Itethics Reader

  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Itethics Reader as PDF for free.

More details

  • Words: 32,838
  • Pages: 156
iTeTHiCS ReaDer BY JiNNo RaFaeL a. MaLaBaNaN To SiR PauL PaJo

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License.

1

This book is dedicated to you. It contains three different books: The Cyber Ethics, The Handbook of Information and Computer Ethics And The Bottom of the Pyramid

2

CONTENTS

Cyber Ethics …….. 4 – 93 The Handbook of Information and Computer Ethics …….. 94 - 142 The Bottom of the Pyramid …….. 143 - 156

3

The CYBeR eTHiCS

4

Book: Cyber Ethics Chapter 1: ETHICS AND THE INFORMATION REVOLUTION Quote: The information stored in the world's libraries and computers doubles every eight years. In a sense the computer age and the information age seem to go hand in hand Learning Expectation: It also underlies the study of ethics in the cyberspace and the significance of understanding the effect of computer to mankind. Furthermore, I am expecting to learn about how the information in the cyberspace is being used. Review: First, there is the problem of establishing penalties of computer crime. Typically, intellectual property has a different status in our criminal justice system. Legal scholars should evaluate the notion that ideas and information need not be protected in the same way as property. Legislators need to enact computer information protection laws that will deter criminals, or even curious computer hackers, from breaking into confidential records. The impact of computers on our society was probably best seen when in 1982 Time magazine picked the computer as its "Man of the Year," actually listing it as "Machine of the Year." It is hard to imagine a picture of the Spirit of St. Louis or an Apollo lander on the magazine cover under a banner "Machine of the Year." This perhaps shows how influential the computer has become in our society. The information stored in the world's libraries and computers doubles every eight years. In a sense the computer age and the information age seem to go hand in hand. Enforcement will also be a problem for several reasons. One reason is the previously stated problem of jurisdiction. Another is that police departments rarely train their personnel in computer abuse and fraud. Computer fraud also raises questions about the role of insurance companies. How do companies insure an electronic asset? What value does computer information have? These 5

questions also need to be addressed in the future. The rapid development and deployment of computing power however has also raised some significant social and moral questions. People in this society need to think clearly about these issues, but often ignore them or become confused. Lesson Learned: We must be conscious on what information we would like to divulge about ourselves for self-preservation purposes. I have learned that the computer technologies do not constitute a safe medium of providing relevant information that could be used by different government agencies. Integrative Questions: What is Cyber ethics? How do you understand the concepts of ethics in the cyberspace? What are the tips in order to protect relevant information about you? How is information being distributed to interested parties? What is the important of cyber ethics?

6

Book: Cyber Ethics Chapter 2: ETHICS ON-LINE Quote: Medical services and many other necessities of life move more and more into cyberspace, will gaps between the rich and the poor become even worse. Lesson Expectation: On-line communications do not only encompass communicating along with other people. I would like to learn the laws governing on-line communications. Review: The answers to many ethical questions depend on answers to questions in metaphysics and other areas of human thought. Furthermore, philosophers have been concerned to establish links between the ethical sphere of life itself and other spheres. Some philosophers have, for philosophical reasons, had doubts about whether philosophy provides anyway the best approach to ethics. And even those who believe philosophy has a contribution to make may suggest that ethical justification must refer outside philosophy to common sense beliefs or real-life examples. A central task of philosophical ethics is to articulate what constitutes ethics or morality. This project is that of meta-ethics. What is it that especially constitutes the moral point of view as opposed to others? Some argue that what is morally required is equivalent to what is required by reason overall, whereas others see morality as providing just one source of reasons. Yet others have suggested that all reasons are self-interested, and that concern for others is ultimately irrational. However, with the Internet as a new method of distributing information, many of these intellectual property laws were challenged. Very few people would photocopy and sell pages from books, for example, but what about copying and selling computer programs? It's very much the same thing. Computer programs are protected exactly the same way as books, so if people distribute programs without the author's permission, it is illegal. This isn't the biggest problem, however. Most people on their home computers don't 7

copy programs, so this is only an issue with very knowledgeable people, or large bootleggers; not an issue for everyday people. What is an important issue, though, is the illegal copying of information on the Internet . Lesson Learned: Most of the crime being committed is stealing private property of one another. Even the identity of these people could be stolen as well. Integrative Questions: What is on-line ethics? How on-line ethics is describes? What are the crimes being committed when on-line? How this on-line ethics controlled by the law? What are the laws that govern on-line activities?

8

Book: Cyber Ethics Chapter 3: REASON, RELATIVITY, AND RESPONSIBILITY AND COMPUTER ETHICS QUOTE: The stakes are much higher, and consequently considerations and applications of Information Ethics must be broader, more profound and above all effective in helping to realize a democratic and empowering technology rather than an enslaving or debilitating one. Learning Expectation: If we can avoid policies that result in significant harm to others, that would be a good beginning toward responsible ethical conduct. Some policies are so obviously harmful that they are readily rejected by our core-value standards. Review: It is the same sort of pyramid scheme that exists over telephone or mail, but no laws covered it for a while. Also, many email chain letters have allowed urban legends to spread at an accelerated rate and created alarm over hoaxes concerning many food and drug products. These emails only bog down email systems and servers, but do not seem to be ending. Morality must play catch-up to technology that has leap-frogged ahead. Without a knowledge of computer ethics, you will not be fully equipped to enter the new world of online society - and you will need to enter that world, whether you choose a career in art, programming, business, or anything else. What is difficult to comprehend is what impact this will have on human life. Surely, some of the effects will be quite positive and others quite negative. With the newly acquired advantages of computer technology, few would want to put the genie completely back into the bottle. Aspects of the computer revolution will continue to spring up in unpredictable ways.

9

Lesson Learned: Other policies easily meet our standards. Building computer interfaces which facilitate use by the disabled is a clear example. And of course, some policies for managing computer technology will be disputed. However, as I have been emphasizing, some of the ethical policies under dispute may be subject to further rational discussion and resolution. Integrative Question: Who is Terry Bynum? What is the role of responsibility in computer ethics? Why is reason and relativity significant in the daily aspect of computer technology? How is computer ethics being practice? How is computer informational enriching?

10

Book: Cyber Ethics Chapter 4: DISCLOSIVE COMPUTER ETHICS Quote: Ethics is always and already the 'other' side of politics. (Critchley 1999) Learning Expectation: More particularly, we are concerned with the way in which the interest of some become excluded through the operation of closure as an implicit and essential part of the design of information technology and its operation in social-technical networks. Review: In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important. Computers provide us with new capabilities and these in turn give us new choices for action. Often, either no policies for conduct in these situations exist or existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, i.e., to formulate policies to guide our actions. Of course, some ethical situations confront us as individuals and some as a society. Ethics is always and already the 'other' side of politics (Critchley 1999). When we use the term 'politics' (with a small 'p')--as indicated above--we refer to the actual operation of power in serving or enclosing particular interests, and not others. For politics to function as politics it seeks closure--one could say 'enrolment' in the actor network theory language. Decisions (and technologies) need to be made and programmes (and technologies) need to be implemented. Without closure politics cannot be effective as a programme of action and change. Obviously, if the interests of the many are included--in the

11

enclosure as it were--then we might say that it is a 'good' politics (such as democracy). If the interests of only a few are included we might say it is a 'bad' politics (such as totalitarianism). Nevertheless, all political events of enclosing are violent as they always include and exclude as their condition of operation.

Lesson Learned: We can also see it as an ongoing operation of 'closing'--where the possibility for suggesting or requesting alternatives is progressively excluded. And finally, we can see it as 'enclosed' in as much as the artifacts become subsumed into larger socio-technical networks from which it becomes difficult to 'unentangle' or scrutinize.

Integrative Questions: What is disclosive computer ethics? How is computer ethics affects the politics? Who is Phillip Brey? What is totalitarianism? What is the rule of disclosive ethics in our society?

12

Book: Cyber Ethics Chapter 5: GENDER AND COMPUTER ETHICS Quote: Although I do not want to belabour this point here, it is worth noting that ‘mainstream’ ICTs studies have tended to view the idea of gender as an analytical dimension as, at best, something to be added on after the main business. Dutton, 1996). Lesson Expectation: The study will further help me to understand the role of the women in cyber technology. It will also help me define gender issues in the computer technology. In addition, what are the laws that are being implemented to protect the well-being of the women. Review: While pornography had been traded over the Internet since the 1980s, it was the invention of the World Wide Web in 1991 as well as the opening of the Internet to the general public around the same time that led to an explosion in online pornography. It also allows access to pornography by people whose access is otherwise restricted for legal or social reasons.Looking toward other more radical approaches to ethics throws into relief the question of power structures in relation to our use of information technology. Gender and technology studies have proved successful in exposing power relations in the development and use of technologies. At the same time, major developments in feminist ethics over the last two decades, particularly in terms of Gilligan’s (1982) ‘ethic of care’ make this an area at least as important as computer ethics in terms of overall contribution to philosophical ethics. I claim that bringing feminist ethics to bear on computer ethics offers a novel and fruitful alternative to current directions in computer ethics in two major ways: firstly in revealing continuing inequalities in power and where liberal approaches to power do not work; and secondly, in

13

offering an alternative, collective approach to the individualism of the traditional ethical theories encapsulated in computer ethics. Nowhere are these issues more important than in thinking about gender and computing in a networked age. This is a well recognized phenomenon. Recognizing it is one thing; suggesting what to do about it is quite another. But I argue that the sort of liberal, inclusive, consultative measures, already becoming enshrined in computing bodies’ codes of ethics and other policy documents, may not have the effect of properly involving women users in decision making about computer systems and women in computing in general, despite the will to do so. Lesson Learned: Through the spread of pornography, women became vulnerable to men. It is about time that the government should implement grave laws to preserve women as they are. We must be able to implement laws that would not discredit the people in the internet, most specially the women. Integrative Questions: What is pornography? How pornography affects the internet in as social life? How women were harassed on-line? What are the laws governing pornography? What are the effects of pornography to mankind?

14

Book: Cyber Ethics Chapter 6: IS THE GLOBAL INFORMATION INFRASTRUCTURE A DEMOCRATIC TECHNOLOGY? Quote The world is slowly witnessing the development of the global information infrastructure (GII), a seamless web of communication networks, computers, databases and consumer electronics that will put vast amounts of information at user's finger tips (United States. Information Infrastructure Task Force 1994). Lesson Expectation: Furthermore, to be able to identify the uses of information infrastructure. In addition, to define global information infrastructure and its effect to democracy. Review: The Internet has made possible entirely new forms of social interaction, activities and organizing, thanks to its basic features such as widespread usability and access. Social networking websites such as Facebook and MySpace have created a new form of socialization and interaction. Users of these sites are able to add a wide variety of items to their personal pages, to indicate common interests, and to connect with others. It is also possible to find a large circle of existing acquaintances, especially if a site allows users to utilize their real names, and to allow communication among large existing groups of people. Sites like meetup.com exist to allow wider announcement of groups which may exist mainly for face-to-face meetings, but which may have a variety of minor interactions over their group's site at meetup.org, or other similar sites. In democratic societies, the Internet has achieved new relevance as a political tool. The presidential campaign of Howard Dean in 2004 in the United States became famous for its ability to generate donations via the Internet. Many political groups use the Internet to achieve a whole new method of organizing, in order to carry out Internet activism. 15

Many countries, including the United States, have enacted laws making the possession or distribution of certain material, such as child pornography, illegal, but do not use filtering software. There are many free and commercially available software programs with which a user can choose to block offensive websites on individual computers or networks, such as to limit a child's access to pornography or violence. See Content-control software. The Internet has been a major source of leisure since before the World Wide Web, with entertaining social experiments such as MUDs and MOOs being conducted on university servers, and humor-related Usenet groups receiving much of the main traffic. Today, many Internet forums have sections devoted to games and funny videos; short cartoons in the form of Flash movies are also popular. Over 6 million people use blogs or message boards as a means of communication and for the sharing of ideas. Lesson Learned: It is simply not one solid or static thing. And despite the many differences which exist from culture to culture and country to country, the globalization of information provides opportunities for a better understanding of all of these. Therefore, despite cultural differences, certain universal understandings of ethical concepts are possible and universal rules can be reached to govern this new global village of sorts. Integrative Questions: What is global information infrastructure? What is the effect of global information infrastructure to democracy? What are the uses of global information infrastructure? Are all nations benefited by global information infrastructure? How is global information infrastructure being distributed?

16

Book: Cyber Ethics Chapter 7: APPLYING ETHICAL AND MORAL CONCEPTS AND THEORIES TO IT ETHICS: KEY PROBLEMS AND CHALLENGES Quote: We are but whirlpools in a river of ever-flowing water. We are not stuff that abides, but patterns that perpetuate themselves. (Wiener 1954) Lesson Expectation: “Computer and information ethics”, in the broadest sense of this phrase, can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts of ICT. The present essay concerns this broad new field of applied ethics. Review: These “policies” — to borrow a helpful word from Moor (1985) — constitute a “received policy cluster”; and in a reasonably just society, they can serve as a good starting point for developing an answer to any information ethics question. Wiener's methodology is to combine the “received policy cluster” of one's society with his account of human nature, plus his “great principles of justice”, plus critical skills in clarifying vague or ambiguous language. In this way, he achieved a very effective method for analyzing information ethics issues. Cyberethics, also referred to as internet ethics, is a branch of ethics that studies the ethical dilemmas brought on by the emergence of digital technologies. With the advent of the internet conflicts over privacy, property, security, accuracy, accessibility, censorship and filtering have arose. Since then, controversy over who or what should be responsible for governing and maintaining ethical conventions in cyberspace have been heatedly debated, ruled upon and amended. Despite being a universal topic, cyberethics may change from country to country, where cultural and societal ethics may differ and therefore are reflected in the debates over the ethics of cyberspace. With the speed at which the internet changes, cyberethics evolves as well. 17

Although he coined the name “cybernetics” for his new science, Wiener apparently did not see himself as also creating a new branch of ethics. As a result, he did not coin a name like “computer ethics” or “information ethics”. These terms came into use decades later. (See the discussion below.) In spite of this, Wiener's three relevant books (1948, 1950, 1963) do lay down a powerful foundation, and do use an effective methodology, for today's field of computer and information ethics. His thinking, however, was far ahead of other scholars; and, at the time, many people considered him to be an eccentric scientist who was engaging in flights of fantasy about ethics. Apparently, no one — not even Wiener himself — recognized the profound importance of his ethics achievements; and nearly two decades would pass before some of the social and ethical impacts of information technology, which Wiener had predicted in the late 1940s, would become obvious to other scholars and to the general public. Lesson Learned: According to Wiener's metaphysical view, everything in the universe comes into existence, persists, and then disappears because of the continuous mixing and mingling of information and matter-energy. Living organisms, including human beings, are actually patterns of information that persist through an ongoing exchange of matter-energy. Thus, he says of human beings,We are but whirlpools in a river of ever-flowing water. Integrative Questions: What is moral ethics? Who is Norbert Wiener? What is cybernetics? What is information revolution? Who is the author of God and Golem, Inc.?

18

Book: Cyber Ethics Chapter 8: JUST CONSEQUENTIALISM AND COMPUTING Quote: Computer ethics is a field of professional ethics concerned with issues of responsibilities and conduct for computer professionals. Gotterbarn (1991). Lesson Expectation: Because of the global impact of computing in recent years, and because of the merging of computing and communications technologies that has also recently occurred, the field of computer ethics might be perceived as one that is currently in a state of flux or transition. Review: It is even plausible to think of communities of intelligent agents, inhabiting cyberspace, interacting with other entities (agents, human users and hosts) and in this way developing a social life. This raises issues concerning information security as well as the ethical and social behaviour of intelligent agents. The simplest form of consequentialism is classical (or hedonistic) utilitarianism, which asserts that an action is right or wrong according to whether it maximizes the net balance of pleasure over pain in the universe. The consequentialism of G.E. Moore, known as “ideal utilitarianism,” recognizes beauty and friendship, as well as pleasure, as intrinsic goods that one's actions should aim to maximize. According to the “preference utilitarianism” of R.M. Hare (1919–2002), actions are right if they maximize the satisfaction of preferences or desires, no matter what the preferences may be for. Consequentialists also differ over whether each individual action should be judged on the basis of its consequences or whether instead general rules of conduct should be judged in this way and individual actions judged only by whether 19

they accord with a general rule. Computer users may be classified as either aware or unaware of security aspects. The former group mistrusts unfamiliar agents while the latter group are not at all aware of potential security risks associated with agent computing. A framework to analyse the security risks of agent computing will create and raise awareness of how secure agents are. Intuitive assessment of agent behaviour may be misleading and it can be argued that a systematic ethical analysis will provide a more reliable basis for assessment. For example the actions of Clippy may be considered as unethical by an expert user due to Clippy’s obtrusive character – however the systematic ethical analysis of Clippy’s actions in section 4.2, reveals that Clippy’s actions can at most be considered irritating, but certainly not unethical. Lesson Learned: Regarding the contemplation, and in particular the performance of some action, one would thus need to determine whether unjust means would be required to facilitate performance of the action by the user, the agent or the host. Therefore, if it is not possible to achieve the envisaged end (performance of the action) without utilizing unjust means, the requirement of just consequentialism is not satisfied. Integrative Questions: Who is Deborah Johnson? Who is James Moor? What is computer ethics? Why are computers malleable according to Moor? What are the uses of computer?

20

Book: Cyber Ethics Chapter 9: The Internet as Public Space: Concepts, Issues and Implications in Public Policy Quote: "A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used" (Moor, 2000). Lesson Expectation: It is furthermore important to consider privacy in the computer context as a delicate subject. The paper will aim to answer the question regarding the internet as a public space. Review: Anyone can find ways to publish a web page, a blog or build a website for very little initial cost. Publishing and maintaining large, professional websites full of attractive, diverse and up-to-date information is still a difficult and expensive proposition, however. Many individuals and some companies and groups use "web logs" or blogs, which are largely used as easily updatable online diaries. Some commercial organizations encourage staff to fill them with advice on their areas of specialization in the hope that visitors will be impressed by the expert knowledge and free information, and be attracted to the corporation as a result. Collections of personal web pages published by large service providers remain popular, and have become increasingly sophisticated. Whereas operations such as Angelfire and GeoCities have existed since the early days of the Web, newer offerings from, for example, Facebook and MySpace currently have large followings. These operations often brand themselves as social network services rather than simply as web page hosts. Advertising on popular web pages can be lucrative, and e-commerce or the sale of products and services directly via the Web continues to grow.

