Академический Документы
Профессиональный Документы
Культура Документы
Page | 2
CYBER ETHICS | Marie Antoinette Arriola
For me
And to those
I love
Page | 3
CYBER ETHICS | Marie Antoinette Arriola
TABLE OF CONTENTS
Page | 4
CYBER ETHICS | Marie Antoinette Arriola
CYBER ETHICS
Page | 5
CYBER ETHICS | Marie Antoinette Arriola
Quote:
For this reason, computing is changing everything—where and how we work, where
and how we learn, shop, eat, vote, receive medical care, spend free time, make war, make
friends, make love (Rogerson & Bynum, 1995)
Learning Expectation:
It also underlies the study of ethics in the cyberspace and the significance of
understanding the effect of computer to mankind. Furthermore, I am expecting to learn about
how the information in the cyberspace is being used. The values and importance of relaying out
information. It also underlies the study of ethics in the cyberspace and the significance of
understanding the effect of computer to mankind. Furthermore, I am expecting to learn about
how the information in the cyberspace is being used.
Review:
It is hard to imagine a picture of the Spirit of St. Louis or an Apollo lander on the
magazine cover under a banner "Machine of the Year." This perhaps shows how influential the
computer has become in our society.
The information stored in the world's libraries and computers doubles every eight years.
In a sense the computer age and the information age seem to go hand in hand. The rapid
development and deployment of computing power however has also raised some significant
social and moral questions. People in this society need to think clearly about these issues, but
often ignore them or become confused.
In a sense, computer fraud is merely a new field with old problems. Computer crimes are
often nothing more than fraud, larceny, and embezzlement carried out by more sophisticated
means.
Page | 6
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
Integrative Questions:
3. What are the tips in order to protect relevant information about you?
Page | 7
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Lesson Expectation:
I would like to learn the laws governing on-line communications. Furthermore, to assess
the crime being committed through ethics on line.
Review:
In 1967, the World Intellectual Property Organization was founded in order to establish
intellectual property boundaries and rules, so that people's hard-fought work would remain the
property of the people who created it. The Organization decided that intellectual property refers
to: "Literary and artistic works, which includes every production in the literary, scientific, and
artistic domain, whatever the mode of expression, dramatic and dramatic-musical works,
choreographic works, photographic works, and works of applied art." As a member of the WIPO,
The United States has laws stating that only the author of this work has the right to display,
copy, perform, or distribute intellectual property. However, with the Internet as a new method of
distributing information, many of these intellectual property laws were challenged. Very few
people would photocopy and sell pages from books, for example, but what about copying and
selling computer programs? It's very much the same thing. Computer programs are protected
exactly the same way as books, so if people distribute programs without the author's
permission, it is illegal. This isn't the biggest problem, however. Most people on their home
computers don't copy programs, so this is only an issue with very knowledgeable people, or
large bootleggers; not an issue for everyday people. What is an important issue, though, is the
illegal copying of information on the Internet, such as text and images on web pages.
It is even argued that caching web sites (the way that browsers automatically store web
sites on one's desktop for a faster load next time that page is accessed) is illegal by the WIPO
Page | 8
CYBER ETHICS | Marie Antoinette Arriola
laws, because the information is copied onto one's hard drive. Also controversial is the trading
of copywritten songs via MP3's online. While recently the Recording Industry Association of
America has succeeded in shutting down Napster, the most widely used song trading program,
there are still places and programs that allow users to illegally download and trade music online.
This is a much wider problem than copying programs. Millions of songs are traded online each
day, all without the permission of the creator.
Lesson Learned:
Most of the crime being committed is stealing private property of one another. Even the
identity of these people could be stolen as well.
Integrative Questions:
4. What is theft?
Page | 9
CYBER ETHICS | Marie Antoinette Arriola
QUOTE:
The stakes are much higher, and consequently considerations and applications of Information
Ethics must be broader, more profound and above all effective in helping to realize a democratic
and empowering technology rather than an enslaving or debilitating one.
Learning Expectation:
We must respect others and their core values. If we can avoid policies that result in
significant harm to others, that would be a good beginning toward responsible ethical conduct.
Review:
Recently, in northern California about one-sixth of the phone calls didn’t connect
because of excessive use of the Internet. People are surging to gain access to computer
technology. They see it as not only a part of their daily lives but a necessary venue for routine
communication and commercial transactions.
On Line, a prominent Internet service provider offered its customers refunds because the
demand for connection overwhelmed the company’s own computer technology. The widespread
desire to be wired should make us reflect on what awaits us as the computer revolution
explodes around the world.
What is difficult to comprehend is what impact this will have on human life. Surely, some
of the effects will be quite positive and others quite negative. The question is to what extent we
can bring ethics to bear on the computer revolution in order to guide us to a better world or at
least prevent us from falling into a worse world. With the newly acquired advantages of
computer technology, few would want to put the genie completely back into the bottle. And yet,
given the nature of the revolutionary beast, I am not sure it is possible to completely control it,
though we certainly can modify its evolution. Therefore, it is extremely important to be alert to
what is happening. Because the computer revolution has the potential to have major effects on
how we lead our lives, the paramount issue of how we should control com- putting and the flow
of information needs to be addressed on an ongoing basis in order to shape the technology.
Page | 10
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
Computer ethics. Other policies easily meet our standards. Building computer interfaces
which facilitate use by the disabled is a clear example. And of course, some policies for
managing computer technology will be disputed. However, as I have been emphasizing, some
of the ethical policies under dispute may be subject to further rational discussion and resolution.
The major resolution technique, which I have been emphasizing, is the empirical investigation of
the actual consequences of proposed policies.
Integrative Question:
Page | 11
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Ethics is always and already the 'other' side of politics (Critchley 1999)
Learning Expectation:
More particularly, we are concerned with the way in which the interest of some become
excluded through the operation of closure as an implicit and essential part of the design of
information technology and its operation in social-technical networks.
Review:
When we use the term 'politics' (with a small 'p')--as indicated above--we refer to the actual
operation of power in serving or enclosing particular interests, and not others. For politics to
function as politics it seeks closure--one could say 'enrolment' in the actor network theory
language. Decisions (and technologies) need to be made and programmes (and technologies)
need to be implemented. Without closure politics cannot be effective as a programme of action
and change. Obviously, if the interests of the many are included--in the enclosure as it were--
then we might say that it is a 'good' politics (such as democracy). If the interests of only a few
are included we might say it is a 'bad' politics (such as totalitarianism).
It is the excluded--the other on the 'outside' as it were--that is the concern of ethics. Thus, every
political action has, always and immediately, tied to its very operation an ethical question or
concern--it is the other side of politics. When making this claim it is clear that for us ethics (with
a small 'e') is not ethical theory or moral reasoning about how we ought live (Caputo 1993). It is
rather the question of the actual operation of closure in which the interests of some become
excluded as an implicit part of the material operation of power--in plans, programmes,
technologies and the like.
Lesson Learned:
We can see it operating as already 'closed' from the start--where the voices (or interests)
of some are shut out from the design process and use context from the start. We can also see it
Page | 12
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
4. What is totalitarianism?
Page | 13
CYBER ETHICS | Marie Antoinette Arriola
Quote:
ICTs has emerged as one of the major critical forces for the social study of information
technologies.
Lesson Expectation:
To be able to grasp the idea that women contribute to the growth of computer ethics in
the world. Furthermore, to become aware of how women are treated in the cyberspace. In
addition, what are the laws that are being implemented to protect the well-being of the women.
Review:
Gender and technology studies have proved successful in exposing power relations in
the development and use of technologies. At the same time, major developments in feminist
ethics over the last two decades, particularly in terms of Gilligan’s (1982) ‘ethic of care’ make
this an area at least as important as computer ethics in terms of overall contribution to
philosophical ethics. I claim that bringing feminist ethics to bear on computer ethics offers a
novel and fruitful alternative to current directions in computer ethics in two major ways: firstly in
revealing continuing inequalities in power and where liberal approaches to power do not work;
and secondly, in offering an alternative, collective approach to the individualism of the traditional
ethical theories encapsulated in computer ethics.
Nowhere are these issues more important than in thinking about gender and computing
in a networked age. I am suggesting that a pressing problem for computer ethics involves
formulating a position on the way that women, and indeed other social groups such as ethnic
minorities and the differently able, may be disadvantaged or even disenfranchised with regard to
information and communications technologies. This is a well recognized phenomenon.
Recognizing it is one thing; suggesting what to do about it is quite another. But I argue that the
sort of liberal, inclusive, consultative measures, already becoming enshrined in computing
bodies’ codes of ethics and other policy documents, may not have the effect of properly
involving women users in decision making about computer systems and women in computing in
general, despite the will to do so.
Page | 14
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
Through the spread of pornography, women became vulnerable to men. It is about time
that the government should implement grave laws to preserve women as they are. We must be
able to implement laws that would not discredit the people in the internet.
Integrative Questions:
1. What is pornography?
Page | 15
CYBER ETHICS | Marie Antoinette Arriola
Quote
Lesson Expectation:
The concerns which many scholars have raised regarding the dangers that this endless
flow of information can present to the specificity of culture are not without merit. Certainly the
information which comes from Western countries has embedded within it certain ideals and
beliefs which are inherently Western. Yet the idea that the myriad and diverse cultures of the
world will simply conform and change, becoming homogenized and as monotonous as this
information is a bit ridiculous, given the many years which these cultures have thrived. One
must also remember that the nature of culture itself is changeable.
Review:
Page | 16
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
To learn the impact of global information infrastructure to the humanity and to be able to
confirm users of said information. Furthermore, to be able to identify the uses of information
infrastructure. In addition, to define global information infrastructure and its effect to democracy.
It is simply not one solid or static thing. And despite the many differences which exist
from culture to culture and country to country, the globalization of information provides
opportunities for a better understanding of all of these. Therefore, despite cultural differences,
certain universal understandings of ethical concepts are possible and universal rules can be
reached to govern this new global village of sorts.
Integrative Questions:
Page | 17
CYBER ETHICS | Marie Antoinette Arriola
Applying ethical and moral concepts and theories to IT Contexts: Key Problems and Challenges
Quote
“Information revolution” has altered many aspects of life significantly: commerce, employment,
medicine, security, transportation, entertainment, and so on.
Lesson Expectation:
Information and communication technology (ICT) has affected — in both good ways and
bad ways — community life, family life, human relationships, education, careers, freedom, and
democracy (to name just a few examples). “Computer and information ethics”, in the broadest
sense of this phrase, can be understood as that branch of applied ethics which studies and
analyzes such social and ethical impacts of ICT. The present essay concerns this broad new
field of applied ethics.
Review:
Two years later he published The Human Use of Human Beings (1950), a book in which
he explored a number of ethical issues that computer and information technology would likely
generate. The issues that he identified in those two books, plus his later book God and Golem,
Inc. (1963), included topics that are still important today: computers and security, computers
and unemployment, responsibilities of computer professionals, computers for persons with
disabilities, computers and religion, information networks and globalization, virtual communities,
teleworking, merging of human bodies with machines, robot ethics, artificial intelligence, and a
number of other subjects.
“Cybernetics” for his new science, Wiener apparently did not see himself as also
creating a new branch of ethics. As a result, he did not coin a name like “computer ethics” or
“information ethics”. These terms came into use decades later. In spite of this, Wiener's three
relevant books (1948, 1950, 1963) do lay down a powerful foundation, and do use an effective
methodology, for today's field of computer and information ethics. His thinking, however, was far
ahead of other scholars; and, at the time, many people considered him to be an eccentric
scientist who was engaging in flights of fantasy about ethics.
Page | 18
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
Living organisms, including human beings, are actually patterns of information that persist
through an ongoing exchange of matter-energy. Thus, he says of human beings,
We are but whirlpools in a river of ever-flowing water. We are not stuff that abides, but patterns
that perpetuate themselves.
Integrative Questions:
3. What is cybernetics?
Page | 19
CYBER ETHICS | Marie Antoinette Arriola
Quote
Computer ethics is a field of professional ethics concerned with issues of responsibilities and
conduct for computer professionals, Gotterbarn (1991).
Lesson Expectation:
To find out the global impact of computing in recent years, and because of the merging
of computing and communications technologies that has also recently occurred, the field of
computer ethics might be perceived as one that is currently in a state of flux or transition.
Review:
The former group mistrusts unfamiliar agents while the latter group are not at all aware
of potential security risks associated with agent computing. Intuitive assessment of agent
behaviour may be misleading and it can be argued that a systematic ethical analysis will provide
a more reliable basis for assessment. For example the actions of Clippy may be considered as
unethical by an expert user due to Clippy’s obtrusive character – however the systematic ethical
analysis of Clippy’s actions in section 4.2, reveals that Clippy’s actions can at most be
considered irritating, but certainly not unethical. An a posteriori systematic analysis of the
behaviour of an agent can assist developers of said agent to improve the modelling of the
secure and ethical behaviour of future versions of the agent. Once the behaviour of a number of
agents have been analysed in this systematic fashion, norms and criteria for the design of new
agents that will exhibit acceptable secure and ethical behaviour can be formulated and
continually refined. This may lead to a simplification of the security measures imposed on the
agent.
Lesson Learned:
To imply that the ends, however good, “do not justify using unjust means”. Regarding the
contemplation, and in particular the performance of some action, one would thus need to
determine whether unjust means would be required to facilitate performance of the action by the
user, the agent or the host. Therefore, if it is not possible to achieve the envisaged end.
