itethic reader [final] by francis t guison

181
Information Technology Ethics Reader S.Y 2008-2009 3 rd Term By: Francisco T. Guison Page 1 An Information Ethic Book For Ethic Reader By Francisco Ma. T. Guison This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License .

Upload: francis-guison

Post on 12-Nov-2014

199 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 1

An

Information Ethic Book

For

Ethic Reader

By

Francisco Ma. T. Guison

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License.

Page 2: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 2

TABLE OF CONTENTS

Cyber Ethics…………………………………………………………………………pp: 7- 93

1. Ethics and the Information Revolution 2. Ethics On-Line 3. Reason, Relativity, and Responsibility in Computer Ethics 4. Disclosive Computer Ethics 5. Gender and Computer Ethics 6. Is the Global Information Infrastructure a Democratic Technology 7. Applying Ethical and Moral Concepts and Theories to IT Contexts 8. Just Consequentialism and Computing 9. The Internet as Public Space 10. The Laws of Cyberspace 11. Of Black Holes and Decentralized Law-Making in Cyberspace 12. Fahrenheit 451.2: Is Cyberspace Burning?

13. Filtering the Internet in the USA: Free Speech Denied 14. Censorship, the Internet, and the Child Pornography Law of 1996: A Critique 15. PICS: Internet Access Controls without Censorship 16. Internet Service Providers and Defamation: New Standards of Liability 17. Digital Millennium Copyright Act 18. Note on the DeCSS Trial 19. A Politics of Intellectual Property: Environmentalism for the Net 20. Intellectual Property, Information, and the Common Good 21. Is Copyright Ethical an Examination of the Theories, Laws, and Practices Regarding the Private 22. On the Web, Plagiarism Matters More Than Copyright Piracy 23. An Ethical Evaluation of Web Site Linking 24. The Cathedral and the Bazaar 25. Towards A Theory of Piracy for the Information Age 26. The Structure of Rights in Directive 95 46 EC 27. Privacy Protection, Control of Information, and Privacy-Enhancing Technologies 28. Toward an Approach to Privacy in Public: Challenges of Information Technology 29. KDD, Privacy, Individuality, and Fairness 30. Data Mining and Privacy 31. Workplace Surveillance, Privacy, and Distributive Justice 32. Privacy and Varieties of Informational Wrongdoing 33. PICS: Internet Access Controls Without Censorship 34. Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace 35. Terrorism or Civil Disobedience: Toward a Hacktivist Ethic 36. Web Security and Privacy: An American Perspective 37. The Meaning of Anonymity in an Information Age 38. Written on the Body: Biometrics and Identity 39. Ethical Considerations for the Information Professions 40. Software Engineering Code of Ethics: Approved 41. No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All 42. Subsumption Ethics 43. Ethical Issues in Business Computing 44. The Practitioner from Within: Revisiting the Virtues

Page 3: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 3

The Handbook of Information and Computer Ethic…………………………………………………pp

1. Foundations of Information Ethic 2. Milestones in the History of Information and Computer Ethics 3. Moral Methodology and Information Technology 4. Value Sensitive Design and Information Systems 5. Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property 6. Informational Privacy: Concepts, Theories, and Controversies 7. Online Anonymity 8. Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterhacking 9. Information Ethics and the Library Profession 10. Ethical Interest in Free and Open Source Software 11. Internet Research Ethics: The Field and Its Critical Issues 12. Health Information Technology: Challenges in Ethics, Science, and Uncertainty 13. Ethical Issues of Information and Business 14. Responsibilities for Information on the Internet 15. Virtual Reality and Computer Simulation 16. Genetic Information: Epistemological and Ethical Issues 17. The Ethics of Cyber Conflict 18. A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection 19. Regulation and Governance of the Internet 20. Information Overload 21. Email Spam 22. The Matter of Plagiarism: What, Why, and If 23. Intellectual Property: Legal and Moral Challenges of Online File Sharing 24. Censorship and Access to Expression 25. The Gender Agenda in Computer Ethics 26. The Digital Divide: A Perspective for the Future 27. Intercultural Information Ethics

The Fortune at the Bottom of the Pyramid………………………………………….............

1. The Market at the Bottom of the Pyramid 2. Products and Services for the BOP 3. BOP: A Global Opportunity 4. The Ecosystem for Wealth Creation 5. Reducing Corruption: Transaction Governance Capacity 6. Development as Social Transformation

ITETHIC Assignments and Activities

Page 4: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 4

PREFACE

Hello Reader, This compilation contains the moral and ethical values in Information Technology at De La Salle-

College of Saint Benilde during the third semester, ninth term of school year 2008-2009. All chapters of

the given book are summarized on this compilation, and these 77 chapters of books entitled, Cyberethics,

Handbook of Information and Computer Ethics, and Bottom of the Pyramid are all included here.

For the book Cyberethics, it contains the history and evolution of people on how they deal and

accept broadly the power of technology and applying perception of humanity in their respective ethical

values. This particular book changes everything because people studied these concept for be able for us

to realize the power of ourselves to technology. “Cyber” is a technical term for connected and “Ethic” is

moral belief of the people. For the Handbook of computer ethics, is the realization of human to

computers and technology on how they can make it through the challenges in our everyday lives. We ask

the question on how can we tolerate and be faithful to technology which is also made by man. Given the

Computer ethics chapters are the concepts that contains the ethical values of man and their respective

behaviors towards computers or technology. For the Fortune at the Bottom of The Pyramid, a best

book includes the strategies on how market grows in economy. This book also focuses on Corporate

Social Responsibility, a topic of the book tha help companies extend their hands to the poor or

unfortunate people.

After all difficulties I experienced, finally, I can say that all the time I sacrificed is worth it. I’m

proud to say that I accomplished something done with my mind, heart and soul. Applying the learning that

I learned from Information Technology Ethic class, I successfully completed all of these. As a reward for

myself, I am considering this compilation of books as a reward for you. It is a privilege that somebody can

read my compilation. It is a great experience that I’ve done all of these in a short period of time.

It is an honor that my works are now in your hands. Please be reminded that all of my works here

are based on my own opinion. If there are some conflicts between my opinion and your opinion, please

bare with it. I will also respect what’s on your mind about this particular thought. I hope that you learned

something from my compilation. I am really thankful that you choose by compilation. Lastly, enjoy reading

my compilation.

Thank You!

Francisco T. Guison

Information Technology Ethics (S.Y 2008-2009)

De La Salle-College of Saint Benilde

Page 5: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 5

DEDICATION

To my Family and Friends,

Parents, Guardians, My Sister, Relative, Block O1S and O1T, CSB Classmates, Schoolmates

who gave me an inspiration and support in doing this job.

To our professors, specially Mr. Paul Pajo

For giving me patience for all my responsibilities in my school works.

For giving me an opportunity to express my perspective in Information Technology Ethics and in

ITETHIC Class.

Lastly, to God,

For giving me strength and opportunities and light in for all challenges that I overcome.

Page 6: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 6

CYBERETHICS

Book Review: Chapter 1: Ethics and the Information Revolution Book: Cyberethics Library Reference: N/A Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“Because of their logical malleability, computers create new possibilities for human action that would appear to be limitless.”

I chose this quote because it describes how people created the power of technology. They greatly influenced the people today, in the modern period. This malleability is the foundation that gives inspiration for the people today to maximize the use of technology and to create new possibilities in improving our lives. Just like what Fujitsu said “Possibilities are Infinite”

Learning Expectations

• To know the basic conceptual framework made by humans. • How conceptual frameworks of ethical values are important to technology. • To know the basic ethical values.

Review: In the beginning of this book, the chapter one talks about how technology and ethical values as a conceptualize framework. From the beginning, people developed technology but it is in informal way. Of course, people that time are starting from scratch so they need enough knowledge in order for them to develop technology. While developing it, they merge their ethical values knowing what is right and wrong for the development of technology. This means that they included value trait applying on what they are doing. This chapter is subdivided into three readings. These are the “Ethics and the Information Revolution”, “Ethics On-line” and “Reason, Relativity and Responsibility in Computer Ethics”. In the first reading, the author, Terrell Bynum, is referring to “Global Information Ethics”. This is the start of Information with ethics defining the field of computer ethics itself. The author wants to document how it started from the beginning contributions. As stated here, the overview of this field provides the readers how fairly comprehensive is this and as a result, the deliverable of the author is good because his essay conclusion included 2 different hypotheses which has a different point of view but it is in the same field of ethics. This will help Information Ethics for the future. The reading 1 serves as a foundation for the Information Technology Ethical values. The second reading is the “Ethics On-line”. It discusses the advent of Internet or information technology. When we say advent, it is the arrival of something’s special. In the case of information ethics, the reading two describes that it is special for the people. This also signifies that if the people are learning to discover ethical values applying it to computer. The unique issues stated here is that these are the issues where a debate can start. From our beliefs and culture, people are applying their respective morals to computers. In this reading again, the internet technology was considered with 3

Page 7: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 7

special features. The scope, ability to communication, and reproducibility of information. These three are the main aspect or feature why internet technology existed. These aspects are powerful. Created by human in nature plus technology in physical. The result is that the human apply their morals on how technology works. Evaluating what is good and bad, it will create a great success of the future. What I’ve learned: The evolution of ethics is the foundation of the ethics today. When our home was created by our almighty God, the ethical values are born. We did not create it but astoundingly it already existed. All we have to do is to discover it. Just like the Theory of Evolution made by Charles Darwin. It’s just a theory but the evolution is true. As we all know, earth is full of mysteries but as the time goes by, we discover things. As a result, we evolve. Relating it to ethical values, it’s the same. We must continue to live on and discover new conceptual framework for the next generation. This conceptual framework is the base of all theories whatever category is it. The framework that is the beginning of theories will lead us to accurate information in the future. We should be sensitive of what we have done. Applying our moral values to non-living thing is a good achievement of humans done here on earth. We should appreciate the frameworks done by human for technology. This is one of the greatest achievements ever done by human. As we go along, we must realize that technologies are made for us to use it.

Integrative Questions:

1.) How does Ethical values of people conducted to Internet Technology? 2.) Why conceptual framework is important aspect why we have ethical values? 3.) How does it started? 4.) Does the 3 readings are accurate in giving foundational information? 5.) How Internet technology is related to ethical values?

Citations: N/A

Page 8: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 8

Book Review: Chapter 2: Ethics On-Line Book: Cyberethics Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“Computing Technology is the most powerful and most flexible technology ever devised.” With this statement, I agree that it is the most powerful technology that ever made in 21

st century. On 20

th

century, the world is focused on industrial revolution. Mechanical technology was prioritized. As stated on this chapter, the word “revolution” is the main topic. Revolution and ethics are combined. It’s a wonderful combination. Just like what Goodyear said “One Revolution Ahead” This chapter explains it all. Learning Expectations

• To know how revolution evolves through the ethical values. • To know how people use ethical values. • To know how people confident using technology with ethics.

Review: “Revolution” is the main topic of this chapter. Revolution is an extraordinary activity from one point to another. That so called “extraordinary activity” can change the world. Revolution is equal to innovation. To industrial revolution to modern revolution. Every moment of our live changes and this is involuntarily. We cannot stop the clock ticking. We have no choice but to continue and accept the challenges of time given to us. We have no choice but to go on with our lives we have. Because of this concept, revolution was modernized by the people who are into it. That’s why these people never stop finding ways how to improve our lives. As a result, here we are in the 21

st century; we are in the computing technology. Digital

world was existed and continue to rise up to the very present time. It is described here that growing information revolution is more on social and ethical side, not merely technological. This means that people who pioneered these technologies are basing it to ethical and moral values. While creating the physical technology, these pioneers also thinks what would be the output of this technology. Is it good or bad for the people? Evaluating technology for social means is really difficult job for them because they must be careful in every technology they make. It is sensitive in social means because people who are using it are also sensitive. It can really affect the lives of the people. They must be careful in terms of this. In describing information technology and human values, it is stated here that the information revolution are significantly changed the aspects of our lives. This is good and that’s the fact happening to the world. It is an advantage for us to live in this world with these technologies. Particularly in the field of Information Technology, it is powerful because we need information as a primary source in much aspect. Because of ethics, many ethical values are produced and turn into an information. This means that people keep producing good ethical values and at the same time, people use these ethical values to be converted into information in such way that it is procedural and it is based on a point of view. Number one example is the bible. The primary source of good ethical values is most commonly a bible. The bible, for the Catholic faith is the basis of good and bad ethical values. People base their faith to bible and that’s why moral values for technology evolved. While some people use their respective bible. Overall, it all depends on the beliefs of the people. Basing it to their respective beliefs, the outputs are all different. As a result, there are some conflict happening. Of course,

Page 9: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 9

people who are against to a particular belief have nothing to do but to respect other people beliefs. It’s their ethical value and we should not against about it. Information grows. And as the information grows, lots of ethical values grow. Maturity is one example of this. Looking back, while humans are developing technology, initially, they have a power to create it. They are hopeful on what they are doing. They trained themselves to give their best while developing it. As the time goes by, human’s knowledge always evolved. So, the presence of maturity is here. Up to now, we are creating good technology that can benefit many people. Is up for the people how to use their moral values for a particular thing specifically technology. What I’ve learned: We should respect each other beliefs. Even if we are different religion, different beliefs, we are still a human. The human has a mission here on earth to fulfill. We must do it in extraordinary way so that the we can help other people at the same time, we can give quality of life for them. For us, who are developing technologies, we must apply ethical values to our job. Knowing and knowledgeable for what is right and wrong. We don’t stop here and we keep evolve as the time goes on. We can change the world starting for ourselves. That is called the revolution with ethical values. Integrative Questions:

1.) How does human feels about the revolution? 2.) How did the human evolve through the help of ethics? 3.) What are the benefits of technology to us with applied ethics? 4.) How information does grow with ethical values? 5.) What are the strengths of Information revolution in our modern period today?

Citations: N/A

Page 10: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 10

Book Review: Chapter 3: Reason, Relativity, and Responsibility in Computer Ethics Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“People are surging to gain access to computer technology.”

Learning Expectations

• What is entitled reason?

• What is Relativity?

• The responsibility of this concept to computer ethics Review:

Computers are special technology and they raise some special ethical issues. In this essay I will discuss what makes computers different from other technology and how this difference makes a difference in ethical considerations. In particular, I want to characterize computer ethics and show why this emerging field is both intellectually interesting and enormously important.

On my view, computer ethics is the analysis of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of such technology. I use the phrase “computer technology” because I take the subject matter of the field broadly to include computers and associated technology. For instance, I include concerns about software as well as hardware and concerns about networks connecting computers as well as computers themselves.

Making ethical or policy on computer wasn’t that easy. Like what I read on the book, you need the process of thinking analytically before you can make one. I do agree on this because how can you make some rules on a very malleable thing? You should think about all forms it can possibly show and then you will make your ethical or unethical way of doing things.

Page 11: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 11

What I’ve learned: I learned the basic knowledge of this concept. I was able to appreciate this three concept because students need that in a time. Integrative Questions:

1. What it is that made by narrow bounds of special interest communities?

2. The two parts of Computer Ethics according to Moor

3. It is logically malleable?

4. What is a policy vacuum?

5. Relative doesn’t mean what?

Citations: N/A

Page 12: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 12

Book Review: Chapter 4: Disclosive Computer Ethics Book: Cyberethics Author: Library Reference: N/A

Amazon Reference:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

‘ “Many computer related practices are simply unfamiliar or unknown to most people, because they are not

visible for the average computer user and are not widely discussed in media, and these practices consequently fail to be identified as morally controversial.”

Learning Expectations

• The basics in computer ethics

• What is Disclosive?

• Why it called disclosive? Review: Computer ethical problems are simply unfamiliar or unknown to most of the people because they can’t see it and the media doesn’t make any fuse about it unlike other ethical problems that we had on our society. Since it wasn’t something that media would cover, it fails to get attentions and fail also to be identified as morally controversial. Actually, this chapter is about Disclosive Computer Ethics or the description of computer technology and related practices in a way that reveal their moral importance. This chapter actually focuses on moral issues namely: privacy, democracy, distributive justice and autonomy. Critical Function of computer ethics is to identify, analyze, morally evaluate and device policy guidelines for on-line monitoring. The hardware, software and procedures used in computing practice often have moral neutrality when in fact they are not morally neutral.

Page 13: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 13

What I’ve learned: I learned that it is very difficult to create an ethical policy on something that has been very malleable. It

isn’t that easy also to create a law with an issue that can be passé immediately.

I also learned that on our society we have too many say on something that sometime it can lead us to

mislead other people too. We are careless on our words that when you gave a good reasoning, people

tend to believe it without further thinking if it is what they are looking for.

Integrative Questions:

1. What year Computer Ethics started?

2. Computer Ethics is first called as?

3. What is this software all about?

4. Who is the pioneer of the cybernetics?

5. What is the meaning of ICT?

Citations: N/A

Page 14: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 14

Book Review: Chapter 5: Gender and Computer Ethics Book: Cyberethics Author: Library Reference: N/A

Amazon Reference:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“Technology is a significant site of gender negotiations where both masculine and feminine

identities are constructed and deconstructed. Technologies are incorporated into our gender

identities…feminine or masculine”

Learning Expectations Review: Women now a day are explorer; they want to try things that are new to them. Computer courses were taken by men in the past and present because we both know men are good in computing but later women try it too. All authors survey if men or women have differences in ethical decision making in relation to information and computing technologies. They found out that women are low in computation and the gender has different response, views, expectation regards to computer privacy. Men seem to have a strong link to technology; some of the defining characteristics of masculine culture are welded to technology.

Women have domesticated the phone by including it in the household, using it to maintain relations with

friends and family, thereby subverting the original ideas of its design, for business, and other public rather

than private matters. Because of its ease of use and its link with feminine identity, it is said to have

“become a ‘mundane’ technology. Studies have shown that women are increasingly using the internet,

but according to surveys they are still far behind in comparison to men, the profile of the average internet

user being male, under 35, employed, with no children in the household. There have been many theories

as to why there are not as many women using the internet.

Because women are stereotypically thought to be linked to private life and not represented in the public world, they may have some reservations signing on to what is described as a “new public space or even a new ‘public sphere’”. It has been said that women have less access to the web, and that man are more likely to have jobs that provide access.

Page 15: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 15

What I’ve learned: Learn in this chapter that the women nowadays, were explorer. The man’s doping were also can be done

by them. The topic of gender has been somewhat neglected I computer writing to date. I also learn the

two main strands of current research in gender and computer ethics. The first strand can be viewed by

spillover from information systems and computing research. One more knowledgeable thing that I get was

that much decision making in relation to computer technologies takes place in the workplace.

Integrative Questions:

1. What is computer ethics?

2. What is traditional ethics, feminist ethics/feminist theory?

3. What is feminist ethics/feminist theory?

4. What feminist ethics offer computer ethics?

5. What is cyberstalking? Citations: N/A

Page 16: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 16

Book Review: Chapter 6: Is the Global Information Infrastructure a Democratic Technology Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“The adoption of a given technical system unavoidably brings with it conditions for human relationships that have a distinctive political cast”

Learning Expectations

• Why is it important to rely on information infrastructure?

• The affect of information to people. • What is this democratic technology?

• The learning on how to adopt this aspect to our lives. Review: Global Information Infrastructure, its advantages and disadvantages. Global information infrastructure

known as GII is often claimed in democratic technology. They said it can create electronic democracy to

facilitate democratic processes. If we say GII is democratic it is also saying that this technology has a

value embedded in it that contains facilities democracy.

The infrastructure in which many aspects of our lives used to takes place. Many scholars believed that

technologies did not embody values, and emphasized that values come into play, if at all only when

technologies are used. Values are one aspect of the social, hence, Bijker’s articulation of the two tenets

of STS includes the claims that values shape technologies and technologies shape values. In this

statement I can tell that values and technology has a similarity. We should expect the GII to carry values

with it, to shape enhance or diminish, afford or constrain values and we should expect that the GII has

been shaped by social values.

In any case, the idea that the GII is democratic because it connects every individual to every other

individual and allows individuals in political discussion puts the emphasis on the users of the technology.

On this account of the value-ladeness of the technology, we may buy and use things because of their

symbolic meaning in our culture, not only because of their focal function. The type of account of values

embedded in a technology is similar to the material account in that on both types of account, values are

tough to be amenable to being read off the technology. On the expressive meaning account, however,

Page 17: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 17

values are dependent on social context so that one cannot understand the values expressed in a

technology unless one understands its social contexts. They should be kept distinct primarily because

they point to very different ways in which values be embedded in technologies and therefore, they

recommend quite different directions of analysis of technology.

What I’ve learned:

I have learned that global information infrastructure is often claimed to be a democratic technology. I also

learned that GII is to be the coming together of technology with telecommunications. It is originated with

the internet, but that name now seems inappropriate. I have also learned that the infrastructures in many

aspects of our lives used to take place, work, shopping, banking and entertainment.

One thing that I have learned is that in terms of democracy, a technology may have: intractable

properties that require democratic patterns of authority, intractable properties that require non-democratic

patterns of authority and flexible properties that are compatible with either pattern authority.

Integrative Questions:

1. What are two tenets has form from the foundation of science and technology?

2. What is Winner famous article title?

3. What type of account where values pervade the invention and production of technology?

4. What type of account is similar to the preceding in the sense that it also affirms an inseparability

between the technology?

5. The democratic technology?

Citations: N/A

Page 18: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 18

Book Review: Chapter 7: Applying Ethical and Moral Concepts and Theories to IT Contexts Book: Cyberethics Author: Library Reference: N/A

Amazon Reference:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote: “In wake of enlightenment, the emphasis in ethical theory has been for a long time on systems an rules”

Learning Expectations

• The meaning of ethical and moral concept theories

• The IT Contexts adaptation. Review: It has often been suggested that technology carries values and biases embedded in it. This paper is an examination of the relation between (the implementation of) computer technology and the incorporation of values and biases. The social complexity of this issue tends to be underexposed. Suggestions are presented for a more comprehensive understanding.

Computer and information ethics, as well as other fields of applied ethics, it needs ethical theories which

coherently unify deontological and consequentiality aspects of ethical analysis. The proposed theory of

just consequentialism emphasizes consequences of policies within the constraints of justice. This makes

just consequentialism a practical and theoretically sound approach to ethical problems of computer and

information ethics.

If we want to apply ethical and moral concepts and theories to IT contexts, there are three conditions are

to be met, first is we must know to what kind of questions such as concepts and theories can be applied,

and to what they cannot, second we must know the limitations of specific concepts and theories and third

is we must have sufficiently detailed knowledge of the domain to which we want to apply them. It has

become a trend to extend the term “computer ethics” o almost anything that for decades used to be

indicated by terms like “social issues in computing”.

Suggesting that such issues can simply be filed under some branch of “ethics” gives a misleading idea of

the nature of these problems, of the kind of framework that is needed to solve them, and of the type of

expert specialization one should turn to for advice on these matters. It also leads to an undesirable

depolarization of such issues, as if the answers can be found by “rational” analysis provided by some

establishment of ethical experts rather than by negotiation.

Page 19: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 19

What I’ve learned: I have learned from this chapter that computer ethics to almost anything that for decades used to be

indicated by terms like social issues in computing. I have also learned that before applying ethical and

moral concepts theories to IT contexts there are three conditions to be met, knowing the questions,

limitations, and sufficiently detailed the knowledge.

Integrative Questions:

1. What are the conditions that we will met in applying ethical and moral concepts and

theories to IT contexts?

2. What is revival of virtue ethics?

3. Behavioral description to employers

4. What makes a picture a lot simpler?

5. Another term for social issues in computing

Citations: N/A

Page 20: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 20

Book Review: Chapter 8: Just Consequentialism and Computing

Book: Cyberethics Author: Library Reference: N/A

Amazon Reference:

http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“The end justifies the mean” Learning Expectations

• What is Just Consqquentialism? • What are the things involved in this particular topic? • Why is it important? Especially in computing?

Review: The proposed theory of Just Connsequentialism emphasizes consequences of policies within the constraints of justice. This makes consequentialism a practical theoretically sound approach to ethical problems of computer and information ethics. Gordon E. Moore, who co-founded Intel, noticed that each new computer chip contained roughly twice the capacity of its predecessor. Computing power seemed to be doubling approximately every two years. This relationship or prediction is now known as Moore's Law. It has held true for over three decades. If anything, the rate of increased computing power is accelerating so that computing power is now doubling each year.

Recently, Apple Computers, the competitor of Intel, announced the G4 chip that operates at a gigaflop (a

billion floating point operations / second) and that will be available in its line of personal computers. There

is a debate about how much Moore's law describes the development of computer chips and how much

awareness of it may create pressures to make it true. And, there is disagreement about how much longer

it can remain true. But there is no disagreement about the surge in computing power available to millions

of people. When the average person can put a supercomputer (a gigaflop processor) on her desktop at

moderate price, impressive computational possibilities are no longer relegated just to the super rich.

With the exponential increase in computing power and interconnectivity on the internet the web promises

to have a striking and unimaginable cultural impact during the coming century. Even with current

capabilities we can foresee that everyone on the web be will be able to publish an updated, personal

magazine of information and have a subscription to a gigantic, updated and at least partially indexed

world magazine of information. Everyone on the web will be able to broadcast personal audio and visual

programs and receive millions of others.

Page 21: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 21

The ethical revolution of a given rule or strategy that requires the evaluation of the consequences of that policy and often the consequences of the policy compared with the consequences of other possible policies. If our actions involving computers and no harmful consequences, policies would not be useless. What I’ve learned: I have learned that we should develop computing policies in such a way that they are above all just.

Another is setting ethical policies for computing might compared to setting a course while sailing. I also

learned too, that sailors take danger bearings to avoid dangerous objects as a reef. Certain

courses should not be taken. All humans most not necessarily think the seriousness of life.

We still have a freedom to happiness.

Integrative Questions:

1. What are the considerations that threaten the existence of justice in cyberspace?

2. What are the two factors that are salient in computing which exacerbate the problem of ensuring

justice on the net?

3. How can justice in cyberspace be generated and maintained?

4. What is consequentialism and how it works in terms of justice?

5. Where does “setting ethical policies for computing might be compared?

Citations: N/A

Page 22: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 22

Book Review: Chapter 9: The Internet as Public Space Book: Cyberethics Author: Jean Camp and Y.T Chien

Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“No universal service for schools or libraries that fail to implement a filtering or blocking technology for

computers with internet access”

Learning Expectations

• The use of internet?

• Why is it publicized?

• Why they considered it as public?

• Review: Issues must be considered when regulating electronic spaces: simultaneity, permeability and exclusivity.

Simultaneity refers to the ability of a person to be two places at once: at work and at a train station.

Permeability is the ability of barriers between spatial, organizational or traditional barriers to be made less

powerful or effective with the adoption of information technology. The permeability of the work/home

barrier is most clearly illustrated with telecommuting. Exclusivity is the nature of one space, perception, or

activity to prevent others. Intranets may offer exclusive access through a variety of access control

mechanisms. In the physical sphere, the walled private cities offer an excellent example of exclusivity.

In order to accomplish our goal we begin by describing what the Internet is not: a new entrant into the

media types paradigm. The media types approach fails with respect to the Internet. The failures of the

media regulatory metaphor have lead to a spatial metaphor, which better addresses the subtly and

complexity of virtual reality. However, the differences which prevent the spatial model from being mapped

directly onto the Internet are issues of simultaneity and the permeability of boundaries on the Internet.

We address the fundamental policy issues that result from treating the Internet as public space. We

delineate the types of public spaces that may be found on the Internet: libraries, clinics or hospitals,

universities, marketplaces, international marketplaces or cultural exchange centers, schools, and as a

forum for political speeches or debate. For each public place a subset of the previously discussed policy

issues applies in a unique way.

Page 23: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 23

What I’ve learned: I have learned that is more than multi-media, it was a national and global telecommunication. Internet has

really a big role in the society; for it help everyone to find things that is impossible to see.

I also learned the basic difference of public and private in terms of computer usage. The competitions of

local and global, the industry with full of job and never ending cycle of money. The impact to this into

public.

