Ethic Reader Arriola

  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ethic Reader Arriola as PDF for free.

More details

  • Words: 27,216
  • Pages: 138
CYBER ETHICS | Marie Antoinette Arriola

TABLE OF CONTENTS

Cyber Ethics -------------------------------------------------------------- 3-92

Fortune at the Bottom of the Pyramid ---------------------------93-105

The Handbook of Information and Computer Ethics -------106-138

Page | 2

CYBER ETHICS | Marie Antoinette Arriola

CYBER ETHICS ETHICS

Page | 3

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter ETHICS AND THE INFORMATION REVOLUTION Quote: For this reason, computing is changing everything—where and how we work, where and how we learn, shop, eat, vote, receive medical care, spend free time, make war, make friends, make love (Rogerson & Bynum, 1995) Learning Expectation: It also underlies the study of ethics in the cyberspace and the significance of understanding the effect of computer to mankind. Furthermore, I am expecting to learn about how the information in the cyberspace is being used. The values and importance of relaying out information. It also underlies the study of ethics in the cyberspace and the significance of understanding the effect of computer to mankind. Furthermore, I am expecting to learn about how the information in the cyberspace is being used. Review: It is hard to imagine a picture of the Spirit of St. Louis or an Apollo lander on the magazine cover under a banner "Machine of the Year." This perhaps shows how influential the computer has become in our society. The information stored in the world's libraries and computers doubles every eight years. In a sense the computer age and the information age seem to go hand in hand. The rapid development and deployment of computing power however has also raised some significant social and moral questions. People in this society need to think clearly about these issues, but often ignore them or become confused. In a sense, computer fraud is merely a new field with old problems. Computer crimes are often nothing more than fraud, larceny, and embezzlement carried out by more sophisticated means.

Page | 4

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: Computer technologies do not constitute a safe medium of providing relevant information that could be used by different government agencies.

We must be conscious on what

information we would like to divulge about ourselves for self-preservation purposes. Furthermore, it is necessary to read the terms of conditions of any site we would like to visit in order to be certain on how the personal information relayed will be used. Integrative Questions: 1. What is Cyber ethics? 2. What is the significance of understanding the concepts of ethics in the cyberspace? 3. What are the tips in order to protect relevant information about you? 4. How is information being distributed to interested parties? 5. Why is cyber ethics important?

Page | 5

CYBER ETHICS | Marie Antoinette Arriola

Name of the Chapter ETHICS ON-LINE Name of the Book: Cyber Ethics Quote: As educational opportunities, business and employment opportunities, medical services and many other necessities of life move more and more into cyberspace. Lesson Expectation: I would like to learn the laws governing on-line communications. Furthermore, to assess the crime being committed through ethics on line. Review: In 1967, the World Intellectual Property Organization was founded in order to establish intellectual property boundaries and rules, so that people's hard-fought work would remain the property of the people who created it. The Organization decided that intellectual property refers to: "Literary and artistic works, which includes every production in the literary, scientific, and artistic domain, whatever the mode of expression, dramatic and dramatic-musical works, choreographic works, photographic works, and works of applied art." As a member of the WIPO, The United States has laws stating that only the author of this work has the right to display, copy, perform, or distribute intellectual property. However, with the Internet as a new method of distributing information, many of these intellectual property laws were challenged. Very few people would photocopy and sell pages from books, for example, but what about copying and selling computer programs? It's very much the same thing. Computer programs are protected exactly the same way as books, so if people distribute programs without the author's permission, it is illegal. This isn't the biggest problem, however. Most people on their home computers don't copy programs, so this is only an issue with very knowledgeable people, or large bootleggers; not an issue for everyday people. What is an important issue, though, is the illegal copying of information on the Internet, such as text and images on web pages. It is even argued that caching web sites (the way that browsers automatically store web sites on one's desktop for a faster load next time that page is accessed) is illegal by the WIPO Page | 6

CYBER ETHICS | Marie Antoinette Arriola laws, because the information is copied onto one's hard drive. Also controversial is the trading of copywritten songs via MP3's online. While recently the Recording Industry Association of America has succeeded in shutting down Napster, the most widely used song trading program, there are still places and programs that allow users to illegally download and trade music online. This is a much wider problem than copying programs. Millions of songs are traded online each day, all without the permission of the creator. Lesson Learned: Most of the crime being committed is stealing private property of one another. Even the identity of these people could be stolen as well. Integrative Questions: 1. What is on-line ethics? 2. What are the crimes being committed when on-line? 3. What are the laws that govern on-line activities? 4. What is theft? 5. Who is Deborah Johnson?

Page | 7

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: REASON, RELATIVITY, AND RESPONSIBILITY AND COMPUTER ETHICS QUOTE: The stakes are much higher, and consequently considerations and applications of Information Ethics must be broader, more profound and above all effective in helping to realize a democratic and empowering technology rather than an enslaving or debilitating one. Learning Expectation: We must respect others and their core values. If we can avoid policies that result in significant harm to others, that would be a good beginning toward responsible ethical conduct. Review: Recently, in northern California about one-sixth of the phone calls didn’t connect because of excessive use of the Internet. People are surging to gain access to computer technology. They see it as not only a part of their daily lives but a necessary venue for routine communication and commercial transactions. On Line, a prominent Internet service provider offered its customers refunds because the demand for connection overwhelmed the company’s own computer technology. The widespread desire to be wired should make us reflect on what awaits us as the computer revolution explodes around the world. What is difficult to comprehend is what impact this will have on human life. Surely, some of the effects will be quite positive and others quite negative. The question is to what extent we can bring ethics to bear on the computer revolution in order to guide us to a better world or at least prevent us from falling into a worse world. With the newly acquired advantages of computer technology, few would want to put the genie completely back into the bottle. And yet, given the nature of the revolutionary beast, I am not sure it is possible to completely control it, though we certainly can modify its evolution. Therefore, it is extremely important to be alert to what is happening. Because the computer revolution has the potential to have major effects on how we lead our lives, the paramount issue of how we should control com- putting and the flow of information needs to be addressed on an ongoing basis in order to shape the technology. Page | 8

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: Computer ethics. Other policies easily meet our standards. Building computer interfaces which facilitate use by the disabled is a clear example. And of course, some policies for managing computer technology will be disputed. However, as I have been emphasizing, some of the ethical policies under dispute may be subject to further rational discussion and resolution. The major resolution technique, which I have been emphasizing, is the empirical investigation of the actual consequences of proposed policies. Integrative Question: 1. Who is Terry Bynum? 2. What is the importance of responsibility in computer ethics? 3. Why is reason and relativity significant in the daily aspect of computer technology? 4. How is computer ethics being practice? 5. Is computer informationally enriching?

Page | 9

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Disclosive Computer Ethics Quote: Ethics is always and already the 'other' side of politics (Critchley 1999)

Learning Expectation: More particularly, we are concerned with the way in which the interest of some become excluded through the operation of closure as an implicit and essential part of the design of information technology and its operation in social-technical networks. Review: When we use the term 'politics' (with a small 'p')--as indicated above--we refer to the actual operation of power in serving or enclosing particular interests, and not others. For politics to function as politics it seeks closure--one could say 'enrolment' in the actor network theory language. Decisions (and technologies) need to be made and programmes (and technologies) need to be implemented. Without closure politics cannot be effective as a programme of action and change. Obviously, if the interests of the many are included--in the enclosure as it were-then we might say that it is a 'good' politics (such as democracy). If the interests of only a few are included we might say it is a 'bad' politics (such as totalitarianism). It is the excluded--the other on the 'outside' as it were--that is the concern of ethics. Thus, every political action has, always and immediately, tied to its very operation an ethical question or concern--it is the other side of politics. When making this claim it is clear that for us ethics (with a small 'e') is not ethical theory or moral reasoning about how we ought live (Caputo 1993). It is rather the question of the actual operation of closure in which the interests of some become excluded as an implicit part of the material operation of power--in plans, programmes, technologies and the like. Lesson Learned: We can see it operating as already 'closed' from the start--where the voices (or interests) of some are shut out from the design process and use context from the start. We can also see it Page | 10

CYBER ETHICS | Marie Antoinette Arriola as an ongoing operation of 'closing'--where the possibility for suggesting or requesting alternatives is progressively excluded. We can also see it as an ongoing operation of 'enclosing'--where the design decisions become progressively 'black-boxed' so as to be inaccessible for further scrutiny. Integrative Questions: 1. What is disclosive computer ethics? 2. Why is ethics is always the other sides of politics? 3. Who is Phillip Brey? 4. What is totalitarianism? 5. Is disclosive computer ethics selective?

Page | 11

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter Gender and Computer Ethics Quote: ICTs has emerged as one of the major critical forces for the social study of information technologies. Lesson Expectation: To be able to grasp the idea that women contribute to the growth of computer ethics in the world. Furthermore, to become aware of how women are treated in the cyberspace. In addition, what are the laws that are being implemented to protect the well-being of the women. Review: Gender and technology studies have proved successful in exposing power relations in the development and use of technologies. At the same time, major developments in feminist ethics over the last two decades, particularly in terms of Gilligan’s (1982) ‘ethic of care’ make this an area at least as important as computer ethics in terms of overall contribution to philosophical ethics. I claim that bringing feminist ethics to bear on computer ethics offers a novel and fruitful alternative to current directions in computer ethics in two major ways: firstly in revealing continuing inequalities in power and where liberal approaches to power do not work; and secondly, in offering an alternative, collective approach to the individualism of the traditional ethical theories encapsulated in computer ethics. Nowhere are these issues more important than in thinking about gender and computing in a networked age. I am suggesting that a pressing problem for computer ethics involves formulating a position on the way that women, and indeed other social groups such as ethnic minorities and the differently able, may be disadvantaged or even disenfranchised with regard to information and communications technologies. This is a well recognized phenomenon. Recognizing it is one thing; suggesting what to do about it is quite another. But I argue that the sort of liberal, inclusive, consultative measures, already becoming enshrined in computing bodies’ codes of ethics and other policy documents, may not have the effect of properly involving women users in decision making about computer systems and women in computing in general, despite the will to do so.

Page | 12

CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned: Through the spread of pornography, women became vulnerable to men. It is about time that the government should implement grave laws to preserve women as they are. We must be able to implement laws that would not discredit the people in the internet. Integrative Questions: 1. What is pornography? 2. How women were harassed on-line? 3. What are the laws governing pornography? 4. What are the effects of pornography to mankind? 5. How can we preserve our well-being?

Page | 13

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Is the Global Information Infrastructure a Democratic Technology? Quote Global information infrastructure (GII), a seamless web of communication networks, computers, databases and consumer electronics that will put vast amounts of information at user's finger tips. Lesson Expectation: The concerns which many scholars have raised regarding the dangers that this endless flow of information can present to the specificity of culture are not without merit. Certainly the information which comes from Western countries has embedded within it certain ideals and beliefs which are inherently Western. Yet the idea that the myriad and diverse cultures of the world will simply conform and change, becoming homogenized and as monotonous as this information is a bit ridiculous, given the many years which these cultures have thrived. One must also remember that the nature of culture itself is changeable. Review: Information Infrastructure Task

Force

1994).

Through the

global

information

infrastructure, users around the world will be able to access libraries, databases, educational institutions, hospitals, government departments, and private organisations located anywhere in the world. The Internet, a global network of computers and networks is being seen as the front runner to GII, and is providing an opportunity and infrastructure for publishing and distributing all types of information in various formats in the shortest possible time and at the lowest cost. With millions of people around the world accessing the Internet and still a large number trying to do so, providing information content on the Internet has become a major business, economic, cultural and even political activity. Both large and small business institutions are marketing their products through the Internet.

Page | 14

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: To learn the impact of global information infrastructure to the humanity and to be able to confirm users of said information. Furthermore, to be able to identify the uses of information infrastructure. In addition, to define global information infrastructure and its effect to democracy. It is simply not one solid or static thing. And despite the many differences which exist from culture to culture and country to country, the globalization of information provides opportunities for a better understanding of all of these. Therefore, despite cultural differences, certain universal understandings of ethical concepts are possible and universal rules can be reached to govern this new global village of sorts. Integrative Questions: 1. What is global information infrastructure? 2. What is the effect of global information infrastructure to democracy? 3. What are the uses of global information infrastructure? 4. Are all nations benefited by global information infrastructure? 5. How is global information infrastructure being distributed?

Page | 15

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Applying ethical and moral concepts and theories to IT Contexts: Key Problems and Challenges Quote “Information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security, transportation, entertainment, and so on. Lesson Expectation: Information and communication technology (ICT) has affected — in both good ways and bad ways — community life, family life, human relationships, education, careers, freedom, and democracy (to name just a few examples). “Computer and information ethics”, in the broadest sense of this phrase, can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts of ICT. The present essay concerns this broad new field of applied ethics. Review: Two years later he published The Human Use of Human Beings (1950), a book in which he explored a number of ethical issues that computer and information technology would likely generate. The issues that he identified in those two books, plus his later book God and Golem, Inc. (1963), included topics that are still important today: computers and security, computers and unemployment, responsibilities of computer professionals, computers for persons with disabilities, computers and religion, information networks and globalization, virtual communities, teleworking, merging of human bodies with machines, robot ethics, artificial intelligence, and a number of other subjects. “Cybernetics” for his new science, Wiener apparently did not see himself as also creating a new branch of ethics. As a result, he did not coin a name like “computer ethics” or “information ethics”. These terms came into use decades later. In spite of this, Wiener's three relevant books (1948, 1950, 1963) do lay down a powerful foundation, and do use an effective methodology, for today's field of computer and information ethics. His thinking, however, was far ahead of other scholars; and, at the time, many people considered him to be an eccentric scientist who was engaging in flights of fantasy about ethics. Page | 16

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: Living organisms, including human beings, are actually patterns of information that persist through an ongoing exchange of matter-energy. Thus, he says of human beings, We are but whirlpools in a river of ever-flowing water. We are not stuff that abides, but patterns that perpetuate themselves. Integrative Questions: 1. What is moral ethics? 2. Who is Norbert Wiener? 3. What is cybernetics? 4. What is information revolution? 5. Who is the author of God and Golem, Inc.?

Page | 17

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Just Consequentialism and Computing Quote Computer ethics is a field of professional ethics concerned with issues of responsibilities and conduct for computer professionals, Gotterbarn (1991). Lesson Expectation: To find out the global impact of computing in recent years, and because of the merging of computing and communications technologies that has also recently occurred, the field of computer ethics might be perceived as one that is currently in a state of flux or transition. Review: The former group mistrusts unfamiliar agents while the latter group are not at all aware of potential security risks associated with agent computing. Intuitive assessment of agent behaviour may be misleading and it can be argued that a systematic ethical analysis will provide a more reliable basis for assessment. For example the actions of Clippy may be considered as unethical by an expert user due to Clippy’s obtrusive character – however the systematic ethical analysis of Clippy’s actions in section 4.2, reveals that Clippy’s actions can at most be considered irritating, but certainly not unethical. An a posteriori systematic analysis of the behaviour of an agent can assist developers of said agent to improve the modelling of the secure and ethical behaviour of future versions of the agent. Once the behaviour of a number of agents have been analysed in this systematic fashion, norms and criteria for the design of new agents that will exhibit acceptable secure and ethical behaviour can be formulated and continually refined. This may lead to a simplification of the security measures imposed on the agent. Lesson Learned: To imply that the ends, however good, “do not justify using unjust means”. Regarding the contemplation, and in particular the performance of some action, one would thus need to determine whether unjust means would be required to facilitate performance of the action by the user, the agent or the host. Therefore, if it is not possible to achieve the envisaged end.

