Ethic Reader - Adnan Fortuna

  • Uploaded by: Andrew Adnan Fortuna
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ethic Reader - Adnan Fortuna as PDF for free.

More details

  • Words: 30,728
  • Pages: 155
ITETHIC ETHIC READER

BOOK REVIEWS ON CYBER ETHICS, HANDBOOK OF COMPUTER ETHICS AND FORTUNE AT THE BOTTOM OF THE PYRAMID

ANDREW ADNAN CASIO FORTUNA

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License.

http://creativecommons.org/licenses/by-nc-sa/3.0/ph/

1

TABLE OF CONTENTS

CYBER ETHICS……………………………………………………………………….3 (Chapter 1-21)

HANDBOOK OF COMPUTER ETHICS……………………………………………46

FORTUNE AT THE BOTTOM OF THE PYRAMID……………………………….…98

CYBER ETHICS………………………………………………………………………99 (Chapter 22-44)

2

CYBER ETHICS CHAPTER 1-21

3

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Ethics and the Information Revolution Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Computing Technology is the most powerful and most flexible technology ever devised. For this reason, computing is changing everything- where and how we work, when and how we learn, shop, eat, vote, receive medical care, spend free time, make war, make friends, make love. Learning Expectation: I expect to learn the profound meaning of Ethics. I also expect to learn the deeper meaning of Information Revolution and how important it is. Book Review: This chapter talks about the concept of Information Revolution and the importance as well. To start off, I would like to define what Information Revolution is. According to Business Dictionary, Information Revolution is defined as the development of technologies (such as computers, digital communication, microchips) in the second half of the 20th century that has led to dramatic reduction in the cost of obtaining, processing, storing, and transmitting information in all forms (text, graphics, audio, video). In other words, Information Revolution is the time wherein gadgets and other computer devices grew that helped mankind through innovation. It helped us people hasten work process, lessen workloads and minimize human errors. Without this gadgets or computer devices, we might not develop as a country or develop as a human being as well. The importance of Information Revolution is that, it awakened the people that life can be lived a bit easier. That there are things out there that we people can use it to our advantage. I guess, without Information Revolution happened, we might be sticking our asses out there, pushing as hard as we can just to squeeze out a small amount of juice. But since Information Revolution happened, that small amount of juice turned out to be a barrel-full. What I learned: I learned the significance of Information Revolution. I learned that this helped a lot of people in our everyday lives.

4

Integrative Questions: • • • • •

What is Information Revolution? When did it happen? Did it play a major role in the society? What did it do to help the people? Is it that important to learn Information Revolution?

5

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Ethics Online Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Information can be reproduced on-line without loss of value and in such a way that the originator or holder of the information would not notice. Of course, in the ordinary world, information can be reproduced via copying machines and camera. In electronic networks, however, there is no loss of value in the process of reproduction. A copied program or copied data set is perfectly usable, and the reproduction can be such that there is no evidence that copying has been done; that is, the person who created or owns the information has no reason to believe it has been copied. The difference here is the difference between taking a painting – the painter or owner no longer has the painting and can see that it is gone – and copying a data set – the creator or the owner still has the data set and may have no indication that a copy was made. Learning Expectation: I expect to learn what the book meant about Ethics Online. I also expect to learn about the issues that aroused from Ethics Online. Book Review:

This chapter talks about how ethics can be applied on the Internet. What I meant, was this chapter discusses the critical issues that are present online. I am a person who was introduced to the computer at an early age. Though encyclopedia were still present when I was starting my research during elementary and secondary education, my parents opted to let me become familiar with the computer and the World Wide Web because they believe that since the world is become more developed and developed, it is better to let me know these things (World Wide Web and the computer itself) so that I would not get left behind. Because that, I am a person which is not a library person. I rather search the net than wasting my time going to the library, search for the item I need among thousands of books and read it. For me, going to the library consumes a lot of time if you are just going to search for something. But I am not saying that going to the library is a bad idea. What I am saying is that, in my opinion, it is much better to look for what you are suppose to look for in the internet rather than going to the library.

6

But this chapter sees a thing that needs ethical thinking. This chapter points out that online information might be hazardous since it might be misleading. It might hand out wrong information. What I learned: I learned that even going online has its issues also. I learned that online information might be misleading and might hand out wrong information. Integrative Questions: • • • • •

What is Ethics Online? What are the issues that are present? Does this have to do with information? What is diminished trust? What is anonymity?

7

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Reason, Relativity and Responsibility in Computer Ethics Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: We are entering a generation marked by globalization and ubiquitous computing. The second generation of computer ethics, therefore, must be an era of “global information ethics.” The stakes are much higher, and consequently considerations and applications of Information Ethics must be broader, more profound and above all effective in helping to realize a democratic and empowering technology rather than an enslaving or debilitating one. Learning Expectation: I expect to learn what the book meant about Reason, Relativity and Responsibility in Computer Ethics. I also expect to learn about the issues that aroused from Reason, Relativity and Responsibility in Computer Ethics. Book Review:

Obviously, this chapter talks about Computer Ethics and its reason, relativity and responsibility. To begin with, I would like to define what Computer Ethics is according to our trusted friend, Wikipedia. Computer Ethic is a branch of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct. The term "computer ethics" was first coined by Walter Manerin the mid-1970s, but only since the 1990s has it started being integrated into professional development programs in academic settings. The conceptual foundations of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. In other words, Computer Ethics is responsible for how professionals should think, act, and make decisions. I believe that the reason behind learning Computer Ethics is that, we people should learn how to live right. I saw this quote in a magazine wherein it said, “Learn to live, Live to learn.” I was amazed with this quote because as simple as it may seem, its meaning is deeper than the deepest ocean. Well, of course it is exaggerated but still, its meaning is very beautiful.

8

What I learned: What I learned in this chapter is that Computer Ethics is responsible for how professionals should think, act, and make decisions. Integrative Questions: • • • • •

What is Computer Ethics? What is the reason behind Computer Ethics? What does it do for professionals? What is the relativity of Computer Ethics? What is the responsibility of Computer Ethics?

9

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Disclosive Computer Ethics Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The world is very close to having technology that can provide electronic privacy and security on the Internet sufficient to safely conduct international business transactions. Once this technology is in place, there will be a rapid expansions of Global Cyberbusiness. Nations with a technological infrastructure is already in place will enjoy rapid economic growth, while the rest of the world lags behind. What will be the political and economic fallout from the rapid growth of global Cyberbusiness? Will accepted business practices in one part of the world be perceived as “cheating” or “fraud” in other parts of the world? Will a few wealthy nations widen the already big gap between rich and poor? Will political and even military confrontations emerge? Learning Expectation: I expect to learn what the book meant about Disclosive Computer Ethics. I also expect to learn about the issues that aroused from Disclosive Computer Ethics. Book Review: Honestly, when I first saw the title, closure already entered my mind. I was a bit puzzled because I thought that the book is almost finished. Kidding aside, this chapter talks about what Disclosive Computer Ethics is and how important Disclosive Computer Ethics. To start off, I would want to begin to delineate what Disclosive Computer Ethics is. According to Google, Disclosive Computer Ethics is a critique of mainstream computer ethics and argues for the importance of a complementary approach which is concerned with the moral deciphering of embedded values and norms in computer systems, applications and practices. In other words, Disclosive Computer Ethics entails people about the things that are not that relevant but we should be aware of. Like justice, economy, privacy and democracy. These are the things that are somehow relevant for a group of people but not that relevant for a majority of people, but still, these are facts that we should be aware of. What I learned: I learned that Disclosive Computer Ethics is somehow similar to a mainstream computer ethics because both argue for the opposite approach which is highly fretful with the basic concepts of computer systems and its applications. Integrative Questions: •

What is Disclosive Computer Ethics?

10

• • • •

Is it similar to a Mainstream Computer Ethics? What are their similarities? What is a Mainstream Computer Ethics? Does Disclosive Computer Ethics help a person out?

11

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Gender and Computer Ethics Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Secondly, feminist ethics brings a direct consideration of questions of power that are so often absent in traditional ethical theories. Utilitarianism argues for the greatest good for the greatest numer. But who is to decide whether one good is better that another? We do not all hae an equal say. Tnog (1993) argues that is it powerful groups, usually hite professional men, who are the decision makers in contemporary cost-benefit analysis. Questions of power are oftendisguised but they are crucial to the ethical decision making process. For instancve, it was noted above that in the empirical studies discussed., there is a disguised power relation between the uniersity teachers undertaking the surveys and the students who take part. This suggests that a study of problems relating to internet pornography and cyberstalking in terms of gender ethics might prove instructive. Issues power must be rendered visible to make these and other areas. Learning Expectation: I expect to learn what the book meant about Gender and Computer Ethics. I also expect to learn about the issues that aroused from Gender and Computer Ethics. Book Review: To be honest, I am already aware that there are Gender issues that are occurring in Computer Ethics. I was actually just waiting for it to come out. I know that there is such thing but I really wanted to know why and what are the gender issues that aroused. It is written that, Gender was a factor when it comes to computers during the early period. Women were deprived of helping out men decide, act or work with computers. Women are usually downgraded since before, women’s image was just for household purposes and nothing else. But now, women are very profound in the information industry. Most of the successful persons in the industry are women. They say that women have this gift that whenever they decide on something, they use their feelings more rather than their brains. I believe that this is what men lack. Men usually think outright whenever they decide on things. They do not care whether they might step on people. Men usually are goal-oriented types of people.

12

What I learned: I learned that Gender also is an issue when we talk about Computer Ethics. Women mostly are deprived of their skills since they are women. I learned that it is not right and as we all know, there are also a lot of women who are very successful. Integrative Questions: • • • • •

What does the chapter meant about Gender issues? What is the difference between ethical decisions and ethical processes? How does the woman do to decide? Usually, what type of person are men? Does gender really is a hindrance in performing a task?

13

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Is the Global Information Infrastructure a Democratic Technology? Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The claim that technology is value-neutral rested in part on the alliance between science and technology, with several ideas about science shaping ideas about technology. The presumption about science was that it is objective and that it progresses in a natural sequence or evolution. The unfolding of our knowledge was thought to be dictated by nature, not by society. New discoveries were thought to proceed and progress in a natural order. The same would be said about technology. Learning Expectation: I expect to learn what the book meant about the question, “Is the Global Information Infrastructure a Democratic Technology?” I also expect to learn about the issues that aroused from the question. Book Review:

To start off, I will first define what Global Information Infrastructure is. According to Wikipedia, Global Information Infrastructure is a global network of interconnected computers, enabling users to share information along multiple channels. Typically, a computer that connects to the Internet can access information from a vast array of available servers and other computers by moving information from them to the computer's local memory. The same connection allows that computer to send information to servers on the network; that information is in turn accessed and potentially modified by a variety of other interconnected computers. In other words, Global Information Infrastructure is also known as the Internet. This chapter holds up the question, “Is the Global Information Infrastructure a Democratic Technology?” From what I understood, Global Information Infrastructure or the Internet is a Democratic Technology, since people may have the freedom to express their ideas in the World Wide Web. People may also get those ideas there. In my knowledge about Democracy, which is democracy is equal to freedom, the Global Information Infrastructure or the Internet is a Democratic Technology. What I learned: I learned that the Global Information Infrastructure is also known as the Internet. I also learned that the Global Information Infrastructure or the Internet is a Democratic Technology.

14

Integrative Questions: • • • • •

What does Global Information Infrastructure mean? What is Global Information Infrastructure also known as? What is a Democratic Technology? Is GII a Democratic Technology? Why so?

15

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key Problems and Challenges Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: In the wake of the Enlightenment the emphasis in ethical theory has been for a long time on systems and rules. Almost invariably, these rules were derived from some supposed “ethically perfect world.” But ideal rules may workout very differently in (non-ideal) practice. That is, it may be the case that such a rule will give rise to gliding scales, e.g., “ethical” and “unethical” cases ate so hard to separate by observable criteria that it is better to forbid some cases that such a rule will give rise to gliding scales. Learning Expectation: I expect to learn how to apply ethical and moral concepts and theories to IT contexts. I also expect to learn the key problems and challenges they encounter. Book Review:

In this chapter, it talks about how a person may apply ethical and moral concepts and theories to IT contexts. It is written that there are three conditions in order to apply ethical and moral concepts and theories in IT context. First is that, we must know what kind of concepts and theories can be applied, and to what they cannot be sufficed. Second, we must know the limitations of specific concepts and theories. We must not force the issue in order for the limitations of the specific concepts and theories to be perfectly adequate and lastly, we must have sufficiently knowledge of the domain to which we want to apply them so that we will not lack specific information that is very vital in the topic. This chapter also talked about the problems that the Information Technology industry faces. An example of which is that, not all theories are applicable. Some theories are applicable to this context but unfortunately, not applicable for another context. This is a problem because there are few theories which apply to any Information Technology context. That is why it is a problem. I therefore conclude that theories and concept must most of the time, match in order for the Information Technology industry lessen their problems which they are facing. I am not saying that these problems will go away because problems are really there. We should face the fact that problems and

16

challenges are always present regardless of what industry you are in. You just have to deal with it. Lessen it as much as possible. Look for ways to minimize these problems. What I learned: I learned that there are three conditions in order to apply ethical and moral concepts and theories in IT context. I also learned that problems are present and should be dealt with. Integrative Questions:

• • • • •

How many conditions are there in order to apply ethical and moral concepts and theories in IT context? What are they? What are the problems the IT Industry faces? Are their ways for them to be lessened? Why is it necessary for the theories to match the IT context?

17

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Just Consequentialism and Computing Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The malleability of computers allows them to be used in novel and unexpected ways, ways for which we frequently do not have formulated policies for controlling their use. Advancing computer technology produces policy vacuums in its wake. And even when relevant policies do exist, they are often ambiguous or inadequate as they were designed for times with a less versatile technology than computing. A basic job of computer ethics is to identify this policy needs, clarify related conceptual confusions, formulate appropriate new policies, and ethical justify them. Learning Expectation: I expect to learn what Just Consequentialism and Computing meant. I also expect to learn the importance of both. Book Review:

I would start off by defining what Consequentialism mean. According to Wikipedia, refers to those moral theories which hold that the consequences of a particular action form the basis for any valid moral judgment about that action. Therefore Just Consequentialism is an act of underlying fair consequences to an action done by a person. From what I read and understood, this chapter talks about the fundamental ideology of ethical thinking that can be applied in our nature of business as an Information Technology related student. When we students get to the real world and face our future clients, we should always prioritize and consider what my clients what regardless of how hard or how weird they want their projects to be and just to comply with their requirements. The issue that I can foresee here is that the issue between you as the programmer or developer against the clients. Even though they have this “seems to be impossible” projects that they wants us to do, we should still comply with it. It is our job to do it. As what the saying goes, “customers is always right”, we actually have no choice but to follow them. We should set aside our feelings and wear the “game-on face” and start working on it.

18

What I learned: I learned that Just Consequentialism refers to those moral theories which hold that the consequences of a particular action form the basis for any valid moral judgment about that action. I also learned that we as programmers or developers must comply with what our clients want. Integrative Questions: • • • • • •

What is Just Consequentialism? What is computing? What is Consequentialism alone? Is Just Consequentialism considered as an approach? If yes, how come?

