Beruflich Dokumente
Kultur Dokumente
Version 2
Created by:
Chino S. Apoloni
PREFACE
1
This second book of mine was done in a complex way. It
is complex because this term is overloaded. The time
when I was doing this book is also the time that I had a
lot of projects and thesis. With all of those challenges that
confronted me, still I was able to finish my second book. I
was able to manage my time very well because of the
help of my family, friends and God. It was really a
pleasure for me to do this book. This book is very
important for me because it helps and affects the people
around the world. There are a lot of lessons and issues
that you will learn as you read this book. I would like to
thank Mr. Paul Pajo because he once again, gave me an
opportunity to create and annotate another book about
Ethics.
2
DEDICATION
Family
3
TABLE OF CONTENTS
Preface p.2
Dedication p.3
4
The Fortune at the
Bottom of the Pyramid
5
Chapter 1: The Market at the bottom of the pyramid
Learning expectations:
Review:
In this chapter, the topic is about the sector at the bottom of the pyramid.
The sector that I am talking about is the poor people. As said in the book,
there are 4 billion people who belong or who are in that sector. Also stated in
the book that aside from them having a 4 billion population, they only gain
$2 per day. With that statement, yes, there really is poverty on that area or
into that place. I cannot imagine where and what you can eat with that $2
per day money. With that, I assume that many children do not have the
capacity to study. It is because of the poverty spreading all over the sector,
which for me is a thing or a matter which should be prioritized. Education is
one of the most important activities a child or a human being must do. It will
affect their life positively when a particular person or a human is well
educated. For me, I value education very well. I think that when you are
educated, you can pursue your dreams. You can live and have a great
lifestyle. So with that, to sum up my review, at this point in time, there
should be a better approach which should help the poor people who are at
the bottom of the pyramid. The government should now move and to their
tasks. They should identify opportunities, innovations so that these people in
the sector should rise up and become equal as to what an ordinary people is
doing or aspiring.
Lessons learned:
6
• The pyramid structure
Integrative questions:
Learning expectations:
Review:
In this chapter, the topic is about the products and services for the bottom
of the pyramid sector. As I have said in the previous chapter, the people at
the bottom of the pyramid are really at risk. They are in need because they
are so plenty and at the same time they do not have money. The
government should move and prioritize them. With that, as C.K Prahalad
stated, the bottom of the pyramid sector can be a viable growth market.
There can be many opportunities founded there. Also, C.K Prahalad taught
the 12 principles of innovation for the bottom of the pyramid markets. There
should be price performance, Innovation hybrids, scale of operations, eco-
friendly developments, functionalities, process innovation, work deskilling,
7
education of customers, infrastructures interfaces, distribution and
conventional wisdom for products and services. With that, I can say that it
really is an opportunity that should be done in that sector. What we need is
the government support, the government giving financial support. Another
thing that we need is cooperation from companies, industries and the market
itself. The last thing that we need to complete the process is the cooperation
of the people there. The more people that will help the faster will be the
development. To sum it all up, the key word is “cooperation”. It will be the
key to overcome the crises that is happening at the bottom of the pyramid. If
all of those said participants will do their duty or tasks, then definitely there
will be a change.
Lessons learned:
• 12 principles of innovation
Integrative questions:
• What is an interface?
Learning expectations:
8
Review:
In this chapter, the topic is about the global opportunities available for the
people at the bottom of the pyramid. As stated in the book, there are
reasons why there are global and market opportunities at the bottom of the
pyramid sector. First is that BOP markets are large and attractive and they
can be a stand-alone entities. Many local innovations can be done across the
Bop markets. They are also to find applications in developed markets. Lastly,
lessons from the BOP markets can influence the management practices of
global firms. Definitely it is good news for the people at the bottom of the
pyramid. All they have to do is cooperate so that development will be in a
faster manner. I have an example with regards to the development of a
place like the story of BOP. In our market place here in Pasig City, during the
early years, according to the old people I know, they told me that the Pasig
City market is like Divisoria. It is a smelly place with a very crowded person
and every store is unorganized. As time passes by, due to the cooperation of
the Pasig City government and the market industry, the Pasig City market
undergoes renovation. The places were cleaned, re-built, stores were
arranged accordingly and people who sell and buy were lectured on how to
maintain the place. This goes the same for the BOP sector. If they will follow
and cooperate the same as to our Pasig market, then they will have no
problem to encounter.
Lessons learned:
• Capital intensity
Integrative questions:
9
Library Reference: N/A
Learning expectations:
Review:
In this chapter, the topic is about Ecosystem. From wikipedia, the term
ecosystem refers to the “combined physical and biological components of an
environment. An ecosystem is generally an area within the natural
environment in which physical factors of the environment together along
with interdependent organisms”. In this chapter, it is not only the term
ecosystem which is fully talked about, another concept talked about is the
market-oriented ecosystem. Based from my understanding, a market-
oriented ecosystem is a binding between the private sector, the people at
the bottom of the pyramid and the social actors. What I meant by bind is that
they act together, they create wealth together for the development of the
people bottom of the pyramid. A concrete example of a market-oriented
ecosystem is Divisoria. In that said place, vendors are all over. Even if they
are plenty, they bind, they work together for all of them to survive
financially. For me, that can be a market-oriented ecosystem. As long as
everyone helps, as long as everyone cooperates, there will be a continuous
improvement and development for all of them. To end up or to sum up this
case, the key words for people at the bottom of the pyramid are cooperation,
perseverance and motivation. Those words are the ones which will lead them
to growth and survival. I just hope that not only the people at the bottom of
the pyramid are the ones who are cooperating, but also the government,
private sectors and every community globally.
