0% found this document useful (0 votes)
214 views

Computerized Ethics: Reviews On The Book Entitled "The Handbook of Information and Computer Ethics"

Compilation of Reflections of the Book entitled "The Handbook of Information and Computer Ethics"

Uploaded by

Nel Mateo
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
214 views

Computerized Ethics: Reviews On The Book Entitled "The Handbook of Information and Computer Ethics"

Compilation of Reflections of the Book entitled "The Handbook of Information and Computer Ethics"

Uploaded by

Nel Mateo
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Running Head: Computerized Ethics 1

Computerized Ethics
Reviews on the book entitled "The Handbook of Information
and Computer Ethics"

Alberto Nel R. Mateo V


De La Salle-College of Saint Benilde

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0


Philippines License.
Running Head: Computerized Ethics 2

Table of Contents
DEDICATION 4

PREFACE 5

CHAPTER 1: FOUNDATION OF INFORMATION ETHICS 6

CHAPTER 2: MILESTONES IN THE HISTORY OF INFORMATION AND COMPUTER


ETHICS 7

CHAPTER 3: MORAL METHODOLOGY AND INFORMATION TECHNOLOGY 9

CHAPTER 4: VALUE SENSITIVE DESIGN AND INFORMATION SYSTEMS 10

CHAPTER 5: PERSONALITY-BASED, RULE-UTILITARIAN AND LOCKEAN


JUSTIFICATIONS OF INTELLECTUAL PROPERTY 11

CHAPTER 6: INFORMATIONAL PRIVACY: CONCEPTS, THEORIES AND


CONTROVERSIES 12

CHAPTER 7: ONLINE ANONYMITY 13

CHAPTER 8: ETHICAL ISSUES INVOLVING COMPUTER SECURITY: HACKING,


HACKTIVISM, AND COUNTERKACKING 14

CHAPTER 9: INFORMATION ETHICS AND THE LIBRARY PROFESSION 15

CHAPTER 10: ETHICAL INTEREST IN FREE AND OPEN SOURCE SOFTWARE 16

CHAPTER 11: INTERNET RESEARCH ETHICS: THE FIELD AND ITS CRITICAL
ISSUES 17

CHAPTER 12: HEALTH INFORMATION TECHNOLOGY: CHALLENGES IN ETHICS,


SCIENCE, AND UNCERTAINTY 18

CHAPTER 13: ETHICAL ISSUES OF INFORMATION AND BUSINESS 19


Running Head: Computerized Ethics 3

CHAPTER 14: RESPONSIBILITIES FOR INFORMATION ON THE INTERNET 20

CHAPTER 15: VIRTUAL REALITY AND COMPUTER SIMULATION 21

CHAPTER 16: GENETIC INFORMATION: EPISTEMOLOGICAL AND ETHICAL


ISSUES 22

CHAPTER 17: THE ETHICS OF CYBER CONFLICT 23

CHAPTER 18: A PRACTICAL MECHANISM FOR ETHICAL RISK ASSESSMENT—A


SODIS INSPECTION 24

CHAPTER 19: REGULATION AND GOVERNANCE OF THE INTERNET 25

CHAPTER 20: INFORMATION OVERLOAD 26

CHAPTER 21: EMAIL SPAM 27

CHAPTER 22: THE MATTER OF PLAGIARISM: WHAT, WHY AND IF 28

CHAPTER 23: INTELLECTUAL PROPERTY: LEGAL AND MORAL CHALLENGES


OF ONLINE FILE SHARING 29

CHAPTER 24: CENSORSHIP AND ACCESS TO EXPRESSION 30

CHAPTER 25: THE GENDER AGENDA IN COMPUTER ETHICS 31

CHAPTER 26: THE DIGITAL DIVIDE: A PERSPECTIVE FOR THE FUTURE 32

CHAPTER 27: INTERCULTURAL INFORMATION ETHICS 33


Running Head: Computerized Ethics 4

Dedication

This book is dedicated to all the people that have helped me in order to produce this output:

First is to my parents who shoulder the expenses of this book.

Second, is to my ITEHTICS classmates that help me to have meaningful ideas, through


their different opinions during discussions, to be written in this book.

Lastly, is to myself, which is the main source of all the inputs of this book through my
perseverance and determination that I was able to finish it and do it with all my best.
Running Head: Computerized Ethics 5

Preface

It is been a very critical question as to how people would differentiate and be able to identify
which is right or wrong. That is why there is a study of right and wrong. It is called ethics. In this
material, it focuses on the Information technology and computer issues that we are encountering at our
times. Even so, these problems are still worth seeing because there is a need to do so. This may involve
critical points that can help our society to be better in terms of decision-making. This material is mainly
an understanding of the author on how he perceives those moral problems. He takes a certain stand
point to better explain the different arguments so that it would be easier to understand them. Thus, it
can only mean that this reading is basically the point of view of the author to those moral issues.

So why not explore the world of information technology issues then try to think about it and see
it for yourselves. It may give you a better idea as to why our society is like this and at the same time
having a practice of critical thinking which a characteristic of a rational being.
Running Head: Computerized Ethics 6

Chapter 1: Foundation of Information Ethics

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Human are special moral agents."

What I expect to learn:


I expect to learn about the foundation of Computer Ethics.

Review:
The founder of this new philosophical field was the American scholar Norbert Wiener, a
professor of mathematics and engineering at MIT. During the Second World War, together with
colleagues in America and Great Britain, Wiener helped to develop electronic computers and other new
and powerful information technologies. While engaged in this war effort, Wiener and colleagues created
a new branch of applied science that Wiener named “cybernetics” (from the Greek word for the pilot of
a ship). Even while the War was raging, Wiener foresaw enormous social and ethical implications of
cybernetics combined with electronic computers.
Consequently, information and communication technology (ICT) has affected — in both good
ways and bad ways — community life, family life, human relationships, specific term “computer ethics”
has been used to refer to applications by professional philosophers of traditional Western theories like
utilitarianism, Kantianism, or virtue ethics, to ethical cases that significantly involve computers and
computer networks. “Computer ethics” also has been used to refer to a kind of professional ethics in
which computer professionals apply codes of ethics and standards of good practice within their
profession.