21

More recently, websites are more often created using content management or wiki software with, initially, very little content. Contributors to these systems, who may be paid staff, members of a club or other organisation or members of the public, fill underlying databases with content using editing pages designed for that purpose, while casual visitors view and read this content in its final HTML form. There may or may not be editorial, approval and security systems built into the process of taking newly entered content and making it available to the target visitors. Public places to use the Internet include libraries and Internet cafes, where computers with Internet connections are available. There are also Internet access points in many public places such as airport halls and coffee shops, in some cases just for brief use while standing. Lesson Learned: If you take precautions (such as forcing people to log in with laborious security measures) then I'd argue perhaps your private areas could be effected - you can't very well argue you stumbled inadvertently into an area that forces you to log in with a secure password). If you end up offended. However, if crimes are committed there, especially against children, I will support law enforcement in stringing up your sorry tuck us - online or not. Integrative Questions: What is internet? What is internet ethics? What must we realize about internet being a public space? What is computer ethics? What are the laws implemented to safeguard privacy in the computer world?

22

Book: Cyber Ethics Chapter 10: The Laws of Cyberspace Quote: "The telecoms are too large, too heterogeneous, too turbulent, too creatively chaotic to be governed wholesale, from the top down," (Huber) Lesson Expectation: If we are trying to create a genuine dialog about ethical values and ethical reasons in the multicultural internet world, we cannot be bound solely to this tradition, because, Chinese and Indians have engaged in ethical thought and ethical reasoning and the grounds for the resolution of their ethical dilemmas may or may not be the same as those offered in Western society. Review: The new book lays down the possible parameters for a Law of Cyber-Space, and argues in favour of starting negotiations with the full participation of the three concerned stakeholders, namely, the governments, the private sector, and civil society. Kamal believes that, in many ways, the current situation in cyber-space is similar to the problems once faced on the open ocean, where the absence of any jurisdiction or consensus legislation had also created a lawless situation. The international community finally woke up to the challenge, and started negotiations on the Law of the Sea. Those negotiations went on for almost a decade before they succeeded and Kamal writes that the world is much better off as a result. Kamal asserts that in the case of cyber-space the challenge appears to be far greater; "The speed of change is phenomenal, new shoals and icebergs appear every day, the dangers affect all countries without exception, yet global responses are sporadic or non-

23

existent. That is why a globally negotiated and comprehensive Law of Cyber-Space is so essential." What will be sketched here is a brief summary of the strands that have now come to make up information ethics. In fact, it can now be seen as a confluence of the ethical concerns of media, journalism, library and information science, computer ethics (including cyberethics), management information systems, business and the internet. In the process of showing this evolution, several bibliographic references will be highlighted, although given the brevity of this article, the set of references provided is in not intended to be comprehensive. It offers a fantastically quick access to information and communication by e-mails and is quite literally at our fingertips. However, it has its downside too-among them are spam, viruses, identity theft, malicious code, cyber-stalking and intellectual property violations. Lesson Learned: Law and Disorder in Cyberspace presents a thesis revolutionary in the truest sense of the word: it argues for overthrowing the existing corrupt order by returning to earlier, better, more fundamental values. So defiant a book naturally reads, to quote its dust jacket, as a "polemic." Yet Law and Disorder in Cyberspace merits serious attention from scholars and policy wonks. Huber makes a strong case for abolishing the FCC and relying on common law to rule the telecosm. The flaws of Law and Disorder in Cyberspace make it not irrelevant, but all the more interesting. Integrative Questions: What are the laws of cyberspace? Who is Kellogg Huber? Who is Kamal? What are the means of implementing the laws of cyberspace? What is cybernetics? 24

Book: Cyber Ethics Chapter 11: Of Black holes and decentralized Law-Making in Cyberspace Quote: We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns--the ones we don't know we don't know. (Rumsfeld, 2002) Lesson Expectation: A three part approach inspired by the Carl Mitcham's philosophy of technology has been employed. Each section has touched on some ideas whose elucidation are in no way complete Review: An excellent example is the 2007 North American meeting of IACAP, which keynoted free software and open access. The argumentative approach I have selected is borrowed from the philosophy of technology, in particular the work of Carl Mitcham and Andrew Feenberg, to present practical and moral advantages of the FOS option. Finally, I will offer a third approach based on its potential epistemological advantages. James Moor suggested that "conceptual muddles" and "policy vacuums" exist where there are problems lacking a philosophical framework to address them, and this is particularly true of computer technology (Moor, 1985). Likewise, Walter Maner proposed that innovations in computer technology create unique, new ethical problems (Maner, 1995). For years, this conceptual vacuum has been filling with the musings of self-proclaimed accidental revolutionaries like Richard Stallman, Eric Raymond, and Linus Torvalds, the creator of the Linux kernel, as well as industry leaders like Bill Gates and Tim O'Reilly. James Moor suggested that "conceptual muddles" and "policy vacuums" exist where there are problems lacking a philosophical framework to address them, and this is particularly true of computer technology (Moor, 1985). Likewise, Walter Maner proposed that innovations in computer technology create unique, new ethical problems (Maner, 1995). For years, this 25

conceptual vacuum has been filling with the musings of self-proclaimed accidental revolutionaries like Richard Stallman, Eric Raymond, and Linus Torvalds, the creator of the Linux kernel, as well as industry leaders like Bill Gates and Tim O'Reilly. In Thinking through Technology: the Path between Engineering and Philosophy, Carl Mitcham introduced the Engineering Philosophy of Technology (EPT) as the field of study focused on determining the best way to conduct engineering and technological endeavors (Mitcham, 1994). This work is from the insider's perspective, and the obvious starting point to transfer insights from the technical arena to the academic study of FOSS. There is a ready set of commonly cited practical benefits supported by empirical research as well as the methodologies used to evaluate, organize, and execute such projects (Lerner and Tirole, 2005). Lesson Learned: Software piracy is very tempting due to the relatively high cost of commercial applications, the easy transfer of digital information, and the lack of a perception of doing harm. Software piracy is especially common among curious academics and hobbyists Integrative Question: Why not avoid the moral dilemma by selecting FOSS? What is the FOS option? Who is Walter Maner? Who is James Moor? Who is Deborah Johnson?

26

Book: Cyber Ethics Chapter 12: Fahrenheit 451.2: Is Cyberspace Burning? Quote: Any content-based regulation of the Internet, no matter how benign the purpose, could burn the global village to roast the pig." U.S. Supreme Court majority decision, Reno v. ACLU (June 26, 1997) Lesson Expectation: A proposal that we rate our online speech is no less offensive to the First Amendment than a proposal that publishers of books and magazines rate each and every article or story, or a proposal that everyone engaged in a street corner conversation rate his or her comments. But that is exactly what will happen to books, magazines, and any kind of speech that appears online under a self-rating scheme. Review: The concept began with Bradbury's short story "Bright Phoenix," written in 1947 but first published in the Magazine of Fantasy and Science Fiction in 1963. The original short story was reworked into the novella, The Fireman, and published in the February 1951 issue of Galaxy Science Fiction. The novel was also serialized in the March, April, and May 1954 issues of Playboy magazine. Bradbury wrote the entire novel on a pay typewriter in the basement of UCLA's Powell Library. His original intention in writing Fahrenheit 451 was to show his great love for books and libraries. Fahrenheit 451 is a dystopian speculative fiction novel authored by Ray Bradbury and first published in 1953. The novel presents a future American society in which the masses are hedonistic, and critical thought through reading is outlawed. The central character, Guy Montag, is employed as a "fireman" (which, in this future, means "book burner"). The number "451" refers to the

27

temperature (in Fahrenheit) at which the books burn when the "firemen" burn them "for the good of humanity". Written in the early years of the Cold War, the novel is a critique of what Bradbury saw as an increasingly dysfunctional American society. Bradbury has stated that the novel is not about censorship; he states that Fahrenheit 451 is a story about how television destroys interest in reading literature, which leads to a perception of knowledge as being composed of "factoids", partial information devoid of context, e.g., Napoleon's birth date alone, without an indication of who he was. Lesson Learned: People from all corners of the globe people who might otherwise never connect because of their vast geographical differences can now communicate on the Internet both easily and cheaply. One of the most dangerous aspects of ratings systems is their potential to build borders around American- and foreign-created speech. It is important to remember that today; nearly half of all Internet speech originates from outside the United States. Integrative Questions: What are the six reasons why self-rating schemes are wrong for the Internet? What is self- rating Schemes? Internet Ratings Systems How Do They Work Who is Ray Bradbury? Is cyberspace burning?

28

Book: Cyber Ethics Chapter 13: Filtering Internet in the USA: Is Free Speech Denied? Quote: To give up the fight, without exhausting our defenses, could cost the surrender of our "soul". (Leo Tolstoy) Lesson Expectation: However, that same ease in accessing information is a "double-edged sword" Perhaps you are now aware how the internet has empowered us to access vast body of information so easily. “-- it enabled others also to invade our privacy just as easily. Review: Filtered Internet - Other so called internet filtering companies say that they will protect your home. Put our Filtered Internet filtering up against theirs and other companies will be found lacking... Do not just consider filtering for your home, but for your Church, Work, and School... Sign up as an affiliate or become a reseller and have our services branded in your organizations name and offer Filtered Internet. Content-control software, also known as censor ware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web. Content-control software determines what content will be available on a particular machine or network; the motive is often to prevent persons from viewing content which the computer's owner(s) or other authorities may consider objectionable; when imposed without the consent of the user, content control can constitute censorship. Common use cases of such software include parents who wish to limit what sites their children may view from home computers, schools performing the same function with regard to computers found at school, and employers restricting what

29

content may be viewed by employees while on the job. Some content-control software includes time control functions that empowers parents to set the amount of time that child may spend accessing the Internet or playing games or other computer activities. While many have seen the danger of such invasion of privacy from the government, we fail to recognize or prefer to ignore a greater source of intrusion to our privacy -- private companies and institutions (many we do not suspect), including "non-profit" organizations, medical institutions, etc. Tracking the behavior of individuals and groups has been a preoccupation of social scientists, poll takers, the advertising industry and all companies that have something to sell. However, previous studies or "ratings" usually just involved a small "statistical sample" of a population. With the coming of the internet and increasing power of computers in terms of speed, automation and storage capacity, it is now theoretically possible to monitor the behavior of every individual connected to the internet. Lesson Learned: If all of us who care about these issues can band together, we may be able to shape the future of the internet so that we can create an internet community that would be more respecting of our privacy and humanity. This is almost a quixotic goal and many of my friends have dissuaded me from embarking on such path. Integrative Questions: What is freedom of speech? Who is Leo Tolstoy? What is Internet? What is privacy? How internets do invades our privacy?

30

Book: Cyber Ethics Chapter 14: Censorship: The Internet and the Child Pornography Law of 1996: A Critique Quote: When the law speaks universally, then, and a case arises on it which is not covered by the universal statement, then it is right, where the legislator fails us and has erred by oversimplicity, to correct the omission—to say what the legislator himself would have said had he been present, and would have put into his law if he had known (Aristotle) Learning Expectation: The ‘net gives all of its users a vast expressive power if they choose to take advantage of it. Therefore, courts, when examining whether material is obscene, consider whether the material tends to "deprave or corrupt" people who are likely to use the material. The focus on the consumer of the material has been criticized on the grounds that it fails to acknowledge harms to the non-consumers of the material like women. Review: Therefore, this effort to protect privacy is a notable free speech issue. Intellectual property rights are also tantamount to restrictions on free speech. If someone has property rights to a trademark, others cannot use that form of expression freely. Finally, one way in which users seek to secure their data is encryption, but encryption in the wrong hands could be a threat to national security, and therefore, many argue that encryption needs to be subject to government control. As a result, the issue of free speech and content control in cyberspace has emerged as arguably the most contentious moral problem of the nascent Information Age. Human rights such as free speech have taken a place of special prominence in this century. In some respects, these basic rights now collide with the state’s inclination to reign in this revolutionary power enjoyed by Internet users. Although the United States has sought to suppress on line

31

pornography, the target of some European countries, such as France and Germany, has been hate speech. In addition, speech is at the root of most other major ethical and public policy problems in cyberspace, including privacy, intellectual property, and security. These three issues are discussed in future chapters where the free speech theme continues to have considerable saliency. Lesson Learned: For example, as a result of New York v. Ferber, the Miller obscenity standard does not apply because the Supreme Court ruled that child pornography is by definition obscene (Akdeniz 1996). The court took this stand for a number of reasons. First, the production of such pornography with children as subjects is harmful to them; second, the value of the material is negligible at best; and third, the distribution of child pornography is inseparable from its role in the abuse of children (Akdeniz 1996). Integrative Question: What is Pornography? Who is Raymond Gastil? Who is Leo Groarke? Who is Loren Clark? What is Communication Decency Act?

32

Book: Cyber Ethics Chapter 15: PICS: INTERNET ACCESS CONTROLS WITHOUT CENSORSHIP Quote: Restricting inappropriate materials at their source is not well suited to the international nature of the Internet, where an information source may be in a different legal jurisdiction than the recipient. Moreover, materials may be legal and appropriate for some recipients but not others, so that any decision about whether to block at the source will be incorrect for some audiences. (Paul Resnick) Lesson Expectation: The developers, a group of computer scientists and software manufacturers, promoted PICS as "Internet Access Controls without Censorship". PICS publicity emphasized a multiplicity of rating systems, voluntary self-rating and labeling by content providers and blocking software installed on home computers. Review: It does not specify how selection software or rating services work, just how they work together. PICS-compatible software can implement selective blocking in various ways. One possibility is to build it into the browser on each computer, as announced by Microsoft and Netscape. A second method-one used in products such as CyberPatrol and SurfWatch-is to perform this operation as part of each computer's network protocol stack. A third possibility is to perform the operation somewhere in the network, for example at a proxy server used in combination with a firewall. Each alternative affects efficiency, ease of use, and security. For example, a browser could include nice interface features such as graying out blocked links, but it would be fairly easy for a child to install a different browser and bypass the selective blocking. The network implementation may be the most secure, but could create a performance bottleneck if not implemented carefully. PICS does not specify how parents or other supervisors 33

set configuration rules. Even that amount of configuration may be too complex, however. Another possibility is for organizations and on-line services to provide preconfigured sets of selection rules. For example, an on-line service might team up with UNICEF to offer "Internet for kids" and "Internet for teens" packages, containing not only preconfigured selection rules, but also a default home page provided by UNICEF. Some clients might choose to request labels each time a user tries to access a document. Others might cache frequently requested labels or download a large set from a label bureau and keep a local database, to minimize delays while labels are retrieved. Lesson learned: Others regard that as the pot calling the kettle black. PICS was, after all, developed by people fearful of government censorship and who were apparently ignorant of the repressiveness of some governments. Integrative Question: What is PICS? What is Metadata? Who is Paul Resnick? What is Multiplicity Rating Systems? What is labeling?

34

Book: Cyber Ethics Chapter 16: Internet Service Providers and Defamation: New Standard of Liability Quote: A computerized database is the functional equivalent of a more traditional news vendor, and the inconsistent application of a lower standard of liability to the electronic news distributor such as CompuServe than that which is applied to a public library, book store, or newsstand would impose an undue burden on thefree flow of information. Pete Leisure Lesson Expectation: Where there is neither actual knowledge of the defamation nor awareness of any facts or circumstances from which a certain institution could reasonably have been expected to be aware of the defamation, and the institution has taken reasonable care in relation to publication of the statement in question, the defense is likely to be available to the institution. Review: Provider (ISP) Liability Overview paper considers the extent to which institutions are responsible for content which is made available on their computer systems. An Internet service provider (ISP, also called Internet access provider or IAP) is a company that offers its customer’s access to the Internet. The ISP connects to its customers using a data transmission technology appropriate for delivering Internet Protocol datagram, such as dial-up, DSL, cable modem or dedicated high-speed interconnects. ISPs may provide Internet e-mail accounts to users which allow them to communicate with one another by sending and receiving electronic messages through their ISPs' servers. (As part of their e-mail service, ISPs usually offer the user an e-mail client software package, developed either internally or through an outside contract arrangement.) ISPs may provide

35

other services such as remotely storing data files on behalf of their customers, as well as other services unique to each particular ISP. Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs for Internet access. An upstream ISP usually has a larger network than the contracting ISP and/or is able to provide the contracting ISP with access to parts of the Internet the contracting ISP by itself has no access to. In the simplest case, a single connection is established to an upstream ISP and is used to transmit data to or from areas of the Internet beyond the home network; this mode of interconnection is often cascaded multiple times until reaching a Tier 1 carrier. In reality, the situation is often more complex. ISPs with more than one point of presence (PoP) may have separate connections to an upstream ISP at multiple PoPs, or they may be customers of multiple upstream ISPs and may have connections to each one of them at one or more point of presence. Lesson learned: 'Distributors', such as bookstores or newsstands, exert very little if any editorial control, and have the benefit of the 'innocent disseminator' defense. Innocent disseminators are protected from liability for defamation if they did not know of the libelous statement, there were no circumstances that ought to have led them to suppose it contained a libel, and they were not negligent in being ignorant of the libel. Integrative Question: What is Internet Services Provider? What is defamatory publication? What is libel? What is pornography? What is Defamation Act of 1996? 36

Book: Cyber Ethics Chapter 17: Digital Millennium Copyright Act Quote: The legal power to create closed technology platforms and exclude competitors from interoperating with them. Worst of all, DRM technologies are clumsy and ineffective; they inconvenience legitimate users but do little to stop pirates. Timothy B. Lee Lesson Expectation: This article will further expand the meaning of Digital Millennium Copyrights Act. It will also highlight the importance of DMCA for the mankind. Likewise, it will also enumerate the disadvantages of the said act. Review: While working for Elcomsoft in Russia, he developed The Advanced eBook Processor, a software application allowing users to strip usage restriction information from restricted ebooks, an activity legal in both Russia and the United States. Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool. Sklyarov was arrested in the United States after presenting a speech at DEF CON and subsequently spent nearly a month in jail. The DMCA has also been cited as chilling to legitimate users, such as students of cryptanalysis (including, in a well-known instance, Professor Edward Felten and students at Princeton), and security consultants such as Niels Ferguson, who has declined to publish information about vulnerabilities he discovered in an Intel secure-computing scheme because of his concern about being arrested under the DMCA when he travels to the US. The DMCA has had an impact on the worldwide cryptography research community, since an argument can be made that any cryptanalytic research violates, or might violate, the DMCA.

37

Lesson Learned: The DMCA has been criticized for making it too easy for copyright owners to encourage website owners to take down allegedly infringing content and links which may in fact not be infringing. When website owners receive a takedown notice it is in their interest not to challenge it, even if it is not clear if infringement is taking place, because if the potentially infringing content is taken down the website will not be held liable.

Integrative questions: What is DMCA? What is copyright? What is cryptography? What are the provisions of DMCA? What are the advantages of DMCA?

