Documente Academic
Documente Profesional
Documente Cultură
opasdfghjklzxcvbnmqwertyuiopasdfgh
jklzxcvbnmqwertyuiopasdfghjklzxcvb
nmqwertyuiopasdfghjklzxcvbnmqwer
Compilation of book reviews in Handbook of Information Technology,
The fortune at the bottom of the pyramid and Cyberethics
tyuiopasdfghjklzxcvbnmqwertyuiopas By:
dfghjklzxcvbnmqwertyuiopasdfghjklzx
cvbnmqwertyuiopasdfghjklzxcvbnmq
This work is licensed under a Creative Commons Attribution-
Noncommercial-Share
wertyuiopasdfghjklzxcvbnmqwertyuio
pasdfghjklzxcvbnmqwertyuiopasdfghj
klzxcvbnmqwertyuiopasdfghjklzxcvbn
mqwertyuiopasdfghjklzxcvbnmqwerty
uiopasdfghjklzxcvbnmqwertyuiopasdf
ghjklzxcvbnmqwertyuiopasdfghjklzxc
vbnmqwertyuiopasfghjklzxcvbnmrtyu
iopasdfghjklzxmqwertyuiopasdfghjklz
xcvbnmqwertyuiopasdfghjklzxcvbnmq
wertyuiopasdfghjklzxcvbnmqwertyuio
TABLE OF CONTENTS
CyberEthics
Dedication
This book is a compilation of all the hard works of the author in this
subject. This book contains book reviews from different books that the
author read. This book is indeed memorable to the author because she
spent a lot of her time accomplishing tasks for this subject. By doing this
book, it made the author to be more patient and to know how to prioritize
her time.
The contents of this book are related to ethical doings. In this subject
it was discussed how to react in every situation. Also, readers will learn the
ethical things to do. This will be helpful to all readers especially to those
who are in the I.T. industry.
THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
We call our society “the information society” because of the pivotal role played by intellectual, intangible
assets (knowledge-based economy), information-intensive services (business and property services,
communications, finance, and insurance), and public sectors (education, public administration, health
care).
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
INTRODUCTION
It is discussed in this chapter that as a social organization and way of life, the information society
has been made possible by a cluster of information and communication technologies (ICTs)
infrastructures. Andas a full expression of techne, the information society has already posed fundamental
ethical problems, whose complexity and global dimensions are rapidly growing and evolving.
It was also mentioned that Information Ethics (IE) means differently in every researchers working
in a variety of disciplines, including computer ethics, business ethics, medical ethics, computer science,
the philosophy of information, social epistemology ICT studies, and library and information science.
According to Froehlich, it was in the 1980s by Koenig et al. (1981) and Hauptman (1988), when
the expression of “information ethics” was introduced. It was used as a general label to discuss issues
regarding information (or data) confidentiality, reliability, quality, and usage. Not surprisingly, the
disciplines involved were initially library and information science and business and management studies.
They were only later joined by information technologies studies.
Socrates argued that a moral agent is naturally interested in gaining as much valuable
information as the circumstances require, and that a well informed agent is more likely to do the right
thing. The ensuing “ethical intellectualism” analyzes evil and morally wrong behavior as the outcome of
deficient information.
It was in the 1990’s when IE began to merge with computer ethics, ICT revolution became so
extensive as to give rise to new issues not only in the management of information-as-a-resource by
professional figures but also in the distributed and pervasive creation, consumption, sharing, and control
of information, by a very large and quickly increasing population of people online, commonly used to
dealing with digital tools of all sorts.
The author said that it is hard to identify researchers who uniquely support this specific
interpretation of IE, as works on Information-as-Product Ethics tend to be inclusive, that are, they tend to
build on the first understanding of IE as an ethics of informational resources and add to it a new layer of
concerns for informational products as well.
The more people have become accustomed to living and working immersed within digital
environments, the easier it has become to unveil new ethical issues involving informational realities.
Returning to our initial model, independently of A’s information input (info-resource) and output (info-
product), in the 1990s there appeared works highlighting a third sense in which information may be
subject to ethical analysis, namely, when A’s moral evaluations and actions affect the informational
environment.
In this chapter it was mentioned that, RPT model may help one to get some initial orientation in
the multiplicity of issues belonging to different interpretations of Information Ethics. Despite its
advantages, however, the model can still be criticized for being inadequate, for at least two reasons.
the model is too simplistic. Arguably, several important issues belong mainly but not only to the
analysis of just one “informational arrow.” The reader may have already thought of several examples that
illustrate the problem: someone’s testimony is someone’s else trustworthy information; A’s responsibility
may be determined by the information A holds, but it may also concern the information A issues;
censorship affects A both as a user and as a producer of information; misinformation (i.e., the deliberate
production and distribution of misleading information) is an ethical problem that concerns all three
“informational arrows”; freedom of speech also affects the availability of offensive content (e.g., child
pornography, violent content, and socially, politically, or religiously disrespectful statements) that might be
morally questionable and should not circulate.
The model is insufficiently inclusive. There are many important issues that cannot easily be
placed on the map at all, for they really emerge from, or supervene on, the interactions among the
“informational arrows.” Two significant examples may suffice: “big brother,” that is, the problem of
monitoring and controlling anything that might concern A and the debate about information ownership and
fair use, which affects both users and producers while shaping their informational environment.
Both criticisms are justified: the RPT model is indeed inadequate. As the examples mentioned
above emphasize, supporters of narrowly constructed interpretations of Information Ethics as a micro
ethics are faced with the problem of being unable to cope with a large variety of relevant issues, which
remain either uncovered or inexplicable. In other words, the model shows that idiosyncratic versions of IE,
which privilege only some limited aspects of the information cycle, are unsatisfactory.
THE FOURTH STAGE: INFORMATION ETHICS AS A MACROETHICS
Biocentric ethics usually grounds its analysis of the moral standing of bioentities and ecosystems
on the intrinsic worthiness of life and the intrinsically negative value of suffering. It seeks to develop a
patient-oriented ethics in which the “patient “maybe not only a human being, but also any form of life.
Indeed, Land Ethics extends the concept of patient to any component of the environment, thus coming
close to the approach defended by Information Ethics. Any form of life is deemed to enjoy some essential
proprieties or moral interests that deserve and demand to be respected, at least minimally and relatively,
that is when contrasted to other interests. So biocentric ethics argues that the nature and well-being of
the patient of any action constitute its moral standing and that the latter makes important claims on the
interacting agent, claims that in principle ought to contribute to the guidance of the agent’s ethical
decisions and the constraint of the agent’s moral behavior.
The author mentioned that, Ethics has steadily moved from a narrow to a more inclusive concept
of what can count as a center of moral worth, from the citizen to the biosphere (Nash, 1989). The
emergence of the info sphere, as a new environment in which human beings spend much of their lives,
explains the need to enlarge further the conception of what can qualify as a moral patient. IE represents
the most recent development in this ecumenical trend, a Platonist and ecological approach without a
biocentric bias, a move from the biosphere to the info sphere. More than 50 years ago, Leopold defined
Land Ethics as something that “changes the role of Homo Sapiens from conqueror of the land community
to plain member and citizen of it.
Moral Agents
It was said that a transition system is interactive when the system and its environment act upon
each other. Typical examples include input or output of a value, or simultaneous engagement of an action
by both agent and patient.
A transition system is also said to be autonomous when the system is able to change state
without direct response to interaction, that is, it can perform internal transitions to change its state. So an
agent must have at least two states. This property instils an agent with a certain degree of complexity and
independence from its environment. Finally, a transition system is adaptable when the system’s
interactions change the transition rules by which it changes state. This property ensures that an agent
might be viewed as learning its own mode of operation in a way that depends critically on its experience.
There can be moral agency in the absence of moral responsibility. Promoting normative action is
perfectly reasonable even when there is no responsibility but only moral accountability and the capacity
for moral action.
All this does not mean that the concept of “responsibility” is redundant. On the contrary, the
previous analysis makes clear the need for further analysis of the concept of responsibility itself,
especially when the latter refers to the ontological commitments of creators of new agents and
environments. The only “cost” of a “mind-less morality” approach is the extension of the class of agents
and moral agents to embrace artificial agents. It is a cost that is increasingly worth paying the more we
move toward an advanced information society.
Lessons Learned:
I learned in this chapter that, a human being is part of the whole, universe as what we call, a part
limited in time and space. He experiences himself, his thoughts and feelings, as something separated
from the rest, a kind of optical delusion of his consciousness. This delusion is a kind of prison for us,
restricting us to our personal desires and to affection for a few persons close to us. Our task must be to
free ourselves from our prison by widening our circle of compassion to embrace all humanity and the
whole of nature in its beauty. Nobody is capable of achieving this completely, but the striving for such
achievement is in itself a part of the liberation and a foundation for inner security.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
In the middle of the Second World War, academic field of information ethics was born. In this
chapter, it was noted that this way of doing information ethics does not require the expertise of a trained
philosopher. Any adult who functions successfully in a reasonably just society is likely to be familiar with
existing customs, practices, rules, and laws that govern one’s behavior and enable one to tell whether a
proposed action or policy would be ethically acceptable. As a result, those who must cope with the
introduction of new information technology—whether they are public policy makers, computer
professionals, business people, workers, teachers, parents, or others—can and should engage in
information ethics by helping to integrate new information technology into society in an ethically
acceptable way. Information ethics, understood in this very broad sense, is too important to be left only to
philosophers or to information professionals.
Moor stated that, Computers are logically malleable in that they can be shaped and molded to do
any activity that can be characterized in terms of inputs, outputs, and connecting logical operations
because logic applies everywhere, the potential applications of computer technology appear limitless. The
computer is the nearest thing we have to a universal tool. Indeed, the limits of computers are largely the
limits of our own creativity.
In this chapter, it was said that many people found Moor’s account of computer ethics to be
insightful and a helpful way to understand and deal with emerging computer ethics issues. His account of
the nature of computer ethics quickly became the most influential one among a growing number of
scholars across America who was joining the computer ethics research community.
A common ethical thread that runs through much of the history of computer ethics, from Norbert
Wiener onward, is concern for the protection and advancement of central human values such as life,
health, security, happiness, freedom, knowledge, resources, power, and opportunity.
Lessons Learned:
I learned in this chapter that, computers are logically malleable in that they can be shaped and
molded to do any activity that can be characterized in terms of inputs, outputs, and connecting logical
operations because logic applies everywhere, the potential applications of computer technology appear
limitless.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
Based on what I read, it was said in this chapter that, computer ethics is a form of applied or
practical ethics. It studies the moral questions that are associated with the development, application, and
use of computers and computer science. Computer ethics exemplifies, like many other areas of applied
and professional ethics, the increasing interest among professionals, public policy makers, and academic
philosophers in real-life ethical questions. Posing ethical questions about privacy, software patents,
responsibility for software errors, equal access, and autonomous agents is one thing; answering them is
another.
Also, it was said that moral philosophers started to look at problems and practices in the
professions, in public policy issues, and public debate. Especially in the USA, philosophers gradually
started to realize that philosophy could contribute to social and political debates about, for example, the
Vietnam War, civil rights, abortion, environmental issues, animal rights, and euthanasia, by clarifying
terms and structuring arguments.
There are problems with the Engineering views that are said in this chapter. They are related to
the logic and to the epistemic status of the premises. The logic of the Engineering Model fails to capture
the phenomenon of belief revision, exceptions, ceteris paribus clauses, and default logic, which
characterizes much of ordinary moral discourse. It furthermore fails to address the problem of open-
textured concepts and vague notions.
There are important objections to particularism, of which two deserve closer examination in this
context. The first is that theory and thinking in terms of moral principles and rules seems to be part of our
moral practices. Trying to find general principles to match one’s judgments and intuitions in a particular
case to extend them to other cases, or to explain them to others, seems a natural thing to do and is
simply part and parcel of moral life, especially in the public policy and political arena. Our moral thinking
in some cases simply depends on our ability to articulate the covering moral rules or principles. Only
when an exaggerated distinction between theory and practice is introduced, can one make the latter
seem superior at the expense of the former.
Lessons Learned:
I learned in this chapter that, Computer ethics exemplifies, like many other areas of applied and
professional ethics, the increasing interest among professionals, public policy makers, and academic
philosophers in real-life ethical questions. Posing ethical questions about privacy, software patents,
responsibility for software errors, equal access, and autonomous agents is one thing; answering them is
another.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The credibility of the system is of great importance, particularly when the system is being used in a
politically charged situation, and is thus the subject of intense scrutiny.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
Value Sensitive Design is discussed in this chapter that it is said to be a theoretically grounded
approach to the design of technology that accounts for human values in a principled and comprehensive
manner throughout the design process. It employs an integrative and iterative tripartite methodology,
consisting of conceptual, empirical, and technical investigations.
There are also three case studies by Value Sensitive Design that are mentioned in this chapter.
First, concerns information and control of web browser cookies, implicating the value of informed consent.
The second study concerns using high-definition plasma displays in an office environment to provide a
“window” to the outside world, implicating the values of physical and psychological well-being and privacy
in public spaces. The third study concerns an integrated land use, transportation, and environmental
simulation system to support public deliberation and debate on major land use and transportation
decisions, implicating the values of fairness, accountability, and support for the democratic process, as
well as a highly diverse range of values that might be held by different stakeholders, such as
environmental sustainability, opportunities for business expansion, or walkable neighborhoods.
Value Sensitive Design can help researchers uncover the multiplicity of and potential conflicts
among human values implicated in technological implementations. In the above design space, for
example, values of physical health, emotional well-being, and creativity appear to partially conflict with
other values of privacy, civil rights, trust, and security.
