Book Reviews on Handbook of Information and Computer Ethics

Embed Size (px)

Citation preview

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    1/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL FRAMEWORKS:1. Foundation of Information Ethics (Luciano Floridi)

    Library Reference: N/A

    Internet Reference: N/A

    Quote: Our society is the information societybecause of the pivotal role played by intellectual,intangible assets (knowledge-based economy), information-intensive services (business andproperty services, communications, finance, and insurance), and public sectors (education, publicadministration, health care).

    Learning Expectation: I expect to learn and to understand the infosphere, which they say thathumanity is and will be flourishing.

    Book Review:

    Infosphere is a neologism coined years ago (see, e.g., Floridi (1999b) or Wikipedia) based onBiosphere, a term referring to that limited region on our planet that supports life. It denotes thewhole informational environment constituted by all informational entities (thus includinginformational agents as well), their properties, interactions, processes, and mutual relations. It isan environment comparable to, but different from, cyberspace (which is only one of itssubregions, as it were), since it also includes offline and analogue spaces of information.

    When I first heard the word infosphere I automatically think that it means information cycle.Lucky me, I was right. It was a cycle, a cycle of information. When we were all children, we

    studied about cycles, life cycles, time cycles, etc. In our Science classes, we often hear the wordsphere. Information sphere or infosphere for me is like the evolution of information. It explainshow information evolves and progress as time goes on. I must admit, I havent thought that thiscycle or rather the term infosphere exists. I used to think that information will just pop out of theblue when somebody discovers something. But I guess I am wrong. Even before, ages ago, weare all under information. It is where our life cycles. We are not just aware of it. But now, as we allknow, information plays an important role in our lives. Even in an individual being, in our dailylives, we are all surrounded by information. At any places we go, what we will do, we haveinformation. Information can be developed and eventually evolves.

    In the world we live in, now a day, we are valuing all the information that we have. Well, for me,every fruit of technology is based on information. For if there is no information, we wont haveeverything that we need. Lets just simply explain this. Information is knowledge for everyone. If

    we know something, we can do something. We can explain and elaborate things that seemunexplainable before. We can do further studies and come up with a better result or betterinformation.

    We live in an information society. The environment where we exist is made up of information thatevolves every second in our life. In every corners of the world, we are surrounded by information.We might not be aware at first but when we think about it, we will discover and learn in our ownlittle ways that every here and there, there is information. I believe that every technology that weare experiencing is because of information. For example, we have now, ipods, itouch, iphone,mp3 players, and the like. Have you ever come to think that these are all fruits of technology?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    2/53

    And this technology is only made possible by information. Information is a pivotal or the centralaspects of our society today. It is the most crucial aspect in our environment.

    Citations: Luciano Floridi

    Integrative Questions:1. What is infosphere?2. What is an information society?3. What is biosphere?4. Is humanity will be flourished?5. Is our society an information society?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    3/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL FRAMEWORKS:2. Milestones in the History of Information and Computer Ethics(Terrell Ward Bynum)

    Library Reference: N/A

    Internet Reference: http://en.wikipedia.org/wiki/Cybernetics

    Quote: The academic field of information ethics was bornunintentionally and almostaccidentallyin the middle of the Second World War. At that time, philosopher/ scientist NorbertWiener was working with a group of scientists and engineers who were involved with him in theinvention of digital computers and radar, and the creation of a new kind of antiaircraft cannon thatcould (1) perceive the presence of an airplane, (2) gather information about its speed andtrajectory, (3) predict its future position a fewseconds later, (4) decidewhere to aim andwhen to

    fire the shell, and (5) carry out that decision.

    Learning Expectation: I expect to learn the history and every milestone of Information andComputer Ethics. I want to learn how it became possible that information played a very vital rolein every aspect of life, during the early times.

    Book Review:

    Wieners cybernetic account of human nature emphasized the physical structure ofthe human body and the tremendous potential for learning and creative action that humanphysiology makes possible. To explain that potential, he often compared human physiology to thephysiology of less intelligent creatures like insects.

    Cybernetics takes the view that the structure of the machine or of the organism is an index of theperformance that may be expected from it. The fact that the mechanical rigidity of the insect issuch as to limit its intelligence while the mechanical fluidity of the human being provides for hisalmost indefinite intellectual expansion is highly relevant to the point of view of this book . Mansadvantage over the rest of nature is that he has the physiological and hence the intellectualequipment to adapt himself to radical changes in his environment. The human species is strongonly in so far as it takes advantage of the innate, adaptive, learning faculties that its physiologicalstructure makes possible. (Wiener, 1954, pp. 5758, italics in the original).

    What is cybernetic? Have you already heard about it? Well for me, it was my first time toencounter the word cybernetic. I was sort of confused because I thought that if we already haveinformation sphere or infosphere how come a new term arises. According to wikipedia,

    Cybernetics is the interdisciplinary study of the structure of regulatory systems. Cybernetics isclosely related to control theory and systems theory. In comparison, if information sphere is thelife cycle of information, cybernetic is the interdisciplinary way of studying the theory of systems.

    Cybernetic is a wide field of study. As I first understand it, cyber means like technology, and thelike, while ethics means moral or the righteous. But I guess my very own definition of cyberneticsis somewhat true and somewhat false. It is said that it is the interdisciplinary study of systemstheory. In the first part of this reading, it is explained there that the academic field of informationethic was born somewhere in the middle of the second war. Clearly, it was ages ago. It alsostated that it was unexpected.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    4/53

    For me cybernetic is like studying a special field. A field of technology and information. But thisstudies involves morality and what is right and wrong.

    Citations: Terrell Ward Bynum

    Integrative Questions:1. What is computer history?2. What are the milestones?3. What is cybernethics?4. What kind of study is cybernethic?5. What is the role played by information in the society?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    5/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL FRAMEWORKS:3. Moral Methodology and Information Technology(Jeroen van den Hoven)

    Library Reference: N/A

    Internet Reference: N/A

    Quote: Computer ethics is a form of applied or practical ethics. It studies the moral questionsthat are associated with the development, application, and use of computers and computerscience. Computer ethics exemplifies, like many other areas of applied and professional ethics,the increasing interest among professionals, public policy makers, and academic philosophers inreal-life ethical questions. Posing ethical questions about privacy, software patents, responsibilityfor software errors, equal access, and autonomous agents is one thing; answering them is

    another. How should we go about answering them, and how can we justify our answers? Howshould we think about practical ethical issues involving computers and information technology(IT)?

    Learning Expectation: I expect to learn more about computer ethics.

    Book Review:

    I must admit that it came with a bit of a shock when I first heard of IT ETHICS and ComputerEthics. I used to think that ethic is a short term for ethical, right manners and proper conducts.These ethical manners are to be observed when you are in fancy restaurants, if you are with yourparents, aunts and uncles. I used to study this when I was in grade school during my Christian

    Living and Values Education. It was the first time I heard about ethics. And then when I have mytheology classes in college, I also heard the word ethics or moral conducts. Even in myphilosophy class, I studied ethical conducts and manner. So I was surprise and amazed when Iencounter the word ETHICS in information technology.

    As I read this chapter, I come to think, what is computer ethic? What does ethic got to do with thecomputer system. And then I read this line:

    The properties of IT may require us to revisit traditional conceptualizations and conceptions ofprivacy, responsibility, property; but they do not require a new way of moral thinking or a radicallynew moral methodology, which is radically different from other fields of technology andengineering ethics. Neuroscience, nanotechnology, and gene technology will provide us withproblems we have not dealt with before, but our moral thinking has revolved in the past, and will

    revolve in the future, around a familiar and central question: how we ought to make use oftechnology to benefit mankind, and how to prevent harm to human beings, other living creatures,the environment, and other valuable entities we decide to endow with moral status.