Page | 20
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
Page | 21
CYBER ETHICS | Marie Antoinette Arriola
The Internet as Public Space: Concepts, Issues and Implications in Public Policy
Quote:
"A typical problem in computer ethics arises because there is a policy vacuum about how
computer technology should be used"
Lesson Expectation:
Review
Helen Nissenbaum has recently shown how certain intrusions into the activities of online
users are not currently protected by privacy norms because information available online is often
treated as information in "public space" or what she describes as a sphere "other than the
intimate." She also notes that few normative theories sufficiently attend to the public aspect of
privacy and that philosophical work on privacy suffers a "theoretical blind spot" when it comes to
the question of protecting privacy in public. Agreeing with Nissenbaum that activities on the
Internet involving the monitoring and recording of certain kinds of personal information can
cause us to reconsider our assumptions regarding the private vs. public character of personal
information currently available online,
Tavani argues that Moor’s "control/restricted access theory" of privacy can be extended
to resolve issues involving the protection of personal privacy in the "public space" of the
Internet. Despite the challenges that the Internet has posed with respect to protecting certain
kinds of personal information, however, there is no compelling evidence that any genuinely new
privacy issues have been introduced by that medium or that we need a new category of
"Internet privacy," as some have suggested.
Page | 22
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
If you take precautions (such as forcing people to log in with laborious security
measures) then I'd argue perhaps your private areas could be affected - you can't very well
argue you stumbled inadvertently into an area that forces you to log in with a secure password).
Integrative Questions:
1. What is internet?
5. What are the laws implemented to safeguard privacy in the computer world?
Page | 23
CYBER ETHICS | Marie Antoinette Arriola
Quote:
The telecoms is too large, too heterogeneous, too turbulent, too creatively chaotic to be
governed wholesale, from the top down,"
Lesson Expectation:
Information society to assert that the grounds for ethics, in particular information ethics,
lies in this Western tradition. If we are trying to create a genuine dialog about ethical values and
ethical reasons in the multicultural internet world, we cannot be bound solely to this tradition,
because, for example, Chinese and Indians have engaged in ethical thought and ethical
reasoning and the grounds for the resolution of their ethical dilemmas .
Review
"In a place like that, nothing except common law can keep up". Huber is not alone in
touting the common [p. 1750/p. 1751] law's unique ability to grapple with cutting-edge legal
issues. He does, however, evince an unusual appreciation of the common law as a
spontaneous order.
Huber understands that common law originates not in the holdings of any court or
courts, but rather in the actual practices of those who have to live with the law. "Rules evolve
spontaneously in the marketplace and are mostly accepted by common consent. Common-law
courts just keep things tidy at the edges" (p. 8). Even when practical rules face litigation, the
common law continues to grow and develop "out of rulings handed down by many different
judges in many different courtrooms." Looping back to the real world, judicial rules then once
more face the acid test of experience. "The good rules gain acceptance by the community at
large, as people conform their conduct to rulings that make practical sense". By attributing only
modest powers to courts, Huber's account contrasts with that of Lawrence Lessig, another
prominent advocate of applying judicial procedures to new and puzzling legal issues. Lessig
claims of the Internet "that we are, vis-à-vis the laws of nature in this new space, gods; and that
the problem with being gods is that we must choose. These choices . . . will be made, by a
Court . To the contrary, like the market place, the English language, or the common law, the
Internet arose out of human action but not human design.
Page | 24
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
Law and Disorder in Cyberspace presents a thesis revolutionary in the truest sense of
the word: it argues for overthrowing the existing corrupt order by returning to earlier, better,
more fundamental values. So defiant a book naturally reads, to quote its dust jacket, as a
"polemic." Yet Law and Disorder in Cyberspace merits serious attention from scholars and
policy wonks. Huber makes a strong case for abolishing the FCC and relying on common law to
rule the telecosm.
Integrative Questions:
5. What is cyberethics?
Page | 25
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Reports that say that something hasn't happened are always interesting to me, because as we
know there are known knowns; there are things we know we know. We also know there are
known unknowns; that is to say we know there are some things we do not know. But there are
also unknown unknowns--the ones we don't know we don't know. (Rumsfeld, 2002)
Lesson Expectation:
This study seeks to identify significant philosophical implications of the free, open source
option as it has emerged in global software development communities. A three part approach
inspired by the Carl Mitcham's philosophy of technology has been employed. Each section has
touched on some ideas whose elucidation are in no way complete
Review
James Moor suggested that "conceptual muddles" and "policy vacuums" exist where
there are problems lacking a philosophical framework to address them, and this is particularly
true of computer technology (Moor, 1985). Likewise, Walter Maner proposed that innovations in
computer technology create unique, new ethical problems (Maner, 1995). For years, this
conceptual vacuum has been filling with the musings of self-proclaimed accidental
revolutionaries like Richard Stallman, Eric Raymond, and Linus Torvalds, the creator of the
Linux kernel, as well as industry leaders like Bill Gates and Tim O'Reilly. While subject area
experts have arisen in the field of computer ethics and the philosophy of computing and
information, articulation of the ethical implications of trends favoring free, open source software
are only beginning to be featured in academic publications and conferences. An excellent
example is the 2007 North American meeting of IACAP, which keynoted free software and open
access. The argumentative approach I have selected is borrowed from the philosophy of
technology, in particular the work of Carl Mitcham and Andrew Feenberg, to present practical
and moral advantages of the FOS option. Finally, I will offer a third approach based on its
potential epistemological advantages.
In Thinking through Technology: the Path between Engineering and Philosophy, Carl
Mitcham introduced the Engineering Philosophy of Technology (EPT) as the field of study
Page | 26
CYBER ETHICS | Marie Antoinette Arriola
focused on determining the best way to conduct engineering and technological endeavors
(Mitcham, 1994). This work is from the insider's perspective, and the obvious starting point to
transfer insights from the technical arena to the academic study of FOSS. There is a ready set
of commonly cited practical benefits supported by empirical research as well as the
methodologies used to evaluate, organize, and execute such projects (Lerner and Tirole, 2005).
Practical ethics have to do with making everyday choices and judging which are appropriate
based on their anticipated outcome. In this respect, technologists engage ethics in the early
stages of project management when they evaluate options. A fundamental differentiation of
options to be considered has always been between in-house versus third party, or build versus
buy (Weinstock and Hissam, 2005). Other 'practical ethics' employed by technology decision
makers include minimizing the total cost of ownership (TCO), using the best tool for the job,
standardizing on a particular technology tool set, and outsourcing where there is no competitive
advantage, which is to leave the decision to a third party. One ought to add, "utilizing free, open
source options where feasible."
Lesson Learned
Software piracy is very tempting due to the relatively high cost of commercial
applications, the easy transfer of digital information, and the lack of a perception of doing harm.
Software piracy is especially common among curious academics and hobbyists
Integrative Question:
Page | 27
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Any content-based regulation of the Internet, no matter how benign the purpose, could burn the
global village to roast the pig."
Lesson Expectation:
The various proposals for Internet blocking and rating. Individually, each of the proposals
poses some threat to open and robust speech on the Internet; some pose a considerably
greater threat than others. To urge industry leaders to develop and deploy the tools for blocking
"inappropriate" speech.
Review:
The ACLU and others in the cyber-liberties community were genuinely alarmed by the
tenor of the White House summit and the unabashed enthusiasm for technological fixes that will
make it easier to block or render invisible controversial speech. Netscape announced plans to
join Microsoft together the two giants have 90% or more of the web browser market in adopting
PICS (Platform for Internet Content Selection) the rating standard that establishes a consistent
way to rate and block online content; IBM announced it was making a $100,000 grant to RSAC
(Recreational Software Advisory Council) to encourage the use of its RSACi rating system.
Microsoft Explorer already employs the RSACi ratings system, Compuserve encourages its use
and it is fast becoming the de facto industry standard rating system;
Four of the major search engines the services which allow users to conduct searches of
the Internet for relevant sites announced a plan to cooperate in the promotion of "self-
regulation" of the Internet. The president of one, Lycos, was quoted in a news account as
having "thrown down the gauntlet" to the other three, challenging them to agree to exclude
unrated sites from search results;
Page | 28
CYBER ETHICS | Marie Antoinette Arriola
Act." But it was not any one proposal or announcement that caused our alarm; rather, it was the
failure to examine the longer-term implications for the Internet of rating and blocking schemes.
The major commercial sites will still be readily available they will have the resources and
inclination to self-rate, and third-party rating services will be inclined to give them acceptable
ratings. People who disseminate quirky and idiosyncratic speech, create individual home pages,
or post to controversial news groups, will be among the first Internet users blocked by filters and
made invisible by the search engines. Controversial speech will still exist, but will only be visible
to those with the tools and know-how to penetrate the dense smokescreen of industry "self-
regulation."
Lesson Learned:
The Internet both easily and cheaply. One of the most dangerous aspects of ratings systems is
their potential to build borders around American- and foreign-created speech.
Integrative Questions:
1. What are the six reasons why self-rating schemes are wrong for the Internet?
5. Is cyberspace burning?
Page | 29
CYBER ETHICS | Marie Antoinette Arriola
Quote:
To give up the fight, without exhausting our defenses, could cost the surrender of our "soul".
(Leo Tolstoy)
Lesson Expectation:
Review:
While you may be able to employ some diabolical subterfuge (e.g., using a different
internet name) to hide your identity, many software programs have been developed to thwart
your efforts so that they will be able to identify even your location or name. Many savvy
websites can even access the code of your computer by planting "cookies" in your computer.
Armed with other information that can be bought readily from other sellers of personal
information. Tracking the behavior of individuals and groups has been a preoccupation of social
scientists, poll takers, the advertising industry and all companies that have something to sell.
However, previous studies or "ratings" usually just involved a small "statistical sample" of a
population.
Page | 30
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
Many people decry this state of the internet -- invasion of privacy, over
commercialization and monopolistic trends in the building of the infrastructure of the internet --
where we as individuals are viewed merely as "consumers".
If all of us who care about these issues can band together, we may be able to shape the
future of the internet so that we can create an internet community that would be more respecting
of our privacy and humanity.
Integrative Questions:
3. What is Internet?
4. What is privacy?
Page | 31
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: Censorship: The Internet and the Child Pornography Law of 1996: A
Critique
Quote:
Lesson Expectation:
Review:
Pornography should be subject to censorship and regulation because the majority has
the right to regulate non-political, public speech that is harmful or offensive to the majority. His
argument starts with the assertion that a distinction between the public and private spheres of
life are valid, and that the majority has a right to regulate the public space in some way (Gastil
1997, 190). He uses the example of nudists, who must where clothes in public, but in private
camps or homes can dress or not dress as they please, to illustrate the majority’s right to an
inoffensive public space and a minority’s right to a private moral space (Gastil 1997, 190). He
then goes on to argue that only the free speech which bears on the consideration of voters
choices and the public interest is protected by the First Amendment, not private speech in the
private interest (Gastil 1997, 191).
He argues that freedom of speech should "be protected by a more absolute but less all
inclusive principle that refers to rational political discourse as an ineluctable requirement of
political democracy." (Gastil 1997, 191). From these arguments he concludes that the
regulations on privately interested speech in the public space can be subjected to censorship if
it is deemed harmful. He then concludes that pornography is harmful because 1) it diminishes
the specialness and dignity of human life and 2) it reduces the creativity of artists and society by
diverting public resources to activities that are wholly uncreative and of little redeeming value.
Page | 32
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
The United States. For example, as a result of New York v. Ferber, the Miller obscenity
standard does not apply because the Supreme Court ruled that child pornography is by
definition obscene (Akdeniz 1996). The court took this stand for a number of reasons. First, the
production of such pornography with children as subjects is harmful to them; second, the value
of the material is negligible at best; and third, the distribution of child pornography is inseparable
from its role in the abuse of children.
Integrative Question:
1. What is Pornography?
Page | 33
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Lesson Expectation:
The World Wide Web Consortium (W3C) in September 1995, it was widely hailed as a
stroke of genius. The developers, a group of computer scientists and software manufacturers,
promoted PICS as "Internet Access Controls without Censorship". PICS publicity emphasized a
multiplicity of rating systems, voluntary self-rating and labeling by content providers and
blocking software installed on home computers. Materials may be legal and appropriate for
some recipients but not others, so that any decision about whether to block at the source will be
incorrect for some audiences.
Review:
PICS specifies only those technical issues that affect interoperability. It does not specify
how selection software or rating services work, just how they work together.
Even that amount of configuration may be too complex, however. Another possibility is
for organizations and on-line services to provide preconfigured sets of selection rules. For
example, an on-line service might team up with UNICEF to offer "Internet for kids" and "Internet
for teens" packages, containing not only preconfigured selection rules, but also a default home
page provided by UNICEF. Labels can be retrieved in various ways. Some clients might choose
to request labels each time a user tries to access a document. Others might cache frequently
requested labels or download a large set from a label bureau and keep a local database, to
minimize delays while labels are retrieved.
Page | 34
CYBER ETHICS | Marie Antoinette Arriola
Lesson learned:
Others regard that as the pot calling the kettle black. PICS was, after all, developed by
people fearful of government censorship and who were apparently ignorant of the
repressiveness of some governments.
Integrative Question:
1. What is PICS?
2. What is Metadata?
5. What is Labeling?
Page | 35
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: Internet Service Providers and Defamation: New Standard of Liability
Quote:
"It is not reasonable to expect editors, producers and journalists to know and apply eight
separate defamation laws in publishing newspapers and magazines circulating throughout
Australia and in selecting material for transmission on national broadcasting and television
programs."
Lesson Expectation:
ISPs attractive defendants in defamation claims, many of which relate to the costs
associated with litigation. For example, the author of a defamatory statement will often reside
outside the jurisdiction of the plaintiff, whereas the ISP that carried the statement does business
in the plaintiff's jurisdiction. It might be difficult, time-consuming, or even impossible, to
determine the actual author of the message.
Review:
The advent of the Internet has resulted in legislatures and courts around the world re-
evaluating laws and policies on issues as diverse as taxation, privacy, and contract formation.
The liability of the Internet Service Provider (ISP), the company that is the vehicle for the user's
access to the Internet, and which brings information to the user from around the world, is
potentially staggering if one applies to it long-established legal principles for issues such as
distribution of pornography, breach of copyright, or misrepresentation. Defamation of character
over the Internet is illustrative of the problem.
Page | 36
CYBER ETHICS | Marie Antoinette Arriola
Lesson learned:
The liability of intermediaries for defamation has a long history in the common law.