Lessons learned:
• Opportunities at BOP
• Ecosystem at BOP
10
Integrative questions:
• What is ecosystem?
• What is asymmetry?
Source:
http://en.wikipedia.org/wiki/Ecosystem
Learning expectations:
Review:
11
these assumptions, they will have a hard time to rise up. To sum up and to
end the story, government officials should reduce poverty and corruption.
Instead of them being bad and corrupt, they should help the people to rise
and survive. They need the help of these politicians so that there will be no
more poor people in the future. Everything will be equal.
Lessons learned:
• Corruption
• eSeva
Integrative questions:
• What is corruption?
• What is eSeva?
• What is TGC?
Source:
http://en.wikipedia.org/wiki/Political_corruption
Learning expectations:
Review:
12
In this chapter, the topic is about development or social transformation.
Social transformation, from wikipedia is the “process by which an individual
alters the socially ascribed social status of their parents into a socially
achieved status for themselves. However another definition refers to large
scale social change as in cultural reforms or transformations. The first occurs
with the individual, the second with the social system”. Social transformation
is one or can be the most difficult thing a person can do in his life. That is
from my point of view. I said that because things, talking about “big things”
which will change our whole life due to that decision. It is like turning from
grade school to college. That is how far the milestone could be in making a
big decision like that. Relating it to the story, for the people at the bottom of
the pyramid, they will have a long transition time if their place will be
developed. It can be because of the traditional things that they do. With this
development, those things that they do traditionally cannot be done
anymore. What they need is time. They will need a longer time for transition
because it is not that easy to change from one pace to another.
Lessons learned:
• E-Choupal
• Importance of contributors
Integrative questions:
• What is e-Choupal?
• Can it be solved?
Source:
http://en.wikipedia.org/wiki/Social_transformation
13
The Handbook of
Computer and
Information Ethics
14
Chapter 1: Foundation of Information Ethics
Learning expectation:
Review:
This chapter talks about the introduction to Information Ethics. Based from
wikipedia, Information ethics is "the field that investigates the ethical issues
arising from the development and application of information technologies. It
provides a critical framework for considering moral issues concerning
informational privacy, moral agency , problems arising from the life-cycle of
information Information Ethics is related to the fields of computer ethics and
the philosophy of information. Dilemmas regarding the life of information are
becoming increasingly important in a society that is defined as "the
information society". Information transmission and literacy are essential
concerns in establishing an ethical foundation that promotes fair, equitable,
and responsible practices. Information ethics broadly examines issues
related to ownership, access, privacy, security, and community. Information
technology affects fundamental rights involving copyright protection,
intellectual freedom, accountability, and security. Professional codes offer a
basis for making ethical decisions and applying ethical solutions to situations
involving information provision and use which reflect an organization’s
15
commitment to responsible information service. Evolving information formats
and needs require continual reconsideration of ethical principles and how
these codes are applied. Considerations regarding information ethics
influence personal decisions, professional practice, and public policy."
In this chapter, what was talked must about was the RPT model. RPT stands
for resource, product and target model. The RPT model is useful to explain
why any technology that radically modifies the “life of information”. There
are four stages that composes the RPT model. IE as an information resource,
IE as an information product, IE as an information environment and IE as a
macroethics. To sum it all up, information ethics is important in our lives. It is
important because it contributes a lot to the society. As said by wikipedia, it
promotes fairness, equity and responsible practices.
Lessons learned:
- RPT model
- Information ethics
Integrative questions:
- What is R in RPT?
- What is P in RPT?
- What is T in RPT?
Reference:
16
http://en.wikipedia.org/wiki/Information_ethics
Learning expectation:
Review:
This chapter briefly talks about the history of computer ethics. Based
from the reading, the foundation of computer ethics was unintentional. It was
founded during the world war two. The ethical issues that
Norbert Wiener analyzed were computer ethics topics that are still of interest
today. They are computers and unemployment, computers and security,
computers and learning, computers for persons with disabilities, computers
and religion, information networks and globalization, virtual communities,
teleworking, the responsibilities of computer professionals, the merging of
human bodies andmachines, “agent” ethics and artificial intelligence. For
me, all of these topics are relevant and very important. They are very
important because they are rules which any person should abide with or
follow. There can be consequences if a rule is to be intercepted.
Aside from Norbert Wiener, there are different perspectives and people in
the foundation of computer ethics. They are Walter Maner, Deborah Johnson,
James Moor and Donald Gotterbarn. To sum it all up, whoever's theory is to
be read, the point is that we should follow the right or we should follow the
rules behind information ethics. It is important to have privacy, security,
integrity and credibility when using our computers. Another reason/s why we
should follow information ethics is for us not to be hacked by any other user.
Our works or creation should not be hacked and plagiarized by any other
human. For me, we should not only follow the rules in information ethics, we
should follow the ten commandements of computer ethics.
Lessons learned:
17
- reasons to know information ethics
Integrative questions:
Reference:
the-handbook-of-information-and-computer-ethics.pdf
Quote: “the very possibility of moral thought and judgment depends on the
provision of a suitable supply of moral principles”
Learning expectation:
Review:
This chapter talks about computer ethics. Based from the book, Computer
ethics is a form of applied or practical ethics. It studies the moral questions
that are associated with the development, application, and use of computers
and computer science. For me, this is a good matter to study specially that
we are into Information Systems. These concepts of computer ethics will
provide us vital data that will guide us through our career. Next term to be
discussed is applied ethics. For me, what i have understand about applied
ethics is that it is an ethics that you know and then you do it actually.