38

Book: Cyber Ethics Chapter 18: Note on the DeCSS Trial Quote: "Our main goal," said Gross, "is to build a strong, solid record to take to the appeals court, where civil liberties are taken more seriously." Eric Corley Learning Expectation: Journalist Eric Corley -- better known as Emmanuel Goldstein, a nom de plume borrowed from Orwell's 1984 -- posted the code for DeCSS (so called because it decrypts the Content Scrambling System that encrypts DVDs) as a part of a story he wrote in November for the well-known hacker journal 2600. The Motion Picture Association of America (MPAA) claims that Corley defied anticircumvention provisions of the Digital Millennium Copyright Act (DMCA) by posting the offending code for anyone to download from his Website. Linux came to the forefront of the ongoing DeCSS trial late last week. That's because, in a very real way, Linux started the uproar that has resulted in eight movie studios suing Eric Corley. Review: The MPAA has since brought suit against him in his native Norway as well. Johansen testified on Thursday that he announced the successful reverse engineering of a DVD on the mailing list of the Linux Video and DVD Project (LiViD), a user resource center for video- and DVD-related work for Linux. The Electronic Frontier Foundation (EFF), an organization based in San Francisco which supports civil liberties in digital arenas, is providing a legal defense that cites, among other issues, fair use. After all, the EFF argues, if you buy a DVD, why can't you play it on any machine you want?

39

Lessons Learned: By taking his stand, Corley has brought key issues of the digital age to trial. Among them is the right to experiment and to share knowledge, he said. The case also points to the DMCA's broad protections, which for the first time not only give copyright to creative work but also to the software -- or any other technology -- that protects it. The judge in the case, the honorable Lewis Kaplan of the US District Court in southern New York, issued a preliminary injunction against posting DeCSS. Corley duly took down the code, but did not help his defense by defiantly linking to myriad sites which post DeCSS. Still open is the question of whether the injunction against Corley, or the fight against DeCSS itself, is not a vain struggle in the face of inevitable change. Judge Kaplan, whom the defense requested recuse himself based on conflict of interest, said last Thursday to Mikhail Reider, the MPAA's chief of Internet antipiracy, "You are asking me to issue an injunction against the guy who unlocked this barn, [telling him] not to unlock it again --- even though there is no horse in it." "It's good to see that [the judge] is realizing the futile nature of dealing with these issues this way," said Robin Gross, an EFF attorney and a member of the defense team. Though the MPAA may not be able to stop DeCSS, there are other issues at stake that are unrelated to digital piracy. Copyright is not the issue to supporters of the defense in this trial. Integrative Questions: What is DeCSS? What is Trial ? What is the copyright issue of the defense trial? Who is the Judge? What is the plans ?

40

Book: Cyber Ethics Chapter 19: A Politics of Intellectual Property: Environmentalism for the Net Quote: Without that balance, there is a danger of absolutizing the claims to ownership and control to the detriment of other interested parties, something we have noted in recent legislative proposals. Samuelson, 1997 Lesson Expectation: First it presents some cases that illustrate the range of possible intellectual property rights. Next it examines the traditional justifications for such rights. It then critiques those justifications, not to refute them, but to show their limits. Finally it proposes a different way of looking at the problem, using traditional natural law ethics. Review: The ink marks can be translated into regions of magnetic polarization on a computer disk, and the intellectual property, and whatever claims there are to that property, will be the same. The owner of a song claims control, not of the CD on which the song is recorded, but of the song itself, of where when and how it can be performed and recorded. But how can you build a fence around a song? What does it mean to "own" an idea? Where are the locks that keep other people from "driving" it?

Intellectual property is an odd notion, almost an

oxymoron. Property usually refers to tangible assets over which someone has or claims control. Originally it meant land. Now it could also refer to a car, a milling machine, a jacket or a toothbrush. In all these cases the property claim is of control of the physical entity. If I claim a plot of land as my property, I am saying I can control who has access to that land and what they do there. I can build a fence around it, rent it out, or drill for oil on it. If a car is my property, I get the keys to it. I can exclude others from using it and use it myself for whatever I want, as long as I do not threaten the lives or property of others. 41

It was only when inexpensive reproductions became feasible that it was seen as necessary to give authors more control over how their works were used by creating copyrights. Intellectual property has always been closely tied to technology. Technology arises from intellectual property in the form of new inventions. But technology also supports intellectual property by providing new, more powerful and more efficient ways of creating and disseminating writing, musical composition, visual art, and so on. Lesson learned: Computer technology has created a new revolution in how intellectual property is created, stored, reproduced and disseminated; and with that has come new challenges to our understanding of intellectual property and how to protect it. Of course computers have given rise to a whole new category of intellectual property, namely computer software. A major commercial program can take a team of one hundred or more highly skilled and highly paid programmers years to create and can sell for hundreds, or even hundreds of thousands, of dollars per copy. Integrative Question: What is intellectual property? What is information? What is copyright? What is plagiarism? What is computer technology?

42

Book: Cyber Ethics Chapter 20: Intellectual Property, Information, and the Common Good Quote: It seems that there must be a balance between the legitimate claims of the developers of intellectual products and the public's interest in their widest possible availability. (Samuelson, 1997) Lesson Expectation: For example facts that are commonly accessible cannot be owned by a few individuals just because they record them in a database. As another example, the sharing of design ideas and knowledge can increase efficiency in the integration and interoperation of different products, promote healthy competition, and lead to new ideas and greater creativity. Review: I can exclude others from using it and use it myself for whatever I want, as long as I do not threaten the lives or property of others. Intellectual property is different because its object is something intangible, although it usually has tangible expression. The intellectual property in a book is not the physical paper and ink, but the arrangement of words that the ink marks on the paper represent. The ink marks can be translated into regions of magnetic polarization on a computer disk, and the intellectual property, and whatever claims there are to that property, will be the same. The owner of a song claims control, not of the CD on which the song is recorded, but of the song itself, of where when and how it can be performed and recorded. Intellectual property is an odd notion, almost an oxymoron. Property usually refers to tangible assets over which someone has or claims control. Originally it meant land. Now it could also refer to a car, a milling machine, a jacket or a toothbrush. In all these cases the property claim is of control of the physical entity. If I claim a plot of land as my property, I am saying I can control who has access to that land and what they do there. I can build a fence around it, rent it out, or drill for oil on it. If a car is my property, 43

Technology arises from intellectual property in the form of new inventions. But technology also supports intellectual property by providing new, more powerful and more efficient ways of creating and disseminating writing, musical composition, visual art, and so on. In fact it was the technology of the printing press that originally gave rise to intellectual property as a legal and moral issue. Before, when it took almost as much of an effort to reproduce a document as it took to create it, there was little need to impose limits on copying. Lesson Learned: In general, then, I would claim there is a tendency to think that intellectual property is a place to apply our "public goods/incentives theory" rather than our "anti-monopoly/free-flow of information" theory. All by itself, this might push rhetoric and analysis towards more expansive property rights. The tendency is compounded, however, by two others. First, courts are traditionally much less sensitive to First Amendment, free speech and other "free flow of information arguments" when the context is seen as private rather than public, property rather than censorship. Integrative Question: What is intellectual property? What is politics? What is environmentalism? Who is James Boyle? What is public’s good theory?

44

Book: Cyber Ethics Chapter 21: Is Copyright Ethical Quote: A property right is the relationship between individuals in reference to things. Cohen (1935) Lesson Expectation: Is non-conformance with these laws a calculated risk against being caught, equivalent to parking at a meter beyond the specified time period, or is it a matter of ethics? This paper examines the relationship between intellectual property rights and ethics, focusing for the most part on copyright. The focus is on two key questions: 1) what is the relationship between ethics and copyright law and practice in the United States; and, 2) is the concept of private ownership of intellectual property inherently ethical? Review: Theoretically copyright law in the United States takes the first view, stating that authors have no natural right in their creation but only the rights that the state has conferred by reason of policy to encourage the creation of new works (H.R. REP. No. 2222). This approach assumes that the content of products of mind (not the objects in which they are embedded) belong to society as a whole, but that society would benefit more if more such products were available, and that in order to encourage production the creator of such products should be given rights that will allow him or her to reap some economic benefits from the creation. As Branscomb (1984) observed this is encouraging access by legislating scarcity. The ethics of copyright can be approached in two ways: (1) If, as Hettinger suggests, every creator stands on the shoulders of giants what is the essential morality in allowing the last contributor to reap the full reward or to have the right to prevent others from building on her contribution; and (2) If, as postulated by Locke, an individual is entitled to what he or she creates, what are the ethics of limiting a creators rights in regards to his or her creation?

45

It has become what is often called an equitable rule of reason, which attempts to balance the rights of authors with the rights of users. It is often not clear whether this balance is to be obtained by granting rights via law or by recognizing the intrinsic rights of each. However, if copyright is indeed only a matter of law there should be no rights other than those granted by the law. What both creators and users then have are expectations, but, as Cohen (1985) observed, the law finds value in protecting legitimate expectations. Earlier United States copyright law was better aligned with the encouragement theory and the ethical position that creative works belonged to society as a whole. Only the exact copying of a work was prohibited, not new works based on a previous work. Subsequent authors were free to adapt novels to the stage, abridge scholarly works for the masses, and translate works into other languages without paying a license fee to the creator or to whom ever the creator had transferred his or her copyright. Lesson learned: Ethics are often raised as well in regard to copying software. The Software Publisher’s Association (SPA), which merged with the Information Industry Association (IIA) in January of 1999 to form the Software & Information Industry Association (SIIA), offers a guide on Software Use and the Law (SPA 1997) which states it is intended to provide “a basic understanding of the issues involved in ethical software use. Integrative Question: What is property right? What is copyright? Is copyright unethical? What is Software Publishers’ Association? What is intellectual property?

46

Book: Cyber Ethics Chapter 22: On the Web, Plagiarism Matters More Than Copyright Piracy Quote: Plagiarism epidemic is mainly a result of a simple fact that the web has made plagiarism much easier than it used to be in the print environment. Cronin (2003) Lesson Expectation: A new term ”cyber-plagiarism” has since been introduced to describe the process by which students copy ideas and information from the Internet without giving attribution, or downloading research papers in whole or in part, and submit the paper as their own work. Plagiarism and academic honesty have become controversial and widely debated issues. Review: Most people are aware that taking the exact texts or words of another person without attribution is plagiarism, but they then believe that paraphrasing the original work is acceptable. Yet taking someone else’s idea and changing the words is like stealing a car and changing its colour. However, literary works that are stolen differ in many ways from physical properties that are the targets of ordinary theft. Ideas are less tangible and identifiable than physical objects. Objects that are stolen remain stolen even if they are taken apart and recombined, but not for ideas. Building new ideas from old ones, using existing information and combining them, might be called creativity, not plagiarism. Plagiarism can be briefly defined as the expropriation of another author’s text, and its presentation as one’s own. This includes using others’ ideas, information without giving credit and acknowledgement. It is clear that piracy is the infringement of copyright, and plagiarism is the failure to give credit to the author. However, many people easily get confused between those two terms, and one may usually commit both offences. It would be plagiarism but not piracy for us to take the works of an

47

obscure 18th century poet and try to use them as our own. Since the copyright will have expired on such works, this is not piracy. There is hardly a clear way to determine which idea counts as a brand new and which requires acknowledgment as a variation on old ideas. In areas such as computer programming and musical composition, what counts as plagiarism is usually highly ambiguous and debatable. Snapper (1999) indicated that cyber-plagiarism was growing rapidly and raising many concerns over its impacts. [9]He also stated that in a period of a few years, students have been able to buy papers on a various subjects from the Internet. As students can gain access to these papers without much effort, the issues have become really important and raised serious concerns. Lesson learned: Unlike physical objects those belong to, and are in possession of someone else alone, we can pick up ideas somewhere and treat them as our own. We may remember ideas without remembering where they come from because without careful notations, recalling a source is much more difficult than recalling the idea itself. Therefore it is not easy to totally avoid unintentional plagiarism. Integrative Question: What is plagiarism? What is piracy? What is copyright? Which is graver: plagiarism or copyright? What is cyber-plagiarism?

48

Book: Cyber Ethics Chapter 23: An Ethical Evaluation of Web Site Linking Quote: “It is important to our company that you know our exact process we take for the education and understanding on how is the ethical evaluation on web site Linking” Learning Expectation: This procedure is not a huge factor in our search engine optimization services but we have found it very functional for the end user getting them where they want to be in a site for information they may be looking for and possibly get the website owner the sale or lead in that specific area. In case people do not understand me on this an interior link can be spotted as a underlined or highlighted keyword on a specific page that moves you to another URL on that website. Review: Scam and Spam search engine optimization companies eat this up because they realize that some words have no competition to them and can be achieved with very little effort, and if you're locked into their contract, you will sometimes have to shell out more money because they claim they have much more to do. Which from an ethical stand point Keyword Performance has a problem with that especially because they are not looking at your company with ethical standards just their bottom lines. For the most part we consult with the person or team of people for that company on the most important keywords they would like to rank high for. Nine out of ten times we find that the keywords the companies like to see are not their only main or lateral phrases for keyword placement and top search engine rankings. In fact I have had keywords come across to me that really have no relevancy to their web sites goals for success.

49

Lessons Learned: This will also help to improve traffic by other audiences finding your website through another site on the World Wide Web. This is a very important factor in driving your website to the top for your relevant keyword terms. Each category will be built for a unique area targeting links that compliment the website services as well as other high Google page ranking directories. Integrative Questions: What is ethical evaluation? What is Web Site Linking? What is the Strategy of Web Site Linking? Why Ethical Evaluation is important? What are the different kinds of Web Site Linking?

50

Book: Cyber Ethics Chapter 24: The Cathedral and the Bazaar Quote: "Given enough eyeballs, all bugs are shallow" Learning Expectation: The Cathedral and the Bazaar is an essay by Eric S. Raymond on software engineering methods, based on his observations of the Linux kernel development process and his experiences managing an open source project, fetchmail. It was first presented by the author at the Linux Kongress on May 27, 1997 and was published as part of a book of the same name in 1999 Review: It's rather to warn you, the lay reader--this guy may have attained some sort of status in the open source community which needs such figures, but it doesn't mean that what he has to say is any good or even true. In his works (including "Cathedral"), Eric makes a very one-sided analysis of software engineering methodologies. It's a complete ra-ra piece which fails to seriously address the very many shortcomings of open-source development, including, most critically, the inability to scale timewise as well as commercial software (while not under the GNU licence, two years ago Raymond was predicting the success of the open-source Mozilla browser initiative, which is at this point a complete fiasco). Instead, he talks about obscure supporting sociological constructs such as that of "gift cultures" that would only convince the already converted. Raymond's standard talk begins with references to himself as an ordinary but experienced IT guy of sorts who, without any sort of formal training in sociology, psychology, marketing, business, or the like, has become the chronicler of the "gnu generation" (not his quote, just a common one) and predictor of open source things to be. this talk in front

51

of academics. Thankfully, he has little shame, or he'd have dropped dead long ago from the subtle looks and snickers that inevitably result from his bombast. Lessons Learned: What people should be getting out of this book (or a book like this) is a balanced, informed view of open source vs commercial software, undertaken with sound research on various cost/effectiveness metrics and some case studies. What we have here is a bible for a community that desperately needs one, because, as Eric's whole thrust implies, it is largely ego driven. Integrative Questions: What is Cathedral and the Bazaar? What is the cathedral model? What is Linux Kernel? Who is Raymond? Why is this book worth reading?

52

Book: Cyber Ethics Chapter 25: Towards a Theory of Privacy for the Information Age Quote: “Our revolution will not be in gathering data—don’t look for TV cameras in your bedroom—but in analyzing the information that is already willingly shared”. Larry Hunter Lesson Expectation: While philosophical theories have long acknowledged the relationship between privacy and information about persons, and have argued for limits on allowable practices of information gathering, analyzing, and sharing as a means of protecting privacy, their efforts have primarily applied to intimate and sensitive information. While not denying the importance of protecting intimate and sensitive information, this paper insists that theories of privacy should also recognize the systematic relationship between privacy and information that is neither intimate nor sensitive and is drawn from public spheres. Review: The Information Age, also known commonly as the Computer Age or Information Era, is an idea that the current age will be characterized by the ability of individuals to transfer information freely, and to have instant access to knowledge that would have previously have been difficult or impossible to find. The idea is heavily linked to the concept of a Digital Age or Digital Revolution, and carries the ramifications of a shift from traditional industry that the Industrial Revolution brought through industrialization, to an economy based around the manipulation of information. The Internet was originally conceived as a distributed, fail-proof network that could connect computers together and be resistant to any one point of failure; the Internet can't be totally destroyed in one event, and if large areas are disabled, the information is easily re-

53

routed. It was created mainly by DARPA; its initial software applications were email and computer file transfer. It was with the invention of the World Wide Web in 1989 that the Internet really became a global network. Today the Internet has become the ultimate place to accelerate the flow of relevant information and the fastest growing form of media. Nowadays, many people tend to think of the Information Age in terms of cell phones, digital music, high definition television, digital cameras, email on the Internet, the Web, computer games, and other relatively new products and services that have come into widespread use. The pace of change brought on by such technology has been very rapid. Lesson learned: Although Hunter, in the passage quoted earlier, may have understated the extent that the sheer growth in data gathering affects privacy and the extent to which technological means allows intrusion into and surveillance of even private, enclosed spaces, he accurately predicted not only that analysis of information will be a major source of privacy invasion, but that because the information analyzed is willingly shared, people are, in some sense, complicit in the violation of their own privacy. Integrative Question: Why do students plagiarized? What are the harmful effects of plagiarism? How to combat plagiarism? What are the laws implemented to prevent plagiarism? What is cyber-plagiarism? Why do students plagiarise?

54

Book: Cyber Ethics Chapter 26: The Structure of Rights in Directive 95/46/ec on the Protection of the individuals with regard to the Processing Personal Data and the free movement of such Data Quote: To determine the act that protects personal data information. In addition, to be able to understand the necessity of having the directives. Furthermore, to be able to assess the advantage of having the directives. Lesson Expectation: To understand the importance of personal data protection. To establish the directive a necessary medium in protecting individual data. And furthermore, to importance of implementing personal data protection. Review: The Act on Personal Data Protection introduced detailed rules on personal data protection in Poland, and up to 1 May 2004, i.e. up to Poland’s accession to the European Union, included in the Polish legal order all principles specified in the Directive 95/46/EC of the European Parliament and of the Council. The provisions of the Act have been in force since 30 April 1998. The principles of personal data protection established in the Directive 95/46/EC were implemented into the Polish legal order by the Act of 29 August 1997 on the Protection of Personal Data (unified text: Journal of Laws of 2002 No. 101, item 926 with amendments). Implementation of the provisions on personal data protection into the Polish legal system allowed Poland to sign in April 1999 and to ratify in May 2002 the Convention No. 108 of the Council of Europe. Those activities reflected increasing democratisation of public life in Poland as well as concern for the protection of privacy of its every citizen. The Act on Personal Data Protection while realizing the requirements of the Community specified the constitutional right to decide on the fact to whom, in what scope and for what purpose we give our personal data, and gave statutory guarantees of compliance with this right by providing the data subjects with 55

measures used for exercise of this right and competent authorities and services – with the legal remedies which guarantee compliance with this right. The main premise of the Act is granting every individual the right to have his/her data protected. The Act on Personal Data Protection determined a legal framework of personal data handling, as well as the principles to be used in the processing of personal data. Lesson Learned: The new Constitution of 1997 was the first one to guarantee the protection of personal data in Poland. Its Art. 47 guaranteed citizens the right to privacy and Art. 51 guaranteed each person the right to the protection of his/her information. However, international obligations of Poland related to the EU accession resulted in the need to ensure personal data such protection as the one guaranteed by the EU Member States on their territories. All European acts were based on or adjusted to the Directive 95/46/EC of the European Parliament and of the Council. Integrative Question: What is directive 95/46/ec? What is personal data protection? What is privacy? When the directive was was established? What is the act on personal data protection?

