative Privacy and the Restricted Access Theory.

-

I want to know how to use the Control in the Justification and Management Privacy.

-

I want to know Privacy in enhancing Technology.

REACTION: The present study is organized into two main parts: the theory of privacy which defends a version of the restricted access theory of privacy, according to Moor, and the pricy –enhancing technologies which considers the role of the privacy. In our private lives we wish to control information about ourselves. We wish to control information that might be embarrassing or harm us. And we wish to control information that might increase our opportunities and allow us to advance our projects. The notion of privacy and the notion of control fit together. Privacy is the main claim of the individuals, groups or institutions to determine for themselves when, how to what extent information about them is communicated to others. According to the book to have a personal view about personal property is to have the ability to consent to the dissemination of personal information. Control of personal information is extremely important as, of course is privacy. But these concepts according to the book are more useful when treated as separable, mutually supporting concepts than as one. Individual control of personal information on the other hand is part of the justification of privacy and plays a role in the management of privacy. Privacy and control do fit together naturally, just not in the way people often state.

Virtually all societies establish normatively private situations, zones of privacy, which limits access to people or aspects about them under certain conditions. The details of these normatively private situations vary somewhat from cultures but they are intended to protect individuals and foster social relationships whether the individuals have control in the situations or not. Normative privacy needs to be distinguished from natural or descriptive privacy. Simply being alone doesn’t provide sufficient claim to right to privacy anymore than having the right to privacy can guarantee privacy as matter of fact. The concept of privacy is defined in terms of restricted acces. Control has a central role in the justification and management of privacy. One practical payoff in making this distinction is that one can resist the temptation to think that because one has increased privacy. LESSONS LEARNED: -

The adequacy of PETS can be challenged in terms of their technological effectiveness or on the basis of their security and public policy implications.

-

PETS provide users with control over their own information.

-

PETS offer users choices about what information they wish to release.

-

PETS give us increased control but it remains an open question whether privacy is increased.

INTEGRATIVE QUESTIONS: 1. What is the Role of Control in the Theory of Privacy? 2. What is Normative Privacy? 3. What is Restricted Access Theory? 4. What exactly are PETS? 5. Why are PETS appealing?

TITLE: Toward an Approach to Privacy in Public: Challenges of Information Technology (Chapter 4.4) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: At the heart of the concern to protect ‘privacy’ lies a conception of the individual and his or her relationship with society. The idea of private and public spheres or activity assumes a community in which not only does such a division make sense, but the institutional and structural agreements that facilitate an organic representation of this kind are present. LEARNING EXPECTATIONS: -

I want to know Privacy and the Personal Realm Background

-

I want to determine how privacy is being violated in public.

-

I want to know the Two Misleading Assumptions.

-

I want to determine the Implication for a Theory of Privacy.

-

I want to analyze the case study about Lotus Marketplace.

REACTION: According to the author, Nssenbaum, this article highlights a contemporary privacy problem that falls outside the scope of dominant theoretical approaches. Many influential approaches to privacy emphasize the role of privacy in safe guarding a personal intimate realm where people may escape the prying and interference of others. The idea that privacy functions to protect the integrity of a private or intimate real spans scholarly work in many disciplines, including legal, political and philosophical discussion of privacy. Privacy is important because it renders possible important human relationships. Privacy provides the necessary context for relationship which we could hardly be human if we had to do without-the relationships of love, friendship and trust. Privacy as control over all information about oneself, according to Fried defended a moral and legal right to privacy that extends only over the far more limited domain of intimate or personal information. The danger of extending control over too broad spectrum of information is privacy may then interfere with other social and legal values. According to Fried the important thing is that there is some information which is protected, namely information about the personal and intimate aspects of life. According also to him, the precise content of the class of protected information will be determined largely by social

and cultural convention. Prevailing social order designates certain areas, intrinsically no more private that other areas, as symbolic of the whole institution of privacy, and thus deserving of protection beyond their particular importance. The author shares assumptions stands in the way of an adequate concept of privacy which are there is a realm public information about persons to which no privacy apply and an aggregation of information does not violate privacy f s parts, taken individually, do not. Intimacy simply could not exist unless people had the opportunity for privacy. Excluding outsiders and resenting their uninvited intrusions are essential parts of having an intimate relationship. LESSONS LEARNED: -

Privacy is the condition of not having undocumented personal knowledge about one possessed by others.

-

Parent means fact which most person in a given society choose not to reveal about them or facts about which a particular individual is acutely sensitive.

-

A person’s right to privacy restricts access by others to this sphere of personal, undocumented information unless, in any given case, there are other moral rights that clearly out weight privacy.

INTEGRATIVE QUESTIONS: 1. What is Privacy and Personal Real Background? 2. What are the Two Misleading Assumptions? 3. What is the view of Schoeman, Fried and Gertein? 4. Who is Raymong Wak? 5. What is the Case of Lotus Marketplace is all about?

TITLE: KDD, Privacy, Individuality, and Fairness (Chapter 4.5) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: At the heart of the concern to protect ‘privacy’ lies a conception of the individual and his or her relationship with society. The idea of private and public spheres or activity assumes a community in which not only does such a division make sense, but the institutional and structural agreements that facilitate an organic representation of this kind are present. LEARNING EXPECTATIONS: -

I want to know Privacy and the Personal Realm Background

-

I want to understand how Privacy is being violated in public.

-

I want to know the Two Misleading Assumptions.

-

I want to know the Implication for a Theory of Privacy.

-

I want to internalize and analyzed the case study about Lotus Marketplace.

