it ethic reader
TRANSCRIPT
-
8/14/2019 It Ethic Reader
1/109
1
-
8/14/2019 It Ethic Reader
2/109
2
-
8/14/2019 It Ethic Reader
3/109
Book: Fortune at the Bottom of the Pyramid
Chapter Title: Chapter 1: The Market at the Bottom of the Pyramid
Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-
Eradicating-Poverty/dp/0131467506
Quote: The strength of these innovative approaches is that they tend to create
opportunities for the poor by offering them choices and encouraging self-esteem.
Learning Expectations:
To know more about markets
To understand the market at the bottom of the pyramid
Chapter Review
Poverty is one of the most daunting problems that our world is facing.
Because of poverty, we need a better approach which involves the people to partner
with them in order to innovate and achieve sustainable win-win scenarios where the
poor are actively engaged and, at the same time, the companies providing products
and services to them are profitable.
The poor represent a latent market for goods and services. Active
engagement of private enterprises at the BOP is a critical element in creating
inclusive capitalism. BOP, as a market, provides a new growth opportunity for the
private sector and a forum for innovations, and it must become an integral part of
the work of the private sector.
As stated in the chapter, all of us are prisoners of our socialization which
means that we perceive things on our own point of view, ideology, experiences, and
established management practices. With that, we let our opinions to judge people.
An example would be, there is an assumption that the poor have no purchasing
power and they do not represent a viable marker but the truth is the poor represent
a significant latent purchasing power because they spend their earnings in their
priorities.
The market development imperative involves both the consumer and the
private sector firm. It has benefits to the consumer and these are creating capacity
to consume, the need for new goods and services, and dignity and choice. Three
principles are mentioned in creating the capacity to consume and these are
3
-
8/14/2019 It Ethic Reader
4/109
affordability, access and availability. The ideal is to create the capacity to earn more
so that the BOP consumers can afford to consume more.
What I have learned
After reading the chapter I learned that the poor could also help the market.
Many people think that they cannot help the market because of their status in life
but they are wrong they judge them easily but it is the other way around, the poor
people became an advantage for them because they gave them profit. There are
also guidelines that would help them to innovate and become successful. Also, we
became prisoners of our socialization, we let our own perceptions rule our life and
judge them in our own opinions but we must not judge them because we dont
know what they could do in order to help the market.
4
-
8/14/2019 It Ethic Reader
5/109
Book: Fortune at the Bottom of the Pyramid
Chapter Title: Chapter 2: Product and Services for the BOP
Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-
Eradicating-Poverty/dp/0131467506
Quote:Because innovations for the BOP markets challenge our established ways
of thinking, BOP markets can become a source of innovations for the developed
markets as well.
Learning Expectation:
To understand how products and services would affect the BOP
To know what ate the products and services for the BOP
Chapter Review
Developmental agencies have tried to replicate developed country models at
the BOP but it has equally unsatisfactory results. Their goal is to reach the entire
population base, including the BOP. The BOP challenged the dominant logic of MNC
managers but advance technology solutions must coexist with the poor and
indifferent electrical and telecom infrastructures.
Also, there is a need for a new philosophy of product development and
innovation that reflects the BOP markets and it must represent a different
perspective from those that we have grown accustomed to. There are innovationsfor the BOP markets, some of these are focus on the price performance of products
and services, innovation requires hybrid solutions, solutions that are developed
must be scalable and transportable across countries, product development must
start from a deep understanding of functionality, not just form, and process
innovations are just critical in BOP markets as product innovations.
Also, innovations must reach the consumer and these innovations do not
require a significant adaptation, because some of the elements might not apply to
all businesses. With that, the managers need to pick, choose and prioritize which
they would adapt that he thinks that would be helpful to them. Innovations for theBOP markets challenge our ways of thinking and these can become a source of
innovations for the developed markets as well.
What I have learned
5
-
8/14/2019 It Ethic Reader
6/109
After I read the chapter I learned that in achieving your goals it should reach
most of the population. Also, innovations are needed and managers should be
careful in choosing which innovation they would use. They should know what they
want to happen and prioritize it. They should focus on their goal and for it to be
successful it requires participation. Also, with the innovations for the BOP markets it
challenged our ways of thinking and this can be a source of innovation for
developed markets.
6
-
8/14/2019 It Ethic Reader
7/109
Book: Fortune at the Bottom of the Pyramid
Chapter Title: Chapter 3: BOP: A Global Community
Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote: Innovations must become value oriented from the consumers
perspective. The BOP focuses attention on both the objective and subjective
performance of the product service.
Learning Expectations:
To know why BOP is a global community
To understand more about global community
Chapter Review
The chapter discusses some sources of opportunities that invests the time
and energy to understand and cater to the BOP markets and these are some of the
BOP markets are large and attractive, many local innovations can be leverages
across other BOP markets that would create global opportunity for local
innovations, some of the innovations will find applications in developed markets,
and lessons for the BOP market can influence the management practices of global
firms.
The chapter is about the innovations that would be helpful in the BOPmarkets and for them the quality, efficacy, potency and usability of solutions
developed for the market are very attractive for the top of the pyramid. It is also
stated that large population is an indicator of the size of the market opportunity.
Also, it is stated that if an industry finds that sweet spot which means the right
business model and the right combination of products and with these markets could
have explosive growth.
For a sustainable development, BOP markets are the great source for
experimentation. MNCs in the markets have the ability and motivation to find
solutions to the problem of packaging emerging markets. With that, innovationsmust become value oriented from the consumers perspective. In order to learn
rapidly, MNCs working would lean to live with a wide variety if relationships are of
large number in institutions. Also, they should learn to cope with different problems
that they are experiencing.
7
-
8/14/2019 It Ethic Reader
8/109
What I have learned
As I read the chapter I understand that markets should learn to make
innovations in their products in order for them to grow. This means that they should
make changes that would help them to improve the products they offer. Also, Ilearned that they need to take risks in order to become successful. They need to
cope up with the different changes that are happening and learn to think of new
strategies. To end I would like to state a quote from the chapter All of us can learn.
The flow of ideas, knowledge, and innovation will become a two-way street from the
developed countries to the developing as well as the reverse.
8
-
8/14/2019 It Ethic Reader
9/109
Book: Fortune at the Bottom of the Pyramid
Chapter Title: Chapter 4: The Ecosystem for Wealth Creation
Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote: A business system is at the heart of the ecosystem wealth creation.
Learning Expectation
To know what is wealth creation
To know that relationship of ecosystem for wealth
creation
Chapter Review
The chapter discusses the market-oriented ecosystem which is a framework
that allows private sector and social actors that act together and create wealth in a
symbiotic relationship. The concept of ecosystem was used because each
constituent has a role to play. They are dependent to each other and the system
adapts and evolves and can be resilient and flexible.
In the ecosystem for a developing country HLL provides the framework, the
intellectual direction, and the processes by which the system is governed and
operated. It is a nodal form that facilitates the entire functioning of the network.