Value Sensitive Design distinguishes between usability and human values with ethical import.
Usability refers to characteristics of a system that make it work in a functional sense, including that it is
easy to use, easy to learn, consistent, and recovers easily from errors.
Value Sensitive Design identifies and takes seriously two classes of stakeholders: direct and
indirect. Direct stakeholders refer to parties’ individuals or organizations that interact directly with the
computer system or its output. Indirect stakeholders refer to all other parties who are affected by the use
of the system.
Lessons Learned:
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The justification typically given for the “fair use” rule is that the disvalue of limiting the rights of authors is
overbalanced by the value of greater access.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
This chapter overviews about the arguments for intellectual property rights have generally taken
one of three forms. Personality theorists maintain that intellectual property is an extension of individual
personality. Rule-utilitarian ground intellectual property rights in social progress and incentives to
innovate. Lockeans argue that rights are justified in relation to labor and merit.
Lessons Learned:
I learned in this chapter the five rights are said in to be the right to reproduce the work, the right to
adapt it or derive other works from it, the right to distribute copies of the work, the right to display the work
publicly, and the right to perform it publicly.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
In this chapter, the concept of privacy was discussed. It was said that privacy is not simply a
static concept, but instead has a dynamic component. Moor argues that privacy is “an evolving concept”
and that its “content” is often influenced by the “political and technological features of the society’s
environment.” In a later section of this chapter, we will see how the concept of privacy has evolved
significantly in the United States since the eighteenth century. Some theorists, such as Regan, claim that
the concept of privacy has existed throughout American history. Yet this concept has also been contested
in American jurisprudence, as there is no explicit mention of privacy in the U.S. Constitution. Many
Americans now believe that their privacy is severely threatened by the kinds of technologies that have
been developed and used in recent years, and some even speak of “the end of privacy.
Also, it was discussed that, “Physical privacy” and “accessibility privacy” are relatively recent
expressions used to refer to a conception of privacy that emerged in the late nineteenth century in
response to an influential article on privacy by Samuel Warren and Louis Brande.
Privacy is sometimes conceived of as freedom from interference in one’s personal choices, plans,
and decisions; many now refer to this view as decisional privacy.
Lessons Learned:
I learned in this chapter the five rights are said in to be the right to reproduce the work, the right to
adapt it or derive other works from it, the right to distribute copies of the work, the right to display the work
publicly, and the right to perform it publicly.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
In this chapter, the term anonymity is said in this chapter to denote a number of related things:
namelessness, detachment, unidentifiability, lack of recognition, loss of sense of identity or sense of self,
and so on. Anonymity can also be brought about in a variety of ways and there are many purposes, both
positive and negative, that anonymity could serve, such as, on the positive side, promoting free
expression and exchange of ideas, or protecting someone from undesirable publicity or, on the negative,
hate speech with no accountability, fraud or other criminal activity. Anonymity and privacy are also
considered to be closely related, with anonymity being one means of ensuring privacy.
The author mentioned in this chapter that Internet as a social environment may be of concern in
so far as it has the capacity to increase the scope of natural or spontaneous anonymity as a by-product of
or endemic to the nature of online communicative relations. For instance, in comparison to face-to-face
and telephonic communications, social and person cues are reduced in online communications, and
people can easily adopt pseudonyms and personae in chat rooms, blogs, and so on. However, the idea
that in “cyberspace” anonymity is given may be mistaken.
In this chapter the concept of anonymity was discussed. It was said that Anonymity has
sometimes been taken to mean “un-name-ability” or “namelessness,” but that is somewhat too narrow a
definition. While a name is often a key and clear identifier of a person, that is not always the case. A
name could be ambiguous or there maybe contexts in which some other tags is a less ambiguous
identifier of a person. Moreover, someone could be clearly and unambiguously identified without naming
her, for example, by giving enough other identifying information such that the person can be uniquely
picked out even without having been named.
Lessons Learned:
I agree with what the author said on the last part that anonymity presupposes social or
communicative relations.9 In other words, it is relative to social contexts in which one has the capacity to
act, affect or be affected by others, or in which the knowledge or lack of knowledge of whom a person is
relevant to their acting, affecting, or being affected by others.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
CHAPTER VIII – Ethical Issues Involving Computer Security: Hacking, Hacktivism, and
Counterhacking
Review:
It was said that this argument also attempts to identify a moral principle that might limit other
rights indeed, one grounded in a putatively stronger right than privacy and property rights, namely the
right of free expression. So strong is the right of free expression, on this analysis, that it entails a moral
principle that would prevent any other right from permitting restrictions on the free flow of content. Also,
based on what I’ve read the claim that there are no morally legitimate restrictions on the free flow of
content is inconsistent with there being any moral intellectual property (IP) rights. Of course, moral IP
rights might be much weaker than the right defined by IP law. But the idea that there are any moral IP
rights is inconsistent with the claim that there are no morally legitimate restrictions on the free flow of
content. If we have any moral IP right to exclude people from the contents of at least some of our
creations, then the right of free expression permits restrictions on the flow of content.
What is Hacktivism?
It was emphasized in this chapter that hacktivism” can be defined as “the commission of an
unauthorized digital intrusion for the purpose of expressing a political or moral position.” Qua digital act,
hacktivism is nonviolent in nature. Qua activism, hacktivism does not seek to achieve its political
purposes, unlike terrorism, by inspiring terror among the population; it attempts to achieve these
purposes by stimulating discussion and debate. Hacktivism is thus conceptually distinct from cyber
terrorism—though the boundaries, as we will see, sometimes seem to blur. Hacktivism is distinct from
other forms of benign hacking in that it is motivated by the laudable desire to protest injustice.
Lessons Learned:
I agree with what the author said on the last part that anonymity presupposes social or
communicative relations.9 In other words, it is relative to social contexts in which one has the capacity to
act, affect or be affected by others, or in which the knowledge or lack of knowledge of whom a person is
relevant to their acting, affecting, or being affected by others.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
The author said that Libraries by their very nature shape the ways in which we access
information. If they did not do this, they would have little use. A big room with all the books and other
information stuffed in at random with no way of sorting through it would be relatively useless. As we saw
in the previous section, selection is an unavoidable part of the librarian’s job; the same is true of
organization. However, once one sorts and organizes material or provides particular ways for the
information seeker to sort the material herself, one is shaping what information that seeker will get and
how the seeker will perceive this information. This shaping may be intentional, or it may simply be an
artifact of the way in which the sorting system has been set up. Nevertheless, a library is an intermediary
between the person who wishes to access some information and the information. The question is what
sorts of shaping are appropriate and which are inappropriate. In traditional library cataloging and
classification, the categories and organization of the information objects are the creations of library
professionals. Librarians determine what would be the most useful categories to use in organizing
material. This may either be by devising a categorical scheme ahead of time or by using the works within
the subject area to guide the creation of the categories. Not all classifications require such intentional acts
of categorization by human beings, however. Classification schemes can also arise from “the ground up,”
as a result of the ways in which large numbers of people actually label and use information objects.
Language itself can be seen as one such classification scheme.
Lessons Learned:
I agree with what the author said on the last part that anonymity presupposes social or
communicative relations.9 In other words, it is relative to social contexts in which one has the capacity to
act, affect or be affected by others, or in which the knowledge or lack of knowledge of whom a person is
relevant to their acting, affecting, or being affected by others.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
The author said that Libraries by their very nature shape the ways in which we access
information. If they did not do this, they would have little use. A big room with all the books and other
information stuffed in at random with no way of sorting through it would be relatively useless. As we saw
in the previous section, selection is an unavoidable part of the librarian’s job; the same is true of
organization. However, once one sorts and organizes material or provides particular ways for the
information seeker to sort the material herself, one is shaping what information that seeker will get and
how the seeker will perceive this information. This shaping may be intentional, or it may simply be an
artifact of the way in which the sorting system has been set up. Nevertheless, a library is an intermediary
between the person who wishes to access some information and the information. The question is what
sorts of shaping are appropriate and which are inappropriate. In traditional library cataloging and
classification, the categories and organization of the information objects are the creations of library
professionals. Librarians determine what would be the most useful categories to use in organizing
material. This may either be by devising a categorical scheme ahead of time or by using the works within
the subject area to guide the creation of the categories. Not all classifications require such intentional acts
of categorization by human beings, however. Classification schemes can also arise from “the ground up,”
as a result of the ways in which large numbers of people actually label and use information objects.
Language itself can be seen as one such classification scheme.
Lessons Learned:
I agree with what the author said on the last part that even if children do not have the cognitive
development to ground full intellectual freedom, there is still an important justification for trying to provide
as full a range of information as possible in support of that children’s future intellectual freedom. Arguably,
in order to develop capacities for understanding, evaluating, and deliberating about information, children
need some degree of liberty to make their own information choices as well as access to a broad range of
information. Such liberty by itself without adult guidance, however, may inhibit rather than promote the
development of an autonomous self.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
The free software community was said by the author that grew substantially after the introduction
of the Internet and Linus Torvalds. Contribution of Linux as free software. It quietly made gains, without
garnering widespread attention, until 1998, when Eric Raymond and Bruce Perens teamed to create the
Open Source Initiative. In 1997, Raymond gave the first thorough analysis of the software development
process employed by the free software community in “The cathedral and the bazaar” (Raymond, 2001).
He argued that the process is effective at producing superior software and considers numerous reasons
that make it effective.
Lessons Learned:
I agree with what the author said on the last part that even if children do not have the cognitive
development to ground full intellectual freedom, there is still an important justification for trying to provide
as full a range of information as possible in support of that children’s future intellectual freedom. Arguably,
in order to develop capacities for understanding, evaluating, and deliberating about information, children
need some degree of liberty to make their own information choices as well as access to a broad range of
information. Such liberty by itself without adult guidance, however, may inhibit rather than promote the
development of an autonomous self.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
The free software community was said by the author that grew substantially after the introduction
of the Internet and Linus Torvalds. Contribution of Linux as free software. It quietly made gains, without
garnering widespread attention, until 1998, when Eric Raymond and Bruce Perens teamed to create the
Open Source Initiative. In 1997, Raymond gave the first thorough analysis of the software development
process employed by the free software community in “The cathedral and the bazaar” (Raymond, 2001).
He argued that the process is effective at producing superior software and considers numerous reasons
that make it effective.
The author mentioned also that The social contract articulated in the Open Source Software
Definition is fairly clear about what OSS offers to others. But what do OSS developers expect in return?
What motivates developers to contribute to an open source project? Is it altruism, that is, do they consider
it a “pro bono” project that contributes to the public good? Is it a reaction against corporate greed? Does it
make them feel part of a select community with special talents? Clearly all of these play a part in OSS
developer motivation to abide by this contract. Beyond that, however, there is also a sense that
developers see their involvement as “enlightened self-interest”.
Lessons Learned:
I agree with what the author said on the last part that even if children do not have the cognitive
development to ground full intellectual freedom, there is still an important justification for trying to provide
as full a range of information as possible in support of that children’s future intellectual freedom. Arguably,
in order to develop capacities for understanding, evaluating, and deliberating about information, children
need some degree of liberty to make their own information choices as well as access to a broad range of
information. Such liberty by itself without adult guidance, however, may inhibit rather than promote the
development of an autonomous self.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
The free software community was said by the author that grew substantially after the introduction
of the Internet and Linus Torvalds. Contribution of Linux as free software. It quietly made gains, without
garnering widespread attention, until 1998, when Eric Raymond and Bruce Perens teamed to create the
Open Source Initiative. In 1997, Raymond gave the first thorough analysis of the software development
process employed by the free software community in “The cathedral and the bazaar” (Raymond, 2001).
He argued that the process is effective at producing superior software and considers numerous reasons
that make it effective.
It was stated also that, Quality software, in the traditional sense, is software that meets
requirement specifications, is well-tested, well-documented, and maintainable. Advocates of OSS claim
that its developers/users are motivated to do quality work because they are developing software for their
own use; their reputations among their peers are at stake. Critics of OSS claim that volunteers will not do
professional-quality work if there is no monetary compensation. This has become a rather outdated
argument. As we have seen above, there are many who are employed by companies to write open
source code and others who are paid to customize it. Critics also claim that documentation and
maintenance are nonexistent. Although it is true that documentation and maintenance are concerns, OSS
advocates maintain that OSS meets users. Requirements, is tested by its developers, and is constantly
being upgraded. Documentation evolves as more and more users become interested in the software and
use it.
The author mentioned also that the social contract articulated in the Open Source Software
Definition is fairly clear about what OSS offers to others. But what do OSS developers expect in return?
What motivates developers to contribute to an open source project? Is it altruism, that is, do they consider
it a “pro bono” project that contributes to the public good? Is it a reaction against corporate greed? Does it
make them feel part of a select community with special talents? Clearly all of these play a part in OSS
developer motivation to abide by this contract. Beyond that, however, there is also a sense that
developers see their involvement as “enlightened self-interest”.
Lessons Learned:
I agree with what the author said and this is what I learned that Quality software, in the traditional
sense, is software that meets requirement specifications, is well-tested, well-documented, and
maintainable. Advocates of OSS claim that its developers/users are motivated to do quality work because
they are developing software for their own use; their reputations among their peers are at stake. Critics of
OSS claim that volunteers will not do professional-quality work if there is no monetary compensation. This
has become a rather outdated argument. As we have seen above, there are many who are employed by
companies to write open source code and others who are paid to customize it. Critics also claim that
documentation and maintenance are nonexistent. Although it is true that documentation and maintenance
are concerns, OSS advocates maintain that OSS meets users. Requirements, is tested by its developers,
and is constantly being upgraded. Documentation evolves as more and more users become interested in
the software and use it.
THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
CHAPTER XI – Internet Research Ethics: The Field and Its Critical Issues
Review:
The author overviews that Internet research ethics (IRE) is an emerging multi- and
interdisciplinary field that systematically studies the ethical implications that arise from the use of the
Internet as a space or locale of, and/or tool for, research. No one discipline can claim IRE as its own, as
various disciplines since the 1990s have used the Internet for research and, to some extent, grappled
with the ethical implications of such research. Indeed, because Internet research is undertaken from a
wide range of disciplines, IRE builds on the research ethics traditions developed for medical, humanistic,
and social science research; this means in turn that a central challenge for IRE is to develop guidelines
for ethical research that aim toward objective, universally recognized norms, while simultaneously
incorporating important disciplinary differences in research ethics a challenge frequently met in IRE
through pluralistic approaches that conjoin shared norms alongside such irreducible differences. Indeed,
at the heart of IRE is an intertwined convergence as IRE seeks to draw from the insights of applied ethics,
research methods, information and computer ethics, and comparative philosophy.
Human subjects protections models are grounded in respect for persons, as born out of the
informed consent process, as well as through a consideration of risks and benefits for the individual and
for the larger society. A careful balance is necessary, though this has certainly not always been the case
(e.g., the Tuskegee syphilis study), in protecting individual rights within the greater societal good.
Researchers must justify the risk of their studies by the value of potential results. And, through the
informed consent process, research participants must clearly understand these risks and benefits, what is
taking place in the research, what is expected of them, and what will become of the data. Informed
consent must be processual, not a static one-time event.
Recruitment
Based on what I’ve read, it was stated that In traditional research ethics, the principle of justice
demands that subjects have an equal or fair chance of participation—exclusion must be based on some
justifiable reason. The federal Office for Human Research Protections (OHRP) in its IRB Handbook, The
Foundations of Human Subjects Protections in the United States, describes the principle of justice: The
principle of justice mandates that the selection of research subjects must be the result of fair selection
procedures and must also result in fair selection outcomes. The “justness” of subject selection relates
both to the subject as an individual.
Lessons Learned:
I agree with what the author said and this it is clear that the research ethics implicated by a given
ethical problem or difficulty is deeply entwined with and defined by the specific methodology that shape a
specific research project.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
CHAPTER XII – Health Information Technology: Challenges in Ethics, Science, and Uncertainty
Review:
The demands of privacy are intuitively straightforward and the consequences of its violation
obvious. Without a credible promise that privacy and confidentiality will be safeguarded, the task of
fostering trust is frustrated. If for instance a patient believes that a physician will disclose interesting or
salacious diagnostic data to others, the patient might not disclose information the physician needs to
render an accurate diagnosis in the first place. If a patient believes a physician or hospital does not
maintain the security of medical records, the patient might similarly be discouraged to tell the truth. And if
a patient is dubious about an institution’s ability to safeguard data stored in or transmitted by computers
and other information systems, then the technology itself will be a source of distrust.
Based on what I’ve read, this is what I’ve learned there come a point at which it is not inaccurate
to suggest that an intelligent machine is practicing medicine or nursing? Moreover, in the event of an
affirmative answer to that question, one might reasonably reply, “So what?” or at least “so what, if patient
care is improved?” Such an exchange parallels those in numerous other disciplines concerning the extent
of any computer’s appropriate use. The challenge for us is the same one that has been a part of the
computer ethics.
I also learned that in order to meet these challenges, we turn to various forms of inquiry: science
and ethics. There is of course no alternative. The very idea that use of a tool, in this case a computational
tool, might be required or forbidden depending on facts and factors we are unsure of is exhilarating.
Applied ethics is too often regarded as consisting in handwringing. In fact, it is among the most important
things humans do. At our best, we progress: Science and ethics advance in ways that improve the human
condition, generally speaking.
Lessons Learned:
I agree with what the author said that the demands of privacy are intuitively straightforward and the
consequences of its violation obvious. Without a credible promise that privacy and confidentiality will be
safeguarded, the task of fostering trust is frustrated. If for instance a patient believes that a physician will
disclose interesting or salacious diagnostic data to others, the patient might not disclose information the
physician needs to render an accurate diagnosis in the first place. If a patient believes a physician or
hospital does not maintain the security of medical records, the patient might similarly be discouraged to
tell the truth. And if a patient is dubious about an institution’s ability to safeguard data stored in or
transmitted by computers and other information systems, then the technology itself will be a source of
distrust. I also learned that in order to meet these challenges, we turn to various forms of inquiry: science
and ethics. There is of course no alternative. The very idea that use of a tool, in this case a computational
tool, might be required or forbidden depending on facts and factors we are unsure of is exhilarating.
Applied ethics is too often regarded as consisting in handwringing. In fact, it is among the most important
things humans do. At our best, we progress: Science and ethics advance in ways that improve the human
condition, generally speaking.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
Economic activity is a part of every society, and it is arguably one of the most important aspects
of current liberal democratic states. Businesses have a large influence on how we live our individual lives
and also on how society is regulated. Businesses are social facts, but they are also the objects of
theoretical and academic attention. The only introductory remark about business that seems
indispensable at this stage of the argument refers to two possible levels of observation of business that
will inform the subsequent debate on ethics. The two levels of observation of business and economic
activity are the micro- and macrolevels. These are reflected by the distinction between the academic
disciplines of economics and business studies. The foci of attention of the two levels are different, which
is reflected by different methodologies and vocabularies. To address the ethical issues arising from the
intersection of business and information, we nevertheless need to consider both levels. Manifest ethical
problems, for example, caused by employee surveillance or digital rights management, often occur on the
microlevel of the individual business or industry. They cannot be completely divorced, however, from the
macrolevel of national and global institutions which, in turn, are linked to prevalent understanding and
theories of economics.
Also, the author lectured that, Ethical issues enter the debate when the justifications of a possible
right to be left alone are discussed. In principle, these can be divided into two streams of debate: one that
is concerned with data about customers, the other which deals with privacy of employees. Companies
usually have more power over their employees than their customers. The arguments in defense of
employee privacy are therefore based on stronger ethical concerns. Within the debate about employee
privacy, one can distinguish three groups of reasons for its support. They deal primarily with the individual
person, with society, and with economic considerations. Attacks on employee surveillance as the main
threat to employee privacy are
Lessons Learned:
I agree with what the author said that the demands of privacy are intuitively straightforward and the
consequences of its violation obvious. Without a credible promise that privacy and confidentiality will be
safeguarded, the task of fostering trust is frustrated. If for instance a patient believes that a physician will
disclose interesting or salacious diagnostic data to others, the patient might not disclose information the
physician needs to render an accurate diagnosis in the first place. If a patient believes a physician or
hospital does not maintain the security of medical records, the patient might similarly be discouraged to
tell the truth. And if a patient is dubious about an institution’s ability to safeguard data stored in or
transmitted by computers and other information systems, then the technology itself will be a source of
distrust. I also learned that in order to meet these challenges, we turn to various forms of inquiry: science
and ethics. There is of course no alternative. The very idea that use of a tool, in this case a computational
tool, might be required or forbidden depending on facts and factors we are unsure of is exhilarating.
Applied ethics is too often regarded as consisting in handwringing. In fact, it is among the most important
things humans do. At our best, we progress: Science and ethics advance in ways that improve the human
condition, generally speaking.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
These are some of the things that the author discussed. First, there should be a causal
relationship of some kind between the agent and the action or the consequences of the action. This
relationship can be direct or indirect, substantial or additional. The relationship need not be the one that
can be framed in terms of a sufficient condition or even of a necessary condition as long as it contributes
in one way or another to the effect. Second, the action or its consequences should be performed or
produced intentionally. This does not mean that the agent should have or should have had a positive
desire to bring about the action or its consequences. The only minimal requirement is that he or she at
least did not act or did not refrain from acting in a state of voluntary ignorance regarding the action or the
omission and their consequences. Although a thorough discussion about this point would go far beyond
the purposes of this chapter, it should be kept in mind that the things that I have said about causality and
intentionality are of a rather minimalist vein. What causal relationship and what kind and degree of
intentionality should be present depends on the context, the kind of action, and the kind of value that is at
stake.
Lessons Learned:
I agree with what the author said that the demands of privacy are intuitively straightforward and
the consequences of its violation obvious. Without a credible promise that privacy and confidentiality will
be safeguarded, the task of fostering trust is frustrated. If for instance a patient believes that a physician
will disclose interesting or salacious diagnostic data to others, the patient might not disclose information
the physician needs to render an accurate diagnosis in the first place.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
CHAPTER XV– Virtual Reality and Computer Simulation
Review:
In this chapter, it was said that Virtual reality and computer simulation have not received much
attention from ethicists. It is argued in this essay that this relative neglect is unjustified, and that there are
important ethical questions that can be raised in relation to these technologies. First of all, these
technologies raise important ethical questions about the way in which they represent reality and the
misrepresentations, biased representations, and offensive representations that they may contain. In
addition, actions in virtual environments can be harmful to others and raise moral issues within all major
traditions in ethics, including consequentialism, deontology, and virtue ethics. Although immersive virtual
reality systems are not yet used on a large scale, non-immersive virtual reality is regularly experienced by
hundreds of millions of users, in the form of computer games and virtual environments for exploration and
social networking. These forms of virtual reality also raise ethical questions regarding their benefits and
harms to users and society, and the values and biases contained in them.
The author mentioned also something about A computer simulation is a computer program that
contains a model of a particular system. The program can be executed, simulating changes in the system
according to certain parameters, after which the output results of the simulation can be analyzed.
Computer simulation is also the name of the discipline in which such models are designed, executed, and
analyzed. The models in computer simulations are usually abstract and either are or involve mathematical
models. Computer simulation has become a useful part of the mathematical modelling of many natural
systems in the natural sciences, human systems in the social sciences, and technological systems in the
engineering sciences, in order to gain insight into the operations of these systems and to study the effects
of alternative conditions and courses of action.
Lessons Learned:
I learned that actions in virtual environments can be harmful to others and raise moral issues
within all major traditions in ethics, including consequentialism, deontology, and virtue ethics. Although
immersive virtual reality systems are not yet used on a large scale, non-immersive virtual reality is
regularly experienced by hundreds of millions of users.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
CHAPTER XVI– Genetic Information: Epistemological and Ethical Issues
Review:
In this chapter, Genetic essentialism7 is widely attacked and this view has strongly influenced
the public perception of genetics. According to Lewontin, however, it takes more than DNA to make a
living organism and its history. A living organism at every moment of its life is the unique consequence of
a developmental history that results from the interaction of and determination by internal (genetics) and
external (environmental) forces. Such external forces are themselves partly a consequence of the
activities of the organism itself, produced by the conditions of its own existence. Reciprocally, the internal
forces are not autonomous, but act in response to the external. Part of the internal chemical machinery of
a cell is manufactured only when external conditions demand it. Therefore, genetic essentialism, which
assumes the uniqueness and independence of genetic information, does not give us a plausible
argument for treating genetic information in a special category. Another claim that genetic information is
special compared with other kinds of health-related information is sometimes based on a further claim
that there is some other kind of genetic information that makes it different. Some have pointed out that
genetic information is predictive; but it is also worth pointing out that, on the contrary, a lot of genetic
information is non-predictive and much of non-genetic health-related information is predictive.
Lessons Learned:
I learned based on the statement of the author that “information” is used in two different contexts: “It may
be used without semantic implication; for example, we may say that the form of a cloud provides
information about whether it will rain. In such cases, no one would think that the cloud had the shape it
did in deeply oppressive. To achieve such a vision in a positive sense, culture cannot be separated from
biology.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
This chapter mentioned that ethical dilemmas involve nonstate actors whose cyber attacks are
politically or socially motivated. This domain of conflict is often referred to as “hacktivism,” as it represents
a confluence of hacking with activism. If the attacks are designed to be sufficiently destructive as to
severely harm and terrorize civilians they become “cyberterrorism” the integration of cyber attacks with
terrorism. Although cyberterrorism is abhorrent and clearly unethical, hacktivism raises ethical questions.
The other thing, the author mentioned something about the ethics of cyber defense, particularly what is
called “hack back,” “strike back,” or “active response.” If a system is under cyber attack, can the system
administrators attack back in order to stop it? What if the attack is coming from computers that may
themselves be victims of compromise? Since many attacks are routed through chains of compromised
machines, can a victim “hack back” along the chain in order to determine the source? Also, another
statement was pointed out by the author. He said that, international law of armed conflict applies to nation
states, and thus concerns cyber warfare at the state level. The paper will extend this framework to
politically and socially motivated cyber attacks by non state actors, and compare this approach with some
previous work on the ethics of cyber activism and civil disobedience. It will also apply the international law
of armed conflict to the domain of cyber defense, and show how it ties in with the legal doctrine of self-
defense and relates to other work on hack back.
Lessons Learned:
I learned based on the statement of the author that “information” is used in two different contexts: “It may
be used without semantic implication; for example, we may say that the form of a cloud provides
information about whether it will rain. In such cases, no one would think that the cloud had the shape it
did in deeply oppressive. To achieve such a vision in a positive sense, culture cannot be separated from
biology.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
This chapter mentioned that ethical dilemmas involve nonstate actors whose cyber attacks are
politically or socially motivated. This domain of conflict is often referred to as “hacktivism,” as it represents
a confluence of hacking with activism. If the attacks are designed to be sufficiently destructive as to
severely harm and terrorize civilians they become “cyberterrorism” the integration of cyber attacks with
terrorism. Although cyberterrorism is abhorrent and clearly unethical, hacktivism raises ethical questions.
