TABLE OF CONTENTS
1 | Page
PREFACE
..4
DEDICATION
.4
CONTEMPORARY MORAL PROBLEMS..
5-18
Handbook of Information Ethics
Chapter
1
.19
Chapter
2
.20
Chapter
3
.21
Chapter
4
.22
Chapter
5
.23
Chapter
6
.24
Chapter
7
.25
Chapter
8
.26
Chapter
9
.27
2 | Page
Chapter
10
.....28
Chapter
11
..29
Chapter
12
..30
Chapter
13
..31
Chapter
14
..32
Chapter
15
..33
Chapter
16
..34
Chapter
17
..35
Chapter
18
..36
Chapter
19
..37
Chapter
20
..38
Chapter
21
..39
3 | Page
Chapter
22
..40
Chapter
23
..41
Chapter
24
..42
Chapter
25
..43
Chapter
26
..44
Chapter
27
..45
Chapter 17
.46-57
4 | Page
PREFACE
This book review is about the handbook of information ethics and
the contemporary moral problems and the 7 chapters including
the topic which has study questions to answer entitled
Introduction to Sociotechnical Computer ethics, Ethics and
Information Technology, Ethics in IT Configured Societies,
Information Privacy and Surveillance, Digital Intellectual Property,
Digital Order and professional ethics computing.
The handbook of information ethics talks about the different
issues and arguments that is related to information ethics and
information technology and how it originated and why it is called
information ethics and the study on what is the difference in
computer and information ethics and what are their relations and
similarities from each other.
DEDICATION
I DEDICATED THIS BOOK REVIEW TO MY LOVEDONES
MY FAMILY
FRIENDS
5 | Page
AND PROFESSORS
AND MOST IMPORTANTLY
TO GOD
James Rachels
Review Questions
1. Explain the legend of Gyges. What questions about morality are raised by the
story?
The Legend of Gyges is a story of a man who took advantage of having ring
with a magical power and used it badly by doing wrong things like killing
other people and stealing what they have because he is full of temptations
and because he has the power to get whatever he wants because of the
magical ring that he has. Questions that should be considered in the legend
of the Gyges are: Should the shepherd have the ring until the end, until he
destroys other peoples lives? Is the shepherd being unselfish? Do you think
he has the authority to do all of those bad things?
2. Distinguish between psychological and ethical egoism
Psychological Egoism states that all man in this world is selfish because
whatever kind of action they do in different kind of way they are still
considered a selfish person because all men in this world are selfish while
the Ethical Egoism explains that a person cannot be considered a selfish
person because it depends on the situation and what did he do about the
situation that occurred it may be because of his own interest but it is still not
considered a act of selfishness it is also about how men behave and they are
not responsible in anything unless it is for their own interest to do something
if a situation or an accident occurs.
3. Rachels discusses two arguments for psychological egoism. What are these
arguments and how does he reply to them?
Based on the text Rachel said that the first argument is If we describe one
persons action as a selfish and another persons action as unselfish, we are
overlooking the crucial fact in both cases While the second argument is
Since so-called unselfish action always produce a sense of self-satisfaction in
6 | Page
4. What are the three commonplace confusions does Rachels detect in the
thesis of psychological egoism?
Based on the text The first confusion is the confusion of selfishness with self
interest, second confusion is the assumption of every action is one either
from self interest or from other regarding motives and the third confusion is
the common but false assumption that a concern for ones own welfare is
incompatible with any genuine concern for the welfare of others.
5. State the argument for saying that ethical egoism is inconsistent. Why
doesnt Rachels accept this argument?
Based on the text the argument saying that Ethical egoism is inconsistent is
Ethical egoism is inconsistent because it is impossible for everyone to
accept egoism. Because an egoist wants a world in which his own interests
are maximized; and if other people adopted the egoist policy of pursuing
their own interests to the exclusion of his interest, as he pursues his interests
to the exclusion of theirs, because he himself is an egoist, while he want
others to be altruist. Rachel doesnt accept this argument because for him
this is totally wrong this egoist just want to have their own world and control
other people because they are the real selfish people not us because they are
trying to convince us and they are also trying to let us enter their world which
is a crazy one because of what they believe Rachel doesnt accept this
argument because these egoist are like other people who wants to be
successful where many people will follow them and believe in them and that
is wrong because they dont have the right to control and force the people in
what they believe because people has their own lives and they have the right
to choose on whom to not listen and listen to.
6. According to Rachels, why shouldnt we hurt others, and why should we help
others? How can the egoist reply?
7 | Page
The egoist will be mad and will not accept it. It means that he doesnt care
about other people at all which means he is the real selfish person because
he wants other people to listen and believe in the argument that he had
made and he is wrong.
Discussion Questions
1. Has Rachels answered the question raised by Glaucon, namely Why be
moral? If so, what exactly is his answer?
Rachel did not answered the question why be moral because from the very
start he had explained egoism and difference of it and did not said anything
about moral.
2. Are genuine egoists rare, as Rachels claims? Is it a fact that most people
care about others, even people they dont know?
For me Genuine Egoist is rare because they think differently than others and
for sure they have wild ideas going through their head. It is a fact that people
care about others even if they dont know it because there are all human
beings and they all have feelings like when a student gives money to the
poor who is asking for money it means that they care for them because they
want to help the thats why he gave them money even if its just a coin.
3. Suppose we define ethical altruism as the view that one should always act for
the benefit of others and never in ones own self interest. Is such a view
immoral or not?
I dont think it is immoral because you are not doing wrong or killing anyone
you are just convincing them using words not actions it will be immoral if you
use actions but when you use words to convince other people I dont think it
is immoral at all.
John Arthur
Review Questions
1. According to Arthur, how are morality and religion different?
Morality and religion are different for Arthur because Morality is social
morality is doing the right thing and not doing wrong things and Religion is
necessary in relation to morality because religion is not related to morality at
all because you dont have to always think about the religion when your
doing something.
2. Why isnt religion necessary for moral motivation?
Religion isnt necessary for moral motivation because not all people are
thinking if they will be caught or not and religion and morality are not related
at all because it is about doing the right thing and not thinking about the
religion at all it is about the motive of other people on how they do it not on
who they believe in and the religion they have.
3. Why isnt religion necessary as a source of moral knowledge?
Religion isnt necessary for moral knowledge because We cannot always
depend on religion if we are doing something because we also dont know if
8 | Page
believing in that religion is right at all because like Arthur said we have to do
and believe what is right because it is what we know is right for ourself.
4. What is the divine command theory? Why does Arthur reject this theory?
Based on the text according to Mortimers view, the divine command theory
would mean that God has the same sort of relation to moral law as the
legislature has to statues it enacts: without Gods commands there would be
no moral rules, just as without a legislature there would be no statues.
Arthur rejected this theory because for him even if an act is right it can be
also on the other hand that the thing that is wrong or we believe is bad are
also good because for him if god would not command us to do a thing it is not
wrong and if we did not follow his command then we had done wrong.
5. According to Arthur, how are morality and religion connected?
Even if Arthur said that morality and religion are not related at all they are
still connected. They are connected because there are some things left that
we should consider first when we do a thing and the religion is created
because of morality because of what is happening every person has a religion
and each religion has their own laws they make this laws and they are basing
it to the morality of people that is why morality and religion are related but
they are still different.
6. Dewey says that morality is social. What does this mean, according to Arthur?
Arthur stated that Dewey we should make our self and our moral conscience
public, we should always consider our decision and the decision that others
make because we are a one society and we should always think about the our
conscience and the pity we have to other people and because it depends on
the social language that we learn to other people because by socializing with
other people this moral will start to grow like a matured person who knows a
lot already because morality is just a little kid who is at first small but when it
gets older it gets bigger and has a lot of problems coming like the morality at
first morality is just about like that but we dont realized that morality isnt
about morality it has many kinds and it is also related to other religion or
study.
