Handbook Of Ethics

  • Uploaded by: Rocky
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Handbook Of Ethics as PDF for free.

More details

  • Words: 5,626
  • Pages: 31
Rocky L. Ho Part 1: Handbook of information and computer ethics. Chapter 1 Title: “Foundations of Information Ethics” by Luciano Floridi

Quote: “The information society has been made possible by a cluster of information and communication technologies infrastructures.”

Expectations: I expect to learn a lot from this chapter since it is the first part of the handbook.

Book Review: The author of this chapter is Luciano Floridi. IE was one of the topic which was discussed, it is said that the IE is the ethics for information resources. ERPT was also discussed, which means external, resource, product, target, and it is a model. There were stages that were mention in this chapter. The stages talks about how the environment evolves when time passes. Technology were produced to help us guide ourselves in our work.

Things I have learned: I learned that the organization policy drives information technology development.

Integrity Questions: 1.) What is ECPT? 2.) What IE? 3.) What are the limitations that were discussed? 4.) Who is Luciano Floridi? 5.) What do we get from this chapter?

Part 1: Handbook of information and computer ethics. Chapter 2 Title: “Milestones in the History of Information and Computer Ethics” by Terrell Ward Bynum

Quote: “The academic field of information ethics was born unintentionally and almost accidentally in the middle of the second war.”

Expectations: I expect to learn about the milestones in the history of information and computer ethics.

Book Review: The author of this chapter is Terrell Ward Bynum. The topic wiener’s account of a good life was discussed, based on my readings, they say that we have to live well, and we have to be free and be creative as much as possible, because in our generation, being a new model is something that we all must achieve. Next which was discussed was about the information ethics methodology, and it says that people tends to find something which was already discovered or has been found by somebody else. There are information that does not need to be extracted from where it came from.

Things I have learned: I learned that this chapter cares for policies, thus it is very complicated to understand new things.

Integrity Questions: 1.) What is unique? 2.) What is influencial computer ethics theory? 3.) What is ETHICOM96? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 1: Handbook of information and computer ethics. Chapter 3 Title: “Moral Methodology and Information Technology” by Jeroen van den Hoven

Quote: “Computer ethics is a form of applied or practical ethics.” Expectations: I expect to learn the moral methodology and information.

Book Review: The author of this chapter is Jeroen van den Hoven. He said that the moral questions was the development of associating and same goes for the applications and the usage of the computers. Since ethics is most likely talking about the computer based part in the information technology world, it gives out benefits on how to justify our answers. For further information, about ethics, it was given that it is “a responsibility for software error, equal access, and autonomous agents is one thing” it says that for us to be able to get the solutions for our problems, we can guide ourselves by using the given samples.

Things I have learned: I learned that there are processes on how to obtain certain things and patch it up to create a new answer for our problem.

Integrity Questions: 1.) What is conceptualization? 2.) What is moral methodologies? 3.) What is applied ethics?

4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 1: Handbook of information and computer ethics. Chapter 4 Title: “Value Sensitive Design and Information Systems” by Batya Friedman, Peter H. Kahn Jr., and Alan Borning

Quote: “It employs an integrative and iterative tripartite methodology, consisting of conceptual, empirical, and technical investigations.”

Expectations: I expect to learn about the values sensitive design and information systems.

Book Review: The authors of this chapter are Batya Friedman, Peter H. Kahn Jr., and Alan Borning. They discussed the same chapter which means that have to agree on something which is based on value sensitive design and information systems. Value sensitive design was discussed, which means that it is an approach which was made or designed of the technology that will eventually helps human lives and values. There were cases in this chapter were there are people who debates about the usage of the land and transportation, fairness, support on the process of being a diverse range of different consumers or stakeholders.

Things I have learned: I learned that the value sensitive design is the main point of design for technology. It is an interesting topic.

Integrity Questions: 1.) What is value sensitive design? 2.) What is value? 3.) What is system design? 4.) What is empirical investigations? 5.) What is technical investigations?

Part 2: Handbook of information and computer ethics. Chapter 5 Title: “Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property” by Adam D. Moore

Quote: “Care is needed so that we do not confuse moral claims with legal ones.” Expectations: I expect to learn about what intellectual property means.

Book Review: The author of this chapter is Adam Moore. The meaning of intellectual property was discussed, it simply means that it is the normal characterized of a generally property which is owned, it is a value which is based on the ideas. The secrets for trading was also discussed, according to the book “consist of any formula, pattern, device, or compilation of information that is used in one’s business”.