Whatever is the rule that you read or understand, you will apply it when you
go out. Another term discussed was generalism. What i have understand in
18
generalism is that we treat fairly all the rules that we know. It is not only
about the rules that you know. For me, even if you are not familiar with a
certain provision or rule, still you should follow it and treat it equally. That is
the meaning of it for me. Next term discussed was particularism. For me, this
is in contrast with generalism. Why is it in contrast? It is in contrast because
in particularism, you follow or you only apply the ethic or the conduct that
you think is correct. You do not treat it fairly. Whatever you know, that is the
only conduct that you will follow and apply. It is opposite with generalism. To
sum it all up, we should apply ethics in our everyday lives. We should always
apply the good and correct acts so that we will not violate anything.
Lessons learned:
- applied ethics
Integrative questions:
- What is generalism?
- What is particularism?
source:
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
19
Review:
This chapter briefly talks about Value Sensitive Design. Based from the
book, Value Sensitive Design is a theoretically grounded approach to the
design of technology that accounts for humanvalues in a principled and
comprehensive manner throughout the design process. In this process, there
are three stages. For me, this concept is important for people and end-users
to fully understand the system. Design is an important matter because it
determines the willingness of the viewer if he or she would be using the
system because of its functions. If a design it not well made, then might as
well it will not be like by a lot. Nowadays, design is becoming critical. If the
design is not good, eye catching or unique, then expect that the users will
not go through or visit your website. That is how critical a design is in
Information Systems. Another term discussed in this chapter is value. From
wikipedia, value denotes "something's degree of importance, with the aim of
determining what action or life is best to do or live, or at least attempt to
describe the value of different actions. It may be described as treating
actions themselves as abstract objects, putting value to them. It deals with
right conduct and good life, in the sense that a highly, or at least relatively
highly, valuable action may be regarded as ethically good , and an action of
low, or at least relatively low, value may be regarded as bad". To sum it all
up, we should value the things that we do. We should value it because it
reflects our personality. The way we develop things. It is an important tool
for users and viewers.
Lessons learned:
- value
Integrative questions:
- What is value?
source:
20
http://en.wikipedia.org/wiki/Value_(ethics)
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
For me, this really is an important matter. The topic being focused is on
rights. We should all value intellectual property in respect with the person
who owns. This chapter also talked about property rights.Property rights are
important in two ways according to this chapter. One is by controlling and
manipulating objects be it tangible or intangible, we have the right to claim
it. It will be our measure of our freedom. Second is our personality becomes
21
infused with an object. The right to claim the work is very important to our
personality.
Lessons learned:
- intellectual property
- property rights
Integrative questions:
- What is rule-utilitiarianism?
source:
http://en.wikipedia.org/wiki/Intellectual_property
the-handbook-of-information-and-computer-ethics.pdf
Quote: “we will have to admit that we always have some degree of privacy,
since there will always be billions of people who have physically restricted
access to us.”
Learning expectation:
Review:
This chapter talks about privacy. Based from wikipedia, privacy is the
"ability of an individual or group to seclude themselves or information about
themselves and thereby reveal themselves selectively.The boundaries and
22
content of what is considered private differ among cultures and individuals,
but share basic common themes. Privacy is sometimes related to anonymity,
the wish to remain unnoticed or unidentified in the public realm. When
something is private to a person, it usually means there is something within
them that is considered inherently special or personally sensitive. The
degree to which private information is exposed therefore depends on how
the public will receive this information, which differs between places and
over time. Privacy is broader than security and includes the concepts of
appropriate use and protection of information."
In this chapter, not only the generic privavy was taught. Informational
privacy was taught. Again, based from wikipedia, Data privacy refers to "the
evolving relationship between technology and the legal right to, or public
expectation of privacy in the collection and sharing of data about one's self.
Privacy concerns exist wherever uniquely identifiable data relating to a
person or persons are collected and stored, in digital form or otherwise." For
me, whatever perspective of privacy you know, just do what is right. Do not
let yourself get into situations where you can be liable to court for damages.
Do the right thing so that you will not be in danger. The lesson learned here
is for you to respect your own individual. Whether it is information, sexual or
political privacy, still it is PRIVACY. Just respect. Period.
Lessons learned:
- privacy
- types of privacy
Integrative questions:
- What is privacy?
source:
http://en.wikipedia.org/wiki/Privacy#Informational
the-handbook-of-information-and-computer-ethics.pdf
23
Chapter 7: Online Anonymity
Learning expectation:
Review:
Now, this chapter talks about online anonymity. What is online anonymity?
Based from my research in wikipedia, Anonymity is "without a name or
namelessness. In colloquial use, anonymous typically refers to a person, and
often means that the personal identity, or personally identifiable information
of that person is not known. Anonymity is a result of not having identifying
characteristics disclosed. This can occur from a lack of interest in learning
the nature of such characteristics, or through intentional efforts to hide these
characteristics. An example of the former would include a brief encounter
with a stranger, when learning the other person's name is not deemed
necessary. An example of the latter would include someone hiding behind
clothing that covers identifying features like hair color, scars, or tattoos, in
order to avoid identification."