Discussion Questions
1. Has Arthur refused the divine command theory? If not. How can it be
defended?
Yes Arthur refused the divine command theory because at the first place he
said that religion is not necessary to morality.
2. If morality is social, as Dewey says, then how can we have any obligations to
non human animals?(Arthur mentions this problem and some possible
solutions to it in the footnote6)
We have obligation to non human animals because these non human animals
are animals like us they are also a living thing who is born like us like a baby
and dies they can eat and walk and even though they are not talking we can
9 | Page
10 | P a g e
Creator of values means he creates his own values and believes in it because
it is for himself and he recognize his self very well.
Mary Midgley
Review Questions
1. What is moral isolationism?
Based on the text Moral Isolationism is the view of anthropologists and
others that we cannot criticize cultures that we do not understand.
2. Explain the Japanese custom of tsujigiri. What questions does midgley ask
about this custom?
It is about a culture where they have this sword which they have to practice if
it is really sharp because one mistake will ruin everything and their reputation
will be in danger that is why to test if the sword of the samurai is really sharp
they used real people to test if this is really true by using it on them. The
questions that midgley asked about this custom is Was he in a position to
deliver a damning indictment? Would we ourselves be qualified to deliver
such an indictment on the samurai, provided we could spend two weeks in
the acient japan? What do we really think about this?
3. What is wrong with Moral Isolationism, according to Midgley?
Moral Isolations is wrong because other cultures should not follow their rituals
and cultures because it is immoral and does not think of what they are doing
at all.
4. What does Midgley think is the basis of criticizing other cultures?
Midgley said that we should first analyze our own culture before analyzing the
culture of other people because it is important. Why should we criticize other
peoples cultures if we dont know what our culture all about is and if it is also
criticized by other nationality?
Discussion Questions
1. Midgley says that Nietzsche is an immoralist. Is that an accurate and fair
assessment of Nietzsche? Why or why not?
I dont think Nietzsche is an immoralist because he just said his own opinion
by having a will of power and it is not wrong to have a own will power and it
is not immoral at all because this base on how far you can go and how strong
you are and he just talked about Morality is social and not something about
immorality.
2. Do you agree that Midgleys claim that the idea of separate and unmixed
cultures is unreal? Ex
I do not agree because everyone has their own culture and that makes them
unique because of what they follow and what they tradition is and we cannot
do something about this because this is what they believe even if it is
immoral for us we still dont have the right to interfere in what is happening
11 | P a g e
to them because it a culture and they are always following it that is why we
have to respect their decision and respect for what they are.
John Stuart Mill
Review Questions
1. State and explain the principle of Utility. Show how it could be used to justify
actions that are conventionally viewed as wrong, such as lying and stealing.
Based on the text the principle of utility does not mean any given pleasure,
as music, for instance, or any given pleasure. They are desired and desirable
in and for themselves; besides being means they are a part of the end. This
means that the principle of utility is about the happiness of a person. If a
person steals money and lied to other people they are happy with it because
this is what they want but doing this thing is wrong even if it gives you the
feeling of happiness.
2. How does Mill reply to the objection that Epicureanism is a doctrine worthy
only of swine?
Mill is not happy about how the Epicureanism is said to be a doctrine only for
swine because if we will compare a human and non human being they are
still different in many ways a non human being as we know has a limited
pleasure of happiness because we dont understand each other at all while
the human beings is I think has unlimited pleasure of happiness because we
do understand each other and they are different because for me the human
being are capable of having a happiness or pleasures and they should not be
compared to animals or nun human beings.
3. How does Mill distinguish between higher and lower pleasures?
Higher pleasure is the highest level of pleasure where you have desires for a
certain thing or to other people while lower pleasures can be the lowest level
of all pleasures and is easily achieved because it is the lowest level of all.
4. According to Mill, whose happiness must be considered?
According to Mill we should measure the happiness of other people.
5. Carefully reconstruct Mills proof of the Principle of utility.
Principle of utility is desirable and being desirable does not mean giving them
any pleasure it is because it is what they want and it is what makes them
happy but the answer still depends on the situation. The principle of utility
does not give you happiness because of the pleasure you are feeling it gives
you the feeling of happiness because you are happy and this is what you
want.
Discussion Questions
1. Is happiness nothing more than pleasure, and the absence of pain? What do
you think?
Having a pleasure can make someone happy but not truly happy because if
you feel pleasure you are just reaching the point of happiness and it is not
12 | P a g e
sure if it will be successful or not and having this pleasure doesnt mean
youre truly happy and will forever be happy because It is just temporary
pleasure so it cannot be called happiness and even though it is only pleasure
there wont be pain existing because your trap in what you think and what
you feel about pleasure and happiness so I think you wont feel any pain
because of the pleasure or happiness that you are feeling.
2. Does mill convince you that the so-called higher pleasures are better than
lower ones? What about the person of experience who prefers the lower
pleasures over the higher ones?
Yes, because for me higher pleasures are hard to achieved and the highest
level of all and it is the right term for that it is better than the lower ones
because of course it is the highest level of pleasure at all we can compare it
to a 1st honor student which is better than the 10 th honor student. A person
who prefers lower pleasures over the higher ones are not confident and
doesnt have the courage to work hard to have a higher pleasure because
they are scared enough.
3. Mill says, In the golden rule of Jesus of Nazareth, we read the complete spirit
of the ethics of utility Is this true or not?
For me it is true because utility is about a persons happiness and a persons
happiness does exist and happiness must also be achieved by our own means
but we also should think of other peoples happiness because they are part of
our world and they are our co-human beings.
4. Many commentators have thought that Mills proof of the principle of utility is
defective. Do you agree? If so, then what mistake or mistakes does he make?
Is there any way to re formulate the proof so that it is not defective?
I dont think Mills proof is defective because if we will analyze it some of his
words are true that principle of utility is not just about giving pleasure it is
about having happiness and I think happiness is more important than desiring
or having a pleasure.
James Rachels
Review Questions:
1. Rachels says that classical utilitarianism can be summed up in three
propositions. What are they?
The three propositions are first, actions are to be judged right or wrong solely
in virtue of their consequences. Second, in assessing consequences the only
thing that matters is the amount of happiness or unhappiness that is caused
and third, in calculating the happiness or unhappiness that will be caused, no
ones happiness is to be counted as more important than anyone elses.
2. Explain the problem with hedonism. How do defenders of utilitarianism
respond to this problem?
The problem with hedonism is happiness the only thing that matter in
everything? Many defenders rejected the theory of hedonism because it is
reliable and have a unjust basis.
13 | P a g e
Aristotle
Review Questions
1. What is happiness, according to Aristotle? How is it related to virtue? How is it
related to pleasure?
According to Aristotle all human beings seek happiness, and that happiness is
not pleasure, honor or wealth but an activity of soul in accordance with
virtue. It is related to pleasure by external prosperity it is accompanied by
pleasure or not without pleasure.
2. How does Aristotle explain moral virtue? Give some examples.
According to Aristotle moral virtue comes from training and habit, and
generally is a state of character that is a mean between the vices of excess of
deficiency. Example of the Moral Virtue is portraying for a virtue of something
like in the text the example is the virtue of courage.
3. Is it possible for everyone in our society to be happy, as Aristotle explains it?
If not, who cannot be happy?
It is possible for our society to be happy, because every people has their own
kind of happiness and has different ways on how to make themselves happy
even if they have problems and even if they are poor they are still happy
because being poor doesnt mean we cannot be happy. Having happiness
wont cost us anything therefore we should always believe that we are happy
and we can be happy in different ways.
Discussion Questions
1. Aristotle characterizes a life of pleasure as suitable for beasts. But what, if
anything, is wrong with a life of pleasure?
Aristotle stated that life of a pleasure is suitable for beasts because having
pleasure is like imagining something that is not real at all, when we do that
pleasure it make us happy but that happiness is not considered a happiness
at all because what we felt in doing it is just contented and we are not
satisfied at all.