19

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: The Internet as a Public Space: Concepts, Issues and Implications in Public Policy Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: There has been much recent debate about what the internet really is – its role in society – as it rapidly moves from a pure academic interest into the public domain. Of particular internet when it comes to characterizing cyberspace is the way we look at the public services that are being created with the internet. Naturally, since the internet is part of the national and global telecommunications infrastructure, many tend to classify the internet’s services into traditional media types. One of the earlier voices in this debate (Camp and Riley, 1996) argues, however, that this classification hardly works well. In fact, previous work illustrates, using events at several universities that neither create protected spaces nor encourage open dialogue. A different model, based on treating virtual spaces as their physical counterparts, would better serve both the organizations and the individuals (Camp and Riley, 1996). We extend this work by focusing on the internet’s public spaces, and the threats and promises of mapping physical spatial models onto virtual space. Learning Expectation: I expect to learn the concepts, issues and implications of the internet as a public space. I also expect to learn the importance of all of them. Book Review:

I would begin by stating a simple definition of the Internet. According to Wikipedia, the Internet is a global network of interconnected computers, enabling users to share information along multiple channels. Typically, a computer that connects to the Internet can access information from a vast array of available servers and other computers by moving information from them to the computer's local memory. The same connection allows that computer to send information to servers on the network; that information is in turn accessed and potentially modified by a variety of other interconnected computers. A majority of widely accessible information on the Internet consists of inter-linked hypertext documents and other resources of the World Wide Web (WWW). In other words, the Internet is really a public space since anyone regardless of its age; neither race nor gender may able to use it just as long as they have the necessary equipment in doing so. The Internet is a very big help for everyone because the Internet is an

20

information gateway. It is an Information Gateway because people may retrieve information and provide information as well. Now a days, the Internet is not just for gathering Information. The Internet is also now used for socializing, selling, buying, etc. There are now social network websites that are present. Examples are: Facebook, Friendster, Multiply, and a whole lot more. For selling and buying, there are also entrepreneurial websites available. An example of which is E-Bay, Amazon, Entrepreneur, etc. What I learned: I learned that the Internet is a public space since anyone can use it just as long as that person has the right equipment. I also learned that the internet is an information gateway because a person can either provide information or get information in the web. Integrative Questions: • • • • •

What is the Internet? What are the concepts of the Internet as a public space? Is the Internet a public space? What are the ethical issues of the Internet as a public space? Does the Internet have different functions?

21

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: The Laws of Cyberspace Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: This is the age of the cyber-libertarian. It is a time when certain hype about cyberspace has caught on. The hype goes like this: Cyberspace is unavoidable, and yet cyberspace is unregulable. No nation can live without it, yet no nation will be able to control behavior in it. Cyberspace is that place where individuals are, inherently, free from the control of real space sovereigns. It is, in the words of James Boyles, the great techno-“gotcha” nations of the world, you can’t live without it, but nations of the world, when you’ve got it, you won’t long live with it. Learning Expectation: I expect to learn what the laws of cyberspace are. I also expect to learn the importance of these laws and how to apply it in my life. Book Review:

What is Cyberspace? Before I begin, I would first define what Cyberspace is. According to Wikipedia, Cyberspace is the global domain of electro-magnetics accessed through electronic technology and exploited through the modulation of electromagnetic energy to achieve a wide range of communication and control system capabilities. In layman’s term, Cyberspace serves as a passageway of bits of information that is being transferred in the internet. This chapter talks about the laws of Cyberspace. The article is saying that the laws of Cyberspace are very much important because this is what makes it organized. Without these laws, there will be a tendency that it will be chaotic. The laws serve as guidelines for online users. We should abide these laws so that the maintenance of the Cyberspace will still continue. What I learned: I learned that Cyberspace serves as a passageway of bits of information that is being transferred in the internet. Laws are very important when we talk about Cyberspace. We should always abide to these laws in order for it to become organized.

22

Integrative Questions: • • • • •

What is Cyberspace? What are the laws of Cyberspace? Are the laws important? How important are the laws? Is Cyberspace related to the Internet?

23

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Of Black Holes and Decentralized Law-Making in Cyberspace Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The task of identifying the alternative rule-makers for purposes of normative comparison is made even more difficult than this because cyberspace, having emerged from decentralized disorder – from the primordial ooze of the internet engineering task force – many well create conditions that the favour the growth of powerful centralizing forces. The state of Virginia will soon discover that its anti-spam statute has little effect on the amount of spam that its citizens receive, because while spam originating anywhere on the network can easily make its way into Virginia, spam originating elsewhere, i.e. outside of Virginia’s borders – is largely immune to Virginia’s control. The same will be true to a federal anti-spam statute (if such statute is enacted), just on a grander scale. We can already write the headline. Learning Expectation: I expect to learn what the book meant about black holes. I also expect to learn that this chapter will explain this thoroughly. Book Review:

I was shocked and amused at the same time when I first read the title. I was thinking how black holes are related in ethics. I was curious on what does the black hole symbolizes. After reading the book, I learned that the term “black hole” that was used in the title were the problems people face in cyberspace. There’s this story written in the article about Tom Field. Tom Field is a professor. Tom Field’s email address was listed in the RBL or the Real-time Black Hole List. Because of that, Tom Field was not allowed to send his personal emails to anyone since this RBL or the Real-time Black Hole List thinks that his email is a spam. Spam is an electronic mail which is considered as unwanted mail. In Yahoo! Mail, they enhanced their program by adding a feature wherein your spam mails are automatically re-directed in a folder named “spam”. With this kind of feature, you will not be anymore bombarded with spam mails in your inbox. The ethical issue that is really present here is whether this RBL or the Real-time Black Hole List is a beneficial thing or a harmful thing. Even though the intention of the RBL or the Real-time Black Hole List

24

is good which is preventing a person receive small mails firsthand, we cannot purely say that it is beneficial because like what happened to Tom Fields, he was not able to send even real emails because what the RBL or the Real-time Black Hole List thought that it is a spam mail. What I learned: I learned that there are still ethical issues that arise even in Cyberspace. I also learned that the RBL or the Real-time Black Hole List can prevent a person from receiving spam mails. Integrative Questions: • • • • •

What is RBL? What does RBL do? Is RBL an ethical issue? Why is RBL an ethical issue? What is a spam mail?

25

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Fahrenheit 451.2: Is Cyberspace Burning? Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The scenario is, for now, theoretical- but inevitable. It is clear that any scheme that allows access to unrated speech will fall afoul the government-coerced push for a family friendly internet. We are moving inexorably toward a system that blocks speech simply because it is unrated and makes criminals of those who mis-rate. Learning Expectation: I expect to learn what the book meant about Cyberspace is burning. I also expect that this topic id related to the problems that are occurring in the Cyberspace. Book Review:

I was interested when I saw the title. The question re-entered my mind. Is Cyberspace really burning? I immediately understood that what the chapter really meant. The chapter meant was that Cyberspace is burning because of the harmful sites that are present today. One of the harmful sites that is the most popular and widely-spread is Porn Sites. Now a day, there are Porn Sites which do not even need age verification. It is very open to anybody. Present day teenagers are most likely open to the Internet. With these kinds of harmful sites at hand to the public, Cyberspace might just literally burn up. To be honest, when I was under-aged, I myself, engaged with those kinds of sites. I was able to enter websites even though they have age verifications. I just fake my date of birth, and in an instant, you are inside the site. This is one of the big issues that Cyberspace is facing now. If you ask the majority about what they feel towards porn sites, most of them will tell you that it is completely wrong. But what about those who put up the sites themselves? What if they did that just to earn money to feed their family? That is why an ethical issue is present here. Are porn sites good or bad? If my opinion is to be asked, I would definitely say that Porn sites are not healthy in the Internet since many minors are engaged in the Internet. But what if I place myself in the people who develop porn

26

sites? Some of them are saying that it is not bad since the people who are in the porn sites was not forced to do it but is in their own liking. What I learned: I learned that harmful sites are the ones who cause big problems that the Cyberspace is facing. I learned that the most popular and widely spread harmful sites are the porn sites. Integrative Questions: • • • • •

Is the Cyberspace really burning up? What do they mean about the Cyberspace is burning? What are the harmful sites that cause problems in Cyberspace? Are porn sites, harmful sites? Is there an ethical issue on porn sites?

27

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Filtering the Internet in the USA: Free Speech Denied Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Thus, access criteria are preset by the product manufacturer and can be altered by the regular downloading of updates or even altered, for certain of the filters, by the active user. Not surprisingly, most users, especially busy parents, are likely to use the default criteria and therefore have minimal awareness of which sites and newsgroups are not accessible. Since blocking and filtering programs are commonly available, the focus of this paper will be on their use; however, also of importance, and potentially more dangerous, are rating programs, analogous to systems in place for movies and television. Two systems are intended to first encourage and later require websites and newsgroups to rate themselves along a number of dimensions for example includes nudity, sex, violence, and language. Browsers and search engines could then be programmed to return or access sites and newsgroups that satisfy a preset profile. The dangers associated with self-rating schemes will be discussed later in this paper. Learning Expectation: I expect to learn what the book meant about Filtering the Internet in the USA: Free Speech Denied. Book Review:

This chapter talks about filtering the internet in the USA. First, I would define what Web Filtering is. Web Filtering is the act of eliminating and controlling of restricted information that goes in the Web. I saw a soft ware named Content-control software wherein according to Wikipedia, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web. Content-control software determines what content will be available on a particular machine or network; the motive is often to prevent persons from viewing content which the computer's owner(s) or other authorities may consider objectionable; when imposed without the consent of the user, content control can constitute censorship. In other words, this software is used to control the content that enters the web. It also removes the restricted content. What I understand about the title is that, it is impossible for it to filter out the Internet of the United States of America because I guess it is the largest Internet user population in the whole world. Well, I

28

guess they chose to state United States of America in the title because in my opinion, America has the most number of people accessing restricted content. That is why it is written, “Free Speech Denied” in the title. It seems impossible to filter out the Internet of America. What I learned: I learned that filtering is a process wherein it cleanses out restricted content in the Internet. I also learned that there is software which is responsible for filtering out the contents in the Internet. Integrative Question: • • • • •

What is filtering? Is it beneficial? What is the name of the software that is responsible for filtering out restricted content? Is it impossible to filter out America? Why is there a need for filtering?

29

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: “When the law speaks universally, then, and a case arises in it which is not covered by the universal statement, then it is right, where the legislator fails us and has erred by over-simplicity, to correct the omission- to say what the legislator himself would have said he had been present, and would have put into his law if he had known.” Aristotle Learning Expectation: I expect to learn about Censorship, the Internet, and the Child Pornography Law of 1996. I also expect to learn its role in cyber ethics. Book Review: Pornography itself is bad enough for me but Child Pornography, this is out of hand. In the World Wide Web, Child Pornography is just around of every corner. What I mean is that Child Pornography is, as you all can see, is at almost in any pornographic website. Well, this chapter talks about how Censorship, the Internet, and the Child Pornography Law of 1996 may help lessen the wide-spread if Cyber Porn as I may call it. To start off, what is Censorship? According to Wikipedia, Censorship is the suppression of speech or deletion of communicative material which may be considered objectionable, harmful or sensitive, as determined by a censor. In other words, Censorship serves as a tool in removing or filtering out potentially harmful information based on what the censor thinks. In this chapter, Censorship plays the role as the one who filter outs the Pornography that is available in the World Wide Web. The Internet here, the tool used to deliver out Pornography. It was served as a bridge in order for the people to view or engage themselves with harmful sites and lastly, the Child Pornography Law of 1996 are for the people who are hard-headed and still will not abide the law.

30

What I learned: I learned that people from the Porn Industry are not contented of what they already popularized, which is porn, but they took it to the next level by endorsing Child Pornography. I learned that there is a law about Child Pornography and people from the Porn Industry must abide to this law. Integrative Questions: • • • • •

What does Censorship mean? What is the Child Pornography Law of 1996? What is the role of Censorship? What is the role of the Internet? What is the role of the Child Pornography Law of 1996?

31

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: PICS: Internet Access Controls Without Censorship Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: On the Internet, we can do still better, with richer labels that reflect diverse view points, and more flexible selection criteria. PICS, the platform for internet content selection, establish internet conventions for label formats and distribution methods while dictating neither a labeling vocabulary nor who should pay attention to which labels. It is analogous to specifying where on a package a label should appear, and in what font it should be printed, without specifying what is should say. Learning Expectation: I expect to learn what PICS is. I also expect to learn what Internet Access Controls Without Censorship is and if it important. Book Review: To start off, I will first explain what PICS is. It is written in the article that PICS is a compatible software that can implement selective blocking in various ways. First way is that, to build it into the browser on each computer, as announced by Microsoft and Netscape. Secondly, one used in products such as CyberPatrol and SurfWatch – is to perform this operation as part of each computer’s network protocol stack and lastly, is to perform the operation somewhere in the network, for example at a proxy server used in a combination with a firewall. To summarize it all up, PICS is responsible for protecting online users from accessing harmful sites. Can administrators of the World Wide Web censor all the harmful sites that are present in the World Wide Web? Well, I guess not. Some people always manages to put harmful sites in the web even though it is filtered already, some place nasty ads on wholesome sites just to advertize their harmful sites. Some even use applications just to inform the public about that site. What I learned: I learned that PICS is a compatible software that can implement selective blocking in various ways according to the text given. I also learned that there are 3 ways to implement selective blocking. I

32

also learned that not every harmful site are being filtered out by the administrators of the World Wide Web since many people still manages to insert their unpleasant sites for marketing purposes. Integrative Questions: • • • • •

What is PICS? What can PICS do? What are the various ways to implement selective blocking? What is selective blocking? Can every pornographic site in the Internet be filtered out?

33

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Internet Service Providers and Defamation: New Standards of Liability Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The one ambiguity in all of this is the need to factor into our analysis of responsibility the difficulties and costs that are involved in preventing harm or rendering aid to someone else. What are the limits of responsibility in cases like this one? How much time and money should ISP’s be expected to spend on investigating allegations of defamation? These are pertinent questions with no easy answers. However, I would argue that while it will be somewhat costly to take these investigative steps promptly and efficiently, economic feasibility does not seem to be issue at this point unless the incidence of defamation in cyberspace reaches epidemic proportions. The critical importance of protecting private reputation must be weighed against the modest cost of post-screening. Learning Expectation: I expect to learn what Internet Service Providers are. I also expect to learn Defamation. I also expect to learn the importance of both. Book Review: Let me begin by providing a definition for Internet Service Provider. According to Wikipedia, Internet Service Provider or ISP is a company that offers its customers an access to the Internet. The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocol datagrams, such as dial-up, DSL, cable modem or dedicated high-speed interconnects. In other words, the Internet Service Provider or ISP serves as a bridge for the customer to be able to connect to the Internet. The Internet Service Provider or ISP uses tool such as dial-up, DSL, cable modem, etc. Next word that came up is Defamation. What is Defamation? According to Wikipedia, Defamation is the communication of a statement that makes a claim, expressly stated or implied to be factual, that may give an individual, business, product, group, government or nation a negative image. It is often, but not always, it is also a requirement that this claim be false, and, or alternatively, that the publication is made to someone other than the person defamed. In other words, Defamation is a statement wherein it can ruin somebody’s image.

34

So what connects the ISP and Defamation? Late Philosophers said that ISP may lead to Defamation since they are responsible for passing through Defamation messages in the World Wide Web. What I learned: I learned that ISP serves as a bridge for the customer to be able to connect to the Internet. The Internet Service Provider or ISP uses tool such as dial-up, DSL, cable modem, etc. Integrative Questions: • • • • •

What is the definition of Internet Service Provider or ISP? What does it do? What is the relationship of ISP and Defamation? What is Defamation? What do they do to minimize Defamation?

35

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Digital Millennium Copyright Act Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled. A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled. The subscriber’s name, address, and telephone number, and a statement that the subscriber consents to the jurisdiction of federal district court for the juridical district in which the address is located, or if the subscriber’s address is outside of the united states, for any juridical district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notification under subsection or an agent of such person. Learning Expectation: I expect to learn what Digital Millennium Copyright Act is. I also expect to learn the importance of Digital Millennium Copyright Act. Book Review: Well, from the looks of it, this chapter talks about the Copyright Act. For one, why is there a need to Copyright? In my ethics class, we talked about how important copyright is. If you are an inventor or a writer, or a developer, or someone who creates their own projects, is it alright for you if someone copied your work and took the all the credit? I bet you wouldn’t hesitate to say no. The Copyright Act serves as a written evidence of the specific consequence that someone will receive if he/she tries to infringe someone’s project or work. For inventors, writers, developers, designers, and anyone who creates their own projects, and are afraid to be infringed by another person, this Copyright Act is the one for you. It will help you not get outsmarted nor get picked on by people who are subjected to copyright infringement. What I learned:

36

I learned that the Copyright Act serves as a written evidence of the specific consequence that someone will receive if he/she tries to infringe someone’s project or work. Integrative Questions: • • • • •

What is the Digital Millennium Copyright Act? Will it benefit the public? How will it benefit the public? What is the act of copying someone’s work without prior notice called? What are the consequences for the people who are guilty of copyright infringement?

