it ethic reader

Upload: bluestella

Post on 30-May-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 It Ethic Reader

    1/109

    1

  • 8/14/2019 It Ethic Reader

    2/109

    2

  • 8/14/2019 It Ethic Reader

    3/109

    Book: Fortune at the Bottom of the Pyramid

    Chapter Title: Chapter 1: The Market at the Bottom of the Pyramid

    Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-

    Eradicating-Poverty/dp/0131467506

    Quote: The strength of these innovative approaches is that they tend to create

    opportunities for the poor by offering them choices and encouraging self-esteem.

    Learning Expectations:

    To know more about markets

    To understand the market at the bottom of the pyramid

    Chapter Review

    Poverty is one of the most daunting problems that our world is facing.

    Because of poverty, we need a better approach which involves the people to partner

    with them in order to innovate and achieve sustainable win-win scenarios where the

    poor are actively engaged and, at the same time, the companies providing products

    and services to them are profitable.

    The poor represent a latent market for goods and services. Active

    engagement of private enterprises at the BOP is a critical element in creating

    inclusive capitalism. BOP, as a market, provides a new growth opportunity for the

    private sector and a forum for innovations, and it must become an integral part of

    the work of the private sector.

    As stated in the chapter, all of us are prisoners of our socialization which

    means that we perceive things on our own point of view, ideology, experiences, and

    established management practices. With that, we let our opinions to judge people.

    An example would be, there is an assumption that the poor have no purchasing

    power and they do not represent a viable marker but the truth is the poor represent

    a significant latent purchasing power because they spend their earnings in their

    priorities.

    The market development imperative involves both the consumer and the

    private sector firm. It has benefits to the consumer and these are creating capacity

    to consume, the need for new goods and services, and dignity and choice. Three

    principles are mentioned in creating the capacity to consume and these are

    3

  • 8/14/2019 It Ethic Reader

    4/109

    affordability, access and availability. The ideal is to create the capacity to earn more

    so that the BOP consumers can afford to consume more.

    What I have learned

    After reading the chapter I learned that the poor could also help the market.

    Many people think that they cannot help the market because of their status in life

    but they are wrong they judge them easily but it is the other way around, the poor

    people became an advantage for them because they gave them profit. There are

    also guidelines that would help them to innovate and become successful. Also, we

    became prisoners of our socialization, we let our own perceptions rule our life and

    judge them in our own opinions but we must not judge them because we dont

    know what they could do in order to help the market.

    4

  • 8/14/2019 It Ethic Reader

    5/109

    Book: Fortune at the Bottom of the Pyramid

    Chapter Title: Chapter 2: Product and Services for the BOP

    Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-

    Eradicating-Poverty/dp/0131467506

    Quote:Because innovations for the BOP markets challenge our established ways

    of thinking, BOP markets can become a source of innovations for the developed

    markets as well.

    Learning Expectation:

    To understand how products and services would affect the BOP

    To know what ate the products and services for the BOP

    Chapter Review

    Developmental agencies have tried to replicate developed country models at

    the BOP but it has equally unsatisfactory results. Their goal is to reach the entire

    population base, including the BOP. The BOP challenged the dominant logic of MNC

    managers but advance technology solutions must coexist with the poor and

    indifferent electrical and telecom infrastructures.

    Also, there is a need for a new philosophy of product development and

    innovation that reflects the BOP markets and it must represent a different

    perspective from those that we have grown accustomed to. There are innovationsfor the BOP markets, some of these are focus on the price performance of products

    and services, innovation requires hybrid solutions, solutions that are developed

    must be scalable and transportable across countries, product development must

    start from a deep understanding of functionality, not just form, and process

    innovations are just critical in BOP markets as product innovations.

    Also, innovations must reach the consumer and these innovations do not

    require a significant adaptation, because some of the elements might not apply to

    all businesses. With that, the managers need to pick, choose and prioritize which

    they would adapt that he thinks that would be helpful to them. Innovations for theBOP markets challenge our ways of thinking and these can become a source of

    innovations for the developed markets as well.

    What I have learned

    5

  • 8/14/2019 It Ethic Reader

    6/109

    After I read the chapter I learned that in achieving your goals it should reach

    most of the population. Also, innovations are needed and managers should be

    careful in choosing which innovation they would use. They should know what they

    want to happen and prioritize it. They should focus on their goal and for it to be

    successful it requires participation. Also, with the innovations for the BOP markets it

    challenged our ways of thinking and this can be a source of innovation for

    developed markets.

    6

  • 8/14/2019 It Ethic Reader

    7/109

    Book: Fortune at the Bottom of the Pyramid

    Chapter Title: Chapter 3: BOP: A Global Community

    Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

    Quote: Innovations must become value oriented from the consumers

    perspective. The BOP focuses attention on both the objective and subjective

    performance of the product service.

    Learning Expectations:

    To know why BOP is a global community

    To understand more about global community

    Chapter Review

    The chapter discusses some sources of opportunities that invests the time

    and energy to understand and cater to the BOP markets and these are some of the

    BOP markets are large and attractive, many local innovations can be leverages

    across other BOP markets that would create global opportunity for local

    innovations, some of the innovations will find applications in developed markets,

    and lessons for the BOP market can influence the management practices of global

    firms.

    The chapter is about the innovations that would be helpful in the BOPmarkets and for them the quality, efficacy, potency and usability of solutions

    developed for the market are very attractive for the top of the pyramid. It is also

    stated that large population is an indicator of the size of the market opportunity.

    Also, it is stated that if an industry finds that sweet spot which means the right

    business model and the right combination of products and with these markets could

    have explosive growth.

    For a sustainable development, BOP markets are the great source for

    experimentation. MNCs in the markets have the ability and motivation to find

    solutions to the problem of packaging emerging markets. With that, innovationsmust become value oriented from the consumers perspective. In order to learn

    rapidly, MNCs working would lean to live with a wide variety if relationships are of

    large number in institutions. Also, they should learn to cope with different problems

    that they are experiencing.

    7

  • 8/14/2019 It Ethic Reader

    8/109

    What I have learned

    As I read the chapter I understand that markets should learn to make

    innovations in their products in order for them to grow. This means that they should

    make changes that would help them to improve the products they offer. Also, Ilearned that they need to take risks in order to become successful. They need to

    cope up with the different changes that are happening and learn to think of new

    strategies. To end I would like to state a quote from the chapter All of us can learn.

    The flow of ideas, knowledge, and innovation will become a two-way street from the

    developed countries to the developing as well as the reverse.

    8

  • 8/14/2019 It Ethic Reader

    9/109

    Book: Fortune at the Bottom of the Pyramid

    Chapter Title: Chapter 4: The Ecosystem for Wealth Creation

    Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

    Quote: A business system is at the heart of the ecosystem wealth creation.

    Learning Expectation

    To know what is wealth creation

    To know that relationship of ecosystem for wealth

    creation

    Chapter Review

    The chapter discusses the market-oriented ecosystem which is a framework

    that allows private sector and social actors that act together and create wealth in a

    symbiotic relationship. The concept of ecosystem was used because each

    constituent has a role to play. They are dependent to each other and the system

    adapts and evolves and can be resilient and flexible.