The market- based ecosystem can be a source of informing the poor of the benefitsof transparency in transactions.
It was stated that most of the developing countries do not fully recognize real
costs of corruption and its impact on private sector development and poverty
alleviation. Also, it is stated that commercial laws are critical to the development of
the private sector. The goal in the development is to bring as many people as
possible to enjoy the benefits of an inclusive market. In addition, the private sector
will invent new systems depending on the nature of the market and the need to
bring more people into the market system.
9
-
8/14/2019 It Ethic Reader
10/109
-
8/14/2019 It Ethic Reader
11/109
Book: Fortune at the Bottom of the Pyramid
Chapter Title:Chapter 5: Reducing Corruption: Transaction Governance Capacity
Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote: There is a need for us to recognize that economic growth fuelled by themarket economy around the world is not a single, monolithic problem. Every
country has its own road travel.
Learning Expectation
To be able to know how to reduce corruption
To understand what is Transaction Governance Capacity
Chapter Review
The chapter is about transaction governance capacity which is about making
the entire process as transparent as possible and consistently reinforced. Also, it isimportant to reduce the frictional losses in doing business at the BOP. It is
fundamental to the evolution of capital markets and private sector is the need for atransparent market capital, land, labor, commodities and knowledge. Transparencyresults from widely understood and clearly enforced rules.
Transaction Governace Capacity is the capacity of a society to guarantee
transparency in the process of economic transactions and the ability to enforcecommercial contracts. It is about reducing uncertainty as to ownership and transfer
of ownership. Also, there is a need for us to recognize that economic growth fuelledby the market economy around the world is not a single, monolithic problem. Each
country has its own road to travel.
TGC is also about creating transparency and eliminating uncertainty and risk in
commercial transactions. It has four specifications and these are a system of lawsthat allows for ownership and transfer of property, a process for changing the lawsgoverning property rights that is clear and unambiguous, a system of regulationsthat accommodates complex transactions and institutions that allow the laws to be
implemented fairly and with transparency.
11
-
8/14/2019 It Ethic Reader
12/109
What I have learned
I learned that transparency is very important for the markets and with that itreduces the uncertainties to ownership and transfer of ownership. It also discusses
about corruption and it adds to the business uncertainty. Also, poor countries arenot really poor but they might be rich if we consider trapped assets. Also, with
transparency transactions made should be clear and unambiguous. With that,corruption is about providing privileged access to resources and recognizing thetime value and money. It is a market mechanism for privileged access.
12
-
8/14/2019 It Ethic Reader
13/109
Book: Fortune at the Bottom of the Pyramid
Chapter Title:Chapter 5: Reducing Corruption: Transaction Governance Capacity
Amazon Reference: http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote: Social transformation is about the number of people who believe that theycan inspire to a middle class lifestyle. It is growing evidence of opportunity, role
models, and real signals of change that allow people to change their aspirations.
Learning Expectation:
To know more about social transformation
To know how social transformation affects the market
Chapter Review
With the development of markets and effective business models at the BOP can
transform poverty alleviation task from one of the constant struggle with subsidiesand aid to entrepreneurship and generation of wealth. If the poor are treated at the
BOP as consumer, they can reap the benefits of respect, choice and self-esteem andhave an opportunity to climb out of the poverty trap. BOP markets represent aglobal opportunity and lessons learned at the BOP can transform MNC operations indeveloped countries and can be the engine for the next round of global expansion
trade and good will.
As consumers get an opportunity to participate in and benefit from the choices
of products and services made available through market mechanisms, theaccompanying social and economic transformation can be very rapid. BOP markets
improve their communication in order for them to move fast in building the capacityto communicate with the outside world and the ability to make themselves
understood
As consumers, they are always upgrading from their existing condition andgaining access to modern technology and good products designed with their needsin mind enables them to take a huge step in improving their quality of life.
Social transformation is about the number of people who believe that they caninspire to a middle-class lifestyle. It is the growing evidence of opportunity, role
models, and real signals of change that allow people to change their aspirations.And the goal is to change the pyramid into a diamond.
13
-
8/14/2019 It Ethic Reader
14/109
What I have learned
I learned that markets should consider also the poor as consumers because theycould get benefits of respect, choice and self-esteem that would help them toimprove their life. Also, BOP markets represent a global opportunity and the lessons
learned from it would help them to innovate strategies and think of ways on howthey would improve their process. They should improve their communication in
order for them to move fast in communicating with the outside world. In socialtransformation, it is a growing evidence of opportunity, role models, and real
signals that allow people change their aspirations.
14
-
8/14/2019 It Ethic Reader
15/109
15
-
8/14/2019 It Ethic Reader
16/109
Book: Cyber Ethics
Chapter Title: Chapter 1 Ethics and the Information Revolution
Author: Terrell Ward Bynum
Quote:Computing is changing everything-where and how we work. Where and
how we learn, shop, eat vote, receive medical care, spend free time, make war,
make friends, make love.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user.
Chapter Review:
Terrell Bynum did a great job on explaining and introducing as self-titled, Ethics and
Information Revolution. In here he summarized what happened on years past from
the 1950s up to 1990s. According to Terrell, growing information revolution is notmerely technological but a fundamental of being social and ethical. Well, as all we
know, internet or merely information technology is fast developing. With just
months past we see more of development and it will have a rapid growth when it
comes to information technology. Sooner or later we just need computers to do all
tasks. One day, our daily household will then need computer to do it. Indeed,
computer will be our main component in our lives one day.
Bynum also mentioned some historical milestones in the history of Computer
Ethics. In 1950 Wiener published a computer ethics book, Human Use of Human
Being. He laid down a foundation of computer ethics that time. He was the first
computer ethics author that placed a foundation to the world of computer ethics.
This will be a powerful basis for ethics people. Another book that gave more
strength to Computer Ethics Foundation was the book wrote by Donn Parker in
16
-
8/14/2019 It Ethic Reader
17/109
which he examines unethical and illegal uses of computers by computer
professionals. He published Rules of Ethics in Information Processing in
Communications of ACM in 1968. Series of ethics authors did their job to support
those first born ethics books and evolved their previous theories into a better form.
In this chapter Bynum expound the article by explaining every aspect of what the
ethics author gave to the community. Sample topics were also written. Sample
topics are as follows, Computer in the workplace, computer security, software
ownership, professional responsibility. Computer ethics thinkers then offered two
different views of the ethical relevance of ethics in the computer technology world.
What Ive learned:
As for this chapter I had a quick view and had an introduction to cyber ethics world.
How it evolves from a singular book to a more complex and had a wide variety of it.
17
-
8/14/2019 It Ethic Reader
18/109
Book: Cyber Ethics
Chapter Title: Chapter 1 Ethics On-Line
Author: Deborah G. Johnson
Quote:Anonymity does not seem to be bad in itself. In fact, it can be beneficial in
certain contexts, such as contexts in which race, gender, or physical appearance
get in the way of fair treatment.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that through this article I may be able to know
more about Ethics On-line, what does Deborah wants to imply to her readers, real
anonymity is and such.