2. Aristotle claims that the philosopher will be happier than anyone else. Why is
this? Do you agree or not?
Philosophers have their own world where they argue and analyze theory that
is why they are happy with it because they understand each other. I do not
agree with this because you dont have to be a philosopher to be happy, all
people has their own kind of happiness and I dont think being a philosopher
will make you happy at all in fact, it will drive you crazy because of the
different arguments that you have to prove and the different theory that you
have to analyze.
Joel Feinberg
Review Questions
16 | P a g e
17 | P a g e
1. What does Dworkin mean by right in the strong sense? What rights in this
sense are protected by the U.S. constitution?
Based on the text On dworkins view, if a people have a right to do
something, then it is wrong to interfere with them. it is acknowledge by the
U.S. constitution but the certain right still depends on the moral situation and
moral problems.
2. Distinguish between legal and moral rights. Give some examples of legal
rights that are not moral rights, and moral rights that are not legal rights.
Legal right is a right given by a certain government of a country while the
moral right is the right of a certain person. Example of legal right is the right
to be a citizen of a certain country and the right of a certain person is to
choose the religion he wants.
3. What are the two models of how government might define the rights of its
citizens? Which does dworkin find more attractive?
Based on the text the two models of how government define the rights of
citizens is first striking a balance between rights of the individual and the demands
and second is the government inflates a right. Dworkin find the second model more
attractive because he believes that the government has more power and the
government is more right because they know everything.
4. According to dworkin, what two important ideas are behind the institution of
rights?
Based on the text According to Dworkin the two important ideas that are
behind the institution of rights are the institution of right must require an
act of faith on the part of the minorities while the second is the
Government will not reestablished respect of law without giving the law some
claim to respect.
Discussion Question
1. Does a person have a right to break the law? Why or why not?
A person have a right to break the law because it is on their free will if they
want to follow the law or not but they should be ready to face the
consequences and what if this law is bad then we should not follow this at all.
2. Are rights in the strong sense compatible with Mills utilitarianism?
Yes because Unitarianism is about happiness and giving a person their own
right will make them happy.
3. Do you think that kant would accept rights in the strong sense or not?
Yes because giving the right of a person will make them happy and is a one
goodwill or a good thing to do.
John Rawls
Review Questions
1. Carefully explain Rawlss conception of the original position.
18 | P a g e
Based on the text According to Rawlss theory, these are principles that free
and rational persons would accept in a hypothetical original position where
there is a veil of ignorance hiding from the contractors all the particular facts
about themselves.
2. State and explain Rawlss first principle of justice.
First principle each person is to have an equal right to the most extensive
basic liberty compatible with a similar liberty for others. Meaning a person
should be treated equally and on the other hand they should also treat others
equally. They should mind their own business.
3. State and explain the second principle. Which principle has priority such that
it cannot be sacrificed?
Second principle is social and economic inequalities are to be arranged so
that they are both reasonably expected to be everyones advantage and
attached to positions and offices open to all. Meaning the social and
economic inequalities should be united and participate with one another for
everyone to know this unity and for them to also be united it is a advantage
because if people are all good and united they will be a fair competition
within the positions on the case of a government office or a business office.
Discussion Questions
1. On the first principle, each person has an equal right to the most extensive
basic liberty as long as this does not interfere with a similar liberty for others.
What does this allow people to do? Does it mean, for example, that people
have a right to engage on homosexual activities as long as they dont
interfere with others? Can people produce and view pornography. If it does
not restrict anyones freedom? Are people allowed to take drugs in the
privacy of their homes?
The activity involving a individuals free liberty still depends on the situation
and if it is not against the law then they are violating the law if the country
and they can still be imprisoned because they violated the law.
2. is it possible for free and rational persons in the original position to agree
upon different principles than those given by Rawls? For example, why
wouldnt they agree to an equal distribution of wealth and income rather than
an unequal distribution? That is, why wouldnt they adopt socialism rather
than capitalism? Isnt socialism just a rational as capitalism?
it is possible because we dont know what will be the reaction of every person
about this because not all people will agree on this not all people have same
opinions and point of view that is why they have to be united first before
analyzing on what to do about this.
Annette Baier
19 | P a g e
Review Questions
1. Distinguish between the justice and care perspectives. According to Gilligan,
how do these perspectives develop?
According to Baier Justice Perspective by itself is inadequate moral theory. It
overlooks inequalities between people. According to Giligan these
perspective develop in the moral development of women and on caring and
personal relationships.
2. Explain Kohlbergs theory of moral development. What criticism do Gilligan
and Baier make of this theory?
Kohlbergs theory of moral development is pre-conventional, conventional,
and post-conventional. Giligan criticized kohlbergs theory by saying it is a
overly androcentric.
3. Baier says there are three important differences between Kantian liberals and
their critics. What are these differences?
Based on the text According to Baier the three important differences between
Kantian liberals and their critics are the first was its dubious record. The
second was its inattention to relations of inequality or its pretence of equality.
The third reason is its exaggeration of the scope of choice or its inattention to
un chosen relations.
4. Why does Baier attack the Kantian view that the reason should control unruly
passions?
Baier attacked the Kantian view because in Kantans view death and being
violent is stated or expressed.
Discussion Questions
1. What does Baier mean when she speaks of the need transvalue of the
values of our patriarchal past? Do new values replace the old ones? If so,
then do we abandon the old values of justice, freedom, and rights?
The transvalue of the value of our patriarchal past means it is in the past like
what they say past is past and I think we have to replace the new value
with the old ones because it is year 2011 already the world is getting more
modernized and dangerous that is why we always have to change our values
but it can also be the same as the old value that we had before. We should
not abandon the old value of justice, freedom and rights because these
values will be forever be the same and will not change because violating all
of these rights is a crime.
2. What is wrong with the Kantian view that extends the equal rights to all
rational beings, including women and minorities? What would Baier say?
What do you think?
What is wrong in the Kantian view is that they did not want to include what
happened in the past anymore and it is okay because it is their opinion. I
think baier will not agree in this one.
20 | P a g e
21 | P a g e
1. I have learned that Information Ethics really complicated to know on what it is all
about.
2. I also learned that ICTS re the one who radically transforms informational context.
3. Information ethics is the study of moral issues.
4. RPT Model is the life of information
5. Morality and responsibility can be related to one another.
Integrative Question:
1.
2.
3.
4.
5.
22 | P a g e
because these values are part of life and we are for sure cannot live without it and we should
also respect Weiner who invented information and computer ethics because without ethics
there wont be any moral values right now that we are valuing.
What I have learned:
1. I have learned that Norbet Weiner is the founder of Information and Computer ethics.
2. Weiner stated after building a aircraft that there will be a second industrial revolution
which is an automatic age.
3. Norbert Weiner wrote a book which leads him to the foundation of information ethics.
4. He changed the information ethics into computer ethics.
5. I learned that even if you are successful and you have everything there is still
something missing.
Integrative Question:
1.
2.
3.
4.
5.
What I expect to learn: I expect to learn the definition and what moral methodology
is all about and I also want to know and learn its relation to information technology.
Quote: Ethics has seen notable changes in the course of the past 100 years.
Review: The chapter talks about computer ethics. Based on the text computer ethics
studies moral questions and computer ethics is a professional ethics. It is a universal
technology and IT is not just about computers, networks or other electronically devices.
It is also about information we should be careful of what the information technology has
and we should be careful on how to morally use it. Like information technology that has
computers and internets are used for business and education and for social purposes
but some people are doing it for their pleasure like using it to watch porns and do adult
web chats and for me that is immoral because they are not using the internet wisely
and they are doing it for their own good and pleasure. Like on the text it stated that we
need to give computer and software their place in our moral world and I dont think
using it for pornography is in that world at all. The chapter also talks about applied
23 | P a g e
ethics which how ethics is revolving around the world for around 100 years now. It also
talks about generalism which is about the moral thought and the moral principles of
morality in relation to ethics and morality and also particularism which talks about the
people of particularism which are called particularlist where they search for moral
values and talk about what theyre valid principles is all about and the objections about
particularism which is the theories and the black boxes which is related in a persons
moral life.