    Clearly, it is stated that although IT is like all about technology, which is a part of science, in someway however, there are some factors that we must insert our moral obligations. We must stillthink what can be the best for what we are doing without harming others. Even though Scienceand IT is as the same, since it studies how to perfect mans life with technology, Morality issuesare still involved. Morality and ethics, for me, can play an essential role in computer or ITsystems. Maybe because technology may not be good for us if we dont feel that it is right for us.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    6/53

    If what we have or what we experiencing now hurts other or destroy animal life or theenvironment, we should still consider thinking about moral values. We can have all what we wantwithout harming others, or by just being ethical.

    Citations: Jeroen van den Hoven

    Integrative Questions:1. What is computer ethics?2. What are the morals?3. What does computer ethics exemplifies?4. What is ethics?5. What are the requirements of the properties of ethics?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    7/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART I: FOUNDATIONAL ISSUES AND METHODOLOGICAL FRAMEWORKS:4. Value Sensitive Design and Information Systems(Batya Friedman, Peter H. Kahn Jr., and Alan Borning)

    Library Reference: N/A

    Internet Reference: N/A

    Quote: Value Sensitive Design is a theoretically grounded approach to the design of technologythat accounts for human values in a principled and comprehensive manner throughout the designprocess. It employs an integrative and iterative tripartite methodology, consisting of conceptual,empirical, and technical investigations. We explicate Value Sensitive Design by drawing on threecase studies. The first study concerns information and control of web browser cookies, implicatingthe value of informed consent. The second study concerns using high-definition plasma displays

    in an office environment to provide a window to the outside world, implicating the values ofphysical and psychological well-being and privacy in public spaces. The third study concerns anintegrated land use, transportation, and environmental simulation system to support publicdeliberation and debate on major land use and transportation decisions, implicating the values offairness, accountability, and support for the democratic process, as well as a highly diverse rangeof values that might be held by different stakeholders, such as environmental sustainability,opportunities for business expansion, or walk able neighborhoods. We conclude with direct andpractical suggestions for how to engage in Value Sensitive Design.

    Learning Expectation: I expect to learn and to understand the definition of Value SensitiveDesign. I also want to know how to differentiate product design that is value sensitive and not,How do we easily distinguish what its difference features and specifications.

    Book Review:

    In every product, design is important. It is what the buyers will first notice. Having a good designwill surely be an eye-catchy for customers. As a buyer, when I am looking for something to buy, acellular phone for example, I always ask what does it looks like. If it is the latest brand, thefeatures, and the like. Design is important because it is what you and others will see. But ofcourse, features and specifications are also important. For me, as a regular costumer, if the looksor the design is perfect but the features is not worth the money Ill spend, I will just easily drop thechance or opportunity of buying the product, but for others, design means a lot. I have a friendwho is so gaga about ipod shuffle before. She said its handy, cute and besides it apple. But thereare also mp3 players that time. It is also handy and cute but design wise ipod shuffle is more funto see.

    Value Sensitive Design is a theoretically grounded approach to the design of technology thataccounts for human values in a principled and comprehensive manner throughout the designprocess.

    When we say Value, we often think monetary value and the like. We used to think that value andmoney are synonymous. How we use the term value is like how we use the term money. But aswe all know, when we were still at our young age, we do encounter the term value. Have we allhad the Christian Living and Values Education when we were in grade one up to our grade six?Surely all of us had an experience talking about Value in a different way. Different in a sense that

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    8/53

    value is all about moral conducts not in a monetary term. In the reading, a broader framing ofvalues has a long history. Since the time of Plato, for example, the content of value-orienteddiscourse has ranged widely, emphasizing the good, the end, the right, obligation, virtue, moraljudgment, aesthetic judgment, the beautiful, truth, and validity

    Citations: Batya Friedman, Peter H. Kahn Jr., and Alan Borning

    Integrative Questions1. What is value?2. What are moral conducts?3. What is the content of value-oriented?4. What is value-sensitive?5. What is a product design?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    9/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART II: THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY,ANONYMITY AND SECURITY5. Personality-Based, Rule-Utilitarian, and Lockean Justifications of

    Intellectual Property (Adam D. Moore)

    Library Reference: N/A

    Internet Reference: http://en.wikipedia.org/wiki/Intellectual_property http://en.wikipedia.org/wiki/Utilitarianism

    Quote: Intellectual property is generally characterized as nonphysical property that is the productof cognitive processes and whose value is based upon some idea or collection of ideas. Typically,rights do not surround the abstract nonphysical entity, orres, of intellectual property; rather,intellectual property rights surround the control of physical manifestations or expressions.

    Systems of intellectual property protect rights to ideas by protecting rights to produce and controlphysical embodiments of those ideas.

    Learning Expectation: I expect to learn and to understand Intellectual Property and Utilitarianism.

    Book Review:

    Intellectual Property, according to Wikipedia, is the legal property rights over creations of themind, both artistic and commercial, and the corresponding fields of law. Under intellectualproperty law, owners are granted certain exclusive rights to a variety of intangible assets, such asmusical, literary, and artistic works; ideas, discoveries and inventions; and words, phrases,symbols, and designs. Apparently, it is the things that we own, technically, or what are beyond

    our control.

    In my own words, I can say that intellectual properties are the one that you created or made. It iswhere you have the complete authority in it. For example, you are the one who invented the oventoaster; surely, you are the one who has the intellectual rights in it. You are the inventor soapparently you are the owner of the ideas.

    Speaking of Utilitarian, Utilitarianism is the idea that the moral worth of an action is determinedsolely by its contribution to overall utility: that is, its contribution to happiness or pleasure assummed among all persons. It is thus a form of consequentialism, meaning that the moral worthof an action is determined by its outcome: put simply, the ends justify the means. Utility, the goodto be maximized, has been defined by various thinkers as happiness or pleasure (versussuffering or pain). It may be described as a life stance, with happiness or pleasure being of

    ultimate importance.

    Rule utilitarianism is a form of utilitarianism which states that moral actions are those whichconform to the rules which lead to the greatest good, or that "the rightness or wrongness of aparticular action is a function of the correctness of the rule of which it is an instance

    The main concept of Utilitarian is The greatest good for the greatest number". I remember, wehave this discussion at ITETHIC class about utilitarianism. The root word is utility which simplymeans object or things. As I recall, happiness is measured with pleasure. What is pleasurableand feels good will make you happy. But come to think of it, what if what makes you happy do not

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    10/53

    make your neighbors happy? Isnt that utilitarianism means that happiness must be in thegreatest number, or which means, in happiness must be felt by everyone not only you inparticular. So as I come to thinking, what if this certain thing makes you happy but do not makeothers happy, are you willing to risk or ignore your own feelings just to follow this concept?

    Citations: Adam D. Moore

    Integrative Questions:

    1. What is rule-utilitarian?2. What is utilitarianism?3. What is intellectual property?4. What is the main concept of utilitarianism?5. What is consequentialism?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    11/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART II: THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY,ANONYMITY AND SECURITY6. Informational Privacy: Concepts, Theories, and Controversies(Herman T. Tavani)

    Library Reference: N/A

    Internet Reference: N/A

    Quote: We demand recognition of our right to privacy, we complain when privacy is invaded, yetwe encounter difficulties immediately [when] we seek to explain what we mean by privacy, what isthe area, the content of privacy, what is outside that area, what constitutes a loss of privacy, aloss to which we have consented, a justified loss, an unjustified loss.

    H.J. McCloskey (1985, p. 343).

    Learning Expectation: I expect to learn what privacy got to do with information. What are itstheories, concepts and controversies?

    Book Review:

    The book talks about private or privacy in particular. There are different forms or kinds of interestthat this book tackles. These are Interest-Based Conceptions and Rights-Based Conceptions ofPrivacy.