56

Book: Cyber Ethics Chapter 27: Privacy, Individuality, Control of information, and Privacy –enhancing Technologies Quote: “Privacy” is used frequently in ordinary language as well as in philosophical, political and legal discussions, yet there is no single definition or analysis or meaning of the term. Learning Expectation: Moreover, the concept has historical origins in well known philosophical discussions, most notably Aristotle's distinction between the public sphere of political activity and the private sphere associated with family and domestic life. Yet historical use of the term is not uniform, and there remains confusion over the meaning, value and scope of the concept of privacy. Review: Other critiques argue that privacy interests are not distinctive because the personal interests they protect are economically inefficient (Posner, 1981) or that they are not grounded in any adequate legal doctrine (Bork, 1990). Finally, there is the feminist critique of privacy, that granting special status to privacy is detrimental to women and others because it is used as a shield to dominate and control them, silence them, and cover up abuse (MacKinnon, 1989). There are several skeptical and critical accounts of privacy. According to one well known argument there is no right to privacy and there is nothing special about privacy, because any interest protected as private can be equally well explained and protected by other interests or rights, most notably rights to property and bodily security (Thomson, 1975). Other commentators defend privacy as necessary for the development of varied and meaningful interpersonal relationships (Fried, 1970, Rachels, 1975), or as the value that accords us the ability to control the access others have to us (Gavison, 1980; Allen, 1988; Moore, 2003), or as a set of norms necessary not only to control access but also to enhance personal 57

expression and choice (Schoeman, 1992), or some combination of these (DeCew, 1997). Discussion of the concept is complicated by the fact that privacy appears to be something we value to provide a sphere within which we can be free from interference by others, and yet it also appears to function negatively, as the cloak under which one can hide domination, degradation, or physical harm to women and others. Lessons Learned: If distinguishing public and private realms leaves the private domain free from any scrutiny, then these feminists such as Catharine MacKinnon (1989) are correct that privacy can be dangerous for women when it is used to cover up repression and physical harm to them by perpetuating the subjection of women in the domestic sphere and encouraging nonintervention by the state. Jean Bethke Elshtain (1981, 1995) and others suggest that it appears feminists such as MacKinnon are for this reason rejecting the public/private split, and are, moreover, recommending that feminists and others jettison or abandon privacy altogether. But, Elshtain points out, this alternative seems too extreme. Integrative Questions: What is informational privacy? What is the constitutional right to privacy? What are the Privacy and Control over Information? What is the privacy and Intimacy? Is privacy relative?

58

Book: Cyber Ethics Chapter 28: Toward and Approach to privacy in public: Challenges of Information technology Quote: Privacy provides the necessary context for relationships which we would hardly be human if we had to do without-the relationships of love, friendship and trust. Charles Fried Lesson Expectation: The articles discuss the importance of privacy in public. It also highlights philosophical views that necessitate the importance of privacy in public. Further more, it also discusses the lack of privacy in the computer technology. Review: Although Fried conceived of privacy as control over all information about oneself, he defended a moral and legal right to privacy that extends only over the far more limited domain of intimate, or personal, information. He accepted this narrowing of scope because even a limited domain of intimate or personal information provides sufficient "currency" for people to differentiate relationships of varying degrees of intimacy. Prominent among contemporary philosophical works on privacy is Charles Fried's. Fried (1984) argued that privacy is important because it renders possible important human relationships. The danger of extending control over too broad a spectrum of information is that privacy may then interfere with other social and legal values. According to Fried, the precise content of the class of protected information will be determined largely by social and cultural convention. Prevailing social order "designates certain areas, intrinsically no more private that other areas, as symbolic of the whole institution of privacy, and thus deserving of protection beyond their particular importance". Other philosophers also have focused on the interdependence between privacy and a personal or

59

intimate realm. Robert Gerstein (1984), for example, contended that "intimacy simply could not exist unless people had the opportunity for privacy. Privacy's purpose, he wrote, is to insulate "individual objectives from social scrutiny. Social scrutiny can generally be expected to move individuals in the direction of the socially useful. Privacy insulates people from this kind of accountability and thereby protects the realm of the personal". Schoeman, unlike Fried (1984) however, holds that there are domains of life that are essentially private and not merely determined to be so by social convention. Lesson Learned: The views of Schoeman, Fried, and Gerstein, though differing in detail, rest on a common core. Each held that properly functioning, psychically healthy individuals need privacy. A person's right to privacy restricts access by others to this sphere of personal, undocumented information unless, in any given case, there are other moral rights that clearly outweigh privacy. Although many other writers who have highlighted the connection between privacy and the personal realm have not attended merely to the status of the "non-personal" realm. If information is not personal information or if it is documented, then action taken with respect to it simply does not bear on privacy. Integrative Question:

Who is Helen Nissembaum? What is privacy in public? What is the importance of privacy? Who is Charles Fried? What are the laws governing privacy?

60

Book: Cyber Ethics Chapter 29: KDD, PRIVACY, INDIVIDUALITY, AND FAIRNESS Quote: “The rights and requirements make no sense regarding anonymous data and group profiles.” Lesson Expectation: The lesson will identify the importance of privacy to individual. Furthermore, it will also highlight the significance of KDD and fairness. It also imbues understanding of privacy. Review: Persons are judged and treated more and more as members or group, i.e., of the reference group that makes up the data or information subject, rather than as individuals with their own characteristics and merits. This consequence of KDD using or producing personal data in the broad sense may, at first sight, seem rather innocent. It loses, however, much of its innocent appearance where the information contained in the profile is of a sensitive nature because it is typically susceptible to prejudice and taboo or because it can be used for selections in allocation procedures. So, for instance, information about persons having a certain probability of manifesting certain diseases, of lifestyles, or of having been involved in crime, etc. may easily give rise to stigmatization and discrimination. The information may also be used for giving or denying access to provisions, like insurance, loans, or jobs. Increasing use and production of group profiles may even result in growing unfairness in social interaction in other ways. This is poignantly clear in the case of what I will call non-distributive profiles, as opposed to distributive profiles. Distributive profiles assign certain properties to a group of persons in such a way that these properties are actually and unconditionally manifested by all the members of that group.

61

Distributive profiles are put in the form of down-to-earth, matter-of-fact statements. Non-distributive profiles, however, are framed in terms of probabilities and averages and medians, or significant deviance from other groups. Non-distributive profiles are, therefore, significantly different from distributive profiles. The properties in non-distributive profiles apply to individuals as members of the reference group, whereas these individuals taken as such need not, in reality, exhibit these properties. Lesson Learned: Infringements of categorical privacy cannot be dealt with in ways similar to those in which individuals are protected against possible infringements of individual informational privacy. The application of principles and rights of, for instance, rectification and consent to potential infringements on categorical privacy is, to a large extent, impossible. Even if it were possible, it would nevertheless be unacceptable for obvious reasons. Integrative Questions: What is KDD? What is privacy? What is individuality? What is fairness? What is a distributive profile?

62

Book: Cyber Ethics Chapter 30: Data Mining and Privacy Quote: Data warehousing is the strategy of ensuring that the data used in an organization is available and accurate from wherever it is needed. Ann Cavoukian ,1988 Lesson Expectation: Recently, issues about information privacy have emerged with the dramatic growth of data storage, computer processing power, and networks. From the findings, this paper will investigate how the current U.S. policy of privacy is shaped, and then propose a new guideline to set up privacy policies to minimize the conflicts between data privacy and data mining. Review: Privacy. It’s a loaded issue. In recent years privacy concerns have taken on a more significant role in American society as merchants, insurance companies, and government agencies amass warehouses containing personal data. The concerns that people have over the collection of this data will naturally extend to any analytic capabilities applied to the data. Users of data mining should start thinking about how their use of this technology will be impacted by legal issues related to privacy. Data can be one of the most important assets of companies for their marketing plan. Thus, businesses became interested in collecting and managing consumer’s data. Though the term data mining is relatively new, data mining attracts tremendous interest in commercial market place. Lots of businesses pay attention to data mining recently. Why are data mining and data warehousing mushrooming so greatly now? Over the next few years we should expect to see an increased level of scrutiny of data mining in terms of its impact on privacy. The sheer amount of data that is collected about individuals, coupled with powerful new technologies such as data mining, will generate a great

63

deal of concern by consumers. Unless this concern is effectively addressed, expect to see legal challenges to the use of data mining technology. Lesson Learned: With the development of computing and communication technology, now data can be captured, recorded, exchanged, and manipulated easier than before. By one estimate, the amount of information in the world doubles every 20 months, and that means the size of databases also does, even faster. Today we consciously or unconsciously diffuse our data somewhere. Whenever we shop, use credit card, rent a movie, withdraw money from ATM, write a check and log on the Internet, our data go somewhere. Integrative Question: What is data mining? What is privacy? What is data mining relation to privacy? What are the purposes of data mining? Can data privacy and data mining coexist?

64

Book: Cyber Ethics Chapter 31: Workplace Surveillance, Privacy and Distributive Justice Amazon Quote: “Each person is to have an equal right to the most extensive basic liberty compatible with a similar liberty for others.” Learning Expectation: Once plaintiff communicated the alleged unprofessional comments to a second person (his supervisor) over an email system which was apparently utilized by the entire company, any reasonable expectation of privacy was lost” (670). The court held that the employee had no reasonable expectation of privacy: “unlike urinalysis and personal property searches, we do not find a reasonable expectation of privacy in email communications voluntarily made by an employee to his supervisor over the company e-mail systems notwithstanding any assurances that such communications would not be intercepted by management. Review: It has been traditionally accepted that employers have a right to engage in such activities. At the foundation of this view is a conception of the employment relationship as involving a voluntary exchange of property. Exceptions to the employment-at-will doctrine include firing someone for serving on jury duty, for reporting violations of certain federal regulations, or for impermissible race, sex, or age discrimination on the employer’s part. Accordingly, the terms and conditions of employment are largely up to the parties to decide. Conceived as a free exchange, the employment relationship, in the absence of some express contractual duration requirement, can be terminated at will by either party for nearly any reason.

65

Lessons Learned: The persons in the original position have no information as to which generation they belong. In order to carry through the idea of the original position, the parties must not know the contingencies that set them in opposition. Rawls argues that fair terms of cooperation are most likely to be chosen from behind a veil of ignorance, which he describes as follows: “no one knows his place in society, his class position or social status, nor does any one know his fortune in the distribution of natural assets and abilities, his intelligence, strength, and the like.

Nor again does anyone know his

conception of the good, the particulars of his rational plan of life, or even the special features of his psychology such as his aversion to risk or liability to optimism or pessimism. More than this, I assume that the parties do not know the particular circumstances of their own society. Integrative Questions: How does this bear on the issue of workplace surveillance? What’s the point of the veil of ignorance? How much privacy protection, if any, would these actually provide? Can you think of a likely situation in these? What are the principles require employers to refrain from collecting data?

66

Book: Cyber Ethics Chapter 32: Privacy and Varieties of Informational Wrongdoing Quote: “It is not non-exclusion that makes retaliation impossible (for there may be other ways of punishing the free-rider than by excluding him), but anonymity of the free-rider. Clearly in a small group it is easier to spot the free rider and sanction him in one of many possible ways once he is identified than in a large group, where he can hide in the crowd". Learning Expectation: I expect awareness of informational wrongdoing. It will also define different varieties of informational wrongdoing. It will also define privacy. Review: The privacy issue is concerned more specifically with the question how to balance the claims of those who want to limit the availability of personal information in order to protect individuals and the claims of those who want to make information about individuals available in order to benefit the community. The privacy issue lies at the heart of an ongoing debate in nearly all Western democracies between liberalists and communitarians over the question how to balance individual rights and collective goods. This essential tension emerges in many privacy discussions, e.g. undercover actions by the police on the internet, use of Closed Circuit Television in public places, making medical files available for health insurance purposes or epidemiological research, linking and matching of databases to detect fraud in social security, soliciting information about on-line behavior of internet users from access providers in criminal justice cases. Communitarians typically argue that the community benefits significantly from having knowledge about its members available. According to communitarians modern Western democracies are in a deplorable condition and our unquenchable thirst for privacy serves as its epitome. Who could object to having his or her data accessed if honorable community causes are served? Communitarians also point out that modern societies exhibit high degrees of 67

mobility, complexity and anonymity. As they are quick to point out, crime, free riding, and the erosion of trust are rampant under these conditions. Political philosopher Michael Walzer observes that "Liberalism is plagued by free-rider problems, by people who continue to enjoy the benefits of membership and identity while no longer participating in the activities that produce these benefits. The modern Nation States with their complex public administrations need a steady input of personal information to function well or to function at all. In post-industrial societies 'participation in producing the benefits' often takes the form of making information about oneself available. Those who are responsible for managing the public goods therefore insist on removing constraints on access to personal information and tend to relativize the importance of privacy of the individual. Lesson Learned: The game-theoretical structure and the calculability of community gains make the arguments in favor of overriding privacy seem clear, straightforward and convincing. Both in the private as well as in the public sector IT is seen as the ultimate technology to resolve the problem of anonymity. Information and communication technology therefore presents itself as the technology of the logistics of exclusion and access-management to public goods and goods involved in private contracts. Whether IT really delivers the goods is not important for understanding the dynamics of the use of personal data. Integrative Question: What are the different varieties of informational wrongdoing? What is informational injustice? What is informational inequality? What are panoptic technologies? Define privacy.

68

Book: Cyber Ethics Chapter 33: Defining the Boundaries of Computer Crime Quote: The U.S. Department of Defense's (DoD) Defense Information Systems Agency (DISA) has completed in-depth research on computer crime. From 1992 to 1995, DISA attacked their own DoD computer systems using software available on the Internet. Learning Expectation: Convincing victims who have suffered a loss to report the crime to police constitutes another hurdle facing law enforcement agencies. Surprisingly, many individuals, network administrators, and corporate managers do not realize that attacks against their networks constitute a crime. Worse, many victims who understand that a crime has taken place may deliberately keep these facts from the police. Review: Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement through warez, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. A common example is when a person starts to steal information from sites, or cause damage to, a computer or computer network. This can be entirely virtual in that the information only exists in digital form, and the damage, while real, has no physical consequence other than the machine ceases to function. In some legal systems, intangible property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a hammer. Where human-centric terminology is used for crimes relying on natural language skills and innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal no matter how it is committed. Even though the computer is not directly used for criminal purposes, it is an excellent device for record keeping, particularly given the power to encrypt the data. Crime statistics 69

facilitate benchmarking and analysis of crime trends. Crime analysts use criminal statistics to spot emerging trends and unique modi operandi. Patrol officers and detectives use this data to prevent future crimes and to apprehend offenders. Therefore, to count computer crime, a general agreement on what constitutes a computer crime must exist. In many police departments, detectives often compile and report crime data. Thus, homicide detectives count the number of murders, sexual assault investigators examine the number of rapes, and auto detectives count car thefts. Computer crime, on the other hand, comprises such an ill-defined list of offenses that various units within a police department usually keep the related data separately, if they keep them at all. Lesson Learned: Generally, crime statistics can provide approximations for criminal activity. Usually, people accurately report serious crimes, such as homicide, armed robbery, vehicle theft, and major assaults. But, new evidence suggests that computer crime may be the most underreported form of criminal behavior because the victim of a computer crime often remains unaware that an offense has even taken place. Sophisticated technologies, the immense size and storage capacities of computer networks, and the often global distribution of an organization's information assets increase the difficulty of detecting computer crime. Integrative Question: What is computer crime? What are the boundaries of computer crime? What is a crime in general? What are the precautions being offered to combat computer crime? What are the punishments for computer crime?

70

Book: Cyber Ethics Chapter 34: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic Quote: The fact that there are limits on the scope of even a legitimate state’s permission to coercively enforce the law suggests, rightly, that civil disobedience is sometimes morally justified. In cases where an otherwise legitimate state has enacted a sufficiently unjust law that falls outside the scope of its coercive authority, citizens have a qualified moral permission to disobey it Learning Expectation: First, I argue that it wrongly presupposes that committing civil disobedience is morally permissible as a general matter of moral principle; in an otherwise legitimate state, civil disobedience is morally justified or excusable only in certain circumstances. Second, I attempt to identify a reliable framework for evaluating civil disobedience that weighs the social and moral values against the social and moral disvalues. Third, I apply this framework to acts of electronic civil disobedience. I argue that such acts typically result in significant harms to innocent third-parties that are not morally justified as an expression of free speech – and especially not as the expression of a view that is deeply contested in society. Review: Civil disobedience, by its nature, involves disobeying something that has the status of law. It is one thing to assert that a law is unjust; it is another thing to deliberately and openly behave in a manner that violates the law; the former is a pure speech act, while the latter is behavior. Civil disobedience, then, might be expressive conduct, but it is primarily conduct and secondarily expression. Ordinary views about the moral right to free speech commonly distinguish between speech acts and expressive behavior. On these views, expressive behavior is subject to more stringent moral limits than those to which pure speech is subject. One might 71

seek, for example, to make a point about sexual morality by having sex in public, but the moral right to free speech is implausibly thought of as entailing a right to have sex in public for the purpose of promoting some view about sexual morality. The reason for this, of course, has something to do with the effects on other people of these different kinds of act. Pure speech acts, other things being equal, affect only doxastic states in any morally significant way. Conduct, however, has the potential to affect not only doxastic states, but may also have significant effects on other states in which a person has a strong interest. Someone who seeks to express anger with you by hitting you not only affects your doxastic states, but also runs the risk of causing you physical and emotional injury Lesson Learned: The victims of such an attack, as well as third-parties, have a right to know exactly what position is motivating the attack and why anyone should think it is a plausible position. The willingness to impose morally significant costs on other people to advance fringe positions that are neither clearly articulated nor backed with some sort of plausible justification is clearly problematic from a moral point of view. It seems clear that such behavior amounts, at least in most cases, to the kind of arrogance that is problematic on ordinary judgments. Integrative Question: Why might companies who try to privatize the internet be intimidated by hacktivism? What is the difference between a hacktivist and a cyberterrorist? How can one differentiate the two? Should the laws regarding hacktivism be loosened? Explain your answer. How does M&G's notion of hacktivism fare under the various ethical frameworks we studied? Define hacking.