What I have learned:


 Importance of Information Ethics

Integrative Questions:
 What are the applications of information technology?
 How to use to pass on or application of information technology
 What is information technology?
 Define the ethics of information technology?
 Which computer experts apply codes of information technology?
Running Head: Computerized Ethics 7

Chapter 2: Milestones in the History of Information and


Computer Ethics

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "To live well, human beings must be free to engage in creative and flexible actions that maximize
their full potential as intelligent, decision-making beings in charge of their own lives."

What I expect to learn:


I expect to learn about moral ideals and some ethical principles.

Review:
The academic field of computer ethics was born accidentally and almost by chance in the middle
of the Second World War. At that time, philosopher scientist Norbert Wiener was working with a group
of scientists and engineers who were involved with him in the creation of digital computers and radar,
and the creation of anew kind of antiaircraft.
According to Wiener (1985), in order to analyze and try to resolve information ethics problems,
there should be nexus of existing principles and laws.
Information Ethics includes:
1. Recognize an ethical question or case regarding information technology into society.
2. Clarify an ambiguous or vague ideas or principles that may apply to the case or issue in question.
3. If possible, apply already existing ethically acceptable principles, laws, rules and practices that
govern human behavior in the given society.
4. If ethically acceptable, precedents, traditions and policies are insufficient to settle the question or
deal with the case, use the purpose of a human life plus the great principles of justice.
The birth and growth of a discipline is cooperation among critical mass of scholars as well as the
creation of courses to teach, conferences to attend, research center for planning and conducting
research projects, and journals and other places to publish the results of the research.
Since 1985, computer and information ethics developments have exponentially reproduced with
new conferences and conference series, new organization, new research centers, new journals and
textbooks.
Compared to many other scholarly regulations, the field of computer and information ethics is
very young. Wiener’s insights were far ahead of everyone else.
In thermodynamics theory and cosmology, we would probably resist that the redecoration of
our moral lives is a human aspect of the universe. Larry Lessig and Peter Singer have achieved for our
thinking about, respectively, converging technologies, freedom in the age of the internet and animal
rights has no counterpart in the purely academic world.

What I have learned:


 Academic of Computer Ethics
Running Head: Computerized Ethics 8

Integrative Questions:
 When was the academic of computer ethics born?
 How a discipline does starts and grows?
 How can the second goal be achieve?
 What does information ethics includes?
 What is needed in order to analyze and resolve an information ethics problem?
Running Head: Computerized Ethics 9

Chapter 3: Moral Methodology and Information Technology

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Computer Ethics is a form of applied or practical ethics."

What I expect to learn:


I expect to learn the uses of moral values in the field of Information Technology.

Review:
Walter Maner observed that the ethical queries and problems considered in his Medical Ethics
course at Old Dominion University often became more complicated or considerably changed when
computers got involved. Sometimes the addition of computers, it seemed to Maner, actually generated
completely new ethics problems that would not have existed if computers had not been invented. He
concluded that there should be a new branch of practical ethics similar to already existing fields like
medical ethics and business ethics; and he decided to name the proposed new field “computer ethics”.
This chapter exhibits that IT morals are to be created or examined just as any other field of
technology and ethics. There are certain divergences as well such as the machines or methods used. But
the bottom line is, it is still just as we examine engineering, industrialism etc. Walter Maner wanted to
create a separate branch to answer the many questions addressed to computer ethics.
IT deals with the use of electronic computers and computer software to alter, store, guard,
process, convey, and securely recover information. Presumably, when speaking of Information
Technology (IT) as a whole, it is noted that the use of computers and information are associated.

What I have learned:


 Computer Ethics as a new field of study.

Integrative Questions:
 What is the moral method of IT?
 What are the principles of information technology?
 What is noted when speaking of information technology as whole?
 What is the database of information technology?
 What are the prospects in moral methods of IT?
Running Head: Computerized Ethics 10

Chapter 4: Value Sensitive Design and Information Systems

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Value refers simply to the economic worth of an object."

What I expect to learn:


I expect to learn concepts regarding Computer Ethics.

Review:
Value Sensitive Design is concern with designing of technology with the need of having to
consider the human values. But what is value? Value is commonly defined as a worth for an object, in
this chapter, value means something that is important for people.
Value Sensitive Design is a theoretically grounded approach to the design of technology that
accounts for human values in a principled and comprehensive manner throughout the design process. It
employs an integrative and iterative tripartite methodology, consisting of conceptual, empirical, and
technical investigations.
I think this Value Sensitive Design is a good concept, but I think the design could be more of the
artistic side of the designer. We don’t need too much information to design for information systems. It is
also mentioned on the book that this value sensitive design uses iterative development lifecycle.

What I have learned:


 Computer Ethics as a new field of study.

Integrative Questions:
 What is Value Sensitive Design?
 What is Value?
 What does Value Sensitive Design employs?
 What manner does Value Sensitive Design implies?
 What are the elements of Value Sensitive Design methodology?
Running Head: Computerized Ethics 11

Chapter 5: Personality-Based, Rule-Utilitarian and Lockean


Justifications of Intellectual Property

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: " Intellectual property is generally characterized as nonphysical property that is the product of
cognitive processes and whose value is based upon some idea or collection of ideas."