Page | 18

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. Who is James Moor? 2. What is computer ethics? 3. Why are computers malleable according to Moor? 4. Who is Deborah Johnson? 5. What are the uses of computer?

Page | 19

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: The Internet as Public Space: Concepts, Issues and Implications in Public Policy Quote: "A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used" Lesson Expectation: It is furthermore important to consider privacy in the computer context as a delicate subject. The paper will aim to answer the question regarding the internet as a public space. To answer such a question, perhaps it would help to consider a particular computer ethics issue. Review Helen Nissenbaum has recently shown how certain intrusions into the activities of online users are not currently protected by privacy norms because information available online is often treated as information in "public space" or what she describes as a sphere "other than the intimate." She also notes that few normative theories sufficiently attend to the public aspect of privacy and that philosophical work on privacy suffers a "theoretical blind spot" when it comes to the question of protecting privacy in public. Agreeing with Nissenbaum that activities on the Internet involving the monitoring and recording of certain kinds of personal information can cause us to reconsider our assumptions regarding the private vs. public character of personal information currently available online, Tavani argues that Moor’s "control/restricted access theory" of privacy can be extended to resolve issues involving the protection of personal privacy in the "public space" of the Internet. Despite the challenges that the Internet has posed with respect to protecting certain kinds of personal information, however, there is no compelling evidence that any genuinely new privacy issues have been introduced by that medium or that we need a new category of "Internet privacy," as some have suggested.

Page | 20

CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned: If you take precautions (such as forcing people to log in with laborious security measures) then I'd argue perhaps your private areas could be affected - you can't very well argue you stumbled inadvertently into an area that forces you to log in with a secure password). Integrative Questions: 1. What is internet? 2. What is internet ethics? 3. What must we realize about internet being a public space? 4. What is computer ethics? 5. What are the laws implemented to safeguard privacy in the computer world?

Page | 21

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: The Laws of Cyberspace Quote: The telecoms is too large, too heterogeneous, too turbulent, too creatively chaotic to be governed wholesale, from the top down," Lesson Expectation: Information society to assert that the grounds for ethics, in particular information ethics, lies in this Western tradition. If we are trying to create a genuine dialog about ethical values and ethical reasons in the multicultural internet world, we cannot be bound solely to this tradition, because, for example, Chinese and Indians have engaged in ethical thought and ethical reasoning and the grounds for the resolution of their ethical dilemmas . Review "In a place like that, nothing except common law can keep up". Huber is not alone in touting the common [p. 1750/p. 1751] law's unique ability to grapple with cutting-edge legal issues. He does, however, evince an unusual appreciation of the common law as a spontaneous order. Huber understands that common law originates not in the holdings of any court or courts, but rather in the actual practices of those who have to live with the law. "Rules evolve spontaneously in the marketplace and are mostly accepted by common consent. Common-law courts just keep things tidy at the edges" (p. 8). Even when practical rules face litigation, the common law continues to grow and develop "out of rulings handed down by many different judges in many different courtrooms." Looping back to the real world, judicial rules then once more face the acid test of experience. "The good rules gain acceptance by the community at large, as people conform their conduct to rulings that make practical sense". By attributing only modest powers to courts, Huber's account contrasts with that of Lawrence Lessig, another prominent advocate of applying judicial procedures to new and puzzling legal issues. Lessig claims of the Internet "that we are, vis-à-vis the laws of nature in this new space, gods; and that the problem with being gods is that we must choose. These choices . . . will be made, by a Court . To the contrary, like the market place, the English language, or the common law, the Internet arose out of human action but not human design. Page | 22

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: Law and Disorder in Cyberspace presents a thesis revolutionary in the truest sense of the word: it argues for overthrowing the existing corrupt order by returning to earlier, better, more fundamental values. So defiant a book naturally reads, to quote its dust jacket, as a "polemic." Yet Law and Disorder in Cyberspace merits serious attention from scholars and policy wonks. Huber makes a strong case for abolishing the FCC and relying on common law to rule the telecosm. Integrative Questions: 1. What are the laws of cyberspace? 2. Who is Kellogg Huber? 3. What are the means of implementing the laws of cyberspace? 4. What is information ethics? 5. What is cyberethics?

Page | 23

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Of Black holes and Decentralized Law-Making in Cyberspace Quote: Reports that say that something hasn't happened are always interesting to me, because as we know there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns--the ones we don't know we don't know. (Rumsfeld, 2002) Lesson Expectation: This study seeks to identify significant philosophical implications of the free, open source option as it has emerged in global software development communities. A three part approach inspired by the Carl Mitcham's philosophy of technology has been employed. Each section has touched on some ideas whose elucidation are in no way complete Review James Moor suggested that "conceptual muddles" and "policy vacuums" exist where there are problems lacking a philosophical framework to address them, and this is particularly true of computer technology (Moor, 1985). Likewise, Walter Maner proposed that innovations in computer technology create unique, new ethical problems (Maner, 1995). For years, this conceptual vacuum has been filling with the musings of self-proclaimed accidental revolutionaries like Richard Stallman, Eric Raymond, and Linus Torvalds, the creator of the Linux kernel, as well as industry leaders like Bill Gates and Tim O'Reilly. While subject area experts have arisen in the field of computer ethics and the philosophy of computing and information, articulation of the ethical implications of trends favoring free, open source software are only beginning to be featured in academic publications and conferences. An excellent example is the 2007 North American meeting of IACAP, which keynoted free software and open access. The argumentative approach I have selected is borrowed from the philosophy of technology, in particular the work of Carl Mitcham and Andrew Feenberg, to present practical and moral advantages of the FOS option. Finally, I will offer a third approach based on its potential epistemological advantages. In Thinking through Technology: the Path between Engineering and Philosophy, Carl Mitcham introduced the Engineering Philosophy of Technology (EPT) as the field of study Page | 24

CYBER ETHICS | Marie Antoinette Arriola focused on determining the best way to conduct engineering and technological endeavors (Mitcham, 1994). This work is from the insider's perspective, and the obvious starting point to transfer insights from the technical arena to the academic study of FOSS. There is a ready set of commonly cited practical benefits supported by empirical research as well as the methodologies used to evaluate, organize, and execute such projects (Lerner and Tirole, 2005). Practical ethics have to do with making everyday choices and judging which are appropriate based on their anticipated outcome. In this respect, technologists engage ethics in the early stages of project management when they evaluate options. A fundamental differentiation of options to be considered has always been between in-house versus third party, or build versus buy (Weinstock and Hissam, 2005). Other 'practical ethics' employed by technology decision makers include minimizing the total cost of ownership (TCO), using the best tool for the job, standardizing on a particular technology tool set, and outsourcing where there is no competitive advantage, which is to leave the decision to a third party. One ought to add, "utilizing free, open source options where feasible." Lesson Learned Software piracy is very tempting due to the relatively high cost of commercial applications, the easy transfer of digital information, and the lack of a perception of doing harm. Software piracy is especially common among curious academics and hobbyists Integrative Question: 1. Why not avoid the moral dilemma by selecting FOSS? 2. What is the FOS option? 3. Who is Walter Maner? 4. Who is James Moor? 5. Who is Deborah Johnson?

Page | 25

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Fahrenheit 451.2: Is Cyberspace Burning? Quote: Any content-based regulation of the Internet, no matter how benign the purpose, could burn the global village to roast the pig." Lesson Expectation: The various proposals for Internet blocking and rating. Individually, each of the proposals poses some threat to open and robust speech on the Internet; some pose a considerably greater threat than others. To urge industry leaders to develop and deploy the tools for blocking "inappropriate" speech. Review: The ACLU and others in the cyber-liberties community were genuinely alarmed by the tenor of the White House summit and the unabashed enthusiasm for technological fixes that will make it easier to block or render invisible controversial speech. Netscape announced plans to join Microsoft together the two giants have 90% or more of the web browser market in adopting PICS (Platform for Internet Content Selection) the rating standard that establishes a consistent way to rate and block online content; IBM announced it was making a $100,000 grant to RSAC (Recreational Software Advisory Council) to encourage the use of its RSACi rating system. Microsoft Explorer already employs the RSACi ratings system, Compuserve encourages its use and it is fast becoming the de facto industry standard rating system; Four of the major search engines the services which allow users to conduct searches of the Internet for relevant sites

announced a plan to cooperate in the promotion of "self-

regulation" of the Internet. The president of one, Lycos, was quoted in a news account as having "thrown down the gauntlet" to the other three, challenging them to agree to exclude unrated sites from search results; Following announcement of proposed legislation by Sen. Patty Murray (D Wash.), which would impose civil and ultimately criminal penalties on those who mis-rate a site, the makers of the blocking program Safe Surf proposed similar legislation, the "Online Cooperative Publishing

Page | 26

CYBER ETHICS | Marie Antoinette Arriola Act." But it was not any one proposal or announcement that caused our alarm; rather, it was the failure to examine the longer-term implications for the Internet of rating and blocking schemes. The major commercial sites will still be readily available they will have the resources and inclination to self-rate, and third-party rating services will be inclined to give them acceptable ratings. People who disseminate quirky and idiosyncratic speech, create individual home pages, or post to controversial news groups, will be among the first Internet users blocked by filters and made invisible by the search engines. Controversial speech will still exist, but will only be visible to those with the tools and know-how to penetrate the dense smokescreen of industry "selfregulation." Lesson Learned: The Internet both easily and cheaply. One of the most dangerous aspects of ratings systems is their potential to build borders around American- and foreign-created speech. Integrative Questions: 1. What are the six reasons why self-rating schemes are wrong for the Internet? 2. What is self- rating Schemes? 3. Internet Ratings Systems How Do They Work 4. Who is Ray Bradbury? 5. Is cyberspace burning?

Page | 27

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter:Filtering Internet in the USA: Is Free Speech Denied? Quote: To give up the fight, without exhausting our defenses, could cost the surrender of our "soul". (Leo Tolstoy) Lesson Expectation: However, that same ease in accessing information is a "double-edged sword" -- it enabled others also to invade our privacy just as easily. Nothing seems to be inviolable anymore. Review: the government, we fail to recognize or prefer to ignore a greater source of intrusion to our privacy -- private companies and institutions (many we do not suspect), including "nonprofit" organizations, medical institutions, etc. The New York Times has published articles of how political candidates gather information about you when you visit their website. Before the crash of the "dot.com" industry, some of the business "policy makers" [sic] considered archived personal data, as a commercial commodity that could be gathered and traded at will by the "dot.coms", even without the person's consent. "Cookies" are left in computers or other diabolical codes are integrated surreptitiously in formatted internet page, advertisements, etc. All these were meant to track your internet viewing habits. While you may be able to employ some diabolical subterfuge (e.g., using a different internet name) to hide your identity, many software programs have been developed to thwart your efforts so that they will be able to identify even your location or name. Many savvy websites can even access the code of your computer by planting "cookies" in your computer. Armed with other information that can be bought readily from other sellers of personal information. Tracking the behavior of individuals and groups has been a preoccupation of social scientists, poll takers, the advertising industry and all companies that have something to sell. However, previous studies or "ratings" usually just involved a small "statistical sample" of a population.

Page | 28

CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned: Many people decry this state of the internet -- invasion of privacy, over commercialization and monopolistic trends in the building of the infrastructure of the internet -where we as individuals are viewed merely as "consumers". If all of us who care about these issues can band together, we may be able to shape the future of the internet so that we can create an internet community that would be more respecting of our privacy and humanity. Integrative Questions: 1. What is freedom of speech? 2. Who is Leo Tolstoy? 3. What is Internet? 4. What is privacy? 5. How internets do invades our privacy?

Page | 29

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Censorship: The Internet and the Child Pornography Law of 1996: A Critique Quote: "deprave or corrupt" people who are likely to use the material. Lesson Expectation: In this case it may be instructive to look at the legal definitions of obscene or pornography for ways of incorporating sexual obscenity in to the term more closely. Therefore, courts, when examining whether material is obscene, consider whether the material tends to "deprave or corrupt" people who are likely to use the material. The focus on the consumer of the material has been criticized on the grounds that it fails to acknowledge harms to the nonconsumers of the material like women. Review: Pornography should be subject to censorship and regulation because the majority has the right to regulate non-political, public speech that is harmful or offensive to the majority. His argument starts with the assertion that a distinction between the public and private spheres of life are valid, and that the majority has a right to regulate the public space in some way (Gastil 1997, 190). He uses the example of nudists, who must where clothes in public, but in private camps or homes can dress or not dress as they please, to illustrate the majority’s right to an inoffensive public space and a minority’s right to a private moral space (Gastil 1997, 190). He then goes on to argue that only the free speech which bears on the consideration of voters choices and the public interest is protected by the First Amendment, not private speech in the private interest (Gastil 1997, 191). He argues that freedom of speech should "be protected by a more absolute but less all inclusive principle that refers to rational political discourse as an ineluctable requirement of political democracy." (Gastil 1997, 191). From these arguments he concludes that the regulations on privately interested speech in the public space can be subjected to censorship if it is deemed harmful. He then concludes that pornography is harmful because 1) it diminishes the specialness and dignity of human life and 2) it reduces the creativity of artists and society by diverting public resources to activities that are wholly uncreative and of little redeeming value. Page | 30

CYBER ETHICS | Marie Antoinette Arriola He cites examples such as defamation, conspiracy, threats, intimidation and similar offenses as examples where the promotion of harm is justification for limits on freedom of expression. On these grounds, Groarke suggests much of the current pornography promotes harm by condoning kidnapping, rape, torture and other violent acts as legitimate means of achieving sexual satisfaction (Groarke 1997, 201). He rejects Gastil’s approach of appealing to some sort of community or majority sensibility because it is an "arbitrary infringement on the freedom of expression", while regulations justified by pornography’s promotion of harm are more respectful of the freedom of expression and still allow for the prohibition and control of the most offensive pornography (Groarke 1997, 203). He summarizes his position by stating that "the key to such censorship is the principle that the promotion of harm to others should not be tolerated, a principle that can be used to justify the changes to obscenity law that prohibit such material, though not the changes that allow a broader censorship." Lesson Learned: The United States. For example, as a result of New York v. Ferber, the Miller obscenity standard does not apply because the Supreme Court ruled that child pornography is by definition obscene (Akdeniz 1996). The court took this stand for a number of reasons. First, the production of such pornography with children as subjects is harmful to them; second, the value of the material is negligible at best; and third, the distribution of child pornography is inseparable from its role in the abuse of children. Integrative Question: 1. What is Pornography? 2. Who is Raymond Gastil? 3. Who is Leo Groarke? 4. Who is Loren Clark? 5. What is Communication Decency Act?