Lesson learned:
- anonymity
Integrative questions:
24
- What is anonymity?
source:
http://en.wikipedia.org/wiki/Anonymity
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
This case talks about three topics. These topics are hacking, hacktivism
and counter hacking. Let us start with the first term. Based from wikipedia,
Hacking refers to the "re-configuring or re-programming of a system to
function in ways not facilitated by the owner, administrator, or designer. The
terms have several related meanings in the technology and computer
science fields, wherein a hack may refer to a clever or quick fix to a
computer program problem, or to what may be perceived to be a clumsy or
inelegant solution to a problem." Next term is hacktivism. From wikipedia,
Hacktivism is the "nonviolent use of illegal or legally ambiguous digital tools
in pursuit of political ends. These tools include web site defacements,
redirects, denial-of-service attacks, information theft, web site parodies,
virtual sit-ins, virtual sabotage, and software development. It is often
understood as the writing of code to promote political ideology - promoting
expressive politics, free speech, human rights, or information ethics. Acts of
hacktivism are carried out in the belief that proper use of code will be able to
25
produce similar results to those produced by regular activism or civil
disobedience." The last term discussed is counter hacking.
For me, these first two terms are the most fatal events that can occur to
the world of information technology. These acts can really destroy an
organization. These acts can destroy the credibility of a company or a person
itself. What i can say is that we users should be very careful on our acts
when we use the internet. We should be careful what sites we visit and make
sure you dont make any online enemies. Get your firewall up and scan your
computer often. These can be the basic rules so that our information cannot
be stolen by anyone. We should always focus and be careful on what we do.
Lessons learned:
- hacking
- how to counter it
- hacktivism
Integrative questions:
- What is hacking?
- What is hacktivism?
source:
http://en.wikipedia.org/wiki/Hack_(technology)
http://en.wikipedia.org/wiki/Hacktivism
the-handbook-of-information-and-computer-ethics.pdf
Quote: “exposing someone to data might not provide that person with
information”
26
Learning expectation:
Review:
This case talks about Information Ethics and the Library Profession. I do
not have an idea on how they are related in the first place. From wikipedia,
the definition of library is a "collection of sources, resources, and services,
and the structure in which it is housed; it is organized for use and maintained
by a public body, an institution, or a private individual. In the more
traditional sense, a library is a collection of books. It can mean the collection,
the building or room that houses such a collection, or both. Public and
institutional collections and services may be intended for use by people who
choose not to or cannot afford to purchase an extensive collection
themselves, who need material no individual can reasonably be expected to
have, or who require professional assistance with their research. In addition
to providing materials, libraries also provide the services of librarians who
are experts at finding and organizing information and at interpreting
information needs."
For me, what is meant by library here are yahoo, google, wikipedia and
many more. They are the public libraries because anyone can easily research
an information that they want. Whatever age you are, wherever you live, you
can access all of these engine browsers. The problem is that with this easy
access on them, children can be exposed to violent, sexual and maliciuous
issues. For me, that is the relation of computer ethics to these libraries. We
need to apply computer ethics onto these engine browsers so that the
mindless or the children should not be exposed to the said topics. They can
be prevented or prohibited.
Lessons learned:
Integrative questions:
- What is library?
27
- How are they related?
source:
http://en.wikipedia.org/wiki/Library
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
This case talks about free and open source software. Based from my
research in wikipedia, Free and open source software is "software that is
liberally licensed to grant the right of users to use, study, change, and
improve its design through the availability of its source code. This approach
has gained both momentum and acceptance as the potential benefits have
been increasingly recognized by both individuals and corporate players. Free
is intended to refer to the freedom to copy and re-use the software, rather
than to the price of the software. The Free Software Foundation, an
organization that advocates for free software, suggests that to understand
the concept, one should think of free as in free speech, not as in free beer.
Free and open source software is an inclusive term which covers both free
software and open source software which, despite describing similar
development models, have differing cultures and philosophies. Free software
focuses on the philosophical freedoms it gives to users while open source
focuses on the perceived strengths of its peer-to-peer development model."
For me, there is nothing wrong with developing a free and open source
software. It is because money is not an important factor here. The important
factor here is your contribution to the people who are in need of it. Generally
it is your contribution to the whole society. For me, that is the most
important reason for a programmer or developer to build a software. It will
28
be a big boost to your career if those users or people will like your creation.
That is one thing for sure.
Lesson learned:
Integrative questions:
source:
http://en.wikipedia.org/wiki/Free_and_open_source_software
the-handbook-of-information-and-computer-ethics.pdf
Chapter 11: Internet Research Ethics: The Field and Its Critical Issues
Learning expectation:
Review:
This case talks about Internet Research Ethics. Based from wikipedia,
Internet research ethics "involves the research ethics of social science,
humanities and scientific research carried out via the Internet." From the
book. Internet research ethics is an "emerging multi and interdisciplinary
field that systematically studies the ethical implications that arise from the
use of the Internet as a space or locale of, and/or tool for research." In this
29
case, the three sources of Internet research ethics was also discussed. There
are three sources of IRE. One is professional ethics. This included the codes
for computer related courses. Second is the social sciences and the
humanities. Philosophers need to study humanities who used online as
amateur artists or authors who are using their creative mind to produce a
work that has a need for copyright protection for people who will be copying
their work. Third is the growing body of information and computing ethics.
We all know that there are issues that need to be answered regarding moral
ethics in having new information technology.