REACTION: In this chapter it discusses the personal data as often considered to be the exclusive kind of data eligible for protection by privacy law and privacy norms. Personal data is commonly defined as data and information relating to unidentifiable person; on the protection of the individuals with regard to the processing of personal data and on the free movement of such data. Personal data should only be collected for specified, explicit, legitimate purposes and should not be further processed in away incompatible with these purposes. No excessive data should be collected, relative to the purpose for which the data is collected. Moreover the data should be accurate and, if applicable, kept up to date. Every reasonable step must be taken to ensure that inaccurate or incomplete data is either rectified or erased. A personal data should be kept in a form that permits identification or data subjects for no longer than is necessary for the purpose for which the data were collected. Another point stretched by Vedder is with the application of the narrow definition of personal data and the protective measures connected to that definition of KDD process is not without difficulties. Of course, as long as the process involves personal data in the strict sense of data relating to an identified or identifiable individual, the principles

applying without reservation; once the data has become anonymous, or has been processed and generalized, an individual cannot exert any influence on the processing of data at all. The rights and requirements make no sense regarding anonymous data and group profile. In the later part of this chapter it discusses that the data used and the profiles created do not always qualify as personal data. Nevertheless, the ways in which the profiles are applied may have a serous impact on the persons from whom the data was originally taken or, even more for the matter to whom the profiles are eventually applied. LESSONS LEARNED: -

Individual is judged and treated on the basis of his, coincidently, belonging to the wrong category of persons.

-

Data can be processed and profiles can be produced.

-

Categorical privacy is strongly connected with individual privacy.

-

Most conceptions of individual privacy currently put forward in law and ethical debate have on feature in common.

INTEGRATIVE QUESTIONS: 1. What is KDD? 2. What is Personal Data, law and Ethics? 3. What is Categorical Privacy? 4. What are Social Consequences? 5. What are the Solutions according to this chapter?

TITLE: Data Mining and Privacy (Chapter 4.6) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Devised by computer scientist David Chaum, these techniques prevent the dossier society in which computers could be used to infer individuals’ life styles, habits, whereabouts, and associations from data collected in ordinary consumer transactions can have a chilling effect causing the people to alter their observable activities LEARNING EXPECTATIONS: -

I want to know more about Data Mining.

-

I want to learn more about Knowledge Discovery.

-

I want to know analysis conducted about this chapter.

REACTION: According to Fulda, as he discussed, Knowledge Discovery using data mining techniques differs from ordinary information retrieval in that what is sought and extracted mined – from the data is not explicit in the database. Fulda defines data mining as the most easily accomplished when the data are highly structured and available in many different forms at many different levels in what are known as data warehouse. The data warehouse contains integrated data, both detailed and summarized data, historical data, and metadata. According to this chapter, points are clarify such as much of the current concerns about privacy arise because of data mining and more generally, knowledge discovery. In traditional computer science terms, data is uninterrupted, while knowledge has a semantics that gives it meaning. While the data stored in databases are not truly uninterrupted, the old legal rule that anything put by a person in the public domain is not legally protected served well when the data was not mined so as to produced classifications, clustering, summaries and profiles, dependencies and links and other patterns. And so non of the cases according to this book involved technology, but sifting through a stack of magazines, an archives, or a stack of letters to find associations between two data and an individual are all pretechnological forms of data mining, and they are all improper.

Another point stretched by Fulda is that technology cannot make right what is otherwise wrong, so such data mining is indeed, a violation of privacy; if data about the individual is mined and implicit knowledge about him is discovered, an appropriation occurred, and further disclosure should not be permitted. LESSONS LEARNED: -

Data Mining is most easily accomplished when the data are highly structured and available in many different forms at many different levels in what are known as data warehouse.

-

Much of the current concerns about privacy arise because of data mining and more generally, knowledge discovery. In traditional computer science terms, data is uninterrupted, while knowledge has a semantics that gives it meaning.

INTEGRATIVE QUESTIONS: 1. What is Data Mining? 2. What are the Issues about Data Mining? 3. What is the Analysis about Data Mining? 4. What are the benefits of Data Mining? 5. What is the connection between Data Mining and Privacy?

TITLE: Workplace Surveillance, Privacy and Distributive Justice (Chapter 4.7) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Surveillance is no longer an ambiguous tool for control and social certainty, not it is merely a weight that weighs down on the employee rather it’s logic and its effects has become increasingly difficult to see clearly and distinctly. LEARNING EXPECTATIONS: -

I want to know the reason why Privacy as a Matter of Justice

-

I want to understand what is Resisting Workplace Surveillance

-

I want to be familiar with what is Distributive Justice all about.

-

I want to know the connection between Workplace Surveillance, Privacy and Distributive Justice.

REACTION: According to this chapter, Surveillance has become a central issue in our late modern society. The surveillance of the public spaces by closed circuit television, the surveillance of consumers through consumers surveys and point of sale technology, and workplace surveillance, to name but a few. And so as surveillance increases, more and more questions are being raised about its legitimacy. Surveillance often functions as resource for the execution off power, and power is the most effective when it hides itself. Introna points out the issue of the lack of legislation in other countries would also indicate that it would be reasonable to conclude that workplace monitoring is still largely viewed as a right of employers with the burden of proof in the employee to show that it is invasive, unfair and stressful. It would seem that a legal correction in the imbalance of power is not likely to be forthcoming in the near future. There is also accumulating evidence that surveillance of individuals lead to stress, a lost of sense of dignity and a general environment of mistrust. Introna believes that Surveillance is no longer an ambiguous tool for control and social certainty, not it is merely a weight that weighs down on the employee rather it’s logic and its effects has become increasingly difficult to see clearly and distinctly. Surveillance, with modernity has lost its shine. In this chapter there is a view or related privacy which states that privacy is no means an uncontroversial issue; we have to select what to survey and most importantly, we have to select how to value what we

find in our surveillance. Surveillance is an important part in computer technology. LESSONS LEARNED: -

Surveillance is no longer an ambiguous tool for control and social certainty, not it is merely a weight that weighs down on the employee rather it’s logic and its effects has become increasingly difficult to see clearly and distinctly.