Page | 31

CYBER ETHICS | Marie Antoinette Arriola Name of the Chapter: PICS: Internet Access Control Without Censorship Quote: Internet Access Controls without Censorship". Lesson Expectation: The World Wide Web Consortium (W3C) in September 1995, it was widely hailed as a stroke of genius. The developers, a group of computer scientists and software manufacturers, promoted PICS as "Internet Access Controls without Censorship". PICS publicity emphasized a multiplicity of rating systems, voluntary self-rating and labeling by content providers and blocking software installed on home computers. Materials may be legal and appropriate for some recipients but not others, so that any decision about whether to block at the source will be incorrect for some audiences. Review: PICS specifies only those technical issues that affect interoperability. It does not specify how selection software or rating services work, just how they work together. One possibility is to build it into the browser on each computer, as announced by Microsoft and Netscape. A second method-one used in products such as CyberPatrol and SurfWatch-is to perform this operation as part of each computer's network protocol stack. A third possibility is to perform the operation somewhere in the network, for example at a proxy server used in combination with a firewall. Each alternative affects efficiency, ease of use, and security. For example, a browser could include nice interface features such as graying out blocked links, but it would be fairly easy for a child to install a different browser and bypass the selective blocking. Even that amount of configuration may be too complex, however. Another possibility is for organizations and on-line services to provide preconfigured sets of selection rules. For example, an on-line service might team up with UNICEF to offer "Internet for kids" and "Internet for teens" packages, containing not only preconfigured selection rules, but also a default home page provided by UNICEF. Labels can be retrieved in various ways. Some clients might choose to request labels each time a user tries to access a document. Others might cache frequently requested labels or download a large set from a label bureau and keep a local database, to minimize delays while labels are retrieved. Page | 32

CYBER ETHICS | Marie Antoinette Arriola Lesson learned: Others regard that as the pot calling the kettle black. PICS was, after all, developed by people fearful of government censorship and who were apparently ignorant of the repressiveness of some governments. Integrative Question: 1. What is PICS? 2. What is Metadata? 3. Who is Paul Resnick? 4. What is Multiplicity Rating Systems? 5. What is Labeling?

Page | 33

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Internet Service Providers and Defamation: New Standard of Liability Quote: "It is not reasonable to expect editors, producers and journalists to know and apply eight separate defamation laws in publishing newspapers and magazines circulating throughout Australia and in selecting material for transmission on national broadcasting and television programs." Lesson Expectation: ISPs attractive defendants in defamation claims, many of which relate to the costs associated with litigation. For example, the author of a defamatory statement will often reside outside the jurisdiction of the plaintiff, whereas the ISP that carried the statement does business in the plaintiff's jurisdiction. It might be difficult, time-consuming, or even impossible, to determine the actual author of the message. Review: Early American decisions focused on distinguishing between ISPs that acted as publishers or distributors. Subsequent legislation in both jurisdictions has resulted in marked differences in the potential for legal liability of ISPs in America and Britain that supposedly reflect the inherent government policies of each country. These policies reflect a balancing of such interests as freedom of speech, personal reputation, and the promotion of electronic communication and commerce. The advent of the Internet has resulted in legislatures and courts around the world reevaluating laws and policies on issues as diverse as taxation, privacy, and contract formation. The liability of the Internet Service Provider (ISP), the company that is the vehicle for the user's access to the Internet, and which brings information to the user from around the world, is potentially staggering if one applies to it long-established legal principles for issues such as distribution of pornography, breach of copyright, or misrepresentation. Defamation of character over the Internet is illustrative of the problem.

Page | 34

CYBER ETHICS | Marie Antoinette Arriola Lesson learned: The liability of intermediaries for defamation has a long history in the common law. 'Publishers', such as newspapers, which traditionally exerted editorial control over content, are generally liable for the defamatory statements that they publish. 'Distributors', such as bookstores or newsstands, exert very little if any editorial control, and have the benefit of the 'innocent disseminator' defense. I nnocent disseminators are protected from liability for defamation if they did not know of the libelous statement, there were no circumstances that ought to have led them to suppose it contained a libel, and they were not negligent in being ignorant of the libel. Integrative Question: 1. What is Internet Services Provider? 2. What is defamatory publication? 3. What is libel? 4. What is pornography? 5. What is Defamation Act of 1996?

Page | 35

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Digital Millennium Copyright Act Quote: The technology companies that distribute their content — the legal power to create closed technology platforms and exclude competitors from interoperating with them. Lesson Expectation: To and the meaning of Digital Millennium Copyrights Act. It will also highlight the importance of DMCA for the mankind. Likewise, it will also enumerate the disadvantages of the said act. Review: The arrest of Russian programmer Dmitry Sklyarov in 2001, for alleged infringement of the DMCA, was a highly publicized example of the law's use to prevent or penalize development of anti-DRM measures. While working for Elcomsoft in Russia, he developed The Advanced eBook Processor, a software application allowing users to strip usage restriction information from restricted e-books, an activity legal in both Russia and the United States. Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool. Sklyarov was arrested in the United States after presenting a speech at DEF CON and subsequently spent nearly a month in jail. The DMCA has also been cited as chilling to legitimate users, such as students of cryptanalysis (including, in a well-known instance, Professor Edward Felten and students at Princeton), and security consultants such as Niels Ferguson, who has declined to publish information about vulnerabilities he discovered in an Intel secure-computing scheme because of his concern about being arrested under the DMCA . Lesson Learned: When website owners receive a takedown notice it is in their interest not to challenge it, even if it is not clear if infringement is taking place, because if the potentially infringing content is taken down the website will not be held liable.

Page | 36

CYBER ETHICS | Marie Antoinette Arriola Integrative questions: 1. What is DMCA? 2. What is copyright? 3. What is cryptography? 4. What are the provisions of DMCA? 5. What are the advantages of DMCA?

Page | 37

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Note on the DeCSS Trial Quote: "Our main goal," said Gross, "is to build a strong, solid record to take to the appeals court, where civil liberties are taken more seriously." Learning Expectation: Linux came to the forefront of the ongoing DeCSS trial late last week. That's because, in a very real way, Linux started the uproar that has resulted in eight movie studios suing Eric Corley. The trial could ultimately affect the way consumers use products they purchase and the way researchers advance technology. Journalist Eric Corley -- better known as Emmanuel Goldstein, a nom de plume borrowed from Orwell's 1984 -- posted the code for DeCSS (so called because it decrypts the Content Scrambling System that encrypts DVDs) as a part of a story he wrote in November for the well-known hacker journal 2600. The Motion Picture Association of America (MPAA) claims that Corley defied anticircumvention provisions of the Digital Millennium Copyright Act (DMCA) by posting the offending code for anyone to download from his Website. Review: Jon Johansen wrote DeCSS in order to view DVDs on a Linux machine. The MPAA has since brought suit against him in his native Norway as well. Johansen testified on Thursday that he announced the successful reverse engineering of a DVD on the mailing list of the Linux Video and DVD Project (LiViD), a user resource center for video- and DVD-related work for Linux. The Electronic Frontier Foundation (EFF), an organization based in San Francisco which supports civil liberties in digital arenas, is providing a legal defense that cites, among other issues, fair use. After all, the EFF argues, if you buy a DVD, why can't you play it on any machine you want?

Page | 38

CYBER ETHICS | Marie Antoinette Arriola Lessons Learned: The judge in the case, the honorable Lewis Kaplan of the US District Court in southern New York, issued a preliminary injunction against posting DeCSS. Corley duly took down the code, but did not help his defense by defiantly linking to myriad sites which post DeCSS. By taking his stand, Corley has brought key issues of the digital age to trial. Among them is the right to experiment and to share knowledge, he said. The case also points to the DMCA's broad protections, which for the first time not only give copyright to creative work but also to the software -- or any other technology -- that protects it. Still open is the question of whether the injunction against Corley, or the fight against DeCSS itself, is not a vain struggle in the face of inevitable change. Judge Kaplan, whom the defense requested recuse himself based on conflict of interest, said last Thursday to Mikhail Reider, the MPAA's chief of Internet antipiracy, "You are asking me to issue an injunction against the guy who unlocked this barn, [telling him] not to unlock it again --- even though there is no horse in it." "It's good to see that [the judge] is realizing the futile nature of dealing with these issues this way," said Robin Gross, an EFF attorney and a member of the defense team. Though the MPAA may not be able to stop DeCSS, there are other issues at stake that are unrelated to digital piracy. Integrative Questions: 1. What is DeCSS? 2. What is Trial ? 3. What is the copyright issue of the defense trial? 4. Who is the Judge? 5. What is the plans ?

Page | 39

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter:A Politics of Intellectual Property: Environmentalism for the Net Quote: There is a danger of absolutizing the claims to ownership and control to the detriment of other interested parties, something we have noted in recent legislative proposals. Samuelson, 1997) Lesson Expectation: First it presents some cases that illustrate the range of possible intellectual property rights. Next it examines the traditional justifications for such rights. It then critiques those justifications, not to refute them, but to show their limits. Finally it proposes a different way of looking at the problem, using traditional natural law ethics. Review: Property usually refers to tangible assets over which someone has or claims control. Originally it meant land. Now it could also refer to a car, a milling machine, a jacket or a toothbrush. In all these cases the property claim is of control of the physical entity. If I claim a plot of land as my property, I am saying I can control who has access to that land and what they do there. I can build a fence around it, rent it out, or drill for oil on it. If a car is my property, I get the keys to it. I can exclude others from using it and use it myself for whatever I want, as long as I do not threaten the lives or property of others. Intellectual property is different because its object is something intangible, although it usually has tangible expression. The intellectual property in a book is not the physical paper and ink, but the arrangement of words that the ink marks on the paper represent. The ink marks can be translated into regions of magnetic polarization on a computer disk, and the intellectual property, and whatever claims there are to that property, will be the same. The owner of a song claims control, not of the CD on which the song is recorded, but of the song itself, of where when and how it can be performed and recorded. Computer technology has created a new revolution in how intellectual property is created, stored, reproduced and disseminated; and with that has come new challenges to our understanding of intellectual property and how to protect it. Of course computers have given rise to a whole new category of intellectual property, namely computer software. A major commercial program can take a team of one hundred or more highly skilled and highly paid programmers Page | 40

CYBER ETHICS | Marie Antoinette Arriola years to create and can sell for hundreds, or even hundreds of thousands, of dollars per copy. Yet someone with access to such a program can make a copy in moments at practically no cost. Lesson learned: Intellectual property has always been closely tied to technology. Technology arises from intellectual property in the form of new inventions. But technology also supports intellectual property by providing new, more powerful and more efficient ways of creating and disseminating writing, musical composition, visual art, and so on. In fact it was the technology of the printing press that originally gave rise to intellectual property as a legal and moral issue. Before, when it took almost as much of an effort to reproduce a document as it took to create it, there was little need to impose limits on copying.

Integrative Question: 1. What is intellectual property? 2. What is information? 3. What is copyright? 4. What is plagiarism? 5. What is computer technology?

Page | 41

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Intellectual Property, Information, and the Common Good Quote: "With air pollution there was, for example, a desire of the people living in Denver to see the mountains again. William Ruckelshaus Lesson Expectation: Everyone says that the ownership and control of information is one of the most important forms of power in contemporary society. This article will tend to review the importance of politics of intellectual property. Review: "There is a fundamental conflict between the efficiency with which markets spread information and the incentives to acquire information." This problem is often, though not always "solved" by ignoring it. A pre-theoretical classification is made, conventionally ascribing a certain problem to one or other realm and the discussion then continues on that basis. Thus for example, we tend to look at the field of intellectual property with a finely honed sensitivity to "public goods" problems that might lead to under production, while underestimating or failing to mention the efficiency costs and other losses generated by the very rights we are granting. Some conventional ascriptions visibly switch over time. The contemporary proponents of legalizing insider trading use the idea of the efficient capital market to minimize or defend the practice. The first generation of analyses saw the insider trade as the entrepreneur's incentive and reward for Faustian recombination of the factors of production. An alternative method for smoothing over the tensions in the policy analysis is for the analyst to acknowledge the tension between efficiency and incentives, point out that there are some limitations imposed on intellectual property rights, to conclude that there are both efficiency-promoting and incentive promoting aspects to intellectual property law, and then to imply that an optimal balance has been struck.

Page | 42

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: In general, then, I would claim there is a tendency to think that intellectual property is a place to apply our "public goods/incentives theory" rather than our "anti-monopoly/free-flow of information" theory. All by itself, this might push rhetoric and analysis towards more expansive property rights. The tendency is compounded, however, by two others. First, courts are traditionally much less sensitive to First Amendment, free speech and other "free flow of information arguments" when the context is seen as private rather than public, property rather than censorship. Second, intellectual property rights are given only for "original" creation. Integrative Question: 1. What is intellectual property? 2. What is politics? 3. What is environmentalism? 4. Who is James Boyle? 5. What is public’s good theory?

Page | 43

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: Is Copyright Ethical Quote: A property right is the relationship between individuals in reference to things. Cohen (1935) Lesson Expectation: The focus is on two key questions: 1) what is the relationship between ethics and copyright law and practice in the United States; and, 2) is the concept of private ownership of intellectual property inherently ethical? These questions are important because access to an overwhelming number of the elements of daily life is now controlled by intellectual property law. Review: The ethics of copyright can be approached in two ways: (1) If, as Hettinger suggests, every creator stands on the shoulders of giants what is the essential morality in allowing the last contributor to reap the full reward or to have the right to prevent others from building on her contribution; and (2) If, as postulated by Locke, an individual is entitled to what he or she creates, what are the ethics of limiting a creators rights in regards to his or her creation? Theoretically copyright law in the United States takes the first view, stating that authors have no natural right in their creation but only the rights that the state has conferred by reason of policy to encourage the creation of new works. United States copyright law was better aligned with the encouragement theory and the ethical position that creative works belonged to society as a whole. Only the exact copying of a work was prohibited, not new works based on a previous work. Subsequent authors were free to adapt novels to the stage, abridge scholarly works for the masses, and translate works into other languages without paying a license fee to the creator or to whom ever the creator had transferred his or her copyright. However as copyright law has expanded to grant creators more rights the law has all but abandoned the concept of allowing, let alone encouraging, transformative or productive use. Copyright no longer has a consistent theory, let alone an ethical position. It has become what is often called an equitable rule of reason, which attempts to balance the rights of authors with the rights of users. It is often not clear whether this balance is to be obtained by granting rights via law or by recognizing the intrinsic rights of each.