Integrative Questions:

1. What are the uses of internet as public spaces?

2. What are the digital characteristics of a public space?

3. Two contradictory characteristics of internet

4. Recent debate about what internet really is

5. Language of the digital age

Citations: N/A

Page 24: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 24

Book Review: Chapter 10: The Laws of Cyberspace

Book: Cyberethics Author: Larry Lessig

Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

Learning Expectations Review: They also regulate in social norms understanding or expectations about how I ought to behave enforced not through some centralized norm enforcer, but rather through the understandings expectations of just about everyone within a particular community-direct and constrain my behavior in a far wider array of contexts than any law.

The real problem is when people use it in the ordinary sense of the term property, which is "a thing that I have that nobody can take, forever, unless I give it to you." By thinking of it as property, we have no resistance to the idea of certain great companies controlling "their" intellectual property forever. But if we instead use terms like monopoly to describe the control that companies like Disney have over art objects like Mickey Mouse, it's harder to run naturally to the idea that you ought to have your monopoly right forever. Another problem is the increasing ability of owners of intellectual property to control the actual use of that property. Before the network, if you bought a book, the First Sale doctrine made it impossible for the copyright owner to control what you did with it. Copyright law would not interfere with my ability to give you the book or copy a chapter or read the book a thousand times. All those things are completely within my control, partly because the law guarantees it, but also because the book producer couldn't do anything about it even if he wanted.

As you move to the Internet, though, lots more control is possible. If you look in the permissions for an Adobe eBook, it has the power to control how many times you can print certain sections of the book, whether you can use technology to read the book aloud, whether you can cut and paste sections of the book. All these controls would not have existed without digital technology, because the cost of regulating those uses would have been too high.

Page 25: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 25

What I’ve learned: I have learned that cyberspace is an avoidable and yet it is unregulable, no nation can live without it, yet

no nation can be able to control behavior in it. Cyberspace is not regulated by laws.

The sovereign as the highest form will be the authentic seal that this will say true. For cyberspace s the

places where individuals are inherently free from the control of real space sovereigns. For cyberspace,

Code and Market and Norms and law together regulate in cyberspace as architecture and market and

norms and law regulate in real space

Integrative Questions:

1. What is cyberspace?

2. The laws of cyberethics?

3. Factors all together that generates law all about cyberethics.

4. What are the Harvard rules in the cyberspace?

5. Difference of net in University of Chicago and Harvard?

Citations: N/A

Page 26: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 26

Book Review: Chapter 11: Of Black Holes and Decentralized Law-Making in Cyberspace Book: Cyberethics Author: David G. Post Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“The task of identifying the alternative rule-makers for purposes of normative comparison is

made even more difficult than this because cyberspace, having emerged from decentralized

disorder Learning Expectations

• What is this all about?

• Is it really a black hole?

• What’s the case of this? Review: Rule-making processes are at the heart of many of the important and challenging cyberspace policy

debates. The extraordinary current turmoil in the domain name allocation system is one illustration. The

story has been told in detail elsewhere. Briefly, in the beginning before the Internet became such a Big

Deal responsibility for operating the machines, and the databases on those machines, that correctly route

Internet messages fell to the Internet Assigned Number Authority (IANA), an imposing-sounding entity

that, in reality, consisted of a small number of dedicated volunteers in southern California. As the Internet

began its explosive growth, IANA's ability to maintain the system became increasingly overloaded;

beginning in 1993, responsibility for maintaining these databases - at least, for three of the increasingly

popular "generic top-level" domains com, net, org and the like was handed over to a private firm, Network

Solutions, Inc., under a contract - styled a "Cooperative Agreement" - funded by the U.S. government first

through the National Science Foundation, later through the Commerce Department's National

Telecommunications and Information Administration.

Page 27: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 27

What I’ve learned:

I have learned in this chapter the following:

• The incident

• The explanation

• The question

• The debate

Integrative Questions:

1. What is spam? 2. What is black holes in cyberspace? 3. What is RBL means? 4. What is MAPS means? 5. ISP’s meaning

Citations: N/A

Page 28: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 28

Book Review: Chapter 12: Fahrenheit 451.2: Is Cyberspace Burning? Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“Any content-based regulation, no matter how benign the purpose could burn the global

village to roast the pig” Learning Expectations

• To know more about this chapter specially why is it burning?

• Does it literally burning?

Review:

This paper examines the free speech implications of the various proposals for Internet blocking

and rating. Individually, each of the proposals poses some threat to open and robust speech on the

Internet; some pose a considerably greater threat than others.

Even more ominous is the fact that the various schemes for rating and blocking, taken together, could

create a black cloud of private "voluntary" censorship that is every bit as threatening as the CDA itself to

what the Supreme Court called "the most participatory form of mass speech yet developed."

Third-party ratings systems, designed to work in tandem with PICS labeling, have been held out

by some as the answer to the free speech problems posed by self-rating schemes. On the plus side,

some argue, ratings by an independent third party could minimize the burden of self-rating on speakers

and could reduce the inaccuracy and mis-rating problems of self-rating. In fact, one of the touted

strengths of the original PICS proposal was that a variety of third-party ratings systems would develop

and users could pick and choose from the system that best fit their values. But third party ratings systems

still pose serious free speech concerns.

First, a multiplicity of ratings systems has not yet emerged on the market, probably due to the difficulty of

any one company or organization trying to rate over a million web sites, with hundreds of new sites not to

mention discussion groups and chat rooms springing up daily.

Page 29: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 29

What I’ve learned: Is Cyberspace Burning?", which immediately equates any effort to restrict access to the Web or filter out any Web-based information to book burning. Parents trying to keep from their children some of the degrading, biased, and inaccurate information that exists on the Web are not Nazis, and casting them in that light is counter to reasoned argument on an important topic. Integrative Questions: 1. What does CDA means?

2. When and where the Reno v. ACLU held?

3. What are the six reasons why self-rating schemes are wrong for the Internet?

4. Meaning of PICS

5. What does ALA means?

Citations: N/A

Page 30: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 30

Book Review: Chapter 13: Filtering the Internet in the USA: Free Speech Denied Book: Cyberethics Author: Richard S. Rosenberg

Library Reference: N/A

Amazon Reference: http://www.amazon.com/s/ref=nb_ss_gw?url=search-alias%3Dstripbooks&field-keywords=cyber+ethics&x=0&y=0 Quote:

“Uphold the first amendments by establishing and implementing written guidelines and policies on

Internet use in your library”

Learning Expectations

• The filtering internet?

• Basic idea on free speech

• What is library association. Review: The basic concerns are that the features fro blocking or restricting accesses are determined on the basis of criteria unavailable for the users. Thus when a web search is undertaken, what is not returned is a product of inadequacies of the search query, the search engine style and filtering software? Censorship is the constant companion. Thus, on constitutional grounds, libraries must not restrict access to protected speech. It may be possible for other libraries to avoid similar fate by designating a limited number of computers for the exclusive use of children in their internet activities. Limiting such access, they fear, will hinder the development of the Internet and pave the way for overzealous government regulators. The ACLU maintains that voluntary Web-site rating methods or automated filtering programs are harmful because they make getting "valuable speech" online more difficult. Rot! Since when have all forms of information had equal public access? Why must that hitherto unnecessary standard be preserved on the Internet? The ACLU fears that blocking programs and rating schemes will make finding what it calls "controversial" material difficult. So what? Yes, you may have to work a wee bit harder to find that material, but no harder than you would now to find it in other media. If that makes the Web a blander medium than it would be otherwise a primary fear of the ACLU so be it. At least then it will be a safe medium to have in our homes. Pro-censorship groups have argued that a third-party rating system for the Internet is no different from the voluntary Motion Picture Association of America ratings for movies that we've all lived with for years. But there is an important distinction: only a finite number of movies are produced in a given year.

Page 31: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 31

What I’ve learned: For filtering and blocking arises from the efforts in the US to defeat the Communications Decency Act of

1996. I also used to learned that filtering or blocking software can be taken to be mechanism used to:

restrict access to internet content, based on an internal database of the product, or restrict access to

internet content through a database maintained external to the product itself, or, restrict access to internet

content to certain ratings assigned to host sites by a third party, or, restrict access to internet content by

scanning content, based on a keyword, phrase or text string or; restrict access to internet content based

on the source of the information.

Integrative Questions:

1. What are three basic types of filtering? 2. What are the librarians and filtering programs?

3. Software tool that internet users to conduct searchers for content on particular subject

4. Software tool for internet users need in order to access information on the World Wide Web.

5. What is Librarian Association

Citations: N/A

Page 32: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 32

Book Review: Chapter 14: Censorship, the Internet, and the Child Pornography Law of 1996: A Critique

Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Around the world, governments are considering restrictions on online content.”

Learning Expectations

• The censorship in photography? • The issue of this topic to children • How does internet affect the lives of other people.

Review: The central objections to CPPA are (1) that it is so broad in its main proscriptions as to violate the First Amendment rights of adults; (2) that it altogether fails to provide minors and their legal guardians with the privacy rights needed to combat the harms associated with certain classes of prurient material on the Internet; and, (3) that the actual rate of technological advance in home computing, and Congress' failure to appreciate how prurient material may be accessed, combined with CPPA to wrongfully expose an increasing number of individuals to possible prosecution and personal ruination. Several other objections are registered along the way, including one aimed at the draconian punishments the law metes out to violators. I close by offering the outlines of an amended version of the law that promises not to violate the rights of adults, that affords children and adults equal and effective protection against the very harmful practices the current law cannot eradicate, and that prescribes punishments that are consistent with the tolerance necessary to support a more democratic vision of the Internet.

Page 33: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 33

What I’ve learned: I learned the meaning of censorship, the child pornography laws. The unwieldy discussion of censorship

on the internet, that it will be useful to introduce an define a number of key terms and distinctions, not only

for achieving greater clarity and control over the discussion but for setting the moral and political

backdrop against which it takes place. I also learned that the difference forms of censorship bears on

affecting the prohibition.

Integrative Questions: Citations: N/A

1. What is the meaning of child pornography?

2. When and where does the 1st

Circuit Court of Appeals upheld?

3. How does Ray Bradbury describes Fahrenheit 451 means?

4. What group had an argument in the issue about net?

5. What do we call the rating standard that establishes a consent way to rate and block

online content?

Page 34: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 34

Book Review: Chapter 15: PICS: PICS: Internet Access Controls without Censorship

Book: Cyberethics Author: Paul Resnick and James Miller Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“When publishers are unwilling to participate, or can't be trusted to participate honestly, independent

organizations can provide third-party labels Learning Expectations

• What are the labels • The primary source of it? • The labels

Review:

PICS-compatible software can implement selective blocking in various ways. One possibility is to build it into the browser on each computer, as announced by Microsoft and Netscape. A second method-one used in products such as CyberPatrol and SurfWatch-is to perform this operation as part of each computer's network protocol stack. A third possibility is to perform the operation somewhere in the network, for example at a proxy server used in combination with a firewall. PICS does not specify how parents or other supervisors set configuration rules. One possibility is to provide a configuration tool like that shown in Figure 3. Even that amount of configuration may be too complex, however.

Labels can be retrieved in various ways. Some clients might choose to request labels each time a user tries to access a document. Others might cache frequently requested labels or download a large set from a label bureau and keep a local database, to minimize delays while labels are retrieved.

Page 35: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 35

What I’ve learned: I also learned that PICS provides a labeling infrastructure for the Internet. It is values-neutral: it can

accommodate any set of labeling dimensions, and any criteria for assigning labels. Any PICS-compatible

software can interpret labels from any source, because each source provides a machine-readable

description of its labeling dimensions. Around the world, governments are considering restrictions on on-line content. Since children differ, contexts of use differ, and values differ, blanket restrictions on distribution can never meet everyone's needs. Integrative Questions:

1. What does PICS doesn’t specify?

2. Three factors in blocking net

3. What does PICS provide?

4. What is a common set of dimensions would make publishers self labels?

5. Who creates labels?

Citations: N/A

Page 36: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 36

Book Review: Chapter 16: Note on the DeCSS Trial Book: Cyberethics Author: Richard A. Spinello

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“No provider or user of an interactive computer service shall be treated as the publisher or

speaker of any information provided by another information content provider”

Learning Expectations

• What is DeCSS tria?l • What is DMCA? • To know It’s Technical background.. • To know about the lawsuits about it.

Review: This article explores recent developments in the regulation of Internet speech, in particular, injurious or defamatory speech and the impact the attempts at regulation are having on the `body' in the sense of the individual person who speaks through the medium of the Internet and upon those harmed by that speech. The article proceeds in three sections. In the fast-passed world of cyber law the first summer of the new millennium will be remembered for two controversial cases. The defense team argued that computer code itself is a form of expressive free speech that deserves full first amendment protection. This includes both the source code and the object code. A computer scientist appearing as an expert witness proclaimed that an injunction against the use of the code would adversely affect his liability to express himself. The implication is that congress cannot legally restrict one’s liability to transmit this code lest they violate the first amendments. We all know that the industry is trying to prevent piracy and protect their own property but I just happen to think this is the wrong approach. I This assessment then concludes with possible suggestions for changes in the legal climate governing the regulation of defamatory speech on the Internet, as well as prediction of the result should the legal climate continue to develop on its present course. This is not to suggest that all law, or even the law of defamation,

Page 37: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 37

What I’ve learned:

I have learned that from the last few years defamation on internet has emerged as controversial topic of

internet law. I had also learned that when a victim alleges defamation he or she must prove that the

publication of the defamatory statement refers to the victim. One more is that the different standards of

liability for disturbing \defamatory information depending upon the role one plays in the process.

Integrative Questions:

1. How does the defamation occur in a internet?

2. Does cyberspace alter the need for libel laws?

3. Meaning of CDA

4. What is the meaning of AOL?

5. Did the Congress entered the fray?

Citations: N/A

Page 38: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 38

Book Review: Chapter 17: Digital Millennium Copyright Act

Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“One basic weakness in a conservation system based wholly economic motives is that most

members of the land community have no economic value” Learning Expectations Review:

The government produced a proposal that laid down the ground rules for the information economy, that

profoundly altered the distribution of property rights over this extremely important resource and that

threatened to "lock in" the power of current market leaders, one would expect a great deal of attention to

be paid by lawyers, scholars and the media. Nothing could be further from the truth.

The really depressing thing about the report is that it fails to accomplish its stated goal; to examine what

level of intellectual property rights would be necessary in cyberspace. It fails in a way that is both

revealing and disturbing. The problem isn't simply the tendency to give a pro-author account of the

existing law.

Go further for a moment, and accept the idea that there might be a special need for a politics to protect

the public domain. What might such a politics look like? Right now, it seems to me that, in a number of

respects, we are at the stage that the American environmental movement was at in the 1950's. There are

people who care about issues we would now identify as "environmental" -- supporters of the park system,

hunters, birdwatchers and so on. (In the world of intellectual property we have start-up software

engineers, libraries, appropriationist artists, parodists, biographers, biotech researchers etc.) There are

flurries of outrage over particular crises -- burning rivers, oil spills.

Page 39: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 39

What I’ve learned: In this chapter, I learned that there are structural reasons why these tendencies will continue. The first

crucial aspect of the current information economy is the increasing homologisation of forms of

information. Another knowledge I learned is that libertarians don't want newspapers censored; their

attitude to the Net is the same (though the interactive quality of the technology, and the proprietary feeling

that novelty gives first adopters have certainly given more people a stake in the protection of the system.) Integrative Questions:

1. What are the frameworks?

2. How does Cyberpunk built?

3. What is privatize?

4. What products requires enormous investments?

5. What article mentions two limitations on intellectual property rights?

Citations: N/A

Page 40: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 40

Book Review: Chapter 18: Digital Millenium Copyright Act Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote: Learning Expectations Review: Digital Millennium Copyright Act Highlights Generally: Makes it a crime to circumvent anti-piracy measures built into most commercial software; Outlaws the manufacture, sale, or distribution of code-cracking devices used to illegally copy software; Does permit the cracking of copyright protection devices, however, to conduct encryption research, assess product interoperability, and test computer security systems; It requires that the Register of Copyrights, after consultation with relevant parties, submit to Congress recommendations regarding how to promote distance education through digital technologies while "maintaining an appropriate balance between the rights of copyright owners and the needs of users; States explicitly that "[n]nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use." The really depressing thing about the report is that it fails to accomplish its stated goal; to examine what

level of intellectual property rights would be necessary in cyberspace. It fails in a way that is both

revealing and disturbing. The problem isn't simply the tendency to give a pro-author account of the

existing law.

Page 41: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 41

What I’ve learned: In this chapter, I learned that there are structural reasons why these tendencies will continue. The first

crucial aspect of the current information economy is the increasing homologisation of forms of

information. Another knowledge I learned is that libertarians don't want newspapers censored; their

attitude to the Net is the same (though the interactive quality of the technology, and the proprietary feeling

that novelty gives first adopters have certainly given more people a stake in the protection of the system.)

Non-profit groups have to adjust to changes in communications technology, just like changes in tax law,

or the regulation of lobbying.

Integrative Questions:

1. What are the two basic analytical frameworks of environmental movement

2. How does Cyberpunk built?

3. What is privatizing?

4. What product requires enormous investments?

5. What article mentions two limitations on intellectual property rights?

Citations: N/A

Page 42: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 42

Book Review: Chapter 19: A Politics of Intellectual Property: Environmentalism for the Net Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Intellectual property has always been closely tied to technology. Technology arises from intellectual property in the form of new inventions.

Learning Expectations

• Politics in intellectual property? • The connection of this article.

Review:

Intellectual property is an odd notion, almost an oxymoron. Property usually refers to tangible assets over

which someone has or claims control. Originally it meant land. Now it could also refer to a car, a milling

machine, a jacket or a toothbrush. In all these cases the property claim is of control of the physical entity.

If I claim a plot of land as my property, I am saying I can control who has access to that land and what

they do there. I can build a fence around it, rent it out, or drill for oil on it.

If a car is my property, I get the keys to it. I can exclude others from using it and use it myself for whatever I want, as long as I do not threaten the lives or property of others. Intellectual property is different because its object is something intangible, although it usually has tangible expression. The intellectual property in a book is not the physical paper and ink, but the arrangement of words that the ink marks on the paper represent. The ink marks can be translated into regions of magnetic polarization on a computer disk, and the intellectual property, and whatever claims there are to that property

Page 43: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 43

What I’ve learned: I learned that computers have given rise to a whole new category of intellectual property, namely

computer software. This chapter was all about the computer technology and how it changed every one’s

life, its intellectual aspect, the information we get from it and the common good or affects of it.

In addition to that, as more and more traditional forms of intellectual property, such as writing, music and

other sound, movies and videos, photographs, and so on, are being made publicly available on computer

networks, they can be copied, manipulated, reworked, excerpted, recombined, and distributed much more

easily than before.

Integrative Questions:

1. What are the five cases in conflicts over intellectual property?

2. What is intellectual property?

3. It was the originally gave rise to intellectual property, what it is?

4. Where technology does arises?

5. What is the title of the article of Justin Hughes?

Citations: N/A

Page 44: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 44

Book Review: Chapter 20: Intellectual Property, Information, and the Common Good

Book: Cyberethics Author: James Boyle

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“The increasing use of web-based electronic publication has created new contexts for both piracy and

plagiarism.”

Learning Expectations Review:

Piracy is the infringement of a copyright, and plagiarism is the failure to give credit. The increasing use of Web-based electron publication has created new contexts for both piracy and plagiarism. In so far as piracy and plagiarism are confused, we cannot appreciate how the Web has changed the importance of these very different types of wrongs.

The present paper argues that Web-based publication lessens the importance of piracy, while it heightens the need for protections against plagiarism. Copyright policy protects the opportunity for publishers to make a profit from their investments. As the cost of publication decreases in the electronic media, we need fewer copyright protections. Plagiarism is the failure to abide by scholarly standards for citation of sources. These standards assure us that information can be verified and traced to its source. Since Web sources are often volatile and changing, it becomes increasingly difficult and important to have clear standards for verifying the source of all information. What I’ve learned: I learned that piracy is the infringement of copyright, and plagiarism is the failure to give credit. If

someone copy ones document the copyright owner suffers from the loss of the revenue that is

customarily paid for permission to copy. A possible loss of potential reputation is hardly sufficient grounds

for the ethical indignation that academics express over incidents of plagiarism. There seems to be no

grounds whatsoever for worry about loss of potential reputation.

Page 45: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 45

Integrative Questions:

1. What’s harm in plagiarism?

2. What’s the use of copyright?

3. Where does copyright must find the balance?

4. What is plagiarism?

5. Who was the obvious candidate to be harm by plagiarism?

Citations: N/A

Page 46: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 46

Book Review: Chapter 21: Is Copyright Ethical an Examination of the Theories, Laws, and Practices Regarding the Private Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“As the World Wide Web has grown in popularity, the propriety of linking to other web sites has achieved some prominence as an important moral and legal issue. Learning Expectations

• To know basically what is this topic for?

• What is this ethical examination Review:

The most fundamental question concerns the appropriate scope of property rights for a web site and how those rights can be properly balanced against the common good of free and open communications on the Web. It is our contention that there is no presumptive claim to the liberty of deep linking at will, since it may be disrespectful of property rights in certain situations. In order to defend this position we first make the case that a web site is a form of intellectual property, drawing support from the major theories that justify property ownership.

Web site authors may indeed have a property right in their creative work they have a correlative obligation to promote the sharing and free flow of information when their specific ownership rights are not put in jeopardy by deep linking.

Change the standard of liability for some individuals with access to the right internet media connections, it does not seem wise to eliminate libel laws altogether or to always leave victims to utilize their own resources to correct damaging falsehoods. The world of cyberspace,

Page 47: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 47

What I’ve learned: Current copyright law, as per the Copyright Act of 1976 as amended, protects all original works of

authorship fixed in a tangible medium expression. So for Intellectual property is a term that has recently

come into extensive use without definition that was the first things I learned in this chapter. Another is that

striking the correct balance between access and incentives as the central problem of copyright law.

Integrative Questions:

1. What are the two ways to approach ethics of copyright?

2. What year did the 105th congress passed three major copyright laws?

3. What does the copyright doesn’t cover?

4. Who defines property rights as the relationship between individuals in reference to things?

5. Who provided the summary of various approaches to rights?

Citations: N/A

Page 48: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 48

Book Review: Chapter 22: On the Web, Plagiarism Matters More Than Copyright Piracy

Book: Cyberethics Author: Shelly Warwick

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote: Learning Expectations Review:

The present days, paper argues that Web-based publication lessens the importance of piracy, while it heightens the need for protections against plagiarism. Copyright policy protects the opportunity for publishers to make a profit from their investments. As the cost of publication decreases in the electronic media, we need fewer copyright protections. Plagiarism is the failure to abide by scholarly standards for citation of sources. These standards assure us that information can be verified and traced to its source. Since Web sources are often volatile and changing, it becomes increasingly difficult and important to have clear standards for verifying the source of all information.

Although commonly confused, the values inherent in copyright policy are different from those inherent in scholarly standards for proper accreditation of ideas. Piracy is the infringement of a copyright, and plagiarism is the failure to give credit. The increasing use of Web-based electron publication has created new contexts for both piracy and plagiarism. In so far as piracy and plagiarism are confused, we cannot appreciate how the Web has changed the importance of these very different types of wrongs.

Page 49: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 49

What I’ve learned: I learned that piracy is the infringement of copyright, and plagiarism is the failure to give credit. If

someone copy ones document the copyright owner suffers from the loss of the revenue that is

customarily paid for permission to copy.

Integrative Questions:

1. What is plagiarism?

2. What’s harm in plagiarism?

3. What’s the use of copyright?

4. Where does copyright must find the balance?

5. Who was the obvious candidate to be harm by plagiarism?

Citations: N/A

Page 50: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 50

Book Review: Chapter 23: An Ethical Evaluation of Web Site Linking

Book: Cyberethics Author: John W. Snapper Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“As the World Wide Web has grown in popularity, the propriety of linking to other web sites has achieved some prominence as an important moral and legal issue. Learning Expectations

• The internet as a primary source of information

• The ethical evaluation for technology and humans Review:

Once we have established that a web site is really property, we consider the specific rights implied by such ownership. We conclude that on the basis of those rights, a prima facie case can be made that because of the potential for negative effects, users should not presume that deep linking is acceptable unless they first seek out the permission of the target web site.We also fully appreciate the dangers inherent in propertizing the web and the need to encourage the most flexible forms of linking.

The most fundamental question concerns the appropriate scope of property rights for a web site and how those rights can be properly balanced against the common good of free and open communications on the Web. It is our contention that there is no presumptive claim to the liberty of deep linking at will, since it may be disrespectful of property rights in certain situations. In order to defend this position we first make the case that a web site is a form of intellectual property, drawing support from the major theories that justify property ownership.

Therefore, we argue that any arbitrary or unnecessary restrictions against deep linking should be eschewed for the sake of the common good of open communications, flexibility, and maximum porosity in the Internet environment. While web site authors may indeed have a property right in their creative work they have a correlative obligation to promote the sharing and free flow of information when their specific ownership rights are not put in jeopardy by deep linking.

Page 51: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 51

What I’ve learned: I have learned that there are so many issues and problems that spread related web site. This problems

was not easy to solve if the computer user will continue spreading it. In this chapter the technical aspects

of web site linking was also discussed. I have also learned that the value and benefits of linking are

manifold and beyond dispute. Most web pages have multiple links to other web pages.

Integrative Questions:

1. What are the three theories encountered in the traditional literature?

2. What is “The right to manage”?

3. What is the “The right to income”?

4. It refers to combination of text, graphics or media content

5. It can be harmful for target web sites in some circumstances

Citations: N/A

Page 52: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 52

Book Review: Chapter 24: The Cathedral and the Bazaar Book: Cyberethics

Author: Eric Raymond

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Try to throw one way, you will, anyhow” Learning Expectations

• Learn again the background of this

• Refresh my mind about the cathedral and bazaar • The basic foundation of developers and their respective aims for the world.

Review:

The Cathedral and the Bazaar is an essay by Eric S. Raymond on software engineering methods, based on his observations of the Linux kernel development process and his experiences managing an open source project, fetchmail. It was first presented by the author at the Linux Kongress on May 27, 1997 and was published as part of a book of the same name in 1999.

The essay helped convince most existing open source and free software projects to adopt Bazaar-style open development models, fully or partially — including GNU Emacs and GCC, the original Cathedral examples. Most famously, it also provided the final push for Netscape Communications Corporation to release the source code for Netscape Communicator and start the Mozilla project.

When O'Reilly Media published the book in 1999, it achieved another distinction by being the first complete and commercially distributed book published under the Open Publication License. Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel. The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy.

Page 53: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 53

What I’ve learned: Even if we already taken this on ISEBIZ Class,we refresh our mind while we read it. I have learned that

this is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of

Linux-based operating systems, and to the success of open source users and the companies that supply

them. The interest in open source software development has grown enormously in the past year.

Cathedral and Bazaar has a big role in the web site, we should just used it in the right time, place and

reasons. Especially for developers primary role is to develop an app.

Integrative Questions:

1. How it is useful?

2. What was Linux style of development?

3. The purpose of author on writing it?

4. What is POP means?

5. What is IMAP means?

Citations: N/A

Page 54: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 54

Book Review: Chapter 25: Towards A Theory of Piracy for the Information Age Book: Cyberethics Author: Eric Raymond

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“An individual or group has normative privacy in a situation with regards to others if and only if that situation the individual or group is normatively protected from intrusion, interference, and information

accessed by others”

Learning Expectations

• The hacker position?

• Piracy : is it good or bad?

• Information Age? Review:

Even where this is held to be correct, in societies such as Australia, it is seen as acceptable for individual privacy to be overridden for the sake of something more valuable, such as the general welfare, and indeed people frequently sacrifice their own privacy for some other benefit, such as the convenience of transacting over the Internet.

Even where this is held to be correct, in societies such as Australia, it is seen as acceptable for individual privacy to be overridden for the sake of something more valuable, such as the general welfare, and indeed people frequently sacrifice their own privacy for some other benefit, such as the convenience of transacting over the Internet.

Privacy is one of the values that we think of as being obvious, until we try to define it. So let us call on a leading philosopher, James Moor, to provide a definition. Moor suggests that privacy is evident when a person is "protected from intrusion, interference and information access by others". This is a good definition of privacy in Western societies, but it is important to remember that this value is neither universal nor absolute. China and Singapore are examples of many societies where it is not considered correct that individuals have the right to be shielded as described by Moor.

