Handbook of Ethics

  • Upload
    rocky

  • View
    213

  • Download
    0

Embed Size (px)

Citation preview

  • 8/14/2019 Handbook of Ethics

    1/31

    Rocky L. Ho

    Part 1: Handbook of information and computer ethics.

    Chapter 1

    Title: Foundations of Information Ethics by

    Luciano Floridi

    Quote: The information society has been made possible by a cluster of information and

    communication technologies infrastructures.

    Expectations:

    I expect to learn a lot from this chapter since it is the first part of the handbook.

    Book Review:

    The author of this chapter is Luciano Floridi. IE was one of the topic which was

    discussed, it is said that the IE is the ethics for information resources. ERPT was also discussed,

    which means external, resource, product, target, and it is a model. There were stages that were

    mention in this chapter. The stages talks about how the environment evolves when time

    passes. Technology were produced to help us guide ourselves in our work.

    Things I have learned:

    I learned that the organization policy drives information technology development.

    Integrity Questions:

    1.) What is ECPT?2.) What IE?3.) What are the limitations that were discussed?4.) Who is Luciano Floridi?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    2/31

    Part 1: Handbook of information and computer ethics.

    Chapter 2

    Title: Milestones in the History of Information and Computer Ethics by

    Terrell Ward Bynum

    Quote: The academic field of information ethics was born unintentionally and almost

    accidentally in the middle of the second war.

    Expectations:

    I expect to learn about the milestones in the history of information and computer ethics.

    Book Review:

    The author of this chapter is Terrell Ward Bynum. The topic wieners account of a good

    life was discussed, based on my readings, they say that we have to live well, and we have to be

    free and be creative as much as possible, because in our generation, being a new model is

    something that we all must achieve. Next which was discussed was about the information

    ethics methodology, and it says that people tends to find something which was already

    discovered or has been found by somebody else. There are information that does not need to

    be extracted from where it came from.

    Things I have learned:

    I learned that this chapter cares for policies, thus it is very complicated to understand

    new things.

    Integrity Questions:

    1.) What is unique?2.) What is influencial computer ethics theory?3.) What is ETHICOM96?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    3/31

    Part 1: Handbook of information and computer ethics.

    Chapter 3

    Title: Moral Methodology and Information Technology by

    Jeroen van den Hoven

    Quote: Computer ethics is a form of applied or practical ethics.

    Expectations:

    I expect to learn the moral methodology and information.

    Book Review:

    The author of this chapter is Jeroen van den Hoven. He said that the moral questions

    was the development of associating and same goes for the applications and the usage of the

    computers. Since ethics is most likely talking about the computer based part in the information

    technology world, it gives out benefits on how to justify our answers. For further information,

    about ethics, it was given that it is a responsibility for software error, equal access, and

    autonomous agents is one thing it says that for us to be able to get the solutions for our

    problems, we can guide ourselves by using the given samples.

    Things I have learned:

    I learned that there are processes on how to obtain certain things and patch it up to

    create a new answer for our problem.

    Integrity Questions:

    1.) What is conceptualization?2.) What is moral methodologies?3.) What is applied ethics?

  • 8/14/2019 Handbook of Ethics

    4/31

    4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    5/31

    Part 1: Handbook of information and computer ethics.

    Chapter 4

    Title: Value Sensitive Design and Information Systems by

    Batya Friedman, Peter H. Kahn Jr., and Alan Borning

    Quote: It employs an integrative and iterative tripartite methodology, consisting of

    conceptual, empirical, and technical investigations.

    Expectations:

    I expect to learn about the values sensitive design and information systems.

    Book Review:

    The authors of this chapter are Batya Friedman, Peter H. Kahn Jr., and Alan Borning.

    They discussed the same chapter which means that have to agree on something which is based

    on value sensitive design and information systems. Value sensitive design was discussed, which

    means that it is an approach which was made or designed of the technology that will eventually

    helps human lives and values. There were cases in this chapter were there are people who

    debates about the usage of the land and transportation, fairness, support on the process of

    being a diverse range of different consumers or stakeholders.

    Things I have learned:

    I learned that the value sensitive design is the main point of design for technology. It is

    an interesting topic.

    Integrity Questions:

    1.) What is value sensitive design?2.)