The other thing, the author mentioned something about the ethics of cyber defense, particularly what is
called “hack back,” “strike back,” or “active response.” If a system is under cyber attack, can the system
administrators attack back in order to stop it? What if the attack is coming from computers that may
themselves be victims of compromise? Since many attacks are routed through chains of compromised
machines, can a victim “hack back” along the chain in order to determine the source? Also, another
statement was pointed out by the author. He said that, international law of armed conflict applies to nation
states, and thus concerns cyber warfare at the state level. The paper will extend this framework to
politically and socially motivated cyber attacks by non state actors, and compare this approach with some
previous work on the ethics of cyber activism and civil disobedience. It will also apply the international law
of armed conflict to the domain of cyber defense, and show how it ties in with the legal doctrine of self-
defense and relates to other work on hack back.
Severity – this refers to people killed or wounded and property damage. The premise is that armed
attacks that use force often produce extensive casualties or property damage, whereas soft measures do
not.
Immediacy – this is the time it takes for the consequences of an operation to take effect. As a general
rule, armed attacks that use force have immediate effects, on the order of seconds to minutes, while
softer measures, such as trade restrictions, may not be felt for weeks or months.
Directness – this is the relationship between an operation and its effects. For an armed attack, effects
are generally caused by and attributable to the application of force, whereas for softer measures there
could be multiple explanations.
Invasiveness – this refers to whether an operation involved crossing borders into the target country. In
general, an armed attack crosses borders physically, whereas softer measures are implemented from
within the borders of a sponsoring country.
Measurability – this is the ability to measure the effects of an operation. The
premise is that the effects of armed attacks are more readily quantified
(number of casualties, dollar value of property damage) than softer measures,
for example, severing diplomatic relations.
Presumptive Legitimacy – this refers to whether an operation is considered legitimate within the
international community. Whereas the use of armed force is generally unlawful absent some justifiable
reason such as self-defense, the use of soft measures are generally lawful absent some prohibition.
Responsibility – this refers to the degree to which the consequence of an action can be attributed to a
state as opposed to other actors. The premise is that armed coercion is within the exclusive province of
states and is more susceptible to being charged to states, whereas non state actors are capable of
engaging in such soft activity as propaganda and boycotts.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally justified is
civil disobedience, which is the active refusal to obey certain laws and demands of a government through
nonviolent means. Civil disobedience is conducted to protest and draw attention to laws, policies, and
practices that are considered unjust or unethical. It employs such means as peaceful demonstrations,
blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an area where
violating a law does not necessarily imply immoral behavior.
THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
CHAPTER XVIII– A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection
Review:
Risk Analysis
Once these potential risk effects have been identified, they are prioritized in the risk analysis
phase to help order when and if they will be addressed. The risk analysis process divides the identified
risks by their severity and the likelihood that they will occur, producing a given level of risk. The analysis
of the risk severity is put in either qualitative or quantitative terms. Kerzner says when doing project risk
analysis, those items to be considered are cost evaluation, schedule evaluation, and technical evaluation.
Once these are analyzed they are converted into a prioritized schedule, either by quantitative analysis or
a limited qualitative analysis that still uses cost and project derailment as the major form of categorization.
Ethical Risks
The ethical stakeholders in developed software are all those who are affected by it even though
they are not directly related to the use or financing of a system. The political candidate who is not elected
because of a difficult voting machine interface is a stakeholder in the development of that voting machine.
The person who suffers identity theft because of a flaw in the security for an information system is a
stakeholder in that information system. The developer’s obligations to these stakeholders are not included
in the generic concept of software failure.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally
justified is civil disobedience, which is the active refusal to obey certain laws and demands of a
government through nonviolent means. Civil disobedience is conducted to protest and draw attention to
laws, policies, and practices that are considered unjust or unethical. It employs such means as peaceful
demonstrations, blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an
area where violating a law does not necessarily imply immoral behavior.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
The author mentioned something about This implies that censorship is a violation of a right.
However, commonly consequentialist arguments are brought to bear against censorship, and some of the
most compelling of these come from Mill (1975, Chapter 2). The first is that an opinion that is not allowed
to be heard might just be true, and the second that it might contain some truth. Therefore restrictions on
the freedom of opinion can, and most probably will, deprive the world of some truths. His third reason is
that unless beliefs and opinions are vigorously challenged, they will be held as mere prejudices, and
finally, those opinions are themselves in danger of dying if never contested, simply because there is
never any need to think about them. Also, the author mentioned that, Anybody can put anything on, and
with varying degrees of difficulty almost anybody can have access to it. In addition, gaining access to
pornography on the Internet may be a very private affair. Locked in one’s room, one can browse and
search to one’s heart’s content. There is no need to face the possible embarrassment of detection in
buying or hiring material from a newsagent or video shop, or even by the interception of mail, if acquiring
material by mail order. As a consequence, it is much more difficult to restrict its consumption to adults.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally
justified is civil disobedience, which is the active refusal to obey certain laws and demands of a
government through nonviolent means. Civil disobedience is conducted to protest and draw attention to
laws, policies, and practices that are considered unjust or unethical. It employs such means as peaceful
demonstrations, blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an
area where violating a law does not necessarily imply immoral behavior.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other. Information overload,
as we have seen, involves more than just the exposure of an agent to excessive amounts of information:
that agent must also suffer certain negative effects as a result. One of the most obvious, and
straightforward, consequences is a failure to complete the task at hand, or to complete it well. As the
conveyor belt speeds up, Lucy is unable to wrap all the chocolates passing her station by the end, she
isn.t wrapping any of them.
Information overload, according to these two definitions, is a condition in which an agent has or is
exposed to, or is provided with too much information, and suffers negative consequences as a result.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally
justified is civil disobedience, which is the active refusal to obey certain laws and demands of a
government through nonviolent means. Civil disobedience is conducted to protest and draw attention to
laws, policies, and practices that are considered unjust or unethical. It employs such means as peaceful
demonstrations, blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an
area where violating a law does not necessarily imply immoral behavior.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
The author said that A fundamental problem with any philosophical discussion of email spam is
definitional. Exactly what constitutes spam? Published definitions by some major players differ
dramatically on which emails should be identified as spam. Some emphasize the importance of “consent”;
others require the emails to be commercial in nature before they are called spam; still others focus on the
number of identical messages that are sent as spam. At least one Web site is soliciting signatories to
settle on the definition of spam. The conceptual muddles about defining spam have immediate
philosophical and legislative consequences. These muddles have, for example, made it difficult to write
effective legislation regarding spam, and the laws that exist have not been successful at significantly
reducing what many people consider a significant problem in cyberspace. At this writing, some estimates
show that over 80% of email traffic is spam. Although the definitional and technical challenges of these
estimates make it difficult to verify their accuracy, few Internet users doubt that spam emails are a
significant and persistent occurrence. In this short article ,we’ll look at the short history of spam and then
describe a just consequentialist analysis of email spam, an analysis that takes into account several
different characteristics that help to differentiate spam from other emails.
Lessons Learned:
I learned based on the statement of the author that Regardless of the intent of the sender, the actual
consequences to the receiver often influence the receiver’s classification of an email. Every email has an
effect. Even emails that are blocked by a spam filter still have a consequence on the performance of the
network and the receiver.s system. Emails that lure the receiver into revealing personal and financial
information, “phishing attacks,” and damaging virus attacks can have devastating effects. However, some
emails that some think of as spam, some might welcome as useful advertising or helpful announcements.
The more detrimental the consequences of an email, the more likely it is that the receiver will label the
email as spam.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
Based on what the author said, As with most ethical concepts, there is plenty of room for debate
over the definition of “plagiarism.” Plagiarism will be treated here very broadly as expression that
improperly incorporates existing work either without authorization or without documentation,
or both. The emphasis on impropriety is important. There are a wide variety of situations where it seems
acceptable to repeat prior expressions while ignoring a possible attribution and making no attempt to seek
permission from a putative source. We commonly repeat jokes and report established dates for historical
events without citing sources, and we do so without qualms about plagiarism. An expression is only
plagiarism if it is unacceptable on some established value. But we should be careful to avoid the error of
being overly narrowing identifying any particular value or standard as the basis for condemning an
expression as plagiarism. Among the reasons for finding an expression to be plagiarism, we may note
that it is sometimes condemned as theft of intellectual property, sometimes as a failure to live up to a
standard of originality, sometimes as a violation of the moral rights of a prior author, sometimes as
fraudulent misrepresentation of authorship. A debate over whether an expression is plagiarism is,
therefore, a debate over the standards for and values inherent in its condemnation. The present study is
an overview of the variety of standards and values that underlie accusations of plagiarism, with an
emphasis on how computer technology has changed the focus for those accusations. It should come as
no surprise that accusation of plagiarism are often based in a complex heap of intertwined and poorly
understood values.
Lessons Learned:
I agree with what I’ve read. And I do believe that plagiarism should not be done because it will
unfair to those who did the real thing.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
CHAPTER XXIII– Intellectual Property: Legal and Moral Challenges of Online File Sharing
Review:
The author said that Thus, the most distinctive feature of this architecture is that each node in the
system is a “peer” or an equal. There is no need for a central authority to mediate and control the
exchange of information. The “purest” P2Parchitecture is flat and non-hierarchical. However, the
diminished control associated with such a completely decentralized network leads to obvious scalability
problems. AsWu observes, as the network grows “the loss of control makes it difficult to ensure
performance on a mass scale, to establish network trust, and even to perform simple tasks like keeping
statistics.” P2P software programs are usually free and easy to install. Once they are installed, a user can
prompt his or her personal computer to ask other PCs in a peer-to-peer network if they have a certain
digital file. That request is passed along from computer to computer within the network until the file is
located and a copy is sent along to the requester’s system. Each time aP2Pusermakes a copy of a digital
file, by default that copy becomes available on the user. computer so that it can be copied
byotherP2Pusers. This process, which is known as “uploading,” results in “an exponentially multiplying
redistribution of perfect digital copies”. Peer-to-peer networks require some method of indexing the
information about the digital files available across the network so that user queries can be handled
efficiently. There are three different methods of indexing: a centralized index system, in which the index is
located on a central server; a decentralized indexing system; and a super node system, in which a special
group of computers act as indexing servers. The first method, which was adopted by Napster, relies on
central servers to maintain an index of all the files available on the network; users search that index, and
they are then referred to peers with a copy of the desired file.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally
justified is civil disobedience, which is the active refusal to obey certain laws and demands of a
government through nonviolent means. Civil disobedience is conducted to protest and draw attention to
laws, policies, and practices that are considered unjust or unethical. It employs such means as peaceful
demonstrations, blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an
area where violating a law does not necessarily imply immoral behavior.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
In this chapter, I have learned based on what the author said that proposed the following
definition of censorship: restricting or limiting access to an expression, portion of an expression, or
category of expression, which has been made public by its author, based on the belief that it will be a bad
thing if people access the content of that expression. A virtue of this definition is that it does not make
describing an act as “censorship” a discussion stopper. In other words, this definition allows that there
may be cases of censorship that are morally permissible or even obligatory. People on both sides of a
debate can agree that some action fulfils the above definition and they can then go on to have the real
conversation about whether such an action is justified. This conversation requires that we look carefully at
both why access to expression is important and what the harms related to access might be. Then we can
think through the justifications for and against censorship in a clear and systematic way. My hope is that
this chapter has gotten us started on this more fruitful approach to the issue of censorship. Ultimately, I
believe that given our strong interests in access to expression and the reasonable concerns about human
implementation of policies that restrict access, cases of justifiable censorship will likely be relatively rare.
Lessons Learned:
I learned that In this chapter the following definition of censorship: restricting or limiting access to an
expression, portion of an expression, or category of expression, which has been made public by its
author, based on the belief that it will be a bad thing if people access the content of that expression. A
virtue of this definition is that it does not make describing an act as “censorship” a discussion stopper. In
other words, this definition allows that there may be cases of censorship that are morally permissible or
even obligatory. People on both sides of a debate can agree that some action fulfils the above definition
and they can then go on to have the real conversation about whether such an action is justified. This
conversation requires that we look carefully at both why access to expression is important and what the
harms related to access might be. Then we can think through the justifications for and against censorship
in a clear and systematic way. My hope is that this chapter has gotten us started on this more fruitful
approach to the issue of censorship. Ultimately, I believe that given our strong interests in access to
expression and the reasonable concerns about human implementation of policies that restrict access,
cases of justifiable censorship will likely be relatively rare.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
I have read in this chapter that Computer ethics is a newarea of applied ethics with a rapidly
burgeoning portfolio of ethical case studies and problems. In this chapter, I frame the question: “What
gender issues are involved in computer ethics and what contribution may feminist ethics offer computer
ethics?” In the following section, I briefly introduce the topic of feminist ethics. The next section reviews
existing research on gender and computer ethics. This falls into two main categories: empirical
comparisons of computer ethics decision making by men and women and other aspects of gender and
computing that have been considered in ethical terms in the literature—the latter usually involves a
consideration of the low numbers of women in computing. In forming a critical analysis of these areas, I
identify a number of gaps where extended discussion from a gender perspective would benefit several
current problem areas within the purview of contemporary computer ethics. These include topics such as
cyber stalking and hacking. Finally, and more speculatively, I suggest what might be offered from these
ideas about gender analysis of computer ethics back to the theoretical development of feminist ethics,
framing the discussion on “cyberfeminism” as a possible locus for a feminist computer ethics. Information
overload, according to these two definitions, is a condition in which an agent has or is exposed to, or is
provided with too much information, and suffers negative consequences as a result.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally
justified is civil disobedience, which is the active refusal to obey certain laws and demands of a
government through nonviolent means. Civil disobedience is conducted to protest and draw attention to
laws, policies, and practices that are considered unjust or unethical. It employs such means as peaceful
demonstrations, blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an
area where violating a law does not necessarily imply immoral behavior.