-

The collective needs to use data collected to coordinate and control the activities of the individuals for the good of the collective.

-

Self-interested individuals would not always to use resources, allocated by the collective, for the sole purpose of furthering the aims and objectives of the collective.

INTEGRATIVE QUESTIONS: 1. What is Workplace Surveillance? 2. What is Distributive Justice? 3. What is Privacy as a matter of justice? 4. What are the two major trends to create the background for our contemporary discussion of workplace surveillance? 5. Why Surveillance become the central issue in our late modern society?

TITLE: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace (Chapter 5.1) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: When true computer telephony arrives, we may need to reexamine our proposed definition of computer crime. LEARNING EXPECTATIONS: -

I want to know what the Boundaries of Computer Crime is. I want to measure if we really need a category of computer crime. I want to understand what Descriptive categories of computer crime are. I want to know the three types of computer crime. I want to examine why computer crime as a descriptive category crime.

REACTION: Tavani, author of this section, says even though concerns about crimes involving the use of computer technology have received considerable attention in the popular press as well as in certain scholarly publications, the criteria used by the news reporters, computer ethicist and legal analyst for determining what exactly constitutes a computer crime has been neither clear or nor consistent. In this chapter he observed based on concerns raised by Gotterbarn and other critics, we can reasonably ask whether having a separate category of computer crime is necessary or even useful. It is perhaps also worth noting that some critics have pointed out that crimes of diverse types are committed in many different sectors, but we don’t have separate categories for crimes committed in each of those areas. So it would certainly seem reasonable for these critics to ask why we need a separate category of crime for criminal acts involving computer technology. Arguments for having a category of computer crime can be advanced from least three different perspectives: legal, moral and information and descriptive. We consider arguments for each, beginning with a look at computer crime as a separate legal category. From a legal perspective, computer crime might be viewed as a useful category for prosecuting certain kinds of crimes. At the outset, one might reasonably ask what the value would be in pursuing questions about computer crime from the point of view of a descriptive category. We can also see then, why our existing laws and policies are not always able to extend to cover adequately at least certain kind of crimes involving computers. LESSONS LEARNED:

-

-

Software Piracy is by using computer technology to produce one or more authorized copies of propriety computer software, distribute unauthorized software or make copies of that software available for distinction over a computer network. Electronic Break Ins is by using computer technology to gain unauthorized access. Computer Sabotage is by using computer technology to unleash one or more programs.

INTEGRATIVE QUESTIONS: 1. 2. 3. 4. 5.

What is Computer Sabotage? What is Software Piracy? What is Electronic Break Ins? What are the three types of computer crime? Do we need a Category of Computer Crime?

TITLE: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic (Chapter 5.2) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Through the routine gathering of information about transactions, consumers preferences, and creditworthiness, a harvest of information about an individual’s whereabouts and movements, tastes, desires, contacts, friends, associates and patterns of work and recreation become available in the form of dossiers sold on the tradable information market, or is endlessly convertible into other form of intelligence through computer matching. LEARNING EXPECTATIONS: -

I want to know more what Hacktivism is.

-

I want to know what Civil Disobedience is.

-

I want to understand what is Hacktivist Ethic.

-

I want to become what is Cyber Terrorism.

-

I want to understand what is Civil Disobedience.

REACTION: In this era of global commerce via the internet, strikes against the hegemony of bureaucratic capitalism and the commercialization of the internet will inevitably be carried out in the World Wide Web. Numerous reports in the popular press have portrayed the hackers as vandals, terrorist and saboteurs, yet no one seems to have considered the possibility that this might be the work of electronic politician activist or hacktivist. Through an investigation of hacktivism, this essay seeks to make clear the growing tensions between the cooperative and liberal ideology of the originators of the “electronic frontier”, speaking in the name of social justice, political decentralization, and freedom of information, and the more powerful counteracting moves to reduce the internet to one grand global “electronic marketplace”. According to the author, Civil Disobedience entails the peaceful breaking of unjust laws. It does not condone violent or destructive acts against its enemies, focusing instead on nonviolent means to expose wrongs, raise awareness, and prohibit ht implementation of perceived unethical laws by individuals, organizations, corporations or governments.

Symbolic acts of civil disobedience are accomplished by drawing attention to a problem indirectly. Sit-ins and other forms of blockade and trespass are examples of symbolic acts of civil disobedience. Every technology affords opposing possibilities towards emancipation or domination, and information technology is no different. The new information technologies are often portrayed as the utopian promise of total human emancipation and freedom. Hacktivist prioritize freedom of information and are suspicious of centralized control over, or private ownership of information. Hackers questions why a few corporations can own and sell huge databases of information about the others, as well as control information helpful to the public at large. Hacktivism is in its infancy, but, given the ubiquity and democratizing possibility of the internet, we will certainly bear witnesses to the movement’s growing pains and increasing maturity. In order for hacktivism to become a legitimate form of social protest, it must be provided sound ethical foundations. This, in turn, means expanding the ethical justification of civil disobedience to include acts of hacktivism. LESSONS LEARNED: -

Hacktivism is defined as the (sometimes) clandestine use of computer hacking to help advance political causes.

-

Access to computers- and anything that might teach you something about the way the world works- should be unlimited and total. Always yield to the Hands- On Imperative

INTEGRATIVE QUESTIONS: 1. What is Electronic Civil Disobedience? 2. What is Hacktivism? 3. What is Cyberterrorism? 4. What is Hacktivist Ethic? 5. What is the connection Disobedience?

of

Hacktivism

and

Electronic

Civil

TITLE: Web Security and Privacy: An American Perspective (Chapter 5.3) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise of thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances. LEARNING EXPECTATIONS: -

I want to know more Web Security.

