Вы находитесь на странице: 1из 160

CYBER ETHICS | Marie Antoinette Arriola

Creative Commons Attribution


Noncommercial-No Derivative
Works 3.0 Philippines License

Page | 2
CYBER ETHICS | Marie Antoinette Arriola

For me

And to those

I love

Page | 3
CYBER ETHICS | Marie Antoinette Arriola

TABLE OF CONTENTS

Cyber Ethics -------------------------------------------------------------- 4-93

Fortune at the Bottom of the Pyramid ---------------------------94-106

The Handbook of Information and Computer Ethics -------107-160

Page | 4
CYBER ETHICS | Marie Antoinette Arriola

CYBER ETHICS

Page | 5
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter ETHICS AND THE INFORMATION REVOLUTION

Quote:

For this reason, computing is changing everything—where and how we work, where
and how we learn, shop, eat, vote, receive medical care, spend free time, make war, make
friends, make love (Rogerson & Bynum, 1995)

Learning Expectation:

It also underlies the study of ethics in the cyberspace and the significance of
understanding the effect of computer to mankind. Furthermore, I am expecting to learn about
how the information in the cyberspace is being used. The values and importance of relaying out
information. It also underlies the study of ethics in the cyberspace and the significance of
understanding the effect of computer to mankind. Furthermore, I am expecting to learn about
how the information in the cyberspace is being used.

Review:

It is hard to imagine a picture of the Spirit of St. Louis or an Apollo lander on the
magazine cover under a banner "Machine of the Year." This perhaps shows how influential the
computer has become in our society.

The information stored in the world's libraries and computers doubles every eight years.
In a sense the computer age and the information age seem to go hand in hand. The rapid
development and deployment of computing power however has also raised some significant
social and moral questions. People in this society need to think clearly about these issues, but
often ignore them or become confused.

In a sense, computer fraud is merely a new field with old problems. Computer crimes are
often nothing more than fraud, larceny, and embezzlement carried out by more sophisticated
means.

Page | 6
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

Computer technologies do not constitute a safe medium of providing relevant information


that could be used by different government agencies. We must be conscious on what
information we would like to divulge about ourselves for self-preservation purposes.
Furthermore, it is necessary to read the terms of conditions of any site we would like to visit in
order to be certain on how the personal information relayed will be used.

Integrative Questions:

1. What is Cyber ethics?

2. What is the significance of understanding the concepts of ethics in the cyberspace?

3. What are the tips in order to protect relevant information about you?

4. How is information being distributed to interested parties?

5. Why is cyber ethics important?

Page | 7
CYBER ETHICS | Marie Antoinette Arriola

Name of the Chapter ETHICS ON-LINE

Name of the Book: Cyber Ethics

Quote:

As educational opportunities, business and employment opportunities, medical services and


many other necessities of life move more and more into cyberspace.

Lesson Expectation:

I would like to learn the laws governing on-line communications. Furthermore, to assess
the crime being committed through ethics on line.

Review:

In 1967, the World Intellectual Property Organization was founded in order to establish
intellectual property boundaries and rules, so that people's hard-fought work would remain the
property of the people who created it. The Organization decided that intellectual property refers
to: "Literary and artistic works, which includes every production in the literary, scientific, and
artistic domain, whatever the mode of expression, dramatic and dramatic-musical works,
choreographic works, photographic works, and works of applied art." As a member of the WIPO,
The United States has laws stating that only the author of this work has the right to display,
copy, perform, or distribute intellectual property. However, with the Internet as a new method of
distributing information, many of these intellectual property laws were challenged. Very few
people would photocopy and sell pages from books, for example, but what about copying and
selling computer programs? It's very much the same thing. Computer programs are protected
exactly the same way as books, so if people distribute programs without the author's
permission, it is illegal. This isn't the biggest problem, however. Most people on their home
computers don't copy programs, so this is only an issue with very knowledgeable people, or
large bootleggers; not an issue for everyday people. What is an important issue, though, is the
illegal copying of information on the Internet, such as text and images on web pages.

It is even argued that caching web sites (the way that browsers automatically store web
sites on one's desktop for a faster load next time that page is accessed) is illegal by the WIPO

Page | 8
CYBER ETHICS | Marie Antoinette Arriola

laws, because the information is copied onto one's hard drive. Also controversial is the trading
of copywritten songs via MP3's online. While recently the Recording Industry Association of
America has succeeded in shutting down Napster, the most widely used song trading program,
there are still places and programs that allow users to illegally download and trade music online.
This is a much wider problem than copying programs. Millions of songs are traded online each
day, all without the permission of the creator.

Lesson Learned:

Most of the crime being committed is stealing private property of one another. Even the
identity of these people could be stolen as well.

Integrative Questions:

1. What is on-line ethics?

2. What are the crimes being committed when on-line?

3. What are the laws that govern on-line activities?

4. What is theft?

5. Who is Deborah Johnson?

Page | 9
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: REASON, RELATIVITY, AND RESPONSIBILITY AND COMPUTER


ETHICS

QUOTE:

The stakes are much higher, and consequently considerations and applications of Information
Ethics must be broader, more profound and above all effective in helping to realize a democratic
and empowering technology rather than an enslaving or debilitating one.

Learning Expectation:

We must respect others and their core values. If we can avoid policies that result in
significant harm to others, that would be a good beginning toward responsible ethical conduct.

Review:

Recently, in northern California about one-sixth of the phone calls didn’t connect
because of excessive use of the Internet. People are surging to gain access to computer
technology. They see it as not only a part of their daily lives but a necessary venue for routine
communication and commercial transactions.

On Line, a prominent Internet service provider offered its customers refunds because the
demand for connection overwhelmed the company’s own computer technology. The widespread
desire to be wired should make us reflect on what awaits us as the computer revolution
explodes around the world.

What is difficult to comprehend is what impact this will have on human life. Surely, some
of the effects will be quite positive and others quite negative. The question is to what extent we
can bring ethics to bear on the computer revolution in order to guide us to a better world or at
least prevent us from falling into a worse world. With the newly acquired advantages of
computer technology, few would want to put the genie completely back into the bottle. And yet,
given the nature of the revolutionary beast, I am not sure it is possible to completely control it,
though we certainly can modify its evolution. Therefore, it is extremely important to be alert to
what is happening. Because the computer revolution has the potential to have major effects on
how we lead our lives, the paramount issue of how we should control com- putting and the flow
of information needs to be addressed on an ongoing basis in order to shape the technology.

Page | 10
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

Computer ethics. Other policies easily meet our standards. Building computer interfaces
which facilitate use by the disabled is a clear example. And of course, some policies for
managing computer technology will be disputed. However, as I have been emphasizing, some
of the ethical policies under dispute may be subject to further rational discussion and resolution.
The major resolution technique, which I have been emphasizing, is the empirical investigation of
the actual consequences of proposed policies.

Integrative Question:

1. Who is Terry Bynum?


2. What is the importance of responsibility in computer ethics?
3. Why is reason and relativity significant in the daily aspect of computer technology?
4. How is computer ethics being practice?
5. Is computer informationally enriching?

Page | 11
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Disclosive Computer Ethics

Quote:

Ethics is always and already the 'other' side of politics (Critchley 1999)

Learning Expectation:

More particularly, we are concerned with the way in which the interest of some become
excluded through the operation of closure as an implicit and essential part of the design of
information technology and its operation in social-technical networks.

Review:

When we use the term 'politics' (with a small 'p')--as indicated above--we refer to the actual
operation of power in serving or enclosing particular interests, and not others. For politics to
function as politics it seeks closure--one could say 'enrolment' in the actor network theory
language. Decisions (and technologies) need to be made and programmes (and technologies)
need to be implemented. Without closure politics cannot be effective as a programme of action
and change. Obviously, if the interests of the many are included--in the enclosure as it were--
then we might say that it is a 'good' politics (such as democracy). If the interests of only a few
are included we might say it is a 'bad' politics (such as totalitarianism).

It is the excluded--the other on the 'outside' as it were--that is the concern of ethics. Thus, every
political action has, always and immediately, tied to its very operation an ethical question or
concern--it is the other side of politics. When making this claim it is clear that for us ethics (with
a small 'e') is not ethical theory or moral reasoning about how we ought live (Caputo 1993). It is
rather the question of the actual operation of closure in which the interests of some become
excluded as an implicit part of the material operation of power--in plans, programmes,
technologies and the like.

Lesson Learned:

We can see it operating as already 'closed' from the start--where the voices (or interests)
of some are shut out from the design process and use context from the start. We can also see it

Page | 12
CYBER ETHICS | Marie Antoinette Arriola

as an ongoing operation of 'closing'--where the possibility for suggesting or requesting


alternatives is progressively excluded. We can also see it as an ongoing operation of
'enclosing'--where the design decisions become progressively 'black-boxed' so as to be
inaccessible for further scrutiny.

Integrative Questions:

1. What is disclosive computer ethics?

2. Why is ethics is always the other sides of politics?

3. Who is Phillip Brey?

4. What is totalitarianism?

5. Is disclosive computer ethics selective?

Page | 13
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter Gender and Computer Ethics

Quote:

ICTs has emerged as one of the major critical forces for the social study of information
technologies.

Lesson Expectation:

To be able to grasp the idea that women contribute to the growth of computer ethics in
the world. Furthermore, to become aware of how women are treated in the cyberspace. In
addition, what are the laws that are being implemented to protect the well-being of the women.

Review:

Gender and technology studies have proved successful in exposing power relations in
the development and use of technologies. At the same time, major developments in feminist
ethics over the last two decades, particularly in terms of Gilligan’s (1982) ‘ethic of care’ make
this an area at least as important as computer ethics in terms of overall contribution to
philosophical ethics. I claim that bringing feminist ethics to bear on computer ethics offers a
novel and fruitful alternative to current directions in computer ethics in two major ways: firstly in
revealing continuing inequalities in power and where liberal approaches to power do not work;
and secondly, in offering an alternative, collective approach to the individualism of the traditional
ethical theories encapsulated in computer ethics.

Nowhere are these issues more important than in thinking about gender and computing
in a networked age. I am suggesting that a pressing problem for computer ethics involves
formulating a position on the way that women, and indeed other social groups such as ethnic
minorities and the differently able, may be disadvantaged or even disenfranchised with regard to
information and communications technologies. This is a well recognized phenomenon.
Recognizing it is one thing; suggesting what to do about it is quite another. But I argue that the
sort of liberal, inclusive, consultative measures, already becoming enshrined in computing
bodies’ codes of ethics and other policy documents, may not have the effect of properly
involving women users in decision making about computer systems and women in computing in
general, despite the will to do so.

Page | 14
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

Through the spread of pornography, women became vulnerable to men. It is about time
that the government should implement grave laws to preserve women as they are. We must be
able to implement laws that would not discredit the people in the internet.

Integrative Questions:

1. What is pornography?

2. How women were harassed on-line?

3. What are the laws governing pornography?

4. What are the effects of pornography to mankind?

5. How can we preserve our well-being?

Page | 15
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter:

Is the Global Information Infrastructure a Democratic Technology?

Quote

Global information infrastructure (GII), a seamless web of communication networks,


computers, databases and consumer electronics that will put vast amounts of information at
user's finger tips.

Lesson Expectation:

The concerns which many scholars have raised regarding the dangers that this endless
flow of information can present to the specificity of culture are not without merit. Certainly the
information which comes from Western countries has embedded within it certain ideals and
beliefs which are inherently Western. Yet the idea that the myriad and diverse cultures of the
world will simply conform and change, becoming homogenized and as monotonous as this
information is a bit ridiculous, given the many years which these cultures have thrived. One
must also remember that the nature of culture itself is changeable.

Review:

Information Infrastructure Task Force 1994). Through the global information


infrastructure, users around the world will be able to access libraries, databases, educational
institutions, hospitals, government departments, and private organisations located anywhere in
the world. The Internet, a global network of computers and networks is being seen as the front
runner to GII, and is providing an opportunity and infrastructure for publishing and distributing all
types of information in various formats in the shortest possible time and at the lowest cost. With
millions of people around the world accessing the Internet and still a large number trying to do
so, providing information content on the Internet has become a major business, economic,
cultural and even political activity. Both large and small business institutions are marketing their
products through the Internet.

Page | 16
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

To learn the impact of global information infrastructure to the humanity and to be able to
confirm users of said information. Furthermore, to be able to identify the uses of information
infrastructure. In addition, to define global information infrastructure and its effect to democracy.

It is simply not one solid or static thing. And despite the many differences which exist
from culture to culture and country to country, the globalization of information provides
opportunities for a better understanding of all of these. Therefore, despite cultural differences,
certain universal understandings of ethical concepts are possible and universal rules can be
reached to govern this new global village of sorts.

Integrative Questions:

1. What is global information infrastructure?

2. What is the effect of global information infrastructure to democracy?

3. What are the uses of global information infrastructure?

4. Are all nations benefited by global information infrastructure?

5. How is global information infrastructure being distributed?

Page | 17
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter:

Applying ethical and moral concepts and theories to IT Contexts: Key Problems and Challenges

Quote

“Information revolution” has altered many aspects of life significantly: commerce, employment,
medicine, security, transportation, entertainment, and so on.

Lesson Expectation:

Information and communication technology (ICT) has affected — in both good ways and
bad ways — community life, family life, human relationships, education, careers, freedom, and
democracy (to name just a few examples). “Computer and information ethics”, in the broadest
sense of this phrase, can be understood as that branch of applied ethics which studies and
analyzes such social and ethical impacts of ICT. The present essay concerns this broad new
field of applied ethics.

Review:

Two years later he published The Human Use of Human Beings (1950), a book in which
he explored a number of ethical issues that computer and information technology would likely
generate. The issues that he identified in those two books, plus his later book God and Golem,
Inc. (1963), included topics that are still important today: computers and security, computers
and unemployment, responsibilities of computer professionals, computers for persons with
disabilities, computers and religion, information networks and globalization, virtual communities,
teleworking, merging of human bodies with machines, robot ethics, artificial intelligence, and a
number of other subjects.

“Cybernetics” for his new science, Wiener apparently did not see himself as also
creating a new branch of ethics. As a result, he did not coin a name like “computer ethics” or
“information ethics”. These terms came into use decades later. In spite of this, Wiener's three
relevant books (1948, 1950, 1963) do lay down a powerful foundation, and do use an effective
methodology, for today's field of computer and information ethics. His thinking, however, was far
ahead of other scholars; and, at the time, many people considered him to be an eccentric
scientist who was engaging in flights of fantasy about ethics.

Page | 18
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

Living organisms, including human beings, are actually patterns of information that persist
through an ongoing exchange of matter-energy. Thus, he says of human beings,

We are but whirlpools in a river of ever-flowing water. We are not stuff that abides, but patterns
that perpetuate themselves.

Integrative Questions:

1. What is moral ethics?

2. Who is Norbert Wiener?

3. What is cybernetics?

4. What is information revolution?

5. Who is the author of God and Golem, Inc.?

Page | 19
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Just Consequentialism and Computing

Quote

Computer ethics is a field of professional ethics concerned with issues of responsibilities and
conduct for computer professionals, Gotterbarn (1991).

Lesson Expectation:

To find out the global impact of computing in recent years, and because of the merging
of computing and communications technologies that has also recently occurred, the field of
computer ethics might be perceived as one that is currently in a state of flux or transition.

Review:

The former group mistrusts unfamiliar agents while the latter group are not at all aware
of potential security risks associated with agent computing. Intuitive assessment of agent
behaviour may be misleading and it can be argued that a systematic ethical analysis will provide
a more reliable basis for assessment. For example the actions of Clippy may be considered as
unethical by an expert user due to Clippy’s obtrusive character – however the systematic ethical
analysis of Clippy’s actions in section 4.2, reveals that Clippy’s actions can at most be
considered irritating, but certainly not unethical. An a posteriori systematic analysis of the
behaviour of an agent can assist developers of said agent to improve the modelling of the
secure and ethical behaviour of future versions of the agent. Once the behaviour of a number of
agents have been analysed in this systematic fashion, norms and criteria for the design of new
agents that will exhibit acceptable secure and ethical behaviour can be formulated and
continually refined. This may lead to a simplification of the security measures imposed on the
agent.

Lesson Learned:

To imply that the ends, however good, “do not justify using unjust means”. Regarding the
contemplation, and in particular the performance of some action, one would thus need to
determine whether unjust means would be required to facilitate performance of the action by the
user, the agent or the host. Therefore, if it is not possible to achieve the envisaged end.

Page | 20
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. Who is James Moor?


2. What is computer ethics?
3. Why are computers malleable according to Moor?
4. Who is Deborah Johnson?
5. What are the uses of computer?

Page | 21
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter:

The Internet as Public Space: Concepts, Issues and Implications in Public Policy

Quote:

"A typical problem in computer ethics arises because there is a policy vacuum about how
computer technology should be used"

Lesson Expectation:

It is furthermore important to consider privacy in the computer context as a delicate


subject. The paper will aim to answer the question regarding the internet as a public space. To
answer such a question, perhaps it would help to consider a particular computer ethics issue.

