Anda di halaman 1dari 63

BOOK REVIEW IN IT-ETHICS

BY: DIANNA B. DELA CRUZ

This work is licensed under a Creative Commons Attribution-Noncommercial-Share


Alike 3.0 Philippines License.

TABLE OF CONTENTS
1 | Page

PREFACE
..4
DEDICATION
.4
CONTEMPORARY MORAL PROBLEMS..
5-18
Handbook of Information Ethics
Chapter
1
.19
Chapter
2
.20
Chapter
3
.21
Chapter
4
.22
Chapter
5
.23
Chapter
6
.24
Chapter
7
.25
Chapter
8
.26
Chapter
9
.27

2 | Page

Chapter
10
.....28
Chapter
11
..29
Chapter
12
..30
Chapter
13
..31
Chapter
14
..32
Chapter
15
..33
Chapter
16
..34
Chapter
17
..35
Chapter
18
..36
Chapter
19
..37
Chapter
20
..38
Chapter
21
..39
3 | Page

Chapter
22
..40
Chapter
23
..41
Chapter
24
..42
Chapter
25
..43
Chapter
26
..44
Chapter
27
..45
Chapter 17
.46-57

4 | Page

PREFACE
This book review is about the handbook of information ethics and
the contemporary moral problems and the 7 chapters including
the topic which has study questions to answer entitled
Introduction to Sociotechnical Computer ethics, Ethics and
Information Technology, Ethics in IT Configured Societies,
Information Privacy and Surveillance, Digital Intellectual Property,
Digital Order and professional ethics computing.
The handbook of information ethics talks about the different
issues and arguments that is related to information ethics and
information technology and how it originated and why it is called
information ethics and the study on what is the difference in
computer and information ethics and what are their relations and
similarities from each other.

DEDICATION
I DEDICATED THIS BOOK REVIEW TO MY LOVEDONES
MY FAMILY
FRIENDS
5 | Page

AND PROFESSORS
AND MOST IMPORTANTLY
TO GOD

James Rachels
Review Questions
1. Explain the legend of Gyges. What questions about morality are raised by the
story?
The Legend of Gyges is a story of a man who took advantage of having ring
with a magical power and used it badly by doing wrong things like killing
other people and stealing what they have because he is full of temptations
and because he has the power to get whatever he wants because of the
magical ring that he has. Questions that should be considered in the legend
of the Gyges are: Should the shepherd have the ring until the end, until he
destroys other peoples lives? Is the shepherd being unselfish? Do you think
he has the authority to do all of those bad things?
2. Distinguish between psychological and ethical egoism
Psychological Egoism states that all man in this world is selfish because
whatever kind of action they do in different kind of way they are still
considered a selfish person because all men in this world are selfish while
the Ethical Egoism explains that a person cannot be considered a selfish
person because it depends on the situation and what did he do about the
situation that occurred it may be because of his own interest but it is still not
considered a act of selfishness it is also about how men behave and they are
not responsible in anything unless it is for their own interest to do something
if a situation or an accident occurs.
3. Rachels discusses two arguments for psychological egoism. What are these
arguments and how does he reply to them?
Based on the text Rachel said that the first argument is If we describe one
persons action as a selfish and another persons action as unselfish, we are
overlooking the crucial fact in both cases While the second argument is
Since so-called unselfish action always produce a sense of self-satisfaction in
6 | Page

the agent and since this sense of satisfaction is a pleasant state of


consciousness
Rachels reply on the first argument is that being a selfish and an unselfish
person still depends on the situation and because you did something for your
own pleasure or satisfaction doesnt make you a selfish person at all because
you did it for the good of others because you didnt want to hurt them. While
on the second argument Rachels reply is that people cannot be called selfish
if they did something because they will be bothered if they did not do that
thing at all and it is not being selfish it is just that person has a good heart
and he Is a good and kind person because he is obliged to do this and by
doing this base on his own interest doesnt make him a selfish man at all
because he did it from his heart and he may not realize it but if it bothers him
to leave someone behind then that means he cares for that person and
doesnt want to hurt their feelings.

4. What are the three commonplace confusions does Rachels detect in the
thesis of psychological egoism?
Based on the text The first confusion is the confusion of selfishness with self
interest, second confusion is the assumption of every action is one either
from self interest or from other regarding motives and the third confusion is
the common but false assumption that a concern for ones own welfare is
incompatible with any genuine concern for the welfare of others.
5. State the argument for saying that ethical egoism is inconsistent. Why
doesnt Rachels accept this argument?
Based on the text the argument saying that Ethical egoism is inconsistent is
Ethical egoism is inconsistent because it is impossible for everyone to
accept egoism. Because an egoist wants a world in which his own interests
are maximized; and if other people adopted the egoist policy of pursuing
their own interests to the exclusion of his interest, as he pursues his interests
to the exclusion of theirs, because he himself is an egoist, while he want
others to be altruist. Rachel doesnt accept this argument because for him
this is totally wrong this egoist just want to have their own world and control
other people because they are the real selfish people not us because they are
trying to convince us and they are also trying to let us enter their world which
is a crazy one because of what they believe Rachel doesnt accept this
argument because these egoist are like other people who wants to be
successful where many people will follow them and believe in them and that
is wrong because they dont have the right to control and force the people in
what they believe because people has their own lives and they have the right
to choose on whom to not listen and listen to.
6. According to Rachels, why shouldnt we hurt others, and why should we help
others? How can the egoist reply?

7 | Page

The egoist will be mad and will not accept it. It means that he doesnt care
about other people at all which means he is the real selfish person because
he wants other people to listen and believe in the argument that he had
made and he is wrong.
Discussion Questions
1. Has Rachels answered the question raised by Glaucon, namely Why be
moral? If so, what exactly is his answer?
Rachel did not answered the question why be moral because from the very
start he had explained egoism and difference of it and did not said anything
about moral.
2. Are genuine egoists rare, as Rachels claims? Is it a fact that most people
care about others, even people they dont know?
For me Genuine Egoist is rare because they think differently than others and
for sure they have wild ideas going through their head. It is a fact that people
care about others even if they dont know it because there are all human
beings and they all have feelings like when a student gives money to the
poor who is asking for money it means that they care for them because they
want to help the thats why he gave them money even if its just a coin.
3. Suppose we define ethical altruism as the view that one should always act for
the benefit of others and never in ones own self interest. Is such a view
immoral or not?
I dont think it is immoral because you are not doing wrong or killing anyone
you are just convincing them using words not actions it will be immoral if you
use actions but when you use words to convince other people I dont think it
is immoral at all.
John Arthur
Review Questions
1. According to Arthur, how are morality and religion different?
Morality and religion are different for Arthur because Morality is social
morality is doing the right thing and not doing wrong things and Religion is
necessary in relation to morality because religion is not related to morality at
all because you dont have to always think about the religion when your
doing something.
2. Why isnt religion necessary for moral motivation?
Religion isnt necessary for moral motivation because not all people are
thinking if they will be caught or not and religion and morality are not related
at all because it is about doing the right thing and not thinking about the
religion at all it is about the motive of other people on how they do it not on
who they believe in and the religion they have.
3. Why isnt religion necessary as a source of moral knowledge?
Religion isnt necessary for moral knowledge because We cannot always
depend on religion if we are doing something because we also dont know if
8 | Page

believing in that religion is right at all because like Arthur said we have to do
and believe what is right because it is what we know is right for ourself.
4. What is the divine command theory? Why does Arthur reject this theory?
Based on the text according to Mortimers view, the divine command theory
would mean that God has the same sort of relation to moral law as the
legislature has to statues it enacts: without Gods commands there would be
no moral rules, just as without a legislature there would be no statues.
Arthur rejected this theory because for him even if an act is right it can be
also on the other hand that the thing that is wrong or we believe is bad are
also good because for him if god would not command us to do a thing it is not
wrong and if we did not follow his command then we had done wrong.
5. According to Arthur, how are morality and religion connected?
Even if Arthur said that morality and religion are not related at all they are
still connected. They are connected because there are some things left that
we should consider first when we do a thing and the religion is created
because of morality because of what is happening every person has a religion
and each religion has their own laws they make this laws and they are basing
it to the morality of people that is why morality and religion are related but
they are still different.
6. Dewey says that morality is social. What does this mean, according to Arthur?
Arthur stated that Dewey we should make our self and our moral conscience
public, we should always consider our decision and the decision that others
make because we are a one society and we should always think about the our
conscience and the pity we have to other people and because it depends on
the social language that we learn to other people because by socializing with
other people this moral will start to grow like a matured person who knows a
lot already because morality is just a little kid who is at first small but when it
gets older it gets bigger and has a lot of problems coming like the morality at
first morality is just about like that but we dont realized that morality isnt
about morality it has many kinds and it is also related to other religion or
study.
Discussion Questions
1. Has Arthur refused the divine command theory? If not. How can it be
defended?
Yes Arthur refused the divine command theory because at the first place he
said that religion is not necessary to morality.
2. If morality is social, as Dewey says, then how can we have any obligations to
non human animals?(Arthur mentions this problem and some possible
solutions to it in the footnote6)
We have obligation to non human animals because these non human animals
are animals like us they are also a living thing who is born like us like a baby
and dies they can eat and walk and even though they are not talking we can
9 | Page

also communicate them by always talking to them which make us sociable to


animals especially dogs.
3. What does Dewey mean by moral education? Does a college ethics-class
count as a moral education?
Moral education is the study on the morality and the dos and donts in the
society or in everything. I think ethics class can be a moral education
because ethics and morals are somehow related because it is the study if
what our doing is right or wrong.
Friedrich Nietzsche
Review Questions
1. How does Nietzsche characterize a good and healthy society?
For Nietzsche a good and healthy society is a society that is not tempted to
do anything and will not took advantage to the chances that will be made but
they will be called a good and healthy society because they protect other
people because they care for them and will do everything just to protect
them for their own sake.
2. What is Nietzsches view of injury, violence and exploitation?
Nietzsche thinks that people should not do this they should not be thinking
about each others strengths and weaknesses but rather they should be
thinking on how to be united and how to treat each other equally.
3. Distinguish between master-morality and slave-morality
Master Morality is the morality of the master which is the power he has but
for sure he is a good person because he is the master and he needs to treat
his servants equally and fairly while the slave morality is the study of the
morality of the slave who is treated badly and they are scared because they
are unfairly treated and because they are a slave.
4. Explain the will of power.
The will of power is to have or gain our own power by having this power we
have to know first our strengths and weaknesses because it is the most
important thing and we live because we have our own will of power.
Discussion Questions
1. Some people view Nietzsches writings as harmful and even dangerous. For
example, some have charged Nietzsche with inspiring Nazism. Are these
charges justified or not? Why or why not?
For me it is not dangerous because Nietzsche just expressed his feelings and
he did not kill anyone like the Nazis did he just wrote something like Jose Rizal
did people should not be threatened about it because it is just about his point
view and people has different point of views and Nietzsche is one of them
who is just stating his own opinion.
2. What does it mean to be creator of values?