THE HANDBOOK OF INFORMATION AND COMPUTER ETHICS
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
Review:
The author said that, The digital divide is not any one particular gap between rich and poor, local
and global, but rather includes a variety of gaps believed to bear on the world’s inequitable distribution of
resources. There is, of course, a comparative lack of meaningful access to information communication
technologies (ICTs); a gap in having the skills needed to use these resources; a gap between rich and
poor in their ability to access information needed to compete in a global economy; and a gap in education
that translates into a gap in abilities to process and absorb information. There are, of course, nondigital
gaps that contribute to the distribution of resources: poor nations have less highly developed
infrastructure at every level needed to contribute to productive economic activity. There has also been the
unfortunate result of pressure by organizations, such as the IMF, World Bank, and USAID, on poor
nations to privatize their most economically prosperous resources, which typically get sold to a wealthy
Western nation that profits from the privatization of recipient poor nations while protecting vulnerable
markets such as agriculture against the competition of poor nations with subsidies that are (arguably)
illegal under the World Trade Agreement.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally
justified is civil disobedience, which is the active refusal to obey certain laws and demands of a
government through nonviolent means. Civil disobedience is conducted to protest and draw attention to
laws, policies, and practices that are considered unjust or unethical. It employs such means as peaceful
demonstrations, blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an
area where violating a law does not necessarily imply immoral behavior.
By:
Herman T. Tavani
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1234374049&sr=8-1
The fruitfulness of the “human-values approach” to computer ethics is reflected in the fact that it has
served as the organizing theme of some major computer-ethics conferences.
Learning Expectations:
I think this chapter overviews things about how and when was the foundation of Internet and
things about Information Ethics and how you can relate those two with each other.
The author overviewed things regarding Morality is objective in the sense of being true or false in
virtue of mindindependent facts about the world and not in virtue of what cultures or individuals think
about them. Normative moral relativism that claims morality is manufactured by the beliefs and practices
of cultures (i.e., moral claims are true in a culture only if accepted, believed, or practiced by some
sufficiently large majority of the culture and Normative moral subjectivism that claims morality is
manufactured by the beliefs and practices of individuals. The distinction between cognitivism and
noncognitivism presupposes that human emotions have no cognitive value and, vice versa, that human
cognition has a truth value if and only if it is free of emotions
Review:
Information overload, according to these two definitions, is a condition in which an agent has or is
exposed to, or is provided with too much information, and suffers negative consequences as a result.
Lessons Learned:
I learned based on the statement of the author that one area where hacktivism may be morally
justified is civil disobedience, which is the active refusal to obey certain laws and demands of a
government through nonviolent means. Civil disobedience is conducted to protest and draw attention to
laws, policies, and practices that are considered unjust or unethical. It employs such means as peaceful
demonstrations, blockades, sit-ins, and trespass. Civil disobedience involves breaking laws, but it is an
area where violating a law does not necessarily imply immoral behavior.
Quote:
“Trust is difficult to build after 50 years of suspicion and prejudice based on little evidence and strong
stereotyping”.
Learning Expectations:
As a reader I am expecting to learn about the BOP market. I expect that I could learn how the
market may be used in poverty alleviation.
Review:
In the economic pyramid, the poor belongs to the bottom. In past and up to the present, Mr.
Prahalad noted the many efforts that have been done by the World Bank and the United Nations among
others to alleviate poverty among developing countries. However, there have not been much headway
and the problem persists. He said that what is needed is a better approach which involves partnering the
poor with the private sectors and companies to innovate and achieve sustainable win-win solutions where
the poor become actively engage and companies providing products and services to them are The writer
writes that there have been many things being in done in solving the global poverty problems. While he
did not say that they are not effective, he implied that the efforts are not enough. According to the writer
there is a need to find a new approach. His approach focused on the people at the bottom of the
pyramid. These are people who live in less than $ 2 a day. In this approach the writer calls upon the
partnership between the poor, civil society organizations, governments, and large firms. The effort will
involve creating a BOP market- which is turning the poor into consumer markets. This approach is based
on his assumptions that : large companies have virtually ignored the poor who actually represents a latent
market for goods and services; the market at the bottom of the pyramid can provide a new growth
opportunity for the private sector and; that this market could become an integral part of its work.
Lessons Learned
In the process the companies are called upon to focus on the BOP market- making products and
services affordable, accessible and available to the poor.
Integrative Questions
3. What is the dominant logic concerning BOP market held by companies and private sector?
4. What is required to meet success in the BOP market?
Quote :
“I believe that more innovative, sustainable solutions will increasingly emerge from serving the BOP
markets than from the developed markets ”- C.K. Prahalad
Learning Expectations
I am expecting to learn the emerging philosophy for developing products and services for the
BOP markets. I also expect to learn how companies need to do in order to develop the poor into
consumer market.
Review:
The BOP markets are challenging companies to innovate. A new philosophy of product development and
innovations that reflects the realities of BOP market will be needed. According to the writer this
philosophy represents a different perspective from those that use in serving Western markets. He
developed 12 principles of innovation in accordance with this philosophy. First companies need to focus
on price performance of products and services. Innovation requires hybrid solutions since BOP
consumer problems cannot be solved with old technologies. Third, as BOP markets are large, solutions
that are developed must be scalable and transportable across countries, cultures, and languages. Fourth,
innovations must focus on conserving resources, eliminate, reduce and recycle. Fifth, product
development must start from a deep understanding of functionality not just form. Sixth, process
innovations are just as critical in BOP markets as product innovations. Seventh,the design of products
and services must take into account the skill levels, poor infrastructure and difficulty of access for service
in remote areas. Eight, education of customers on product usage is key. Ninth, Products must work in
hostile environments. Tenth, Research on interfaces is critical given the nature of the consumer
population. Eleventh, innovations must reach the consumers. Twelfth, focus on the broad architecture of
the system so that features can be easily incorporated. The writer stressed that this market has the same
needs as those in the developed markets but were only disregarded because of the dominant logic that
the companies and private sector have about it And therefore companies need to develop and architect
their system according to these needs.
Lessons Learned
A new philosophy is emerging in product development. This new philosophy is set against the needs and
realities of the markets in BOP.
Integrative Questions
Quote:
“ What we see here is the convergence of the traditional roles of the firm and the consumer and
the distributor and the consumer ”- C.K. Prahalad
Learning Expectations:
In reading this chapter, I expect to learn about the global opportunity that BOP market offers. I am
also expecting to know the sources of global opportunities for companies who want to produce products
and services for BOP markets.
Review
The writer is enthusiastic about the global opportunities that BOP markets offer to companies. The
sources of opportunities for companies who wish to cater to these markets are: some BOP markets are
large and attractive as stand-alone entities; many local innovations can be leveraged across other BOP
markets; some innovations from the BOP markets will find applications in developed markets; and
lessons from the BOP markets can influence the management practices of global firms. According to the
writer a new approach is needed by companies to operate in these markets. This approach involves a
deep understanding of the nature and the requirements of the consumers at the BOP markets and then
architect the business models and management processes around these requirements. Companies stand
to learn from the BOP markets. Because the BOP forces an extraordinary emphasis on price
performance, firms must focus on all elements of costs.
Lessons Learned:
The chapter also help me understand the challenge for companies learning to live with a wide variety of
relationships.
Integrative Questions:
Quote:
“Ultimately the goal in development is to bring as many people as possible to enjoy the benefits of an
inclusive market”-C.K. Prahalad.
Learning Expectations:
I wish to know what market-oriented ecosystem is; and what are its constituents. I also intend to learn
the nature of symbiotic relationship within ecosystem.
Review
Market-based ecosystem is defined as a framework that allows private sector and social actors
with different traditions and motivations, varying in sizes and areas of influence to act together and create
wealth in a symbiotic relationship. In the symbiotic relationship each constituent has a role to play and is
dependent of each other. The system adapts and r\evolves and can be resilient and flexible. While there
could be distortions at the margin, the system is always oriented toward a dynamic equilibrium. The
market-based ecosystem provides social collateral of open and honest entrepreneurship. It provides the
tools for the poor and the disadvantaged to be connected seamlessly with the rest of the world in a
mutually beneficial and non-exploitative way.
Lessons Learned
I learned about the importance for companies to learn to live in a network of relationships as their
boundaries expand.
Integrative Questions:
Quote:
“Corruption is about providing privileged access to resources and recognizing the time value of money”-
C.K. Prahalad.
Learning Expectations:
I expected to learn about the requirements of TGC as well as the different criteria for transaction
governance capacity. I also intend to learn about the effects of corruption in solving poverty problems.
Review:
According to Mr. Prahalad, transaction governance capacity is about making the entire process
as transparent as possible and consistently enforced. In a way this is a way of reducing corruption in the
government by minimizing the frictional losses in doing business at BOP. And for the evolution of a
market economy in the BOP market transaction governance capacity is very important. The initial
requirements for active private-sector involvement in the development lies in the nation’s TGC. According
to the writer fundamental to the evolution of capital markets and a vibrant private sector is the need for a
transparent market for capital, land, labor, commodities and knowledge.
Lessons Learned
These lessons help me realize why countries like the Philippines could not solve poverty problems is due
Integrative Questions:
Quote:
“ For the BOP consumers, gaining access to modern technology and good products designed with their
needs in mind enables them to take a huge step in improving their lives”- C.K. Prahalad.
Learning Expectations:
This is the last chapter of the book and I expect to learn about the impact of development in terms
of social transformation
Review
. Women are central to the entire development process. They are also at the vanguard of social
transformation. The access to economic independence can change the long tradition of suppression of
women and denial of opportunities.Social transformation that is taking place in markets where the public
and private sectors are involved at the BOP is impressive. The elite found themselves surprised by the
ability of the BOP consumers to adapt and their resilience. They adapt to new technology without much
difficulty and are willing to experiment and find new and unforeseen applications for it. This technology
breaks down the barriers to communication. BOP consumers constantly upgrade and improve their lives.
Gaining access to products and services the BOP consumers also gain legal identity. Finally, women are
emancipated.The real goal of the social transformation is poverty alleviation. The pyramid which has been
used to measure income inequalities will morph into diamond. A diamond assumes that the bulk of the
population is middle class, propelled by growing number of people who believe that they can aspire to a
middle-class lifestyle. The diamond morphing is the evidence of opportunity, role models and real signals
of change that allow people to change their aspirations. This is in fact the ultimate goal of development of
market at BOP, to put as many people in the diamond and not at the bottom of the pyramid. This pyramid
They are very resilient and could easily adapt to changes. The writer likewise taught about the creativity
of these people and always working towards improving and upgrading their lives.
Integrative Questions:
1. What is the reason for expecting rapid transformation for people at BOP consumers?
2. What is the role of women in the market economy at BOP?
3. What is the impact of gaining legal identity for people at BOP?
4. What does diamond symbolizes at the scheme of market development at BOP?
5. What is the ultimate goal of development at the BOP markets?
CYBERETHICS
Name of the Chapter
ETHICS AND THE INFORMATION REVOLUTION
Quote:
For this reason, computing is changing everything—where and how we work, where and how we learn,
shop, eat, vote, receive medical care, spend free time, make war, make friends, make love (Rogerson &
Bynum, 1995)
Learning Expectation:
It is further to understand the values and importance of relaying out information. It also underlies
the study of ethics in the cyberspace and the significance of understanding the effect of computer to
mankind.
Review:
The impact of computers on our society was probably best seen when in 1982 Time magazine picked the
computer as its "Man of the Year," actually listing it as "Machine of the Year." It is hard to imagine a
picture of the Spirit of St. Louis or an Apollo lander on the magazine cover under a banner "Machine of
the Year." This perhaps shows how influential the computer has become in our society.
The computer has become helpful in managing knowledge at a time when the amount of information is
expanding exponentially. The information stored in the world's libraries and computers doubles every
eight years. In a sense the computer age and the information age seem to go hand in hand.
The rapid development and deployment of computing power however has also raised some significant
social and moral questions. People in this society need to think clearly about these issues, but often
ignore them or become confused.
In a sense, computer fraud is merely a new field with old problems. Computer crimes are often nothing
more than fraud, larceny, and embezzlement carried out by more sophisticated means. The crimes
usually involve changing address, records, or files. In short, they are old-fashioned crimes using high
technology.
Lesson Learned:
I have learned that the computer technologies do not constitute a safe medium of providing
relevant information that could be used by different government agencies. We must be conscious on
what information we would like to divulge about ourselves for self-preservation purposes. Furthermore, it
is necessary to read the terms of conditions of any site we would like to visit in order to be certain on how
the personal information relayed will be used.
Integrative Questions:
What is Cyber ethics?
What is the significance of understanding the concepts of ethics in the cyberspace?
What are the tips in order to protect relevant information about you?
How is information being distributed to interested parties?
Why is cyber ethics important?