Review

Helen Nissenbaum has recently shown how certain intrusions into the activities of online
users are not currently protected by privacy norms because information available online is often
treated as information in "public space" or what she describes as a sphere "other than the
intimate." She also notes that few normative theories sufficiently attend to the public aspect of
privacy and that philosophical work on privacy suffers a "theoretical blind spot" when it comes to
the question of protecting privacy in public. Agreeing with Nissenbaum that activities on the
Internet involving the monitoring and recording of certain kinds of personal information can
cause us to reconsider our assumptions regarding the private vs. public character of personal
information currently available online,

Tavani argues that Moor’s "control/restricted access theory" of privacy can be extended
to resolve issues involving the protection of personal privacy in the "public space" of the
Internet. Despite the challenges that the Internet has posed with respect to protecting certain
kinds of personal information, however, there is no compelling evidence that any genuinely new
privacy issues have been introduced by that medium or that we need a new category of
"Internet privacy," as some have suggested.

Page | 22
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

If you take precautions (such as forcing people to log in with laborious security
measures) then I'd argue perhaps your private areas could be affected - you can't very well
argue you stumbled inadvertently into an area that forces you to log in with a secure password).

Integrative Questions:

1. What is internet?

2. What is internet ethics?

3. What must we realize about internet being a public space?

4. What is computer ethics?

5. What are the laws implemented to safeguard privacy in the computer world?

Page | 23
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: The Laws of Cyberspace

Quote:

The telecoms is too large, too heterogeneous, too turbulent, too creatively chaotic to be
governed wholesale, from the top down,"

Lesson Expectation:

Information society to assert that the grounds for ethics, in particular information ethics,
lies in this Western tradition. If we are trying to create a genuine dialog about ethical values and
ethical reasons in the multicultural internet world, we cannot be bound solely to this tradition,
because, for example, Chinese and Indians have engaged in ethical thought and ethical
reasoning and the grounds for the resolution of their ethical dilemmas .

Review

"In a place like that, nothing except common law can keep up". Huber is not alone in
touting the common [p. 1750/p. 1751] law's unique ability to grapple with cutting-edge legal
issues. He does, however, evince an unusual appreciation of the common law as a
spontaneous order.

Huber understands that common law originates not in the holdings of any court or
courts, but rather in the actual practices of those who have to live with the law. "Rules evolve
spontaneously in the marketplace and are mostly accepted by common consent. Common-law
courts just keep things tidy at the edges" (p. 8). Even when practical rules face litigation, the
common law continues to grow and develop "out of rulings handed down by many different
judges in many different courtrooms." Looping back to the real world, judicial rules then once
more face the acid test of experience. "The good rules gain acceptance by the community at
large, as people conform their conduct to rulings that make practical sense". By attributing only
modest powers to courts, Huber's account contrasts with that of Lawrence Lessig, another
prominent advocate of applying judicial procedures to new and puzzling legal issues. Lessig
claims of the Internet "that we are, vis-à-vis the laws of nature in this new space, gods; and that
the problem with being gods is that we must choose. These choices . . . will be made, by a
Court . To the contrary, like the market place, the English language, or the common law, the
Internet arose out of human action but not human design.

Page | 24
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

Law and Disorder in Cyberspace presents a thesis revolutionary in the truest sense of
the word: it argues for overthrowing the existing corrupt order by returning to earlier, better,
more fundamental values. So defiant a book naturally reads, to quote its dust jacket, as a
"polemic." Yet Law and Disorder in Cyberspace merits serious attention from scholars and
policy wonks. Huber makes a strong case for abolishing the FCC and relying on common law to
rule the telecosm.

Integrative Questions:

1. What are the laws of cyberspace?

2. Who is Kellogg Huber?

3. What are the means of implementing the laws of cyberspace?

4. What is information ethics?

5. What is cyberethics?

Page | 25
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Of Black holes and Decentralized Law-Making in Cyberspace

Quote:

Reports that say that something hasn't happened are always interesting to me, because as we
know there are known knowns; there are things we know we know. We also know there are
known unknowns; that is to say we know there are some things we do not know. But there are
also unknown unknowns--the ones we don't know we don't know. (Rumsfeld, 2002)

Lesson Expectation:

This study seeks to identify significant philosophical implications of the free, open source
option as it has emerged in global software development communities. A three part approach
inspired by the Carl Mitcham's philosophy of technology has been employed. Each section has
touched on some ideas whose elucidation are in no way complete

Review

James Moor suggested that "conceptual muddles" and "policy vacuums" exist where
there are problems lacking a philosophical framework to address them, and this is particularly
true of computer technology (Moor, 1985). Likewise, Walter Maner proposed that innovations in
computer technology create unique, new ethical problems (Maner, 1995). For years, this
conceptual vacuum has been filling with the musings of self-proclaimed accidental
revolutionaries like Richard Stallman, Eric Raymond, and Linus Torvalds, the creator of the
Linux kernel, as well as industry leaders like Bill Gates and Tim O'Reilly. While subject area
experts have arisen in the field of computer ethics and the philosophy of computing and
information, articulation of the ethical implications of trends favoring free, open source software
are only beginning to be featured in academic publications and conferences. An excellent
example is the 2007 North American meeting of IACAP, which keynoted free software and open
access. The argumentative approach I have selected is borrowed from the philosophy of
technology, in particular the work of Carl Mitcham and Andrew Feenberg, to present practical
and moral advantages of the FOS option. Finally, I will offer a third approach based on its
potential epistemological advantages.

In Thinking through Technology: the Path between Engineering and Philosophy, Carl
Mitcham introduced the Engineering Philosophy of Technology (EPT) as the field of study

Page | 26
CYBER ETHICS | Marie Antoinette Arriola

focused on determining the best way to conduct engineering and technological endeavors
(Mitcham, 1994). This work is from the insider's perspective, and the obvious starting point to
transfer insights from the technical arena to the academic study of FOSS. There is a ready set
of commonly cited practical benefits supported by empirical research as well as the
methodologies used to evaluate, organize, and execute such projects (Lerner and Tirole, 2005).
Practical ethics have to do with making everyday choices and judging which are appropriate
based on their anticipated outcome. In this respect, technologists engage ethics in the early
stages of project management when they evaluate options. A fundamental differentiation of
options to be considered has always been between in-house versus third party, or build versus
buy (Weinstock and Hissam, 2005). Other 'practical ethics' employed by technology decision
makers include minimizing the total cost of ownership (TCO), using the best tool for the job,
standardizing on a particular technology tool set, and outsourcing where there is no competitive
advantage, which is to leave the decision to a third party. One ought to add, "utilizing free, open
source options where feasible."

Lesson Learned

Software piracy is very tempting due to the relatively high cost of commercial
applications, the easy transfer of digital information, and the lack of a perception of doing harm.
Software piracy is especially common among curious academics and hobbyists

Integrative Question:

1. Why not avoid the moral dilemma by selecting FOSS?

2. What is the FOS option?

3. Who is Walter Maner?

4. Who is James Moor?

5. Who is Deborah Johnson?

Page | 27
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Fahrenheit 451.2: Is Cyberspace Burning?

Quote:

Any content-based regulation of the Internet, no matter how benign the purpose, could burn the
global village to roast the pig."

Lesson Expectation:

The various proposals for Internet blocking and rating. Individually, each of the proposals
poses some threat to open and robust speech on the Internet; some pose a considerably
greater threat than others. To urge industry leaders to develop and deploy the tools for blocking
"inappropriate" speech.

Review:

The ACLU and others in the cyber-liberties community were genuinely alarmed by the
tenor of the White House summit and the unabashed enthusiasm for technological fixes that will
make it easier to block or render invisible controversial speech. Netscape announced plans to
join Microsoft together the two giants have 90% or more of the web browser market in adopting
PICS (Platform for Internet Content Selection) the rating standard that establishes a consistent
way to rate and block online content; IBM announced it was making a $100,000 grant to RSAC
(Recreational Software Advisory Council) to encourage the use of its RSACi rating system.
Microsoft Explorer already employs the RSACi ratings system, Compuserve encourages its use
and it is fast becoming the de facto industry standard rating system;

Four of the major search engines the services which allow users to conduct searches of
the Internet for relevant sites announced a plan to cooperate in the promotion of "self-
regulation" of the Internet. The president of one, Lycos, was quoted in a news account as
having "thrown down the gauntlet" to the other three, challenging them to agree to exclude
unrated sites from search results;

Following announcement of proposed legislation by Sen. Patty Murray (D Wash.), which


would impose civil and ultimately criminal penalties on those who mis-rate a site, the makers of
the blocking program Safe Surf proposed similar legislation, the "Online Cooperative Publishing

Page | 28
CYBER ETHICS | Marie Antoinette Arriola

Act." But it was not any one proposal or announcement that caused our alarm; rather, it was the
failure to examine the longer-term implications for the Internet of rating and blocking schemes.

The major commercial sites will still be readily available they will have the resources and
inclination to self-rate, and third-party rating services will be inclined to give them acceptable
ratings. People who disseminate quirky and idiosyncratic speech, create individual home pages,
or post to controversial news groups, will be among the first Internet users blocked by filters and
made invisible by the search engines. Controversial speech will still exist, but will only be visible
to those with the tools and know-how to penetrate the dense smokescreen of industry "self-
regulation."

Lesson Learned:

The Internet both easily and cheaply. One of the most dangerous aspects of ratings systems is
their potential to build borders around American- and foreign-created speech.

Integrative Questions:

1. What are the six reasons why self-rating schemes are wrong for the Internet?

2. What is self- rating Schemes?

3. Internet Ratings Systems How Do They Work

4. Who is Ray Bradbury?

5. Is cyberspace burning?

Page | 29
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter:Filtering Internet in the USA: Is Free Speech Denied?

Quote:

To give up the fight, without exhausting our defenses, could cost the surrender of our "soul".
(Leo Tolstoy)

Lesson Expectation:

However, that same ease in accessing information is a "double-edged sword" -- it


enabled others also to invade our privacy just as easily. Nothing seems to be inviolable
anymore.

Review:

the government, we fail to recognize or prefer to ignore a greater source of intrusion to


our privacy -- private companies and institutions (many we do not suspect), including "non-
profit" organizations, medical institutions, etc. The New York Times has published articles of
how political candidates gather information about you when you visit their website. Before the
crash of the "dot.com" industry, some of the business "policy makers" [sic] considered archived
personal data, as a commercial commodity that could be gathered and traded at will by the
"dot.coms", even without the person's consent. "Cookies" are left in computers or other
diabolical codes are integrated surreptitiously in formatted internet page, advertisements, etc.
All these were meant to track your internet viewing habits.

While you may be able to employ some diabolical subterfuge (e.g., using a different
internet name) to hide your identity, many software programs have been developed to thwart
your efforts so that they will be able to identify even your location or name. Many savvy
websites can even access the code of your computer by planting "cookies" in your computer.
Armed with other information that can be bought readily from other sellers of personal
information. Tracking the behavior of individuals and groups has been a preoccupation of social
scientists, poll takers, the advertising industry and all companies that have something to sell.
However, previous studies or "ratings" usually just involved a small "statistical sample" of a
population.

Page | 30
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

Many people decry this state of the internet -- invasion of privacy, over
commercialization and monopolistic trends in the building of the infrastructure of the internet --
where we as individuals are viewed merely as "consumers".

If all of us who care about these issues can band together, we may be able to shape the
future of the internet so that we can create an internet community that would be more respecting
of our privacy and humanity.

Integrative Questions:

1. What is freedom of speech?

2. Who is Leo Tolstoy?

3. What is Internet?

4. What is privacy?

5. How internets do invades our privacy?

Page | 31
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Censorship: The Internet and the Child Pornography Law of 1996: A
Critique

Quote:

"deprave or corrupt" people who are likely to use the material.

Lesson Expectation:

In this case it may be instructive to look at the legal definitions of obscene or


pornography for ways of incorporating sexual obscenity in to the term more closely. Therefore,
courts, when examining whether material is obscene, consider whether the material tends to
"deprave or corrupt" people who are likely to use the material. The focus on the consumer of the
material has been criticized on the grounds that it fails to acknowledge harms to the non-
consumers of the material like women.

Review:

Pornography should be subject to censorship and regulation because the majority has
the right to regulate non-political, public speech that is harmful or offensive to the majority. His
argument starts with the assertion that a distinction between the public and private spheres of
life are valid, and that the majority has a right to regulate the public space in some way (Gastil
1997, 190). He uses the example of nudists, who must where clothes in public, but in private
camps or homes can dress or not dress as they please, to illustrate the majority’s right to an
inoffensive public space and a minority’s right to a private moral space (Gastil 1997, 190). He
then goes on to argue that only the free speech which bears on the consideration of voters
choices and the public interest is protected by the First Amendment, not private speech in the
private interest (Gastil 1997, 191).

He argues that freedom of speech should "be protected by a more absolute but less all
inclusive principle that refers to rational political discourse as an ineluctable requirement of
political democracy." (Gastil 1997, 191). From these arguments he concludes that the
regulations on privately interested speech in the public space can be subjected to censorship if
it is deemed harmful. He then concludes that pornography is harmful because 1) it diminishes
the specialness and dignity of human life and 2) it reduces the creativity of artists and society by
diverting public resources to activities that are wholly uncreative and of little redeeming value.

Page | 32
CYBER ETHICS | Marie Antoinette Arriola

He cites examples such as defamation, conspiracy, threats, intimidation and similar


offenses as examples where the promotion of harm is justification for limits on freedom of
expression. On these grounds, Groarke suggests much of the current pornography promotes
harm by condoning kidnapping, rape, torture and other violent acts as legitimate means of
achieving sexual satisfaction (Groarke 1997, 201). He rejects Gastil’s approach of appealing to
some sort of community or majority sensibility because it is an "arbitrary infringement on the
freedom of expression", while regulations justified by pornography’s promotion of harm are more
respectful of the freedom of expression and still allow for the prohibition and control of the most
offensive pornography (Groarke 1997, 203). He summarizes his position by stating that "the key
to such censorship is the principle that the promotion of harm to others should not be tolerated,
a principle that can be used to justify the changes to obscenity law that prohibit such material,
though not the changes that allow a broader censorship."

Lesson Learned:

The United States. For example, as a result of New York v. Ferber, the Miller obscenity
standard does not apply because the Supreme Court ruled that child pornography is by
definition obscene (Akdeniz 1996). The court took this stand for a number of reasons. First, the
production of such pornography with children as subjects is harmful to them; second, the value
of the material is negligible at best; and third, the distribution of child pornography is inseparable
from its role in the abuse of children.

Integrative Question:

1. What is Pornography?

2. Who is Raymond Gastil?

3. Who is Leo Groarke?

4. Who is Loren Clark?

5. What is Communication Decency Act?

Page | 33
CYBER ETHICS | Marie Antoinette Arriola

Name of the Chapter: PICS: Internet Access Control Without Censorship

Quote:

Internet Access Controls without Censorship".

Lesson Expectation:

The World Wide Web Consortium (W3C) in September 1995, it was widely hailed as a
stroke of genius. The developers, a group of computer scientists and software manufacturers,
promoted PICS as "Internet Access Controls without Censorship". PICS publicity emphasized a
multiplicity of rating systems, voluntary self-rating and labeling by content providers and
blocking software installed on home computers. Materials may be legal and appropriate for
some recipients but not others, so that any decision about whether to block at the source will be
incorrect for some audiences.

Review:

PICS specifies only those technical issues that affect interoperability. It does not specify
how selection software or rating services work, just how they work together.

One possibility is to build it into the browser on each computer, as announced by


Microsoft and Netscape. A second method-one used in products such as CyberPatrol and
SurfWatch-is to perform this operation as part of each computer's network protocol stack. A third
possibility is to perform the operation somewhere in the network, for example at a proxy server
used in combination with a firewall. Each alternative affects efficiency, ease of use, and security.
For example, a browser could include nice interface features such as graying out blocked links,
but it would be fairly easy for a child to install a different browser and bypass the selective
blocking.

Even that amount of configuration may be too complex, however. Another possibility is
for organizations and on-line services to provide preconfigured sets of selection rules. For
example, an on-line service might team up with UNICEF to offer "Internet for kids" and "Internet
for teens" packages, containing not only preconfigured selection rules, but also a default home
page provided by UNICEF. Labels can be retrieved in various ways. Some clients might choose
to request labels each time a user tries to access a document. Others might cache frequently
requested labels or download a large set from a label bureau and keep a local database, to
minimize delays while labels are retrieved.

Page | 34
CYBER ETHICS | Marie Antoinette Arriola

Lesson learned:

Others regard that as the pot calling the kettle black. PICS was, after all, developed by
people fearful of government censorship and who were apparently ignorant of the
repressiveness of some governments.

Integrative Question:

1. What is PICS?

2. What is Metadata?

3. Who is Paul Resnick?

4. What is Multiplicity Rating Systems?

5. What is Labeling?

Page | 35
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Internet Service Providers and Defamation: New Standard of Liability

Quote:

"It is not reasonable to expect editors, producers and journalists to know and apply eight
separate defamation laws in publishing newspapers and magazines circulating throughout
Australia and in selecting material for transmission on national broadcasting and television
programs."

Lesson Expectation:

ISPs attractive defendants in defamation claims, many of which relate to the costs
associated with litigation. For example, the author of a defamatory statement will often reside
outside the jurisdiction of the plaintiff, whereas the ISP that carried the statement does business
in the plaintiff's jurisdiction. It might be difficult, time-consuming, or even impossible, to
determine the actual author of the message.