10 | P a g e

Creator of values means he creates his own values and believes in it because
it is for himself and he recognize his self very well.
Mary Midgley
Review Questions
1. What is moral isolationism?
Based on the text Moral Isolationism is the view of anthropologists and
others that we cannot criticize cultures that we do not understand.
2. Explain the Japanese custom of tsujigiri. What questions does midgley ask
about this custom?
It is about a culture where they have this sword which they have to practice if
it is really sharp because one mistake will ruin everything and their reputation
will be in danger that is why to test if the sword of the samurai is really sharp
they used real people to test if this is really true by using it on them. The
questions that midgley asked about this custom is Was he in a position to
deliver a damning indictment? Would we ourselves be qualified to deliver
such an indictment on the samurai, provided we could spend two weeks in
the acient japan? What do we really think about this?
3. What is wrong with Moral Isolationism, according to Midgley?
Moral Isolations is wrong because other cultures should not follow their rituals
and cultures because it is immoral and does not think of what they are doing
at all.
4. What does Midgley think is the basis of criticizing other cultures?
Midgley said that we should first analyze our own culture before analyzing the
culture of other people because it is important. Why should we criticize other
peoples cultures if we dont know what our culture all about is and if it is also
criticized by other nationality?

Discussion Questions
1. Midgley says that Nietzsche is an immoralist. Is that an accurate and fair
assessment of Nietzsche? Why or why not?
I dont think Nietzsche is an immoralist because he just said his own opinion
by having a will of power and it is not wrong to have a own will power and it
is not immoral at all because this base on how far you can go and how strong
you are and he just talked about Morality is social and not something about
immorality.
2. Do you agree that Midgleys claim that the idea of separate and unmixed
cultures is unreal? Ex
I do not agree because everyone has their own culture and that makes them
unique because of what they follow and what they tradition is and we cannot
do something about this because this is what they believe even if it is
immoral for us we still dont have the right to interfere in what is happening
11 | P a g e

to them because it a culture and they are always following it that is why we
have to respect their decision and respect for what they are.
John Stuart Mill
Review Questions
1. State and explain the principle of Utility. Show how it could be used to justify
actions that are conventionally viewed as wrong, such as lying and stealing.
Based on the text the principle of utility does not mean any given pleasure,
as music, for instance, or any given pleasure. They are desired and desirable
in and for themselves; besides being means they are a part of the end. This
means that the principle of utility is about the happiness of a person. If a
person steals money and lied to other people they are happy with it because
this is what they want but doing this thing is wrong even if it gives you the
feeling of happiness.
2. How does Mill reply to the objection that Epicureanism is a doctrine worthy
only of swine?
Mill is not happy about how the Epicureanism is said to be a doctrine only for
swine because if we will compare a human and non human being they are
still different in many ways a non human being as we know has a limited
pleasure of happiness because we dont understand each other at all while
the human beings is I think has unlimited pleasure of happiness because we
do understand each other and they are different because for me the human
being are capable of having a happiness or pleasures and they should not be
compared to animals or nun human beings.
3. How does Mill distinguish between higher and lower pleasures?
Higher pleasure is the highest level of pleasure where you have desires for a
certain thing or to other people while lower pleasures can be the lowest level
of all pleasures and is easily achieved because it is the lowest level of all.
4. According to Mill, whose happiness must be considered?
According to Mill we should measure the happiness of other people.
5. Carefully reconstruct Mills proof of the Principle of utility.
Principle of utility is desirable and being desirable does not mean giving them
any pleasure it is because it is what they want and it is what makes them
happy but the answer still depends on the situation. The principle of utility
does not give you happiness because of the pleasure you are feeling it gives
you the feeling of happiness because you are happy and this is what you
want.
Discussion Questions
1. Is happiness nothing more than pleasure, and the absence of pain? What do
you think?
Having a pleasure can make someone happy but not truly happy because if
you feel pleasure you are just reaching the point of happiness and it is not
12 | P a g e

sure if it will be successful or not and having this pleasure doesnt mean
youre truly happy and will forever be happy because It is just temporary
pleasure so it cannot be called happiness and even though it is only pleasure
there wont be pain existing because your trap in what you think and what
you feel about pleasure and happiness so I think you wont feel any pain
because of the pleasure or happiness that you are feeling.
2. Does mill convince you that the so-called higher pleasures are better than
lower ones? What about the person of experience who prefers the lower
pleasures over the higher ones?
Yes, because for me higher pleasures are hard to achieved and the highest
level of all and it is the right term for that it is better than the lower ones
because of course it is the highest level of pleasure at all we can compare it
to a 1st honor student which is better than the 10 th honor student. A person
who prefers lower pleasures over the higher ones are not confident and
doesnt have the courage to work hard to have a higher pleasure because
they are scared enough.
3. Mill says, In the golden rule of Jesus of Nazareth, we read the complete spirit
of the ethics of utility Is this true or not?
For me it is true because utility is about a persons happiness and a persons
happiness does exist and happiness must also be achieved by our own means
but we also should think of other peoples happiness because they are part of
our world and they are our co-human beings.
4. Many commentators have thought that Mills proof of the principle of utility is
defective. Do you agree? If so, then what mistake or mistakes does he make?
Is there any way to re formulate the proof so that it is not defective?
I dont think Mills proof is defective because if we will analyze it some of his
words are true that principle of utility is not just about giving pleasure it is
about having happiness and I think happiness is more important than desiring
or having a pleasure.
James Rachels
Review Questions:
1. Rachels says that classical utilitarianism can be summed up in three
propositions. What are they?
The three propositions are first, actions are to be judged right or wrong solely
in virtue of their consequences. Second, in assessing consequences the only
thing that matters is the amount of happiness or unhappiness that is caused
and third, in calculating the happiness or unhappiness that will be caused, no
ones happiness is to be counted as more important than anyone elses.
2. Explain the problem with hedonism. How do defenders of utilitarianism
respond to this problem?
The problem with hedonism is happiness the only thing that matter in
everything? Many defenders rejected the theory of hedonism because it is
reliable and have a unjust basis.
13 | P a g e

3. What are the objections about justice, rights and promises?


Justice theory says that lying is the only thing to do like in the case of
an innocent man accused for the crime that he did not do.
Rights basis of more happiness than unhappiness.
Promises-considerations about the consequences in the future.
4. Distinguish between rule and act utilitarianism. How does rule utilitarianism
reply to the objections?
Rule Utilitarianism is when individual acts will be judged right or wrong by
reference to the rule while the Act Utilitarianism is called when it is compared
with the original theory and is more of a perfectly defensible doctrine than
rule utilitarianism. Based on the text Rule Utilitarianism is unnecessarily
watered down version of theory which gives riles a greater importance than
they merit.
5. What is the third line of defense?
Based on the text, the third line of defense is Admittedly Utilitarianism does
have consequences which are incompatible with the common moral
consciousness, but I tended to take the view so much the worse for the
common moral consciousness that is, I was inclined to reject the common
methodology of testing general ethical principles by seeing how the square
with our feelings in particular instances.
Discussion Questions:
1. Smarts defense of utilitarianism is to reject common moral beliefs when they
conflict with utilitarianism. Is this acceptable to you or not? Explain your
answer.
I do not accept this, because what we believe is the most important and
utilitarianism is not always reliable if we will rely to what utilitarianism is then
we will be lead to the wrong path.
2. A utilitarian is supposed to give moral consideration to all concerned. Who
must be considered? What about nonhuman animals? How about lakes and
streams?
Everything should be considered, because either human or nonhuman or
living things are also living creatures like us created by God and we have to
give moral consideration to them because they are living in this world, and
we always have to think if what we are doing is right or wrong.
3. Rachels claims that merit should be given moral consideration independent of
utility. Do you agree?
I do not agree because considering this is like corrupting and even if it is not
related to utility Merit or value is like a advantage of something therefore
taking advantage of it is kind of low and think of the consequences in the
future.
Immanuel Kant
Review Questions:
14 | P a g e