72

Book: Cyber Ethics Chapter 35: Web Security and Privacy: An American Perspective Quote: Privacy not only allows us to develop healthy interpersonal relationships, it also seems to be required for democratic states to function. (Gavison, 1995; Johnson, 2001) Lesson Expectation: For this purpose I will start this section by discussing the concept of ideology. This will lead to a discussion of ideological issues likely to be involved in debates on privacy and security as identified by the literature. Review: The methodology of critical discourse analysis should be of interest to individuals from a technical background because it facilitates the generation of insights that is different from most technical research. Critique of the practices and rhetoric of large commercial software vendors is not novel per se. This paper is nevertheless a valuable contribution because it uses a different theory and methodology and therefore provides new arguments for separating the ethical and commercial uses of the concepts of privacy and security. Privacy and Security are concepts that have a strong moral connotation. We value privacy as well as security because they represent moral values which can be defended using ethical arguments. This paper suggests that the moral bases of privacy and security render them open to misuse for the promotion of particular interests and ideologies. In order to support this argument, the paper discusses the ethical underpinnings of privacy and security. It will then introduce the critical approach to information systems research and explain the role of ideology in critical research. Based on this understanding of the centrality of ideology, the paper will discuss the methodology of critical discourse analysis which allows the identification of instances of ideology. This will then lead to the discussion of an ideology critique based on Jürgen Habermas's theory of communicative 73

action, which will be applied to the websites of Microsoft Vista and Trustworthy Computing. The results of this discourse analysis support the contention that privacy and security can be used for ideological purposes. The paper will conclude by discussing possible avenues to address this problem. Concerning privacy laws of the United States, privacy is not guaranteed per se by the Constitution of the United States. The Supreme Court of the United States has found that other guarantees have "penumbras" that implicitly grant a right to privacy against government intrusion, for example in Griswold v. Connecticut (1965). In the United States, the right of freedom of speech granted in the First Amendment has limited the effects of lawsuits for breach of privacy. Lesson Learned: In the final step, I have attempted a brief critical discourse analysis on Haberma's Theory of Communicative Action to support the suspicion that the moral nature of privacy and security can be used for ideological purposes. In this paper I have argued that privacy and security are concepts with important moral connotations. Integrative Question: What is the difference between security and privacy? Why secure information is not necessarily private? What are the goals of security? What aspects of security can both be protecting and limiting privacy at the same time? What are the tools used to provide security?

74

Book: Cyber Ethics Chapter 36: The Meaning of Anonymity in an Information Age Quote: But public understanding is not, in my opinion, enough. Knowing where landmines are buried can help people avoid them, but clearing the landmines is a more robust and lasting solution. Learning Expectation: Although answers to this foundational question will not immediately yield answers, it is essential to understanding what is at stake in the answer to these question. For, after all is said and done, we would not want to discover that the thing we have fought so hard to protect was not worth protecting after all. My purpose here is not to suggest that anonymity in an information age is impossible. I am mainly arguing that achieving it is a more demanding business than merely allowing people to withhold their names. Review: I am mainly arguing that achieving it is a more demanding business than merely allowing people to withhold their names. Although I do not mean to imply that contemporary networks of information, and the compromise of opaque identifiers, are the result of insidious conspiracy and subterfuge, I recognize, at the same time, that all interests are not equally served by promoting a sufficient public understanding. An understanding of the natural meaning of anonymity, as may be reflected in ordinary usage or a dictionary definition, is of remaining nameless, that is to say, conducting oneself without revealing one's name. The concern I wish to raise here is that in a computerized world concealing or withholding names is no longer adequate, because although it preserves a traditional understanding of anonymity, it fails to preserve what is at stake in protecting anonymity. Anonymity is often used to protect the privacy of people, for example when reporting results of a scientific study, when describing individual cases. Many countries even have laws which protect anonymity in certain circumstances. Examples: A person may, in many countries, 75

consult a priest, doctor or lawyer and reveal personal information which is protected. In some cases, for example confession in catholic churches, the confession booth is specially designed to allow people to consult a priest, without seeing him face to face. The anonymity in confessional situations is however not always 100 %. If a person tells a lawyer that he plans a serious crime, some countries allow or even require that the lawyer tell the police. Lesson Learned: Anonymity may encourage freedom of thought and expression by promising a possibility to express opinions, and develop arguments, about positions that for fear of reprisal or ridicule they would not or dare not do otherwise. Anonymity may enable people to reach out for help, especially for socially stigmatized problems like domestic violence, fear of HIV or other sexually transmitted infection, emotional problems, suicidal thoughts. Anonymity may also provide respite to adults from commercial and other solicitations. Integrative Question: What is anonymity? What is pseudonym? What is anonymity in a computerized world? How is the concept different from that prior to the computerization of the society? What's the difference between anonymity and pseudonimity?

76

Book: Cyber Ethics Chapter 37: Double Encryption of Anonym zed Electronic Data Interchange Quote: “Collecting medical data electronically requires, according to our moral belief, also some kind of encryption.” Learning Expectation: Even the number of the patient in the doctor’s database will be replaced, because once the doctor may be a researcher using the central database who recognizes one of the patients based on the number. Both the patient identification in the data and the doctor identification in the data must be anonymized. We skip the name and address; only the sex and the month-year of birth will be sent from the doctor to the central database. Review: The receiver must decrypt that message first with his own secret key and second with the public key of the sender according to the header. When the message is readable after this double decryption, one can be sure that the message was meant to be received by the decrypting receiver and the message was really sent by the sender named in the header of the message. Thus: double encryption needs the sender identification in order to decrypt the message with the senders public key. The problem with an anonymized electronic message is that the senders identification was anonymized by the virtual postbox. To be sure that the data are really sent by the sender of the electronic message, the double encryption of PGP is a suitable and widely used protocol.

Lessons Learned:

77

This procedure requires the availability of a list with only public keys at the virtual postbox, as well as a program to intervene the electronic communication. Unfortunately, so far none of the network providers is willing or has been able to implement it. We are building it ourselves first, to convince the technical feasibility. Meanwhile it is a nice example of ethical constraints demanding new technology, instead of the opposite. To use double encryption for anonym zed electronic communication, new requirements must be specified. In this paper we suggest additional features that network providers must incorporate in the functionality of electronic message handlers. In fact we propose to add some 'intelligence' to the virtual postbox: instead of automatically forwarding, the postbox must now be able to read the sender from the header, select the appropriate public key from that sender, decrypt the message with that public key, replace the senders identification and encrypt the message with its own public key. Integrative Questions: What is Double Encryption of Anonym zed Electronic Data Interchange? What do the authors mean by "double encryption used twice"? Is it a robust setup? What is the problem the authors are trying to solve? Why is double encryption necessary in this case?

78

Book: Cyber Ethics Chapter 38: Written on the Body: Biometrics Identity Quote: When a biometric is translated into its digital representation or code it could theoretically be copied, changed, etc. with the ease that only computers offer. Learning Expectation: If someone were to tell you today that your biometrics are going to be one of the biggest ID theft problems of the future, what would you say? Would you laugh and think that person was crazy? You might not want to repeat the past so you should be more careful and listen this time. Review: Authentication happens when you use one biometric for comparison with an already identified biometric in hopes of an exact match thereby authenticating an individual. When biometrics are combined with powerful computer information systems they can be used in ways which were previously impossible. Although the strengths of biometrics are increased, the weaknesses may also be increased. Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The main operations a system can perform are enrollment and test. During the enrollment, biometric information from an individual is stored. During the test, biometric information is detected and compared with the stored information. Note that it is crucial that storage and retrieval of such systems themselves be secure if the biometric system is to be robust. The first block (sensor) is the interface between the real world and our system; it has to

79

acquire all the necessary data. Most of the times it is an image acquisition system, but it can change according to the characteristics desired. The second block performs all the necessary pre-processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing background noise), to use some kind of normalization, etc. In the third block features needed are extracted. This step is an important step as the correct features need to be extracted and the optimal way. A vector of numbers or an image with particular properties is used to create a template. Lesson Learned: Some strengths of using biometrics come from the “distinguishable (rather than unique) physiological and behavioral traits (Chandra, Akhilesh 2005)” that make up one’s body and the ease at which they can be used for identification and authentication. Unlike your passwords, you will not forget your fingerprints, irises, or DNA when you go to work. They are a part of you. They are also extremely distinguishable from another person’s biometrics. This means that they can be used with great confidence. Since they are a part of you they are difficult for another person to obtain or fake. They are also easy to use. Integrative Questions: What is the entry-point paradox as defined by Roger Clarke? In what ways are name, code, knowledge, and token-based identification schemes deficient? What factors have led to the emergence of a consortium-based specification for a global standard for biometric technologies? In the context of identity determination and verification, what are the distinctions between a 'one to many' and 'one to one' match? In what ways are verification and identification procedures inter-dependent?

80

Book: Cyber Ethics Chapter 39: Ethical Considerations for the Information Professions Quote: ‘A Physician’s Guide To Medical Writing’, an ideal medical write up framed along ethical considerations,” Learning Expectation: The efficiency flowing into this professional stream, promises a brighter and strategically stable future for this industry. But the emergence of certain negative trends in the practice of this profession poses a threat to its ability to deliver quality contents with reliable information. Review: Ethical issues are the concerns that address subjects like, content reliability, data collection techniques and presentation tactics, marketing strategy and the relevance of research and development. They play a vital role in relieving the writers of regulatory pressures involved in the process. Properly includes technical exposition on any subject related to medical science, such as biochemistry, pharmacologic studies, sanitation and psychoanalysis”. It is the responsibility of the writer to include necessary technical details under regulatory limitations to establish a level of understanding among the readers. Such ethical responsibilities have to be shared by the writer as well as the client. The client or the researcher should generate complete information on the academic background of the writer before allotting the assignment. This helps a client to understand the performance level that could be extracted from a writer. •

Regular communication with the writer is an essential condition for the correct formulation of the content.

81



It is pivotal for a client to allow proper validation of the content written for him before mass circulation. Lessons Learned: Ethical and legal considerations enhance the quality and reliability of the content. It is

true that the technical aspects in the profession of medical writing demand constant attention and need to be presented with clarity. In absence of such considerations it will be impossible for the clients to bridge the communication gaps between them and the target audience. It is widely accepted by many researchers that legal and ethical issues can play the role of obstacles in the progress of marketing a research as they impose certain limitations on the utilization of research products. Integrative Questions: What are ethical considerations? What is the information profession? What are the activities of ethical? Define ethical considerations? Find the legal and ethical issues?

82

Book: Cyber Ethics Chapter 40: Software Engineering Code of Ethics: Approved! Quote: Codes instruct practitioners about the standards that society expects them to meet, and what their peers strive for and expect of each other. Codes are not meant to encourage litigation, and they are not legislation; but they do offer practical advice about issues that matter to professionals and their clients and they do inform policy makers. Lesson Expectation: To know the approved software engineering code of ethics. To be able to differentiate the full version from the short one; and, to be able to understand the approved software engineering code of ethics. Review: The composition of the task force is multinational in both citizenship and in membership in professional computing organizations. There were two ethical approaches of by members of the task force to this project, but there was an achievement of consensus between them. Several of the ethical discussions about the Code are related to the relative position of rights/obligations based ethics versus virtue based ethics. This is reflected, for example, in different values placed on privacy. This difference between rights and virtue based ethics as a primary assumption was reflected in differing views on the actual and acceptable roles of governments in the software development process and reflected in different values or obligations related to the roles of government and individuals in protecting data integrity. The lessons learned from

developing of the Software Engineering Code of Ethics (www-

cs.etsu.edu/seeri) and relating these approaches to ethics provide indications on how to improve the ethics education of computer professionals. The observations in this paper were made during my tenure as chair of the task force developing this Code of Ethics. The generalizations in this paper, like all generalizations are 83

subject to exceptions. With this cautionary word, I will now venture to blatantly categorize ethical approaches. A software engineer is a person who applies the principles of software engineering to the design, development, testing, and evaluation of the software and systems that make computers or anything containing software, such as chips work. The IEEE-CS/ACM Software Engineering Code of Ethics Archive documents the drafting, debate, and final adoption of the joint IEEE Computer Society /ACMSoftware Engineering Code of Ethics and Standards of Practice. Indirectly, the archive illustrates how software engineering developed from an occupation to a profession. The drafting and approval of the Software Engineering Code, carried out in substantial part by email, has produced a detailed record of the development of a professional code of ethics. This correspondence, as well as related documents, interviews, and publications, make up the contents of the IEEE-CS/ACM Software Engineer’s Code of Ethics Archive. Lesson Learned: The software engineer as a practicing professional acts from a higher level of care for the customer (virtue ethics) and conforms to the development standards of the profession (right/obligations ethics). Both types of ethics are needed for the Professional engineer. Addressing computer ethics issues for the professional and in the classroom needs to include both of these approaches. Integrative Questions: What does IEEE-CS stands for? What does ACM stands for? Why did they develop a joint force ethical approach for software engineering? Enumerate and explain the short version of the software engineering ethics. What is Virtue Ethics?

84

Book: Cyber Ethics Chapter 41: No, Papa,: Why incomplete Codes of Ethics Are Worse Than None at All” Quote: “Computer and information ethics”, in the broadest sense of this phrase, can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts” Learning Expectation: Some career counselors suggest a student also focus on "people skills" and business skills rather than purely technical skills because such "soft skills" are allegedly more difficult to offshore.It is the quasi-management aspects of software engineering that appear to be what has kept it from being impacted by globalization. Review: “Computer ethics” also has been used to refer to a kind of professional ethics in which computer professionals apply codes of ethics and standards of good practice within their profession. In addition, other more specific names, like “cyber ethics” and “Internet ethics”, have been used to refer to aspects of computer ethics associated with the Internet. The more specific term “computer ethics” has been used to refer to applications by professional philosophers of traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and computer networks. Lessons Learned: The same considerations are highly likely to apply to any moral code that is developed (whether in computing or elsewhere). Authors of incomplete moral codes risk encouraging others to act in immoral ways with the author's apparent sanction. 85

Related, broader, questions are considered, and it is advocated that there should always be acknowledgment of the existence of 'external', potentially more important, moral issues. The problem is that by focusing on these four areas of concern, attention may be taken away from other, potentially more important, moral issues. Not all important moral issues in information technology can be put under those headings. Integrative Questions: What is codes of ethics What are the worse than none at all in ethics What are the kinds of computer ethics? Define codes of ethics? How does codes of ethics existence?

86

Book: Cyber Ethics Chapter 42: Subsumption Ethics Quote: “A key factor is whether the subsumptionist can prevent a conscious victim from calling for help, and whether or not the subsumptionist enjoys toying with a victim who is aware of the process. “ Learning Expectation: The attacker takes all of the victim's memories, cognitive structures, and available computronium, and incorporates them into emself. Usually this results in the death of the victim, but in some cases the attacker retains an inactive backup copy, or keeps the victim as a much-reduced emulation in a simulated environment. Subsumption is a form of violent assault, carried out by one AI or virtual against another. It has been compared, inadequately, to such perversions as rape, cannibalism, and bodyjacking. Of these, cannibalism is the closest equivalent. Review: As may be guessed, the motivations for doing so are rarely benign, and the experiences of the survivor are not usually pleasant. The very rare restored survivors of such treatment have compared it to such ancient human practices as lobotomy, emasculation, or blinding, sometimes followed by various forms of torture. Usually a subsumptionist simply causes a series of unexplained disappearances and then moves on before eir activities are noticed. However, a particularly skilled subsumptionist, who has can retained all of the victim's traits and memories intact, may conceal the crime from outsiders for an indefinite period of time. The public "outward" aspect of the victim's personality is retained as a kind of mask, and the subsumptionist acts from within this shell. 87

Lessons Learned: Whether this is because such events are actually rarer among transapients or whether this is because they are difficult for SI<1 observers to detect is unknown. On the other hand, it is not at all uncommon for lesser entities to be destroyed and/or incorporated when a transapient ascends to a higher toposophic level. This is regarded as subsumption (and also as a perverse transcend) in "civilized" parts of the Terragen sphere if the participants are unwilling. It is considered a kind of voluntary amalgamation if they volunteer. Most examples of subsumption have been carried out by sapient-grade entities, or even by specialized sub-sapient (sentient-level) AIs. The number of subsumption events known to have occurred between beings of higher toposophic levels is relatively small (the destruction of numerous lesser sapient and transapient beings by the Archosaurian Entity in 9400 a.t. is a recent exception). Integrative Questions: What is Subsumption? What is the use of transapient? How many numbers in subsumption? Define subsumption? What are the human practices?

88

Book: Cyber Ethics Chapter 43: Ethical Issues in business computing Quote: “It will provide readers with a clear knowledge of the complex ethical issues involved in e-business and improve their understanding of widely discussed current issues in e-business such as those of privacy, information management, data mining, intellectual property, and consumer tracking.” Learning Expectation: The internet has revolutionized business by fundamentally changing the means by which businesses operate and enlarging the opportunities available to them to reach and service customers. However, in doing so, the development and practice of e-business also raises a host of ethical issues, such as those pertaining to information security, privacy, data mining, and intellectual property. Review: Therefore, as e-business continues to grow in significance and scope, it is important to understand and respond to the unique ethical issues associated with e-business. As e-business models become more common in the world of business, there must be an effort to integrate ebusiness more fully into the field of business ethics so that scholars and professionals working in the field can better appreciate and respond to these ethical issues

89

Lessons Learned: The book will be written for scholars, professionals, and students interested in gaining a better comprehension and appreciation of the moral issues encountered in the multifaceted world of e-business. This book will aim to provide a comprehensive overview of the most important ethical issues associated with the expanding world of e-business. Grounded solidly in the most recent scholarship in business ethics, the book will apply the most relevant theoretical frameworks to ethical issues in all significant areas of e-business. Integrative Questions: What is the importance of ethics for e-business? What are the

new paradigm of business on the internet and its ethical implications?

Identifying and responding to stakeholders in e-business? How to Applying ethical principles to e-business? What is Ethical issues in e-marketing?