Things I have learned: I learned that the meaning of intellectual property can somehow be obtained when we get the respect of other people. Like we give them their own rights.

Integrity Questions: 1.) What is intellectual property? 2.) What does the alternatives to patents talks about? 3.) What is copyright? 4.) Who is the author of this chapter? 5.) What is trade secret and social utility?

Part 2: Handbook of information and computer ethics. Chapter 6 Title: “Informational Privacy: Concepts, Theories, and Controversies” by Herman T. Tavani

Quote: “it would seem that privacy is not simply a static concept, but instead has a dynamic component.”

Expectations: I expect to learn about the informational privacy, concepts, theories, and controversies.

Book Review: The author of this chapter is Herman Tavani. He discussed the concept of privacy, for what I have understood about this topic, it is the complain of privacy where in it is being used to someone else, and changing the things which does not belong to them. Since it is privacy, they have no right to intrude into someone else’s stuff, file, projects, etc. since privacy is a big issue for everyone, it can somehow be related to hacking into somebody else’s files and calim it as your own.

Things I have learned: I learned that privacy is a big issue for all of us, because it is the centralized topic which is very important to the one who makes the work done.

Integrity Questions: 1.) What is the concept of privacy? 2.) What unitary? 3.) What is derivative? 4.) What is cluster definition? 5.) What is decisional privacy?

Part 2: Handbook of information and computer ethics. Chapter 7 Title: “Online Anonymity” by Kathleen A. Wallace

Quote: “The term anonymity has been used to denote a number of related things: namelessness, detachment, unidentifiability, lack of recognition, loss of sense of identity or sense of self, and so on.”

Expectations: I expect to learn about the topic online anonymity.

Book Review: The author of this chapter is Kathleen Wallace. From the beginning of the chapter, anonymity as a feature of complex social structures was discussed, according to what I have read “Before turning to a discussion of the concept of anonymity itself, it is worth noting that recent concerns about anonymity may be an expression of a widespread feature of contemporary social organization and of the extent to which technological features of that organization affect with whom we interact, how we interact with one another, and how we think of ourselves as related, socially and ethically, to others” this statement talks about how fast the things can passes, and how others receives the information so fast.

Things I have learned: I learned that anonymity can help us to have a modern life when It comes to ethical world in information technology.

Integrity Questions: 1.) What is anonimity? 2.) What is complex social structures? 3.) What is online anonimity? 4.) What is the concept of anonimity? 5.) What is data mining?

Part 2: Handbook of information and computer ethics. Chapter 8 Title: “Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking” by Kenneth Einar Himma

Quote: “Certain assumptions about hacker and related terms should be made explicit.” Expectations: I expect to learn about the ethical issues involving computer security, hacking, hacktivism, and counter hacking.

Book Review: The author of this chapter is Einar Himma. This chapter talks about hacking where people does not have the authority to snoop around other peoples file, as an information technology person, they should know that is is a negative thing to do because it is written in the ten commandments of information technology world. There are also positive things when it comes to hacking. For what I know, there is this guy who hacked the system, luckily he hacked is after that, he was know for some people, what he did was correct.

Things I have learned: I learned that hacking is not always negative thing to do, there are positive sides when it comes to hacking.

Integrity Questions: 1.) What is hacktivism? 2.) What is counter attacking? 3.) Are there limitations when it comes to hacking? 4.) Who was the first person who was known as a hacker? 5.) What do we get from this chapter?

Part 3: Handbook of information and computer ethics. Chapter 9 Title: “Information Ethics and the Library Profession” by Kay Mathiesen and Don Fallis

Quote: “We begin this chapter by considering the mission of the librarian as an information provider and the core value that gives this mission its social importance.”

Expectations: I expect to learn about the information ethics and the library profession.

Book Review: The author of this chapter are Kay Mathiesen and Don Fallis. They discussed the core value of the library profession, selection, bias, neutrality, the classification of labeling, how children gets access to the information that are been made. Several years ago, almost everybody puts newly information in the library. Its like a mission for them to put information. Selection means that they have the ability or right to choose from, bias talks about how other people discriminate other races, and how they treat others unfairly. Neutrality talks about how people treats other people fairly and has the equal rights.

Things I have learned: I learned that computer ethics can be known in the world, we can get the references in the library which supports information for what we need.