What I have learned:
1. I learned that we should be careful on how we are going to use IT.
2. We should respect the uses of IT.
3. Computer ethics is a professional ethics because it is an ethics that studies the
theories and problems that can related to business persons and educators.
4. Particularism has two objections which is the theories and the black boxes.
5. The one who studies Particularism are called Particularist.
Integrative Questions:
1.
2.
3.
4.
5.
What I expect to learn: What I expect to learn from this chapter is what the
value sensitive design is all about its relation to information systems and what the
information system all about is.
Quote: Informed consent provides a critical protection for privacy, and supports
other human values such as autonomy and trust.
Review: The chapter talks about Value Sensitive Design and Information Systems.
Value Sensitive Design studies about human values in a manner that is for
principles. According to the text Value Sensitive Design is a theoretically grounded
approach to the design of technology that accounts for human values in a principled
and comprehensive manner throughout the design process meaning Value
Sensitive Design studies about the human values in a manner that it will be related
to the process of designing. The text studies 3 case studies which based on the text
24 | P a g e
What I expect to learn: What I expect to learn from this chapter is what is
the definition of Personality-Based, Rule-Utilitarian and Lockean Justifications
of intellectually property and its relations to each other.
Quote: The incentives based rule-utilitarian argument for systems of
intellectual property protection is very similar
25 | P a g e
26 | P a g e
What I expect to learn: What I expect to learn from this chapter is what is
Informational Privacy all about and its concepts, theories and controversies.
Quote: it would seem that privacy is not simply a static concept, but instead a
dynamic component.
Review: The chapter talks about the Informational Privacy and its relation to the
concepts, theories and controversies of Informational Privacy but let us first define
what privacy is. Privacy is like our personal property it can be our personal
information like where do we live and what kind of lifestyle do we have and we dont
want a stranger to know all of these are we? Because we dont know them and it is
scary on what they might to do and theyre real motive in asking for this information
and it is really dangerous especially in our country where the crime rate is high.
Based on the text it is important because that concept has played and continuous
to play in social and political thought. Many people now a days wants to have their
own privacy. In the case of the problem in the united states where many people are
complaining about the information that they have in famous social networks and
they dont have their own privacy that Is now today because of the new upgraded
versions that social networks has like face book you can now change you settings
into private and choose the people who can see your profile in that way all the
things in your site and face book will be private and can only be seen by your
friends. Privacy is also important like in politics every politician needs their own
privacy because what they are doing is strictly confidential and they are the one
handling the government and has the power over a certain country that is why they
need their own privacy. Based on the text Moor argues that privacy is an evolving
concept and that its content is influenced by political and technological features of
the societys environment.
What I have learned:
1. Privacy is very important because it is confidential and should only be within
a persons personal and own privacy.
2. We should respect the privacy of a person.
3. We should be careful on our personal information and the people we socialize
to.
4. We should keep things private within the people we know and not to
strangers, like what they say dont talk to strangers.
5. Informational privacy is the privacy within the IT world which can be how
private and how we should protect our networks and prevent it from hacking.
Integrative Questions:
1. What is the difference between interests based conceptions and rights based
conceptions?
2. What are the similarities of interests based conceptions and rights based
conceptions?
3. What is the relation of privacy or informational privacy to ethics?
4. What is the most important component of informational privacy?
5. What is the relation of accessibility privacy to informational privacy?
27 | P a g e
28 | P a g e
What I expect to learn: What I expect to learn from this chapter is the definition
of Ethical Issues Involving security and what it is all about and its relation to
Hacking, Hacktivisim, and Counterhacking.
Quote: Many hackers believe benign intrusions not calculated to cause damage
can be on the strength of variety of considerations
Review: This chapter talks about the ethical issues involving security hacking but
let us first define what is Computer security is all about. Computer Security is like
securing the data of you computer not only your computer but also your hard drive
because some important files might be in it, that is why we should be careful and
always make it safe to keep it from hackers because they will hack the data in your
system or computer even if there are in a different location, there are called
professional hackers because they know how to hack you system within a second.
The chapter talks about The Prima Facie case against hacking according to the
text it might seem obvious that hacking is wrong although the more malicious of
these acts involve serious wrongs because of the harm they cause, all are wrong
because they constitute a digital trespass onto the property of another person.
Meaning hacking someones computer by getting its information is wrong because it
is not yours and it still belongs to the person which gives you no right or authority to
analyze and go through their system at all that is why it is wrong because the owner
did not give you any consent to do that and because hacking is illegal many people
are doing it for the sake of gaining the information of the other party that is why we
have to be careful on the information that we will encode and save on our
computers if these information could be save through a paper then we should do it.
We dont have to save it on the computer for convenient purposes because that
information would be in much more danger if you will store it in your computer.
What I have learned:
1. I have learned that Hacking is wrong.
2. There are social benefits in hacking.
3. Hacking is wrong because it involved getting and harming the information of
the other party.
4. We should respect the privacy of other people and be careful about their
information.
29 | P a g e
5. We should not click and trust pop-ups because it might be virus that can hack
our system.
Integrative Questions:
1.
2.
3.
4.
5.
What I expect to learn: What I expect to learn from this chapter is the definition
of information ethics and library profession and to know what it is all about.
Quote: Such serious reflection needs to start with a focus on the point of having
libraries and librarians in the first place-that is the mission of the librarian.
Review: The chapter talks about the information ethics and the library profession.
The main topic of this chapter is about the librarian on how they ethically handle
this job and the information that they will share within the books that they are
analyzing. There are many types of librarian it can be a corporate librarian which
handles the information of the company, a school librarian which handles the library
related to education and the public librarian which is a librarian of a public library
and has a more complicated job because all of the different kinds of books that we
are looking for can be found at a public library. These librarians are careful enough
about information ethics what is the relation of the librarian to information ethics its
relations is that the librarian should consider and respect the information of every
books of the author and the librarian should analyze if the books are applicable or
not. Having a profession of a librarian is really hard because you are like the head of
a library; you have the highest and lowest position because as a librarian you
should know where all the books are placed and memorize them one by one.
Owners who hire librarians should be careful enough in choosing what kind of
librarians their library should have these librarians should be trustworthy they
should not reveal any information and have the consent of the owner first because
revealing without any consent is morally wrong because they broke the rules and
regulations of the library or company.
What I have learned:
1. I learned that being a librarian is hard.
2. Librarians should be careful on the information they give to other people.
30 | P a g e
31 | P a g e
Chapter 11: Internet Research Ethics: The field and its Critical Issues
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1
What I expect to learn: What I expect to learn from this chapter is the definition
of Internet Research Ethics and what it is about and its relation to the field and its
critical issues.
Quote: Philosophers who examine extant statements on research ethics from
diverse disciplines and diverse countries will recognize that these make use of at
least two familiar western ethical frameworks, namely, deontology and
utilitarianism.
Review: The chapter talks about the Internet Research Ethics and its relation to the
field of it and its critical issues, but let us first define what internet research ethics is
all about. Internet Research ethics is about researching sources in the internet and
thinking if what you are doing is morally right. Cases like this are internet plagiarism
where you copy and paste from a certain source for your assignment. To avoid
plagiarism we have to paraphrase words that we get from our source or just quote it
and then explain we have to say based to or according to the text we dont have to
copy and paste everything because this is like stealing the work of others. Many
years ago even if the internet is introduced many people are still looking or using
the books as their source for their paper works and case studies but as the world is
getting more modern many students tend to use internet for fast searching and
convenience but the result of this is that they are copying the works of others
without stating the source or link on where they got it unlike when we got our
source from a book we have to state the name of the book and the author it is also
the same from the internet we also have to state the source on where we got it
from. Based on the text years ago during the 1990s many researchers had been
32 | P a g e
examining the issues and complications on Internet Research ethics because many
people and this internet researchers have to learn the rules about the internet
research ethics on what to and what not to do when researching something in the
internet they have to ethically and morally learn what it is right and wrong.