    In the ecosystem for a developing country HLL provides the framework, the

    intellectual direction, and the processes by which the system is governed and

    operated. It is a nodal form that facilitates the entire functioning of the network.

    The market- based ecosystem can be a source of informing the poor of the benefitsof transparency in transactions.

    It was stated that most of the developing countries do not fully recognize real

    costs of corruption and its impact on private sector development and poverty

    alleviation. Also, it is stated that commercial laws are critical to the development of

    the private sector. The goal in the development is to bring as many people as

    possible to enjoy the benefits of an inclusive market. In addition, the private sector

    will invent new systems depending on the nature of the market and the need to

    bring more people into the market system.

    9

  • 8/14/2019 It Ethic Reader

    10/109

  • 8/14/2019 It Ethic Reader

    11/109

    Book: Fortune at the Bottom of the Pyramid

    Chapter Title:Chapter 5: Reducing Corruption: Transaction Governance Capacity

    Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

    Quote: There is a need for us to recognize that economic growth fuelled by themarket economy around the world is not a single, monolithic problem. Every

    country has its own road travel.

    Learning Expectation

    To be able to know how to reduce corruption

    To understand what is Transaction Governance Capacity

    Chapter Review

    The chapter is about transaction governance capacity which is about making

    the entire process as transparent as possible and consistently reinforced. Also, it isimportant to reduce the frictional losses in doing business at the BOP. It is

    fundamental to the evolution of capital markets and private sector is the need for atransparent market capital, land, labor, commodities and knowledge. Transparencyresults from widely understood and clearly enforced rules.

    Transaction Governace Capacity is the capacity of a society to guarantee

    transparency in the process of economic transactions and the ability to enforcecommercial contracts. It is about reducing uncertainty as to ownership and transfer

    of ownership. Also, there is a need for us to recognize that economic growth fuelledby the market economy around the world is not a single, monolithic problem. Each

    country has its own road to travel.

    TGC is also about creating transparency and eliminating uncertainty and risk in

    commercial transactions. It has four specifications and these are a system of lawsthat allows for ownership and transfer of property, a process for changing the lawsgoverning property rights that is clear and unambiguous, a system of regulationsthat accommodates complex transactions and institutions that allow the laws to be

    implemented fairly and with transparency.

    11

  • 8/14/2019 It Ethic Reader

    12/109

    What I have learned

    I learned that transparency is very important for the markets and with that itreduces the uncertainties to ownership and transfer of ownership. It also discusses

    about corruption and it adds to the business uncertainty. Also, poor countries arenot really poor but they might be rich if we consider trapped assets. Also, with

    transparency transactions made should be clear and unambiguous. With that,corruption is about providing privileged access to resources and recognizing thetime value and money. It is a market mechanism for privileged access.

    12

  • 8/14/2019 It Ethic Reader

    13/109

    Book: Fortune at the Bottom of the Pyramid

    Chapter Title:Chapter 5: Reducing Corruption: Transaction Governance Capacity

    Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

    Quote: Social transformation is about the number of people who believe that theycan inspire to a middle class lifestyle. It is growing evidence of opportunity, role

    models, and real signals of change that allow people to change their aspirations.

    Learning Expectation:

    To know more about social transformation

    To know how social transformation affects the market

    Chapter Review

    With the development of markets and effective business models at the BOP can

    transform poverty alleviation task from one of the constant struggle with subsidiesand aid to entrepreneurship and generation of wealth. If the poor are treated at the

    BOP as consumer, they can reap the benefits of respect, choice and self-esteem andhave an opportunity to climb out of the poverty trap. BOP markets represent aglobal opportunity and lessons learned at the BOP can transform MNC operations indeveloped countries and can be the engine for the next round of global expansion

    trade and good will.

    As consumers get an opportunity to participate in and benefit from the choices

    of products and services made available through market mechanisms, theaccompanying social and economic transformation can be very rapid. BOP markets

    improve their communication in order for them to move fast in building the capacityto communicate with the outside world and the ability to make themselves

    understood

    As consumers, they are always upgrading from their existing condition andgaining access to modern technology and good products designed with their needsin mind enables them to take a huge step in improving their quality of life.

    Social transformation is about the number of people who believe that they caninspire to a middle-class lifestyle. It is the growing evidence of opportunity, role

    models, and real signals of change that allow people to change their aspirations.And the goal is to change the pyramid into a diamond.

    13

  • 8/14/2019 It Ethic Reader

    14/109

    What I have learned

    I learned that markets should consider also the poor as consumers because theycould get benefits of respect, choice and self-esteem that would help them toimprove their life. Also, BOP markets represent a global opportunity and the lessons

    learned from it would help them to innovate strategies and think of ways on howthey would improve their process. They should improve their communication in

    order for them to move fast in communicating with the outside world. In socialtransformation, it is a growing evidence of opportunity, role models, and real

    signals that allow people change their aspirations.

    14

  • 8/14/2019 It Ethic Reader

    15/109

    15

  • 8/14/2019 It Ethic Reader

    16/109

    Book: Cyber Ethics

    Chapter Title: Chapter 1 Ethics and the Information Revolution

    Author: Terrell Ward Bynum

    Quote:Computing is changing everything-where and how we work. Where and

    how we learn, shop, eat vote, receive medical care, spend free time, make war,

    make friends, make love.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user.

    Chapter Review:

    Terrell Bynum did a great job on explaining and introducing as self-titled, Ethics and

    Information Revolution. In here he summarized what happened on years past from

    the 1950s up to 1990s. According to Terrell, growing information revolution is notmerely technological but a fundamental of being social and ethical. Well, as all we

    know, internet or merely information technology is fast developing. With just

    months past we see more of development and it will have a rapid growth when it

    comes to information technology. Sooner or later we just need computers to do all

    tasks. One day, our daily household will then need computer to do it. Indeed,

    computer will be our main component in our lives one day.

    Bynum also mentioned some historical milestones in the history of Computer

    Ethics. In 1950 Wiener published a computer ethics book, Human Use of Human

    Being. He laid down a foundation of computer ethics that time. He was the first

    computer ethics author that placed a foundation to the world of computer ethics.

    This will be a powerful basis for ethics people. Another book that gave more

    strength to Computer Ethics Foundation was the book wrote by Donn Parker in

    16

  • 8/14/2019 It Ethic Reader

    17/109

    which he examines unethical and illegal uses of computers by computer

    professionals. He published Rules of Ethics in Information Processing in

    Communications of ACM in 1968. Series of ethics authors did their job to support

    those first born ethics books and evolved their previous theories into a better form.

    In this chapter Bynum expound the article by explaining every aspect of what the

    ethics author gave to the community. Sample topics were also written. Sample

    topics are as follows, Computer in the workplace, computer security, software

    ownership, professional responsibility. Computer ethics thinkers then offered two

    different views of the ethical relevance of ethics in the computer technology world.

    What Ive learned:

    As for this chapter I had a quick view and had an introduction to cyber ethics world.

    How it evolves from a singular book to a more complex and had a wide variety of it.

    17

  • 8/14/2019 It Ethic Reader

    18/109

    Book: Cyber Ethics

    Chapter Title: Chapter 1 Ethics On-Line

    Author: Deborah G. Johnson

    Quote:Anonymity does not seem to be bad in itself. In fact, it can be beneficial in

    certain contexts, such as contexts in which race, gender, or physical appearance

    get in the way of fair treatment.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that through this article I may be able to know

    more about Ethics On-line, what does Deborah wants to imply to her readers, real

    anonymity is and such.