Integrity Questions: 1.) What is bias? 2.) What is selection? 3.) What is neutrality? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 3: Handbook of information and computer ethics. Chapter 10 Title: “Ethical Interest in Free and Open Source Software” by Frances S. Grodzinsky and Marty J. Wolf

Quote: “It is beyond the scope of this paper and its author to develop a detailed integration of ideas of Kant and Aristotle around the virtues.”

Expectations: I expect to learn about the ethical interest in free and open source software.

Book Review: The author of this chapter are Fances Grodzinsky and Marty Wolf. In this chapter the free software and open source software is the main topic. They discussed the importance of open source and free software. We can say that it is a free software if we downloaded it from the internet without paying a single amount of money. It is an open source if it is legal without being hesitated by anyone. We can get free software from the one who made the software himself or herself.

Things I have learned: I learned that not all free things in the world can be easily obtained. There are still prices which we have to pay.

Integrity Questions: 1.) What is free software? 2.) What is open source? 3.) What are the differences among free software and open source? 4.) Who is the author of this chapter? 5.) Where do we get free software and open source?

Part 3: Handbook of information and computer ethics. Chapter 11 Title: “Internet Research Ethics: The Field and Its Critical Issues” by Elizabeth A. Buchanan and Charles Ess

Quote: “internet research ethics is an emerging multi and interdisciplinary field that systematically studies the ethical implications that arise from the use of internet as a space or locale of , and/or tool for, research.”

Expectations: I expect to learn about the internet research ethics which discusses the fields and its crucial issues.

Book Review: The author of this are Elizabeth Buchanan and Charles Ess. From the beginning of the chapter, they discussed the introduction to the internet which research about the ethics, also the background of all major issues in the literature. Followed by the history of the IRE, next is the philosophical foundations which tackles the sources, frameworks and the initial considerations. Next that was discussed was the specific of IRE issues. Then the definition of revealing identities was next discussed, here in this topic, they said that it is an online identities are very similarly complex. We have to give respect for other person, since we are the same as a human being, we can understand what or how they think.

Things I have learned: I learned that the source, framework and initial considerations are the main topic which usually discussed for this chapter.

Integrity Questions: 1.) What is source? 2.) What is framework? 3.) What is initial considerations? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 3: Handbook of information and computer ethics. Chapter 12 Title: “Health Information Technology: Challenges in Ethics, Science, and Uncertainty” by Kenneth W. Goodman

Quote: “there is arguably no better trigger for reflection on morality and its relationship to the law and society than privacy and its cousin, confidentiality.”

Expectations: I expect to learn about the health information technology which talks about the challenges in ethics, science and uncertainly.

Book Review: The author of this chapter is Kenneth Goodman. At the beginning of this chapter, the privacy and confidentiality was discussed, inside this topic, the definitions were given and said that there are lots of us who usually violates the right of being a human being, I can relate this to ethics since I am taking up ethics class, I can say that we all have the right to be able to acknowledge things on our own because we have our own life and we can reason out our belief which can be believed by the public.

Things I have learned: I learned that we have our own privacy which others cannot take away from us.

Integrity Questions: 1.) What is diagnostic expert systems? 2.) What prognostic scoring systems? 3.) What does the standard view talks about? 4.) Who is the author of this chapter? 5.) What does progressive caution talks about?

Part 3: Handbook of information and computer ethics. Chapter 13 Title: “Ethical Issues of Information and Business” by Bernd Carsten Stahl

Quote: “Businesses and the economic system they work in have an important influence on ethical issues arising from information and information and communication technology.”

Expectations: I expect to learn about the ethical issues of information and business.

Book Review: The author of this chapter is Bernd Carsten Stahl. The concept of business was discussed, since the concept of the society which is the main topic which everyone uses as the most count of argument, I can say that it is the liberal democratic states. It can affect the business which can affect our daily lives. Next is the shareholders and the stakeholders, it says that the ethical business can approach the stakeholders. Next is the shared norms and values, this topics says that it can either be democratic or egalitarian as it can be offered by some businessman.

Things I have learned: I learned that the stakeholders and stockholders have the same attributes.

Integrity Questions: 1.) What is stockholders? 2.) What is stakeholders? 3.) What are the differences between stockholders and stakeholders? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 4: Handbook of information and computer ethics. Chapter 14 Title: “Responsibilities for Information on the Internet” by Anton Vedder

Quote: “One of the most fascinating aspects of the Internet is that very few accidents happen. This not only holds for the technical infrastructure and maintenance, but also for the communication and information transmitted through the network.”