Quote:
The gap between rich and poor nations, and even between rich and poor citizens in industrialized
countries, is already disturbingly wide. As educational opportunities, business and employment
opportunities, medical services and many other necessities of life move more and more into cyberspace,
will gaps between the rich and the poor become even worse?
Lesson Expectation:
I am aware that on-line communications do not only encompass communicating along with other
people. I would like to learn the laws governing on-line communications. Furthermore, to assess the crime
being committed through on-line activities.
Review:
In 1967, the World Intellectual Property Organization was founded in order to establish intellectual
property boundaries and rules, so that people's hard-fought work would remain the property of the people
who created it. The Organization decided that intellectual property refers to: "Literary and artistic works,
which includes every production in the literary, scientific, and artistic domain, whatever the mode of
expression, dramatic and dramatic-musical works, choreographic works, photographic works, and works
of applied art." As a member of the WIPO, The United States has laws stating that only the author of this
work has the right to display, copy, perform, or distribute intellectual property. However, with the Internet
as a new method of distributing information, many of these intellectual property laws were challenged.
Very few people would photocopy and sell pages from books, for example, but what about copying and
selling computer programs? It's very much the same thing. Computer programs are protected exactly the
same way as books, so if people distribute programs without the author's permission, it is illegal. This isn't
the biggest problem, however.
; not an issue for everyday people. What is an important issue, though, is the illegal copying of
information on the Internet, such as text and images on web pages. It is even argued that caching web
sites (the way that browsers automatically store web sites on one's desktop for a faster load next time that
page is accessed) is illegal by the WIPO laws, because the information is copied onto one's hard drive.
Also controversial is the trading of copywritten songs via MP3's online. While recently the Recording
Industry Association of America has succeeded in shutting down Napster, the most widely used song
trading program, there are still places and programs that allow users to illegally download and trade
music online. This is a much wider problem than copying programs. Millions of songs are traded online
each day, all without the permission of the creator.
Lesson Learned:
Most of the crime being committed is stealing private property of one another. Even the identity of these
people could be stolen as well. The government still needed to provide extensive laws to govern the
internet.
Integrative Questions:
The world is slowly witnessing the development of the global information infrastructure (GII), a seamless
web of communication networks, computers, databases and consumer electronics that will put vast
amounts of information at user's finger tips (United States. Information Infrastructure Task Force 1994).
Through the global information infrastructure, users around the world will be able to access libraries,
databases, educational institutions, hospitals, government departments, and private organisations located
anywhere in the world. The Internet, a global network of computers and networks is being seen as the
front runner to GII, and is providing an opportunity and infrastructure for publishing and distributing all
types of information in various formats in the shortest possible time and at the lowest cost. With millions of
people around the world accessing the Internet and still a large number trying to do so, providing
information content on the Internet has become a major business, economic, cultural and even political
activity. Both large and small business institutions are marketing their products through the Internet.
Cultural institutions such as music and film industries, national libraries, archives and museums are also
establishing their presence on the Net.
Lesson Learned:
Certainly the information which comes from Western countries has embedded within it certain ideals and
beliefs which are inherently Western. Yet the idea that the myriad and diverse cultures of the world will
simply conform and change, becoming homogenized and as monotonous as this information is a bit
ridiculous, given the many years which these cultures have thrived. One must also remember that the
nature of culture itself is changeable. It is simply not one solid or static thing. And despite the many
differences which exist from culture to culture and country to country, the globalization of information
provides opportunities for a better understanding of all of these. Therefore, despite cultural differences,
certain universal understandings of ethical concepts are possible and universal rules can be reached to
govern this new global village of sorts.
Integrative Questions:
What is global information infrastructure?
What is the effect of global information infrastructure to democracy?
What are the uses of global information infrastructure?
Are all nations benefited by global information infrastructure?
How is global information infrastructure being distributed?
Lesson Expectation:
Because of the global impact of computing in recent years, and because of the merging of computing and
communications technologies that has also recently occurred, the field of computer ethics might be
perceived as one that is currently in a state of flux or transition.
Review:
Computer users may be classified as either aware or unaware of security aspects. The former group
mistrusts unfamiliar agents while the latter group are not at all aware of potential security risks associated
with agent computing. Computer ethics is a field of professional ethics concerned with issues of
responsibilities and conduct for computer professionals, Gotterbarn (1991).
Intuitive assessment of agent behaviour may be misleading and it can be argued that a systematic ethical
analysis will provide a more reliable basis for assessment. For example the actions of Clippy may be
considered as unethical by an expert user due to Clippy’s obtrusive character – however the systematic
ethical analysis of Clippy’s actions in section 4.2, reveals that Clippy’s actions can at most be considered
irritating, but certainly not unethical.
An a posteriori systematic analysis of the behaviour of an agent can assist developers of said agent to
improve the modelling of the secure and ethical behaviour of future versions of the agent. Once the
behaviour of a number of agents have been analysed in this systematic fashion, norms and criteria for the
design of new agents that will exhibit acceptable secure and ethical behaviour can be formulated and
continually refined.
Lesson Learned:
Moor (2001) summarises the theory of just consequentialism to imply that the ends, however good, “do
not justify using unjust means”. Regarding the contemplation, and in particular the performance of some
action, one would thus need to determine whether unjust means would be required to facilitate
performance of the action by the user, the agent or the host. Therefore, if it is not possible to achieve the
envisaged end (performance of the action) without utilizing unjust means, the requirement of just
consequentialism is not satisfied.
Integrative Questions:
Who is James Moor?
What is computer ethics?
Why are computers malleable according to Moor?
Who is Deborah Johnson?
What are the uses of computer?
Lesson Expectation:
It is problematic in our global information society to assert that the grounds for ethics, in particular
information ethics, lies in this Western tradition. If we are trying to create a genuine dialog about ethical
values and ethical reasons in the multicultural internet world, we cannot be bound solely to this tradition,
because, for example, Chinese and Indians have engaged in ethical thought and ethical reasoning and
the grounds for the resolution of their ethical dilemmas may or may not be the same as those offered in
Western society.
Review
But can common law courts do any better? Huber convincingly argues that they can. "The telecoms is too
large, too heterogeneous, too turbulent, too creatively chaotic to be governed wholesale, from the top
down," he explains. "In a place like that, nothing except common law can keep up". Huber is not alone in
touting the common [p. 1750/p. 1751] law's unique ability to grapple with cutting-edge legal issues. "The
telecoms is too large, too heterogeneous, too turbulent, too creatively chaotic to be governed wholesale,
from the top down," (Huber)
Huber understands that common law originates not in the holdings of any court or courts, but rather in the
actual practices of those who have to live with the law. "Rules evolve spontaneously in the marketplace
and are mostly accepted by common consent. Common-law courts just keep things tidy at the edges" (p.
8). Even when practical rules face litigation, the common law continues to grow and develop "out of
rulings handed down by many different judges in many different courtrooms." Looping back to the real
world, judicial rules then once more face the acid test of experience. "The good rules gain acceptance by
the community at large, as people conform their conduct to rulings that make practical sense" (p. 8).
By attributing only modest powers to courts, Huber's account contrasts with that of Lawrence Lessig,
another prominent advocate of applying judicial procedures to new and puzzling legal issues. Lessig
claims of the Internet "that we are, vis-à-vis the laws of nature in this new space, gods; and that the
problem with being gods is that we must choose. These choices . . . will be made, by a Court . To the
contrary, like the market place, the English language, or the common law, the Internet arose out of human
action but not human design. No one person or institution can create or predict such spontaneous orders.
Lessig's claim that officers of the court enjoy god-like power over the Internet thus smacks of hubris.
Huber's account of the modest powers of common law courts at least avoids that tragedy.
Lesson Learned:
Law and Disorder in Cyberspace presents a thesis revolutionary in the truest sense of the word: it argues
for overthrowing the existing corrupt order by returning to earlier, better, more fundamental values. So
defiant a book naturally reads, to quote its dust jacket, as a "polemic." Yet Law and Disorder in
Cyberspace merits serious attention from scholars and policy wonks. Huber makes a strong case for
abolishing the FCC and relying on common law to rule the telecosm. The flaws of Law and Disorder in
Cyberspace make it not irrelevant, but all the more interesting.
Integrative Questions:
What are the laws of cyberspace?
Who is Kellogg Huber?
What are the means of implementing the laws of cyberspace?
What is information ethics?
What is cyberethics?
Lesson Expectation:
This study seeks to identify significant philosophical implications of the free, open source option as it has
emerged in global software development communities. A three part approach inspired by the Carl
Mitcham's philosophy of technology has been employed. Each section has touched on some ideas whose
elucidation are in no way complete
Review
James Moor suggested that "conceptual muddles" and "policy vacuums" exist where there are problems
lacking a philosophical framework to address them, and this is particularly true of computer technology
(Moor, 1985). Likewise, Walter Maner proposed that innovations in computer technology create unique,
new ethical problems (Maner, 1995). For years, this conceptual vacuum has been filling with the musings
of self-proclaimed accidental revolutionaries like Richard Stallman, Eric Raymond, and Linus Torvalds,
the creator of the Linux kernel, as well as industry leaders like Bill Gates and Tim O'Reilly. While subject
area experts have arisen in the field of computer ethics and the philosophy of computing and information,
articulation of the ethical implications of trends favoring free, open source software are only beginning to
be featured in academic publications and conferences. knowns; there are things we know we know. We
also know there are known unknowns; that is to say we know there are some things we do not know.
In Thinking through Technology: the Path between Engineering and Philosophy, Carl Mitcham introduced
the Engineering Philosophy of Technology (EPT) as the field of study focused on determining the best
way to conduct engineering and technological endeavors (Mitcham, 1994). This work is from the insider's
perspective, and the obvious starting point to transfer insights from the technical arena to the academic
study of FOSS. There is a ready set of commonly cited practical benefits supported by empirical research
as well as the methodologies used to evaluate, organize, and execute such projects (Lerner and Tirole,
2005). Practical ethics have to do with making everyday choices and judging which are appropriate based
on their anticipated outcome. In this respect, technologists engage ethics in the early stages of project
management when they evaluate options. A fundamental differentiation of options to be considered has
always been between in-house versus third party, or build versus buy (Weinstock and Hissam, 2005).
Other 'practical ethics' employed by technology decision makers include minimizing the total cost of
ownership (TCO), using the best tool for the job, standardizing on a particular technology tool set, and
outsourcing where there is no competitive advantage, which is to leave the decision to a third party. One
ought to add, "utilizing free, open source options where feasible."
Lesson Learned
Software piracy is very tempting due to the relatively high cost of commercial applications, the easy
transfer of digital information, and the lack of a perception of doing harm. Software piracy is especially
common among curious academics and hobbyists
Integrative Question:
why not avoid the moral dilemma by selecting FOSS?
What is the FOS option?
Who is Walter Maner?
Who is James Moor?
Who is Deborah Johnson?
Name of the Chapter:
Fahrenheit 451.2: Is Cyberspace Burning?
Name of the Book:
Quote:
The ACLU and others in the cyber-liberties community were genuinely alarmed by the tenor of the White
House summit and the unabashed enthusiasm for technological fixes that will make it easier to block or
render invisible controversial speech. (Note: see appendix for detailed explanations of the various
technologies.)
Lesson Expectation:
This paper examines the free speech implications of the various proposals for Internet blocking and
rating. Individually, each of the proposals poses some threat to open and robust speech on the Internet;
some pose a considerably greater threat than others.
Review:
The ashes of the CDA were barely smoldering when the White House called a summit meeting to
encourage Internet users to self-rate their speech and to urge industry leaders to develop and deploy the
tools for blocking "inappropriate" speech. The meeting was "voluntary," of course: the White House
claimed it wasn't holding anyone's feet to the fire.
Any content-based regulation of the Internet, no matter how benign the purpose, could burn the global
village to roast the pig." U.S. Supreme Court majority decision, Reno v. ACLU (June 26, 1997)
Industry leaders responded to the White House call with a barrage of announcements:
Netscape announced plans to join Microsoft together the two giants have 90% or more of the web
browser market in adopting PICS (Platform for Internet Content Selection) the rating standard that
establishes a consistent way to rate and block online content;
Lesson Learned:
One of the most dangerous aspects of ratings systems is their potential to build borders around
American- and foreign-created speech. It is important to remember that today; nearly half of all Internet
speech originates from outside the United States.
Integrative Questions:
What are the six reasons why self-rating schemes are wrong for the Internet?
What is self- rating Schemes?
Internet Ratings Systems How Do They Work
Who is Ray Bradbury?
Is cyberspace burning?
Lesson Expectation:
Several factors make ISPs attractive defendants in defamation claims, many of which relate to the costs
associated with litigation. For example, the author of a defamatory statement will often reside outside the
jurisdiction of the plaintiff, whereas the ISP that carried the statement does business in the plaintiff's
jurisdiction. It might be difficult, time-consuming, or even impossible, to determine the actual author of the
message. And even if the author can be identified, he or she may be judgment proof, whereas the ISP
likely has 'deeper pockets'.
Review:
The liability of ISPs for defamation in the United States and Britain has been addressed by both the
courts and legislatures in the respective countries. Early American decisions focused on distinguishing
between ISPs that acted as publishers or distributors. Subsequent legislation in both jurisdictions has
resulted in marked differences in the potential for legal liability of ISPs in America and Britain that
supposedly reflect the inherent government policies of each country. These policies reflect a balancing of
such interests as freedom of speech, personal reputation, and the promotion of electronic communication
and commerce. "It is not reasonable to expect editors, producers and journalists to know and apply eight
separate defamation laws in publishing newspapers and magazines circulating throughout Australia and
in selecting material for transmission on national broadcasting and television programs."