For me, to sum it all up, we should not just copy and paste works from the
net. If we want to copy, then we must source it out. We must include
reference and quotes to justify our work. We should be educated and
disciplined very well about this matter. It is because this is a serious matter
that may lead to plagiarism. It is important that we should be unique of what
we do. People are all unique. We have our own creativity. We should learn
and develop from that.
Lesson learned:
- IRE
Integrative questions:
source:
http://en.wikipedia.org/wiki/Internet_research_ethics
the-handbook-of-information-and-computer-ethics.pdf
30
Learning expectation:
Review:
This case talks about two terms. Privacy and confidentiality. From
wikipedia, Privacy is the "ability of an individual or group to seclude
themselves or information about themselves and thereby reveal themselves
selectively. The boundaries and content of what is considered private differ
among cultures and individuals, but share basic common themes. Privacy is
sometimes related to anonymity, the wish to remain unnoticed or
unidentified in the public realm. When something is private to a person, it
usually means there is something within them that is considered inherently
special or personally sensitive. The degree to which private information is
exposed therefore depends on how the public will receive this information,
which differs between places and over time. Privacy is broader than security
and includes the concepts of appropriate use and protection of information."
From wikipedia, Confidentiality has been defined by the International
Organization for Standardization as "ensuring that information is accessible
only to those authorized to have access and is one of the cornerstones of
information security. Confidentiality is one of the design goals for many
cryptosystems, made possible in practice by the techniques of modern
cryptography."
For me, privacy and confidentiality are both important and significant for
all. They determine the safety of us users, developers or programmers
depending on how we created the Information System. For me, that is where
health comes in. If people are always being hacked, then what i can say is
that the programs that they use are not healthy. It is not healthy because
their identites are not secured. It will have a bad effect to the organization if
their softwares are not healthy. That is how i relate health and ethics to this
case study.
Lesson learned:
- Privacy
- Confidentiality
Integrative questions:
- What is privacy?
31
- What is confidentiality?
source:
http://en.wikipedia.org/wiki/Privacy
http://en.wikipedia.org/wiki/Confidentiality
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
- To know CSR
Review:
32
the public sphere. Business would proactively promote the public interest by
encouraging community growth and development, and voluntarily
eliminating practices that harm the public sphere, regardless of legality."
For me, these terms that i have discussed are all very important. They are
important because it will or it can affect the many. A corporation or any
business should apply these terms that i have discussed. It will be a big
boost or a big impact on their line of business because they affect the
people. Whatever their actions are, good or bad, it refelcts everyone. Not
only to the company, but to all people who are inside it. We should know our
goals and objectives. We should know our mission and vision.
Lesson learned:
- CSR
- Business ethics
Integrative questions:
- What is CSR?
source:
http://en.wikipedia.org/wiki/Business_ethics#What_is_Business_Ethics
http://en.wikipedia.org/wiki/Corporate_social_responsibility
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
- Information responsibilites
33
Review:
This case talks about responsibilities for Information on the Internet. From
wikipedia, An Internet service provider , also sometimes referred to as an
Internet access provider, is a company that offers its customers access to
the Internet. The ISP connects to its customers using a data transmission
technology appropriate for delivering Internet Protocol datagrams, such as
dial-up, DSL, cable modem, wireless or dedicated high-speed interconnects.
ISPs may provide Internet e-mail accounts to users which allow them to
communicate with one another by sending and receiving electronic
messages through their ISP's servers. ISPs may provide services such as
remotely storing data files on behalf of their customers, as well as other
services unique to each particular ISP. Based from the book, the transactions
and procedures that occurs through the internet are good. I agree with that. I
agree with that because in this generation, almost all information or data you
need are already posted in the net. It is just one click away for you to get
what you want. The problem only is that we are not responsible for our
actions. What am i saying? Whenever we get something from the net or from
google, we do not source it out. We do not put quotes. That can result to
plagiarism. To sum it all up, we users should know the provisions when using
the internet. We should follow all guidelines so that we will not be sued by
the management. It is important so that we will not be liable for our
wrongdoings. We should be creative and unique.
Lesson learned:
- Information responsibilities
Integrative questions:
- What is ISP?
source:
http://en.wikipedia.org/wiki/Internet_service_provider
34
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
In this chapter study, the topics being talked about are Virtual Reality and
Computer simulation. For me, they are new terms. Before we start, let us
define virtual reality. Based from my research in wikipedia, Virtual reality is a
"term that applies to computer-simulated environments that can simulate
places in the real world as well as in imaginary worlds. Most current virtual
reality environments are primarily visual experiences, displayed either on a
computer screen or through special stereoscopic displays, but some
simulations include additional sensory information, such as sound through
speakers or headphones. Some advanced, haptic systems now include tactile
information, generally known as force feedback, in medical and gaming
applications. Users can interact with a virtual environment or a virtual
artifact either through the use of standard input devices such as a keyboard
and mouse, or through multimodal devices such as a wired glove, the
Polhemus boom arm, and omnidirectional treadmills. The simulated
environment can be similar to the real world." The next definiton to be
defined is computer simulation. From wikipedia, A computer simulation, is a
"computer program, or network of computers, that attempts to simulate an
abstract model of a particular system. Computer simulations have become a
useful part of mathematical modeling of many natural systems in physics,
astrophysics, chemistry and biology, human systems in economics,
psychology, and social science and in the process of engineering new
technology, to gain insight into the operation of those."