Expectations: I expect to learn about the responsibilities for information on the internet.

Book Review: The author of this chapter is Anton vedder. The responsibilities for information on the internet was the topic for this chapter, we all know that we all bare responsibilities when it comes to the responsibilities. We can do anything as long as we will not hurt anybody. E can get tons of information in the internet, since the internet is the center of all attraction in our generations today, almost everybody uses it to amaze themselves.

Things I have learned: I learned that the internet can sometimes be harmful to us, it is also the center of all attraction to us.

Integrity Questions: 1.) What is internet? 2.) What can we do with internet? 3.) How can internet harm other people? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 4: Handbook of information and computer ethics. Chapter 15 Title: “Virtual Reality and Computer Simulation” by Philip Brey

Quote: “Virtual reality and computer simulation have not received much attention from ethicists. It is argued in this essay that this relative neglect is unjustified, and that there are important ethical questions that can be raised in relation to these technologies.”

Expectations: I expect to learn about the virtual reality and computer simulation.

Book Review: The author of this chapter is Philip brey. According to the book which I have read, virtual reality is the technology which was made during 1980, it has been in the market for several years, since it can help us to make time pass faster, we can enjoy it and play with it, not just by playing, we can do anything which we cannot do in the real world, it’s like 3D animation and you may or can think that we are in the game itself, it is also a computer based program.

Things I have learned: I learned that the virtual reality is a computer based program which can be the attraction for our generation.

Integrity Questions: 1.) What is virtual reality? 2.) What is computer simulation? 3.) What are the difference between virtuality and reality? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 4: Handbook of information and computer ethics. Chapter 16 Title: “Genetic Information: Epistemological and Ethical Issues” by Antonio Marturano

Quote: “The quantity of information in a system can be understood roughly as the amount of order in that system, or the inverse of the entropy (disorder) that all closed physical systems accumulate over time.”

Expectations: I expect to learn about the genetic information, epistemological and ethical issues.

Book Review: The author of this chapter is Antonio Marturano. This chapter talks about the concept which are being used to genetics for two different levels that can be taken and can be made or extracted to a new information. Since it can transfer information from one place to another, it has the ability to make something extraordinary things. The topic eggs as computer machineries made me think how can eggs be a part of computer machineries.

Things I have learned: I learned that the computer machineries can be related to computer ethics.

Integrity Questions: 1.) What are the concept of information? 2.) What is genetic information? 3.) What is computer machinery? 4.) Who usually use this theory? 5.) What can we obtain in this chapter?

Part 4: Handbook of information and computer ethics. Chapter 17 Title: “The Ethics of Cyber Conflict” by Dorothy E. Denning

Quote: “cyber-terrorism—the integration of cyber attacks with terrorism. Although cyber-terrorism is abhorrent and clearly unethical, hacktivism raises ethical questions.”

Expectations: I expect to learn about the ethics for cyber conflict.

Book Review: The author of this chapter is Dorothy Denning. At the beginning of the reading materials, they said that this chapter talks about the attack of cyber to be able to clearly state the unethical things which is illegal. The attack of computer viruses in our computer is very harmful, it can easily destroy our computer files, sometimes it cannot be returned to you once the virus was already spread. For the time being, we can avoid these sort of things by setting some samples like putting anti-virus, put on the windows firewall. Viruses are threats for us.

Things I have learned: I learned that the organization computer virus can kill our computer.

Integrity Questions: 1.) What is cyber-terrorism? 2.) What is a virus? 3.) How can we prevent computer virus attacks? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 4: Handbook of information and computer ethics. Chapter 18 Title: “A Practical Mechanism for Ethical Risk Assessment — A SoDIS Inspection” by Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan

Quote: “Informaticians have been evolving and refining techniques to mediate risks of developing software products that meet the needs of their clients.”

Expectations: I expect to learn about the practical mechanism for ethical risk assessment.

Book Review: The author of this chapter are Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan. Risk management is the main point here in this chapter. Since all of us is in need of budget, we tend to to everything to gain money, to be able to raise money, we have to have money, in a company, risk management is important, we have to monitor the risk management to lessen the negativity of the company’s profile or the company’s image.

Things I have learned: I learned that the risk management is important in a company to raise the its name.