    Privacy interest privacy protects the interest individuals have in sustaining a personal space,

    free from interference by other people and organizations. Privacy does not simply protect onesspatial interests, nor does it merely protect ones reputational interest from potential harm thatmight result in a privacy intrusion, it also protects ones interest in being able to think and planones conduct and to lead a rational life. Other authors suggest that privacy protects a tangibleproperty interest that individuals have with respect to their personal information. An interests-based conception of privacy have suggested that privacy protection schemes can simply bestipulated (as a procedural matter) as opposed to having to be grounded in the kinds ofphilosophical and legal theories needed to justify rights. Discussions involving privacy in terms ofan explicit right moral, legal, or otherwisehave often become mired in controversy.

    We all need some privacy in our life. But are we all clear about the word privacy? Privacy is theability of an individual or group to seclude them or information about themselves and therebyreveal them selectively. The boundaries and content of what is considered private differ among

    cultures and individuals, but share basic common themes. Privacy is sometimes related toanonymity, the wish to remain unnoticed or unidentified in the public realm.

    The book discusses about the Four Distinct kinds of privacy: Physical/ Accessibility, Decisional,Psychological /Mental, and Informational Privacy.

    The book also discusses about Control Theory. Control Theory means privacy is directly linked toones having control over information about oneself. Privacy just not means that you are the onlyone who knows something and the others are completely unaware of it. In other words, when youknow something and the others have no idea about that fact, it does not mean that that thing is

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    12/53

    something private. Some things become private when you have a complete control over it. Whenyou can control and you have the complete charge on it, thats the time you can call it a completeprivacy.

    Citations: Herman T. Tavani

    Integrative Questions:

    1. What is the concept of privacy?2. What are the theories of privacy?3. What is privacy?4. What are the controversies in privacy?5. What are the Four Distinct kinds of privacy?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    13/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART II: THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY,ANONYMITY AND SECURITY7. Online Anonymity(Kathleen A. Wallace)

    Library Reference: N/A

    Internet Reference: http://en.wikipedia.org/wiki/Anonymity

    Quote: The idea of a kind of naturally occurring, spontaneous anonymity is embodied incharacterizations of someone as a member of an anonymous mass or in expressions such asthe logic of anonymity in modern life. There are two ideas at work here. One is the thought thatanonymity could be the byproduct of sheer size as when one is among a throng of people whodont know one another. The other is the thought that anonymity could be the byproduct of

    complex social organization, where society is organized such that ones social locations aredispersed and not necessarily connected with one another.

    Learning Expectation: I expect to learn and understand the definition of Anatomity.

    Book Review:

    Online Anonymity. When I first saw the title, I got a little confused. What is anatomity? IsAnatomy and Anatomity same? Anatomity means:

    The term anonymity has been used to denote a number of related things: namelessness,detachment, unidentifiability, lack of recognition, loss of sense of identity or sense of self, and soon. Anonymity can also be brought about in a variety of ways and there are many purposes, both

    positive and negative, that anonymity could serve, such as, on the positive side, promoting freeexpression and exchange of ideas, or protecting someone from undesirable publicity or, on thenegative, hate speech with no accountability, fraud or other criminal activity. Anonymity andprivacy are also considered to be closely related, with anonymity being one means of ensuringprivacy.

    According to wikipedia, Anatomity is derived from the Greek word which means "without a name"or "namelessness". In conversational use, the term typically refers to a person, and often meansthat the personal identity or personally identifiable information of that person is not known. a well-defined set, the "anonymity set, "anonymity" of that element refers to the property of that elementof not being identifiable within this set. If it is not identifiable, then the element is said to be"anonymous". The term "anonymous message" typically refers to message that does not carry

    any information about its sender and its intended recipient. It is therefore unclear if multiple suchmessages have been sent by the same sender or if they have the same intended recipient.

    Obviously, anatomity means anonymous. But what is the connection between going online andanatomity? Have you ever experience someone whos sending you message but you have noclue who is it from? Anonymous sender, now a day is freaky no more. I suppose. We allencounter that thing when somebody sends us quotes and messages but we dont know where itcame from. I believe that the internet is a powerful tool. We can make the impossible, possible.The Internet as a social environment may be of concern in so far as it has the capacity to

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    14/53

    increase the scope of natural or spontaneous anonymity as a by-product of or endemic to thenature of online communicative relations.

    Citations: Kathleen A. Wallace

    Integrative Questions:

    1. What is online anonymity?2. What is anonymity?3. What is the idea of spontaneous anonymity?4. Is anonymity safe?5. Is anonymity legal?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    15/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART II: THEORETICAL ISSUES AFFECTING PROPERTY, PRIVACY,ANONYMITY AND SECURITY8. Ethical Issues Involving Computer Security: Hacking,Hacktivism, and Counterhacking(Kenneth Einar Himma)

    Library Reference: N/A

    Internet Reference: http://answers.yahoo.com/question/index?qid=20081022072100AAzcJGyhttp://en.wikipedia.org/wiki/Hack_(technology_slang)

    Quote: There are two problems with this argument. First, assuming that hacking is a species oftrespass, it doesnt follow that all hacking is wrong because not all trespasses are wrong. It ispermissible to trespass onto your land if doing so is the only way to capture a murderer fleeing

    the crime scene; committing a minor trespass is morally justified as the only way to secure thegreat good of stopping a killer. If hacking is trespass, then hacking necessary to secure somegood that significantly outweighs the evil involved in trespass would also be justified.Second, and more importantly, it is not clear that the concept of trespass properly applies todigital intrusions. The term trespass has largely been reservedat least in moral usagetorefer to acts in which one person enters upon physical space owned by another, but a hacker isnot in any literal sense entering upon a physical space owned by another person. Perhaps digitalintrusion is more like using heat sensors to see what is going on inside a house, which is notusually characterized as trespass, than like coming into the house without permission.

    Learning Expectation: I expect to learn and really understand the Hacking, Hactivism and Counterhacking. What are the differences and are they illegal or not?

    Book Review:

    I first heard the term hack or hackers when I first made my Yahoo Mail. My brother said to methat I should keep my password because somebody might hack it. I got a little confused. Howcome somebody can hack my password if the only person who knows it is me? It was soconfusing. I thought that hacking is synonymous to stealing. But hacking is when you stealsomething online, like passwords, email address, and the like. But what is hacking? Is it reallystealing?

    Hack or Hacking has several meanings in the technology and computer science fields. It mayrefer to a clever or quick fix to a computer program problem, or to a clumsy or inelegant solutionto a problem. The term is also used to refer to a modification of a program or device to give the

    user access to features that were otherwise unavailable, such as DIY circuit bending.

    I read this article about how to be a hacker and it says:

    The hacker mind-set is not confined to this software-hacker culture. There are people who applythe hacker attitude to other things, like electronics or music actually; you can find it at thehighest levels of any science or art. Software hackers recognize these kindred spirits elsewhereand may call them hackers too and some claim that the hacker nature is really independent ofthe particular medium the hacker works in. But in the rest of this document we will focus on the

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    16/53

    skills and attitudes of software hackers, and the traditions of the shared culture that originated theterm hacker.

    Hactivism, on the other hand simply means hacking actively or the combination of the words,hack and activism, while counter hacking means Defending yourself against hacking does notinclude counter-hacking though.

    Citations: Kenneth Einar Himma

    Integrative Questions:

    1. What is Hacktivism?2. What is hacking?3. Is hacking legal?4. What is counterhacktivism?5. Is this also legal?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    17/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART III: PROFESSIONAL ISSUES AND THEINFORMATION-RELATED PROFESSIONS9. Information Ethics and the Library Profession(Kay Mathiesen and Don Fallis)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn what does librarian got to do with Information Ethics?

    What does library profession means in a different way?

    In what way does the librarian is considered as information provider?

    Quote:

    Librarianship as a distinct profession, however, is relatively a recent development. With theadvent of the printing press, collections of works became larger and more complex, thus creatinga greater need for someone devoted to organizing and cataloging such collections.