Review:

Early American decisions focused on distinguishing between ISPs that acted as


publishers or distributors. Subsequent legislation in both jurisdictions has resulted in marked
differences in the potential for legal liability of ISPs in America and Britain that supposedly
reflect the inherent government policies of each country. These policies reflect a balancing of
such interests as freedom of speech, personal reputation, and the promotion of electronic
communication and commerce.

The advent of the Internet has resulted in legislatures and courts around the world re-
evaluating laws and policies on issues as diverse as taxation, privacy, and contract formation.
The liability of the Internet Service Provider (ISP), the company that is the vehicle for the user's
access to the Internet, and which brings information to the user from around the world, is
potentially staggering if one applies to it long-established legal principles for issues such as
distribution of pornography, breach of copyright, or misrepresentation. Defamation of character
over the Internet is illustrative of the problem.

Page | 36
CYBER ETHICS | Marie Antoinette Arriola

Lesson learned:

The liability of intermediaries for defamation has a long history in the common law.
'Publishers', such as newspapers, which traditionally exerted editorial control over content, are
generally liable for the defamatory statements that they publish. 'Distributors', such as
bookstores or newsstands, exert very little if any editorial control, and have the benefit of the
'innocent disseminator' defense. I

nnocent disseminators are protected from liability for defamation if they did not know of
the libelous statement, there were no circumstances that ought to have led them to suppose it
contained a libel, and they were not negligent in being ignorant of the libel.

Integrative Question:

1. What is Internet Services Provider?

2. What is defamatory publication?

3. What is libel?

4. What is pornography?

5. What is Defamation Act of 1996?

Page | 37
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Digital Millennium Copyright Act

Quote:

The technology companies that distribute their content — the legal power to create closed
technology platforms and exclude competitors from interoperating with them.

Lesson Expectation:

To and the meaning of Digital Millennium Copyrights Act. It will also highlight the
importance of DMCA for the mankind. Likewise, it will also enumerate the disadvantages of the
said act.

Review:

The arrest of Russian programmer Dmitry Sklyarov in 2001, for alleged infringement of
the DMCA, was a highly publicized example of the law's use to prevent or penalize development
of anti-DRM measures. While working for Elcomsoft in Russia, he developed The Advanced
eBook Processor, a software application allowing users to strip usage restriction information
from restricted e-books, an activity legal in both Russia and the United States.

Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool.
Sklyarov was arrested in the United States after presenting a speech at DEF CON and
subsequently spent nearly a month in jail. The DMCA has also been cited as chilling to
legitimate users, such as students of cryptanalysis (including, in a well-known instance,
Professor Edward Felten and students at Princeton), and security consultants such as Niels
Ferguson, who has declined to publish information about vulnerabilities he discovered in an Intel
secure-computing scheme because of his concern about being arrested under the DMCA .

Lesson Learned:

When website owners receive a takedown notice it is in their interest not to challenge it,
even if it is not clear if infringement is taking place, because if the potentially infringing content is
taken down the website will not be held liable.

Page | 38
CYBER ETHICS | Marie Antoinette Arriola

Integrative questions:

1. What is DMCA?

2. What is copyright?

3. What is cryptography?

4. What are the provisions of DMCA?

5. What are the advantages of DMCA?

Page | 39
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Note on the DeCSS Trial

Quote:

"Our main goal," said Gross, "is to build a strong, solid record to take to the appeals
court, where civil liberties are taken more seriously."

Learning Expectation:

Linux came to the forefront of the ongoing DeCSS trial late last week. That's because, in
a very real way, Linux started the uproar that has resulted in eight movie studios suing Eric
Corley. The trial could ultimately affect the way consumers use products they purchase and the
way researchers advance technology.

Journalist Eric Corley -- better known as Emmanuel Goldstein, a nom de plume


borrowed from Orwell's 1984 -- posted the code for DeCSS (so called because it decrypts the
Content Scrambling System that encrypts DVDs) as a part of a story he wrote in November for
the well-known hacker journal 2600. The Motion Picture Association of America (MPAA) claims
that Corley defied anticircumvention provisions of the Digital Millennium Copyright Act (DMCA)
by posting the offending code for anyone to download from his Website.

Review:

Jon Johansen wrote DeCSS in order to view DVDs on a Linux machine. The MPAA has
since brought suit against him in his native Norway as well. Johansen testified on Thursday that
he announced the successful reverse engineering of a DVD on the mailing list of the Linux
Video and DVD Project (LiViD), a user resource center for video- and DVD-related work for
Linux. The Electronic Frontier Foundation (EFF), an organization based in San Francisco which
supports civil liberties in digital arenas, is providing a legal defense that cites, among other
issues, fair use. After all, the EFF argues, if you buy a DVD, why can't you play it on any
machine you want?

Page | 40
CYBER ETHICS | Marie Antoinette Arriola

Lessons Learned:

The judge in the case, the honorable Lewis Kaplan of the US District Court in southern
New York, issued a preliminary injunction against posting DeCSS. Corley duly took down the
code, but did not help his defense by defiantly linking to myriad sites which post DeCSS.

By taking his stand, Corley has brought key issues of the digital age to trial. Among them
is the right to experiment and to share knowledge, he said. The case also points to the DMCA's
broad protections, which for the first time not only give copyright to creative work but also to the
software -- or any other technology -- that protects it.

Still open is the question of whether the injunction against Corley, or the fight against
DeCSS itself, is not a vain struggle in the face of inevitable change. Judge Kaplan, whom the
defense requested recuse himself based on conflict of interest, said last Thursday to Mikhail
Reider, the MPAA's chief of Internet antipiracy, "You are asking me to issue an injunction
against the guy who unlocked this barn, [telling him] not to unlock it again --- even though there
is no horse in it." "It's good to see that [the judge] is realizing the futile nature of dealing with
these issues this way," said Robin Gross, an EFF attorney and a member of the defense team.

Though the MPAA may not be able to stop DeCSS, there are other issues at stake that
are unrelated to digital piracy.

Integrative Questions:

1. What is DeCSS?
2. What is Trial ?
3. What is the copyright issue of the defense trial?
4. Who is the Judge?
5. What is the plans ?

Page | 41
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter:A Politics of Intellectual Property: Environmentalism for the Net

Quote:

There is a danger of absolutizing the claims to ownership and control to the detriment of other
interested parties, something we have noted in recent legislative proposals. Samuelson, 1997)

Lesson Expectation:

First it presents some cases that illustrate the range of possible intellectual property
rights. Next it examines the traditional justifications for such rights. It then critiques those
justifications, not to refute them, but to show their limits. Finally it proposes a different way of
looking at the problem, using traditional natural law ethics.

Review:

Property usually refers to tangible assets over which someone has or claims control.
Originally it meant land. Now it could also refer to a car, a milling machine, a jacket or a
toothbrush. In all these cases the property claim is of control of the physical entity. If I claim a
plot of land as my property, I am saying I can control who has access to that land and what they
do there. I can build a fence around it, rent it out, or drill for oil on it. If a car is my property, I get
the keys to it. I can exclude others from using it and use it myself for whatever I want, as long as
I do not threaten the lives or property of others. Intellectual property is different because its
object is something intangible, although it usually has tangible expression. The intellectual
property in a book is not the physical paper and ink, but the arrangement of words that the ink
marks on the paper represent. The ink marks can be translated into regions of magnetic
polarization on a computer disk, and the intellectual property, and whatever claims there are to
that property, will be the same. The owner of a song claims control, not of the CD on which the
song is recorded, but of the song itself, of where when and how it can be performed and
recorded.

Computer technology has created a new revolution in how intellectual property is


created, stored, reproduced and disseminated; and with that has come new challenges to our
understanding of intellectual property and how to protect it. Of course computers have given rise
to a whole new category of intellectual property, namely computer software. A major commercial
program can take a team of one hundred or more highly skilled and highly paid programmers

Page | 42
CYBER ETHICS | Marie Antoinette Arriola

years to create and can sell for hundreds, or even hundreds of thousands, of dollars per copy.
Yet someone with access to such a program can make a copy in moments at practically no
cost.

Lesson learned:

Intellectual property has always been closely tied to technology. Technology arises from
intellectual property in the form of new inventions. But technology also supports intellectual
property by providing new, more powerful and more efficient ways of creating and disseminating
writing, musical composition, visual art, and so on. In fact it was the technology of the printing
press that originally gave rise to intellectual property as a legal and moral issue. Before, when it
took almost as much of an effort to reproduce a document as it took to create it, there was little
need to impose limits on copying.

Integrative Question:

1. What is intellectual property?

2. What is information?

3. What is copyright?

4. What is plagiarism?

5. What is computer technology?

Page | 43
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Intellectual Property, Information, and the Common Good

Quote:

"With air pollution there was, for example, a desire of the people living in Denver to see the
mountains again. William Ruckelshaus

Lesson Expectation:

Everyone says that the ownership and control of information is one of the most important
forms of power in contemporary society. This article will tend to review the importance of politics
of intellectual property.

Review:

"There is a fundamental conflict between the efficiency with which markets spread
information and the incentives to acquire information." This problem is often, though not always
"solved" by ignoring it. A pre-theoretical classification is made, conventionally ascribing a certain
problem to one or other realm and the discussion then continues on that basis. Thus for
example, we tend to look at the field of intellectual property with a finely honed sensitivity to
"public goods" problems that might lead to under production, while underestimating or failing to
mention the efficiency costs and other losses generated by the very rights we are granting.
Some conventional ascriptions visibly switch over time. The contemporary proponents of
legalizing insider trading use the idea of the efficient capital market to minimize or defend the
practice.

The first generation of analyses saw the insider trade as the entrepreneur's incentive
and reward for Faustian recombination of the factors of production. An alternative method for
smoothing over the tensions in the policy analysis is for the analyst to acknowledge the tension
between efficiency and incentives, point out that there are some limitations imposed on
intellectual property rights, to conclude that there are both efficiency-promoting and incentive
promoting aspects to intellectual property law, and then to imply that an optimal balance has
been struck.

Page | 44
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

In general, then, I would claim there is a tendency to think that intellectual property is a
place to apply our "public goods/incentives theory" rather than our "anti-monopoly/free-flow of
information" theory. All by itself, this might push rhetoric and analysis towards more expansive
property rights. The tendency is compounded, however, by two others.

First, courts are traditionally much less sensitive to First Amendment, free speech and
other "free flow of information arguments" when the context is seen as private rather than
public, property rather than censorship. Second, intellectual property rights are given only for
"original" creation.

Integrative Question:

1. What is intellectual property?

2. What is politics?

3. What is environmentalism?

4. Who is James Boyle?

5. What is public’s good theory?

Page | 45
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: Is Copyright Ethical

Quote:

A property right is the relationship between individuals in reference to things. Cohen (1935)

Lesson Expectation:

The focus is on two key questions: 1) what is the relationship between ethics and
copyright law and practice in the United States; and, 2) is the concept of private ownership of
intellectual property inherently ethical? These questions are important because access to an
overwhelming number of the elements of daily life is now controlled by intellectual property law.

Review:

The ethics of copyright can be approached in two ways: (1) If, as Hettinger suggests,
every creator stands on the shoulders of giants what is the essential morality in allowing the last
contributor to reap the full reward or to have the right to prevent others from building on her
contribution; and (2) If, as postulated by Locke, an individual is entitled to what he or she
creates, what are the ethics of limiting a creators rights in regards to his or her creation?
Theoretically copyright law in the United States takes the first view, stating that authors have no
natural right in their creation but only the rights that the state has conferred by reason of policy
to encourage the creation of new works.

United States copyright law was better aligned with the encouragement theory and the
ethical position that creative works belonged to society as a whole. Only the exact copying of a
work was prohibited, not new works based on a previous work. Subsequent authors were free to
adapt novels to the stage, abridge scholarly works for the masses, and translate works into
other languages without paying a license fee to the creator or to whom ever the creator had
transferred his or her copyright. However as copyright law has expanded to grant creators more
rights the law has all but abandoned the concept of allowing, let alone encouraging,
transformative or productive use. Copyright no longer has a consistent theory, let alone an
ethical position. It has become what is often called an equitable rule of reason, which attempts
to balance the rights of authors with the rights of users. It is often not clear whether this balance
is to be obtained by granting rights via law or by recognizing the intrinsic rights of each.

Page | 46
CYBER ETHICS | Marie Antoinette Arriola

Lesson learned:

The Software Publisher’s Association (SPA), which merged with the Information Industry
Association (IIA) in January of 1999 to form the Software & Information Industry Association
(SIIA), offers a guide on Software Use and the Law (SPA 1997) which states it is intended to
provide.

Integrative Question:

1. What is property right?


2. What is copyright?
3. Is copyright unethical?
4. What is Software Publishers’ Association?
5. What is intellectual property?

Page | 47
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: Cyber Ethics

Name of the Chapter: On the Web, Plagiarism Matters More Than Copyright Piracy

Quote:

Plagiarism epidemic is mainly a result of a simple fact that the web has made plagiarism much
easier than it used to be in the print environment. Cronin (2003)

Lesson Expectation:

There are worrisome trends in the behaviour and attitudes of students towards
plagiarism and cheating in their academic work. A new term ”cyber-plagiarism” has since been
introduced to describe the process by which students copy ideas and information from the
Internet without giving attribution, or downloading.

Review:

This includes using others’ ideas, information without giving credit and
acknowledgement. It is clear that piracy is the infringement of copyright, and plagiarism is the
failure to give credit to the author. However, many people easily get confused between those
two terms, and one may usually commit both offences. It would be plagiarism but not piracy for
us to take the works of an obscure 18th century poet and try to use them as our own. Since the
copyright will have expired on such works, this is not piracy. Most people are aware that taking
the exact texts or words of another person without attribution is plagiarism, but they then believe
that paraphrasing the original work is acceptable.

Yet taking someone else’s idea and changing the words is like stealing a car and
changing its colour. However, literary works that are stolen differ in many ways from physical
properties that are the targets of ordinary theft. Ideas are less tangible and identifiable than
physical objects. There is hardly a clear way to determine which idea counts as a brand new
and which requires acknowledgment as a variation on old ideas.

Page | 48
CYBER ETHICS | Marie Antoinette Arriola

Lesson learned:

We may remember ideas without remembering where they come from because without careful
notations, recalling a source is much more difficult than recalling the idea itself. Therefore it is
not easy to totally avoid unintentional plagiarism. However, beside the careless paraphrasing or
accidental misleading citations, there are other harmful plagiarism acts that are negatively
influencing the scholarly communities.

Integrative Question:

1. What is plagiarism?
2. What is piracy?
3. What is copyright?
4. Which is more grave: plagiarism or copyright?
5. What is cyber-plagiarism?

Page | 49
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: An Ethical Evaluation of Web Site Linking

Quote:

“It is important to our company that you know our exact process we take for the education and
understanding on how is the ethical evaluation on web site Linking”

Learning Expectation:

Web Site linking we use this SEO strategy to navigate people to other pages within the
website for the relevant information they are looking for. This improves navigation and link back
popularity as well. This procedure is not a huge factor in our search engine optimization
services but we have found it very functional for the end user getting them where they want to
be in a site for information they may be looking for and possibly get the website owner the sale
or lead in that specific area. In case people do not understand me on this an interior link can be
spotted as a underlined or highlighted keyword on a specific page that moves you to another
URL on that website.

Review:

The person or team of people for that company on the most important keywords they
would like to rank high for. Nine out of ten times we find that the keywords the companies like to
see are not their only main or lateral phrases for keyword placement and top search engine
rankings. In fact I have had keywords come across to me that really have no relevancy to their
web sites goals for success.

Scam and Spam search engine optimization companies eat this up because they realize
that some words have no competition to them and can be achieved with very little effort, and if
you're locked into their contract, you will sometimes have to shell out more money because they
claim they have much more to do.

Page | 50
CYBER ETHICS | Marie Antoinette Arriola

Lessons Learned:

The Directory is developed to increase traffic and search engine popularity by targeting
other websites to point back to your website. This will also help to improve traffic by other
audiences finding your website through another site on the World Wide Web.

Integrative Questions:

1. What is ethical evaluation?


2. What is Web Site Linking?
3. What is the Strategy of Web Site Linking?
4. Why Ethical Evaluation is important?
5. What are the different kinds of Web Site Linking?

Page | 51
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter:The Cathedral and the Bazaar

Quote:

"Given enough eyeballs, all bugs are shallow"

Learning Expectation:

Eric S. Raymond on software engineering methods, based on his observations of the


Linux kernel development process and his experiences managing an open source project,
fetchmail. It was first presented by the author at the Linux Kongress on May 27, 1997 and was
published as part of a book of the same name in 1999

Review:

Raymond's standard talk begins with references to himself as an ordinary but


experienced IT guy of sorts who, without any sort of formal training in sociology, psychology,
marketing, business, or the like, has become the chronicler of the "gnu generation" (not his
quote, just a common one) and predictor of open source things to be. Then, he drones on for an
hour or two about sociology, psychology, marketing, business, and the like. I've seen him give
this talk in front of academics. Thankfully, he has little shame, or he'd have dropped dead long
ago from the subtle looks and snickers that inevitably result from his bombast.