    Chapter Review:

    We can all attest that technology today runs fast as it could. We can say that in a

    span of a month or so another invention has to be launched, technology has to be

    invented and what have you. Through Deborah Johnson I had a quick knowledge on

    what happens to the cyber world that even an online rape exists. I thought that it is

    just prostitution that is available online I dont have an enough information that up

    to an online rape still exist.

    Same as what Bynum realized, technology evolves on a fast pace and well our

    ethics will then evolve as these technology evolves and made up a new one.

    Anonymity is a topic which Deborah spent time writing with. She then explains whatanonymity is and what lies with anonymity. According to Deborah, anonymity is a

    process or term in which an individual can communicate without having an identity,

    using pseudonyms and taking on different personas. Another was, someone elses

    words and alter them, or may grab someone elses identity and distribute words as

    if they were the words behind it. It is somehow we can link to cheating and more of

    18

  • 8/14/2019 It Ethic Reader

    19/109

    you are refuse to comply the copyright rules that you copied another persons work

    and putting your name as the author of it. Well, it is somehow similar as

    photocopying an article putting your name at top and submitting it to your teacher

    as if you did it. As I was reading this chapter I was then stuck at the second

    problem of anonymity which states that anonymity creates a shroud under which

    people are not afraid to say what they think. Even if I am not afraid telling what I

    feel, or maybe what I see but I am still on my feet and name putting a signature on

    what I say. I am not afraid of telling what I feel, because that is what is inside me.

    If there are people who were hurt by my words I dont think it is my responsibility

    due to the fact that I tell it to the world generally not on a lone person. If you were

    hurt so then accept the fact that my words stabbed you. May or may not be truebut I am free to say it and I am willing to be corrected if ever. For me, that is part

    of my learning as a human. To say what you feel and if youre wrong then a person

    or persons will then correct you for that. That is what anonymity and what Ive

    learned about anonymity by this article.

    What Ive learned:

    As for this chapter I learned a couple of sentences about anonymity specifically.

    What Ive learned here wasnt just a part of my knowledge but will be a part of my

    daily living.

    19

  • 8/14/2019 It Ethic Reader

    20/109

  • 8/14/2019 It Ethic Reader

    21/109

    Thats all I think I can share with you guys.

    What Ive learned:

    As for this chapter I learned a few things in life. Ethics has different persona as we

    usually know and it is a matter of how you run the rules as to how you obey it.

    21

  • 8/14/2019 It Ethic Reader

    22/109

    Book: Cyber Ethics

    Chapter Title: Chapter 1 Disclosive Computer Ethics

    Author: Philip Brey

    Quote:A typical problem in computer ethics arises because there is a policy

    vacuum about how computer technology should be used.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user.

    Chapter Review:

    Honestly, I dont have a broad idea what is that Mainstream Computer Ethics. But

    as I move on with the article I found a spot understanding this article.

    As I have read the first part of this article, a brief description in which it gave me an

    idea on what will Disclosive Computer Ethics is. The main topic that this article

    objectives is to affect influentially within computer ethics, it [Disclosive Ethics] still

    deviates from its main approach in computer ethics. A standard model for me is

    that you are studying the case deeply. You are about to thing whether it is moral or

    not, like what we have as an example, hacking, theft, and what have we. Actually,

    these are just continuation of what they first had. What I mean is that, they acted

    and gave it first and placed and ethical theory on a certain part. It will then be a

    rapid evolution of things behind. As you tend to broaden and evolve tendency is you

    have a bigger picture of life in which before it is too specific on a certain trait that

    now we dont even all know what ethics are and what are those inside ethics.

    Maybe we should get back to the main course instead of the dressings. For me, it is

    easy to be ethical the difficulty lies on the side of the people who tend not to know

    22

  • 8/14/2019 It Ethic Reader

    23/109

    and have a good grasp of ethics that they tend to be an elementary kiddo that

    seem to begin learning what ethics is. I mean, if people has enough or the needed

    information maybe we can survive and all of us be ethical. Disclosive is more of

    deciphering that is.

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on ethics has. Those

    typical computer ethics and its evolutions and those Disclosive type of computer

    ethics.

    23

  • 8/14/2019 It Ethic Reader

    24/109

    Book: Cyber Ethics

    Chapter Title: Chapter 1 Gender and Computer Ethics

    Author: Alison Adam

    Quote:Gender has been somewhat neglected in computer ethics writing to date.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user.

    Chapter Review:

    First things first, I was shocked when I read that gender has some bearing when it

    comes to computer ethics. I dont even think that a gender per se will be a

    hindrance or might as well say that a problem to computer society. One problem is

    that, womens access to computer technology. Next is those differences between

    men and women ethical decision making in relation to information and computer

    technology. I actually agree on what Alison wrote on her article, men tend to have a

    different view over women. Actually everyone have different view through life, and

    as well to ethics, as to what is right over wrong. For me I have my own perception

    of ethics in terms of what is right and wrong. I remember one person told me that

    they separate men from women at the workplace so to avoid misconception or

    what.

    24

  • 8/14/2019 It Ethic Reader

    25/109

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on ethics has. Those

    typical computer ethics and its evolutions and those Gender ethics that I wasshocked about.

    25

  • 8/14/2019 It Ethic Reader

    26/109

  • 8/14/2019 It Ethic Reader

    27/109

    As I can see to the values of technology that there is a compatibility of work and

    use. Like what Winner gave up as an example, solar energy is said to be compatible

    with a democratic society but it doesnt mean that it requires us people.

    The idea of this article is broad that it is a bit complicated to explain. But that is

    somehow a bit of my explanation to this.

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on ethics has. The main

    idea of technology and it values, what global information infrastructure and a like.

    27

  • 8/14/2019 It Ethic Reader

    28/109

    Book: Cyber Ethics

    Chapter Title: Chapter 1 Applying Ethical and Moral concepts and Theories to IT

    Contexts: Some Key Problems and Challenges

    Author: A.J Birrer

    Quote:We need not to go into details much further to see that the protocol of the

    joint problem solving process by expert and client is a complicated one, and that

    the responsibilities of expert and client are intricate and intertwined.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    article. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user. In this article I expect to learn ways on how to

    apply ethical and moral concepts and theories to IT contexts.

    Chapter Review:

    According to AJ Birrer, If we want to apply ethical and moral concepts and theories

    to IT contexts we should then have three conditions to make. First is to know what

    kind of questions such concepts and theories can be applied and what cannot. Next

    is that we should know the limitations of specific concepts and theories. Lastly, we

    should have knowledge of the topic and to where you want to apply them.

    But what is computer ethics? That is one question that may strike our minds out.

    Maybe we can think that computer ethics is morality about computers. What

    technically is about computers and how we can use computer on a right manner.

    We can think of stuffs like privacy, hacking, software, infringement and stuffs alike.