Integrity Questions: 1.) What is risk? 2.) What is risk management? 3.) How do we get profit? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 5: Handbook of information and computer ethics. Chapter 19 Title: “Regulation and Governance of the Internet” by John Weckert and Yeslam Al-Saggaf

Quote: “There are at least two different questions involved in the governance of the Internet: who, if anybody should be in charge, and what, if anything, should be governed or regulated.”

Expectations: I expect to learn about the regulating and governance of the internet.

Book Review: The author of this chapter are John Weckert and Yeslam Al-Saggaf. They discussed the internet governance. According to them “Internet governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet” for this statement, I can say that internet governance is somehow been able to help us thru our decision making.

Things I have learned: I learned that the internet governance is the aid to our decision making.

Integrity Questions: 1.) What is internet governance? 2.) What WGIG? 3.) What is ICANN? 4.) What is W3C? 5.) What is IAB?

Part 5: Handbook of information and computer ethics. Chapter 20 Title: “Information Overload” by David M. Levy

Quote: “It should hardly be surprising if complaints about a flood, a fire hose, or a blizzard of information are not only common but increasing.”

Expectations: I expect to learn about the information overload.

Book Review: The author of this chapter is David Levy. Some of us does not know that there are limitations for information sending or receiving, it is called information overload. We tend to get information from the internet. For what I know, the most famous search engine is the google, almost everybody get information in google, but for articles, there are lots of us uses Wikipedia, but Wikipedia cannot be trusted since there are most of us use Wikipedia as pranks and put false information.

Things I have learned: I learned that the information overload has its limitations.

Integrity Questions: 1.) What is information overload? 2.) What is information? 3.) What’s the difference between perception and reality? 4.) Who is David Lewy? 5.) What is the history of information overload?

Part 5: Handbook of information and computer ethics. Chapter 21 Title: “Email Spam” by Keith W. Miller and James H. Moor

Quote: “The conceptual muddles about defining spam have immediate philosophical and legislative consequences.”

Expectations: I expect to learn about the importance of email spamming.

Book Review: The author of this chapter are Keith W. Miller and James H. Moor. They have discussed the importance and the meaning of email spamming. There are lots of us who tends to spam, it can make our email slow, it is very persistent, so we tend to delete all of the files which was spammed to us, to lessen the hassle during deleting, or reading nonsense email.

Things I have learned: I learned that spamming can cause hassleness to the one whose email was spammed.

Integrity Questions: 1.) What is email spamming? 2.) What are the intensions of other people who tends to spam? 3.) What are the advantages in spamming? 4.) What are the disadvantages in spamming? 5.) What lesson do we get from this chapter?

Part 5: Handbook of information and computer ethics. Chapter 22 Title: “The Matter of Plagiarism: What, Why, and If” by John Snapper

Quote: “As with most ethical concepts, there is plenty of room for debate over the definition of “plagiarism.” Plagiarism will be treated here very broadly as expression that improperly incorporates existing work either without authorization or without documentation, or both. The emphasis on impropriety is important.”

Expectations: I expect to learn about the matter of plagiarism.

Book Review: The author of this chapter is John Snapper. In this chapter the topic is plagiarism. There are many of us still doesn’t know what plagiarism is, plagiarism is the act of action where we copy other person’s file and claim it as your own work. Plagiarism is not bad, but we have to put the citations where we copied the file itself. Because once the owner of the file sees his or her work which is being used by other people without citations, he or she will surely be furious, because they made use of the file without the permission of the owner.

Things I have learned: I learned that we have to have the permission of the owner before using the file.

Integrity Questions: 1.) What is plagiarism? 2.) What are the concept of plagiarism? 3.) What do we have to do if we copied other persons file? 4.) Who is the author of this chapter? 5.) What is authorization?

Part 5: Handbook of information and computer ethics. Chapter 23 Title: “Intellectual Property: Legal and Moral Challenges of Online File Sharing” by Richard A. Spinello

Quote: “Lost in the thicket of lawsuits and policy challenges are the ethical issues associated with the use and distribution of file sharing software.”

Expectations: I expect to learn about the intellectual property.

Book Review: The author of this chapter is Richard Spinello. He discussed the file sharing, file sharing can lessen the time where we can transfer files without standing that will cause us our precious time. We just have to use networking to be able to transfer files from a computer to another computer, we can also use email to store files and also to send. We don’t have to use and software to do networking, we just need the internet or a networking cable to be able to transfer files.

Things I have learned: I learned that the networking can do easier task for us.

Integrity Questions: 1.) What is networking? 2.) What is peer to peer network? 3.) What is sharing or theft? 4.) What is secondary liability? 5.) Who is Richard Spinello?