90

Book: Cyber Ethics Chapter 44: The Practitioner from Within: Revisiting the Virtues Quote: ‘Flourishing’ by means of what is variously presented as the formation of virtuous ‘habits’ or a virtuous ‘character’. Learning Expectation: In this paper, I want to take a different approach that emphasises individual human flourishing – although moral values and behaviours will also be discussed in the context of this approach. I want to investigate to what extent virtue ethics can ground a conception of the good life and, correspondingly, the good society, in relation to uses of information technology and new media. Although virtue ethics has received attention in computer and information ethics before (e.g., Grodzinsky 1999), the emphasis in previous discussion has been on virtue ethics as a means to instil moral values and behaviours in computer professionals and computer users through character formation. Review: Originally revived and re-introduced into moral philosophy by Elisabeth Anscombe around 1958, Virtue Ethics is currently a central element in the work of, for instance, Nussbaum, Sen, Foot, and Solomon. Where it does not form a fundamental part of inquiry it is nevertheless receiving critical attention (e.g. Baron et. al 1997). What is more – and as the paper will argue and endeavour to show – there are some complimentarities between Virtue Ethics and the other dominant methods of ethics, particularly some versions and elements of Kantianism. Two specific reasons present themselves at inception in support of positing Virtue Ethics as a particular object of inquiry in the context of this paper. First, Virtue Ethics has recently experienced a novel degree of academic and policy-related attention in contemporary and ongoing work in the fields of political philosophy, freedom and development studies, media 91

and culture research, and economics. Second, Virtue Ethics has one unique feature which lacks in the other major ethical methods and which renders it particularly interesting to the present inquiry. This feature is its central concern with an areatically and ontologically conceived ethical subject and her ‘flourishing’ by means of what is variously presented as the formation of virtuous ‘habits’ or a virtuous ‘character’. By critiquing deontological approaches and strictly universal rules-based accounts of ethics, Virtue Ethics is particularly agent-focused and agentbased. This arguably means that a Kantian moral dilemma in which an ethical subject must choose between two first-order moral rules and necessarily, therefore, violate one of them can at least be conceptually addressed by Virtue Ethics in that attention is paid to the mechanisms and the underlying moral virtues. Lessons Learned: Ethical subjects have histories and futures; they are engaged in development, identityand value-formation and self-reflection. And it is here that the recent work which relates to Virtue Ethics is beginning to have some impact in a number of disciplines. It will be useful to extend these applications to new media and information technology. Nevertheless, Virtue Ethics does afford the moral theorist the perhaps only contemporaneous ethical account that might address the crucial questions over the ways and processes in which an ethical subject might come to be ethical. In other words, it is important to ask in relation to all major ethical traditions how and why an agent might variously choose to enter into a given social and moral contract, or embrace universal rule-based moral systems, or indeed become virtuous. Integrative Questions: What is The Practitioner from Within: Revisiting the Virtues? How virtuous is the virtual? Does Virtue Ethics does afford the moral? What is the policy of ethics virtue?

92

What are the methods of virtues?

93

The HaNDBooK oF iNFoRMaTioN aND CoMPuTeR eTHiCS

94

Book: Handbook of Computer Ethics Chapter 1: Foundations of Information Ethics Quote: Information technology affects fundamental rights involving copyright protection, intellectual freedom, accountability, and security.

Learning Expectations It provides a critical framework for considering moral issues concerning informational privacy, moral agency (e.g. whether artificial agents may be moral), new environmental issues (especially how agents should one behave in the infosphere), problems arising from the lifecycle (creation, collection, recording, distribution, processing, etc.) of information (especially ownership and copyright, digital divide). Information Ethics is related to the fields of computer ethics and the philosophy of information.

Review Information are becoming increasingly important in a society that is defined as "the information society". Information transmission and literacy are essential concerns in establishing an ethical foundation that promotes fair, equitable, and responsible practices. Information ethics broadly examines issues related to ownership, access, privacy, security, and community.

Consequently, information and communication technology (ICT) has affected — in both good ways and bad ways — community life, family life, human relationships, education, careers, freedom, and democracy (to name just a few examples). “Computer and information ethics”, in the broadest sense of this phrase, can be understood as that branch of applied ethics which studies and analyzes such social and ethical impacts of ICT.

95

Lessons Learned A basis for making ethical decisions and applying ethical solutions to situations involving information provision and use which reflect an organization’s commitment to responsible information service. Evolving information formats and needs require continual reconsideration of ethical principles and how these codes are applied. Considerations regarding information ethics influence “personal decisions, professional practice, and policy .

Integrative Questions 1. What is foundation of information ethics? 2. What are the information ethics? 3. What are the codes of information ethics? 4. What is literacy? 5. How these codes are applied?

96

Book: Handbook of Computer Ethics Chapter 2: Milestones in the History of Information and Computer Ethics Quote: The founder of this new philosophical field was the American scholar Norbert Wiener, a professor of mathematics and engineering at MIT Learning Expectations: To learn the Developments in science and philosophy led to the creation of a new branch of ethics that would later be called “computer ethics” or “information ethics”. The founder of this new philosophical field was the American scholar Norbert Wiener, a professor of mathematics and engineering at MIT. Review: Everything in the world is a mixture of both of these, and thinking, according to Wiener, is actually a kind of information processing. Consequently, the braindoes not secrete thought “as the liver does bile”, as the earlier materialists claimed, nor does it put it out in the form of energy, as the muscle puts out its activity. Information is information, not matter or energy. No materialism which does not admit this can survive at the present day. (Wiener 1948, p. 155) Living organisms, including human beings, are actually patterns of information that persist through an ongoing exchange of matter-energy. Thus, he says of human beings, Using the language of today's “information age” we would say that, according to Wiener, human beings are “information objects”; and their intellectual capacities, as well as their personal identities, are dependent upon persisting patterns of information and information processing within the body, rather than on specific bits of matter-energy.

97

Lessons Learned Social and ethical implications of cybernetics combined with electronic computers. He predicted that, after the War, the world would undergo “a second industrial revolution” — an “automatic age” with “enormous potential for good and for evil” that would generate a staggering number of new ethical challenges and opportunities.

Integrative Questions 1. What is the Milestones in the History of Information and Computer Ethics? 2. What is the history of computer? 3. What are the opportunities of computer?? 4. what is milestone? 5. What are the strategy of information of computer?

98

Book: Handbook of Computer Ethics Chapter 3: Moral Methodology and Information Technology Quote: Information technology (IT), as defined by the Information Technology Association of America (ITAA), is "the study, design, development, implementation, support or management of computer-based information systems, particularly software applications and computer hardware. Learning Expectations: Today, the term information technology has ballooned to encompass many aspects of computing and technology, and the term has become very recognizable. The information technology umbrella can be quite large, covering many fields. IT professionals perform a variety of duties that range from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as the management and administration of entire systems. Review: The term Information Technology (IT) is sometimes said to have been coined by Jim Domsic of Michigan in November 1981.[citation

needed]

Domsic, who worked as a computer

manager for an automotive related industry, is supposed to have created the term to modernize the outdated phrase "data processing". Lessons Learned The Oxford English Dictionary, however, in defining information technology as "the branch of technology concerned with the dissemination, processing, and storage of information, esp. by means of computers" provides an illustrative quote from the year 1958

99

(Leavitt & Whisler in Harvard Business Rev. XXXVI. 41/1 "The new technology does not yet have a single established name.

Integrative Questions 1. What is the moral methodology of IT? 2. What are the moral of information technology? 3. Defining the information technology? 4. What are the database of information technology? 5. What are the opportunities in moral methodology of IT?

100

Book: Handbook of Computer Ethics Chapter 4: Value Sensitive Design and Information System Quote: Value-Sensitive Design is primarily concerned with values that center on human well being, human dignity, justice, welfare, and human rights. Value-Sensitive Design connects the people who design systems and interfaces with the people who think about and understand the values of the stakeholders who are affected by the systems. Learning Expectations: Above all design for values is design of technology in its social, economic, and political context. An understanding of design for values begins with the major strands of theoretical work and must include methodological approaches. on the interactions of technological development and social values. Review: The evaluation of past designs with a critical eye on the initial design, improvement of specific designs, and the development of guidelines for designs. There is a specific design focus distinct from those methods that are focused on critique rather than design. As opposed to traditional technical approaches to socially responsible design, there is a focus on iteration and the use of legal and social scholarship to refine or correct designs that builds upon computer supported cooperative work. Design is fundamental to all human activity. At the nexus of values, attitudes, needs and actions, designers have the potential to act as a transdisciplinary integrators and facilitators. The map of value systems and perspectives described by Beck and Cowan as ‘Spiral Dynamics’, can serve as a tool in the facilitation of ‘transdisciplinary design dialogue’.

101

Lessons Learned Esbjörn-Hargens and Brown describe the application of this framework to solving complex problems of local and global relevance and to sustainable development. When applied to design this kind of framework can help us to conceptualize how different value systems and different onto-epistemological assumptions change our experience of reality and therefore intentionality behind design.

Integrative Questions Why we design things and processes? In turn, affects what and how we design? What are the nexus of values, attitudes, needs and actions, designers? Is there is a specific design? What are the different kinds of design?

102

Book: Handbook of Computer Ethics Chapter 5:

Personality-Based, Rule-Utilitarian, and Lockean Justificatons of Intellectual

Property Quote: "The obvious line for justification is that each person is in possession of himself, if not by choice or conscious act, then by a kind of natural necessity."

Learning Expectations: The labor theory is called upon to aid the theory that possession is the root of title; yet it depends for its own success upon the proposition that the possession of self is the root of title to self. Review: It is unclear why Epstein should reach this conclusion. Locke never mentions one's possession of one's body as the basis for one's property in one's body; he begins simply by asserting one's body is one's property. Yet Epstein connects property to possession by saying, " Epstein directly, albeit unknowingly, points out a critical difference: we are not in possession of any particular external objects by a kind of natural necessity. If we were, the need for property laws would be greatly diminished. Each person, like a tree, would be rooted to his own parcel of external objects; this would be "of natural necessity," and no one would try to displace another from his natural and necessary attachments.

Lessons Learned His theory is largely a justification by negation: under his two conditions there are no good reasons for not granting property rights in possessions. This has led scholars such as Richard Epstein to a possession-based interpretation of Locke. Epstein argues that "first

103

possession" forms the basis for legal title and believes that this is the heart of Locke's position. For Epstein, the talk of labor is a smokescreen hiding the fundamental premise of Locke's argument that a person possesses his own body:

Integrative Questions 1. What justly can be reduced to property? 2. What is the conditions there are no good reasons for not granting property rights in possessions? 3. What is the limited capacity of humans put a natural ceiling? 4. How much each individual may appropriate through labor? 5. What is the condition prohibits the accumulation?

104

Book: Handbook of Computer Ethics Chapter 6: Informational Privacy: Concepts, Theories, and Controversies Quote: From a practical point of view, it might seem fruitful to approach privacy-related issues and concerns simply from the vantage point of various stipulated interests.

Learning Expectations: Some authors suggest that it is more useful to view privacy as either a presumed or stipulated interest that individuals have with respect to protecting personal information, personal property, or personal space than to think about privacy as a moral or legal right.

Review: In terms of an economic interest and that information about individuals might be thought of in terms of personal property that could be bought and sold in the commercial sphere. Clarke (1999) has recently suggested that privacy can be thought of as an "interest individuals have in sustaining personal space free from interference by other people and organizations." From a practical point of view, it might seem fruitful to approach privacy-related issues and concerns simply from the vantage point of various stipulated interests. Many Western European nations have preferred to approach issues related to individual privacy as issues of "data protection" for individuals -- i.e., as an interest in protecting personal information -- rather than in terms of a normative concept that needs philosophical analysis.

Lessons Learned Some of the philosophical and legal foundations of privacy will not only provide us with a rich perspective on privacy itself, but will also be particularly useful in helping us to understand what privacy is, why it is valued, and how it is currently threatened by certain activities on the Internet. Such an examination will also help us to differentiate between some subtle, yet significant, aspects of personal privacy. For example, it will enable us to differentiate

105

between the condition of privacy (what is required to have privacy) and a right to privacy, and between a loss of privacy and a violation or invasion of privacy.

Integrative Questions What is perspective privacy? Ho to determine privacy? Is privacy is ought to be right? Is there a moral, legal or otherwise? Is privacy helping us to understand?

106

Book: Handbook of Computer Ethics Chapter 7: Online Anonymity Quote: More strictly, and in reference to an arbitrary within a well-defined set (called the "anonymity set"), "anonymity" of that element refers to the property of that element of not being identifiable within this set. If it is not identifiable, then the element is said to be "anonymous". Learning Expectations: However, in other contexts what matters is that both anonymity and pseudonymity are concepts that are, among other things, concerned with hiding a person's legal identity. In such contexts people may not distinguish between anonymity and pseudonymity. The problem of determining whether or not the identity of a communication partner is the same as one previously encountered is the problem of authentication. Lessons Learned Electronic conversational media can provide physical isolation, in addition to anonymity. This prevents physical retaliation for remarks, and prevents negative or taboo behavior or discussion from tarnishing the reputation of the speaker. This can be beneficial when discussing very private matters, or taboo subjects or expressing views or revealing facts which may put someone in physical, financial, or legal danger (such as illegal activity, or unpopular or outlawed political views). With few perceived negative consequences, anonymous or semi-anonymous forums often provide a soapbox for disruptive conversational behavior.

107

Integrative Questions What is Anonymity in charity? What is the referring to the anonymous? What are the Anonymity and the press? Define the Anonymity on the Internet? Why Anonymity and politics involve?

Book: Handbook of Computer Ethics 108

Chapter 8:

Ethical Issues Involving Computer Security: Hacking,Hactivism, and Counter

hacking Quote: The objective of computer security can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.

Learning Expectations: Computer security provides a technical strategy to convert negative requirements to positive enforceable rules. For this reason, computer security is often more technical and mathematical than some computer science fields. Review: Systems designed with such methodology represent the state of the art of computer security although products using such security are not widely known. In sharp contrast to most kinds of software, they meet specifications with verifiable certainty comparable to specifications for size, weight and power. Secure operating systems designed this way are used primarily to protect national security information, military secrets, and the data of international financial institutions.

Lessons Learned In USA parlance, the term High Assurance usually suggests the system has the right security functions that are implemented robustly enough to protect DoD and DoE classified information. Medium assurance suggests it can protect less valuable information, such as income tax information. Secure operating systems designed to meet medium robustness levels of security functionality and assurance have seen wider use within both government and commercial markets.

109

Integrative Questions Why computer hacking? What are the code of computer security? Why computer needs security code? What are the effects of computer hacking? Define computer security?

110

Book: Handbook of Computer Ethics Chapter 9: Information Ethics and the Library Profession Quote: In addition to its holdings of relevant books and leading periodicals, the library contains a comprehensive collection of codes of ethics, many now available online, and an extensive collection of materials on other centers. Learning Expectations: The library has enhanced its computer resources in order to interact with other libraries, as well as to conduct online searches. Staffed by a professional research librarian, the library provides bibliographic assistance to researchers anywhere in the world and assists visiting scholars and practitioners. Review: The American Library Association has a special concern for the free flow of information and ideas. Its views have been set forth in such policy statements as the Library Bill of Rights and the Freedom to Read Statement where it has said clearly that in addition to the generally accepted legal and ethical principles and the respect for intellectual freedom which should guide the action of every citizen, membership in the library profession carries with it special obligations and responsibilities. Special collections librarians share fundamental values with the entire library profession. They should be thoroughly familiar with the ALA Code of Ethics and must adhere to the principles of fairness, freedom, professional excellence, and respect for individual rights expressed

therein.

Furthermore,

special

collections

librarians

have

extraordinary

responsibilities and opportunities associated with the care of cultural property, the preservation of original artifacts, and the support of scholarship based on primary research materials. At times their commitment to free access to information may conflict with their mission to protect and preserve the objects in their care. When values come into conflict, 111

librarians must bring their experience and judgment to bear on each case in order to arrive at the best solution, always bearing in mind that the constituency for special collections includes future generations. Lessons Learned Librarians have a special concern for the free flow of information and ideas. The American Library Association has set forth its views in such policy statements as the Library Bill of Rights and the Freedom to Read Statement where it is clearly stated that in addition to the generally accepted legal and ethical principles and the respect for intellectual freedom which should guide the action of every citizen, membership in the library profession carries with it special obligations and responsibilities. The statement which follows sets forth certain ethical norms which are basic to librarianship. Integrative Questions Has a special responsibility to maintain the principles of the Library Bill of Right?. Should learn and faithfully execute the policies of the institution of which one is a part and should endeavor to change those which conflict with the spirit of the Library Bill of Rights.? Must protect the essential confidential relationship which exists between a library user and the library? Must avoid any possibility of personal financial gain at the expense of the employing institution? Has an obligation to insure equality of opportunity and fair judgment of competence in actions dealing with staff appointments, retentions, and promotions. ?

112

Book: Handbook of Computer Ethics Chapter 10: Ethical Interest in Free and Open Source Software Quote: Software that cannot be modified and redistributed without further limitation, but whose source code is visible (e.g., “source viewable” or “open box” software, including “shared source” and “community” licenses), is not considered here since such software doesn’t meet the definition of OSS/FS. OSS/FS is not “freeware”; freeware is usually defined as proprietary software given away without cost, and does not provide the basic OSS/FS rights to examine, modify, and redistribute the program’s source code. Learning Expectations: Instead, this paper emphasizes quantitative measures (such as experiments and market studies) to justify why using OSS/FS products is in many circumstances a reasonable or even superior approach. I should note that while I find much to like about OSS/FS, I’m not a rabid advocate; I use both proprietary and OSS/FS products myself. Vendors of proprietary products often work hard to find numbers to support their claims; this page provides a useful antidote of hard figures to aid in comparing proprietary products to OSS/FS.

Review: Many proprietary software product licenses include clauses that forbid public criticism of the product without the vendor’s permission. Obviously, there’s no reason that such permission would be granted if a review is negative -- such vendors can ensure that any negative comments are reduced and that harsh critiques, regardless of their truth, are never published. This significantly reduces the amount of information available for unbiased comparisons. Reviewers may choose to change their report so it can be published (omitting important negative information), or not report at all -- in fact, they might not even start the evaluation. Some laws, such as UCITA (a law in Maryland and Virginia), specifically enforce 113

these clauses forbidding free speech, and in many other locations the law is unclear -- making researchers bear substantial legal risk that these clauses might be enforced.

Lessons Learned Other alternative terms for OSS/FS, besides either of those terms alone, include “libre software” (where libre means free as in freedom), “livre software” (same thing), free-libre / open-source software (FLOS software or FLOSS), open source / Free Software (OS/FS), free / open source software (FOSS or F/OSS), open-source software (indeed, “open-source” is often used as a general adjective), “freed software,” and even “public service software” (since often these software projects are designed to serve the public at large). I recommend the term “FLOSS” because it is easy to say and directly counters the problem that “free” is often misunderstood as “no cost”. However, since I began writing this document before the term “FLOSS” was coined, I have continued to use OSS/FS here.

Integrative Questions Is there no Discrimination against Fields of Endeavor? What is the Distribution of License? How License Must Not Be Specific to a Product? Why License Must Not Restrict Other Software Is there no provision of the license may be predicated on any individual technology or style of interface?

114

Book: Handbook of Computer Ethics Chapter 11: Internet Research ethics: The Field and Its Critical Issues Quote: Research is a broad term. Here, it is used to mean "looking something up (on the Web)". It includes any activity where a topic is identified, and an effort is made to actively gather information for the purpose of furthering understanding. Learning Expectations: Common applications of Internet research include personal research on a particular subject (something mentioned on the news, a health problem, etc), students doing research for academic projects and papers, and journalists and other writers researching stories. It should be distinguished from scientific research - research following a defined and rigorous process carried out on the Internet; from straightforward finding of specific info, like locating a name or phone number; and from research about the Internet. Review: First of all, online existence involves a bodily abstraction which implies abstraction from bodily identity and individuality. Secondly, online existence also entails abstraction from our situational orientation - an orientation which includes sharing time and space with others. Thirdly, online existence is presence- as well as globally-oriented. Given the bodily abstraction of online existence, we can also say that digital being-with-others tends to be ghostly-oriented. These characteristics of online existence thus help sharpen the point: ethical dilemmas of Internet research arise from the tension between the proper object of research, i.e. online existence, and bodily existence. The borderline between these two phenomena is interface communication itself.