For me, virtual reality and computer simulation are all good. They are
good because they are unique, they are all very fast and all of them are
useful. The problem is that it will be harmful to minors and to those who are
35
studying due to its being addictive. What i can say is that to those who will
be involving into virtual realities and computer simulation, they should all be
careful so that their studies would not be affected by the games or
application of the said terms. It is alright to play, for as long as you have your
limitations.
Lessons learned:
- virtual reality
- computer simulation
Integrative questions:
source:
http://en.wikipedia.org/wiki/Virtual_reality
http://en.wikipedia.org/wiki/Computer_simulation
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
36
This case study talks about the relation of Information Technology to
Science. The topic focuses more about gentics. From wikipedia, Genetics, a
"discipline of biology, is the science of heredity and variation in living
organisms. The fact that living things inherit traits from their parents has
been used since prehistoric times to improve crop plants and animals
through selective breeding. However, the modern science of genetics, which
seeks to understand the process of inheritance, only began with the work of
Gregor Mendel in the mid-nineteenth century. Although he did not know the
physical basis for heredity, Mendel observed that organisms inherit traits via
discrete units of inheritance, which are now called genes." Whati can say is
that Information Technology and Science are related. They are related in the
sense that scientists can do its experiment as fast as they can because of
the technology or gadget that they use. It is now very fast and easier to
perform. The problem with this is that some of the scientists use the
technology for cloning, DNA testing and many more, which for me is
unethical because we do unjust things to them. We do unjust things to
human beings or to animals. For example, a person kills a dog. The reason
why that dog died is because the cells are needed by a scientist for cloning.
In my opinion, that is so unethical because we risk lives just to make an
experiment. How and what about the value of that animal? Before we
perform such things, we should take note of all the risks of doing an act.
There is/are consequences for every wrong action that is done.
Lesson learned:
- relation of IT to Science
Integrative questions:
- What is genetics?
source:
http://en.wikipedia.org/wiki/Genetics
the-handbook-of-information-and-computer-ethics.pdf
37
Chapter 17: The Ethics of Cyber Conflict
Learning expectation:
Review:
This case study talks about cyber conflict. As technology grows by, people
who have mastered the use of computers have the power to do unethical
things. The unethical things that i am talking to are the creation of cookies
and viruses. From wikipedia, A computer virus is a "computer program that
can copy itself and infect a computer. The term virus is also commonly but
erroneously used to refer to other types of malware, adware, and spyware
programs that do not have the reproductive ability. A true virus can only
spread from one computer to another when its host is taken to the target
computer; for instance because a user sent it over a network or the Internet,
or carried it on a removable medium such as a floppy disk, CD, DVD, or USB
drive. Viruses can increase their chances of spreading to other computers by
infecting files on a network file system or a file system that is accessed by
another computer." From wikipedia, A cookie is a "small piece of text stored
on a user's computer by a web browser. A cookie consists of one or more
name-value pairs containing bits of information."
With these said things and problems, we should now be careful when we
use the computer. We should make sure that our software is always secured
with anti-virus. Our internet should always be protected. Our anti-virus
program should always be updated so that it will be in good strength to block
viruses. Aside from that, whenever we are visitng sites, we should be careful
when and when not to give our identities to websites. It is because some of
that website can be hackers. Once we give our full identification, then it may
be the start of their harm to our personal computer.
Lesson learned:
Integrative questions:
- What is a virus?
38
- What is a cookie?
source:
http://en.wikipedia.org/wiki/Computer_virus
http://en.wikipedia.org/wiki/HTTP_cookie
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
This chapter talks about risk management. In this chapter, the cycle in risk
assessment had also been talked about. Based from wikipedia, Risk
management can therefore be considered the "identification, assessment,
and prioritization of risks followed by coordinated and economical application
of resources to minimize, monitor, and control the probability and/or impact
of unfortunate events or to maximize the realization of opportunities. Risks
can come from uncertainty in financial markets, project failures, legal
liabilities, credit risk, accidents, natural causes and disasters as well as
deliberate attacks from an adversary. Several risk management standards
have been developed including the Project Management Institute, the
National Institute of Science and Technology, actuarial societies, and ISO
standards. Methods, definitions and goals vary widely according to whether
the risk management method is in the context of project management,
security, engineering, industrial processes, financial portfolios, actuarial
assessments, or public health and safety."
39
For me, as an Information Systems student, we should really give focus or
we should really give priority when handling risks. It is because risks can or
may cause the downfall of our Information Systems. For us to prevent that,
we should always first, identify the risk. We should identify the risk so that
we would know how to handle a particular risk. Next step is to analyze the
risk. We should create a plan on how we can prevent that risk. The last step
for me is to evaluate the risk. For me, evaluate is to monitor the status of
that particular risk. After we have identify and analyze, it is time for us to
track whether the risk has been subtracted or lessened. It is important for
every Information System so that we would not have expensive costs during
the run time.
Lesson learned:
Integrative questions:
source:
http://en.wikipedia.org/wiki/Risk_management
the-handbook-of-information-and-computer-ethics.pdf
Quote:
“the Internet is not spoken about only as a type ofmedium but often as a
living space in which people work, play, shop, socialize, and so on. So to
some extent the argument about controls on Internet content has shifted a
little. Although there is still discussion of pornography, hate language, and
40
the like, there is also discussion of, for example, controlling Internet
gambling and downloadingmusic and movies. So the discussion now is partly
of Internet activity and partly of Internet content.”