    We begin this chapter by considering the mission of the librarian as an information provider andthe core value that gives this mission its social importance. Of course, librarians face the standardethical issues that arise in any profession, but our focus here will be on those issues that arise inrelation to the role of the librarian as an information provider. In particular, we will be focusing onquestions of the selection and organization of information, which bring up issues of bias,neutrality, advocacy, and childrens rights to access information. All these issues bring upimportant challenges to what is commonly seen as the core value of librarianshipintellectualfreedom.

    Book Review:

    In any libraries Ive been to, there is always a librarian. The librarians are the one whomyou can ask about where to find a book, what kind of books suits your question, what section youcan find children books or novels, etc. In this reading, the introduction part describes the librarianas the information provider. Clearly, they are the ones whom you can ask for guide andassistance inside the library. Surely, they know the where abouts and what abouts inside the

    library. Librarianship is said to be a different or distinct profession. I have never known a librarianpersonally. I just meet them when I am inside a library. But I agree on the statement that they arean information provider. It is said that they face the standard in any ethical issues that arise in anyprofessions. I believe that that this statement is also true. Since they are the information provider,their minds are open in all substances and circumstances or in any issue around them. The corevalue of the librarianship is said to be intellectual freedom. This statement explains that sincelibrarians mind are open or always welcoming new thoughts, from the books and all the articlesthey have read, they are resilient or open minded in any situation that they will face. The way theythink is based on many assumptions or many readings that they have.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    18/53

    Integrative Questions:

    1. Who are the information providers?2. What is the core value of librarianship?3. What are the issues that a librarian faces?4. What is said to be a distinct profession?5. Why greater needs for someone devoted to organizing and cataloging do arise?

    What I have learned?

    I have learned that a librarian jobs is not just any ordinary job or task

    A librarian is an information provider

    The core of librarianship is intellectual freedom

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    19/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART III: PROFESSIONAL ISSUES AND THEINFORMATION-RELATED PROFESSIONS10. Ethical Interest in Free and Open Source Software(Frances S. Grodzinsky and Marty J. Wolf)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn what the definition of ethical interest is.

    What does open source software means?

    What does ethical interest have to do with free and open source software?

    Quote:

    Both open source and proprietary developers share the professional ethical responsibility todevelop solid, well-tested code. However, the influences on open source software developers tomaintain this ethic differ substantially. Proprietary software establishes a strong distinctionbetween developers and consumers. An interesting aspect of OSS is that this distinction can beless pronounced, suggesting that ethical models for analyzing that relationship need to bedifferent. Most obviously, when developers and users of OSS neither get nor give payment,Financial self-interest is no longer a major concern. Developers are not using consumers to gettheir money. Users are not trying to negotiate an unfair deal for software. Instead, bothdevelopers and consumers in OSS are cooperating freely in the OSS project.The social pressure in the open source community to avoid code forking provides incentives forproject leaders to ensure that the code is the best it can be. On the contrary, when an opensource developer believes there is too much risk associated with a particular piece of code,he/she can rewrite it and release it. Although there is a reputation risk in doing so, there is theopportunity to publicly demonstrate that the forked product is superior.

    Book Review:

    Open source software, as I understand it, is free or something that you can use or seewithout even paying for it. I know that in the Ten Commandments on IT we discussed says thatThou shall not copy or use proprietary software which you have not paid. Since open source

    software means free software, using it is legal. I guess, using it for your own learning is okay butwhen you start using it for profit, thats the time it can become illegal. Its like selling somethingthat you dont own or you just steal.

    Proprietary software has a distinct relationship with their consumers. Of course, they areearning money from those people so a proper relationship must be build. Both proprietary andopen source software developer have an ethical responsibility. Sure they are both working forother people sake, but it differs. Though they both develop a code, in some way or another, the

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    20/53

    codes being offered by a proprietary software developer from an open source software developerdiffers.

    Integrative Questions:

    1. What is an Open Source Software?2. What is proprietary software?3. What are the differences between the two?4. Are the two have the same relationship with their consumers?5. Financial Interest is not the concern of what software?

    What I have learned?

    I have learned about the difference from open source software from proprietary software.

    I have learned how does the proprietary software developer deals with consumers

    I have learned that although the two differs in some ways, it both have an ethicalresponsibility.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    21/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART III: PROFESSIONAL ISSUES AND THEINFORMATION-RELATED PROFESSIONS11. Internet Research Ethics: The Field and Its Critical Issues(Elizabeth A. Buchanan and Charles Ess)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn what Internet Research Ethics is.

    What are the emerging issues that arise because of Internet?

    Is internet safe for minors?

    Are all the sources that we get in the internet are reliable?

    Quote:

    Internet research ethics (IRE) is an emerging multi- and interdisciplinary field that systematicallystudies the ethical implications that arise from the use of the Internet as a space or locale of,and/or tool for, research. No one discipline can claim IRE as its own, as various disciplines sincethe 1990s have used the Internet for research and, to some extent, grappled with the ethicalimplications of such research. Indeed, because Internet research is undertaken from a wide

    range of disciplines, IRE builds on the research ethics traditions developed for medical,humanistic, and social science research; this means in turn that a central challenge for IRE is todevelop guidelines for ethical research that aim toward objective, universally recognized norms,while simultaneously incorporating important disciplinary differences in research ethicsachallenge frequently met in IRE through pluralistic approaches that conjoin shared normsalongside such irreducible differences. Indeed, at the heart of IRE is an intertwined convergenceas IRE seeks to draw from the insights of applied ethics, research methods, information andcomputer ethics, and comparative philosophy, especially vis-_a-vis the possibility of developing aglobal IRE that simultaneously preserves irreducible differences defining diverse culturaltraditions while developing a more global IRE for Internet research undertaken by researchersaround the world.

    Book Review:

    Now-a-days, when we want to research something, instead of using books orencyclopedia, we are using the internet. Internet is one of the fruit of technology that we areexperiencing. It can make our life easier. When we want to search for something, like stories,articles, you will just type it in a search engine, and just like that, answers will just pop out. One ofmy professor mentioned that what you see in the internet are not all reliable. Sometimes, differentfacts from different perspective were posted. We may post something that might be true or falsein the internet.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    22/53

    There are a lot of issues arise when internet became popular. One common example ischatting. Most teen-agers are all into chatting, meeting friends online and stuff. Thru this a lot ofcrimes happened. Rape and stealing are common examples. Most cases are criminal cases thatarise because of internet.

    Integrative Question:

    1. What is IRE?2. What are the common issues emerge because of internet?3. Is internet safe for teen-agers?4. Is internet a reliable source of information?5. What does IRE builds?

    What I have learned?

    I learned that thru internet, life become fast moving.

    But the internet is not all about good stuffs and the like.

    Internet is not the most reliable source.

    Internet isnt safe for minors.

    Most cases are reported because of the internet.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    23/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART III: PROFESSIONAL ISSUES AND THEINFORMATION-RELATED PROFESSIONS12. Health Information Technology: Challenges in Ethics, Science,and Uncertainty(Kenneth W. Goodman)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn what Health Information Technology is.

    What are the so called challenges?

    Does Health Information Technology is accepted around the globe?

    How popular is Health Information Technology?

    Quote:

    ..as a practical matter, it is often essential for individuals to disclose sensitive, even potentiallyembarrassing, information to a health care provider to obtain appropriate care. Trust inprofessional ethics and established health privacy and confidentiality rules encourages individualsto share information they would not want publicly known. In addition, limits on disclosure are

    designed to protect individuals from tangible and intangible harms due to widespread availabilityof personal health information. Individual trust in the privacy and confidentiality of their personalhealth information also promotes public health because individuals with potentially contagious orcommunicable diseases are not inhibited from seeking treatment. . . In an age in which electronictransactions are increasingly common and security lapses are widely reported, public support forthe [National Health Information Network] depends on public confidence and trust that personalhealth information is protected. Any system of personal health information collection, storage,retrieval, use, and dissemination requires the utmost trust of the public. The health care industrymust commit to incorporating privacy and confidentiality protections so that they permeate theentire health records system(National Committee on Vital and Health Statistics, 2006).