Page 55: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 55

What I’ve learned: I learned how important privacy is, it is one of our personal time where we can do what we want. Privacy

is only for us that no one has the right to disturb or distract. In this chapter privacy is the main topic; I

have known that it was not only in personal lives a persona has privacy but also in web site.

I also learned the theory that determines the privacy for information age. Greased information is

information that moves like lightning and is hard to hold onto.

Integrative Questions:

1. What isInformatio Age? 2. How to makes information easy to access?

3. What is PETS means?

4. The purpose of PETS? 5. What are the values we have in common as human beings?

Citations: N/A

Page 56: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 56

Book Review: Chapter 26: The Structure of Rights in Directive 95 46 EC Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

"In one sense, all human rights are aspects of the right to privacy." Learning Expectations

• The basic rights in directives?

• To know more about this chapter. Review:

Privacy is recognized around the world in diverse regions and cultures. It is protected in the Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and in many other international and regional human rights treaties. Nearly every country in the world includes a right of privacy in its constitution. At a minimum, these provisions include rights of inviolability of the home and secrecy of communications. Most recently written constitutions include specific rights to access and control one's personal information. In many of the countries where privacy is not explicitly recognized in the constitution, the courts have found that right in other provisions. In many countries, international agreements that recognize privacy rights such as the International Covenant on Civil and Political Rights or the European Convention on Human Rights have been adopted into law.

Outside this rather strict context, privacy protection is frequently seen as a way of drawing the line at how far society can intrude into a person's affairs. The lack of a single definition should not imply that the issue lacks importance. As one writer observed, "in one sense, all human rights are aspects of the right to privacy." human rights in the international catalogue, privacy is perhaps the most difficult to define. Definitions of privacy vary widely according to context and environment. In many countries, the concept has been fused with data protection, which interprets privacy in terms of management of personal information.

Privacy is a fundamental human right. It underpins human dignity and other values such as freedom of association and freedom of speech. It has become one of the most important human rights of the modern age.

Page 57: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 57

What I’ve learned: I learned that the rights should be respected. I learned that this is all about the data in a internet where

there are so many problems had encountered by the user and owner. According to article 8, any

processing is justified for other reasons. However it is unclear whether it is necessary in this case for the

controller to obtain the data subject’s consent to the further processing. I also learned that the basic idea

of the restricted access in its most suggestive sense, privacy is a limitation of other’s access to individual.

Integrative Questions:

1. What are the three aspects of privacy?

2. What is the concern of European standard?

3. What article stated that personal data

4. What are the two very different ideals in the directive pertaining to the protection of individual

rights?

5. What is the concern of European standard?

Citations: N/A

Page 58: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 58

Book Review: Chapter 27: Privacy Protection, Control of Information, and Privacy-Enhancing Technologies Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“The Internet for everyday activities is bringing new threats to personal privacy.”

Learning Expectations

• The idea of this concept? • Is it useful?

Review: These technologies have thus far done little to make cyberspace more privacy friendly. The market incentives for firms to collect and process personal data are very high. Data about users is not only useful in assessing how a firm might improve its service for its customers, but it also has become a key commercial asset which firms use both for internal marketing purposes and for licensing to third parties. Information privacy is a scarce commodity in cyberspace. The technical infrastructure of cyberspace makes it remarkably easy and cheap to collect substantial amounts of information identifiable to particular individuals. Once these data have been collected, information technologies make it very easy and cheap to process the data in any number of ways (for example, to make profiles of particular users’ interests). While innovative information and communication services are constantly improving people's lives and generating growth throughout Europe's economy, they can also bring about new risks. Privacy Enhancing Technologies (PETs) can minimise them by helping people better protect their privacy and personal data online.

Page 59: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 59

What I’ve learned: Privacy refers to the ability of the individual to protect information about him. Anonymity is privacy of

identity. We can divide anonymity into two cases: persistent anonymity where the user maintains a

persistent online persona which is not connected with the user's physical identity and one-time anonymity,

where an online persona lasts for just one use.

I explore more about this chapter that it get to know that privacy is not simply an absence of information

about us in the minds of others. This chapter was all about protecting one’s privacy in the field of web site

and internet. It also deals with the privacy enhancing technologies, where our technology is in the high

status.

Integrative Questions:

1. What are PET?

2. How is it useful to people?

3. Who said that PETs can be understood as technical and organizational concepts?

4. What are the complementary notions that reinforce each other?

5. What concepts aim to protect personal identity?

Citations: N/A

Page 60: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 60

Book Review: Chapter 28: Toward an Approach to Privacy in Public: Challenges of Information Technology Book: Cyberethics Author: Dag Elgesem Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

““Privacy” lays a conception of the individual and his or her relationship with society.” Learning Expectations

• The privacy. • Concept that will make this more secure. • Challenges of information

Review:

importance of securing intimate and personal realms. Nor does it challenge the compelling connection between privacy norms and the ability to protect these realms against unwarranted intrusion. It argues, however, that an account of privacy is not complete that stops with the intimate and recent advances in wireless technologies have led to the development of intelligent, in-vehicle safety applications designed to share information about the actions of nearby vehicles, potential road hazards, and ultimately predict dangerous scenarios or imminent collisions. These vehicle safety communication (VSC) technologies rely on the creation of autonomous, self-organizing, wireless communication networks connecting vehicles with roadside infrastructure and with each other.

VSC technologies are still being developed, certain ethical implications of these new information technologies emerge: Coupled with the predicted safety benefits of VSC applications is a potential rise in the ability to survey a driver engaging in her everyday activities on the public roads. This paper will explore how the introduction of VSC technologies might disrupt the "contextual integrity" of personal information flows in the context of highway travel and threaten one's "privacy in public." Since VSC technologies and their related protocols and standards are still in the developmental stage, the paper will conclude by revealing how close attention to the ethical implications of the remaining design decisions can inform and guide designers of VSC technologies to create innovate safety applications that increase public safety, but without compromising the value of one's privacy in public.

Page 61: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 61

What I’ve learned:

I learned in this chapter that the idea that privacy functions to protect the integrity of a private or intimate realm spans scholarly work in many discipline, including legal, political, and philosophical discussions of privacy. I also learned that the widespread use of technology such as in personal profiling, to assemble and transmit vast stores of information is called public information.

Integrative Questions:

1. What are the two misleading assumption?

2. Who characterized privacy as a legal island?

3. It is delimited by physical boundaries, what is it?

4. What do you call the technology that assemble and transmit vast stores information?

5. Who is 19th century British legal theorist?

Citations: N/A

Page 62: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 62

Book Review: Chapter 29: KDD, Privacy, Individuality, and Fairness

Book: Cyberethics Author: Herman T. Tavani and James H. Moor Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“It should be observed that group profiles may occasionally be incompatible with respect to individuals privacy and rules and regulations”

Learning Expectations

• What is this all about? • Is it fair use applicable here?

Review:

There are problems with KDD(Knowledge Discovery database) because for one thing, it uses personal data in terms of categorical privacy, and I have indicated the shortcomings of traditional privacy conceptions. But the primary concern would be the problems being faced by using KDD. I know privacy is something we all should attain and something the Information technology industry should think of ways to protect us but one thing or another personal information gathering problem. We can work together through the task of getting those techniques work for everyone. As a matter of fact, we should consider cooperating with people that can truly help us with our individual privacy problems such as that geek and loner people wearing unbelievably large eyeglasses in universities, Facing that problem can actually help us out. Something will change once cooperation because it will result into something good considering now, they can hear your side of the problem and frustration and you can know their guilt and sleepless night just to develop that anti-virus or descriptor for you to use. It is all about give and take now and it is all about groups that are information subjects for a special purpose. From the perspective of others than the producers and certain users of the profiles, the definition of the information subject will remain hidden because they do not know the specific purpose of the definition.

Page 63: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 63

What I’ve learned:

The basic on this particular chapter relies on how privacy is much secured now. We must be able to implement this kind of privacy because it is our freedom also to have privacy.

Integrative Questions:

1. What should be better to grow unfairness in social interaction? 2. What is KDD 3. Why is KDD important? 4. Define personal data? 5. Where dos categorial privacy strongly connected?

Citations: N/A

Page 64: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 64

Book Review: Chapter 30: Data Mining and Privacy

Book: Cyberethics Author: Helen Nissenbaum

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Technology cannot make right what is otherwise wrong, so such data mining, is indeed a

violation of privacy” Learning Expectations

• The role of privacy in data? • Data mining as a primary source of security for all data? • Is data mining is good?

Review:

Data mining is the process of extracting hidden patterns from large amounts of data. As more data is gathered, with the amount of data doubling every three years, data mining is becoming an increasingly important tool to transform this data into information. It is commonly used in a wide range of profiling practices, such as marketing, surveillance, fraud detection and scientific discovery.

The Privacy. It’s a loaded issue. In recent years privacy concerns have taken on a more significant role in American society as merchants, insurance companies, and government agencies amass warehouses containing personal data. The concerns that people have over the collection of this data will naturally extend to any analytic capabilities applied to the data. Users of data mining should start thinking about how their use of this technology will be impacted by legal issues related to privacy.

Patterns in data samples that have been "mined", it is important to be aware that the use of a sample of the data may produce results that are not indicative of the domain. Data mining will not uncover patterns that are present in the domain, but not in the sample. There is a tendency for insufficiently knowledgeable "consumers" of the results to treat the technique as a sort of crystal ball and attribute "magical thinking" to it. Like any other tool, it only functions in conjunction with the appropriate raw material: in this case, indicative and representative data that the user must first collect. Further, the discovery of a particular pattern in a particular set of data does not necessarily mean that pattern is representative of the whole population from which that data was drawn.

Page 65: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 65

What I’ve learned: The important part of the process is the verification and validation of patterns on other samples of data. this chapter that data mining is the process of identifying valid, novel, potentially useful, and ultimately understandable structure in data. That it can be easily accomplished when the data are highly structured and available in many different forms at many different levels in what are known as data warehouses.

Integrative Questions:

1. What is data mining? 2. What does data warehouse contains? 3. What do we call if the data are highly structured and available in different levels? 4. It is the allowing of data to be compared and contrasted in different form 5. Provide the context of the data

Citations: N/A

Page 66: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 66

Book Review: Chapter 31: Workplace Surveillance, Privacy, and Distributive Justice

Book: Cyberethics Author: Anton H. Vedder Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

Employers have generally been considered merely extensions of traditional management

prerogatives” Learning Expectations

• To know mpre about this chapter

• What is surveillance and privacy?

• Is it applicable to justice? Review: In the country USA, seem to favour such an interpretation. The individual's call for workplace privacy seems illegitimate in a context where the 'personal' is almost excluded by default. In this paper I want to argue that the private/public distinction is not useful in the context of workplace surveillance since it always seems possible to argue that the workplace is always and only 'public'---thereby leaving the employee without resources to defend their claim. Modern technologies are providing unprecedented opportunities for surveillance. In the workplace surveillance technology is being built into the very infrastructure of work. Can the employee legitimately resist this increasingly pervasive net of surveillance? The employers argue that workplace surveillance is essential for security, safety, and productivity in increasingly competitive markets. They argue that they have a right to ensure that they 'get what they pay for' Thus, it seems that one needs to develop another approach to think through the issues at stake. I will argue that the distribution of privacy rights and transparency (surveillance) rights is rather a matter of organisational justice. I will suggest that we may use theories of justice---in particular the work of Rawls---to develop a framework of distributive justice for distributing privacy and transparency between the collective and the individual in a way that is fair

Page 67: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 67

What I’ve learned:

I learned that surveillance has become a central issue in our late modern society. One of the problematic areas of surveillance is the workplace surveillance. With the new technology, surveillance becomes less overt and more diffused. I also learned that privacy is by no means an uncontroversial issue. For Posner privacy creates opportunities for hiding information that could render many social interactions. Integrative Questions:

1. It is the central issue in late modern society 2. What does ECPA means? 3. Exceptions that allows monitoring communications. 4. What does IPC means?

5. Is it true that allows monitoring those cases where prior consent has been obtained? Citations: N/A

Page 68: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 68

Book Review: Chapter 32: Privacy and Varieties of Informational Wrongdoing

Book: Cyberethics Author: Joseph S. Fulda

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“It is non-exclusion that makes retaliation impossible, but anonymity of the free-rider.” Learning Expectations

• What are these wrongdoing

• Privacy and Varieties of Informational Wrongdoing is it a problem?

Review: Van den Hoven examines the concept of privacy from a different perspective. I find his work very fundamental. He deals with the specific reasons why we want to restrain access to the information that we disseminate to others. Van den Hoven identifies four reasons to restrain access to this information: information-based harm, informational inequality, informational injustice and moral autonomy and moral identification. Formal legislation, traditionally applicable within physically defined national boundaries, can of course work internationally, but the controls and constraints of physical borders applicable to our geographical environment do not transfer easily to "cyberspace". Using the metaphor of "cyberspace" encourages a spatial and somewhat abstract concept leading to an impression of a "virtual world". This abstract entity compounds the perceived difficulties of enforcing legislation. Within this environment, which is controlled and constrained by users and technical development (respectively), the emphasis is on self-regulation and a response to perceived ethical concerns in the form of trust-building initiatives. This paper shows that to some extent a discourse ethics is already in operation outside, but about the Internet.

Page 69: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 69

What I’ve learned: I learned that many public administration problems can be characterized as free-rider problems, law enforcement, tax collection, implementation of environmental policies. This chapter also discussed the fact that personal information is used to inflict harm or a cause serious disadvantage to individuals does not necessarily make such uses violations. Integrative Questions:

1. Who observes that liberalism is plagued by free-riders problem? 2. Known to have used computerized databases and internet to get information. 3. Meaning of IVHS Intelligent Vehicle 4. Who observes that liberalism is plagued by free-riders problem?

Citations: N/A

Page 70: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 70

Book Review: Chapter 33: PICS: Internet Access Controls Without Censorship Book: Cyberethics Author: Lucas D. Introna

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote: Learning Expectations Review: PICS-compatible software can implement selective blocking in various ways. One possibility is to build it into the browser on each computer, as announced by Microsoft and Netscape. A second method-one used in products such as CyberPatrol and SurfWatch-is to perform this operation as part of each computer's network protocol stack. A third possibility is to perform the operation somewhere in the network, for example at a proxy server used in combination with a firewall.

PICS does not specify how parents or other supervisors set configuration rules. One possibility is to provide a configuration tool like that shown in Figure 3. Even that amount of configuration may be too complex, however. Another possibility is for organizations and on-line services to provide preconfigured sets of selection rules. For example, an on-line service might team up with UNICEF to offer "Internet for kids”.

What I’ve learned:

I also learned that PICS provides a labeling infrastructure for the Internet. It is values-neutral: it can

accommodate any set of labeling dimensions, and any criteria for assigning labels. Any PICS-compatible

software can interpret labels from any source, because each source provides a machine-readable

description of its labeling dimensions. I also learned that from this chapter, I have learned that PICS

provides a common format for labels, so that any PICS-compliant selection software can process any

PICS-compliant label.

Page 71: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 71

Integrative Questions:

1. What does PICS doesn’t specify?

2. What does PICS provide?

3. Three factors in blocking net

4. What is a common set of dimensions would make publishers self labels?

5. Who creates labels?

Citations: N/A

Page 72: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 72

Book Review: Chapter 34: Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace Book: Cyberethics Author: Jeroen van den Hoven

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Computer crime is a territory that is not so well defined, a number of ethical questions both precede and

follow from”

Learning Expectations

• What is this sabotage? • To learn more about what happened in computer crime?

Review:

With the number of internet users all around the world growing at an ever increasing pace, it has now become critical for all users to be familiar with the inherited risks that the internet brings forth and also some of the legal responsibilities that a user has in an open environment that is the internet. This means that knowing what a computer crime is will help not only a user avoid legal troubles down the road, but also make the user aware of the ways that computers can be exploited and how to protect oneself

against such attacks.

Furthermore, Computer crime is a growing problem all over the globe now that personal computers have become the norm. In fact there are over 800 million people are using the internet all over the globe at this moment. This international nature of modern computer society creates many complications when it comes to criminal activities. Indeed, it’s all too often that we hear of the latest virus to hit the major networks to be the work of a hacker living on the opposite side of the globe or of a large

scale attack being made on an internet backbone outside of the United States.

Page 73: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 73

What I’ve learned: I have learned that in this chapter the computer crime they called was the piracy, break-ins and sabotage in a cyberspace. It was really a problem in so many cyberspaces. If we will hear the word “crime” we usually think that it was a bad doings of a criminal person, but in this chapter computer crime was in the field of cyberspace. Integrative Questions:

1. Does any crime involving a computer constitute a computer crime or should its definition be more strict?

2. Does cyber-stalking count as a computer crime or is that merely an extension of a pre-existing type of crime?

3. Why does its definition even matter? 4. Is it applicable to our country? 5. How does it works for developing countries?

Citations: N/A

Page 74: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 74

Book Review: Chapter 35: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Intellectual property is not tangible, material entity. It is nothing more than a volatile pattern arrayed in patterns and closed gates to form intelligible numerical or textual information, documents, and data reside

inside computers

Learning Expectations

• Hacktivist? • To know more about terrorism happening on Cyberethics?

Review:

Hackers believe that non-malicious intrusions are morally permissible and have offered a number of arguments purporting to justify such intrusions. Some hackers believe, for example, these intrusions are justified because they result in an increase in humanity’s stock of knowledge about the relevant technologies and thereby promote the development of technologies that will ultimately make the Internet more secure. Some believe that any barriers to information are morally illegitimate and hence deserve no respect – including barriers that separate the information on one person’s computer from another person’s computer.

The argument is roughly as follows. Since civil disobedience is morally justifiable as a protest against injustice, it is sometimes justifiable to commit digital intrusions as a means of protesting injustice. Insofar as it is permissible to stage a sit-in in a commercial or governmental building to protest, say, laws that violate human rights, it is permissible to intrude upon commercial or government networks to protest such laws. Thus, digital attacks that might otherwise be morally objectionable are morally permissible if they are politically-motivated acts of digital civil disobedience or hacktivism.

Page 75: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 75

What I’ve learned: I have learned that there are so many reason why a person hacking in a cyberspace. Hacktivist here was defined as an act of electronic civil disobedience, then the punitive outcomes must be brought into alignment with other forms of civil disobedience. If we hear the work “Hack” we actually think of holdups, but that was true but did you know that there are many kinds of hacking, like computer hacking.

Integrative Questions:

1. What is hacktivism? 2. What is ECD? 3. Name of hactivist group that hacked India’s Bhabba Atomic Research Center 4. The privacy of the company? 5. Role of security?

Citations: N/A

Page 76: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 76

Book Review: Chapter 36: Web Security and Privacy: An American Perspective

Book: Cyberethics Author: Herman T. Tavani Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“A system that maintains availability while under attack exhibits survivability. System with

survivability exhibit degradation in the face of attacks.” Learning Expectations Review:

Updates are then shown on the user's home page using a timeline which lists all the updates received in chronological order, and delivered to other users who have signed up to receive them. Users can respond to other users' updates from their timeline through the Plurk.com website, by instant messaging, or by text messaging.

For Americans, they have having fun with the internet since they are the pioneers on making this. Americans loves systems and that’s the fact. No wonders why their system is very much productive and reliable than us. Let’s go to their web security wherein they are very conscious and yet protective about the data.

On the internet, we can do still better, with richer labels that reflect diverse view points and more flexible selection criteria. PIC, the Platfrom for Internet Content Selection, establishes internet conventions for label formats and distribution methods while dictating neither a label vocabulary nor who should pay attention to which labels. It is an analogous to specify where on a package a label should appear and in what font it should be printed, without specifying what it should say.

I have been known in my class to be the very mysterious one. I do talk a lot and loudly at times but no one really do know me. People and some of my friends already told me that I should let loose and just, you know, let myself be open to the world, but that is not me. This is me. I am person who is anonymous. I have to admit, I am mysterious even to myself because I tend to not talk about things about me that much considering my interest with other people’s lives.

Page 77: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 77

What I’ve learned: On the internet, we can do still better, with richer labels that reflect diverse view points and more flexible selection criteria. Because the internet is very much powerful, lot people use it and make something of it. That’s why web 2.0 came out. The more advanced technology developed, the more people will use the security of it. Integrative Questions:

1. The update in internet? 2. How can be implemented? 3. Who are the people involved with it? 4. Is it good or bad? 5. Security as a primary security of the system. Effective or not?

Citations: N/A

Page 78: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 78

Book Review: Chapter 37: The Meaning of Anonymity in an Information Age Book: Cyberethics Author: Mark Manion and Abby Goodrum

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“first concept comes into our mind is that it is questionable” Learning Expectations

• What is anonymity? Review: When we say the word “Anonymity”, the first concept comes into our mind is that it is questionable, or in other words, unidentifiable. We have no idea about it. We don’t know how to define it, that’s why, anonymity is defined also as a freedom from identification. It is anonymous, in a way that we don’t know everything about it, and because we have no idea about it, we must think something for it, we must define it as much as possible to give description to it. Because of this, the word “freedom” came out. And since freedom is so much powerful to a person, we have a power to choose it and a power to have a responsibility over it. Anonymity is the state of not knowing of something and therefore, it considered as a lack of distinctiveness. We know that this is existed but we have no description over it. No one can define unless, if we have more information about it, there’s a big possibility that we could define it formally. For the next part of this chapter, we will deal the purpose and the impact of anonymity in the social environment. Anonymity maybe deliberately sought or something that occurs spontaneously from the sheer complexity of modern life. That’s the effect in our lives. As we can see, it occurs spontaneously, therefore, we don’t know everything about it and we are clueless about it. For instance, If a person asked you to define a particular character in the movie and that character role is very mysterious, then we have to think that this character only done a particular role which is a big role in the film, but you can’t identify his/her name especially when that actor/actress is not that popular, therefore, the first perception is that “who is this character in real life?” As a result, it is called the anonymous character in the movie. So, the next time you so this character, we will think that “This is the character in the movie”. But still, it is anonymous to you because you have no information about it. As an analogy to social environment, If there is something existed and people have an issue about it, the people just think that this is anonymous simply because they have no idea for it. And since it is spontaneous, we will immediately forget about this issue. And if you have no interest with it, therefore, it will mislay into your mind. That’s the concept of anonymity in a layman’s point of view. How about if it is on the internet and social environment side? Does anonymity is still present? How can anonymity applied in the social and internet side?

Page 79: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 79

What I’ve learned: I learned that anonymity is sometimes good or bad. Based on this chapter, it is an advantage and disadvantage for us people to know the anonymity of something. The idea is that we are now in the modern world and information is so much powerful in terms to social impact. Therefore, the internet as a tool, we must use it to identify something that is good for us and can benefit us in a way that it is a good manner or way. Integrative Questions:

1. What is anonymity to information age? 2. What’s the role of internet in terms of this particular topic? 3. How can we use this in defending ourselves? 4. How can we actually deal with it? 5. Does 10 commandment present in this particular chapter?

Citations: N/A

Page 80: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 80

Book Review: Chapter 38: Written on the Body: Biometrics and Identity Book: Cyberethics Author: L. Jean Camp

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Discussion of these technologies tend often to miss precisely this level of analysis Learning Expectations Review:

Biometrics is often described as `the next big thing in information technology'. Rather than IT rendering the body irrelevant to identity – a mistaken idea to begin with – the coupling of biometrics with IT unequivocally puts the body center stage. The question to be raised about biometrics is how bodies will become related to identity, and what the normative and political ramifications of this coupling will be. Unlike the body rendered knowable in the biomedical sciences, biometrics generates a readable body: it transforms the body's surfaces and characteristics into digital codes and ciphers to be `read' by a machine.

Your iris is read, in the same way that your voice can be printed, and your fingerprint can be read'', by computers that, in turn, have become touch-sensitive and endowed with seeing and hearing capacities. Thus transformed into readable text, the meaning and significance of the biometric body will be contingent upon context, and the relations established with other texts. These metaphors open up ways to investigate the different meanings that will become attached to the biometric body and the ways in which it will be tied to identity. This paper reports on an analysis of plans and practices surrounding the Eurodac' project, a European Union initiative to use biometrics (specif. fingerprinting) in controlling illegal immigration and border crossings by asylum seekers.

Page 81: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 81

What I’ve learned:

Since in this chapter is about anonym zing in sending mail, I learned that double encryption was really amazing technique to send any email or documents to someone without revealing the identity of the sender. Gatekeeper was also a hi-tech thing that they invented, it only removes the envelope with the sender’s address and delivers the bare floppy disk with anonym zed data to central data bases.

Integrative Questions:

1. What does ATM means? 2. Why Biometric? 3. The effect of this in the people? 4. Why is it related to information ethics? 5. How can be implemented?

Citations: N/A

Page 82: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 82

Book Review: Chapter 39: Ethical Considerations for the Information Professions

Book: Cyberethics Author: Helen Nissenbaum

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Ethics is the study of morality; the study of what we do. Morality could exist without ethics

but there cannot be ethics without morality. Learning Expectations

• Ethics as a profession?

• How can we say that ethics is part of the morality of the people.

Review:

This chapter discussed ethical concerns of information science professionals from two viewpoints: concerns of practitioners and the information industry, including a prototype for ethical contexts and principles for ethical actions; and concerns of theoreticians and researchers, including system principles and ideological, political, and social frameworks. Codes of ethics are also discussed.

An accounting firm expanding on the Internet will likely explore several different strategies. They range from offering only selected accounting services, to providing a complete line of the firm's services to clients online. Alternatively, a firm may simply want clients to be able to receive information from the firm's website. In between these extremes fall such activities as marketing, instruction, referral, and chat rooms or bulletin boards.

Providing services online enables practitioners to serve customers remotely; however, it also creates the potential for both intentional and inadvertent abuse. Only limited regulatory or professional standards specifically address online service providers. In addition, most professional codes of conduct fail to address Internet delivery of services. As a result, CPAs are left with little ethical guidance when problems unique to the Internet arise. Professionals may not be fully aware of the ethical issues that could arise or how their codes apply on the Internet.

Page 83: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 83

What I’ve learned: In this chapter that I have read, I learned that these issues can have far-reaching and potentially crippling consequences for uninformed online business providers. While the Internet's rapid expansion has enabled an equally rapid expansion of web based professional services, it has not been matched by the consideration and understanding of the related ethical implications.

Integrative Questions:

1. It is generally define as philosophical study of moral behavior.

2. What does refers to the sense of conscience? 3. Identified the three major realms of ethics

4. What does NTIA means? 5. What does ALA’s means? – Library

Citations: N/A

Page 84: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 84

Book Review: Chapter 40: Software Engineering Code of Ethics: Approved

Book: Cyberethics Author: Irma van der Ploeg

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Ethical tensions can be best addressed by thoughtful consideration of fundamental

principles, rather than blind reliance on detailed regulations. Learning Expectations

• What are these codes? • Conection to software engineering codes?

Review:

To ensure, as much as possible, that their efforts will be used for good, software engineers must commit themselves to making software engineering a beneficial and respected profession. In accordance with that commitment, software engineers shall adhere to the following Code of Ethics and Professional Practice. The Code contains eight Principles related to the behavior of and decisions made by professional software engineers, including practitioners, educators, managers, supervisors and policy makers, as well as trainees and students of the profession. The Principles identify the ethically responsible relationships in which individuals, groups, and organizations participate and the primary obligations within these relationships.

The Clauses of each Principle are illustrations of some of the obligations included in these relationships. These obligations are founded in the software engineer's humanity, in special care owed to people affected by the work of software engineers, and in the unique elements of the practice of software engineering. The Code prescribes these as obligations of anyone claiming to be or aspiring to be a software engineer.

Computers have a central and growing role in commerce, industry, government, medicine, education, entertainment and society at large. Software engineers are those who contribute by direct participation or by teaching, to the analysis, specification, design, development, certification, maintenance and testing of software systems. Because of their roles in developing software systems, software engineers have significant opportunities to do good or cause harm, to enable others to do good or cause harm, or to influence others to do good or cause harm.

Page 85: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 85

What I’ve learned:

The dynamic and demanding context of software engineering requires a code that is adaptable and relevant to new situations as they occur. However, even in this generality, the Code provides support for software engineers and managers of software engineers who need to take positive action in a specific case by documenting the ethical stance of the profession.