-

I want to undertsnad what is the American Perspective about Web Security and Privacy.

-

I want to learn more about cryptographic.

-

I want to determine the different amendments of the states.

REACTION: In this section, the author discussed, American legal tradition focuses on a right to privacy, rather than a need for data protection. Yet illuminating Web privacy of this particular perspective throws a broader light on how the fundamental rights of speech, assembly and freedom of religious inquiry may depend upon electronic privacy in the information age. The confusion between the privacy and security remains with many in the computer security community. Privacy requires security, because without the ability to control access and distribution of information, privacy cannot be protected. But security is not privacy. Security can be used to limit privacy by preventing the subject of information from knowing about the compilation of information, or to violate privacy by using data in ways in which do not coincide to the subject’s wishes. Integrity means that information is not altered. Information has integrity during the transmission if the recipient can be certain that the information was not altered in transit. Integrity means that what is received is exactly what sent. Hash function compress information was. Cryptography secure, collision-free hash functions provide the ability to verify information without exposing it. Cryptographically secure hash functions compress information to unpredictable values. Collision free hash functions compress data into unique hash values. In public key cryptography there are two keys. Anything encrypted with one key can only be decrypted with the other key. One key is held secret, shared with

no one. The other key is widely publicized. Public key cryptography sometimes called asymmetric cryptography. The right of people to be secure in their persons, houses, papers, and effects, against unreasonable sources and seizures, shall not be violated and no warrants shall be issue, but upon probable cause, supported by oath or affirmation, and particularly describing the placed to be searched, and the persons or things to be seized. No person shall be held to answer for a capital, or otherwise infamous crime, unless a presentment or indictment of a grand jury, except in cases arising in the land or naval forces, or in the militia, when in actual service in time of war or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use. LESSONS LEARNED: -

A system that maintains availability while under attack exhibits survivability.

-

Systems with survivability exhibit graceful degradation in the face of attacks.

-

False light is the publication of information that is misleading, and thus shows an individual in a false light.

INTEGRATIVE QUESTIONS: 1. What is ISP? 2. What is IP? 3. What are you doing on the web? 4. What is the difference between privacy and security? 5. What is anonymity?

TITLE: The Meaning of Anonymity in an Information Age (Chapter 5.4) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Even where fragments of information do not lead to information that is uniquely identifying, people may be identified with a high degree of probability when various properties are compounded to include a smaller and smaller set of individuals who satisfy them all LEARNING EXPECTATIONS: -

I want to know how Anonymity works in the information age.

-

I want to understand if Anonymity is good in all aspect.

-

I want to determine how it benefits society.

REACTION: The natural meaning of Anonymity as may be reflected in ordinary usage or a dictionary definition is of remaining nameless, that is to say, conducting oneself without revealing one’s name. a poem or pamphlet is anonymous when attributable to a named person, a donation is anonymous when the name of the donor is withheld, people strolling through a foreign city are anonymous because no one knows who they are. Information technology has made it possible to trace people in historically unprecedented ways. We are targets of surveillance at just about every turn of our lives. In transactions with retailer, mail-order companies, medical caregivers, day-care providers, and even beauty parlors, information’s about us is collected, stored and analyzed, and sometimes shared. Our presence on the planet, our notable features and momentous milestones, are dutifully recorded by agencies of federal, state, and local government, including birth, marriage, divorce, property ownership, driver’s licenses, phone number, credit card numbers, social security number, passport number, level of education and more, we are described by age, hair color, eye color, height, quality of vision, purchases, credit card activity, travel, employment and rental history real estate transactions, change of address, ages and numbers of children, and magazines descriptions. The power of information technology to extract or infer identity from misidentifying signs and information has been inventively applied by literary scholars to settling disputes and unraveling mysteries of authorship say to discover whether it was Shakespeare who wrote a given sonnet.

Anonymity may enable people to reach out for help, especially for socially stigmatized problems like domestic violence, HIV or other sexually transmitted infection, emotional problems or suicidal thoughts. It offers the possibility of a protective cloak for children, enabling them to engage in internet communication without fear of social predation or- perhaps less ominous but nevertheless unwanted- overtures from commercials marketers. The application that does such a thing or aids us for becoming more informed in other person’s every movement are different social networks especially Plurk. It keeps me posted with every update to my friends. I recently created an account just to see what the application is all about. As a purpose of knowing why my classmates are creating accounts and having too much fun and even I become addicted to it. LESSONS LEARNED: -

The value of anonymity lies not in the capacity to be unnamed, but in the possibility of acting or participating while remaining out of reach, remaining unreachable.

-

Being unreachable means that no one will come knocking on your door demanding explanations, apologies, answerability, punishment, or payment.

-

To secure the possibility of being unreachable, we need both to promote understanding and also pursue advocacy.

INTEGRATIVE QUESTIONS: 1. What is Anonymity? 2. What is the purpose of Anonymity? 3. What is the effect of Anonymity? 4. How does Anonymity works in info-age? 5. What is the Social Security System?

TITLE: Double Encryption of Anonymized Electronic Data Interchange (Chapter 5.5) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The power of information technology to extract or infer identity from non-identifying signs and information has been inventively applied by literary scholars to settling disputes and unraveling mysteries of authorship LEARNING EXPECTATIONS: -

I want to know what is Double Encryption.

-

I want to understand what does the title of this chapter implies.

-

I want to learn more about Anonymity.

-

I want to know what are the two main problems that needs to solve in order to keep GP, as a sender anonymized.