'Publishers', such as newspapers, which traditionally exerted editorial control over content, are
generally liable for the defamatory statements that they publish. 'Distributors', such as
bookstores or newsstands, exert very little if any editorial control, and have the benefit of the
'innocent disseminator' defense. I
nnocent disseminators are protected from liability for defamation if they did not know of
the libelous statement, there were no circumstances that ought to have led them to suppose it
contained a libel, and they were not negligent in being ignorant of the libel.
Integrative Question:
3. What is libel?
4. What is pornography?
Page | 37
CYBER ETHICS | Marie Antoinette Arriola
Quote:
The technology companies that distribute their content — the legal power to create closed
technology platforms and exclude competitors from interoperating with them.
Lesson Expectation:
To and the meaning of Digital Millennium Copyrights Act. It will also highlight the
importance of DMCA for the mankind. Likewise, it will also enumerate the disadvantages of the
said act.
Review:
The arrest of Russian programmer Dmitry Sklyarov in 2001, for alleged infringement of
the DMCA, was a highly publicized example of the law's use to prevent or penalize development
of anti-DRM measures. While working for Elcomsoft in Russia, he developed The Advanced
eBook Processor, a software application allowing users to strip usage restriction information
from restricted e-books, an activity legal in both Russia and the United States.
Paradoxically, under the DMCA, it is not legal in the United States to provide such a tool.
Sklyarov was arrested in the United States after presenting a speech at DEF CON and
subsequently spent nearly a month in jail. The DMCA has also been cited as chilling to
legitimate users, such as students of cryptanalysis (including, in a well-known instance,
Professor Edward Felten and students at Princeton), and security consultants such as Niels
Ferguson, who has declined to publish information about vulnerabilities he discovered in an Intel
secure-computing scheme because of his concern about being arrested under the DMCA .
Lesson Learned:
When website owners receive a takedown notice it is in their interest not to challenge it,
even if it is not clear if infringement is taking place, because if the potentially infringing content is
taken down the website will not be held liable.
Page | 38
CYBER ETHICS | Marie Antoinette Arriola
Integrative questions:
1. What is DMCA?
2. What is copyright?
3. What is cryptography?
Page | 39
CYBER ETHICS | Marie Antoinette Arriola
Quote:
"Our main goal," said Gross, "is to build a strong, solid record to take to the appeals
court, where civil liberties are taken more seriously."
Learning Expectation:
Linux came to the forefront of the ongoing DeCSS trial late last week. That's because, in
a very real way, Linux started the uproar that has resulted in eight movie studios suing Eric
Corley. The trial could ultimately affect the way consumers use products they purchase and the
way researchers advance technology.
Review:
Jon Johansen wrote DeCSS in order to view DVDs on a Linux machine. The MPAA has
since brought suit against him in his native Norway as well. Johansen testified on Thursday that
he announced the successful reverse engineering of a DVD on the mailing list of the Linux
Video and DVD Project (LiViD), a user resource center for video- and DVD-related work for
Linux. The Electronic Frontier Foundation (EFF), an organization based in San Francisco which
supports civil liberties in digital arenas, is providing a legal defense that cites, among other
issues, fair use. After all, the EFF argues, if you buy a DVD, why can't you play it on any
machine you want?
Page | 40
CYBER ETHICS | Marie Antoinette Arriola
Lessons Learned:
The judge in the case, the honorable Lewis Kaplan of the US District Court in southern
New York, issued a preliminary injunction against posting DeCSS. Corley duly took down the
code, but did not help his defense by defiantly linking to myriad sites which post DeCSS.
By taking his stand, Corley has brought key issues of the digital age to trial. Among them
is the right to experiment and to share knowledge, he said. The case also points to the DMCA's
broad protections, which for the first time not only give copyright to creative work but also to the
software -- or any other technology -- that protects it.
Still open is the question of whether the injunction against Corley, or the fight against
DeCSS itself, is not a vain struggle in the face of inevitable change. Judge Kaplan, whom the
defense requested recuse himself based on conflict of interest, said last Thursday to Mikhail
Reider, the MPAA's chief of Internet antipiracy, "You are asking me to issue an injunction
against the guy who unlocked this barn, [telling him] not to unlock it again --- even though there
is no horse in it." "It's good to see that [the judge] is realizing the futile nature of dealing with
these issues this way," said Robin Gross, an EFF attorney and a member of the defense team.
Though the MPAA may not be able to stop DeCSS, there are other issues at stake that
are unrelated to digital piracy.
Integrative Questions:
1. What is DeCSS?
2. What is Trial ?
3. What is the copyright issue of the defense trial?
4. Who is the Judge?
5. What is the plans ?
Page | 41
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter:A Politics of Intellectual Property: Environmentalism for the Net
Quote:
There is a danger of absolutizing the claims to ownership and control to the detriment of other
interested parties, something we have noted in recent legislative proposals. Samuelson, 1997)
Lesson Expectation:
First it presents some cases that illustrate the range of possible intellectual property
rights. Next it examines the traditional justifications for such rights. It then critiques those
justifications, not to refute them, but to show their limits. Finally it proposes a different way of
looking at the problem, using traditional natural law ethics.
Review:
Property usually refers to tangible assets over which someone has or claims control.
Originally it meant land. Now it could also refer to a car, a milling machine, a jacket or a
toothbrush. In all these cases the property claim is of control of the physical entity. If I claim a
plot of land as my property, I am saying I can control who has access to that land and what they
do there. I can build a fence around it, rent it out, or drill for oil on it. If a car is my property, I get
the keys to it. I can exclude others from using it and use it myself for whatever I want, as long as
I do not threaten the lives or property of others. Intellectual property is different because its
object is something intangible, although it usually has tangible expression. The intellectual
property in a book is not the physical paper and ink, but the arrangement of words that the ink
marks on the paper represent. The ink marks can be translated into regions of magnetic
polarization on a computer disk, and the intellectual property, and whatever claims there are to
that property, will be the same. The owner of a song claims control, not of the CD on which the
song is recorded, but of the song itself, of where when and how it can be performed and
recorded.
Page | 42
CYBER ETHICS | Marie Antoinette Arriola
years to create and can sell for hundreds, or even hundreds of thousands, of dollars per copy.
Yet someone with access to such a program can make a copy in moments at practically no
cost.
Lesson learned:
Intellectual property has always been closely tied to technology. Technology arises from
intellectual property in the form of new inventions. But technology also supports intellectual
property by providing new, more powerful and more efficient ways of creating and disseminating
writing, musical composition, visual art, and so on. In fact it was the technology of the printing
press that originally gave rise to intellectual property as a legal and moral issue. Before, when it
took almost as much of an effort to reproduce a document as it took to create it, there was little
need to impose limits on copying.
Integrative Question:
2. What is information?
3. What is copyright?
4. What is plagiarism?
Page | 43
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: Intellectual Property, Information, and the Common Good
Quote:
"With air pollution there was, for example, a desire of the people living in Denver to see the
mountains again. William Ruckelshaus
Lesson Expectation:
Everyone says that the ownership and control of information is one of the most important
forms of power in contemporary society. This article will tend to review the importance of politics
of intellectual property.
Review:
"There is a fundamental conflict between the efficiency with which markets spread
information and the incentives to acquire information." This problem is often, though not always
"solved" by ignoring it. A pre-theoretical classification is made, conventionally ascribing a certain
problem to one or other realm and the discussion then continues on that basis. Thus for
example, we tend to look at the field of intellectual property with a finely honed sensitivity to
"public goods" problems that might lead to under production, while underestimating or failing to
mention the efficiency costs and other losses generated by the very rights we are granting.
Some conventional ascriptions visibly switch over time. The contemporary proponents of
legalizing insider trading use the idea of the efficient capital market to minimize or defend the
practice.
The first generation of analyses saw the insider trade as the entrepreneur's incentive
and reward for Faustian recombination of the factors of production. An alternative method for
smoothing over the tensions in the policy analysis is for the analyst to acknowledge the tension
between efficiency and incentives, point out that there are some limitations imposed on
intellectual property rights, to conclude that there are both efficiency-promoting and incentive
promoting aspects to intellectual property law, and then to imply that an optimal balance has
been struck.
Page | 44
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
In general, then, I would claim there is a tendency to think that intellectual property is a
place to apply our "public goods/incentives theory" rather than our "anti-monopoly/free-flow of
information" theory. All by itself, this might push rhetoric and analysis towards more expansive
property rights. The tendency is compounded, however, by two others.
First, courts are traditionally much less sensitive to First Amendment, free speech and
other "free flow of information arguments" when the context is seen as private rather than
public, property rather than censorship. Second, intellectual property rights are given only for
"original" creation.
Integrative Question:
2. What is politics?
3. What is environmentalism?
Page | 45
CYBER ETHICS | Marie Antoinette Arriola
Quote:
A property right is the relationship between individuals in reference to things. Cohen (1935)
Lesson Expectation:
The focus is on two key questions: 1) what is the relationship between ethics and
copyright law and practice in the United States; and, 2) is the concept of private ownership of
intellectual property inherently ethical? These questions are important because access to an
overwhelming number of the elements of daily life is now controlled by intellectual property law.
Review:
The ethics of copyright can be approached in two ways: (1) If, as Hettinger suggests,
every creator stands on the shoulders of giants what is the essential morality in allowing the last
contributor to reap the full reward or to have the right to prevent others from building on her
contribution; and (2) If, as postulated by Locke, an individual is entitled to what he or she
creates, what are the ethics of limiting a creators rights in regards to his or her creation?
Theoretically copyright law in the United States takes the first view, stating that authors have no
natural right in their creation but only the rights that the state has conferred by reason of policy
to encourage the creation of new works.
United States copyright law was better aligned with the encouragement theory and the
ethical position that creative works belonged to society as a whole. Only the exact copying of a
work was prohibited, not new works based on a previous work. Subsequent authors were free to
adapt novels to the stage, abridge scholarly works for the masses, and translate works into
other languages without paying a license fee to the creator or to whom ever the creator had
transferred his or her copyright. However as copyright law has expanded to grant creators more
rights the law has all but abandoned the concept of allowing, let alone encouraging,
transformative or productive use. Copyright no longer has a consistent theory, let alone an
ethical position. It has become what is often called an equitable rule of reason, which attempts
to balance the rights of authors with the rights of users. It is often not clear whether this balance
is to be obtained by granting rights via law or by recognizing the intrinsic rights of each.
Page | 46
CYBER ETHICS | Marie Antoinette Arriola
Lesson learned:
The Software Publisher’s Association (SPA), which merged with the Information Industry
Association (IIA) in January of 1999 to form the Software & Information Industry Association
(SIIA), offers a guide on Software Use and the Law (SPA 1997) which states it is intended to
provide.
Integrative Question:
Page | 47
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: On the Web, Plagiarism Matters More Than Copyright Piracy
Quote:
Plagiarism epidemic is mainly a result of a simple fact that the web has made plagiarism much
easier than it used to be in the print environment. Cronin (2003)
Lesson Expectation:
There are worrisome trends in the behaviour and attitudes of students towards
plagiarism and cheating in their academic work. A new term ”cyber-plagiarism” has since been
introduced to describe the process by which students copy ideas and information from the
Internet without giving attribution, or downloading.
Review:
This includes using others’ ideas, information without giving credit and
acknowledgement. It is clear that piracy is the infringement of copyright, and plagiarism is the
failure to give credit to the author. However, many people easily get confused between those
two terms, and one may usually commit both offences. It would be plagiarism but not piracy for
us to take the works of an obscure 18th century poet and try to use them as our own. Since the
copyright will have expired on such works, this is not piracy. Most people are aware that taking
the exact texts or words of another person without attribution is plagiarism, but they then believe
that paraphrasing the original work is acceptable.
Yet taking someone else’s idea and changing the words is like stealing a car and
changing its colour. However, literary works that are stolen differ in many ways from physical
properties that are the targets of ordinary theft. Ideas are less tangible and identifiable than
physical objects. There is hardly a clear way to determine which idea counts as a brand new
and which requires acknowledgment as a variation on old ideas.
Page | 48
CYBER ETHICS | Marie Antoinette Arriola
Lesson learned:
We may remember ideas without remembering where they come from because without careful
notations, recalling a source is much more difficult than recalling the idea itself. Therefore it is
not easy to totally avoid unintentional plagiarism. However, beside the careless paraphrasing or
accidental misleading citations, there are other harmful plagiarism acts that are negatively
influencing the scholarly communities.
Integrative Question:
1. What is plagiarism?
2. What is piracy?
3. What is copyright?
4. Which is more grave: plagiarism or copyright?
5. What is cyber-plagiarism?
Page | 49
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“It is important to our company that you know our exact process we take for the education and
understanding on how is the ethical evaluation on web site Linking”
Learning Expectation:
Web Site linking we use this SEO strategy to navigate people to other pages within the
website for the relevant information they are looking for. This improves navigation and link back
popularity as well. This procedure is not a huge factor in our search engine optimization
services but we have found it very functional for the end user getting them where they want to
be in a site for information they may be looking for and possibly get the website owner the sale
or lead in that specific area. In case people do not understand me on this an interior link can be
spotted as a underlined or highlighted keyword on a specific page that moves you to another
URL on that website.
Review:
The person or team of people for that company on the most important keywords they
would like to rank high for. Nine out of ten times we find that the keywords the companies like to
see are not their only main or lateral phrases for keyword placement and top search engine
rankings. In fact I have had keywords come across to me that really have no relevancy to their
web sites goals for success.
Scam and Spam search engine optimization companies eat this up because they realize
that some words have no competition to them and can be achieved with very little effort, and if
you're locked into their contract, you will sometimes have to shell out more money because they
claim they have much more to do.
Page | 50
CYBER ETHICS | Marie Antoinette Arriola
Lessons Learned:
The Directory is developed to increase traffic and search engine popularity by targeting
other websites to point back to your website. This will also help to improve traffic by other
audiences finding your website through another site on the World Wide Web.