Integrative Questions:

1. What is the first principle of the code? 2. It can be addressed by thoughtful consideration of fundamental principles 3. These persons contribute by direct participation or by teaching. 4. What are the eight principles that software engineer shall adhere? 5. It is not a simple ethical algorithm

Citations: N/A

Page 86: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 86

Book Review: Chapter 41: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Attempting to derive a code o0f ethics or any similar kind of any practical ethical guidance

from fundamental ethical principles is of little practical help, Learning Expectations

• I expect to learn why this chapter entitling No, PAPA: Why Incomplete Codes of Ethics Are Worse

• What is PAPA?

Review:

It has been argued that it is in the best interests of IT professionals, to adopt and enforce professional codes in the work place. But there is no code for usability engineers, unless one accepts that it is a branch of software engineering. The new joint ACM/IEEE-CS Software Engineering Code of Ethics is applied to actual usability cases. This enables usability engineers to interpret this code in their profession. This is achieved by utilizing four case studies both directly in terms of the ethical issues involved and in the light of the code. Also examined are the short-comings of the code for the domain of usability engineering, and suggestions are made for enhancements for future revisions of the code

The problem is, that by focusing on these four areas of concern, attention may be taken away from other, potentially more important, moral issues. Not all important moral issues in information technology can be put under those headings. Yet it focus on four areas gives the erroneous impression that adherence to the moral requirements in those areas alone could ensure moral rectitude.

The same considerations are highly likely to apply to any moral code that is developed. Authors of incomplete moral codes risk encouraging others to act in immoral ways with the author's apparent sanction. Related, broader, questions are considered, and it is advocated that there should always be acknowledgment of the existence of 'external', potentially more important, moral issues.

Page 87: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 87

What I’ve learned:

I learned in this chapter that in most countries of the world, the “information revolution” has altered many aspects of life significantly: commerce, employment, medicine, security, transportation, entertainment, and so on. Consequently, information and communication technology (ICT) has affected in both good ways and bad ways community life, family life, human relationships, education, careers, freedom, and democracy.

Integrative Questions:

1. What does PAPA means? 2. What are the ethical issues in PAPA? 3. What is the important telework issue? 4. What is Richard Mason’s article title? 5. What does ACM means?

Citations: N/A

Page 88: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 88

Book Review: Chapter 42: Subsumption Ethics Book: Cyberethics Author: Elizabeth A. Buchanan

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“The different between computers and simple machines is the extent to which computer systems subsume design and development decisions over which users have little or no control”

Learning Expectations

• What is this subsumption?

• How does it work?

• To learn more about it. Review:

Subsumption in ethics is defined as the process by which decisions become incorporated into the operation of information technology (IT) systems, and subsequently forgotten. There are four axioms of subsumption ethics: A. Information systems subsume design, policy and implementation decisions in programming code and content; B. Subsumed objects have determinate moral value; C. Subsumed objects have a high "invisibility factor;" and D. Subsumptive complexity increases over time. These axioms can be applied to practical problems in IT by using them in conjunction with established ethical frameworks. Information systems subsume design, policy and implementation decisions in programming code.

The right to privacy is similarly guaranteed by article 8 of the ECHR. Data protection comes within the scope of the protection of private life guaranteed under this article. Derogations to the principles of data protection and to article 8 of the ECHR must be in accordance with the law and must respect the principle of proportionality. Equally limits to freedom of expression, such as the ones that might derive from the application of data protection principles, must also be in accordance with the law and respect the principle of proportionality.

The differences between these three models should not however be over-estimated. In most cases, independently of any express derogation that may exist, data protection legislation does not apply fully to the media because of the special constitutional status of the rules on freedom of expression and freedom of the press. These rules place a de facto limit on the application of substantive data protection provisions or at least their effective enforcement.

Page 89: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 89

What I’ve learned:

I have learned that subsumption ethics implies for continuous ethical analysis during systems design and development. An ethical framework is required for this analysis. Any number can be applied to the process of subsumption ethics.

Integrative Questions:

1. This is a part of an ancient Hindu Text called Mahabharata 2. What does IT means? 3. What are the four ethical principles that have roots in antiquity? 4. What do we call the third ethical principle? 5. What is sumsumption ethics?

Citations: N/A

Page 90: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 90

Book Review: Chapter 43: Ethical Issues in Business Computing Book: Cyberethics Author: Don Gotterbarn, Keith Miller, Simon Regerson

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote:

“Essentially, computers are used in business to solve problems. An individual manager,

focused on use of a computer

Learning Expectations

• The basic of ethical issues on this chapter • How is it related to business computing?

• Is ethical issues affected? Review:

Because of our new hi-tech technology, computer nowadays was very useful in may ways. It can also used in business. That is why there are so many businessmen that has the newest model of computer to use for their businesses. The right to reply and the possibility to have false information corrected, the professional obligations of journalists and the special self-regulatory procedures attached to them, together with the law protecting honor (criminal and civil provisions concerning libel) must be taken into consideration when evaluating how privacy is protected in relation to the media.

The differences as to the application of data protection law to the media may also be explained by changing perspectives both on the role of data protection law and on the use of information technology by the media. In the early days of data protection the attention tended to focus on large mainframe-based databases. In those days the media seemed hardly concerned by such rules and no derogations from them therefore seemed necessary.

Business, Legal and Ethical Issues is the first of the core subjects undertaken by Computer Professional Education Program students in their ongoing professional development. Professionalism is a risk management strategy and in this subject the emphasis is on applying professionalism in the business context.

Page 91: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 91

What I’ve learned: I learned that all companies of whatever size, should consider their use of computer systems. If a policy on computer use has not already developed, it is not just sensible but essential that urgent consideration is given to the ways in which systems are currently being used. Integrative Questions:

1. This is the smallest scale of business computing

2. Here business organization is larger 3. At this level a business is large enough to employ a designated computer specialist 4. At this level there will be at least one team of computer specialist 5. It is use by business computer systems falls into two distinct and equally important

Citations: N/A

Page 92: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 92

Book Review: Chapter 44: The Practitioner from Within: Revisiting the Virtues Book: Cyberethics Author: Library Reference: N/A

Amazon Reference: http://www.amazon.com/Cyberethics-Morality-Cyberspace-Richard-Spinello/dp/0763737836/ref=pd_bbs_sr_1?ie=UTF8&s=books&qid=1239361218&sr=8-1 Quote: “It is difficult to get from youth up a right training for virtue if one has not been brought up under right laws;

for to live temperately and hardily is not pleasant to most people especially when they are young. Learning Expectations

• Expect how does virtues works • The reaction of Practitioners from within

Review: A very little internalization of these action-based theories. Virtue Ethics offers character-forming theory that has been more successful with my students than the action-based theories of computer ethics texts. Why? Virtue Ethics is directed toward character development. The focus is on being rather than doing.

It is grounded in practical wisdom. It is experiential, learning to care about the self, others, the community, living the good life, flourishing and striving for moral excellence. It offers a model for the development of character and personal ethics which will lead to professional ethics. Yet, the strict Virtue Ethics espoused by Aristotle has its limitations. This paper will explore the need for a more integrative approach to contemporary moral theory, one that may be found by revisiting the virtues through the works of Aristotle and Kant. It will offer insight into translating theory into practice for students of computer science and information technology.

Computer ethics involves taking students who are not philosophically trained, exposing them to action-guiding theories, presenting them with the codes of ethics of several companies and professional organizations and asking them to make ethical decisions in scenario-based cases. This approach is deliberately action-based and focuses on doing. "What would you do?" is the traditional question we ask our students. While this pedagogical methodology forces them to examine situations and argue from a particular point of view, it does little to influence their character. They see the utilitarian or deontologist as someone other than themselves.

Page 93: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 93

What I’ve learned: I have learned that much of the data that is mined is public or semi-public in nature what we purchase at the supermarket, where we surf the Web, where we work, our salary. This data can be used to construct profiles and customer categories that can be used to target advertising. In addition to data privacy issues, data mining raises other social concerns. Integrative Questions:

1. What ethics offers character-forming theory? 2. What is Sherman’s books of discussion? 3. What does ICT means? 4. What does Louden states about ethics? 5. Who asserts that carrying out rules is a sole concern of ethics?

Citations: N/A

Page 94: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 94

The-handbook-of-information-and-computer-ethic

Book Review: Chapter 1: Foundations of Information Ethics Book: The-handbook-of-information-and-computer-ethic Author: LUCIANO FLORIDI

Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“We call our society “the information society” because of the pivotal role played by Intellectual, information-intensive services intangible assets”

The people are also called information because each one of us can give information. We are so called “information society”. Even animals belong to this society because they also consist of information that can affect the life of human. Learning Expectations:

• The basic foundation of ethics in society. • How does information flows in information ethics?

• To know and to be familiar in the word “Infosphere” Review: Why is it that our society called “the information society”? Basically, we are entitled to be the information in the society. Why? It’s because each one of us can give information. When the earth is created by our God Almighty, all of what He created is very powerful knowing the fact that each one of those is included with information. Since the information is all provided, all we have to do is to discover it. For instance, God created the nature. All facts about it already exist like, the W’s and H questions on a particular thing. The humans make a discovery all out of it. And what’s the output? All of these discoveries will lead other people knowing the information. The information now is just passed away into the society and many people will know it. For those who want to be into discovering, they must know it. This introduction is very useful because it is the foundation of everything all about information. The technology we have right now is because of information. The information is also conversation because we can get information through it. Every one of us has a power if we have information the money include. But on the physical side, its information make the world go around. One of the reason and fact is that we are on the “knowledge-based economy” era wherein information turns into knowledge. The so called “techne” is a full expression defined by the society which gives us ethical problems. This means that ethical problems are the problems we are up to. It is very much complex to understand if you we will include this on the global dimensional problem. The world is now focusing to these cycles namely data, information and knowledge. It’s quite amazing that these three can rule the world. They included the so called “Infosphere”. It is a new word for us but it is basically the information that rules our lives into modern technology. “Infos” means the gathered data on a particular topic and the “Sphere” is what surrounds us. It is just like a nature with technology included.

Page 95: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 95

What I’ve learned: I learned the function and structure of “infosphere”. To be honest, it’s the first time I heard about infosphere. It is a new word for us and we don’t actually know the meaning of it. Now, because it is related to information, infosphere is widespread information across the globe. All those who are in I.T should also know this for further knowledge in Information technology field. I also learned that humans have a greatest responsibility as a main element on ethical issues. We are acting like an agent toward the infosphere. The human as the main entity must be informed about information ethics so that the ethics will be addressed to other people who are involved in information ethics. Other people can also apply these values to other people. Overall, it’s all for us, anybody can use it. The foundations of ethics in general are very much useful in many ways. We are humans who control a the world must have knowledge to have ideas on the foundation of ethics. Thanks to the foundation of ethics because it gives basis to other people who are working in I.T field and other fields. Integrative Questions:

1. What is infosphere? 2. What are the structures of it? 3. What is the function of this particular chapter / discussion? 4. Does this study is very useful? 5. What is the impact of I.T course on the foundation of information ethics?

Citations: N/A

Page 96: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 96

Book Review: Chapter 2: Milestones in the History of Information and Computer Ethics Book: The-handbook-of-information-and-computer-ethic Author: TERRELL WARD BYNUM Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Cybernetics takes the view that the structure of the machine or of the organism is an index of the performance that may be expected from it.”

Learning Expectations

• I expect to learn what are the milestones in information and computer ethics?

• The history of the people in creating modern technology. • How did Weiner contribute his works to the world?

Review: This chapter is the collection of the history of information and computer ethics. It is stated here all information regarding computer ethics. The Second World War is the starting point of the history. It is all where information and computer ethics starts. Also in Second World War, number one advancement created by humans is the internet which connects one network to another. It is good to say that because of world war, people are really passionate in doing new things that can really help in the world war. They use this as a tool to fight against the enemy. As they create these tools, people can now acquire knowledge for technology. The outputs are all information. One story at that time was a philosopher and scientist, Norbert Wiener who are involved in digital computers. Because he is involved here, lots of ideas come into his mind specifically the idea of defense using technology. All of these are called “enormous potential for good and evil.” Because of this idea, he thinks now that the new information technology could change the world in a literal way. He also based the industrial revolution because of this revolution, people cannot collect ideas to have an advancements particularly advancement in technology. It is hard to predict the “second industrial revolution” as an “automatic age”. In this particular age, all are high tech. At this age, we come to a point that all are technical. It is hard to foresee this but it is a good prediction for us provided that these technology will don’t give us harmful reasons. Thanks to the people who are involved in the industrial revolution and Second World War age. Wiener really has great contribution for the change of the world. He even wrote a book so called “cybernetics”. With this book, the ethical impacts sides are included so that people would know the right and wrong about this. He laid the foundation of information ethics and computer ethics as an eccentric study of that time. They would not know the future, even he don’t know it. As the time goes by, the social and cultural impacts of social computing are developed. As of today, we are considering Wiener study as a good milestone of the coming era.

Page 97: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 97

About the book, it is basically the foundation of information ethics which involves human and technology. Weiner base his study on this way by evaluating the human perspective on health, happiness, security, freedom, knowledge, opportunities and ability of a particular person. He based his idea on this so that it is the side of human and to be based on ethical and moral values, naturally. The “cybernetic view of human nature and society” was really a big help giving foundational ideas on ethics for the “purpose of a human life”. In referring to life as a conclusion is that a purpose of a human life is to “flourish as the kind of information-processing organisms that human in a natural way”. This means that Weiner are really basing to a natural point of view. What I’ve learned: I learn the basic function of cybernetics for the foundational historical information and computer ethics. I learn that in natural way, the idea will just come out as the human thinks. All of us are aiming for a good life. Because we have a freedom to overcome a good life, we need to stick up ideas on how to be creative in our lives including the ethical values we must have. We are now dealing in technology these days. Because of Weiner’s idea, we can level up our lives through the technology we have today as well as the life we have today. We must be happy in all aspect because we can achieve for a good life. Through the foundational ideas stated here, we must do the best we can to live our lives to the fullest. Integrative Questions:

1. What is cybernetics?

2. What is the basic function of cybernetics?

3. Does it give function that we are really up to?

4. How did Weiner come up to this idea?

5. What was the reason why technological advancement are created today?

Citations: N/A

Page 98: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 98

Book Review: Chapter 3: Moral Methodology and Information Technology Book: The-handbook-of-information-and-computer-ethic Author: Jeroen van den Hoven

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“It studies the moral questions that are associated with the development, application, and use of computers and computer science.”

Learning Expectations

• To have brief background in the methodology they made. • What are the needs in I.T Field?

• How computer exemplifies? Review: This chapter talks about cyber ethics with a computer concept. In short, this is called the computer ethics. From the moral questions mixed up with computer related topic through development, and application. Professionals and other people who are involved in computer technology have many questions on what is right and what is wrong on particular ethical issues or ethical questions. It is hard to identify which is which and specifically it is hard if there are no references justifying the ethical or moral values. If you are an I.T person, it is hard to identify your point of view. Even you cannot identify it. Justifying answers is hard to formulate because you must know also the basis of a particular topic is. In the field of IT, it is everywhere. Information technology department is a must for a company today in order to survive simply because we are in the 21

st century and companies must be innovative as much as

possible. What if a problem occurs regarding the ethical values? What would be the basis of this particular problem? Well, it is all indicated here. As we review this chapter, we will learn how moral methodology and information technology works. According to the methodology of information technology, they described that there are surely specific properties of computers need to be accommodated in our moral thinking about it. At the end we are the one who will take advantage of the computers specifically in information technology. They describe this as the following. It is Ubiquitous and pervasive and comes to be a universal technology because of its logical and malleability. The computer can also simulate, communicate, recreate, and calculate and so on. These are the features of computers that can be use by people. It’s unimaginable because in the past centuries, they only predicted all of these. And here we are in the 21

st century, we are dealing with them

with an ethical values involved. Another description of computers is that it is a universal technology because of its unique feature, logical malleability. It is constitutive technology which serves as an essential part of our lives. There are many methodologies in the information technology. More and more methodologies will be discovering at the later part. The question is when, why, what?

Page 99: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 99

What I’ve learned: I learned how the people managed to got an idea in discovering methodologies in information technology. These ideas were very powerful because this gives an information to information technology methodology. The people keep making concepts to have a better conceptualization output in the future so that they can discover more about technology. In line of these technologies, people also learn how to manage the moral methodology. Combining this two is a better conceptualization that is good for our day to day living. It is indicated here that methodological positions in applied ethics relevant for computer ethics. The natural aspect and technological aspect of ethics are combined which gives an interaction to the user. Second indication is that the sketch of proposed conception of method of ethics of technology. This will really give help for those who are into ethics of technology. Since ethics are all there, lot of information are discovered. I must appreciate this discovery as an I.T Student. Integrative Questions:

1. How do they describe the methodology of information technology? 2. How did they apply the ethical values here? 3. How is it useful in society? 4. Does it change because of information technology? 5. Can we create more methodology in I.T?

Citations: N/A

Page 100: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 100

Book Review: Chapter 4: Value Sensitive Design and Information Systems Book: The-handbook-of-information-and-computer-ethic Author: Batya Friedman, Peter H. Kahn Jr., and Alan Borning Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Value Sensitive Design is a theoretically grounded approach to the design of technology that accounts for human values in a principled and comprehensive manner throughout the design process.”

Learning Expectations

• To learn what is value in Value Sensitive design. • Idea on human values that is principled. • Approaches in value system design.

Review: Value system design on this discussion is made specifically for technology for human values. It is stated here that it employs an integrative and iterative methodology. It simply means that in every value that they made are very much important with an integrative and iterative point of view. Integrative means to put concepts together and iterative means in an incremental form. When we combine these two concepts, it results to a mixture concepts and may result to a value sensitive design. During the early period of computerization, Wiener again, (stated in the previous chapter) a scientist and cyberneticist stated on his book that technology could help make us better human beings and create more just society. But most of all, because of the features that technology given to us, we must take control of what we created. Maybe in future, or a prediction, technology will rule over than human being. In his perspective, we must reject worshipping our created new technological advancement here on earth. The human value system design has emerged as stated on this chapter. These are in computer ethics, social information, Computer-supported cooperative work, and participatory design. These functions can really affect the lives of humans. These functions are very sensitive to us specifically in ethics. It can change our morality because we are following this value. It is explained here that in computer ethics particularly, it advances our way of thinking that intersect in computer technology and human lives. With these values, it can really affect the live of the people. Another thing is that in other values, these are all the same. In technical investigation part of value sensitive design, it follows the suitable from properties of technology. The primary role is to give suit abilities that follow from properties of technology. It should be certain in all possible activities.

Page 101: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 101

What I’ve learned: I learned the value system design is very much helpful in designing a particular principle. For example, the value of privacy. Privacy means it is a time which people choose in a private place. Knowing the fact that privacy is for an individual who need time to reflect. Privacy is an important part of a people lives because this is the time where we have to reflect or do the things we need to do independently. This is a good example of value sensitive design applying information systems. We need to apply and know this kind of principle so that other people would respect us to have also privacy for everything. The suggestions are very much helpful in creating value sensitive design. Implementing it is slightly difficult but if you understand the concepts, it would be easier. These are the ff.

1. Start with a value, Technology, or context of use. 2. Identify direct and indirect stakeholders 3. Identify Benefits and Harms for Each Stakeholder Group 4. Conduct a Conceptual Investigation of Key Values 5. Identify Potential Value Conflicts 6. Integrate Value Considerations into One’s Organizational Structure

These are very useful and effective in integrating value sensitive design. Integrative Questions:

1. Why does it called value sensitive design? 2. Can privacy still a private? 3. Who are involved in these values? 4. How to create a formal value sensitive design? 5. Can value design implement each one of those?

Citations: N/A

Page 102: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 102

Book Review: Chapter 5: Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property Book: The-handbook-of-information-and-computer-ethic Author: ADAM D. MOORE Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Intellectual property is generally characterized as nonphysical property that is the product of cognitive processes and whose value is based upon some idea or collection”

Learning Expectations

• To learn basically the intellectual property • To learn the purpose of this aspect in computer ethics, • Why do we need to adopt intellectual property?

Review: The first part of this chapter discusses about what is intellectual property. It is explained at introduced here that intellectual property are all based on individual personality. Since each one of us has a individual personality, we assume that we have also intellectual property as well. We must be knowledgeable to develop ourselves. Innovating ourselves is one way of changing our lives. It is explained here that we must fight our strength and weaknesses. We have strength, then maintain it and make you good as possible. On the other hand, weakness is your fear as an individual, therefore fight your fears. This is to justify yourself to be intellectual person. Its non-physical, which means, it is all based on ideas, on mental reasoning. The people must collaborate with all ideas we have. One must share ideas to others and ideas must be in a collaborative way of distributing it. It surrounds the control of physical appearance of the knowledge of the people. Each expression could be different but there is only one intellectual or rational idea. This chapter is focusing on three aspects. These are the personality-based, rule-utilitarian and Lockean Justifications. The first one is the personality-based where an individual is just focusing on his/her personality. He/she has own ideas on a particular perspective. Only him/her can understand it and no one can interfere his/her ideas. Once it is shared to other person, there is surely a conflict between ideas. The intellectual property has now conflict. We can’t fight against it because, as explained, each one of us has an intellectual property. The analogy is that you can’t dive to the intellectual property of others because it is private and only he/she can only understand it. That’s for personality-based. The next one is the rule utilitarian. This is where utilitarian of intellectual properties used. Once the idea is passed to another person, then the person who will be receiving it is considered to be a utilitarian. He/she just use the intellectual idea of a particular person for the benefit for him / her. That’s absurd! Because making use of an individual’s idea is considered to be a utilitarian. It can give both positive and negative effects for the people. It will now depend on us if we use the utilitarian point of view. The last one is Lockean Justification where the justifications of human are more sensitive. Because it is where the human correct or justify his/her humanity in terms of his/her ideas in life.

Page 103: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 103

What I’ve learned: I learned how to utilize my intellectual ideas in such way that applying these aspects in my life. To be honest, it is complicated. In determining your own personality, you must be knowledgeable about yourself first. Knowing yourself is one of the most important things in life. Therefore the ideas you are thinking are also important and also part of your intellectual property. The rule-utilitarian can give us positive and negative effects because your ideas or intellectual property can be beneficial to others. The justification is also important because the dignity of one person is relying to it. Integrative Questions:

1. What is personality based? 2. What is rule-utilitarian? 3. What is justification? 4. What are the purposes of these aspects to an individual? 5. How can we use this correctly?

Citations: N/A

Page 104: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 104

Book Review: Chapter 6: Informational Privacy: Concepts, Theories and Controversies Book: The-handbook-of-information-and-computer-ethic Author: HERMAN T. TAVANI Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“It would seem that privacy is not simply a static concept, but instead has a dynamic component.” Learning Expectations

• The basic concept of privacy

• I expect the usefulness of privacy to an individual • Privacy as a whole.

Review: This chapter discusses all about informational privacy. To start with, let us define the concept of privacy. It is usually a separate side where a state of being is apart from other people. Only those people within the privacy boundary will just exchange ideas and more information regarding a particular topic. Unlike public, it is publicly announced to the people who they are addressing to. When we say privacy, it is very sensitive because no one among those states being will pass the information they conversed. That means, that topic is very sensitive and powerful. Those private people don’t want to be shared to other people. That’s the basic analogy, example, and concept of privacy. As the chapter goes, it is explained that the privacy is not simply a static concept, but instead, it has dynamic component. This only means that privacy cannot be changed at all. What is trying to say with this concept is that it should not be in a fixed position. This privacy must also be a dynamic aspect so that people within an organization knows what is happening in that particular issue. Well, of course, the privacy only needs the people who are in the authority to make assumptions. That’s the concept of privacy on our physical lives. What about informational privacy? It’s discussed here those theories like “reductionist” and “ownership-based” accounts are part of informational privacy. Let’s define first the reductionist concept. Basically it aims for simplification of a particular thing. Privacy visualized here as the utility that will help that are very useful to us. It can also preserve human dignity as well. It is a very useful utility for us because if privacy applied, there are no problems to you as a person. People cannot argue with you because they don’t know what the topics are for you. The restricted access theory is quite different. The “zones” of privacy should be in a limited form. It should

Page 105: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 105

What I’ve learned:

• I learned the basic concept of privacy

• Privacy should not be a static aspect • I learned how people use privacy in a correct way. We must use it in a correct way. • Rights conception of privacy. • Four distinct kinds of privacy.

Integrative Questions:

1. What is privacy in a corporate setting? 2. How can privacy help us in doing things right or wrong? 3. Does privacy affects the morality of an individual? 4. What are the four distinct kinds of privacy? 5. What are the theories of informational privacy?

Citations: N/A

Page 106: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 106

Book Review: Chapter 7: Online Anonymity Book: The-handbook-of-information-and-computer-ethic Author: KATHLEEN A. WALLACE Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“The logic of anonymity in modern life”

Learning Expectations

• What is anonymity?

• What is/are the connection of anonymity online?

• How can be implemented? Review: When we say the word “Anonymity”, the first concept comes into our mind is that it is questionable, or in other words, unidentifiable. We have no idea about it. We don’t know how to define it, that’s why, anonymity is defined also as a freedom from identification. It is anonymous, in a way that we don’t know everything about it, and because we have no idea about it, we must think something for it, we must define it as much as possible to give description to it. Because of this, the word “freedom” came out. And since freedom is so much powerful to a person, we have a power to choose it and a power to have a responsibility over it. Anonymity is the state of not knowing of something and therefore, it considered as a lack of distinctiveness. We know that this is existed but we have no description over it. No one can define unless, if we have more information about it, there’s a big possibility that we could define it formally. For the next part of this chapter, we will deal the purpose and the impact of anonymity in the social environment. Anonymity maybe deliberately sought or something that occurs spontaneously from the sheer complexity of modern life. That’s the effect in our lives. As we can see, it occurs spontaneously, therefore, we don’t know everything about it and we are clueless about it. For instance, If a person asked you to define a particular character in the movie and that character role is very mysterious, then we have to think that this character only done a particular role which is a big role in the film, but you can’t identify his/her name especially when that actor/actress is not that popular, therefore, the first perception is that “who is this character in real life?” As a result, it is called the anonymous character in the movie. So, the next time you so this character, we will think that “This is the character in the movie”. But still, it is anonymous to you because you have no information about it. As an analogy to social environment, If there is something existed and people have an issue about it, the people just think that this is anonymous simply because they have no idea for it. And since it is spontaneous, we will immediately forget about this issue. And if you have no interest with it, therefore, it will mislay into your mind. That’s the concept of anonymity in a layman’s point of view. How about if it is on the internet and social environment side? Does anonymity is still present? How can anonymity applied in the social and internet side?

Page 107: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 107

Based on this chapter, the Internet as a social environment may be of concern in so far as it has the capacity to increase the scope of natural or spontaneous anonymity as a by-product of or endemic to the nature of online communicative relations. Since we have a powerful tool like internet, there are lots of spontaneous anonymity will happen. Believe it or not, it will come across the globe. The social per se have a big possibility to react over this issue. See the picture of the impact? It is very much sensitive. People will react and react just to identify this anonymity of something will be affecting their lives. Since internet is powerful tool, it is also a big help to eliminate the conception of anonymity. For example in a social networking site, if someone viewed your profile that is anonymous, then you don’t know him/her. Therefore, since internet has the information and there are other social networking site, and you are interested who he/she is, then you can find it through net by social networking site. In this way, you can identify the person and you can eliminate your anonymity. Another sensitive part is that if a hacker hacked into your system, and you don’t know this particular hacker, it is anonymous for you; therefore, if you are good in hacking you can do it to him/her. The problem is that how about the 10 commandments of computer ethics? You will violate one of those. It will depend on your moral or conscience if you will do that or not. What I’ve learned: I learned that anonymity is sometimes good or bad. Based on this chapter, it is an advantage and disadvantage for us people to know the anonymity of something. The idea is that we are now in the modern world and information is so much powerful in terms to social impact. Therefore, the internet as a tool, we must use it to identify something that is good for us and can benefit us in a way that it is a good manner or way. Integrative Questions:

1. What is anonymity? 2. What’s the role of internet in terms of this particular topic? 3. How can we use this in defending ourselves? 4. How can we actually deal with it? 5. Does 10 commandment present in this particular chapter?