    Well, as the world goes up and running one way or other computer problems will

    grow and grow. As the world goes, technology is then passing by like wind part of

    this will be the fight on being ethical or not. I cannot feel the pressure of those

    28

  • 8/14/2019 It Ethic Reader

    29/109

    ethical problems. I mean as a big impact on my life but as I will be a in the field I

    may say that this will cause me a headache too. But as I read this article I have a

    quick view on how will I face and carry those problems ahead given it will still be

    more a mature problem and have the roots spread out still.

    Industry should face the fact that it will still grow and we as an IT practitioners

    should make a stand on how we should go with it.

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on ethics has specificallyon how to apply ethical and moral concepts and theories to IT contexts. Others are

    the following:

    Untangling terminological confusion: The demarcation of Computer Ethics

    Connecting Ethics and social context

    Computer Ethics and the roles of experts

    29

  • 8/14/2019 It Ethic Reader

    30/109

    Book: Cyber Ethics

    Chapter Title: Chapter 1 Just Consequentialism and Computing

    Author: James H. Moor

    Quote:The ethical evaluation of a given policy requires the evaluation of the

    consequences of that policy and often the consequences of the policy compared

    with the consequences of the other possible policies. If our actions involving

    computers had no harmful consequences, policies would not be needed.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user.

    Chapter Review:

    As an IT student, I was trained to code, do systems analysis and design, develop a

    program theoretically. Our professors taught us on how to do it, what to do, what

    we can do with this lines of codes. Ethical side? Not really. But before we step out of

    the academe, our school specifically our department gave us this course of

    Information Technology Ethics in which I am taking now. And if I were to think of,

    we were lucky having this so that we may have a distinction of what is ethically

    correct to what is not ethically correct.

    As I have read on the first sub topic that, when considering consequences we

    evaluate the benefits and the harms as I have mentioned we then now know what

    could be possible and not.

    From the title itself, Consequentialism we then need to know the consequence of

    what we are doing. We should be responsible on every aspect that we will be doing

    in relation to what we are studying when we were in the academe.

    30

  • 8/14/2019 It Ethic Reader

    31/109

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on ethics has. Others that

    I learned are some ideas from the subtopics like:

    Consequentialism constrained by justice

    The good as the enemy of the Just

    Computing in uncharted waters

    31

  • 8/14/2019 It Ethic Reader

    32/109

    Book: Cyber Ethics

    Chapter Title: Chapter 2 The Internet as Public Space: Concepts, Issues, and

    Implication in Public Policy

    Author: Jean Camp and Y.T. Chien

    Quote:As a public domain, the internet challenges the average citizens

    imagination for its function and power far beyond computing and communications.

    A variety of public uses of the internet, which draw on one or more of the digital

    characteristics described above, are already upon us or emerging. Each of them

    brings to the fore a set of new opportunities, barriers, and policy issues.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    As we all know internet is a public space in which things going on inside this

    network will or can be seen by anyone given that the webpage/websites you have is

    on a security or not meaning it can be seen publicly. It is typical for us now that we

    use the internet to connect to everyone. We all now have social media site that I

    may say that it is the latest trend of making friends. I remember before, I am a

    child then and that we are just limited to going out of our backyard, playing withour neighbor kids and we make friends with them, or go out to the mall, play on the

    playground and thats it. But on the latest trend we are experiencing today that

    even on facebook and plurk that we usually go to will help us make friends

    nowadays.

    32

  • 8/14/2019 It Ethic Reader

    33/109

    I actually agree on what the article sub topic is said that internet is more than

    multi-media. Actually it is as Jean and Y.T explained on the sub topic, The Internet

    is More than Multi-media that there are four traditional media namely, publisher,

    distributor, broadcaster and common carrier in which internet has it all. We can do

    all of this using the internet. Well thats one thing I know and I learn as I move

    forward. We are aware of the latest innovation like online burol, online medical

    hospital, and alike. Sooner or later it will then have a lot more of these that will

    make internet more than like what we ever taught off. I wish that I will be one of

    the developers of the soon technology.

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on ethics has. I love what

    I have read because I know my world revolves around ethics. Other things that I

    learned are some ideas from the subtopics like:

    The internet is more than multi-media

    Digital characteristics of a public space

    Uses of Internet as public space: Opportunities and Barriers

    33

  • 8/14/2019 It Ethic Reader

    34/109

    Book: Cyber Ethics

    Chapter Title: Chapter 2 The Laws of Cyberspace

    Author: Larry Lessig

    Quote:Norms say what clothes I will wear: a suit, not a dress; they tell you to sit

    quietly, and politely, for at least 40 minutes while I speak; they organize how we

    will interact after this talk is over. Norms guide behavior; in this sense, they

    function as a second regulatory constraint.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new from this article. I

    also then expect to know about law in cyberspace which I should know that I am

    going for a web development track after I graduated in the academe.

    Chapter Review:

    I came to think if the earth is still around if we dont have laws within our

    subordinate, culture, and or native. Are we still all alive by that time we dont have

    a law that to be regulated and obeyed? How will our life be by then? Those are

    some of my queries as I have seen the title.

    Laws of Cyberspace, is it different from the real space law? Well that is what I am

    answering to that what norm, law, and rule we have on cyberspace synonymously

    similar to as what we have in real life. In almost all we do here in real life will be

    put into practice up to the cyberspace world. But there is one problem Larry Lessig

    raised on his article. Given that in the United States you cannot sell pornography

    materials to children. Everythings possible that they can limit kiddos to buy

    pornography videos have been implemented but thinking of, are we able to look

    now on how our children do in the cyber world. Can we still track what they are

    doing or in other words can we still be in shaped that we know he is at an age man

    34

  • 8/14/2019 It Ethic Reader

    35/109

    viewing pornography material via World Wide Web not knowing he is just having an

    age upgraded. Can we still say we can limit those children now? As we all know it is

    difficult for us to disguise ourselves when it we talk of disguising in real life. Those

    wigs can be measured as fake and still we can fail to that. But in cyberspace a

    simple disguise on your age can let those children access the pornography sites

    successfully.

    Now is our time to think on how we will be able to polish things up. I know in time

    we can work with this. One thing I want is to be that person that will start a change

    on a community. Hope I can be. I know and as all we know theres a set of people

    who are in this field of law making. Lets those law makers make a move on this,

    hope they can make it that our world and soon our world will then revolve on

    cyberspace. By the time it will be, we have a better system to this for a better

    world.

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on ethics has. I love what

    I have read because I know my world revolves around ethics. Other things that I

    learned are some ideas from the subtopics which commonly talk about the idea of

    cyberspace law is similar to what we have on real life and what challenges we will

    then have for this.

    35

  • 8/14/2019 It Ethic Reader

    36/109

    Book: Cyber Ethics

    Chapter Title: Chapter 2 Of Black Holes and Decentralized Law-Making in

    Cyberspace

    Author: David G. Post

    Quote:Conditions in cyberspace do seem to create, in professor Elkin-Korens

    words, new opportunities for voluntary normative regimes of this kind. Not

    surprisingly, conflicts between formal and informal, centralized and decentralized,

    rulemaking processes are at the heart of many of the important and challenging

    cyberspace policy debates.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    Have you experienced sending a message to your friends then once youve asked

    them if they got it, they will tell you they havent only to find out that it was

    stocked on their SPAM mail area. Dont you ever wonder why it happens? On my

    part I do. We have an account for example in yahoo, carrying your whole name on

    your electronic mail details but how come they still go to Spam mails one time or

    another? As for me, if you have a valid account it will not be counted as a spamelectronic mail rather treated as a normal e-mail. This is the same incident that

    happened to Sir Tom Fields. Tom Fields e-mail was listed in the RBL [Real-time

    Blackhole List] and now was rejected to send an e-mail to the proper recipient

    because RBL [Real-time Blackhole List] thinks that the email address was a spam.