Learning Expectation:
Review:
In this chapter of the book they said that “Internet governance is the
development and application by Governments, the private sector and civil
society, in their respective roles, of shared principles, norms, rules, decision-
making procedures, and programs that shape the evolution and use of the
Internet” which for me means that the internet is really important for all the
people because the internet is one of their source of income, information,
and a lot more. It is said that in effective regulation there are two broad
issues regarding the regulation of the content on the Internet: can content
on the Internet be regulated effectively, and should it be regulated. They
have also discussed about across boarders and they have said that Individual
countries, or political entities within countries, apart from blocking, can also
control content through legislation, and this can be relatively effective in
certain circumstances despite the fact that the Internet crosses national
borders. Consider the recent example of Internet gambling in the U.S. Online
gambling has been prohibited in the U.S., but at least one prominent
gambling business, Party Gaming, is based on Gibraltar, where it isimmune
from U.S. legislation.
For me, whatever our position is, high or low, we should be ethical when
using the internet. We should not take advantage when using it. We should
not use our power or we should not exercise our power over it. The internet
is for all. It is for equal purposes. That is why we should respect and be
disciplined.
Lessons Learned:
Integrative Questions:
41
- What is Censorship?
source:
the-handbook-of-information-and-computer-ethics.pdf
Quote:
Learning Expectation:
- Information Overload
- Advantages
- Disadvantages
Review:
42
Toffler posited information overload as having the same sorts of effects, but
on the higher cognitive functions, writing. More and more people are
considered to be active writers and viewers because of their participation.
This flow has created a new life where we are now in danger of becoming
dependent on this method of access to information. Therefore we see an
information overload from the access to so much information, almost
instantaneously, without knowing the validity of the content and the risk of
misinformation."
For me, I think that Information overload only arises when we are
memorizing. Because when we memorize, sometimes we tend to get
pressured if whether or not we can do it. Unlike if we understand, we do not
have to memorize. With just one snap, we already know and can apply the
concept. When we get to be tired and pressured on memorizing, that is the
time information overload comes. We should understand the concept, not
memorize.
Lessons Learned:
- Information Overload
Integrative Questions:
- What does it mean to have too much information, and, for that matter?
- What exactly is this substance we can apparently have too much of?
source:
http://en.wikipedia.org/wiki/Information_overload
the-handbook-of-information-and-computer-ethics.pdf
43
Chapter 21: Email Spam
Quote:
"This technique has been tried, and some prominent domestic spammers
have been arrested. However, this has not eliminated the problem of spam
email. One problem is that state or national laws, unlike the Internet, do not
reach across political boundaries. Spammers can effectively avoid anti spam
laws. Another problem is the definitional problem we have discussed
previously. Furthermore, when spammers spoof return addresses or use
drones, this complicates prosecution of the true source of the spam emails."
Learning Expectation:
- Email Spam
- Advantages
- Disadvantages
Review:
In this chapter they have discussed about Email Spam. They said that email
spam is also known as junk mail. Some of the junk mails are virus. Email
spam is an example of a spoiling of the commons; email spammers exploit
the economic model of Internet email and the relative openness of email
protocols. NF-UCBE shifts the cost of advertising to email recipients, who
must clear out advertisements for products they have no interest in. F-UCBE
uses the Internet to defraud victims. The ethical case against F-UCBE is
straightforward, and the people who are responsible for F-UCBE are
condemned. An ethical analysis of NF-UCBE is more nuanced, since the
economic incentives of current email arrangements make NF-UCBE
attractive.
The end- users or external users of an email should be very careful especially
in reading emails that we don’t know if who the recipient is because if we
open it there are a lot of possibilities that your email would face. There are
other spam emails that are asking for money, and telling that you won for a
certain game when in fact you did not join in that game, the others they use
to send you a junk mail so that you will give them information and they can
use it illegally.
44
Lessons Learned:
- span
- junk in e-mail
Integrative Questions:
- Is spam harmful?
- What is a spam?
source:
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
This chapter talks all about the concept of plagiarism. So, what is
plagiarism all about? Is it good or not? Based from wikipedia, Plagiarism, is
the use or close imitation of the language and thoughts of another author
and the representation of them as one's own original work. Within academia,
plagiarism by students, professors, or researchers is considered academic
dishonesty or academic fraud and offenders are subject to academic
censure, up to and including expulsion. In journalism, plagiarism is
considered a breach of journalistic ethics, and reporters caught plagiarizing
typically face disciplinary measures ranging from suspension to termination
of employment. Some individuals caught plagiarizing in academic or
journalistic contexts claim that they plagiarized unintentionally, by failing to
45
include quotations or give the appropriate citation. While plagiarism in
scholarship and journalism has a centuries-old history, the development of
the Internet, where articles appear as electronic text, has made the physical
act of copying the work of others much easier. Plagiarism is not the same as
copyright infringement. While both terms may apply to a particular act, they
are different transgressions.
For me, based from the research, we should get in touch with this kind of
activity. It is because you do not create good image to the school, to the
community or to the company. You should be unique when doing something.
You should not copy others work because it definitely looses your image. If
you really want to copy that, you source it out. You should quote it from your
source. Each individual has their uniqueness. We should exercise that
uniqueness within us instead of us cheating and copying others work.