37

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Note on the DeCSS Trial Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The DeCSS trial, which concluded in mid-August 2000, has tested the scope and constitutionality of the anti-circumvention provision included in Section 1201 of the Digital Millennium Copyright Act (DMCA). The questions triggered by this case go to the heart of the debate about intellectual property protection on the Internet. Is DeCSS no more than a piracy tool that enables widespread copying of DVD files? Or does it merely enable “fair use” of DVD media by allowing DVD formatted movies to be played on computers with unsupported operating systems such as Linux. Learning Expectation: I expect to learn what DeCSS Trial is. I also expect to learn the importance DeCSS Trial. I also expect that this chapter will briefly discuss the Note on the DeCSS Trial. Book Review: In complete honesty, I had no idea or whatsoever, about the topic, DeCSS. When I looked for DeCSS in Wikipedia, it gave out this result. DeCSS is a computer program capable of decrypting content on a DVD-Video disc encrypted using the Content-Scrambling System (CSS). In other words, DeCSS is a software used to decrypt encrypted content. After searching the meaning of DeCSS in Wikipedia, something entered my mind. I automatically made an assumption that there is an ethical issue in using DeCSS. Well of course there is because obviously, DeCSS is pro-piracy. They copy movies and burn them out in a DVD and sell to the public. Well, for people who can afford go to the movies, when you think about DeCSS, you’ll say that it is wrong because it is piracy and it just copies what is in the cinemas. But if you put your place in the people who can’t afford to go to the movies or even people who sells DVD’s for a living, try to put your place in their shoes. When this issue comes up, they will say that it is not wrong because it benefits them. It gives income to be able to feed their family. They would also say that it would help them because it is a cheaper kind of recreation. Now a days, people tend to buy DVD’s rather than going to the movies since there are lot of better deals with DVD’s. First, you may watch it as many times as you want. Next, you can watch it at the

38

comfort of your own home. Next, you have the power to pause the film, playback and go forward with DVD’s. Lastly, you may have the chance to watch it alone. What I learned: I learned that it DeCSS is a software used to decrypt encrypted content. Integrative Questions: • • • • •

What is DeCSS? Why was it used in this chapter? What are the issues that aroused from the topic? What are the two websites that encounters problem with swapping of MP3? What is fair use?

39

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: A Politics of Intellectual Property: Environmentalism for the Net? Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Beyond the failures in the decision-making process lie failures in the way that we think about the issues. The environmental movement gained much of its persuasive power by pointing out that there were structural reasons that we were likely to make bad environmental decisions; a legal system based on a particular notion of what “private property” entailed, and an engineering or scientific system that treated the world as a simple, linearly, related set of causes and effects. In both of these conceptual systems, the environment actually disappeared; there was no place for it in the analysis. Small surprise then that we did not preserve it very well. I have argued that the same is true about the public domain. The fundamental aporia in the economic analysis of information issues, the source-blindness of an “original author” – centered model or property rights, and the political blindness to the importance of the public domain disappear, first in concept and then, increasingly, as a reality. Learning Expectation: I expect to learn the Politics of Intellectual Property is. I also expect to learn the importance of Politics of Intellectual Property. Book Review: I’ll start off by defining what Intellectual Property is. According to Wikipedia, Intellectual Property is legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets. In other words, Intellectual Property is intangible things that you rightfully own. Examples of which are thoughts, dreams, etc. What I learned: I learned that Intellectual Property is intangible things that you rightfully own. Examples of which are thoughts, dreams, etc.

40

Integrative Questions: • • • • •

What is Intellectual Property? What are examples of Intellectual Property? What is Environmentalism? How is it related to Intellectual Property? Do the have differences of some sort?

41

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Intellectual Property, Information, and the Common Good Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Intellectual property is an odd notion, almost an oxymoron. Property usually refers to tangible assets which over someone has or claims control. Originally it meant land. Now it could also refer to a car, a milling machine, a jacket, or a toothbrush. In all these cases the property claim is of control of the physical entity. If I claim a plot of land as my property, I am saying I can control who has access to that land and what they do there. I can build a fence around it, rent it out, or drill it for oil on it. If a car is my property, I get the keys to it. I can exclude others from using it and use it myself for whatever I want, as long as I do not threaten the lives or property of others. Intellectual property is different because its object is something intangible, although it usually has tangible expression. The intellectual property in a book is not the physical paper and ink, but the arrangement of words that the ink marks on the paper represent. The ink marks can be translated into regions of magnetic polarization on a computer disk. Learning Expectation: I expect to learn the Politics of Intellectual Property, Information, and the Common Good are. I also expect to learn the importance of Intellectual Property, Information, and the Common Good. Book Review: We already know what Intellectual Property is about in the previous chapter. Now I would start by explaining what the Common Good is. According to Wikipedia, Common Good is a term that can refer to several different concepts. In the popular meaning, the common good describes a specific "good" that is shared and beneficial for all (or most) members of a given community. This is also how the common good is broadly defined in philosophy, ethics, and political science. However there is no strict definition of the common good for each situation. The good that is common between person A and person B may not be the same as between person A and person C. Thus the common good can often change, although there are some things such as the basic requirements for staying alive: food, water, and shelter - that are always good for all people. In other words, the Common Good is the thing that the majority benefits from in the community. It is what is similar from them.

42

What I learned: I learned that the Common Good is the thing that the majority benefits from in the community. It is what is similar from them. Integrative Questions: • • • • •

What is Intellectual Property? What is Information? What is the Common Good? What is Lockean Theory? What is Hegelian Theory?

43

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the United States Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: To provide a basis for this examination, some varying constructions of rights, property, and intellectual property will be presented along with a brief history of copyright in the United States. The copyright legislation passed by 105th Congress will be discussed as well as some current international aspects of intellectual property. Then, with both theory and practice at hand, we will proceed to the ethical examination. Sadly we will be unable to reach a conclusion on whether all aspects of intellectual property are the matter of ethics, but we will have found that copyright in the United States is an economic regime that pays homage to ethics only when it wishes to invoke a higher ground than economic damages for reasons to obey the copyright law. Learning Expectation: I expect to learn whether copyright is ethical. I also expect to learn why did it question whether copyright is ethic. Book Review: In my opinion, copyright is very much ethical because, according to the one of ten 10 commandments of computer ethics which is, Thou shalt not use other people's computer resources without authorization. Copyrighting a work will prevent a person disobey this chapter because it is written in the 10 commandments that it is not right to mess with other people’s computer resources. According to Wikipedia, According to Wikipedia, Copyright is a form of intellectual property which gives the creator of an original work exclusive right for a certain time period in relation to that work, including its publication, distribution and adaptation; after which time the work is said to enter the public domain. Copyright applies to any expressible form of an idea or information that is substantive and discrete. Some jurisdictions also recognize "moral rights" of the creator of a work, such as the right to be credited for the work.

44

What I learned:

I learned that copyright is ethical because it prevents a person from disobeying the 10 commandments of computer ethics. I also learned that copyright is a form of intellectual property. Integrative Questions: • • • • •

Is copyright ethical? What is copyright? Is copyright a form of intellectual property? What are the two things that copyright do not support and protect? What are the theories of intellectual property?

45

HANDBOOK 46

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Foundations of Information Ethics Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Socrates already argued that a moral agent is naturally interested in gaining as much valuable information as the circumstances require, and that a well-informed agent is more likely to do the right thing. The ensuing “ethical intellectualism” analyzes evil and morally wrong behavior as the outcome of deficient information.

Learning Expectation: I expect to learn the different foundation of Information Ethics and how this can help a person be more ethical. Book Review: This chapter talks about the foundations of Information Ethics. To start off, I would like to discuss what Information Ethics is. According to Wikipedia, Information Ethics is the field that investigates the ethical issues arising from the development and application of information technologies. It provides a critical framework for considering moral issues concerning informational privacy, moral agency (e.g. whether artificial agents may be moral), new environmental issues (especially how agents should one behave in the infosphere), problems arising from the life-cycle (creation, collection, recording, distribution, processing, etc.) of information (especially ownership and copyright, digital divide). Information Ethics is related to the fields of computer ethics and the philosophy of information. In other words, Information Ethics is a basis for the Information Technology industry. This tells an I.T. Professional on what to do and if it is ethical to do it. In this chapter as well, it talked about the RPT model or the Resource Product Target model. This model has 3 components. First component is the Info-resource. Info- resource as what its name said is where the person gets its information. Secondly, is the Info-product. Info- product covers moral issues that arise and lastly, the Info-target. Info-target of Information environment analyzes the world of hacking. Other form of security also lies here. What I learned: I learned that Information Ethics is the basis Ethics is a basis for the Information Technology industry. This tells an I.T. Professional on what to do and if it is ethical to do it. I also learned that the RPT model has 3 stages namely the Info-resource, Info-product and the Info-target.

47

Integrative Question: • • • • •

What does Information Ethic mean? What is the RPT Model? What does Info-resource mean? What does Info-product mean? What does Info-target mean?

48

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Milestone in the History of Information and Computer Ethics Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Wiener realized that the new science and technology that he and his colleagues were creating would have “enormous potential for good and for evil.” He predicted that, after the war, the new information technology would dramatically change the world just as much as the Industrial Revolution had done in the nineteenth and early twentieth centuries. Wiener predicted a “second industrial revolution,” an “automatic age,” that would generate a staggering number of new ethical challenges and opportunities. Learning Expectation: I expect to learn the milestone in the history of Information and Computer Ethics and how relevant this is in the book. I want to know if how important to know the history of Information and Computer Ethics. I also want to know if this will benefit the Information Technology Industry. Book Review: Information Ethics was born in the middle of the Second World War two according to the article given. It said that it was unintentional and almost an accident because the creator, Norbert Wiener, together with his fellow scientists, were creating an anti-aircraft cannon that would allow to spot an aircraft and eliminate it as well. This made Norbert Wiener think that in making this anti-aircraft cannon has its positive and negative side. Since ethics is the study of distinguishing something from good or bad, it gave Norbert Weiner and his colleagues an idea that the anti-aircraft cannon is a potential for good or for evil. Norbert Weiner and his fellow scientists created two books which talks about the social and ethical impacts of the new information technologies. Little did Norbert Weiner know that he already made the foundations of information ethics and cyber ethics. That is why it was said earlier that it was unintentional and almost an accident when Norbert Wiener and his fellow scientist created the Information Ethics. What I Learned: I learned that Norbert Wiener created the Information Ethics during the Second World War. I also learned that it was an accident because they were creating this so-called anti-aircraft cannon that would allow eliminating an enemy’s aircraft and from that thing, the Information Ethics was born.

49

Integrative Questions: • • • • •

Who created Information Ethics? What triggered Norbert Wiener to create it? When was it created? Was Norbert Weiner aware that he was able to the foundations of Information and Cyber Ethics? What can the anti-aircraft cannon do?

50

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Moral Methodology and Information Technology Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: I think the way we ought to proceed in the ethics of IT is not very different from the way we ought to proceed in other departments of ethics of technology and engineering1, although there are certainly differences between the moral problems occasioned by different types of technology and there are certainly specific properties of computers that need to be accommodated in our moral thinking about them. Learning Expectation: I expect to learn the meaning of moral methodology and the deeper meaning of Information Technology. Book Review: This beginning of this chapter talks about cyber ethics. It gave us the definition that Cyber Ethics is a form of applied or practical ethics. It studies the moral questions that are associated with the development, application, and use of computers and computer science. Computer ethics exemplifies, like many other areas of applied and professional ethics, the increasing interest among professionals, public policy makers, and academic philosophers in real-life ethical questions. In other words, Cyber Ethics is a study wherein it focuses on the moral questions of computer professionals. At least that’s what I understood. This chapter tells us readers that there is a big argument when we talk about using the computer. There is always something good or something bad whenever you use the computer. An example of a good thing that a computer is capable of doing is it helps people hasten their workloads since the computer has many features installed in it. It also has a World Wide Web application which users can surf the internet and look for stuff that the need or want to know. Aside from the positive side of using the internet, there is also a negative side. People now a days, use the computer to mingle with other people’s files. A computer may also infringe something. A computer may also copy an original work and distribute it. Here is where the cyber ethics comes in. Cyber Ethics informs the users the stuff which is good from stuff that is bad.

51

What I learned: I learned that the computer is not purely to help a person out. It has also its negative side. I also learned that a computer now a days is not just for hastening things up but sometimes for illegal stuff which could harm people as well. I also learned that Cyber Ethics deals with this kind of problem. Integrative Questions: • • • • •

What is the definition of Cyber Ethics? Does this help solve the problem between determining whether the function of a computer is for the good or not? What is the study of moral questions that are associated with the development, application, and use of computers and computer science? What is generalism? What is PACS?

52

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Value Sensitive Design and Information Systems Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: What is wrong, I think, is that we have permitted technological metaphors . . . and technique itself to so thoroughly pervade our thought processes that we have finally abdicated to technology the very duty to formulate questions. . .. Where a simple man might ask: “Do we need these things?”, technology asks “what electronic wizardry will make them safe?” Where a simple man will ask “is it good?”, technology asks “will it work?” Learning Expectation: I expect to learn what a value sensitive design is and how it helps the Information Technology industry. Book Review: This chapter begins by explain what a Value Sensitive Design is. According to the book, A Value Sensitive Design, or VSD, is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process. It employs an integrative and iterative tripartite methodology, consisting of conceptual, empirical, and technical investigations. In other words, a Value Sensitive Design or VSD helps out a person determine its human values based on the approach given by the Value Sensitive Design or VSD. This Value Sensitive Design derived 3 case studies. The first study handles the information and controls the web browser cookies. This study checks whether the information passes or not. The second study suggests using highdefinition plasma or what I believe a Television set or a computer to help picture out or visualize what reality is. Lastly, the third study is the use of environmental simulation systems in order to be precise in making big decisions which involves land and other environmental issues. In this way, it implies fairness, accountability, etc. I therefore conclude that a Value Sensitive Design or VSD is a tool which helps promote the betterment of a nation. This may help places to become more peaceful and well-organize.

53

What I learned: I learned that a Value Sensitive Design is a tool which helps promote the betterment of a nation. This may help places to become more peaceful and well-organize. I also learned that it has three case studies which each case has its unique suggestion. Integrative Question: • • • • •

What does VSD stand for? What does a VSD do? Does it help make a place better? How many case studies does VSD have? What does value mean?

54

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: The bundle of rights conferred on patents owners are the right to make, the right to use, the right to sell, and the right to authorize others to sell the patented item. Moreover, the bundle of rights conferred by a patent exclude others from making, using, or selling the invention regardless of independent creation. Learning Expectation: I expect to learn what Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property mean. Book Review: This chapter started off by explaining to us readers what Intellectual Property means. According to the text given, Intellectual property is generally characterized as nonphysical property that is the product of cognitive processes and whose value is based upon some idea or collection of ideas. Typically, rights do not surround the abstract nonphysical entity, or res, of intellectual property; rather, intellectual property rights surround the control of physical manifestations or expressions. Systems of intellectual property protect rights to ideas by protecting rights to produce and control physical embodiments of those ideas. In other words, Intellectual Property is not actually a thing we can hold but an intangible benefit that was given to us. As stated in Wikipedia, it is a legal property right which is created by the mind, both artistic and commercial, and the corresponding fields of law. This means that it is all in the mind. Examples of intangible benefits that we are entitled to is literature, music, ideas, inventions, discoveries, and a whole lot more. Another part of the chapter discusses about Property Right. According to Wikipedia, Property Right is a right given to a property owner wherein he/she can consume, sell, rent, mortgage, transfer and exchange his or her property. It is important to know your rights in order for you to not be treated as rubbish and may live in justice.

55

What I Learned: I learned that Intellectual Property is not a tangible thing that we can hold on to. Like what Wikipedia said, it is created by the mind. I also learned that Property Right is a right given to a property owner wherein he/she can consume, sell, rent, mortgage, transfer and exchange his or her property. Integrative Questions: • • • • •

What is Intellectual Property? What is Property Right? Is Intellectual Property just a state of mind? Is Property Right important for us readers to know about it? How important is it?