What I have learned:
1. Internet research ethics started during the 1990s.
2. Many people tend to use the internet for their research than reading a book.
3. Students who are lazy like to copy and paste works from others without
stating the source through internet.
4. Internet research ethics is the study of how internet users used the internet in
a wrong way.
5. Searching works in the internet is more convenient.
Integrative Questions:
1.
2.
3.
4.
5.
What I expect to learn: I expect to learn what is Health information technology all
about and its relation to challengers in Ethics, science and Uncertainty.
Quote: Computers complicate medical privacy and confidentiality in interesting
ways.
Review: The chapter talks about Health information technology which is an
information technology that is related to health and how it is used in an moral and
ethical way, because the world is getting more modern today and many high
technologies were introduced using these technologies can be used in different
areas like in Health, many people are expecting a lot from this technologies because
they want their diseases to go away. Like chances of a surviving cancer patient
depends on how advance the technology is the common process of curing a cancer
patient is going through chemo therapy but with the technology being more
advanced people can now invent or they might be a technology where it can be a
laser that will kill all you cancer cells in the body. Like in the case of cataract old
people have cases like these and many years ago the procedure in removing a
cataract is through surgery but with the modern world today many people are now
using lasers for their cataract because it is less pain and more convenient you can
33 | P a g e
like go to work immediately after the operation because it seems like nothing
happened at all. Unlike when they do manual surgery you have to wait for week for
it to be healed. But they should be also careful on the technologies that they are
developing and how they used it many people are uncertain about these
technologies because it might be dangerous to our health because it contains
chemicals and it is not natural anymore. Some people dont want it because it Is too
expensive and the output is just the same.
What I have learned:
1. Information technology can also be applied in health.
2. People should be careful in doing these things and consider if there are
ethical or not.
3. The technology is getting more advanced.
4. Many people are uncertain about this technology.
5. Ethics has many branches and studies.
Integrative Questions:
1.
2.
3.
4.
5.
What I expect to learn: I expect to learn what are the ethical issues in the
business and information technology industry.
Quote: Beyond such very general considerations of the ethical foundations of
economic activity, there are also more specific issues debated on the macro level.
Review: The chapter talks about the issues related to information and business
industry it talks about the immoral things and the issues behind the business and
information having a good impact to the country and its economy. Based on the text
information is becoming increasingly important in more aspects of our lives
meaning the introducing of information technology made the lives of everyone
easier and every jobs nowadays requires you to have a knowledge on how to use
the technologies related to information technology you have to know the basic
technology softwares like how to use the Microsoft office for you to have a job
because a job for sure will require and make you type all the time because of
34 | P a g e
business proposals and letters to clients. You also have to make a presentation for
the next meeting for you boss or again to have a creative view of your business
proposal to be more detailed and understood by your managers for them to have a
basis on what your proposal is all about. According to the text business and ethics
are not related, but if you we will analyze it we will realize that they are related
because in doing business you have to think if what you are doing is ethical or not
like if you business is illegal like drugs and fake dvds this things are immoral
because it is against the law. And when doing business we have to consider the
norms of a certain country and their culture.
What I have learned:
1.
2.
3.
4.
5.
Integrative Questions:
1. If selling fake dvds is not against a law in a certain country would it still be
considered immoral or unethical?
2. What is the relation of business ethics in information ethics?
3. Why is ethics important in business?
4. Why should we consider the norms of people in relation to business?
5. Why is doing business important? Is it just for money or power?
cause less accident because you can do everything in the internet you can change
your identity, stalk someone and pretend someone youre not and still nothing can
happen to you because they dont know who you are they can know if that person is
wise enough to track your i.p. address and do other process to know your real
personal information then they will know who you really are. But these things like
pretending someone your not is this really good? We should know the
consequence if we will do these things, what if they really found out who you are?
And filed a case against you then it is your responsibility to accept the charges and
accept the fact that you really did pretend, even if its just a minor case It can be
lead to court if the other party makes it a big deal and of course if it is against the
law.
What I have learned:
1. You should be careful on what you are doing when using the internet.
2. You should be responsible enough to face the consequence to what you had
done.
3. Many people are using the internet for many things and purposes.
4. Many people use internet as a threat to other people by sending them
viruses.
5. We should think and consider if what we are doing is good or not.
Integrative Questions:
1. What are the relations of responsibilities for information on the internet to
ethics?
2. What is the solution on this problem?
3. Why do many people treat internet as a weapon to attack their enemies and
other people?
4. Are there any other ways for this problem to be solved?
5. Should the government consider on making a law about these? like what they
implemented today about pornography if you will download it on the internet
you can now be punished by the law.
Chapter 15: Virtual Reality and Computer Simulation
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1
real enough but they are not real at all. 3D effects can be done in movies where the
3D can be seen on the screen where you have to wear 3D glasses and while
watching it, the movie seems real to you. While the computer simulations are the
changes that are being done and the alterations within a invented software and
application by famous developers. Based on the text Computer simulations are
used in the natural and social sciences to gain insight into the functioning of natural
and social systems and in the engineering sciences for performance optimization.
Meaning computer simulation is done to used for the testing or to test if its
compatible with the nature and the society if this new alteration will click to the
society until they come to the conclusion at their survey and analysis on which side
is really effective enough to implement a software or something that is related to
information technology and is also related to computer simulation and virtual reality.
Implementers need to consider first why they are developing something and how it
can help the society. They should think if what they are doing is right or wrong and if
this thing is goof for everyone because one mistake can ruin everything and it might
be too late to do something in the end.
What I have learned:
1.
2.
3.
4.
5.
Integrative Questions:
1.
2.
3.
4.
What I expect to learn: What I expect to learn from this chapter is to know what
Genetic Information is all about and its relation to Epistemological and Ethical
Issues.
Quote: To achieve such a vision in a positive sense, culture cannot be separated
from biology.
37 | P a g e
Review: The chapter talks about Genetic Information. Let us first define what
Genetic Information all about. Genetic is information is related to Genetics which
the main idea or topic is all about Genes and DNAs. it is the time where many
scientists are studying about the relation of DNA and RNA while studying it they are
relating it to Information Technology by using technologies that are most recognized
at that time and by analyzing they are gathering information on what to do and
these information are what they are using to apply it to information technology.
Based on the text According to Kay which is a historian that around the year of
1950 molecular biologists described genetic mechanisms without ever using
information that is why many scientists learned from these mistakes which makes
and force them to use information on analyzing and studying research problems for
them to be in a good and proper conclusion that will lead them to a bright future.
Analyzing and knowing the information of a certain problem is important because
without gathering information first we will not know what the problem is all about
and we cannot formulate a solution without knowing what the problem is and with
the use of information technology in Genetic Information in determining Genes it is
said to be unethical because chemicals are reacting and by examining a DNA of a
certain person some other DNA;s and chemicals might be on the persons body if
they will examine it so scientists need to be extra careful on what they are doing
and make sure that it will work.
What I have learned:
1.
2.
3.
4.
5.
Integrative Question:
1. What is the relation of the chapter to ethics?
2. Are there any other methods besides IT that the scientists can use in
examining the DNA and RNA?
3. What is the difference between DNA and RNA?
4. Why is it important in the IT industry?
5. What is life without DNA and RNA?
Quote: The law of international conflict is designed to promote peace and minimize
the adverse effects of war on the world.
38 | P a g e
What I expect to learn: What I expect to learn from this chapter is the definition and
the issues regarding Cyber Conflict.