    36

  • 8/14/2019 It Ethic Reader

    37/109

    If we were to think, it is good have a real-time listings but if it will fail you specially

    for the company better not to use it or maybe just upgrade it to a much more

    better system.

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed

    it a little compare to previous which I enjoyed a lot reading those articles. I cant

    wait to have my own original copy of the book. Anyway, other things that I learned

    are some ideas from the subtopics like:

    The Explanation which briefly explains what happened to Sir Toms email.

    The Debate

    37

  • 8/14/2019 It Ethic Reader

    38/109

    Book: Cyber Ethics

    Chapter Title: Chapter 2 Fahrenheit 451.2: Is cyberspace burning?

    Author: -

    Quote:Internet users know best. The primary responsibility for determining what

    speech to access should remain with the individual internet user; parents should

    take primary responsibility for determining what their children should access.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    Cyberspace is burning? What then? Is it real? Well, technically its not. Cyberspace

    will never be burned or will burn seriously. What it means is that, cyberspace is

    burning like flaming due to its fame or maybe we can say technically that the

    population in the internet is liberal that we cannot say when it will be trimmed down

    or what. Not just who are using it up but same as the web pages that are created,

    uploaded and online web development system that are now available in the wild.

    Let me address cyberspace/internet as the wild. Yes it is a wild, from the word

    itself.

    As I am busying reading the article I may then remember what I or rather we used

    to talk about last term during our Vertical Solutions class. I came up reading about

    the free speech, self-rating thing-of-a-jig. In which I relate it to the human voice

    which 95 theses tackled therefore. Those free verse, open voice that weve

    memorized. Well, in this part I may about to see that they jive the same idea in

    38

  • 8/14/2019 It Ethic Reader

    39/109

    which internet has this free whatsoever that anyone can say/tell his/her opinion via

    wild. But the problem is, if that speech he/she is tackling on his/her blog site or

    whatsoever have an ethical stand. I mean if he/she developed a blog post let say

    which has instilled still morals while he/she is doing it or lets just say that I

    developed a web application in which it is illegal in nature but morally correct.

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed

    it a little compare to previous which I enjoyed a lot reading those articles. The free

    voice which I reminds me of what I had last term.

    39

  • 8/14/2019 It Ethic Reader

    40/109

    Book: Cyber Ethics

    Chapter Title: Chapter 2 Filtering the Internet in the USA: Free speech Denied?

    Author: Richard S. Rosenberg

    Quote:

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    What the heck is it? Why I cant access? Darn! Blocked! Those were some reaction

    we normally have when we see a blocked page. I remember then when I was in the

    elementary. I used to go to MIC [Multiple Intelligences Center], which is our library

    and use our computer facility to surf the internet. I remember that the slot is

    limited so my friends and I were running as fast as we could just to be first on the

    line. We are doing it every snack time we had. We are accessing social sites like

    Friendster that time. We can freely go in and out of it without any strings. But after

    a few months, they had it blocked for they said computers are have been used for

    educational and research purposes only. This is the same thing United States did;

    they had some internets blocked and what so ever. But I then remember that time

    on when they blocked the sites we usually go through then came our knowledgeabout putting up a proxy in which we have accessed through the sites again. We

    were young but then we know a simple strategy on that. Well, same thing as on the

    country like United States. If an ordinary child like us can do proxies how much

    more to their country which is full of knowledge and technology.

    40

  • 8/14/2019 It Ethic Reader

    41/109

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed

    it a little compare to previous which I enjoyed a lot reading those articles. Other

    sub topics gave me an idea and this are:

    Mainstream Loundoun, et. Al v. Board of Trustees of the Loundoun Country

    Library.

    41

  • 8/14/2019 It Ethic Reader

    42/109

    Book: Cyber Ethics

    Chapter Title: Chapter 2 PICS: Internet Access Controls Without Censorship

    Author: Paul Resnick and James Miller

    Quote:

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    What the heck is it? Why I cant access? Darn! Blocked! Those were some reaction

    we normally have when we see a blocked page. I remember then when I was in the

    elementary. I used to go to MIC [Multiple Intelligences Center], which is our library

    and use our computer facility to surf the internet. I remember that the slot is

    limited so my friends and I were running as fast as we could just to be first on the

    line. We are doing it every snack time we had. We are accessing social sites like

    Friendster that time. We can freely go in and out of it without any strings. But after

    a few months, they had it blocked for they said computers are have been used for

    educational and research purposes only. This is the same thing United States did;

    they had some internets blocked and what so ever. But I then remember that time

    on when they blocked the sites we usually go through then came our knowledgeabout putting up a proxy in which we have accessed through the sites again. We

    were young but then we know a simple strategy on that. Well, same thing as on the

    country like United States. If an ordinary child like us can do proxies how much

    more to their country which is full of knowledge and technology.

    42

  • 8/14/2019 It Ethic Reader

    43/109

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed

    it a little compare to previous which I enjoyed a lot reading those articles. Other

    sub topics gave me an idea and this are:

    Mainstream Loundoun, et. Al v. Board of Trustees of the Loundoun Country

    Library.

    43

  • 8/14/2019 It Ethic Reader

    44/109

    Book: Cyber Ethics

    Chapter Title: Chapter 2 Internet Service Providers and Defamation: New

    Standards of Liability

    Author: Richard A. Spinello

    Quote:The problem is compounded since the internet itself has the potential to

    become a defamation prone zone.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    What is defamation? That is one of my questions to this article. Honestly I dont have a

    good vocabulary and so I search for its meaning. According to Internet Business Law

    Services, defamation is the act of making an untrue statement to a third party that

    damages the subject's reputation. There are several subcategories of Defamation, being

    Libel and Slander. Libel is Defaming in a printed forum, such as a newspaper or magazine.

    Slander is spoken Defamation, and could be made person-to-person, or also broadcast over

    a radio or television.

    Being defamed is like putting your name in the air that no one will ever happen to see you.

    It is like your gliding with no one will ever reach for you. You tend to say things and leave

    statements which are not true that others will look at it as badly. Nobility is nothing for you

    in this case.

    Well, technological advancements sometimes leads to misuse of people. Those people never

    think of that those technological advancements we have is brought to us in good ways and

    we should properly use it for the good not for the bad. But how can we have it be used in

    44

  • 8/14/2019 It Ethic Reader

    45/109

    good ways if we dont have ethics right? I guess those people who are being bad inside the

    world wide web community has no proof that they have morals with them and in their souls.

    But anyway, if those moral people did this, were their loyalty and nobility?