Page | 44

CYBER ETHICS | Marie Antoinette Arriola Lesson learned: The Software Publisher’s Association (SPA), which merged with the Information Industry Association (IIA) in January of 1999 to form the Software & Information Industry Association (SIIA), offers a guide on Software Use and the Law (SPA 1997) which states it is intended to provide. Integrative Question: 1. What is property right? 2. What is copyright? 3. Is copyright unethical? 4. What is Software Publishers’ Association? 5. What is intellectual property?

Page | 45

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: Cyber Ethics Name of the Chapter: On the Web, Plagiarism Matters More Than Copyright Piracy Quote: Plagiarism epidemic is mainly a result of a simple fact that the web has made plagiarism much easier than it used to be in the print environment. Cronin (2003) Lesson Expectation: There are worrisome trends in the behaviour and attitudes of students towards plagiarism and cheating in their academic work. A new term ”cyber-plagiarism” has since been introduced to describe the process by which students copy ideas and information from the Internet without giving attribution, or downloading. Review: This

includes

using

others’

ideas,

information

without

giving

credit

and

acknowledgement. It is clear that piracy is the infringement of copyright, and plagiarism is the failure to give credit to the author. However, many people easily get confused between those two terms, and one may usually commit both offences. It would be plagiarism but not piracy for us to take the works of an obscure 18th century poet and try to use them as our own. Since the copyright will have expired on such works, this is not piracy. Most people are aware that taking the exact texts or words of another person without attribution is plagiarism, but they then believe that paraphrasing the original work is acceptable. Yet taking someone else’s idea and changing the words is like stealing a car and changing its colour. However, literary works that are stolen differ in many ways from physical properties that are the targets of ordinary theft. Ideas are less tangible and identifiable than physical objects. There is hardly a clear way to determine which idea counts as a brand new and which requires acknowledgment as a variation on old ideas.

Page | 46

CYBER ETHICS | Marie Antoinette Arriola Lesson learned: We may remember ideas without remembering where they come from because without careful notations, recalling a source is much more difficult than recalling the idea itself. Therefore it is not easy to totally avoid unintentional plagiarism. However, beside the careless paraphrasing or accidental misleading citations, there are other harmful plagiarism acts that are negatively influencing the scholarly communities. Integrative Question: 1. What is plagiarism? 2. What is piracy? 3. What is copyright? 4. Which is more grave: plagiarism or copyright? 5. What is cyber-plagiarism?

Page | 47

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: An Ethical Evaluation of Web Site Linking Quote: “It is important to our company that you know our exact process we take for the education and understanding on how is the ethical evaluation on web site Linking” Learning Expectation: Web Site linking we use this SEO strategy to navigate people to other pages within the website for the relevant information they are looking for. This improves navigation and link back popularity as well. This procedure is not a huge factor in our search engine optimization services but we have found it very functional for the end user getting them where they want to be in a site for information they may be looking for and possibly get the website owner the sale or lead in that specific area. In case people do not understand me on this an interior link can be spotted as a underlined or highlighted keyword on a specific page that moves you to another URL on that website. Review: The person or team of people for that company on the most important keywords they would like to rank high for. Nine out of ten times we find that the keywords the companies like to see are not their only main or lateral phrases for keyword placement and top search engine rankings. In fact I have had keywords come across to me that really have no relevancy to their web sites goals for success. Scam and Spam search engine optimization companies eat this up because they realize that some words have no competition to them and can be achieved with very little effort, and if you're locked into their contract, you will sometimes have to shell out more money because they claim they have much more to do.

Page | 48

CYBER ETHICS | Marie Antoinette Arriola Lessons Learned: The Directory is developed to increase traffic and search engine popularity by targeting other websites to point back to your website. This will also help to improve traffic by other audiences finding your website through another site on the World Wide Web. Integrative Questions: 1. What is ethical evaluation? 2. What is Web Site Linking? 3. What is the Strategy of Web Site Linking? 4. Why Ethical Evaluation is important? 5. What are the different kinds of Web Site Linking?

Page | 49

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter:The Cathedral and the Bazaar Quote: "Given enough eyeballs, all bugs are shallow" Learning Expectation: Eric S. Raymond on software engineering methods, based on his observations of the Linux kernel development process and his experiences managing an open source project, fetchmail. It was first presented by the author at the Linux Kongress on May 27, 1997 and was published as part of a book of the same name in 1999 Review: Raymond's standard talk begins with references to himself as an ordinary but experienced IT guy of sorts who, without any sort of formal training in sociology, psychology, marketing, business, or the like, has become the chronicler of the "gnu generation" (not his quote, just a common one) and predictor of open source things to be. Then, he drones on for an hour or two about sociology, psychology, marketing, business, and the like. I've seen him give this talk in front of academics. Thankfully, he has little shame, or he'd have dropped dead long ago from the subtle looks and snickers that inevitably result from his bombast. In his works (including "Cathedral"), Eric makes a very one-sided analysis of software engineering methodologies. It's a complete ra-ra piece which fails to seriously address the very many shortcomings of open-source development, including, most critically, the inability to scale timewise as well as commercial software (while not under the GNU licence, two years ago Raymond was predicting the success of the open-source Mozilla browser initiative, which is at this point a complete fiasco Lessons Learned: The people should be getting out of this book (or a book like this) is a balanced, informed view of open source vs commercial software, undertaken with sound research on various cost/effectiveness metrics and some case studies. Page | 50

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. What is Cathedral and the Bazaar? 2. What is the cathedral model? 3. What is Linux Kernel? 4. Who is Raymond? 5. Why is this book worth reading?

Page | 51

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Towards a Theory of Privacy for the Information Age Quote: Few students enter college fully understanding the relationship between plagiarism and the rules about quoting, paraphrasing and documenting material” (Wilhoit, 1994). Lesson Expectation: The web environment and use more online resources for research, the need for protections against plagiarism increases. Because of the volatility characteristic of the web environment, it is usually difficult to establish or preserve the provenance. Review: The Cathedral and the Bazaar, the most important computer programming thinking to follow the Internet revolution. But it would be more unfortunate to overlook the implications and long-term benefits of his fastidious description of open-source software development considering the growing dependence businesses and economies have on emerging computer technologies. Lesson learned: The integrity of the Internet and academic communities is severely damaged. The main reason why students get away with internet plagiarism is that we lack of resources to monitor cheating, and the examiners have to mark too many papers thus cannot give enough attention to each submitted work. Tools that provide automatic detection of plagiarised works can greatly improve the situation. Therefore, computer professionals can provide great help. Integrative Question: 1. Why do students plagiarized? 2. What are the harmful effects of plagiarism? 3. How to combat plagiarism? 4. What are the laws implemented to prevent plagiarism? 5. What is cyber-plagiarism? 6. Why do students plagiarise? Page | 52

CYBER ETHICS | Marie Antoinette Arriola

Page | 53

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: The Structure of Rights in Directive 95/46/ec on the Protection of the individuals with regard to the Processing Personal Data and the free movement of such Data Quote: Lesson Expectation: To understand the importance of personal data protection. To establish the directive a necessary medium in protecting individual data. And furthermore, to importance of implementing personal data protection. Review: The principles of personal data protection established in the Directive 95/46/EC were implemented into the Polish legal order by the Act of 29 August 1997 on the Protection of Personal Data The Act on Personal Data Protection introduced detailed rules on personal data protection in Poland, and up to 1 May 2004, i.e. up to Poland’s accession to the European Union, included in the Polish legal order all principles specified in the Directive 95/46/EC of the European Parliament and of the Council. The provisions of the Act have been in force since 30 April 1998.Implementation of the provisions on personal data protection into the Polish legal system allowed Poland to sign in April 1999 and to ratify in May 2002 the Convention No. 108 of the Council of Europe. Those activities reflected increasing democratisation of public life in Poland as well as concern for the protection of privacy of its every citizen. Lesson Learned: The Community specified the constitutional right to decide on the fact to whom, in what scope and for what purpose we give our personal data, and gave statutory guarantees of compliance with this right by providing the data subjects with measures used for exercise of this right and competent authorities and services – with the legal remedies which guarantee compliance with this right.

Page | 54

CYBER ETHICS | Marie Antoinette Arriola Integrative Question: 1. What is directive 95/46/ec? 2. What is personal data protection? 3. What is privacy? 4. When was the directive was established? 5. What is the act on personal data protection?

Page | 55

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Privacy, Individuality, Control of information, and Privacy –enhancing Technologies Quote: “Privacy” is used frequently in ordinary language as well as in philosophical, political and legal discussions, yet there is no single definition or analysis or meaning of the term. Learning Expectation: Privacy has broad historical roots in sociological and anthropological discussions about how extensively it is valued and preserved in various cultures. Moreover, the concept has historical origins in well known philosophical discussions, most notably Aristotle's distinction between the public sphere of political activity and the private sphere associated with family and domestic life.

Review: According to one well known argument there is no right to privacy and there is nothing special about privacy, because any interest protected as private can be equally well explained and protected by other interests or rights, most notably rights to property and bodily security (Thomson, 1975). Other critiques argue that privacy interests are not distinctive because the personal interests they protect are economically inefficient (Posner, 1981) or that they are not grounded in any adequate legal doctrine (Bork, 1990). Other commentators defend privacy as necessary for the development of varied and meaningful interpersonal relationships (Fried, 1970, Rachels, 1975), or as the value that accords us the ability to control the access others have to us (Gavison, 1980; Allen, 1988; Moore, 2003), or as a set of norms necessary not only to control access but also to enhance personal expression and choice (Schoeman, 1992), or some combination of these (DeCew, 1997). Discussion of the concept is complicated by the fact that privacy appears to be something we value to provide a sphere within which we can be free from interference by

Page | 56

CYBER ETHICS | Marie Antoinette Arriola others, and yet it also appears to function negatively, as the cloak under which one can hide domination, degradation, or physical harm to women and others. Lessons Learned: The feminist critique of privacy, yet it can be said in general that many feminists worry about the darker side of privacy, and the use of privacy as a shield to cover up domination, degradation and abuse of women and others. If distinguishing public and private realms leaves the private domain free from any scrutiny, then these feminists such as Catharine MacKinnon (1989) are correct that privacy can be dangerous for women when it is used to cover up repression and physical harm to them by perpetuating the subjection of women in the domestic sphere and encouraging nonintervention by the state. Integrative Questions: 1. What is informational privacy? 2. What is the constitutional right to privacy? 3. What are the Privacy and Control over Information? 4. What is the privacy and Intimacy? 5. Is privacy relative?

Page | 57

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Toward and Approach to privacy in public: Challenges of Information technology Quote: Privacy provides the necessary context for relationships which we would hardly be human if we had to do without-the relationships of love, friendship and trust. Charles Fried Lesson Expectation: The articles discuss the importance of privacy in public. It also highlights philosophical views that necessitate the importance of privacy in public. Further more, it also discusses the lack of privacy in the computer technology. Review: Prominent among contemporary philosophical works on privacy is Charles Fried's. Fried (1984) argued that privacy is important because it renders possible important human relationships. Although Fried conceived of privacy as control over all information about oneself, he defended a moral and legal right to privacy that extends only over the far more limited domain of intimate, or personal, information. He accepted this narrowing of scope because even a limited domain of intimate or personal information provides sufficient "currency" for people to differentiate relationships of varying degrees of intimacy. The danger of extending control over too broad a spectrum of information is that privacy may then interfere with other social and legal values. Fried wrote, "The important thing is that there is some information which is protected" , namely, information about the personal and intimate aspects of life. According to Fried, the precise content of the class of protected information will be determined largely by social and cultural convention. Prevailing social order "designates certain areas, intrinsically no more private that other areas, as symbolic of the whole institution of privacy, and thus deserving of protection beyond their particular importance". Other philosophers also have focused on the interdependence between privacy and a personal or intimate realm. Robert Gerstein (1984), for example, contended that "intimacy simply could not exist unless people had the opportunity for privacy.

Page | 58

CYBER ETHICS | Marie Antoinette Arriola Privacy's purpose, he wrote, is to insulate "individual objectives from social scrutiny. Social scrutiny can generally be expected to move individuals in the direction of the socially useful. Privacy insulates people from this kind of accountability and thereby protects the realm of the personal". Schoeman, unlike Fried (1984) however, holds that there are domains of life that are essentially private and not merely determined to be so by social convention. Lesson Learned: The views of Schoeman, Fried, and Gerstein, though differing in detail, rest on a common core. Each held that properly functioning, psychically healthy individuals need privacy. Privacy assures these people a space in which they are free of public scrutiny, judgment, and accountability, and in which they may unselfconsciously develop intimate relationships with others. A person's right to privacy restricts access by others to this sphere of personal, undocumented information unless, in any given case, there are other moral rights that clearly outweigh privacy. Although many other writers who have highlighted the connection between privacy and the personal realm have not attended merely to the status of the "non-personal" realm. If information is not personal information or if it is documented, then action taken with respect to it simply does not bear on privacy. Integrative Question: 1. Who is Helen Nissembaum? 2. What is privacy in public? 3. What is the importance of privacy? 4. Who is Charles Fried? 5. What are the laws governing privacy?

Page | 59

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: KDD, PRIVACY, INDIVIDUALITY, AND FAIRNESS Quote: “The rights and requirements make no sense regarding anonymous data and group profiles.” Lesson Expectation: To be able to define KDD and its impact to the society. In addition to be able to understand its importance and its effect to individuals. And lastly, to understand the importance of privacy. Review: Sometimes, these theoretical views on informational privacy are not much more than implicit assumptions. However, things are different and more articulate where theorists define informational privacy as being in control over (the accessibility of) personal information, or where they indicate some kind of personal freedom, such as the preference-freedom in the vein of John Stuart Mill's individuality, as the ultimate point and key value behind privacy (see, for instance Parent, 1983 and Johnson. 1989).These theorists consider privacy to be mainly concerned with information relating to designating individuals. The protective measures connected to that definition to the KDD process is not without difficulties. Of course, as long as the process involves personal data in the strict sense of data relating to an identified or identifiable individual, the principles apply without reservation. For instance, the right of rectification applies to the personal data in the strict sense itself; it does not apply» information derived from this data. Lesson Learned: It should be observed that group profiles may occasionally be incompatible with respect to individual privacy and laws and regulations regarding the protection of personal data, as it is commonly conceived of. For instance, distributive profiles may sometimes be rightfully thought of as infringements of (individual) privacy when the individuals involved can easily be identified through a combination with other information available to the recipient or through spontaneous recognition.

Page | 60

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. What is KDD? 2. What is privacy? 3. What is individuality? 4. What is fairness? 5. What is a distributive profile?