What I expect to learn:


I expect to learn range of moral and legal concerns about intellectual property

Review:
The enough and as good condition principles protects Locke's labor justification from any
attacks asserting that property introduces immoral inequalities. Essentially the enough and as good
condition is an equal opportunity provision leading to a desert-based, but noncompetitive allocation of
goods: each person can get as much as he is willing to work for without creating competition against
others.
The general outline of Locke's property theory is familiar to generations of students. In Chapter
V of the Second Treatise of Government, Locke begins the discussion by describing a state of nature in
which goods are held in common through a grant from God. God grants this bounty to humanity for its
enjoyment but these goods cannot be enjoyed in their natural state. The individual must convert these
goods into private property by exerting labor upon them. This labor adds value to the goods, if in no
other way than by allowing them to be enjoyed by a human being. "First possession" forms the basis for
legal title and believes that this is the heart of Locke's position. Locke proposes that in this primitive
state there are enough unclaimed goods so that everyone can appropriate the objects of his labors
without infringing upon goods that have been appropriated by someone else. Although normally
understood as descriptive of the common, the enough and as good condition also is conceptually
descriptive of human beings.

What I have learned:


 Strategies for justifying intellectual property rights

Integrative Questions:
 What fairly can be reduced to belongings?
 What is the partial capacity of humans put a natural ceiling?
 How much each individual may suit through labor?
 What is the condition forbids the accumulation?
 What are the conditions there are no good reasons for not surrendering property rights in
possessions?
Running Head: Computerized Ethics 12

Chapter 6: Informational Privacy: Concepts, Theories and


Controversies

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Privacy protects the interest individuals have in “sustaining a personal space, free from
interference by other people and organizations."

What I expect to learn:


I expect to learn about concepts about privacy

Review:
Here, some key concepts theories and controversies affecting un-informational privacy are
being discussed.
The concept of privacy demand recognition of our right to privacy, privacy is not simple a static
concept, instead, it has a dynamic concept that is basic and thus capable of standing on its own.
Volkman (2003) argues that matters of privacy can be sufficiently accounted for by unpacking
our natural rights to life, liberty and property.
The restricted access theory limits or controls others from access to information about her. This
theory recognizes the importance of zones and contexts that need to be established to achieve
informational privacy.
In analyzing, the principal focus is on controversies affecting informational privacy.

What I have learned:


 Informational privacy

Integrative Questions:
 What is the concept of privacy demand recognition?
 Where do matters of privacy be accounted?
 What is restricted access theory?
 What does restricted access theory recognizes?
 What is the principal focus on all analysis?
Running Head: Computerized Ethics 13

Chapter 7: Online Anonymity

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Anonymity can also be brought about in a variety of ways and there are many purposes, both
positive and negative, that anonymity could serve, such as, on the positive side, promoting free
expression and exchange of ideas, or protecting someone from undesirable publicity or, on the negative,
hate speech with no accountability, fraud or other criminal activity."

What I expect to learn:


I expect to learn about the concept of anonymity

Review:

Anonymity plays a large part in information privacy. Some people use this privilege of going
online under the cloak of anonymity in good faith. Sometimes, other people can just go online and send
messages to any body and the receiver and sender could never find out about each other. It is therefore
unclear if multiple such messages have been sent by the same sender or if they have the same intended
recipient. In this case, it may be useful for the person to establish a unique identifier, called a
pseudonym, with the other entity. Examples of pseudonyms are nicknames, credit card numbers,
student numbers, bank account numbers, and IP addresses. A pseudonym enables the other entity to
link different messages from the same person and, thereby, the maintenance of a long-term
relationship. Although typically pseudonyms do not contain personally identifying information,
communication that is based on pseudonyms is often not classified as "anonymous", but as
"pseudonymous" instead. This can occur from a lack of interest in learning the nature of such
characteristics, or through intentional efforts to hide these characteristics. An example of the former
would include a brief encounter with a stranger, when learning the other person's name is not deemed
necessary. An example of the latter would include someone hiding behind clothing that covers
identifying features like hair color, scars, or tattoos, in order to avoid identification. In some cases,
anonymity is reached unintentionally, as is often the case with victims of crimes or war battles, when a
body is discovered in such a state that the physical features used to identify someone are no longer
present.

What I have learned:


 Concept of anonymity

Integrative Questions:
 Why a person might choose to obscure their identity?
 What are the benefactors do not wish?
 For whatever reason do people keep on going online?
 What is Anonymity?
 Why are many illegal reasons to hide behind anonymity?
Running Head: Computerized Ethics 14

Chapter 8: Ethical Issues Involving Computer Security:


Hacking, Hacktivism, and Counterkacking

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Aggressive measures are not likely to conduce to the protection of the victim in any reasonably
sophisticated attack."

What I expect to learn:


I expect to learn about moral ideals and some ethical principles.

Review:

I don’t even know where to begin with the ethical issues involving computer security because
there are so many of them. Let me just clear up that there is a thing called ethics if you guys out there
are not familiar because ethics should be inclined with what you are doing in life. A condition where you
can apply this is with your life alone. If you tend to do things without thinking about ethical concerns the
you are screwed up because in the first place, we need some guidelines to follow knowing that freedom
is not absolute for if it is, then we will all be bombing each other’s countries arguing who should have
own. Intense concern with my files and my terminal occurred to me after reading this chapter because it
made me realize that there are so many people that can just hack your private files even when your
computer is shut off – yes, it does happen – so I made a promise to myself that I have to be more careful
with where I place my files, how I move them, how strong I encrypt them and how accessible they are
because you will never know what might happen. We cannot really attack someone just because we
think he or she hacked us because hacking is a skill that people master first before doing it big and
publicly so a mere knowledge about computers like opening programs and deleting files is not enough.
Knowledge about IP addresses, ports, cables, LAN, and other network related functions of your
computer should be well thought of and watched because it can be their access point.