REACTION: We cut his electronic head by creating a Gatekeeper postbox that forwards all the incoming electronic data, thereby replacing the doctor’s address with its own address. Furthermore, collecting medical data electronically require, according to our moral institutions, some kind of encryption. To be sure that data are really sent by the sender and received by the receiver meant by the sender, the double encryption protocol is suitable and widely used. However, double encryption needs the sender identification in order to decrypt the message to the sender’s public key, but the sender’s identification was anonymized by the Gatekeeper postbox. To use double encryption for anonymized electronic communication, new requirements must be specified. The power of information technology to extract or infer identity from non-identifying signs and information has been inventively applied by literary scholars to settling disputes and unraveling mysteries of authorship -- say, to discover whether it was Shakespeare who wrote a given sonnet. These scholars infer authorship by comparing the stylistic and lexical features of anonymous text with the known style of authors whose texts have been analyzed along these same dimensions Our main data sources are therefore the persons who prescribe drugs. Using this post marketing surveillance as scientific method, we distinguish between two phases, the generation of a hypothesis and the evaluation

of the hypothesis. The assistant of the GP will make notes of the referrals to a specialist and of the treatment summary of the specialist in the patient record of the GP. In the Netherlands, the number of GP’s using Electronic Patient Records was growing rapidly from 1988. The central role of the Dutch GP enables us to follow individual patient. In order to transmit the data from the GP to the central database of IPCI, we use the edifact standard for electronic messages. Anonymization of the GP means only a randomized number and profession type are transmitted. The problem of replacing a sender’s identity can be done very easily by introducing an electronic postbox of the Gatekeeper. Instead of transmitting the messages from the GP to the ICPI postbox directly, the messages are now sent to the Gatekeeper’s postbox has only one function, forward every incoming message to the ICPI postbox so that the original sender is replaced by the new sender, the Gatekeepers identity. To encrypt an electronic message we chose a double encryption program with a secret and a public key. Instead of one key, used to encrypt and decrypt a message, two different keys are generated so that a message encrypted with one key is decrypted only with the other key and vice versa. We conclude that it is possible to automatically anonymize an electronic sender by the introduction of a Gatekeeper’s postbox. The possibilities of double encryption programs are demonstrated as a way to be sure about sender and receiver. LESSONS LEARNED: -

As soon as data are sent electronically, the sender’s identification is automatically added to the message. To anonymized the sender, an automatic process of replacing this identification must be implemented.

-

To decrypt an encrypted message, one must know the decryption key of the sender. However, when the sender is anonymized, it is impossible to select the right key. An automatic process of key-handling and decryption must also be implemented.

-

The Gatekeeper’s postbox intercepts the message, the sender identification is used to select the sender’s public key, and only then remove it from the message.

INTEGRATIVE QUESTIONS: 1. What is ICPI? 2. What is GP? 3. What is ERP? 4. What is Meduer format?

5. What is SOAP?

TITLE: Written on the Body: Biometrics and Identity (Chapter 5.6) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Biometrics is often described as `the next big thing in information technology'. Rather than IT rendering the body irrelevant to identity – a mistaken idea to begin with – the coupling of biometrics with IT unequivocally puts the body center stage. LEARNING EXPECTATIONS: -

I want to know Virtual Identities of Biometrics.

-

I want to understand why they are questioning the biometric body.

-

I want to determine the different buyers of biometrics.

REACTION: Generally speaking, biometric technology involves the collection with a censoring device of digital representations of physical features unique to an individual, like a fingerprint, pattern of the iris, the retina, the veins of the hand, physiognomic features, shape of the hand, or voice patterns, it may also include typical behavioral patterns like typing or writing a signature. If a matching template is found, the person presenting themselves is recognized and counts as known to the system. Major buyers of biometrics technology can be found in the private sector, particularly among corporations with high security interest and/or limited access areas like banks and nuclear plants, but an important impetus comes from governments and government-related departments and services catering to client populations of thousands, often millions of people. Public institution concerned with the distribution of welfare and child benefits, immigration and applications for political asylum, or the issue of passports and car licenses and increasingly looking towards biometrics in order to improve what are perceived as system threatening levels of fraud. Also, employers interested in keeping track of the whereabouts and activities of their employees, hospitals and insurance companies in the process of introducing electronic patient records are among the many interested parties. Moreover, with so many forces joining in a coordinated effort to make it succeed, biometrics can be expected to become one of the dominant ways for bodies and information systems to connect. In the process, the very notion of identity is being reconstructed in ways that are highly

relevant for the contemporary philosophical debate on the relation between the body, identity, and information technology. Biometrics is often described as `the next big thing in information technology'. Rather than IT rendering the body irrelevant to identity – a mistaken idea to begin with – the coupling of biometrics with IT unequivocally puts the body center stage. The question to be raised about biometrics is how bodies will become related to identity, and what the normative and political ramifications of this coupling will be. Unlike the body rendered knowable in the biomedical sciences, biometrics generates a readable body: it transforms the body's surfaces and characteristics into digital codes and ciphers to be read by a machine. LESSONS LEARNED: -

Biometrics requires a theory of identity that, unlike much of the available literature, takes the body and the embodied nature of subjectivity fully into account.

-

We need to investigate what kind of body is, by researching the practices and informational configurations of which the readable biometric body becomes part.

-

Only the former maybe at stake in biometrics, while the latter is taken to refer to something both authors perceive as true identity.

-

The biometrics is not just about as narrow an identity check as some authors maintain.

INTEGRATIVE QUESTIONS: 1. What is Biometrics? 2. What is the Identity of Biometrics? 3. What is the Virtual Identity of Biometric? 4. Who are the major buyers of biometric? 5. Why are they questioning Biometric Body?