Review: The chapter talks about Cyber Ethics which is the study of the ethics in the
internet and modern world. Where many people are doing this like kids and
teenager they are doing this by playing games through internet and many more.
The issues of this chapter relies on if this Cyber World is good for everyone or not or
if it is a good influence and if its wrong or not, if it is ethical or not and if it is moral
and immoral. At the negative side we can say that Cyber World is wrong because
this cyber world where is gaming gives children and users the idea on how to kill
someone because this gaming is all about killing someone and something for you to
win this cyber games can be sometimes a bad influence to the kids because this
involves crimes and violation of the law. That is why many parents are prohibiting
their children to use this kind of things because of the issues that surrounds around
cyber gaming. But on the positive side cyber gaming can be a good thing because it
can relax our mind and we can meet different people online, we can also earn
money by selling something that you have online because of this game you can
earn money in just a minute and you can have many friends from different parts of
the world example of these are like in South Korean which cyber games are very
famous even old people and middle aged people are playing this kind of games
because it is very relaxing and they can meet many people online.
What I have learned:
1. Cyber ethics is the study of the world of Cyber Gaming.
2. It analyzes the negative and positive effects of the cyber world to young
ones.
3. There are also adult people who play cyber games because it is very relaxing.
4. Cyber gaming can be a bad influence to children because they might do
these things to harm others.
5. Cyber Gaming is popular especially in South Korea, because they have their
own championship live.
Integrative Questions:
1.
2.
3.
4.
5.
39 | P a g e
Quote: Sometimes we find the cost/benefit analysis of this form of risk analysis
troubling
What I expect to learn: What I expect to learn from this chapter is the definition and
what is a practical mechanism all about and its relation to ethical risk and the
assessment for A SODIS inspection.
Review: The chapter talks about A practical mechanism for ethical risk but let us
first define what practical mechanism is all about. Practical Mechanism is the study
for the simplest way of the modern world today it is applied in the information
technology through machines and other things that is related to information
technology and should consider if its ethical or not. Today many softwares are
being developed but not all this softwares are surely developed because there are
possible things that might happen this is the number one problem of developers
because sometimes they are finished developing a software and while testing the
software they will encounter some minor problems that has to rebuild and redevelop
all again because the whole code or thing is in a one source code but with the
technology getting more modern there are actually programming languages were
they have shortcuts and it wont be hard for developers to develop a software
because names of codes are already in the programs but some programmers or
developers prefer the old version without these automatic names because they
might not memorize all this things and they might not learn something from it
because they will be dependent on the word that is appearing and will keep them
from memorizing terms which is a bad thing and developers should be careful and
consider if what or if the software they are developing is good or bad and unethical
or not because this software might be rejected and not be recognized by public
users and professionals but are hackers who are used to these kind of things.
What I have learned:
1. Developed softwares still has problems.
2. Example of these is the apple or Mac which still has some problems and the
windows 7.
3. Developers should double check the software they are developing to avoid
future problems and complaints from the users.
4. When developing software developers should consider the risk.
5. They should analyze and plan the whole software development properly.
Integrative Questions:
1. What is the relation of the chapter to ethics?
2. Is the continuous development of softwares like upgrading software from 0.5
to 0.6 and another one a good thing?
3. What are the possible solutions to the problems that might occur while
developing software?
4. What should the developers consider in the way users will treat this or is it a
user friendly?
40 | P a g e
Integrative Questions:
1.
2.
3.
4.
5.
Quote: The more identical emails are sent from a sender, the more likely the
recipients are to perceive it as spam
What I expect to learn: What I expect to learn from this chapter is the definition and
what is email spam all about.
Review: The chapter talks about Email spam where in this email spam is the
notifications and the spam that we receive in our email besides the inbox these
spams are the ones that has advertisements and offers by different websites. This
spams are from different people and company and this spams are not sure on
whom it is actual user or the one who really send that spam. Some spams are
dangerous and some are not we have to be careful on the spams that we will be
viewing and receiving in our emails some of this has spam alert! When we will see
this word we have to check first if this email message is safe or not or we shouldnt
check it at all because it can harm our computer we have to make sure that every
spam that we will receive is safe and we know who the recipient is. We might not
know that this recipient or spam is a virus that will attack the system of our laptop
or hackers that will hack our bandwidth for their bandwidth to increase and ours to
decrease and this is a bad thing because they are hacking it and without asking
permission from us this is like trespassing a property where in you are not asking for
the permissions of the owner and just coming in a house of the owner without
asking the owners permission and of course in the culture of our country and it is
given that we should ask permission first before taking something or going inside a
house or if the case is that we know someone who invites us over to their house
then it is legal and not bad at all.
What I have learned:
1. Email Spam is the notification that we receive in our email besides the inbox.
2. This spams has advertisements and offers from different sites.
3. This spams can be viruses so we have to be careful if we will take a look at it
or not.
43 | P a g e
4. We have to make sure that we know the advertisements that we are viewing
because this spams can be viruses that can hack our system and steal our
bandwidth.
5. We have to be careful in every website that we will visit.
Integrative Questions:
1.
2.
3.
4.
5.
44 | P a g e
Chapter 23 Intellectual Property: Legal and Moral Challenges of Online File Sharing
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1
communist country where there leader is the only one who controls everything and
you dont have the freedom to speak or be against him or else you will be dead and
that is unfair to everyone.
What I have learned:
1.
2.
3.
4.
5.
Integrative Question:
1. What is the relation of the chapter to ethics?
2. What is the possible solution to the problem?
3. As a concerned citizen of the country what are the things that we
should do?
4. What is its relation to information technology?
5. It is still followed today?
Quote: Computer ethics is a new area of applied ethics with a rapidly burgeoning
portfolio of ethical case studies and problems.
What I expect to learn: What I expect to learn from this chapter is what the gender
agenda in computer ethics all about.
Review: The chapter talks about the gender agenda in computer ethics. What is
the gender agenda in computer ethics? Gender agenda is like to know and analyze
what the agenda of computer ethics really is. Why is computer ethics created and
what is its features and functionalities and how it can be related to the real world.
We have to make sure that everything will be related to computer ethics. Because
computer ethics is the most important and the core of ethics so in order to
understand this we have to analyze first the value and difference between computer
ethics from other kinds of ethics that is existing and there are various wide ranges
of computer ethics that we can choose from or particularly ethics. Computer ethics
is like the one of the types of computer ethics or ethics that is invented when the
issues related to computer ethics arise when people used the computer too much
47 | P a g e
like abusing it and using it for other thing and using it for wrong doings and
negative things and this is not good because it should be done in a good way if not
then what should it be. We have to consider and be careful on the things that we
would do and we have to consider if what we are doing is good or not to not make
any mistakes in the end. We have to always do things that will have good effect in
relation to computer ethics because computer ethics is really important.
What I have learned:
6.
7.
8.
9.
Quote: Although these differences in access to ICTS and information correlate with
differences in wealth, there is a casual relation between them.
What I expect to learn: What I expect to learn from this chapter is the definition of
the digital divide and what it is all about and its relation to a perspective for the
future.
Review: The Chapter talks about digital divide a perspective for the future which is
the vision and assuming on what will happen to the future. We should vision and be
careful on what will happen to our future because this future can be our forever and
will be our last hope to the dreams that we want to happen and to the goals that we
want to fulfill. We want our future to not be fully planned because we want it to
happen unexpectedly and go on smoothly and thoroughly because having a
planned future isnt exciting at all like for rich families and Chinese families whose
futures are already planned where they have to take over their family business and
they are also planned to marry someone they dont love it is called arrange
48 | P a g e
marriage this is done because of the business relations, if you have a business and
you know someone who also has a business and you want your children to marry to
make your business big and huge because it will increase you assets and
investments because for sure the parents of the one that your son or daughter will
marry will invest a lot to your company because you are now one family. On the
positive side it is good because you dont have to look for a partner anymore but
what if you found someone you love and its qualifications doesnt meet your
parents and what if they are not Chinese then it is unfair and we should do
something or just follow our parents wish because it is for our future.