What I have learned:


 Some concerns about hacking

Integrative Questions:
 What is Hacktivism?
 What is hacking?
 Enumerate the communal benefits of benign intrusions.
 Is Hacktivism proper?
 What is The Active Response Spectrum?
Running Head: Computerized Ethics 15

Chapter 9: Information Ethics and the Library Profession

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Librarianship as a distinct profession, however, is relatively a recent development."

What I expect to learn:


I expect to learn the connection between Information Ethics and Library Profession.

Review:

Libraries are organized depositories of documents have existed at least from the time of the
Sumerians.
According to Dowell 2002, librarianship is a distinct profession. With the advent of the printing
press, collections of works became larger and more complex, thus creating a greater need for someone
devoted to organizing and cataloging such collections.
Moral Quality would have been included in what the librarian should be evaluating. Librarians
ought to evaluate works based on their possible “moral teaching or effect”
Enabling maximal intellectual freedom might imply providing access to all legally available
information. Public library collection should fit with the needs of its users, but this solution is not the
panacea that it might appear to be.
Librarians must take selections, but on so doing, they face the possibility of personal or political
bias entering into the process.
Librarians continue today to see their central value as the promoting of intellectual freedom.
Those who promote the values face many challenges. Librarians respond to the fact of social injustice
within the society it serves.

What I have learned:


 Librarian as a source of information

Integrative Questions:
 What is a Library?
 What are the principles of information technology?
 What is noted when speaking of information technology as whole?
 What is the database of information technology?
 What are the prospects in moral methods of IT?
Running Head: Computerized Ethics 16

Chapter 10: Ethical Interest in Free and Open Source


Software

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "The distinction between Free Software and Open Source Software has had a positive effect on
the software development community and on the larger online community as well."

What I expect to learn:


I expect to learn the concept of Free and Open Source Software.

Review:

I found something very interesting about free software and open source software in Wikipedia
which I intend to put here as my explanation for this chapter. it is interesting because there is a part of it
in the Wikipedia where in free and open source are being criticized as something too different to
compare. Here is Open Source against Free Software as explained in Wikipedia: Critics have said that the
term “open source” fosters an ambiguity of a different kind such that it confuses the mere availability of
the source with the freedom to use, modify, and redistribute it. Developers have used the alternative
terms Free/open source Software (FOSS), or Free/Libre/open source Software (FLOSS), consequently, to
describe open source software which is also free software. Open source software and free software are
different terms for software which comes with certain rights, or freedoms, for the user. They describe
two approaches and philosophies towards free software. Open source and free software (or software
libre) both describe software which is free from onerous licensing restrictions. It may be used, copied,
studied, modified and redistributed without restriction. Free software is not the same as freeware,
software available at zero price. The definition of open source software was written to be almost
identical to the free software definition. There are very few cases of software that is free software but is
not open source software, and vice versa. The difference in the terms is where they place the emphasis.
“Free software” is defined in terms of giving the user freedom. This reflects the goal of the free software
movement. “Open source” highlights that the source code is viewable to all and proponents of the term
usually emphasize the quality of the software and how this is caused by the development models which
are possible and popular among free and open source software projects.

What I have learned:


 Difference of Free and Open Source Software.

Integrative Questions:
 What is free software?
 What is open source software?
 What are the evaluations of free and open source software?
 What are the inspirations of OSS developers?
 Explain the concept of open source and accountability.
Running Head: Computerized Ethics 17

Chapter 11: Internet Research Ethics: The Field and Its


Critical Issues

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Internet research ethics (IRE) is an emerging multi- and interdisciplinary field that systematically
studies the ethical implications that arise from the use of the Internet as a space or locale of, and/or tool
for, research."

What I expect to learn:


I expect to learn some issues in internet research

Review:

Our lives, particularly our lives as researchers, and, correspondingly, our research objects and
methods, are informed and thus transformed by digital devices and particularly by digital networks. We
live in a digital environment in the sense that we look at reality within the framework of its possibility of
being digital or of its digitability We use the concept of ontology in its Heideggerian sense as related to
the human capacity of world construction on the basis of the givenness of our being-in-theworld itself.
Heidegger's terminus technicus [technical term] for this existential givenness is Dasein (Heidegger 1977).
The perception of the finite openness of our existence allows us to produce not just new things but new
world ‘castings’ or projects [Entwurf]: within such castings, natural things and processes as well as man-
made ones can be understood, discovered and/or invented, and used.
That is: while human reason and understanding actively originate or "legislate" (to use a later
Kantian term) the forms of our knowledge (e.g., the frameworks of time and space, the categories of
causality, etc.) - as embodied beings, we also depend entirely upon the material world as received
through our senses for the content of our knowledge.

What I have learned:


 Perception of finite openness

Integrative Questions:
 What are the respects for bodily identity as affected by research on digital identity?
 What is the respect for the welfare and values of the people subject to online research, giving
them the opportunity of an active and free cooperation?
 Find the unmasking of abuses with regard to the mishandling of instrument-oriented analysis
by political and/or private bodies?
 What are the establishment of an atmosphere of social responsibility of online researchers as
well as of heir patrons with regard to the utility and usability of their research?
 What are the mainly with regard to the weakest members of society?
Running Head: Computerized Ethics 18

Chapter 12: Health Information Technology: Challenges in


Ethics, Science, and Uncertainty

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "The use of computers or, more generally, information technology in the health professions is
indeed a rich source of ethical issues and challenges."

What I expect to learn:


I expect to learn how Information Technology can help in Healthcare

Review:

To support a more effective marketplace, better competition, and increased choice through
convenience to accurate information on healthcare costs, quality, and outcomes, The Office of the
National Coordinator (ONC) is advancing the NHIN as a “network of networks” which will connect
diverse entities that need to exchange health information, such as state and regional health information.
By balancing standards, different information systems, networks, and software applications will
be able to ‘speak the same language’ and work together technically to manage and use consistent,
accurate, and useful health information.