Lesson learned:
- effect of Plagiarism
Integrative questions:
- What is Plagiarism?
source:
http://en.wikipedia.org/wiki/Plagiarism
the-handbook-of-information-and-computer-ethics.pdf
Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File
Sharing
Learning expectations:
46
- to know what Online sharing is
Review:
In this case study, the topic talked about was online file sharing. Based
from wikipedia, File sharing is the "practice of distributing or providing
access to digitally stored information, such as computer programs, multi-
media, documents, or electronic books. It may be implemented through a
variety of storage, transmission, and distribution models and common
methods of file sharing incorporate manual sharing using removable media,
centralized computer file server installations on computer networks, World
Wide Web-based hyperlinked documents, and the use of distributed peer-to-
peer networking. File sharing is not in and of itself illegal. However, the
increasing popularity of the mp3 music format in the late 1990s led to the
release and growth of Napster and other software that aided the sharing of
electronic files. This in practice led to a huge growth in illegal file sharing:
the sharing of copyright protected files without authorization."
For me, it is good and at the same time, bad to have an online file sharing.
It is good because it can help students to learn in a fast pace. Students can
learn easily and fast if documents are to be uploaded on an educational
basis. Meanwhile, it is bad it will be used for profit. An example of this would
be limewire. This would be bad if a person will download songs from limewire
and at the same time, that person will burn and sell the pirated songs to the
black market. That can be the downfall for file sharing. So for me, we should
use it in an educational way or use it in a good way.
Lesson learned:
Integrative questions:
- What is P2P?
47
source:
http://en.wikipedia.org/wiki/File_sharing
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
For me, censorship is really one of the best practices that we should follow
on. It is because our personality, identity and all information are secured. If
there will be no censorship, then hackers must be all over the globe. I have
an example for censorship. When a user creates an account on facebook,
friendster, twitter, linkedin, yahoomail, gmail and many more, we usually
provide our own passwords. We are provided by usernames and passwords.
For me, that is the censorship. We our restricted to view and to know only
our personal accounts. We are not to know the accounts of the other people
for security purposes.
Lesson learned:
48
- advantage of censorship
Integrative questions:
- What is censorship?
source:
http://en.wikipedia.org/wiki/Censorship#Internet_censorship
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
In this case study, the topic is all about gender. The topic mostly focused
about feminist ethics. So, what is feminist ethics? For me, it is again, a new
term. Based from the Standford Encyclopedia of Philosophy, Feminist Ethics
is an "attempt to revise, reformulate, or rethink traditional ethics to the
extent it depreciates or devalues women's moral experience. Among others,
feminist philosopher Alison Jaggar faults traditional ethics for letting women
down in five related ways. First, it shows less concern for women's as
opposed to men's issues and interests. Second, traditional ethics views as
trivial the moral issues that arise in the so-called private world, the realm in
which women do housework and take care of children, the infirm, and the
elderly. Third, it implies that, in general, women are not as morally mature or
deep as men.Feminists have developed a wide variety of gender-centered
approaches to ethics, each of which addresses one or more of the five ways
49
traditional ethics has failed or neglected women. Some feminist ethicists
emphasize issues related to women's traits and behaviors, particularly their
care-giving ones. In contrast, other feminist ethicists emphasize the political,
legal, economic, and/or ideological causes and effects of women's second-
sex status. "
For me, I really do not understand how the feminist ethics is related to
computer ethics or Information Technology. In my point of view, there should
be no gender issue for this matter. Whether you are male or you are female,
if you commit mistake, then you are liable for it. There are consequences for
every wrong act that we do. That is why for me, there should be no gender
issue in the computer world.
Lesson learned:
- Feminst ethics
Integrative questions:
- What is Cyberstalking?
source:
http://plato.stanford.edu/entries/feminism-ethics/
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
50
In this case study, the topic that was talked about was Digital Divide. What
is it? For me, it is a new term. Based from wikipedia, The digital divide is the
"gap between people with effective access to digital and information
technology and those with very limited or no access at all. It includes the
imbalances in physical access to technology as well as the imbalances in
resources and skills needed to effectively participate as a digital citizen. In
other words, it is the unequal access by some members of society to
information and communication technology, and the unequal acquisition of
related skills. The term is closely related to the knowledge divide as the lack
of technology causes lack of useful information and knowledge. The digital
divide may be classified based on gender, income, and race groups, and by
locations. The term global digital divide refers to differences in technology
access between countries or the whole world."
For me, this gap that they are referring to in this case study can be erased
with the use of this digital divide. I have said that because everything is
connected with technology. With that, the poor and the rich can be
connected literally and figuratively. Figuratively because there are a lot of
computer shops. How much do we pay to rent a computer for one full hour?
It is very cheap. Why not use the computer shop if these poor people cannot
buy their own personal computers? That is my point. It does not need wealth
to connect the rich and the poor. Every will has a way.
Lesson learned:
- Digital Divide
Integrative questions:
- What is ICT?
source:
http://en.wikipedia.org/wiki/Digital_divide
51
the-handbook-of-information-and-computer-ethics.pdf
Learning expectation:
Review:
For me, this is an important matter because we deal with a lot of cultures.
A lot of cultures that will or that may affect the world wide web. We should
respect each and every culture so that there will be no conflict onto the
world wide web. Let us follow the ten commandments of the computer, let us
respect the traditions of each and every race. It is important for us to have
ethics so that there would be no harm, there would be no discriminations on
the internet. An example of this would be plagiarism. If you really have
ethics, then you should not copy others activity or work, or if you really want
to copy it, then make sure to source it out so that there would be no conflict.
Lesson learned:
52
- IIE
Integrative questions:
- What is IIE?
source:
http://en.wikipedia.org/wiki/Information_ethics
the-handbook-of-information-and-computer-ethics.pdf
53