56

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Informational Privacy: Concepts, Theories, and Controversies Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: We demand recognition of our right to privacy, we complain when privacy is invaded, yet we encounter difficulties immediately [when] we seek to explain what we mean by privacy, what is the area, the content of privacy, what is outside that area, what constitutes a loss of privacy, a loss to which we have consented, a justified loss, an unjustified loss. —H.J. McCloskey (1985, p. 343) Learning Expectation: I expect to learn what the different concepts, theories and controversies of Informational and how important it is to know these things. Book Review: I believe that this chapter talks about privacy and how privacy should be properly dealt with. The chapter started out by explaining the real concept of privacy to us readers. According to H,J, McCloskey, the concept of privacy is that people demand the right to privacy but we do not exactly know what privacy is. We are not that sure if our privacy is being invaded or not. That’s what I understood from the quote stored above. After determining the concept of privacy, the book tells us 4 distinct kinds of privacy. It is written that the 4 kinds are physical, decisional, psychological and informational privacy. According to an article written by Samuel Warren and Louis Bradeis, Physical Privacy is defined as the freedom a person enjoys from sensory intrusion, which is “achieved thanks to restrictions on others, ability to have bodily interactions with (that person).” This means that physical privacy lives up to its name which is physical. The next kind is the Decisional privacy. Floridi defines Decisional privacy as a freedom from procedural interference, achieved thanks to the exclusion of others from decisions (concerning, e.g., education, health care, career, work, marriage, faith)”. This means that a person enjoys everything that concerns the examples given above. Next is the Psychological privacy which is defined by Regan as protecting one’s intimate thoughts. This means that psychological privacy focuses on the mental side of you. Lastly, Informational privacy, according to Floridi, is defined as “freedom from epistemic interference” that is achieved when there is a restriction on “facts” about someone that are “unknown.”

57

What I learned: I learned that privacy has its 4 distinct kind namely Physical privacy, Decisional privacy, Psychological privacy and lastly, Informational Privacy. Integrative Questions: • • • • •

What is the concept of Privacy? What is Physical privacy? What is Decisional privacy? What is Psychological privacy? What is Informational privacy?

58

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Online Anonymity Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: One is the thought that anonymity could be the byproduct of sheer size as when one is among a throng of people who don’t know one another. The other is the thought that anonymity could be the byproduct of complex social organization, where society is organized such that one’s social locations are dispersed and not necessarily connected with one another; for example, one’s work environment may be disconnected from or not overlapped with one’s familial locations. Learning Expectation:

I expect to learn what Online Anonymity is. I also expect to learn that it is somehow related to privacy since I think that anonymity is closely related to privacy. Book Review: Basically, this chapter speaks of Anonymity. We should first describe what Anonymity is. According to Wikipedia, Anonymity is derived from the Greek word ανωνυµία, meaning "without a name" or "namelessness". In colloquial use, the term typically refers to a person, and often means that the personal identity or personally identifiable information of that person is not known. In layman’s terms, anonymity is simply described as someone unknown. This chapter argues whether Anonymity is right or wrong. It is written that, there are things which make Anonymity a good thing but there also things which cause bad things to occur. It is also written that it is one of the problems that the technology world faces now a days because they are unsure whether this person will do good or be harmful. One thing that I think will benefit something out of Anonymity is your privacy. With this, people would not know that it is you. But the bad thing about it is that, crimes may be committed since people would not have an idea who that person is.

59

What I learned: What I learned from this chapter is how the importance of Anonymity. I also learned that Anonymity has its positive side and its negative side. Integrative Question: • • • • •

What is Anonymity? Is it related to Privacy? Why is it related to Privacy? Does Anonymity have its good side? Does Anonymity have its bad side?

60

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: At first glance, it might seem obvious that hacking is wrong. Although the more malicious of these acts involve serious wrongs because of the harm they cause, all are wrong because they constitute a digital trespass onto the property of another person. Unauthorized entry into some other person’s computer seems not relevantly different than uninvited entry onto the land of another person. Real trespass is morally wrong, regardless of whether it results in harm, because it violates the owner’s property right to control the uses to which her land is put and hence to exclude other people from its use. Learning Expectation: I expect to learn how hacking became ethical. I want to know the good side if it because what I know now is that, hacking is really wrong. Book Review:

In complete honesty, I was amazed when I read this chapter. I saw that hacking could be ethical as well. Well, we all know that the nature of hacking is really bad since it does not follow the 10 commandments of the computer wherein, thou shall not interfere with other people’s work or something like that. After reading this chapter, I found out that it is not completely unethical to hack unless your purpose of doing so will benefit other people as well. Now a day, there are people out there who are very skillful enough to hack in your very computer. We even hear in the news that someone just hacked a government system or something. We can even see these things in movies wherein even a young student was able to hack a government facility in the United States. That is why. It is not impossible to hack into someone’s system. Well, hacking is not completely bad as I said because hacking may help someone do something good. A perfect example for this is when the government of the US has to hack the information system of North Korea in order to stop a ballistic missile from hitting Alaska which will kill thousands of people. That is when, hacking comes in and it is not wrong since lives will be saved.

61

What I learned: I learned that it is not purely wrong to be a hacker because there are stuff we can benefit from hacking. Integrative Questions:

• • • • •

Is hacking purely wrong? Are their things that we could benefit from hacking? Do other people think hacking is bad? What is hacking? What is hacktivism?

62

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Information Ethics and the Library Profession Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Libraries as organized depositories of documents have existed at least from the time of the Sumerians (Fourie and Dowell, 2002, pp. 15–16). Librarianship as a distinct profession, however, is relatively a recent development. With the advent of the printing press, collections of works became larger and more complex, thus creating a greater need for someone devoted to organizing and cataloging such collections. Even then, those who collected, organized, and preserved books and other documents were Scholars and their activities as “librarians” were not distinct from their scholarly work. Not until the nineteenth century did librarianship become a separate profession (Gilbert (1994), p. 383). Learning Expectation: I expect to learn what a library profession is and the profound meaning of information ethics. I want to know how important both are. Book Review: This chapter starts off by pointing out that the issues that are being tackled here will not really benefit library professions such as librarians but will other information provider. According to the article, examples of information providers are Google, Yahoo, Ask, Wikipedia, Encarta, Altavista and a whole lot more. This will benefit them since this chapter of this book will talk about information ethics. What I understood here in this chapter is that, these information providers do good and may do bad as well. Obviously they do good since they give us the precise information we ask of them. These information providers are also responsible for hastening the work speed of the people since all we have to do is just type in the information we need, and in seconds, it is already available. Unfortunately, issues arise due to the fact that information providers may input wrong information and may be biased. That is why ethics is needed in this one right here. In my opinion, ethics is really applicable here because information is a big thing. Absorbing wrong information is very crucial since it may affect a person.

63

What I learned: I learned that even information providers may do harm to other people without even doing it on purpose. I also learned that, that is the reason why ethics should be applied here. Integrative Questions: • • • • •

What are library professions? Do search engines count as library professions? Do search engines count as information provider? What are samples of information provider? Does it have the capability to harm a person?

64

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Ethical Interest in Free and Open Source Software Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Free software stems from the close ties that early software developers had with academia. As the software industry began to mature, the bond with academia and its ideals of sharing research results weakened. After spending many years as an active participant in the hacker culture, Richard Stallman grew frustrated as more and more softwarewas not free—not free in a financial sense, but free in awaythat allowed for its inspection, running, and modification. Learning Expectation: I expect to learn why there is ethical interest in free and open source software. I want to know why this is important. Book Review: As we all can see, this chapter obviously talks about free and open source software and the ethical interest in it. To start off, I want to briefly define what an Open Source Software is. Open Source Software is a software which does not require cash since it is free. You may download it in the World Wide Web. This may be garnered in any website that relates to your desired software. A good example of this Open Source Software is the Open Office. Open Office may be downloaded in the net. Unlike, Microsoft Office, Open Office does not require any payment since it is free. Another example of open source is PHP. PHP is a scripting language used by web developers in order for their web pages to be loaded. This is also an Open Source Software since it is available for download it the net. In this chapter, there is also a moral issue that arises. Similar to information providers, Open Source Software developers should see to it that their codes are superior because there reputation is on the line. They are open to handing out false information if their codes are not that good. What I learned: I learned that there are a lot of Open Source Softwares available in the World Wide Web. I also learned that moral issues are still present even for Open Source Softwares.

65

Integrative Questions: • • • • •

What are Open Source Softwares? Are moral issues present for OSS? What are the moral issues? Who developed the concept of Free Software? When was it developed?

66

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Internet Research Ethics: The Field and Its Critical Issues Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Internet research ethics (IRE) is an emerging multi- and interdisciplinary field that systematically studies the ethical implications that arise from the use of the Internet as a space or locale of, and/or tool for, research. No one discipline can claim IRE as its own, as various disciplines since the 1990s have used the Internet for research and, to some extent, grappled with the ethical implications of such research. Learning Expectation: I expect to learn the critical issues arise from the internet research field. I also want to learn if it will benefit the readers. Book Review: To start off, this chapter talks about the Internet Research Ethics as a field and the critical issues that arises. First, I would like to define what Internet Research Ethics is. According to the article, Internet Research Ethics is an emerging multi- and interdisciplinary field that systematically studies the ethical implications that arise from the use of the Internet as a space or locale of, and/or tool for, research. In other words, Internet Research Ethics are responsible in handling the issues created while using the internet for means of research. When I read this chapter, I was shocked to know that even while researching through the internet; ethical issues occur. I believe that ethical issues do occur because similar as information providers, internet research also gives information to those who researches it. That is why ethical issues did arise. Internet research has its beneficial advantages but may also do harm for the public. What I beneficial advantages that I see is that Internet Research may give out precise information asked by the researcher. But the bad thing about this is that Internet Research may also give out, not precise information, but false information or false data. As we all know, false information may trigger dangerous results for a human being. It may harm him in so many ways.

67

What I learned: I learned that aside from information providers, internet research also experiences critical issues. I learned that they also do experience critical issues because their similarities are that they both give out information to the public. Integrative Questions:

• • • • •

What does IRE stand for? What does IRE do? What are the critical issues that arise? What does Internet Research mean? Is it similar to Information Provider?

68

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Health Information Technology: Challenges in Ethics, Science, and Uncertainty Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: It is sadly and too often the case that many professionals regard ethics as a source of codes for the edification of the not-yet-virtuous, as a place where pointy-headed boffins pass judgment on heathens, as an office to call in search of someone with a horse and a sword to come .round to smite the evildoers. Learning Expectation: I expect to learn what Health Information Technology is. I also want to learn what challenges in ethics, science and uncertainty got to do with this topic. Book Review: What is Health Information Technology? According to Wikipedia, Health Information Technology or HIT provides the umbrella framework to describe the comprehensive management of health information and its secure exchange between consumers, providers, government and quality entities, and insurers. Health information technology (HIT) in general is increasingly viewed as the most promising tool for improving the overall quality, safety and efficiency of the health delivery system (Chaudhry et al., 2006). In other words, Health Information Technology is responsible to protect the exchange of between people. Since the word “protect” and “secure” came up, this chapter also opened the topic privacy. According to the article, Privacy is the right entitlement or reasonable expectation people have that they are and will be secure from intrusion. In layman’s term, Privacy is the right given to a person in whom he or she may keep it to himself or herself regardless of what other people might think or say. There is a good example on why an ethical issue aroused here in Health Information Technology. The example given by the article is that, if a patient does not believe that this specific hospital is not capable of securing medical records and keeps it confidential, then that patient is reluctant to tell the truth since the patient is scared that his or her records might not be dealt with properly.

69

What I learned: What I learned is that even hospitals and other health related fields also experience ethical issues. I also learned that Privacy is closely related to Confidentiality in the point that the article itself related Privacy and Confidentiality as cousins, Integrative Questions: • • • • • •

What does HIT stand for? What does HIT do? What is Privacy? What is Confidentiality? Are they related?

70

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Ethical Issue of Information and Business Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Businesses and the economic system they work in have an important influence on ethical issues arising from information and information and communication technology. This chapter aims at establishing a link between several sets of ethical discourses that concern similar topics. It offers an introduction to some of the current debates in business ethics and considers how information and technology influence the current topics and debates in the area. Drawing on some of the debates in computer and information ethics, the chapter points out areas where these two sets of discourses overlap and where they have the potential to inform each other. Learning Expectation: I would like to learn more of the Business and Computer Ethics. I also would like to understand if Business Ethics is an oxymoronic term.

Book Review: “A possible view might be that Business and ethics simply have nothing to do with each other, that the term business Ethics is an oxymoron”. I think I do not agree on this one. For me Business and ethics is not oxymoron since Businesses involve and possible only when there are people, People who have their own moral background and standards. “Immoral behavior of individual market participants, such as High-profile managers or corporations” “Ethics as the theory of morality plays an important role in justifying the economic system and thus allowing economic agents to feel legitimated in acting within the system” For me economic system should if possible be moral and fair in most of its aspect. What I learned: I have learned that ethical theory can be helpful in raising awareness and shaping views on how ethical problems can be addressed. Integrative Question: • • •

What does Information mean? What does Business mean? What are the ethical issues of information?

71

• •

What are the ethical issues of business? What are the ethical issues of Information and Business?

72

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Responsibilities for Information on the Internet Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Unfortunately, the law does not offer many clues as to this question. With regard to information that is not in itself illegal, the possibilities of invoking legal regulation are very limited. Traditionally, the law approaches the problematic consequences of information as a liability problem. As I suggested already in Section 14.3, this approach is insufficient. Liability only arises after the harm and offence have really taken place. Thus, the preventive potential with regard to possible harm and offence and to risks is severely limited. Establishing liability for information is further complicated, because of difficulties of identifying causal relationships, of giving due consideration to the perspectives of content providers and users, and—sometimes— of balancing the good of establishing liability against information freedoms. Learning Expectation: I would like to learn more of the Responsibilities for Information on the Internet. I also would like to understand the importance of Responsibilities for Information on the Internet.

Book Review: “For the time being, responsibilities for safeguarding the reliability of online information are responsibilities shared by all parties involved.” I agree with Mr. Anton’s opinion that every party has their responsibilities to promoted legal, reliable, and moral online information. “Content providers (CPs), the organizations that provide the infrastructure for the dissemination of that information, the so-called Internet service and access providers, the receivers or users of the information, third parties, such as those that deliver quality certificates for Websites, and others.” There is much research and literature in the discipline of business ethics, which deals with the relationship between business and ethics. Business and ethics, the way is see it, is something that goes along with each other for the reason that you cannot do business if you do not have ethics. My meaning is that your client will not last if you do not have ethics to follow your contract or provide the right things to your client. So you can do business without ethics but the only problem is that it will not last. Whether we like it or not, ethics goes along with business.

73

What I learned: I have learned that problems of reliability on online information have two types: People lack the necessary expertise to assess information on the basis of content criteria, and they also lack the necessary expertise to assess information on the basis of pedigree criteria. In this case, the problems are due to a lack of competence of the users. People lack the expertise to assess information on the basis of content criteria, and it is impossible for them to test the information with the help of pedigree criteria. This is the case when the users are, in principle, competent in using pedigree criteria, but the information is presented in such a way that there are no indicators or markers of conformity with pedigree criteria. Integrative Question: • • • • •

What are the responsibilities for Information on the Internet What is the similarities of business and ethics? What are CP’s? What is Mr. Anton’s opinion? What are the conditions of responsibility?

74

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Virtual Reality and Computer Simulation Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: Virtual reality and computer simulation have not received much attention from ethicists. It is argued in this essay that this relative neglect is unjustified, and that there are important ethical questions that can be raised in relation to these technologies. First of all, these technologies raise important ethical questions about the way in which they represent reality and the misrepresentations, biased representations, and offensive representations that they may contain. In addition, actions in virtual environments can be harmful to others and raise moral issues within all major traditions in ethics, including consequentialism, deontology, and virtue ethics. Learning Expectation: I would like to learn about the Responsibilities Virtual Reality and Computer Simulation. I also would like to understand the importance of Virtual Reality and Computer Simulation.

