Ethic Reader Deep

  • Uploaded by: deep
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Ethic Reader Deep as PDF for free.

More details

  • Words: 18,356
  • Pages: 155
My INFORMATION TECHOLOGY ETHIC’s Book Are You Moral Enough?

This work is licensed under a Creative Commons AttributionNoncommercial-share alike 3.0 Philippines license.

DEDICATION

THE BOOK IS DEDICATED TO MYSELF FOR ONCE I AM NOT LAZY AND TO MY PARENTS FAMILY AND FRIENDS Truly yours the one the only

fuldeep brar

2

PREFACE

Ethics was taught to us in class. I enjoyed learning it. Trough the good times.

I would like to thank san Miguel brewery for making the best beer in the country

3

Cyber Ethics Chapter 1

Chapter: Ethics and the Information Revolution

“Be unselfish. That is the first and final commandment for those Who would be useful and happy in their usefulness. If you think of yourself only, you cannot develop Because you are choking The source of development, which is spiritual Expansion through thought for others.” - Charles William Eliot

What I expect to learn: I expect to learn things that would help me understand and get the mature thinking about the revolution of ethics and information technology. Meaning of the quote: I selected this quote because the quote is perfect match for the information revolution. Being selfish would not help anyone. We need to learn how to be unselfish. We should learn how to appreciate other people as well. Review: The Information technology grew. It was a big boom not only today, but also in the future. Every person wants to be in the trend of the new technology. The trend in which every person would or is benefiting. Information Technology grows not only a tiny step day by day. But it takes a giant step forward and it progresses in to more powerful technology. It’s like foreseeing the future. We create and upgrade everything. There is a sad part though. People tend to become more greedy this days. As technology grows evil grows with it. People abuse information technology they create such things as viruses and spywares that infect other computers that they steal or destroy the other computer. People need to have the proper state of mind or the proper morality within one self’s. We need to put the bad side away. We need to improve the ethical attitude of people supporting this growth.

4

What I learned: ♦ How the information boomed and evolved. ♦ Information technology with values ♦ Information technology of past present and future ♦ What good and bad can happen with information technology. ♦ Being true to oneself eliminates being uneducated with ethics.

Integrative Questions: 1. Why does information rapidly grow? 2. Would this growth stop? 3. What are the four parts of global information ethics? 4. Why are people creating viruses and spywares? 5. Why shouldn’t be software owner ship be allowed according to people like Richard Stallman?

5

Cyber Ethics Chapter 2

Chapter: Ethics On-Line

Quote:

“The release of atom power has changed everything Except our way of thinking. The solution to this problem lies in the heart of mankind. If only I had known, I should have become a watchmaker.” - Albert Einstein

What I expect to learn: I expect to learn and know what the right and wrong decisions are when information technology is dissected with ethics. Meaning of the Quote: The quotes explains that everything we should do is for the good of mankind. We should change the way we think. We should be smart enough to know what is helpful to the world and which is not. Review: The chapter discusses the difference between the law, information, and communication. People can tend to be ethical by following the law. But are we sure that following that law is ethical? In some cases the law can be determined as a bad part of morality. Some laws are bad. It depends on how ethics is implemented and it depends on the culture. The information we get nowadays are so broad. Everywhere you go you would have a great chance of getting that specific info you would need. Library these days are things of the past, with the world wide web and cyber world. The information grows and improves. Before I remember when I was a kid if you need to research you would have to go to the library, these days open up Mozilla and you would have all the things you would need in the browser. But what I also noticed people doing those things are forgetting something. They are forgetting to give credit to the people who did the work. There forget to give the reference and citation to the author. Same with the software’s that is being created now. He licensed software’s are being pirated and being sold by the people of the ghetto market. Like I said information is needed by people everyday and every moment in order to survive this time in our world.

6

Things that I have learned: ♦ Technology is everywhere. ♦ The three characteristics of communication in networks. Integrative Questions: 1. 2. 3. 4. 5.

What is Variety and what is Consent, what are its differences. What can be beneficial in certain contexts? What is diminished trust? What are the three problems of anonymity? Can Information be reproduced without a loss of value? Explain

7

Cyber Ethics Chapter 3

Chapter: Reason, Relativity, and Responsibility in Computer Ethics

Quote: “Injustice, poverty, slavery, ignorance – these may be cured by reform or revolution. But men do not live only by fighting evils. They live by positive goals, individual and collective, a vast variety of them, seldom predictable, at times incompatible.” – Isaiah Berlin What I expect to learn: What does Reason and Relativity have to with responsibility in Computer Ethics. Meaning of the Quote: The quote explains that Being selfish and doing injustice actions are things we should avoid in order to have a better life. Men should act like real men, God created us not to fight not to be selfish. He created us to be a better person knowing united we can be a better human beings. Review: Revolution and evolution sounds so near but yet the meaning so far. These two words are basically on the opposite side but the meaning may have the same direction or point. A revolution wants a new beginning. An evolution wants to upgrade into something new. Information technology is evolving and revolutionizing faster than the speed of light. We Should know the right things. We should know what the wrongs thing is and what the right thing is while we are growing. We should set aside the bad deeds in order for us to win this. We should always be honest. Being greedy nor being selfish would not help a person. It is better to be a kind hearted and know the good things. Than being someone elite who is doing something below the table.

8

Things that I have learned: ♦ ♦ ♦ ♦

Information revolution and evolution Core Values Responsibility in computer ethics. Cultural relativism

Integrative Question: 1. 2. 3. 4. 5.

What are the possible policies for a website? What are the core values of Computer ethics? Do computer scientists have disagreements? Enumerate responsibilities in computer ethics Respecting the core values of everyone would give standard?

9

Cyber Ethics Chapter 4

Chapter: Disclosive Computer Ethics Quote: “A man is ethical only when life, as such, is sacred to him, that of plants and animals as that of his fellow men, and when he devotes himself helpfully to all life that is in need of help.” -Albert Schweitzer

What I expect to learn: Being able to learn ethical principles in which we can use as a professional in the industry.

Meaning of the quote:

A man should not be selfish. He should learn how to be a person who is willing to do good things for others. A man’s life is not about himself. It is about ethical things that happened in his life.

Review:

The chapter is basically about computer ethics. It says the technology should grow with moral ethics. People would learn to follow policies if they are not only implemented properly but also if they are given a proper introduction. We need to have another approach in which ethics would be given a better understanding. Things that I have learned: ♦ ♦ ♦ ♦ ♦ ♦

Justice Autonomy Democracy Privacy Computer ethics Morality

10

Integrative Questions: 1. 2. 3. 4. 5.

How is democracy defined in the book? Are the limitations of computer ethics justifiable? Give and explain one hidden morality Give the four key values What is disclosive computer ethics?

11

Cyber Ethics Chapter 5

Chapter: Gender and Computer Ethics Quote: “Of liberty I would say that, in the whole plenitude of its extent, it is unobstructed action according to our will. But rightful liberty is unobstructed action according to our will within limits drawn around us by the equal rights of others. I do not add 'within the limits of the law,' because law is often but the tyrant's will, and always so when it violates the right of an individual.” - Thomas Jefferson What I expect to learn: I expect to learn if nowadays discrimination of gender is still in the public and is it in the information technology sector? Meaning of the Quote: The quote explains that every person has his right to be equal. Every person is the same as any other individual. Review: The chapter tells how gender discrimination still occurs in the information technology department. It is hard to say what I am about to say because I am a man. Many men think that women are only good for household work. For me I agree but, if you make a man work with a woman, the work would be way much better. Women are not only good at household work but actual work also. We need to learn how to be fair. Its unethical to discriminate gender.

What I have learned: ♦ ♦ ♦ ♦ ♦

Barriers and pipelines in computer ethics Men and women’s moral decision making Ethical decisions versus ethical process Lack of theory Two strands of gender

12

Integrative Questions: 1. What are the two strands of gender and computer ethics? 2. Why do we need to begin exploring the alternative ethics that feminism can offer computer ethics? 3. How student population does affect computer ethics? 4. In what two areas do computer ethics have gender implications? 5. What is liberalisms connection in gender issues?

13

Cyber Ethics Chapter 6

Chapter: Is the Global Information Infrastructure a Democratic Technology?

Quote: “We have, in fact, two kinds of morality side by side: one which we preach but do not practice, and another which we practice but seldom preach.” - Bertrand Russell

What I expect to learn: I expect to learn things about Global information infrastructure. Definition of the quote: The quote states that a person has two sides. One side is his pride in which he boasts about which he is so proud. The other side is the side in which when he makes mistakes it is hidden. Review: Values play an important role in information technology. Values are the standards we follow in everyday life we need to adopt the right values. This is being passed on from one generation to another generation. We have to know what would be right and what would be wrong in such actions we do.

What I have learned: ♦ ♦ ♦ ♦ ♦

Information technology values Power to many Joint deliberation Democracy in information technology Values embedded in information technology

14

Integrative Questions: 1. 2. 3. 4. 5.

What is the idea of joint deliberation? Give the values that are embedded in the global information infrastructure Define embedded values Explain Power to the many Explain how technology and values are alike.

15

Cyber Ethics Chapter 7

Chapter: Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key Problems and Challenges Quote: “When we honestly ask ourselves which person in our lives means the most us, we often find that it is those who, instead of giving much advice, solutions, or cures, have chosen rather to share our pain and touch our wounds with a gentle and tender hand. The friend who can be silent with us in a moment of despair or confusion, who can stay with us in an hour of grief and bereavement, who can tolerate not knowing, not curing, not healing and face with us the reality of our powerlessness, that is a friend who cares.” - Henri Nouwen What I expect to learn: I expect to learn how to apply ethics and moralities in information technology problems. Definition of the quote: The quote states that things we do is not for ourselves, things we do is for all the people we love. There would be no one alone in the world. We have a friend who would be there when we need him or her. Review: We need to apply our lives with ethical thinking. Sometimes we don’t know or we are just ignorant in doing something wrong. In the software industry sharing is ok as long as the software maker allows it, but what if it is not. Here come the pirates who sales the software’s in the black market in order for them to gain money, what happens to the original maker of the software bankrupt. Profit shares would not go back to them. We need to learn how to stop if we already have enough. People need to work together in order for us to have a better information technology life.

16

What I have learned: ♦ ♦ ♦ ♦

Ethics in information technology Connecting ethics and social contexts Computer ethics and role of experts Demarcation of computer ethics

Integrative Questions: 1. 2. 3. 4. 5.

Define the role of experts What are the reasons to distinguish ethics? What does demarcation of computer ethics mean? What is the resemblance of ethics and social texts? What are the 3 conditions in order to apply ethical and moral concept in information technology?

17

Cyber Ethics Chapter 8

Chapter: Just Consequentialism and Computing Quote: “Justice is itself the great standing policy of civil society; and any eminent departure from it, under any circumstances, lies under the suspicion of being no policy at all.” - Edmund Burke What I expect to learn: I expect to learn how an individual can act as a man wit ethical thinking in the information technology world.

Definition of the quote;

The quote says that we cannot change ourselves to a better person if we would not follow rules regulations that we imply. We need to follow the policies we create in order for us to be a well organized person. Review: I learned that we should be able to nurture the experience we get for us to determine what concepts or ideas are within our natural state of mind. We should know the difference of how to do good things and how bad things work. One word RESPECT. The word respect is perfect for this chapter if we don’t show respect as an information technology personnel we would not know how to treat a person right with morality and ethics.

What I have learned: ♦ Consequentialism constrained by justice ♦ The good as the enemy of the just ♦ Computing in uncharted waters

18

Integrative Questions: 1. 2. 3. 4. 5.