    Book Review:

    Health Information Technology. I have leaned about this thru television. I watched aseries which tackles this technology. If I am not mistaken, you will just type in your symptoms andwhat possible sickness you have will just pop out. Its like researching your condition. You will alsosee what possible medicines might cure your sickness. I think that this thing is totally anadvanced technology. I was amazed. But I still dont take chances. If I am sick, I wont just typemy symptoms and believe what the internet might say. I will definitely go to hospital and ask formedical advice. Maybe it isnt bad to check yourself thru the internet but it is not safe to dependon the internet about your condition.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    24/53

    Busy people might be used to this but I still do believe that anything we read and see inthe internet are not all hundred percent reliable.

    Integrative Questions:

    1. What is Health Information Technology?2. Is it safe?3. Is it reliable?4. Are most people relying on this now?5. What are the reasons why most people trust this technology?

    What I have learned?

    I have learned what is Health Information Technology

    I have also learned that most people trust this technology because of privatereasons and confidentiality issues.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    25/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART III: PROFESSIONAL ISSUES AND THEINFORMATION-RELATED PROFESSIONS13. Ethical Issues of Information and Business(Bernd Carsten Stahl)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn Business Ethics

    What are the issues involve in business ethics?

    Quote:

    Moral norms are important for the functioning of an economic system. If people did not honorcontracts, pay their dues, give accurate information about products, and generally follow themoral code of society, economic transactions would become difficult to sustain (De George, 1999;Donaldson and Dunfee, 1999; Hausman and McPherson, 1996; Schwartz and Gibb, 1999; Sen,1987). At the same time, ethics as the theory of morality plays an important role in justifying theeconomic system and thus allowing economic agents to feel legitimated in acting within thesystem. One justification of our current economic system is the utilitarian consideration that freetrade creates the goods that allow individuals to satisfy their preferences and live a good lifeaccording to their own design (Gauthier, 1986; Good paster and Matthews,1982). Other streamsof justification of a market-oriented constitution of society would be the natural rights tradition thatcan be used to ground a right in personal property (Nozick, 1974). Where personal property isaccepted, market mechanisms can easily gain a measure of legitimacy.

    Book Review:

    We all know the meaning or the definition of ethics. Ethics or ethical manner is the rightconduct that we should practice. It is a moral norm that most of us exercise. In business, there isalso a norm or proper conduct that business people should follow. The quote above stated thatmoral norms are important for the functioning of the economic system. If we think about it, if thereis no moral norm involve in a business, there might be a lot of thief and misconduct that willcirculate in the business industry. If that happens, how can an economy rise? Business is like anyother sectors. In school, we also have moral norms that we follow. Because of these moral

    norms, we are aware if what we do is wrong or right.

    Any sectors in the society may not function right if there are no moral norms that peoplefollows. This may lead to the downfall of any area or zone in the society.

    Integrative Questions:

    1. Are moral norms important?2. In what system these moral norms are important?

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    26/53

    3. Does business have its own set of moral norms?4. What might happen if there is no business ethics?5. Where do ethics as the theory of morality plays an important role?

    What I have learned?

    I have learned about business ethics. The moral norms involve in any sectors in thesociety.

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT

    14. Responsibilities for Information on the Internet(Anton Vedder)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn if the internet is a reliable source of information.

    Quote:

    Interestingly, the typology of essential and significant information is not enough. As we saw, onlypart of the problems with regard to the assessment of online information are primarily caused bythe providers, for example, through the presentation of the information. Often, the initial cause ofthe problems is the incompetence of users.Therefore, what is necessary is

    (1) The creation of new credibility-conferring systems, such as certification systems, allowing usto use pedigree criteria with regard to (online) information, when such systems are lacking.

    (2) Raising the visibility of indicators or markers of reliability of information (according to pedigreecriteria).

    (3) Raising expertise and background knowledge in all users (to enable them to recognize

    reliability on the basis of pedigree criteria).

    (4) Raising the awareness of the varying qualities of information.

    Book Review:

    Is the information that we read and saw in the internet are reliable? One of my professorsaid that the internet is the fastest way of getting and receiving information. It is also complete.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    27/53

    Usually when we do our research, instead on using the traditional source of information and facts,the books, we tend to use the internet. Internet compared with book, internet is less hassle. Anywhere, any time, you can search for everything. In books, you need to drag yourself in the libraryor in a bookstore. You need to do a full time research. A lot of reading is also included. Oneadvantage of the internet is that when you want to search for something, you will just search it inany search engines like Google, yahoo, etc. But is everything that we see in the internet are realand true? We all know that there are about a billion users of internet around the globe. Clearly,any users can simply add information, edit information. These information may be authentic orfraud. According to the quote above, there is a pedigree criteria. These criteria, as I understand it,helps us, internet users, if what we read and saw are really reliable. As I mentioned earlier in thispaper, all the information that we read in the internet may be right and may be wrong, so withthese pedigree criteria we will become aware if the information that we have are consistent.

    Integrative Question:

    1. What is a pedigree criteria?2. What is considered as one of the new credibility system?3. Is the information in the internet reliable?4. Why is pedigree criteria developed?5. Why does there is a need to raise expertise and background knowledge in all users?

    What I have learned?

    I have learned that there is a criteria that checks whether the information from the internetare reliable.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    28/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT15. Virtual Reality and Computer Simulation(Philip Brey)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn how high the impact of virtual reality in our generation.

    What is computer simulation got to do with virtual reality?

    Quote:

    Virtual reality and computer simulation have not received much attention from ethicists. It isargued in this essay that this relative neglect is unjustified, and that there are important ethicalquestions that can be raised in relation to these technologies. First of all, these technologies raiseimportant ethical questions about the way in which they represent reality and themisrepresentations, biased representations, and offensive representations that they may contain.In addition, actions in virtual environments can be harmful to others and raise moral issues withinall major traditions in ethics, including consequentialism, deontology, and virtue ethics.Although immersive virtual reality systems are not yet used on a large scale,Non immersive virtual reality is regularly experienced by hundreds of millions of users, in the formof computer games and virtual environments for exploration and social networking. These formsof virtual reality also raise ethical questions regarding their benefits and harms to users andsociety, and the values and biases contained in them.

    Book Review:

    Virtual reality, I heard a lot about it thru TV series that involves robots, time machines,outer space. All that seems unrealistic and unbelievable to see are because of virtual reality. Ibelieve that 3D is a part or is a virtual reality. Watching movies with 3D technology is verydifferent with the traditional way. With Virtual reality, we can feel that it is real, though it is reallynot. Another common example of virtual reality is gaming, which is popular among teenagers. Aswe all know, Nintendo wii offers a different way of playing computer games. You can play golf or

    tennis just like you are in real courts. These technologies we have today make our life easier. Ourown way of relaxation, like playing computer games, become more interesting because of allthese innovations. In the introduction part of the reading says that this topic, virtual reality andcomputer simulation, have not received much attention. It is said that there are a lot of moralproblems that should be raised on this topic. The way the virtual reality presents some scenesmaybe immoral or biased. In playing computer games, for example, there are guns and bombsinvolve in some games. Maybe this thing can lead some children in different way of thinking. Ibelieve that this reason is one of the main problems of virtual reality. Virtual reality may confuseda childs mind about what is the difference of reality from virtual reality.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    29/53

    Integrative Questions:

    1. What is Virtual Reality?2. Is it considered biased?3. Does virtual reality receive attention from ethicist?4. Is virtual reality maybe harmful?5. Does virtual reality represent misinterpretation?

    What I have learned:

    I have learned about some facts about virtual reality. Virtual reality is one fruit oftechnology that we have in our generation. For me, it makes our life more colorful. Wecan see things that feel so real. But there are some ethical issues with virtual reality, likeit can be harmful especially with children.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    30/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT16. Genetic Information: Epistemological and Ethical Issues(Antonio Marturano)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn genetic information.