In his works (including "Cathedral"), Eric makes a very one-sided analysis of software
engineering methodologies. It's a complete ra-ra piece which fails to seriously address the very
many shortcomings of open-source development, including, most critically, the inability to scale
timewise as well as commercial software (while not under the GNU licence, two years ago
Raymond was predicting the success of the open-source Mozilla browser initiative, which is at
this point a complete fiasco

Lessons Learned:

The people should be getting out of this book (or a book like this) is a balanced,
informed view of open source vs commercial software, undertaken with sound research on
various cost/effectiveness metrics and some case studies.

Page | 52
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What is Cathedral and the Bazaar?


2. What is the cathedral model?
3. What is Linux Kernel?
4. Who is Raymond?
5. Why is this book worth reading?

Page | 53
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Towards a Theory of Privacy for the Information Age

Quote:

Few students enter college fully understanding the relationship between plagiarism and
the rules about quoting, paraphrasing and documenting material” (Wilhoit, 1994).

Lesson Expectation:

The web environment and use more online resources for research, the need for
protections against plagiarism increases. Because of the volatility characteristic of the web
environment, it is usually difficult to establish or preserve the provenance.

Review:

The Cathedral and the Bazaar, the most important computer programming thinking to
follow the Internet revolution. But it would be more unfortunate to overlook the implications and
long-term benefits of his fastidious description of open-source software development
considering the growing dependence businesses and economies have on emerging computer
technologies.

Lesson learned:

The integrity of the Internet and academic communities is severely damaged. The main
reason why students get away with internet plagiarism is that we lack of resources to monitor
cheating, and the examiners have to mark too many papers thus cannot give enough attention
to each submitted work. Tools that provide automatic detection of plagiarised works can greatly
improve the situation. Therefore, computer professionals can provide great help.

Integrative Question:

1. Why do students plagiarized?


2. What are the harmful effects of plagiarism?
3. How to combat plagiarism?
4. What are the laws implemented to prevent plagiarism?
5. What is cyber-plagiarism?
6. Why do students plagiarise?

Page | 54
CYBER ETHICS | Marie Antoinette Arriola

Page | 55
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: The Structure of Rights in Directive 95/46/ec on the Protection of the
individuals with regard to the Processing Personal Data and the free movement of such Data

Quote:

Lesson Expectation:

To understand the importance of personal data protection. To establish the directive a


necessary medium in protecting individual data. And furthermore, to importance of implementing
personal data protection.

Review:

The principles of personal data protection established in the Directive 95/46/EC were
implemented into the Polish legal order by the Act of 29 August 1997 on the Protection of
Personal Data The Act on Personal Data Protection introduced detailed rules on personal data
protection in Poland, and up to 1 May 2004, i.e. up to Poland’s accession to the European
Union, included in the Polish legal order all principles specified in the Directive 95/46/EC of the
European Parliament and of the Council. The provisions of the Act have been in force since 30
April 1998.Implementation of the provisions on personal data protection into the Polish legal
system allowed Poland to sign in April 1999 and to ratify in May 2002 the Convention No. 108 of
the Council of Europe. Those activities reflected increasing democratisation of public life in
Poland as well as concern for the protection of privacy of its every citizen.

Lesson Learned:

The Community specified the constitutional right to decide on the fact to whom, in what
scope and for what purpose we give our personal data, and gave statutory guarantees of
compliance with this right by providing the data subjects with measures used for exercise of this
right and competent authorities and services – with the legal remedies which guarantee
compliance with this right.

Page | 56
CYBER ETHICS | Marie Antoinette Arriola

Integrative Question:

1. What is directive 95/46/ec?


2. What is personal data protection?
3. What is privacy?
4. When was the directive was established?
5. What is the act on personal data protection?

Page | 57
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Privacy, Individuality, Control of information, and Privacy –enhancing
Technologies

Quote:

“Privacy” is used frequently in ordinary language as well as in philosophical, political and


legal discussions, yet there is no single definition or analysis or meaning of the term.

Learning Expectation:

Privacy has broad historical roots in sociological and anthropological discussions about
how extensively it is valued and preserved in various cultures. Moreover, the concept has
historical origins in well known philosophical discussions, most notably Aristotle's distinction
between the public sphere of political activity and the private sphere associated with family and
domestic life.

Review:

According to one well known argument there is no right to privacy and there is nothing
special about privacy, because any interest protected as private can be equally well explained
and protected by other interests or rights, most notably rights to property and bodily security
(Thomson, 1975). Other critiques argue that privacy interests are not distinctive because the
personal interests they protect are economically inefficient (Posner, 1981) or that they are not
grounded in any adequate legal doctrine (Bork, 1990).

Other commentators defend privacy as necessary for the development of varied and
meaningful interpersonal relationships (Fried, 1970, Rachels, 1975), or as the value that
accords us the ability to control the access others have to us (Gavison, 1980; Allen, 1988;
Moore, 2003), or as a set of norms necessary not only to control access but also to enhance
personal expression and choice (Schoeman, 1992), or some combination of these (DeCew,
1997). Discussion of the concept is complicated by the fact that privacy appears to be
something we value to provide a sphere within which we can be free from interference by

Page | 58
CYBER ETHICS | Marie Antoinette Arriola

others, and yet it also appears to function negatively, as the cloak under which one can hide
domination, degradation, or physical harm to women and others.

Lessons Learned:

The feminist critique of privacy, yet it can be said in general that many feminists worry
about the darker side of privacy, and the use of privacy as a shield to cover up domination,
degradation and abuse of women and others. If distinguishing public and private realms leaves
the private domain free from any scrutiny, then these feminists such as Catharine MacKinnon
(1989) are correct that privacy can be dangerous for women when it is used to cover up
repression and physical harm to them by perpetuating the subjection of women in the domestic
sphere and encouraging nonintervention by the state.

Integrative Questions:

1. What is informational privacy?


2. What is the constitutional right to privacy?
3. What are the Privacy and Control over Information?
4. What is the privacy and Intimacy?
5. Is privacy relative?

Page | 59
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Toward and Approach to privacy in public: Challenges of Information
technology

Quote:

Privacy provides the necessary context for relationships which we would hardly be human if we
had to do without-the relationships of love, friendship and trust. Charles Fried

Lesson Expectation:

The articles discuss the importance of privacy in public. It also highlights philosophical
views that necessitate the importance of privacy in public. Further more, it also discusses the
lack of privacy in the computer technology.

Review:

Prominent among contemporary philosophical works on privacy is Charles Fried's. Fried


(1984) argued that privacy is important because it renders possible important human
relationships. Although Fried conceived of privacy as control over all information about oneself,
he defended a moral and legal right to privacy that extends only over the far more limited
domain of intimate, or personal, information. He accepted this narrowing of scope because even
a limited domain of intimate or personal information provides sufficient "currency" for people to
differentiate relationships of varying degrees of intimacy. The danger of extending control over
too broad a spectrum of information is that privacy may then interfere with other social and legal
values. Fried wrote, "The important thing is that there is some information which is protected" ,
namely, information about the personal and intimate aspects of life. According to Fried, the
precise content of the class of protected information will be determined largely by social and
cultural convention. Prevailing social order "designates certain areas, intrinsically no more
private that other areas, as symbolic of the whole institution of privacy, and thus deserving of
protection beyond their particular importance". Other philosophers also have focused on the
interdependence between privacy and a personal or intimate realm. Robert Gerstein (1984), for
example, contended that "intimacy simply could not exist unless people had the opportunity for
privacy.

Page | 60
CYBER ETHICS | Marie Antoinette Arriola

Privacy's purpose, he wrote, is to insulate "individual objectives from social scrutiny.


Social scrutiny can generally be expected to move individuals in the direction of the socially
useful.

Privacy insulates people from this kind of accountability and thereby protects the realm
of the personal". Schoeman, unlike Fried (1984) however, holds that there are domains of life
that are essentially private and not merely determined to be so by social convention.

Lesson Learned:

The views of Schoeman, Fried, and Gerstein, though differing in detail, rest on a
common core. Each held that properly functioning, psychically healthy individuals need privacy.
Privacy assures these people a space in which they are free of public scrutiny, judgment, and
accountability, and in which they may unselfconsciously develop intimate relationships with
others.

A person's right to privacy restricts access by others to this sphere of personal,


undocumented information unless, in any given case, there are other moral rights that clearly
outweigh privacy. Although many other writers who have highlighted the connection between
privacy and the personal realm have not attended merely to the status of the "non-personal"
realm. If information is not personal information or if it is documented, then action taken with
respect to it simply does not bear on privacy.

Integrative Question:

1. Who is Helen Nissembaum?


2. What is privacy in public?
3. What is the importance of privacy?
4. Who is Charles Fried?
5. What are the laws governing privacy?

Page | 61
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: KDD, PRIVACY, INDIVIDUALITY, AND FAIRNESS

Quote:

“The rights and requirements make no sense regarding anonymous data and group
profiles.”

Lesson Expectation:

To be able to define KDD and its impact to the society. In addition to be able to understand its
importance and its effect to individuals. And lastly, to understand the importance of privacy.

Review:

Sometimes, these theoretical views on informational privacy are not much more than
implicit assumptions. However, things are different and more articulate where theorists define
informational privacy as being in control over (the accessibility of) personal information, or
where they indicate some kind of personal freedom, such as the preference-freedom in the vein
of John Stuart Mill's individuality, as the ultimate point and key value behind privacy (see, for
instance Parent, 1983 and Johnson. 1989).These theorists consider privacy to be mainly
concerned with information relating to designating individuals. The protective measures
connected to that definition to the KDD process is not without difficulties. Of course, as long as
the process involves personal data in the strict sense of data relating to an identified or
identifiable individual, the principles apply without reservation.

For instance, the right of rectification applies to the personal data in the strict sense
itself; it does not apply» information derived from this data.

Lesson Learned:

It should be observed that group profiles may occasionally be incompatible with respect
to individual privacy and laws and regulations regarding the protection of personal data, as it is
commonly conceived of. For instance, distributive profiles may sometimes be rightfully thought
of as infringements of (individual) privacy when the individuals involved can easily be identified
through a combination with other information available to the recipient or through spontaneous
recognition.

Page | 62
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What is KDD?
2. What is privacy?
3. What is individuality?
4. What is fairness?
5. What is a distributive profile?

Page | 63
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Data Mining and Privacy

Quote:

Data mining is that when data about the organization’s processes becomes readily available, it
becomes easy and therefore economical to mine it for new and profitable relationships.

Lesson Expectation:

Can data privacy and data mining coexist? This paper began with an attempt to define
the concept of data mining and privacy. And it goes on to explore how exactly data mining can
be a threat to privacy, and especially how the Internet is currently associated with the tension
between data mining.

Review:

Thus, businesses became interested in collecting and managing consumer’s data. Data
mining is a valuable tool for business. Before we discuss its relation to privacy, it will be helpful
to cover what is data mining. Though the term data mining is relatively new, data mining attracts
tremendous interest in commercial market place. Lots of businesses pay attention to data
mining recently. Why are data mining and data warehousing mushrooming so greatly now?

According to Cavoukian (1998), data mining is usually used for four main purposes: (1)
to improve customer acquisition and retention; (2) to reduce fraud; (3) to identify internal
inefficiencies and then revamp operations, and (4) to map the unexplored terrain of the Internet.
Generally, data mining seems a survival strategy for companies in these days. Indeed, Erick
Brethenoux, research director for advanced technologies at the Gartner Group, calls data
mining as “necessary for survival.”

Lesson Learned:

Whenever we shop, use credit card, rent a movie, withdraw money from ATM, write a
check and log on the Internet, our data go somewhere. Virtually, every aspect of our life
discloses information about us. With the development of computing and communication
technology, now data can be captured, recorded, exchanged, and manipulated easier than
before. By one estimate, the amount of information in the world doubles every 20 months, and
that means the size of databases also does, even faster.
Page | 64
CYBER ETHICS | Marie Antoinette Arriola

Integrative Question:

1. What is data mining?


2. What is privacy?
3. What is data mining relation to privacy?
4. What are the purposes of data mining?
5. Can data privacy and data mining coexist?

Page | 65
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Workplace Surveillance, Privacy and Distributive Justice

Quote:

“Each person is to have an equal right to the most extensive basic liberty compatible
with a similar liberty for others.”

Learning Expectation:

The employee had no reasonable expectation of privacy: “unlike urinalysis and personal
property searches, we do not find a reasonable expectation of privacy in email communications
voluntarily made by an employee to his supervisor over the company e-mail systems
notwithstanding any assurances that such communications would not be intercepted by
management.

Review:

Traditionally accepted that employers have a right to engage in such activities. At the
foundation of this view is a conception of the employment relationship as involving a voluntary
exchange of property. The employer agrees to exchange property in the form of a wage or
salary for the employee’s labor. Conceived as a free exchange, the employment relationship, in
the absence of some express contractual duration requirement, can be terminated at will by
either party for nearly any reason.

Exceptions to the employment-at-will doctrine include firing someone for serving on jury
duty, for reporting violations of certain federal regulations, or for impermissible race, sex, or age
discrimination on the employer’s part. Rawls argues that fair terms of cooperation are most
likely to be chosen from behind a veil of ignorance, which he describes as follows: “no one
knows his place in society, his class position or social status, nor does any one know his fortune
in the distribution of natural assets and abilities, his intelligence, strength, and the like. Nor
again does anyone know his conception of the good, the particulars of his rational plan of life, or
even the special features of his psychology such as his aversion to risk or liability to optimism or
pessimism

Page | 66
CYBER ETHICS | Marie Antoinette Arriola

Lessons Learned:

More than this, I assume that the parties do not know the particular circumstances of
their own society. That is, they do not know its economic or political situation, or the level of
civilization and culture it has been able to achieve. The persons in the original position have no
information as to which generation they belong. In order to carry through the idea of the original
position, the parties must not know the contingencies that set them in opposition.

Integrative Questions:

1. How does this bear on the issue of workplace surveillance?


2. What’s the point of the veil of ignorance?
3. How much privacy protection, if any, would these actually provide?
4. Can you think of a likely situation in these?
5. What are the principles require employers to refrain from collecting data?

Page | 67
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Privacy and Varieties of Informational Wrongdoing

Quote:

“Clearly in a small group it is easier to spot the free rider and sanction him in one of
many possible ways once he is identified than in a large group, where he can hide in the crowd”

Learning Expectation:

I expect awareness of informational wrongdoing. It will also define different varieties of


informational wrongdoing. It will also define privacy.

Review:

The privacy issue is concerned more specifically with the question how to balance the
claims of those who want to limit the availability of personal information in order to protect
individuals and the claims of those who want to make information about individuals available in
order to benefit the community. This essential tension emerges in many privacy discussions,
e.g. undercover actions by the police on the internet, use of Closed Circuit Television in public
places, making medical files available for health insurance purposes or epidemiological
research, linking and matching of databases to detect fraud in social security, soliciting
information about on-line behavior of internet users from access providers in criminal justice
cases.

According to communitarians modern Western democracies are in a deplorable


condition and our unquenchable thirst for privacy serves as its epitome. Who could object to
having his or her data accessed if honorable community causes are served? Communitarians
also point out that modern societies exhibit high degrees of mobility, complexity and anonymity.
As they are quick to point out, crime, free riding, and the erosion of trust are rampant under
these conditions. Political philosopher Michael Walzer observes that "Liberalism is plagued by
free-rider problems, by people who continue to enjoy the benefits of membership and identity
while no longer participating in the activities that produce these benefits. Communitarianism, by
contrast, is the dream of a perfect free-riderlessness".

Page | 68
CYBER ETHICS | Marie Antoinette Arriola

Those who are responsible for managing the public goods therefore insist on removing
constraints on access to personal information and tend to relativize the importance of privacy of
the individual.

Lesson Learned:

Whether IT really delivers the goods is not important for understanding the dynamics of
the use of personal data. The fact that it is widely believed to be effective in this respect is I
think sufficient to explain its widespread use for these purposes.

Integrative Question:

1. What are the different varieties of informational wrongdoing?


2. What is informational injustice?
3. What is informational inequality?
4. What are panoptic technologies?
5. Define privacy.

Page | 69
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Defining the Boundaries of Computer Crime

Quote:

the purchase of a home in a particular neighborhood to inquire about the number of burglaries
and violent crimes in the area. Just as these data provide important information for communities
in the "real world,"

Learning Expectation:

Access to reliable and timely computer crime statistics allows individuals to determine
their own probability of victimization and the threat level they face and helps them begin to
estimate probable recovery costs. Law enforcement organizations traditionally have taken a
leading role in providing crime data and crime prevention education to the public, which now
should be updated to include duties in cyberspace.

Review:

Patrol officers and detectives use this data to prevent future crimes and to apprehend
offenders. Therefore, to count computer crime, a general agreement on what constitutes a
computer crime must exist.

Thus, homicide detectives count the number of murders, sexual assault investigators
examine the number of rapes, and auto detectives count car thefts. Computer crime, on the
other hand, comprises such an ill-defined list of offenses that various units within a police
department usually keep the related data separately, if they keep them at all. For example, the
child abuse unit likely would maintain child pornography arrest data and identify the crime as the
sexual exploitation of a minor. A police department's economic crimes unit might recap an
Internet fraud scam as a simple fraud, and an agency's assault unit might count an on-line
stalking case as a criminal threat.