1. Explain Kants account of the good will.


Good will is good because it is willing to do everything it has willingness
inside and out and because it is good in itself.
2. Distinguish between hypothetical and categorical imperatives.
Based on the text Hypothetical imperative in general, doesnt know
beforehand what it will contain until condition while the Categorical
imperatives is will know what it contains once it is conceived,
3. State the first formulation of the categorical imperative (using the notion of
universal law). And explain how kant uses this rule to derive some specific
duties toward self and others.
Based on the text the first formulation is From self-love can become a
universal law by nature. Kants used this rule by re studying it one by one for
them to also understand what universal law is.
4. State the second version of the categorical imperative (using the language of
means and end), explain it.
It should be noted that I reserve my division of duties entirely for a future.
Metaphysics of Morals and that my present division is therefore put forward
as arbitrary. Further, I understand here by a perfect duty one which allows no
exception in the interest of inclination, and so I recognize among perfect
duties, not only outer ones, but also inner. This is contrary to accepted usage
of schools, but I do intend to justify it here. It says that even if a students is
always bad at school doesnt mean he will be bad in the future because all
men who are stupid before are one of those nerds that we see in television or
TV ads every day and is one of the successful business tycoons in the country
today.
Discussion Questions:
1. Are the two versions of the categorical and imperative just different
expressions of one basic rule, or are they two different rules? Defend you
review.
I think categorical rule and imperative rule are one because to determine
what the Categorical Imperative is we have to first determine what the
categorical then will use Categorical Method of a given situation is conceived.
2. Kant claims that an action that is not done from the motive of duty has no
moral worth. Do you agree or not? If not, give some counterexamples.
i do not agree because not all actions are related to the motive of duty and it
depends on the situation. Like if a mother has a debt to a jewelry owner she
has to pay it right away and we have to also used our brains about the
situation that is happening right now.
3. Some commentators think that the categorical imperative (particularly the
first formulation) can be used to justify nonmoral or immoral actions. Is this a
good criticism?
It is a good criticism because the condition and what it contains is already
conceived.
15 | P a g e

Aristotle
Review Questions
1. What is happiness, according to Aristotle? How is it related to virtue? How is it
related to pleasure?
According to Aristotle all human beings seek happiness, and that happiness is
not pleasure, honor or wealth but an activity of soul in accordance with
virtue. It is related to pleasure by external prosperity it is accompanied by
pleasure or not without pleasure.
2. How does Aristotle explain moral virtue? Give some examples.
According to Aristotle moral virtue comes from training and habit, and
generally is a state of character that is a mean between the vices of excess of
deficiency. Example of the Moral Virtue is portraying for a virtue of something
like in the text the example is the virtue of courage.
3. Is it possible for everyone in our society to be happy, as Aristotle explains it?
If not, who cannot be happy?
It is possible for our society to be happy, because every people has their own
kind of happiness and has different ways on how to make themselves happy
even if they have problems and even if they are poor they are still happy
because being poor doesnt mean we cannot be happy. Having happiness
wont cost us anything therefore we should always believe that we are happy
and we can be happy in different ways.
Discussion Questions
1. Aristotle characterizes a life of pleasure as suitable for beasts. But what, if
anything, is wrong with a life of pleasure?
Aristotle stated that life of a pleasure is suitable for beasts because having
pleasure is like imagining something that is not real at all, when we do that
pleasure it make us happy but that happiness is not considered a happiness
at all because what we felt in doing it is just contented and we are not
satisfied at all.
2. Aristotle claims that the philosopher will be happier than anyone else. Why is
this? Do you agree or not?
Philosophers have their own world where they argue and analyze theory that
is why they are happy with it because they understand each other. I do not
agree with this because you dont have to be a philosopher to be happy, all
people has their own kind of happiness and I dont think being a philosopher
will make you happy at all in fact, it will drive you crazy because of the
different arguments that you have to prove and the different theory that you
have to analyze.
Joel Feinberg
Review Questions
16 | P a g e

1. Describe nowheresville. How is this world different from our world?


Nowheresville is a world where rights are not important they dont have a law
about the rights of people that is why if they are treated badly they cannot
file a complaint against something because it is legal. It is different from our
world because our world composes of different people who does crimes and
have many wrong doings that is why a certain country has a law about their
own rights for every people to have their own protection. It is different
because if that world we be our world rate of crimes will increase and it is a
big problem.
2. Explain the doctrine of the logical correlativity of rights and duties. What is
feinbergs position on this doctrine?
According to the text the doctrine of the logical correlativity of rights and
duties are all duties entail other peoples rights and all rights entails other
peoples duties. Feinbergs position in this doctrine is balance because
sometimes rights and duties can be used in a same and different manner.
3. How does feiberg explain the concept of personal desert? How would this
work in nowheresville according to Feinberg?
According to Feinberg the concept of persona desert is when a person
deserves to get what he wants because of the good thing that he had done.
This would work in nowheresville by making it a belief or culture because if
you earn what you worked hard for, in order for people to be motivated in
doing something and not doing other wrong doing things.
4. What are claim-rights? Why does Feinberg think they are morally important?
According to Fienberg claim-rights are necessarily the grounds of other
peoples duties toward the right-holder it is morally important because it is
about the duties of other people like the duties of a employee to his employer
it is morally important because it is not always the one who has a lower
position whom we should take pity for we should always think about the
employer and respect them.
Discussion Questions
1. Does Feinberg make a convincing case of the importance of rights? Why or
why not?
Feinberg make a convincing case of the importance of rights because he had
explained every detail on why it is morally important.
2. Can you give a noncircular definition of claim-right?
Claim right is the right of every people a right to have a right and claim it a
right should be given to them.
Ronald Dworkin
Review Questions

17 | P a g e

1. What does Dworkin mean by right in the strong sense? What rights in this
sense are protected by the U.S. constitution?
Based on the text On dworkins view, if a people have a right to do
something, then it is wrong to interfere with them. it is acknowledge by the
U.S. constitution but the certain right still depends on the moral situation and
moral problems.
2. Distinguish between legal and moral rights. Give some examples of legal
rights that are not moral rights, and moral rights that are not legal rights.
Legal right is a right given by a certain government of a country while the
moral right is the right of a certain person. Example of legal right is the right
to be a citizen of a certain country and the right of a certain person is to
choose the religion he wants.
3. What are the two models of how government might define the rights of its
citizens? Which does dworkin find more attractive?
Based on the text the two models of how government define the rights of
citizens is first striking a balance between rights of the individual and the demands
and second is the government inflates a right. Dworkin find the second model more
attractive because he believes that the government has more power and the
government is more right because they know everything.
4. According to dworkin, what two important ideas are behind the institution of
rights?
Based on the text According to Dworkin the two important ideas that are
behind the institution of rights are the institution of right must require an
act of faith on the part of the minorities while the second is the
Government will not reestablished respect of law without giving the law some
claim to respect.

Discussion Question
1. Does a person have a right to break the law? Why or why not?
A person have a right to break the law because it is on their free will if they
want to follow the law or not but they should be ready to face the
consequences and what if this law is bad then we should not follow this at all.
2. Are rights in the strong sense compatible with Mills utilitarianism?
Yes because Unitarianism is about happiness and giving a person their own
right will make them happy.
3. Do you think that kant would accept rights in the strong sense or not?
Yes because giving the right of a person will make them happy and is a one
goodwill or a good thing to do.
John Rawls
Review Questions
1. Carefully explain Rawlss conception of the original position.
18 | P a g e

Based on the text According to Rawlss theory, these are principles that free
and rational persons would accept in a hypothetical original position where
there is a veil of ignorance hiding from the contractors all the particular facts
about themselves.
2. State and explain Rawlss first principle of justice.
First principle each person is to have an equal right to the most extensive
basic liberty compatible with a similar liberty for others. Meaning a person
should be treated equally and on the other hand they should also treat others
equally. They should mind their own business.
3. State and explain the second principle. Which principle has priority such that
it cannot be sacrificed?
Second principle is social and economic inequalities are to be arranged so
that they are both reasonably expected to be everyones advantage and
attached to positions and offices open to all. Meaning the social and
economic inequalities should be united and participate with one another for
everyone to know this unity and for them to also be united it is a advantage
because if people are all good and united they will be a fair competition
within the positions on the case of a government office or a business office.
Discussion Questions
1. On the first principle, each person has an equal right to the most extensive
basic liberty as long as this does not interfere with a similar liberty for others.
What does this allow people to do? Does it mean, for example, that people
have a right to engage on homosexual activities as long as they dont
interfere with others? Can people produce and view pornography. If it does
not restrict anyones freedom? Are people allowed to take drugs in the
privacy of their homes?
The activity involving a individuals free liberty still depends on the situation
and if it is not against the law then they are violating the law if the country
and they can still be imprisoned because they violated the law.
2. is it possible for free and rational persons in the original position to agree
upon different principles than those given by Rawls? For example, why
wouldnt they agree to an equal distribution of wealth and income rather than
an unequal distribution? That is, why wouldnt they adopt socialism rather
than capitalism? Isnt socialism just a rational as capitalism?
it is possible because we dont know what will be the reaction of every person
about this because not all people will agree on this not all people have same
opinions and point of view that is why they have to be united first before
analyzing on what to do about this.

Annette Baier
19 | P a g e

Review Questions
1. Distinguish between the justice and care perspectives. According to Gilligan,
how do these perspectives develop?
According to Baier Justice Perspective by itself is inadequate moral theory. It
overlooks inequalities between people. According to Giligan these
perspective develop in the moral development of women and on caring and
personal relationships.
2. Explain Kohlbergs theory of moral development. What criticism do Gilligan
and Baier make of this theory?
Kohlbergs theory of moral development is pre-conventional, conventional,
and post-conventional. Giligan criticized kohlbergs theory by saying it is a
overly androcentric.
3. Baier says there are three important differences between Kantian liberals and
their critics. What are these differences?
Based on the text According to Baier the three important differences between
Kantian liberals and their critics are the first was its dubious record. The
second was its inattention to relations of inequality or its pretence of equality.
The third reason is its exaggeration of the scope of choice or its inattention to
un chosen relations.
4. Why does Baier attack the Kantian view that the reason should control unruly
passions?
Baier attacked the Kantian view because in Kantans view death and being
violent is stated or expressed.
Discussion Questions
1. What does Baier mean when she speaks of the need transvalue of the
values of our patriarchal past? Do new values replace the old ones? If so,
then do we abandon the old values of justice, freedom, and rights?
The transvalue of the value of our patriarchal past means it is in the past like
what they say past is past and I think we have to replace the new value
with the old ones because it is year 2011 already the world is getting more
modernized and dangerous that is why we always have to change our values
but it can also be the same as the old value that we had before. We should
not abandon the old value of justice, freedom and rights because these
values will be forever be the same and will not change because violating all
of these rights is a crime.
2. What is wrong with the Kantian view that extends the equal rights to all
rational beings, including women and minorities? What would Baier say?
What do you think?
What is wrong in the Kantian view is that they did not want to include what
happened in the past anymore and it is okay because it is their opinion. I
think baier will not agree in this one.