    Epistemology of genetic information.

    Ethical issues involving genetic information

    Quote:

    Genetics has utilized many concepts from informatics. These concepts are used in genetics attwo different, albeit related levels. At the most basic level, genetics has taken the very notion ofinformation, central to the field of informatics, to explain the mechanisms of life. An example is thefamous Central Dogma of Genetics, which Crick (1958) describes as follows:

    The transfer of information from nucleic acid to nucleic acid or from nucleic acid to proteins maybe possible . . . but transfer from protein to protein or from protein to nucleic acid is impossible.Information means here the precise determination of sequence, either of bases in the nucleic acidand or of amino acid residues in the protein.

    At a higher level, molecular biologists claim that cells and molecules are machinery similar tocomputers; this cell-machinery actually contains devices useful to build up unique biologicalbeings starting from the information stored in a DNA.

    Book Review:

    The quote above compares information to nuclei acid. The terms used above are what abiologist studies. They say that computer is similar to molecules and cells. Cells and moleculesare said to be machineries and these machineries stored information in a DNA. In this sentence,it explains that a computer is, clearly, machinery which can store information. When we hear the

    word genetic, the first thing that we think is family hereditary.

    In the reading the computer machineries is also compared with eggs. I think this chaptertries to explain that computer also has a history or beginning. Like a human life, computer alsohas birth and evolution. I believe that this statement is somewhat relevant. Since this chaptertalks about genetics information, it simply says that computer also have traits that can be studiedand compare to humans.

    Integrative Question:

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    31/53

    1. What is genetic Information?2. Computer machineries are compared with?3. Genetics utilized many concepts of what?4. What are these two that is been considered as machineries?5. Where the cell machinery does stored information?

    What I have learned:

    I have learned that computer can be compared to human body. There are somesimilarities between us and the computers.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    32/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT17. The Ethics of Cyber Conflict(Dorothy E. Denning)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    I expect to learn The Law of Conflict Management.

    The Ethics of Cyber Conflict.

    Some examples of conflicts that can happened online

    Definition of cyberterrorism

    Quote:

    If the attacks are designed to be sufficiently destructive as to severely harm and terrorizecivilians, they become cyberterrorismthe integration of cyber attacks with terrorism.Although cyberterrorism is abhorrent and clearly unethical, hacktivism raises ethical questions.For example: Is it ethical for a group of hackers to take down a Web site that is being usedprimarily to trade child pornography, traffic in stolen credit card numbers, or support terrorist

    operations? Can the hacktivists protest the policies or practices of governments or corporationsby defacing Web sites or conducting web sit-ins? Can they attack vulnerable machines in orderto expose security holes with the goal of making the Internet more secure?

    Book review:

    Even via the internet, there are so-called cyber terrorism. It is the combination of cyberattacks and terrorism. They attack civilians, probably the users, and do harm the innocents. Iwasnt aware that there is a term like cyber terrorism before. I thought, terrorism just happens inthe war zone where you can kill and harm your opponent and the innocent people. Cyberterrorism is almost the same as terrorism. The only difference is, the damaging part happens inthe cyber world. I wasnt aware of this thing. A good example that I may give is that of people whohacks accounts and password of other people. Surely, they steal and do harm to other people. I

    can say that these people, who steal passwords, accounts, and the like, can be classified ascyber terrorist. Another example that I can site is that of people who spread virus online. Afriend once told me that viruses in the internet were been done by others who sell anti-virus cd. Atfirst I was shock. How come these people produce viruses and Anti-virus cd at the same time?But then I come to thinking, these people cant earn money if they do not have any customer. So,they need to produce these things so that people will buy their product.

    Integrative Questions:

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    33/53

    1. What is cyberterrorism?2. Cyberterrorism stands for?3. Is cyberterrorism ethical?4. Why? Or why not?5. Do hacktivist agree with cyberterrorism?

    What I have learned:

    I have learned about cyberterrorism. Cyberterrorism is an integration of cyber andterrorist. In short, doing wrong and unjust actions via the internet,

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    34/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART IV: RESPONSIBILITY ISSUES AND RISK ASSESSMENT18. A Practical Mechanism for Ethical RiskAssessment A SoDIS Inspection(Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    Ethical Risk

    Risk Analysis.

    General Standards

    Software as a tool in business

    Risk Management

    Quote:

    Informaticians have been evolving and refining techniques to mediate risks of developingsoftware products that meet the needs of their clients. The risks focused on include missed

    schedule, over budget, and failing to meet the system.s specified requirements (Boehm, 2006;Hall, 1998; Jones, 1994). This focus was later expanded to address software security as thehighest risk (Stoneburner et al., 2002). In spite of this attention to risks, a high percentage ofsoftware systems are being delivered late, over budget, and not meeting all requirements, leadingto software development being characterized as a software crisis and a mistrust of softwaresystems.

    Book Review:

    As the introduction part says, all business needs high end software. Software is anecessary tool in any business structure. For example, how can you be one of the leadingcompanies in the country if you dont have advanced software? This will tell you that you cantlead or have unique features for your business. But having an advance or pioneering softwaredoes not mean you have it all. You still have to consider some things. Assuming you have it all, ahigh end software, you will also need to know how to improve it. Of course, in any system, risksare involved. General standards, is said that it is available from almost all professional societies. Ithink it is the standard or the norms on what way you can approach each risk that may comealong. There is thing called Risk Management. In this way, you can manage or maybe avoid riskand find solutions to your problems. In Risk Management, there are several steps you need tounderstand. In risk analysis, you will need to identify the potential risk that you may encounter. Itslike taking list of all the problems that your system might come across to. It is said that RiskManagement is an iterative step. You need to analyze, evaluate and treat all risk. In ethical risk

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    35/53

    part, stakeholders are been identified. The stakeholders are the one who did not directly uses thesystem but still can be affected if problems occur in the system.

    .Integrative Questions:

    1. What is Risk Management?2. Who are the stakeholders?3. What is Risk Analysis?4. What is necessary for business operations?5. After analyzing risk, next step is?

    What I have learned?

    I have learned that business needs high end software. Software may break or make a business.A risk management is an iterative step in managing all risk that a system may encounter.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    36/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART V: REGULATORY ISSUES AND CHALLENGES19. Regulation and Governance of the Internet(John Weckert and Yeslam Al-Saggaf)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    Internet Governance

    Effective Regulation

    The Current Situation

    Technical Issues

    Quote:

    Some of these are issues of political morality, while others are issues of prudential rationality:(1) Whether it is legitimate, as a matter of political morality, for use of the Internet to be subject torestrictions;(2) If so, what kinds of restrictions would be morally justified (e.g., would censorship ofpornography? Or would limiting use of the web by businesses for commercial purposes, as has

    been demanded by some hacktivists?);(3) What kinds of enforcement mechanisms for otherwise justified restrictions would be morallypermissible (e.g., the usual coercive enforcement mechanisms like threats of incarceration orcode-based mechanisms that make the violation of these restrictions technologically impossible);(4) what sorts of enforcement mechanisms are likely to be most effective and hence conducemaximally to these prudential interests; and(5) What sorts of restrictions are prudentially justified as being in everyones best interest.

    Book Review:

    Internet governance is like a law that was been set or enforced by the government. Likeany other law, it has the dos and donts that an internet user must follow. There are severalquestions that were been raised with this issue. First, internet should be subject to restrictions.

    Well, we are all aware that nowadays, several groups are like anti-porn or anything that can harmthe user physically and mentally. In some countries, like the sample in the book, blocks site. InChina, Dalai Lama. Ive never been into China before but I know the fact that some countries doblock some sites because of the content. But I know that there are still internet freaks that can stillfind ways to upload tricky and non sense sites that fools people. As I know, the IP address isunique, so everyone are traceable, but as I said, there are some people who can find ways not tobe caught red handed. To what extent this thing can be empowered? I think it cant. Since thereare about billions of internet users around the globe, these set of rules are sort of useless.Internet is a free world. You can say whatever you want to, be whoever you want to, have fun,

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    37/53

    shop online, make reservations, call someone abroad, etc. There are a lot of things that you cando via the net. So I think if there are certain rules that an internet users should follow, these ruleswill eventually be worthless. Of course, most people will violate it. Thru the net we can have fun,there are no rules, and then suddenly rules are being put upon us.