Lesson Learned:

Usually, people accurately report serious crimes, such as homicide, armed robbery,
vehicle theft, and major assaults. Many other criminal offenses, however, remain significantly

Page | 70
CYBER ETHICS | Marie Antoinette Arriola

underreported. Police always have dealt with some underreporting of crime. But, new evidence
suggests that computer crime may be the most underreported form of criminal behavior
because the victim of a computer crime often remains unaware that an offense has even taken
place. Sophisticated technologies, the immense size and storage capacities of computer
networks, and the often global distribution of an organization's information assets increase the
difficulty of detecting computer crime.

Integrative Question:

1. What is computer crime?


2. What are the boundaries of computer crime?
3. What is a crime in general?
4. What are the precautions being offered to combat computer crime?
5. What are the punishments for computer crime?

Page | 71
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic

Quote:

Attacks on government and corporate sites can be justified as a form of political activism – that
is, as a form of “hacktivism.” The argument is roughly as follows.

Learning Expectation:

I argue that it wrongly presupposes that committing civil disobedience is morally


permissible as a general matter of moral principle; in an otherwise legitimate state, civil
disobedience is morally justified or excusable only in certain circumstances.

Review:

The effect of the protest in Washington was that many persons might have been late to
work – losses that are easily made up. An attack that shuts down a busy commercial or public
website for a few hours can easily affect hundreds of thousands of people

Lesson Learned:

The victims of such an attack, as well as third-parties, have a right to know exactly what
position is motivating the attack and why anyone should think it is a plausible position.The
willingness to impose morally significant costs on other people to advance fringe positions that
are neither clearly articulated nor backed with some sort of plausible justification is clearly
problematic from a moral point of view. It seems clear that such behavior amounts, at least in
most cases, to the kind of arrogance that is problematic on ordinary judgments

Integrative Question:

1. Why might companies who try to privatize the internet be intimidated by hacktivism?
2. What is the difference between a hacktivist and a cyberterrorist? How can one
differentiate the two?
3. Should the laws regarding hacktivism be loosened? Explain your answer.

Page | 72
CYBER ETHICS | Marie Antoinette Arriola

4. How does M&G's notion of hacktivism fare under the various ethical frameworks we
studied in Chapter 1, in particular: Johnson's ``three rules'' (Ethics On-Line), Moor's
``reason within relative frameworks'' (Reason, Relativity and Responsibility...), his Just
Consequentialism..., Brey's Disclosive Computer Ethics, and Adam's ``feminist ethics''
(Gender and...) ?
5. Define hacking.

Page | 73
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter:Web Security and Privacy: An American Perspective

Quote:

A rich history of justificatory ideas ranging from duty (deontology) to utility (teleology) to the
individual character (virtue ethics). It is not the purpose of this paper to engage in the ethical
discourses surrounding privacy and security but only to demonstrate their relevance by
explicating some of the more frequently used arguments.

Lesson Expectation:

The main argument of this paper is that there are discourses concerning privacy and
security that focus on the ethical quality of the concepts and that the resulting ethical
connotation of the terms is used to promote particular interests. In order to support this claim, I
will briefly review the literature on privacy and security, emphasizing the ethical angle of the
arguments.

Review:

We value privacy as well as security because they represent moral values which can be
defended using ethical arguments. This paper suggests that the moral bases of privacy and
security render them open to misuse for the promotion of particular interests and ideologies. In
order to support this argument, the paper discusses the ethical underpinnings of privacy and
security.

It will then introduce the critical approach to information systems research and explain
the role of ideology in critical research. Based on this understanding of the centrality of ideology,
the paper will discuss the methodology of critical discourse analysis which allows the
identification of instances of ideology. This will then lead to the discussion of an ideology critique
based on Jürgen Habermas's theory of communicative action, which will be applied to the
websites of Microsoft Vista and Trustworthy Computing.

Page | 74
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

I then suggested that these moral qualities render the concepts open to be used to
promote certain ideologies. In the final step, I have attempted a brief critical discourse analysis
on Haberma's Theory of Communicative Action to support the suspicion that the moral nature of
privacy and security can be used for ideological purposes.

Integrative Question:

1. What is the difference between security and privacy?


2. Why secure information is not necessarily private?
3. What are the goals of security?
4. What aspects of security can both be protecting and limiting privacy at the same time?
5. What are the tools used to provide security?

Page | 75
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: The Meaning of Anonymity in an Information Age

Quote:

The information they divulge to others in various transactions, and as a result, more capable of
protecting the possibility of anonymity.

Learning Expectation:

Although answers to this foundational question will not immediately yield answers, it is
essential to understanding what is at stake in the answer to these question

Review:

An understanding of the natural meaning of anonymity, as may be reflected in ordinary


usage or a dictionary definition, is of remaining nameless, that is to say, conducting oneself
without revealing one's name. A poem or pamphlet is anonymous when unattributable to a
named person; a donation is anonymous when the name of the donor is withheld; people
strolling through a foreign city are anonymous because no-one knows who they are. Extending
this understanding into the electronic sphere, one might suggest that conducting one's affairs,
communicating, or engaging in transactions anonymously in the electronic sphere, is to do so
without one's name being known.

Specific cases that are regularly discussed includes ending electronic mail to an
individual, or bulletin board, without one's given name appearing in any part of the header
participating in a "chat" group, electronic forum, or game without one's given name being known
by other participants buying something with the digital equivalent of cash being able to visit any
web site without having to divulge one's identity

For situations that we judge anonymity acceptable, or even necessary, we do so


because anonymity offers a safe way for people to act, transact, and participate without
accountability, without others "getting at" them, tracking them down, or even punishing them.
This includes a range of possibilities. Anonymity may encourage freedom of thought and
expression by promising a possibility to express opinions, and develop arguments, about
positions that for fear of reprisal or ridicule they would not or dare not do otherwise. Anonymity
Page | 76
CYBER ETHICS | Marie Antoinette Arriola

may enable people to reach out for help, especially for socially stigmatized problems like
domestic violence, fear of HIV or other sexually transmitted infection, emotional problems,
suicidal thoughts.

It offers the possibility of a protective cloak for children, enabling them to engage in
internet communication without fear of social predation or -- perhaps less ominous but
nevertheless unwanted -- overtures from commercial marketers. Anonymity may also provide
respite to adults from commercial and other solicitations. It supports socially valuable institutions
like peer review, whistle-blowing and voting.

Lesson Learned:

The concern I wish to raise here is that in a computerized world concealing or withholding
names is no longer adequate, because although it preserves a traditional understanding of
anonymity, it fails to preserve what is at stake in protecting anonymity.

Integrative Question:

1. What is anonymity?
2. What is pseudonym?
3. What is anonymity in a computerized world?
4. How is the concept different from that prior to the computerization of the society?
5. What's the difference between anonymity and pseudonimity?

Page | 77
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter:

Double Encryption of Anonymized Electronic Data Interchange

Quote:

“Collecting medical data electronically requires, according to our moral belief, also some
kind of encryption.”

Learning Expectation:

. We skip the name and address; only the sex and the month-year of birth will be sent
from the doctor to the central database. Even the number of the patient in the doctors database
will be replaced, because once the doctor may be a researcher using the central database who
recognizes one of the patients based on the number.

Review:

The sender encrypts his message with his secret key firstly and with the public key of the
receiver secondly and afterwards he sends the message. The receiver must decrypt that
message first with his own secret key and second with the public key of the sender according to
the header. When the message is readable after this double decryption, one can be sure that
the message was meant to be received by the decrypting receiver and the message was really
sent by the sender named in the header of the message.

Lessons Learned:

In this paper we suggest additional features that network providers must incorporate in
the functionality of electronic message handlers. In fact we propose to add some 'intelligence' to
the virtual postbox: instead of automatically forwarding, the postbox must now be able to read
the sender from the header, select the appropriate public key from that sender, decrypt the
message with that public key, replace the senders identification and encrypt the message with
its own public key. On the receiver side (the central database) we have to decrypt the message
with the secret key of the virtual postbox and after that with the secret key of the central
database receiver.

Page | 78
CYBER ETHICS | Marie Antoinette Arriola

This procedure requires the availability of a list with only public keys at the virtual
postbox, as well as a program to intervene the electronic communication. Unfortunately, so far
none of the network providers is willing or has been able to implement it.

Integrative Questions:

1. What is Double Encryption of Anonymized Electronic Data Interchange?


2. What do the authors mean by "double encryption used twice"?
3. Is it a robust setup?
4. What is the problem the authors are trying to solve?
5. Why is double encryption necessary in this case?

Page | 79
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter:

Written on the Body: Biometrics Identity

Quote:

“Biometrics will soon hold the key to your future, allowing you and only you to access your
house, car, finances, medical records and workplace.

Learning Expectation:

The technology is easy to explain and trust. The primary advantage that signature
verification systems have over other types of biometric technologies is that signatures are
already accepted as the common method of identity verification.

Review:

DNA identification, face-shape recognition, voice recognition and fingerprint


identification. Biometric identification is superior to lower technology identification methods in
common use today - namely passwords, PIN numbers, key-cards and smartcards. Biometrics is
the measuring of an attribute or behavior that is unique to an individual person. Biometrics
includes measuring attributes of the human body - such as DNA, iris/retina patterns, face shape,
and fingerprints - or measuring unique behavioral actions, such as voice patterns and dynamic
signature verification.

Physical objects include smartcards or magnetic-stripe cards - behaviors based-on-


memory includes the act of entering a PIN number or a secret password. The primary use of a
physical objects or behaviors based-on-memory has a clear set of problems and limitations.
Objects are often lost or stolen and a behavior-based-on-memory is easily forgotten. Both types
are often shared. The use of a valid password on a computer network does not mean that an
identity is genuine. Identity cannot be guaranteed, privacy is not assumed and inappropriate use
cannot be proven or denied.

Page | 80
CYBER ETHICS | Marie Antoinette Arriola

Lesson Learned:

Unlike your passwords, you will not forget your fingerprints, irises, or DNA when you go
to work. They are a part of you. They are also extremely distinguishable from another person’s
biometrics. This means that they can be used with great confidence. Since they are a part of
you they are difficult for another person to obtain or fake. They are also easy to use. All you may
have to do is put your finger into a device and it gives you access if you are authorized or
denies you if you aren’t. For these reasons and others, biometric systems are becoming more
mainstream and commonplace.

Integrative Questions:

1. What is the entry-point paradox as defined by Roger Clarke?


2. In what ways are name, code, knowledge, and token-based identification schemes
deficient?
3. What factors have led to the emergence of a consortium-based specification for a global
standard for biometric technologies?
4. In the context of identity determination and verification, what are the distinctions between
a 'one to many' and 'one to one' match?
5. In what ways are verification and identification procedures inter-dependent?

Page | 81
CYBER ETHICS | Marie Antoinette Arriola

Page | 82
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Ethical Considerations for the Information Professions

Quote:

‘A Physician’s Guide To Medical Writing’, an ideal medical write up framed along ethical
considerations,”

Learning Expectation:

The emergence of certain negative trends in the practice of this profession poses a
threat to its ability to deliver quality contents with reliable information.

Review:

They play a vital role in relieving the writers of regulatory pressures involved in the
process. Properly includes technical exposition on any subject related to medical science, such
as biochemistry, pharmacologic studies, sanitation and psychoanalysis”. It is the responsibility
of the writer to include necessary technical details under regulatory limitations to establish a
level of understanding among the readers.

The client or the researcher should generate complete information on the academic
background of the writer before allotting the assignment. This helps a client to understand the
performance level that could be extracted from a writer. Regular communication with the writer
is an essential condition for the correct formulation of the content.

Lessons Learned:

In absence of such considerations it will be impossible for the clients to bridge the
communication gaps between them and the target audience. It is widely accepted by many
researchers that legal and ethical issues can play the role of obstacles in the progress of
marketing a research as they impose certain limitations on the utilization of research products.

Page | 83
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What is ethical considerations?


2. What is the information professions?
3. What are the activities of ethical?
4. Define ethical considerations?
5. Find the legal and ethical issues?

Page | 84
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Software Engineering Code of Ethics: Approved!

Quote:

Put in more general terms, the rights/obligations ethicist starts with rules stating obligations
about how one should behave and rights about how I am to be treated, while the virtue ethicist
starts with the human character and its ethical dispositions

Lesson Expectation:

There are several purposes of a code of ethics. Several principles that were suggested for the
code used imperative language.

Review:

Association of Computing Machinery (ACM) formed a joint committee to help organize


software developers and engineers into a profession. As part of this project, a sub-committee of
professionals, academics, and members of ACM and IEEE-CS began work drafting a code of
ethics for software engineers through electronic mail. After four years of online discussion and
revision, version 5.2 of the Software Engineer’s Code of Ethics and Standards of Practice was
adopted by IEEE-CS and ACM in 1998, and since then, the code has been adopted by software
engineering and computer societies worldwide.

The IEEE-CS/ACM Software Engineering Code of Ethics Archive documents the


drafting, debate, and final adoption of the joint IEEE Computer Society /ACMSoftware
Engineering Code of Ethics and Standards of Practice. Indirectly, the archive illustrates how
software engineering developed from an occupation to a profession. The drafting and approval
of the Software Engineering Code, carried out in substantial part by email, has produced a
detailed record of the development of a professional code of ethics.

Lesson Learned:

The software engineer as a practicing professional acts from a higher level of care for
the customer (virtue ethics) and conforms to the development standards of the profession
(right/obligations ethics).

Page | 85
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What does IEEE-CS stands for?


2. What does ACM stands for?
3. Why did they develop a joint force ethical approach for software engineering?
4. Enumerate and explain the short version of the software engineering ethics.
5. What is Virtue Ethics?

Page | 86
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: No,Papa,: Why incomplete Codes of Ethics Are Worse Than None at
All”

Quote:

“Computer and information ethics”, in the broadest sense of this phrase, can be understood as
that branch of applied ethics which studies and analyzes such social and ethical impacts”

Learning Expectation:

Review:

“computer ethics” has been used to refer to applications by professional philosophers of


traditional Western theories like utilitarianism, Kantianism, or virtue ethics, to ethical cases that
significantly involve computers and computer networks. “Computer ethics” also has been used
to refer to a kind of professional ethics in which computer professionals apply codes of ethics
and standards of good practice within their profession. The same considerations are highly likely
to apply to any moral code that is developed (whether in computing or elsewhere). Authors of
incomplete moral codes risk encouraging others to act in immoral ways with the author's
apparent sanction.
Related, broader, questions are considered, and it is advocated that there should always
be acknowledgment of the existence of 'external', potentially more important, moral issues.

Lessons Learned:

The problem is that by focusing on these four areas of concern, attention may be taken
away from other, potentially more important, moral issues. Not all important moral issues in
information technology can be put under those headings. Yet focusing on four areas gives the
erroneous impression that adherence to the moral requirements in those areas alone could
ensure moral rectitude.

Integrative Questions:

1. What is codes of ethics?


2. What are the worse than none at all in ethics?

Page | 87
CYBER ETHICS | Marie Antoinette Arriola

3. What are the kinds of computer ethics?


4. Define codes of ethics?
5. How does codes of ethics existence?

Page | 88
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Subsumption Ethics

Quote:

“A key factor is whether the subsumptionist can prevent a conscious victim from calling
for help, and whether or not the subsumptionist enjoys toying with a victim who is aware of the
process. “

Learning Expectation:

Of these, cannibalism is the closest equivalent. The attacker takes all of the victim's
memories, cognitive structures, and available computronium, and incorporates them into emself.

Review:

The very rare restored survivors of such treatment have compared it to such ancient
human practices as lobotomy, emasculation, or blinding, sometimes followed by various forms
of torture. Usually a subsumptionist simply causes a series of unexplained disappearances and
then moves on before eir activities are noticed. However, a particularly skilled subsumptionist,
who has can retained all of the victim's traits and memories intact, may conceal the crime from
outsiders for an indefinite period of time. Whether this is because such events are actually rarer
among transapients or whether this is because they are difficult for SI<1 observers to detect is
unknown.

On the other hand, it is not at all uncommon for lesser entities to be destroyed and/or
incorporated when a transapient ascends to a higher toposophic level. This is regarded as
subsumption (and also as a perverse transcend) in "civilized" parts of the Terragen sphere if the
participants are unwilling. It is considered a kind of voluntary amalgamation if they volunteer.
Volition under such circumstances is a slippery concept at best however; this provides rich
material for debates regarding the ethics and meta-ethics of such events.

Page | 89
CYBER ETHICS | Marie Antoinette Arriola

Lessons Learned:

The number of subsumption events known to have occurred between beings of higher
toposophic levels is relatively small.

Integrative Questions:

1. What is Subsumption?
2. What is the use of transapient?
3. How many numbers in subsumption?
4. Define subsumption?
5. What are the human practices?

Page | 90
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: Ethical Issues in business computing

Quote:

“It will provide readers with a clear knowledge of the complex ethical issues involved in e-
business and improve their understanding of widely discussed current issues in e-business such
as those of privacy, information management, data mining, intellectual property, and consumer
tracking.”