    What is value?

    3.) What is system design?4.) What is empirical investigations?5.) What is technical investigations?

  • 8/14/2019 Handbook of Ethics

    6/31

    Part 2: Handbook of information and computer ethics.

    Chapter 5

    Title: Personality-Based, Rule-Utilitarian, and Lockean Justificationsof Intellectual Property by

    Adam D. Moore

    Quote: Care is needed so that we do not confuse moral claims with legal ones.

    Expectations:

    I expect to learn about what intellectual property means.

    Book Review:

    The author of this chapter is Adam Moore. The meaning of intellectual property was

    discussed, it simply means that it is the normal characterized of a generally property which is

    owned, it is a value which is based on the ideas. The secrets for trading was also discussed,

    according to the book consist of any formula, pattern, device, or compilation of information

    that is used in ones business.

    Things I have learned:

    I learned that the meaning of intellectual property can somehow be obtained when weget the respect of other people. Like we give them their own rights.

    Integrity Questions:

    1.) What is intellectual property?2.) What does the alternatives to patents talks about?3.) What is copyright?4.) Who is the author of this chapter?5.) What is trade secret and social utility?

  • 8/14/2019 Handbook of Ethics

    7/31

    Part 2: Handbook of information and computer ethics.

    Chapter 6

    Title: Informational Privacy: Concepts, Theories, and Controversies by

    Herman T. Tavani

    Quote: it would seem that privacy is not simply a static concept, but instead has a dynamic

    component.

    Expectations:

    I expect to learn about the informational privacy, concepts, theories, and controversies.

    Book Review:

    The author of this chapter is Herman Tavani. He discussed the concept of privacy, for

    what I have understood about this topic, it is the complain of privacy where in it is being used

    to someone else, and changing the things which does not belong to them. Since it is privacy,

    they have no right to intrude into someone elses stuff, file, projects, etc. since privacy is a big

    issue for everyone, it can somehow be related to hacking into somebody elses files and calim it

    as your own.

    Things I have learned:

    I learned that privacy is a big issue for all of us, because it is the centralized topic which

    is very important to the one who makes the work done.

    Integrity Questions:

    1.) What is the concept of privacy?2.) What unitary?3.) What is derivative?4.) What is cluster definition?5.) What is decisional privacy?

  • 8/14/2019 Handbook of Ethics

    8/31

    Part 2: Handbook of information and computer ethics.

    Chapter 7

    Title: Online Anonymity by

    Kathleen A. Wallace

    Quote: The term anonymity has been used to denote a number of related things:

    namelessness, detachment, unidentifiability, lack of recognition, loss of sense of identity or

    sense of self, and so on.

    Expectations:

    I expect to learn about the topic online anonymity.

    Book Review:

    The author of this chapter is Kathleen Wallace. From the beginning of the chapter,

    anonymity as a feature of complex social structures was discussed, according to what I have

    read Before turning to a discussion of the concept of anonymity itself, it is worth noting that

    recent concerns about anonymity may be an expression of a widespread feature of

    contemporary social organization and of the extent to which technological features of

    that organization affect with whom we interact, how we interact with one another, and

    how we think of ourselves as related, socially and ethically, to others this statement talks

    about how fast the things can passes, and how others receives the information so fast.

    Things I have learned:

    I learned that anonymity can help us to have a modern life when It comes to ethical

    world in information technology.

    Integrity Questions:

    1.) What is anonimity?2.) What is complex social structures?3.) What is online anonimity?4.) What is the concept of anonimity?5.) What is data mining?

  • 8/14/2019 Handbook of Ethics

    9/31

    Part 2: Handbook of information and computer ethics.

    Chapter 8

    Title: Ethical Issues Involving Computer Security: Hacking,Hacktivism, and Counterhacking by

    Kenneth Einar Himma

    Quote: Certain assumptions about hacker and related terms should be made explicit.

    Expectations:

    I expect to learn about the ethical issues involving computer security, hacking,

    hacktivism, and counter hacking.

    Book Review:

    The author of this chapter is Einar Himma. This chapter talks about hacking where

    people does not have the authority to snoop around other peoples file, as an information

    technology person, they should know that is is a negative thing to do because it is written in the

    ten commandments of information technology world. There are also positive things when it

    comes to hacking. For what I know, there is this guy who hacked the system, luckily he hacked

    is after that, he was know for some people, what he did was correct.