Chapter Review:
We can all attest that technology today runs fast as it could. We can say that in a
span of a month or so another invention has to be launched, technology has to be
invented and what have you. Through Deborah Johnson I had a quick knowledge on
what happens to the cyber world that even an online rape exists. I thought that it is
just prostitution that is available online I dont have an enough information that up
to an online rape still exist.
Same as what Bynum realized, technology evolves on a fast pace and well our
ethics will then evolve as these technology evolves and made up a new one.
Anonymity is a topic which Deborah spent time writing with. She then explains whatanonymity is and what lies with anonymity. According to Deborah, anonymity is a
process or term in which an individual can communicate without having an identity,
using pseudonyms and taking on different personas. Another was, someone elses
words and alter them, or may grab someone elses identity and distribute words as
if they were the words behind it. It is somehow we can link to cheating and more of
18
-
8/14/2019 It Ethic Reader
19/109
you are refuse to comply the copyright rules that you copied another persons work
and putting your name as the author of it. Well, it is somehow similar as
photocopying an article putting your name at top and submitting it to your teacher
as if you did it. As I was reading this chapter I was then stuck at the second
problem of anonymity which states that anonymity creates a shroud under which
people are not afraid to say what they think. Even if I am not afraid telling what I
feel, or maybe what I see but I am still on my feet and name putting a signature on
what I say. I am not afraid of telling what I feel, because that is what is inside me.
If there are people who were hurt by my words I dont think it is my responsibility
due to the fact that I tell it to the world generally not on a lone person. If you were
hurt so then accept the fact that my words stabbed you. May or may not be truebut I am free to say it and I am willing to be corrected if ever. For me, that is part
of my learning as a human. To say what you feel and if youre wrong then a person
or persons will then correct you for that. That is what anonymity and what Ive
learned about anonymity by this article.
What Ive learned:
As for this chapter I learned a couple of sentences about anonymity specifically.
What Ive learned here wasnt just a part of my knowledge but will be a part of my
daily living.
19
-
8/14/2019 It Ethic Reader
20/109
-
8/14/2019 It Ethic Reader
21/109
Thats all I think I can share with you guys.
What Ive learned:
As for this chapter I learned a few things in life. Ethics has different persona as we
usually know and it is a matter of how you run the rules as to how you obey it.
21
-
8/14/2019 It Ethic Reader
22/109
Book: Cyber Ethics
Chapter Title: Chapter 1 Disclosive Computer Ethics
Author: Philip Brey
Quote:A typical problem in computer ethics arises because there is a policy
vacuum about how computer technology should be used.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user.
Chapter Review:
Honestly, I dont have a broad idea what is that Mainstream Computer Ethics. But
as I move on with the article I found a spot understanding this article.
As I have read the first part of this article, a brief description in which it gave me an
idea on what will Disclosive Computer Ethics is. The main topic that this article
objectives is to affect influentially within computer ethics, it [Disclosive Ethics] still
deviates from its main approach in computer ethics. A standard model for me is
that you are studying the case deeply. You are about to thing whether it is moral or
not, like what we have as an example, hacking, theft, and what have we. Actually,
these are just continuation of what they first had. What I mean is that, they acted
and gave it first and placed and ethical theory on a certain part. It will then be a
rapid evolution of things behind. As you tend to broaden and evolve tendency is you
have a bigger picture of life in which before it is too specific on a certain trait that
now we dont even all know what ethics are and what are those inside ethics.
Maybe we should get back to the main course instead of the dressings. For me, it is
easy to be ethical the difficulty lies on the side of the people who tend not to know
22
-
8/14/2019 It Ethic Reader
23/109
and have a good grasp of ethics that they tend to be an elementary kiddo that
seem to begin learning what ethics is. I mean, if people has enough or the needed
information maybe we can survive and all of us be ethical. Disclosive is more of
deciphering that is.
What Ive learned:
As for this chapter I had a quick grasp on how main issue on ethics has. Those
typical computer ethics and its evolutions and those Disclosive type of computer
ethics.
23
-
8/14/2019 It Ethic Reader
24/109
Book: Cyber Ethics
Chapter Title: Chapter 1 Gender and Computer Ethics
Author: Alison Adam
Quote:Gender has been somewhat neglected in computer ethics writing to date.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user.
Chapter Review:
First things first, I was shocked when I read that gender has some bearing when it
comes to computer ethics. I dont even think that a gender per se will be a
hindrance or might as well say that a problem to computer society. One problem is
that, womens access to computer technology. Next is those differences between
men and women ethical decision making in relation to information and computer
technology. I actually agree on what Alison wrote on her article, men tend to have a
different view over women. Actually everyone have different view through life, and
as well to ethics, as to what is right over wrong. For me I have my own perception
of ethics in terms of what is right and wrong. I remember one person told me that
they separate men from women at the workplace so to avoid misconception or
what.
24
-
8/14/2019 It Ethic Reader
25/109
What Ive learned:
As for this chapter I had a quick grasp on how main issue on ethics has. Those
typical computer ethics and its evolutions and those Gender ethics that I wasshocked about.
25
-
8/14/2019 It Ethic Reader
26/109
-
8/14/2019 It Ethic Reader
27/109
As I can see to the values of technology that there is a compatibility of work and
use. Like what Winner gave up as an example, solar energy is said to be compatible
with a democratic society but it doesnt mean that it requires us people.
The idea of this article is broad that it is a bit complicated to explain. But that is
somehow a bit of my explanation to this.
What Ive learned:
As for this chapter I had a quick grasp on how main issue on ethics has. The main
idea of technology and it values, what global information infrastructure and a like.
27
-
8/14/2019 It Ethic Reader
28/109
Book: Cyber Ethics
Chapter Title: Chapter 1 Applying Ethical and Moral concepts and Theories to IT
Contexts: Some Key Problems and Challenges
Author: A.J Birrer
Quote:We need not to go into details much further to see that the protocol of the
joint problem solving process by expert and client is a complicated one, and that
the responsibilities of expert and client are intricate and intertwined.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
article. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user. In this article I expect to learn ways on how to
apply ethical and moral concepts and theories to IT contexts.
Chapter Review:
According to AJ Birrer, If we want to apply ethical and moral concepts and theories
to IT contexts we should then have three conditions to make. First is to know what
kind of questions such concepts and theories can be applied and what cannot. Next
is that we should know the limitations of specific concepts and theories. Lastly, we
should have knowledge of the topic and to where you want to apply them.
But what is computer ethics? That is one question that may strike our minds out.
Maybe we can think that computer ethics is morality about computers. What
technically is about computers and how we can use computer on a right manner.
We can think of stuffs like privacy, hacking, software, infringement and stuffs alike.
Well, as the world goes up and running one way or other computer problems will
grow and grow. As the world goes, technology is then passing by like wind part of
this will be the fight on being ethical or not. I cannot feel the pressure of those
28
-
8/14/2019 It Ethic Reader
29/109
ethical problems. I mean as a big impact on my life but as I will be a in the field I
may say that this will cause me a headache too. But as I read this article I have a
quick view on how will I face and carry those problems ahead given it will still be
more a mature problem and have the roots spread out still.