Define consequentialism? What are the combined notions of human life? What is computing in uncharted waters? If the ends don’t justify the means what would? Define consequentialism constrained justice?

19

Cyber Ethics Chapter 9

Chapter: The Internet as Public Space: Concepts, Issues, and Implications in Public Policy Quote: “To be successful you have to be selfish, or else you never achieve. And once you get to your highest level, then you have to be unselfish. Stay reachable. Stay in touch. Don't isolate.” - Michael Jordan What I expect to learn: I expect to learn how the internet became a public place.

Definition of the quote: The quote states that in every action we do we have an intention of doing it for ourselves only. But once we have done it we should learn not to raise our heads high, we need to learn how to be humble. If you become rich, learn how to reach out to the poor people.

Review: Nobody ones the internet but everyone has his rights over it. The internet is made for the public, made for everyone in short. The internet not only removes communication gaps between people but it helps us to learn and understand certain things we need or want to gain knowledge about. We should always remember that we need to make the internet a better place for everyone, people who makes the viruses and spywares are selfish people who wants to destroy the happy community of the internet. Where ethics in their minds? They don’t have values.

What I have learned: ♦ ♦ ♦ ♦

The internet is a big world Implications in public policy Uses of internet as a public space Digital characteristics of a public space.

20

Integrative Question: 1. 2. 3. 4. 5.

What are the digital characteristics of a public space? What are the establishments that use internet as a public space? Discuss implications in the public policy Define the impact on social well being Is the internet a public space?

21

Cyber Ethics Chapter 10

Chapter: The Laws of Cyberspace Quote: “The sole end for which mankind are warranted, individually or collectively, in interfering with the liberty of action of any of their number, is self-protection. That the only purpose for which power can be rightfully exercised over any member of a civilised community, against his will, is to prevent harm to others. His own good, either physical or moral, is not sufficient warrant. He cannot rightfully be compelled to do or forbear because it will be better for him to do so, because it will make him happier, because, in the opinion of others, to do so would be wise, or even right... The only part of the conduct of anyone, for which he is amenable to society, is that which concerns others. In the part which merely concerns himself, his independence is, of right, absolute. Over himself, over his own body and mind, the individual is sovereign.” What I expect to learn: To more about cyberspace and the laws implemented in it, Definition of the quote: The quote states that everyone, who ever you are wherever you are you have freedom. You gain it with what actions you do. Review: People are starting to disobey rules. One good example is rules implemented in the cyberspace and in the information technology world. People tend not to follow these rules because they want to be something other people can not be. People these days are full of pride in which they grow their heads. I know rules are to be followed, I would be honest most of the times I don’t follow them, but after realizing that rules are made to make our world a better place. Not only for me but for everyone also. For us.

22

What I have learned: ♦ The laws on cyberspace ♦ Following the law Integrative Questions 1. 2. 3. 4. 5.

What are the laws of cyberspace? What does cyberspace law play an important factor? Define cyberspace Do we need to follow the cyberspace rules? How does one follow the rules?

23

Cyber Ethics Chapter 11

Chapter: Of Black Holes and Decentralized Law-Making in Cyberspace Quote: “Like almost everyone who uses e-mail, I receive a ton of spam every day. Much of it offers to help me get out of debt or get rich quick. It would be funny if it weren't so exciting.” - Bill Gates What I expect to learn: I expect to learn and understand the concept of black holes in the cyberspace

Definition of the quote: The quotes says that everyone is affected by spam and everyone is not safe from it.

Review: Why do people spam? People do this in order for them to gain profit. Actually for me it is already forcing. They forcing people to do this do that blah blah. They are dictating the lives of people. They shouldn’t be doing dat. They have no moral dignity. They just endanger people more. What they do is not true or in short fake. Do you think it is right? Hell no right. People need to stop doing this bad act. As an Information technology student I know things or methods to ignore this spam. To bad some people are confused and they get lured to the spam messages they waste money waste time because of the spam message. This act has to stop. What I have learned: ♦ ♦ ♦ ♦

The Debate The Question The Explanation The Incident

24

Integrative Questions: 1. 2. 3. 4. 5.

What is the incident? What is the explanation? What is the question? What is the debate? Define order and disorder in social systems

25

Cyber Ethics Chapter 12

Chapter: Fahrenheit 451.2: Is Cyberspace Burning? Quote:

“I used to think that cyberspace was fifty years away. What I thought was fifty years away, was only ten years away. And what I thought was ten years away... it was already here. I just wasn't aware of it yet.” - Bruce Sterling What I expect to learn: I expect to learn and adopt the speed of cyberspace

Definition of the quote: Cyberspace is growing everyday. Technology matures fast. You sleep tonight with your beloved technology, you wake up tomorrow with a new technology. Review: The Cyberspace is burning. Burning because of how fast it improves day in night out. We think the good technology is the only technology improving in the cyberspace, but we are wrong. Bad people have gained power and knowledge about this. The half of the cyberspace is in bad hands. People should learn how to be smart in operating the cyberspace. I would tell you its becoming nasty, yes nasty because of the scams being created on it.

What I have learned: ♦ ♦ ♦ ♦

Cyberspace growth Rethinking the rush to rate Free speech online Third party rating as the answer

26

Integrative Questions: 1. 2. 3. 4. 5.

Is the cyberspace really burning? Define third party rating What are the six reasons why self rating schemes in the internet is wrong? What is rush to rate? Define free speech online

27

Cyber Ethics Chapter 13

Chapter: Filtering the Internet in the USA: Free Speech Denied? Quote: “Raise a million filters and the rain will not be clean, until the longing for it be refined in deep confession. And still we hear, If only this nation had a soul, or, Let us change the way we trade, or, Let us be proud of our region.” - Leonardo Cohen What I expect to learn: What does freedom of speech have to do with filtering. Definition of the quote: A person would not change no matter what happens unless he really changes. Same with a nation, if the people living on that nation have a certain attitude it would be hard to change the attitude of that nation. It is already carved within them it is already what they call their trade mark.

Review: People nowadays are bothered by pop-ups, spam and other unwanted things in the internet like viruses and spy wares. We are invaded by bad people. People who have selfish desires in which they want to gain the upper hand in life. We need to filter this. Even if such things are filtered those bad people still find a way to crack the filter. We should have a law passed that this people should be sent to jail. Its impossible not to find this people with the technology we have tracking their IP address is one of the solution in order to catch these filthy people. What I learned: ♦ Problems with blocking and filtering programs ♦ Mainstream Loudoun ♦ Why filter

28

Integrative questions: 1. 2. 3. 4. 5.

Define filtering? How does filtering work? What are the problems encountered in filtering? What are the two libraries given in the chapter that uses filtering? What are the problems in blocking?

29

Cyber Ethics Chapter 14

Chapter: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique

Quote: “The peculiar evil of silencing the expression of an opinion is, that it is robbing the human race; posterity as well as the existing generation; those who dissent from the opinion, still more than those who hold it. If the opinion is right, they are deprived of the opportunity of exchanging error for truth: if wrong, they lose, what is almost as great a benefit, the clearer perception and livelier impression of truth, produced by its collision with error.” - John Stuart Mill

What I expect to learn: I expect to learn about censorship on the internet, and some laws. Definition of the quote: The quote explains that evil and bad things are happening right now, a good example is the scamming over the cyberspace we cannot win unless we go on an all out war against these people who always do bad things such as cyber crimes and illegal activities. We should have the truth. Review: A lot of bad people are taking advantage of the cyber world they are doing illegal activities in the cyber world. These people are people who take advantage of other people’s weaknesses. We want our cyber space to be clean and filtered. Do you think this I right? Child pornography? That’s already over the limit. They have no dignity and respect. What I have learned: ♦ Child pornography prevention act ♦ Argument 1, 2, and 3

30

Integrative questions: 1. 2. 3. 4. 5.

Define argument 1? Explain argument 2? What is argument 3? Explain censorship? Explain what is child pornography and why is it illegal?

31

Cyber Ethics Chapter 15

Chapter: PICS: Internet Access Controls Without Censorship Quote: “Although we must change the ways we protect our country, we must also guard against policies that appear attractive but offer little real protection and may even impede our ability to protect ourselves.” - Richard Burr

What I expect to learn: I expect to learn about Internet Access Controls Without Censorship.

Definition of the quote: The quote defines that changes alone cannot change something. There should be dedication and will to change.

Review: We need to protect the cyber world. We should free them from all the bad things moving around this place. We ourselves should know what is right and wrong. We should fight together as a team to fight and prevent this. These people destroying or creating chaos in our world should be stopped. The most affected would be the youth, am not saying we are safe. We can also be easy target for them no one is safe. It turned into an ugly world.

What I have learned: ♦ PICS ♦ Flexible blocking ♦ PICS specifications

32

Integrative Questions: 1. 2. 3. 4. 5.

What is PICS? What are the specifications of PICS? What is flexible blocking? Explain the supervisor? Explain the context?

33

Cyber Ethics Chapter 16

Chapter: Internet Service Providers and Defamation: New Standards of Liability Quotes: “Without accepting the fact that everything changes, we cannot find perfect composure. But unfortunately, although it is true, it is difficult for us to accept it. Because we cannot accept the truth of transience, we suffer.” - Shunryu Suzuki What I expect to learn: I expect to gain knowledge on ISP and defamation.

Definition of the quote: The quote says that we must be ready for change. I know a lot of people misunderstand change. Change has benefits. Change is needed not only when a bad thing or things happen. Change is also beneficiary to people who want to improve. Review: The chapter says that change is needed. Like what people say change is beneficial to all of us. We need to improve information technology from further abuse the hackers and other bad people do. We need to dominate it this time to determine what change we need to have. We better have this change now, rather than regretting this in the future. What I have learned: ♦ ♦ ♦ ♦ ♦

Legal Definitions and standards Internet service providers and legal defamation Legal precedents for ISP liability A moral perspective The need for libel law

34

Integrative questions: 1. 2. 3. 4. 5.

What is ISP? Define moral perspective Why does the cyberspace alter the need for libel laws? Define Decency act How does ISP work?

35

Cyber Ethics Chapter 17

Chapter: Digital Millennium Copyright Act Quote: "Only one thing is impossible for God: to find any sense in any copyright law on the planet . . . Whenever a copyright law is to be made or altered, then the idiots assemble." - Mark Twain

What I expect to learn: I want to gain sufficient knowledge about DMC act.

Definition of the quote: The quote states that people alter and alter changes made by them, in order to get new laws about copyright. They cannot be satisfied with what law they make.

Review: The chapter tells that the digital millennium copyright act would be a better way to handle copyright laws. This law would be a good idea for all the people who create and use stuff’s owned by other people. People would learn how to respect others creatin and appreciate it. Getting other people’s work without giving credit to the creator is not only stealing but it is also disrespecting the person’s creation or masterpiece.

What I have learned: ♦ ♦ ♦ ♦

Violations regarding circumvention of technological measures Sec. 1202 Integrity of Copyright management information Elements of notification Limitations on liability relating to material online

36

Integrative Questions: 1. 2. 3. 4. 5.

Give the elements of notification: What is topic sec 1202? Explain Limitations on liability relating to material online What is an information location tool? What is condition for eligibility?

37

Cyber Ethics Chapter 18

Chapter: Note on the DeCSS Trial

Quote: “The Internet is both great and terrible. As a source of information, a tool for delivering music and art, it's great. But spamming ads and piracy of music is terrible. It's stealing.” - Gary Wright

What I expect to learn: I expect to learn about DECSS Trial. Definition of the Quote: The quotes says that technology nowadays are being abused by greedy people. It is wrongfully used by these people.