What I have learned:


 Connection of Information Technology in Healthcare

Integrative Questions:
 What is the enhanced health care quality?
 How to avoid medical errors?
 Why lessen health care costs?
 How many boost administrative efficiencies?
 Is there an increase contact to affordable care?
Running Head: Computerized Ethics 19

Chapter 13: Ethical Issues of Information and Business

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Information is becoming increasingly important in most aspects of our lives, and this is
particularly true for our economic activities."

What I expect to learn:


I expect to learn about ethical issues of information and business

Review:

There are a lot of ethical issues in business where in information technology casts on like the
previous chapter involving privacy. In any business, privacy is really important especially if you want
your business to be a significant part of the industry, not just in it. Realizing that information technology
does not revolve only around computers and cables is critical when trying to communicate information
technology in a business because it is more than just cables and ports but it is proposing the best
probable system needed by the business to be placed in advance of its competitors.
What do I really mean by that? Based on what I have been learning for the last three years of
education, a business proposal for information technology is one of the most beneficial and yet so
complex process in software engineering. Before creating the project proposal, we need to conduct
numerous interviews to the business’ stakeholders to truly understand what they want in their system
and what needs to be taken out. Along with that is the pressure of thinking of a way on how to achieve
the business’ goals and objectives without neglecting its norms and society’s concerns. I guess proposal
is truly the toughest part of systems analysis because once you are done with that, then it is as good as
implementation.

What I have learned:


 Ethical Issues in business

Integrative Questions:
 What are the approaches to ethical issues in business and information?
 What is the concept of business?
 What are some difference between stakeholders and shareholders?
 Give at least two examples of corporate responsibility.
 What is the micro stage influence of business on ethics?
Running Head: Computerized Ethics 20

Chapter 14: Responsibilities for Information on the Internet

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "One of the most fascinating aspects of the Internet is that very few accidents happen."

What I expect to learn:


I expect to learn about moral ideals and some ethical principles.

Review:

One problem in using the Internet to do historical research is that the quality of sources varies
enormously. The Internet is a global network of interrelated computers, enabling users to share
information along multiple channels. Unlike books and journals, which go through a filtering process
(e.g. editing, peer review), information on the Internet is mostly unfiltered. . An important consideration
with web pages is the presence of advertising. Currency can be thought of as the "freshness" of
information, and is a desirable trait for statistics, news, and other present-context material. Historical
material restricted to a particular period doesn't require as frequent updating as state-of-the-art
information, and can be regarded in a different light. In general, the latest information is the most
valuable. It is important to identify any biases that the author(s) or editor(s) of an information source
might possess. If there are sponsoring agencies, they should be named and reputable. Any apparent
conflicts of interest should be identified.

What I have learned:


 Timeliness of updating information in the Internet

Integrative Questions:
 What are the identifiers of appropriate data repositories?
 Is there conducting comprehensive searches by creating queries that are suitable for the
topic's breadth and depth?
 What are the groundwork for organizing and ranking of information?
 Is there a critical evaluation on each information resource?
 How reliable and free from error is the information coming from the Internet?
Running Head: Computerized Ethics 21

Chapter 15: Virtual Reality and Computer Simulation

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Virtual reality and computer simulation have not received much attention from ethicists."

What I expect to learn:


I expect to learn about the concept of virtual reality.

Review:

Whenever I hear the word “virtual reality”, huge sunglasses with 3D display capabilities for
computer games is the first thing I can think about. But what is virtual reality? Virtual reality, as
explained in the chapter, is a technology emerged in the 1980s, with the development and marketing of
systems consisting of a head-mounted display and data suit or data glove attached to a computer. These
technologies simulated three-dimensional (3D) settings displayed in surround stereoscopic vision on the
head-mounted display. The user could navigate and interact with simulated environments through the
data suit and data glove, items that tracked the positions and motions of body parts and allowed the
computer to alter its output depending on the recorded positions. This original technology has helped
define what is often meant by “virtual reality”: an immersive, interactive three-dimensional computer-
generated environment in which interface takes place over multiple sensory channels and includes
tactile and positioning feedback. Now that is the definition from the chapter – any resemblance in mine?
–which pretty much the same thing as how I pictured it. A technology or well, goggles, that allows
people to interact with computer made graphics as though it is happening in real life. Amazing isn’t it?
How technology can do such wonders for our benefits and allows us to experience something more than
what we should have experienced back then.

What I have learned:


 Concept of Virtual Reality

Integrative Questions:
 What is virtual reality?
 Where do you often hear that term?
 What were the ethical issues revealed that exists in the virtual world?
 What are avatars?
 What is Single-User VR?
Running Head: Computerized Ethics 22

Chapter 16: Genetic Information: Epistemological and Ethical


Issues

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Genetics has utilized many concepts from informatics."

What I expect to learn:


I expect to learn about Ethical Issues regarding genetic information.

Review:

We all expected that the detection of a marker linked to the Huntington's disease gene would
need thousands of tests and probes, but the third probe that Gusella characterized and the twelfth one
he tried hit the jackpot. He began with the Iowan family, whose samples were the first to be collected,
and the probe, called G8, was weakly positive, but not significantly so. They searched the DNA from
these two families for a telltale marker, helping to develop what were to become standard laboratory
procedures in such ventures. Jim sliced up each person's DNA with restriction enzymes. He then
developed markers, RFLPs, which he made radioactive. These markers were called anonymous because
he did not know on which human chromosome they were located, only that they were in one unique
spot in the genome, just like a gene, and they came in several forms so that individuals could be
differentiated from one another. The fragments of chopped-up DNA from the family members were put
on a gel that separates fragments on the basis of size. The radioactive probe (denatured, or single-
stranded) was then added. When the probe is radioactive, it would "light up" where it was stuck on the
gel, revealing distinctive bands. One would then need to check if a certain pattern of bands appeared
only in individuals who had the disease and another pattern in their relatives who were healthy.