Page | 61

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Data Mining and Privacy Quote: Data mining is that when data about the organization’s processes becomes readily available, it becomes easy and therefore economical to mine it for new and profitable relationships. Lesson Expectation: Can data privacy and data mining coexist? This paper began with an attempt to define the concept of data mining and privacy. And it goes on to explore how exactly data mining can be a threat to privacy, and especially how the Internet is currently associated with the tension between data mining. Review: Thus, businesses became interested in collecting and managing consumer’s data. Data mining is a valuable tool for business. Before we discuss its relation to privacy, it will be helpful to cover what is data mining. Though the term data mining is relatively new, data mining attracts tremendous interest in commercial market place. Lots of businesses pay attention to data mining recently. Why are data mining and data warehousing mushrooming so greatly now? According to Cavoukian (1998), data mining is usually used for four main purposes: (1) to improve customer acquisition and retention; (2) to reduce fraud; (3) to identify internal inefficiencies and then revamp operations, and (4) to map the unexplored terrain of the Internet. Generally, data mining seems a survival strategy for companies in these days. Indeed, Erick Brethenoux, research director for advanced technologies at the Gartner Group, calls data mining as “necessary for survival.” Lesson Learned: Whenever we shop, use credit card, rent a movie, withdraw money from ATM, write a check and log on the Internet, our data go somewhere. Virtually, every aspect of our life discloses information about us. With the development of computing and communication technology, now data can be captured, recorded, exchanged, and manipulated easier than before. By one estimate, the amount of information in the world doubles every 20 months, and that means the size of databases also does, even faster. Page | 62

CYBER ETHICS | Marie Antoinette Arriola Integrative Question: 1. What is data mining? 2. What is privacy? 3. What is data mining relation to privacy? 4. What are the purposes of data mining? 5. Can data privacy and data mining coexist?

Page | 63

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Workplace Surveillance, Privacy and Distributive Justice Quote: “Each person is to have an equal right to the most extensive basic liberty compatible with a similar liberty for others.” Learning Expectation: The employee had no reasonable expectation of privacy: “unlike urinalysis and personal property searches, we do not find a reasonable expectation of privacy in email communications voluntarily made by an employee to his supervisor over the company e-mail systems notwithstanding any assurances that such communications would not be intercepted by management. Review: Traditionally accepted that employers have a right to engage in such activities. At the foundation of this view is a conception of the employment relationship as involving a voluntary exchange of property. The employer agrees to exchange property in the form of a wage or salary for the employee’s labor. Conceived as a free exchange, the employment relationship, in the absence of some express contractual duration requirement, can be terminated at will by either party for nearly any reason. Exceptions to the employment-at-will doctrine include firing someone for serving on jury duty, for reporting violations of certain federal regulations, or for impermissible race, sex, or age discrimination on the employer’s part. Rawls argues that fair terms of cooperation are most likely to be chosen from behind a veil of ignorance, which he describes as follows: “no one knows his place in society, his class position or social status, nor does any one know his fortune in the distribution of natural assets and abilities, his intelligence, strength, and the like. Nor again does anyone know his conception of the good, the particulars of his rational plan of life, or even the special features of his psychology such as his aversion to risk or liability to optimism or pessimism

Page | 64

CYBER ETHICS | Marie Antoinette Arriola Lessons Learned: More than this, I assume that the parties do not know the particular circumstances of their own society. That is, they do not know its economic or political situation, or the level of civilization and culture it has been able to achieve. The persons in the original position have no information as to which generation they belong. In order to carry through the idea of the original position, the parties must not know the contingencies that set them in opposition. Integrative Questions: 1. How does this bear on the issue of workplace surveillance? 2. What’s the point of the veil of ignorance? 3. How much privacy protection, if any, would these actually provide? 4. Can you think of a likely situation in these? 5. What are the principles require employers to refrain from collecting data?

Page | 65

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Privacy and Varieties of Informational Wrongdoing Quote: “Clearly in a small group it is easier to spot the free rider and sanction him in one of many possible ways once he is identified than in a large group, where he can hide in the crowd” Learning Expectation: I expect awareness of informational wrongdoing. It will also define different varieties of informational wrongdoing. It will also define privacy. Review: The privacy issue is concerned more specifically with the question how to balance the claims of those who want to limit the availability of personal information in order to protect individuals and the claims of those who want to make information about individuals available in order to benefit the community. This essential tension emerges in many privacy discussions, e.g. undercover actions by the police on the internet, use of Closed Circuit Television in public places, making medical files available for health insurance purposes or epidemiological research, linking and matching of databases to detect fraud in social security, soliciting information about on-line behavior of internet users from access providers in criminal justice cases. According to communitarians modern Western democracies are in a deplorable condition and our unquenchable thirst for privacy serves as its epitome. Who could object to having his or her data accessed if honorable community causes are served? Communitarians also point out that modern societies exhibit high degrees of mobility, complexity and anonymity. As they are quick to point out, crime, free riding, and the erosion of trust are rampant under these conditions. Political philosopher Michael Walzer observes that "Liberalism is plagued by free-rider problems, by people who continue to enjoy the benefits of membership and identity while no longer participating in the activities that produce these benefits. Communitarianism, by contrast, is the dream of a perfect free-riderlessness".

Page | 66

CYBER ETHICS | Marie Antoinette Arriola Those who are responsible for managing the public goods therefore insist on removing constraints on access to personal information and tend to relativize the importance of privacy of the individual. Lesson Learned: Whether IT really delivers the goods is not important for understanding the dynamics of the use of personal data. The fact that it is widely believed to be effective in this respect is I think sufficient to explain its widespread use for these purposes. Integrative Question: 1. What are the different varieties of informational wrongdoing? 2. What is informational injustice? 3. What is informational inequality? 4. What are panoptic technologies? 5. Define privacy.

Page | 67

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Defining the Boundaries of Computer Crime Quote: the purchase of a home in a particular neighborhood to inquire about the number of burglaries and violent crimes in the area. Just as these data provide important information for communities in the "real world," Learning Expectation: Access to reliable and timely computer crime statistics allows individuals to determine their own probability of victimization and the threat level they face and helps them begin to estimate probable recovery costs. Law enforcement organizations traditionally have taken a leading role in providing crime data and crime prevention education to the public, which now should be updated to include duties in cyberspace. Review: Patrol officers and detectives use this data to prevent future crimes and to apprehend offenders. Therefore, to count computer crime, a general agreement on what constitutes a computer crime must exist. Thus, homicide detectives count the number of murders, sexual assault investigators examine the number of rapes, and auto detectives count car thefts. Computer crime, on the other hand, comprises such an ill-defined list of offenses that various units within a police department usually keep the related data separately, if they keep them at all. For example, the child abuse unit likely would maintain child pornography arrest data and identify the crime as the sexual exploitation of a minor. A police department's economic crimes unit might recap an Internet fraud scam as a simple fraud, and an agency's assault unit might count an on-line stalking case as a criminal threat.

Lesson Learned: Usually, people accurately report serious crimes, such as homicide, armed robbery, vehicle theft, and major assaults. Many other criminal offenses, however, remain significantly Page | 68

CYBER ETHICS | Marie Antoinette Arriola underreported. Police always have dealt with some underreporting of crime. But, new evidence suggests that computer crime may be the most underreported form of criminal behavior because the victim of a computer crime often remains unaware that an offense has even taken place. Sophisticated technologies, the immense size and storage capacities of computer networks, and the often global distribution of an organization's information assets increase the difficulty of detecting computer crime. Integrative Question: 1. What is computer crime? 2. What are the boundaries of computer crime? 3. What is a crime in general? 4. What are the precautions being offered to combat computer crime? 5. What are the punishments for computer crime?

Page | 69

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic Quote: Attacks on government and corporate sites can be justified as a form of political activism – that is, as a form of “hacktivism.” The argument is roughly as follows. Learning Expectation: I argue that it wrongly presupposes that committing civil disobedience is morally permissible as a general matter of moral principle; in an otherwise legitimate state, civil disobedience is morally justified or excusable only in certain circumstances. Review: The effect of the protest in Washington was that many persons might have been late to work – losses that are easily made up. An attack that shuts down a busy commercial or public website for a few hours can easily affect hundreds of thousands of people

Lesson Learned: The victims of such an attack, as well as third-parties, have a right to know exactly what position is motivating the attack and why anyone should think it is a plausible position.The willingness to impose morally significant costs on other people to advance fringe positions that are neither clearly articulated nor backed with some sort of plausible justification is clearly problematic from a moral point of view. It seems clear that such behavior amounts, at least in most cases, to the kind of arrogance that is problematic on ordinary judgments Integrative Question: 1. Why might companies who try to privatize the internet be intimidated by hacktivism? 2. What is the difference between a hacktivist and a cyberterrorist? How can one differentiate the two? 3. Should the laws regarding hacktivism be loosened? Explain your answer.

Page | 70

CYBER ETHICS | Marie Antoinette Arriola 4. How does M&G's notion of hacktivism fare under the various ethical frameworks we studied in Chapter 1, in particular: Johnson's ``three rules'' (Ethics On-Line), Moor's ``reason within relative frameworks'' (Reason, Relativity and Responsibility...), his Just Consequentialism..., Brey's Disclosive Computer Ethics, and Adam's ``feminist ethics'' (Gender and...) ? 5. Define hacking.

Page | 71

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter:Web Security and Privacy: An American Perspective Quote: A rich history of justificatory ideas ranging from duty (deontology) to utility (teleology) to the individual character (virtue ethics). It is not the purpose of this paper to engage in the ethical discourses surrounding privacy and security but only to demonstrate their relevance by explicating some of the more frequently used arguments. Lesson Expectation: The main argument of this paper is that there are discourses concerning privacy and security that focus on the ethical quality of the concepts and that the resulting ethical connotation of the terms is used to promote particular interests. In order to support this claim, I will briefly review the literature on privacy and security, emphasizing the ethical angle of the arguments. Review: We value privacy as well as security because they represent moral values which can be defended using ethical arguments. This paper suggests that the moral bases of privacy and security render them open to misuse for the promotion of particular interests and ideologies. In order to support this argument, the paper discusses the ethical underpinnings of privacy and security. It will then introduce the critical approach to information systems research and explain the role of ideology in critical research. Based on this understanding of the centrality of ideology, the paper will discuss the methodology of critical discourse analysis which allows the identification of instances of ideology. This will then lead to the discussion of an ideology critique based on Jürgen Habermas's theory of communicative action, which will be applied to the websites of Microsoft Vista and Trustworthy Computing.

.

Page | 72

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: I then suggested that these moral qualities render the concepts open to be used to promote certain ideologies. In the final step, I have attempted a brief critical discourse analysis on Haberma's Theory of Communicative Action to support the suspicion that the moral nature of privacy and security can be used for ideological purposes. Integrative Question: 1. What is the difference between security and privacy? 2. Why secure information is not necessarily private? 3. What are the goals of security? 4. What aspects of security can both be protecting and limiting privacy at the same time? 5. What are the tools used to provide security?

Page | 73

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: The Meaning of Anonymity in an Information Age Quote: The information they divulge to others in various transactions, and as a result, more capable of protecting the possibility of anonymity. Learning Expectation: Although answers to this foundational question will not immediately yield answers, it is essential to understanding what is at stake in the answer to these question Review: An understanding of the natural meaning of anonymity, as may be reflected in ordinary usage or a dictionary definition, is of remaining nameless, that is to say, conducting oneself without revealing one's name. A poem or pamphlet is anonymous when unattributable to a named person; a donation is anonymous when the name of the donor is withheld; people strolling through a foreign city are anonymous because no-one knows who they are. Extending this understanding into the electronic sphere, one might suggest that conducting one's affairs, communicating, or engaging in transactions anonymously in the electronic sphere, is to do so without one's name being known. Specific cases that are regularly discussed includes ending electronic mail to an individual, or bulletin board, without one's given name appearing in any part of the header participating in a "chat" group, electronic forum, or game without one's given name being known by other participants buying something with the digital equivalent of cash being able to visit any web site without having to divulge one's identity

For situations that we judge anonymity acceptable, or even necessary, we do so because anonymity offers a safe way for people to act, transact, and participate without accountability, without others "getting at" them, tracking them down, or even punishing them. This includes a range of possibilities. Anonymity may encourage freedom of thought and expression by promising a possibility to express opinions, and develop arguments, about positions that for fear of reprisal or ridicule they would not or dare not do otherwise. Anonymity Page | 74

CYBER ETHICS | Marie Antoinette Arriola may enable people to reach out for help, especially for socially stigmatized problems like domestic violence, fear of HIV or other sexually transmitted infection, emotional problems, suicidal thoughts. It offers the possibility of a protective cloak for children, enabling them to engage in internet communication without fear of social predation or -- perhaps less ominous but nevertheless unwanted -- overtures from commercial marketers. Anonymity may also provide respite to adults from commercial and other solicitations. It supports socially valuable institutions like peer review, whistle-blowing and voting. Lesson Learned: The concern I wish to raise here is that in a computerized world concealing or withholding names is no longer adequate, because although it preserves a traditional understanding of anonymity, it fails to preserve what is at stake in protecting anonymity.

Integrative Question: 1. What is anonymity? 2. What is pseudonym? 3. What is anonymity in a computerized world? 4. How is the concept different from that prior to the computerization of the society? 5. What's the difference between anonymity and pseudonimity?

Page | 75

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Double Encryption of Anonymized Electronic Data Interchange Quote: “Collecting medical data electronically requires, according to our moral belief, also some kind of encryption.” Learning Expectation: . We skip the name and address; only the sex and the month-year of birth will be sent from the doctor to the central database. Even the number of the patient in the doctors database will be replaced, because once the doctor may be a researcher using the central database who recognizes one of the patients based on the number. Review: The sender encrypts his message with his secret key firstly and with the public key of the receiver secondly and afterwards he sends the message. The receiver must decrypt that message first with his own secret key and second with the public key of the sender according to the header. When the message is readable after this double decryption, one can be sure that the message was meant to be received by the decrypting receiver and the message was really sent by the sender named in the header of the message. Lessons Learned: In this paper we suggest additional features that network providers must incorporate in the functionality of electronic message handlers. In fact we propose to add some 'intelligence' to the virtual postbox: instead of automatically forwarding, the postbox must now be able to read the sender from the header, select the appropriate public key from that sender, decrypt the message with that public key, replace the senders identification and encrypt the message with its own public key. On the receiver side (the central database) we have to decrypt the message with the secret key of the virtual postbox and after that with the secret key of the central database receiver. Page | 76

CYBER ETHICS | Marie Antoinette Arriola This procedure requires the availability of a list with only public keys at the virtual postbox, as well as a program to intervene the electronic communication. Unfortunately, so far none of the network providers is willing or has been able to implement it. Integrative Questions: 1. What is Double Encryption of Anonymized Electronic Data Interchange? 2. What do the authors mean by "double encryption used twice"? 3. Is it a robust setup? 4. What is the problem the authors are trying to solve? 5. Why is double encryption necessary in this case?