Review: Piracy kills. Have you ever seen the commercial adds against piracy? Or have you seen Edu Manzano destroying pirated CD’s and DVD’s? Well I have. The world is full of pirates not only the Somali pirates(sea pirates) we also have the pirates who destroys industries. Piracy is a very very good example of how the information technology we have is being abused by people who wants to gain more money. Yes money money money. That’s what pirates talk about. More profits for them. Sad to say that many industries are dying because of this.

What I Have learned: ♦ ♦ ♦ ♦

Technical background The lawsuit The outcome Piracy

38

Integrative Questions: 1. 2. 3. 4. 5.

What is piracy? What does piracy do? What is DeCSS? Explain the outcome. Explain the lawsuit.

39

Cyber Ethics Chapter 19

Chapter: A Politics of Intellectual Property: Environmentalism for the Net?

Quote; “We could have saved the Earth but we were too damned cheap.” . - Kurt Vonnegut, Jr. What I expect to learn: I expect to learn about Environmentalism for the net.

Definition of the quote: The quote says that we could have been helpful if we were not too arrogant and cheap. I can relate the quote to information technology because it matches. We could have saved earth if we were not cheap, in Information technology we could have saved the industry if we did not buy cheap CD’s. which we all know are pirated.

Review: The chapter is almost the same as the previous chapter about piracy, but it added some extra features, in which you only can get in a original DVD. Just kidding. Well it actually has added information in which we need to put values in. The environment refers to the information technology, in which we abuse just like mother earth right?

What I have learned:

♦ ♦ ♦ ♦ ♦ ♦

Code is Code: The logic of the information relation Intellectual property is the legal form of the information age The conceptual structure of an intellectual land-grab Tensions in an intellectual property system Copyright on the Net The analogy to environmentalism

40

Integrative Questions: 1. 2. 3. 4. 5.

What is code of code? Explain Copyright in the net? What is the analogy to environmentalism? What is Tensions in an intellectual property system? Explain Intellectual property is the legal form of the information age?

41

Cyber Ethics Chapter 20

Chapter: Intellectual Property, Information, and the Common Good

Quote: “What a distressing contrast there is between the radiant intelligence of the child and the feeble mentality of the average adult.” - Sigmund Freud What I expect to learn: I expect to gain knowledge in common good, yes I said it common good.

Definition of the quote: The quote explains that minds can be similar. Even with the age gap. Men can think like kids, kids can think like men.

Review: This chapter has connections with the previous chapter and its issues. People steal nowadays, especially work of other people. There is what we call intellectual property. This property is being stolen nowadays.

What I have learned:

♦ Conflicts over intellectual property: Five Cases ♦ Philosophical justification for intellectual property ♦ A more balanced view of the common good

42

Integrative Questions: 1. 2. 3. 4. 5.

Define Intellectual Property Give the five cases of intellectual properties Explain what is ProCD What happened with the NBA case against STATinc? What is natural law?

43

Cyber Ethics Chapter 21

Chapter: Is Copyright Ethical? An Examination of the Theories, Laws, and Practices Regarding the Private Ownership of Intellectual Work in the United States.

Quote:

“It is with flowers, as with moral qualities: the bright-coloured are sometimes poisonous; but, I believe, never the sweet-smelling.” - Augustus William Hare and Julius Charles Hare

What I expect to learn: I expect to learn if copyright is ethical. Definition of the quote: The quotes say that the people we expect to have morals are the persons who really are hiding their true color.

Review: The chapter talks about how copyright becomes ethical. It does not become ethical if you are stealing it. You should be able to give respect to the person you are getting information at. It is actually disrespecting if you just get them. You have to cite, give credit and thanks to them. You don’t really need to spend money, just say thank you. And its free, no more headaches of plagiarism right?

What I have learned: ♦ Property rights ♦ Theories of intellectual property and copyright ♦ Copyright

44

Ethical Questions: 1. 2. 3. 4. 5.

What is copyright? How does one violate copyright policies? What are the theories of intellectual property and copyright? What are the rights of copyright? Is copyright ethical?

45

Cyber Ethics Chapter 22

Chapter: On the Web, Plagiarism Matters More Than Copyright Piracy

Quote: Mr. Fitzgerald, I believe that is how he spells his name, seems to believe that plagiarism begins at home. - Zelda Fitzgerald What I expect to learn: I expect to learn about plagiarism matters

Definition of the quote: The quote is very true and right. Plagiarism starts from our home, actually within us. It spreads faster than the light.

Review: This chapters tells me that plagiarism is stealing, disrespecting and killing the creator of the object. Most of the people lack knowledge about giving citation people should respect other people’s work. To those who know how to cite the source we should teach other people about it. We need to stop plagiarism.

What I have learned:

♦ ♦ ♦ ♦

Plagiarism What’s the harm in plagiarism What’s the use of copyright Bring it all together

46

Integrative Questions: 1. 2. 3. 4. 5.

What is plagiarism? Where does plagiarism move around? What’s the use of copyright? What is the outcome of we would be using plagiarized work? Would you plagiarize?

47

Cyber Ethics Chapter 23

Chapter: An Ethical Evaluation of Web Site Linking

Quote: “I would like us to think about it more explicitly, and not take our intuitions as the given of ethics, but rather to reflect on it, and be more open about the fact that something is an ethical issues and thin what we ought to do about it.” - Peter Singer What I expect to learn: I expect to learn about Ethical Evaluation of Web Site Linking.

Definition of the quote: The quote says that everything has ethics in it. We should no ignore ethics we should apply it in every aspect we do.

Review: The chapter explains Website linking and ethical evaluation of it. Deep linking could be harmful as said in the book. They say that this could lead to advertising revenues of some people. And do you know who those people are? Drum rolls please….. the spammers, the virus builders, hackers and the pirates! Hahaha. Those are the people who would target such things. We need to be aware of the scenario.

What I have learned: ♦ ♦ ♦ ♦ ♦

The technical aspects of website linking Two case studies Deep linking Websites as intellectual property Respecting the common good

48

Integrative Questions: 1. 2. 3. 4. 5.

What is deep linking? What are the two case studies given? What is respecting the common good? What is website as intellectual property? What is website linking?

49

Cyber Ethics Chapter 24

Chapter: The Cathedral and the Bazaar

Quote: “The Roots of Violence: Wealth without work, Pleasure without conscience, Knowledge without character, Commerce without morality, Science without humanity, Worship without sacrifice, Politics without principles.” - Mohandas Gandhi What I expect to learn: I expect to learn what the cathedral and the bazaar is Definition of the quote: The quote says that we don’t get satisfied with what we have, it’s not about a simple thing being enough. It is about how the simple thing would be enough.

Review: The chapter tells us the story of the cathedral and bazaar. What I mean is the rise of Linux as an open source. We should know very well that most of the things we need nowadays are being paid and its no longer free. That’s why they created the open source. It helps developers develop and create at the same time helps people who could not afford programs.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦

The cathedral and the bazaar The mail must get through Importance of having users When is a rose not a rose Popclient becomes fetch mail Social context of an open source software

50

Integrative Questions: 1. 2. 3. 4. 5.

What is the cathedral and the bazaar? What is an open source software? When is a rose not a rose? How did the popclient become a fetch mail? Explain the social context of an open source software

51

Cyber Ethics Chapter 25

Chapter: Towards A Theory of Piracy for the Information Age

Quote: “In the information age, you don't teach philosophy as they did after feudalism. You perform it. Aristotle were alive today he'd have a talk show.” - Timothy Leary What I expect to learn: I expect to learn about the theory of piracy in the information age.

Definition of the quote: The quote is actually funny but so true. The quote explains that information age is growing rapidly. If Aristotle was here would have done a talk show like Oprah and The tonight show. Because of the power of information age.

Review: The chapter says that information age is really being abused by people. Information age is supposed to help us. Guide us and make our lives easier. But here comes the…. Drum rolls please again.. pirates! Argh shiver me timber. Hahaha, well actually they are the stars of the show. For me if you download a song its ok, but if you sell it or gain profit from it, that’s piracy already. Learn the difference of sharing and gaining profit.

What I have learned: ♦ ♦ ♦ ♦

Greased Data Grounding Piracy The nature of piracy Setting and adjusting policies for private situations

52

Integrative questions: 1. 2. 3. 4. 5.

What is publicity principle. Define greased data? What is a grounding piracy? What is the nature of piracy? Define setting and adjusting policies for private situations

53

Cyber Ethics Chapter 26

Chapter: The Structure of Rights in Directive 95/46/EC on the Protection of Individuals with Regard to the Processing of Personal Data and the free Movement of Such Data Quote: “ A person is born with desires of the eyes and ears, and a liking for beautiful sights and sounds. If he gives way to them, they will lead him to immorality and lack of restriction, and any ritual principles and propriety will be abandoned.” - Xun Zi What I expect to learn: I expect to learn the structure of rights in a directive.

Definition of the quote: The quote says that every person is being brainwashed by greediness. We should open our eyes to reality

Review: The chapter is about restrictions. In the information technology world and in the real world everything has its restriction. The world wide web is a very very very big place, did I mention it is really big? I know you get a lot of info and resources from it but there are restrictions to it. It has limits also. What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

The directive on the question of further processing of personal data Data quality Legitimate purposes Sensitive data The right to be informed Data subject’s right to access and to object The reprocessing of personal data Using personal data for a different purpose Data protection and the philosophy of privacy

54

Integrative Questions: 1. 2. 3. 4. 5.

What is data Quality? Define sensitive data? What is the right to be informed? Give the two examples of data protection? What is reprocessing of personal data?

55

Cyber Ethics Chapter 27

Chapter: Privacy Protection, Control of Information, and Privacy-Enhancing Technologies

Quote: “A book is the only place in which you can examine a fragile thought without breaking it, or explore an explosive idea without fear it will go off in your face. It is one of the few havens remaining where a man's mind can get both provocation and privacy.” - Edward P. Morgan

What I expect to learn: I expect to learn Privacy Protection, Control of Information, and PrivacyEnhancing Technologies. Definition of the quote: The quote says that a man who enters a certain risk or gamble in his life has no more privacy. In which a part of his life is gone. Review: The chapter explains that privacy is very very important in information technology. People are being deprived of privacy because of the hackers in the world wide web. These hackers not only hack you but they get your identity also, this is called identity theft. When this occurs where does your privacy go?

What I have learned: The theory of privacy Normative privacy and the restricted access theory The use control in the justification and management of privacy Privacy-enhancing technologies PETs and the role of individual choice in controlling personal information ♦ PETs and the principle of informed consent

♦ ♦ ♦ ♦ ♦

56

♦ PET owners beware Integrative Questions: 1. 2. 3. 4.

What is PETs? What is the theory of privacy? Why should PET owners beware? Define Privacy enhancing technologies in an individual choice in controlling personal information? 5. What is normative privacy?

57

Cyber Ethics Chapter 28

Chapter: Toward an Approach to Privacy in Public: Challenges of Information Technology.

Quote: "Obstacles are like wild animals. They are cowards but they will bluff you if they can. If they see you are afraid of them... they are liable to spring upon you; but if you look them squarely in the eye, they will slink out of sight." - Orison Swett Marden What I expect to learn: I expect to learn the approach to privacy in public.

Definition of the quote: The quote is true. You have to face you challenges without fear. For every challenge you go thru, easy way or hard way you get a valuable experience which you can cherish for the rest of your life.

Review: The chapter basically talks about challenges information technology is facing in the real world. Information technology is facing a lot of challenges and it is not easily backing down. The main challengers are the pirates, hackers and spammers. The challenge is protecting the privacy of each individual from these people.

What I have learned: ♦ Privacy and personal realm background. ♦ Violating privacy in public – the case of Lotus Marketplace: Households ♦ Two misleading Assumptions

58

Integrative questions: 1. 2. 3. 4. 5.