Integrative Questions:
Page | 51
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Learning Expectation:
Review:
In his works (including "Cathedral"), Eric makes a very one-sided analysis of software
engineering methodologies. It's a complete ra-ra piece which fails to seriously address the very
many shortcomings of open-source development, including, most critically, the inability to scale
timewise as well as commercial software (while not under the GNU licence, two years ago
Raymond was predicting the success of the open-source Mozilla browser initiative, which is at
this point a complete fiasco
Lessons Learned:
The people should be getting out of this book (or a book like this) is a balanced,
informed view of open source vs commercial software, undertaken with sound research on
various cost/effectiveness metrics and some case studies.
Page | 52
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
Page | 53
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: Towards a Theory of Privacy for the Information Age
Quote:
Few students enter college fully understanding the relationship between plagiarism and
the rules about quoting, paraphrasing and documenting material” (Wilhoit, 1994).
Lesson Expectation:
The web environment and use more online resources for research, the need for
protections against plagiarism increases. Because of the volatility characteristic of the web
environment, it is usually difficult to establish or preserve the provenance.
Review:
The Cathedral and the Bazaar, the most important computer programming thinking to
follow the Internet revolution. But it would be more unfortunate to overlook the implications and
long-term benefits of his fastidious description of open-source software development
considering the growing dependence businesses and economies have on emerging computer
technologies.
Lesson learned:
The integrity of the Internet and academic communities is severely damaged. The main
reason why students get away with internet plagiarism is that we lack of resources to monitor
cheating, and the examiners have to mark too many papers thus cannot give enough attention
to each submitted work. Tools that provide automatic detection of plagiarised works can greatly
improve the situation. Therefore, computer professionals can provide great help.
Integrative Question:
Page | 54
CYBER ETHICS | Marie Antoinette Arriola
Page | 55
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: The Structure of Rights in Directive 95/46/ec on the Protection of the
individuals with regard to the Processing Personal Data and the free movement of such Data
Quote:
Lesson Expectation:
Review:
The principles of personal data protection established in the Directive 95/46/EC were
implemented into the Polish legal order by the Act of 29 August 1997 on the Protection of
Personal Data The Act on Personal Data Protection introduced detailed rules on personal data
protection in Poland, and up to 1 May 2004, i.e. up to Poland’s accession to the European
Union, included in the Polish legal order all principles specified in the Directive 95/46/EC of the
European Parliament and of the Council. The provisions of the Act have been in force since 30
April 1998.Implementation of the provisions on personal data protection into the Polish legal
system allowed Poland to sign in April 1999 and to ratify in May 2002 the Convention No. 108 of
the Council of Europe. Those activities reflected increasing democratisation of public life in
Poland as well as concern for the protection of privacy of its every citizen.
Lesson Learned:
The Community specified the constitutional right to decide on the fact to whom, in what
scope and for what purpose we give our personal data, and gave statutory guarantees of
compliance with this right by providing the data subjects with measures used for exercise of this
right and competent authorities and services – with the legal remedies which guarantee
compliance with this right.
Page | 56
CYBER ETHICS | Marie Antoinette Arriola
Integrative Question:
Page | 57
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: Privacy, Individuality, Control of information, and Privacy –enhancing
Technologies
Quote:
Learning Expectation:
Privacy has broad historical roots in sociological and anthropological discussions about
how extensively it is valued and preserved in various cultures. Moreover, the concept has
historical origins in well known philosophical discussions, most notably Aristotle's distinction
between the public sphere of political activity and the private sphere associated with family and
domestic life.
Review:
According to one well known argument there is no right to privacy and there is nothing
special about privacy, because any interest protected as private can be equally well explained
and protected by other interests or rights, most notably rights to property and bodily security
(Thomson, 1975). Other critiques argue that privacy interests are not distinctive because the
personal interests they protect are economically inefficient (Posner, 1981) or that they are not
grounded in any adequate legal doctrine (Bork, 1990).
Other commentators defend privacy as necessary for the development of varied and
meaningful interpersonal relationships (Fried, 1970, Rachels, 1975), or as the value that
accords us the ability to control the access others have to us (Gavison, 1980; Allen, 1988;
Moore, 2003), or as a set of norms necessary not only to control access but also to enhance
personal expression and choice (Schoeman, 1992), or some combination of these (DeCew,
1997). Discussion of the concept is complicated by the fact that privacy appears to be
something we value to provide a sphere within which we can be free from interference by
Page | 58
CYBER ETHICS | Marie Antoinette Arriola
others, and yet it also appears to function negatively, as the cloak under which one can hide
domination, degradation, or physical harm to women and others.
Lessons Learned:
The feminist critique of privacy, yet it can be said in general that many feminists worry
about the darker side of privacy, and the use of privacy as a shield to cover up domination,
degradation and abuse of women and others. If distinguishing public and private realms leaves
the private domain free from any scrutiny, then these feminists such as Catharine MacKinnon
(1989) are correct that privacy can be dangerous for women when it is used to cover up
repression and physical harm to them by perpetuating the subjection of women in the domestic
sphere and encouraging nonintervention by the state.
Integrative Questions:
Page | 59
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: Toward and Approach to privacy in public: Challenges of Information
technology
Quote:
Privacy provides the necessary context for relationships which we would hardly be human if we
had to do without-the relationships of love, friendship and trust. Charles Fried
Lesson Expectation:
The articles discuss the importance of privacy in public. It also highlights philosophical
views that necessitate the importance of privacy in public. Further more, it also discusses the
lack of privacy in the computer technology.
Review:
Page | 60
CYBER ETHICS | Marie Antoinette Arriola
Privacy insulates people from this kind of accountability and thereby protects the realm
of the personal". Schoeman, unlike Fried (1984) however, holds that there are domains of life
that are essentially private and not merely determined to be so by social convention.
Lesson Learned:
The views of Schoeman, Fried, and Gerstein, though differing in detail, rest on a
common core. Each held that properly functioning, psychically healthy individuals need privacy.
Privacy assures these people a space in which they are free of public scrutiny, judgment, and
accountability, and in which they may unselfconsciously develop intimate relationships with
others.
Integrative Question:
Page | 61
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“The rights and requirements make no sense regarding anonymous data and group
profiles.”
Lesson Expectation:
To be able to define KDD and its impact to the society. In addition to be able to understand its
importance and its effect to individuals. And lastly, to understand the importance of privacy.
Review:
Sometimes, these theoretical views on informational privacy are not much more than
implicit assumptions. However, things are different and more articulate where theorists define
informational privacy as being in control over (the accessibility of) personal information, or
where they indicate some kind of personal freedom, such as the preference-freedom in the vein
of John Stuart Mill's individuality, as the ultimate point and key value behind privacy (see, for
instance Parent, 1983 and Johnson. 1989).These theorists consider privacy to be mainly
concerned with information relating to designating individuals. The protective measures
connected to that definition to the KDD process is not without difficulties. Of course, as long as
the process involves personal data in the strict sense of data relating to an identified or
identifiable individual, the principles apply without reservation.
For instance, the right of rectification applies to the personal data in the strict sense
itself; it does not apply» information derived from this data.
Lesson Learned:
It should be observed that group profiles may occasionally be incompatible with respect
to individual privacy and laws and regulations regarding the protection of personal data, as it is
commonly conceived of. For instance, distributive profiles may sometimes be rightfully thought
of as infringements of (individual) privacy when the individuals involved can easily be identified
through a combination with other information available to the recipient or through spontaneous
recognition.
Page | 62
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
1. What is KDD?
2. What is privacy?
3. What is individuality?
4. What is fairness?
5. What is a distributive profile?
Page | 63
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Data mining is that when data about the organization’s processes becomes readily available, it
becomes easy and therefore economical to mine it for new and profitable relationships.
Lesson Expectation:
Can data privacy and data mining coexist? This paper began with an attempt to define
the concept of data mining and privacy. And it goes on to explore how exactly data mining can
be a threat to privacy, and especially how the Internet is currently associated with the tension
between data mining.
Review:
Thus, businesses became interested in collecting and managing consumer’s data. Data
mining is a valuable tool for business. Before we discuss its relation to privacy, it will be helpful
to cover what is data mining. Though the term data mining is relatively new, data mining attracts
tremendous interest in commercial market place. Lots of businesses pay attention to data
mining recently. Why are data mining and data warehousing mushrooming so greatly now?
According to Cavoukian (1998), data mining is usually used for four main purposes: (1)
to improve customer acquisition and retention; (2) to reduce fraud; (3) to identify internal
inefficiencies and then revamp operations, and (4) to map the unexplored terrain of the Internet.
Generally, data mining seems a survival strategy for companies in these days. Indeed, Erick
Brethenoux, research director for advanced technologies at the Gartner Group, calls data
mining as “necessary for survival.”
Lesson Learned:
Whenever we shop, use credit card, rent a movie, withdraw money from ATM, write a
check and log on the Internet, our data go somewhere. Virtually, every aspect of our life
discloses information about us. With the development of computing and communication
technology, now data can be captured, recorded, exchanged, and manipulated easier than
before. By one estimate, the amount of information in the world doubles every 20 months, and
that means the size of databases also does, even faster.
Page | 64
CYBER ETHICS | Marie Antoinette Arriola
Integrative Question:
Page | 65
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“Each person is to have an equal right to the most extensive basic liberty compatible
with a similar liberty for others.”
Learning Expectation:
The employee had no reasonable expectation of privacy: “unlike urinalysis and personal
property searches, we do not find a reasonable expectation of privacy in email communications
voluntarily made by an employee to his supervisor over the company e-mail systems
notwithstanding any assurances that such communications would not be intercepted by
management.
Review:
Traditionally accepted that employers have a right to engage in such activities. At the
foundation of this view is a conception of the employment relationship as involving a voluntary
exchange of property. The employer agrees to exchange property in the form of a wage or
salary for the employee’s labor. Conceived as a free exchange, the employment relationship, in
the absence of some express contractual duration requirement, can be terminated at will by
either party for nearly any reason.
Exceptions to the employment-at-will doctrine include firing someone for serving on jury
duty, for reporting violations of certain federal regulations, or for impermissible race, sex, or age
discrimination on the employer’s part. Rawls argues that fair terms of cooperation are most
likely to be chosen from behind a veil of ignorance, which he describes as follows: “no one
knows his place in society, his class position or social status, nor does any one know his fortune
in the distribution of natural assets and abilities, his intelligence, strength, and the like. Nor
again does anyone know his conception of the good, the particulars of his rational plan of life, or
even the special features of his psychology such as his aversion to risk or liability to optimism or
pessimism
Page | 66
CYBER ETHICS | Marie Antoinette Arriola
Lessons Learned:
More than this, I assume that the parties do not know the particular circumstances of
their own society. That is, they do not know its economic or political situation, or the level of
civilization and culture it has been able to achieve. The persons in the original position have no
information as to which generation they belong. In order to carry through the idea of the original
position, the parties must not know the contingencies that set them in opposition.
Integrative Questions:
Page | 67
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“Clearly in a small group it is easier to spot the free rider and sanction him in one of
many possible ways once he is identified than in a large group, where he can hide in the crowd”
Learning Expectation:
Review:
The privacy issue is concerned more specifically with the question how to balance the
claims of those who want to limit the availability of personal information in order to protect
individuals and the claims of those who want to make information about individuals available in
order to benefit the community. This essential tension emerges in many privacy discussions,
e.g. undercover actions by the police on the internet, use of Closed Circuit Television in public
places, making medical files available for health insurance purposes or epidemiological
research, linking and matching of databases to detect fraud in social security, soliciting
information about on-line behavior of internet users from access providers in criminal justice
cases.
Page | 68
CYBER ETHICS | Marie Antoinette Arriola
Those who are responsible for managing the public goods therefore insist on removing
constraints on access to personal information and tend to relativize the importance of privacy of
the individual.
Lesson Learned:
Whether IT really delivers the goods is not important for understanding the dynamics of
the use of personal data. The fact that it is widely believed to be effective in this respect is I
think sufficient to explain its widespread use for these purposes.
Integrative Question:
Page | 69
CYBER ETHICS | Marie Antoinette Arriola
Quote:
the purchase of a home in a particular neighborhood to inquire about the number of burglaries
and violent crimes in the area. Just as these data provide important information for communities
in the "real world,"
Learning Expectation:
Access to reliable and timely computer crime statistics allows individuals to determine
their own probability of victimization and the threat level they face and helps them begin to
estimate probable recovery costs. Law enforcement organizations traditionally have taken a
leading role in providing crime data and crime prevention education to the public, which now
should be updated to include duties in cyberspace.
Review:
Patrol officers and detectives use this data to prevent future crimes and to apprehend
offenders. Therefore, to count computer crime, a general agreement on what constitutes a
computer crime must exist.
Thus, homicide detectives count the number of murders, sexual assault investigators
examine the number of rapes, and auto detectives count car thefts. Computer crime, on the
other hand, comprises such an ill-defined list of offenses that various units within a police
department usually keep the related data separately, if they keep them at all. For example, the
child abuse unit likely would maintain child pornography arrest data and identify the crime as the
sexual exploitation of a minor. A police department's economic crimes unit might recap an
Internet fraud scam as a simple fraud, and an agency's assault unit might count an on-line
stalking case as a criminal threat.
Lesson Learned:
Usually, people accurately report serious crimes, such as homicide, armed robbery,
vehicle theft, and major assaults. Many other criminal offenses, however, remain significantly
Page | 70
CYBER ETHICS | Marie Antoinette Arriola
underreported. Police always have dealt with some underreporting of crime. But, new evidence
suggests that computer crime may be the most underreported form of criminal behavior
because the victim of a computer crime often remains unaware that an offense has even taken
place. Sophisticated technologies, the immense size and storage capacities of computer
networks, and the often global distribution of an organization's information assets increase the
difficulty of detecting computer crime.
Integrative Question:
Page | 71
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Attacks on government and corporate sites can be justified as a form of political activism – that
is, as a form of “hacktivism.” The argument is roughly as follows.