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on Internet Defamation. I

    enjoyed it a little compare to some other topics I had earlier which I enjoyed a lot

    reading those articles. Other sub topics gave me an idea and this are:

    Internet Service Providers and Internet Defamation

    Legal Precedents for ISP Liability

    Moral Perspective

    45

  • 8/14/2019 It Ethic Reader

    46/109

    Book: Cyber Ethics

    Chapter Title: Chapter 3 Digital Millennium Copyright Act

    Author: Not Applicable

    Quote:No person shall circumvent a technological measure that effectively

    controls access to a work protected under this title.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    Towards the release rampantly of software and technology based products. Are now

    having a right decision as to what kind of product we will be buying as to we have

    so many technology in the market. All come and go. All we know sometimes is what

    they were called but we dont even mind who made it.

    As to this, we need to have this regulation that may limit those resellers, copiers of

    the product which are technically given all manned efforts just to finish it but at the

    end of the day they were fooled and win to another guy. We should really be

    stopping those kinds of people. I think by having this kind of regulation may limit

    all violators by giving sentence to those who will be caught.

    46

  • 8/14/2019 It Ethic Reader

    47/109

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on Internet and the

    Digital Millenneum Copyright act in which it tackles about the Regulation that hasbeen made for those who are copying to your website. Other things that might say

    I had learned over that like integrity of copyright management information and

    much more.

    47

  • 8/14/2019 It Ethic Reader

    48/109

    Book: Cyber Ethics

    Chapter Title: Chapter 3 Note on DeCSS Trial

    Author: Not said

    Quote:

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Library Reference: -

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Chapter Review:

    What the heck is it? Why I cant access? Darn! Blocked! Those were some reaction

    we normally have when we see a blocked page. I remember then when I was in the

    elementary. I used to go to MIC [Multiple Intelligences Center], which is our library

    and use our computer facility to surf the internet. I remember that the slot is

    limited so my friends and I were running as fast as we could just to be first on the

    line. We are doing it every snack time we had. We are accessing social sites like

    Friendster that time. We can freely go in and out of it without any strings. But after

    a few months, they had it bloc ked for they said computers are have been used for

    educational and research purposes only. This is the same thing United States did;

    they had some internets blocked and what so ever. But I then remember that time

    on when they blocked the sites we usually go through then came our knowledgeabout putting up a proxy in which we have accessed through the sites again. We

    were young but then we know a simple strategy on that. Well, same thing as on the

    country like United States. If an ordinary child like us can do proxies how much

    more to their country which is full of knowledge and technology.

    48

  • 8/14/2019 It Ethic Reader

    49/109

  • 8/14/2019 It Ethic Reader

    50/109

    Book: Cyberethics

    Chapter Title: Chapter 4 Privacy Protection, Control of Information, and Privacy

    Enhancing Technologies

    Author: Hermani T. Tavani and James H. Moor

    Library Reference: Not Applicable

    Quote:Privacy is the claim of individuals, group, or institutions to determine for

    themselves when, how and to what extent information about them is

    communicated to others.

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Book Review:

    In a persons life, sense of privacy is very important especially the things that will

    put our lives into danger. Once we decided that specific information will be kept

    private, we have the control regarding that information and to whom it will be

    shared or how it will be kept. Control is very important specifically when sharing

    some of our own information to other people or when it terms of technology, to

    people who will be able to see it. Privacy- Enhancing technologies will be really

    helpful for people who cant control their privacy since PETs aim to protect personal

    identity. By using PETs, things that should be kept confidential and we choose to be

    private wont give us the risk of letting the information be seen by other people. We

    can choose what information we can share and to whom it will be shared. But even

    though PETs are available to be used to protect public information, it is also

    advisable to have courses of actions that will implement and help people on

    protecting their information. Every person has the right to privacy and all of us

    have things and information that we should keep private.

    50

  • 8/14/2019 It Ethic Reader

    51/109

    What Ive learned:

    As for this chapter I had a quick grasp on how main issue on privacy. I learned to

    differentiate normative privacy from a descriptive privacy and how it is different

    from each other.

    51

  • 8/14/2019 It Ethic Reader

    52/109

    Book: Cyberethics

    Chapter Title: Chapter 4 Toward an Approach to Privacy in Public: Challenges of

    Information Technology

    Author: Helen Nissenbaum

    Library Reference: Not Applicable

    Quote:The important thing is that there be some information which is protected

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Book Review:

    In this article, Privacy or personal realm refers to the family, friends, personalrelationships and other intimates. Like in what happened in the Case of Lotus:

    Marketplace, it is clearly a violation of privacy and the information that is placed in

    an individual is not accurate because it was taken from what is out there without

    any confirmation and permission from these individuals. And since the plan was it

    will be offered to different companies to monitor or to have records regarding the

    citizens, it is clearly an invasion of privacy. Even if it was not accurate, information

    that should be private will now be public because it will be accessed by different

    people from different companies. And since the power of computers and other

    technology, more theories or systems should be made to keep those information

    private because in terms of computers which includes the Web, the privacy of otherpeople will be deprived from them in public.

    52

  • 8/14/2019 It Ethic Reader

    53/109

    What Ive learned:

    Privacy

    The personal Realm

    Violating privacy in public the case of Lotus Marketplace: Households Two misleading Assumptions

    Erroneous Assumption1

    Erroneous assumption 2

    Implications for a theory of privacy

    53

  • 8/14/2019 It Ethic Reader

    54/109

    Chapter Title: Chapter 4 KDD, Privacy, Individuality, and Fairness

    Author: Anton H. Vedder

    Library Reference: Not Applicable

    Quote:The important thing is that there be some information which is protected

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Book Review:

    Knowledge discovery is a process where a data is collected, checked and

    coded and then and then it will be analyzed in a phase called data mining and it will

    be interpreted after analyzed. It is used to collect information from people with

    different personalities, livelihood, age and other social status and will be grouped

    together according to a specific category to conduct tests to predict the behaviour

    of the different groups. It will be helpful for a lot of people especially people who

    works for forensic and judicial purposes and those who analyzes medical patterns.On the other hand, this process treats the people as just mere members of the

    group and forgets that an individual has his/her own unique characteristics and you

    cant formulate any thesis for people by grouping them according to a certain

    characteristic. It can also be used discriminating people and in judging them by the

    group in which they belong. One disadvantage of this is that it can be used as a

    reference for companies and organizations in recruiting people even if it is not

    accurate thus, concluding that a person is not fit for the job offered and prohibiting

    him to exercise his ability. This clearly implies that a persons individuality is

    disregarded. It also violates the privacy of an individual because he/she is being

    judged immediately without any critical assessment and the information will beused in public.

    54

  • 8/14/2019 It Ethic Reader

    55/109

  • 8/14/2019 It Ethic Reader

    56/109

    Chapter Title: Chapter 4 Data Mining and Privacy

    Author: Joseph S. Fulda

    Library Reference: Not Applicable

    Quote:The important thing is that there be some information which is protected

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Book Review:

    Before Data Mining, Knowledge discovery process is being done first. In this

    process, data are being classified first into pre-existing categories. And then it will

    be clustered according to the data created during the analysis wherein a summary

    that will be useful is made to describe dependencies between the variables. After

    that, they will associates between the fields to predict future values of data thus

    formulating patterns that will reveal some trends. One problem of data mining and

    knowledge discovery is that the data of other people is used to link to other

    peoples own data. Linkages were made to access other peoples data thus not

    having the privacy for legal information. Privacy is also violated because their won

    characteristics were used in interpreting their behaviour. And it is a clear violation

    of privacy. Another proof that it violates privacy is that in determining new trends, a

    combination of different characteristics were being examined and will determine

    one new behaviour or trend about a person thus, violating the privacy of that

    person because he/ she is being examined according to his/her behaviour without

    him knowing or without asking permission.