The advent of the Internet has resulted in legislatures and courts around the world re-evaluating laws and
policies on issues as diverse as taxation, privacy, and contract formation. The liability of the Internet
Service Provider (ISP), the company that is the vehicle for the user's access to the Internet, and which
brings information to the user from around the world, is potentially staggering if one applies to it long-
established legal principles for issues such as distribution of pornography, breach of copyright, or
misrepresentation. Defamation of character over the Internet is illustrative of the problem. ISP liability
must reflect the need for law makers to balance the interests of its citizens who may be libeled because of
postings accessed around the world, with the interests of society generally that use ISPs as conduits to
this largely unfettered global communication medium.
Lesson learned:
The liability of intermediaries for defamation has a long history in the common law. 'Publishers', such as
newspapers, which traditionally exerted editorial control over content, are generally liable for the
defamatory statements that they publish. 'Distributors', such as bookstores or newsstands, exert very little
if any editorial control, and have the benefit of the 'innocent disseminator' defense. Innocent
disseminators are protected from liability for defamation if they did not know of the libelous statement,
there were no circumstances that ought to have led them to suppose it contained a libel, and they were
not negligent in being ignorant of the libel.
Integrative Question:
What is Internet Services Provider?
What is defamatory publication?
What is libel?
What is pornography?
What is Defamation Act of 1996?
Integrative questions:
What is DMCA?
What is copyright?
What is cryptography?
What are the provisions of DMCA?
What are the advantages of DMCA?
Review:
The whole affair began when teenager Jon Johansen wrote DeCSS in order to view DVDs on a
Linux machine. The MPAA has since brought suit against him in his native Norway as well. "The software
which Sigma Design plans on releasing works only on their card, whereas the design for LiViD will work
on a variety of cards or on systems that do not have a card at all."
Lesson Learned:
Still open is the question of whether the injunction against Corley, or the fight against DeCSS itself, is not
a vain struggle in the face of inevitable change. Judge Kaplan, whom the defense requested recuse
himself based on conflict of interest, said last Thursday to Mikhail Reider, the MPAA's chief of Internet
antipiracy, "You are asking me to issue an injunction against the guy who unlocked this barn, [telling him]
not to unlock it again --- even though there is no horse in it."
Integrative Questions:
What is DeCSS Trial?
What is the significance of understanding the concepts of ethics in the DeCSS Trial?
What are the tips in order to protect relevant information about you?
How is information being distributed to interested parties?
Why is DeCSS Trial is important?
This paper examines the relationship between intellectual property rights and ethics, focusing for the most
part on copyright. The focus is on two key questions: 1) what is the relationship between ethics and
copyright law and practice in the United States; and, 2) is the concept of private ownership of intellectual
property inherently ethical? These questions are important because access to an overwhelming number
of the elements of daily life is now controlled by intellectual property law. Is non-conformance with these
laws a calculated risk against being caught, equivalent to parking at a meter beyond the specified time
period, or is it a matter of ethics?
Review:
The ethics of copyright can be approached in two ways: (1) If, as Hettinger suggests, every creator
stands on the shoulders of giants what is the essential morality in allowing the last contributor to reap the
full reward or to have the right to prevent others from building on her contribution; and (2) If, as postulated
by Locke, an individual is entitled to what he or she creates, what are the ethics of limiting a creators
rights in regards to his or her creation? Theoretically copyright law in the United States takes the first
view, stating that authors have no natural right in their creation but only the rights that the state has
conferred by reason of policy to encourage the creation of new works (H.R. REP. No. 2222).
Lesson Expectation:
Lesson learned:
The Software Publisher’s Association (SPA), which merged with the Information Industry Association (IIA)
in January of 1999 to form the Software & Information Industry Association (SIIA), offers a guide on
Software Use and the Law (SPA 1997) which states it is intended to provide “a basic understanding of the
issues involved in ethical software use.” The same document declares that it is “wrong” for a school to
duplicate software. While copying software except for backup or archival purposes is clearly illegal does
this automatically make such actions unethical? Unless one considers all laws ethical, and that breaking
any law to be unethical, illegality and unethicality can not be automatically equated. One also might
question whether the efforts by the SIIA and its predecessor organizations to have Congress enact
legislation that provides greater rights to creators (and their assigns) than to users were prompted by an
ethical position or by a desire for greater profits.
Integrative Question:
What is property right?
What is copyright?
Is copyright unethical?
What is Software Publishers’ Association?
What is intellectual property?
Lesson Expectation:
Plagiarism and academic honesty have become controversial and widely debated issues. There are
worrisome trends in the behaviour and attitudes of students towards plagiarism and cheating in their
academic work. A new term ”cyber-plagiarism” has since been introduced to describe the process by
which students copy ideas and information from the Internet without giving attribution, or downloading
research papers in whole or in part, and submit the paper as their own work.
Review:
Plagiarism can be briefly defined as the expropriation of another author’s text, and its presentation as
one’s own. This includes using others’ ideas, information without giving credit and acknowledgement. It is
clear that piracy is the infringement of copyright, and plagiarism is the failure to give credit to the author.
However, many people easily get confused between those two terms, and one may usually commit both
offences. This approach assumes that the content of products of mind (not the objects in which they are
embedded) belong to society as a whole, but that society would benefit more if more such products were
available, and that in order to encourage production the creator of such products should be given rights
that will allow him or her to reap some economic benefits from the creation.
But it still remains plagiarism, because we have used the author’s words and ideas without accrediting the
authorship properly (Snapper, 1999).
Most people are aware that taking the exact texts or words of another person without attribution is
plagiarism, but they then believe that paraphrasing the original work is acceptable. Yet taking someone
else’s idea and changing the words is like stealing a car and changing its colour. However, literary works
that are stolen differ in many ways from physical properties that are the targets of ordinary theft. Ideas are
less tangible and identifiable than physical objects. Objects that are stolen remain stolen even if they are
taken apart and recombined, but not for ideas. Building new ideas from old ones, using existing
information and combining them, might be called creativity, not plagiarism.
There is hardly a clear way to determine which idea counts as a brand new and which requires
acknowledgment as a variation on old ideas. In areas such as computer programming and musical
composition, what counts as plagiarism is usually highly ambiguous and debatable.
Snapper (1999) indicated that cyber-plagiarism was growing rapidly and raising many concerns over its
impacts. [9]He also stated that in a period of a few years, students have been able to buy papers on a
various subjects from the Internet.
Lesson learned:
Unlike physical objects those belong to, and are in possession of someone else alone, we can pick up
ideas somewhere and treat them as our own. We may remember ideas without remembering where they
come from because without careful notations, recalling a source is much more difficult than recalling the
idea itself. Therefore it is not easy to totally avoid unintentional plagiarism. However, beside the careless
paraphrasing or accidental misleading citations, there are other harmful plagiarism acts that are
negatively influencing the scholarly communities.
Integrative Question:
What is plagiarism?
What is piracy?
What is copyright?
Which is more grave: plagiarism or copyright?
What is cyber-plagiarism?
Name of the Chapter:
An Ethical Evaluation of Web Site Linking
Name of the Book:
Quote:
Characteristics of the program, particularly its stage of development and context, will influence the
evaluation’s purpose. Four general purposes exist for conducting evaluations in public health practice.
Lesson Expectation:
The evaluation cycle begins by engaging stakeholders (i.e., the persons or organizations having an
investment in what will be learned from an evaluation and what will be done with the knowledge). Public
health work involves partnerships; therefore, any assessment of a public health program requires
considering the value systems of the partners. Stakeholders must be engaged in the inquiry to ensure
that their perspectives are understood. Review:
Articulating an evaluation’s purpose (i.e., intent) will prevent premature decision-making regarding how
the evaluation should be conducted. Gain insight -- evaluations done for this purpose provide the
necessary insight to clarify how program activities should be designed to bring about expected changes.
1. Change practice -- evaluations done for this purpose include efforts to improve the quality,
effectiveness, or efficiency of program activities.
2. Assess effects -- evaluations done for this purpose examine the relationship between program
activities and observed consequences.
3. Affect participants -- evaluations done for this purpose use the processes of evaluation to affect
those who participate in the inquiry. The logic and systematic reflection required of stakeholders
who participate in an evaluation can be a catalyst for self-directed change. An evaluation can be
initiated with the intent that the evaluation procedures themselves will generate a positive
influence.
Lesson learned:
Public health programs mature and change over time; therefore, a program’s stage of development
reflects its maturity. A minimum of three stages of development must be recognized: planning,
implementation, and effects. During planning, program activities are untested, and the goal of evaluation
is to refine plans. During implementation, program activities are being field-tested and modified; the goal
of evaluation is to characterize real, as opposed to ideal, program activities and to improve operations,
perhaps by revising plans. During the last stage, enough time has passed for the program’s effects to
emerge; the goal of evaluation is to identify and account for both intended and unintended effects.
Integrative Question:
What is the ethical evaluation?
What are the harmful effects of ethical evaluation of web site linking?
How to combat web site?
What are the laws implemented to prevent evaluation?
Define ethical evaluation of web site linking.
Lesson Expectation:
The Cathedral and the Bazaar takes its title from an essay Raymond read at the 1997 Linux Kongress.
The essay documents Raymond's acquisition, re-creation, and numerous revisions of an e-mail utility
known as fetchmail. Raymond engagingly narrates the fetchmail development process while elaborating
on the ongoing bazaar development method he uses with the help of volunteer programmers. The essay
smartly spares the reader from the technical morass that could easily detract from the text's goal of
demonstrating the efficacy of the open-source, or bazaar, method in creating robust, usable software.
Review:
Once Raymond has established the components and players necessary for an optimally running open-
source model, he sets out to counter the conventional wisdom of private, closed-source software
development. Like superbly written code, the author's arguments systematically anticipate their rebuttals.
For programmers who "worry that the transition to open source will abolish or devalue their jobs,"
Raymond adeptly and factually counters that "most developer's salaries don't depend on software sale
value." "Most developer's salaries don't depend on software sale value."
Lesson learned:
The integrity of the Internet and academic communities is severely damaged. The main reason why
students get away with internet plagiarism is that we lack of resources to monitor cheating, and the
examiners have to mark too many papers thus cannot give enough attention to each submitted work.
Tools that provide automatic detection of plagiarised works can greatly improve the situation. Therefore,
computer professionals can provide great help. Firstly, they can implement new algorithm and create new
effective software to identify plagiarised papers. Softwares which can detect plagiarism in students’ works
have proved to be effective.
Integrative Question:
What is the cathedral?
What are the harmful effects of cathedral and the bazaar?
What are the laws implemented to prevent plagiarism?
What is effective software?
Why do students plagiarise?
Lesson Expectation:
As scholars are more exposed to the web environment, and use more online resources for research, the
need for protections against plagiarism increases. Because of the volatility characteristic of the web
environment, it is usually difficult to establish or preserve the provenance.
Review:
It may be foolish to consider Eric Raymond's recent collection of essays, The Cathedral and the Bazaar,
the most important computer programming thinking to follow the Internet revolution. But it would be more
unfortunate to overlook the implications and long-term benefits of his fastidious description of open-
source software development considering the growing dependence businesses and economies have on
emerging computer technologies.
The Cathedral and the Bazaar takes its title from an essay Raymond read at the 1997 Linux Kongress.
The essay documents Raymond's acquisition, re-creation, and numerous revisions of an e-mail utility
known as fetchmail. Raymond engagingly narrates the fetchmail development process while elaborating
on the ongoing bazaar development method he uses with the help of volunteer programmers. Few
students enter college fully understanding the relationship between plagiarism and the rules about
quoting, paraphrasing and documenting material” (Wilhoit, 1994).
Once Raymond has established the components and players necessary for an optimally running open-
source model, he sets out to counter the conventional wisdom of private, closed-source software
development. Like superbly written code, the author's arguments systematically anticipate their rebuttals.
For programmers who "worry that the transition to open source will abolish or devalue their jobs,"
Raymond adeptly and factually counters that "most developer's salaries don't depend on software sale
value."
Lesson learned:
The Internet has greatly reduced the efforts to plagiarise among students and scholars. The integrity of
the Internet and academic communities is severely damaged. The main reason why students get away
with internet plagiarism is that we lack of resources to monitor cheating, and the examiners have to mark
too many papers thus cannot give enough attention to each submitted work. Tools that provide automatic
detection of plagiarised works can greatly improve the situation. Therefore, computer professionals can
provide great help. Firstly, they can implement new algorithm and create new effective software to identify
plagiarised papers. Integrative Question:
Why do students plagiarized?
What are the harmful effects of plagiarism?
How to combat plagiarism?
What are the laws implemented to prevent plagiarism?
What is cyber-plagiarism?
Why do students plagiarise?
Lesson Learned:
The Act on Personal Data Protection while realizing the requirements of the Community specified the
constitutional right to decide on the fact to whom, in what scope and for what purpose we give our
personal data, and gave statutory guarantees of compliance with this right by providing the data subjects
with measures used for exercise of this right and competent authorities and services – with the legal
remedies which guarantee compliance with this right. The main premise of the Act is granting every
individual the right to have his/her data protected.
Integrative Question:
What is directive 95/46/ec?
What is personal data protection?
What is privacy?
When was the directive was established?
What is the act on personal data protection?
Lesson Expectation:
The articles discuss the importance of privacy in public. It also highlights philosophical views that
necessitate the importance of privacy in public. Further more, it also discusses the lack of privacy in the
computer technology.