Part 6: Handbook of information and computer ethics. Chapter 24 Title: “Censorship and Access to Expression” by Kay Mathiesen

Quote: “One might hope that work in law or philosophy might provide the answer.However, the concept of “censorship” is commonly used in ways that go much beyond the strict confines of First Amendment law.”

Expectations: I expect to learn about the cencorship and how to access to expression.

Book Review: The author of this chapter is Kay Mathiesen. In this chapter cencorship was discussed, from what I have read, it says that there is no one who wants to be a censor or no one wants to be called as a censor. There are many people who are interested in this topic since it is one of the attraction for them. What does censorship really means, it is the limitation access to a content. Censorship are harmful.

Things I have learned: I learned that censorship is a really bad thing. Can’t really imagine how bad, but based on my readings they said it is really bad.

Integrity Questions: 1.) What is censorship? 2.) Is censorship a bad or a good thing? 3.) What does censorship do? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 6: Handbook of information and computer ethics. Chapter 25 Title: “The Gender Agenda in Computer Ethics” by Alison Adam

Quote: “The recognition of continuing differences between men and women lots, at home, in the workplace, and in education, even in societies that have seen considerable opening up of opportunities for women in the space of a generation or so, has been a major force in developing contemporary feminist writing.”

Expectations: I expect to learn about the gender agenda in computer ethics.

Book Review: The author of this chapter is Alison Adam. Based on my understandings, the issue in this chapter is based on gender. It is said that “it is the major way of classifying and ordering our world has been propounded by a number of authors, mainly, although not exclusively, writing from a feminist position”. I can say that it is based on the authors, on how they put everything together and make something out of it.

Things I have learned: I learned that the gender in this chapter is one of the major topic which was discussed.

Integrity Questions: 1.) What does gender have to do in this chapter? 2.) What is feminist ethics? 3.) What are the studies of gender and computer ethics can be related to this chapter? 4.) Who is the author of this chapter? 5.) What do we get from this chapter?

Part 6: Handbook of information and computer ethics. Chapter 26 Title: “The Digital Divide: A Perspective for the Future” by Maria Canellopoulou-Bottis and Kenneth Einar Himma

Quote: “In the developing world, poverty and the suffering it causes is considerably worse. Here poverty is characteristically “absolute” in the sense that people do not have enough to consistently meet their basic needs.”

Expectations: I expect to learn about the digital divide which tackles the topic a perspective for the future.

Book Review: The author of this chapter are Maria Canellopoulou-Bottis and Kenneth Einar Himma. They discussed the global distribution which will bother some conscientious individuals. Since the rate of money in our country is not consistent, it would suddenly rise or fall. We have to do something about it, to think carefully what to do in the mere future, being an information technology person can be helpful, we can use our knowledge on what we have learned and apply it to our work to be able to make the money growth normal in our country.

Things I have learned: I learned that the poverty could be such a scary thing if that really happens to us.

Integrity Questions: 1.) What is poverty? 2.) What is global distribution? 3.) How can we lessen the poverty? 4.) What can we do to help the poor? 5.) Who is the author of this chapter?

Part 6: Handbook of information and computer ethics. Chapter 27 Title: “Intercultural Information Ethics” by Rafael Capurro

Quote: “The distinction between cognitivism and noncognitivism presupposes that human emotions have no cognitive value and, vice versa, that human cognition has a truthvalue if and only if it is free of emotions.”

Expectations: I expect to learn about the intercultural information ethics.

Book Review: The author of this chapter is Rafael Capurro. Rafael discussed the cultural part where intercultural information ethics has been occurred. There were frameworks were the cultured country has been surrounded by the common culture thru experience of existence in the world. They follow some traditions since they were given birth by their ancestors. Computer ethics can be followed in this chapter by means of cultivating plans or by traditions.

Things I have learned: I learned that the culture can be affected by means of computer ethics.

Integrity Questions: 1.) Who is Toru Nishigaki? 2.) What is culture? 3.) Who is Terrell Ward Bynum? 4.) Who is Bernd Frohmann? 5.) Who is Lorenzo Magnani?

Related Documents

Handbook Of Ethics
May 2020 11
Ethics Handbook 2008
June 2020 33
Ethics
November 2019 43
Ethics
April 2020 40
Ethics
April 2020 36
Ethics
November 2019 47

More Documents from "api-3700579"