    56

  • 8/14/2019 It Ethic Reader

    57/109

    What Ive learned:

    As for this chapter I had a quick grasp about Data Mining in which I gave my mind

    a new knowledge about this matter. I first heard of it last year, as I study Systems

    Analysis and Design. Other sub topics gave me an idea and this are:

    Knowledge Discovery and Data Mining

    The issue

    Analysis of the issue

    Issues in the first case as well as the second case

    Categories in pre-existing data

    Cluster data by mapping

    57

  • 8/14/2019 It Ethic Reader

    58/109

    Chapter Title: Chapter 4 Workplace Surveillance, Privacy, and Distributive

    Justice

    Author: Lucas D. Introna

    Library Reference: Not Applicable

    Quote:The important thing is that there be some information which is protected

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world means

    and wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Book Review:

    Workplace Surveillance has positive and negative impact on employees and

    on the people who works in accompany with workplace surveillance. Workplace

    surveillance will be very helpful for a company for their security. It will help the

    company monitor any criminal activities that will be performed in their area. It will

    also be helpful in investigations whenever an anomaly will happen in their work. It

    will also help the people in managerial positions to monitor their employees andexamine their behaviour to create a better environment and relationship in their

    work and to monitor employees who will be in line for promotion. Surveillance will

    help them make right decisions regarding their jobs and in promoting the right

    employee for their company. On the other hand, having Workplace surveillance is a

    violation of privacy because it monitors the different activities that an employee is

    doing and checking even the private information like who is he calling, the address

    of the employee, his/her mannerisms, their behaviour in work and the private

    things that they bring on work. Even though it helps them create a good

    atmosphere in their work, if an employee is being monitored in everything that he/

    she does, it will make them feel as if there is nothing that they can do that can beprivate even if they want it to be.

    58

  • 8/14/2019 It Ethic Reader

    59/109

    What Ive learned:

    As for this chapter I had a quick grasp about surveillance and workplace.

    59

  • 8/14/2019 It Ethic Reader

    60/109

    Chapter Title: Chapter 4 Privacy and the varieties of informational wrong doing

    Author: Jeroen van den Hoven

    Library Reference: Not Applicable

    Quote:The important thing is that there be some information which is protected

    Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1

    Learning Expectations: I expect that I may learn things new by reading this

    book. I expect that I may be enlighten on what ethics on the cyber world meansand wants to convey as a web user that allows me to interpret the concepts on to

    my own intellect.

    Book Review:

    There are 3 moral reasons for data protection. These reasons are Information

    Based- Harm, Informational Inequality and Informational Injustice. In Information

    Based- Harm, the information that should be held private was used by

    cybercriminals and malicious hackers to get information for their next victims.

    Sometimes, the things that you post in the Internet that should be kept private orinformation that can be used by the cybercriminals to put your life in danger. You

    must be careful in putting the information in the internet and in other forms of

    technology that will be accessed by the public. The second is the Informational

    Inequality. Here, everything that is offered needs something in return. If you will

    avail something like benefits, in order for you to get those benefits, you have to

    supply them will your personal information, and for this personal information to be

    private, the company or the organization must keep it private and not use it to any

    of its transactions beside the benefits that you availed. Third is the Informational

    Injustice. People sometimes using their relatives information or other peoples

    personal information in getting the things they want and to get out of the law.Sometimes the personal information was also used to get more benefits and more

    privileges. These reasons should be kept in mind when giving your personal

    information to different types of people.

    60

  • 8/14/2019 It Ethic Reader

    61/109

    What Ive learned:

    As for this chapter I had a quick view of data protection. Data should be protected

    as to not being hacked or anomized. Other sub topics gave me an idea towards the

    topic, these are:

    Definition of Privacy

    The different varieties of informational wrongdoing

    Panoptic technologies and the public good

    Information-based harm

    Informational inequality

    Informational injustice

    Spheres of access

    Encroachment on moral autonomy

    61

  • 8/14/2019 It Ethic Reader

    62/109

    Book: Cyberethics

    Chapter Title: Chapter 5 - Defining the Boundaries of Computer Crime: Piracy,

    Break-Ins, and Sabotage in Cyberspace

    Library Reference: Not Applicable

    Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr

    =8-1

    Quote:It is argued that for a criminal act to count as a genuine instance of

    computer crime, the act must be one that can be carried out only through the use

    of computer technology. Limiting genuine computer crimes to ones that can be

    carried out only through the use of computer technology would incorporate Moors

    insight that new opportunities (including new possibilities for crime) are madepossible because of the existence of computer technology.

    Learning Expectation: To know the different categories and types of computer

    crime and establish a clear and coherent criterion for computer crimes

    Book Review:

    With the advent of computers, it has become very difficult to distinguish computer

    crimes to crimes that have the computer only as a medium. Thus, having a

    concrete definition of what is a computer crime is very imperative to see which

    criminal acts involving computers fit and do not fit in the category of computercrime. However, in addressing this issue, there appears to be a sub-issue that

    needs to be solved as well: the categorizing of computer crimes. In categorizing,

    there are three categories that are considered: the legal, moral, and descriptive.

    From a legal perspective, computer crime is viewed as a useful category for

    prosecuting certain kinds of crimes. Meanwhile, viewing from a moral perspective, a

    number of ethical questions both precede and follow from declaring certain

    computer-related activities illegal. But it is the descriptive category that was widely

    supported. This would therefore give the grounds that computers make possible

    certain kinds of criminal activities that otherwise would not be possible in the pre-

    computer era. Now that a certain category is chosen, the next step was to establishclear and coherent criteria in declaring a crime to be a computer crime. The

    foremost criterion is that the act must be one that can be carried out only through

    the use of computer technology. That would then rule out many other cases that

    are thought as being computer crimes: pedophilia over the internet, cheating on

    ones income tax returns, and the like.

    62

    http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
  • 8/14/2019 It Ethic Reader

    63/109

    Now that we had defined what a computer crime is, it is but easy to identify

    computer crimes and eliminate confusion that might ensue to the range of criminal

    activities involving computer technology. And now that computer crimes can be

    identified easily, the next step should be to frame an Internet crime law so that

    computer crimes and its punishments are institutionalized and respected by

    everyone in the world.

    What Ive learned:

    I enjoyed it a little compare to previous which I enjoyed a lot reading those articles.

    Other sub topics gave me an idea and this are:

    Categories of computer crimes

    Legal

    Moral

    Descriptive

    Criteria for identifying a crime as a computer crime

    How to identify computer crimes

    Types of computer crimes

    Piracy

    Break-ins

    Sabotage in cyberspace

    63

  • 8/14/2019 It Ethic Reader

    64/109

    Book: Cyberethics

    Chapter Title: Chapter 5 - Terrorism or Civil Disobedience: Toward a Hacktivist

    Ethic

    Library Reference: Not Applicable

    Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr

    =8-1

    Quote:In order to justify hacktivisms direct action praxis and to legitimate its

    theoretical foundations, two things must be demonstrated. First, it must be shown

    that hacktivism is not the work of curious teenagers with advanced technical

    expertise and a curiosity for infiltrating large computer networks for mere

    intellectual challenge or sophomoric bravado. Moreover, the justification ofhacktivism entails demonstrating that its practitioners are neither crackersthose

    who break into systems for profit or vandalism, nor are they cyberterroriststhose

    who use computer technology with the intention of causing grave harm such as loss

    of life, severe economic losses, or destruction of critical infrastructure. Hacktivism

    must be shown to be ethically motivated.