Learning Expectation:

The internet has revolutionized business by fundamentally changing the means by which
businesses operate and enlarging the opportunities available to them to reach and service
customers. However, in doing so, the development and practice of e-business also raises a host
of ethical issues, such as those pertaining to information security, privacy, data mining, and
intellectual property.

Review:

Therefore, as e-business continues to grow in significance and scope, it is important to


understand and respond to the unique ethical issues associated with e-business.

As e-business models become more common in the world of business, there must be
an effort to integrate e-business more fully into the field of business ethics so that scholars and
professionals working in the field can better appreciate and respond to these ethical issues.
There thus exists a clear need for an edited collection of articles that provides a comprehensive
and thorough treatment of ethical issues in e-business.

Lessons Learned:

This book will aim to provide a comprehensive overview of the most important ethical
issues associated with the expanding world of e-business. Grounded solidly in the most recent
scholarship in business ethics, the book will apply the most relevant theoretical frameworks to

Page | 91
CYBER ETHICS | Marie Antoinette Arriola

ethical issues in all significant areas of e-business. The book will be written for scholars,
professionals, and students interested in gaining a better comprehension and appreciation of
the moral issues encountered in the multifaceted world of e-business.

Integrative Questions:

1. What is the importance of ethics for e-business?


2. What are the new paradigm of business on the internet and its ethical implications?
Identifying and responding to stakeholders in e-business?
3. How to Applying ethical principles to e-business?
4. What is Ethical issues in e-marketing?

Page | 92
CYBER ETHICS | Marie Antoinette Arriola

Name of the book: Cyber Ethics

Name of the Chapter: The Practitioner from Within: Revisiting the Virtues

Quote:

‘Flourishing’ by means of what is variously presented as the formation of virtuous ‘habits’


or a virtuous ‘character’.

Learning Expectation:

In this paper, I want to take a different approach that emphasises individual human
flourishing – although moral values and behaviours will also be discussed in the context of this
approach. I want to investigate to what extent virtue ethics can ground a conception of the
good life and, correspondingly, the good society, in relation to uses of information technology.

Review:

First, Virtue Ethics has recently experienced a novel degree of academic and policy-
related attention in contemporary and ongoing work in the fields of political philosophy, freedom
and development studies, media and culture research, and economics. Originally revived and
re-introduced into moral philosophy by Elisabeth Anscombe around 1958, Virtue Ethics is
currently a central element in the work of, for instance, Nussbaum, Sen, Foot, and Solomon.
Where it does not form a fundamental part of inquiry it is nevertheless receiving critical attention
(e.g. Baron et. al 1997).

What is more – and as the paper will argue and endeavour to show – there are some
complimentarities between Virtue Ethics and the other dominant methods of ethics, particularly
some versions and elements of Kantianism. Virtue Ethics is particularly agent-focused and
agent-based. This arguably means that a Kantian moral dilemma in which an ethical subject
must choose between two first-order moral rules and necessarily, therefore, violate one of them
can at least be conceptually addressed by Virtue Ethics in that attention is paid to the
mechanisms and the underlying moral virtues by which a subject might decide over and
between different courses of action.

Page | 93
CYBER ETHICS | Marie Antoinette Arriola

Lessons Learned:

Virtue Ethics does afford the moral theorist the perhaps only contemporaneous ethical
account that might address the crucial questions over the ways and processes in which an
ethical subject might come to be ethical. In other words, it is important to ask in relation to all
major ethical traditions how and why an agent might variously choose to enter into a given
social and moral contract, or embrace universal rule-based moral systems, or indeed become
virtuous. Ethical subjects have histories and futures; they are engaged in development, identity-
and value-formation and self-reflection.

Integrative Questions:

1. What is The Practitioner from Within: Revisiting the Virtues?


2. How virtuous is the virtual?
3. Does Virtue Ethics does afford the moral?
4. What are the policy of ethics virtue?
5. What are the methods of virtues?

Page | 94
CYBER ETHICS | Marie Antoinette Arriola

FORTUNE AT THE BOTTOM OF


THE PYRAMID

Page | 95
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: “The Fortune at the Bottom of the Pyramid

Book Review Chapter:

Chapter 1: The Market at the Bottom of the Pyramid

Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507

Amazon Link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote:

“The poor cannot participate in the benefits of globalization without an active engagement and
without access to products and services that represent global quality standards”- C. K.
Prahalad.

Learning Expectations:

I am expecting to learn what is meant by bottom of the pyramid. I also expects to learn
the reasons why the writer is confident about the potentials of the markets at BOP.

Review:

According to Mr. Prahalad, there have been many things being in done in solving the
global poverty problems. While he did not say that they are not effective, he implied that the
efforts are not enough. According to the writer there is a need to find a new approach. His
approach focused on the people at the bottom of the pyramid. These are people who live in
less than $ 2 a day.

In this approach the writer calls upon the partnership between the poor, civil society
organizations, governments, and large firms. The effort will involve creating a BOP market-
which is turning the poor into consumer markets. This approach is based on his assumptions
that : large companies have virtually ignored the poor who actually represents a latent market
for goods and services; the market at the bottom of the pyramid can provide a new growth
opportunity for the private sector and; that this market could become an integral part of its work.
Mr. Prahalad says that this market remains untapped because of the dominant logic held by
companies.

Lessons Learned

Although it has not been given much attention, we find that multinationals are reinventing
the consumer markets. They are now reaching the market at the bottom of the pyramid.

Page | 96
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions

1. What is the condition of people at the bottom of the pyramid?

2. What are reasons why poverty alleviation programs of the World Bank and other
nongovernment organization do not succeed in resolving this problem?

3. What is the attitude of big companies of the markets in the BOP?

4. How can big companies benefit from the opportunities present in the markets at the lowest
economic pyramid?

5. What are the opportunities in the BOP markets according to Mr. Prahalad?

Page | 97
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: “The Fortune at the Bottom of the Pyramid”

Book Review Chapter:

Chapter 2: Products and Services for BOP

Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507

Amazon Link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote :

“As a result the promise of emerging BOP markets has been largely illusionary ”- C.K. Prahalad

Learning Expectations

As reader, I expect to learn about what products and services the consumers at BOP
needs.

Review:

According to the writer, BOP market challenges the dominant logic of multinational
companies (MNC). He explained that small unit packages, low margin per unit, high volume
and high return on capital employed are the basic economics at BOP markets. He reiterated the
importance of understanding the BOP market, focusing on their needs. He went on to say that
the approach towards this market is to understand the needs of the people in this market and
then tailored the product and the manufacturing process around these needs. Companies are
challenge to innovate. For this reason, he formulated the 12 principles of innovation. The first
is creating a new price –performance envelope; hybrid solutions; scale of operations; identifying
functionally; sustainable development; process innovation; deskilling of work; education of
consumers; designing for hostile infrastructure; interfaces; distribution and delivery.

The chapter simply emphasis that companies need to discard their biases of the BOP
market. These markets has the same needs as those in the developed markets but were only
disregarded because of the dominant logic that the companies and private sector have about
the poor consumer market. However, there are many realities in the market that the companies
need to understand. The needs of the market should be understood against the characteristics
of the consumers. The companies need to adapt and innovate against these realities.

Lessons Learned

The writer clearly pointed out that companies need also to throw away their prejudices
against the people at the bottom of the pyramid since they represent a latent market force.

Page | 98
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions

1. Why is it important for the companies to understand about the realities and needs of
BOP markets?
2. What are the 12 principles of innovation formulated by Prahalad?
3. What is meant by zero-based view?
4. What makes BOP market attractive ?
5. To be involved at BOP markets what is required of the companies’ managers?

Page | 99
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: “The Fortune at the Bottom of the Pyramid”

Book Review Chapter:

Chapter 3- BOP: A Global Opportunity

Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507

Amazon Link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote:

“ BOP markets are great source for experimentation in sustainable development”- C.K.
Prahalad

Learning Expectations:

I am expecting to learn about the global opportunity present at the BOP market.
Through this chapter, we wish to understand the principles of innovation needed in developing
the market at BOP.

Review

Doing business in the markets at BOP offer challenges and global opportunities for
companies. However, involvement in BOP markets challenges assumptions or dominant logic
that companies have developed for long period of time. The enthusiasm for BOP markets is
based on the opportunities that are presented.

First, markets in most countries at BOP are large and attractive and stand-alone entities.
He also believes that many local innovations can be leveraged across other BOP markets
creating a global opportunity for local innovations; some innovations from these markets may be
applied in developed markets; and lessons from the BOP markets can influence the
management practices of global firms. The traditional approach of many global companies is to
start from the business models fitted for developed markets then adopt in the BOP markets. But
this is bound to fail because it does not consider the realities and needs of these markets.

Lessons Learned:

I have learned about what companies must do in order to engage in BOP markets.

Page | 100
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. How do companies engage at the BOP market?


2. What are the sources of global opportunities in the BOP market?
3. What are the global opportunities that are present in the BOP market?
4. What are the principles of innovation needed for developing BOP markets?
5. What is meant by value-oriented innovation?

Page | 101
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: “The Fortune at the Bottom of the Pyramid”

Book Chapter Review:

Chapter 4- The Ecosystem for Wealth Creation

Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507

Amazon Link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote:

“It is reasonable to expect that 4 billion people in search of an improved quality of life will create
one of the most vibrant growth markets we have ever seen”-C.K. Prahalad.

Learning Expectations:

I expect to learn about the market-oriented ecosystem. We expect that the writer
explains the significance of the symbiotic relationship within the system.

Review

In the concept developed by the writer, the market-oriented ecosystem is composed of


extralegal NGO enterprises; micro enterprises; small and medium enterprises, cooperatives;
large and small firms and NGOs. A market-based ecosystem is a framework that allows private
sector and social actors often with different traditions and motivations to act together and create
wealth in a symbiotic relationships. It is consists of a wide variety of institutions coexisting and
complementing each other. In this system all constituents have roles to play and are dependent
of each other. According to Mr. Prahalad the need for building an ecosystem in developing the
BOP market is obvious from the start. A market-based ecosystem is a framework that allows
private sector and social actors with different traditions and motivations, varying in sizes and
areas of influence to act together and create wealth in a symbiotic relationship. In the symbiotic
relationship each constituent has a role to play and is dependent of each other. The market-
based ecosystem provides social collateral of open and honest entrepreneurship. It provides
the tools for the poor and the disadvantaged to be connected seamlessly with the rest of the
world in a mutually beneficial and non-exploitative way.

Lessons Learned

The symbiotic relationship between them is a way of creating wealth. In the market-
oriented system includes nodal firms that provide the tools for improving the lives of the poor.

Page | 102
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What comprised the market-oriented ecosystem?


2. What is the significance of symbiotic relationship among the groups in the ecosystem?
3. What can the market-oriented ecosystem does for the poor?
4. What is the nodal firm?
5. What is the importance of contracts wealth creation in the market-oriented ecosystem?

Page | 103
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: “The Fortune at the Bottom of the Pyramid”

Book Review Chapter:

Chapter 5- Reducing Corruption: Transaction Governance Capacity

Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507

Amazon Link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote:

“ Poor countries could often be asset-rich but capital-poor”- C.K. Prahalad.

Learning Expectations:

I expect to know the different spectrum of TGC and the four requirements in building
TGC.

Review:

There are four criteria for transparency in transactions. There must be access to
information and transparency for all transactions. There should be clear processes so that
selective interpretation by bureaucrats is reduced if not eliminated. Speed with which the
processes can be completed by citizens and trust in the system.

On one hand the different spectrum of TGC include countries that are arbitrary and
authoritarian; countries where laws and institutions of market economy exist but do not reach
their potential; and countries with well-developed laws, regulations, institutions and enforcement
systems. Enhanced TGC showed that regulations and government business processes can be
simplified and interconnected systems will be able to identify pockets of graft and corruption.
From the experience of Andhra Pradesh the lesson drawn indicate building trust is essential.
And that citizens must feel that changes are taking place.

Lessons Learned

As learned in this chapter, corruption is embedded in different micro regulations of the


government. It is for this reason that transactions in the government is not only costly for the
people but even for investors

Page | 104
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What is the importance of TGC in the fight against poverty and corruption?
2. What are the criteria for transaction governance capacity?
3. What are the specifications for TGC?
4. What are the different spectrums of TGC?
5. What are the lessons drawn from the experiences of Andhra Pradesh on TGC?

Page | 105
CYBER ETHICS | Marie Antoinette Arriola

Name of the Book: “The Fortune at the Bottom of the Pyramid”

Book Review Chapter:

Chapter 6- Development as Social Transformation

Library Reference: ISBN-10: 0131467506 | ISBN-13: 978-0131467507

Amazon Link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

Quote:

“ When the poor are treated as consumers, they can reap the benefits of respect, choice, and
self-esteem and have an opportunity to climb out of the poverty ”

Learning Expectations:

I intend to understand the effects of social transformation on the people at the BOP.

Review

One of the impact of transforming BOP into market is gaining legal identity. This is
denied to them in the past. Without this identity consumers cannot access the services. The
social transformation that is taking place in markets where the public and private sectors have
been involved at the BOP is impressive.

This will transform the economic pyramid into diamond. There will always be rich, but
the measure of development is the number of people in a society who are considered middle
class. There will not longer be BOP.

Lessons Learned

The poor people will no longer belong to the bottom of the pyramid but inside the
diamond as middle classes.

Page | 106
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What is the role of government in the social transformation of people at BOP?


2. How are the people transformed at the BOP?
3. How are women empowered at BOP?
4. What happened to the people at the bottom of the pyramid?
5. What does diamond as measure of development implied?

Page | 107
CYBER ETHICS | Marie Antoinette Arriola

The HANDBOOK of
information and computer
ethics

Page | 108
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 1: Foundations of Information Ethics Luciano Floridi
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“The more people have become accustomed to living and working immersed within digital
environments, the easier it has become to unveil new ethical issues involving informational
realities. “

Learning Expectation:

I expect to learn the foundation of the information technology ethics. Since this is
something that is rarely discussed, it will be an interesting topic.

Review:

Our world today had a lot of differences way back before computers were invented. We
must admit that our scope of thoughts had become and is becoming more diverse each day,
and so as the ethical responsibilities we have for each other and for the society.

In the use of machines and programs, it always seems that having a lot of resources or
information is the best solution to come up with a better idea. Sometimes, in order for us to
create a more practical solution to the problems, we need to focus on few areas and use very
relevant information only. Sometimes knowing everything can also create problems to those
people who happen to a lot of information because in a situation wherein they need to make
decisions, sometimes, the factors that may affect the outcome will be considered in detail so the
span of time spent in making a decision will be increased compared to the normal time spent.

Because of the increase in numbers of the users of technology, the scope for information
ethics also expanded. Hacking has been a major issue. Though the use of the information is not
the main concern but the unauthorized access which invades the privacy of the information
owner or of the system owner.

Information ethics is a patient-oriented. Meaning information ethics does not only give
importance or protection only to the human beings but to all life forms.

Page | 109
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that information ethics is a very complicated subject and that includes
many aspects that concerns morality that every IT professionals should consider.

5 Integrative Questions:

1. What is the basis for the information ethics?


2. What are some of the issues arising in the information technology field?
3. How sensitive is information in an organization?
4. How does Information ethics evolved?
5. What are the parts of the infosphere?

Citation/s: N/A

Page | 110
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 2:
Milestones in the History of Information and Computer Ethics Terrell Ward Bynum
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“To live well, according to Wiener, human beings must be free to engage in creative and flexible
actions that maximize their full potential as intelligent, decision-making. “

Learning Expectation:

I expect to learn what Norbert Weiner’s explanation for cyber ethics and I expect to learn
the basis for the term used and if there are further definition for cyber ethics.

Review:

In this chapter, it is said that, in Weiner’s point of view, humans are expected to act
more differently than any other species in the world because of a higher intellect that humans
possess compared to insects or animals. Humans are also able to adapt to the changes that
happens in the environment.

According to Weiner, because of the special ability of humans, we are expected to


flourish and improve the information –processing that we have. To live well, according to
Wiener, human beings must be free to engage in creative and flexible actions that maximize
their full potential as intelligent, decision-making beings in charge of their own lives. It is also
stated that the success of every human being differs from the other because of the different
talents and intellect level that every person has.

There are three principles Weiner had developed. First is the Principle of Freedom. It
means that humans should explore and do not limit himself in achieving success. He should
seek all possibilities to reach his goals. The second principle is Principle of Equality means that
what belongs to a person should remain his no matter what situation he’ll be into. The third
principle is The Principle of Benevolence. This principle says that in justice, there should be
good will between man and man.

According to Weiner, success of human beings is only possible when humans interact
socially and participate in activities that share the same interest and personalities with them.

Page | 111
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that the success of humans also depends on how active we are on the
society. And success is better achieved when we participate with people with the same ideas
and personalities.

5 Integrative Questions:
1. What is Weiner’s idea of cyber ethics?
2. What are the three principles of justice according to Weiner?
3. How can humans achieve success?
4. What is expected from humans?
5. Where does the success of humans regardless of the varied culture depend?

Citation/s: N/A

Page | 112
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 3:
Moral Methodology and Information Technology Jeroen Van De Hoven
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“if the Internet and the WorldWideWeb are introduced into the lives of children, their lives will be very
different from the childhood of people who grew up without online computer games”

Learning Expectation:

I expect to learn the methodologies in morality and how is information technology


connected to it or how the methodologies apply to technology.