What I have learned:


 Genetic Information

Integrative Questions:
 What is genetics?
 What does the acronym DNA means?
 What is the indication that the probe is radioactive?
 What is genetic information?
 What is the term use to call the markers?
Running Head: Computerized Ethics 23

Chapter 17: The Ethics of Cyber Conflict

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Most cyber attacks appear to be clearly unethical as well as illegal."

What I expect to learn:


I expect to learn about cyber conflict and its effect.

Review:

With the advancing technology, even internet can cause war to different countries. It could be a
silent war; no one would get physically hurt but incurs other type of damages. Cyber conflict may result
to chaos to the apprehensive parties. Such as what happened in September 2000, wherein Israelite
teenage hackers created a website that successfully jammed six websites in Lebanon, causing a huge
turmoil in different websites in Israel, including those of the Palestinians and at least one U.S. site. They
made two main types of attacks, the website defacement and distributed denial of service. Website
defacement focuses on high-profile political site such as government sites. Disruption of such site would
cause confusion to the citizens of that country and those other persons that are connected to them. On
the other hand, DDoS or distributed denial of service concerns shutting down of contrasting sites. The
Israelites teenage hackers also assaulted the websites that concerns broadcasting, telecommunication
infrastructures and other websites corning alike. One website that the hacker attacked was the internet
service provider that deals with Israeli senior citizens.

What I have learned:


 How Cyber conflict can cause damage to people

Integrative Questions:
 What does cyber conflict means?
 What are some examples of cyber conflicts mentioned in this chapter?
 What does Jus in Bello means?
 What does Jus ad Bellum means?
 What are the ethical frameworks of Hacktivism?
Running Head: Computerized Ethics 24

Chapter 18: A Practical Mechanism for Ethical Risk


Assessment—A SoDIS Inspection

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "The availability of high-quality software is critical for the effective use of information technology
in organizations."

What I expect to learn:


I expect to learn about practical mechanism for ethical risk assessment

Review:

Everything in this world results from a choice, and comes with hazard. Hazard that you need to
assess, manage and even branch out. You can never ever do something without risking something, that’s
why you have to weigh up the possible consequences of decisions. A simple eating of your favorite pie
might end you up in a room in one of the most expensive hospital in our country. A little decision might
cause a million disasters. Disasters that is possibly reduced or diminished when properly assessed.
Analysis of danger in any field is really important, in science, risk can cause the extinction of human race,
in finance, financial crisis, just like what we are experiencing now, and as to advance technology like
internet, invasion of privacy and furthermore, threat to security.

What I have learned:


 Importance of Risk Analysis

Integrative Questions:
 What is SoDIS?
 How does the SODIS audit process works?
 What is the concept of risk identification?
 What is risk assessment?
 Why is risk assessment important?
Running Head: Computerized Ethics 25

Chapter 19: Regulation and Governance of the Internet

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Internet governance is the development and application by Governments, the private sector
and civil society, in their respective roles, of shared principles, norms, rules, decision-making
procedures, and programs that shape the evolution and use of the Internet"

What I expect to learn:


I expect to learn about Internet Governance

Review:

This Chapter states that the Internet is useful in our living in the present. Though it is useful
indeed, it also has some danger in it. That is why this chapter is telling us that there is a justifiable
argument to which Internet contents must be controlled. In order to do it, there would be consequences
that are not favorable to other users such as degradation in Internet performance. It only signifies that
there would still be a disadvantage of content regulation at the long term range because of the
recognized problems that are present.

This chapter recommends that if we do want to have the contents of the internet to be
regulated without encountering problems that would bring disadvantages to us, there is a need of more
research into technological approaches in blocking contents. There should also be cooperation in an
international level in formulating and implementing laws, practices and standards. If these two factors
can be accomplish successfully, it is like to be a benefit to all users the regulation of internet content
without worrying of any problems that might take place.

What I have learned:


 Internet Content Regulation Disadvantage

Integrative Questions:
 What is Internet Governance?
 What is Internet Content Regulation?
 What is an example of a disadvantage of regulating internet content?
 What is the recommendation about the regulation of internet content?
 What level must the cooperation on formulating and enforcing of laws, practices and
standards should be?
Running Head: Computerized Ethics 26

Chapter 20: Information Overload

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Information overload would seem to be a straightforward phenomenon with a straightforward


cause."

What I expect to learn:


I expect to learn about the concept of Information Overload

Review:

Have you experienced headaches in the middle of your class, thinking what might be its cause
and realizing that your professors have taught you a lot of lessons (especially in programming classes)
that your mind cannot absorb them any more? If that's the case, you might be experiencing information
overload. This commonly occurs when the mind is trying to grasp so much information that it end up to
a point that it cannot understand anything anymore. Information overload is said to be the side effect of
our advancing technology. This result from the too much availability of information generated through
internet and other channels of communication. A lot of us are curious about different things happening
in our environment, but too much of this curiosity might also cause harm. Being too exposed to different
things in our society that we may miss the fact of ‘reality’, which we cannot based everything on books,
researches and experiments. Sometimes, we still need to experience them, just as what they all used to
say, experience is the best teacher. Things experienced can never be compared to things ‘read’. Simple
information about some matter would be a great help for us, but too much of anything can cause
trouble. Imagine reading a certain article about a candy and formulating insights that you realized while
reading it, then disseminating it to others. The person who received the information about the candy
together with your insights can also formulate his own insight about it, and after passing it to a few
others, that’s already whole lot of information that you’re not even sure if it’s true or not, thus, resulting
to an information overload over a simple candy.