Book Review: “Many simulations aim to faithfully depict existing structures, persons, states of affairs, processes, or events” VR and Computer Simulations has their own intended purposes and is very beneficial to many in different industries or even individuals. I think that most of these technologies are solely made for the user’s benefits and not intended to be biased, misrepresent, or violate moral standards.

The case against computer games tends to center on three perceived negative consequences: addiction, aggression, and maladjustment. The perceived problem of addiction is that many gamers get so caught up in playing that their health, work or study, family life, and social relations suffer.

This are the common problem nowadays in our country, more and more students are being addicted to games specially the young ones. I agree that when you get tie up to the game, your life will suffer a lot like the following mentioned above.

75

What I learned: I have learned that the principle that professional expertise should be used for the enhancement of human welfare. If technology is to promote human welfare, it should not contain biases and should regard the values and interests of stakeholders or society at large. Taking into account such values and avoiding biases in design cannot be done without a proper methodology. Integrative Question: • • • • •

What is a Virtual Reality? What is a Computer Simulation? What are the similarities of both? What are the dissimilarities of both? Are they both ethical?

76

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Genetic Information: Epistemological and Ethical Issues Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: “Science will be the MUCH poorer, and progress in this field will inevitably be delayed” (Ash burner quoted in Moody, 2004, p. 112).”

“The quantity of information in a system can be understood roughly as the amount of order in that system, or the inverse of the entropy (disorder) that all closed physical systems accumulate over time. This measure says nothing about the content of information. Shannon’s theory is now labeled as the syntactical theory of information.”

Learning Expectation: I would like to learn about the Genetic Information. I also would like to understand the importance of Genetic Information.

Book Review: “A possible view might be that Business and ethics simply have nothing to do with each other, that the term business Ethics is an oxymoron”. I think I do not agree on this one. For me Business and ethics is not oxymoron since Businesses involve and possible only when there are people, People who have their own moral background and standards. “Immoral behavior of individual market participants, such as High-profile managers or corporations”

77

“Ethics as The theory of morality plays an important role in justifying the economic system and Thus allowing economic agents to feel legitimated in acting within the system” For me economic system should if possible be moral and fair in most of its aspect. What I learned: I have learned that ethical theory can be helpful in raising awareness and shaping views on how ethical problems can be addressed. Integrative Question: • • • • •

What is a Genetic Information? What are its epistemological issues? What are its ethical issues? What are the dissimilarities of both? What are the difference between epistemological issue from ethical issue?

78

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: The Ethics of Cyber Conflict Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote:

“Both are about ethical principles as much as they are about “law,” and indeed, international law does not carry the same weight as domestic law. Under international law, states, as sovereign entities, assume international legal obligations only by affirmatively agreeing to them, for example, signing a treaty or agreeing to abide by the Charter of the United Nations.”

“The UN Charter prohibits states from using force against other states (Article 2(4)), except when conducted in self defense (Article 51) or under the auspices of the Security Council (Article 39). The Charter effectively encodes an ethical principle of just cause for attacking another state that most people would accept.”

Learning Expectation: I would like to learn about the Ethics of Cyber Conflict. I also like to understand the importance of it.

Book Review: The framework presented here is based on the international law of armed conflict.

79

Although this law was developed to address armed attacks and the use of primarily armed force, some work has been done to interpret the law in the domain of cyber conflict. The law has two parts: jus ad bellum, or the law of conflict management, and jus in Bello, or the law of war. Despite being referred to as “law,” both of these parts are as much about ethical behavior as they are rules of law.

The law has two parts but the both of them actually talks about the ethical behavior of the tow on how you will use the network.

Immediacy - This is the time it takes for the consequences of an operation to take effect. As a general rule, armed attacks that use force have immediate effects, on the order of seconds to minutes, while softer measures, such as trade restrictions, may not be felt for weeks or months.

An intrusion into an air traffic control system that causes two large planes to enter the same airspace and collide, leading to the deaths of 500 persons on board the two aircraft. In terms of severity, the cyber attack clearly ranks high. Immediacy is also high, although the delay between the intrusion and the crash may be somewhat longer than between something like a missile strike and the planes crashing. What I learned: I have learned the meaning of Severity, Immediacy and directness. Integrative Question: • • • • •

What is a cyber conflict? What is immediacy? What are its ethical issues? What are the cyber conflicts mentioned in the article? What is Jus in Bello?

80

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: A Practical Mechanism for Ethical Risk Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote:

“Boehm (2006) says the top ten software risks are “personnel shortfalls, unrealistic schedules and budgets, developing the wrong functions, developing the wrong user interfaces, gold-plating, continuing stream of requirements changes, shortfalls in externally performed tasks, shortfalls in externally-furnished components, real-time performance shortfalls, and straining computer science capabilities.”

“What was not considered in the design of the system was its use in a manual transmission car that was left in gear when it was parked. Nor was the pedestrian considered who was hurt while walking between two cars when one of the cars was started remotely.”

Learning Expectation: To know the more about the techniques those were being used to identify the impact of risk.

Book Review:

81

The risk identification process identifies potential negative impact on the project and its stakeholders. AS/NZS lists potential negative areas of impact such as Asset and resource base of the organization, Revenue and entitlements, Costs, Performance, Timing and schedule of activities, and Organizational behavior (AS/NZS, 1999, p. 39).

Risk identification is a process of identifying the negative impact on the project and to its stakeholders. By this, it will be easy to react if there was a problem and if there was a problem it will be deal with great knowledge because they know that it will come.

Risk Analysis Once these potential risk effects have been identified, they are prioritized in the risk analysis phase to help order when and if they will be addressed. The risk analysis process divides the identified risks by their severity and the likelihood that they will occur, producing a given level of risk. The analysis of the risk severity is put in either qualitative or quantitative terms. Risk analysis is about identifying the impact of projects when some of the parts of projects were not delivered. It will be marked as High, Medium, or Low. What I learned: I have learned the different type of techniques on how to identify the risk on projects. Integrative Question: • • • • •

What is ethical risk? What is a risk analysis? What are risk effects? What is risk identification? What is a risk identification process?

82

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Regulations and Governance of Internet Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote:

“His conception of a good human life is one in which we think, reflect, and rationally choose for ourselves from different beliefs and lifestyles according to what seems most true or meaningful to us.”

“What was not considered in the design of the system was its use in a manual transmission car that was left in gear when it was parked. Nor was the pedestrian considered who was hurt while walking between two cars when one of the cars was started remotely.”

Learning Expectation: To know more about internet.

Book Review: The freedom of speech or expression of one person can cause harm to another, so some restrictions need to be placed on how and to what extent a person can be allowed free expression. That there should normally be some restrictions placed on harming others, other things being equal, is pretty uncontroversial interest.

83

We must be careful about the things that the things that is being post and the content of the internet. It is not like a television where there is a regulatory board that monitor the things that will be shown on television or radio.

Regulations and Technical Issues

That there are benefits in reducing the amount of material that can harm the innocent and vulnerable is obvious. Whether this can be achieved to any significant extent given current technology is not.

Censorship The first is that an opinion that is not allowed to be heard might just be true, and the second that it might contain some truth. Therefore restrictions on the freedom of opinion can, and most probably will, deprive the world of some truths. For me, there should be a defining content on things that should be publish and should not. What I learned: I have learned that there are a lot of things that are going on about filtering the content of website. Integrative Question: • • • • •

What are regulations of the internet? What is governance of the internet? What are the regulations issues? What are the technical issues? What is censorship?

84

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Information Overload Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote:

“Among scholars who concern themselves with information from a theoretical perspective, however, there is little agreement about the notion. In search of stable footing, some have borrowed the information theoretic approach of Shannon and Weaver, which identifies the number of bits of information content in a signal, despite the fact that this is an abstract measure of channel capacity and not of meaning.”

Learning Expectation: To know about information overload and to understand the meaning of information overload. Book Review: What is information overload?

Information overload, according to these two definitions, is a condition in which an agent has—or is exposed to, or is provided with—too much information, and suffers negative consequences as a result (experiences distress, finds itself in a “problematic situation,” is unable to make a decision or to stay informed on a topic, etc.).

For me, information overload should not be redundant. There must be a common meaning between the information that was being shown. From the word information, it should sounds and look like friendly. It must not distress the one who is looking for it.

85

In both of the definitions above—as in many of the discussions of information overload in the popular press and academic literatures—the meaning of the word is assumed to be understood. This is presumably because the notion of information is unproblematic in the public mind: we require no explanation because we know what it means. For me, information should not be difficult to understand and also can be easily found. I agree about what was mentioned about; it should not be problematic

What I learned: I have learned that information has an effect on people on their decision making. Also, information is being called information for the reason that it answers the questions that were being raised. Information should not be problematic as what the author said. Integrative Question: • • • • •

What is information overload? What does it mean? What is information? What are the ethical issues? What are the given consequences of information overload?

86

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Email Spam Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: A fundamental problem with any philosophical discussion of email spam is definitional. Exactly what constitutes spam? Published definitions by some major players differ dramatically on which emails should be identified as spam. Some emphasize the importance of “consent”; others require the emails to be commercial in nature before they are called spam; still others focus on the number of identical messages that are sent as spam. At least one Web site (Spam Defined, 2007) is soliciting signatories to settle on the definition of spam. Learning Expectation: I expect to learn what Email Spam is. Book Review: To start off, I would describe what Email Spam is an electronic mail which is considered as unwanted mail. In Yahoo! Mail, they enhanced their program by adding a feature wherein your spam mails are automatically re-directed in a folder named “spam”. With this kind of feature, you will not be anymore bombarded with spam mails in your inbox. I also found out that Gmail has also the feature of separating the Spam mails into one folder. The good about this is that, whenever you open your mail, the spam mail are not anymore, mixed with your personal mails in the inbox. Another good thing about it is that your inbox would not get full in an instant. Another good thing about it is that, the deuature that we see in Yahoo! Mail and Gmail is that, they have a delete all button for the spam. You do not have to click everything 1 on 1 just to delete it. I think the reason behind putting a delete all function there because people most of the time does not care what’s inside the Spam folder.

What I learned: I learned that Email Spam is an electronic mail which is considered as unwanted mail. Integrative Question: • • •

What is Email Spam? How can it affect a person? Is Email Spam ethical?

87

• •

What are the ethical issues? What are the given consequences of Email Spamming?

88

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: The Matter of Plagiarism: What, Why, and If Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: “An expression is only plagiarism if it is unacceptable on some established value. But we should be careful to avoid the error of being overly narrow in identifying any particular value or standard as the basis for condemning an expression as plagiarism. Learning Expectation: To know about plagiarism Book Review: Plagiarism

Plagiarism will be treated here very broadly as expression that improperly incorporates existing work either without authorization or without documentation, or both. The emphasis on impropriety is important. In the simplest way in explaining this is that quoting something or writing something without citing the source.

LACK OF AUTHORIZATION—NATURAL OR MORAL RIGHTS The title of the present section refers, perhaps misleadingly, to “natural” rights, a concept usually associated with Locke.s theory that a laborer has a claim to his or her labor, and consequently to items with which that labor is mixed.

89

It is like claiming something that you have said or done but the truth is that there were someone else has said that or claimed about it before the person who claimed it. For me, that is in contrast of moral rights.

There is a range of economic theories that seek to understand the consequences of a broader or narrower definition of copyright infringement, and narrower or broader definitions of fair use, and tighter or looser plagiarism policies.

What I learned: I have learned that it is not always wrong to copy. There is at least a little boarder that allows you to have your own copy and that is called fair use. Integrative Question: • • • • •

What is plagiarism? What are the specific grounds for action if caught plagiarizing? How can plagiarism be avoided? What are the ethical issues? What are the given consequences of plagiarizing?

90

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Intellectual Property: Legal and Moral Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: “Defenders of the unfettered use of P2P networks come in many different stripes. But they typically concur that the personal copying of protected files on P2P networks is legally acceptable. Some legal scholars in this camp maintain that users who download files are not making copies of those files but simply “sharing” digital information over a conduit. Learning Expectation: To know about peer-to-peer Book Review: What is File sharing or peer-to-peer network? The technology at the center of these copyright disputes is a software that enables computer users to share digital files over a peer-to-peer (P2P) network. Although the P2P architecture is evolving, a genuine P2P network is still defined as the one in which “two or more computers share [files] without requiring separate server computer or server software” (Cope, 2002).

There is a range of economic theories that seek to understand the consequences of a broader or narrower definition of copyright infringement, and narrower or broader definitions of fair use, and tighter or looser plagiarism policies.

The use of a piece of intellectual property without the copyright holder’s permission (and therefore against his will) is unfair to that copyright holder since it violates his right to determine what is to be done

91

with that property. And this unfair use of another’s intellectual property constitutes a form of theft (Grisez, 1997).

Moral Considerations

The utilitarian arguments for maintaining a strong legal tradition of secondary liability seem especially persuasive. Given the enormous difficulties of enforcing copyright protection by pursuing direct infringers and the threats posed to content providers by dynamic technologies such as P2P software, the need for this liability seems indisputable What I learned: I have learned that we can still able to copy a file as long as we do not reproduce it and sell it. Integrative Question: • • • • •

What is moral considerations? What is file sharing? What is the other term for file sharing? What is Intellectual Property? Is it legal or moral?

92

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: Censorship and Access to Expression Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: However, it will not be quite so easy to show that censorship will lead to less harm overall than allowing access. First, it is worth reminding ourselves of the central interests in expression, deliberation, and information, which can only be satisfied when there is a general free flow of expression. The benefits we receive from having these interests satisfied (and the harms from not having them satisfied) will not be easily overridden. Second, we have to ask ourselves not what in principle it might be good to censor. We have to ask ourselves what in actual practice would be the consequences of having policies in place that restrict access. It is at this point that “slippery slope” and “chilling effect” arguments might have some force. Learning Expectation: To know about peer-to-peer Book Review: What is censorship? Censorship limits access to an expression, either by deterring the speaker from speaking or the hearer from receiving such speech. By an “expression” I mean anything that may be composed by one person and communicated to another. This includes such things as speeches, personal communications, books, and articles, compilations of data, artworks, photographs, and music.

For me, censorship is not bad. It has good and negative side. Of course, before settling the censorship there must a clear boarder line on what should be censored and should not be shown. There must be a guideline to be able to discern immediately the right and wrong.

The deliberative interest concerns our ability to revise and gain a deeper understanding of our individual and collectively held beliefs and commitments. This requires access to expressions of others, because of “the familiar fact that reflection on matters of human concern cannot be pursued in isolation.

93

Establishing rules for censorship is a very difficult task. It is like a diversified culture trying to be fair as much as possible. Also, the rules will be biased because every person has a different background in their values so at a certain rules there will be a biased decision or rules that will be set.

What I learned: I have learned censorship is also an issue that must be discussed. There is a lot of issue that were being raise and also it is difficult to come up with the mean decision. Integrative Question: • • • • •

What is censorship? What are its ethical issues? Do people get satisfaction whenever they mess with other people’s files? Is censorship ethical or not? Is it legal or moral?

94

Andrew Adnan Fortuna 10667652 ITETHIC

THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS

Book Review: A Gender Agenda in Computer Ethics Internet Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599 Quote: “The use of a piece of intellectual property without the copyright holder’s permission (and therefore against his will) is unfair to that copyright holder since it violates his right to determine what is to be done with that property. And this unfair use of another’s intellectual property constitutes a form of theft (Grisez, 1997).

Learning Expectation: To know about email spam and to characterize spam Book Review: The basic human goods (including life and health, knowledge, the harmony of friendship and community, and so forth) are basic not because we need them to survive but because we cannot flourish as human beings without them. These goods, which are intrinsic aspects of human well-being and fulfillment, are the primary ends or reasons for action and the ultimate source of normatively.

I believe in this, in the whole world we cannot deny that there are those people who separate themselves or consider themselves as “poor” or “rich” so therefore they are not for those type of people. The way I see it people should not think of that and it must be eliminated. How will we eliminate those things? The rich people must distribute their wealth. The money is not distributed properly therefore many people are not accepting the right amount or sometimes are not accepting anything.