Learning Expectation:
Review:
The effect of the protest in Washington was that many persons might have been late to
work – losses that are easily made up. An attack that shuts down a busy commercial or public
website for a few hours can easily affect hundreds of thousands of people
Lesson Learned:
The victims of such an attack, as well as third-parties, have a right to know exactly what
position is motivating the attack and why anyone should think it is a plausible position.The
willingness to impose morally significant costs on other people to advance fringe positions that
are neither clearly articulated nor backed with some sort of plausible justification is clearly
problematic from a moral point of view. It seems clear that such behavior amounts, at least in
most cases, to the kind of arrogance that is problematic on ordinary judgments
Integrative Question:
1. Why might companies who try to privatize the internet be intimidated by hacktivism?
2. What is the difference between a hacktivist and a cyberterrorist? How can one
differentiate the two?
3. Should the laws regarding hacktivism be loosened? Explain your answer.
Page | 72
CYBER ETHICS | Marie Antoinette Arriola
4. How does M&G's notion of hacktivism fare under the various ethical frameworks we
studied in Chapter 1, in particular: Johnson's ``three rules'' (Ethics On-Line), Moor's
``reason within relative frameworks'' (Reason, Relativity and Responsibility...), his Just
Consequentialism..., Brey's Disclosive Computer Ethics, and Adam's ``feminist ethics''
(Gender and...) ?
5. Define hacking.
Page | 73
CYBER ETHICS | Marie Antoinette Arriola
Quote:
A rich history of justificatory ideas ranging from duty (deontology) to utility (teleology) to the
individual character (virtue ethics). It is not the purpose of this paper to engage in the ethical
discourses surrounding privacy and security but only to demonstrate their relevance by
explicating some of the more frequently used arguments.
Lesson Expectation:
The main argument of this paper is that there are discourses concerning privacy and
security that focus on the ethical quality of the concepts and that the resulting ethical
connotation of the terms is used to promote particular interests. In order to support this claim, I
will briefly review the literature on privacy and security, emphasizing the ethical angle of the
arguments.
Review:
We value privacy as well as security because they represent moral values which can be
defended using ethical arguments. This paper suggests that the moral bases of privacy and
security render them open to misuse for the promotion of particular interests and ideologies. In
order to support this argument, the paper discusses the ethical underpinnings of privacy and
security.
It will then introduce the critical approach to information systems research and explain
the role of ideology in critical research. Based on this understanding of the centrality of ideology,
the paper will discuss the methodology of critical discourse analysis which allows the
identification of instances of ideology. This will then lead to the discussion of an ideology critique
based on Jürgen Habermas's theory of communicative action, which will be applied to the
websites of Microsoft Vista and Trustworthy Computing.
Page | 74
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
I then suggested that these moral qualities render the concepts open to be used to
promote certain ideologies. In the final step, I have attempted a brief critical discourse analysis
on Haberma's Theory of Communicative Action to support the suspicion that the moral nature of
privacy and security can be used for ideological purposes.
Integrative Question:
Page | 75
CYBER ETHICS | Marie Antoinette Arriola
Quote:
The information they divulge to others in various transactions, and as a result, more capable of
protecting the possibility of anonymity.
Learning Expectation:
Although answers to this foundational question will not immediately yield answers, it is
essential to understanding what is at stake in the answer to these question
Review:
Specific cases that are regularly discussed includes ending electronic mail to an
individual, or bulletin board, without one's given name appearing in any part of the header
participating in a "chat" group, electronic forum, or game without one's given name being known
by other participants buying something with the digital equivalent of cash being able to visit any
web site without having to divulge one's identity
may enable people to reach out for help, especially for socially stigmatized problems like
domestic violence, fear of HIV or other sexually transmitted infection, emotional problems,
suicidal thoughts.
It offers the possibility of a protective cloak for children, enabling them to engage in
internet communication without fear of social predation or -- perhaps less ominous but
nevertheless unwanted -- overtures from commercial marketers. Anonymity may also provide
respite to adults from commercial and other solicitations. It supports socially valuable institutions
like peer review, whistle-blowing and voting.
Lesson Learned:
The concern I wish to raise here is that in a computerized world concealing or withholding
names is no longer adequate, because although it preserves a traditional understanding of
anonymity, it fails to preserve what is at stake in protecting anonymity.
Integrative Question:
1. What is anonymity?
2. What is pseudonym?
3. What is anonymity in a computerized world?
4. How is the concept different from that prior to the computerization of the society?
5. What's the difference between anonymity and pseudonimity?
Page | 77
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“Collecting medical data electronically requires, according to our moral belief, also some
kind of encryption.”
Learning Expectation:
. We skip the name and address; only the sex and the month-year of birth will be sent
from the doctor to the central database. Even the number of the patient in the doctors database
will be replaced, because once the doctor may be a researcher using the central database who
recognizes one of the patients based on the number.
Review:
The sender encrypts his message with his secret key firstly and with the public key of the
receiver secondly and afterwards he sends the message. The receiver must decrypt that
message first with his own secret key and second with the public key of the sender according to
the header. When the message is readable after this double decryption, one can be sure that
the message was meant to be received by the decrypting receiver and the message was really
sent by the sender named in the header of the message.
Lessons Learned:
In this paper we suggest additional features that network providers must incorporate in
the functionality of electronic message handlers. In fact we propose to add some 'intelligence' to
the virtual postbox: instead of automatically forwarding, the postbox must now be able to read
the sender from the header, select the appropriate public key from that sender, decrypt the
message with that public key, replace the senders identification and encrypt the message with
its own public key. On the receiver side (the central database) we have to decrypt the message
with the secret key of the virtual postbox and after that with the secret key of the central
database receiver.
Page | 78
CYBER ETHICS | Marie Antoinette Arriola
This procedure requires the availability of a list with only public keys at the virtual
postbox, as well as a program to intervene the electronic communication. Unfortunately, so far
none of the network providers is willing or has been able to implement it.
Integrative Questions:
Page | 79
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“Biometrics will soon hold the key to your future, allowing you and only you to access your
house, car, finances, medical records and workplace.
Learning Expectation:
The technology is easy to explain and trust. The primary advantage that signature
verification systems have over other types of biometric technologies is that signatures are
already accepted as the common method of identity verification.
Review:
Page | 80
CYBER ETHICS | Marie Antoinette Arriola
Lesson Learned:
Unlike your passwords, you will not forget your fingerprints, irises, or DNA when you go
to work. They are a part of you. They are also extremely distinguishable from another person’s
biometrics. This means that they can be used with great confidence. Since they are a part of
you they are difficult for another person to obtain or fake. They are also easy to use. All you may
have to do is put your finger into a device and it gives you access if you are authorized or
denies you if you aren’t. For these reasons and others, biometric systems are becoming more
mainstream and commonplace.
Integrative Questions:
Page | 81
CYBER ETHICS | Marie Antoinette Arriola
Page | 82
CYBER ETHICS | Marie Antoinette Arriola
Quote:
‘A Physician’s Guide To Medical Writing’, an ideal medical write up framed along ethical
considerations,”
Learning Expectation:
The emergence of certain negative trends in the practice of this profession poses a
threat to its ability to deliver quality contents with reliable information.
Review:
They play a vital role in relieving the writers of regulatory pressures involved in the
process. Properly includes technical exposition on any subject related to medical science, such
as biochemistry, pharmacologic studies, sanitation and psychoanalysis”. It is the responsibility
of the writer to include necessary technical details under regulatory limitations to establish a
level of understanding among the readers.
The client or the researcher should generate complete information on the academic
background of the writer before allotting the assignment. This helps a client to understand the
performance level that could be extracted from a writer. Regular communication with the writer
is an essential condition for the correct formulation of the content.
Lessons Learned:
In absence of such considerations it will be impossible for the clients to bridge the
communication gaps between them and the target audience. It is widely accepted by many
researchers that legal and ethical issues can play the role of obstacles in the progress of
marketing a research as they impose certain limitations on the utilization of research products.
Page | 83
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
Page | 84
CYBER ETHICS | Marie Antoinette Arriola
Quote:
Put in more general terms, the rights/obligations ethicist starts with rules stating obligations
about how one should behave and rights about how I am to be treated, while the virtue ethicist
starts with the human character and its ethical dispositions
Lesson Expectation:
There are several purposes of a code of ethics. Several principles that were suggested for the
code used imperative language.
Review:
Lesson Learned:
The software engineer as a practicing professional acts from a higher level of care for
the customer (virtue ethics) and conforms to the development standards of the profession
(right/obligations ethics).
Page | 85
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
Page | 86
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: No,Papa,: Why incomplete Codes of Ethics Are Worse Than None at
All”
Quote:
“Computer and information ethics”, in the broadest sense of this phrase, can be understood as
that branch of applied ethics which studies and analyzes such social and ethical impacts”
Learning Expectation:
Review:
Lessons Learned:
The problem is that by focusing on these four areas of concern, attention may be taken
away from other, potentially more important, moral issues. Not all important moral issues in
information technology can be put under those headings. Yet focusing on four areas gives the
erroneous impression that adherence to the moral requirements in those areas alone could
ensure moral rectitude.
Integrative Questions:
Page | 87
CYBER ETHICS | Marie Antoinette Arriola
Page | 88
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“A key factor is whether the subsumptionist can prevent a conscious victim from calling
for help, and whether or not the subsumptionist enjoys toying with a victim who is aware of the
process. “
Learning Expectation:
Of these, cannibalism is the closest equivalent. The attacker takes all of the victim's
memories, cognitive structures, and available computronium, and incorporates them into emself.
Review:
The very rare restored survivors of such treatment have compared it to such ancient
human practices as lobotomy, emasculation, or blinding, sometimes followed by various forms
of torture. Usually a subsumptionist simply causes a series of unexplained disappearances and
then moves on before eir activities are noticed. However, a particularly skilled subsumptionist,
who has can retained all of the victim's traits and memories intact, may conceal the crime from
outsiders for an indefinite period of time. Whether this is because such events are actually rarer
among transapients or whether this is because they are difficult for SI<1 observers to detect is
unknown.
On the other hand, it is not at all uncommon for lesser entities to be destroyed and/or
incorporated when a transapient ascends to a higher toposophic level. This is regarded as
subsumption (and also as a perverse transcend) in "civilized" parts of the Terragen sphere if the
participants are unwilling. It is considered a kind of voluntary amalgamation if they volunteer.
Volition under such circumstances is a slippery concept at best however; this provides rich
material for debates regarding the ethics and meta-ethics of such events.
Page | 89
CYBER ETHICS | Marie Antoinette Arriola
Lessons Learned:
The number of subsumption events known to have occurred between beings of higher
toposophic levels is relatively small.
Integrative Questions:
1. What is Subsumption?
2. What is the use of transapient?
3. How many numbers in subsumption?
4. Define subsumption?
5. What are the human practices?
Page | 90
CYBER ETHICS | Marie Antoinette Arriola
Quote:
“It will provide readers with a clear knowledge of the complex ethical issues involved in e-
business and improve their understanding of widely discussed current issues in e-business such
as those of privacy, information management, data mining, intellectual property, and consumer
tracking.”
Learning Expectation:
The internet has revolutionized business by fundamentally changing the means by which
businesses operate and enlarging the opportunities available to them to reach and service
customers. However, in doing so, the development and practice of e-business also raises a host
of ethical issues, such as those pertaining to information security, privacy, data mining, and
intellectual property.
Review:
As e-business models become more common in the world of business, there must be
an effort to integrate e-business more fully into the field of business ethics so that scholars and
professionals working in the field can better appreciate and respond to these ethical issues.
There thus exists a clear need for an edited collection of articles that provides a comprehensive
and thorough treatment of ethical issues in e-business.
Lessons Learned:
This book will aim to provide a comprehensive overview of the most important ethical
issues associated with the expanding world of e-business. Grounded solidly in the most recent
scholarship in business ethics, the book will apply the most relevant theoretical frameworks to
Page | 91
CYBER ETHICS | Marie Antoinette Arriola
ethical issues in all significant areas of e-business. The book will be written for scholars,
professionals, and students interested in gaining a better comprehension and appreciation of
the moral issues encountered in the multifaceted world of e-business.
Integrative Questions:
Page | 92
CYBER ETHICS | Marie Antoinette Arriola
Name of the Chapter: The Practitioner from Within: Revisiting the Virtues
Quote:
Learning Expectation:
In this paper, I want to take a different approach that emphasises individual human
flourishing – although moral values and behaviours will also be discussed in the context of this
approach. I want to investigate to what extent virtue ethics can ground a conception of the
good life and, correspondingly, the good society, in relation to uses of information technology.
Review:
First, Virtue Ethics has recently experienced a novel degree of academic and policy-
related attention in contemporary and ongoing work in the fields of political philosophy, freedom
and development studies, media and culture research, and economics. Originally revived and
re-introduced into moral philosophy by Elisabeth Anscombe around 1958, Virtue Ethics is
currently a central element in the work of, for instance, Nussbaum, Sen, Foot, and Solomon.
Where it does not form a fundamental part of inquiry it is nevertheless receiving critical attention
(e.g. Baron et. al 1997).
What is more – and as the paper will argue and endeavour to show – there are some
complimentarities between Virtue Ethics and the other dominant methods of ethics, particularly
some versions and elements of Kantianism. Virtue Ethics is particularly agent-focused and
agent-based. This arguably means that a Kantian moral dilemma in which an ethical subject
must choose between two first-order moral rules and necessarily, therefore, violate one of them
can at least be conceptually addressed by Virtue Ethics in that attention is paid to the
mechanisms and the underlying moral virtues by which a subject might decide over and
between different courses of action.
Page | 93
CYBER ETHICS | Marie Antoinette Arriola
Lessons Learned:
Virtue Ethics does afford the moral theorist the perhaps only contemporaneous ethical
account that might address the crucial questions over the ways and processes in which an
ethical subject might come to be ethical. In other words, it is important to ask in relation to all
major ethical traditions how and why an agent might variously choose to enter into a given
social and moral contract, or embrace universal rule-based moral systems, or indeed become
virtuous. Ethical subjects have histories and futures; they are engaged in development, identity-
and value-formation and self-reflection.