What I have learned:


 Concept of Information Overload

Integrative Questions:
 What is it that is considered as a side effect of technology advancement?
 What is Information Overload?
 Differentiate perception and reality.
 Enumerate the history of information overload briefly.
 What are the given consequences of information overload?
Running Head: Computerized Ethics 27

Chapter 21: Email Spam


Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "A fundamental problem with any philosophical discussion of email spam is definitional."

What I expect to learn:


I expect to learn about the concept of Email Spam

Review:

Email Spam, as well as the other types of spam, aggravates the electronic communication of the
users. This chapter tells us that unsolicited phone calls, and analogous problem have been diminished
through legislation but it is not completely removed. In the context of email spam, it is invulnerable
from legislation and technological fixes because it has some definitional as a part of it and some is the
fundamental open nature of the internet protocols and architectures.

This chapter also tells us that email spam is a form of exploitation to which it exploits the
economic representation of the Internet emails to which they are deceiving its recipients. That is why
the struggle for its elimination must continue. It would be useful to have ethical analysis in order to
come up with strategies of email senders and email recipients. Before it can reach to that point there
should be a clear exposition as to what are the characteristics of an email that is considered as spam.
When it is now defined, that is the only time they can jump into the specifics of spam ethics.

What I have learned:


 Concept of Spam

Integrative Questions:
 What is Email Spam?
 What is the effect of spam to the electronic communication?
 What makes email spam invulnerable to legislation?
 What is the use of ethical analysis in the context of email spam?
 What is the pre-requisite in order to discuss the specifics of spam ethics?
Running Head: Computerized Ethics 28

Chapter 22: The Matter of Plagiarism: What, Why and If

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "There is plenty of room for debate over the definition of plagiarism."

What I expect to learn:


I expect to learn about the concept of Plagiarism

Review:

It was just discussed to us that plagiarism is not the same as infringement of copyright. For those
who thought plagiarism is some disease found only in South East part of the world, plagiarism is the use
or close imitation of the language and ideas of another author and representation of them as one's own
original work. Plagiarism is not synonymous to copyright infringement. While both terms may similarly
apply to a particular act, they are different misbehaviors. Copyright infringement is a violation of the
rights of a copyright holder, when material protected by copyright is used without consent. On the other
hand, plagiarism is concerned with the unearned increment to the plagiarizing author's reputation that
is achieved through false claims of authorship which involves copying of ideas at an entirely basis. See,
even Wikipedia can prove why both terms may seem similar but totally different in definition. I actually
had a classmate that plagiarized already but to the class’ disappointment, he (a clue! a clue!) was not
punished for it. He did not pay for something illegal to do because you know what he did? He literally
just copied and pasted an article explaining how life is to people in psychology and just put his name for
identification. Wrong move because my professor is very keen with plagiarism but still, trying to
remember the event, I was disappointed because our professor just let it slip meaning more and more
students will eventually do it because they will have an idea that they won’t be in trouble in the first
place. So here is what I think, plagiarism is definitely wrong because you have a brain and you need to
use it, not copy another man’s ideas in its entirety.

What I have learned:


 Concept of Plagiarism

Integrative Questions:
 What is Plagiarism?
 What is the difference between plagiarism and infringement of copyright?
 What is infringement of copyright?
 What does lack of accreditation mean?
 What are some ways to avoid plagiarism?
Running Head: Computerized Ethics 29

Chapter 23: Intellectual Property: Legal and Moral Challenges


of Online File Sharing

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "The Internet has many “gatekeepers,” from Internet Service Providers (ISPs) and search engines
to purveyors of certain types of network software."

What I expect to learn:


I expect to learn about Intellectual Property

Review:

I am guilty to using online file sharing because first of all, it is free and second of all, it is
accessible. Honestly, for me, that is enough reason for anyone to shift from buying a brand new album
by a certain band to downloading or listening to the whole album for free. Of course I don’t want you to
open your browser just to check out what file sharing is. This is the definition of file sharing in Wikipedia,
“File sharing refers to the providing and receiving of digital files over a network, usually following the
peer-to-peer (P2P) model, where the files are stored on and served by personal computers of the users.
The first file sharing programs marked themselves by inquiries to a server, either the data to the
download held ready or in appropriate different Peers and so-called Nodes further-obtained, so that one
could download there. Two examples were Napster (today using a pay system) and eDonkey2000 in the
server version (today, likewise with Overnet and KAD - network decentralized). Another notable
instance of peer to peer file sharing, which still has a free version, is Limewire.” Of course I know what
these software are because yes, I have committed an unethical approach to technology because back
then, five to 7 years back, downloading something from the internet is not illegal because it is just the
concept of sharing but now, many complained that P2P software ruin the music and movie industry
because of all the files that people can have access to without paying a cent.

What I have learned:


 Concept of Intellectual Property

Integrative Questions:
 What does intellectual property means?
 What industry is most affected of file sharing sites?
 What does file sharing means?
 Does the P2P model violate a law? Explain.
 How does the P2P software ruin the music and movie industry?
Running Head: Computerized Ethics 30

Chapter 24: Censorship and Access to Expression

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "To describe a person as a censor, or an act as one of “censorship,” is to condemn the person or
the action."

What I expect to learn:


I expect to learn about the concept of censorship and access to expression.

Review:

It is relevant to the research process to understand something about censorship in libraries and
how the debate has changed in the electronic age. Most companies, libraries extended its position
accessed over the Internet. "Freedom of expression is an unalienable human right and the foundation of
self-government. Freedom of expression encompasses the freedom of speech and the corollary right to
receive information". Information retrieved from the Internet has not gone through an evaluation by
librarians. When libraries begin to offer broad Internet access, they open the door to access to all sorts
of information that would otherwise never appear on a library's shelves.