Review:

Computer ethics is a form of applied or practical ethics. It studies the moral questions
that are associated with the development, application, and use of computers and computer
science. Computer ethics is basically about the proper use of computers and related
technology. The definition of technology depends on the area or subject it is applied with. With
the different applications, software and other technology that users can apply or utilize, the
morality is difficult to implement.

One of the most controversial issues in cyber ethics is privacy. It is difficult to distinguish
or to implement fair use in today’s cyber world because of the common application that most
users are using like the peer-to-peer programs.

The problem with the implementation of ethics to the current problems of the information
technology is that only one method is being applied when not all problems can be addressed by
one ethical method. Wheat we need to learn is to apply ethical methods without generalizing.

Page | 113
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that it is very difficult to apply ethical solutions to the problems that we
have especially if the problem is something that most people have learned to use mos of the
time.

5 Integrative Questions:
1. What are the methodologies in ethics?
2. What is the best methodology to apply?
3. Is it possible to have one methodology for all ethical problems?
4. What is the danger in the methodologies?
5. Does technology need to be the ones adapting all the time?

Citation/s: N/A

Page | 114
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 4: Value Sensitive Design and Information Systems BATYA FRIEDMAN, PETER H.
KAHN JR., and ALAN BORNING
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“Technical mechanisms will often adjudicate multiple if not conflicting values, often in the form of
design trade-offs. We have found it helpful to make explicit how a design trade-off maps onto a
value conflict and differentially affects different groups of stakeholders.”

Learning Expectation:

I expect to learn what value sensitive design is and how design in technology will need
ethical concepts.

Review:

Value Sensitive Design is concern with designing of technology with the need of having
to consider the human values. But what is value? Value is commonly defined as a worth for an
object, in this chapter, value means something that is important for people.

Weiner argued that we can become better human beings if we do not allow ourselves to
be consumed too much by the technology we use. Computer ethics is where we study the effect
of technology in the lives of humans. It guides us to what the decisions and proper actions that
should be done in the cyber world.

Conceptual investigation includes the question on whether the designs should be based
on the moral values or should it be based in the aesthetic value. It said in this chapter that the
trust of people depends on three aspects. The use of value sensitive design is beneficial for or
to whom it is intended for, but it can also invade the privacy of other people which can also
become another issue for cyber ethics.

Page | 115
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that we should not put aside the value when designing systems and in
using technology because there will always be a way where we can affect someone.

5 Integrative Questions:
1. What is value sensitive design?
2. Who are the stakeholders?
3. Why is it important to consider the stakeholders in designing?
4. Is there a disadvantage in designing systems?
5. How is human values implemented in system designing?

Citation/s: N/A

Page | 116
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 5: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual
Property | ADAM D. MOORE
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“Arguments for intellectual property rights have generally taken one of three forms. Personality
theorists maintain that intellectual property is an extension of individual personality.”

Learning Expectation:

I expect to learn what intellectual property rights is and what are the problem arising in
this area in the field of technology. I am also expecting to learn what are the different
justifications and its meanings.

Review:

What is intellectual property? Intellectual property, according to the book, Personality


theorists maintain that intellectual property is an extension of individual personality. Rule-
utilitarians ground intellectual property rights in social progress and incentives to innovate.
Lockeans argue that rights are justified in relation to labor and merit. Basically, intellectual
property is the product of thinking that is not seen physically, it is conceived the minds of the
creators.

Intellectual property is protected usually by copyright, patent and trade marks. These are
usually used for literary works, inventions, computer software and more. Patent is the most
secured protection based on the book. The rights included on patents owners are the right to
make, the right to use, the right to sell, and the right to authorize others to sell the patented item.
Patent also do not allow others to use or to produce materials that has been patented already.

The Lockean principle in protecting the intellectual property states that every person has
the right to his own labor. It is also said that if a person’s own labor is joined into an object even
though it does not belong to him, or it is not a product of his work, then the product still belongs
to him. John Locke had said “For this labor being the unquestionable property of the laborer, no
man but he can have a right to what that is once joined to, at least where there is enough and as
good left for others.” This statement says that if one had worked for something, then he has the right to

Page | 117
CYBER ETHICS | Marie Antoinette Arriola

own its product for as long as he does not claim everything and that there’s still something that remains
for others.

What I Have Learned:

I have learned the three ways in justifying protection of intellectual property rights and
their advantages and disadvantages.

5 Integrative Questions:
1. What is intellectual property?
2. How is IPR violated?
3. What are the three definitions of IP based on the three ideas?
4. How is IP protected?
5. What is the strongest type of IP protection?

Citation/s: N/A

Page | 118
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 6:
Informational Privacy: Concepts, Theories, and Controversies | Herman T. Tavani
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“We demand recognition of our right to privacy, we complain when privacy is invaded, yet we
encounter difficulties immediately [when] we seek to explain what we mean by privacy, what is
the area, the content of privacy, what is outside that area, what constitutes a loss of privacy, a
loss to which we have consented, a justified loss, an unjustified loss.”

—H.J. McCloskey (1985, p. 343)

Learning Expectation:

I expect to learn the key concepts, theories and the controversies that concern the
information privacy.

Review:

Having a good and clear understanding of what is privacy is an important. Moor argued
that privacy has an evolving concept and its “content” is often influenced by the “political and
technological features of the society’s environment.” We all know that technology is as the same
way. And with the advances that continue to happen in the field of technology, it is unavoidable
that privacy can become an issue. In the previous chapter, a common example is the peer-to-
peer programs.

In this chapter, it is argued whether privacy is a right or an interest for a person. Privacy
are of four kinds. First is the Physical privacy wherein it is about the damages that can be done
in a person physically when evading privacy. The Second example is Decisional privacy which
states that a person has his own freedom to have his own ideas and that one must not influence
the choices made by another. The third kind is psychological privacy which is somewhat the
same with the previous kind of privacy but it is defined in the book that a person is confined into
his own thinking and that he cannot influence the way others think. The fourth and last kind of
privacy is informational privacy includes the restriction in facts where there are certain records
or documents that can only be accessed by limited or authorized people.

Page | 119
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned a different definition of privacy. I have also learned the types of privacy
and the theories that it has.

5 Integrative Questions:

1. What is privacy?
2. What are the theories in information privacy?
3. What are the types of privacy?
4. What is decisional privacy?
5. What is Informational Privacy?

Citation/s: N/A

Page | 120
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 7:
Online Anonymity | Kathleen A. Wallace
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“The term anonymity has been used to denote a number of related things: namelessness,
detachment, unidentifiability, lack of recognition, loss of sense of identity or sense of self, and so
on.”

Learning Expectation:

I expect to learn the meaning of anonymity and how can it become useful. I also expect
to learn more facts on the importance of online anonymity.

Review:

Anonymity can also be brought about in a variety of ways and there are many purposes,
both positive and negative, that anonymity could serve, such as, on the positive side, promoting
free expression and exchange of ideas, or protecting someone from undesirable publicity or, on
the negative, hate speech with no accountability, fraud or other criminal activity. This excerpt
from the book explains that anonymity has two sides and has two possible outcomes. Same as
anything, anonymity can be positive or negative depending on the purpose of using or
implementing it. There are certain situations that calls for anonymity, like for security purposes.
It can become negative if the purpose is to harm others or to retrieve restricted information.

Anonymity online is easily done because of the options that internet users have. Most of
the programs online can allow the users to create pseudonyms or aliases to conceal their real
identities. This can become a problem when used in an illegal way like scams and other types
of fraud activities. Online anonymity does not only affect in legal aspects, it also affects the way
of human communication where the bonds of human communication is weakening because
online users are detached from having a good relation with another human because of the
possible wrong information that they post or give online.

Page | 121
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that anonymity can become useful and harmful at the same time. I also
learned that the advances in technology also make it harder to identify correct and reliable
information because of the lack of proper sources.

5 Integrative Questions:

1. What is anonymity?
2. What is the advantage of being anonymous?
3. How can anonymity be implemented?
4. Is anonymity legal?
5. What are the advantages of using anonymity online?

Citation/s: N/A

Page | 122
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and
Counterhacking | Kenneth Einar Himma
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“Expressive conduct is subject to more stringent moral limits than those to which pure speech is
subject. The reason for this has to do with the effects of these different kinds of act.”

Learning Expectation:

I expect to learn the definitions of terms hacktivism and counterhacking. I would also like
to learn the concepts of hacking and if there are advantages in doing it.

Review:

Hacking is a negative action to anyone who had heard of it before. Hacking is the
intrusion in the property of other people. Hacker is the term used in referring to the person who
does the invasion of property. According to the book, there are two arguments in the definition,
hacking can also be acceptable if the purpose that it is done is for the purpose of protecting
one’s property. The second argument in the term trespassing is that, trespassing includes the
physical act of entering into someone else’s property. But it is not applicable in the digital area
because the hacker does not physically intrude in someone else’s digital file or account but it is
the access of a private account that hacker does.

Though any act of illegal access to someone’s property is impermissible, there can still
be some acceptable situations such as if the unpermitted access to information is needed for
the safety and welfare of others, then it is acceptable.

Hacking does not only connote illegal activities. Hacker can perform hacking to ensure
the safety of one’s network. Hacking can also be done to improve the security of a network and
see if there are possible threats or ways that can be used by the intruders. Hacktivism is the
term used in the activity if using hacking to promote an idea to an author or an act to show
deviation.

Page | 123
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that hacking is not absolutely illegal and wrong but it can also become and
advantage for companies

5 Integrative Questions:

1. What is hacktivism?
2. What is counterhacking?
3. What is hacker?
4. What is hacking?
5. What is trespassing?

Citation/s: N/A

Page | 124
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 9: Information Ethics and Library Profession | KAY MATHIESEN and DON FALLIS
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“Expressive conduct is subject to more stringent moral limits than those to which pure speech is
subject. The reason for this has to do with the effects of these different kinds of act.”

Learning Expectation:

I expect to learn the meaning of Information ethics and the concepts that is included with
it. I am also expecting to learn the connection of information ethics to the library profession.

Review:

This chapter of the book discusses the issue regarding information in library and the
issues regarding the library profession. My first thought regarding library profession is a job that
requires arranging and organizing collection of books. I am right in way because there are
several types of library professions: there are corporate, academic and public librarians. The
public library has the most number of issues.

In the following sections, we consider the challenges that confront the librarian in
carrying out his or her professional duties, in particular with regard to selection of materials and
the organization of these materials. With this there are 5 laws of library science by Shiyali
Ramamrita Rangathan:

(1) Books are for use.


(2) Every person his or her book.
(3) Every book its reader.
(4) Save the time of the reader.
(5) The library is a growing organism.

The first law emphasizes that librarian should make sure that books are made available
for the users. Librarians are compared to referees because just like the latter, librarians are
supposed to be neutral.

What I Have Learned:

Page | 125
CYBER ETHICS | Marie Antoinette Arriola

I have learned that it is important for a library profession to remain neutral so that the
distribution of information will be fair and all of those people who want to access will be given a
chance to have information that they need.

5 Integrative Questions:

1. What is information ethics?


2. What is a library profession?
3. What are types of libraries?
4. What is the most complex type of library profession?
5. What is neutrality in library profession?

Citation/s: N/A

Page | 126
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 10: Ethical Interest in Free and Open Source Software |
KAY MATHIESEN and DON FALLIS
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“The golden rule requires that if I like a program I must share it with other people who like it”
(Stallman, 1985).

Learning Expectation:

I expect to learn the concepts in the free software and open source software and the
ethical issues, if there are any, which are involved with this topic.

Review:

Nowadays, the use of open source software is encouraged because it is first of all, free
and it helps other developers to learn. What is Free Software? Free software gives free access
to users the software product for free. Open Source software on the other hand, allows other
users to see and modify codes of programs made by other developers. This also allows the
users to use the software for free.

So why open source is better that paid software? It is maybe because of the almost the
same features for the software and users will be able to use it for free and save money. There is
no problem with using open source software because most of them are sometimes better,
compared to paid software. The problem I see with OS software is that there is limited support,
unlike paid software that offers technical support anytime. Stallman argues that payment for
software limits the benefits of humanity with the program and that the reward a programmer can
get in having his software accessed for free is the social contribution the he makes. By having
free software available, the community can benefit from it, thus, the community improves.

What I Have Learned:

Page | 127
CYBER ETHICS | Marie Antoinette Arriola

I have learned that it is not wrong to use open source software. I also learned that by
having this kind of software, it helps each one of us to improve and further learn more concepts.

5 Integrative Questions:

1. What is free software?


2. What is open source software movement?
3. What is general public license?
4. What is the distinction between FS and OSS?
5. Who establish Free Software Foundation?

Citation/s: N/A

Page | 128
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 11: Internet Research Ethics: The Field and Its Critical Issues |
ELIZABETH A. BUCHANAN and CHARLES ESS
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“IRE builds on the research ethics traditions developed for medical, humanistic, and social
science research; this means in turn that a central challenge for IRE is to develop guidelines for
ethical research that aim toward objective, universally recognized norms, while simultaneously
incorporating important disciplinary differences in research ethics”

Learning Expectation:

I expect to learn the concepts of internet research ethics. I also expect learn the critical
issues that are involve in the topic.

Review:

The internet has become the number one source of information nowadays. Every
question seems to be answered by browsing through web pages and so, the internet is the
primary source of information for researches. With this, the internet has become a critical issue.
Researches will be greatly affected by the information researches retrieves from the internet
that is why, it is important to have a reliable source.

The book states that “researchers thence have the obligation to respect and protect
these rights, regardless of the “costs” of doing so, for example, of having to develop
comparatively more complicated and/or costly research design to protect such rights, or even
the ultimate cost of giving up an otherwise compelling and potentially highly beneficial research
project because it unavoidably violates these basic rights and duties.” With this, the developers
are still the ones who will decide on whether they will make their program available for the public
or not even though it will greatly affect the community with its uses.

Page | 129
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that because of the complexity of the internet and it being the primary
source of information, it is important that we know how to handle information properly. It is also
important that we give credits to our sources.

5 Integrative Questions:

1. What is Internet research ethics?


2. What is global IRE?
3. What is the western approach in IRE?
4. What is Tamura’s approach?
5. What is the Buddhist notion for the ‘self’?

Citation/s: N/A

Page | 130
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 12: Health Information Technology: Challenges in Ethics, Science, and Uncertainty |
KENNETH W. GOODMAN

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“There is arguably no better trigger for reflection on morality and its relationship to the law and
society than privacy and its cousin, confidentiality. The demands of privacy are intuitively
straightforward and the consequences of its violation obvious. Without a credible promise that
privacy and confidentiality will be safeguarded, the task of fostering trust is frustrated.”

Learning Expectation:

I expect to learn the concepts in health information technology and the different
challenges it gives to the ethics and science area.

Review:

This chapter of the book focuses on these three topics:

• privacy and confidentiality,


• use of decision support systems, and
• Development of personal health records.

Privacy is defined as the right or reasonable expectation people have that they will be
secured from intrusion. It is the right to keep things for themselves and to not allow the public in
having information that they choose to keep. Information technology plays a big role in the field
of health and sciences, information in medical issues are kept private and confidential as well.

Computers made it easier to keep and record medical files compared in storing it
manually on the paper files. But as information is made computerized, it is still prone to
intrusions.

Page | 131
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that there are ethical decision that should be made in medical field and
that sometimes professionals forget or sometimes do not have an idea that they violate the
privacy and confidentiality of the patients.

5 Integrative Questions:
1. What is health information technology?
2. What is the difference between privacy and confidentiality?
3. Who is the author of this chapter?
4. What is the field of emergency public health informatics?
5. What steps should be taken to ensure that computers are not used for inappropriate
access?

Citation/s: N/A

Page | 132
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani

Chapter 13: Ethical Issues of Information and Business | BERND CARSTEN STAHL
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“Businesses and the economic system they work in have an important influence on ethical
issues arising from information and information and communication technology.”

Learning Expectation:

I expect to learn the concepts and issues regarding information and business. I would
also like to learn new ethic principles about business.

Review:

It is said that the relationship of business and ethics or the link between computers and
ethics. Business ethics is simply defined as a relationship which deals with the discipline of
business and ethics. Ethics in business is important because moral norms are said to be
important in the economic system. An example would be the respect that should be given to
contract and dealing in the business setting. Without moral values it is more likely to have chaos
in the economic system. A good economy signifies a good life for the people, and so as much
as everyone would want to have a good life, it is imperative that people doing business should
be ethical.

According to the book, the central idea of the stakeholder conception of the company is
that the legitimate interests of stakeholders need to be considered when decisions are made. It
is important that the interest of an individual should not hamper the decisions that were to be
made. It is important that stakeholders and company members will be unbiased.

Page | 133
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that stakeholders should not be influenced by the factors in their
environment.

5 Integrative Questions:

1. What is business ethic?


2. How is business and ethics related?
3. What are stakeholders?
4. What is a stockholder?
5. What is the difference between stockholder and stakeholder?

Citation/s: N/A

Page | 134
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 14: Responsibilities for Information on the Internet | ANTON VEDDER

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

One of the most fascinating aspects of the Internet is that very few accidents happen. This not
only holds for the technical infrastructure and maintenance, but also for the communication and
information transmitted through the network.