95

What I learned: I have learned that there is a line that separates the poor and the rich people. And the way I see it people do not want to accept that all are equal, specially the rich people. Integrative Question: • • • • •

What is gender agenda? What are its ethical issues? Does gender a big factor in ethics? If so, how come? Can these be fixed?

96

BOP 97

Andrew Adnan Fortuna 10667652 ITETHIC

THE FORTUNE AT THE BOTTOM OF THE PYRAMID

Book Review: The Market at the Bottom of the Pyramid. Internet Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291 Quote: All of us are prisoners of our own socialization. The lenses through which we perceive the world are colored by our own ideology, experiences, and established management practices. Each one of the groups that is focusing on poverty alleviation- the World Bank, rich countries providing aid, charitable organizations, national governments and the private sector- is conditioned by its own dominant logic. Let us, for example, examine the dominant logic of each group as it approaches the task of eradicating poverty.

Learning Expectation: To know the deeper meaning of what is the market at the bottom of the pyramid. I want to know what the market symbolizes. Book Review: To start off, this chapter basically talks about how a business targets the bottom of the pyramid. I was shocked at first that this book talks about business at all. When I saw the title, there was nothing related to business that entered my mind. I thought that this book was some kind of a fiction story. Anyways, this chapter helps the readers determine who and what their target market are. This chapter tells us readers that it is essential for a business to always begin in the bottom of the pyramid since it has the largest population. For the people who are just starting their business, it is best for them to start at the bottom since it has the most number of people. But of course, your products must suit the people at the bottom of the pyramid. rd

As a 3 year college student, it is normal for us to think of our future since it is very soon. I myself am thinking to whether start my own business or work in a big corporation. If I were to start my own business, this book will be a big help for me. This chapter taught me that when I should start, I should first

98

target my market at the bottom part of the pyramid before I think about what products or services I would sell or offer. The book says that there is a good chance that my business will turn out to be successful just as long as I follow the book. What I learned: I learned that the bottom of the pyramid is a swell target market since it has the biggest population. The bigger the population, the more profit you earn. I also learned that you should first consider your target market before you choose what products to sell or what services to offer because your target market might not be suitable for your products. It is much better to choose your market first and use that as your basis for your products and services. Integrative Questions: • • • • •

What kind of people are at the bottom of the pyramid? Does the bottom of the pyramid a good target market? Is it better to choose your target market first? Is it good to base your products to your target market? What is at the bottom of the pyramid?

99

Andrew Adnan Fortuna 10667652 ITETHIC

THE FORTUNE AT THE BOTTOM OF THE PYRAMID

Book Review: Products and Services for the BOP Internet Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291 Quote: These challenges are not isolated conditions. Involvement in BOP markets will challenge assumptions that managers in MNCs have developed over a long period of time. A new philosophy of product development and innovation that reflects the realities of BOP markets will be needed. This philosophy must represent a different perspective from those that we have grown accustomed to in serving Western markets.

Learning Expectation: I expect to learn that this chapter will greatly help the readers to determine what products and services are suitable for the people at the bottom of the pyramid. Book Review: At the previous chapter, it tells us that targeting your market at the bottom of the pyramid is best. After doing so, this chapter tells us that we should know the products and services that will be a big hit for the people at the bottom of the pyramid in order for the business to be successful. This is very essential for a business because if your products do not go well with your target market, there is a great chance that your business would not last long since not so many people would purchase your product. If you are a person who belongs at the bottom of the pyramid, and you see a store which sells products that are very much expensive, would you even bother to buy or even enter the store perhaps? That is what I believe the chapter is telling us readers. I believe that the whole book, “The fortune at the bottom of the pyramid” is a guide for the people who are interested in starting their own business. I think that it is a six detailed steps in order for your business to succeed. In this chapter, we already have to steps. First is to target your market at the bottom of the pyramid and secondly, choose products and services which go well with your target market. What I Learned: I learned that after selecting that your target market must be the bottom of the pyramid, you should appropriate your products and services based on your target market. I think we need to base our products to our target market so that we the producers would know their dislikes and likes, in order for us

100

to gain profit. We must need to know their wants and needs and they must be satisfied with the products that we produce. Integrative Questions: • • • • •

Is it wise to base your products to your target market? What are the products that go well with the people at the BOP? What are the services that go well with the people at the BOP? What is the step before choosing your products and services? What are the 12 BOP Innovative Principles?

101

Andrew Adnan Fortuna 10667652 ITETHIC

THE FORTUNE AT THE BOTTOM OF THE PYRAMID

Book Review: A Global Opportunity Internet Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291 Quote: Involvement in BOP markets will challenge assumptions that managers in MNCs have developed over a long period of time. A new philosophy of product development and innovation that reflects the realities of BOP markets will be needed. This philosophy must represent a different perspective from those that we have grown accustomed to in serving Western markets. Learning Expectation: I expect to learn what the title of this chapter meant which is “A Global Opportunity”. I want to know what it does to help a person run a business successfully. Book Review: I believe that this chapter is somewhat similar in the first chapter. This chapter also tells us how important for a business to target their market at the bottom of the pyramid since the number of people is in a large amount. Since it is a large number of people, the more people are in need of a product. The more needy people, the more profit you earn. There is this company we studied in our ethics class wherein this company targeted the bottom of the pyramid. This is CEMEX. CEMEX is known for its outstanding and world-class cement. The difference between CEMEX and other cement companies is that, CEMEX sells their products as solutions instead of the ordinary. Their target market is also different from the other cement companies since CEMEX targeted the bottom of the pyramid in a pa reticular place. Because of that, CEMEX grew and become a known throughout the world. Even though they are a huge company now, their market is still open for the bottom part of the pyramid. They have products to sell and services to offer for the people in the bottom of the pyramid. What I learned: I learned that it is a very good idea that a company must target the bottom part of the pyramid as their market since it has a big population. As I said above, the larger number of people, the more people are in need of a product. The more needy people, the more profit you earn. It is wise for a company to sell their products to the needy ones. Integrative Questions:

102

• What does the book call the process of determining the products and services that big companies should sell and offer? • Did CEMEX target the bottom part of the pyramid? • What is a sustainable development? • How can the BOP be a global opportunity? • Is it for the betterment of a company to follow the Fortune at Bottom of the Pyramid?

103

Andrew Adnan Fortuna 10667652 ITETHIC

THE FORTUNE AT THE BOTTOM OF THE PYRAMID

Book Review: The Ecosystem for Wealth Creation Internet Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291 Quote: Every developing country has the components of this portfolio. However, the relative importance of the various components of the ecosystem is different across countries. For example the extralegal (those who exist outside the legal system) vegetable sellers in the slums of the San Paulo or Mumbai coexist with global firms such as ford and unilever. The chicken cooperatives and processors such as Sadia in southern Brazil and a local fast food chain such as Habib’s coexist with Kentucky Fried Chicken and McDonalds. Whether it is in Brazil, Mexico, South Africa, or India, a portfolio of these constituents of various ecosystems exists.

Learning Expectation: To fully understand what the ecosystem for wealth creation mean. I also expect to learn that this will help us readers to become successful when we decide to put up our own business someday. Book Review: I believe that this chapter tells us readers that it is very important to follow what is written in this book because this may result into having your very own company become known and may earn lots of money. In order to do so, you should start off by setting your target market to the bottom of the pyramid since they are plenty. Do not worry about placing a high mark up on your product. Just set your target on the bottom of the pyramid and your business is good to go. Of course, you should choose your products first. These products must go well and must be suitable for the people under the pyramid. If your products are not suitable for them, do not expect that your business will grow. Expect that your business will close soon. I believe the right products should be items which are in great demand but very affordable. Examples of products which very ideal to sell to the lower part of the pyramid are hygienic items, food, etc… These products are most likely goes well with the people at the bottom of the pyramid since it is cheap, important and useful. If I were to put up my own business, my products would be somewhat similar to what Proctol&Gamble sells. Their product is perfect for the bottom of the pyramid because it is cheap and is an everyday necessity. What I Learned:

104

I learned that it does not matter if your target market is the higher part of the pyramid because that does not tell whether your business would grow or not. The book even advices us that when we will put up our own business someday, we should target the lower part of the pyramid since it has the biggest population. Even though your products are not that expensive, you will earn more profit when sell many inexpensive items rather than selling less expensive items. Integrative Questions: • • • • •

What is an ecosystem? What is the meaning of wealth creation? Is it good for a company to focus the market on the lower end of the pyramid? Is it not wise to focus the market on the top pyramid? What are the benefits of having the bottom part of the pyramid as your target market?

105

Andrew Adnan Fortuna 10667652 ITETHIC

THE FORTUNE AT THE BOTTOM OF THE PYRAMID

Book Review: Reducing Corruption: Transaction Governance Capacity Internet Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-EradicatingPublishing/dp/0131877291 Quote: Most developing countries do not fully recognize the real costs of corruption and its impact on private-sector development and poverty alleviation. The capacity to facilitate commercial transactions through a system of laws fairly enforced is critical to the development of the private sector. I call this a nation’s TGC as opposed to TGC within the ecosystem we considered in the previous chapter. In this chapter, we examine the need for and the process by which countries can develop their TGC.

Learning Expectation: I expect to learn that this chapter will explain itself thoroughly on how reducing corruption is related in putting up a business. Book Review: I believe that corruption was suddenly placed in this book because there is also a logical reason behind it that is somewhat related to the people at the bottom of the pyramid. As we all know, the bottom of the pyramid is the biggest part of the pyramid. That means it is where it has the most number of people. If you target the bottom part of the pyramid, and used it to promote anti-corruption, there is a good chance of you dealing with the problem well. Since you have the voice of the majority, it is easier for you to control the minority since they are just the minorities. A good example of this is the first ever people power wherein the people get together in order to persuade Former President Ferdinand E. Marcos to step down. Former President Corazon Aquino was the one who led the people to revolt against rd Marcos. She has the power on the majority. In our case, the Philippines is a 3 world country. This means that its majority is mostly the less fortunate. I believe that if you want to have the people in the bottom of the pyramid, you should seek the approval of the less fortunate. What I Learned: I learned that it is not just business that people can benefit if you target the bottom of the pyramid. It can also help you reduce corruption since the majority is on your side. If you already have the hearts of the people at the bottom of the pyramid, you are already shaped up. I also learned that in business, corruption may still affect your business, big time! Integrative Questions:

106

• • • • •

What is TGC? Does corruption affect businesses? Does the BOP help reduce corruption? What does the BOP do the reduce corruption? What is the Andhra Pradesh experiment?

CYBER ETHICS CHAPTER 22-44 107

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: On the Web, Plagiarism matters more than Copyright piracy Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Although commonly confused, the values inherent in copyright policy are different from those inherent in scholarly standards for the proper accreditation of ideas. Piracy is the infringement of a copyright and plagiarism is the failure to give credit. They are confused because the most common examples of these wrongs involve both sorts of wrongs. But it is not hard to give examples that separate them. It would be plagiarism but not piracy for me to take the works of an obscure 19th century poet and try to pass them off as my own. Since the copyright will have expired on such works, this is not piracy. But it remains plagiarism of the sort that could be grounds for dismissal from journalism post. It would be piracy but not plagiarism if I were to edit a volume of modern poetry and forget to get copyright. Learning Expectation: I expect to learn why plagiarism matters more that copyright piracy Book Review: I will first differentiate the two topics. I will first start to define what Plagiarism is. According to Wikipedia, Plagiarism is the use or close imitation of the language and ideas of another author and representation of them as one's own original work. In other words, Plagiarism is the act of copying a person’s work and claiming it as its own. Plagiarism, here in the Philippines, is being treated seriously. If you are a student, and was caught Plagiarizing, you are ground for suspension which may lead to expulsion. In the business world, journalism perhaps, if you are caught Plagiarizing, you are ground to suspension and may lead to termination. What is Copyright Infringement then? According to Wikipedia, Copyright Infringement is the unauthorized use of material that is covered by copyright law, in a manner that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works. In layman’s term, Copyright Infringement is when you copy a copyrighted work without asking for authorization. So what is the difference between the two? Basically, Copyright Infringement is copying a work which is copyrighted first while Plagiarism is using or copying something from a person without citing

108

him/her and claiming it as your own. That is why on the web, Plagiarism is more profound rather than Copyright Infringement since people just place their ideas and information freely. People too could get their ideas and information without any hassle. What I learned: I learned that the difference between Plagiarism and Copyright Infringement is that Copyright Infringement is copying a work which is copyrighted first while Plagiarism is using or copying something from a person without citing him/her and claiming it as your own. Integrative Questions: • • • • •

What is Plagiarism? What is Copyright Infringement? Is Plagiarism and Copyright Infringement different? What makes the two different? What matters more in the web?

109

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: An Ethical Evaluation of Website Linking Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Given the potential for harm cited in these cases, what should be done about deep linking? To some extent, the resolution of this normative question depends upon whether or not a web site can be classified as private property and, if so, what specific rights should belong to the property owner. When authors create websites and put them on the World Wide Web, do those sites in effect become part of the internet commons and does this give others an implied license to link to those sites in any way they choose? Or are they still the intellectual property of their owners despite their quasi-public and social nature? Before we explicitly consider this question, it is instructive to review the prominent theories of intellectual property that have been invoked to justify property rights. Learning Expectation: I expect to learn what Ethical Evaluation of Website Linking is. I want to know how important it is to know it. Book Review: Before I begin, I would like to start off by giving out the definition of Website Linking. In my words, Website Linking is that act of bridging out two or more particular websites in order for those websites to connect with each other. I honestly cannot understand completely what this chapter wants to talk about. I believe that this chapter wants to tell the reader that Website Linking has an issue that arises because it opposites the Intellectual Property law. Intellectual Property is once again defined as are legal property rights over creations of the mind, both artistic and commercial, and the corresponding fields of law. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets according to Wikipedia.

110

What I learned: I learned that even just with the simple process of website linking, ethical issues are still present within its vicinity. Integrative Questions: • • • • •

What is website linking? Is website linking advantageous? Is website linking disadvantageous? What are the ethical issues present? What is IP?

111

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: The Cathedral and the Bazaar Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The fact that the bazaar style seemed to work, and work well, came as a distinct shock. As I learned my way around, I worked hard not just at individual projects, but also at trying to understand why the Linux world not only didn’t fly apart in confusion but seemed to go from strength at a speed barely imaginable to cathedral-builders. By mid-1996 I thought I was beginning to understand. Chance handed me a perfect way to test my theory in the form of an open-source project that I could consciously try to run in the bazaar style. So I did – and it was a significant success. This is the story of that project. I’ll use it to propose some aphorism about effective open-source development. Not all of these are things I first learned in a Linux world, but we’ll see how the Linux world gives them particular point. If I’m correct, they’ll help you understand exactly what it is that makes the Linux community such a fountain of good software – and, perhaps, they will help you become more productive yourself. Learning Expectation: I expect to learn what the author meant about the cathedral and the bazaar. I want to know what symbolizes it. Book Review: Basically this chapter talks about the Linux Operating System. According to Wikipedia, Linux is a generic term referring to Unix-like computer operating systems based on the Linux kernel. Their development is one of the most prominent examples of free and open source software collaboration; typically all the underlying source code can be used, freely modified, and redistributed by anyone under the terms of the GNU GPL and other free licenses. In other words, Linux is an operating system which is based on open source software. Why did the author use Cathedral and the Bazaar as the title? Well, If I were not to read this chapter, I would know it for sure. It was far away from my mind that what the author wants us to see that the Cathedral symbolizes peace and serenity. Linux is an Operating System which was carefully done with precise actions. Linux was made to perfection in order for the people to buy it. The Bazaar symbolizes people, interacting with people and market. Well, the author would want to market the perfect ordeal.

112

What I learned: I learned that this chapter talks about the Linux Operating System. I also learned that, the author used the Cathedral and the Bazaar only as symbols. Integrative Questions: • • • • •

Why was the chapter called the cathedral and the bazaar? What does the cathedral mean? What does the bazaar mean? What is the operating system that was being talked about in this chapter? What are the ethical issues present?