What is privacy? Define personal realm background? What are the to misleading assumptions? How do you violate privacy? Explain the privacy violation in the case of lotus marketplace?

59

Cyber Ethics Chapter 29

Chapter: KDD, Privacy, Individuality, and Fairness

Quote: “The hero is one who kindles a great light in the world, who sets up blazing torches in the dark streets of life for men to see by. The saint is the man who walks through the dark paths of the world, himself a light.” -

Felix Adler

What I expect to learn: I expect to learn KDD Definition of the quote: The quotes explains that we as an individual can change something. We don’t need publicity in everything good we do. We need to be simple and helpful.

Review: We all know that we are not supposed to be selfish. But in some cases we need to in order for us to protect our privacy. We need this protection badly. If this selfish method works for the information technology world why not share it right? Like they say be selfish now, and share in the appropriate time. You become selfish for the sake of others; you share what you learned for the sake of others. We need to fight the cyber crimes together and stop it and prevent it from creating more chaos.

What I have learned: ♦ ♦ ♦ ♦ ♦

What KDD is Personal data Social consequences Categorial privacy Solutions

60

Integrative Question: 1. 2. 3. 4. 5.

What is KDD? Define personal data? What is a social consequence? Explain Categorial privacy? What is solution in the chapter?

61

Cyber Ethics Chapter 30

Chapter: Data Mining and Privacy Quote: “I love those who can smile in trouble, who can gather strength from distress, and grow brave by reflection. Tis the business of little minds to shrink, but they whose heart is firm, and whose conscience approves their conduct, will pursue their principles unto death.” - Leonardo da Vinci What I expect to learn: I expect to learn things about data mining and privacy.

Definition of the quote: The quote says that we need to gain strength and knowledge. But we still need to have ethic and a proper conduct.

Review: The chapter talks about data mining. So what is data mining for me? It is when you get date which you would need. This data are useful to you. Its almost the same with data gathering. The difference is in data mining you will use all your data. It is basically thinking and loading up your mind with information’s.

What I have learned: ♦ Knowledge Discovery and Data Mining ♦ The issue ♦ Analysis

62

Inetgrative Questions: 1. 2. 3. 4. 5.

What is knowledge discovery? What is data mining? What is the issue? Define analysis? What is a dossier society?

63

Cyber Ethics Chapter 31

Chapter: Workplace Surveillance, Privacy, and Distributive Justice Quote: “It seems to limit you; when you're working in an office, you're a creature in a small cell under somebody's supervision and surveillance.” - Jack Vance

What I expect to learn: I expect to learn what work place surveillance is

Definition of the quote: The quotes is true, people are watching you at work, because they want to make sure everything is still private.

Review: The chapter says that companies have rights in watching their employee’s. They do this in order for them to make sure that their information’s would not go to the wrong hands of the cyber criminals. They are doing it to keep the information safe. Quite frankly it’s ok to me. Because what if a information goes out and it gets leaked the company is doomed.

What I have learned: ♦ ♦ ♦ ♦

Resisting workplace surveillance Privacy as a matter of justice Privacy, surveillance, and distributive justice Conclusion

64

Integrative Questions: 1. 2. 3. 4. 5.

Define privacy in a workplace? What is distributive justice? Why people resist workplace surveillance? Do you agree workplace surveillance is good? Is privacy a matter of justice?

65

Cyber Ethics Chapter 32

Chapter: Privacy and Varieties of Informational Wrongdoing Quote: “You can practice shooting eight hours a day, but if your technique is wrong, then all you become is very good at shooting the wrong way. Get the fundamentals down and the level of everything you do will rise.” - Micheal Jordan What I expect to learn: I expect to learn varieties of informational wrongdoing. Definition of the quote: The quote can relate to the information technology world. How? Its simple you practice false programming, or you practice hacking and spamming people. Think about it if you doing it to help other people. How many would benefit? A lot

Review: The chapter is about wrongdoings. People in the cyber world are affected by the wrong doings of other people. We should learn the right fundamentals and use it in a right manner; we should be smart enough to help other people than doing a wrong deed.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦

Panoptic technologies and the public good Information-based harm informational inequality Informational injustice Spheres of access Encroachment on moral autonomy.

66

Integrative Questions: 1. 2. 3. 4. 5.

Define moral autonomy? Define spheres of access? Define informational based harm? What is informational Injustice? What is informational inequality.

67

Cyber Ethics Chapter 33

Chapter: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace

Quote: “What is the difference between unethical and ethical advertising? Unethical advertising uses falsehoods to deceive the public; ethical advertising uses truth to deceive the public.” -

Vilhjalmur Stefansson -

What I expect to learn: I expect to learn Sabotage in cyber space.

Definition of the quote: The quotes says that if your way is ethical be sure what you are doing is also ethical and it should have the right values.

Review: The chapter tells me when to stop. The chapter taught me to stop and no longer go further. We should learn to appreciate what we already have. We should not be greedy and get more things we want. Everything has a boundary.

What I learned: ♦ ♦ ♦ ♦ ♦

Boundaries of Computer Crime Crime in cyberspace Abuse in cyberspace Terrorism in cyberspace Anonymity and encryption

68

Integrative Question: 1. 2. 3. 4. 5.

What is crime in cyberspace? What is Abuse in cyberspace? What is Terrorism in cyberspace? Define anonymity and encryption? Explain the boundaries of computer crimes?

69

Cyber Ethics Chapter 34

Chapter: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic

Quote: “We all have dreams. But in order to make dreams come into reality, it takes an awful lot of determination, dedication, self-discipline, and effort.” - Jesse Owens What I expect to learn: I expect to learn civil disobedience in the cyberspace.

Definition of the quote: The quote tells me that in order for me to achieve something’s I should have self discipline. To be the man you need to have self discipline and effort.

Review: Hacktivist wow, this people are really going nuts. They use the cyberspace for their self interest. There are people who are really abusing the information technology power. They do this for their self interest. Where is ethics in that?

What I have learned: ♦ ♦ ♦ ♦

Electronic civil disobedience Hacktivism Cyber terrorism Toward a Hacktivist ethic

70

Intergrative Questions: 1. 2. 3. 4. 5.

Define hacktivism? What is cyber terrorism? What is the ethics of an hacktivist? What is civil disobedience? Describe mistrust authority?

71

Cyber Ethics Chapter 35

Chapter: Web Security and Privacy: An American Perspective

Quote: “The right of an individual to conduct intimate relationships in the intimacy of his or her own home seems to me to be the heart of the Constitution's protection of privacy.” - Harry A. Blackmun

What I expect to learn: I expect to gain knowledge on web security on an American perspective.

Definition of the quote: The quotes states that each individual has his right to have his privacy where ever, whenever he wants.

Review: This chapter tells me how American defines privacy. They define it in a simple term as long as you don’t’ cross the line it is ok. Now a day’s people are abusing other peoples life. They are messing them even in cyberspace. Some of the new Web 2.0 sites have privacy settings for example my space, no one can see my profile unless they are listed as my friend.

What I have learned: ♦ Browsing information ♦ Legal Issues and Societal Implications ♦ What are you doing on the web

72

Integrative Questions: 1. 2. 3. 4. 5.

What is DNS? What is an IP? What are you doing on the web? What are the legal key issues? What is browsing information?

73

Cyber Ethics Chapter 36

Chapter: The Meaning of Anonymity in an Information Age

Quote: “But anonymity is very important to me, and I don't want to be recognized in public more than I already am. - Todd Solondz” What I expect to learn: I expect o learn the Meaning of Anonymity in an Information Age

Definition of the quote: The quote is what people need now, being a humble person.

Review: Anonymity of this information age, ahem ahem. People want their identity to be kept. That’s why cybername comes out. People now wants to hide who they are in cyberspace. They have new identities in this world.

What I have learned:

♦ ♦ ♦ ♦ ♦ ♦

Methods Gate keepers Results Encryption Anonymity Data flow

74

Integrative Questions: 1. 2. 3. 4. 5.

What is data flow? Describe anonymity? What is encryption? Define the results? What is a Gate Keepers?

75

Cyber Ethics Chapter 37

Chapter: Written on the Body: Biometrics and Identity

Quote: “Our achievements of today are but the sum total of our thoughts of yesterday. You are today where the thoughts of yesterday have brought you and you will be tomorrow where the thoughts of today take you. -

Blaise Pascal”

What I expect to learn: I expect to learn biometrics and identity.

Definition of the quote: The quotes says that you need to value your identity. Legacy lives on forever if your identity is well respected.

Review: Information technology has many ways of identifying with the use of biometrics. Our online identities can be an example of this.

What I have learned:

♦ ♦ ♦ ♦

Use of biometrics Identifying biometric identity Virtual identities Questioning the biometric body

76

Integrative Questions

1. 2. 3. 4. 5.

What is a biometric? How does biometric identify our identity? What is virtual identities? What is biometric body? What is a biometric?

77

Cyber Ethics Chapter 38

Chapter: Ethical Considerations for the Information Professions

Quote: “There may be people that have more talent than you, but there’s no excuse for anyone to work harder than you do”

- Derek Jeter

What I expect to learn: I expect to learn ethical considerations

Definition of the quote: The quote says that whoever you are, you can achieve, you may not become the best but you’re hard work pay’s off

Review: Information technology changes the world. It changed me, once I was illiterate about computers, I was jealous of my classmates when I was grade 3 who have their own computers at home, till when I got a computer when I was grade 5. it changed me. I became an enthusiast of it. My knowledge grew, and it has grown bigger each day. Look at me now, basketball and computers is my thing. I go online and always find basketball stuffs on the internet hahaha.

Things that I have learned: ♦ Code of ethics ♦ Philosophical foundations ♦ Major issues

78

Integrative Questions: 1. 2. 3. 4. 5.

What are the two phase of computer ethics? Explain the survival of the colonial era? Explain the first phase of computer ethics? Explain the second phase of computer ethics? Define philosophical foundations?

79

Cyber Ethics Chapter 39

Chapter: Software Engineering Code of Ethics: Approved!

Quote: "A winner is someone who recognizes his God-given talents, works his tail off to develop them into skills, and uses these skills to accomplish his goals." - Larry Bird

What I expect to learn: I expect to learn about the code of ethics of a software engineer

Definition of the quote: Bird’s Quote is simply true.

Review: The code of ethic of a software engineer. I salute it. This would help a software engineer into having values and respect for what he does. His morality would be defined by his work.

What I learned: ♦ ♦ ♦ ♦ ♦

IEEE-CS ACM Short version of the software engineering ethics. Applied principles Practices

80

Integrative Questions: 1. 2. 3. 4. 5.

What is IEEE-CS? What is ACM? Explain the short version of ethics? What is applied principle? Define the preactices?

81

Cyber Ethics Chapter 40

Chapter: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All Quote: “Here once again education is crucial, it enables children to be become more aware of their rights and to exercise them in a respectful manner which helps them shape their own future.” - Carol Bellamy What I expect to learn: Why incomplete code of ethics is worse than non at all: Definition of the quote: The quote is perfect for this chapter, if you have no education your career might not be complete, you get education but you don’t complete it its bad. Review: It is really better to have no code of ethics than having an incomplete one. You would just get confused with what is happening and how the rules or codes of ethic work if it is incomplete.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

Weapons Environmental impacts PAPA Teleworking Telecommunicating Protecting the weak against the strong Importance of the PAPA issues pressures to look for loopholes Incomplete moral codes Complete moral codes Avoiding accidental incomplete moral codes

82

Integrative questions: 1. 2. 3. 4. 5.