    Things I have learned:

    I learned that hacking is not always negative thing to do, there are positive sides when it

    comes to hacking.

    Integrity Questions:

    1.) What is hacktivism?2.) What is counter attacking?3.)

    Are there limitations when it comes to hacking?

    4.) Who was the first person who was known as a hacker?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    10/31

    Part 3: Handbook of information and computer ethics.

    Chapter 9

    Title: Information Ethics and the Library Profession by

    Kay Mathiesen and Don Fallis

    Quote: We begin this chapter by considering the mission of the librarian as an informationprovider and the core value that gives this mission its social importance.

    Expectations:

    I expect to learn about the information ethics and the library profession.

    Book Review:

    The author of this chapter are Kay Mathiesen and Don Fallis. They discussed the core

    value of the library profession, selection, bias, neutrality, the classification of labeling, how

    children gets access to the information that are been made. Several years ago, almost

    everybody puts newly information in the library. Its like a mission for them to put information.Selection means that they have the ability or right to choose from, bias talks about how other

    people discriminate other races, and how they treat others unfairly. Neutrality talks about how

    people treats other people fairly and has the equal rights.

    Things I have learned:

    I learned that computer ethics can be known in the world, we can get the references in

    the library which supports information for what we need.

  • 8/14/2019 Handbook of Ethics

    11/31

    Integrity Questions:

    1.) What is bias?2.) What is selection?3.) What is neutrality?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    12/31

    Part 3: Handbook of information and computer ethics.

    Chapter 10

    Title: Ethical Interest in Free and Open Source Software by

    Frances S. Grodzinsky and Marty J. Wolf

    Quote: It is beyond the scope of this paper and its author to develop a detailed integration

    of ideas of Kant and Aristotle around the virtues.

    Expectations:

    I expect to learn about the ethical interest in free and open source software.

    Book Review:

    The author of this chapter are Fances Grodzinsky and Marty Wolf. In this chapter the

    free software and open source software is the main topic. They discussed the importance of

    open source and free software. We can say that it is a free software if we downloaded it from

    the internet without paying a single amount of money. It is an open source if it is legal without

    being hesitated by anyone. We can get free software from the one who made the software

    himself or herself.

    Things I have learned:

    I learned that not all free things in the world can be easily obtained. There are still prices

    which we have to pay.

    Integrity Questions:

    1.) What is free software?2.) What is open source?3.) What are the differences among free software and open source?4.) Who is the author of this chapter?5.) Where do we get free software and open source?

  • 8/14/2019 Handbook of Ethics

    13/31

    Part 3: Handbook of information and computer ethics.

    Chapter 11

    Title: Internet Research Ethics: The Field and Its Critical Issues by

    Elizabeth A. Buchanan and Charles Ess

    Quote: internet research ethics is an emerging multi and interdisciplinary field that

    systematically studies the ethical implications that arise from the use of internet as a space orlocale of , and/or tool for, research.

    Expectations:

    I expect to learn about the internet research ethics which discusses the fields and its

    crucial issues.

    Book Review:

    The author of this are Elizabeth Buchanan and Charles Ess. From the beginning of the

    chapter, they discussed the introduction to the internet which research about the ethics, also

    the background of all major issues in the literature. Followed by the history of the IRE, next is

    the philosophical foundations which tackles the sources, frameworks and the initial

    considerations. Next that was discussed was the specific of IRE issues. Then the definition of

    revealing identities was next discussed, here in this topic, they said that it is an online identities

    are very similarly complex. We have to give respect for other person, since we are the same as

    a human being, we can understand what or how they think.

    Things I have learned:

    I learned that the source, framework and initial considerations are the main topic whichusually discussed for this chapter.

  • 8/14/2019 Handbook of Ethics

    14/31

    Integrity Questions:

    1.) What is source?2.) What is framework?3.) What is initial considerations?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    15/31

    Part 3: Handbook of information and computer ethics.