20 | P a g e

3. Baier seems to reject the Kantian emphasis on freedom of choice. Granted,


we do not choose our parents, but still dont we have freedom of choice about
many things, and isnt this very important?
It is very important in choosing about other things and we should have a
freedom to do that because these freedom of choice that we will do about
other things is on our own freewill and this will affect our future if we will take
the wrong path because of the wrong choice then were the ones who will
suffer because we made the wrong choice.

Chapter 1: Foundational Issues and Methodological Frameworks


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1
What I expect to learn: what I expect to learn from this chapter is about the issues in the
foundation of information ethics and what are methodological frameworks all about.
Quote: The emergence of the information society has further expanded the scope of IE.
Review: The chapter talk about IE, it talks about the IEs 3 different approaches which is the
IE as an ethics of information resources second is the IE as an ethics of information products
third is the IE as an ethics of information environment. It is not only three approaches it also
introduced one more approach which is the Information Ethics as a Macro Ethics. It also talks
about the RPT model which based on the text is the life of information and ICTS which
based on the text are the one who transfers informational context on the moral issues that
will arise. IE is called information ethics in information ethics we need to have moral
responsibility in everything that we will do because all of wrong doings will have
consequences and we have to face it and deal with it. We have to be careful on the things
that we will do. Based on the text morality is usually predicted upon responsibility this is
because morality and responsibility are somewhat related if what you are doing Is immoral
then you have the responsibility to face the consequences and if what you are doing is moral
then you have the responsibility to maintain what you are doing. Moral agency is where we
can determine where our moral responsibilities are, but not all our moral actions should have
responsibilities the situation still depends. Many people are against Information Ethics that is
because of the misunderstandings by other people and are making false conclusions about
it.
What I have learned:

21 | P a g e

1. I have learned that Information Ethics really complicated to know on what it is all
about.
2. I also learned that ICTS re the one who radically transforms informational context.
3. Information ethics is the study of moral issues.
4. RPT Model is the life of information
5. Morality and responsibility can be related to one another.
Integrative Question:
1.
2.
3.
4.
5.

Why do many people object Information Ethics?


Why should there be always being a responsibility?
What is the difference between morality and responsibility?
What are the misunderstandings in Information Ethics?
What are Informational Entities and Agents?

Chapter 2: Milestones in the History of Information and Computer Ethics


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1
What I expect to learn: What I expect to learn from this chapter is the history of information
and computer ethics and where it came from and to know what is the story of the history of
information and computer ethics.
Quote: Because of logical malleability, computing technology enables human beings to do
an enormous number of new things that they were never able to do before.
Review: The chapter talks about information ethics and how Norbert Wiener did introduce
and made information ethics to computer ethics. Based on the text at first information ethics
was born during World War II and during that war many scientist including Wiener were
planning to do a aircraft and planned a step by step process in implementing it and by
implementing it Weiner realized that they can get something from these because this
making of an aircraft is like the 2nd industrial revolution and he called it the automatic age
he imagined everything he can that is why many people found him weird because he is
always imagining fantasies about the future. Wiener did a book and while writing the book
Weiner did not realized that with everything that happened and the books he wrote he
realized that he had done the foundation of information and computer ethics for him he
still cannot be called a successful man because even after all what he had done he still cant
recognized the importance of himself and his ethical achievements. According to Weiner the
central human values are life, health, happiness, security, freedom, knowledge, and
abilities we should value of these human values because this values play an important role
in our life these are the ones that we should always think of when we are doing something

22 | P a g e

because these values are part of life and we are for sure cannot live without it and we should
also respect Weiner who invented information and computer ethics because without ethics
there wont be any moral values right now that we are valuing.
What I have learned:
1. I have learned that Norbet Weiner is the founder of Information and Computer ethics.
2. Weiner stated after building a aircraft that there will be a second industrial revolution
which is an automatic age.
3. Norbert Weiner wrote a book which leads him to the foundation of information ethics.
4. He changed the information ethics into computer ethics.
5. I learned that even if you are successful and you have everything there is still
something missing.
Integrative Question:
1.
2.
3.
4.
5.

What is the difference of Information and Computer ethics?


Why should Norbet Weiner change Information Ethics to computer ethics?
Did Norbert co-scientist / philosophers stayed with him until the end?
What is the relationship of human values to information and computer ethics?
What is the importance of the philosophers different theories about information and
computer ethics?

Chapter 3: Moral Methodology and Information Technology


Amazon link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: I expect to learn the definition and what moral methodology
is all about and I also want to know and learn its relation to information technology.
Quote: Ethics has seen notable changes in the course of the past 100 years.
Review: The chapter talks about computer ethics. Based on the text computer ethics
studies moral questions and computer ethics is a professional ethics. It is a universal
technology and IT is not just about computers, networks or other electronically devices.
It is also about information we should be careful of what the information technology has
and we should be careful on how to morally use it. Like information technology that has
computers and internets are used for business and education and for social purposes
but some people are doing it for their pleasure like using it to watch porns and do adult
web chats and for me that is immoral because they are not using the internet wisely
and they are doing it for their own good and pleasure. Like on the text it stated that we
need to give computer and software their place in our moral world and I dont think
using it for pornography is in that world at all. The chapter also talks about applied
23 | P a g e

ethics which how ethics is revolving around the world for around 100 years now. It also
talks about generalism which is about the moral thought and the moral principles of
morality in relation to ethics and morality and also particularism which talks about the
people of particularism which are called particularlist where they search for moral
values and talk about what theyre valid principles is all about and the objections about
particularism which is the theories and the black boxes which is related in a persons
moral life.
What I have learned:
1. I learned that we should be careful on how we are going to use IT.
2. We should respect the uses of IT.
3. Computer ethics is a professional ethics because it is an ethics that studies the
theories and problems that can related to business persons and educators.
4. Particularism has two objections which is the theories and the black boxes.
5. The one who studies Particularism are called Particularist.
Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of Generalism to Particularism?


Why are people using IT particularly the use of internet for their own pleasure?
Why should we relate computer ethics to morality or moral ethics?
What is the relation of applied ethics to Generalism and Particularims?
Why does the Particularism have two objections?

Chapter 4: Value Sensitive Design and Information Systems

Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?


ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: What I expect to learn from this chapter is what the
value sensitive design is all about its relation to information systems and what the
information system all about is.
Quote: Informed consent provides a critical protection for privacy, and supports
other human values such as autonomy and trust.
Review: The chapter talks about Value Sensitive Design and Information Systems.
Value Sensitive Design studies about human values in a manner that is for
principles. According to the text Value Sensitive Design is a theoretically grounded
approach to the design of technology that accounts for human values in a principled
and comprehensive manner throughout the design process meaning Value
Sensitive Design studies about the human values in a manner that it will be related
to the process of designing. The text studies 3 case studies which based on the text
24 | P a g e

is first study of concerns information and control of web browser cookies,


implicating the value of informed consent. The second one is again based on the
text which is the using the high definition plasma displays in an office environment
to provide a window to the outside world, implicating the values of physical and
psychological well-being and privacy in public spaces the last one is based on text
concerns an integrated land use, transportation, and environmental simulation
system to support public deliberation and debate on major land use they studies
all of these three case studies in relation to Value Sensitive Design the relation of
Value Sensitive Design to Information systems is that the Value System Design is a
study of the design of a certain system of the human values and its relation to
information systems is that the Information Systems will have a base on what to do
using the Value Sensitive Design and its human values whenever a developer or a
programmer is implementing a system they have to first think of the human values
and what are the causes and effects on it If they will be developing a system.
What I have learned:
1. I learned that Value Sensitive Design talks about human values.
2. Value Sensitive Design is a approach for principles in the design process.
3. The text studies about three case studies which helped them figure out the
relation of the Value Sensitive Design and Information System in reality.
4. We should be value everything we have and we should be careful on the
value of a certain thing is.
5. Human values should be considered before implementing a system.
Integrative Questions:
1. What is the Technical Investigations for?
2. What is the relation of Technical Investigation to Value Sensitive Design and
Information Systems?
3. Why should we analyze technical mechanisms and its relation to information
systems?
4. Can the benefits help the improvement on the investigation of technical
investigation and its view to Value Systems Design and Information Systems?
5. Why should they identify conflicts relating to values?
Chapter 5 Personality-Based, Rule-Utilitarian, and Lockean Justifications
of Intellectual Property

Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: What I expect to learn from this chapter is what is
the definition of Personality-Based, Rule-Utilitarian and Lockean Justifications
of intellectually property and its relations to each other.
Quote: The incentives based rule-utilitarian argument for systems of
intellectual property protection is very similar

25 | P a g e

Review: The chapter talks about Personality-based, Rule-Utilitarian and


Lockean Justifications of Intellectual Property. But let us first define what
Intellectual property is. Intellectual Property is according to the text
Intellectual property is generally characterized as nonphysical property that
is the product of cognitive processes and whose values Is based upon some
idea or collection of ides the meaning of this is that it is not a living thing
and it has values, variation of values from different processes. Intellectual
property is said to be a personal property or a individual personality because
it is all about the characteristic of a person and behaviors of different people
because based on the text Arguments for Intellectual property have
generally taken one of three forms. Personality theorists maintain intellectual
property as an extension of individual personality meaning intellectual
property is the same as a individual personality and they are related. The
chapter also talks about the theory of the personalities which is The
Personality of Theorists Rejoinder which talks about the force and study
about the personality-based theories and the incentives arguments which is
based and is made only for intellectual property.
What I have learned:
1. I learned that Intellectual Property is very important because it is like
the study of the individual personality of a certain person.
2. We have to be careful on studying and analyzing on what the
Intellectual Property is all about because we might misunderstand it
and relate it on the negative side of morality.
3. I also learned that there are three forms for the arguments of
intellectual property.
4. We have to preserve our intellectual property because this is our own
personality.
5. Intellectual property is not a living thing because it can be found within
a person.
Integrative Questions:
1.
2.
3.
4.