Citations: N/A

Page 108: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 108

Book Review: Chapter 8: Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counter hacking Book: The-handbook-of-information-and-computer-ethic Author: KENNETH EINAR HIMMA

Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Whether and to what extent various types of unauthorized computer intrusions” Learning Expectations

• To know basically what is this topic?

• Why ethical involves in computer security?

• The difference of hacking, hacktivism and counterhacking Review: Many people say that hacking is wrong and some say that hacking is right. Well, it depends. We cannot determine the real act of hacking unless we do it in actual. For most people even an ordinary people, they say that hacking is wrong because hacking is exploring the private property of anyone without asking an official permission to the owner. Hacking is a skill wherein hackers do their best to access file that are protected. The word hacking is known in digital world because for computer people hacking is the term of destroying a security. The more malicious acts in hacking, the more people cause harm because hackers ruin their personal life. For computer technology, hacking constitutes a digital trespass onto a property of another person. This means that are those people who try to hack a private property, he/she may do so, but the conscience of guilt is still there. Ethical issues involved here because in computer security also involves the morality of human rights. Asking question what is right and what is wrong. How do they do the wrong thing if they intend to do it in wrong way and likewise. Ethical is so much powerful that can give us more strength to do a particular thing. Again, it’s matter of what is right and what is wrong. If a computer hacker wants to hacks the system, it’s fine, but make sure that this will not harm other people because it is considered as a wrongdoing. If it is for good, then do it.

Page 109: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 109

What I’ve learned: The first pat talks about prima facie, it means at first glance, the system will not know if the intrusions made by the hacker are coming or not, therefore, the concept of security here must be in a high level so that hackers will be disappointed if they hack the system. It’s a matter of throwing of intrusions and empowering the system. High to high level of security and low to low level of security. It all depends on the hackers how they will play for it. The most important part here is the ethical values that a person wants to give in. The first section articulates a prima facie general case against these intrusions. The second considers intrusions motivated by malicious intentions and by certain benign intentions, such as the intent to expose security vulnerabilities. The third considers hacktivism, while the fourth considers counterhacking (or hackbacks). Integrative Questions:

1. Why is it that ethical issue involves in computer security? 2. What are the purposes of security in computers? 3. Is it true that hacking is wrong? 4. Why people need to secure their computers? 5. How did people adopt this knowledge of security for hackers?

Citations: N/A

Page 110: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 110

Book Review: Chapter 9: Information Ethics and the Library Profession Book: The-handbook-of-information-and-computer-ethic Author: KAY MATHIESEN and DON FALLIS Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Librarianship as a distinct profession, however, is relatively a recent development.” Learning Expectations

• The connection of library profession to information ethics?

• Why library related to ethics?

• Is this profession good or not?

• The power of information ethics Review: Librarianship is also a profession. Thus, this chapter discusses how a librarian makes a contribution to the modern world. As a librarian, the primary role of this job is to organize books collected around the world. It is a distinct or clearly different position because this profession shows the natural aspect of job. For library, it is purely manual because books are only collected however, it is a relatively development to the world, to publish a book, lots of process must be made. Press, collections of works, printing and etc. Collection may be a larger and more complex and it is relatively different development. In creating a greater need for someone, it is devoted to organizing cataloging such as collections. As stated from this particular chapter, Librarianship as a distinct profession, however, is relatively a recent development? With the advent of the printing press, collections of works became larger and more complex, thus creating a greater need for someone devoted to organizing and cataloging such collections. For those people who organize, and preserved books, and other documents, they are also considered as a authentic librarian because they did their job by doing these things. This job is also important not just for our individual perspective but also in society as a whole. Some people think that this job is boring but this job is interesting. First and foremost, librarians are universal, meaning that they are suited for all library works around the world. The collection, organization and preservation of books and documents is there primary job. The relation of this profession to computer ethics is that it librarians are the primary source of information of books and other stuffs related to it. Therefore, since they are in the right position of doing this, they are also considered as a professional that can organize information.

Page 111: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 111

Base on this chapter, consider the challenges that confront the librarian in carrying out his or her professional duties, in particular with regard to selection of materials and the organization of these materials. Since the ethical obligations of librarians as professionals will at least partly be determined by the role that librarians play in society, to understand the mission and values of the librarian in order to understand what those ethical obligations are. (1) Books are for use. (2) Every person his or her book. (3) Every book its reader. (4) Save the time of the reader. (5) The library is a growing organism. These are their primary job or mission which is very important to our society as well as in modern world. What I’ve learned: As stated on this chapter that Librarians and governing bodies should maintain that parents—and only parents—havethe right and the responsibility to restrict the access of their children—and only their children—to library resources. Parents who do not want their children to have access to certain library services, materials, or facilities should so advise their children. Librarians and library governing bodies cannot assume the role of parents or the functions of parental authority in the private relationship between parent and child

The Information Ethics Special Interest Group of the Association for Library and Information Science Education strongly advocates that information ethics should be encouraged as an important aspect of education, research, scholarship, service, and practice in library and information studies and in other related professions. It therefore advocates that attention to information ethics (either through the curriculum, instructor expertise, resources, or symposia) be considered for development by library and information studies education programs. Schools of library and information studies are encouraged to implement this recommendation.

Integrative Questions:

1. How did the author relate it to information ethics? 2. Why it is that ethics is present while this chapter talks about library profession? 3. How is it important to collect information? 4. Can this topic help improve information ethics? 5. What is librarianship?

Citations: N/A

Page 112: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 112

Book Review: Chapter 10: Ethical Interest in Free and Open Source Software

Book: The-handbook-of-information-and-computer-ethic Author: Frances S. Grodzinsky and Marty J. Wolf Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“The Free Software movement can be credited with providing an impetus for establishing notions of freedom for other types of digital media”

Learning Expectations

• Expect to learn the interest in free and open source software. • Why is it that many are interested in open source free software?

• Why does a person take advantage to this kind of software’s?

• The relation of ethical values towards free software. Review: (1) Freedom to run the program, for any purpose. (2) Freedom to study how the program works, and adapt it to your needs. (3) Freedom to redistribute copies so you can help your neighbor. (4) Freedom to improve the program, and release your improvements to the Public, so that the whole community benefits. While the Internet's rapid expansion has enabled an equally rapid expansion of webbased professional services, it has not been matched by the consideration and understanding of the related ethical implications. The growth of new opportunities is accompanied by equal, if not greater, growth in ethical issues for businesses seeking to expand their offerings via the Internet. These issues include the quality of services and information, privacy and security, nature of relationship, forms of delivery, contractual considerations, and regulation and enforcement.

Computers have a central and growing role in commerce, industry, government, medicine, education, entertainment and society at large. Software engineers are those who contribute by direct participation or by teaching, to the analysis, specification, design, development, certification, maintenance and testing of software systems. Because of their roles in developing software systems, software engineers have significant opportunities to do good or cause harm, to enable others to do good or cause harm, or to influence others to do good or cause harm. To ensure, as much as possible, that their efforts will be used for good, software engineers must commit themselves to making software engineering a beneficial and respected profession. In accordance with that commitment, software engineers shall adhere to the following Code of Ethics and Professional Practice.

Page 113: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 113

The Code contains eight Principles related to the behavior of and decisions made by professional software engineers, including practitioners, educators, managers, supervisors and policy makers, as well as trainees and students of the profession. The Principles identify the ethically responsible relationships in which individuals, groups, and organizations participate and the primary obligations within these relationships. The Clauses of each Principle are illustrations of some of the obligations included in these relationships. These obligations are founded in the software engineer's humanity, in special care owed to people affected by the work of software engineers, and in the unique elements of the practice of software engineering. The Code prescribes these as obligations of anyone claiming to be or aspiring to be a software engineer.

What I’ve learned: I learned that the distinction between Free Software and Open Source Software has had a positive effect on the software development community and on the larger online community as well. Regardless of the motivation of individual developers, it is difficult to find fault with their willingness to give their creative contributions to the world to study and adapt as the world sees fit. Integrative Questions:

1. What is open source software? 2. Why is it free? 3. What are the ethical responsibilities of software developers? 4. What are the accountabilities made in open source software? 5. The relation of creative commons on this article?

Citations: N/A

Page 114: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 114

Book Review: Chapter 11: Internet Research Ethics: The Field and Its Critical Issues

Book: The-handbook-of-information-and-computer-ethic Author: Elizabeth A. Buchanan and Charles Ess Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“We consider some of the most current issues in IRE, including the complex interactions between methodologies and ethics, and also whether or not a genuinely”

Learning Expectations

• The role of IRE in critical issues?

• How can critical issues controlled?

• How people conduct an internet research?

Review: Philosophical Foundations: Sources, Frameworks, and Initial Considerations Philosophers who examine extant statements on research ethics from diverse disciplines and diverse countries will recognize that these make use of at least two familiar.

Internet research nowadays and ethics is going to have an effect on the forms of research that are sanctioned or even permissible, the ways that we understand Internet culture, and our larger understandings of individuals and society. This suggests that there are significant consequences to hindering the participation of certain disciplines and preventing some kinds of histories from being produced. A truly ethical model of Internet research ethics would acknowledge such outcomes and encourage a variety of histories and disciplines. It would develop guidelines and rules that consider these problems at the same time as it foregrounds their possible effects

Academics from varied institutions and countries are engaged in the important task of articulating ethical guidelines for those who research the Internet. However, they have failed to provide users and researchers with important information because they do not address the ways that Internet material is mediated and constructed. The ethical issues and dilemmas involved in Internet research include researchers who ignore the screen, varied icons, repetitive motifs, and produced content. Addressing constructed material is important because Internet settings abound with ageist, classist, homophobic, racist, and sexist imagery and ideas. The current writing about ethical Internet research behaviors can enable such intolerant conceptions by encouraging academics and other users to presume that Internet settings provide access to the truth about individuals or are a direct conduit to people. In other words, conceiving of Internet material as people and human subjects without foregrounding the constructed aspects of users’ proclaimed "self-representations" makes it seems like Internet material is exacting and natural.The global reach of the Internet means that research participants may be drawn from a wide range of nations and cultures.

Page 115: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 115

What I’ve learned:

Many Internet users shift between describing Internet settings as a conduit to the self and as artistic or cultural production. Acknowledging the highly mediated and representational aspects of this material and considering the ethical codes of research disciplines that engage with culturally produced material suggest a very different set of research strategies. When Internet material is viewed as cultural production then the models for Internet research

Integrative Questions:

1. What are the Philosophical foundations of IRE? 2. What is IRE? 3. What are the roles of IRE to our lives? 4. Why is it called a young field of intersections? 5. The role of this topic to society.

Citations: N/A

Page 116: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 116

Book Review: Chapter 12: Health Information Technology: Challenges in Ethics, Science, and Uncertainty

Book: The-handbook-of-information-and-computer-ethic Author: Kenneth W. Goodman Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Humans use tools to do extraordinary things.” Learning Expectations

• Why is it called the health information technology?

• Expect to learn the challenges on this topic?

• Why ethics again involved here? Review: It is sadly and too often the case that many professionals regard ethics as a source of codes for the edification of the not-yet-virtuous, as a place where pointy-headed bowfins pass judgment on heathens, as an office to call in search of someone with a horse and a sword to come .round to smite the evildoers. There is arguably no better trigger for reflection on morality and its relationship to the lawand society than privacy and its cousin, confidentiality. The demands of privacy are intuitively straightforward and the consequences of its violation obvious

The chapter even included privacy in health information technology. Privacy is, most generally, as discussed in the chapter, the right entitlement or reasonable expectation people have that they are and will be secure from intrusion. Given the example in the chapter, it is obvious that society values both personal privacy and the law enforcement but in some cases, the police officer investigating a crime may and, in fact, must take steps to justify that her official need is worth the intrusion. “Put differently, privacy rights are not absolute, but may be balanced against other values. The same is true for confidentiality, which applies to information—medical records, for instance. Where privacy is customarily about people, confidentiality applies to information about people. Privacy is also sometimes regarded as including within its scope people’s concern about protecting confidentiality. Privacy is a broader concept.” – indeed as a broader concept yet privacy still serve as one of the most studied factor in information technology and one that is most protected.

Page 117: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 117

Since we are talking here about health information, I can say that computers complicate medical privacy and confidentiality in interesting ways. According to a sentinel Institute of Medicine analysis, a number of entities demand patient information to “assess the health of the public and patterns of illness and injury; identify unmet. What I’ve learned: As stated on the book, Computers have been reckoned both to make it easier than paper records to acquire medical information inappropriately. They have misused the computer. But again, computer is non-living things and computer cannot control our mind. We value accuracy and efficiency, but it should be uncontroversial to hypothesize that some people are Prepared, in principle, to delegate to machines that which confounds those healers. And we value control over all of this, while hoping that the tools used to manage our health require sacrifices that are not burdensome. To meet these challenges, we turn to various forms of inquiry: science and ethics. There is of course no alternative. Integrative Questions:

1. Is it literally called “Health”? 2. Why this topic need also a privacy and confidentiality 3. The difference of privacy and confidentiality? 4. What is the value of accuracy? 5. What are the challenges to this topic?

Citations: N/A

Page 118: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 118

Book Review: Chapter 13: Ethical Issues of Information and Business

Book: The-handbook-of-information-and-computer-ethic Author: Bernd Carsten Stahl Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote: “Businesses and the economic system they work in have an important influence on ethical issues arising

from information and information and communication technology.”

Learning Expectations

• Expect to learn the issues of ethics and information business

• The effects of ethics towards information per se

• The effects of ethics towards business per se Review:

Computers have changed the way offices are organized and the tasks done. They have changed manufacturing, purchasing, marketing, finance, and management. The ethical issues are therefore not simply issues that are involved in computers and their use and in information technology more broadly, but in the way business is done in the Information Age. We can distinguish five different kinds of ethical problems connected with information technology: 1 Ethical issues in the use of technology in business 2 Ethical issues in the information technology business 3 Ethical issues dealing with the Internet 4 Ethical issues in e-business 5 Ethical issues resulting from the impact of computers and information technology on society, both nationally and internationally The five are interrelated. Lurking behind all of them is the Myth of Amoral Computers and Information Technology. This is the widespread belief that computers and information technology have nothing to do with ethics. Computers, of course, are a type of machine and are not moral beings. But they are developed, programmed, and used by human beings. Nonetheless, “The computer is down” is often taken as a valid excuse, as if no one is to blame for this and no moral blame should be assessed.

The appropriate use of digital communications such as email and text messaging is another area that must be clearly understood by the employee and it is the employer's responsibility to set the guidelines. Many employees need to be taught that text based communications can be more often misinterpreted than spoken communications because other verbal and body language cues are not present.

Page 119: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 119

What I’ve learned:

In this chapter I have learned that in digital age, it is the responsibility employers to guide their employees on the proper use of information systems. Without such guidance, the workplace can become an offensive atmosphere with significant ethical and legal consequences for the employer.

Integrative Questions:

1. What are the ethical issues about Information? 2. What are the ethical issues about business? 3. What is CSR? Explain 4. What is Business Ethics? 5. What is the difference between Information ethics to Business ethics?

Citations: N/A

Page 120: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 120

Book Review: Chapter 14: Responsibilities for Information on the Internet Book: The-handbook-of-information-and-computer-ethic Author: Anton Vedder Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“According to Friedman, if they were to have these responsibilities, then these responsibilities might easily conflict with their obligations to make profits

for the stockholders” Learning Expectations:

• To learn how this responsibilities help information on the internet become better. • To learn what are the responsibilities for information on the internet. • To learn the effects and benefits of the responsibilities to information as well as to the internet as

well. Review:

We, as online users, have our own responsibilities in handling our own source of information – ourselves. The government, in my point of view, should be more concerned in this issue but other than that, we need to take action ourselves because the internet is a huge place for information to be spread and that alone is not really something I would think as just a petty file share. Of course, file sharing is another thing but what about copyright? Piracy? Infringement? There are a lot of issues we have to dwell with right after knowing what it is that needs to be done but still, be responsible enough to take extra protective measures with what you do online.

It takes an enormous amount of work to understand what theories mean for real-world situations, issues, and decisions, and in some sense, we don't understand theories until we understand what they imply about real-world situations. Practical ethics is best understood as the domain in which there is negotiation between theory and real-world situations. What I’ve learned:

I have learned about the Information in general as it was mentioned the debate on information-related responsibilities was until recently restricted to the issues of ISP’s responsibilities with regard to clearly illegal or immoral content.

Page 121: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 121

Integrative Questions:

1. What the responsibilities for information are as stated in this chapter? 2. What is Information in general? 3. What is the relation of Internet and Information? 4. What is ISP? 5. What are the conditions of responsibility?

Citations: N/A

Page 122: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 122

Book Review: Chapter 15: Virtual Reality and Computer Simulation

Book: The-handbook-of-information-and-computer-ethic Author: Philip Brey Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Technologies raise important ethical questions about the way in which they represent reality and the

misrepresentations, biased representations, and offensive representations that they may contain.”

Learning Expectations:

• To learn Virtual Reality. • To learn Computer Simulation • To learn the relation of the two. • To know the difference and distinction between virtual and real

Review: The endoscope is maneuvered in the duodenum until the major duodenal papilla is identified. The papilla is a nodular protuberance on the medial wall of the duodenum through which the bile duct and pancreatic duct expel bile and pancreatic juice respectively into the duodenum to aid in the process of digestion. After the endoscope is positioned near the major duodenal papilla, a catheter is inserted through a channel of the endoscope and directed into the desired ductal system (biliary or pancreatic) by changing the position of the flexible endoscope tip in relation to the papilla. An "elevator" apparatus at the tip of the endoscope can also be utilized to adjust the angle at which the catheter enters the papilla. To guide the catheter into the papilla, the physician relies on visual feedback from the endoscopic video display and tactile resistance encountered when advancing the catheter. In diagnostic ERCP, contrast dye is injected through the catheter while fluoroscopic images are observed and roentgenograms are obtained.

How technology can do such wonders for our benefits and allows us to experience something more than what we should have experienced back then.

Page 123: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 123

What I’ve learned:

The computer simulation is sensitive activities exist nowadays. Let’s say for example as stated above my review, endoscope is guided into position using standard endoscopic techniques. A position tracking system reports the endoscope movements to a high performance Silicon Graphics computer which controls the interactions and updates the computer generated imagery on the monitor. That’s why by knowing this, we can still keep the reality even if it is a virtual technology.

Integrative Questions:

1. What is Virtual Reality? 2. What is Computer Simulation?\ 3. What is the difference between real and virtual? 4. Give examples of virtual reality. 5. What is avatar?

Citations: N/A

Page 124: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 124

Book Review: Chapter 16: Genetic Information: Epistemological and Ethical Issues

Book: The-handbook-of-information-and-computer-ethic Author: Antonio Marturano Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“The future of biology is strongly tied to that of bioinformatics, a field of research that collects all sort of

biological data, tried to make sense of living organisms in their entirety and then make predictions.” Learning Expectations

• To learn different Epistemological Issues. • To learn more different Ethical Issues. • To learn what is genetic information. • To learn semantic and synthetic theory.

Review:

Identify an ethical question or case regarding the integration of information technology into society. Typically this focuses upon technology-generated possibilities that could affect (or are already affecting) life, health, security, happiness, freedom, knowledge, opportunities, or other key human values. Clarify any ambiguous or vague ideas or principles that may apply to the case or the issue in question. If possible, apply already existing, ethically acceptable principles, laws, rules, and practices that govern human behavior in the given society.

It was explained “that genetic information is the genes containing an amount of information (the so-called TACG amino acids sequence) and able to build a human being up is today a seldom challenged triviality. This idea is fundamental to the so-called “Central Dogma” of genetics. The “Central Dogma”, as originally formulated by Crick, is a negative hypothesis, which states that information cannot flow downward from protein to DNA.” No, DNAs are not really my professional concern but I am aware that like DNAs, computers withhold an amazing degree of information no man can memorize but can definitely determine.

Page 125: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 125

What I’ve learned:

I have learned the Concept of Information, The Notion of Genetic Information, Ideological Use of a Model and Ethical Issues in Fund-raising, Cooperation and Public Access of Data.

Integrative Questions: 1. What is semantic theory? 2. What is synthetic theory? 3. What is genetic information? 4. What did Berlinski contribute? Elaborate. 5. What did Maynard mention? Explain. Citations: N/A

Page 126: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 126

Book Review: Chapter 17: The Ethics of Cyber Conflict Book: The-handbook-of-information-and-computer-ethic Author: Dorothy E. Denning Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Besides cyber attacks conducted for pleasure or personal gain, the paper does not consider

revenge attacks by insiders—all of which are generally regarded as unethical.” Learning Expectations

• To learn more about cyberspace. • To learn the distinction of combatants from noncombatants • To learn the ethics of cyber conflict. • To learn different cyber attacks happened in the past.

Review:

The issue of law and cyber conflict is something that while relatively new, is something that people, nation states, and military organizations have been working on for the last 10 years at least. Many countries have robust cyber warfare rules of engagement, and the more interesting part about this is that any country with an internet connection can engage in cyber conflicts. Attribution (IE Knowing who is attacking you, and being able to act appropriately against the real place that is attacking you) has long been a problem. Zombies, bot nets, jump points, and the millions of compromised computers both Windows and Linux are the cannon fodder of cyber warfare. Attributing the attacker back to the point of origin is going to be difficult if not impossible without some smart people having unrestricted access to packets, and to compromised systems. Legally though, it gets more interesting as the state of cyber law is often well behind the state of cyber warfare tools.

With the advancing technology, even internet can cause war to countries. It could be a silent war; no one would get hurt… physically. Cyber conflict may result to chaos to the concerned parties. Such as what happened in September 2000, wherein Israelite teenage hackers created a website that successfully jammed six websites in Lebanon, causing a huge turmoil in different websites in Israel, including those of the Palestinians and at least one U.S. site. They made two main types of attacks, the website defacement and distributed denial of service.

Page 127: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 127

What I’ve learned:

• Jus ad Bellum—The Law of Conflict Management • When Does a Cyber Attack Constitute the Use of Force • Jus in Bello—The Law of War • Distinction of Combatants from Noncombatants.

· Military Necessity. · Proportionality. · Indiscriminate Weapons. · Superfluous Injury. · Perfidy. · Neutrality.

Integrative Questions:

1. What is cyberspace? 2. What is hacktivism? 3. What happened in the law of war? 4. What is the doctrine of self defense? 5. What it is about hack back and force?

Citations: N/A

Page 128: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 128

Book Review: Chapter 18: A Practical Mechanism for Ethical Risk Assessment — A SoDIS Inspection

Book: The-handbook-of-information-and-computer-ethic Author: Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“The availability of high-quality software is critical for the effective use of information technology in organizations”

Learning Expectations

• To learn the Generic Standards for Risk Analysis Models. • To learn A Practical Mechanism for Ethical Risk Assessment. • To learn what is Sodis Inspection Model.

Review:

The quantitative nature of the tool allows a company to determine whether or not it has successfully decreased its ethical risk over time. But the qualitative aspect of the tool allows the organization to identify and address specific risk-prone areas by minimizing risks that can be controlled and by instigating effective measures to counteract unavoidable risks.

In developing their tool, the pair looked at two existing measures of ethical risk that were ultimately found lacking: the Global Reporting Initiative (GRI) and the Ethics Resource Center Ethics Quick Test.

The GRI takes a broad look at social performance measures, looking at how a company adhered to multinational codes and standards in the past, Berman explained. "It's really backward-looking. It really says what we've done, and not what kinds of risks we have and how do we manage them. It doesn't help us manage the risk going forward, so unfortunately, we didn't find it super helpful."

The Ethics Quick Test focuses on 12 areas of an organization's commitment to ethics, such as how ethics factors into its organizational values, strategies, goals, objectives, policies and procedures. It looks at organizational incentives, decision-making, and tone at the top, as well as ethics evaluation, education, and training. But the major downfall of the Quick Test, Berman noted, was that it focuses on organizational dynamics as ethical risk factors, without really getting at individual or industrial-level factors.

Page 129: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 129

What I’ve learned:

In this chapter I learned the following issues about:

o Generic Standards for Risk Analysis Models o The Context o Risk Identification o Risk Analysis o Limitations of the Generic Standards

Integrative Questions:

1. What is SoDIS?

2. What is risk assessment? 3. Is risk assessment necessary? 4. What is Jus ad Bellum? 5. What is Jus in Bello?

Citations: N/A

Page 130: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 130

Book Review: Chapter 19: Regulation and Governance of the Internet

Book: The-handbook-of-information-and-computer-ethic Author: John Weckert and Yeslam Al-Saggaf Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote: “Degrading Internet performance will not obviously harm many people very much, depending of course on

the degradation Learning Expectations

• To recognize the regulation and governance of the internet • To learn what is Censorship • To know internet regulation: moral arguments.

Review:

This technological, industrial and social innovation has risen to the very top of the major public policy priorities. As a result, the desire to correct certain inconsistencies, gaps or dangers in the current situation has become part of the international political agenda. A certain number of tensions have also resulted. Due to its UN framework, the Summit had as prerequisites the plurality of the actors and the equal acceptability of their viewpoints. The debates that resulted, whether formal or informal, whether included in the official program or led in parallel, emphasize the need to coordinate, if not harmonize, complex balances of power.

To examine how the regulation of the Internet has emerged as an object of global governance in the context of the United Nations. Secondly, using a neo-Foucauldian governmentality perspective, to explore and explain how these UN-initiated regulatory activities have been driven and shaped by a cluster of concerns, principals and imageries about technological features of the Internet and its relationship to socio-political transformations. This exploration gives important insights into the contemporary shape of Internet regulation and the principals and knowledge bases that have given momentum to and shaped this emergent object of global governance. In particular, the paper shows how technological features of the Internet have come to function as models for the shape of its regulation.

This inaugural lecture by Jonathan Zittrain proposes a theory about what lies around the corner for the Internet, how to avoid it, and how to study and affect the future of the internet using the distributed power of the network itself, using privacy as a signal example.

Page 131: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 131

What I’ve learned: I have learned that inside the nebulous "Internet governance" there coexist different regulatory models, more or less founded in the law, more or less specialized, more or less effective. We will not return to the particular, and in many respects emblematic, case of ICANN: the controversies over its legitimacy, its ability to operate and its future have fueled the greater part of research work on Internet governance in the past years and still provide the essential fuel for debates within the WSIS regarding the management of the technical resources of the Internet Integrative Questions:

1. What is Censorship? 2. What is Content Regulation? 3. What is Internet Govenrance? 4. What is IP address? 5. To what extent does the technology allowfor effective regulation?

Citations: N/A

Page 132: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 132

Book Review: Chapter 20: Information Overload

Book: The-handbook-of-information-and-computer-ethic Author: David M. Levy Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote: “Some of these information goods are end-products (films an video games and newspapers), while others

are agents of control (advertisement and e-mail messages) that help to manage the accelerating processes of production and consumption.”

Learning Expectations

• To learn what is Information Overload. • To learn understand what is Information. • To learn what are the consequences of information overload. • To learn what is A Novel, Recurrent, or Ever-Present Phenomenon. • To learn the brief history of the phrase.

Review:

The most obvious locus of information inundation is the office: e-mail, voice mail, phone calls, meetings, business journals, faxes, memos, manuals, Web research. The list goes on. Far from bringing about the anticipated "paperless office" and reduced work load, technological innovations have increased both areas.

Information technology, in fact, often diminishes workplace efficiency. Scientific American ("Taking Computers to Task," July 1997) pointed out that despite the $1 trillion spent annually across the globe, "productivity growth measured in the seven richest nations has instead fallen precipitously in the last 30 years ... Most of the economic growth can be explained by increased employment, trade and production capacity. Computers' contributions, in contrast, nearly vanish in the noise." Blame can be pinned on everything from sound cards to solitaire, that numbing front-desk babysitter.

We can say that Data is like food. A good meal is served in reasonably-sized portions from several food groups. It leaves you satisfied but not stuffed. Likewise with information, we're best served when we can partake of reasonable, useful portions, exercising discretion in what data we digest and how often we seek it out. Unfortunately, we often do the opposite, ingesting information constantly to the point of choking on it. The risk of information asphyxiation touches all of us -- managers, Web surfers, even lazy couch tubers. That’s the analogy of it.