TITLE: Ethical Considerations for the Information Professions (Chapter 6.1) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Morality could exist without ethics (if no one investigated how morality is done) but there cannot be ethics without morality (we cannot study morality unless there is morality)…. Morality is like eating; it is an inevitable part of everyone’s life. LEARNING EXPECTATIONS: -

I want to understand the different ethical considerations for the Information Professions

-

I want to learn the aspect of ethics in terms of information profession

REACTION: The field of information ethics is relatively new. The issues specific to information ethics, however, have certainly been with us for a longer time, yet continue to gain prominence and complexity in public discourse with the popularization of information and computer technologies. Information ethics bridges many disciplines, including library and information science, computer science, archival science, records management, informatics, educational media technologies, and more. According to Buchanan, the domain of information ethics comprises all of the ethical issues related to the production, storage, access and dissemination of information. Similar to the term computer ethics, information ethics reflects the meeting of the social, the technology, and the philosophical. Recognizing the importance of the ethical issues surrounding information assumes a critical role for information workers, librarians, or computer scientists alike. This chapter includes a brief introduction to the philosophical foundations of ethics and morality and an overview of basic principles of information ethics, describes particular issues and areas of particular concern to information professionals, and discusses codes of ethics for the information professions. An abbreviated resource list is included for additional information and sources. Ethics is generally defined as the philosophical study of moral behavior, of moral decision-making, or how to lead a “good life.” Ethics is the study of morality; the study of what we do. Morality could exist without ethics but there cannot be ethics without morality. Morality is like eating; it is an inevitable part of everyone’s life. Ethics, on the other hand, is like nutrition. It is crucial to living a good life but it is not an inevitable part of living or an activity engaged in by all.

Information ethics, much like the technologies that continue to contribute to its complexity, will thrive and present new challenges to all of us. Ethics will continue to be put through new tests as technologies race ahead of many social and cultural conventions and norms. In closing, information ethics must be understood as impacting each and every member of the “information society.” As such, each member must accept certain responsibilities and act accordingly. Information ethics, as with information literacy, must become integral to formal and informal education. The Kantian categorical imperative reveals promise, yet once again, as a guiding principle for the information age and as a critical tenet of information ethics. LESSONS LEARNED: -

Ethics is the study of morality; the study of what we do.

-

Information ethics must be understood as impacting each and every member of the “information society.”

-

The Kantian categorical imperative reveals promise, yet once again, as a guiding principle for the information age and as a critical tenet of information ethics

INTEGRATIVE QUESTIONS: 1. What is Information Profession had a great importance in our society. 2. How does philosophical study of moral behavior in the field of Information profession? 3. Identified the growth of ethical issues in Information Profession 4. What is the function of National Telecommunications and Information Administration 5. Who are the pioneers of American Library Association?

TITLE: Software Engineering Code of Ethics: Approved! (Chapter 6.2) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: In all these judgments concern for the health, safety and welfare of the public is primary; that is, the ‘public interest’ is central to this code. LEARNING EXPECTATIONS: -

I want to know the components of Software Engineering Codes.

-

I want to understand the different concepts in the Software Engineering Code.

-

I want to know how the Software Engineering Code has been approved.

REACTION: Software Engineering now has its own code of ethics. The code has been adopted by both the ACM and the IEEE-Computer Society, having gone through an extensive review process that culminated in the official unanimous approval by the leadership of both professional organizations. The preamble to the code was significantly revised. It includes specific ethical standards to help professional make ethical decisions. Ethical tensions can best be addressed by thoughtful consideration of fundamental principles, rather than blind reliance on detailed regulations. These principles should influence software engineers to consider broadly who is affected by their work; to examine if they and their colleagues are treating other human beings with due respect; to consider how the public, if reasonably well informed, would view their decisions; and to consider whether their acts would be judged worthy of the ideal professional working as a software engineer. The code emphasizes the professional’s obligations to the public at large. “In all these judgments concern for the health, safety and welfare of the public is primary; that is, the ‘public interest’ is central to this code.” The code contains a clause (8.07) against using prejudices or bias in any decision making. The code includes specific language about the importance of ethical behavior during the maintenance phase of software development. The purpose of developing a software engineering code of ethics is to document the ethical and professional responsibilities and obligations of software engineers. The code is unique in that it, unlike other codes, is

intended as the code for a profession and is distinctive in that it has been adopted by two international computing societies. The code contains eight principles related to the behavior of and decisions made by professional software engineers, including practitioners, educators, managers, supervisors, and policy makers, as well as trainees and students of the profession. 1. PUBLIC software engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest. 3. PRODUCT software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4. JUDGMENT software engineers shall maintain independence in their professional judgment.

integrity

and

5. MANAGEMENT software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. 6. PROFESSION software engineers shall advance the integrity and reputation of the profession consistent with the public interest. 7. SELF software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession. 8. COLLEAGUES software engineers shall be fair to and supportive of their colleagues. LESSONS LEARNED: -

Ethical tensions can best be addressed by thoughtful consideration of fundamental principles, rather than blind reliance on detailed regulations.

-

The dynamic and demanding context of software engineering requires a code that is adaptable and relevant to new situations as the Code provides support for software engineers and managers of software engineers who need to take positive action.

INTEGRATIVE QUESTIONS:

1. What are the eight principles that software engineer shall adhere. 2. What is a software engineer? 3. Who is the person who contributed by direct participation or by teaching fundamental principles? 4. What is the relation of client and employer in software engineer? 5. Does it have a great importance of the Code in the eight principles of a software engineer?

TITLE: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All (Chapter 6.3) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: The information age puts new emphasis on some parts of many older moral questions. The moral issues surrounding the development of weaponry are thus a few of the very many possible examples of how an older moral question can take on a new light as technology changes. LEARNING EXPECTATIONS: -

I want to know the reason why incomplete codes of ethics are worse than none at all.

-

I want to understand how an organization consider or treat a code of ethics.

-

I want to know when code of ethics considered incomplete is.