    Chapter 12

    Title: Health Information Technology: Challenges in Ethics, Science, and Uncertainty by

    Kenneth W. Goodman

    Quote: there is arguably no better trigger for reflection on morality and its relationship to

    the law and society than privacy and its cousin, confidentiality.

    Expectations:

    I expect to learn about the health information technology which talks about the

    challenges in ethics, science and uncertainly.

    Book Review:

    The author of this chapter is Kenneth Goodman. At the beginning of this chapter, the

    privacy and confidentiality was discussed, inside this topic, the definitions were given and said

    that there are lots of us who usually violates the right of being a human being, I can relate this

    to ethics since I am taking up ethics class, I can say that we all have the right to be able to

    acknowledge things on our own because we have our own life and we can reason out our belief

    which can be believed by the public.

    Things I have learned:

    I learned that we have our own privacy which others cannot take away from us.

    Integrity Questions:

    1.) What is diagnostic expert systems?2.) What prognostic scoring systems?3.) What does the standard view talks about?4.) Who is the author of this chapter?5.) What does progressive caution talks about?

  • 8/14/2019 Handbook of Ethics

    16/31

    Part 3: Handbook of information and computer ethics.

    Chapter 13

    Title: Ethical Issues of Information and Business by

    Bernd Carsten Stahl

    Quote: Businesses and the economic system they work in have an important influence onethical issues arising from information and information and communication technology.

    Expectations:

    I expect to learn about the ethical issues of information and business.

    Book Review:

    The author of this chapter is Bernd Carsten Stahl. The concept of business was

    discussed, since the concept of the society which is the main topic which everyone uses as the

    most count of argument, I can say that it is the liberal democratic states. It can affect the

    business which can affect our daily lives. Next is the shareholders and the stakeholders, it says

    that the ethical business can approach the stakeholders. Next is the shared norms and values,

    this topics says that it can either be democratic or egalitarian as it can be offered by some

    businessman.

    Things I have learned:

    I learned that the stakeholders and stockholders have the same attributes.

    Integrity Questions:

    1.) What is stockholders?2.) What is stakeholders?3.) What are the differences between stockholders and stakeholders?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    17/31

    Part 4: Handbook of information and computer ethics.

    Chapter 14

    Title: Responsibilities for Information on the Internet by

    Anton Vedder

    Quote: One of the most fascinating aspects of the Internet is that very few accidentshappen.

    This not only holds for the technical infrastructure and maintenance, but also for the

    communication and information transmitted through the network.

    Expectations:

    I expect to learn about the responsibilities for information on the internet.

    Book Review:

    The author of this chapter is Anton vedder. The responsibilities for information on the

    internet was the topic for this chapter, we all know that we all bare responsibilities when it

    comes to the responsibilities. We can do anything as long as we will not hurt anybody. E can get

    tons of information in the internet, since the internet is the center of all attraction in our

    generations today, almost everybody uses it to amaze themselves.

    Things I have learned:

    I learned that the internet can sometimes be harmful to us, it is also the center of all

    attraction to us.

    Integrity Questions:

    1.) What is internet?2.) What can we do with internet?3.)

    How can internet harm other people?

    4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    18/31

    Part 4: Handbook of information and computer ethics.

    Chapter 15

    Title: Virtual Reality and Computer Simulation by

    Philip Brey

    Quote: Virtual reality and computer simulation have not received much attention fromethicists. It is argued in this essay that this relative neglect is unjustified, and that

    there are important ethical questions that can be raised in relation to these technologies.

    Expectations:

    I expect to learn about the virtual reality and computer simulation.

    Book Review:

    The author of this chapter is Philip brey. According to the book which I have read,

    virtual reality is the technology which was made during 1980, it has been in the market for

    several years, since it can help us to make time pass faster, we can enjoy it and play with it, not

    just by playing, we can do anything which we cannot do in the real world, its like 3D animation

    and you may or can think that we are in the game itself, it is also a computer based program.

    Things I have learned:

    I learned that the virtual reality is a computer based program which can be the

    attraction for our generation.

    Integrity Questions:

    1.) What is virtual reality?2.) What is computer simulation?3.) What are the difference between virtuality and reality?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    19/31

    Part 4: Handbook of information and computer ethics.