What is PAPA? Define teleworking? Explain Telecommunicating? Explain incomplete moral codes? Define a complete moral code?

83

Cyber Ethics Chapter 41

Chapter: Subsumption Ethics

Quote: “The psychology of the mature human being is an unfolding, emergent, oscillating, spiraling process marked by progressive subordination of older, lower-order behavior systems to newer, higher-order systems as man's existential problems change.” - Clare W. Graves

What I expect to learn: I am expecting to gain deeper knowledge on Subsumption ethics.

Definition of the quote: Change always happen. A person’s mood changes, we wouldn’t know if which side sis he right now.

Review: This chapter talks about subsumption. Well for me subsumpsion occur everywhere, as in literally everywhere. As a developer I should know how to develop properly. I should follow the basic steps in developing in order for my creation to be a masterpiece.

What I have learned:

♦ ♦ ♦ ♦ ♦

Subsumption ethics Systems Development Ethical Framework The golden mean The golden rule

84

Integrative Question:

1. 2. 3. 4. 5.

What is subsumption Ethics? Define system development? What is an ethical framework? Define the golden mean? Explain the golden rule?

85

Cyber Ethics Chapter 42

Chapter: Ethical Issues in Business Computing

Quote: “In a knowledge economy, a good business is a community with a purpose, not a piece of property.”

- Charles Handy

What I expect to learn: Ethics in business

Definition of the quote: The quote says that a business must have goals and purpose rather than just having properties.

Review: The chapter talks about how business computing are needed nowadays in the business world. The industry helps other industries. The companies are having a easier time with business computing rather than going old school. These new methods are really giving us a better time, headache free computing.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

Business computing Size issues Level one Level Two Level Three Level four The tasks of business computing Data considerations

86

Integrative Questions: 1. 2. 3. 4. 5.

what is business computing? explain level one? explain level two? explain level three? explain level four?

87

Cyber Ethics Chapter 43

Chapter: The Practitioner from Within: Revisiting The Virtues

Quote: “Morals are too essential to the happiness of man to be risked on the uncertain combinations of the head. She [nature] laid their foundation therefore in sentiment, not science.”

- Thomas Jefferson

What I expect to learn: I want to revisit the virtues

Definition of the quote: The quote says that without morals a man would not be complete, a man would not be happy.

Review: The chapter talks about how to being a person that has virtues, a person who has ethics and a person who believes in the right morals. In order for the industry to be better, we need to reconsider studying ourselves first. We need to make ourselves better. We need to improve our values. We retrace our step on how we are suppose to be.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦

Ethics Morality Values Character forming vs. Action guiding theories Need for contemporary moral theory Core values Imagination and narrative genre

88

Integrative Questions: 1. 2. 3. 4. 5.

What is ethics? what is morality? Give an example of a core value? Explain need for contemporary moral theory? Explain imagination and narrative genre?

89

The Handbook of Information and Computer Ethics Chapter 1

Chapter: Foundations of Information Ethics

Quote: A belief in God helps provide a foundation to arbitrate our decisions. Without this foundation, we are condemned to live essentially formless lives.

- Armstrong Williams

What I expect to learn: I expect to gain knowledge in the foundation of information ethics

Review: The chapter tells about how to start from the scratch, you must have these basic elements in order to start. Just like in basketball you should know the basics. Every thing starts from the scratch.

What I learned:

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

IE as an ethics of informational resources(1st stage) IE as an ethics of information products(2nd stage) IE as an ethics of the informational environment(3rd stage) Information Ethics as a macroethics Two recurrent objections Moral agents The responsibilities of human agents Internal Resource Product Target Model Four moral principles

90

Integrative Questions:

1. 2. 3. 4. 5.

Explain stage 1? explain stage 2? explain stage 3? define moral agents? what are the four moral principles

91

The Handbook of Information and Computer Ethics Chapter 2

Chapter: Milestones in the History of Information and Computer Ethics

Quote: Our deep respect for the land and its harvest is the legacy of generations of farmers who put food on our tables, preserved our landscape, and inspired us with a powerful work ethic. - James H. Douglas What I expect to learn: I expect to learn the History of Information and Computer Ethics. Review: The chapter is about the history of the computers. Started from something small, it grew large to something everybody wants and needs. A new technology is being developed day by day. Values are being overshadowed by greedy people nowadays who only think of profits.

What I have learned: ♦ NORBERT WIENER’S FOUNDATION OF INFORMATION ETHICS ♦ Wiener's Account of a Good Life ♦ Wiener’s Information Ethics Methodology ♦ COMPUTER ETHICS DEVELOPMENTS AFTER WIENER AND BEFORE MANER ♦ WALTER MANER.S COMPUTER ETHICS INITIATIVE ♦ DEBORAH JOHNSON’S INFLUENTIAL TEXTBOOK ♦ AND THE START OF THE ‘‘UNIQUENESS DEBATE ♦ THE PROFESSIONAL-ETHICS APPROACH OF DONALD GOTTERBARN ♦ COMPUTING AND HUMAN VALUES ♦ LUCIANO FLORIDI’S INFORMATION ETHICS THEORY

92

Integrative Question: 1. 2. 3. 4. 5.

Explain Wiener's Account of a Good Life explain lucianos theory Define Computing and human values What is Wlater’s initiative? Explain the approach of Donald

93

The Handbook of Information and Computer Ethics Chapter 3

Chapter: Moral Methodology and Information Technology Quote:

Different things delight different people. But it is my delight to keep the ruling faculty sound without turning away either from any man or from any of the things which happen to men, but looking at and receiving all with welcome eyes and using everything according to its value. Marcus Aurelius What I expect to learn: Morality in information technology.

Review:

The chapter talks about how information technology ethics becomes a practical ethic. It explains that values in information technology are of the same values with other fields. It tells that not only good things are created from computers but also bad things.

What I have learned:

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

APPLIED ETHICS Generalism Particularism Reflective Equilibrium THE DESIGN TURN IN APPLIED ETHICS VALUE SENSITIVE DESIGN PACS Real-Time Emergency Medicine. OTHER CONCEPTIONS OF METHOD IN COMPUTER ETHICS

94

Integrative Questions: 1. 2. 3. 4.

What is generalism? What is the definition of Cyber Ethics? What is the study of moral questions? Does this help solve the problem between determining whether the function of a computer is for the good or not? 5. What is PACS?

95

The Handbook of Information and Computer Ethics Chapter 4

Chapter: Value Sensitive Design and Information Systems

Quote:

We begin by sketching the key features ofValue Sensitive Design and then describe its integrative tripartite methodology, which involves conceptual, empirical, and technical investigations, employed iteratively. Then we explicate Value Sensitive Design by drawing on three case studies. One involves cookies and informed consent in web browsers; the second involves HDTV display technology in an office environment; and the third involves user interactions and interface for an integrated land use, transportation, and environmental simulation. We conclude with direct and practical suggestions for how to engage in Value Sensitive Design.

What I expect to learn: Value Sensitive Design.

Review:

The chapter talks about ways how you can use information technology with the approach of values. This chapter shows that we can do our work in a value added work. In every action we do we must remember our ethics.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

WHAT IS VALUE SENSITIVE DESIGN? What is a Value? Related Approaches to Values and System Design THE TRIPARTITE METHODOLOGY: CONCEPTUAL, EMPIRICAL, AND TECHNICAL INVESTIGATIONS Conceptual Investigations Technical Investigations Conceptualizing the Value Using a Conceptual Investigation to Analyze Existing Technical Mechanisms

96

Integrative questions: 1. 2. 3. 4. 5.

What is value sensitive design? What is conceptual investigations? What is Technical investigations? what is conceptualizing the value? Explain related approach to value and system design.

97

The Handbook of Information and Computer Ethics Chapter 5

Chapter: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property

Quote: It is important to note that compensation is typically built into the proviso and the overall account of bettering and worsening. An individual’s appropriation may actually benefit others and the benefit may serve to cancel the worsening that occurs from restricted use. Moreover, compensation can occur at both the level of the act and at the level of the institution.

What I expect to learn: I expect to gain knowledge about Intellectual property

Review:

This chapter discussed the intellectual properties of individuals. These properties are copy righted by the owners. The creators have the rights for their work as long as they have it under a license like creative common. In short if they declared it first.

What I have learned:

♦ WHAT IS INTELLECTUAL PROPERTY? ♦ PERSONALITY-BASED JUSTIFICATIONS OF INTELLECTUAL PROPERTY ♦ Problems for Personality-Based Justifications of Intellectual Property ♦ The Personality Theorist's Rejoinder ♦ THE RULE-UTILITARIAN INCENTIVES BASED ARGUMENT FOR INTELLECTUAL PROPERTY ♦ Problems for the Rule-Utilitarian Incentives Based Argument ♦ Alternatives to Patents

98

Integrative Questions: 1. 2. 3. 4. 5.

What is intellectual property? explain problems for personality? What is alternatives patents? what are the problems for a rule-utilitarian arguemen? What is personality theorist rejoinder?

99

The Handbook of Information and Computer Ethics Chapter 6

Chapter: Informational Privacy: Concepts, Theories, and Controversies

Quote: Thus far, we have examined some ways that RALC improves upon the control and restricted access theories of informational privacy by incorporating key elements of both theories. We have also seen how RALC can respond to two kinds of potential objections from critics.However,muchmore needs to be said aboutRALCand the role it plays in protecting privacy.We revisit the RALC theory in Section 6.5.3, where we examine some proposals for framing comprehensive policies that protect informational privacy.

What I expect to learn: Concept and theories.

Review: This chapter talks about privacy. A person is eligible to have privacy whenever he wants to have it. It could be with his work or his life. When a person is not in public he is in private mode. Actually privacy may also tackle information about that person.

What I have learned: ♦ THE CONCEPT OF PRIVACY ♦ Unitary, Derivative, and Cluster Definitions of Privacy ♦ Interest-Based Conceptions Versus Rights-Based Conceptions of Privacy ♦ FOUR DISTINCT KINDS OF PRIVACY: PHYSICAL/ACCESSIBILITY, DECISIONAL, PSYCHOLOGICAL/MENTAL, AND INFORMATIONAL PRIVACY ♦ Privacy as Nonintrusion Involving One’s Physical Space: Physical/Accessibility Privacy ♦ Privacy as Nonintrusion/Noninterference Involving One’s Thoughts and One’s Personal Identity: Psychological/Mental Privacy

100

Integrative Questions: 1. 2. 3. 4. 5.

Define the concept of privacy: what is the cluster definition of pricacy? what are the four distinct kind of privacy? what is the restricted theory? What is the control theory?

101

The Handbook of Information and Computer Ethics Chapter 7

Chapter: Online Anonymity

Quote: Whatever be the purpose(s) of a given instance of anonymity, it raises the issue of accountability, whatever other issues, such as attribution bias, noted above, may be involved or at stake. We might label the issue of accountability the Ring of Gyges scenario. In Plato.s parable,48 Gyges finds a ring that makes him invisible whenever he wears it. (I.m not suggesting that we rely on magical means of anonymizing; rather I am suggesting that Plato.s parable makes vivid the risk in anonymity.) Plato.s point is that the successfully unjust (immoral or unethical) person seeks and relies on strategies that enable her to avoid accountability for her actions. The Ring of Gyges scenario is when someone.s ability to be invisible—anonymous—allows unethical or criminal action with impunity. What I expect to learn: To know what is online anonymity

Review: The chapter talks about the anonymity of a person, in which his real identity is hidden. The technology nowadays could really help a lot of people. But cybercrime is also up and we need to be careful with the anonymous person we see online.