Why should the intellectual property protection be adopted?


What is this incentives relation to intellectual property all about?
What is the relation of Intellectual property to ethics?
What should be considered in studying intellectual property and its
three forms?
5. Why is the Intellectual Property important in the business world?

Chapter 6 Informational Privacy: Concepts, Theories and Controversies

Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?


ie=UTF8&s=books&qid=1269175801&sr=8-1

26 | P a g e

What I expect to learn: What I expect to learn from this chapter is what is
Informational Privacy all about and its concepts, theories and controversies.
Quote: it would seem that privacy is not simply a static concept, but instead a
dynamic component.
Review: The chapter talks about the Informational Privacy and its relation to the
concepts, theories and controversies of Informational Privacy but let us first define
what privacy is. Privacy is like our personal property it can be our personal
information like where do we live and what kind of lifestyle do we have and we dont
want a stranger to know all of these are we? Because we dont know them and it is
scary on what they might to do and theyre real motive in asking for this information
and it is really dangerous especially in our country where the crime rate is high.
Based on the text it is important because that concept has played and continuous
to play in social and political thought. Many people now a days wants to have their
own privacy. In the case of the problem in the united states where many people are
complaining about the information that they have in famous social networks and
they dont have their own privacy that Is now today because of the new upgraded
versions that social networks has like face book you can now change you settings
into private and choose the people who can see your profile in that way all the
things in your site and face book will be private and can only be seen by your
friends. Privacy is also important like in politics every politician needs their own
privacy because what they are doing is strictly confidential and they are the one
handling the government and has the power over a certain country that is why they
need their own privacy. Based on the text Moor argues that privacy is an evolving
concept and that its content is influenced by political and technological features of
the societys environment.
What I have learned:
1. Privacy is very important because it is confidential and should only be within
a persons personal and own privacy.
2. We should respect the privacy of a person.
3. We should be careful on our personal information and the people we socialize
to.
4. We should keep things private within the people we know and not to
strangers, like what they say dont talk to strangers.
5. Informational privacy is the privacy within the IT world which can be how
private and how we should protect our networks and prevent it from hacking.
Integrative Questions:
1. What is the difference between interests based conceptions and rights based
conceptions?
2. What are the similarities of interests based conceptions and rights based
conceptions?
3. What is the relation of privacy or informational privacy to ethics?
4. What is the most important component of informational privacy?
5. What is the relation of accessibility privacy to informational privacy?

27 | P a g e

Chapter 7 Online Anonymity


Amazon Link:: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1
What I expect to learn: What I expect to learn from this chapter is the definition of Online
Anonymity and what it is about and its relation to ethics.
Quote: The internet as a social environment may be of concern in so far as it has the
capacity to increase the scope of natural or spontaneous anonymity as a by-product of or
endemic to the nature of online communicative relations.
Review: The chapter talks about what Online Anonymity is all about. Online Anonymity is
according to the text has been used to denote a number of related things: namelessness,
detachment, unidentifiability, lack of recognition, loss of identify or sense of self and soon.
Meaning it is the indication of the relation between namelessness, detachment, etc.
according to the text anonymity occurs spontaneously because we are not expecting if it
will happen or not. The text also discussed about Anonymity as a feature of complex social
structures where he discusses how is Anonymity happening in real life and how it is
happening in our social life for example in schools and offices. Online Anonymity is done in
the internet where people socialize like web chatting or using social network sites this is
what we call Online Anonymity because it can be spontaneous because we dont know what
will happen once we start using this or once we start talking to strangers, some of them
might have different other motives other than talking and socializing therefore we have to
be careful on whom we are talking to specially if in these sites. Based on the text the
assuming of Online Anonymity has increased because of the social network sites that
requires registration and people dont sometimes put theyre real information. The text also
discussed the Concept of Anonymity where it is defined to be nameless or namelessness.
Where people dont have to be identified by their name they can also be identified by their
SSS nos and other ids who have identification number because the world is modern today
government organizations or companies are now using identification number for employee
and customer purposes for the list to be more organized like if you are doing a database for
the employee you need to have a employee code to identify its number because you have
other employees who also has the same name but different location.
What I have learned:
1.
2.
3.
4.

Anonymity is spontaneous or you are like assuming something.


Today a case of assuming in Online Anonymity has increased.
Many people are giving false information while they are registering in some sites.
Many organizations are using identification numbers to identify their employees and
customers.
5. Online Anonymity occurs spontaneously.
Integrative Questions:
1. Why should they use the term Online Anonymity why dont they use the assuming
spontaneously term instead?
2. What is the importance of Online Anonymity?
3. Why should the internet sites do to stop the increasing of Online Anonymity?

28 | P a g e

4. Does having a identification number important?


5. What is the relation of Online Anonymity to information technology?

Chapter 8 : Ethical Issues Involving Computer Security: Hacking, Hacktivism, and


Counterhacking
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: What I expect to learn from this chapter is the definition
of Ethical Issues Involving security and what it is all about and its relation to
Hacking, Hacktivisim, and Counterhacking.
Quote: Many hackers believe benign intrusions not calculated to cause damage
can be on the strength of variety of considerations
Review: This chapter talks about the ethical issues involving security hacking but
let us first define what is Computer security is all about. Computer Security is like
securing the data of you computer not only your computer but also your hard drive
because some important files might be in it, that is why we should be careful and
always make it safe to keep it from hackers because they will hack the data in your
system or computer even if there are in a different location, there are called
professional hackers because they know how to hack you system within a second.
The chapter talks about The Prima Facie case against hacking according to the
text it might seem obvious that hacking is wrong although the more malicious of
these acts involve serious wrongs because of the harm they cause, all are wrong
because they constitute a digital trespass onto the property of another person.
Meaning hacking someones computer by getting its information is wrong because it
is not yours and it still belongs to the person which gives you no right or authority to
analyze and go through their system at all that is why it is wrong because the owner
did not give you any consent to do that and because hacking is illegal many people
are doing it for the sake of gaining the information of the other party that is why we
have to be careful on the information that we will encode and save on our
computers if these information could be save through a paper then we should do it.
We dont have to save it on the computer for convenient purposes because that
information would be in much more danger if you will store it in your computer.
What I have learned:
1. I have learned that Hacking is wrong.
2. There are social benefits in hacking.
3. Hacking is wrong because it involved getting and harming the information of
the other party.
4. We should respect the privacy of other people and be careful about their
information.

29 | P a g e

5. We should not click and trust pop-ups because it might be virus that can hack
our system.
Integrative Questions:
1.
2.
3.
4.
5.

Why do many people do hacking?


What is the relation of hacking in ethics?
What is the purpose of hackers in hacking other peoples system?
Is hacking well in a different point of view or side?
How can we prevent hackers from hacking?

Chapter 9 Information Ethics and the Library Profession


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: What I expect to learn from this chapter is the definition
of information ethics and library profession and to know what it is all about.
Quote: Such serious reflection needs to start with a focus on the point of having
libraries and librarians in the first place-that is the mission of the librarian.
Review: The chapter talks about the information ethics and the library profession.
The main topic of this chapter is about the librarian on how they ethically handle
this job and the information that they will share within the books that they are
analyzing. There are many types of librarian it can be a corporate librarian which
handles the information of the company, a school librarian which handles the library
related to education and the public librarian which is a librarian of a public library
and has a more complicated job because all of the different kinds of books that we
are looking for can be found at a public library. These librarians are careful enough
about information ethics what is the relation of the librarian to information ethics its
relations is that the librarian should consider and respect the information of every
books of the author and the librarian should analyze if the books are applicable or
not. Having a profession of a librarian is really hard because you are like the head of
a library; you have the highest and lowest position because as a librarian you
should know where all the books are placed and memorize them one by one.
Owners who hire librarians should be careful enough in choosing what kind of
librarians their library should have these librarians should be trustworthy they
should not reveal any information and have the consent of the owner first because
revealing without any consent is morally wrong because they broke the rules and
regulations of the library or company.
What I have learned:
1. I learned that being a librarian is hard.
2. Librarians should be careful on the information they give to other people.
30 | P a g e

3. Companies also on the other hand should be careful in choosing their


librarian.
4. There are many kinds of librarian.
5. Being a public librarian is the hardest among other kinds of librarians.
Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of being a librarian in information technology?


Are there any other positions other than being a librarian?
How does a librarian not following rules morally or ethically wrong?
What is the importance of libraries?
Can a library still be called library without a librarian?

Chapter 10: Ethical Interest in Free and Open Source Software


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1
What I expect to learn: What I expect to learn from this chapter is the definition of Ethical
Interest and its relation to free and open source software.
Quote: free software stems from the close ties that early software developers had with
academia
Review: The chapter talks about the Ethical Interest in free and open source software. The
chapter talks about the history of software and the history of software developers and how it
is developed. It distinguished the difference between free software and open source
software. Free software is software that can be downloaded through the internet which is
free and no payment at all. While the open source software is software that is available
through codes. There are many objections on the free software being free based on the test
Stallman deals with in the manifesto that a programmer has a right to control the results of
his/her creative endeavor which for me is the programmer or the developers program
decision if he would like his software to be free or not maybe he has other motives on this
program or software to be free maybe he has some other plans. A smart developer will do
these like when we will download a limewire software a limewire software that is for free has
few features while the limewire pro has all the features that we are looking for but you have
to pay first and purchase it. Many users will choose the free even though it does have few
features because it is free after and all and this is the exact software that we are looking for.
If a developer will do these he will not lost any client and profit because he made many
options for his clients and has the rate or level for those who wants to buy and doesnt want
to buy giving users an option will give many user downloads and if a developer wants to
gain many downloads from users then he should do this.
What I have learned:
1. I learned that being a developer is good because you can make a lot of money.
2. Before being a developer you have to work hard to develop software that will attract
many users.
3. A developer has the right to control on what he wants to do to his software because
he is the one who made it.