    Chapter 16

    Title: Genetic Information: Epistemological and Ethical Issues by

    Antonio Marturano

    Quote: The quantity of information in a system can be understood roughly as theamount of order in that system, or the inverse of the entropy (disorder) that all closed

    physical systems accumulate over time.

    Expectations:

    I expect to learn about the genetic information, epistemological and ethical issues.

    Book Review:

    The author of this chapter is Antonio Marturano. This chapter talks about the concept

    which are being used to genetics for two different levels that can be taken and can be made or

    extracted to a new information. Since it can transfer information from one place to another, it

    has the ability to make something extraordinary things. The topic eggs as computermachineries made me think how can eggs be a part of computer machineries.

    Things I have learned:

    I learned that the computer machineries can be related to computer ethics.

    Integrity Questions:

    1.) What are the concept of information?2.) What is genetic information?3.) What is computer machinery?4.) Who usually use this theory?5.) What can we obtain in this chapter?

  • 8/14/2019 Handbook of Ethics

    20/31

    Part 4: Handbook of information and computer ethics.

    Chapter 17

    Title: The Ethics of Cyber Conflict by

    Dorothy E. Denning

    Quote: cyber-terrorismthe integration of cyber attacks with terrorism.Although cyber-terrorism is abhorrent and clearly unethical, hacktivism raises ethical

    questions.

    Expectations:

    I expect to learn about the ethics for cyber conflict.

    Book Review:

    The author of this chapter is Dorothy Denning. At the beginning of the reading

    materials, they said that this chapter talks about the attack of cyber to be able to clearly state

    the unethical things which is illegal. The attack of computer viruses in our computer is very

    harmful, it can easily destroy our computer files, sometimes it cannot be returned to you once

    the virus was already spread. For the time being, we can avoid these sort of things by setting

    some samples like putting anti-virus, put on the windows firewall. Viruses are threats for us.

    Things I have learned:

    I learned that the organization computer virus can kill our computer.

    Integrity Questions:

    1.) What is cyber-terrorism?2.) What is a virus?3.) How can we prevent computer virus attacks?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    21/31

    Part 4: Handbook of information and computer ethics.

    Chapter 18

    Title: A Practical Mechanism for Ethical RiskAssessment A SoDIS Inspection by

    Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan

    Quote: Informaticians have been evolving and refining techniques to mediate risks ofdeveloping software products that meet the needs of their clients.

    Expectations:

    I expect to learn about the practical mechanism for ethical risk assessment.

    Book Review:

    The author of this chapter are Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan. Risk

    management is the main point here in this chapter. Since all of us is in need of budget, we tend

    to to everything to gain money, to be able to raise money, we have to have money, in a

    company, risk management is important, we have to monitor the risk management to lessenthe negativity of the companys profile or the companys image.

    Things I have learned:

    I learned that the risk management is important in a company to raise the its name.

    Integrity Questions:

    1.) What is risk?2.) What is risk management?3.) How do we get profit?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    22/31

    Part 5: Handbook of information and computer ethics.

    Chapter 19

    Title: Regulation and Governance of the Internet by

    John Weckert and Yeslam Al-Saggaf

    Quote: There are at least two different questions involved in the governance of the Internet:who, if anybody should be in charge, and what, if anything, should be governed or regulated.

    Expectations:

    I expect to learn about the regulating and governance of the internet.

    Book Review:

    The author of this chapter are John Weckert and Yeslam Al-Saggaf. They discussed the

    internet governance. According to them Internet governance is the development and

    application by Governments, the private sector and civil society, in their respective roles, of

    shared principles, norms, rules, decision-making procedures, and programs that shape the

    evolution and use of the Internet for this statement, I can say that internet governance is

    somehow been able to help us thru our decision making.

    Things I have learned:

    I learned that the internet governance is the aid to our decision making.

    Integrity Questions:

    1.) What is internet governance?2.) What WGIG?3.) What is ICANN?4.) What is W3C?5.) What is IAB?

  • 8/14/2019 Handbook of Ethics

    23/31

    Part 5: Handbook of information and computer ethics.

    Chapter 20

    Title: Information Overload by

    David M. Levy

    Quote: It should hardly be surprising if complaints about a flood, a fire hose, or ablizzard of information are not only common but increasing.

    Expectations:

    I expect to learn about the information overload.