Page 133: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 133

What I’ve learned:

• Consequences of information overload • Actions to be taken • Definition of information overload • Definition of information • More than information • Perception and reality • A Novel, Recurrent, or Ever-Present Phenomenon • History of the phrase • Causes of information overload

Integrative Questions:

1. What is Information Overload? 2. What is Information? 3. What are the causes of information overload? 4. What is the consequence of information overload? 5. Explain the brief history of phrase.

Citations: N/A

Page 134: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 134

Book Review: Chapter 21: Email Spam

Book: The-handbook-of-information-and-computer-ethic Author: Keith W. Miller and James H. Moor Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“A fundamental problem with any philosophical discussion of email spam is definitional. Exactly what

constitutes spam? Learning Expectations

• To know what is email spam. • To know how searching for a characterization of “spam” was done. • To know the number of identical email sent. • To know what is Unsolicited Commercial Bulk Emails (UCBE). • To know The Ethics of Reducing the Number of Spam Emails Read After They Are Sent

Review:

E-mail spam, also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. A common synonym for spam is unsolicited bulk e-mail (UBE). Definitions of spam usually include the aspects that email is unsolicited and sent in bulk. "UCE" refers specifically to unsolicited commercial e-mail.

Furthermore, E-mail spam has steadily, even exponentially grown since the early 1990s to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail users. Laws against spam have been sporadically implemented, with some being opt-out and others requiring opt in e-mail. The total volume of spam (over 100 billion emails per day as of April 2008) has leveled off slightly in recent years, and is no longer growing exponentially. The amount received by most e-mail users has decreased, mostly because of better filtering. About 80% of all spam is sent by fewer than 200 spammers. Botnets, networks of virus-infected computers, are used to send about 80% of spam. Since the cost of the spam is borne mostly by the recipient, it is effectively postage due advertising. Definitions of spam usually include the aspects that email is unsolicited and sent in bulk "UCE" refers specifically to unsolicited commercial e-mail. The total volume of spam (over 100 billion emails per day as of April 2008) has leveled off slightly in recent years, and is no longer growing exponentially.

Now you know what spam emails are and thanks to google and wiki for the definition. Anyway, spam emails is not something we want but it is a method of some websites to endorse their investors to other people.

Page 135: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 135

What I’ve learned:

In this chapter I have learned the following:

• Short history of the term spam • SEARCHING FOR A CHARACTERIZATION OF ‘‘SPAM’’ • Content of the Email • Intent of the sender • Consequences to the receiver • Consent of the receiver • Deceptive Emails Meant to Defraud Are Condemned, Spam or • Emails Between Well-Meaning Friends Are Probably Not Spam • Unsolicited Commercial Bulk Emails (UCBE • The Ethics of Reducing the Number of Spam Emails Read After They Are Sent • The Ethics of Suggestions to Reduce the Number of Emails Sent

Integrative Questions:

1. What is Email? 2. What is Email Spam? 3. What is Email Message? 4. What is Unsolicited Commercial Bulk Emails (UCBE)? 5. What is The Accountability of the Sender and the Degree of Deception?

Citations: N/A

Page 136: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 136

Book Review: Chapter 22: The Matter of Plagiarism: What, Why, and If Book: The-handbook-of-information-and-computer-ethic Author: John Snapper Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“The emphasis on impropriety is important. There are a wide variety of situations where it

seems acceptable to repeat prior expressions while ignoring a possible attribution and

making no attempt to seek permission from a putative source. Learning Expectations

• The contrast of plagiarism to digital technology

• What is Plagiarism?

• Why does it answers what, why, and if?

• How is it related to cyberethics? Review:

Plagiarism occurs when students fail to acknowledge that the ideas of others are being used. Specifically it occurs when: other people’s work and/or ideas are paraphrased and presented without a reference; other students’ work is copied or partly copied; other people’s designs, codes or images are presented as the student’s own work; phrases and passages are used verbatim without quotation marks and/or without a reference to the author or a web page; lecture notes are reproduced without due acknowledgement. By this, we can identify what’s the meaning of this.

When plagiarism is suspected, a staff member involved in unit assessment is required to put the matter to the student, identify the passages which are alleged to be plagiarised and their source and report the matter to the Chief Examiner (or nominee). If it is alleged that an internet site is the source of plagiarism, it would be advisable to print out the material in case the site is changed.

According to the book, The present author believes that, in some contexts, new technology has tended to increase the importance we should place on acknowledgment and to lessen the importance that we should place on authorization. For academic publication and technology, the digital technology has shifted the major costs of typesetting away from the publisher to the authors and editors who produce print-ready digital The situation, however, is really very complicated. We noted above that today’s technology has created problems for a film industry that seeks to recoup high production costs when piracy is cheap and easy.

Page 137: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 137

What I’ve learned: These bulleted form are the list of what I learned in this particular chapter.

• Concept of plagiarism • Lack of authorization – economic foundations • Lack of authorization – natural or moral rights • Lack of accreditation – no infringing plagiarism • A personal view of matter • Literature review

Integrative Questions:

1. What is plagiarism? 2. Why is it very sensitive? 3. The role of plagiarism to cyberethics? 4. How can this be implemented through cyberethics, digital technology? 5. How is it complicated to cyberethics as well as in natural literature?

Citations: N/A

Page 138: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 138

Book Review: Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File Sharing Book: The-handbook-of-information-and-computer-ethic Author: Richard A. Spinello Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Unauthorized downloading of copyrighted files constituted direct infringement.” Learning Expectations

• What is intellectual property?

• The online file sharing?

• Why do we need to include legal and moral challenges in file sharing?

• What are these legal and moral challenges?

• How can we use intellectual property?

Review: What is an intellectual property? According to this chapter, it is a property from original thought protected by law. An original creative work manifested in tangible form that can be legally protected. So that means that this property must be protected by laws at all cost. Many of us make a mistake about this topic because it’s complicated and we don’t understand which is which, and what is what. For beginners, they don’t understand this topic well especially those beginners who will be creating something for them. They did it very well. But other people will just use it without permission to the owner. That is calling a copyright infringement. As stated here that all unauthorized property is against ethical values. For example, in downloading copyright files online can be considered as an infringement because the downloaders don’t have a permission to the owner to use it. Even if it is fair use, they don’t have rights to download these files. The only key to download this to avoid copyright infringement is that pay for that property and make a permission to use that thing. We are now in 21

st century and as we go along, many people and many cases involved copyright

infringement. The intellectual property of a person must be protected at all cost. Let’s say you did something for the good of others, and another person did something good for others but the way of doing it is stealing from you. That is considered also as a copyright infringement because that person doesn’t have a permission to do such thing. Since technology is fast growing more and more cases involved in copyright infringement. It is one of the best case spread in the world. We don’t have a control with this stuff and that is the reality.

Page 139: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 139

For internet, it is called a gatekeeps because of Internet Service Providers and search engines. Gatekeepers are the one who are in the position to don’t interfere in copyright infringement. Good thing that gatekeepers are trusted to prevent copyright infringements. What I’ve learned: We must think that code is a law. It has great power to overcome us. Great power to software codes as a logical constraint, software providers have a moral obligation for temptations of writing antiregulatory code. As stated on this chapter. For P2P programs, the solution to avoid copyright infringement is that developers must design their responsibility as a coder to embed within those ethical values in the form of tools so that the misuse of properties will be avoided. This will effectively lead to a feasibility and cost effective for the copyright owner and for the owner. Integrative Questions:

1. What is intellectual property? 2. What is P2P? 3. What is infringement? 4. Why does our moral challenges affected? 5. Why it is that intellectual property has a connection to cyberethics?

Citations: N/A

Page 140: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 140

Book Review: Chapter 24: Censorship and Access to Expression

Book: The-handbook-of-information-and-computer-ethic Author: Kay Mathiesen Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“No one wants to be censor. No one wants to be called a “Censor”.”

Learning Expectations

• What is Censorship?

• Is it good or bad?

• How does censorship relate to cyberethics?

• What is expression?

Review: We are now in 21

st century and we are now involved in technology. For ancient times, censorship was

also applicable. Those who have an authority can order a restriction of a particular issue or event. We are now in the modern times, and we are still doing this act. Of course all of us need privacy. Each individual should be protected at all cost. In order to prevent the exposure of private, the censorship is applied. What is this censorship? Well basically, censorship role is to condemn person’s action. In other words, condemn is considering something guilty about a particular act. So in order to avoid guiltiness, censorship is applied. Without getting clear on what we mean by censorship, this chapter tells us that it is very hard to know exactly what is wrong with a particular act and indeed, it is always wrong. We must find out the real truth about censorship. By finding it, of course, we don’t know where to start because it was censored. There is no information about it. For example, there was an illegal transaction between a businessman and a group that sells drugs and it was recorded in the video, it was censored when it was first shown because they don’t want to reveal that transaction. When a person who are in the authority who wants to reveal the truth, he/she must make information out of it and try to release this video at all cost. But, the problem is that it is censored. That’s the main point of the problem. That’s why it is difficult to release it even if it is an evidence for the case. Without getting clear on what we mean by censorship, it is difficult to get a grip on exactly what is wrong with it, and indeed, on whether it is always wrong.

Page 141: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 141

What I’ve learned: The censorship is not only in a case but also in speaking. The concept of censorship is commonly ised in ways that go much beyond the strict. That’s the definition of it. But what people do is that they go beyond this limit and try to find out what is real. Well, for privacy purposes, they have nothing to do with it because it is only limited and strict. The so called freedom of expression has no effect in censorship itself. It’s private and nothing to do with it. People must not abuse this kind of act. Even if it is hard control it, many people will try to reveal the true information. For cyber ethics, we must be knowledgeable on using this act. They must justify whether the use of censorship is appropriate for that case or else, it will have a bad effect for those people involved in the case. From speaking methodology, censorship limits access to an expression, either by deterring the speaker from speaking or the hearer from receiving such speech. The speech must be controllable and make sure that it is all true. Integrative Questions:

1. What is censorship? 2. How do they define censorship and expression? 3. How do they connect this two aspect through cyberethics? 4. Is it really justifiable? 5. What is restricting access to cyberethics?

Citations: N/A

Page 142: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 142

Book Review: Chapter 25: The Gender Agenda in Computer Ethics

Book: The-handbook-of-information-and-computer-ethic Author: Alison Adam Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Puts it, the job of feminist ethics is, to create a gender-equal ethics, a moral theory that generates nonsexist moral principles, policies and practices”

Learning Expectations

• Why does gender preferences included in Computer ethics?

• How does it relate to moral thinking?

• Why did they focus on feminist side?

• How can it be affected by gender?

• Ethical Behavior? Review: At the first part of this particular chapter, noticed that the main topic is feminine. The question is that why do they need to focus on them? The answer to that is that woman is powerful also as man. It is much better than the abilities of man. As they discussed here, Woman’s ethical values is the number one debates and issue for our world today. The world in reality can’t accept the man’s ability and other would tell that it is not good for woman because some abilities of man can’t do it by woman. But then morality again is the issue here. Care cyberethics. It’s the first time I heard that. According to this chapter, care ethics is a cornerstone of most difficult approaches towards feminist ethics. The main actor here again is the feminine. They are the main emphasis on this chapter. As we all know, the characteristics of woman is unique. They are the one who make things better not just only in society but especially on families. Mothers are considered the light of house. Their responsibilities are big therefore they should take these responsibilities for their family. In relating to computer ethics. It’s the same, as stated on this chapter, they give more emphasis on feminine side, therefore, and they have big responsibilities in society. For computer ethics, researches told us that decision of man and woman is very important specifically in computer ethics problem. They have a power to rule over it. The fact is, nobody owns cyberethics and that means it’s for us. We must take this responsibility owning it. Taking a good decision will really help people in making good things towards the computer ethics. The gender, ethics and information technology. In that work, the hope must be strengthened and theoretical dimensions must be broadened. Ethical decisions of man and woman are said to be important so that decisions made are strong.

Page 143: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 143

What I’ve learned: For me, it doesn’t matter who will be using the world of cyberspace. I don’t care he / she is. But I understand the sentiments of the people that we are biased. I was trying to avoid that word “biased” because there’s a truth behind it. Only God will know if you believe in him. Gender analysis is not effective for the people because it’s not thrilling/. Both man and woman must work together. We lived here on earth to use things that are useful to us. Therefore, we must make most out of it. In my perspective, woman and man must be equal, to make the world even better. Because, if this happens, people even if different gender can move especially towards cyberethics. We all have responsibilities and we must take it seriously. Integrative Questions:

1. Why is it related to Cyberethics? 2. Why they focus on feminine side? 3. What is care ethics? 4. What is ethical behavior? 5. What is Cyberstalking and hacking?

Citations: N/A

Page 144: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 144

Book Review: Chapter 26: The Digital Divide: A Perspective for the Future

Book: The-handbook-of-information-and-computer-ethic Author: Maria Canellopoulou-Bottis and Kenneth Einar Himma Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“The global distribution of material resources should bother any conscientious person”

Learning Expectations

• Why is it entitled the digital divide?

• What is digital divide?

• How it works for people. Review: This chapter explains the role of Digital Divide for the people. Let us define first what is digital divide? As stated here on this particular chapter, Digital divide is a new term for right which means that it occupies the main component of global lingua franca. The word lingua franca is only for the internet which is accepted as a language from our language. Those words by lingua franca came from us but these words were modernized because of internet. These words defined by human and can understand by people who are into computers or internet enthusiasts. It’s more on digital words I should say because, it is modernized by people to make it more attractable and meaningful. This is to signify that in essential terms, one thing: the fundamental disparity between information haves and have-nots. These words are too techy and I don’t understand it either. It is stated here that these will depend upon who is on the sides of comparison. What do people expect from this topic? Again, it is a literature of words that is full of technical definition. There are many doubts about digital divide because people cannot easily detect in digital divide literature. The big problem of this topic is that it is hard to understand this particular language and more people will not and discourage them to understand this. It is a learning tool for us bet yet, no one in the world will try to understand and learn it. Only those people who are interested. It is stated here that this was too narrow to certainly understand the revolution. The network had to expand, by all means so that it will be accessible for people who like to use this as a primary tool.

Page 145: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 145

What I’ve learned: I learned that it is hard to understand this tool. It is for the future. The future is good for us knowing that we are knowledgeable enough in understanding the situation. It is for future and for todays person specifically those people who are not into internet or any technical tools or terms, it will not be a wrong for them. The point is how this topic of this particular chapter can adapt it for the people to understand this. We must know first what we need to do so that in future, we will be successful. Plan now and aim for success. Integrative Questions:

1. What people expect from this topic? 2. Why is it different tool? 3. How does it differ to the ordinary language? 4. Why did they choose this tool? 5. Does anyone can use internet?

Citations: N/A

Page 146: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 146

Book Review: Chapter 27: Intercultural Information Ethics

Book: The-handbook-of-information-and-computer-ethic Author: Rafael Capurro Library Reference: N/A

Amazon Reference:

http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1 Quote:

“Present debate shows a variety of foundational Perspectives as well as a preference for the narrow view that focuses IIE on ICT”

Learning Expectations

• Expect to learn what is IIE?

• Why it is called as an emerging discipline?

• The impact of IIE to ICT?

• What is this so called, universality of values?

• Why web 2.0 is affected here? Review: When we say intercultural it is within the culture. Combining this to ethics means a lot to the information ethics topic. We all know that information ethics is part of ethical values made by human. We all know that information is everywhere. It will go out somewhere just like water. But the problem of this is that information is very much sensitive. Once information is leaked, more people will know it and as a result, people will react and react about that issue. The information now turns out to issue. That’s the informal way of knowing the information. Information must be in a good side wherein people must make use of it in a right and better way. Now, for uneducated people, they don’t know how to handle the information, they keep leaking this and sometimes this particular information will go to some professionals. It’s complicated in sharing information especially if that information is sensitive. As stated here on this chapter. IIE will not deal with the question of the impact of ICT on local cultures but explores also how specific ICT issues or, more generally, media issues can be analyzed from different IIE perspective. We are talking here again about the cultures and we all know that we have different cultures and at the same time, we have different beliefs. So this statement from this chapter proves that Intercultural Information of ethics is different and has different impact to ICT for local cultures. Different understanding for different cultures.

Page 147: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 147

What I’ve learned: The power of Web 2.0 is already there. Web 2.0 is a powerful tool for us individuals. With web 2.0 we can now create new issues by blogging, creating wikis, chat, social networking and everything that web 2.0 features that connects people. Information will obviously spread as much as possible. As a result many people will know that issue immediately either good or bad, they don’t care as long as they will know the information. “We have to deepen the foundational debate on the sources of morality from Intercultural information ethics perspective”. Based on this theory, we are now relying more on technology and the concept of controlling our ethical perspective are not that good. It will be better if we rely on technology at the same time we must control our own ethical values to strengthen our personality to other people. Integrative Questions:

1. Why is it called emerging discipline? 2. What is the foundational perspective that focuses on IIE? 3. What is basically IIE? 4. How Web 2.0 helped people distribute information / sources? 5. Why is it called intercultural?

Citations: N/A

Page 148: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 148

THE FORTUNE AT THE BOTTOM OF THE PYRAMID

Book Review: Chapter 1: The Market at the Bottom of the Pyramid Book: The Fortune at the bottom of the Pyramid Author: C.K. Prahalad and Stuart L. Hart Library Reference: N/A

Amazon Reference: http://www.amazon.com/Fortune-at BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2 Quote: “What is needed is a better approach to help the poor, an approach that involves partnering with them to

innovate and achieve sustainable win-win scenarios.”

I chose this statement simply because it discusses and focuses on helping out the unfortunate people. In this earth we live, we are community and since we are a community, our mission is to help other people. The concept of solidarity is the main topic of this particular quote. We must do something that is good for others. Learning Expectations

• To know basically the concept of market at the bottom of the pyramid?

• What this is all about?

• Understanding how it works for the market or industry

• To relate it to “Markets are conversations” Review: This first chapter entitled The Market at the Bottom of the Pyramid. At first glance, we have no idea on how to understand this particular topic simply because; the word is not that understandable. So, the solution to this in order to understand this topic very well, we will discuss it word by word. Let’s start in the word “Market”. Just like our Vertical Solutions class, the main topics for that subject are markets and of course, all VERTSOL students know about market. The first thesis entitled, “Market’s are conversation”. Yes, markets are conversations knowing the fact that markets are now literally talking and knowing also the fact that people is the very vital part of the market. If there are no people who will be working for the market, obviously no there’s no market. The second word is the word “Bottom”. It means that it is the lowest part of something that may never reach. The farthest point particularly in the pyramid because it is the topic for this particular chapter. For the word pyramid, it is a triangular shaped object. Usually found on Egypt as we all know. Anyway, Pyramid is just a representation of statistic to further understand the meaning of this particular chapter. Now we all know the meaning of each word, the number 1 question is that, what is this for. What are the purpose of this concept or theory to the market and the purpose of it for the people and we will learn the purpose of this concept later on as we go on to this chapter.

Page 149: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 149

As stated here on the book, the 21

st century number one problem is the poverty; furthermore,

disenfranchisement considers the world’s number one problem. This only means that the world is in need of entrepreneurs who will be responsible for the solutions of daunting problems occurring in our world today. This chapter provides basic assumptions for the bottom of the pyramid.

• First, the poor represent as a “latent market” meaning that these poor people are underlying to active engagement of private enterprises. They don’t have the opportunity to acquire this.

• Second, the Bottom of the Pyramid provides a new growth and opportunity for private sectors.

The previous solutions cannot now create markets in Bottom of the Pyramid. Meaning that these private sectors had enough power to acquire BOP as a market.

• Third, BOP Markets must become an integral part of work of private sector. That means the most

important and the basic part can be conducted by the community. One way of doing this is an CSR-Corporate Social Responsibility.

These are the best guidelines to avoid poverty in our country. Appreciate each of it and these powerful concepts will go back to us and gain more advantage. It is for the betterment of the world. What I’ve learned: As stated on this chapter, the main purpose of this book in overall is to illustrate that the typical pictures of poverty mask the fact that the very poor represent courageous entrepreneurs and value-conscious consumers. This only means that it’s time for the people of the world to know that people are changing and evolving to fight against poverty. The so called “Poverty mask” must be removed in the lives of every individual living here on earth. I’m very interested in this book because, we can apply our learning in ethical and moral values as well as integrating or combining the concept of vertical solutions particularly the market towards the fight against the poverty. Technology and Ethical values are present here. Therefore, as a student, we must learn about these concepts. Thanks to our program because we can combine our ethical values as well as marketing skills and be able to do a fortune at the bottom of the pyramid. Integrative Questions:

1. What is the Bottom of the Pyramid? 2. How does it affect less fortunate people lives? 3. Can we easily integrate this concept for them? 4. What are the purposes or what are the advantages of this chapter? 5. What are the so called “Tiers” for?

Citations: N/A

Page 150: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 150

Book Review: Chapter 2: Products and Services of BOP

Book: The Fortune at the bottom of the Pyramid

Author: C.K. Prahalad and Stuart L. Hart

Library Reference: N/A

Amazon Reference: http://www.amazon.com/Fortune-at-BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2 Learning Expectations:

• What are the products and services of BOP

• To learn the specifics of Products offered by the BOP

• To learn the specifics of Services offered by the BOP

• How do people conduct these product and services?

• The twelve principles of Innovation for Bottom of the Pyramid Markets

• How does a company or anyone make this part happen?

Quote:

“Will challenge the dominant logic the beliefs and values of the managers serving the developed markets and have been socialized with”

This quote is very much alike from this particular chapter. It is stated there that the challenge will be a dominant logic. That means the people who are in the authority in a particular position must partake the challenge because they are the only one who can handle beliefs and values. For managers, they are challenged to serve, develop markets and socialize with people. Review: Since this particular chapter talks about product and services, these matter are considered as part of the business and the process of distributing it to the final consumer or customer is called a market. Again, since market is present here in this chapter, there are many ways now how to market a product and services. Markets are conversation, and as stated from the previous chapter and in Cluetrain Manifesto as part of 95 theses, people plays again the vital role of marketing a product. People are the only key to maximize the potential strength in marketing the product or services. These people will make sure that the quality of product or services they offer to the final consumer will be satisfied with this. In relation for the BOP that this chapter discussed, here is the explanation. According to this chapter, “The BOP, as a market, will challenge the dominant logic” so this means that BOP is a feature in a market that will help the product or services offered by the company or any other business firm will give more improvement for that. Another one is that the BOP will give reputation for these products and services. For BOP, it is stated here that advanced technology solutions, must coexist. We are talking here the side of BOP. Basically, in a BOP, the technology must be present or coexist because for instance, the networks are considered to be part of Markets are conversation because people can converse digitally. We are now in the 21

st century and the thing is that we must maximize the use of technology. For BOP,

yes of course the foundation of the pyramid is for the market. It’s just a representation on how markets work on BOP.

Page 151: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 151

Good to know that the author of this book and particular chapter aims to discuss all about the twelve principles of Innovation for Bottom of the Pyramid Markets: These are the ff:

1. Price Performance 2. Innovation: Hybrids 3. Scale of Operations 4. Sustainable Development: Eco-Friendly 5. Identifying Functionality 6. Process Innovation 7. Deskilling of work 8. Education of Customers 9. Designing for Hostile Infrastructure 10. Interfaces 11. Distribution: Accessing the Customer 12. BOP Markets essentially allows us to challenge the conventional wisdom in delivery of Product

Basically, these principles are involved in the innovation and this kind of innovation is part of BOP. Identifying, evaluating, scoring of products or services offered by the company is very much effective determining the state of the product or services as well as promoting that. What I’ve learned: I learned that there are twelve principles of innovation to make the products and services of the company succeed. Knowing these principles will help the company or anyone else improve their respective offering for their consumers. This innovation must be evaluated first exactly know how can affect people’s lives. I experienced how to score a scorecard regarding the BOP and while doing it, it was very interesting because while thinking or evaluating for a particular principle, my mind flows for that principle if it is applicable or not. As a conclusion: Getting the right combination of scale, technology, price, sustainability, and usability are towards the concept of innovation for BOP Markets. Thanks to BOP because company will now have a basis on how to improve their products or services. Determining the status again of a product or services is a great factor to be able for the company to improve their performance in the eyes of the people. Integrative Questions:

1. What are the twelve principles of innovation for Bottom for the Pyramid? 2. What are the effects of these twelve in identifying the factors being served by the company or

anyone else? 3. Is it really important to score the product or services offered by the company to the consumers? 4. Is it really easy to implement? 5. How does it innovative in our world today?

Citations: N/A

Page 152: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 152

Book Review: Chapter 3: BOP: Global Opportunity Book: The Fortune at the bottom of the Pyramid Author: C.K. Prahalad and Stuart L. Hart Library Reference: N/A Amazon Reference: http://www.amazon.com/Fortune-at-BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2 Learning Expectations:

• I expect to have an idea of Bottom of the Pyramid for Global Opportunity

• What is the Global Opportunity in BOP?

• Can these opportunities effective to markets? Quote: “The quality, efficacy, potency, and usability solutions developed for the BOP Markets are very attractive

for the top of the pyramid”

These are the factors why we call them a BOP. The power of the concept of BOP is still authentic and I can say that these factors will help improve the name of BOP for entrepreneurs. Since we are talking here about Global Opportunity, the number one actors in this chapter are an entrepreneur who aims to make a difference for the world. Review: Let’s describe first what is an opportunity? Basically it is a chance of people or group to attain advantageous goals. An when we commit or attain goals, it is our pride that we commit it and we are proud of something because we did something different for others. In relation to global community, it’s also the same, each one of us can attain goals. If anyone can attain for it, of course, each one of us has the chance to meet our goals in life and that is called opportunity. In this chapter, we can say that opportunity is very much useful to meet our goals in life. In relating to market, we believe that the market has a potential to attain opportunities and goals. In determining strength and weaknesses, opportunities and threats, we can determine how to achieve a particular goal. Identify it and trust your evaluation, you can now find your answer if you have a right opportunity for that. Especially, in applying this theory to market, it is very much effective because knowing this will lead to goals. How do we engage BOP? It is stated here that there are two ways to engage the power of BOP into markets, first, the traditional approach. Traditional, it is an old style of doing things But even if it is traditional, it is the most authentic and basic way of attaining the goals considering that the market. For the BOP, the top of the pyramid is considered as the comfort zone. All business are aiming for that position.

Page 153: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 153

What I’ve learned: As stated here on this chapter (p.57), BOP Markets are a great source for experimentation in sustainable development. I agree with this statement because BOP is just a theory that is considered to be true. All part of the BOP market are considered to be scarce. This means that the natural resources here on earth are only limited, therefore, today, many companies are looking for innovation to produce or create product or services that is not harmful to mother earth as well as for the people. The sustainability in a market is a great factor for the company who offer product and services for their consumers, therefore, these companies must motivate to give the best they can offer for the consumers. Targeting poor people is a factor in BOP that aims for the global attainment. All of these must be sustainable for a company. Since innovation is the answer for BOP, the potential companies who can sustain the authentic development must go for it. This is a change for the image of the company as well as reputation of the name itself. The flow of ideas, knowledge, and innovation will become a two-way street from the developed countries to the developing countries as well. Because of this statement, we can say that those countries that had lack opportunity can make it through by helping other developed countries. Private sector as stated here has a desire to leverage resources and gain market coverage and will invent more new systems to accommodate the people they are serving with. A positive situation for both large companies and BOP Consumers. Integrative Questions:

1. How to engage BOP to Global Opportunity? 2. What are the benefits of operating BOP? 3. Is it true that BOP can be a source of innovation? 4. How does BOP grow in market? 5. How does BOP develop solutions for market?

Citations: N/A

Page 154: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 154

Book Review: Chapter 4: The Ecosystem of Wealth Creation Book: The Fortune at the bottom of the Pyramid

Author: C.K. Prahalad and Stuart L. Hart

Library Reference: N/A Amazon Reference: http://www.amazon.com/Fortune-at-BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2 Learning Expectations:

• I expect to learn the connection of ecosystem to BOP

• What is the role of Ecosystem to wealth creation?

• How is this effective to BOP?

• I want to learn the Market-Oriented Ecosystem. What is it?