Page | 77

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Written on the Body: Biometrics Identity Quote: “Biometrics will soon hold the key to your future, allowing you and only you to access your house, car, finances, medical records and workplace. Learning Expectation: The technology is easy to explain and trust. The primary advantage that signature verification systems have over other types of biometric technologies is that signatures are already accepted as the common method of identity verification. Review: DNA

identification,

face-shape

recognition,

voice

recognition

and

fingerprint

identification. Biometric identification is superior to lower technology identification methods in common use today - namely passwords, PIN numbers, key-cards and smartcards. Biometrics is the measuring of an attribute or behavior that is unique to an individual person. Biometrics includes measuring attributes of the human body - such as DNA, iris/retina patterns, face shape, and fingerprints - or measuring unique behavioral actions, such as voice patterns and dynamic signature verification. Physical objects include smartcards or magnetic-stripe cards - behaviors based-onmemory includes the act of entering a PIN number or a secret password. The primary use of a physical objects or behaviors based-on-memory has a clear set of problems and limitations. Objects are often lost or stolen and a behavior-based-on-memory is easily forgotten. Both types are often shared. The use of a valid password on a computer network does not mean that an identity is genuine. Identity cannot be guaranteed, privacy is not assumed and inappropriate use cannot be proven or denied.

Page | 78

CYBER ETHICS | Marie Antoinette Arriola Lesson Learned: Unlike your passwords, you will not forget your fingerprints, irises, or DNA when you go to work. They are a part of you. They are also extremely distinguishable from another person’s biometrics. This means that they can be used with great confidence. Since they are a part of you they are difficult for another person to obtain or fake. They are also easy to use. All you may have to do is put your finger into a device and it gives you access if you are authorized or denies you if you aren’t. For these reasons and others, biometric systems are becoming more mainstream and commonplace. Integrative Questions: 1. What is the entry-point paradox as defined by Roger Clarke? 2. In what ways are name, code, knowledge, and token-based identification schemes deficient? 3. What factors have led to the emergence of a consortium-based specification for a global standard for biometric technologies? 4. In the context of identity determination and verification, what are the distinctions between a 'one to many' and 'one to one' match? 5. In what ways are verification and identification procedures inter-dependent?

Page | 79

CYBER ETHICS | Marie Antoinette Arriola

Page | 80

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Ethical Considerations for the Information Professions Quote: ‘A Physician’s Guide To Medical Writing’, an ideal medical write up framed along ethical considerations,” Learning Expectation: The emergence of certain negative trends in the practice of this profession poses a threat to its ability to deliver quality contents with reliable information. Review: They play a vital role in relieving the writers of regulatory pressures involved in the process. Properly includes technical exposition on any subject related to medical science, such as biochemistry, pharmacologic studies, sanitation and psychoanalysis”. It is the responsibility of the writer to include necessary technical details under regulatory limitations to establish a level of understanding among the readers. The client or the researcher should generate complete information on the academic background of the writer before allotting the assignment. This helps a client to understand the performance level that could be extracted from a writer. Regular communication with the writer is an essential condition for the correct formulation of the content.

Lessons Learned: In absence of such considerations it will be impossible for the clients to bridge the communication gaps between them and the target audience. It is widely accepted by many researchers that legal and ethical issues can play the role of obstacles in the progress of marketing a research as they impose certain limitations on the utilization of research products.

Page | 81

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. What is ethical considerations? 2. What is the information professions? 3. What are the activities of ethical? 4. Define ethical considerations? 5. Find the legal and ethical issues?

Page | 82

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Software Engineering Code of Ethics: Approved! Quote: Put in more general terms, the rights/obligations ethicist starts with rules stating obligations about how one should behave and rights about how I am to be treated, while the virtue ethicist starts with the human character and its ethical dispositions Lesson Expectation: There are several purposes of a code of ethics. Several principles that were suggested for the code used imperative language. Review: Association of Computing Machinery (ACM) formed a joint committee to help organize software developers and engineers into a profession. As part of this project, a sub-committee of professionals, academics, and members of ACM and IEEE-CS began work drafting a code of ethics for software engineers through electronic mail. After four years of online discussion and revision, version 5.2 of the Software Engineer’s Code of Ethics and Standards of Practice was adopted by IEEE-CS and ACM in 1998, and since then, the code has been adopted by software engineering and computer societies worldwide. The IEEE-CS/ACM Software Engineering Code of Ethics Archive documents the drafting, debate, and final adoption of the joint IEEE Computer Society /ACMSoftware Engineering Code of Ethics and Standards of Practice. Indirectly, the archive illustrates how software engineering developed from an occupation to a profession. The drafting and approval of the Software Engineering Code, carried out in substantial part by email, has produced a detailed record of the development of a professional code of ethics. Lesson Learned: The software engineer as a practicing professional acts from a higher level of care for the customer (virtue ethics) and conforms to the development standards of the profession (right/obligations ethics).

Page | 83

CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions: 1. What does IEEE-CS stands for? 2. What does ACM stands for? 3. Why did they develop a joint force ethical approach for software engineering? 4. Enumerate and explain the short version of the software engineering ethics. 5. What is Virtue Ethics?

Page | 84

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: No,Papa,: Why incomplete Codes of Ethics Are Worse Than None at All” Quote: “Computer and information ethics”, in the broadest sense of this phrase, can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts” Learning Expectation: Review: “computer ethics” has been used to refer to applications by professional philosophers of traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and computer networks. “Computer ethics” also has been used to refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession. The same considerations are highly likely to apply to any moral code that is developed (whether in computing or elsewhere). Authors of incomplete moral codes risk encouraging others to act in immoral ways with the author's apparent sanction. Related, broader, questions are considered, and it is advocated that there should always be acknowledgment of the existence of 'external', potentially more important, moral issues. Lessons Learned: The problem is that by focusing on these four areas of concern, attention may be taken away from other, potentially more important, moral issues. Not all important moral issues in information technology can be put under those headings. Yet focusing on four areas gives the erroneous impression that adherence to the moral requirements in those areas alone could ensure moral rectitude. Integrative Questions: 1. What is codes of ethics? 2. What are the worse than none at all in ethics? Page | 85

CYBER ETHICS | Marie Antoinette Arriola 3. What are the kinds of computer ethics? 4. Define codes of ethics? 5. How does codes of ethics existence?

Page | 86

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Subsumption Ethics Quote: “A key factor is whether the subsumptionist can prevent a conscious victim from calling for help, and whether or not the subsumptionist enjoys toying with a victim who is aware of the process. “ Learning Expectation: Of these, cannibalism is the closest equivalent. The attacker takes all of the victim's memories, cognitive structures, and available computronium, and incorporates them into emself. Review: The very rare restored survivors of such treatment have compared it to such ancient human practices as lobotomy, emasculation, or blinding, sometimes followed by various forms of torture. Usually a subsumptionist simply causes a series of unexplained disappearances and then moves on before eir activities are noticed. However, a particularly skilled subsumptionist, who has can retained all of the victim's traits and memories intact, may conceal the crime from outsiders for an indefinite period of time. Whether this is because such events are actually rarer among transapients or whether this is because they are difficult for SI<1 observers to detect is unknown. On the other hand, it is not at all uncommon for lesser entities to be destroyed and/or incorporated when a transapient ascends to a higher toposophic level. This is regarded as subsumption (and also as a perverse transcend) in "civilized" parts of the Terragen sphere if the participants are unwilling. It is considered a kind of voluntary amalgamation if they volunteer. Volition under such circumstances is a slippery concept at best however; this provides rich material for debates regarding the ethics and meta-ethics of such events.

Page | 87

CYBER ETHICS | Marie Antoinette Arriola Lessons Learned: The number of subsumption events known to have occurred between beings of higher toposophic levels is relatively small. Integrative Questions: 1. What is Subsumption? 2. What is the use of transapient? 3. How many numbers in subsumption? 4. Define subsumption? 5. What are the human practices?

Page | 88

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: Ethical Issues in business computing Quote: “It will provide readers with a clear knowledge of the complex ethical issues involved in ebusiness and improve their understanding of widely discussed current issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.” Learning Expectation: The internet has revolutionized business by fundamentally changing the means by which businesses operate and enlarging the opportunities available to them to reach and service customers. However, in doing so, the development and practice of e-business also raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Review: Therefore, as e-business continues to grow in significance and scope, it is important to understand and respond to the unique ethical issues associated with e-business. As e-business models become more common in the world of business, there must be an effort to integrate e-business more fully into the field of business ethics so that scholars and professionals working in the field can better appreciate and respond to these ethical issues. There thus exists a clear need for an edited collection of articles that provides a comprehensive and thorough treatment of ethical issues in e-business.

Lessons Learned: This book will aim to provide a comprehensive overview of the most important ethical issues associated with the expanding world of e-business. Grounded solidly in the most recent scholarship in business ethics, the book will apply the most relevant theoretical frameworks to Page | 89

CYBER ETHICS | Marie Antoinette Arriola ethical issues in all significant areas of e-business. The book will be written for scholars, professionals, and students interested in gaining a better comprehension and appreciation of the moral issues encountered in the multifaceted world of e-business. Integrative Questions: 1. What is the importance of ethics for e-business? 2. What are the

new paradigm of business on the internet and its ethical implications?

Identifying and responding to stakeholders in e-business? 3. How to Applying ethical principles to e-business? 4. What is Ethical issues in e-marketing?

Page | 90

CYBER ETHICS | Marie Antoinette Arriola Name of the book: Cyber Ethics Name of the Chapter: The Practitioner from Within: Revisiting the Virtues Quote: ‘Flourishing’ by means of what is variously presented as the formation of virtuous ‘habits’ or a virtuous ‘character’. Learning Expectation: In this paper, I want to take a different approach that emphasises individual human flourishing – although moral values and behaviours will also be discussed in the context of this approach.

I want to investigate to what extent virtue ethics can ground a conception of the

good life and, correspondingly, the good society, in relation to uses of information technology. Review: First, Virtue Ethics has recently experienced a novel degree of academic and policyrelated attention in contemporary and ongoing work in the fields of political philosophy, freedom and development studies, media and culture research, and economics. Originally revived and re-introduced into moral philosophy by Elisabeth Anscombe around 1958, Virtue Ethics is currently a central element in the work of, for instance, Nussbaum, Sen, Foot, and Solomon. Where it does not form a fundamental part of inquiry it is nevertheless receiving critical attention (e.g. Baron et. al 1997). What is more – and as the paper will argue and endeavour to show – there are some complimentarities between Virtue Ethics and the other dominant methods of ethics, particularly some versions and elements of Kantianism. Virtue Ethics is particularly agent-focused and agent-based. This arguably means that a Kantian moral dilemma in which an ethical subject must choose between two first-order moral rules and necessarily, therefore, violate one of them can at least be conceptually addressed by Virtue Ethics in that attention is paid to the mechanisms and the underlying moral virtues by which a subject might decide over and between different courses of action.

Page | 91

CYBER ETHICS | Marie Antoinette Arriola Lessons Learned: Virtue Ethics does afford the moral theorist the perhaps only contemporaneous ethical account that might address the crucial questions over the ways and processes in which an ethical subject might come to be ethical. In other words, it is important to ask in relation to all major ethical traditions how and why an agent might variously choose to enter into a given social and moral contract, or embrace universal rule-based moral systems, or indeed become virtuous. Ethical subjects have histories and futures; they are engaged in development, identityand value-formation and self-reflection. Integrative Questions: 1. What is The Practitioner from Within: Revisiting the Virtues? 2. How virtuous is the virtual? 3. Does Virtue Ethics does afford the moral? 4. What are the policy of ethics virtue? 5. What are the methods of virtues?

Page | 92

CYBER ETHICS | Marie Antoinette Arriola

FORTUNE AT THE BOTTOM OF THE PYRAMID

Page | 93

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: “The Fortune at the Bottom of the Pyramid Book Review Chapter: Chapter 1: The Market at the Bottom of the Pyramid Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507 Amazon Link: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote: “The poor cannot participate in the benefits of globalization without an active engagement and without access to products and services that represent global quality standards”- C. K. Prahalad. Learning Expectations: I am expecting to learn what is meant by bottom of the pyramid. I also expects to learn the reasons why the writer is confident about the potentials of the markets at BOP. Review: According to Mr. Prahalad, there have been many things being in done in solving the global poverty problems. While he did not say that they are not effective, he implied that the efforts are not enough. According to the writer there is a need to find a new approach. His approach focused on the people at the bottom of the pyramid. These are people who live in less than $ 2 a day. In this approach the writer calls upon the partnership between the poor, civil society organizations, governments, and large firms. The effort will involve creating a BOP marketwhich is turning the poor into consumer markets. This approach is based on his assumptions that : large companies have virtually ignored the poor who actually represents a latent market for goods and services; the market at the bottom of the pyramid can provide a new growth opportunity for the private sector and; that this market could become an integral part of its work. Mr. Prahalad says that this market remains untapped because of the dominant logic held by companies. Lessons Learned Although it has not been given much attention, we find that multinationals are reinventing the consumer markets. They are now reaching the market at the bottom of the pyramid.

Page | 94

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions 1. What is the condition of people at the bottom of the pyramid? 2. What are reasons why poverty alleviation programs of the World Bank and other nongovernment organization do not succeed in resolving this problem? 3. What is the attitude of big companies of the markets in the BOP? 4. How can big companies benefit from the opportunities present in the markets at the lowest economic pyramid? 5. What are the opportunities in the BOP markets according to Mr. Prahalad?

Page | 95

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: “The Fortune at the Bottom of the Pyramid” Book Review Chapter: Chapter 2: Products and Services for BOP Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507 Amazon Link: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506 Quote : “As a result the promise of emerging BOP markets has been largely illusionary ”- C.K. Prahalad

Learning Expectations As reader, I expect to learn about what products and services the consumers at BOP needs. Review: According to the writer, BOP market challenges the dominant logic of multinational companies (MNC). He explained that small unit packages, low margin per unit, high volume and high return on capital employed are the basic economics at BOP markets. He reiterated the importance of understanding the BOP market, focusing on their needs. He went on to say that the approach towards this market is to understand the needs of the people in this market and then tailored the product and the manufacturing process around these needs. Companies are challenge to innovate. For this reason, he formulated the 12 principles of innovation. The first is creating a new price –performance envelope; hybrid solutions; scale of operations; identifying functionally; sustainable development; process innovation; deskilling of work; education of consumers; designing for hostile infrastructure; interfaces; distribution and delivery. The chapter simply emphasis that companies need to discard their biases of the BOP market. These markets has the same needs as those in the developed markets but were only disregarded because of the dominant logic that the companies and private sector have about the poor consumer market. However, there are many realities in the market that the companies need to understand. The needs of the market should be understood against the characteristics of the consumers. The companies need to adapt and innovate against these realities. Lessons Learned The writer clearly pointed out that companies need also to throw away their prejudices against the people at the bottom of the pyramid since they represent a latent market force.

Page | 96

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions 1. Why is it important for the companies to understand about the realities and needs of BOP markets? 2. What are the 12 principles of innovation formulated by Prahalad? 3. What is meant by zero-based view? 4. What makes BOP market attractive ? 5. To be involved at BOP markets what is required of the companies’ managers?