Integrative Questions:
Page | 94
CYBER ETHICS | Marie Antoinette Arriola
Page | 95
CYBER ETHICS | Marie Antoinette Arriola
Amazon Link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“The poor cannot participate in the benefits of globalization without an active engagement and
without access to products and services that represent global quality standards”- C. K.
Prahalad.
Learning Expectations:
I am expecting to learn what is meant by bottom of the pyramid. I also expects to learn
the reasons why the writer is confident about the potentials of the markets at BOP.
Review:
According to Mr. Prahalad, there have been many things being in done in solving the
global poverty problems. While he did not say that they are not effective, he implied that the
efforts are not enough. According to the writer there is a need to find a new approach. His
approach focused on the people at the bottom of the pyramid. These are people who live in
less than $ 2 a day.
In this approach the writer calls upon the partnership between the poor, civil society
organizations, governments, and large firms. The effort will involve creating a BOP market-
which is turning the poor into consumer markets. This approach is based on his assumptions
that : large companies have virtually ignored the poor who actually represents a latent market
for goods and services; the market at the bottom of the pyramid can provide a new growth
opportunity for the private sector and; that this market could become an integral part of its work.
Mr. Prahalad says that this market remains untapped because of the dominant logic held by
companies.
Lessons Learned
Although it has not been given much attention, we find that multinationals are reinventing
the consumer markets. They are now reaching the market at the bottom of the pyramid.
Page | 96
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions
2. What are reasons why poverty alleviation programs of the World Bank and other
nongovernment organization do not succeed in resolving this problem?
4. How can big companies benefit from the opportunities present in the markets at the lowest
economic pyramid?
5. What are the opportunities in the BOP markets according to Mr. Prahalad?
Page | 97
CYBER ETHICS | Marie Antoinette Arriola
Amazon Link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote :
“As a result the promise of emerging BOP markets has been largely illusionary ”- C.K. Prahalad
Learning Expectations
As reader, I expect to learn about what products and services the consumers at BOP
needs.
Review:
According to the writer, BOP market challenges the dominant logic of multinational
companies (MNC). He explained that small unit packages, low margin per unit, high volume
and high return on capital employed are the basic economics at BOP markets. He reiterated the
importance of understanding the BOP market, focusing on their needs. He went on to say that
the approach towards this market is to understand the needs of the people in this market and
then tailored the product and the manufacturing process around these needs. Companies are
challenge to innovate. For this reason, he formulated the 12 principles of innovation. The first
is creating a new price –performance envelope; hybrid solutions; scale of operations; identifying
functionally; sustainable development; process innovation; deskilling of work; education of
consumers; designing for hostile infrastructure; interfaces; distribution and delivery.
The chapter simply emphasis that companies need to discard their biases of the BOP
market. These markets has the same needs as those in the developed markets but were only
disregarded because of the dominant logic that the companies and private sector have about
the poor consumer market. However, there are many realities in the market that the companies
need to understand. The needs of the market should be understood against the characteristics
of the consumers. The companies need to adapt and innovate against these realities.
Lessons Learned
The writer clearly pointed out that companies need also to throw away their prejudices
against the people at the bottom of the pyramid since they represent a latent market force.
Page | 98
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions
1. Why is it important for the companies to understand about the realities and needs of
BOP markets?
2. What are the 12 principles of innovation formulated by Prahalad?
3. What is meant by zero-based view?
4. What makes BOP market attractive ?
5. To be involved at BOP markets what is required of the companies’ managers?
Page | 99
CYBER ETHICS | Marie Antoinette Arriola
Amazon Link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“ BOP markets are great source for experimentation in sustainable development”- C.K.
Prahalad
Learning Expectations:
I am expecting to learn about the global opportunity present at the BOP market.
Through this chapter, we wish to understand the principles of innovation needed in developing
the market at BOP.
Review
Doing business in the markets at BOP offer challenges and global opportunities for
companies. However, involvement in BOP markets challenges assumptions or dominant logic
that companies have developed for long period of time. The enthusiasm for BOP markets is
based on the opportunities that are presented.
First, markets in most countries at BOP are large and attractive and stand-alone entities.
He also believes that many local innovations can be leveraged across other BOP markets
creating a global opportunity for local innovations; some innovations from these markets may be
applied in developed markets; and lessons from the BOP markets can influence the
management practices of global firms. The traditional approach of many global companies is to
start from the business models fitted for developed markets then adopt in the BOP markets. But
this is bound to fail because it does not consider the realities and needs of these markets.
Lessons Learned:
I have learned about what companies must do in order to engage in BOP markets.
Page | 100
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
Page | 101
CYBER ETHICS | Marie Antoinette Arriola
Amazon Link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“It is reasonable to expect that 4 billion people in search of an improved quality of life will create
one of the most vibrant growth markets we have ever seen”-C.K. Prahalad.
Learning Expectations:
I expect to learn about the market-oriented ecosystem. We expect that the writer
explains the significance of the symbiotic relationship within the system.
Review
Lessons Learned
The symbiotic relationship between them is a way of creating wealth. In the market-
oriented system includes nodal firms that provide the tools for improving the lives of the poor.
Page | 102
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
Page | 103
CYBER ETHICS | Marie Antoinette Arriola
Amazon Link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
Learning Expectations:
I expect to know the different spectrum of TGC and the four requirements in building
TGC.
Review:
There are four criteria for transparency in transactions. There must be access to
information and transparency for all transactions. There should be clear processes so that
selective interpretation by bureaucrats is reduced if not eliminated. Speed with which the
processes can be completed by citizens and trust in the system.
On one hand the different spectrum of TGC include countries that are arbitrary and
authoritarian; countries where laws and institutions of market economy exist but do not reach
their potential; and countries with well-developed laws, regulations, institutions and enforcement
systems. Enhanced TGC showed that regulations and government business processes can be
simplified and interconnected systems will be able to identify pockets of graft and corruption.
From the experience of Andhra Pradesh the lesson drawn indicate building trust is essential.
And that citizens must feel that changes are taking place.
Lessons Learned
Page | 104
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
1. What is the importance of TGC in the fight against poverty and corruption?
2. What are the criteria for transaction governance capacity?
3. What are the specifications for TGC?
4. What are the different spectrums of TGC?
5. What are the lessons drawn from the experiences of Andhra Pradesh on TGC?
Page | 105
CYBER ETHICS | Marie Antoinette Arriola
Amazon Link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“ When the poor are treated as consumers, they can reap the benefits of respect, choice, and
self-esteem and have an opportunity to climb out of the poverty ”
Learning Expectations:
I intend to understand the effects of social transformation on the people at the BOP.
Review
One of the impact of transforming BOP into market is gaining legal identity. This is
denied to them in the past. Without this identity consumers cannot access the services. The
social transformation that is taking place in markets where the public and private sectors have
been involved at the BOP is impressive.
This will transform the economic pyramid into diamond. There will always be rich, but
the measure of development is the number of people in a society who are considered middle
class. There will not longer be BOP.
Lessons Learned
The poor people will no longer belong to the bottom of the pyramid but inside the
diamond as middle classes.
Page | 106
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
Page | 107
CYBER ETHICS | Marie Antoinette Arriola
The HANDBOOK of
information and computer
ethics
Page | 108
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“The more people have become accustomed to living and working immersed within digital
environments, the easier it has become to unveil new ethical issues involving informational
realities. “
Learning Expectation:
I expect to learn the foundation of the information technology ethics. Since this is
something that is rarely discussed, it will be an interesting topic.
Review:
Our world today had a lot of differences way back before computers were invented. We
must admit that our scope of thoughts had become and is becoming more diverse each day,
and so as the ethical responsibilities we have for each other and for the society.
In the use of machines and programs, it always seems that having a lot of resources or
information is the best solution to come up with a better idea. Sometimes, in order for us to
create a more practical solution to the problems, we need to focus on few areas and use very
relevant information only. Sometimes knowing everything can also create problems to those
people who happen to a lot of information because in a situation wherein they need to make
decisions, sometimes, the factors that may affect the outcome will be considered in detail so the
span of time spent in making a decision will be increased compared to the normal time spent.
Because of the increase in numbers of the users of technology, the scope for information
ethics also expanded. Hacking has been a major issue. Though the use of the information is not
the main concern but the unauthorized access which invades the privacy of the information
owner or of the system owner.
Information ethics is a patient-oriented. Meaning information ethics does not only give
importance or protection only to the human beings but to all life forms.
Page | 109
CYBER ETHICS | Marie Antoinette Arriola
I have learned that information ethics is a very complicated subject and that includes
many aspects that concerns morality that every IT professionals should consider.
5 Integrative Questions:
Citation/s: N/A
Page | 110
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“To live well, according to Wiener, human beings must be free to engage in creative and flexible
actions that maximize their full potential as intelligent, decision-making. “
Learning Expectation:
I expect to learn what Norbert Weiner’s explanation for cyber ethics and I expect to learn
the basis for the term used and if there are further definition for cyber ethics.
Review:
In this chapter, it is said that, in Weiner’s point of view, humans are expected to act
more differently than any other species in the world because of a higher intellect that humans
possess compared to insects or animals. Humans are also able to adapt to the changes that
happens in the environment.
There are three principles Weiner had developed. First is the Principle of Freedom. It
means that humans should explore and do not limit himself in achieving success. He should
seek all possibilities to reach his goals. The second principle is Principle of Equality means that
what belongs to a person should remain his no matter what situation he’ll be into. The third
principle is The Principle of Benevolence. This principle says that in justice, there should be
good will between man and man.
According to Weiner, success of human beings is only possible when humans interact
socially and participate in activities that share the same interest and personalities with them.
Page | 111
CYBER ETHICS | Marie Antoinette Arriola
I have learned that the success of humans also depends on how active we are on the
society. And success is better achieved when we participate with people with the same ideas
and personalities.
5 Integrative Questions:
1. What is Weiner’s idea of cyber ethics?
2. What are the three principles of justice according to Weiner?
3. How can humans achieve success?
4. What is expected from humans?
5. Where does the success of humans regardless of the varied culture depend?
Citation/s: N/A
Page | 112
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“if the Internet and the WorldWideWeb are introduced into the lives of children, their lives will be very
different from the childhood of people who grew up without online computer games”
Learning Expectation:
Review:
Computer ethics is a form of applied or practical ethics. It studies the moral questions
that are associated with the development, application, and use of computers and computer
science. Computer ethics is basically about the proper use of computers and related
technology. The definition of technology depends on the area or subject it is applied with. With
the different applications, software and other technology that users can apply or utilize, the
morality is difficult to implement.
One of the most controversial issues in cyber ethics is privacy. It is difficult to distinguish
or to implement fair use in today’s cyber world because of the common application that most
users are using like the peer-to-peer programs.
The problem with the implementation of ethics to the current problems of the information
technology is that only one method is being applied when not all problems can be addressed by
one ethical method. Wheat we need to learn is to apply ethical methods without generalizing.
Page | 113
CYBER ETHICS | Marie Antoinette Arriola
I have learned that it is very difficult to apply ethical solutions to the problems that we
have especially if the problem is something that most people have learned to use mos of the
time.
5 Integrative Questions:
1. What are the methodologies in ethics?
2. What is the best methodology to apply?
3. Is it possible to have one methodology for all ethical problems?
4. What is the danger in the methodologies?
5. Does technology need to be the ones adapting all the time?
Citation/s: N/A
Page | 114
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Technical mechanisms will often adjudicate multiple if not conflicting values, often in the form of
design trade-offs. We have found it helpful to make explicit how a design trade-off maps onto a
value conflict and differentially affects different groups of stakeholders.”
Learning Expectation:
I expect to learn what value sensitive design is and how design in technology will need
ethical concepts.
Review:
Value Sensitive Design is concern with designing of technology with the need of having
to consider the human values. But what is value? Value is commonly defined as a worth for an
object, in this chapter, value means something that is important for people.
Weiner argued that we can become better human beings if we do not allow ourselves to
be consumed too much by the technology we use. Computer ethics is where we study the effect
of technology in the lives of humans. It guides us to what the decisions and proper actions that
should be done in the cyber world.
Conceptual investigation includes the question on whether the designs should be based
on the moral values or should it be based in the aesthetic value. It said in this chapter that the
trust of people depends on three aspects. The use of value sensitive design is beneficial for or
to whom it is intended for, but it can also invade the privacy of other people which can also
become another issue for cyber ethics.
Page | 115
CYBER ETHICS | Marie Antoinette Arriola
I have learned that we should not put aside the value when designing systems and in
using technology because there will always be a way where we can affect someone.
5 Integrative Questions:
1. What is value sensitive design?
2. Who are the stakeholders?
3. Why is it important to consider the stakeholders in designing?
4. Is there a disadvantage in designing systems?
5. How is human values implemented in system designing?
Citation/s: N/A
Page | 116
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Arguments for intellectual property rights have generally taken one of three forms. Personality
theorists maintain that intellectual property is an extension of individual personality.”
Learning Expectation:
I expect to learn what intellectual property rights is and what are the problem arising in
this area in the field of technology. I am also expecting to learn what are the different
justifications and its meanings.
Review:
Intellectual property is protected usually by copyright, patent and trade marks. These are
usually used for literary works, inventions, computer software and more. Patent is the most
secured protection based on the book. The rights included on patents owners are the right to
make, the right to use, the right to sell, and the right to authorize others to sell the patented item.
Patent also do not allow others to use or to produce materials that has been patented already.
The Lockean principle in protecting the intellectual property states that every person has
the right to his own labor. It is also said that if a person’s own labor is joined into an object even
though it does not belong to him, or it is not a product of his work, then the product still belongs
to him. John Locke had said “For this labor being the unquestionable property of the laborer, no
man but he can have a right to what that is once joined to, at least where there is enough and as
good left for others.” This statement says that if one had worked for something, then he has the right to
Page | 117
CYBER ETHICS | Marie Antoinette Arriola
own its product for as long as he does not claim everything and that there’s still something that remains
for others.