What I have learned:
6. We
7. We
8. We
9. We
10.We
Integrative Question:
6. What is the relation of the chapter of the future to ethics?
7. What is the relation of the chapter to IT?
8. What are the other issues regarding the future?
9. What can be the possible solution to the issue or the problem?
10.Why do parents control and plan the future of their children?
Quote: Intercultural Information Ethics (IIE) can be defined in a narrow orin a broad
sense.
What I expect to learn: What I expect to learn from this chapter is the definition of
Intercultural Information Ethics and what it is all about.
Review: The chapter talks about the culture of information ethics and where it
originated from studying the history of information ethics is important because
knowing and understanding the meaning of information ethics will make us
understand the heart and core of computer ethics more. Knowing this information
ethics definition is important by knowing this we will be professionals and know the
core and what is the relation of information ethics and computer ethics. And we will
know why is it invented and why is it related each other. We will also know how or
what is the relation of the word computer and information and how is it invented.
Knowing all of these things will give us new ideas and knowledge in relation to our
49 | P a g e
course and it is a good thing because there are many people who dont know that
what they are doing is unethically wrong because they did not study what Is the
good or bad in the internet or how to use it properly. That is why we have to teach
them on how to use the internet properly to decrease the users of the internet who
loves to do naughty things and uses the internet in a wrong and bad way. Doing all
this things will not just help our self but the country too and the people around us it
will make them realize what is good or wrong and by realizing that we should help
them analyze and wrong what is good or bad in the usage of internet and how to
use it wisely.
What I have learned:
6. History of information ethics is important.
7. After knowing its history it can now be related to computer ethics.
8. Relating and applying these things are very important.
9. We can now differentiate computer and information ethics.
10.We should help other people realize that what they are doing is wrong or
right.
Integrative Questions:
6. Why do people use the internet in a bad way?
7. What are the benefits of the bad people who treats internet in a bad way?
8. How can we teach these people the right way to use the internet?
9. What is its relation to ethics or IT?
10.What are the possible solutions to the problem regarding this chapters issue?
50 | P a g e
Based on the text According to moor, the computer revolution will occur in
two stages. The first stage is that of technological introduction in which
computer technology is developed and refined while the second stage is the
one that industrialized world has once recently entered. Meaning he is the
one who predicted what will happen to the world and the world of computer
ethics were there will be a new technology that will be introduced to
everyone and how it will be fully developed and equipped.
3. What is a policy vacuum? Give an example, and explain it using the standard
account.
Based on the text According to Moor, when computer create new
possibilities, there is a vacuum of policies. Meaning there are tons of policies
that you have to consider when creating software you have many things to
consider like the culture and norms. We may think that creating software is
easy but publishing it is not and it will take through a lot process before it
should be published and can be used by users.
4. What Is a conceptual muddle, and how do they get in the way of filling policy
vacuums? Illustrate with an example.
Based on the text to illustrate a conceptual muddle, consider another case
from the early days of computing computer software, where they figure out
how to conceptualize the invention of computer softwares. With this they
have to do everything just to make sure that the software will be published
like they have to process the papers on publishing this software that they had
created.
5. What is wrong with the standard account of computer ethics? Identify at least
two criticisms, and explain.
Based on the text the problem had to do with fitting computer software or
prevailing intellectual property law, copyright and patent seemed the best
possibilities meaning they have to do all of these just to publish a software
and this is related to computer ethics because you have to think and consider
first if the software that you will publish is ethical or not and the second one
is the new inventors would have to get permission from a private owner to
use one of the building blocks this is not a good idea because in the
computer world if you would like to create a software in your own means it
will be great but having to ask permission to a private owner takes a lot of
time how can a software developer create a software with his own idea if he
still needs to ask permission and they have policies I think it may be hard to
create and publish a software that is fully developed and created by him
there may be some revisions on it because there are policies that should be
followed.
6. What are the two tenets of the view referred to as technological
determinism? What is the STS critique of each tenet?
The two tenets of technological determinism is based on the text first is the
technology develops independently from society and second when a
51 | P a g e
52 | P a g e
54 | P a g e
Rights can be based on deontological theory by rules, following rules that are
made for you to follow. While the utility theory is doing everything in order to
have happiness. Rights can be based on deontological theory by following the
rules of a certain country because this not only for their own good but for
everyone and for the whole country while the utility theory is doing
everything and taking risk for happiness.
14.What is the veil of ignorance on the original position in Rawls social contract
theory?
Based on the text according to rawls, justice is what individuals in the
original position would agree to. Meaning human beings are rational this is
like buying a cellphone or a computer which you dont know its specifications
and how good it is you just bought it because it attracts you outside but you
know its features inside?
15.What are the two principles of justice in Rawls theory?
Based on the text the two principles are first each person should have an
equal right to the most extensive basic liberty compatible with a similar
liberty for others. While the second one is based on the text social and
economic inequalities should be arranged so that they are both reasonably
expected to be everyones advantage and attached to positions and offices
open to all.
16.How does virtue ethics theory differ in focus from other theories discussed in
this chapter?
Virtue ethics theory is important because this is the study on the main or
major characteristic on what ethics is all about in its relation to the different
theories a certain ethics have analyzing this ethics will help us understand
more the virtue of ethics and its value to other people.
17.What is the analogical reasoning? Give an example of how it can be used in
computer ethics.
Analogical reasoning is analyzing something on a thing like based on the text
an IT is analyzing on what the world would be without internet for sure many
people will go crazy like what happened in Cairo where their president
removed all their internet connections which made the people really mad.
18.Why should we always use caution when arguing on the basis of analogies?
We should be careful when analyzing and arguing this analogies because we
dont know where this analogies came from and we have different point of
views but if this is more knowledgeable than us then we should be careful on
the arguments that we will take not and analyze in the future.
55 | P a g e
56 | P a g e
6. Did anyone do anything wrong in the virtual rape case? If so, who? What was
the wrong doing? Develop analogies between the behavior in this case and
other kinds of behavior that occur offline.
Yes something is wrong because what they had done to her is unethical and
morally wrong.
7. Explain the statement that social networking sites shape, and are shaped by,
friendship.
Networking sites are shaped by friendship because this is the place where
friends update one another on their status and everything, every detail can
be found in you facebook page and this is the means of communication
through social networking sites.
8. What characteristics of IT and the internet change the environment for
plagiarism and plagiarism detection?
Many developers developed and created a software for plagiarism to check
and make sure that your are not copying the works of other people and to
make sure that what you are doing is right and wrong.
9. Identify and explain the four arguments made to show that the internet is a
democratic technology.
The first argument explains that it allows users to share information with
other people. The second one explains that it is directly connected and can
be viewed through videos by other people like youtube.Third one is can be
access by many people and the last one is it is independent.
10.Do any of the four arguments in question #9 hold up to critical scrutiny?
Explain which argument you think holds up the best. Do you think that his
best argument is convincing?
The best argument Is number one where it is true that many people are
knowing the information about you because you are sharing it but it still
depends on which kind of people you will share your information with is.
Chapter 4: Information Flow, Privacy, and Surveillance
Study Questions
1. What are the significant differences between personal information flow with
IT and personal information flow without IT?
Personal information flow is a personal information within the ITS structure
and personal flow with IT is also included and related with the personal
information of ITS structure. Without the information flow or personal
information flow without IT is like not depending on something and not having
any information on the steps on how to do a thing that relates to IT.
2. What are the three arguments that can be made for why we shouldnt worry
about privacy? How can each of the three be encountered?
First we should not worry about privacy because there are many things that
can protect us. Second there are many kinds of securities out there like anti
viruses for our computer to detect the virsues that will come to our personal
57 | P a g e
computers and lastly protection of these anti viruses are safe because they
will notify you if a virus attacked your computer.