Page | 97

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: “The Fortune at the Bottom of the Pyramid” Book Review Chapter: Chapter 3- BOP: A Global Opportunity Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507 Amazon Link: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote: “ BOP markets are great source for experimentation in sustainable development”- C.K. Prahalad

Learning Expectations: I am expecting to learn about the global opportunity present at the BOP market. Through this chapter, we wish to understand the principles of innovation needed in developing the market at BOP. Review Doing business in the markets at BOP offer challenges and global opportunities for companies. However, involvement in BOP markets challenges assumptions or dominant logic that companies have developed for long period of time. The enthusiasm for BOP markets is based on the opportunities that are presented. First, markets in most countries at BOP are large and attractive and stand-alone entities. He also believes that many local innovations can be leveraged across other BOP markets creating a global opportunity for local innovations; some innovations from these markets may be applied in developed markets; and lessons from the BOP markets can influence the management practices of global firms. The traditional approach of many global companies is to start from the business models fitted for developed markets then adopt in the BOP markets. But this is bound to fail because it does not consider the realities and needs of these markets. Lessons Learned: I have learned about what companies must do in order to engage in BOP markets.

Page | 98

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. 2. 3. 4. 5.

How do companies engage at the BOP market? What are the sources of global opportunities in the BOP market? What are the global opportunities that are present in the BOP market? What are the principles of innovation needed for developing BOP markets? What is meant by value-oriented innovation?

Page | 99

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: “The Fortune at the Bottom of the Pyramid” Book Chapter Review: Chapter 4- The Ecosystem for Wealth Creation Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507 Amazon Link: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote: “It is reasonable to expect that 4 billion people in search of an improved quality of life will create one of the most vibrant growth markets we have ever seen”-C.K. Prahalad.

Learning Expectations: I expect to learn about the market-oriented ecosystem. We expect that the writer explains the significance of the symbiotic relationship within the system. Review In the concept developed by the writer, the market-oriented ecosystem is composed of extralegal NGO enterprises; micro enterprises; small and medium enterprises, cooperatives; large and small firms and NGOs. A market-based ecosystem is a framework that allows private sector and social actors often with different traditions and motivations to act together and create wealth in a symbiotic relationships. It is consists of a wide variety of institutions coexisting and complementing each other. In this system all constituents have roles to play and are dependent of each other. According to Mr. Prahalad the need for building an ecosystem in developing the BOP market is obvious from the start. A market-based ecosystem is a framework that allows private sector and social actors with different traditions and motivations, varying in sizes and areas of influence to act together and create wealth in a symbiotic relationship. In the symbiotic relationship each constituent has a role to play and is dependent of each other. The marketbased ecosystem provides social collateral of open and honest entrepreneurship. It provides the tools for the poor and the disadvantaged to be connected seamlessly with the rest of the world in a mutually beneficial and non-exploitative way. Lessons Learned The symbiotic relationship between them is a way of creating wealth. In the marketoriented system includes nodal firms that provide the tools for improving the lives of the poor.

Page | 100

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. 2. 3. 4. 5.

What comprised the market-oriented ecosystem? What is the significance of symbiotic relationship among the groups in the ecosystem? What can the market-oriented ecosystem does for the poor? What is the nodal firm? What is the importance of contracts wealth creation in the market-oriented ecosystem?

Page | 101

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: “The Fortune at the Bottom of the Pyramid” Book Review Chapter: Chapter 5- Reducing Corruption: Transaction Governance Capacity Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507 Amazon Link: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506 Quote: “ Poor countries could often be asset-rich but capital-poor”- C.K. Prahalad. Learning Expectations: I expect to know the different spectrum of TGC and the four requirements in building TGC. Review: There are four criteria for transparency in transactions.

There must be access to

information and transparency for all transactions. There should be clear processes so that selective interpretation by bureaucrats is reduced if not eliminated. Speed with which the processes can be completed by citizens and trust in the system. On one hand the different spectrum of TGC include countries that are arbitrary and authoritarian; countries where laws and institutions of market economy exist but do not reach their potential; and countries with well-developed laws, regulations, institutions and enforcement systems. Enhanced TGC showed that regulations and government business processes can be simplified and interconnected systems will be able to identify pockets of graft and corruption. From the experience of Andhra Pradesh the lesson drawn indicate building trust is essential. And that citizens must feel that changes are taking place.

Lessons Learned As learned in this chapter, corruption is embedded in different micro regulations of the government. It is for this reason that transactions in the government is not only costly for the people but even for investors

Page | 102

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. 2. 3. 4. 5.

What is the importance of TGC in the fight against poverty and corruption? What are the criteria for transaction governance capacity? What are the specifications for TGC? What are the different spectrums of TGC? What are the lessons drawn from the experiences of Andhra Pradesh on TGC?

Page | 103

CYBER ETHICS | Marie Antoinette Arriola Name of the Book: “The Fortune at the Bottom of the Pyramid” Book Review Chapter: Chapter 6- Development as Social Transformation Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507 Amazon Link: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote: “ When the poor are treated as consumers, they can reap the benefits of respect, choice, and self-esteem and have an opportunity to climb out of the poverty ”

Learning Expectations: I intend to understand the effects of social transformation on the people at the BOP.

Review One of the impact of transforming BOP into market is gaining legal identity. This is denied to them in the past. Without this identity consumers cannot access the services. The social transformation that is taking place in markets where the public and private sectors have been involved at the BOP is impressive. This will transform the economic pyramid into diamond. There will always be rich, but the measure of development is the number of people in a society who are considered middle class. There will not longer be BOP.

Lessons Learned The poor people will no longer belong to the bottom of the pyramid but inside the diamond as middle classes.

Page | 104

CYBER ETHICS | Marie Antoinette Arriola Integrative Questions: 1. 2. 3. 4. 5.

What is the role of government in the social transformation of people at BOP? How are the people transformed at the BOP? How are women empowered at BOP? What happened to the people at the bottom of the pyramid? What does diamond as measure of development implied?

Page | 105

CYBER ETHICS | Marie Antoinette Arriola

The HANDBOOK of information and computer ethics

Page | 106

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 1: Foundations of Information Ethics

Luciano Floridi

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “The more people have become accustomed to living and working immersed within digital environments, the easier it has become to unveil new ethical issues involving informational realities. “

Learning Expectation: I expect to learn the foundation of the information technology ethics. Since this is something that is rarely discussed, it will be an interesting topic.

Review: Our world today had a lot of differences way back before computers were invented. We must admit that our scope of thoughts had become and is becoming more diverse each day, and so as the ethical responsibilities we have for each other and for the society. In the use of machines and programs, it always seems that having a lot of resources or information is the best solution to come up with a better idea. Sometimes, in order for us to create a more practical solution to the problems, we need to focus on few areas and use very relevant information only. Sometimes knowing everything can also create problems to those people who happen to a lot of information because in a situation wherein they need to make decisions, sometimes, the factors that may affect the outcome will be considered in detail so the span of time spent in making a decision will be increased compared to the normal time spent. Because of the increase in numbers of the users of technology, the scope for information ethics also expanded. Hacking has been a major issue. Though the use of the information is not the main concern but the unauthorized access which invades the privacy of the information owner or of the system owner. Information ethics is a patient-oriented. Meaning information ethics does not only give importance or protection only to the human beings but to all life forms.

Page | 107

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that information ethics is a very complicated subject and that includes many aspects that concerns morality that every IT professionals should consider.

5 Integrative Questions: 1. 2. 3. 4. 5.

What is the basis for the information ethics? What are some of the issues arising in the information technology field? How sensitive is information in an organization? How does Information ethics evolved? What are the parts of the infosphere?

Citation/s: N/A

Page | 108

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 2: Milestones in the History of Information and Computer Ethics Terrell Ward Bynum Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “To live well, according to Wiener, human beings must be free to engage in creative and flexible actions that maximize their full potential as intelligent, decision-making. “

Learning Expectation: I expect to learn what Norbert Weiner’s explanation for cyber ethics and I expect to learn the basis for the term used and if there are further definition for cyber ethics. Review: In this chapter, it is said that, in Weiner’s point of view, humans are expected to act more differently than any other species in the world because of a higher intellect that humans possess compared to insects or animals. Humans are also able to adapt to the changes that happens in the environment. According to Weiner, because of the special ability of humans, we are expected to flourish and improve the information –processing that we have. To live well, according to Wiener, human beings must be free to engage in creative and flexible actions that maximize their full potential as intelligent, decision-making beings in charge of their own lives. It is also stated that the success of every human being differs from the other because of the different talents and intellect level that every person has. There are three principles Weiner had developed. First is the Principle of Freedom. It means that humans should explore and do not limit himself in achieving success. He should seek all possibilities to reach his goals. The second principle is Principle of Equality means that what belongs to a person should remain his no matter what situation he’ll be into. The third principle is The Principle of Benevolence. This principle says that in justice, there should be good will between man and man. According to Weiner, success of human beings is only possible when humans interact socially and participate in activities that share the same interest and personalities with them. Page | 109

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that the success of humans also depends on how active we are on the society. And success is better achieved when we participate with people with the same ideas and personalities.

5 Integrative Questions: 1. 2. 3. 4. 5.

What is Weiner’s idea of cyber ethics? What are the three principles of justice according to Weiner? How can humans achieve success? What is expected from humans? Where does the success of humans regardless of the varied culture depend?

Citation/s: N/A

Page | 110

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 3: Moral Methodology and Information Technology Jeroen Van De Hoven Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “if the Internet and the WorldWideWeb are introduced into the lives of children, their lives will be very different from the childhood of people who grew up without online computer games”

Learning Expectation: I expect to learn the methodologies in morality and how is information technology connected to it or how the methodologies apply to technology.

Review: Computer ethics is a form of applied or practical ethics. It studies the moral questions that are associated with the development, application, and use of computers and computer science. Computer ethics is basically about the proper use of computers and related technology. The definition of technology depends on the area or subject it is applied with. With the different applications, software and other technology that users can apply or utilize, the morality is difficult to implement. One of the most controversial issues in cyber ethics is privacy. It is difficult to distinguish or to implement fair use in today’s cyber world because of the common application that most users are using like the peer-to-peer programs. The problem with the implementation of ethics to the current problems of the information technology is that only one method is being applied when not all problems can be addressed by one ethical method. Wheat we need to learn is to apply ethical methods without generalizing.

Page | 111

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that it is very difficult to apply ethical solutions to the problems that we have especially if the problem is something that most people have learned to use mos of the time.

5 Integrative Questions: 1. 2. 3. 4. 5.

What are the methodologies in ethics? What is the best methodology to apply? Is it possible to have one methodology for all ethical problems? What is the danger in the methodologies? Does technology need to be the ones adapting all the time?

Citation/s: N/A

Page | 112

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 4: Value Sensitive Design and Information Systems BATYA FRIEDMAN, PETER H. KAHN JR., and ALAN BORNING Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “Technical mechanisms will often adjudicate multiple if not conflicting values, often in the form of design trade-offs. We have found it helpful to make explicit how a design trade-off maps onto a value conflict and differentially affects different groups of stakeholders.”

Learning Expectation: I expect to learn what value sensitive design is and how design in technology will need ethical concepts.

Review: Value Sensitive Design is concern with designing of technology with the need of having to consider the human values. But what is value? Value is commonly defined as a worth for an object, in this chapter, value means something that is important for people. Weiner argued that we can become better human beings if we do not allow ourselves to be consumed too much by the technology we use. Computer ethics is where we study the effect of technology in the lives of humans. It guides us to what the decisions and proper actions that should be done in the cyber world. Conceptual investigation includes the question on whether the designs should be based on the moral values or should it be based in the aesthetic value. It said in this chapter that the trust of people depends on three aspects. The use of value sensitive design is beneficial for or to whom it is intended for, but it can also invade the privacy of other people which can also become another issue for cyber ethics.

Page | 113

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that we should not put aside the value when designing systems and in using technology because there will always be a way where we can affect someone.

5 Integrative Questions: 1. 2. 3. 4. 5.

What is value sensitive design? Who are the stakeholders? Why is it important to consider the stakeholders in designing? Is there a disadvantage in designing systems? How is human values implemented in system designing?

Citation/s: N/A

Page | 114

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 5: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property | ADAM D. MOORE Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “Arguments for intellectual property rights have generally taken one of three forms. Personality theorists maintain that intellectual property is an extension of individual personality.”

Learning Expectation: I expect to learn what intellectual property rights is and what are the problem arising in this area in the field of technology. I am also expecting to learn what are the different justifications and its meanings. Review: What is intellectual property? Intellectual property, according to the book, Personality theorists maintain that intellectual property is an extension of individual personality. Ruleutilitarians ground intellectual property rights in social progress and incentives to innovate. Lockeans argue that rights are justified in relation to labor and merit. Basically, intellectual property is the product of thinking that is not seen physically, it is conceived the minds of the creators. Intellectual property is protected usually by copyright, patent and trade marks. These are usually used for literary works, inventions, computer software and more. Patent is the most secured protection based on the book. The rights included on patents owners are the right to make, the right to use, the right to sell, and the right to authorize others to sell the patented item. Patent also do not allow others to use or to produce materials that has been patented already. The Lockean principle in protecting the intellectual property states that every person has the right to his own labor. It is also said that if a person’s own labor is joined into an object even though it does not belong to him, or it is not a product of his work, then the product still belongs to him. John Locke had said “For this labor being the unquestionable property of the laborer, no man but he can have a right to what that is once joined to, at least where there is enough and as good left for others.” This statement says that if one had worked for something, then he has the right to

Page | 115

CYBER ETHICS | Marie Antoinette Arriola own its product for as long as he does not claim everything and that there’s still something that remains for others.

What I Have Learned: I have learned the three ways in justifying protection of intellectual property rights and their advantages and disadvantages.

5 Integrative Questions: 1. 2. 3. 4. 5.

What is intellectual property? How is IPR violated? What are the three definitions of IP based on the three ideas? How is IP protected? What is the strongest type of IP protection?

Citation/s: N/A

Page | 116

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 6: Informational Privacy: Concepts, Theories, and Controversies | Herman T. Tavani Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “We demand recognition of our right to privacy, we complain when privacy is invaded, yet we encounter difficulties immediately [when] we seek to explain what we mean by privacy, what is the area, the content of privacy, what is outside that area, what constitutes a loss of privacy, a loss to which we have consented, a justified loss, an unjustified loss.” —H.J. McCloskey (1985, p. 343)

Learning Expectation: I expect to learn the key concepts, theories and the controversies that concern the information privacy. Review: Having a good and clear understanding of what is privacy is an important. Moor argued that privacy has an evolving concept and its “content” is often influenced by the “political and technological features of the society’s environment.” We all know that technology is as the same way. And with the advances that continue to happen in the field of technology, it is unavoidable that privacy can become an issue. In the previous chapter, a common example is the peer-topeer programs. In this chapter, it is argued whether privacy is a right or an interest for a person. Privacy are of four kinds. First is the Physical privacy wherein it is about the damages that can be done in a person physically when evading privacy. The Second example is Decisional privacy which states that a person has his own freedom to have his own ideas and that one must not influence the choices made by another. The third kind is psychological privacy which is somewhat the same with the previous kind of privacy but it is defined in the book that a person is confined into his own thinking and that he cannot influence the way others think. The fourth and last kind of privacy is informational privacy includes the restriction in facts where there are certain records or documents that can only be accessed by limited or authorized people. Page | 117

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned a different definition of privacy. I have also learned the types of privacy and the theories that it has. 5 Integrative Questions: 1. 2. 3. 4. 5.