113

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Towards A Theory of Piracy for the Information Age Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: I have argued that using the core value framework, privacy can be grounded both instrumentally and intrinsically – instrumentally, as a support of all the core values, and intrinsically, as an expression of security. I am, however, concerned that the traditional instrumental/intrinsic understanding may be misleading. Traditionally, instrumental/intrinsic analyses push us in the direction of a search for a summum bonum, a greatest good. We try to find the one thing to which all other things lead. In the core value approach that I am advocating, some values may be more important than others, but there is not a summum bonum. Rather the model is one of an intersupporting framework. The core values, as the beams of a truss, are in support of each other. Learning Expectation: I expect to learn the Theory of Piracy for the Information Age. I want to know the importance of the Theory of Piracy for the Information Age. Book Review: To begin with, I would like to define what Piracy is. According to Wikipedia, Piracy is the ability of an individual or group to seclude them or information about themselves and thereby reveal them selectively. The boundaries and content of what is considered private differ among cultures and individuals, but share basic common themes. Privacy is sometimes related to anonymity, the wish to remain unnoticed or unidentified in the public realm. When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear. In other words, Piracy is the capability of the person copy something. A good example of this is the DVDs and other compact discs that are available almost anywhere. These are pirated CDs. They have many ways in doing so. Others go to cinemas and record the movie while it is playing. Others have connections to the movie industry and sneak out a movie or two. From that CD, that certain person will make hundreds or even thousands of copies from it.

114

What I learned: I learned that this chapter talks about Piracy and how people can do stuff just to sell those things. Integrative Questions: • • • • •

What is Piracy? Is Piracy ethical? Are their ethical issues present? What is the difference between Piracy and Plagiarism? What is the difference between Piracy and Copyright Infringement?

115

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the Free Movement of Such Data. Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: But even if a processing is legitimate, it is not necessarily permitted if the data is of a sensitive in nature. Personal data revealing racial or ethnic origin, political opinions, religious beliefs, tradeunion membership, and the processing of data concerning health or sex life are singled out as particularly sensitive. These special categories of data are sensitive in the sense that the dissemination of such data can be particularly harmful to the data subject’s interests. Learning Expectation: I expect to learn The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with regard to the Processing of Personal Data and the Free Movement of Such Data. Book Review: This chapter basically talks about how the structure of rights in directive can protect individuals regardless of the personal data he/she acquires. First of all what is data? According to Wikipedia, Data refers to information or facts usually collected as the result of experience, observation or experiment, or processes within a computer system, or premises. Data may consist of numbers, words, or images, particularly as measurements or observations of a set of variables. Data are often viewed as a lowest level of abstraction from which information and knowledge are derived. In other words, Data is raw information which is not yet fully-classified or fully-organized. Since we already know what Data is, let us talk about how the structure of rights in directive can protect individuals. Well I believe that structure of rights in directive has a big impact on someone because an individual will become aware of his/her rights. What I learned: I learned that this chapter talks about the Structure of Rights in Directive 95/46/EC on the Protection of Individuals with regard to the Processing of Personal Data and the Free Movement of Such Data.

116

Integrative Questions: • • • • •

What is the structure of rights in directive? What is data? Are their ethical issues present? How did it protect the individual? What is privacy?

117

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Privacy Protection, Control of Information, and Privacy-Enhancing Technologies Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: We believe this tradition of identifying the concept of privacy with control is misleading. Control of personal information is extremely important as, of course, is privacy. But, these concepts are more useful when treated as separable, mutually supporting concepts than as one. A good theory of privacy has at least three components: an account of the concept of privacy, an account of the justification for privacy, and an account of the management of privacy. This tripartite structure of the theory of privacy is important to keep in mind that because each part of the theory performs a different function. To give an account of one if the parts is not to give an account of the others. The concept of privacy itself is best defined in terms of restricted access, not control. Privacy is fundamentally about protection from intrusion and information gathering by others. Individual control of personal information, on the other hand, is part of the justification of privacy and plays a role in the management of privacy. Privacy and control do it fit together naturally, just not in the way people often state. Learning Expectation: I expect to learn Privacy Protection, Control of Information, and Privacy-Enhancing Technologies Book Review: What is Privacy Protection? Let me begin by answering this question with the definition of Privacy Protection. Like what its word is saying, it is to protect one’s privacy. A question then followed up and went inside my head and asked why do we have to protect our privacy? If you have common sense, of course you’ll say that you have to protect your privacy because it is you we are talking to. Without protection, do you people meddling with your life? What is Control of Information? What I understood in after reading is that, Control of Information is a task wherein it is critical for a person to control his/her information because this might endager his/her privacy. What is Privacy-Enhancing Technologies? Like what its name said, It is a technology wherein it helps protect an individual’s privacy. What I learned:

118

I learned that this chapter talks about the Structure of Rights in Directive 95/46/EC on the Protection of Individuals with regard to the Processing of Personal Data and the Free Movement of Such Data. Integrative Questions: • • • • •

What is Privacy Protection? What is Control of Information?? Are their ethical issues present? What is Privacy-Enhancing Technologies? What is privacy?

119

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Toward an Approach to Privacy in Public: Challenges of Information Technology Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Many influential approaches to privacy emphasize the role of privacy in safe guarding a personal or intimate realm where people may escape the prying and interference of others. This private realm, which is contrasted with a public realm, is defined in various ways. It is deliminated by physical boundaries, such as the home; by personal relationships, such as family, friends and intimates; and by selected fields of information, such as personal, sensitive, or embarrassing information. Privacy is worthy of safeguarding, these approaches argue, because intimacy is important; privacy is worth protecting because we value the sanctity of a personal realm. Learning Expectation: I expect to learn Approach to Privacy in Public. I also expect to learn the challenges of Information Technology. Book Review: In the Information Technology world, problems and challenges is always top of the attendance sheet. What am I trying to say is that, problems and challenges are always present in the Information Technology world. One problem that I can say that the Information Technology Industry faces is Privacy. Since there are ethical issues towards Privacy, how can the Information Technology choose which is which? That is one of the biggest problems they face. I’ll give an example of why Privacy is a problem to further defend my answer. Let’s say that I work now in the Information Technology Industry. I am now a certified programmer/developer. I have this client which asked me to develop a project of his but wants to get the codes I used. As a programmer, handing out your source codes is hard because it is your right to privacy. Since it is your client, you are not mixed up with what to do. What I learned: I learned that this chapter talks the problems and challenges the Information Technology Industry or IT Industry faces. I big problem they face is Privacy.

120

Integrative Questions: • • • • •

What are the Problems and Challenges the IT Industry faces? What are the two misleading assumptions about privacy? Are their ethical issues present? What does the first assumption mean? What does the second assumption mean?

121

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: KDD, Privacy, Individuality, and Fairness Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: It should be observed that group profiles may occasionally be incompatible with respect to individuals privacy and rules and regulations regarding the protection of personal data, as it is commonly conceived of. For instance, distributive profiles may sometimes be rightfully thought of as infringement of individual privacy when the individuals involved can easily be identified through a combination with other information available to the recipient or through spontaneous recognition. In the case of nondistributive profiles, however, the information remains attached to an information subject constituted by a group. It cannot be tracked back to individual persons in any straightforward sense. Learning Expectation: I expect to learn what KDD, Privacy, Individuality, and Fairness. I also expect to learn the importance of KDD, Privacy, Individuality, and Fairness. Book Review: I would begin my review by explaining what KDD is. It is written in the article that KDD or also known as Knowledge discovery in databases (KDD) has been described as the nontrival extraction of implicit, previously unknown, and potentially useful information from data. The KDD process is usually divided into three phases: the data warehousing phase, the data mining phase and the interpretation phase. In other words, KDD is a method of hauling out of hidden patterns in raw data. These are a very helpful tool. What does Privacy got to do with KDD? Well, I believe that Privacy and KDD are contradictory because I think based on the definition of KDD which is a method of hauling out of hidden patterns in raw data; privacy is being stepped on or violated here. Instead of hiding data which is protecting one’s Privacy, it data mines. It digs out hidden patterns from data. What I learned: I learned that that Privacy and KDD are contradictory because I think based on the definition of KDD which is a method of hauling out of hidden patterns in raw data; privacy is being stepped on or

122

violated here. Instead of hiding data which is protecting one’s Privacy, it data mines. It digs out hidden patterns from data. Integrative Questions: • • • • •

What does stand for KDD? What does KDD do? What is Individuality? What is Fairness? Does these 4 relate to each other?

123

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Data Mining and Privacy Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Traditional information retrieval from databases returns database records – or turples derived from fields of records - in response to a query. Hence what is returned is explicit in the database. Knowledge discovery using data mining techniques differs from ordinary information retrieval in that what is sought and extracted- mined from the data is not explicit in the database. Rather, objects that typically will not exist a priori, patterns which are implicit data and can be used for either descriptive or predictive purposes, are discovered. Learning Expectation: I expect to learn what Data Mining is and what Privacy is. I also expect to learn that this chapter will explain its relationship Book Review: Similar to the previous chapter, KDD is also Data Mining. Actually, when I searched Wikipedia about the definition of KDD, it re-directed me to the page of Data Mining. So, according to Wikipedia, Data Mining is the process of extracting hidden patterns from data. As more data is gathered, with the amount of data doubling every three years data mining is becoming an increasingly important tool to transform this data into information. It is commonly used in a wide range of profiling practices, such as marketing, surveillance, fraud detection and scientific discovery. What does Privacy got to do with Data Mining? Well, I believe that Privacy and Data Mining are contradictory because I think based on the definition of Data Mining which is a method of hauling out of hidden patterns in raw data; privacy is being stepped on or violated here. Instead of hiding data which is protecting one’s Privacy, it data mines. It digs out hidden patterns from data.

What I learned: I learned that that Privacy and Data Mining are contradictory because I think based on the definition of Data Mining which is a method of hauling out of hidden patterns in raw data; privacy is being

124

stepped on or violated here. Instead of hiding data which is protecting one’s Privacy, it data mines. It digs out hidden patterns from data. Integrative Questions: • • • • •

What is Data Mining? What is its relation to Privacy? Is there an ethical issue present? Are KDD and Data Mining alike? Why are they alike?

125

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Workplace Surveillance, Privacy, and Distributive Justice Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: For the individual, privacy secures autonomy, creates social capital for intimacy, and forms the basis of structuring many diverse social relations. It is generally accepted that it is in the interest of the individual to have maximum control over her privacy – here taken to be the freedom from the appropriate judgement of others. For the collective or institution, transparency secures control and thereby efficiency of resource allocation and utilization as well as creating mechanisms for disciplinary intervention. It is generally accepted that it is in the interest of the collective or institution to have maximum control over surveillance – here taken to mean subjecting all individuals in the institution to reasonable scrutiny and judgement. If the individuals are given an absolute right to privacy, they may act only in their own interest and may thereby defraud the institution. Learning Expectation: I expect to learn what Workplace Surveillance, Privacy, and Distributive Justice is. I also expect to learn the importance of Workplace Surveillance, Privacy, and Distributive Justice. Book Review: I’d start off by defining what Surveillance is. Surveillance is the monitoring of the behavior of a person or group of people, often in a surreptitious manner. Although the word surveillance in French literally means "watching over", the term is often used for all forms of observation or monitoring, not just visual observation. In other words, Surveillance is an act of monitoring a person or a group of person. What is Workplace Surveillance? I think that a Workplace Surveillance is where a device is used to monitor a specific person or a group of people in an office. I believe that Workplace Surveillance and Privacy also are contradicts since Workplace Surveillance lets you be monitored. If you are a person who is serious of your Privacy, then you might be pissed because of the Workplace Surveillance. That is why an issue is present here. What I learned:

126

I learned that that Workplace Surveillance and Privacy are contradictory because I think based on the definition of Workplace Surveillance which where a device is used to monitor a specific person or a group of people in an office.; privacy is being stepped on or violated here. Instead of respecting one’s privacy by not monitoring that person every minute of every day, it does the opposite. But when you look at it, Workplace Surveillance’s intentions are good because its intentions are just for security purpose only. It does not mean to disrespect someone’s privacy. Integrative Questions: • • • • •

What is Surveillance? What is Workplace Surveillance? What is its relation to Privacy? Is there an ethical issue present? Is it ethically wrong to put an Surveillance camera in the office?

127

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Privacy and Varieties of Moral Wrongdoing Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The privacy issue lies at the heart of an ongoing debate in nearly all Western democracies between liberalists and communitarians over the question how balance individual rights and collective goods. The privacy issue is concerned more specifically with the question of how information in order to protect individuals and the claims of those who want to make information about individuals available in order to benefit the community. This essential tension emerges in many privacy discussions, e.g. undercover actions by the police on the internet, use of Close Circuit Televisions in public places, making medical files available for health insurance purposes… Learning Expectation: I expect to learn what Privacy and Varieties of Moral Wrongdoing is. I also expect to learn the importance of Privacy and Varieties of Moral Wrongdoing. Book Review: I’d start off by explaining what Moral Wrongdoing is. As we all know, Wrongdoing is a bad deed done by a person or a group of people. But why is Wrongdoing accompanied by the world Moral? According to Wikipedia, Moral is a message conveyed or a lesson to be learned from a story or event. The moral may be left to the hearer, reader or viewer to determine for themselves, or may be explicitly encapsulated in a maxim. In other words, moral is a good thing. So why are they together? Is it not an oxymoron? This chapter talks about how a person has his/her reason to protect from him or herself from getting harmed. This chapter talks about the three moral reasons for data protection. First is Information based harm, second is information inequality and lastly, information justice. What I learned: I learned that there are three moral reasons for data protection. First is Information based harm, second is information inequality and lastly, information justice.

128

Integrative Questions: • • • • •

What is Wrongdoing? What is Moral Wrongdoing? What is Privacy? What is its relation to Privacy? What are the varieties of Moral Wrongdoing?

129

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Further cases of criminal activity involving computer technology may cause us to re-examine the tripartite scheme of computer crime advanced in this essay. One recent form of criminal activity that seems potentially to border on computer crime is a criminal act involving the act of digital telephony. Basse points out that in the use of cellular phones, a popular technique for avoiding charges is “cloning” – i.e. reprogramming one’s cellular phone to transmit another customer’s number. When true “computer telephony” (the merging of computers and telephones, also known as Internet phones) arrives, we may need to re-examine our proposed definition of computer crime. Learning Expectation: I expect to learn the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace. I also expect to learn the importance of defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace. Book Review: As I stated at my previous chapter on Piracy, according to Wikipedia, Piracy is a war-like act committed by a nonstate actor, especially robbery or criminal violence committed at sea, on a river, or sometimes on shore, either from a vessel flying no national flag, or one flying a national flag but without authorization from a national authority. It does not normally include crimes on board a vessel among passengers or crew. The term has been used to refer to raids across land borders by nonstate actors. In other words, Piracy is a crime. Similar to Piracy, Break-Ins are also computer crime. From what I understood, Break-In is the act of hacking in someone’s system and sabotage his/her work or steal some important files which should not be opened.

130

What I learned: I learned that there is Piracy, Break-Ins and Sabotage in Cyberspace are big Computer Crimes which the IT Industry also faces today.

Integrative Questions: • • • • •

What is Piracy? What is a Break-In? Are they both Computer Crimes? What are the boundaries of Computer Crimes? Are there ways to prevent these crimes?

131

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Hacktivism is in its infancy, but, given the ubiquity and democratizing possibility of the internet, we will certainly bear witness to the movement’s growing pains and increasing maturity. One thing is sure, however. Incidents of cyber activism are the rise and will continue to be on the rise in the near future. Learning Expectation: I expect to learn Terrorism or Civil Disobedience: Toward a Hacktivist Ethic. I also expect to learn the profound meaning of Hacktivism. Book Review: I would begin by defining what Hacktivism. Based on the reading material given, Hacktivism is defined as the (sometimes) clandestine use of computer hacking to help advance political causes. Hacktivist groups such as Electronic disturbance theater, the cult of the dead cow, and the Hong Kong blondes have used electronic civil disobedience to help advance the Zapatista rebellion in Mexico, protest nuclear testing at India’s Bhabba Atomic Research Center, attack Indonesian Government Websites over the occupation of East Timor, as well as protest and anti-democracy crackdowns in China. From what I understood, Hacktivism is not ethically wrong because, they are hacking for a good purpose. I believe this is what ethical hacking is. But if you ask any ordinary person whether hacking is a right thing to do or the wrong thing to do, they will answer you straight that hacking is entirely wrong. Of course, they do not know that hacking can become a good deed just as long as your purpose of hacking will benefit the common good and will not harm other people.