Industry should face the fact that it will still grow and we as an IT practitioners
should make a stand on how we should go with it.
What Ive learned:
As for this chapter I had a quick grasp on how main issue on ethics has specificallyon how to apply ethical and moral concepts and theories to IT contexts. Others are
the following:
Untangling terminological confusion: The demarcation of Computer Ethics
Connecting Ethics and social context
Computer Ethics and the roles of experts
29
-
8/14/2019 It Ethic Reader
30/109
Book: Cyber Ethics
Chapter Title: Chapter 1 Just Consequentialism and Computing
Author: James H. Moor
Quote:The ethical evaluation of a given policy requires the evaluation of the
consequences of that policy and often the consequences of the policy compared
with the consequences of the other possible policies. If our actions involving
computers had no harmful consequences, policies would not be needed.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user.
Chapter Review:
As an IT student, I was trained to code, do systems analysis and design, develop a
program theoretically. Our professors taught us on how to do it, what to do, what
we can do with this lines of codes. Ethical side? Not really. But before we step out of
the academe, our school specifically our department gave us this course of
Information Technology Ethics in which I am taking now. And if I were to think of,
we were lucky having this so that we may have a distinction of what is ethically
correct to what is not ethically correct.
As I have read on the first sub topic that, when considering consequences we
evaluate the benefits and the harms as I have mentioned we then now know what
could be possible and not.
From the title itself, Consequentialism we then need to know the consequence of
what we are doing. We should be responsible on every aspect that we will be doing
in relation to what we are studying when we were in the academe.
30
-
8/14/2019 It Ethic Reader
31/109
What Ive learned:
As for this chapter I had a quick grasp on how main issue on ethics has. Others that
I learned are some ideas from the subtopics like:
Consequentialism constrained by justice
The good as the enemy of the Just
Computing in uncharted waters
31
-
8/14/2019 It Ethic Reader
32/109
Book: Cyber Ethics
Chapter Title: Chapter 2 The Internet as Public Space: Concepts, Issues, and
Implication in Public Policy
Author: Jean Camp and Y.T. Chien
Quote:As a public domain, the internet challenges the average citizens
imagination for its function and power far beyond computing and communications.
A variety of public uses of the internet, which draw on one or more of the digital
characteristics described above, are already upon us or emerging. Each of them
brings to the fore a set of new opportunities, barriers, and policy issues.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
As we all know internet is a public space in which things going on inside this
network will or can be seen by anyone given that the webpage/websites you have is
on a security or not meaning it can be seen publicly. It is typical for us now that we
use the internet to connect to everyone. We all now have social media site that I
may say that it is the latest trend of making friends. I remember before, I am a
child then and that we are just limited to going out of our backyard, playing withour neighbor kids and we make friends with them, or go out to the mall, play on the
playground and thats it. But on the latest trend we are experiencing today that
even on facebook and plurk that we usually go to will help us make friends
nowadays.
32
-
8/14/2019 It Ethic Reader
33/109
I actually agree on what the article sub topic is said that internet is more than
multi-media. Actually it is as Jean and Y.T explained on the sub topic, The Internet
is More than Multi-media that there are four traditional media namely, publisher,
distributor, broadcaster and common carrier in which internet has it all. We can do
all of this using the internet. Well thats one thing I know and I learn as I move
forward. We are aware of the latest innovation like online burol, online medical
hospital, and alike. Sooner or later it will then have a lot more of these that will
make internet more than like what we ever taught off. I wish that I will be one of
the developers of the soon technology.
What Ive learned:
As for this chapter I had a quick grasp on how main issue on ethics has. I love what
I have read because I know my world revolves around ethics. Other things that I
learned are some ideas from the subtopics like:
The internet is more than multi-media
Digital characteristics of a public space
Uses of Internet as public space: Opportunities and Barriers
33
-
8/14/2019 It Ethic Reader
34/109
Book: Cyber Ethics
Chapter Title: Chapter 2 The Laws of Cyberspace
Author: Larry Lessig
Quote:Norms say what clothes I will wear: a suit, not a dress; they tell you to sit
quietly, and politely, for at least 40 minutes while I speak; they organize how we
will interact after this talk is over. Norms guide behavior; in this sense, they
function as a second regulatory constraint.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new from this article. I
also then expect to know about law in cyberspace which I should know that I am
going for a web development track after I graduated in the academe.
Chapter Review:
I came to think if the earth is still around if we dont have laws within our
subordinate, culture, and or native. Are we still all alive by that time we dont have
a law that to be regulated and obeyed? How will our life be by then? Those are
some of my queries as I have seen the title.
Laws of Cyberspace, is it different from the real space law? Well that is what I am
answering to that what norm, law, and rule we have on cyberspace synonymously
similar to as what we have in real life. In almost all we do here in real life will be
put into practice up to the cyberspace world. But there is one problem Larry Lessig
raised on his article. Given that in the United States you cannot sell pornography
materials to children. Everythings possible that they can limit kiddos to buy
pornography videos have been implemented but thinking of, are we able to look
now on how our children do in the cyber world. Can we still track what they are
doing or in other words can we still be in shaped that we know he is at an age man
34
-
8/14/2019 It Ethic Reader
35/109
viewing pornography material via World Wide Web not knowing he is just having an
age upgraded. Can we still say we can limit those children now? As we all know it is
difficult for us to disguise ourselves when it we talk of disguising in real life. Those
wigs can be measured as fake and still we can fail to that. But in cyberspace a
simple disguise on your age can let those children access the pornography sites
successfully.
Now is our time to think on how we will be able to polish things up. I know in time
we can work with this. One thing I want is to be that person that will start a change
on a community. Hope I can be. I know and as all we know theres a set of people
who are in this field of law making. Lets those law makers make a move on this,
hope they can make it that our world and soon our world will then revolve on
cyberspace. By the time it will be, we have a better system to this for a better
world.
What Ive learned:
As for this chapter I had a quick grasp on how main issue on ethics has. I love what
I have read because I know my world revolves around ethics. Other things that I
learned are some ideas from the subtopics which commonly talk about the idea of
cyberspace law is similar to what we have on real life and what challenges we will
then have for this.
35
-
8/14/2019 It Ethic Reader
36/109
Book: Cyber Ethics
Chapter Title: Chapter 2 Of Black Holes and Decentralized Law-Making in
Cyberspace
Author: David G. Post
Quote:Conditions in cyberspace do seem to create, in professor Elkin-Korens
words, new opportunities for voluntary normative regimes of this kind. Not
surprisingly, conflicts between formal and informal, centralized and decentralized,
rulemaking processes are at the heart of many of the important and challenging
cyberspace policy debates.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
Have you experienced sending a message to your friends then once youve asked
them if they got it, they will tell you they havent only to find out that it was
stocked on their SPAM mail area. Dont you ever wonder why it happens? On my
part I do. We have an account for example in yahoo, carrying your whole name on
your electronic mail details but how come they still go to Spam mails one time or
another? As for me, if you have a valid account it will not be counted as a spamelectronic mail rather treated as a normal e-mail. This is the same incident that
happened to Sir Tom Fields. Tom Fields e-mail was listed in the RBL [Real-time
Blackhole List] and now was rejected to send an e-mail to the proper recipient
because RBL [Real-time Blackhole List] thinks that the email address was a spam.