What I learned: ♦ ANONYMITY AS A FEATURE OF COMPLEX SOCIAL STRUCTURES ♦ Data Mining, Tracking, and User’s Presumption of Anonymity ♦ THE CONCEPT OF ANONYMITY ♦ ANONYMITY AND ETHICAL ISSUES IN INFORMATION TECHNOLOGY ♦ Anonymity and Attribution Bias ♦ Anonymity and Expression of Self ♦ Anonymity and Identity Theft ♦ PURPOSES AND ETHICS OF ANONYMITY

102

Integrative Questions: 1. 2. 3. 4. 5.

What is anonymity? Explain the concept of anonymity? Explain identity theft? What are the purpose and ethics of anonymity? What is attribution bias?

103

The Handbook of Information and Computer Ethics Chapter 8

Chapter: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterkacking

Quote: One of the key issues in evaluating whether an act of hacktivism is morally justified is the extent to which the act harms the interests of innocent third parties. In thinking about this issue, it is important to reiterate that the context being assumed here is a morally legitimate democratic systemthat protects the right of free expression and thus affords persons a variety of avenues for expressing their views that do not impact the interests of innocent third parties.

What I expect to learn: Ethical issues involving computer security. Review: Well the pirates, spammer, bad hackers are the unethical persons in this chapters. They are people who are abusing information technology. The world wide web would be better if these type of people would not exist. These people should be taught of proper ethics.

What I have learned:

♦ THE PRIMA FACIE CASE AGAINST HACKING ♦ OVERCOMING THE PRIMA FACIE CASE: HACKING MOTIVATED BY BENIGN PURPOSES ♦ The Social Benefits of Benign Intrusions ♦ Benign Intrusions as Preventing Waste ♦ Benign Intrusions as Exercising the Right to a Free Flow of Content ♦ HACKTIVISM: HACKING AS POLITICALLY MOTIVATED ACTIVISM AND CIVIL DISOBEDIENCE ♦ CD and Morality ♦ What is Hacktivism? ♦ Is Hacktivism Morally Justified as CD?

104

Integrative questions: 1. 2. 3. 4. 5.

Is Hacktivism Morally Justified as CD? What is Hacktivism? explain The Social Benefits of Benign Intrusions? What is civil disobedience? What is benign intrusions?

105

The Handbook of Information and Computer Ethics Chapter 9

Chapter: Information Ethics and the Library Profession Quote:

At the center of the librarian.s commitment to humanity.s search for truth and understanding is the goal of remaining always neutral in the battle of competing ideas. No matter how precious to us any faith or philosophy or social movement might be, we have to keep our distance and maintain our impartiality as we help to insure that all the people can hear all the arguments and establish for themselves what is right or true.’

What I expect to learn:

I expect to learn How IE works in Library profession.

Review:

The chapter is about how librarian face proper ethic. These people are overwhelmed with information ethics. They have power of knowing a person by viewing their records.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

THE CORE VALUE OF THE LIBRARY PROFESSION 1) Books are for use. (2) Every person his or her book. (3) Every book its reader. (4) Save the time of the reader. (5) The library is a growing organism. SELECTION, BIAS, AND NEUTRALITY CLASSIFICATION AND LABELING CHILDREN’S ACCESS TO INFORMATION

106

Integrative Questions: 1. 2. 3. 4. 5.

What are the five core value of a librarian? Explain SELECTION, BIAS, AND NEUTRALITY Explain Books are for use? Does a librarian core value need change? Explain the classification and labeling?

107

The Handbook of Information and Computer Ethics chapter 10

Chapter: Ethical Interest in Free and Open Source Software

Quote:

The social pressure in the open source community to avoid code forking provides incentives for project leaders to ensure that the code is the best it can be. On the contrary, when an open source developer believes there is too much risk associated with a particular piece of code, he/she can rewrite it and release it. Although there is a reputation risk in doing so, there is the opportunity to publicly demonstrate that the forked product is superior

What I expect to learn: I want learn about ethical interest in free and open source software.

Review: This chapter talks about free and open source softwares. The free softwares are the ones maybe the trials or really free the other one is open source which you can modify or create. Nonetheless this are free. Yes free so get ready grab a bite!

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

ON THE DISTINCTION BETWEEN FS AND OSS The History of Free and Open Source Software Free Software (1) Freedom to run the program, for any purpose. (2) Freedom to study how the program works, and adapt it to your needs. (3) Freedom to redistribute copies so you can help your neighbor. (4) Freedom to improve the program, and release your improvements to the public, so that the whole community benefits. Critiques of Free and Open Source Software The Controversy Regarding GPL Version 3 WHY OSS FLOURISHES Economic Foundations for OSS The Quality of OSS 108

♦ The Ethical Responsibilities of Software Developers ♦ Open Source and Accountability ♦ IS OSS A PUBLIC GOOD? Integrative Question: 1. 2. 3. 4. 5.

Is OSS a public good? What is OSS? what is GPL? Explain the history of free and open source software explain the ethical responsibilities of a developer

109

The Handbook of Information and Computer Ethics Chapter 11

Chapter: Internet Research Ethics: The Field and Its Critical Issues

Quote: A key decision for Internet researchers is often disciplinebased, that is, do we treat our “subjects” as subjects (as is characteristic of the social sciences) and thereby invoke familiar human subjects protections, and/or do we treat our “subjects” as posters, as authors (as is characteristic of the humanities)? If the latter is the case, then far from emphasizing the need for anonymity and confidentiality, we are rather dealing with posters who intend to act as public agents online.

What I expect to learn: I expect to learn Research ethics and its critical issues:

Review:

Information technology is growing fast. Before I used to borrow books from the library when I was a kid or research hard, when I got to highschool books were no longer superior. The world wide web dominated. Till now its dominating more. It is improving to make our life easier.

What I have learned: ♦ INTRODUCTION TO INTERNET RESEARCH ETHICS: BACKGROUND AND MAJOR ISSUES IN THE LITERATURE ♦ IRE: A BRIEF HISTORY ♦ Philosophical Foundations: Sources, Frameworks, and Initial Considerations ♦ Specific IRE Issues ♦ Anonymity/Confidentiality ♦ Copyright ♦ Revealing Identities ♦ Public Versus Private Spaces ♦ Respect for Persons ♦ Recruitment ♦ Research with Minors ♦ Emerging Issues 110

♦ METHODOLOGIES AND ETHICS ♦ Participant Observation and Discourse Analysis Integrative questions: 1. 2. 3. 4. 5.

Define respect for person? What is IRE? what is copyright? What is confidentiality? Explain research with minors.

111

The Handbook of Information and Computer Ethics Chapter 12

Chapter: Health Information Technology: Challenges in Ethics, Science, and Uncertainty

Quote: To ask if a computer diagnosis increases (or decreases) the risk of diagnostic or other error is in part to ask whether it will improve patient care. If the answer is that, on balance, the tool increases (the risk of) diagnostic error, then we should say it would be unethical to use it. Significantly, though, what is sought here is an empirical finding or a reasoned judgment—where such a finding is often lacking or even methodologically hard to come by; or where such a judgment is based on inadequate epistemic support, at least according to standards otherwise demanded to justify clinical decisions. . . This means that we are pressed to answer an ethical question (Is it acceptable to use a decision support system?) in a context of scientific uncertainty (How accurate is the system?). Many challenges in contemporary bioethics share this feature, namely, that moral uncertainty parallels scientific or clinical ignorance. (Goodman, 2007, p. 129). What I expect to learn I expect to gain knowledge on challenges in ethics. Review: The chapter talks about how the information technology is doing, updating improving getting better. We are lucky that we are the batch that are trying new things out with technology. I know in the future it would be way better. But we should always remember to put values in what we are doing.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

PRIVACY AND CONFIDENTIALITY CLINICAL DECISION SUPPORT SYSTEMS Diagnostic Expert Systems Prognostic Scoring Systems ‘‘The Standard View” and ‘‘Progressive Caution” PERSONAL HEALTH RECORDS Privacy and confidentiality Decision support Status of the professions

112

Integrative Questions: 1. 2. 3. 4. 5.

What is status of proffesions? Define clinical decision support system? what is diagnostic expert system? what is prognostic scoring system? define standard view?

113

The Handbook of Information and Computer Ethics Chapter 13

Chapter: Ethical Issues of Information and Business Quote: Ethical issues enter the debate when the justifications of a possible right to be left alone (Britz, 1999; Velasquez, 1998) are discussed. In principle, these can be divided into two streams of debate: one that is concerned with data about customers, the other which deals with privacy of employees. Companies usually have more power over their employees than their customers. The arguments in defense of employee privacy are therefore based on stronger ethical concerns. Within the debate about employee privacy, one can distinguish three groups of reasons for its support. They deal primarily with the individual person, with society, and with economic considerations.

What I expect to learn: I expect to learn ethical issues in information and business

Review: Business ethics is tackled in this chapter. It is shoed how business woks with ethics, how you need ethics in business. You would need privacy in running a business you would need to make you customers details private.

What I have learned: ♦ APPROACHES TO ETHICAL ISSUES IN BUSINESS AND INFORMATION ♦ The Concept of Business ♦ Business Ethics ♦ Shareholders and Stakeholders ♦ Shared Norms and Values ♦ Corporate Social Responsibility ♦ Business Ethics and Computer Ethics ♦ MICROLEVEL INFLUENCE OF BUSINESS ON ETHICS AND INFORMATION ♦ The Business Value of Information ♦ The Impact of Business on Privacy: Employee Surveillance ♦ The Ethical Response to Employee Surveillance ♦ The Impact of Business on Intellectual Property ♦ The Ethical Response to Intellectual Property Protection 114

♦ THE MACROLEVEL INFLUENCE OF BUSINESS ON ETHICS AND INFORMATION ♦ Globalization ♦ Digital Divides ♦ The Ethical Response to Globalization and Digital Divides Integrative Questions: 1. 2. 3. 4. 5.

What is globalization? what is digital divides? define business ethics? what is shared norms and values? define the business value of information?

115

The Handbook of Information and Computer Ethics chapter 14

Chapter: Responsibilities for Information on the Internet

Quotes: Many problems regarding reliability of online information on the Internet are not problems of information lacking reliability, but of receivers misperceiving or not perceiving (un-) reliability. In order to pave thewayto discussing this issue, I will, first, givesome attention to the dimensions of functionality and significance of information. These dimensions introduce the users perspective.

What I expect to learn: I expect to learn about responsibilities of information on the internet

Review: The chapter talks about responsibilities for information on the internet, right? But are these responsibilities being done? A lot of people are abusing information in the internet. They use it to destroy and harm other people. They use it to gain money illegally from other people. They make information over the internet unsafe.

What I have learned: ♦ CONDITIONS OF RESPONSIBILITY ♦ ISPs AND CLEARLY HARMFUL OR OFFENSIVE INFORMATION ♦ INFORMATION IN GENERAL ♦ THE RESPONSIBILITIES INVOLVED ♦ (1) The creation of new credibility-conferring systems, such as certification systems, allowing us to use pedigree criteria with regard to (online) information, when such systems are lacking. ♦ (2) Raising the visibility of indicators or markers of reliability of information ♦ (according to pedigree criteria). ♦ (3) Raising expertise and background knowledge in all users (to enable them to recognize reliability on the basis of pedigree criteria). ♦ (4) Raising the awareness of the varying qualities of information.

116

Integrative Questions: 1. 2. 3. 4. 5.

What is ISP? Define conditions of responsibility? What is information in general? What are the responsible involved? explain raising awareness of varying qualities.