Learning Expectation:

I expect to learn the concepts the responsibilities on the internet.

Review:

The internet is a very interesting and one of the most important innovations in the history
of mankind. It serves a lot of purpose and more information and advancements are made
because of it. But good as it may seem, the internet has a lot of issues that needs to be
discussed and answered. Most of which are concerned with ethical problems.

“Until recently, issues of responsibilities on the Internet have often been discussed in
association with specific accountabilities of ISPs with regard to information (including pictures
and footage) that are outright illegal or immoral. Think, for instance, of child pornography, illegal
weapon sales, the sale of illegal drugs, and the dispersion of hate and discrimination.” No one
owns the internet, and so, who is to blame for the problems that will arise. The cyber world
lacks proper implementation of law for those who violate rights and do illegal activities especially
during the earlier years of the internet. Countries such as ours also have deficient regulations on
internet problems.

Page | 135
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that it is difficult to measure the responsibilities that every user of the
internet has.

Integrative Questions:

1. What is the internet?


2. What are the problems that arises with the use of internet?
3. Who is the author of this chapter?
4. What is ISP?
5. What is responsibility?

Citation/s: N/A

Page | 136
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 15: Virtual Reality and Computer Simulation| PHILIP BREY

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Designers have a responsibility to reflect on the values and biases contained in their creations
and to ensure that they do not violate important ethical principles”

Learning Expectation:

I expect to learn the concepts of virtual reality and computer simulation. I expect to learn
the advantages and issues from the said topic.

Review:

Virtual reality started on the 80’s. According to the book, virtual reality is a technology
which shows three-dimensional environments with head equipment. The VR allows the user can
interact with the environment. There are four essential elements in Virtual reality:

a. Virtual world
b. Immersion
c. Sensory feedback
d. Interactivity

Virtual world and virtual reality are two different things. Virtual world is a more complex
and broader concept compared to virtual reality. According to the book computer simulation is a
computer program that contains a model of a particular (actual or theoretical) system. It can be
customized according to the needs of the user. This has become useful in mathematical
systems. Unlike virtual reality, the environment in the computer simulation does not need to be
too realistic. The environment can be developed in an abstract way.

Page | 137
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that there are issues that concern the use of virtual reality and computer
simulation. I also learned the difference of the two technologies.

Integrative Questions:

1. What is virtual reality?


2. What is the purpose of VR?
3. What is Computer Simulation?
4. What is the difference between virtual reality and computer simulation?\
5. When did virtual reality started?

Citation/s: N/A

Page | 138
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 16: Genetic Information: Epistemological and Ethical Issues | ANTONIO MARTURANO

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:

“It may be used without semantic implication; for example, we may say that the form of a cloud
provides information about whether it will rain. In such cases, no one would think that the cloud
had the shape it did in provided information. In contrast, a weather forecast contains information
about whether it will rain, and it has the form it does because it conveys that information. The
difference can be expressed by saying that the forecast has intentionality whereas the cloud
does not.”

Learning Expectation:

I expect to learn concepts in the genetic information. I want to learn the definition of
epistemology and ethics in genetics.

Review:

Technology and science are almost associated in every way. In the advancement of
science, technology has a great role. Genetic information is consists of data about the genetic
components. The technology is used to determine specific information for genetic studies.
Castells said that science relies on the computational models, simulations and analysis.

Genetic information is more special compared to the other cases of health information.
The book states that there really are not two different kinds of information; information has the
same meaning in information technology and in molecular biology. Meaning, the information in
genetics cannot be easily be defined

Page | 139
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that technology has a big role in the field of science.
Integrative Questions:

1. What is genetics?
2. What is genetic information?
3. What is a Central Dogma?
4. What is computing machinery?
5. What are the models in genetic information?

Citation/s: N/A

Page | 140
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 17: The Ethics of Cyber Conflict| DOROTHY E. DENNING

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“At the state level, the doctrine of self-defense is based on jus ad bellum and jus in bello, which together
allow states to use force in self-defense, but constrain how that force is applied.”

Learning Expectation:

I expect to learn the conflicts in the cyber ethics.

Review:

The first issue that needs to be discussed in the cyber ethic is the state of security. The
question is on whether cyber ethics can answer the ethical questions that concerns the
protection of sensitive information. Second is hacktivism. If the effect is affecting the majority or
a large number of users, then it becomes a problem not only to those who are affected directly
by hacking, but it is a problem that should be addressed to the cyber world. The third problem in
cyber ethics is the hack back or the activity wherein the victims will try to hack-back and find the
source.

According to the book, there is a law for these problems. The framework presented here
is based on the international law of armed conflict. Although this law was developed to address
armed attacks and the use of primarily armed force, some work has been done to interpret the
law in the domain of cyber conflict. The law has two parts: jus ad bellum, or the law of conflict
management, and jus in bello, or the law of war. Despite being referred to as “law,” both of
these parts are as much about ethical behavior as they are rules of law.

Page | 141
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned the concepts in the cyber ethic problems and on how these problems
should be approached.

Integrative Questions:
1. What is hack back?
2. What are the three problems in cyber ethics?
3. How are these things approached?
4. What is Jus in Bello?
5. What is Jus in Bellum?

Citation/s: N/A

Page | 142
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 18: A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection | DON
GOTTERBARN, TONY CLEAR, and CHOON-TUCK KWAN

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

“. . . if [qualitative risk identification is] done properly it should ensure that all foreseeable risks
are listed, representing any uncertain event, or set of circumstances that, if it occurs, would
have a positive or negative effect on the project ...”

Learning Expectation:

I expect to learn what the practical mechanism means and how is it connected to the
assessment of ethical risk.

Review:

This chapter of the book focuses mainly on the possible risks that we could face in the
future. It is important that we check all possible risks and problems that may occur regardless of
the positive or negative effects that it can cause.

Once the risks are identified, the next step is to analyze the risks and decide on the
probable actions to be taken or that can be made in order to solve the risk. What is an ethical
stakeholder? An ethical stakeholder does not have a direct relation into a program but can be
affected if there are changes that will happen in the program.

What I Have Learned:

I have learned that there are steps in acquiring the risks that can possibly affect a
system and/or the people involved in it. Thus, it is important that there are risk management.

Page | 143
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:
1. What is SoDIS?
2. What does the risk management commonly consist of?
3. Who are the authors of this chapter?
4. What is Risk Identification?
5. What are the types of risk management?

Citation/s: N/A

Page | 144
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 19: Regulation and Governance of the Internet | JOHN WECKERT and YESLAM AL-SAGGAF

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

Internet governance is the development and application by Governments, the private sector and
civil society, in their respective roles, of shared principles, norms, rules, decision-making
procedures, and programs that shape the evolution and use of the Internet (WGIG, 2005).

Learning Expectation:

I expect to learn how the laws or rules in the internet are implemented. I also want to
learn who implements the regulations if there are any.

Review:

As much as the views of every individual vary, the perception of countries differs as well
with regards to internet regulations. China is the leading country in regulating the internet
access in their country. The contents on the internet are also filtered by the service providers.
Another country which enforces strict regulation on the internet is Saudi Arabia. Being an
Islamic country, they are very strict when it comes to internet contents that promote anti-Islam
and pornography.

Unlike here in the Philippines, we do not have a regulation of contents and filtering of
transactions on the web. Though content filtering is a good way to protect people, it also prevent
the people to have extensive research and study of some topics which they needed.

Page | 145
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that there are a lot of countries that have strict regulations in the internet
and by being so, it also has some disadvantages.

Integrative Questions:

1. What is internet governance?


2. Who implements the internet regulations?
3. Who governs the internet?
4. What is content regulation?
5. What is censorship?
Citation/s: N/A

Page | 146
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 20: Information Overload| DAVID M. LEVY

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

“On the other hand, with human beings and their social units we can receive direct reports that,
at the very least, describe their subjective state: This is more than I can handle.”’

Learning Expectation:

I expect to learn what information overload is, how it happens and what are the reasons
such thing happens.

Review:

Because of the different sources of information that we can have through the use of
technology, it has become a dilemma for people to get the right and credible information
because of the variations and numerous sources.

Information is defined in the book as the state of having too much information to make a
decision or remain informed about a topic. According to the book, information overload can also
cause confusions for people because of the contradictions on the references. Information
overload, as we have seen, involves more than just the exposure of an agent to excessive
amounts of information: that agent must also suffer certain negative effects as a result. One of
the most obvious, and straightforward, consequences is a failure to complete the task at hand,
or to complete it well.

Page | 147
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned that having a lot of information does not mean that one can have a better
output.

Integrative Questions:
1. What is information overload?
2. Who is the author of this chapter?
3. What causes information overload?
4. What is information?
5. What is capacity?

Citation/s: N/A

Page | 148
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 21: Email Spam | KEITH W. MILLER and JAMES H. MOOR

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

“On the other hand, with human beings and their social units we can receive direct reports that,
at the very least, describe their subjective state: This is more than I can handle.”’

Learning Expectation:

I expect to learn the meaning of spam and what are the effects that it brings.

Review:

According to the book, Published definitions by some major players differ dramatically on
which emails should be identified as spam. Some emphasize the importance of “consent”;
others require the emails to be commercial in nature before they are called spam; still others
focus on the number of identical messages that are sent as spam. Spam is electronic mails that
are sent to us from unknown contacts. Most of the spam is composed of advertisements or
invitations to some unknown products.

The book says that every email has an effect. Even emails that are blocked by a spam
filter still have a consequence on the performance of the network and the receiver’s system.
Emails that lure the receiver into revealing personal and financial information, “phishing attacks,”
and damaging virus attacks can have devastating effects. Because of this there are features in
emails that filter malicious mails and labelled it as a spam.

Page | 149
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned more information about the definition of spam and its effect to the people
who receives it.

Integrative Questions:

1. What is spam?
2. What is the purpose of spam?
3. How is spam controlled?
4. How is spam detected?
5. Who are the authors of this chapter?

Citation/s: N/A

Page | 150
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 22: The Matter of Plagiarism: What, Why, and If| JOHN SNAPPER

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

“Among the reasons for finding an expression to be plagiarism, we may note that it is sometimes
condemned as theft of intellectual property, sometimes as a failure to live up to a standard of originality,
sometimes as a violation of the moral rights of a prior author, sometimes as fraudulent misrepresentation
of authorship”

Learning Expectation:

I expect to learn the following:

• What is plagiarism?
• And the actions taken for those who commit such act.

Review:

It has been taught to us that plagiarism is an unlawful and unacceptable act. There are
consequences in doing so. First what is plagiarism, according to the book; plagiarism is defined
as an unauthorized copying of a content of a work. If one must use a certain part on someone
else’s work, there must be a proper authorization. This can be done by; asking the author for
permission or crediting the name of the author.

Though there are information that are allowed for public use, it is still better to cite the
reference that one uses or at least tell others that it was not originally made by them.

What I Have Learned:

I have learned the definition and new concepts of plagiarism and how I can avoid it. I
have learned that plagiarism violates the right of the author.

Page | 151
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:

1. What is plagiarism?
2. What are the examples for it?
3. How is plagiarism controlled?
4. What is authorization?
5. What is a copyright law?

Citation/s: N/A

Page | 152
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File Sharing|
RICHARD A. SPINELLO

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

“All the goods of the information age- all of the expressions once contained in books or
film strips or newsletters- will exist as thought or something very much like thought: voltage
conditions darting around the net at the speed of light, in conditions that one might behold in
effect, as glowing pixels or transmitted sounds”

Learning Expectation:

I expect to learn the definition of intellectual property and other information that is
concerned with it. I also want to learn the moral issues in online file sharing.

Review:

Most of the music files that every person has at least here in the Philippines are from
peer-to-peer sites or programs. Online file sharing has become the number one problem for
companies or artists. Mp3 files are downloaded for free and so the sales of artists are
decreasing. Though this is the downside of having such file sharing, there’s still an advantage,
by having it freely downloaded, some artists says that it promotes their music and if people
really like their songs, then they will eventually purchase it.

Internet users can easily access peer-to-peer programs because they are offered for
free and can be installed easily.

Page | 153
CYBER ETHICS | Marie Antoinette Arriola

What I Have Learned:

I have learned has some moral issues that need to be addressed and this kind of
activity will be difficult to control because of the number of people who have grown into using
such.

Integrative Questions:

1. What is IP?
2. What is online file sharing?
3. How is it done?
4. Is P2P illegal?
5. What is MGM vs. Grokter?

Citation/s: N/A

Page | 154
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 24: Censorship and Access to Expression | KAY MATHIESEN

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

“No one wants to be a censor. Or, more precisely, no one wants to be called a “censor.” To
describe a person as a censor, or an act as one of “censorship,” is to condemn the person or
the action.”

Learning Expectation:

I expect to learn the definition of censorship and the definition of access expression.

Review:

Censorship is said to limit the access to expression because of certain limits and
restrictions applied to someone. It is argued by Cohen that by having freely expressed one’s
expression can one become fully satisfied. Though the thought of others regarding censorship is
that it allows secured transfer of information through filtered contents.

What I Have Learned:

I have learned that censorship is a critical issue that needs to be further discussed.
Censorship has harmful effect to people as well.

Integrative Questions:
1. What is censorship?
2. How is it done?
3. What is access expression?
4. What are the harms brought by censorship?
5. Who is Cohen?

Citation/s: N/A

Page | 155
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 25: The Gender Agenda in Computer Ethics| ALISON ADAM

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:
“Computer ethics is a new area of applied ethics with a rapidly burgeoning portfolio of ethical case studies
and problems.”

Learning Expectation:

I expect to learn new concepts regarding gender and its relation to the ethical issues
today and what technology can do.

Review:

There are limited regulations that protect women in the cyber world. Women are
stereotyped to be weak and less powerful during the early years of industrialization. It is said to
be that most of the information are usually given to men. Women and men have a lot of
differences and so the ethical views also differ.

What I Have Learned:

I have learned that gender should not become an issue in technology; both genders
must know how to compromise their differences and manage to come up with beneficial moral
solutions to the ethical problems.

Integrative Questions:
1. What is gender issue?
2. What is feminist ethics?
3. What is cyber stalking?
4. What are the hacking communities?
5. What is the effect of gender in technology?

Citation/s: N/A

Page | 156
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 26: The Digital Divide: A Perspective for the Future | Canellopoulou-Bottis and
Kenneth EIinar Himma

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:
“In the developing world, poverty and the suffering it causes is considerably worse. Here poverty
is characteristically “absolute” in the sense that people do not have enough to consistently meet
their basic needs. People in absolute poverty lack consistent access to adequate nutrition, clean
water, and health care, as well as face death from a variety of diseases that are easily cured in
affluent nations. Indeed,15 million children die every year of malnutrition in a world where the
food that is disposed of as garbage by affluent persons is enough to save most, if not all, of
these lives.”

Learning Expectation:

I expect to learn the definition of digital divide and why is that they have this kind of term.
I want to learn how it affects the cyber world.

Review:

Social status has become a barrier into any endeavour one wants to engage in.
Nowadays, technology has a great role in every person’s life. Though no matter how technology
may seem to be useful, there are still limitations especially to those people who lack power and
wealth. The global distribution of wealth is unequal and only the wealthy has more access to
greater income and opportunity,
It is evident that only those who are in authority have the greater access to information. Because
of this, poverty still remains.

What I Have Learned:

I have learned that there are inequalities and that discrimination and unequal access to
information is very prevalent.

Page | 157
CYBER ETHICS | Marie Antoinette Arriola

Integrative Questions:
1. What is digital divide?
2. Who is responsible to the poverty that the world is experiencing?
3. Is it possible to decrease the number of the poor?
4. What is poverty?
5. What are the ethical issues in poverty?

Citation/s: N/A

Page | 158
CYBER ETHICS | Marie Antoinette Arriola

Book Title: The Handbook of Information and Computer Ethics


Author: Kenneth Einar Himma and Herman T. Tavani
Chapter 27: Intercultural Information Ethics| Rafael Cappuro

Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599


Amazon Link:

http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink

Quote:

“In a broad sense IIE deals with intercultural issues raised not only by ICT, but also by other
media as well, allowing a large historical comparative view. IIE explores these issues under
descriptive and normative perspectives. Such comparative studies can be done either at a
concrete level or at the level of ontological or structural presuppositions.”

Learning Expectation:

I want to learn what is the meaning of intercultural information ethics and if it possible to
have a uniform ethical view regardless of the varied culture.

Review:

ICT has a great impact on the varied cultures in the world. Each country has a different
culture from the other that is why it is difficult to have uniform ethical values. The beliefs of every
country also have become one of the factors that affect the differences of morality.

In this chapter of the book it is discussed that not all of the ethical solutions are
applicable for everyone. So we are to respect the differences and adapt to others if we need to.

What I Have Learned:

I have learned how varied the cultures in the world are and how we try to adapt to each
ethical morality that every culture has. I learned that it is also difficult to keep up with the
changes especially if the culture is very complex.

Integrative Questions:
1. What is intercultural ethics?
2. How is it formulated?
3. Who are responsible for it?

Page | 159
CYBER ETHICS | Marie Antoinette Arriola

4. What does IEEE means?


5. Who is Rafael Cappuro?

Citation/s: N/A

Page | 160

Вам также может понравиться