• I want to learn the building Governance capabilities among the poor. • The private-sector in ecosystem

• How does this transform the basis for commercial transactions within a developing economy? Quote:

“The social capital or individual entrepreneurs has a focus on both business and social developmental initiatives at the BOP”

This is considered as one aspect of ecosystem. I believe that entrepreneurs are part of the ecosystem what aims for social developmental initiatives for BOP. These entrepreneurs who aims for social and developmental initiatives has a heart to help unfortunate people who are in need. A business system is at the heart of ecosystem for wealth creation. I believe this because business system aims for what is good for the people. Review: First, let us define the meaning of ecosystem. When people heard that word, the first thing comes up to our mind are living organisms living here on earth. Organisms are part of our environment. Therefore, we can say that ecosystem is an environment where people are living. Naturally, when God created this world, ecosystem already exists. People are now relating themselves to meet another organism. That’s make a better ecosystem. The explanation is in natural world. But how about in Business world? Is this concept available? It is stated here that there have been a few attempts to focus on symbiotic nature of the relationships between various private sector and social institutional players that can lead to rapid development of markets at BOP. With this support statement, the concepts of ecosystem in business world are now related knowing the fact that it is for rapid development. In relation to rapid development, let us discuss about the market-oriented ecosystem since these are related to each other. Basically, Market-oriented ecosystem is a framework that allows private sector and social actors, act together and create wealth in a symbiotic relationship. This definition is somewhat similar to ecosystem but putting it on the business side. Knowing the fact that ecosystems are very depended on each other, it is very feasible to create a market-based ecosystem simply because people are connected. Also, we consider as market are conversation, we can now find a reason why markets are ecosystem. But the big problem of market-oriented ecosystem is that if one sector for special can’t pick up, how can they move on with the whole system? That’s the big dilemma for the ecosystem.

Page 155: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 155

For the developing countries, they are the target of BOP Market because they are still developing and improving their respective economic state. One example here is the Philippines, it is considered as a developing country and considering this state, Philippines need a help for those who are in developed country. For the developed countries to help developing countries, they need a competitive condition such as the availability of new technologies, the nature of resources, and the educational infrastructure. These are the basic factors needed to help under developed countries. The private sectors are the fast-moving of consumer goods who has capabilities to help developing countries. They have good relation to the government as well as in other company. What I’ve learned: The history tells us the result of evolution made by humans. It is stated here that the large firm was a big symptom of a maturing economy focused on system efficiencies through scale and scope. This means that large firms are advantage for those who are in developing countries because these large firms can are feasible enough to give help. But the problem is that these large firms are focused on system efficiencies. They think the most efficient way to help other ecosystems. The goal in development is to bring as many people as possible to enjoy the benefits of an inclusive market. In short, the BOP goal for ecosystem is the development or the BOP gives something to for those people who are in need so that they can meet the enjoyment even if they are not in the good state to enjoy happiness. But even if it is not that good, the goal is to meet happiness whatever it takes. This chapter tells us that the Market-based ecosystem must provide us to build basic infrastructure stated above this review most especially education. It allows large firms to build and profit growth markets which are advantageous for these companies. Integrative Questions:

1. What is Market-Oriented Ecosystem? 2. What are the ecosystems for developing country? 3. What’s the role of History in evolution of the large firms? 4. Can Market-based ecosystem provide us an approach to build basic infrastructures? 5. BOP consumers can benefit in local entrepreneurship?

Citations: N/A

Page 156: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 156

Book Review: Chapter 5: Reducing Corruption: Transaction Governance Capacity Book: The Fortune at the bottom of the Pyramid

Author: C.K. Prahalad and Stuart L. Hart

Library Reference: N/A Amazon Reference: http://www.amazon.com/Fortune-at-BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2 Learning Expectations:

• Expect to learn the effects of corruption in terms of BOP Concept • Difference of corruption and local practice. • Identifying the question “Are the Poor, poor?” • The center for Good Governance

Quote:

“Most developing countries do not fully recognize the real costs of corruption and its impact on private-sector development and poverty alleviation”

The quote I chose is pertaining to the developing countries. This is stating that the developing countries do not recognize the real costs of corruption in their respective country. I agree with this statement because no one knows who did this, who did that, clueless when they are talking about corruption. Even the highest position in an organization or in a country don’t provide answers for that because they want to be safe in malicious issues about them or so called “Playing Safe” They don’t know the effect of corruption into the private-sector. Review: Corruption is the number one problem in a particular country especially for those states that are still developing countries. Countries consider this as a number one problem and they need to fight this for change. For example, the Philippines is ranked as the most corrupt countries in Southeast Asia and considering that we are the only Christian nation in Southeast Asia. It is hard to accept the reality that Filipinos are considered to be one of the most corrupt countries around the globe. But the thing is we are very afraid to fight this kind of attitude knowing that we are leading in the most corrupt country. Those people who are really involved in the corruption are avoiding the issues for them. The tendency is that many people will be involved in corruption and this will continue until they change the leader. First, we must understand the difference between corruption and local practice. In explaining this in layman’s term, local practice is only for local, within the community and only limited, unlike corruption, it is national. People can obviously know that corruption issue as fast as they could because people are concern for that thing. Transaction governance capacity is about making the entire process as transparent as possible and consistently enforced. This only means that corruption is transparent to people. As stated before, because corruption is transparent, people will know that issue immediately. To fight against corruption and to avoid this act, it is stated here that we must reduce the frictional losses in doing business at the BOP. Doing business in BOP is considered to be an easy job, but when implementing BOP to product or services, it would be a different story.

Page 157: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 157

What I’ve learned: The primary statement of this particular chapter is to overt corruption in a business operation. I agree that corruption should be totally “killed” or avoid it as much as possible. Basing it to ethical values of the Filipinos, we have a power to avoid this particular act but the problem is we don’t have enough capabilities to overcome this challenge. I believe in the abilities of the Filipinos furthermore, we are world class people. The problem is that we don’t have an authentic solidarity. Just like Ben Quinones, the speaker from Corporate Social Responsibility for entrepreneurs, he is a very good example of an authentic entrepreneur because he combines the concept of corporate social responsibility, Bottom of the Pyramid Markets, authentic solidarity and other concepts or theory related to markets that will help people go further and surpass the state of poverty. I believe in him because he shows the characteristics of an authentic Christian. If Filipinos are like Mr. Ben Quinones, the future of the Philippines will have a good hope for the next generation of Filipinos. Integrative Questions:

1. Difference of corruption and local practice. 2. What are the assumptions for poverty reduction, and developmental assistance? 3. What is TGC? 4. Is it difficult to implement TGC? 5. The effect of corruption to BOP?

Citations: N/A

Page 158: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 158

Book Review: Chapter 6: Development as Social Transformation

Book: The Fortune at the bottom of the Pyramid

Author: C.K. Prahalad and Stuart L. Hart Library Reference: N/A Amazon Reference: http://www.amazon.com/Fortune-at-BottomPyramid/dp/B00006L5AW/ref=sr_1_2?ie=UTF8&s=books&qid=1232066330&sr=1-2 Learning Expectations:

• Development in BOP

• What is Social Transformation?

• The role of BOP in Social Transformation Quote: “The poor can be a market, Serve the market is to innovate, Demands a range of innovations in products and services, business models, and management innovations, Making the government accountable to the

citizens and making it accessible and transparent.”

These are the foundations of development as social transformation. These are the lists of foundation are gateway to success especially in BOP Markets. If companies or government follow these foundational concepts, there will be an authentic change for the society and for the world as a whole. BOP leads to innovation and that innovation will lead to world to success. For a result, people will now motivated to work and giving them a chance of hope. Review: When a poor at the BOP are treated as consumers, they can reap the benefits of respect, choice and self-esteem and have an opportunity to climb out of the poverty state. Just like the previous chapter, it discusses about ecology as a wealth of creation. In this particular chapter, we can see that it is also applicable. We see that this chapter discussed all about development as social transformation and in part of this title, there is a “social” which we can relate it to ecology and also we can include this in the BOP market aspect. For the word social, it means that we are still connected to each other knowing the fact that we are united as one and that’s the role of ecology. On the other hand, the word “transformation” is a word of change. This means that we develop as an individual and as a social community. Since we are talking here about social transformation, through BOP Market, people will have an opportunity to literally climb out of the poverty trap. Meaning that all of us had a potential an opportunity to raise ourselves and prove that we can do it. When the time we done it, it is called an authentic social transformation. Again, we developed with our own perception and once we did it, we are considered to be part of a transformation. As stated above, the quote means that these are the foundations or guide for a development as social transformation. Each people should learn these foundational aspects so that people will know how to transform or change themselves. Even that individual is just a starter, more and more determination will acquire by him or her. The question is how will these changes impact life at the BOP? The answer is stated here. “As a BOP Consumers get an opportunity to participate in and benefit from the choices of products and services made available through market mechanism.” With this answer, as a consumer of

Page 159: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 159

BOP Markets, it will now be understand that it is easy to acquire these knowledge in BOP provided and knowing these foundations. What I’ve learned: Converting the poor into a market will require innovation. I agree with this because if people don’t think or move, how can their lives transform. I mean, what’s the use of their lives if they don’t move. Bottom of the Pyramid concept is given. People analyzed and study all about it to process an innovation for all humans. This is for all people who seek change specifically in market. All we have to do is to move and do something to implement it in our lives. We cannot call ourselves an authentic social transformation because we did not implement it yet therefore, since we aim for an innovation, we must gain knowledge for the BOP. Modern Technology, Good product and services are given; this will enable them to take a huge step in improving their quality of life. For a final remark in Bottom of the Pyramid, while doing this book review, I realized that for our country, it is hard to implement this concept because we need more knowledge about this. Even if innovations for us already existed, the basic concepts must be inherited for the people so that they will know the true value of this study. We have enough ethical values because, first, we are Christian people and we are aiming for good values for our country. We also have a big opportunity to think what is good for us and other. Given all of these, we can do this together; the only problem is the solidarity which some Filipino’s don’t have. For me, I love the study of the Bottom of the Pyramid. It is the good and best way to analyze the status of a particular company for their products and services. Thanks to this BOP because I learned a lot in expounding my knowledge as an IT Student and Business student. Integrative Questions:

1. How will these changes impact life at the BOP? 2. What is the Real Test? 3. What does BOP Consumer gains? 4. What are the foundations of social transformation? 5. What is BOP Consumer Upgrade?

Citations: N/A

Page 160: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 160

ITETHIC LISTS OF ASSIGNMENTS AND ACTIVITIES Assignment 1 - Tough times call for more CSR > A newspaper Article TITLE: “Tough times call for more CSR” NAME: Francis Guison Section: O0A PARTNER: Reychelle Buenavidez Submitted Date: January 12, 2009 Questions

1.) How does League of Corporate foundation can be reliable in their respective Corporate Social Responsibility?

- Each member of League of Corporate foundation (LCF) must mitigate their respective cost to fund a particular project for the people. The member should be feasible in every project they put into action. LCF also encourage these companies to make a change in the society.

2.) How Don Bosco Technical Training Centers does support scholars who are taking up integrated farming

technology techniques? - Primarily, UCPB-CIIF supports the scholars from Don Bosco Technical Training Centers then they

provide quality of education related to organic farming techniques. 3.) How Jollibee Foods Corporation sustain benefit from society? - They basically have a scholarship program for high school students, post-secondary up to training and

employment. In this way, they help scholars and at the same time, these scholars will be employed at Jollibee. Another benefit to JFC is the training and livelihood program for those farmers who are capable in supplying raw materials in JFC.

4.) Why Splash Corporation Foundation named it “Ganda Mo, Hanapbuhay Ko”? - From the quote itself, it promotes livelihood project for the society. “Ganda Mo” means that it’s for you,

and “Hanapbuhay ko” means that you are working for it. Splash foundation gives this opportunity for the people who have skills in cosmetology.

5.) Why did Team Energy Foundation and Asian Institute of Management join forces? - They have specialties in the society. Team energy is specialized company in providing electricity in far

areas while Asian Institute of Management supports team energy in managing the project. As a result, they produced a project called BEACON (Barangay Electrification Assistance for Countryside Development). Many people now in that area have now electricity. It’s a good teamwork! 6.) How Figaro Foundation use the coffee industry to help the society?

- Since coffee is the primary product of Figaro, they are strengthening it by promoting coffee in the community. These communities are trained on organic farming methods so that they can produce more raw materials in making coffee and market it. This serves as a livelihood project for them. Figaro and the community gained benefits at the same time.

7.) How Meralco Millennium Foundation adopt their project? - Meralco is one of the leading electricity providers here in NCR. They have a project called “Share the

light” which provides depressed communities in the Philippines. 8.) What does UCPB-CIIF do? - Primarily, their main target is to uplift the quality of life of coconut farmers. Since Philippines are rich in

the plantation of the coconut, it is a great opportunity for them to harvest the tree of life. UCPB-CIIF supports them.

Page 161: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 161

9.) How does LCF encourage its members to implement a particular CSR Program? - LCF make sure that the programs implemented by these foundations are feasible and has a benefit for

both of them. LCF encourages them to mitigate cost and continue supporting these projects. 10.) Is CSR is considered as one way of promotional strategy of a company? - It is one way how to promote their name for the people. But the main purpose of these projects is to

help communities. It is their Corporate Social Responsibility as a company. Assignment 2 - Coding Horror Profitable Until Deemed Illegal INTEGRATIVE QUESTIONS:

1. What is Swoopo.com? “Swoopo is one of the world’s most innovative auction sites. Based on a unique software solution and business model, the company sells premium products”. It is a great site for entertainment Shopping. -swoopo.com 2. How does swoopo.com works?

· There is a starting price for a particular product. · Every 15 seconds, 15 cents price are increased. · When it times up, the winner get that product and pay Swoopo.com

3. What is Penny Auction?

The bid increases the final price of the sold item by 1 cent and costing you still in 75 cents. 4. What are endowment effects?

This has connections about irrational decision making. 5. Why swoopo is said to be a close to pure distilled evil business plan?

It is evil way of doing business because they don’t need a system to implement. The only key is the net and the people, and they start doing evil business.

6. What is 100% Auction? The winner gets it all. The final price is the final price.

7. Who is the author of this article? The name of the author is Jeff Atwood.

8. Why is it that the author is fascinated with these activities? Because the concept of slot machine and online e-commerce site are present. It is so different if both of these mixed up.

9. Why did he post this? He posted it because he can see some unethical activities happening to this site.

10.This article is all about what? This article portrays the good and the bad side of programming. Additional Questions:

1. If you were asked to program this example, would you do it? Why? In my own perspective, it is the most unethical way as a programmer to program this kind of

application. As a Christian believer and as an ordinary human, I would definitely not do this simply because it is the bad side in the world of programming. Basically, as a programmer, I have a power to decide if I want to earn money fast in an awful way or earning money in slow but good way. As we all know, money makes the world go around and nothing will change this statement. But I’m a Christian! God gave me power to decide things. It’s my responsibility to take care of it.

2. Is it right to program this example? Why?

When I read this article, it’s amazing that you can earn money easier just by doing all of these stuffs. Apparently, after reading this, I think it is the most fastest and evil way to generate money with the use of technology. The law is weak in enforcing these kinds of activities especially here in the Philippines. The tendency is that many programmers will have an opportunity to be part of this kind of project. More

Page 162: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 162

and more programmers will be interested for this. For them, it is right to program it because they have enough knowledge to do all of these. But their conscience will be the winner after they done all of that. Assignment 3 - Aristotle: Happiness and Virtue SWOOPO

1.) If you asked to program it, would you do it?

Ø Basing it to Aristotle’s framework, yes, even though I’m not passionate programmer, I will program this project simply because I can seek happiness for doing it at the same time, I can earn lot of money. But there are conditions before I accept this job; this is to change the auction system. All from Swoopo should be benefitted as well as their customer. The key here is the equality of all. It’s a good concept of business but Swoopo must have a responsibility to make a fair way to the customer to make a better auction site.

2.) Is it right to program it?

Ø For me, technically yes because it is programming and nothing is impossible with programming. That is the capability of computer and people must use it. The result is that they are happy on what they are doing. Another thing is that many buyers continue to do this entertainment shopping just for the sake of having fun. Christianity, otherwise, will be against to this act because it’s wrong and illegal. Assignment 5 - Student auctions off virginity > Natalie Dylan Case. Is Natalie Dylan right to sell her virginity to fund her master's degree? In a Christian perspective, obviously it’s wrong. Selling yourself is one of the most unacceptable acts in the eyes of God simply because our body is sacred. God created us with his own image and likeness then people like Natalie will just sell her body for money. For me, that is absurd! Of course, it’s a sin. Natalie has no connection to that highest bidder therefore; they are not legal to do such thing. It’s just one-night-only offer to have fun with earning money. The question is, if Natalie only forced to do this or not? In my own opinion, she seeks for happiness therefore; she considers it as a virtue. Because we have a freedom, she decides for it and let her decision bring her to right or wrong of ethics. The Extremes:

• Because of poverty, she cannot avail her master's degree, therefore she had to do something to sustain her needs. Education is an important part of our lives. We cannot deny it.

• She is forced to do this task.

Page 163: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 163

The Ten Commandments of Computer Ethics

(Partners: Reychelle Buenavidez & Abram Limpin) ITETHICS Reychelle Buenavidez OOA Abram Limpin Mr. Paul Pajo Francis Guison 10 Commandments of Computer Ethics I – Hacktivist Side

1.) Commandment # 2 : Ethan would take the office and soon and enough held start taking over the computer network

2.) Commandment # 2 Exploiting the weakness in MediaDefenfer’s firewall, he started poking around on the company’s network.

3.) Commandment # 7 He found folder after labeled with the largest media company on the planet

4.) Commandment 4 & 2 He logged into Media Defender’s computer. He chatted on another with some hacker friends to see if they knew everything about the firm.

5.) Commandment # 1, 2, 3, 4, 6, 9, 10 These hackers made movie and music industry lose billions of revenues.

6.) Commandment # 1,3,4, 10 Ethan hacked into the company. II – Company’s side

1.) Commandment # 5, 10 MediaDefender monitors this traffic implicates a handful of tricks to sabotage it including planting booby-traps versions of songs and downloader.

2.) Commandment #’s 1, 2, 9, 10 MediaDefender used different IP Addresses to upload files that is empty. The user cannot download this file.

3.) Commandment #’s 1, 3, 5, 9, 10 MediaDefender traps other people who are uploading protected content.

Page 164: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 164

Assignment 7 - IEEE Code of ethics Francis Guison OOA ASSIGNMENT: IEEE Code of Ethics Identifying Strength and Weaknesses of each ethical values of IEEE 1. To accept responsibility in making engineering decisions consistent with the safety, health, and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; Strength: Their responsibility is the main ethical value as a company. They should comply with this vision and applying correct ethical values for the people.

2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist; Weaknesses: It’s too general and not easy to understand especially explaining it to layman’s term. 3. to be honest and realistic in stating claims or estimates based on available data; Strength: They are direct to the point in giving honesty and in a realistic service for the people. They aspire and maximize what they have. 4. to reject bribery in all its forms; Weakness: They challenge themselves how to stop this illegal activity. But they didn’t specify what kind or type of rejection appropriate to stop bribery. 5. to improve the understanding of technology, its appropriate application, and potential consequences; Strength: They specializes technology as their primary industry; they have a capability to improve what they have. While improving it, they can also develop new things for the people. 6. to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations; Strength: They make sure that their qualities of excellence are focused on technical aspect which is a good ethical value for the eyes of the people.

7. to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; Strength: They ensure that technical work is on high quality level. Accuracy and honesty are highly prioritized.

8. to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin;

Page 165: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 165

Strength: They are not against to any religion or other aspect of the people. They treat people fairly. No biases.

9. to avoid injuring others, their property, reputation, or employment by false or malicious action; Strength: Ensures that each employee is transparent for the company and for the people.

10. to assist colleagues and coworkers in their professional development and to support them in following this code of ethics. Strength: This is to inspire other co-workers with all activity in the company in a good ethical way. Aspire each other for the company and for the people they are serving. Activity - Gandhi and the British Government Question: Was Gandhi stealing salt from the British government. or was he simply breaking the law, which gave the British the exclusive right to produce salt? Answer: I In my own opinion, Gandhi did not steal salt from British Government. Yes, it is a law created by British Government but Gandhi also has a right just for the sake of goodness. I also believe that the world are created for us. We need to share what God created for the betterment of other people. Activity - YouTube's 09 Fair Use Massacre Francis Guison OOA Activity: YouTube's 09 Fair Use Massacre from this link I - Yes/No

1. Yes 2. Yes 3. Yes 4. Yes 5. No 6. Yes 7. No 8. Yes

II - Explanation For me, it is a fair use. The purpose of composing that song is to entertain people. In my own opinion, you tube has no rights to mute the song because the user just only sung it with her own voice. As long as it is not harful to the composer of the song. It is considered to be fair use.

Page 166: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 166

Assignment 9 - Listening Activity "What is Christian Nation?" Francis T. Guison OOA Mr. Paul Pajo Listening Activity: Cermon by: Mr. Paul Jehle

1. What is Christian Nation? - A Christian Nation is a nation which shows the nature and symbolism of Christianity. God created a kingdom to bring out the Church that will teach the concept of Christianity for the people. All of us are God's people but we have different beliefs on Him. Mr. Paul Jehle said that if we have no Theology in our life, we are considered to have no savior. The only problem with human beings is that we continue to make sin. For example, Mr. Paul asked his listeners if America ever confess if Jesus Christ is our savior, did the nation declare the bible as a source of the laws? He was pointing was the nation is clearly different from individuals. The nation is on generational continuity. The kingdom of God governs the above and the bottom of nation. He will do anything just to discipline that nation in a different and a unique way. Every nation needed God. Only human being will just decide if they accept God in their hearts individually. The symbolism of Christianity is the Father, the Son, and the Holy Spirit. Mr. Paul has an anaology on these three in the government. It is a model that God really govern every nation. So, Christian nation governs by God no matter what happens. The earth itself is considered to be the Kingdom of God. 2. 10 Integrative Questions - Is America considered to be a Christian Nation because of slavery? - Is it true that if there are America has a wrong Theology? - Do you have rights if you don't have Theology? - Do Christian accept the Ten Commandments given by God? - Did Christian are responsible enough to govern Christian as a nation or family? - Does God only rules only what He agrees in? - Is it true that if you disagree once in the rule of God, you disagree all? - How can we look into a nation in a Christian perspective? - Can you look into the literature by determining the heart of the people? - Could it be possible that a Christian Nation can confess? - Did America ever confess that Jesus Christ is our savior at all cost? 3. Using Mr. Jehle's Framework? Is Philippines considered to be a Christian Nation? - In my own opinion, I consider Philippines as a Christian Nation because no matter what happens, Filipinos will still reamain basing our morality to the bible. We keep doing this act. Thanks to the Spaniards because they gave us a religion that are applicable to our culture. Since God governs the Christian Nation, We are basing morality to the bible. Our beliefs are ruled by God. Assignment 10 - The Ethical Concepts an Ethical Theories: Establishing and Justifying A moral System REVIEW QUESTIONS

1. What is ethics, and how can it be distinguished from morality?

Page 167: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 167

-It is the study of morality's effect in conduct. It can be distinguished by basing on the standards of ethical values.

2. What is meant by a moral system? What are some of the key differences between the "rules of conduct" and the "principles of evaluation" that compromise a moral system? -Moral system involves the right or wrong things. It aims primarily to the transition of human in terms of behavior. Rules of conduct are the rule existed and need to be followed to have a right conduct. The principles of evaluation are the standards of determining what is right and wrong.

3. What does Bernard Gert mean when he describes morality in terms of a "public system"? Why is the notion of "personal morality" an oxymoron? -Oxymoron are expressions with contradicting words to other. Personal morality are basing to an individual morality who he/she believes in. For Gert, it is public system.

4. Why does Gert believe that morality is an "informal" system? How is a moral system both similar to, and different from, a game? -For him, he points out that informal system has no formal authoratative judges. He believes that morality is more informal.

5. Describe how the ideals of "rationality" and "impartiality" function in Gert's moral system. -Being rational is being conditional and logical. Impartial means not biased means that you are not favoring to one person. In short you are neutral.

6. What are the values and what are some of the key differences between moral values and nonmoral values? -Value means something is worth. Given the importance to it. Nonmoral values mean not having a correct moral principle. If a person don't value the morality, then he/she is considered as a nonmoral value person.

7. How do religion, law, and philosophy each provide different grounds for justifying a moral principle? -In religion, it is an act of living religiously. Religious in a way that you believe in God. For law, it is the rules that created by man. It already existed and depends on the people if they will follow it. For philosophy, it is the basis of everything philosophical. Human study it to know the philosophical values.

8. What is the method of philosophical ethics and what is a philosophical study? -In method of philosophical ethics, it should be step by step or methodological way of studying to know or predict the theories.

9. How does philosophical study differ from a descriptive study?rather than normative in nature? -Philosophical study are based on the philosophers who are good enough to explain in philosophical matters. Unlike descriptive study, it just only study basically the theories.

10. Summaraize the four diff. kinds of "discussion stoppers" in ethical discourse. -

-Morality is simply a matter for individual cultures to determine -People disagree on solutions to moral issues -Who am I to judge others? -Morality is simply a private matter

11. Why are these discussion stoppers problematic for the advancement of dialogue and

debate about ethical issues? -This is to stop discussions regarding ethical issues on how to resolve it.

12. What is moral relativism? How is it different from cultural relativism? -It is a belief in a changable standards. Cultural relativism is judging basing on their own terms.

13. What is ethical theory, and what important functions do ethical theories play in the analysis of moral issues? - Ethical theories are the theories justified to have a more principled idea in life. This function is to correct and guide peoples lives

14. What are the distinguishing features of consequence-based ethical theories? - Consequence is the significance of moral and ethical theories appriciated by humans.

Page 168: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 168

15. Describe some of the key features between act and rule utilitarianism. - Act Utilitarianism - it is the rightness or wrongness of one's actions is depending on its expected outcome. Rule Utilitarianism - the rightness and wrongness of one's actions is depended on whether it follows the general rule.

16. Which feature distinguish duty-based ethical theories from alternative types of theories? - We have a duty as we live here on earth. Therefore, We must have based ethical theories for ourselves.

17. Describe some of the main differences bet act deontology and rule deontology. -It is all depend on the solution of the problem.

18. What is meant by the expression contract-based ethical theories? -Expression of ethical theories means the external appearance of the theories in the eyes of the people. People will decide whether they want to follow these theories or not.

19. What freatures distinguish character based ethical theories from alternative schemes of morality? -Character is the nature of person. Basing it to ethical theories may have different point of view.

20. How does James Moor's "Just consequentialist" theory incorporate aspects of utilitarianism and deontological theories into one comprehensive framework?

-There are two frame work of just consequentialist theory, first is to purposely evaluate policies. And evaluating it in delibiration stage. Seatwork: Patent Trolling (Partner: Reychelle Buenavidez) Francis T. Guison OOA Partner: Reychelle Buenavidez PATENT TROLLING Mary Midgley: Cultural Relativism Strength:

• Patent can be applied in the context of the Philippine. Weakness:

• You cannot justify it based on your own culture. • Relationship with other companies culture; meaning you won’t be able to have good relationship

with other companies because it’s shows suspicious act for them. • You cannot sell something to them because you only copy it.

Immanuel Kant: ahCategorical Imperative Strength:

• It applies to the goose and it also applies to the gander. Meaning it applies to all. Weakness:

• Others can troll on you also. • There will be a “chilling effect” meaning it is possible that no one would like to have patent

anymore, they just do trade secret instead.