117

The Handbook of Information and Computer Ethics Chapter 15

Chapter: Virtual Reality and Computer Simulation

Quote: Virtual reality and computer simulation will continue to present newchallenges for ethics because newand more advanced applications are still being developed and their use is more and more widespread. Moreover, as has been argued, virtual environments can mimic manyof the properties of real life and, therefore, contain manyof the ethical dilemmas found in real life. It is for this reason that they will continue to present new ethical challenges not only for professional developers and users but also for society at large.

What I expect to learn: I expect to learn Virtual reality and computer simulation:

Review: The chapter discuses the history of virtual reality. It is actually one of the successful machines invented. You would get a 3d look or a view. Its one of the pioneers of information. Nowadays technology improved changing fast to a better technology.

What I have learned: BACKGROUND: THE TECHNOLOGY AND ITS APPLICATIONS Virtual Reality Computer Simulation Applications VIRTUALITY AND REALITY The Distinction between the Virtual and the Real Is the Distinction Disappearing? Evaluating the Virtual as a Substitute for the Real REPRESENTATION AND SIMULATION: ETHICAL ISSUES Misrepresentations, Biased Representations, and Indecent Representations ♦ Virtual Child Pornography ♦ Depiction of Real Persons ♦ BEHAVIOR IN VIRTUAL ENVIRONMENTS: ETHICAL ISSUES

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

118

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

Avatars, Agency, and Identity Behavior in Single-User VR Behavior in Multiuser VR Virtual Property and Virtual Economies THE ETHICS OF COMPUTER GAMES The Goods and Ills of Computer Games Computer Games and Values Computer Games and Gender VIRTUAL REALITY, SIMULATION, AND PROFESSIONAL ETHICS

Integrative Questions:

1. 2. 3. 4. 5.

What is virtual reality? what is the history of virtual reality? Define computer games and values? what is virtual child pornography? what are avatars, agency and identity?

119

The Handbook of Information and Computer Ethics Chapter 16

Chapter: Genetic Information: Epistemological and Ethical Issues Quote: But it was not until 1977 that robust and generally applicable sequencing methods were developed, and even then the modern bioinformatics techniques of gene discovery was still years away. Although the development of information/processing by computers proceeded contemporaneously with progress in research into biological and biochemical information processing, the trajectories of these two initiatives were never unified even if they sometimes overlapped at various points.

What I expect to learn: I want to learn details about Epistemological and Ethical Issues

Review: The way I understood this chapter is information grows thru its history. It would continue to grow nonstop. Just like a DNA structure, information has its structure as well. And the structure of information cannot be altered unless it improves to a new technology.

What I have learned:

♦ INFORMATION THEORY AND THE NOTION OF GENETIC INFORMATION ♦ The Concept of Information ♦ The Notion of Genetic Information ♦ A SEMANTIC OR A SYNTACTIC THEORY OF GENETIC INFORMATION ♦ THE CELL AS COMPUTER MACHINERY ♦ Berlinski: Bacterial Cell as Automata ♦ Maynard Smith: Eggs as Computer Machineries ♦ USE AND MISUSE OF MODELS ♦ ETHICAL PROBLEMS OF GENETIC INFORMATION ♦ Ideological Use of a Model and Ethical Issues in Fund-raising ♦ Cooperation and Public Access of Data ♦ Sequence Patenting and the Open Source Challenge

120

Integrative Questions: 1. 2. 3. 4. 5.

Define the concept of information? what is a notion of genetic information? what is cooperation and public access of data? what is ethical problems of genetic information? define information theory?

121

The Handbook of Information and Computer Ethics Chapter 17

Chapter: The Ethics of Cyber Conflict

Quote: All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations

What I expect to learn: I expect to understand the cyber conflict

Review:

The chapter discusses how cyber conflict could happen. How it would go if a misunderstanding happens. As we all know most of the war weapons now are being operated via computers. Technology really boomed after world war II, I mean technology for self defense.

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

CYBER WARFARE AT THE STATE LEVEL Jus ad Bellum—The Law of Conflict Management When Does a Cyber Attack Constitute the Use of Force? Severity Immediacy Directness. Invasiveness Measurability Presumptive Legitimacy. Responsibility. Jus in Bello—The Law of War

122

Integrative Questions: 1. 2. 3. 4. 5.

What is severity? what is directness? what is measurability? what is responsibility? When Does a Cyber Attack Constitute the Use of Force?

123

The Handbook of Information and Computer Ethics chapter 18

Chapter: A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection

Quote: This quantitative approach is utilitarian. The risks that are addressed are those with the highest risk exposure. All consequences are given dollar values. Even qualitative risks are turned into a numerical hierarchy (McFarland, 1990). The resulting risk of the September 11 disaster was calculated in terms of the number of deaths that occurred on that day or lifetime dollar earnings potential of those who died.

What I expect to learn: I want to learn what SoDIS inspection is.

Review: The chapter talks about how person should decide. His faith is on the line. His future. Everything for technology is on the line.

What I have learned:

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

EVOLVING PRACTICES FOR RISK ASSESSMENT Generic Standards for Risk Analysis Models The Context Risk Identification Risk Analysis Limitations of the Generic Standards Ethical Risks SODIS AUDIT PROCESS Software Development Impact Statement Stakeholder Identification SoDIS Stakeholders Identification Identification of Tasks or Requirements Identify Potential Ethical Issues SODIS INSPECTION MODEL Improve SoDIS Audit with an Inspection Model 124

♦ ♦ ♦ ♦ ♦

THE SODIS AND UK ELECTRONIC VOTING REQUIREMENTS Lessons Learned from the UK Election Research Insights from UK e-Voting Analysis Insights Related to Practice from UK e-Voting Analysis RESEARCH PROJECT

Integrative Questions: 1. 2. 3. 4. 5.

What is a research project? define the context what is a risk identification? what is a risk analysis do? Identity potential ethical issues?

125

The Handbook of Information and Computer Ethics Chapter 19

Chapter: Regulation and Governance of the Internet

Quote: Is there anything wrong as such with individual countries regulating the content of the Internet in their country? Content includes things such as libelous material, material protected by intellectual property laws or privacy laws, cultural material (should there be free trade in cultural objects?), political material, and pornographic material. We will consider some problems with this later.

What I expect to learn: I expect to learn how the internet coup up with the law.

Review: The internet as of now is not being govern properly. A lot of people are abusing it. No one can own it. But a lot of people act like they own it. There should be laws implemented on how the internet should work

What I have learned: ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

CONTENT REGULATION EFFECTIVE REGULATION REGULATION: TECHNICAL ISSUES THE CURRENT SITUATION ACROSS BORDERS INTERNET REGULATION: NORMATIVE ISSUES CENSORSHIP REGULATION OF THE INTERNET: MORAL ARGUMENTS OTHER ARGUMENTS REGULATION AND EFFICIENCY REGULATION ACROSS LEGAL JURISDICTIONS CONCLUSION

126

Integrative Questions 1. 2. 3. 4. 5.

What is conclusion? define regulation and efficiency? What is censorship? Define across the border? what is an effective regulation?

127

The Handbook of Information and Computer Ethics Chapter 20

Chapter: Information Overload

Quote: Much of this linguistic transparency seems to have come from the meaning of the word “overload,” and its root word “load.” The Oxford English Dictionary defines “load” as “That which is laid upon a person, beast, or vehicle to be carried; a burden. Also, the amount which usually is or can be carried; e.g., cart-load, horse-load, wagon-load,” and it defines “overload” as “An excessive load or burden; too great a load; the condition of being overloaded.” These core meanings speak to the recognition that a person or an animal (or by extension, a device such as a cart or wagon) is capable of carrying physical materials and second, that this capacity is finite and can be exceeded.

What I expect to learn: I expect to learn about how information overloads. Review: Information overload is when a certain topic is taught to you or you learn in by yourself and at a certain point you don’t’ get what you are studying because you got pre occupied with the first topic and you are getting confused with the information being given to you, that’s information overload. To much at the moment.

What I have learned:

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

WHAT IS INFORMATION OVERLOAD? What is Information?. More than Information Perception or Reality? A Novel, Recurrent, or Ever-Present Phenomenon? A BRIEF HISTORY OF THE PHRASE CAUSES OF INFORMATION OVERLOAD CONSEQUENCES OF INFORMATION OVERLOAD CONCLUSION: WHAT CAN BE DONE?

128

Integrative Questions:

1. 2. 3. 4. 5.

What is information? What is information overload? Define perception? define reality? what is a conclusion?

129

The Handbook of Information and Computer Ethics Chapter 21

Chapter: Email Spam

Quote:

The struggle against unwanted emails will continue. Ethical analysis can be useful in analyzing emerging strategies of email senders and email recipients. In these analyses, ethicists must be careful to look at individual stakeholders as well as systematic stakeholders; both micro- and macroissues are important. All such analyses should start with a clear exposition of the characteristics of the emails that will be considered “spam.” Only then can we discuss with precision the ethics of spam.

What I expect to learn; Spam prevention and safety Review Since we are at information age, the smarter the spammers are these days, they know how to attack you, insurance, car load and other explicit things. Its really annoying at one point you want to destroy your email. But the spam folder sometimes misses the spam? What to do? Pray that they would pass a law banning email spam.

What I have learned:

♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦ ♦

A SHORT HISTORY OF THE TERM ‘‘SPAM’’ SEARCHING FOR A CHARACTERIZATION OF ‘‘SPAM’’ Content of the Email Intent of the Sender Consequences to the Receiver Consent of the Receiver Relationship Between the Sender and the Receiver The Accountability of the Sender and the Degree of Deception Number of Identical Emails Sent Illegality Size of the Message ENVISIONING THE SPAM SPACE: SPECIFIC EMAILS EXHIBIT 130

♦ ♦ ♦ ♦ ♦ ♦

COMBINATIONS OF CHARACTERISTICS DeceptiveEmailsMeant to Defraud AreCondemned, SpamorNot Emails Between Well-Meaning Friends Are Probably Not Spam Unsolicited Commercial Bulk Emails (UCBE) THE ETHICS OF ANTISPAM MEASURES The Ethics of Doing Nothing

Integrative Questions

1. 2. 3. 4. 5.

what is spam? why are they spamming you and me? What is the intent of the sender? give a possible content of a spam email Is it illegal to spam?

131

The Handbook of Information and Computer Ethics chapter 22

Chapter: The Matter of Plagiarism: What, Why, and If

Quote:

A debate over whether an expression is plagiarism is, therefore, a debate over the standards for and values inherent in its condemnation. The present study is an overview of the variety of standards and values that underlie accusations of plagiarism, with an emphasis on howcomputer technology has changed the focus for those accusations.

What I expect to learn:

I expect to learn how plagiarism can be prevented

Review

Plagiarism is really bad in this time of the information age. A lot of people tend to steal ideas of other people. We can borrow their ideas its for free we just have to give them credit and cite them. Respect for their work in short.

What I have learned:

♦ ♦ ♦ ♦ ♦ ♦

THE CONCEPT OF PLAGIARISM LACK OF AUTHORIZATION—ECONOMIC FOUNDATIONS LACK OF AUTHORIZATION—NATURAL OR MORAL RIGHTS LACK OF ACCREDITATION—NONINFRINGING PLAGIARISM A PERSONAL VIEW OF THE MATTER LITERATURE REVIEW

132

Integrative Questions:

1. 2. 3. 4. 5.

What is plagiarism? Is it legal to plagiarize? I would not get caught if I plagiarize? Define the concept of plagiarism? What is literature review?

133

The Handbook of Information and Computer Ethics Chapter 23

Chapter: Intellectual Property: Legal and Moral Challenges of Online File Sharing

Quote:

. . all the goods of the Information Age—all of the expressions once contained in books or film strips or newsletters—will exist as thought or something very much like thought: voltage conditions darting around the Net at the speed of light, in conditions that one might behold in effect, as glowing pixels or transmitted sounds, but never touch or claim to “own” in the old sense of the word. What I expect to learn: I expect to learn moral challenges

Review: I would admit I am into file sharing, but I have to say I never gained profit from file sharing. What I do is for personal use only for example music from peer 2 peer clients. Its not illegal if you don’t gain profit from it.