What I learned: I learned that there is a good way of Hacking and is not ethically wrong. It is called, Hacktivism.

132

Integrative Questions: • • • • •

What is Hacktivism? Is it ethically wrong? Is there such thing as ethical hacking? When can a hacker be ethically hacking? What should be one’s purpose if he/she would ethically hack?

133

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Web Security and Privacy: An American Perspective Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Browsing the Web gives one the heady feeling of walking without footprints in cyberspace. Yet data surveillance can be both ubiquitous and transparent to the user. Can those who browse the Web protect their privacy? And does it matter if they cannot? I offer answers to these questions from the American legal tradition. The American Legal Tradition focuses on a right to privacy, rather than a need for data protection. Yet illuminating Web privacy from this particular perspective throws a broader light in how the fundamental rights of speech, assembly and freedom of religious inquiry may depend upon electronic privacy in the information age. Learning Expectation: I expect to learn Web Security and Privacy and why is it entitled as an American Perspective. I also expect to learn the importance of Web Security and Privacy. Book Review: To start off, I will first define what Web Security is. Based on my own knowledge, I believe that Web Security is the act of protecting people from harmful websites and other inappropriate things that are happening in the World Wide Web. Privacy on the other hand, is again defined as the ability of an individual or group to seclude them or information about themselves and thereby reveal them selectively. That was according to Wikipedia. Web Security and Privacy are 2 agreeing words unlike the other past words that are accompanied by Privacy. I believe that they are not contradicting because Web Security is just responsible for preventing users be harmed by malicious sites. This does not contradict Privacy in anyway.

134

What I learned: I learned that Web Security is the act of protecting people from harmful websites and other inappropriate things that are happening in the World Wide Web. I also learned that Web Security and Privacy are 2 agreeing words unlike the other past words that are accompanied by Privacy. Integrative Questions: • What is Web Security? • What is Privacy? • Is there an ethical issue present? • What is the difference between Web Security and Privacy? • Why is the chapter entitled as an American Perspective?

135

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: The Meaning of Anonymity in Information Age Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The natural meaning of anonymity, as may be reflected in ordinary usage or dictionary definition, is of remaining nameless, that is to say, conducting oneself without revealing one’s name. A poem or a pamphlet is anonymous when attributable to a named person; a donation is anonymous when the name of the donor is withheld; people strolling through a foreign city are anonymous because no one knows who why are. Extending this understanding into electronic sphere, one might suppose the conducting one’s affairs, communicating; engaging in transactions anonymously in the electronic sphere is to do so without one’s name being known. Specific cases that are regularly discussed include. Learning Expectation: I expect to learn the Meaning of Anonymity in Information Age. I also expect to learn the importance of the Meaning of Anonymity in Information Age. Book Review: Let me begin by expounding the definition of Anonymity. Based on Wikipedia, Anonymity is derived from the Greek word ανωνυµία, meaning "without a name" or "namelessness". In colloquial use, the term typically refers to a person, and often means that the personal identity or personally identifiable information of that person is not known. In other words, Anonymity is when a person does not use his real identity and hides it from the public. What is Information Age? According to Wikipedia, Information Age is also known commonly as the Computer Age or Information Era, is an idea that the current age will be characterized by the ability of individuals to transfer information freely, and to have instant access to knowledge that would have previously have been difficult or impossible to find. In layman’s Term, Information Age is the time wherein the age of technology and other enhanced mechanism bloomed.

136

What I learned: I learned that Anonymity is when a person does not use his real identity and hides it from the public. I also learned that Information Age is the time wherein the age of technology and other enhanced mechanism bloomed. Integrative Questions: • • • • •

What is Anonymity? What is Information Age? What is the Meaning of Anonymity in Information Age? Is there an ethical issue present? What is a gatekeeper?

Andrew Adnan Fortuna

137

10667652 ITETHIC

CYBER ETHICS

Book Review: Double Encryption of Anonymized Electronic Data Interchange Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: To keep the GP as a sender of anonymized data also anonymous, we have to solve two main problems: 1. As soon as data are sent electronically, the senders identification is automatically added to the message. To anonymized the sender, an automatic process of replacing this identification must be implemented. 2. To decrypt an encrypted message, one must know the decryption key of the sender. However when the sender is anonymized, it is impossible to select the right key. An automatic process of key handling and decryption must be encrypted. Learning Expectation:

learn

I expect to learn Double Encryption of Anonymized Electronic Data Interchange. I also expect to the importance of Double Encryption of Anonymized Electronic Data Interchange.

Book Review: I would like to begin by defining what Encryption is. According to Wikipedia, is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted). In layman’s term, Encryption is the process of changing an unreadable text using different algorithms or techniques in order for that text to be readable.

What I learned: I learned that Encryption is defined as the process of changing an unreadable text using different algorithms or techniques in order for that text to be readable. Integrative Questions:

138

• • • • •

What is Encryption? What is Double Encryption? What is the Double Encryption of Anonymized Electronic Data Interchange? Is there an ethical issue present? What is the importance of Double Encryption of Anonymized Electronic Data Interchange?

139

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Written on the Body: Biometrics and Identity Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: So we are stuck with a riddle” How can a biometric identifier be both identifying and not saying anything particular about you? I think the key to this riddle may be found in the idea that meaning is not something intrinsic, but, following determined by use. Following this kind of reasoning, we should perhaps not expect to be able to determine any intrinsic meaning of biometric data, or the biometric body in general, but investigate quite specifically what uses and practices biometrics will become part of. Learning Expectation: I expect to learn what Biometrics and Identity mean I also expect to learn the importance of Biometrics and Identity. Book Review: I would like to begin by defining what Biometrics is. According to Wikipedia, Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. In other words, Biometrics is used to track and monitor people who are under surveillance. Usually, Biometrics is used in government agencies especially in the Crime Department since Biometrics identifies individuals in groups that are under surveillance. This is a big help for the Crime Department because they do not have to look for the people manually. What is Identity? Identity for me is a person’s existence. It is its human form, its wholeness. So what is the relationship between Biometrics and Identity? Well, obviously, based on the definition of Biometrics, the word indentify is there. Identify is related to Identity. Biometrics indentifies Identity. I therefore conclude that both of these words are not contradicting each other.

140

What I learned: I learned that Biometrics and Identity does not contradict each other since Biometrics identifies a person. Identity is a person.

Integrative Questions: • • • • •

What is Biometrics? What is Identity? Does Biometrics and Identity contradict? Where does Biometrics usually found? Is there an ethical issue present?

141

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Ethical Considerations for the Information Professions Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Information ethics, much like the technologies that continue to contribute to its complexity, will thrive and present new challenges of all of us. Ethics will continue to be put through new tests as technologies race ahead of many social and cultural conventions and norms. Ethics is the study of morality; the study of what we do. Morality could exist without ethics (if no one investigated how morality is done) but there cannot be ethics without morality (we cannot study morality unless there is morality)…. Morality is like eating; it is an inevitable part of everyone’s life. Ethics, on the other hand, is like nutrition. It is crucial to living a good life but it is not an inevitable part of living or an activity engaged in by all. Learning Expectation: I expect to learn what the ethical considerations for the Information Professions are. Book Review: I will begin by stating first what an Information Profession is. According to Wikipedia, Information Profession is a profession who works with information science, libraries, museums, or archives, although the field is changing rapidly to include other disciplines. Typically, an Information Professional is deemed as such only after receiving the degree of Master of Science in Information (or Library) Science from a university accredited by the American Library Association (ALA). In other words, Information Profession is a profession which handles anything just as long as it covers Information based learning. When we say ethical considerations, it is also saying that ethical considerations are rules. One thing that I remember when it comes to rules is the codes of ethics. Codes of Ethics are like guidelines that need to be followed in order for the individual, group or even a company be successful and minimize problems. What I learned: I learned that Ethical Considerations are also like Codes of Ethics since they are rules.

142

Integrative Questions: • • • • •

What is Information? What is an Information Profession? What are the ethical considerations for Information Profession? What is code of ethic? Is there an ethical issue present?

143

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Software Engineering Code of Ethics: Approved! Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Ethical tensions can best be addressed by thoughtful consideration of fundamental principles, rather than blind reliance on detailed regulations. These principles should influence software engineers to consider broadly who is affected by their work; to examine if they and their colleagues are treating other human beings with due respect; to analyze how the least empowered will be affected by their decisions; and to consider whether their acts would be judged worthy of the ideal professional working as a software engineer. Learning Expectation: I expect to learn the Software Engineering Code of Ethics and to know how important it is. I also expect that this will help me someday in the future.

Book Review: To be honest, I was a bit puzzled when I saw the title because my course is not really that related to Software Engineering. So, I asked myself, why on earth should I have to know the Code of Ethics of Software Engineering? Little that I know, that this will also help me since the code of ethics for Software Engineers are quite similar. It just has some points which are not of value for my course, Information Systems. But I believe that no matter what code of ethics it is, all I know is that, codes of ethics are there to mold a human being to become the best that he/she can be. In our ethics class, we were asked to create our own codes of ethics. In this way, our professor wants us to become good citizens before we hit the real world. He is now preparing us face reality which I believe is near. What I learned: I learned that Ethical Considerations are also like Codes of Ethics since they are rules.

144

Integrative Questions: • • • • •

What is a code of ethics? What does it do to a person? What is the Software Engineer Code of Ethic? Can that be applied to any course? Is there an ethical issue present?

145

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Those who write moral codes (or things that could be mistaken for them) need to be aware of the possibility that they may be abused. Codes that address some issues but not the others are very common, and particularly open to such abuse on issues at the edge of their competence. Codes should make it clear what their area of competence is. More importantly, thought, authors of codes should always make it clear that their code is no substitute for careful moral consideration and especially in areas or on questions where there is no clear guidance in the code. Learning Expectation: I expect to learn Why Incomplete Codes of Ethics are worse than none at All. I also expect to learn how important it is. Book Review: I was pretty interested when I saw the title first hand. I was interested because how come incomplete codes are much worse rather than having nothing written at all? In reality, we always come across with the Filipino statement “ok na yan kesa wala”. If you come to think of it, makes sense because less is really much better than having none at all. If I would put you in a situation wherein you lost your wallet and you have to pay for this stuff that costs, let’s say roughly around Php 100.00. I lent you 20 bucks since that is all I have. Will you accept it even though you still lack some? Of course, you will. Who in their right state of mind wouldn’t accept it at all? But in this chapter, is another way around. It is written that having an incomplete code of ethics is much worse rather than none at all. After reading this chapter, I realized that it is right that it is much worse to have incomplete codes of ethics because incomplete codes of ethics means that people will tend to look for ways in which; if they broke a code, they would find ways to go around it just slipped away since the codes of ethics is incomplete. But having none at all, is much better than that because at least we you were not able to place something yet. What I learned:

146

I learned that that having an incomplete code of ethics is much worse rather than none at all. Integrative Questions: • • • • •

What is a code of ethics? What does it do to a person? Which is worse, incomplete code of ethics or none at all? Why is it better to have none at all rather than having an incomplete code of ethics? Is there an ethical issue present?

147

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Subsumption Ethics Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: The difference between computers and simple machines is the extent to which computer systems subsume design and development decisions over which users have little or no control. Normally, such decisions are all but forgotten after implementation. Subsumption ethics describes this process. Learning Expectation: I expect to learn what Subsumption Ethics is. I also expect to learn the importance of studying Subsumption Ethics. Book Review: I would start off by defining what Subsumption is. Based on the reading material given, Subsumption in general is the process of building larger components from smaller ones. In this sense, a cell subsumes DNA function. American common law subsumes juridical decisions, and a half dryer subsumes an electric motor. Subsumption in computers is different because there is so much more Subsumption going on than in simple machines. In other words, Subsumption is the process of developing or enhancing a small portion to a larger portion. If we would combine the two words, Subsumption and Ethics, Subsumption Ethics means that is broadens the ethics of a person. It widens its scope into a much larger scenario. It makes you think big and not settle for something small. What I learned: I learned that Subsumption is the process of developing or enhancing a small portion to a larger portion. I also learned that Subsumption Ethics means that is broadens the ethics of a person. It widens its scope into a much larger scenario. It makes you think big and not settle for something small.

148

Integrative Questions: • • • • •

What does Subsumption mean? What is Subsumption Ethics? Which is worse, incomplete code of ethics or none at all? Why is it better to have none at all rather than having an incomplete code of ethics? Is there an ethical issue present?

149

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: Ethical Issues in Business Computing Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Finally, practical use of the systems is not only relevant issue. The actual material processed by business systems – all ‘data’ entered and generated – differs greatly. This is particularly important, as the nature of the data held on company systems must affect the uses to which it may ethically be put. For example, a list of names and addresses held on computer and used by a bookshop to mail invoices and statements is surely acceptable. However, if an identical list of names, addresses and invoice details were secretly examined and correlated to determine which customers were buying suspect literature, the ethical position is very different, and the need for the ethical consideration clear. Such issues need attention. Learning Expectation: I expect to learn what Ethical Issues in Business Computing is. I also expect to learn the importance of Ethical Issues in Business Computing. Book Review: Now a days, business computing is highly needed in the Information Technology Industry, since the time is of the essence, countries develops and so is technology. With business computing, it helps the Information Technology Industry to become updated and be more organized. Ethical Issues will always be present, regardless of what business you have. Example, if you are a partnership kind of business wherein you for example, you and your partner sells cars. You found out that your partner buys illegally imported cars from different places and re-selling it here in the Philippines. As a partner and a friend perhaps, of course you would not tell. But since it is ethically right to report to the authorities, you must do regardless of what your partner might say or feel about you. What I learned: I learned that Ethical Issues will always be present, regardless of what business you have.

150

Integrative Questions: • • • • •

What is Business? What are the ethical issues? What is Business Computing? Are problems always present in a business? Is there an ethical issue present?

151

Andrew Adnan Fortuna 10667652 ITETHIC

CYBER ETHICS

Book Review: The Practitioner From Within: Revisiting the Virtues Internet Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard Spinello/dp/0763737836 Quote: Traditionally computer ethics texts and courses involve taking students who are not philosophically trained, exposing them to action-guiding theories, presenting them with the codes of ethics of several companies and professional organizations, and asking them to make ethical decisions in scenario based cases. This approach is deliberately action based and focuses on doing. Learning Expectation: I expect to learn what the book meant about The Practitioner from Within. I also want to know if it is important. Book Review: I was wondering what did the book meant when he used an actor, The Practitioner. After reading the book, I realized that the Practitioner that the author was talking about is a Medical Practitioner. A question again entered my mind and I asked myself, why the author chose a Medical Practitioner to be a character here in the book. I then realized that a Medical Practitioner is a person who is very patient, caring, and understandable, knows his/her place, and a whole lot more. Again, I came to realize that this is the last part of the book. I believe that the author used the Medical Practitioner as a symbol of a person who followed the topics the ethical topics that were discussed here. What I learned: I learned that the Practitioner that the author was talking about is a Medical Practitioner. I also learned that the author used the Medical Practitioner as a symbol of a person who followed the topics the ethical topics that were discussed here.

Integrative Questions:

152

• • • • •

What is a Practitioner? What is a Medical Practitioner? Why did the author choose a Medical Practitioner? What does the Practitioner symbolizes? What does the book mean about The Practitioner from Within?

153

154

155

Related Documents

Ethic Reader
April 2020 23
Cmp Final - Adnan Fortuna
December 2019 7
Ethic Reader Deep
April 2020 14
Ethic Reader Arriola
April 2020 11

More Documents from ""