However, for most librarians the idea of censorship is abhorrent. In lieu of censorship, libraries
have taken a few precautions in providing broad Internet access to users. Among the most common
precautions are having Internet access the computers in a public area of the library and assisting us. A
society where intellectual activity and creativity, freedom of expression and debate, and access to
information are encouraged and nurtured as vital elements underpinning individual and community
fulfillment in all aspects of human life. It is the role of a library and information service that is funded
from the public purse to provide, as far as resources allow, access to all publicly available information,
whether factual or fiction and regardless of media or format, in which its users claim legitimate interest.
In some cases this will be limited to those areas reflecting the primary purpose of a parent institution; in
others it will be generalist in natures in finding appropriate resources to meet their information needs.

What I have learned:


 Censorship

Integrative Questions:
 What is Censorship?
 Why the idea of censorship does become abhorrent in a librarian's view?
 What are some precautions that the libraries have already undertaken?
 What are the vital elements underpinning individual and community fulfillment?
 What is funded from the public purse?
Running Head: Computerized Ethics 31

Chapter 25: The Gender Agenda in Computer Ethics

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "The idea that gender is a major (possibly even the major) way of classifying and ordering our
world has been propounded by a number of authors, mainly, although not exclusively, writing from a
feminist position."

What I expect to learn:


I expect to learn about Gender Agenda

Review:

Okay, I get it. Back then, women have no rights aside being mothers and I also get it that up to
now, it is still a big deal to other parts of the world but hey, wake up guys because if you open your eyes
wide enough, you will see how many women showed power and passion to their true beings and
demonstrated how it is to truly be brave and to truly treasure a right. I know I seem upset but who
would not be upset after reading a history book explaining why women have no rights back then and
how they treat women. Now is not the right time to morn about it because it is done. We are finally
saved from all those cultural chains that pulled women away from their capabilities and justice as a
human being. Ethics of care, I have to admit, obviously means the heart of women and in a good way.
Here is an excerpt from the chapter explaining the relevance of digital divide: What is the relevance, if
any, of the digital divide discourse (e.g., Internet access to all) with the fact that data is not information,
information is not marketable knowledge, and marketable knowledge is not wisdom? The gaps between
these various notions must be identified to call better attention to how our efforts to bridge the various
gaps should succeed. For example, we must provide education that enables people to convert data to
information, and information to marketable knowledge. To ensure full human flourishing, we want to
ensure that bridging the digital divide leads not only to ending life-threatening poverty, but also to full
flourishing of human beings, which requires wisdom, aesthetic experience, philosophical self-reflection,
and so on.

What I have learned:


 Concept of Gender Agenda

Integrative Questions:
 What is Gender Agenda?
 What are ways to ensure human flourishing?
 What are the requirements to full human flourishing?
 What is the relevance of the digital divide discourse?
 What are the things to be identified in order to call for better attention in bridging the gap?
Running Head: Computerized Ethics 32

Chapter 26: The Digital Divide: A Perspective for the Future

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Only if we have some persuasive answers to these kinds of questions, will we be able to arrive
at equally persuasive conclusions about exactly how to approach the problems of poverty to which the
digital divide contributes."

What I expect to learn:


I expect to learn about practical mechanism for ethical risk assessment

Review:

Here is something I did not understand even with reading the part twice – poverty in connection
with digital divide. I think it is all about the bridging of the information gap. And what is that gap? If you
really want to know and willing to spend a few minutes reading, read through this chapter so you will
know it better with more definition and brief examples wand situations why there is a gap and how that
gap even came about. I may not know much nor can I explain much about this so called gap but I do
know that it exists especially after reading this chapter. Technology should be equal to communication if
placed in a mathematical formula because we developers think of programs, applications or websites
that allows everyone to have a voice. I know, some develops for private companies but still, it is relative
to the point of technology enabling communication whether between two or more people or two or
more other technologies that will change the process of a company with proper connection and
communication of both. That is how technology can change a simple process. A simple login can be
turned into something more and like what they said, “There is no limitations with imagination” but of
course, that does not completely apply to information technology because with IT, you need to be
rational and be aware as always in order for you to produce something that will be bought by
consumers and will eventually be used for aiding their own problems.

What I have learned:


 Digital Divide concept

Integrative Questions:
 What is the connection of poverty with digital divide?
 What is the gap that is presented in this chapter?
 How this gap does exist?
 How does technology change simple process?
 What is needed in order to produce something that consumer wants?
Running Head: Computerized Ethics 33

Chapter 27: Intercultural Information Ethics

Amazon Reference: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599

Quote: "Intercultural Information Ethics (IIE) can be defined in a narrow or in a broad sense."

What I expect to learn:


I expect to learn about intercultural information ethics

Review:

This chapter really did summarize everything because it explained the connection of all the
previous issues mentioned in the book and still, at the same time, opened new ideas to us in terms of
morality and communities. Although this chapter mentioned the most number of people and defined
them each briefly as their contributions got bigger and more relevant. It is similar to the song I am
listening to right now which explains so much with little time, three minutes ot be exact. IT tackles the
history of information technology, how it got started, how it went on for years and how will it continue
on through the years to come because we all experience the benefit the great information technology
presents to us now, particularly in this generation. Because like now, it would be hard to type in a
typewriter just to finish your thesis paper. Can you imagine how many hours it will take you to finish a
citation and how huge your callus in your fingers will be afterwards? Oh man, I can’t even explain how
the world will be without technology helping us around. Heck, I don’t even think the 50% of the
population of the world will survive without technology because we all become dependent to its
potentials which are why trying to detach ourselves from it will be like withdrawing from an addiction.
You will realize how hard things really are once technology is gone so treasure its presence and realize
its importance.

What I have learned:


 Intercultural information ethics

Integrative Questions:
 What does Intercultural mean?
 What is Intercultural information ethics?
 How this chapter does summarize all of the other chapters?
 Why does world's population wouldn't survive without technology?
 What should be doing to the presence and importance of technology?

You might also like