36
-
8/14/2019 It Ethic Reader
37/109
If we were to think, it is good have a real-time listings but if it will fail you specially
for the company better not to use it or maybe just upgrade it to a much more
better system.
What Ive learned:
As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed
it a little compare to previous which I enjoyed a lot reading those articles. I cant
wait to have my own original copy of the book. Anyway, other things that I learned
are some ideas from the subtopics like:
The Explanation which briefly explains what happened to Sir Toms email.
The Debate
37
-
8/14/2019 It Ethic Reader
38/109
Book: Cyber Ethics
Chapter Title: Chapter 2 Fahrenheit 451.2: Is cyberspace burning?
Author: -
Quote:Internet users know best. The primary responsibility for determining what
speech to access should remain with the individual internet user; parents should
take primary responsibility for determining what their children should access.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
Cyberspace is burning? What then? Is it real? Well, technically its not. Cyberspace
will never be burned or will burn seriously. What it means is that, cyberspace is
burning like flaming due to its fame or maybe we can say technically that the
population in the internet is liberal that we cannot say when it will be trimmed down
or what. Not just who are using it up but same as the web pages that are created,
uploaded and online web development system that are now available in the wild.
Let me address cyberspace/internet as the wild. Yes it is a wild, from the word
itself.
As I am busying reading the article I may then remember what I or rather we used
to talk about last term during our Vertical Solutions class. I came up reading about
the free speech, self-rating thing-of-a-jig. In which I relate it to the human voice
which 95 theses tackled therefore. Those free verse, open voice that weve
memorized. Well, in this part I may about to see that they jive the same idea in
38
-
8/14/2019 It Ethic Reader
39/109
which internet has this free whatsoever that anyone can say/tell his/her opinion via
wild. But the problem is, if that speech he/she is tackling on his/her blog site or
whatsoever have an ethical stand. I mean if he/she developed a blog post let say
which has instilled still morals while he/she is doing it or lets just say that I
developed a web application in which it is illegal in nature but morally correct.
What Ive learned:
As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed
it a little compare to previous which I enjoyed a lot reading those articles. The free
voice which I reminds me of what I had last term.
39
-
8/14/2019 It Ethic Reader
40/109
Book: Cyber Ethics
Chapter Title: Chapter 2 Filtering the Internet in the USA: Free speech Denied?
Author: Richard S. Rosenberg
Quote:
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
What the heck is it? Why I cant access? Darn! Blocked! Those were some reaction
we normally have when we see a blocked page. I remember then when I was in the
elementary. I used to go to MIC [Multiple Intelligences Center], which is our library
and use our computer facility to surf the internet. I remember that the slot is
limited so my friends and I were running as fast as we could just to be first on the
line. We are doing it every snack time we had. We are accessing social sites like
Friendster that time. We can freely go in and out of it without any strings. But after
a few months, they had it blocked for they said computers are have been used for
educational and research purposes only. This is the same thing United States did;
they had some internets blocked and what so ever. But I then remember that time
on when they blocked the sites we usually go through then came our knowledgeabout putting up a proxy in which we have accessed through the sites again. We
were young but then we know a simple strategy on that. Well, same thing as on the
country like United States. If an ordinary child like us can do proxies how much
more to their country which is full of knowledge and technology.
40
-
8/14/2019 It Ethic Reader
41/109
What Ive learned:
As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed
it a little compare to previous which I enjoyed a lot reading those articles. Other
sub topics gave me an idea and this are:
Mainstream Loundoun, et. Al v. Board of Trustees of the Loundoun Country
Library.
41
-
8/14/2019 It Ethic Reader
42/109
Book: Cyber Ethics
Chapter Title: Chapter 2 PICS: Internet Access Controls Without Censorship
Author: Paul Resnick and James Miller
Quote:
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
What the heck is it? Why I cant access? Darn! Blocked! Those were some reaction
we normally have when we see a blocked page. I remember then when I was in the
elementary. I used to go to MIC [Multiple Intelligences Center], which is our library
and use our computer facility to surf the internet. I remember that the slot is
limited so my friends and I were running as fast as we could just to be first on the
line. We are doing it every snack time we had. We are accessing social sites like
Friendster that time. We can freely go in and out of it without any strings. But after
a few months, they had it blocked for they said computers are have been used for
educational and research purposes only. This is the same thing United States did;
they had some internets blocked and what so ever. But I then remember that time
on when they blocked the sites we usually go through then came our knowledgeabout putting up a proxy in which we have accessed through the sites again. We
were young but then we know a simple strategy on that. Well, same thing as on the
country like United States. If an ordinary child like us can do proxies how much
more to their country which is full of knowledge and technology.
42
-
8/14/2019 It Ethic Reader
43/109
What Ive learned:
As for this chapter I had a quick grasp on how main issue on spamming. I enjoyed
it a little compare to previous which I enjoyed a lot reading those articles. Other
sub topics gave me an idea and this are:
Mainstream Loundoun, et. Al v. Board of Trustees of the Loundoun Country
Library.
43
-
8/14/2019 It Ethic Reader
44/109
Book: Cyber Ethics
Chapter Title: Chapter 2 Internet Service Providers and Defamation: New
Standards of Liability
Author: Richard A. Spinello
Quote:The problem is compounded since the internet itself has the potential to
become a defamation prone zone.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
What is defamation? That is one of my questions to this article. Honestly I dont have a
good vocabulary and so I search for its meaning. According to Internet Business Law
Services, defamation is the act of making an untrue statement to a third party that
damages the subject's reputation. There are several subcategories of Defamation, being
Libel and Slander. Libel is Defaming in a printed forum, such as a newspaper or magazine.
Slander is spoken Defamation, and could be made person-to-person, or also broadcast over
a radio or television.
Being defamed is like putting your name in the air that no one will ever happen to see you.
It is like your gliding with no one will ever reach for you. You tend to say things and leave
statements which are not true that others will look at it as badly. Nobility is nothing for you
in this case.
Well, technological advancements sometimes leads to misuse of people. Those people never
think of that those technological advancements we have is brought to us in good ways and
we should properly use it for the good not for the bad. But how can we have it be used in
44
-
8/14/2019 It Ethic Reader
45/109
good ways if we dont have ethics right? I guess those people who are being bad inside the
world wide web community has no proof that they have morals with them and in their souls.
But anyway, if those moral people did this, were their loyalty and nobility?