What is privacy? What are the theories in information privacy? What are the types of privacy? What is decisional privacy? What is Informational Privacy?

Citation/s: N/A

Page | 118

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 7: Online Anonymity | Kathleen A. Wallace Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “The term anonymity has been used to denote a number of related things: namelessness, detachment, unidentifiability, lack of recognition, loss of sense of identity or sense of self, and so on.”

Learning Expectation: I expect to learn the meaning of anonymity and how can it become useful. I also expect to learn more facts on the importance of online anonymity. Review: Anonymity can also be brought about in a variety of ways and there are many purposes, both positive and negative, that anonymity could serve, such as, on the positive side, promoting free expression and exchange of ideas, or protecting someone from undesirable publicity or, on the negative, hate speech with no accountability, fraud or other criminal activity. This excerpt from the book explains that anonymity has two sides and has two possible outcomes. Same as anything, anonymity can be positive or negative depending on the purpose of using or implementing it. There are certain situations that calls for anonymity, like for security purposes. It can become negative if the purpose is to harm others or to retrieve restricted information. Anonymity online is easily done because of the options that internet users have. Most of the programs online can allow the users to create pseudonyms or aliases to conceal their real identities. This can become a problem when used in an illegal way like scams and other types of fraud activities. Online anonymity does not only affect in legal aspects, it also affects the way of human communication where the bonds of human communication is weakening because online users are detached from having a good relation with another human because of the possible wrong information that they post or give online.

Page | 119

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that anonymity can become useful and harmful at the same time. I also learned that the advances in technology also make it harder to identify correct and reliable information because of the lack of proper sources. 5 Integrative Questions: 1. 2. 3. 4. 5.

What is anonymity? What is the advantage of being anonymous? How can anonymity be implemented? Is anonymity legal? What are the advantages of using anonymity online?

Citation/s: N/A

Page | 120

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking | Kenneth Einar Himma Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “Expressive conduct is subject to more stringent moral limits than those to which pure speech is subject. The reason for this has to do with the effects of these different kinds of act.” Learning Expectation: I expect to learn the definitions of terms hacktivism and counterhacking. I would also like to learn the concepts of hacking and if there are advantages in doing it. Review: Hacking is a negative action to anyone who had heard of it before. Hacking is the intrusion in the property of other people. Hacker is the term used in referring to the person who does the invasion of property. According to the book, there are two arguments in the definition, hacking can also be acceptable if the purpose that it is done is for the purpose of protecting one’s property. The second argument in the term trespassing is that, trespassing includes the physical act of entering into someone else’s property. But it is not applicable in the digital area because the hacker does not physically intrude in someone else’s digital file or account but it is the access of a private account that hacker does. Though any act of illegal access to someone’s property is impermissible, there can still be some acceptable situations such as if the unpermitted access to information is needed for the safety and welfare of others, then it is acceptable. Hacking does not only connote illegal activities. Hacker can perform hacking to ensure the safety of one’s network. Hacking can also be done to improve the security of a network and see if there are possible threats or ways that can be used by the intruders. Hacktivism is the term used in the activity if using hacking to promote an idea to an author or an act to show deviation.

Page | 121

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that hacking is not absolutely illegal and wrong but it can also become and advantage for companies 5 Integrative Questions: 1. 2. 3. 4. 5.

What is hacktivism? What is counterhacking? What is hacker? What is hacking? What is trespassing?

Citation/s: N/A

Page | 122

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 9: Information Ethics and Library Profession | KAY MATHIESEN and DON FALLIS Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “Expressive conduct is subject to more stringent moral limits than those to which pure speech is subject. The reason for this has to do with the effects of these different kinds of act.” Learning Expectation: I expect to learn the meaning of Information ethics and the concepts that is included with it. I am also expecting to learn the connection of information ethics to the library profession. Review: This chapter of the book discusses the issue regarding information in library and the issues regarding the library profession. My first thought regarding library profession is a job that requires arranging and organizing collection of books. I am right in way because there are several types of library professions: there are corporate, academic and public librarians. The public library has the most number of issues. In the following sections, we consider the challenges that confront the librarian in carrying out his or her professional duties, in particular with regard to selection of materials and the organization of these materials. With this there are 5 laws of library science by Shiyali Ramamrita Rangathan: (1) Books are for use. (2) Every person his or her book. (3) Every book its reader. (4) Save the time of the reader. (5) The library is a growing organism. The first law emphasizes that librarian should make sure that books are made available for the users. Librarians are compared to referees because just like the latter, librarians are supposed to be neutral.

What I Have Learned:

Page | 123

CYBER ETHICS | Marie Antoinette Arriola I have learned that it is important for a library profession to remain neutral so that the distribution of information will be fair and all of those people who want to access will be given a chance to have information that they need. 5 Integrative Questions: 1. 2. 3. 4. 5.

What is information ethics? What is a library profession? What are types of libraries? What is the most complex type of library profession? What is neutrality in library profession?

Citation/s: N/A

Page | 124

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 10: Ethical Interest in Free and Open Source Software | KAY MATHIESEN and DON FALLIS Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “The golden rule requires that if I like a program I must share it with other people who like it” (Stallman, 1985). Learning Expectation: I expect to learn the concepts in the free software and open source software and the ethical issues, if there are any, which are involved with this topic. Review: Nowadays, the use of open source software is encouraged because it is first of all, free and it helps other developers to learn. What is Free Software? Free software gives free access to users the software product for free. Open Source software on the other hand, allows other users to see and modify codes of programs made by other developers. This also allows the users to use the software for free. So why open source is better that paid software? It is maybe because of the almost the same features for the software and users will be able to use it for free and save money. There is no problem with using open source software because most of them are sometimes better, compared to paid software. The problem I see with OS software is that there is limited support, unlike paid software that offers technical support anytime. Stallman argues that payment for software limits the benefits of humanity with the program and that the reward a programmer can get in having his software accessed for free is the social contribution the he makes. By having free software available, the community can benefit from it, thus, the community improves.

What I Have Learned: Page | 125

CYBER ETHICS | Marie Antoinette Arriola I have learned that it is not wrong to use open source software. I also learned that by having this kind of software, it helps each one of us to improve and further learn more concepts. 5 Integrative Questions: 1. 2. 3. 4. 5.

What is free software? What is open source software movement? What is general public license? What is the distinction between FS and OSS? Who establish Free Software Foundation?

Citation/s: N/A

Page | 126

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 11: Internet Research Ethics: The Field and Its Critical Issues | ELIZABETH A. BUCHANAN and CHARLES ESS Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “IRE builds on the research ethics traditions developed for medical, humanistic, and social science research; this means in turn that a central challenge for IRE is to develop guidelines for ethical research that aim toward objective, universally recognized norms, while simultaneously incorporating important disciplinary differences in research ethics”

Learning Expectation: I expect to learn the concepts of internet research ethics. I also expect learn the critical issues that are involve in the topic. Review: The internet has become the number one source of information nowadays. Every question seems to be answered by browsing through web pages and so, the internet is the primary source of information for researches. With this, the internet has become a critical issue. Researches will be greatly affected by the information researches retrieves from the internet that is why, it is important to have a reliable source. The book states that “researchers thence have the obligation to respect and protect these rights, regardless of the “costs” of doing so, for example, of having to develop comparatively more complicated and/or costly research design to protect such rights, or even the ultimate cost of giving up an otherwise compelling and potentially highly beneficial research project because it unavoidably violates these basic rights and duties.” With this, the developers are still the ones who will decide on whether they will make their program available for the public or not even though it will greatly affect the community with its uses.

Page | 127

CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned: I have learned that because of the complexity of the internet and it being the primary source of information, it is important that we know how to handle information properly. It is also important that we give credits to our sources. 5 Integrative Questions: 1. 2. 3. 4. 5.

What is Internet research ethics? What is global IRE? What is the western approach in IRE? What is Tamura’s approach? What is the Buddhist notion for the ‘self’?

Citation/s: N/A

Page | 128

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 12: Health Information Technology: Challenges in Ethics, Science, and Uncertainty | KENNETH W. GOODMAN Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “There is arguably no better trigger for reflection on morality and its relationship to the law and society than privacy and its cousin, confidentiality. The demands of privacy are intuitively straightforward and the consequences of its violation obvious. Without a credible promise that privacy and confidentiality will be safeguarded, the task of fostering trust is frustrated.” Learning Expectation: I expect to learn the concepts in health information technology and the different challenges it gives to the ethics and science area. Review: This chapter of the book focuses on these three topics: • • •

privacy and confidentiality, use of decision support systems, and Development of personal health records.

Privacy is defined as the right or reasonable expectation people have that they will be secured from intrusion. It is the right to keep things for themselves and to not allow the public in having information that they choose to keep. Information technology plays a big role in the field of health and sciences, information in medical issues are kept private and confidential as well. Computers made it easier to keep and record medical files compared in storing it manually on the paper files. But as information is made computerized, it is still prone to intrusions.

Page | 129

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that there are ethical decision that should be made in medical field and that sometimes professionals forget or sometimes do not have an idea that they violate the privacy and confidentiality of the patients. 5 Integrative Questions: 1. 2. 3. 4. 5.

What is health information technology? What is the difference between privacy and confidentiality? Who is the author of this chapter? What is the field of emergency public health informatics? What steps should be taken to ensure that computers are not used for inappropriate access?

Citation/s: N/A

Page | 130

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 13: Ethical Issues of Information and Business

| BERND CARSTEN STAHL

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “Businesses and the economic system they work in have an important influence on ethical issues arising from information and information and communication technology.” Learning Expectation: I expect to learn the concepts and issues regarding information and business. I would also like to learn new ethic principles about business. Review: It is said that the relationship of business and ethics or the link between computers and ethics. Business ethics is simply defined as a relationship which deals with the discipline of business and ethics. Ethics in business is important because moral norms are said to be important in the economic system. An example would be the respect that should be given to contract and dealing in the business setting. Without moral values it is more likely to have chaos in the economic system. A good economy signifies a good life for the people, and so as much as everyone would want to have a good life, it is imperative that people doing business should be ethical. According to the book, the central idea of the stakeholder conception of the company is that the legitimate interests of stakeholders need to be considered when decisions are made. It is important that the interest of an individual should not hamper the decisions that were to be made. It is important that stakeholders and company members will be unbiased.

Page | 131

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that stakeholders should not be influenced by the factors in their environment. 5

Integrative Questions: 1. 2. 3. 4. 5.

What is business ethic? How is business and ethics related? What are stakeholders? What is a stockholder? What is the difference between stockholder and stakeholder?

Citation/s: N/A

Page | 132

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 14: Responsibilities for Information on the Internet | ANTON VEDDER Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote:

One of the most fascinating aspects of the Internet is that very few accidents happen. This not only holds for the technical infrastructure and maintenance, but also for the communication and information transmitted through the network. Learning Expectation: I expect to learn the concepts the responsibilities on the internet. Review: The internet is a very interesting and one of the most important innovations in the history of mankind. It serves a lot of purpose and more information and advancements are made because of it. But good as it may seem, the internet has a lot of issues that needs to be discussed and answered. Most of which are concerned with ethical problems.

“Until recently, issues of responsibilities on the Internet have often been discussed in association with specific accountabilities of ISPs with regard to information (including pictures and footage) that are outright illegal or immoral. Think, for instance, of child pornography, illegal weapon sales, the sale of illegal drugs, and the dispersion of hate and discrimination.” No one owns the internet, and so, who is to blame for the problems that will arise. The cyber world lacks proper implementation of law for those who violate rights and do illegal activities especially during the earlier years of the internet. Countries such as ours also have deficient regulations on internet problems.

Page | 133

CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned: I have learned that it is difficult to measure the responsibilities that every user of the internet has. Integrative Questions: 1. 2. 3. 4. 5.

What is the internet? What are the problems that arises with the use of internet? Who is the author of this chapter? What is ISP? What is responsibility?

Citation/s: N/A

Page | 134

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 15: Virtual Reality and Computer Simulation| PHILIP BREY Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “Designers have a responsibility to reflect on the values and biases contained in their creations and to ensure that they do not violate important ethical principles” Learning Expectation: I expect to learn the concepts of virtual reality and computer simulation. I expect to learn the advantages and issues from the said topic. Review: Virtual reality started on the 80’s. According to the book, virtual reality is a technology which shows three-dimensional environments with head equipment. The VR allows the user can interact with the environment. There are four essential elements in Virtual reality: a. Virtual world b. Immersion c. Sensory feedback d. Interactivity Virtual world and virtual reality are two different things. Virtual world is a more complex and broader concept compared to virtual reality. According to the book computer simulation is a computer program that contains a model of a particular (actual or theoretical) system. It can be customized according to the needs of the user. This has become useful in mathematical systems. Unlike virtual reality, the environment in the computer simulation does not need to be too realistic. The environment can be developed in an abstract way.

Page | 135

CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned: I have learned that there are issues that concern the use of virtual reality and computer simulation. I also learned the difference of the two technologies. Integrative Questions: 1. 2. 3. 4. 5.

What is virtual reality? What is the purpose of VR? What is Computer Simulation? What is the difference between virtual reality and computer simulation?\ When did virtual reality started?

Citation/s: N/A

Page | 136

CYBER ETHICS | Marie Antoinette Arriola Book Title: The Handbook of Information and Computer Ethics Author: Kenneth Einar Himma and Herman T. Tavani Chapter 16: Genetic Information: Epistemological and Ethical Issues | ANTONIO MARTURANO Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599 Amazon Link: http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl ink Quote: “It may be used without semantic implication; for example, we may say that the form of a cloud provides information about whether it will rain. In such cases, no one would think that the cloud had the shape it did in provided information. In contrast, a weather forecast contains information about whether it will rain, and it has the form it does because it conveys that information. The difference can be expressed by saying that the forecast has intentionality whereas the cloud does not.” Learning Expectation: I expect to learn concepts in the genetic information. I want to learn the definition of epistemology and ethics in genetics. Review: Technology and science are almost associated in every way. In the advancement of science, technology has a great role. Genetic information is consists of data about the genetic components. The technology is used to determine specific information for genetic studies. Castells said that science relies on the computational models, simulations and analysis. Genetic information is more special compared to the other cases of health information. The book states that there really are not two different kinds of information; information has the same meaning in information technology and in molecular biology. Meaning, the information in genetics cannot be easily be defined

Page | 137

CYBER ETHICS | Marie Antoinette Arriola What I Have Learned: I have learned that technology has a big role in the field of science. Integrative Questions: 1. 2. 3. 4. 5.

What is genetics? What is genetic information? What is a Central Dogma? What is computing machinery? What are the models in genetic information?

Citation/s: N/A

Page | 138

Related Documents

Ethic Reader Arriola
April 2020 11
Ethic Reader
April 2020 23
Ethic Reader Deep
April 2020 14