31 | P a g e

4. A developer should be innovative and creative in his own ways in developing


software.
5. A developer must also be aware of the threats and viruses that his competitors will
do to destroy his creations.
Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of the chapter in ethics?


Is being a developer a good and nice job?
What is the importance in being a developer?
Why is the free software more applicable than open source software?
Why do people understand the definition of what free software is than the open
source software?

Chapter 11: Internet Research Ethics: The field and its Critical Issues
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: What I expect to learn from this chapter is the definition
of Internet Research Ethics and what it is about and its relation to the field and its
critical issues.
Quote: Philosophers who examine extant statements on research ethics from
diverse disciplines and diverse countries will recognize that these make use of at
least two familiar western ethical frameworks, namely, deontology and
utilitarianism.
Review: The chapter talks about the Internet Research Ethics and its relation to the
field of it and its critical issues, but let us first define what internet research ethics is
all about. Internet Research ethics is about researching sources in the internet and
thinking if what you are doing is morally right. Cases like this are internet plagiarism
where you copy and paste from a certain source for your assignment. To avoid
plagiarism we have to paraphrase words that we get from our source or just quote it
and then explain we have to say based to or according to the text we dont have to
copy and paste everything because this is like stealing the work of others. Many
years ago even if the internet is introduced many people are still looking or using
the books as their source for their paper works and case studies but as the world is
getting more modern many students tend to use internet for fast searching and
convenience but the result of this is that they are copying the works of others
without stating the source or link on where they got it unlike when we got our
source from a book we have to state the name of the book and the author it is also
the same from the internet we also have to state the source on where we got it
from. Based on the text years ago during the 1990s many researchers had been
32 | P a g e

examining the issues and complications on Internet Research ethics because many
people and this internet researchers have to learn the rules about the internet
research ethics on what to and what not to do when researching something in the
internet they have to ethically and morally learn what it is right and wrong.
What I have learned:
1. Internet research ethics started during the 1990s.
2. Many people tend to use the internet for their research than reading a book.
3. Students who are lazy like to copy and paste works from others without
stating the source through internet.
4. Internet research ethics is the study of how internet users used the internet in
a wrong way.
5. Searching works in the internet is more convenient.
Integrative Questions:
1.
2.
3.
4.
5.

Why did they introduce Internet Research ethics?


What is the relation of IRE on every peoples lives?
What will be the solution on the problems of IRE?
What should the users do in order to avoid this problem?
Why is plagiarism the main problem among internet users?

Chapter 12 Health Information Technology: Challengers in Ethics, Science


and Uncertainty
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: I expect to learn what is Health information technology all
about and its relation to challengers in Ethics, science and Uncertainty.
Quote: Computers complicate medical privacy and confidentiality in interesting
ways.
Review: The chapter talks about Health information technology which is an
information technology that is related to health and how it is used in an moral and
ethical way, because the world is getting more modern today and many high
technologies were introduced using these technologies can be used in different
areas like in Health, many people are expecting a lot from this technologies because
they want their diseases to go away. Like chances of a surviving cancer patient
depends on how advance the technology is the common process of curing a cancer
patient is going through chemo therapy but with the technology being more
advanced people can now invent or they might be a technology where it can be a
laser that will kill all you cancer cells in the body. Like in the case of cataract old
people have cases like these and many years ago the procedure in removing a
cataract is through surgery but with the modern world today many people are now
using lasers for their cataract because it is less pain and more convenient you can
33 | P a g e

like go to work immediately after the operation because it seems like nothing
happened at all. Unlike when they do manual surgery you have to wait for week for
it to be healed. But they should be also careful on the technologies that they are
developing and how they used it many people are uncertain about these
technologies because it might be dangerous to our health because it contains
chemicals and it is not natural anymore. Some people dont want it because it Is too
expensive and the output is just the same.
What I have learned:
1. Information technology can also be applied in health.
2. People should be careful in doing these things and consider if there are
ethical or not.
3. The technology is getting more advanced.
4. Many people are uncertain about this technology.
5. Ethics has many branches and studies.
Integrative Questions:
1.
2.
3.
4.
5.

Why do people do cloning?


Is cloning moral?
What are the benefits of the technology being more advanced?
What is the difference of a manual and automated system or operation?
What is the importance of the ethics or morality of information technology in
the health of every people.

Chapter 13: Ethical Issues of Information and Business


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: I expect to learn what are the ethical issues in the
business and information technology industry.
Quote: Beyond such very general considerations of the ethical foundations of
economic activity, there are also more specific issues debated on the macro level.
Review: The chapter talks about the issues related to information and business
industry it talks about the immoral things and the issues behind the business and
information having a good impact to the country and its economy. Based on the text
information is becoming increasingly important in more aspects of our lives
meaning the introducing of information technology made the lives of everyone
easier and every jobs nowadays requires you to have a knowledge on how to use
the technologies related to information technology you have to know the basic
technology softwares like how to use the Microsoft office for you to have a job
because a job for sure will require and make you type all the time because of
34 | P a g e

business proposals and letters to clients. You also have to make a presentation for
the next meeting for you boss or again to have a creative view of your business
proposal to be more detailed and understood by your managers for them to have a
basis on what your proposal is all about. According to the text business and ethics
are not related, but if you we will analyze it we will realize that they are related
because in doing business you have to think if what you are doing is ethical or not
like if you business is illegal like drugs and fake dvds this things are immoral
because it is against the law. And when doing business we have to consider the
norms of a certain country and their culture.
What I have learned:
1.
2.
3.
4.
5.

Business and ethics are related to each other.


In doing business consider other peoples norms and culture.
Consider you business if its immoral or not.
Jobs nowadays require you to have knowledge on information technology.
Booming of Information Technology helped a lot of business people.

Integrative Questions:
1. If selling fake dvds is not against a law in a certain country would it still be
considered immoral or unethical?
2. What is the relation of business ethics in information ethics?
3. Why is ethics important in business?
4. Why should we consider the norms of people in relation to business?
5. Why is doing business important? Is it just for money or power?

Chapter 14: Responsibilities for Information on the Internet


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: I expect to learn what is the responsibilities for


information on the internet all about and its relation to ethics.
Quote: Consequentialist reasons for an accurate attribution of retrospective
responsibility seem to be more natural than the Kantian ones.
Review: The chapter talks about the definition and what are the responsibilities for
information on the internet. For literal explanation I think that we should consider
the responsibilities for information on the internet. Information technology is
introduced and made to make our lives easier and we should also consider the
things that we are doing on the internet and its responsibilities. The chapter talks
about the internet and how good it is based on the text one of the most fascinating
aspects of the internet is that very few accidents happen. Because internet is
communicating through net and not meeting each other in person it would likely
35 | P a g e

cause less accident because you can do everything in the internet you can change
your identity, stalk someone and pretend someone youre not and still nothing can
happen to you because they dont know who you are they can know if that person is
wise enough to track your i.p. address and do other process to know your real
personal information then they will know who you really are. But these things like
pretending someone your not is this really good? We should know the
consequence if we will do these things, what if they really found out who you are?
And filed a case against you then it is your responsibility to accept the charges and
accept the fact that you really did pretend, even if its just a minor case It can be
lead to court if the other party makes it a big deal and of course if it is against the
law.
What I have learned:
1. You should be careful on what you are doing when using the internet.
2. You should be responsible enough to face the consequence to what you had
done.
3. Many people are using the internet for many things and purposes.
4. Many people use internet as a threat to other people by sending them
viruses.
5. We should think and consider if what we are doing is good or not.
Integrative Questions:
1. What are the relations of responsibilities for information on the internet to
ethics?
2. What is the solution on this problem?
3. Why do many people treat internet as a weapon to attack their enemies and
other people?
4. Are there any other ways for this problem to be solved?
5. Should the government consider on making a law about these? like what they
implemented today about pornography if you will download it on the internet
you can now be punished by the law.
Chapter 15: Virtual Reality and Computer Simulation
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: it is not usually an aim in computer simulations, as it is in virtual reality, to


do realistic visual modeling of the systems that they simulate.
What I expect to learn: I expect to learn what is virtual reality and computer
simulation all about and its relation to ethics.
Review: The chapter talks about virtual reality and computer simulation. Virtual
reality is like a real objects created by the modern technology that information
technology specialists had developed today these things are called 3d where there
36 | P a g e

real enough but they are not real at all. 3D effects can be done in movies where the
3D can be seen on the screen where you have to wear 3D glasses and while
watching it, the movie seems real to you. While the computer simulations are the
changes that are being done and the alterations within a invented software and
application by famous developers. Based on the text Computer simulations are
used in the natural and social sciences to gain insight into the functioning of natural
and social systems and in the engineering sciences for performance optimization.
Meaning computer simulation is done to used for the testing or to test if its
compatible with the nature and the society if this new alteration will click to the
society until they come to the conclusion at their survey and analysis on which side
is really effective enough to implement a software or something that is related to
information technology and is also related to computer simulation and virtual reality.
Implementers need to consider first why they are developing something and how it
can help the society. They should think if what they are doing is right or wrong and if
this thing is goof for everyone because one mistake can ruin everything and it might
be too late to do something in the end.
What I have learned:
1.
2.
3.
4.
5.

Many people are amazed by the Virtual Reality.


Virtual Reality are invented by the ITS like the 3D movies and softwares.
Many alterations are being within the computer simulation.
Nature and society are considered and tested in computer simulation.
These things can be imaginary or not imaginary.