    Book Review:

    The author of this chapter is David Levy. Some of us does not know that there are

    limitations for information sending or receiving, it is called information overload. We tend to

    get information from the internet. For what I know, the most famous search engine is the

    google, almost everybody get information in google, but for articles, there are lots of us uses

    Wikipedia, but Wikipedia cannot be trusted since there are most of us use Wikipedia as pranks

    and put false information.

    Things I have learned:

    I learned that the information overload has its limitations.

    Integrity Questions:

    1.) What is information overload?2.) What is information?3.) Whats the difference between perception and reality?4.) Who is David Lewy?5.) What is the history of information overload?

  • 8/14/2019 Handbook of Ethics

    24/31

    Part 5: Handbook of information and computer ethics.

    Chapter 21

    Title: Email Spam by

    Keith W. Miller and James H. Moor

    Quote: The conceptual muddles about defining spam have immediate philosophical andlegislative consequences.

    Expectations:

    I expect to learn about the importance of email spamming.

    Book Review:

    The author of this chapter are Keith W. Miller and James H. Moor. They have discussed

    the importance and the meaning of email spamming. There are lots of us who tends to spam, it

    can make our email slow, it is very persistent, so we tend to delete all of the files which was

    spammed to us, to lessen the hassle during deleting, or reading nonsense email.

    Things I have learned:

    I learned that spamming can cause hassleness to the one whose email was spammed.

    Integrity Questions:

    1.) What is email spamming?2.) What are the intensions of other people who tends to spam?3.) What are the advantages in spamming?4.) What are the disadvantages in spamming?5.) What lesson do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    25/31

    Part 5: Handbook of information and computer ethics.

    Chapter 22

    Title: The Matter of Plagiarism: What, Why, and If by

    John Snapper

    Quote: As with most ethical concepts, there is plenty of room for debate over the definitionof plagiarism. Plagiarism will be treated here very broadly as expression that improperly

    incorporates existing work either without authorization or without documentation,

    or both. The emphasis on impropriety is important.

    Expectations:

    I expect to learn about the matter of plagiarism.

    Book Review:

    The author of this chapter is John Snapper. In this chapter the topic is plagiarism. There

    are many of us still doesnt know what plagiarism is, plagiarism is the act of action where we

    copy other persons file and claim it as your own work. Plagiarism is not bad, but we have to put

    the citations where we copied the file itself. Because once the owner of the file sees his or her

    work which is being used by other people without citations, he or she will surely be furious,because they made use of the file without the permission of the owner.

    Things I have learned:

    I learned that we have to have the permission of the owner before using the file.

    Integrity Questions:

    1.) What is plagiarism?2.)

    What are the concept of plagiarism?

    3.) What do we have to do if we copied other persons file?4.) Who is the author of this chapter?5.) What is authorization?

  • 8/14/2019 Handbook of Ethics

    26/31

    Part 5: Handbook of information and computer ethics.

    Chapter 23

    Title: Intellectual Property: Legal and Moral Challenges ofOnline File Sharing by

    Richard A. Spinello

    Quote: Lost in the thicket of lawsuits and policy challenges are the ethical issues associatedwith the use and distribution of file sharing software.

    Expectations:

    I expect to learn about the intellectual property.

    Book Review:

    The author of this chapter is Richard Spinello. He discussed the file sharing, file sharing

    can lessen the time where we can transfer files without standing that will cause us our precious

    time. We just have to use networking to be able to transfer files from a computer to another

    computer, we can also use email to store files and also to send. We dont have to use and

    software to do networking, we just need the internet or a networking cable to be able to

    transfer files.

    Things I have learned:

    I learned that the networking can do easier task for us.

    Integrity Questions:

    1.) What is networking?2.) What is peer to peer network?3.) What is sharing or theft?4.) What is secondary liability?5.) Who is Richard Spinello?

  • 8/14/2019 Handbook of Ethics

    27/31

    Part 6: Handbook of information and computer ethics.

    Chapter 24

    Title: Censorship and Access to Expression by

    Kay Mathiesen

    Quote: One might hope that work in law or philosophy might provide the answer.However,the concept of censorship is commonly used in ways that go much beyond the strict

    confines of First Amendment law.