    Learning Expectation: To explore the frontiers and potentials of the new form of

    civil disobedience that use computers and the internet as medium: hacktivism

    Book Review:

    Civil disobediences ultimate purpose is to achieve social or political change by

    drawing attention to problems and influencing public opinion. Now in this modern

    age, there has been the emergence of a new form of civil disobediencea type that

    is uses computers and the internet to publish information, coordinate effective

    action, and directly lobby policy makers: an act termed as hacktivism. It is a

    combination of the words hack and activism, meaning that this type of civil

    disobedience uses computer hacking to help advance political causes. Hacktivism

    has been used in many instances such as the issue on Kashmir, India, and China,

    East Timor, and on the Zapatista Rebellion, among others. These acts are political

    protests which draw attention to what is perceived to be grave social injustice. Thereason for these actions is clear: they are motivated by a socio-economic system

    that perpetuates discrimination, racism, and economic inequality.

    The main challenge for the noble cause of hacktivists is their identification with

    crackers, people who hack just for the fun and thrill of it, and worst, cyberterrorists.

    The aforementioned puts hacktivists in a bad light, and thus they are often

    perceived as terrorists themselves. It is a bit unfair for hacktivists since they only

    64

    http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
  • 8/14/2019 It Ethic Reader

    65/109

    wanted freedom of information and full democratization of the public sphere, which

    would enable them to express their views freely. Thus, hacktivism needs to be

    legitimized in order to practice direct action protest over the internet freely. In

    legitimizing hacktivism, the current ethical justifications of civil disobedience must

    now include acts of hacktivism. Thus, there is a pressing need to alter and change

    the current provisions of the acts of civil disobedience.

    What Ive learned:

    I enjoyed it a little compare to previous which I enjoyed a lot reading those articles.

    Other sub topics gave me an idea and this are:

    The existence of hacktivists and hacktivism

    Hacktivism as a form of civil disobedience

    Direct acts

    Symbolic acts

    Distinction between hacktivists, crackers, and cyberterrorists

    Ethics of hacktivists

    65

  • 8/14/2019 It Ethic Reader

    66/109

    Book: Cyberethics

    Chapter Title: Chapter 5 - Web Security and Privacy: An American Perspective

    Library Reference: Not Applicable

    Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr

    =8-1

    Quote:Today the Web is the meeting place of both marginal groups and

    mainstream groups who are sometimes the target of violent attacks. Gay rights

    advocates, feminists, and advocates of reproductive rights have all been subject to

    violent attacks in physical space. All of these groups have found safe places to

    associate on the Web, and coexist in cyberspace with even their most extreme

    opponents. However, due to the lack of authentication and encryption, the identitiesand associations of members of any and all of these groups can be tracked by

    invisible observers.

    Learning Expectations:

    To know the difference between security and privacy, and how to protect it whilst

    browsing the Web

    Book Reviews:

    Due to globalization, information can be shared and retrieved by anyone almost

    everywhere. Furthermore, the development of computer technology expedites

    information-sharing. Browsing the Web is a concrete example of how information

    can be retrieved by anyone. But can we do this act while protecting our privacy at

    the same time? Can our identities remain secured and private?

    Before answering the aforementioned questions, we must know first the difference

    between privacy and security. These two words are almost being used

    interchangeable every day, without even knowing that there is a difference between

    those two. Security is the control of the information by the owner, while privacy is

    the control of the information by the subject of the information itself. This brings us

    to the conclusion that privacy requires security, because without the ability to

    control access and distribution of information, privacy cannot be protected.

    Meanwhile, security is privacy.

    Protecting our privacy and security over the internet is harder than manually

    protecting it, due to the advanced tools that the Web can use to extract our

    personal information such as IP addresses and cookies. In an Americans

    66

    http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
  • 8/14/2019 It Ethic Reader

    67/109

    perspective, the right to privacy is very much important, so much so that it is

    included in their constitution, along with the rights of autonomy and seclusion, right

    to pursue private interest privately, right to think and speak freely, the right to read

    anonymously; and the freedom to read without fear of surveillance, among others.

    The Constitutional right to privacy allows individuals to take certain actions without

    fear of retribution, rather than preventing the publication of information as with tort

    law.

    As the issue of privacy is a really pressing concern, there are instruments that we

    can use to protect our privacy. We can use pseudonyms, access controls, and

    cryptography, among others. But even with those instruments, it is but a fact that

    these instruments require time and skills to learn, and that is what many people do

    not have or do not avail to. Thus, the lack of technical savvy limits privacy. It is

    then in our hands and capacity to learn the instruments so as to protect our own

    privacy and security.

    67

  • 8/14/2019 It Ethic Reader

    68/109

    What I learned:

    American legal tradition: privacy as the main focus

    European focus: data protection

    Difference between security and privacy

    Goals of Security

    Integrity

    Authentication

    Confidentiality

    Security tools

    Cryptography

    Access controls

    ISPs

    IPs

    Cookies

    Javascript

    Applets

    ActiveX

    USAs Constitutional right to Privacy

    68

  • 8/14/2019 It Ethic Reader

    69/109

    Book: Cyberethics

    Chapter Title: Chapter 5 - The Meaning of Anonymity in an Information Age

    Library Reference: Not Applicable

    Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-

    Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr

    =8-1

    Quote:In a computerized world, with the systems of information that we currently

    have in place, namelessness by itself is no longer sufficient for protecting what is at

    stake in anonymity. If it is true, as I have suggested, that one can gain access to a

    person through bits, or constellation of bits, on information, then protecting

    anonymity today amounts to more than merely withholding a name. It means

    withholding the information or constellation of information it now takes to get at, orget to, a person. When we think of protecting anonymity we must think about this

    broader range of possibilities; we must think not only of how a person can prevent

    his or her name from being divulged, especially the bits of information that when

    divulged would enable access to him or her.

    Learning Expectations: To know if anonymity could still be protected in this

    Information Age

    Book Review:

    Information Technology has that inherent power to extract and infer identity fromthe simplest things such as email addresses, credit card numbers, phone numbers,

    and other information that we put in when we transact business over the internet or

    even if were just simply taking an online quiz or a personality test on the Web. In

    thinking that it is but natural to put in our online information, we also unknowingly

    reveal information about ourselves, which could then result in our loss of anonymity

    over the Net.

    Given a wide range of possibilities over the internet, we rather choose to remain

    unknown knowing that it is the safest way for us to act, transact, and participate

    without accountability and without worrying that other people might be after us.

    This makes anonymity foster freedom of expression and thought. Thus, to secure

    anonymity, we need both to promote understanding and pursue advocacythat the

    protection of anonymity is very important in order for people to browse the net

    freely.

    69

    http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853