What Ive learned:
As for this chapter I had a quick grasp on how main issue on Internet Defamation. I
enjoyed it a little compare to some other topics I had earlier which I enjoyed a lot
reading those articles. Other sub topics gave me an idea and this are:
Internet Service Providers and Internet Defamation
Legal Precedents for ISP Liability
Moral Perspective
45
-
8/14/2019 It Ethic Reader
46/109
Book: Cyber Ethics
Chapter Title: Chapter 3 Digital Millennium Copyright Act
Author: Not Applicable
Quote:No person shall circumvent a technological measure that effectively
controls access to a work protected under this title.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
Towards the release rampantly of software and technology based products. Are now
having a right decision as to what kind of product we will be buying as to we have
so many technology in the market. All come and go. All we know sometimes is what
they were called but we dont even mind who made it.
As to this, we need to have this regulation that may limit those resellers, copiers of
the product which are technically given all manned efforts just to finish it but at the
end of the day they were fooled and win to another guy. We should really be
stopping those kinds of people. I think by having this kind of regulation may limit
all violators by giving sentence to those who will be caught.
46
-
8/14/2019 It Ethic Reader
47/109
What Ive learned:
As for this chapter I had a quick grasp on how main issue on Internet and the
Digital Millenneum Copyright act in which it tackles about the Regulation that hasbeen made for those who are copying to your website. Other things that might say
I had learned over that like integrity of copyright management information and
much more.
47
-
8/14/2019 It Ethic Reader
48/109
Book: Cyber Ethics
Chapter Title: Chapter 3 Note on DeCSS Trial
Author: Not said
Quote:
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Library Reference: -
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Chapter Review:
What the heck is it? Why I cant access? Darn! Blocked! Those were some reaction
we normally have when we see a blocked page. I remember then when I was in the
elementary. I used to go to MIC [Multiple Intelligences Center], which is our library
and use our computer facility to surf the internet. I remember that the slot is
limited so my friends and I were running as fast as we could just to be first on the
line. We are doing it every snack time we had. We are accessing social sites like
Friendster that time. We can freely go in and out of it without any strings. But after
a few months, they had it bloc ked for they said computers are have been used for
educational and research purposes only. This is the same thing United States did;
they had some internets blocked and what so ever. But I then remember that time
on when they blocked the sites we usually go through then came our knowledgeabout putting up a proxy in which we have accessed through the sites again. We
were young but then we know a simple strategy on that. Well, same thing as on the
country like United States. If an ordinary child like us can do proxies how much
more to their country which is full of knowledge and technology.
48
-
8/14/2019 It Ethic Reader
49/109
-
8/14/2019 It Ethic Reader
50/109
Book: Cyberethics
Chapter Title: Chapter 4 Privacy Protection, Control of Information, and Privacy
Enhancing Technologies
Author: Hermani T. Tavani and James H. Moor
Library Reference: Not Applicable
Quote:Privacy is the claim of individuals, group, or institutions to determine for
themselves when, how and to what extent information about them is
communicated to others.
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Book Review:
In a persons life, sense of privacy is very important especially the things that will
put our lives into danger. Once we decided that specific information will be kept
private, we have the control regarding that information and to whom it will be
shared or how it will be kept. Control is very important specifically when sharing
some of our own information to other people or when it terms of technology, to
people who will be able to see it. Privacy- Enhancing technologies will be really
helpful for people who cant control their privacy since PETs aim to protect personal
identity. By using PETs, things that should be kept confidential and we choose to be
private wont give us the risk of letting the information be seen by other people. We
can choose what information we can share and to whom it will be shared. But even
though PETs are available to be used to protect public information, it is also
advisable to have courses of actions that will implement and help people on
protecting their information. Every person has the right to privacy and all of us
have things and information that we should keep private.
50
-
8/14/2019 It Ethic Reader
51/109
What Ive learned:
As for this chapter I had a quick grasp on how main issue on privacy. I learned to
differentiate normative privacy from a descriptive privacy and how it is different
from each other.
51
-
8/14/2019 It Ethic Reader
52/109
Book: Cyberethics
Chapter Title: Chapter 4 Toward an Approach to Privacy in Public: Challenges of
Information Technology
Author: Helen Nissenbaum
Library Reference: Not Applicable
Quote:The important thing is that there be some information which is protected
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Book Review:
In this article, Privacy or personal realm refers to the family, friends, personalrelationships and other intimates. Like in what happened in the Case of Lotus:
Marketplace, it is clearly a violation of privacy and the information that is placed in
an individual is not accurate because it was taken from what is out there without
any confirmation and permission from these individuals. And since the plan was it
will be offered to different companies to monitor or to have records regarding the
citizens, it is clearly an invasion of privacy. Even if it was not accurate, information
that should be private will now be public because it will be accessed by different
people from different companies. And since the power of computers and other
technology, more theories or systems should be made to keep those information
private because in terms of computers which includes the Web, the privacy of otherpeople will be deprived from them in public.
52
-
8/14/2019 It Ethic Reader
53/109
What Ive learned:
Privacy
The personal Realm
Violating privacy in public the case of Lotus Marketplace: Households Two misleading Assumptions
Erroneous Assumption1
Erroneous assumption 2
Implications for a theory of privacy
53
-
8/14/2019 It Ethic Reader
54/109
Chapter Title: Chapter 4 KDD, Privacy, Individuality, and Fairness
Author: Anton H. Vedder
Library Reference: Not Applicable
Quote:The important thing is that there be some information which is protected
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Book Review:
Knowledge discovery is a process where a data is collected, checked and
coded and then and then it will be analyzed in a phase called data mining and it will
be interpreted after analyzed. It is used to collect information from people with
different personalities, livelihood, age and other social status and will be grouped
together according to a specific category to conduct tests to predict the behaviour
of the different groups. It will be helpful for a lot of people especially people who
works for forensic and judicial purposes and those who analyzes medical patterns.On the other hand, this process treats the people as just mere members of the
group and forgets that an individual has his/her own unique characteristics and you
cant formulate any thesis for people by grouping them according to a certain
characteristic. It can also be used discriminating people and in judging them by the
group in which they belong. One disadvantage of this is that it can be used as a
reference for companies and organizations in recruiting people even if it is not
accurate thus, concluding that a person is not fit for the job offered and prohibiting
him to exercise his ability. This clearly implies that a persons individuality is
disregarded. It also violates the privacy of an individual because he/she is being
judged immediately without any critical assessment and the information will beused in public.
54
-
8/14/2019 It Ethic Reader
55/109
-
8/14/2019 It Ethic Reader
56/109
Chapter Title: Chapter 4 Data Mining and Privacy
Author: Joseph S. Fulda
Library Reference: Not Applicable
Quote:The important thing is that there be some information which is protected
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Book Review:
Before Data Mining, Knowledge discovery process is being done first. In this
process, data are being classified first into pre-existing categories. And then it will
be clustered according to the data created during the analysis wherein a summary
that will be useful is made to describe dependencies between the variables. After
that, they will associates between the fields to predict future values of data thus
formulating patterns that will reveal some trends. One problem of data mining and
knowledge discovery is that the data of other people is used to link to other
peoples own data. Linkages were made to access other peoples data thus not
having the privacy for legal information. Privacy is also violated because their won
characteristics were used in interpreting their behaviour. And it is a clear violation
of privacy. Another proof that it violates privacy is that in determining new trends, a
combination of different characteristics were being examined and will determine
one new behaviour or trend about a person thus, violating the privacy of that
person because he/ she is being examined according to his/her behaviour without
him knowing or without asking permission.