    Integrative Questions:

    1. What is internet governance?2. What is the first question raised upon the internet governance?3. What is the site that has been blocked in China?4. What is an IP address?5. What are some technical issues in this problem?

    What I have learned?

    I have leaned what is internet governance. There are still some questions that are been raisedwith this issue, it includes technical issues.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    38/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART V: REGULATORY ISSUES AND CHALLENGES20. Information Overload(David M. Levy)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    Information Overload

    Information

    Quote:

    Information overload: Exposure to or provision of too much information; a problematic situationor state of mental stress arising from this. [OED Online, retrieved (June 11, 2007)].

    Information overload . . . refers to the state of having too much information to make a decision orremain informed about a topic. Large amounts of historical information to dig through, a high rateof new information being added, contradictions in available information, a low signal-to-noise ratiomake it difficult to identify what information is relevant to the decision. The lack of a method forcomparing and processing different kinds of information can also contribute to this effect.

    Information overload, according to these two definitions, is a condition in which an agent hasoris exposed to, or is provided withtoo much information, and suffers negative consequences asa result (experiences distress, finds itself in a problematic situation, is unable to make a decisionor to stay informed on a topic, etc.).

    Book Review:

    Information is data that has been arranged systematically form a fact. We are all awarethat we need information. Even in our basic living, we need to know the what abouts, the latestthing, etc. These things are called information. Now, the internet is the fastest and the latestsource of information. As a student, when researching something, instead of using books, I usethe internet. It is easy to use and way faster than books. The things that you researched are eventhe latest. You dont need tons of books to find all the stuffs you needed because now there is

    internet. The internet, as a source of information, encounters some problems. Problems such asinformation overload. I assume that most of us know that when you type something in theinternet, as you click on search, tons of information appears. I know for a fact that this informationis not true or real. Sometimes, it is just an opinion from other people. Like what I have said earlierin this book review, some internet resources are fraud. It is because anyone can upload anythingin the internet. Sometimes what you see or what you have researched in is more thaninformation. Sometimes it is even a lie about something. Having information overload is said toconfused people. I think it confused people in a way that tons of information is available and we

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    39/53

    dont know what is real and authentic. We tend to think or sometimes chose what we shouldbelieve and try to study. These things may really puzzle out our mind.

    Integrative Questions:

    1. What is information?2. What is information overload?3. Are all the things in the internet real and authentic?4. Are there problems arise because of information overload?5. Is information overload terrible situation?

    What I have learned?

    I have learned about information overload. It is true that because of internet, research becameeasy. But we must all be aware of not all the things posted in the internet are real. Sometimes itsa lie or an opinion. Not a fact. Information overload confuses people.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    40/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART V: REGULATORY ISSUES AND CHALLENGES21. Email Spam(Keith W. Miller and James H. Moor)

    Library Reference: N/A

    Internet Reference: http://en.wikipedia.org/wiki/Spam_(electronic) http://en.wikipedia.org/wiki/E-mail_spam

    Learning Expectation:

    Email

    Spam

    Junk mail

    Quote:

    If an email is a short message, perhaps an invitation to a local event, it is unlikely to be labeledspam, especially if it comes from someone the recipient knows. But, if the content of an emailincludes yet another routine advertisement for improving ones sexual prowess, it will likely beclassified as spam. Even worse, if it includes a disguised virus that erases the recipients harddrive that email will almost certainly be labeled spam by the enraged recipient. This designationwill be made regardless of other characteristics below. Notice, however, that an email messagethat contains a virus can be sent to a specific individual (not part of a mass email) innocuously, by

    a friend, without any commercial aspect, and with a valid return address. Sometimes massemailing itself will be enough to count as spam regardless of content, as happens in attempts toflood servers with messages to overwhelm them (denial of service).

    Book Review:

    Email spam also known as junk email. According to Wikipedia, email spam is a subset ofspam that involves nearly identical messages sent to numerous recipients by e-mail. A commonsynonym for spam is unsolicited bulk e-mail (UBE). Definitions of spam usually include theaspects that email is unsolicited and sent in bulk. A spam is the abuse of electronic messagingsystems to send unsolicited bulk messages indiscriminately. While the most widely recognizedform of spam is e-mail spam, the term is applied to similar abuses in other media: instantmessaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam,

    Online classified ads spam, mobile phone messaging spam, Internet forum spam, junk faxtransmissions, and file sharing network spam.

    When I first used yahoo mail, I noticed that there is bulk or spam folder. At first, I ignoredit. But on the later I noticed why some of my mails do not directly go to the inbox folder. Some of itgoes directly to this spam or bulk folder. I thought that this folder is just a special feature of theyahoo. I am still confused what does this folder got to do with email spam.

    In this reading, email spam is said to be a junk email. Email that is useless or trash.When we received email, it is usually from someone that we know. Messages are something

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    41/53

    important or a forwarded quote, and sometimes a e-card or electronic card. A email spam isusually advertisements from random companies. I am quite sure that as internet users, we allencountered this email spam.

    Integrative Questions:

    1. What is email spam?2. What is email message?3. What is the difference between email spam and email message?4. Does email spam sometimes contain viruses?5. What is denial of service?

    What I have learned?

    I have learned about email spam. It is really the first time that I read about some email spamcontains viruses that can erase or affect the computers hard drive. I am aware about email spambut this virus thing is somewhat new to me.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    42/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART V: REGULATORY ISSUES AND CHALLENGES22. The Matter of Plagiarism: What, Why, and If(John Snapper)

    Library Reference: N/A

    Internet Reference: http://en.wikipedia.org/wiki/Plagiarism

    Learning Expectation:

    Plagiarism

    The definition of plagiarism

    Some consequences in plagiarizing ones work

    Cases about plagiarism

    Quote:

    As with most ethical concepts, there is plenty of room for debate over the definition ofplagiarism. Plagiarism will be treated here very broadly as expression that improperlyincorporates existing work either without authorization or without documentation, or both. Theemphasis on impropriety is important. There are a wide variety of situations where it seemsacceptable to repeat prior expressions while ignoring a possible attribution and making noattempt to seek permission from a putative source. We commonly repeat jokes and report

    established dates for historical events without citing sources, and we do so without qualms aboutplagiarism. An expression is only plagiarism if it is unacceptable on some established value. Butwe should be careful to avoid the error of being overly narrowing identifying any particular valueor standard as the basis for condemning an expression as plagiarism.

    Book Review:

    I would begin this defining the word plagiarism. Plagiarism, as what I have understood,is copying or imitating ones work. This definition is somewhat still vague. But let me explain toyou the concept of plagiarism. Plagiarism is use or close imitation of the language and ideas ofanother author and representation of them as one's own original work. Plagiarism is not copyrightinfringement. While both terms may apply to a particular act, they are different transgressions.

    Copyright infringement is a violation of the rights of a copyright holder, when material protectedby copyright is used without consent. On the other hand, plagiarism is concerned with theunearned increment to the plagiarizing author's reputation that is achieved through false claims ofauthorship.

    The definition above plagiarism and copyright infringement is according to Wikipedia. Forme, copying ones work is not illegal in some instances. For example, most school works orassignments are about definition of terms. Students often browse the web or books and copywhat they have researched in. This scenario, for me, is not illegal, since it is used for education. Ialways site the name of the author whenever I copied something from the internet or books.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    43/53

    Plagiarism occurs when for example, someone claims that he wrote a book when the truth it hejust copied the whole book from another book. When someone claims others work as his ownand earn money from it, I think this scenario is a certified plagiarism.