3. Explain rachels argument that privacy is necessary for a diversity of
relationships.
Privacy is necessary and needed in a relationship because many relationships
that we see is not what we always see there could be other things that is
happening while there alone and while were not seeing them but that
because it is private and good thing they are doing it in private not in public.
4. What does gossip have to with privacy?
Gossip is like ruining ones privacy and going on inside with their life and
digging in other things that will make their life miserable like stating the
things they are weak at and saying the things they had badly done.
5. Nissenbaums account of privacy as contextual integrity explains privacy in
terms of two norms. Explain.
When going in to a privacy of a person we have to consider its norms
because this is the most important we might not know that we are going
through the privacy of a person and knowing their norms are kind of not a
good idea at all.
6. What is the panopticon? How do prisoners experience themselves differently
when they are in panopticon prisons?
Panopticon is a prison building for prisoners this is the building or the place
where they stay. They experience their selves by getting used to the place
because they dont have a choice.
7. What happens to people who are watched all the time according to reiman?
People that are being watched all the time are getting paranoid and sick of
them being watched and they are getting crazier than before.
8. Pick a domain of human activity in which information about individuals is
gathered?
Information of individuals Is gathered through registration and introducing
and starting ones personal information.
9. What would be the benefits and drawbacks of limiting organizations to using
only crude categories in their information gathering practices?
Benefits of drawbacks is not know how to operate something using gathering
information on some things that are important.
10.What are the five principles of the code of fair information practices?
Principles of the code of fair information practices are very important and
should consider if it is right or wrong it is made for us to have a basis on what
the code of information is all about.
11.How would transparency policies protect privacy?
Transparency policies can protect privacy because they have certain rules
which a person should follow regarding ones own privacy.
12.What is the difference between opt-in policies and opt-out policies?
Opt in policies are policies inside a information or within a policy while the opt
put policies are the policies outside the information and is far related to opt In
policies.
58 | P a g e
13.What do you think are the three most significant personal steps an individual
can take to protect his or personal information?
This steps can help us gather more information on how to protect our own
privacy and the privacy of a certain person. This steps can help us be a better
person.
Chapter 5: Digital Intellectual Property
Study Questions:
1. What is software? What is hardware?
Software is the one that we are using and the one that is produced by many
developers today while the hardware is the one that is used through the
software it used within the software and has different hardware and software
requirements.
2. What are the differences between object programs, sources programs, and
algorithms?
Object programs are the objects that are used within a program where there
is a actual design and value of something. While the source program is the
source code within the program it is where all the source and where it
originated and lastly algorithms are declared variables and values that are
used within the source code and source program.
3. What is the aim of the us copyright system?
The aim of the us copyright system is to keep others from copying each other
works for them to have their own originality and for them to express their
own ideas and apply the knowledge that they have learn from school.
4. What is copyright problematic for protecting software ownership?
Copyright is problematic for protecting ownership because copyright is
sometimes hard to get and obtain that is why many people and developers
are skipping this process and going through the whole process without
checking if there is a copyright or not.
5. What does a copyright holder have to show to prove infringement?
A copyright holder have the right to prove that the software that they have is
copyright and the other party doesnt have any right to be against what the
copyright holder is saying.
6. What must copyright holders show in order to prove that they had a
legitimate trade secret?
The copyright holders must show the certificate of the copyright and the
receipt because they will pay for it to show the proof that they did really pay
for that copyright and it is approved by the law.
7. Why is trade secrecy problematic for the protection of software ownership?
Trade secrecy is problematic because trading something to other people or
other people needs security because there are many treats out there
specially in our country that is why we have to be more careful.
8. How is patent a monopoly?
Patent monopoly is like having a copyright or is accepted already by an
agency and they will keep it and register for another one for the trademark to
59 | P a g e
be new and with new sources and will or agreement to the agency or
company.
9. What test must a patent claim to satisfy to obtain a us patent?
The test for the patent is by evaluating the software or business if it is really
good in quality and it is a good choice to test if the software or product will
click to the mass media and other countries.
10.What cannot be patented in the United States why?
What cannot be patented in united states in the products that are not made
by them and made by other races because all us business should be from a
citizen only not from another nationality and approval of patent can be
obtained if the business is legal and is in good terms with other businesses.
11.What are the three different forms of digital shanng discussed in this chapter?
Three different forms of digital sharing are Bluetooth, infared and file transfer
protocol.
12.What are the four freedoms that FS advocates try to preserve?
Four freedoms of FS advocates to preserve are really important because they
are the core of the advocates or patents of a company.
13.What is lockes labor theory of property? Why doesnt it necessarily apply to
ownership of computer software?
Lockes theory of property is to protect the privacy of a security and a
persons own property by not sharing the information gathered to other
people.
14.What natural rights to arguments can be made for and against ownership of
software?
Natural rights that are made to the software is that they have all the power to
do what they want to do with the software and name the price that they want
because they are the one who made and developed that software.
15.The authors argue that software copying is immoral because it is illegal. List
the logical steps they used to arrive at this condition. Is the argument valid?
Software copying is of course immoral and illegal and we have to consider the
point of view of other people. Many people tend to buy softwares that are
copied or what we called fake ones because there are more affordable than
the original ones that you will just have to sue for a week for your subject in
school and it is expensive specially for students.
16.What is creative commons?
Creative commons is a creative point of view and opinion common to all
people specially programmers, developers, IT specialist and IT professionals.
2.
3.
4.
5.
6.
7.
8.
9.
reliability are related because the security needs reliability and assurance
that it is really secured.
If you own a personal computer, how secure is that machine? How did you
decide how much security was enough?
For my personal computer I will ensure that the computer has anti-virus and
is always updated because reformatting a computer cost a lot and is really
expensive for students like us.
If you use a computer system that is run by an organization have you ever
carefully read the security policies that you are supposed to know as a
systems user?
When using a computer system from an organization we have to carefully
ready the policies because we will be charged or will have an offence if we
visited a site that is prohibited by that organization.
If your machine is being used as a drone by a hacker to send spam emails,
are you victim, a perpetrator, or both?
If this will happen I am a victim because that hacker is hacking my system
and getting my systems information and files.
If you make a living by selling security software to individuals who own
personal computers are you happy or sad when hacker activity increases?
Of course I am happy when hacker activity increases because many people
will buy more anti virus from me because they know that it is more safe and a
computer really does need a anti virus from protecting the computer not only
from virus but from threats.
Have you ever received an email that indicated someone else had sent out
spam with your return email address on it? How would you feel about it?
Yes I had received an emall like this and after reading that the content is
weird I understood immediately that it is a virus because I dont understand a
thing on what the content says.
Have you ever compromised physical security for convenience? If so, what
did you do? If not have you seen anyone else do this?
Yes because we have to do something if our life is in danger because we have
to secure and protect our selves from other people who have bad motives.
Why is the issue of children being exposed to pornography online a difficult
one to resolve? Is this the only reason that received so much publicity?
It is publicity because many people or children that are exposed to
pornography are not influenced because of the pornography online but it is
what they see from their parents and other people specially from poor people
that is why many of them have many children because their children also
knows how to do something that they had learned from their parents because
they saw them doing it.
Do you think the 9/11 terrorist attack have substantially changed peoples
attitudes toward the trade offs between privacy and security?
Yes because many people are know much more secure and protecting their
selves and always at their place because they are scared that something
might happen to them and they are more alert and warned than before
because they dont know what will happen.
61 | P a g e
10.Go on the website and if you found something offensive. Having viewed this
material that you find objectionable, would you favor legislation to ban this
kind of material from the web?
I will favor this kind of ban because internet is where we also do business and
seeing something like this is so unprofessional and unethical there are certain
places for it should be done and I dont think internet is the right choice.
63 | P a g e