115

Lessons Learned The body is the primordial medium of our being-in-the-world. We can take a distance from it only in a derivative way and make it an object within, for instance, the digital casting. The digital casting concerns our existence, i.e., the way we share the world with others as well as, more fundamentally, the way we cast Being itself. (There is a difference between digital ontology and digital metaphysics. From a metaphysical point of view, the real is the digital and vice versa. To put it in Berkeley's formula: To be, is to be digital or Esse est computari (Capurro 1999, Berkeley 1965, 62).) Digital ontology concerns our understanding of Being. We believe that we understand something in its being when we are able to re-make digitally. Within the digital casting of Being we look at humans as they are online instead of embracing the digital within the "life-world" (Husserl). The online casting pervades our lives, including our lives as researchers.

Integrative Questions What are the characteristics of online existence? What are the including whole societies as weakest members or non-members of the online world. Why researchers online should be aware of their own gender biases within their own culture? What are the cultures that are the object of their research? Is there an ethics of care and less by utilitarian and/or deontological premises that may lead either to a purely instrumental or moralist view.?

116

Book: Handbook of Computer Ethics Chapter 12: Health Information Technology: Challenges in Ethics, Science and Uncertainly Quote: Health IT will help consumers gather all of their health information in one place so they can thoroughly understand it and share it securely with their health care providers so they get the care that best fits their individual needs. Learning Expectations: Electronic health information exchange promises an array of potential benefits for individuals and the U.S. health care system through improved clinical care and reduced cost. At the same time, Review: This environment also poses new challenges and opportunities for protecting individually identifiable health information. In health care, accurate and complete information about individuals is critical to providing high quality, coordinated care. If individuals and other participants in a network lack trust in electronic exchange of information due to perceived or actual risks to individually identifiable health information or the accuracy and completeness of such information, it may affect their willingness to disclose necessary health information and could have life-threatening consequences.

Lessons Learned Coordinated attention at the Federal and State levels is needed both to develop and implement appropriate privacy and security policies. Only by engaging all stakeholders, particularly consumers, can health information be protected and electronically exchanged in a manner that respects variations in individuals’ views on privacy and access.

117

Integrative Questions What are the Early detection of infectious disease outbreaks around the country? Is there an improved tracking of chronic disease management? What are the Evaluation of health care based on value? What are the enabled by the collection of de-identified price and quality information that can be compared? Why Reduce health care costs?

118

Book: Handbook of Computer Ethics Chapter 13: Ethical Issues of Information and Business Quote: Business ethics is one of the forms of applied ethics that examines ethical principles and moral or ethical problems that can arise in a business environment. Learning Expectations: In the increasingly conscience-focused marketplaces of the 21st century, the demand for more ethical business processes and actions (known as ethicism) is increasing. Simultaneously, pressure is applied on industry to improve business ethics through new public initiatives and laws (e.g. higher UK road tax for higher-emission vehicles). Review: Business ethics can be both a normative and a descriptive discipline. As a corporate practice and a career specialization, the field is primarily normative. In academia, descriptive approaches are also taken. The range and quantity of business ethical issues reflects the degree to which business is perceived to be at odds with non-economic social values. Historically, interest in business ethics accelerated dramatically during the 1980s and 1990s, both within major corporations and within academia. For example, today most major corporate websites lay emphasis on commitment to promoting non-economic social values under a variety of headings (e.g. ethics codes, social responsibility charters). In some cases, corporations have rebranded their core values in the light of business ethical considerations (e.g. BP's "beyond petroleum" environmental tilt). The term CSR came in to common use in the early 1970s although it was seldom abbreviated. The term stakeholder, meaning those impacted by an organization's activities, was used to describe corporate owners beyond shareholders as a result of an influential book by R Freeman in 1984. 119

Whilst there is no recognized standard for CSR, public sector organizations (the United Nations for example) adhere to the Triple Bottom Line (TBL). It is widely accepted that CSR adheres to similar principals but with no formal act of legislation.

Lessons Learned Managing risk is a central part of many corporate strategies. Reputations that take decades to build up can be ruined in hours through incidents such as corruption scandals or environmental accidents. These events can also draw unwanted attention from regulators, courts, governments and media. Building a genuine culture of 'doing the right thing' within a corporation can offset these risks Integrative Questions What are the Corporate social responsibility ? Find the Issues regarding the moral rights and duties between a company and its shareholders: fiduciary responsibility, stakeholder concept v. shareholder concept.? What is Ethical issues concerning relations between different companies? Who are the Leadership issues: corporate governance. ? Is there a Political contributions made by corporations?

120

Book: Handbook of Computer Ethics Chapter 14: Responsibilities for Information on the Internet Quote: The same connection allows that computer to send information to servers on the network; that information is in turn accessed and potentially modified by a variety of other interconnected computers. Learning Expectations: Using and citing information found on the Internet is a little like swimming on the beach without a lifeguard. How can you tell whether or not an Internet resource is appropriate for a research project? A researcher should evaluate Internet pages to make sure that they are appropriate information sources for a particular assignment. Review: When referring to a database, it could refer to the content being broken up into specific fields that have been indexed to maximize search capability. Design is a criterion that surfaces frequently with regard to web pages and web sites. The pages should be properly linked externally and internally to facilitate navigation. There should not be any broken links. The design should be appropriate to the content, and maximize utility. Files and graphics should be of a size that allows them to be loaded quickly. the design should be based upon an easilygrasped hierarchy or logic. The use of frames in the web site should not result in the user becoming lost, or take up valuable screen area. The users' primary method of accessing the site should be considered. If the site is designed for network access primarily, then the greater bandwidth of that medium can be employed. If dialup modem is the primary means of access, then the site should conform to those standards. Although multimedia hardware such as graphics accelerators, better graphics cards, and sound cards are now more commonplace, site hardware requirements should be clearly identified and conform to generally-used standards.

121

Lessons Learned The importance of accuracy cannot be overstated. When possible, information should be cross-checked to verify its accuracy. The source should not only be reliable, but error-free. Obvious inaccuracies, misspellings, and poor grammar often (but not always) indicate a lack of careful authorship. With respect to web pages, links from the source should be relevant and appropriate. The subject should be covered comprehensively within the intended scope (i.e., completely). There should be no question as to whether the information presented is factual, opinion, or interpretation of facts.

Integrative Questions How reliable and free from error is the information? Who is the author or developer of the material? Who is the publisher or producer of the site? Are there footnotes and/or a bibliography? is there an attempt to sway the opinion of the audience?

122

Book: Handbook of Computer Ethics Chapter 15: Virtual Reality and Computer Simulation Quote: This is different from the current, technologically achievable concept of virtual reality. Virtual reality is easily distinguished from the experience of "true" reality; participants are never in doubt about the nature of what they experience. Simulated reality, by contrast, would be hard or impossible to distinguish from "true" reality. Learning Expectations: However, such messages have not been made public if they have been found, and the argument relies on the messages being truthful. As usual, other hypotheses could explain the same evidence. In any case, if such constants are in fact infinite, then at some point an apparently meaningful message will appear in them (this is known as the infinite monkey theorem), not necessarily because it was placed there. Review: In a virtual-people simulation, every inhabitant is a native of the simulated world. They do not have a "real" body in the external reality. Rather, each is a fully simulated entity, possessing an appropriate level of consciousness that is implemented using the simulation's own logic (i.e. using its own physics). As such, they could be downloaded from one simulation to another, or even archived and resurrected at a later date. It is also possible that a simulated entity could be moved out of the simulation entirely by means of mind transfer into a synthetic body. Another way of getting an inhabitant of the virtual reality out of its simulation would be to "clone" the entity, by taking a sample of its virtual DNA and create a real-world counterpart from that model. The result would not bring the "mind" of the entity out of its simulation, but its body would be born in the real world.

123

Lessons Learned Taken one step further, the "fine grained" elements of our world could themselves be simulated since we never see the sub-atomic particles due to our inherent physical limitations. In order to see such particles we rely on other instruments which appear to magnify or translate that information into a format our limited senses are able to view: computer print out, lens of a microscope, etc. Therefore, we essentially take on faith that they're an accurate portrayal of the fine grained world which appears to exist in a realm beyond our natural senses. Assuming the sub-atomic could also be simulated then the processing power required to generate a realistic world would be greatly reduced.

Integrative Questions Is it possible, even in principle, to tell whether we are in a simulated reality? Is there any difference between a simulated reality and a "real" one? How should we behave if we knew that we were living in a simulated reality? What is virtual simulation? Define simulation?

124

Book: Handbook of Computer Ethics Chapter 16: Genetic Information: Epistemological and Ethical Issues Quote: Philosophy has remained an intellectual enterprise, which deals with ideas or concepts by way of creating, criticizing and justifying it. Learning Expectations: To begin with, there is no doubt that personal experiences are socially and theoretically constructed, and that it is in this manner that knowledge is produced. The implication is that knowledge is a product of personal, social and theoretical experience. It is equally true, that such socially bound problems especially the ethics related issues and phenomenon stem from epistemological experiences.

The claim to be advanced in this paper is that there are no

genuine ethical problems; that ethical problems are not necessarily religious problems as they are often concerned, and most of all, that what we call ethical problems are some sort of epistemological problems moralized. Review: From the very on-set, it is necessary to differentiate between ethics and morality. Until such distinction is made, it might appear too difficult to ascertain whether ethical problems are epistemological problems or not. There is no claim here that, the two concepts – ethics and morality may not or cannot in certain circumstances be used interchangeably. Scholars often correctly use the two terms as though they are the same. J.A. Aigbodioh for instance refers to ethics as one of the moral disciplines. Jacques Maritain says ethics or morals are the practical science which aims at procuring man are unqualified good. Properly understood however, while ethics is a branch of philosophy concerned with the study of the fundamental principles of morality and human conduct, morality on the other hand is connected with the rightness of action or behaviour of individuals, class, group or society at large. i The difference lies on the point that while morality concerns itself with the set of rules and principles involved in the assessment of actions of individuals or groups. The morality of a

125

class or group has to do with the right beliefs or behaviours recommended and approved for the class or group in question. Ethics on the other hand is a step further from morality. It is an intellectual reflection on those approved norms and principles of morality with the intent of proffering answers to question that are raised on the moral principles and norms of morality.

Lessons Learned The consequence of this is that, ethical problems are systematic or intellectual problems requiring conceptual analysis, clarification and deeper reflection.

Ethics therefore does not

aim at describing how individuals, group or people behave, neither does it only try to identify the pattern, norm or principles of conduct of an individuals or people ought to behave, as well as why such principles or norms should be considered good or bad, appropriates or otherwise.

Integrative Questions Is there any such thing as objectivity in moral action or choice? Can we justify our moral claims and judgments? are there such things as facts or truth about morality? Are our actions actually guided by moral considerations? Define Genetic Information?

126

Book: Handbook of Computer Ethics Chapter 17: The Ethics of Cyber Conflict Quote: Cyberethics, also referred to as internet ethics, is a branch of ethics that studies the ethical dilemmas brought on by the emergence of digital technologies. With the advent of the internet conflicts over privacy, property, security, accuracy, accessibility, censorship and filtering have arose. Learning Expectations: Since then, controversy over who or what should be responsible for governing and maintaining ethical conventions in cyberspace have been heatedly debated, ruled upon and amended. Despite being a universal topic, cyberethics may change from country to country, where cultural and societal ethics may differ and therefore are reflected in the debates over the ethics of cyberspace. With the speed at which the internet changes, cyberethics evolves as Review: Accessibility, censorship and filtering bring up many ethical issues that have several branches in cyberethics. Many questions have arisen which continue to challenge our understanding of privacy, security and our participation in society. Throughout the centuries mechanisms have been constructed in the name of protection and security. Today the applications are in the form of software that filters domains and content so that they may not be easily accessed or obtained without elaborate circumvention or on a personal and business level through free or content-control software. Internet censorship and filtering are used to control or suppress the publishing or accessing of information. Lessons Learned The legal issues are similar to offline censorship and filtering. The same arguments that apply to offline censorship and filtering apply to online censorship and filtering; whether people 127

are better off with free access to information or should be protected from what is considered by a governing body as harmful, indecent or illicit. The fear of access by minors drives much of the concern and many online advocate groups have sprung up to raise awareness and of controlling the accessibility of minors to the internet.

Integrative Questions What are the data record-keeping systems whose very existence is secret? Find out what information about the person is in a record and how it is used? Is there a a way for a person to prevent information about the person that was obtained for one purpose from being used or made available for other purposes without the person's consent. Is there a way for a person to correct or amend a record of identifiable information about the person? Any organization creating, maintaining, using, or disseminating records of identifiable personal data ?

128

Book: Handbook of Computer Ethics Chapter 18: A Practical Mechanism for Ethical Risk Quote: In the risk sciences, it is common to distinguish between “objective risk” and “subjective risk”. Learning Expectations: Problems of risk have seldom been treated systematically in moral philosophy. A possible defence of this limitation is that moral philosophy can leave it to decision theory to analyse the complexities that indeterminism and lack of knowledge give rise to in real life. Review: Issues of risk have given rise to heated debates on what levels of scientific evidence are needed for policy decisions. The proof standards of science are apt to cause difficulties whenever science is applied to practical problems that require standards of proof or evidence other than those of science. Two major types of errors are possible in a decision whether or not to accept a scientific hypothesis. The first of these consists in concluding that there is a phenomenon or an effect when in fact there is none. This is called an error of type I (false positive). The second consists in missing an existing phenomenon or effect. This is called an error of type II (false negative). In the internal dealings of science, errors of type I are in general regarded as more problematic than those of type II. The common scientific standards of statistical significance substantially reduce the risk of type I errors but do not protect against type II errors. Lessons Learned According to the conventional division of labour between the two disciplines, moral philosophy provides assessments of human behaviour in well-determined situations. Decision theory takes assessments of these cases for given, adds the available probabilistic information, 129

and derives assessments for rational behavior in an uncertain and indeterministic world. On this view, no additional input of moral values is needed to deal with indeterminism or lack of knowledge, since decision theory operates exclusively with criteria of rationality.

Integrative Questions What is the Ethical Risk? What is the practical Mechanism? Find the risk? Is there a moral on ethical risk? What are the causes of risk?

130

Book: Handbook of Computer Ethics Chapter 19: Regulation and Governance of the Internet Quote: It is upon this layer that the other two layers (logical and content) are built, and governance of the infrastructure layer is therefore critical to maintaining the seamlessness and viability of the entire network. Learning Expectations: Moreover, as we shall discuss further later, the lack of adequate competition policies and inadequately developed national markets also play a significant role in raising access costs for end-users. Increasing connectivity within regions has reduced some of the concerns for the costs of connection to major backbones, as has absolute cost of undersea optical cable services. Review: This situation is particularly problematic for developing countries, which generally lack ownership of Tier 1 infrastructure and are often in a poor position to negotiate favourable access rates. By some accounts, ISPs in the Asia-Pacific region paid companies in the United States US$ 5 billion in “reverse subsidies” in 2000; in 2002, it was estimated that African ISPs were paying US$ 500 million a year. One commentator, writing on access in Africa, argues that “the existence of these reverse subsidies is the single largest factor contributing to high bandwidth costs”. 16 It should be noted that not everyone would agree with that statement, and that high international access costs are not by any means the only reason for high local access costs. A related – indeed, in a sense, the underlying – problem is the general lack of good local content in many developing countries. It is this shortage of local content, stored on local servers, that leads to high international connectivity costs as users are forced to access sites and information stored outside the country.

131

Lessons Learned Most importantly, this section attempts to make clear the real importance of Internet governance by drawing links between apparently technical decisions and their social, economic or political ramifications. Indeed, an important principle (and difficulty) of Internet governance is that the line between technical and policy decision-making is often blurred. Understanding the “real world” significance of even the most arcane technical decision is essential to understanding that decision and its processes, and to thinking of new ways to structure Internet governance. Integrative Questions How to define “universal”? Find the Universal access is frequently taken to mean access across geographic areas? What are the digital divide, to refer to the need for equitable access? Find the rich and poor between countries.? Should universal access include support services? Why does plagiarism matter?

132

Book: Handbook of Computer Ethics Chapter 20: Information Overload Quote: People nowadays are logging in to the net not only to surf or browse but to donate or share a piece of information. According to Sohora Jha, journalists are using the web to conduct their research, getting information regarding interviewing sources and press releases, updating news online, and thus it shows the gradual shifts in attitudes because of the rapid increase in the Internet.[ Learning Expectations: Many academics, corporate decision-makers, and federal policy-makers recognize the magnitude and growing impact of this phenomenon. In June 2008 a group of interested researchers from a diverse set of corporations, smaller companies, academic institutions and consultancies created the Information Overload Research Group (IORG), a non-profit interest group dedicated to raising awareness, sharing research results and promoting the creation of solutions around Information Overload. Review: Recent research suggests that an "attention economy" of sorts will naturally emerge from information overload, allowing Internet users greater control over their online experience with particular regard to communication mediums such as e-mail and instant messaging. This could involve some sort of cost being attached to e-mail messages. For example, managers charging a small fee for every e-mail received - e.g. $5.00 - which the sender must pay from their budget. The aim of such charging is to force the sender to consider the necessity of the interruption. According to Steve Beller, “I’m defining information overload as a state of having more information available that one can readily assimilate, that is, people have difficulty absorbing 133

the information into their base of knowledge. This hinders decision-making and judgment by causing stress and cognitive impediments such as confusion, uncertainty and distraction” [ -“A symptom of the high-tech age, which is too much for one human being to absorb in an expanding world of people and technology. It comes from all sources including TV, newspapers, magazines as well as wanted and unwanted regular e-mail and faxes. It has been exacerbated enormously because of the formidable number of results obtained from web search engines.” Lessons Learned Media like the internet are conducting research to promote awareness of information overload. In , Kyunghye Kim, Mia Liza A. Lustria, Darrell Burke, and Nahyun Kwon conducted a study regarding people who have encountered information overload while searching for health information about cancer and what the impact on them was. The conclusion drawn from the research discusses how health information should be distributed and that information campaigns should be held to prevent irrelevant or incorrect information being circulated on the internet.

Integrative Questions What are the Contradictions and inaccuracies ? Is there an available information ? Find the low signal-to-noise ratio ? Is there a lack of a method for comparing and processing? What are the different kinds of information ?