What I learned:

    

PEER-TO-PEER NETWORKS SHARING OR THEFT? SECONDARY LIABILITY MGM V. GROKSTER: A BRIEF HISTORY MORAL CONSIDERATIONS

134

Integrative Questions: 1. 2. 3. 4. 5.

What is p2p? Is sharing legal? Is in helpful? Give the history of P2p Give an example of a p2p program

135

The Handbook of Information and Computer Ethics Chapter 24

Chapter: Censorship and Access to Expression

Quote: Fundamental interests in communicating with others, both as speakers and as hearers. In addition, we have a fundamental interest in accessing expressions based on individual and collective deliberative and informational interests. Notice that the focus here is on the primary importance of the capacity of persons to communicate with each other, rather than on the interest in the freedom of the speaker to speak. Standard discussions of free expression focus almost exclusively on the importance of person.s freedom to engage in acts of expression. However, it is less often noted that such expressions are fundamentally acts of communication. If persons do not have the right to receive information so expressed, the act of communication is prohibited.

What I expect to learn: Censorship and access in information technology.

Review:

The chapter discusses the censorship. They are blocking or not allowing access. This may happen to certain sites if you use a proxy setting in a workplace, school or a restricted area.

What I have learned:     

THE INTEREST IN ACCESS TO EXPRESSION DEFINING CENSORSHIP TYPES OF HARM AND ARGUMENTS AGAINST CENSORSHIP Inherently Harmful Access Instrumentally Harmful Access.

136

Integrative Questions: 1. 2. 3. 4. 5.

What is censorship? Define censorship? Give the types of harms? Is it harmful? what is censorship for?

137

The Handbook of Information and Computer Ethics Chapter25

Chapter: The Gender Agenda in Computer Ethics

Quote:

These studies belong to a particular genre of research strongly representative of the business and management literature, a style of research that perpetuates its approach without substantial inroads from other types of research.

What do you expect to learn:

I expect to learn more details about gender agenda in computer ethics. Review:

The chapter discussed that no matter what gender you are you are supposed to be equal with the other person. Everybody has the same rights, male female or of the third kind. Its ethical to give respect. We should know how to blend with people. After all they are also human.

What I have learned:

       

FEMINIST ETHICS GENDER AND COMPUTER ETHICS—A MALE–FEMALE BINARY? GENDER AND COMPUTER ETHICS STUDIES Student Population Quantitative Versus Qualitative Research Methodologies What is Ethical Behavior? The Undertheorizing of Gender and Ethics WOMEN IN COMPUTING—AN ALTERNATIVE APPROACH

138

Integrative Questions: 1. 2. 3. 4. 5.

define feminist ethics? Define student population? What is qualitative research? what is quantitative research? Why shouldn’t be there female discrimination?

139

The Handbook of Information and Computer Ethics Chapter 26

Chapter: The Digital Divide: A Perspective for the Future

Quote:

There are gaps in access to information and information communication technologies within nations and between nations.Within the United States, for example, there are such gaps between rich and poor citizens, whites and blacks, and urban dwellers and rural dwellers. According to the U.S. Department of Commerce (1999),

What I expect to learn:

I expect to learn Digital division and perspective for the future:

Review:

People should start making changes, the changes needed in information technology. The cyberspace really need more people it can help a lot of people still have not yet touched a computer in their entire life. So we need to reach out to this people introduce technology to them.

Things that I have learned:

      

THE BIDIRECTIONAL RELATIONSHIP BETWEEN ABSOLUTE POVERTY AND THE DIGITAL AND INFORMATION DIVIDES THE MORAL BASIS FOR THE IDEA DIVIDES SHOULD BE ELIMINATED EMPIRICAL SKEPTICISM ABOUT THE RELATIONSHIP BETWEEN DIGITAL DIVIDES AND ABSOLUTE POVERTY Meanings Expectations Empirical Studies Illustrating Perceived Failures Bridges and Questions

140

Integrative Questions:

1. 2. 3. 4. 5.

Define bridges and questions: Define expectations? what is empirical studies? what is digital divides? Define poverty?

141

The Handbook of Information and Computer Ethics Chapter 27

Chapter: Intercultural Information Ethics

Quote:

Morality is objective in the sense of being true or false in virtue of mindindependent facts about the world—and not in virtue of what cultures or individuals think about them (i.e., moral objectivism);

What I expect to learn:

I expect to gain knowledge on inter cultural ethics

What I learned:

This chapter is explains how morality should be implemented when connecting it with information technology. The whole chapter is actually detailed based on the earlier chapters. I have to say that we need to step up together to fight against cyber crime female discrimination and illegal activities.

What I have learned:

      

THE FOUNDATIONAL DEBATE On the Foundation of IIE THE IMPACT OF ICT ON LOCAL CULTURES FROM AN IIE PERSPECTIVE Asia and the Pacific SPECIAL ISSUES Privacy Intellectual Property

142

Integrative Question: 1. 2. 3. 4. 5.

Define intellectual property? what is privacy? what is special issues? what is the cultural perspective what is the foundational debate?

143

The Fortune at the Bottom of the Pyramid Chapter 1

Chapter: The Market at the Bottom of the Pyramid

Quote: Actually they pay the ‘poverty penalty’ of up to 5 - 25 times; a result of local monopolies, inadequate access, poor distribution, and strong traditional intermediaries.

What I expect to learn;

I expect to learn the market at the bottom of the pyramid

Review:

It is quite shocking that the bottom of the pyramid spends a lot more money that the people at the top. The bottom pyramid has been monopolized and those people capitalized on their weaknesses. For me if you should target the ghetto market you should make a reasonable price, I noticed they paid more which is not fair for them.

What I have learned:

           

‘poverty penalty’ Density of urban settlements The challenge lies in making aspirational products affordable. they are rapidly exploiting the benefits of information networks. Creating the capacity to consume •Needs to be accessed differently Small unit packs, single-serve Innovative purchase schemes (credit) 3 simple principles: – Affordability – Access – Availability

144

Integrative Question: 1. 2. 3. 4. 5.

Is it fair for the bottom of the pyramid to be treated that way? Define how they spend more? Are they creating a capacity to consume? Can they afford some expensive materials? describe density in urban settlemen

145

The Fortune at the Bottom of the Pyramid Chapter 2

Chapter: Products and Services for the BOP

Quote: Product development must start from a deep understanding of functionality, not just form; marginal changes to products for non-BOP markets will not do

What I expect to learn:

I expect to learn different innovative products and services at the bottom of the pyramid.

Review: It is discussed here that if you were to start a business you should know which area you should target. You should find your target market by determining what they want and need. You can determine it by asking canvassing and surveying. Try to place it in a reasonable price, not to high not to low. I would use that motive if I were to start my own business

What I have learned 1. Price performance 2. Innovation: hybrids 3. Scale of operations 4. Sustainable development: eco-friendly 5. Identifying functionality: is it different? 6. Process innovations 7. Deskilling of work 8. Education of customers 9. Designing for hostile infrastructure 10.Interfaces 11. Distribution: accessing the customer 12.Challenging conventional wisdom

146

Integrative Question: 1. 2. 3. 4. 5.

What are the 12 principles of BOP markets? What is process innovations? what is challenging conventional wisdom define interfaces? what is distribution accessing the customer?

147

The Fortune at the Bottom of the Pyramid Chapter 3

Chapter: BOP: A Global Opportunity

Quote:

We have grown literally afraid to be poor. We despise anyone who elects to be poor in order to simplify and save his inner life. If he does not join the general scramble and pant with the money-making street, we deem him spiritless and lacking in ambition. ~William James

What I expect to learn:

I expect to learn to take advantage of a global opportunity Review:

This chapters thinking is they would target an opportunity to capitalize on it. Its like a change why would you let go if it is already. You have to target what people want and need. A lot of people would not go for the expensive product, but I gurantee you they would go for the replica.

What I have learned:

     

Engaging the BOP Local growth opportunities Local innovations and global opportunity BOP solutions for developed markets Innovations The costs of managing

148

Integrative Questions: 1. 2. 3. 4. 5.

What is bop? Define innovation? define cost of managing? What is local growth opputunities what is local innovation?

149

The Fortune at the Bottom of the Pyramid Chapter 4

Chapter: The Ecosystem for Wealth Creation

Quote:

The poverty of our century is unlike that of any other. It is not, as poverty was before, the result of natural scarcity, but of a set of priorities imposed upon the rest of the world by the rich. Consequently, the modern poor are not pitied...but written off as trash. The twentieth-century consumer economy has produced the first culture for which a beggar is a reminder of nothing. ~John Berger

What I expect to learn: I expect to learn about the safety of the ecosystem for wealth creaton.

Review:

This chapter tells that companies are not friendly with the environment. These company gain big money but what happens to the nature? Nothing the nature is just destroyed while they are sitting home gaining money and enjoying themselves. Some sell low quality product. They should satisfy the customer with cleanliness.

What I have learned:

    

The ecosystem The ecosystem for wealth creation Organization of the group Learning the sanctity of contracts Reducing inequalities in contracts

150

Integrative questions; 1. 2. 3. 4. 5.

Is ethics applied to the following chapter? Define the ecosystem what is ecosystem for wealth creation what is organization of the group amongs the poor? Should they reduce inequalities?

151

The Fortune at the Bottom of the Pyramid chapter 5

Chapter: Reducing Corruption: Transaction Governance Capacity

Quote: However mean your life is, meet it and live it: do not shun it and call it hard names. Cultivate poverty like a garden herb, like sage. Do not trouble yourself much to get new things, whether clothes or friends. Things do not change, we change. Sell your clothes and keep your thoughts . ~Henry David Thoreau

What I expect to learn: I expect to learn how to reduce corruption

Review: The corruption scheme it never goes away. This chapter explains why corruption should be terminated in order to make the government more trustable. We know that poverty starts from corruption if we prevent it we may have a better future.

What I have learned:

    

TGC The Andhra Pradesh e-Governance Story Building TGC Corruption and e-governance principles of the CGG in Andhra Pradesh

152

Integrative Question

1. 2. 3. 4. 5.

What is corruption? what is Andhra Pradesh? what is e-governance? what is TGC what is e-governance story

153

The Fortune at the Bottom of the Pyramid chapter 7

Chapter: Development as Social Transformation

Quote: For each new morning with its light, For rest and shelter of the night, For health and food, for love and friends, For everything Thy goodness sends. ~Ralph Waldo Emerson

What I expect to learn: I expect to learn development in social transformation.

Review;

The chapter discusses the development of the BOP. If you start the business you would have to target the lower part of the crowd. You should get close to the crowd and you should get to know the people on the bottom. You must have balance between the pyramid, but target the poor area but you have to give a reasonable price.

What I have learned:

   

BOP consumers upgrade private sector and the BOP rural income distribution checks and balances

154

Integrative Question; 1. 2. 3. 4. 5.

What is consumer upgrade? what is checks? what is balances? does rural income have a factor? who do you target?

155

Related Documents

Ethic Reader Deep
April 2020 14
Ethic Reader
April 2020 23
Ethic Reader Arriola
April 2020 11

More Documents from "Luigi Vibal"

Ethic Reader Deep
April 2020 14
Lesson Plan.docx
November 2019 31
Round Robin.docx
November 2019 24
Dummy Report.docx
December 2019 24
1841021279.pdf
December 2019 20