Page 169: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 169

John Stuart Mill: Utilitarianism Strength:

• Increasing the scope of those people who will be benefited is better. • If the demand is high the number of people and country who will be benefited will increase as

well. Weakness:

• Those who are “creators” will not be happy because everybody will just troll and troll. Annette Baier: Ethics of Care Strength:

• Weaker nation can be helped by the stronger nation. For example Philippines and America. Weakness:

• Stronger nation may abuse or may take advantage against the weaker nation. Assignment11: The Professional Ethics, Codes of Conduct and Moral Responsibility REVIEW QUESTIONS 1. What is professional ethics? -It is a field wherein professionals applied the concept of ethics concerned with moral issues that affect computer professionals. 2. What is a computer professional? -Is the one who are professionally responsible in the world of computers, electronics, information technology, information management towards a good human and technology relationship. 3. Do computer professionals have special moral responsibilities that ordinary computer users do not have? If so, what are some of those special responsibilities? -Yes, they have. All professionals from computing technology field have a standard obligations in their respective moral responsibilities. Continue to do their job while applying ethical values and good morality. 4. Why is it useful to limit our discussion of moral issues affecting computer professionals to issues affecting software engineers and engineering teams, computer science instructor, and IT support professionals, as opposed to professionals such as lawyers and accountants who also use computers and why may work for computer organizations? - Because each profession have a different roles, therefore, each of that will have different approaches in moral issues, thus, moral issues are aiming for the good to fix all of it. 5. How do Gotterbarn, Miller, and Rogerson propose that we define the profession of software engineering? Who is included in a software engineering team? -These people believes that because of software engineers and their teams are responsibile for developing safety-critical systems, they have significant opportunities to do good or cause harm, enable others to do good or cause harm, and influence others to do good or cause harm. Therefore, Gotterbarn suggest that the role and responsibilities involved in the development of safety-critical systems is a different facter - Gotterbarn(2001).

Page 170: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 170

6. What are professional codes of ethics, and what functions do these codes serve? -Professional code are significant to professionals. These ethical roles is often designed to motivate an individual to behave in a certain ways like to inspire, guide, educate, and discipline. 7. List some of the benefits of professional code of ethics. Describe some of the criticism of these professional codes. -Helpful guidance and advice for individual in confronting situations that are morally complex. -Educating by the use of information to all the members of a professional field about their respective ethical responsibilities. -These codes have a disciplinary or penal functions. 8. Why does John Ladd believes that professional codes of ethics rest on a series of errors that are both intellectual and moral? Describe the arguments he uses to support his position. - He criticized that ethical codes slightly different grounds in arguing that all of these codes rest on a series of confusions. Both moral and itellectual side of a person are affected. The ethics for him consists of issues to be examined, discussed, explore, deliberated and argued. 9. Explain Don Gotterbarn's three-fold distinction: codes of ethics, codes of conduct, and codes of practice. Do Gotternbarn's distinctions help to eliminate any of the criticisms that have been raised against professional codes? -He forsee ethics as an "aspirational" meaning an individual wants to achieve something most especially for self-improvement.. This serves as a mission statements for a particular profession. Also provides vision and objectives. Yes, he helped to eliminate it because aspirational for an individual will take that person farther in life. This is the ultimate guide on professional codes. 10. How does the IEEE-CS/ACM Software Engineering Code of Ethics and Professional Practice improve on earlier professional codes? -It is the solution and guidance for all professionals in the field. This IEEE-CS is the improvement and very much effective for professionals. 11. Do computer professionals have presumed, or prima facie, obligation to loyalty to their employers? -I think for computer professionals, they have an obligation to loyalty and they must presume their respective obligation because people also will have a loyalty to you as a return. 12. Describe the arguments by Ronal Duska and John Ladd regarding employee loyalty. - Duska's arguments is common to be focusing only to a mutual relationship between the employer and employee. 13. What exactly is whistle-blowing? Acc. to Michael Martin, what are the three general approaches that have been taken in analysis of whistle-blowing cases? -Whistle blowing comes from the effort by individuals to get the public attention. Just like Star witness, Jun Lozada did during the ZTE Broadband deal issue. It is generally understood to occur when people will walk out in the organization and looking for light regarding the misconduct in the organization.

Page 171: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 171

-For Michael Martin, the act of whistle blowing is in condemned as an action taken by "disloyal troublemakers", "tragedy to be avoided" and unequivocally" that overrides all considerations. 14. Describe De George's criteria for determining when one is required to blow the whistle as opposed to when one is permitted to do so. Are De George's criteria useful in making this disticntion? 15. In which ways do Gene James and Kenneth Alpern disagree with De George's model for whitsle-blowing? -Gene suggested that it is good that whistle blow came from an individual and has a courage to do it. It is his/her moral obligation as a person living here on earth. Don't try to escape no matter what happens. You are accountable to the particular issue, therefore, clean your name as much as possible. 16. Describe John Ladd's argument in defense of De George's position on whistle -blowing. - They have arguments, for George, the position of whistle-blowing is a must in extraordinary event which people must have courage to do it. On the other hand, Ladd argues that it should be in a very special cases. 17. Why does Helen Nisssenbaum believe that the notion of accountability has been "systematically undermindes in the computer age"? How does she distinguish between accountability and responsibility? - The 3 aspect must be present, the responsibility, legal liability and accountability. In accountability, it is greater than responsibility because the extent of accountability is broad, unlike the responsibility, it is only a a feature of behaivior. 18. What does Nissenbaum mean by problem of "many hands" in a computing context? -There's a big problem regarding this particular issue, based on this chapter, particularly this content, it is difficult to determine who exactly, is accountable whenever one of these activity of safety-critical systems fails. Thus, this will result for blaming each other that they are not responsible and accountable for any failure. 19. Why does Nissenbaum believe that it is important to distinguish between moral accountability and legal liability? -In using accountability, it is a result where to avoid the tendency to think only at the level of individuals in matters typically associated with assigning moral responsibility. This means that accountable is much better than responsibility because it create such a powerful style when we say it and very much exact. 20. Acc. to Don Gotterbarn, what is required for a model of risk analysis to be adequate in the software development process for safety-critical systems? -He suggest that if software fails, that's the main problem of professionals, therefore, the ethical risks associated with the entire software development cycle will be much affected. He worries even though much attention has been paid to cost-effectiveness. It is for safety of the system.

Page 172: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 172

Assignment12: Sarbanes-Oxley Act Reaction paper. ITETHIC Francis T. Guison OOA Reaction Paper

Sarbanes-Oxley Act is an effective and formal act created by United States Federal law. The function of this act is to eliminate any inconsistency within the organization. Company's accounting department is one of the most vital and sensitive part of the company wherein they keep records of all financial transaction within the company. If inconsistency occured by the people involved in that area, there is something wrong with the company. That means, those people dishonestly doing their job. If this happens, it is considered to be the most greatest scandal in a company simply because, it involved the inconsistency of money. The company cannot avoid this kind of scenarios and naturally, it is already existed in the blood of man, to do good or bad. For morality, I think the conscience is the best way to avoid it. We have a freedom of choice to do a particular thing. The only enemy is yourself. That's the company's morality point of view.

Mr. Sia, introduced us a video involves the wearing a seatbelt while car in motion. The accident is obviously the most dangerous risk in our lives and we cannot avoid it either. Thus, this is Mr. Sia's analogy regarding the Sarbanes-Oxley act. From wearing a seatbelt, the analogy for that is to have a preventive action in the company. Like I said before, the company must always have a preventive actions so that each process must be productive and avoiding inconsistency is a big part of productivity. I can say, the analogy is good. Control is the key to success. Applying the Sarbanes-Oxley act for the companies here in the Philippines is very much effective because company will become productive in all ways. Honesty of people within the company is the best way to improve each conscience. To deliver high quality of service.

Honestly, I don't know anything about this before. But now, I was able to appreciate this act knowing that it is good for the corporate world. And since we are in the I.T industry, we have a great advantage that we include the business side. The business nowadays cannot exist without an Information technology department which is responsible for all technical matters. and improvement of business processes are also applied. Combining I.T and business will procure all objectives of the company overall, provided that conscience must be right all the time just like wearing seatbelt. Thanks to this seminar because we are able to open our eyes in the corporate world. Applying this act is the best key to success. Assignment13: Examples of how can you apply Noblesse Oblige in IT Side. Francis Guison ooa Noblesse Oblige 1.) As an I.T and Business student, I am oblige to do my task for helping other people with the use of my learnings and skills learned from my institution. 2.) As an IT Professional in future, I must share my learnings to the corporate world. Thus, my responsibilities must be capable enough to make my job more professionally competent. 3.) As an I.T Student, I should portray a good example to lower batch by sharing my knowledge with them like analysis and programming.

Page 173: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 173

CEMEX Case study ITETHIC Francis T. Guison OOA Mr. Paul Pajo CEMEX: Patrimonio Hoy Case Study

1. 1.) How did CEMEX fundamentally change the way it conducted its business? · CEMEX is one of the famous company manufacturers in the world. Because they are now

famous and a growing company, they want to give emphasis for improving the profitability by thinking ways of an effective efficient operations.

2. 2.) How does information systems contribute to CEMEX' competitive advantage? · Information System is one of the best feature and answer of a company for a fast and

transforming world today. Since this feature is so much powerful, it enables each business processes to become more productive and each operations transformed to be efficient. That's their competitive advantage.

3. 3.) What is social capital? How does CEMEX build social capital? · Social capital obviously came from social means. This is to provide people connections to each

other such as economics, public health, sciences, and etc. to be keep updated on these aspects.

· For CEMEX, they aim to have an high level customer relationship, aim to be more innovative and strengthen their markets around the globe. Through customer relationships, there will be a big opportunities to them.

4. 4.) How is the low-income savings characteristics of Mexican society characterized? · CEMEX created a savings program so called "Patrimonio Hoy" which enables low-income

people can afford the products of CEMEX. The aim of this program is to pursue social responsiveness to Mexican Societies.

5. 5.) How are the entrepreneurial characteristics of the women in Mexican society tied to the CEMEX BOP strategy?

· The CEMEX conduct a research about this topic. They concluded that woman is the key of financial savings in a family. Considering that Woman is entrepreneurial in nature, woman is much more money-savings oriented.

6. 6.) What did the CEMEX initial market research in Guadalajara discover?

The CEMEX research team conducted the ff: · The profiles of low-communities was very representative of most populated area in Mexico. The

CEMEX is losing stronghold knowing that nearly all houses are not yet finish, and the construction method of Guadalajara was different compared to other countries.

7. 7.) What is the role of socios in the Patrimonio Hoy system? How important are they in

the making the system successful? · The "socio" is a partner. A big challenge of CEMEX to build trust to the people. Given the

objectives of Patrimonio Hoy, it is good for all people / customers to be attracted to this kind of program. Many benefits will acquire as well. It will really a great help for a low-income customers.

Page 174: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 174

8. 8.) Why do you think it was important for CEMEX to position itself as a complete solutions

provider vs. just another product provider? · I think, CEMEX strategy was good for all of its customer because they provide everything what

is good for their business as well as for the people they are serving. It is considered as a complete solutions for helping people who are in need. Both of them gained advantage.

9. 9.) How is the social capital of Patrimonio Hoy promoters related to economic capital? · Both of these aspects are connected and aiming for one goal. 10. 10.) What, in brief, is the value of Patrimonio Hoy to a) it's promoter b) its socios &

partners c) its suppliers and d) its distributors?

· For promoter, since CEMEX has this program, it is also an alternative way of marketing their products to be advertise effectively to the customers.

· For Socios and partners, they will acquire / procure advantage and benefits to be a proud part of Patrimonio Hoy.

· For suppliers, adavantage for them because they are the source of the product and it is easier for them to make the product.

· For Distributor, once customer buys for them, a possible increase of income from them, and because it is CEMEX, customers who can afford can also support Patrimonio Hoy.

11. 11.) What is patrimonio? Why is this important for the marketing efforts for the Patrimonio Hoy system?

· Patrimonio is the capital asset of CEMEX. It is important because it is another promotional side of CEMEX that will really help people. Marketing will be much stronger and beneficial for them.

12. 12.) How can Patrimonio Hoy offer a slightly higher price than its competitors and maintain a competitive edge?

· They can offer affordable price for the customers who have trust with them. Therefore, these customers always rely on their product and always trust the name of CEMEX. That's why they can compete to other competitor in fairly.

13. 13.) How does the concept of freezing prices encourage socios to do more business for Patrimonio Hoy?

· Concept of freezing prices is good for the customer because they can afford it, and socios will gain advantage with it. Therefore, socios has an advantage and benefit to do more business for Patrimonio Hoy system.

14. 14.) Intuitively, doing with business with a low income group would be riskier than

traditional lending models but it is profitable for Patrimonio Hoy. Why? · Because as stated here, conducting business with low income population with no regular

stream of paychecks seems to be riskier. CEMEX's Patrimonio Hoy considering their risks are very low.

15. 15.) What is the role of peer/community pressure in the Patrimonio Hoy lending model? · In this model, it allows consumers to have more business with CEMEX as well as helping the

program of Patrimonio Hoy.

16. 16.) How has Patrimonio Hoy changed the consumer behavior in Mexico?

Page 175: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 175

· Because of Patrimonio Hoy, people thinks that this program made by CEMEX will help them especially for those people who want to build houses but in low budget. People continue to support this program because it is for them.

17. What are the challengs of the Patrimonio Hoy program? · Big challenges of Patrimonio Hoy are the retention of customers. They must retain customers

who are loyal to them for a longer period so that these customers will also support the program of CEMEX. Once these loyal customers are out, there's a possibility that Patrimonio Hoy system may not be retained as a program.

18. What does Construmex take advantage of the existing remittance market between U.S.A

and Mexico? · Construmex from U.S sent remittances home every week. It's an advantage for CEMEX to

continue the program and CEMEX must be proud of this Mexicans who are sending remittances. With these remittances, CEMEX or Patrimonio Hoy can provide good quality of houses.

19. CEMEX Philippines is exploring the possibility of replicating the Patrimonio Hoy system in

the Philippines. What are the parallels between the Mexican and the Philippine market? · I can say that replicating of Patrimonio Hoy here in the Philippines is a good way for helping

people who are living here. We have same condition with Mexicans and therefore, we need help for housing projects. For marketing, I think it is applicable because, firstly, our government needs investors another one is the purchasing buyer of upper and middle-class Filipinos is good.

· It is a great opportunity for us to acquire Patrimonio Hoy system here in the Philippines,

provided that Filipino's will not abuse this kind of system. We must make sure that both must help together for a stronger nation.

20. As an IT practitioner looking at the Construmex business model, what IT-driven systems

can you propose to make CEMEX more competitive? (name 10-15) · These are my proposal for an IT-Driven systems that will help CEMEX earn more profit:

1.) Delivery system (Fleet Management System) for cost-efficient transactions. 2.) E-Commerce 3.) Social Networking site for Patrimonio Hoy 4.) Customer Relationship Management 5.) Marketing system for more improvement

WIRED Francis Guison OOA How hard it is to implement? After reading the article about Kaminsky, I was amazed on what he did. As an I.T Student and a beginner to the network infrastructures, I can't imagine how to do this. Honestly, I'm clueless about this stuff. In short, it is hard to implement with my basic knowledge skills in network infrastructures. I have to admit that Kaminsky did was very much technical and obviously it is hard to implement. But, it's a good thing that he did it and therefore, many network enthusiasts will do the same. If there is a training program about this stuff, I am interested about it and willing to take it. Thanks to Kaminsky, the network connections even if you are in a paid wi-fi zone area are now free and broad. However, slow connections you wll be encountering.

Page 176: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 176

BCS Code of Conduct ITETHIC Francis Guison Partner: Reychele Buenavidez BS-IS Section O0A

• First Paragraph - S1-S4-S7-W1 • Second Paragraph-S1-S4-W4-W7 • Third Paragraph-S1-S2-W5-W6 • Fourth Paragraph-S1-S6-W1-W4

1. S1-S3-S5-S6-W2-W3-W6 2. S1-S3-W1-W3-W5 3. S6-W3-W6-W7 4. S1-S2-S4-W6-W4 5. S1-S2-W2-W6 6. S1-S4-W1 7. S3-S4-W2-W3-W5 8. S1-S2-S6-W4-W5-W6 9. S1-S4-W1-W2-W3 10. S2-S3-S4-W5-W6-W7 11. S1-S3-S6-W1-W3-W4 12. S1-S4-S5-W3-W6 13. S2-S5-S6-W1-W2-W3-W6-W7 14. S1-S2-S3-W1-W2-W5-W6 15. S2-S3-S4-S5-W4-W5-W6-W7 16. S2-S3-S5-W1-W3-W5-W6-W7 17. S1-S5-S3-W2-W6

Annapurna Salt StoryPublic Health and Enterprise ITETHIC Francis T. Guison OOA The Annspurna Salt Story: Public Health and Private Enterprise - Case Study 1. What is the role of NGOs (Non-Governmental Organizations) in BOP markets according to Prahalad? Do you agree with this position? Non-governmental organization role in the society is that they are the one who give solution to solve a particular problem pertaining to humanity related matter such as poverty, public health crises and other problem. Yes I agree in this position because NGO’s are really straight to the point in helping people who are in need. 2. According to Rekha Balu of Fast Company, "poor people ... can become just as discerning about brands as rich customer". Do you agree with this statement? Is this applicable in the Philippines? I’m neutral about this particular statement because not all poor people can discern a rich brand. Yes they have potential to buy those material things if and only if they work hard for it but for me, it’s more on

Page 177: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 177

materialistic side which is not correct and no point at all to chase rich people about this. Yes, It is applicable here because poor people just want to express that they are discerning about this topic. 3. What is the nature of the breakthrough of K15 Technology in your own words? K15 is technology that helps protect with macro or molecular encapsulation This technology would release an iodine only a very acidic environment therefore the environment of K15 is only limited as much as possible. 4. What are the issues/difficulties in branding something like salt according to Vishal Dhawan? The product branding is one of the difficulties in marketing. As a customer of course we want the best product for us therefore, the problem is that we want what is the best for us. Improvement of product must be an extensive factor for the company. 5. Why is the Annapurna evolution necessary according to Vishal Dhawan? Annapurna’s evolution is very important because the company will achieve a good response in their product as well as achieving good reputation to the people. The credibility of the product will really rely on people so that’s why the company must revolutionize their product for innovation. 6. What would the nature of the "differentiator" for Dr. Amitava Pramanik? The nature of “Differentiator” is to become different from other competitor. The company must have a so called special sauce so that they are considered to be unique for the eyes of the people. 7. What is the effect of advertising for the marketing strategy for Annapurna with K15? Naturally, advertising product is the most effective way to inform people about the product can be an informative or interactive way. For Annapurna with K15 advertisement, it is the most successful strategy to advertise their product provided all information about the benefits of K15. 8. What are the innovations of HLL with regards to transporting salt? The supply chain innovation is the answer of transporting their salt. One idea of transporting their product is to use Rail for a faster means of transportation. In this way, there will be an efficiency and productivity gained by the company. 9. What is Project Shakti and what are its goals? Shakti means strength in the language of Sanskrit. It is another project created by the company to focus and target individuals in the rural part of India. It is a Bottom of the pyramid initiated by the company. The goals are:

· Increasing power to reach rural markets · Increase the awareness about health. · Change attitudes regarding the usage of various product categories. · Promote wealthy society and give growth to the market.

10. How would you imagine SANGA, an "e-tailing program for daily ordering and delivery"? If you were its designer how would you describe it? If I am a designer, I would choose business process reengineering in delivering those products. And e-tailing via e-commerce is the best design for this process of ordering and delivery. It is the most efficient and effective way to meet customers in cloud computing technology.

Page 178: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 178

11. Project Shakti caters exclusively to men. There have been requests for men to becomeShakit dealers but HLL turned them down. If you were the decision-maker, would you allow men to become Shakti dealers? Why? For me, yes, I will allow men to cater Shakti because they have also strength like women. The good thing is that a woman has more convincing power than man and man can override with it. They only need a power of persuasion to convince the customer about the Shakti. 12. What is i-Shakti? As an IM student how can you improve i-Shakti? i-Shakti is an internet based where can you access information all about Shakti. As an IS student, I will improve the system and add more modules to it with cutting edge technology existing. The design of the system must be improved in accordance to i-Shakti. 13. HLL's would-be competitors decided to have a watch-and-wait policy. If you were a would-be competitor for HLL would you decide to get into HLL's market? Why? How? If I would be the competitor, and really desperate to overcome HLL, I would make a big step to compete by rival. I would sell my products cheaper but in high quality for the customers. 14. Should HLL keep their K15 technology proprietary? Why? Yes because it’s their main asset as a company. The people believe in them that’s why they continue to grow and become more productive. They increase their market shares, the more productive they are. 15. Do you think a program like Project Shakti would succeed in the Philippines? What do you think would be some of the anticipated difficulties?. Project like Shakti would succeed here in the Philippines. First, our government needs an investor and part of that, there should also a BOP initiated by the company for the Filipino people. Many people specially in rural areas of the Philippines can adopt project Shakti and gain more benefit and advantages for the company and for the people. Privacy and Encryption Questionnaire ITETHIC Francis Guison OOA 1. Who is Bruce Schneier? Why is he noteworthy?

• An expert internationally known as a security technologist and author. Entitled to him as a "Security Guru" where people always rely on his critic all about security. He is the ultimate source person on how securities really work. The Applied cryptography is a popular work for cryptography, therefore, he is considered noteworthy about his work

2. In your own words, describe TwoFish

• It is a very key schedule that uses key for both processes. It is a special key that modifies encryption of algorithm.

3. In your own words, describe Blowfish

• Also known as Cipher, A special and good encryption rate in software and no effective cryptanalysis up to now. An encryption and decryption algorithm like TwoFish but in cipher terms,

4. In your own words, what are the similarities between TwoFish and Blowfish?

Page 179: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 179

• Firstly, they are both developed by Bruce Schneier. The features are the same but Blowfish has no effective cryptanalysis, means that there are no techniques in decoding messages.

5. In your own words, what are the differences between TwoFish and Blowfish?

• Blowfish has a 64-bit block size and variable key lengths also there are no cryptanalysis for this cryptography, however in TwoFish, has a 128 bits block size. TwoFish was not selected for standardize cryptanalysis.

6. In your own words, what is the Advanced Encryption Standard or AES?

• Advanced Encryption Standard. Currently using by the U.S government to standardize comprises three block cipher.

7. In your own words, what is Rijndael? *

• Slightly slower than TwoFish. It was chosen to be an AES the standard and original published standard.

8. Why do you think Rijndael was chosen as the AES? *

• Its good for standardisation. Another thing is that it is more reliable other than cryptanalysis. A good Advance Encryption Standard.

9. Who is Phil ZImmerman? Why is he noteworthy? *

• He developed PGP, Pretty Good Privacy. His encryption software is good because it focuses on emails. That makes him noteworthy.

10. What is PGP? Why is it noteworthy? • Pretty Good Privacy. Provides a Cryptographic privacy and authentication. Encrypting and

Decrypting email to increase security of email information. With this module, it allows the security and avoidance of leaking emails in web.

CSR Social Responsibility CSR Social Entrepreneurship

Mr. Benjamin Quinones gave us a talk about social entrepreneurship last Friday. At first, I have no idea about this topic because it talks about Entrepreneurship. I have different point of view every time I heard this word. It’s more on business aspect. But when I heard the word “CSR” or Corporate Social Responsibility which is related to our ITETHIC class, I became interested with this talk. Mr. Benjamin explained to us the importance of Corporate Social Responsibility in Entrepreneurship. How these two aspects relate to each other and how does it work together.

The fact is that there are few entrepreneurs nowadays because technology is building a big change for the society. Unlike the old days, it is vice versa, because human making a difference for the community and humans are working hard for that change. As a result, more people became an entrepreneur. Mr. Benjamin encourage us today to make a change for the community because he thinks that we are responsible enough to create something different for the world and since technology existed, we have more opportunity and advantage to make entrepreneurship better.

He started his talk by identifying what is an Entrepreneur? According to him, entrepreneur is basically a person who creates something new for the society. It is an individual who envisions and seeks to have a difference and change for the society. It is most likely a businessman / businesswoman who seeks for a profit but it depends on them how it goes. Based on Mr. Quinones, there are two types of Entrepreneurs; an entrepreneur’s that seeks and strive hard to engage a profit. If a business person who seek just for the sake of profit, he/she is considered to be a type 1 entrepreneur who just entering entrepreneurship just for the sake of making a profit and earn lot of money or Profit-centered type. The

Page 180: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 180

type two of entrepreneurship is not all entrepreneurs are all relying on profit they earned, but also they can earn profit and at the same time, thinking a good way to have a cause for the community or this is called social entrepreneur. These two types are powerful because you’re the only one who controls your money and it’s your decision to make use of that money in a good or in personal way. If I have the opportunity to choose from these two types, I will choose the second type simply because I’m earning profit and at the same time, I can help other people who are unprivileged. Of course, I cannot do that first because I need to study hard to commend that objective.

Corporate Social responsibility is considered as a big mark for a company wherein they seek for a true change for the good of others. I can say that entrepreneurship is one and the best way to make a change for the society. Entrepreneurs are motivators because people look at them a professional, a true leader, and making a good relationship with them. I like Mr. Ben Quinones did for the Indian people. A great example to make a change for the betterment of their lives. Solidarity based community is a good aspect to strive hard for a change. Having solidarity between the communities is a great challenge for them. But, the big problem is that, Filipinos today has a concept of “Kanya-kanya” meaning each individual Filipino has an own way of thinking and no matter what happens; it conflicts to other people minds. As a result, they can’t meet a particular goal and assumption. It’s a bad thing for us. There’s a big chance for us to change all we need to do is to have solidarity.

For the conclusion, we live here on earth not just for ourselves. The meaning why we live here is how much we help other people. When we die, firstly, we cannot bring our millions or billions in heaven and God will not ask about your money. It’s just a material or instrument that makes the world move. But the true meaning of life is how we can bring a legacy to the people. As an I.T student, my goal is to link technology and business to help other people who are in need. Jaipur Foot Case Study Questions Jaipur Foot Case Study Questions 1. What is the innovation of Jaipur Foot? The innovation of Jaipur Foot is so much affordable which cost only for $30. Considered as a lifestyle of the poor people within that place. The artificial limbs provided by Bhagwan Mahaveer Viklang Sahayata Samiti uses Jaipur Limb Technology.- Source 2. What is the business of Jaipur Foot? The mission of Jaipur Foot is to provide a cheap and affordable prosthetic foot. The target customers are the low class people who are unfortunate to afford it. 3. Who are the main beneficiaries of Jaipur Foot's products? The beneficiaries of this products are the Amputees who are in lower class. 4. Why is Afghanistan one of the markets of Jaipur Foot? Because people in Afghanistan can afford these products. Also, lot of people get amputated . 5. How does Jaipur Foot's product pricing compare with the West? Th western people can afford this product immediately because they are rich.

Page 181: ITETHIC Reader [FINAL] by Francis T Guison

Information Technology Ethics Reader

S.Y 2008-2009 3rd Term

By: Francisco T. Guison Page 181

6. What is the Gait Cycle? This type of cycle will determine how people walk. Determining the time consumed of a person movement. 7. How was the first Jaipur Foot artificial limb developed? Made from wood and rubber. Artificial limb that can eeffectively help disabled people walking. 8. What are the design considerations in the Jaipur Foot Design Process? The design process of Jaipur foot is very unique and easy to deal with. This will help people particularly the poor ones to avail the prosthetic foot. 9. What are the constraints in the development for Jaipur Foot? The main constraint in the development of this product are the changes need to be applied in the innovation of the next product lines 10. How can you compare the raw materials for Jaipur Foot vs. other products? The raw material of the company is trying its best to innovate its product in a way that the products are to be marketed in a variation of buyers. 11. Explain a typical fitting day for a Jaipur Foot? How does it compare with the West? The fitting day of Jaipur Foot is typical and for distribution, the product distributed in wide range in the western side. 12. What is the BMVSS? How does Jaipur Foot conduct community outreach? Bhagwan Mahaveer Viklang Sahayata Samiti is an Non-government organization. This NGO makes innovative designs for the the innovations to the design of the prosthetic in partnership with ISRO. 13. Compare Jaipur Foot with Ossur - which one is more competitive? Why? For me, Jaiour Foot is the one competitive in the market. Given that it is supported by NGO, this product still have a promotional activity while it is part of NGO 14. Is the Jaipur Foot model scalable? Explain. Yes, it is scalable, it is good for the people that's why it is scalable. 15. What is the significance of Jaipur Foot's cooperation with ISRO? Indian Space Research Organisation Cooperation or ISRO together with Jaipur Foot is said to be important in the production and expansion of the product in terms of marketing and promotion.