134

Book: Handbook of Computer Ethics Chapter 21 : Email Spam Quote: E-mail spam has steadily, even exponentially grown since the early 1990s to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail users. Learning Expectations: Often, image spam contains nonsensical, computer-generated text which simply annoys the reader. However, new technology in some programs try to read the images by attempting to find text in these images. They are not very accurate, and sometimes filter out innocent images of products like a box that has words on it. A newer technique, however, is to use an animated GIF image that does not contain clear text in its initial frame, or to contort the shapes of letters in the image (as in CAPTCHA) to avoid detection by OCR tools. Review: Spam is legally permissible according to the CAN-SPAM Act of 2003 provided it follows certain criteria: a truthful subject line; no false information in the technical headers or sender address; "conspicuous" display of the postal address of the sender; and other minor requirements. If the spam fails to comply with any of these requirements, then it is illegal. Aggravated or accelerated penalties apply if the spammer harvested the email addresses using methods described earlier. A review of the effectiveness of CAN-SPAM in 2005 showed that the amount of sexually explicit spam had significantly decreased since 2003 and the total volume had begun to level off. Senator Conrad Burns, a principal sponsor, noted that "Enforcement is key regarding the CAN-SPAM legislation." In 2004 less than 1% of spam complied with the CAN-SPAM Act of 2003.

135

Several countries have passed laws that specifically target spam, notably Australia and all the countries of the European Union. Article 13 of the European Union Directive on Privacy and Electronic Communications (2002/58/EC) provides that the EU member states shall take appropriate measures to ensure that unsolicited communications for the purposes of direct marketing are not allowed either without the consent of the subscribers concerned or in respect of subscribers who do not wish to receive these communications, the choice between these options to be determined by national legislation. Lessons Learned In order to send spam, spammers need to obtain the e-mail addresses of the intended recipients. To this end, both spammers themselves and list merchants gather huge lists of potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is done without the consent (and sometimes against the expressed will) of the address owners. As a consequence, spammers' address lists are inaccurate. A single spam run may target tens of millions of possible addresses — many of which are invalid, malformed, or undeliverable.

Integrative Questions What is gathering addresses? How to Delivering spam messages Find the Using Webmail services Why other people's computers How to open relays

136

Book: Handbook of Computer Ethics Chapter 22: The Matter of Plagiarism: What, Why, and If Learning Expectations: Likewise, professors need to trust their students. They have to have confidence in the truthfulness of students' statements in class, the honesty of their efforts to learn, and their trustworthiness in the papers and projects they submit for grading Review: Plagiarism is the use or close imitation of the language and ideas of another author and representation of them as one's own original work. Within academia, plagiarism by students, professors, or researchers is considered academic dishonesty or academic fraud and offenders are subject to academic censure, up to and including expulsion. In journalism, plagiarism is considered a breach of journalistic ethics, and reporters caught plagiarizing typically face disciplinary measures ranging from suspension to termination. Some individuals caught plagiarizing in academic or journalistic contexts claim that they plagiarized unintentionally, by failing to include quotations or give the appropriate citation. While plagiarism in scholarship and journalism has a centuries-old history, the development of the Internet, where articles appear as electronic text, has made the physical act of copying the work of others much easier, simply by copying and pasting text from one web page to another. Plagiarism is not copyright infringement. While both terms may apply to a particular act, they are different transgressions. Copyright infringement is a violation of the rights of a copyright holder, when material protected by copyright is used without consent. On the other hand, plagiarism is concerned with the unearned increment to the plagiarizing author's reputation that is achieved through false claims of authorship. Lessons Learned Generally, although plagiarism is often loosely referred to as theft or stealing, it has not been set as a criminal matter in the courts.[10] Likewise, plagiarism has no standing as a criminal offense in the 137

common law. Instead, claims of plagiarism are a civil law matter, which an aggrieved person can resolve by launching a lawsuit. Acts that may constitute plagiarism are in some instances treated as copyright infringement, unfair competition, or a violation of the doctrine of moral rights. The increased availability of intellectual property due to a rise in technology has furthered the debate as to whether copyright offences are criminal.

Integrative Questions What is the deepen their commitments, and to develop their capacities for service." is it realistic to expect that he or she won't do so later? Why does plagiarism matter? Is anyone really hurt by it?

138

Book: Handbook of Computer Ethics Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File Sharing Quote: File sharing can be implemented in a variety of storage and distribution models. Current common models are the centralized server-based approach and the distributed peer-to-peer (P2P) networks. Learning Expectations: Recently, Facebook opened its API to 3rd party developers which has allowed for a new type of file-sharing service to emerge. Box.net and FreeDrive.com[1] are two examples of companies that have specific Facebook applications that allow file sharing to be easily accomplished between friends. Review: The first generation of peer-to-peer file sharing networks over the Internet had a centralized server system. This system controls traffic amongst the users. The servers store directories of the shared files of the users and are updated when a user logs on. In the centralized peer-to-peer model, a user would send a search to the centralized server of what they were looking for. The server then sends back a list of peers that have the data and facilitates the connection and download. The server-client system is efficient because the central directory is constantly being updated and all users had to be registered to use the program. However, there is only a single point of entry, which could result in a collapse of the network. In addition, it is possible to have out-of-date information or broken links if the server is not refreshed.[3] The first file-sharing programs on the Internet marked themselves by inquiries to a server, either the data to the download held ready or in appropriate different Peers and so-called Nodes furtherobtained, so that one could download there. Two examples were Napster (today using a pay system) and eDonkey2000 in the server version (today, likewise with Overnet and KAD - network decentralized). Another notable instance of peer to peer file sharing, which still has a free version, is Limewire.

139

Lessons Learned The Internet existed prior to WWIVnet, but it was only available to academic institutions, governments and large corporations. FidoNet was a hierarchical (server/client) based network thus not peer-to-peer. WWIVnet was the first widely available distributed network model that you could bring to your home. That all being said, it did not have the capability to share files built in. It was not until the introduction of Linker34 by Jayson Cowan did we see the first P2P application over a distributed end user network.[2] Requests for file lists and specific files where handled by the peer much in the same way as second generation peer-to-peer file sharing and no central server was used for this process. Integrative Questions Why file-sharing enables people to share files? What feature allows you to access and share files? Is there a private sharing files ? What is Peer to Peer file sharing? What are the technologies to use in file sharing?

140

Book: Handbook of Computer Ethics Chapter 24: Censorship and Access to Expression Quote: "Censorship through consensus" is also a real possibility. There are countries where the adherence to a shared social, though not religious, code is a fact of life. Understanding that entails discerning where the boundaries of expression are, and where they might be interfered with in a consensus situation. Learning Expectations: To understand censorship, and the impulse to censor, it is necessary to strip away the shock epithet value that is attached to the word at first utterance. Review: Censorship -- the control of the information and ideas circulated within a society -- has been a hallmark of dictatorships throughout history. In the 20th Century, censorship was achieved through the examination of books, plays, films, television and radio programs, news reports, and other forms of communication for the purpose of altering or suppressing ideas found to be objectionable or offensive. The rationales for censorship have varied, with some censors targeting material deemed to be indecent or obscene; heretical or blasphemous; or seditious or treasonous. Thus, ideas have been suppressed under the guise of protecting three basic social institutions: the family, the church, and the state. One must recognize that censorship and the ideology supporting it go back to ancient times, and that every society has had customs, taboos, or laws by which speech, dress, religious observance, and sexual expression were regulated. In Athens, where democracy first emerged, censorship was well known as a means of enforcing the prevailing orthodoxy. Indeed, Plato was the first recorded thinker to formulate a rationale for intellectual, religious, and artistic censorship. In his ideal state outlined in The Republic, official censors would prohibit mothers and nurses from relating tales deemed bad or evil. Plato also proposed that unorthodox notions about God or the hereafter be treated as crimes and that formal procedures be established to suppress heresy. Freedom of speech in Ancient Rome was reserved

141

for those in positions of authority. The poets Ovid and Juvenal were both banished, and authors of seditious writings were punished severely. The emperor Nero deported his critics and burned their books. Lessons Learned Not all censorship is equal, nor does all arise from government or external force. People selfcensor all the time; such restraint can be part of the price of rational dialogue. The artist Ben Shahn's poster illustration reads: "You have not converted a man because you have silenced him." Silence can indicate a forced assent, or conversely, it can be contemplative, a necessary part of dialogue that rises above the din of quotidian life. Integrative Questions What are the Moral censorship? is the removal of materials that are obscene or otherwise morally questionable.? What is Military censorship is the process of keeping military intelligence and tactics? Find the Political censorship ? What is Religious censorship is the means by which any material objectionable to a certain faith is removed?

142

THe BoTToM oF THe PYRaMiD

143

Book: The Fortune at the Bottom of the Pyramid Chapter 1: The Market at the Bottom of the Pyramid Quote: “Trust is difficult to build after 50 years of suspicion and prejudice based on little evidence and strong stereotyping”. Learning Expectations: I also expected that the writer may teach use about the potentials of those in the bottom of the pyramid for market development. Review: Mr. Prahalad says that this market remains untapped because of the dominant logic held by companies. Companies held that the poor are not a viable market, pricely because they do not have money to buy nor they can afford their products and services; that the poor do not have use for their produces;

that only developed countries appreciate and can pay for

technological innovations; that BOP market is not critical for long-term growth; and that it is difficult to recruit managers for BOP markets. But the writer contradicts these assumptions saying that people comprising the BOP market represent 70% of the population of developing world with purchasing power parity of about $3 trillion; the poor are getting connected and networked as they readily accept advanced technology. What is left for the firms is to convert the poor into consumers .

The market development can make services and products 144

affordable, accessible and available to the poor. This means the involvement of the private sector in the market: resulting to a harmonious relationship between the poor and the private sector replacing mistrust into trust. And companies through persistent effort and the provision of world-class quality, mutual trust and responsibility between them and BOP consumers. The needs of the poor are many and the growth opportunity in this market can only be tapped if companies learn to innovate. Lessons Learned The chapter provides insight about the new approach in poverty alleviation. It involves focusing on the poor who are at the bottom of the pyramid.

The approach calls for a

collaboration and partnership between the poor and companies, civil society and private and public sector. Integrative Questions 1. What is meant by bottom of the pyramid? 2. What are features of BOP market 3. What is the dominant logic concerning BOP market held by companies and private sector? 4. What is required to meet success in the BOP market? 5. How can people at the BOP be developed into a consuming public?

145

Book: The Fortune at the Bottom of the Pyramid Chapter 2: Products and Services for BOP Quote : “I believe that more innovative, sustainable solutions will increasingly emerge from serving the BOP markets than from the developed markets ”- C.K. Prahalad Learning Expectations I also wish to understand the principles of innovation that are develop for companies intending to make business in these markets. Review: As he writes, the market development calls for significant forgetting curve in the organization, this is an ability to discard traditional approaches. He believes that this market represents an opportunity to create economic value in a fundamentally new way. What is also interesting to note from the chapter is that the needs of the consumer might not be even obvious to them nor to the companies. Companies through their managers need to invest in research to understand the needs of this market. They are gigantic which might surprise them. In summed, the writer says that companies need a new philosophy of innovation and product and service delivery to the BOP markets. But companies need to start with zero-based view of innovations and begin to rethink and re-examine their assumptions.

The BOP markets,

according to the writer can serve as catalysts for new burst of creativity. 146

Lessons Learned There are many lessons that I learned from this chapter. I begin to understand why the BOP markets are attractive for companies. From the writer we learned that BOP markets challenge companies to innovate. Integrative Questions 1. What challenges are offered by BOP markets to companies? 2. What is the new philosophy of innovation all about? 3. What are principles of innovations developed for companies? 4. What can companies do to have zero-based view? 5. What are the basic economics at the BOP markets?

147

Book: The Fortune at the Bottom of the Pyramid Chapter 3: A Global Opportunity Quote: “ What we see here is the convergence of the traditional roles of the firm and the consumer and the distributor and the consumer ”- C.K. Prahalad Learning Expectations: I expected that I may learn about the needed approach in engaging the BOP. Review Shortage and the cost of capital force firms in BOP markets to be very focused on the efficiency of capital use. In operating in BOP markets, the companies’ boundaries expand beyond its legal parameters and begin to engage and empower the large and economically isolated segment or the informal sectors. Besides working at the BOP enable companies to learn rapidly that they have to learn to live with a wide variety of relationships with a large number of institutions. As such the firm had to learn to cope with the differing priorities time scales, decision cycles and perspectives of both the causes of the problem and the nature and efficacy of the solution. In the end, these companies learn how to transform their ideals of good corporate citizenship and social responsibility into their core business of delivering value on a day-to-day business basis. Private sector involvement in development can be a win for both the BOP consumers and the private sector. They all learn and flow of ideas, knowledge 148

and innovation will become a two-way street from the developed countries to the developing countries as well and vice versa. Companies can help BOP markets to develop, and also learn from BOP markets.

Lessons Learned: From this chapter I learned about the role of BOP markets in the global economy. As pointed out in the chapter, the writer helps me learned the sources of opportunites for companies catering to BOP markets Integrative Questions: 1. What global opportunity are present in the BOP markets? 2. What are the sources of opportunities at BOP markets? 3. What is the concept of the new approach in engaging at BOP markets? 4. What is price performance means? 5. What are the gains of companies in engaging in BOP markets?

149

Book: “ The Fortune at the Bottom of the Pyramid” Chapter 4: The Ecosystem for Wealth Creation Quote: “Ultimately the goal in development is to bring as many people as possible to enjoy the benefits of an inclusive market”-C.K. Prahalad.

Learning Expectations: In reading this chapter, I expect to understand the ecosystem for wealth creation. Review Market-based ecosystem is defined as a framework that allows private sector and social actors with different traditions and motivations, varying in sizes and areas of influence to act together and create wealth in a symbiotic relationship. In the symbiotic relationship each constituent has a role to play and is dependent of each other. The system adapts and r\evolves and can be resilient and flexible. While there could be distortions at the margin, the system is always oriented toward a dynamic equilibrium. The market-based ecosystem provides social collateral of open and honest entrepreneurship. It provides the tools for the poor and the disadvantaged to be connected seamlessly with the rest of the world in a mutually beneficial and non-exploitative way. The ecosystem provides them with skills and opportunity that are often denied to them. A nodal firm in the ecosystem is that which facilitates the entire 150

functioning of the network. It provides expertise and establishes technical standards for a wide variety of private-sector enterprises from supplier factors to individual entrepreneurs in remote villages. The impact of the market-based ecosystem and that of the nodal firm is very important in developing the disciplines of the market that includes: respect for contracts, understanding mutuality of benefits, being local and at the same time getting the benefits of being national and global. But most important of all both parties recognized the benefits of transparency in relationship.There are steps in creating a transaction governance capacity based on the marketing ecosystem: help the poor understand that there is a win-win situation for them and the firm by respecting contracts. Respect for the contract must transcends to people everyday. Market-based ecosystems can be a source of educating the poor of the benefits of transparency in transactions. Individuals are taught to respect contracts, be they implicit or explicit with the company. The private sector can reduce the asymmetries in information, choice, ability to enforce contracts and social standing like using information technology to build a network can create a powerful motivation to be part of the system; understanding the rationales for the contracting system: the hows and the whys- reduce the cost of capital and increases access to capital.

151

Lessons Learned In reading this chapter, I learned about market-based ecosystem. From this knowledge I learned to understand the symbiotic relationship within the ecosystem. Integrative Questions: 1. What is a market-oriented ecosystem? 2. How does symbiotic relationship works in the ecosystem? 3. How can the market-based ecosystem help the poor? 4. What is the role of market-oriented ecosystem in wealth creation in the BOP markets? 5. What are the steps in creating transaction governance?

152

Book: The Fortune at the Bottom of the Pyramid Chapter 5: Reducing Corruption: Transaction Governance Capacity Quote: “Corruption is about providing privileged access to resources and recognizing the time value of money”- C.K. Prahalad. Learning Expectations: I am expecting to learn about transaction governance capacity (TGC). In learning about TGC I also expect to learn the different degrees of TGC among countries. Review: Transparency results from widely understood and clearly enforced rules. It

is

the

responsibility of the government to guarantee transparency in the process of economic transactions and the ability to enforce commercial contracts.

Specifications for TGC are

fourfold. There is a system of laws that allows for ownership and transfer of property; a clear process for changing the laws governing property rights; a system of regulations that accommodates complex transactions; and have institutions that allow the laws to be implemented fairly, in timely and with transparency. Countries have varying degree of TGC. There are countries that are arbitrary and authoritarian where laws do not exist; and if exist are not enforced; countries where laws and institutions of a market economy exist and yet the country does not reach its potential; and countries with well-developed laws, regulations, 153

institutions and enforcement systems. Access to information and transparency for all transactions; clear process so that selective interpretation by bureaucrats is reduced if not eliminated; speed with which the processes can be completed and trust in the system are the criteria for working TGC.The specifications for TGC are fourfold: First there should be a system of laws that allows for ownership and transfer of property; there should be a process for changing the laws governing property rights that is clear and unambiguous. There should be a system of regulations that accommodates complex transactions when societies become more complex. The last requirement is for having institutions that allow the laws to be implemented fairly, in a timely fashion and with transparency. Lessons Learned From this chapter I learned about the importance for governments for transaction governance capacity for the developing the market economy for BOP. I learned that TGC of nation means curbing corruption. Integrative Questions: 1. What is transaction governance capacity? 2. What is necessary in the evolution of market economy at BOP? 3. How is transparency in transaction possible? 4. What are the specification for transaction governance capacity? 5. What are the different spectrum of TGC? 6. What are the outcome and lessons from Andhra Pradesh? 154

Book: The Fortune at the Bottom of the Pyramid Chapter 6: Development as Social Transformation Quote: “ For the BOP consumers, gaining access to modern technology and good products designed with their needs in mind enables them to take a huge step in improving their lives”C.K. Prahalad. Learning Expectations: I expect to learn how these developments impact on the lives of people at the bottom of the pyramid. In addition it is important what is the ultimate goal of this development in BOP markets.

Review In looking at the BOP as a viable and profitable growth market, the writer is positive about the transformation that will happen with the collaboration between the market and the private sectors and other players including companies. The development allows the people get an opportunity to participate in and benefit from the choices of products and services through market mechanism.

Rapid transformation follows because BOP consumers are very

entrepreneurial and can easily imagine ways in which they can use their newly found access to information, choice and infrastructure. As sign of transformation BOP consumers constantly upgrade themselves. Having access to information, the consumers from the bottom will always 155

look to something better that fits their needs. In transforming BOP into consumer market, the poor can have an identity. They will have legal identity. This is very important in order to access the services they need like credit. In the past there has been very little attention given to women particularly in leading development process Lessons Learned I learned from this chapter the impact of development of market at the BOP. The transformation of consumers at BOP is rapid because as I have learned they are very entrepreneurial. Integrative Questions: 1. What is the reason for expecting rapid transformation for people at BOP consumers? 2. What is the role of women in the market economy at BOP? 3. What is the impact of gaining legal identity for people at BOP? 4. What does diamond symbolizes at the scheme of market development at BOP? 5. What is the ultimate goal of development at the BOP markets?

156

Related Documents

Itethics Reader
April 2020 2
An Itethics Reader
April 2020 6
Reader
May 2020 26
Reader
December 2019 32
Reader
November 2019 34
Reader
October 2019 40