Integrative Questions:
1.
2.
3.
4.

What is the relation of Virtual Reality to ethics?


What is the relation of Computer Simulation to ethics?
Is making 3D effects unethical?
What can be the possible effects of implementing 3D effects and 3D
softwares?
5. What are the possible effects if computer simulation is implemented in
politics?

Chapter 16 Genetic Information: Epistemological and Ethical Issues


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

What I expect to learn: What I expect to learn from this chapter is to know what
Genetic Information is all about and its relation to Epistemological and Ethical
Issues.
Quote: To achieve such a vision in a positive sense, culture cannot be separated
from biology.
37 | P a g e

Review: The chapter talks about Genetic Information. Let us first define what
Genetic Information all about. Genetic is information is related to Genetics which
the main idea or topic is all about Genes and DNAs. it is the time where many
scientists are studying about the relation of DNA and RNA while studying it they are
relating it to Information Technology by using technologies that are most recognized
at that time and by analyzing they are gathering information on what to do and
these information are what they are using to apply it to information technology.
Based on the text According to Kay which is a historian that around the year of
1950 molecular biologists described genetic mechanisms without ever using
information that is why many scientists learned from these mistakes which makes
and force them to use information on analyzing and studying research problems for
them to be in a good and proper conclusion that will lead them to a bright future.
Analyzing and knowing the information of a certain problem is important because
without gathering information first we will not know what the problem is all about
and we cannot formulate a solution without knowing what the problem is and with
the use of information technology in Genetic Information in determining Genes it is
said to be unethical because chemicals are reacting and by examining a DNA of a
certain person some other DNA;s and chemicals might be on the persons body if
they will examine it so scientists need to be extra careful on what they are doing
and make sure that it will work.
What I have learned:
1.
2.
3.
4.
5.

Genetic Information is all about Genetics.


Genetics is determining types of DNAs.
It is also the study of the comparison of RNAS and DNAS and proteins.
Information technology helped the Genetic Information.
Scientists used information to examine and analyze the DNA and RNA.

Integrative Question:
1. What is the relation of the chapter to ethics?
2. Are there any other methods besides IT that the scientists can use in
examining the DNA and RNA?
3. What is the difference between DNA and RNA?
4. Why is it important in the IT industry?
5. What is life without DNA and RNA?

Chapter 17: The Ethics of Cyber Conflict


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: The law of international conflict is designed to promote peace and minimize
the adverse effects of war on the world.
38 | P a g e

What I expect to learn: What I expect to learn from this chapter is the definition and
the issues regarding Cyber Conflict.
Review: The chapter talks about Cyber Ethics which is the study of the ethics in the
internet and modern world. Where many people are doing this like kids and
teenager they are doing this by playing games through internet and many more.
The issues of this chapter relies on if this Cyber World is good for everyone or not or
if it is a good influence and if its wrong or not, if it is ethical or not and if it is moral
and immoral. At the negative side we can say that Cyber World is wrong because
this cyber world where is gaming gives children and users the idea on how to kill
someone because this gaming is all about killing someone and something for you to
win this cyber games can be sometimes a bad influence to the kids because this
involves crimes and violation of the law. That is why many parents are prohibiting
their children to use this kind of things because of the issues that surrounds around
cyber gaming. But on the positive side cyber gaming can be a good thing because it
can relax our mind and we can meet different people online, we can also earn
money by selling something that you have online because of this game you can
earn money in just a minute and you can have many friends from different parts of
the world example of these are like in South Korean which cyber games are very
famous even old people and middle aged people are playing this kind of games
because it is very relaxing and they can meet many people online.
What I have learned:
1. Cyber ethics is the study of the world of Cyber Gaming.
2. It analyzes the negative and positive effects of the cyber world to young
ones.
3. There are also adult people who play cyber games because it is very relaxing.
4. Cyber gaming can be a bad influence to children because they might do
these things to harm others.
5. Cyber Gaming is popular especially in South Korea, because they have their
own championship live.
Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of the chapter to ethics?


What is the relation of the chapter to information technology?
Why is it unethical?
What are the good and bad effects of cyber gaming to young people?
What are the possible solutions to lessen the addiction of cyber gaming?

Chapter 18: A practical Mechanism for Ethical Risk Assessment A SoDIS


Inspection
Amazon Link : http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

39 | P a g e

Quote: Sometimes we find the cost/benefit analysis of this form of risk analysis
troubling
What I expect to learn: What I expect to learn from this chapter is the definition and
what is a practical mechanism all about and its relation to ethical risk and the
assessment for A SODIS inspection.
Review: The chapter talks about A practical mechanism for ethical risk but let us
first define what practical mechanism is all about. Practical Mechanism is the study
for the simplest way of the modern world today it is applied in the information
technology through machines and other things that is related to information
technology and should consider if its ethical or not. Today many softwares are
being developed but not all this softwares are surely developed because there are
possible things that might happen this is the number one problem of developers
because sometimes they are finished developing a software and while testing the
software they will encounter some minor problems that has to rebuild and redevelop
all again because the whole code or thing is in a one source code but with the
technology getting more modern there are actually programming languages were
they have shortcuts and it wont be hard for developers to develop a software
because names of codes are already in the programs but some programmers or
developers prefer the old version without these automatic names because they
might not memorize all this things and they might not learn something from it
because they will be dependent on the word that is appearing and will keep them
from memorizing terms which is a bad thing and developers should be careful and
consider if what or if the software they are developing is good or bad and unethical
or not because this software might be rejected and not be recognized by public
users and professionals but are hackers who are used to these kind of things.
What I have learned:
1. Developed softwares still has problems.
2. Example of these is the apple or Mac which still has some problems and the
windows 7.
3. Developers should double check the software they are developing to avoid
future problems and complaints from the users.
4. When developing software developers should consider the risk.
5. They should analyze and plan the whole software development properly.
Integrative Questions:
1. What is the relation of the chapter to ethics?
2. Is the continuous development of softwares like upgrading software from 0.5
to 0.6 and another one a good thing?
3. What are the possible solutions to the problems that might occur while
developing software?
4. What should the developers consider in the way users will treat this or is it a
user friendly?
40 | P a g e

5. What is the situation where can software be unethical, in which way?


Chapter 19: Regulation and Governance of the Internet
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: An alternative method would be to use routers to block content at the


packet level, where the source address of each packet is checked against a black
list.
What I expect to learn: What I expect to learn from this chapter is the definition and
what is the regulation and governance of the internet all about.
Review: The chapter talks about the regulation and Governance of the internet
meaning they are studying what is happening on the internet its process and the
issues that surrounds around it. Even if internet is accessed by everyone it still has
rules and regulations and this rules needs to be followed. Like by having a email add
you should register and you should be over 18 years old. An also in youtube if the
video you are watching is for an adult you have to log in to confirm that you are 18
years old so that you can view that video and if the video in youtube is licensed by
a company then it will be blocked and removed that is why many people are
changing the title and putting a link instead if the movie is licensed by a company
and you cant upload a pornographic video or content in youtube or else it would be
removed by the site. Some sites also has their own rules like in facebook where you
cannot have double accounts like in friendster and of course it is more easy and
convenient to have a one account than two accounts that you need to check all the
time it is more hassle. Certain rules should be followed specially in famous websites
like yahoo and google because if not then you wont have the thing that you want or
the guarantee that you will have a email if you will not follow these conditions but
this terms and agreements can still be cheated because a person can change the
age and year of his birthday without anyone knowing it because the site doesnt
who he is that is why its easy for him to change their age.
What I have learned:
1.
2.
3.
4.

Internet is not free at all.


There are certain rules and regulations that surrounds internet.
We have to follow these in order to have what we want.
We have to be careful In the sites that we are visiting because there might be
viruses on it.
5. We have to consider if the site where visiting is good or not.
Integrative Questions:
1. What is the relation of the chapter to ethics?
2. What are the problems and issues of the governance of the internet?
41 | P a g e

3. What are the possible solutions on this problem?


4. Should the hackers and IT developers has something to do about this?
5. As a citizen, what are the things that we can contribute to make the problem
easier to solve?

Chapter 20: Information Overload


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: At the heart of this understanding of the phenomenon is fairly simple


conception of human information processing.
What I expect to learn: What I expect to learn from this chapter is the definition and
what is information overload all about.
Review: The chapter talks about information overload which is the study of how
dependent people are without internet for sure they cannot possibly live without it,
because you can find everything in internet. If you have concerns you can just ask it
like in yahoo answers and many people will answer you from different parts of the
world it is good that we are seeking advice from other people and it is also good
that this different people has different opinions but we dont have to depend on in
too much we need to still depend in our own intuition and opinion because it is the
best. Searching for something in the internet related to our concern is just a
reference but we should go for what we want because we know whats best for us. It
is also good in a positive site like when we want to buy something we will search it
in the internet and see some reviews if it is good or not or look for a cheaper
product that has the same specifications it is good because we dont have to go to
the mall to canvass and look for something that we want it will save you more time
to shop than to look for something, at least when you go to a mall you already know
what you want to buy and youll have more time to shop for other things, but the
best option is to go again to the mall to see it actual if it is really good or not and to
test if the specifications in the internet and how you test and feel it is the same as
you wanted It to be.
What I have learned:
1.
2.
3.
4.

Many people are too dependent on the use of internet.


We need to still depend on our own opinion because its the best.
It is also good to compare products that we want to buy through internet.
Comparing products in the internet will be save us more time because we
have more time to shop because we already know the product that we want
to buy.
5. Information overload is too much information in the internet that people are
asking and telling about.
42 | P a g e

Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of the chapter to ethics?


Was the chapter stating this as a problem, discussion or opinion?
What is the solution for this issue?
Is it true that people depend on internet too much?
Why is it entitled information overload?