    Integrative Questions:

    1. What is plagiarism?2. Is plagiarizing ones work illegal?3. What is copyright infringement?4. Do all the scenarios that we copy someone elses work considered as plagiarism?5. What are the exemptions in plagiarism?

    What I have learned?

    I have learned about plagiarism. There are also some cases that we can and cannot be taggedas the one who plagiarized.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    44/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART V: REGULATORY ISSUES AND CHALLENGES23. Intellectual Property: Legal and Moral Challenges ofOnline File Sharing(Richard A. Spinello)

    Library Reference: N/A

    Internet Reference: http://en.wikipedia.org/wiki/Intellectual_property http://www.ipophil.gov.ph/mainframe_homepage.htm

    Learning Expectation:

    Online File Sharing

    Intellectual Property

    Quote:

    The recording industry in the United States has filed multiple lawsuits against purveyors of filesharing software. It has even initiated lawsuits against individuals who make substantial use ofthis technology (RIAA v. Verizon, 2003). The industry contends that the unauthorized sharing ofcopyrighted files is actually tantamount to the theft of intellectual property. The industry alsocontends that those companies that provide this software, such as Grokster and StreamCast, areculpable of secondary or indirect liability for such theft. This assertion is contentious, but recentcourt cases have tended to support the recording industry.s claims about secondary liability,especially when there is evidence of inducement.

    . . . all the goods of the Information Ageall of the expressions once contained in booksor film strips or newsletterswill exist as thought or something very much like thought:voltage conditions darting around the Net at the speed of light, in conditions that onemight behold in effect, as glowing pixels or transmitted sounds, but never touch or claimto own in the old sense of the word.

    Book Review:

    Online file sharing is simply sharing files via the internet. I dont think that this is illegal.But the United States claims that this is illegal. Illegal, I think, in a way that most people instead ofbuying their own software just ask for a friend who already has it to send the software or the

    installer online. Obviously, this lessen the profit that a company can earned.

    The unauthorized sharing of copyrighted file is like stealing to intellectual property.Intellectual properties are legal property rights over creations of the mind, both artistic andcommercial, and the corresponding fields of law. Under intellectual property law, owners aregranted certain exclusive rights to a variety of intangible assets, such as musical, literary, andartistic works; ideas, discoveries and inventions; and words, phrases, symbols, and designs.Common types of intellectual property include copyrights, trademarks, patents, industrial designrights and trade secrets.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    45/53

    In the Philippines, the role of IP Philippines is the effective management of the IntellectualProperty system is vital to a nation's advancement and international competitiveness. The role ofIP Philippines is to ensure that intellectual property is used as a tool for the social, economic andcultural development of our nation and that its benefits accrue to Filipinos.

    Integrative Questions:1. What is Intellectual Property?2. What is the role of intellectual property in the Philippines?3. Does US filed lawsuit against online file sharing?4. Does unauthorized sharing of copyright is tantamount to theft on intellectual property?5. What are the common types of intellectual property in the Philippines?

    What I have learned

    I have learned that Philippines has also a Intellectual Property Rights organization. Also, I havelearned that online file sharing is somewhat considered as theft on intellectual property.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    46/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART VI: ACCESS AND EQUITY ISSUES24. Censorship and Access to Expression and Uncertainty(Kay Mathiesen)

    Library Reference: N/A

    Internet Reference: N/A

    Learning Expectation:

    Censorship

    Access to expression

    Quote:

    Censorship limits access to an expression, either by deterring the speaker from speaking or thehearer from receiving such speech. By an expression I mean anything that may be composedby one person and communicated to another. This includes such things as speeches, personalcommunications, books, and articles, compilations of data, artworks, photographs, and music.Given that censorship limits access to expression, it is important to have clearly before us whyaccess to expressions is valuable. Cohen (1993) provides an admirably clear and convincingaccount of the fundamental human interests that can only be satisfied if there is access to theexpressions of others. Cohen links our concern with freedom of speech to three fundamentalinterests: (1) the interest in expression, (2) the interest in deliberation, and (3) the interest ininformation

    Book Review:

    No one wants to be a censor. The introduction part of the book speaks about the wordcensor. As the quote above says: censorship limits access to an expression. Have you everimagined yourself talking about a serious matter and yet no one is listening? Or have you everexperienced listening to some important details and someone is commanding you not to listen?The example given in the quote above explains that censorship is like stopping us tocommunicate to another person. All means of communication is banned. Books, arts and stuff arealso limited.

    No one in this world can live like this. In my opinion, if I am the one who is been tagged

    as censored, I think Ill be like a walking in a noisy room blind folded. You cannot hear otherpeoples thoughts and you cant speak up whats in your mind.

    As we all know, we live in a democratic country where all of us are free to express ourthoughts, vision and mission in life. I think the term censorship would not be successfullylaunched in the Philippines since most Filipinos are democratic in mind and in heart. MostFilipinos express their thoughts and vision thru artworks and media.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    47/53

    Integrative Questions:

    1. What is censor?2. What is censorship?3. What are the different accesses to expression?4. Does a person who is considered as censor free?5. What are the limitations of a person that is censored?

    What I have learnedI have learned that censorship and stuff are somewhat irrelevant to what our country is.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    48/53

    Otsuka Hikaru

    ITETHIC

    Book: The Handbook of Information and Computer Ethics

    Book Review: PART VI: ACCESS AND EQUITY ISSUES25. The Gender Agenda in Computer Ethics(Alison Adam)

    Library Reference: Chapter 1- Ethical Theories- Annette Baier: The Need for more than Justice

    Internet Reference: N/A

    Learning Expectation:

    Gender Agenda

    Care perspective

    Feminist Ethics

    Quote:

    The idea that gender is a major (possibly even the major) way of classifying and ordering ourworld has been propounded by a number of authors, mainly, although not exclusively, writingfrom a feminist position.1 The recognition of continuing differences between mens and womenslots, at home, in the workplace, and in education, even in societies that have seen considerableopening up of opportunities for women in the space of a generation or so, has been a major forcein developing contemporary feminist writing.2 Coupled with this, we continue to be fascinated bydifferences between men and women, putative differences in behavior, differences in interests,differences in management style, differences in parenting approach, and so on. This suggeststhat, in the process of ordering and classifying our world into that which is feminine, that is,belonging to or pertaining to women, and that which is masculine, that is, pertaining to men, wemay polarize this binary in a search for, and perhaps even maintenance of, difference.

    Book Review:

    In all aspect, we might often see that men and women are challenging one another. Ithink it is the thing that women want to prove something. Women want to prove their worth andtheir capabilities. Men often ignored the fact that women are better in most cases.

    I have read in our previous book, the contemporary moral problem, about the careperspective. In the book says: Gilligan wants still wants to claim that women are most unlikely totake only the justice perspective, as some men are claimed to, at least until some mid-life crisis

    jolts them into bifocal moral vision. Gilligan in her book did not offer any explanatory theory ofwhy there should be any difference between female and male moral outlook, but she did tend linknaturalness to women of the care perspective with their role as the primary caretakers of youngchildren, that is with their parental and specifically maternal role.

    Most men claimed to be of care perspective. For me, men should be classified as justiceperspective. Care perspective, as the quote stated above, for woman, suits a woman. It comeswith naturalness, a woman is the one who take care of an infant, raise a child, and discipline aperson. There are things with this naturalness that only woman can do.

  • 8/14/2019 Book Reviews on Handbook of Information and Computer Ethics

    49/53

    I think by not ignoring the fact that men and women can be equal in most cases canresult to a brighter future. The debate about who is better and whos not should be stop sincemen and women have different strengths and functionalities.

    Integrative Questions:

    1. What is Gender Agenda?2. What is Care perspective?3. What is the feminist ethic?4. Do men claim to be more of care perspective?5. Does gender is the way that we can classify and order our world?

    What I have learnedI have learned that male and female have still competitions since men often ignore the

    capabilities of women.

  • 8/14/2019