Review:
Fried (1984) argued that privacy is important because it renders possible important human relationships.
Although Fried conceived of privacy as control over all information about oneself, he defended a moral
and legal right to privacy that extends only over the far more limited domain of intimate, or personal,
information. He accepted this narrowing of scope because even a limited domain of intimate or personal
information provides sufficient "currency" for people to differentiate relationships of varying degrees of
intimacy. The danger of extending control over too broad a spectrum of information is that privacy may
then interfere with other social and legal values. Fried wrote, "The important thing is that there is some
information which is protected" , namely, information about the personal and intimate aspects of life.
According to Fried, the precise content of the class of protected information will be determined largely by
social and cultural convention. Prevailing social order "designates certain areas, intrinsically no more
private that other areas, as symbolic of the whole institution of privacy, and thus deserving of protection
beyond their particular importance". Privacy provides the necessary context for relationships which we
would hardly be human if we had to do without-the relationships of love, friendship and trust.
Excluding outsiders and resenting their uninvited intrusions are essential parts of having an intimate
relationship". Ferdinand Schoeman (1984) noted that "one's private sphere in some sense can be
equated with those areas of a person's life which are considered intimate or innermost" . Privacy's
purpose, he wrote, is to insulate "individual objectives from social scrutiny. Social scrutiny can generally
be expected to move individuals in the direction of the socially useful.
Lesson Learned:
The views of Schoeman, Fried, and Gerstein, though differing in detail, rest on a common core. Each held
that properly functioning, psychically healthy individuals need privacy. Privacy assures these people a
space in which they are free of public scrutiny, judgment, and accountability, and in which they may
unselfconsciously develop intimate relationships with others.
A person's right to privacy restricts access by others to this sphere of personal, undocumented
information unless, in any given case, there are other moral rights that clearly outweigh privacy. Although
many other writers who have highlighted the connection between privacy and the personal realm have
not attended merely to the status of the "non-personal" realm. If information is not personal information or
if it is documented, then action taken with respect to it simply does not bear on privacy.
Integrative Question:
Who is Helen Nissembaum?
What is privacy in public?
What is the importance of privacy?
Who is Charles Fried?
What are the laws governing privacy?
Lesson Learned:
It should be observed that group profiles may occasionally be incompatible with respect to individual
privacy and laws and regulations regarding the protection of personal data, as it is commonly conceived
of. For instance, distributive profiles may sometimes be rightfully thought of as infringements of
(individual) privacy when the individuals involved can easily be identified through a combination with other
information available to the recipient or through spontaneous recognition.
Integrative Questions:
What is KDD?
What is privacy?
What is individuality?
What is fairness?
What is a distributive profile?
Lesson Expectation:
This paper is aimed at answering the following questions: Can data privacy and data mining coexist? This
paper began with an attempt to define the concept of data mining and privacy. And it goes on to explore
how exactly data mining can be a threat to privacy, and especially how the Internet is currently associated
with the tension between data mining and data privacy.
Review:
Data can be one of the most important assets of companies for their marketing plan. Thus, businesses
became interested in collecting and managing consumer’s data. Data mining is a valuable tool for
business.
The reason data warehousing is closely connected with data mining is that when data about the
organization’s processes becomes readily available, it becomes easy and therefore economical to mine it
for new and profitable relationships.
According to Cavoukian (1998), data mining is usually used for four main purposes: (1) to improve
customer acquisition and retention; (2) to reduce fraud; (3) to identify internal inefficiencies and then
revamp operations, and (4) to map the unexplored terrain of the Internet. Generally, data mining seems a
survival strategy for companies in these days. Indeed, Erick Brethenoux, research director for advanced
technologies at the Gartner Group, calls data mining as “necessary for survival.” He says, “If you don’t
use it to predict a trend before your competitors, you’re dead” (Ennor, 1998)
Lesson Learned:
Today we consciously or unconsciously diffuse our data somewhere. Whenever we shop, use credit card,
rent a movie, withdraw money from ATM, write a check and log on the Internet, our data go somewhere.
Virtually, every aspect of our life discloses information about us. With the development of computing and
communication technology, now data can be captured, recorded, exchanged, and manipulated easier
than before. By one estimate, the amount of information in the world doubles every 20 months, and that
means the size of databases also does, even faster.
Integrative Question:
What is data mining?
What is privacy?
What is data mining relation to privacy?
What are the purposes of data mining?
Can data privacy and data mining coexist?
Lesson Expectation:
Surveillance and work is examined as the central theme of the issue. Two interpretations of the phrase
are made – first, surveillance of work, and second surveillance as work. After a focus on the second, a
review of recently published work which informs this perspective is undertaken, and then two issues for
future research are discussed.
Review:
While surveillance has long been recognized as part of the armoury of managerial practices in the
workplace, there has been increasing claims that electronic or panoptic surveillance is a new and
successful model of control. It concludes by arguing that through there has been some shift towards
surveillance practices, there is insufficient evidence that a combination of electronic panopticon and peer
pressure is effective and distinctive enough to constitute a credible new model of control of the labour
process.
Lesson learned:
These issues concern how the surveilled subject might come to be understood, and how connectivity
between different surveillance locales may be examined. It is concluded that examining surveillance as
work renders new types of occupational category and organizational activity significant, as well as the
labours involved in the social processes of identity work and representation management.
Integrative Question:
What is surveillance?
What are the privacy and distributive?
What are the laws implemented to prevent justice?
What is the workplace surveillance?
Why do students distributive justice?
Learning Expectation:
For individuals and organizations to intelligently assess their level of risk, agencies must provide accurate
data about criminal threats. Access to reliable and timely computer crime statistics allows individuals to
determine their own probability of victimization and the threat level they face and helps them begin to
estimate probable recovery costs. Law enforcement organizations traditionally have taken a leading role
in providing crime data and crime prevention education to the public, which now should be updated to
include duties in cyberspace.
Review:
Crime analysts use criminal statistics to spot emerging trends and unique modi operandi. Businesses and
individuals rely on law enforcement crime statistics when making important decisions about their safety.
Many citizens contact a local police station prior to the purchase of a home in a particular neighborhood
to inquire about the number of burglaries and violent crimes in the area. Just as these data provide
important information for communities in the "real world," the same is true in cyberspace.
In many police departments, detectives often compile and report crime data. Thus, homicide detectives
count the number of murders, sexual assault investigators examine the number of rapes, and auto
detectives count car thefts. For example, the child abuse unit likely would maintain child pornography
arrest data and identify the crime as the sexual exploitation of a minor. A police department's economic
crimes unit might recap an Internet fraud scam as a simple fraud, and an agency's assault unit might
count an on-line stalking case as a criminal threat. Because most police organizations do not have a
cohesive entity that measures offenses where criminals either criminally target a computer or use one to
perpetrate a crime, accurate statistics remain difficult to obtain.
Lesson Learned:
Generally, crime statistics can provide approximations for criminal activity. Usually, people accurately
report serious crimes, such as homicide, armed robbery, vehicle theft, and major assaults. Many other
criminal offenses, however, remain significantly underreported. Police always have dealt with some
underreporting of crime. But, new evidence suggests that computer crime may be the most underreported
form of criminal behavior because the victim of a computer crime often remains unaware that an offense
has even taken place. Sophisticated technologies, the immense size and storage capacities of computer
networks, and the often global distribution of an organization's information assets increase the difficulty of
detecting computer crime. Thus, the vast majority of individuals and organizations do not realize when
they have suffered a computer intrusion or related loss at the hands of a criminal hacker.
Integrative Question:
What is computer crime?
What are the boundaries of computer crime?
What is a crime in general?
What are the precautions being offered to combat computer crime?
What are the punishments for computer crime?
Learning Expectation:
In First, I argue that it wrongly presupposes that committing civil disobedience is morally permissible as a
general matter of moral principle; in an otherwise legitimate state, civil disobedience is morally justified or
excusable only in certain circumstances. Second, I attempt to identify a reliable framework for evaluating
civil disobedience that weighs the social and moral values against the social and moral disvalues. Third, I
apply this framework to acts of electronic civil disobedience.
Review:
It is true, of course, that most civil disobedience has effects on third-parties, but digital civil disobedience
can potentially do much more damage to the interests of far more people than ordinary non-digital civil
disobedience. Recently, a number of writers, such as Manion and Goodrum (2000), have begun to argue
that attacks on government and corporate sites can be justified as a form of political activism – that is, as
a form of “hacktivism.” The argument is roughly as follows. Since civil disobedience is morally justifiable
as a protest against injustice, it is sometimes justifiable to commit digital intrusions as a means of
protesting injustice. Insofar as it is permissible to stage a sit-in in a commercial or governmental building
to protest, say, laws that violate human rights, it is permissible to intrude upon commercial or government
networks to protest such laws. Thus, digital attacks that might otherwise be morally objectionable are
morally permissible if they are politically-motivated acts of digital civil disobedience or hacktivism.
Lesson Learned:
One should say much more by way of justification for hacking 300 sites than just a vague slogan like this.
The victims of such an attack, as well as third-parties, have a right to know exactly what position is
motivating the attack and why anyone should think it is a plausible position.The willingness to impose
morally significant costs on other people to advance fringe positions that are neither clearly articulated nor
backed with some sort of plausible justification is clearly problematic from a moral point of view. It seems
clear that such behavior amounts, at least in most cases, to the kind of arrogance that is problematic on
ordinary judgments.
Integrative Question:
Why might companies who try to privatize the internet be intimidated by hacktivism?
What is the difference between a hacktivist and a cyberterrorist? How can one differentiate the two?
Should the laws regarding hacktivism be loosened? Explain your answer.
How does M&G's notion of hacktivism fare under the various ethical frameworks we studied in Chapter 1,
in particular: Johnson's ``three rules'' (Ethics On-Line), Moor's ``reason within relative frameworks''
(Reason, Relativity and Responsibility...), his Just Consequentialism..., Brey's Disclosive Computer
Ethics, and Adam's ``feminist ethics'' (Gender and...) ?
Define hacking.
Lesson learned:
The National Institute of Standards and Technology in a 1996 publication defines Electronic Data
Interchange as "the computer-to-computer interchange of strictly formatted messages that represent
documents other than monetary instruments. EDI implies a sequence of messages between two parties,
either of whom may serve as originator or recipient. The formatted data representing the documents may
be transmitted from originator to recipient via telecommunications or physically transported on electronic
storage media.". It goes on further to say that "In EDI, the usual processing of received messages is by
computer only. Human intervention in the processing of a received message is typically intended only for
error conditions, for quality review, and for special situations.
Integrative Question:
What is double encryption?
What are the electronic data interchange?
What is the system of electronic data interchange?
How we use the electronic data interchange?
What are the effects of encryption of anonymized electronic ?
Lesson Learned:
Some strengths of using biometrics come from the “distinguishable (rather than unique) physiological and
behavioral traits (Chandra, Akhilesh 2005)” that make up one’s body and the ease at which they can be
used for identification and authentication. Unlike your passwords, you will not forget your fingerprints,
irises, or DNA when you go to work.They are a part of you. They are also extremely distinguishable from
another person’s biometrics. This means that they can be used with great confidence. Since they are a
part of you they are difficult for another person to obtain or fake. They are also easy to use. All you may
have to do is put your finger into a device and it gives you access if you are authorized or denies you if
you aren’t.For these reasons and others, biometric systems are becoming more mainstream and
commonplace.
Integrative Questions:
What is the entry-point paradox as defined by Roger Clarke?
In what ways are name, code, knowledge, and token-based identification schemes deficient?
What factors have led to the emergence of a consortium-based specification for a global standard for
biometric technologies?
In the context of identity determination and verification, what are the distinctions between a 'one to many'
and 'one to one' match?
In what ways are verification and identification procedures inter-dependent?
Learning Expectation:
A code of ethics from, say, instruction from a teacher or parent? It is one thing to tell people what
they ought or ought not do - even I do that. And quite another to codify that.
Review:
When something like ethics is codified, then this gives people room to be 'ethical' by watching for
loopholes or playing legal games. "It is better to adhere to the spirit of an ethic," but that doesn't mean
that should be no letter.”
Lessons Learned:
I would prefer to see the possibility of the spirit informing the letter, and the letter informing the spirit, with
each mutually reinforcing the other.
Also, as far as codes leading people to watch for loopholes as distinct from telling people to do, you
should meet my seven-year-old son. He remembers everything I tell him to do and not to do, and is
constantly formulating exceptions. So, we might consider codes simply as the pragmatic recognition of
the fact that not everyone possesses or "adhere[s] to the spirit of an ethic." Thus, rather than being
"arbitrary," they often are evolving adaptations by a concerned party to historical evasions of ethics.
Having said that, it would be appropriate to bring the other concerned party, the students, into the writing
(and ongoing re-writing) of a code of ethics.
Integrative Questions:
Why should rules be complete in order to be valuable?
Is this action really an exception?
In what ways does this exception inform our understanding of the rule?
Should we change the rule or simply?
Is there noting the exception, complexify our understanding of the rule?
Lessons Learned:
Information systems subsume design, policy and implementation decisions in programming code and
content. Code segments and content become "subsumed objects." While it is demonstrable that systems
are built from subsumed components, it is less easy to show exactly how decisions are subsumed. This
axiom posits that the decisions themselves, including many subtle factors, are incorporated into systems
operation.
Integrative Questions:
Integrative Questions:
What is the revisiting virtue of ethics?
What are the human nature and society?
What are the ethical concepts of revisiting virtues?
What is the moral?
Define ethical virtues?