56
-
8/14/2019 It Ethic Reader
57/109
What Ive learned:
As for this chapter I had a quick grasp about Data Mining in which I gave my mind
a new knowledge about this matter. I first heard of it last year, as I study Systems
Analysis and Design. Other sub topics gave me an idea and this are:
Knowledge Discovery and Data Mining
The issue
Analysis of the issue
Issues in the first case as well as the second case
Categories in pre-existing data
Cluster data by mapping
57
-
8/14/2019 It Ethic Reader
58/109
Chapter Title: Chapter 4 Workplace Surveillance, Privacy, and Distributive
Justice
Author: Lucas D. Introna
Library Reference: Not Applicable
Quote:The important thing is that there be some information which is protected
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world means
and wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Book Review:
Workplace Surveillance has positive and negative impact on employees and
on the people who works in accompany with workplace surveillance. Workplace
surveillance will be very helpful for a company for their security. It will help the
company monitor any criminal activities that will be performed in their area. It will
also be helpful in investigations whenever an anomaly will happen in their work. It
will also help the people in managerial positions to monitor their employees andexamine their behaviour to create a better environment and relationship in their
work and to monitor employees who will be in line for promotion. Surveillance will
help them make right decisions regarding their jobs and in promoting the right
employee for their company. On the other hand, having Workplace surveillance is a
violation of privacy because it monitors the different activities that an employee is
doing and checking even the private information like who is he calling, the address
of the employee, his/her mannerisms, their behaviour in work and the private
things that they bring on work. Even though it helps them create a good
atmosphere in their work, if an employee is being monitored in everything that he/
she does, it will make them feel as if there is nothing that they can do that can beprivate even if they want it to be.
58
-
8/14/2019 It Ethic Reader
59/109
What Ive learned:
As for this chapter I had a quick grasp about surveillance and workplace.
59
-
8/14/2019 It Ethic Reader
60/109
Chapter Title: Chapter 4 Privacy and the varieties of informational wrong doing
Author: Jeroen van den Hoven
Library Reference: Not Applicable
Quote:The important thing is that there be some information which is protected
Amazon Reference:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1
Learning Expectations: I expect that I may learn things new by reading this
book. I expect that I may be enlighten on what ethics on the cyber world meansand wants to convey as a web user that allows me to interpret the concepts on to
my own intellect.
Book Review:
There are 3 moral reasons for data protection. These reasons are Information
Based- Harm, Informational Inequality and Informational Injustice. In Information
Based- Harm, the information that should be held private was used by
cybercriminals and malicious hackers to get information for their next victims.
Sometimes, the things that you post in the Internet that should be kept private orinformation that can be used by the cybercriminals to put your life in danger. You
must be careful in putting the information in the internet and in other forms of
technology that will be accessed by the public. The second is the Informational
Inequality. Here, everything that is offered needs something in return. If you will
avail something like benefits, in order for you to get those benefits, you have to
supply them will your personal information, and for this personal information to be
private, the company or the organization must keep it private and not use it to any
of its transactions beside the benefits that you availed. Third is the Informational
Injustice. People sometimes using their relatives information or other peoples
personal information in getting the things they want and to get out of the law.Sometimes the personal information was also used to get more benefits and more
privileges. These reasons should be kept in mind when giving your personal
information to different types of people.
60
-
8/14/2019 It Ethic Reader
61/109
What Ive learned:
As for this chapter I had a quick view of data protection. Data should be protected
as to not being hacked or anomized. Other sub topics gave me an idea towards the
topic, these are:
Definition of Privacy
The different varieties of informational wrongdoing
Panoptic technologies and the public good
Information-based harm
Informational inequality
Informational injustice
Spheres of access
Encroachment on moral autonomy
61
-
8/14/2019 It Ethic Reader
62/109
Book: Cyberethics
Chapter Title: Chapter 5 - Defining the Boundaries of Computer Crime: Piracy,
Break-Ins, and Sabotage in Cyberspace
Library Reference: Not Applicable
Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr
=8-1
Quote:It is argued that for a criminal act to count as a genuine instance of
computer crime, the act must be one that can be carried out only through the use
of computer technology. Limiting genuine computer crimes to ones that can be
carried out only through the use of computer technology would incorporate Moors
insight that new opportunities (including new possibilities for crime) are madepossible because of the existence of computer technology.
Learning Expectation: To know the different categories and types of computer
crime and establish a clear and coherent criterion for computer crimes
Book Review:
With the advent of computers, it has become very difficult to distinguish computer
crimes to crimes that have the computer only as a medium. Thus, having a
concrete definition of what is a computer crime is very imperative to see which
criminal acts involving computers fit and do not fit in the category of computercrime. However, in addressing this issue, there appears to be a sub-issue that
needs to be solved as well: the categorizing of computer crimes. In categorizing,
there are three categories that are considered: the legal, moral, and descriptive.
From a legal perspective, computer crime is viewed as a useful category for
prosecuting certain kinds of crimes. Meanwhile, viewing from a moral perspective, a
number of ethical questions both precede and follow from declaring certain
computer-related activities illegal. But it is the descriptive category that was widely
supported. This would therefore give the grounds that computers make possible
certain kinds of criminal activities that otherwise would not be possible in the pre-
computer era. Now that a certain category is chosen, the next step was to establishclear and coherent criteria in declaring a crime to be a computer crime. The
foremost criterion is that the act must be one that can be carried out only through
the use of computer technology. That would then rule out many other cases that
are thought as being computer crimes: pedophilia over the internet, cheating on
ones income tax returns, and the like.
62
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1 -
8/14/2019 It Ethic Reader
63/109
Now that we had defined what a computer crime is, it is but easy to identify
computer crimes and eliminate confusion that might ensue to the range of criminal
activities involving computer technology. And now that computer crimes can be
identified easily, the next step should be to frame an Internet crime law so that
computer crimes and its punishments are institutionalized and respected by
everyone in the world.
What Ive learned:
I enjoyed it a little compare to previous which I enjoyed a lot reading those articles.