I have learned the three ways in justifying protection of intellectual property rights and
their advantages and disadvantages.
5 Integrative Questions:
1. What is intellectual property?
2. How is IPR violated?
3. What are the three definitions of IP based on the three ideas?
4. How is IP protected?
5. What is the strongest type of IP protection?
Citation/s: N/A
Page | 118
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“We demand recognition of our right to privacy, we complain when privacy is invaded, yet we
encounter difficulties immediately [when] we seek to explain what we mean by privacy, what is
the area, the content of privacy, what is outside that area, what constitutes a loss of privacy, a
loss to which we have consented, a justified loss, an unjustified loss.”
Learning Expectation:
I expect to learn the key concepts, theories and the controversies that concern the
information privacy.
Review:
Having a good and clear understanding of what is privacy is an important. Moor argued
that privacy has an evolving concept and its “content” is often influenced by the “political and
technological features of the society’s environment.” We all know that technology is as the same
way. And with the advances that continue to happen in the field of technology, it is unavoidable
that privacy can become an issue. In the previous chapter, a common example is the peer-to-
peer programs.
In this chapter, it is argued whether privacy is a right or an interest for a person. Privacy
are of four kinds. First is the Physical privacy wherein it is about the damages that can be done
in a person physically when evading privacy. The Second example is Decisional privacy which
states that a person has his own freedom to have his own ideas and that one must not influence
the choices made by another. The third kind is psychological privacy which is somewhat the
same with the previous kind of privacy but it is defined in the book that a person is confined into
his own thinking and that he cannot influence the way others think. The fourth and last kind of
privacy is informational privacy includes the restriction in facts where there are certain records
or documents that can only be accessed by limited or authorized people.
Page | 119
CYBER ETHICS | Marie Antoinette Arriola
I have learned a different definition of privacy. I have also learned the types of privacy
and the theories that it has.
5 Integrative Questions:
1. What is privacy?
2. What are the theories in information privacy?
3. What are the types of privacy?
4. What is decisional privacy?
5. What is Informational Privacy?
Citation/s: N/A
Page | 120
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“The term anonymity has been used to denote a number of related things: namelessness,
detachment, unidentifiability, lack of recognition, loss of sense of identity or sense of self, and so
on.”
Learning Expectation:
I expect to learn the meaning of anonymity and how can it become useful. I also expect
to learn more facts on the importance of online anonymity.
Review:
Anonymity can also be brought about in a variety of ways and there are many purposes,
both positive and negative, that anonymity could serve, such as, on the positive side, promoting
free expression and exchange of ideas, or protecting someone from undesirable publicity or, on
the negative, hate speech with no accountability, fraud or other criminal activity. This excerpt
from the book explains that anonymity has two sides and has two possible outcomes. Same as
anything, anonymity can be positive or negative depending on the purpose of using or
implementing it. There are certain situations that calls for anonymity, like for security purposes.
It can become negative if the purpose is to harm others or to retrieve restricted information.
Anonymity online is easily done because of the options that internet users have. Most of
the programs online can allow the users to create pseudonyms or aliases to conceal their real
identities. This can become a problem when used in an illegal way like scams and other types
of fraud activities. Online anonymity does not only affect in legal aspects, it also affects the way
of human communication where the bonds of human communication is weakening because
online users are detached from having a good relation with another human because of the
possible wrong information that they post or give online.
Page | 121
CYBER ETHICS | Marie Antoinette Arriola
I have learned that anonymity can become useful and harmful at the same time. I also
learned that the advances in technology also make it harder to identify correct and reliable
information because of the lack of proper sources.
5 Integrative Questions:
1. What is anonymity?
2. What is the advantage of being anonymous?
3. How can anonymity be implemented?
4. Is anonymity legal?
5. What are the advantages of using anonymity online?
Citation/s: N/A
Page | 122
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Expressive conduct is subject to more stringent moral limits than those to which pure speech is
subject. The reason for this has to do with the effects of these different kinds of act.”
Learning Expectation:
I expect to learn the definitions of terms hacktivism and counterhacking. I would also like
to learn the concepts of hacking and if there are advantages in doing it.
Review:
Hacking is a negative action to anyone who had heard of it before. Hacking is the
intrusion in the property of other people. Hacker is the term used in referring to the person who
does the invasion of property. According to the book, there are two arguments in the definition,
hacking can also be acceptable if the purpose that it is done is for the purpose of protecting
one’s property. The second argument in the term trespassing is that, trespassing includes the
physical act of entering into someone else’s property. But it is not applicable in the digital area
because the hacker does not physically intrude in someone else’s digital file or account but it is
the access of a private account that hacker does.
Though any act of illegal access to someone’s property is impermissible, there can still
be some acceptable situations such as if the unpermitted access to information is needed for
the safety and welfare of others, then it is acceptable.
Hacking does not only connote illegal activities. Hacker can perform hacking to ensure
the safety of one’s network. Hacking can also be done to improve the security of a network and
see if there are possible threats or ways that can be used by the intruders. Hacktivism is the
term used in the activity if using hacking to promote an idea to an author or an act to show
deviation.
Page | 123
CYBER ETHICS | Marie Antoinette Arriola
I have learned that hacking is not absolutely illegal and wrong but it can also become and
advantage for companies
5 Integrative Questions:
1. What is hacktivism?
2. What is counterhacking?
3. What is hacker?
4. What is hacking?
5. What is trespassing?
Citation/s: N/A
Page | 124
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Expressive conduct is subject to more stringent moral limits than those to which pure speech is
subject. The reason for this has to do with the effects of these different kinds of act.”
Learning Expectation:
I expect to learn the meaning of Information ethics and the concepts that is included with
it. I am also expecting to learn the connection of information ethics to the library profession.
Review:
This chapter of the book discusses the issue regarding information in library and the
issues regarding the library profession. My first thought regarding library profession is a job that
requires arranging and organizing collection of books. I am right in way because there are
several types of library professions: there are corporate, academic and public librarians. The
public library has the most number of issues.
In the following sections, we consider the challenges that confront the librarian in
carrying out his or her professional duties, in particular with regard to selection of materials and
the organization of these materials. With this there are 5 laws of library science by Shiyali
Ramamrita Rangathan:
The first law emphasizes that librarian should make sure that books are made available
for the users. Librarians are compared to referees because just like the latter, librarians are
supposed to be neutral.
Page | 125
CYBER ETHICS | Marie Antoinette Arriola
I have learned that it is important for a library profession to remain neutral so that the
distribution of information will be fair and all of those people who want to access will be given a
chance to have information that they need.
5 Integrative Questions:
Citation/s: N/A
Page | 126
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“The golden rule requires that if I like a program I must share it with other people who like it”
(Stallman, 1985).
Learning Expectation:
I expect to learn the concepts in the free software and open source software and the
ethical issues, if there are any, which are involved with this topic.
Review:
Nowadays, the use of open source software is encouraged because it is first of all, free
and it helps other developers to learn. What is Free Software? Free software gives free access
to users the software product for free. Open Source software on the other hand, allows other
users to see and modify codes of programs made by other developers. This also allows the
users to use the software for free.
So why open source is better that paid software? It is maybe because of the almost the
same features for the software and users will be able to use it for free and save money. There is
no problem with using open source software because most of them are sometimes better,
compared to paid software. The problem I see with OS software is that there is limited support,
unlike paid software that offers technical support anytime. Stallman argues that payment for
software limits the benefits of humanity with the program and that the reward a programmer can
get in having his software accessed for free is the social contribution the he makes. By having
free software available, the community can benefit from it, thus, the community improves.
Page | 127
CYBER ETHICS | Marie Antoinette Arriola
I have learned that it is not wrong to use open source software. I also learned that by
having this kind of software, it helps each one of us to improve and further learn more concepts.
5 Integrative Questions:
Citation/s: N/A
Page | 128
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“IRE builds on the research ethics traditions developed for medical, humanistic, and social
science research; this means in turn that a central challenge for IRE is to develop guidelines for
ethical research that aim toward objective, universally recognized norms, while simultaneously
incorporating important disciplinary differences in research ethics”
Learning Expectation:
I expect to learn the concepts of internet research ethics. I also expect learn the critical
issues that are involve in the topic.
Review:
The internet has become the number one source of information nowadays. Every
question seems to be answered by browsing through web pages and so, the internet is the
primary source of information for researches. With this, the internet has become a critical issue.
Researches will be greatly affected by the information researches retrieves from the internet
that is why, it is important to have a reliable source.
The book states that “researchers thence have the obligation to respect and protect
these rights, regardless of the “costs” of doing so, for example, of having to develop
comparatively more complicated and/or costly research design to protect such rights, or even
the ultimate cost of giving up an otherwise compelling and potentially highly beneficial research
project because it unavoidably violates these basic rights and duties.” With this, the developers
are still the ones who will decide on whether they will make their program available for the public
or not even though it will greatly affect the community with its uses.
Page | 129
CYBER ETHICS | Marie Antoinette Arriola
I have learned that because of the complexity of the internet and it being the primary
source of information, it is important that we know how to handle information properly. It is also
important that we give credits to our sources.
5 Integrative Questions:
Citation/s: N/A
Page | 130
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“There is arguably no better trigger for reflection on morality and its relationship to the law and
society than privacy and its cousin, confidentiality. The demands of privacy are intuitively
straightforward and the consequences of its violation obvious. Without a credible promise that
privacy and confidentiality will be safeguarded, the task of fostering trust is frustrated.”
Learning Expectation:
I expect to learn the concepts in health information technology and the different
challenges it gives to the ethics and science area.
Review:
Privacy is defined as the right or reasonable expectation people have that they will be
secured from intrusion. It is the right to keep things for themselves and to not allow the public in
having information that they choose to keep. Information technology plays a big role in the field
of health and sciences, information in medical issues are kept private and confidential as well.
Computers made it easier to keep and record medical files compared in storing it
manually on the paper files. But as information is made computerized, it is still prone to
intrusions.
Page | 131
CYBER ETHICS | Marie Antoinette Arriola
I have learned that there are ethical decision that should be made in medical field and
that sometimes professionals forget or sometimes do not have an idea that they violate the
privacy and confidentiality of the patients.
5 Integrative Questions:
1. What is health information technology?
2. What is the difference between privacy and confidentiality?
3. Who is the author of this chapter?
4. What is the field of emergency public health informatics?
5. What steps should be taken to ensure that computers are not used for inappropriate
access?
Citation/s: N/A
Page | 132
CYBER ETHICS | Marie Antoinette Arriola
Chapter 13: Ethical Issues of Information and Business | BERND CARSTEN STAHL
Library Reference: ISBN-13: 978-0471799597 | ISBN-10: 0471799599
Amazon Link:
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Businesses and the economic system they work in have an important influence on ethical
issues arising from information and information and communication technology.”
Learning Expectation:
I expect to learn the concepts and issues regarding information and business. I would
also like to learn new ethic principles about business.
Review:
It is said that the relationship of business and ethics or the link between computers and
ethics. Business ethics is simply defined as a relationship which deals with the discipline of
business and ethics. Ethics in business is important because moral norms are said to be
important in the economic system. An example would be the respect that should be given to
contract and dealing in the business setting. Without moral values it is more likely to have chaos
in the economic system. A good economy signifies a good life for the people, and so as much
as everyone would want to have a good life, it is imperative that people doing business should
be ethical.
According to the book, the central idea of the stakeholder conception of the company is
that the legitimate interests of stakeholders need to be considered when decisions are made. It
is important that the interest of an individual should not hamper the decisions that were to be
made. It is important that stakeholders and company members will be unbiased.
Page | 133
CYBER ETHICS | Marie Antoinette Arriola
I have learned that stakeholders should not be influenced by the factors in their
environment.
5 Integrative Questions:
Citation/s: N/A
Page | 134
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
One of the most fascinating aspects of the Internet is that very few accidents happen. This not
only holds for the technical infrastructure and maintenance, but also for the communication and
information transmitted through the network.
Learning Expectation:
Review:
The internet is a very interesting and one of the most important innovations in the history
of mankind. It serves a lot of purpose and more information and advancements are made
because of it. But good as it may seem, the internet has a lot of issues that needs to be
discussed and answered. Most of which are concerned with ethical problems.
“Until recently, issues of responsibilities on the Internet have often been discussed in
association with specific accountabilities of ISPs with regard to information (including pictures
and footage) that are outright illegal or immoral. Think, for instance, of child pornography, illegal
weapon sales, the sale of illegal drugs, and the dispersion of hate and discrimination.” No one
owns the internet, and so, who is to blame for the problems that will arise. The cyber world
lacks proper implementation of law for those who violate rights and do illegal activities especially
during the earlier years of the internet. Countries such as ours also have deficient regulations on
internet problems.
Page | 135
CYBER ETHICS | Marie Antoinette Arriola
I have learned that it is difficult to measure the responsibilities that every user of the
internet has.
Integrative Questions:
Citation/s: N/A
Page | 136
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Designers have a responsibility to reflect on the values and biases contained in their creations
and to ensure that they do not violate important ethical principles”
Learning Expectation:
I expect to learn the concepts of virtual reality and computer simulation. I expect to learn
the advantages and issues from the said topic.
Review:
Virtual reality started on the 80’s. According to the book, virtual reality is a technology
which shows three-dimensional environments with head equipment. The VR allows the user can
interact with the environment. There are four essential elements in Virtual reality:
a. Virtual world
b. Immersion
c. Sensory feedback
d. Interactivity
Virtual world and virtual reality are two different things. Virtual world is a more complex
and broader concept compared to virtual reality. According to the book computer simulation is a
computer program that contains a model of a particular (actual or theoretical) system. It can be
customized according to the needs of the user. This has become useful in mathematical
systems. Unlike virtual reality, the environment in the computer simulation does not need to be
too realistic. The environment can be developed in an abstract way.