REACTION: Condemnation of an immoral act may be so highly distorted as to be absurd, or a highly immoral act may not be condemned at all, because the impacts that cause it to be considered immoral do not fit within the ‘PAPA’ formulation. Not all important moral issues in information technology can be put under the ‘PAPA’ headings. Accuracy of information systems may be of relevance in weapons systems, because inaccurate data or processing may cause the wrong target to be hit. The property issues raised by the production, existence and use of weaponry are important, but they are not the issues of intellectual property and ownership of networks. However the possibility that it might be used, destroying life as well as property, must be factored into the considerations in a very substantial way. Privacy and accuracy of computer data and information are issues essentially unrelated to the environmental impacts of computing. Property issues in computing will have two tangential relationships to the environment: The cost of software that respects legal intellectual property rights, being a significant portion of the cost of computing, tends to inhibit the increasing use of computers. But the possibility of a return on development costs induces software developers to produce software that requires computers with ever greater computing power, causing users to upgrade hardware far more frequently than wear-and-tear would require. Most of the moral issues related to teleworking are not, however privacy or access issues. Those issues that are not privacy or access issues

are not accuracy issues either, thought: The distance between the worker and the conventional workplace does not introduce significant additional accuracy issues. The privacy issue that most clearly accompanies telework is the possible automated collection of data on the employee by the employer. Any moral code (whether in computing or elsewhere)can be turned to by someone feeling pressures to find a relatively easy ‘way out’ of a morally tricky situation. Thus any moral code could be looked at in the hope that it will provide an excuse for potential immoral acts. Clearly, the more obviously relevant, and the more easily a code comes to hand, the more likely it is that it will be turned to. Further, as we shall see, some ethical codes are more open to such abuse than others are. Nonetheless, moral codes in all fields and sub-fields could be abused in this way if they leave themselves open to it. Codes should make it clear what their area of competence is(thus a code of computer ethics may make it clear that it will not cover questions of how income generated by using computers should be distributed) but in doing so, it must also make it clear that moral issues outside its area of competence are still moral issues, and ones that may be of greater importance than any covered in the code. Those who write moral codes (or things that could be mistaken for them) need to be aware of the possibility that they may be abused. Codes that address some issues but not others are very common, and particularly open to such abuse on issues at the edge of their competence. Code should make it clear what their area of competence is. More importantly, though, authors of code should always make it clear that their code is no substitute for careful moral consideration, and especially in areas or on questions where there is no clear guidance in the code. LESSONS LEARNED: -

Consequently, information and communication technology (ICT) has its effect in good ways and bad ways community life, family life, human relationships, education, careers, freedom, and democracy in the field of PAPA.

-

To avoid the criticism of incompleteness, it is not necessary for a code to be derived from a consistent set of fundamental ethical principles.

INTEGRATIVE QUESTIONS: 1. What does Privacy, Accuracy, Property and Accessibility related in the field of ICT? 2. What are the ethical issues in PAPA?

3. What is Richard Mason’s article title stands for? 4. What is the important telework issue? 5. What are the Four Ethical Issues of the Information Age?

TITLE: Subsumption Ethics (Chapter 6.4) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Act in such a way that it is possible for one to will that the maxim of one’s action should become a universal law. LEARNING EXPECTATIONS: -

I want to know what subsumption ethics is.

-

I want to learn the issues in subsumption ethics.

-

I want to understand the underlying concepts of subsumption ethics.

REACTION: The difference between computers and simple machine is the extent to which computer systems subsume design and development decisions over which users have little or no control. Subsumption ethics is the process by which decisions become incorporated into the operation of information technology (IT) systems, and subsequently forgotten. Subsumption is the process of building larger components from smaller ones. In computer systems, small components are developed and tested, and once they are working reliably they are subsumed into larger systems. This is the enabling technique of object-oriented programming. People tend to think that changes to software should be easy because programming is just a set of instructions, and not like a building made up of hard materials. The Greek word ethos, from which we derive “ethics,” can be translated as “habit.” Habit in general is a subsumption process. Design and implementation decisions dictate the structure and operation of systems. Systems ultimately operate according to many such decisions. The decisions become codified into programming code and information content. I call segments of this code and content “subsumed objects” (SOs). Design decisions often have ethical components, whether or not the designer is explicitly aware of them. 1. The impact of IT is determined by the operation of its subsumed objects; 2. Subsumed objects have a determinate moral values; 3. The ethical impact of an IT system is the responsibility of the people who designed, developed, and used it. There is a close organizational policy.

relationship

between

computer

systems

and

There are four axioms of subsumption ethics: A. Information systems subsume design, policy, and implementation decisions in programming code and content. Code segments and content become “subsumed objects.” B. Assumed objects have determinate moral value. C. Subsumed objects have a high “invisibility factor.” D. Subsumptive complexity increases over time. Subsumption ethics implies a need for continuous ethical analysis during systems design and development. The first is “the Golden Rule” found in the bible, in Kant’s categorical imperative, and many other world traditions. nThe second “the Golden Mean” as explicated by Aristotle. The Third is “action without desire or aversion” and comes from the philosophy of the east, both Buddhist and Hindu.The fourth principle is “ethical complexity.” Subsumption ethics suggests that ethical processes should be applied continuously during systems development. Impact analysis should be used by all the members of a project team, including users, management, systems architects, programmers, and project managers. The Golden Rule – Application of the golden rule means reviewing each stakeholder’s needs as decisions are made. While this process is timeconsuming, the result is more successful projects, since the completed systems have the respect of a broad constituency. The Golden Mean – Virtuous decisions require informed balance between extremes. The team must examine both the technical and ethical impacts of their decisions. Within this framework, ethical impacts become clear. Niskama Karma – Effective systems development should incorporate many perspectives. A democratic process of social negotiation, that should yield a distribution of responsibilities that is fair to all parties involved, and that satisfies the criteria of practicability, efficiency, and effectiveness. Complexity – Systems are complex, both in their operation and in their relationship to organizations. The overall complexity of a project can be determined by systematically applying SoDIS to the WBS and evaluating each task as a function of complexity, experience and knowledge. Areas of inexperience or insufficient knowledge should be addressed quickly and thoroughly. This process should be iterative as the project matures. Technology amplifies the actions of individuals, and subsumption ethics further describes the complex impacts of poor judgments in each of these cases. Complex systems have always failed---complexity itself makes such failures inevitable. Inattention to subsumption ethics makes them more likely. LESSONS LEARNED:

-

For the subsumption ethics and describes the four axioms of subsumption ethics, four ethical frameworks with roots of philosophical traditions are introduced, including the golden rule: the golden mean, nishaka karma and complexity

INTEGRATIVE QUESTIONS: 1. What is the process by which decisions become incorporated into the operation of Information Technology? 2. What is Information Technology? 3. What are the four ethical principles that have roots in antiquity • Golden rule • Golden mean • Action without desire aversion • Ethical complexity 4. What is Mahabharata which is a part of an ancient Hindu Text? 5. What do we call the third ethical principle?

TITLE: Ethical Issues in Business Computing (Chapter 6.5) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: Professionalism is a risk management strategy and in this subject the emphasis is on applying professionalism in the business context LEARNING EXPECTATIONS: -

I want to know how computer technology helps the business.

-

I want to understand the importance of ethical issues in business especially in terms of computer technology.

-

I want to learn the underlying concepts in ethical issues with regard to business computing.

REACTION: Essentially, computers are used in business to solve problems. As I have remembered in a seminar, a speaker defines Business and IT as this “Business is IT and IT is business. I became more interesting with the topic and simply defines that these two different entities have common undertaking to each other. Business, Legal and Ethical Issues is the first of the core subjects undertaken by Computer Professional Education Program (CPeP) students in their ongoing professional development. Professionalism is a risk management strategy and in this subject the emphasis is on applying professionalism in the business context. An individual manager, focused on use of a computer for the task in hand, may understandably lack specialist awareness of wider ethical issues Because of our new hi-tech technology; computer nowadays was very useful in many ways. It can also used in business. That is why there are so many businessmen that have the newest model of computer to use for their businesses. Nevertheless the overwhelming commercial advantages carried by use of modern computer systems, their power and distance from common human experience potentially carry considerable associated disadvantages, and for the relevant one does developed and maintained in appropriate business behavior. The business computing is by no means straightforward, one complication is that there is no one type of computer or computer system that must be used by business people, because the nature of properly designed computer systems is to change and adapt to specific needs.

The PC’s must allow for some generalization, and for the business computing even physically identical computers become quite different in appearance and use when dissimilar applications are employed. LESSONS LEARNED: -

All companies of whatever size should consider their use of computer systems.

-

I learned that the business cannot stand without IT as well as the IT cannot stand without the business.

-

I learned that that there is no one type of computer or computer system that must be used by business people

INTEGRATIVE QUESTIONS: 1. What is the smallest scale of business computing? 2. What level a business is if it is large enough to employ a designated computer specialist? 3. What is meant by level two in business computing? 4. What are the tasks of business computing? 5. What is the level where there will be at least one team of computer specialist?

TITLE: The Practitioner from Within: Revisiting the Virtues (Chapter 6.6) AMAZON LINK: http://www.amazon.com/s/ref=nb_ss_gw?url=searchalias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 QUOTATION: It is grounded in practical wisdom. It is experiential, learning to care about the self, others, the community, living the good life, flourishing and striving for moral excellence. It offers a model for the development of character and personal ethics which will lead to professional ethics. LEARNING EXPECTATIONS: -

I want to know the virtues with connection to the revisit.

-

I want to understand the concepts in the revisiting virtues.

-

I want to know the goal of this section in line with cyber ethics.

REACTION: In this chapter the author discusses that traditionally the study of computer ethics involves taking students who are not philosophically trained, exposing them to action-guiding theories, presenting them with the codes of ethics of several companies and professional organizations and asking them to make ethical decisions in scenario-based cases. It is difficult to get from youth up a right training for virtue if one has not been brought up under right laws; for to live temperately and hardily is not pleasant to most people especially when they are young. For this reason their nurture and occupation should be fixing by law. This approach is deliberately action-based and focuses on doing. " The traditional question asked to students. While this pedagogical methodology forces them to examine situations and argue from a particular point of view, it does little to influence their character and personality. They see the utilitarian or deontologist as someone other than themselves. Here seems to be very little internalization of these action-based theories. Virtue Ethics offers character-forming theory that has been more successful with my students than the action-based theories of computer ethics texts. Why? Virtue Ethics is directed toward character development. Virtue ethics offers character-forming theory that has been more successful with the students than the action guiding theories of computer ethics. One problem of novices in the field of ethics is for the reductionist in the moral theory underlying the compute ethics, and for the one whose vision of who are is too important to jettison. Personal intentions and dispositions guide actions, and people over it are being evaluated with this kind of virtues.

LESSONS LEARNED: -

In order to encompass with the reality that would deal with the examining the complex and novel one, and for the issues of computer technology, and for the one that for life and happiness for humans and includes other core .

INTEGRATIVE QUESTIONS: 1. What is meant by core values? 2. How the practitioner from within does revisited the virtues from within? 3. How the Imagination and Narrative Genre does take place? 4. What do Ethics mean? 5. Does Ethics and Morality take hand-in-hand in the field of the computer-mediated action?

Related Documents

Cyber Ethics + Bop
April 2020 10
Cyber Ethics
November 2019 32
Cyber Ethics Ellen
April 2020 7
Bop
May 2020 42
Bop
November 2019 46

More Documents from ""