Other sub topics gave me an idea and this are:
Categories of computer crimes
Legal
Moral
Descriptive
Criteria for identifying a crime as a computer crime
How to identify computer crimes
Types of computer crimes
Piracy
Break-ins
Sabotage in cyberspace
63
-
8/14/2019 It Ethic Reader
64/109
Book: Cyberethics
Chapter Title: Chapter 5 - Terrorism or Civil Disobedience: Toward a Hacktivist
Ethic
Library Reference: Not Applicable
Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr
=8-1
Quote:In order to justify hacktivisms direct action praxis and to legitimate its
theoretical foundations, two things must be demonstrated. First, it must be shown
that hacktivism is not the work of curious teenagers with advanced technical
expertise and a curiosity for infiltrating large computer networks for mere
intellectual challenge or sophomoric bravado. Moreover, the justification ofhacktivism entails demonstrating that its practitioners are neither crackersthose
who break into systems for profit or vandalism, nor are they cyberterroriststhose
who use computer technology with the intention of causing grave harm such as loss
of life, severe economic losses, or destruction of critical infrastructure. Hacktivism
must be shown to be ethically motivated.
Learning Expectation: To explore the frontiers and potentials of the new form of
civil disobedience that use computers and the internet as medium: hacktivism
Book Review:
Civil disobediences ultimate purpose is to achieve social or political change by
drawing attention to problems and influencing public opinion. Now in this modern
age, there has been the emergence of a new form of civil disobediencea type that
is uses computers and the internet to publish information, coordinate effective
action, and directly lobby policy makers: an act termed as hacktivism. It is a
combination of the words hack and activism, meaning that this type of civil
disobedience uses computer hacking to help advance political causes. Hacktivism
has been used in many instances such as the issue on Kashmir, India, and China,
East Timor, and on the Zapatista Rebellion, among others. These acts are political
protests which draw attention to what is perceived to be grave social injustice. Thereason for these actions is clear: they are motivated by a socio-economic system
that perpetuates discrimination, racism, and economic inequality.
The main challenge for the noble cause of hacktivists is their identification with
crackers, people who hack just for the fun and thrill of it, and worst, cyberterrorists.
The aforementioned puts hacktivists in a bad light, and thus they are often
perceived as terrorists themselves. It is a bit unfair for hacktivists since they only
64
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1 -
8/14/2019 It Ethic Reader
65/109
wanted freedom of information and full democratization of the public sphere, which
would enable them to express their views freely. Thus, hacktivism needs to be
legitimized in order to practice direct action protest over the internet freely. In
legitimizing hacktivism, the current ethical justifications of civil disobedience must
now include acts of hacktivism. Thus, there is a pressing need to alter and change
the current provisions of the acts of civil disobedience.
What Ive learned:
I enjoyed it a little compare to previous which I enjoyed a lot reading those articles.
Other sub topics gave me an idea and this are:
The existence of hacktivists and hacktivism
Hacktivism as a form of civil disobedience
Direct acts
Symbolic acts
Distinction between hacktivists, crackers, and cyberterrorists
Ethics of hacktivists
65
-
8/14/2019 It Ethic Reader
66/109
Book: Cyberethics
Chapter Title: Chapter 5 - Web Security and Privacy: An American Perspective
Library Reference: Not Applicable
Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr
=8-1
Quote:Today the Web is the meeting place of both marginal groups and
mainstream groups who are sometimes the target of violent attacks. Gay rights
advocates, feminists, and advocates of reproductive rights have all been subject to
violent attacks in physical space. All of these groups have found safe places to
associate on the Web, and coexist in cyberspace with even their most extreme
opponents. However, due to the lack of authentication and encryption, the identitiesand associations of members of any and all of these groups can be tracked by
invisible observers.
Learning Expectations:
To know the difference between security and privacy, and how to protect it whilst
browsing the Web
Book Reviews:
Due to globalization, information can be shared and retrieved by anyone almost
everywhere. Furthermore, the development of computer technology expedites
information-sharing. Browsing the Web is a concrete example of how information
can be retrieved by anyone. But can we do this act while protecting our privacy at
the same time? Can our identities remain secured and private?
Before answering the aforementioned questions, we must know first the difference
between privacy and security. These two words are almost being used
interchangeable every day, without even knowing that there is a difference between
those two. Security is the control of the information by the owner, while privacy is
the control of the information by the subject of the information itself. This brings us
to the conclusion that privacy requires security, because without the ability to
control access and distribution of information, privacy cannot be protected.
Meanwhile, security is privacy.
Protecting our privacy and security over the internet is harder than manually
protecting it, due to the advanced tools that the Web can use to extract our
personal information such as IP addresses and cookies. In an Americans
66
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1 -
8/14/2019 It Ethic Reader
67/109
perspective, the right to privacy is very much important, so much so that it is
included in their constitution, along with the rights of autonomy and seclusion, right
to pursue private interest privately, right to think and speak freely, the right to read
anonymously; and the freedom to read without fear of surveillance, among others.
The Constitutional right to privacy allows individuals to take certain actions without
fear of retribution, rather than preventing the publication of information as with tort
law.
As the issue of privacy is a really pressing concern, there are instruments that we
can use to protect our privacy. We can use pseudonyms, access controls, and
cryptography, among others. But even with those instruments, it is but a fact that
these instruments require time and skills to learn, and that is what many people do
not have or do not avail to. Thus, the lack of technical savvy limits privacy. It is
then in our hands and capacity to learn the instruments so as to protect our own
privacy and security.
67
-
8/14/2019 It Ethic Reader
68/109
What I learned:
American legal tradition: privacy as the main focus
European focus: data protection
Difference between security and privacy
Goals of Security
Integrity
Authentication
Confidentiality
Security tools
Cryptography
Access controls
ISPs
IPs
Cookies
Javascript
Applets
ActiveX
USAs Constitutional right to Privacy
68
-
8/14/2019 It Ethic Reader
69/109
Book: Cyberethics
Chapter Title: Chapter 5 - The Meaning of Anonymity in an Information Age
Library Reference: Not Applicable
Amazon:http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-
Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr
=8-1
Quote:In a computerized world, with the systems of information that we currently
have in place, namelessness by itself is no longer sufficient for protecting what is at
stake in anonymity. If it is true, as I have suggested, that one can gain access to a
person through bits, or constellation of bits, on information, then protecting
anonymity today amounts to more than merely withholding a name. It means
withholding the information or constellation of information it now takes to get at, orget to, a person. When we think of protecting anonymity we must think about this
broader range of possibilities; we must think not only of how a person can prevent
his or her name from being divulged, especially the bits of information that when
divulged would enable access to him or her.
Learning Expectations: To know if anonymity could still be protected in this
Information Age
Book Review:
Information Technology has that inherent power to extract and infer identity fromthe simplest things such as email addresses, credit card numbers, phone numbers,
and other information that we put in when we transact business over the internet or
even if were just simply taking an online quiz or a personality test on the Web. In
thinking that it is but natural to put in our online information, we also unknowingly
reveal information about ourselves, which could then result in our loss of anonymity
over the Net.
Given a wide range of possibilities over the internet, we rather choose to remain
unknown knowing that it is the safest way for us to act, transact, and participate
without accountability and without worrying that other people might be after us.
This makes anonymity foster freedom of expression and thought. Thus, to secure
anonymity, we need both to promote understanding and pursue advocacythat the
protection of anonymity is very important in order for people to browse the net
freely.
69
http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853343&sr=8-1http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1238853