Page | 137
CYBER ETHICS | Marie Antoinette Arriola
I have learned that there are issues that concern the use of virtual reality and computer
simulation. I also learned the difference of the two technologies.
Integrative Questions:
Citation/s: N/A
Page | 138
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“It may be used without semantic implication; for example, we may say that the form of a cloud
provides information about whether it will rain. In such cases, no one would think that the cloud
had the shape it did in provided information. In contrast, a weather forecast contains information
about whether it will rain, and it has the form it does because it conveys that information. The
difference can be expressed by saying that the forecast has intentionality whereas the cloud
does not.”
Learning Expectation:
I expect to learn concepts in the genetic information. I want to learn the definition of
epistemology and ethics in genetics.
Review:
Technology and science are almost associated in every way. In the advancement of
science, technology has a great role. Genetic information is consists of data about the genetic
components. The technology is used to determine specific information for genetic studies.
Castells said that science relies on the computational models, simulations and analysis.
Genetic information is more special compared to the other cases of health information.
The book states that there really are not two different kinds of information; information has the
same meaning in information technology and in molecular biology. Meaning, the information in
genetics cannot be easily be defined
Page | 139
CYBER ETHICS | Marie Antoinette Arriola
I have learned that technology has a big role in the field of science.
Integrative Questions:
1. What is genetics?
2. What is genetic information?
3. What is a Central Dogma?
4. What is computing machinery?
5. What are the models in genetic information?
Citation/s: N/A
Page | 140
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“At the state level, the doctrine of self-defense is based on jus ad bellum and jus in bello, which together
allow states to use force in self-defense, but constrain how that force is applied.”
Learning Expectation:
Review:
The first issue that needs to be discussed in the cyber ethic is the state of security. The
question is on whether cyber ethics can answer the ethical questions that concerns the
protection of sensitive information. Second is hacktivism. If the effect is affecting the majority or
a large number of users, then it becomes a problem not only to those who are affected directly
by hacking, but it is a problem that should be addressed to the cyber world. The third problem in
cyber ethics is the hack back or the activity wherein the victims will try to hack-back and find the
source.
According to the book, there is a law for these problems. The framework presented here
is based on the international law of armed conflict. Although this law was developed to address
armed attacks and the use of primarily armed force, some work has been done to interpret the
law in the domain of cyber conflict. The law has two parts: jus ad bellum, or the law of conflict
management, and jus in bello, or the law of war. Despite being referred to as “law,” both of
these parts are as much about ethical behavior as they are rules of law.
Page | 141
CYBER ETHICS | Marie Antoinette Arriola
I have learned the concepts in the cyber ethic problems and on how these problems
should be approached.
Integrative Questions:
1. What is hack back?
2. What are the three problems in cyber ethics?
3. How are these things approached?
4. What is Jus in Bello?
5. What is Jus in Bellum?
Citation/s: N/A
Page | 142
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“. . . if [qualitative risk identification is] done properly it should ensure that all foreseeable risks
are listed, representing any uncertain event, or set of circumstances that, if it occurs, would
have a positive or negative effect on the project ...”
Learning Expectation:
I expect to learn what the practical mechanism means and how is it connected to the
assessment of ethical risk.
Review:
This chapter of the book focuses mainly on the possible risks that we could face in the
future. It is important that we check all possible risks and problems that may occur regardless of
the positive or negative effects that it can cause.
Once the risks are identified, the next step is to analyze the risks and decide on the
probable actions to be taken or that can be made in order to solve the risk. What is an ethical
stakeholder? An ethical stakeholder does not have a direct relation into a program but can be
affected if there are changes that will happen in the program.
I have learned that there are steps in acquiring the risks that can possibly affect a
system and/or the people involved in it. Thus, it is important that there are risk management.
Page | 143
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
1. What is SoDIS?
2. What does the risk management commonly consist of?
3. Who are the authors of this chapter?
4. What is Risk Identification?
5. What are the types of risk management?
Citation/s: N/A
Page | 144
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
Internet governance is the development and application by Governments, the private sector and
civil society, in their respective roles, of shared principles, norms, rules, decision-making
procedures, and programs that shape the evolution and use of the Internet (WGIG, 2005).
Learning Expectation:
I expect to learn how the laws or rules in the internet are implemented. I also want to
learn who implements the regulations if there are any.
Review:
As much as the views of every individual vary, the perception of countries differs as well
with regards to internet regulations. China is the leading country in regulating the internet
access in their country. The contents on the internet are also filtered by the service providers.
Another country which enforces strict regulation on the internet is Saudi Arabia. Being an
Islamic country, they are very strict when it comes to internet contents that promote anti-Islam
and pornography.
Unlike here in the Philippines, we do not have a regulation of contents and filtering of
transactions on the web. Though content filtering is a good way to protect people, it also prevent
the people to have extensive research and study of some topics which they needed.
Page | 145
CYBER ETHICS | Marie Antoinette Arriola
I have learned that there are a lot of countries that have strict regulations in the internet
and by being so, it also has some disadvantages.
Integrative Questions:
Page | 146
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“On the other hand, with human beings and their social units we can receive direct reports that,
at the very least, describe their subjective state: This is more than I can handle.”’
Learning Expectation:
I expect to learn what information overload is, how it happens and what are the reasons
such thing happens.
Review:
Because of the different sources of information that we can have through the use of
technology, it has become a dilemma for people to get the right and credible information
because of the variations and numerous sources.
Information is defined in the book as the state of having too much information to make a
decision or remain informed about a topic. According to the book, information overload can also
cause confusions for people because of the contradictions on the references. Information
overload, as we have seen, involves more than just the exposure of an agent to excessive
amounts of information: that agent must also suffer certain negative effects as a result. One of
the most obvious, and straightforward, consequences is a failure to complete the task at hand,
or to complete it well.
Page | 147
CYBER ETHICS | Marie Antoinette Arriola
I have learned that having a lot of information does not mean that one can have a better
output.
Integrative Questions:
1. What is information overload?
2. Who is the author of this chapter?
3. What causes information overload?
4. What is information?
5. What is capacity?
Citation/s: N/A
Page | 148
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“On the other hand, with human beings and their social units we can receive direct reports that,
at the very least, describe their subjective state: This is more than I can handle.”’
Learning Expectation:
I expect to learn the meaning of spam and what are the effects that it brings.
Review:
According to the book, Published definitions by some major players differ dramatically on
which emails should be identified as spam. Some emphasize the importance of “consent”;
others require the emails to be commercial in nature before they are called spam; still others
focus on the number of identical messages that are sent as spam. Spam is electronic mails that
are sent to us from unknown contacts. Most of the spam is composed of advertisements or
invitations to some unknown products.
The book says that every email has an effect. Even emails that are blocked by a spam
filter still have a consequence on the performance of the network and the receiver’s system.
Emails that lure the receiver into revealing personal and financial information, “phishing attacks,”
and damaging virus attacks can have devastating effects. Because of this there are features in
emails that filter malicious mails and labelled it as a spam.
Page | 149
CYBER ETHICS | Marie Antoinette Arriola
I have learned more information about the definition of spam and its effect to the people
who receives it.
Integrative Questions:
1. What is spam?
2. What is the purpose of spam?
3. How is spam controlled?
4. How is spam detected?
5. Who are the authors of this chapter?
Citation/s: N/A
Page | 150
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Among the reasons for finding an expression to be plagiarism, we may note that it is sometimes
condemned as theft of intellectual property, sometimes as a failure to live up to a standard of originality,
sometimes as a violation of the moral rights of a prior author, sometimes as fraudulent misrepresentation
of authorship”
Learning Expectation:
• What is plagiarism?
• And the actions taken for those who commit such act.
Review:
It has been taught to us that plagiarism is an unlawful and unacceptable act. There are
consequences in doing so. First what is plagiarism, according to the book; plagiarism is defined
as an unauthorized copying of a content of a work. If one must use a certain part on someone
else’s work, there must be a proper authorization. This can be done by; asking the author for
permission or crediting the name of the author.
Though there are information that are allowed for public use, it is still better to cite the
reference that one uses or at least tell others that it was not originally made by them.
I have learned the definition and new concepts of plagiarism and how I can avoid it. I
have learned that plagiarism violates the right of the author.
Page | 151
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
1. What is plagiarism?
2. What are the examples for it?
3. How is plagiarism controlled?
4. What is authorization?
5. What is a copyright law?
Citation/s: N/A
Page | 152
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“All the goods of the information age- all of the expressions once contained in books or
film strips or newsletters- will exist as thought or something very much like thought: voltage
conditions darting around the net at the speed of light, in conditions that one might behold in
effect, as glowing pixels or transmitted sounds”
Learning Expectation:
I expect to learn the definition of intellectual property and other information that is
concerned with it. I also want to learn the moral issues in online file sharing.
Review:
Most of the music files that every person has at least here in the Philippines are from
peer-to-peer sites or programs. Online file sharing has become the number one problem for
companies or artists. Mp3 files are downloaded for free and so the sales of artists are
decreasing. Though this is the downside of having such file sharing, there’s still an advantage,
by having it freely downloaded, some artists says that it promotes their music and if people
really like their songs, then they will eventually purchase it.
Internet users can easily access peer-to-peer programs because they are offered for
free and can be installed easily.
Page | 153
CYBER ETHICS | Marie Antoinette Arriola
I have learned has some moral issues that need to be addressed and this kind of
activity will be difficult to control because of the number of people who have grown into using
such.
Integrative Questions:
1. What is IP?
2. What is online file sharing?
3. How is it done?
4. Is P2P illegal?
5. What is MGM vs. Grokter?
Citation/s: N/A
Page | 154
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“No one wants to be a censor. Or, more precisely, no one wants to be called a “censor.” To
describe a person as a censor, or an act as one of “censorship,” is to condemn the person or
the action.”
Learning Expectation:
I expect to learn the definition of censorship and the definition of access expression.
Review:
Censorship is said to limit the access to expression because of certain limits and
restrictions applied to someone. It is argued by Cohen that by having freely expressed one’s
expression can one become fully satisfied. Though the thought of others regarding censorship is
that it allows secured transfer of information through filtered contents.
I have learned that censorship is a critical issue that needs to be further discussed.
Censorship has harmful effect to people as well.
Integrative Questions:
1. What is censorship?
2. How is it done?
3. What is access expression?
4. What are the harms brought by censorship?
5. Who is Cohen?
Citation/s: N/A
Page | 155
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“Computer ethics is a new area of applied ethics with a rapidly burgeoning portfolio of ethical case studies
and problems.”
Learning Expectation:
I expect to learn new concepts regarding gender and its relation to the ethical issues
today and what technology can do.
Review:
There are limited regulations that protect women in the cyber world. Women are
stereotyped to be weak and less powerful during the early years of industrialization. It is said to
be that most of the information are usually given to men. Women and men have a lot of
differences and so the ethical views also differ.
I have learned that gender should not become an issue in technology; both genders
must know how to compromise their differences and manage to come up with beneficial moral
solutions to the ethical problems.
Integrative Questions:
1. What is gender issue?
2. What is feminist ethics?
3. What is cyber stalking?
4. What are the hacking communities?
5. What is the effect of gender in technology?
Citation/s: N/A
Page | 156
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“In the developing world, poverty and the suffering it causes is considerably worse. Here poverty
is characteristically “absolute” in the sense that people do not have enough to consistently meet
their basic needs. People in absolute poverty lack consistent access to adequate nutrition, clean
water, and health care, as well as face death from a variety of diseases that are easily cured in
affluent nations. Indeed,15 million children die every year of malnutrition in a world where the
food that is disposed of as garbage by affluent persons is enough to save most, if not all, of
these lives.”
Learning Expectation:
I expect to learn the definition of digital divide and why is that they have this kind of term.
I want to learn how it affects the cyber world.
Review:
Social status has become a barrier into any endeavour one wants to engage in.
Nowadays, technology has a great role in every person’s life. Though no matter how technology
may seem to be useful, there are still limitations especially to those people who lack power and
wealth. The global distribution of wealth is unequal and only the wealthy has more access to
greater income and opportunity,
It is evident that only those who are in authority have the greater access to information. Because
of this, poverty still remains.
I have learned that there are inequalities and that discrimination and unequal access to
information is very prevalent.
Page | 157
CYBER ETHICS | Marie Antoinette Arriola
Integrative Questions:
1. What is digital divide?
2. Who is responsible to the poverty that the world is experiencing?
3. Is it possible to decrease the number of the poor?
4. What is poverty?
5. What are the ethical issues in poverty?
Citation/s: N/A
Page | 158
CYBER ETHICS | Marie Antoinette Arriola
http://www.amazon.com/gp/reader/0471799599/ref=sib_dp_pop_toc?ie=UTF8&p=S008#readerl
ink
Quote:
“In a broad sense IIE deals with intercultural issues raised not only by ICT, but also by other
media as well, allowing a large historical comparative view. IIE explores these issues under
descriptive and normative perspectives. Such comparative studies can be done either at a
concrete level or at the level of ontological or structural presuppositions.”
Learning Expectation:
I want to learn what is the meaning of intercultural information ethics and if it possible to
have a uniform ethical view regardless of the varied culture.
Review:
ICT has a great impact on the varied cultures in the world. Each country has a different
culture from the other that is why it is difficult to have uniform ethical values. The beliefs of every
country also have become one of the factors that affect the differences of morality.
In this chapter of the book it is discussed that not all of the ethical solutions are
applicable for everyone. So we are to respect the differences and adapt to others if we need to.
I have learned how varied the cultures in the world are and how we try to adapt to each
ethical morality that every culture has. I learned that it is also difficult to keep up with the
changes especially if the culture is very complex.
Integrative Questions:
1. What is intercultural ethics?
2. How is it formulated?
3. Who are responsible for it?
Page | 159
CYBER ETHICS | Marie Antoinette Arriola
Citation/s: N/A
Page | 160