    Expectations:

    I expect to learn about the cencorship and how to access to expression.

    Book Review:

    The author of this chapter is Kay Mathiesen. In this chapter cencorship was discussed,

    from what I have read, it says that there is no one who wants to be a censor or no one wants to

    be called as a censor. There are many people who are interested in this topic since it is one of

    the attraction for them. What does censorship really means, it is the limitation access to a

    content. Censorship are harmful.

    Things I have learned:

    I learned that censorship is a really bad thing. Cant really imagine how bad, but based

    on my readings they said it is really bad.

    Integrity Questions:

    1.) What is censorship?2.) Is censorship a bad or a good thing?3.) What does censorship do?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    28/31

    Part 6: Handbook of information and computer ethics.

    Chapter 25

    Title: The Gender Agenda in Computer Ethics by

    Alison Adam

    Quote: The recognition of continuing differences between men and women lots, at home, inthe workplace, and in education, even in societies that have seen considerable opening up of

    opportunities for women in the space of a generation or so, has been a major force in

    developing contemporary feminist writing.

    Expectations:

    I expect to learn about the gender agenda in computer ethics.

    Book Review:

    The author of this chapter is Alison Adam. Based on my understandings, the issue in this

    chapter is based on gender. It is said that it is the major way of classifying and

    ordering our world has been propounded by a number of authors, mainly, although not

    exclusively, writing from a feminist position. I can say that it is based on the authors, on how

    they put everything together and make something out of it.

    Things I have learned:

    I learned that the gender in this chapter is one of the major topic which was discussed.

    Integrity Questions:

    1.) What does gender have to do in this chapter?2.) What is feminist ethics?3.) What are the studies of gender and computer ethics can be related to this chapter?4.) Who is the author of this chapter?5.) What do we get from this chapter?

  • 8/14/2019 Handbook of Ethics

    29/31

    Part 6: Handbook of information and computer ethics.

    Chapter 26

    Title: The Digital Divide: A Perspective for the Future by

    Maria Canellopoulou-Bottis and Kenneth Einar Himma

    Quote: In the developing world, poverty and the suffering it causes is considerablyworse. Here poverty is characteristically absolute in the sense that people do not

    have enough to consistently meet their basic needs.

    Expectations:

    I expect to learn about the digital divide which tackles the topic a perspective for the

    future.

    Book Review:

    The author of this chapter are Maria Canellopoulou-Bottis and Kenneth Einar Himma.

    They discussed the global distribution which will bother some conscientious individuals. Since

    the rate of money in our country is not consistent, it would suddenly rise or fall. We have to dosomething about it, to think carefully what to do in the mere future, being an information

    technology person can be helpful, we can use our knowledge on what we have learned and

    apply it to our work to be able to make the money growth normal in our country.

    Things I have learned:

    I learned that the poverty could be such a scary thing if that really happens to us.

  • 8/14/2019 Handbook of Ethics

    30/31

    Integrity Questions:

    1.) What is poverty?2.) What is global distribution?3.) How can we lessen the poverty?4.) What can we do to help the poor?5.) Who is the author of this chapter?

  • 8/14/2019 Handbook of Ethics

    31/31

    Part 6: Handbook of information and computer ethics.

    Chapter 27

    Title: Intercultural Information Ethics by

    Rafael Capurro

    Quote: The distinction between cognitivism and noncognitivism presupposes that humanemotions have no cognitive value and, vice versa, that human cognition has a truthvalue

    if and only if it is free of emotions.

    Expectations:

    I expect to learn about the intercultural information ethics.

    Book Review:

    The author of this chapter is Rafael Capurro. Rafael discussed the cultural part where

    intercultural information ethics has been occurred. There were frameworks were the cultured

    country has been surrounded by the common culture thru experience of existence in the world.

    They follow some traditions since they were given birth by their ancestors. Computer ethics can

    be followed in this chapter by means of cultivating plans or by traditions.

    Things I have learned:

    I learned that the culture can be affected by means of computer ethics.

    Integrity Questions:

    1.) Who is Toru Nishigaki?2.) What is culture?3.) Who is Terrell Ward Bynum?4.) Who is Bernd Frohmann?5.) Who is Lorenzo Magnani?