Chapter 21: Email Spam


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: The more identical emails are sent from a sender, the more likely the
recipients are to perceive it as spam
What I expect to learn: What I expect to learn from this chapter is the definition and
what is email spam all about.
Review: The chapter talks about Email spam where in this email spam is the
notifications and the spam that we receive in our email besides the inbox these
spams are the ones that has advertisements and offers by different websites. This
spams are from different people and company and this spams are not sure on
whom it is actual user or the one who really send that spam. Some spams are
dangerous and some are not we have to be careful on the spams that we will be
viewing and receiving in our emails some of this has spam alert! When we will see
this word we have to check first if this email message is safe or not or we shouldnt
check it at all because it can harm our computer we have to make sure that every
spam that we will receive is safe and we know who the recipient is. We might not
know that this recipient or spam is a virus that will attack the system of our laptop
or hackers that will hack our bandwidth for their bandwidth to increase and ours to
decrease and this is a bad thing because they are hacking it and without asking
permission from us this is like trespassing a property where in you are not asking for
the permissions of the owner and just coming in a house of the owner without
asking the owners permission and of course in the culture of our country and it is
given that we should ask permission first before taking something or going inside a
house or if the case is that we know someone who invites us over to their house
then it is legal and not bad at all.
What I have learned:
1. Email Spam is the notification that we receive in our email besides the inbox.
2. This spams has advertisements and offers from different sites.
3. This spams can be viruses so we have to be careful if we will take a look at it
or not.

43 | P a g e

4. We have to make sure that we know the advertisements that we are viewing
because this spams can be viruses that can hack our system and steal our
bandwidth.
5. We have to be careful in every website that we will visit.
Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of the chapter to ethics?


What are the issues surrounding email spam?
What are the possible solutions for this problem?
Why do they call it Email Spam?
Why are they doing Email Spam, and why it is a bad thing for most people
and why are they just ignoring it in their emails?

Chapter 22 The Matter of Plagiarism: What, Why, and If


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: It is important to distinguish between issues of authorization and


documentation, for these two are two sorts of wrongs
What I expect to learn: What I expect to learn from this chapter is the issues
surrounding plagiarism and its definition and what it is all about.
Review: The chapter talks about plagiarism. Plagiarism is done in many ways it can
be done through book and it can be done in the internet, in music like in lyrics and
in other things. But why is it wrong? And what is the proper way to avoid plagiarism.
Plagiarism can be avoided like in the internet and in the book by stating the source
and quoting it this way you are not plagiarizing anything and in words we have to
paraphrase the word in order for it to have different meaning and different way of
explanation if we dont want our paper works to be labeled as plagiarism. There are
also plagiarism in the music industry like in the Asian music culture that we have
there are some issues that a Taiwanese music video is the same as the Japanese
music video that Japan has and the lyrics of a Korean music is the same as the
American artist. There are many types of plagiarism and to avoid these we have to
do all these things because being accused of plagiarism is a huge thing because it
can be lead to court. Like in a school if you are accused by plagiarism you will be
sent to the disicplanary office with an offence what more in the real world it would
be a more serious case than the case that we have in the school. We have to be
careful in the things and sources that we will search on because these sources are
not only viewed by us but other people too, so there are possibilities that are paper
works will be the same as them because we just copied it from a site and this is
wrong and to avoid plagiarism we have to also use a plagiarism checker to make
sure that we are not copying the work of other people and to check If we are using
the same words or not to make sure that we are not copying from someone at all.

44 | P a g e

What I have learned:


1. Plagiarism in the real world is a big deal compare to school life.
2. There are many ways to avoid plagiarism.
3. We should download a online plagiarism checker to check if we are copying
from other or not.
4. If we dont want to plagiarize we can still paraphrase the source that we got
because it is really not allowed to cut and paste.
5. We should state the sources on where we got this article or research from.
Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of the chapter to ethics?


Why are many people still doing this?
Is this a good or a bad thing?
What should be the possible solution to this problem?
Are many students and working people still doing this until now?

Chapter 23 Intellectual Property: Legal and Moral Challenges of Online File Sharing
Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: The P2P architecture represents a powerful communication technology with


obvious social benefits.
What I expect to learn: What I expect to learn from this chapter is the definition and
what is intellectual property all about..
Review: The chapter talks about intellectual property which is the more define way
of having a property or a thing this intellectual property is used by many people
today because many people are getting more smarter because of the modern world
that we have today and because the there are many more technologies that are
being invented and books are more advanced and kids have to learned in advanced
even if they are in high school, preschool or grade school they have to learn all of
this to be smart enough to have a knowledge on the new information technology
that the world has today. Having a knowledge like this is big deal and the chapter
talks about the legal and moral challenges in online file sharing this online file
sharing is good because it is good to share a file online it is a automatic option than
doing it manually because it takes a lot of time unlike online file sharing where you
will just share a file from each other even though your far apart but these file
sharing can be interrupted due to connection of the internet, or if there are hackers
out there that wants to interrupt and hacked the thing that we are doing. As
programmers and developers we have to learn on what to with these things
because this is our specialty and this is the thing which we are good in and it Is not
a bad thing at all we should cherish this and It is very important specially to
teenagers like us.
45 | P a g e

What I have learned:


1. There are many students who are getting more smarter today because of the
intelligent books they are using with good terms that they can learn
something from.
2. Many people are getting more intelligent because of the more advanced
technology we have today.
3. We have to careful in hackers, always.
4. We have to carefully analyze and know the system in order for us to know
what to do if there is a problem.
5. We have to learn how to cherish what we have and learn from it.
Integrative Questions:
1.
2.
3.
4.
5.

What is the relation of the chapter to ethics?


What is the issues that surrounds around the chapter?
What are the possible solutions to this problem from the chapter?
As a citizen of the country what can we contribute to this problem?
Are there any other ways for the people not to suffer too much on what Is
happening.

Chapter 24: Censorship to Access to Expression


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: To censor is to be a third party interfering in a communicative exchange.


What I expect to learn: What I expect to learn from this chapter is the definition of
censorship to access to expression and what it is all about.
Review: The chapter talks about the censorship to access to expression which is the
restriction to access to expression to not allow the access of censor. The main topic
of the chapter is about being censor or to use a censorship. Based on the text
Censorship limits access to an expression, either by deterring the speaker from
speaking or the hearer from receiving such speech. Meaning a person is not
allowed to have access to the outside world and it is also not allowed to say
anything. A person is not allowed to express his or her feelings through other means
or things like writing a books or by music which the meaning is found in the lyrics of
the music. Example of this is in the case of Jose Rizal which he wrote everything like
the secrets of the Spaniards in a book where he is punished to death because of
what he did he fought for our country by not doing anything and just writing a book
unlike what Andres Bonifacio did where he really did fight for his freedom from the
Spaniards like killing someone and going on wars. It is like a freedom of speech of a
certain person. Not having a freedom to speak is a big thing because we are not
allowed to express what we want to express and this is against the law but it
depends on the what kind of country that is like in North Korea where it is a
46 | P a g e

communist country where there leader is the only one who controls everything and
you dont have the freedom to speak or be against him or else you will be dead and
that is unfair to everyone.
What I have learned:
1.
2.
3.
4.
5.

Censorship is not allowing someone to speak for himself.


Freedom of speech should be considered.
All people have their own freedom to speak what they want.
Scientists used information to examine and analyze the DNA and RNA.
People in communist country dont have any freedom to speak and say what
they want.

Integrative Question:
1. What is the relation of the chapter to ethics?
2. What is the possible solution to the problem?
3. As a concerned citizen of the country what are the things that we
should do?
4. What is its relation to information technology?
5. It is still followed today?

Chapter 25: The Gender Agenda in Computer Ethics


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: Computer ethics is a new area of applied ethics with a rapidly burgeoning
portfolio of ethical case studies and problems.
What I expect to learn: What I expect to learn from this chapter is what the gender
agenda in computer ethics all about.
Review: The chapter talks about the gender agenda in computer ethics. What is
the gender agenda in computer ethics? Gender agenda is like to know and analyze
what the agenda of computer ethics really is. Why is computer ethics created and
what is its features and functionalities and how it can be related to the real world.
We have to make sure that everything will be related to computer ethics. Because
computer ethics is the most important and the core of ethics so in order to
understand this we have to analyze first the value and difference between computer
ethics from other kinds of ethics that is existing and there are various wide ranges
of computer ethics that we can choose from or particularly ethics. Computer ethics
is like the one of the types of computer ethics or ethics that is invented when the
issues related to computer ethics arise when people used the computer too much
47 | P a g e

like abusing it and using it for other thing and using it for wrong doings and
negative things and this is not good because it should be done in a good way if not
then what should it be. We have to consider and be careful on the things that we
would do and we have to consider if what we are doing is good or not to not make
any mistakes in the end. We have to always do things that will have good effect in
relation to computer ethics because computer ethics is really important.
What I have learned:
6.
7.
8.
9.

Computer ethics is very important and we should value it.


We should be careful on what we are doing.
We should consider if what we are doing is good or bad.
There are many other kinds and types of ethics and computer ethics is one of
them.
10.Computer ethics should be carefully and properly used.
Integrative Questions:
6. What is the relation of this chapter to ethics?
7. What is the relation of this chapter to information technology?
8. What is the possible solution on the issues relating to computer ethics?
9. Does the government have to do with these problems?
10. Is money related in the issue regarding computer ethics?

Chapter 26: The Digital Divide: A perspective for the future


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: Although these differences in access to ICTS and information correlate with
differences in wealth, there is a casual relation between them.
What I expect to learn: What I expect to learn from this chapter is the definition of
the digital divide and what it is all about and its relation to a perspective for the
future.
Review: The Chapter talks about digital divide a perspective for the future which is
the vision and assuming on what will happen to the future. We should vision and be
careful on what will happen to our future because this future can be our forever and
will be our last hope to the dreams that we want to happen and to the goals that we
want to fulfill. We want our future to not be fully planned because we want it to
happen unexpectedly and go on smoothly and thoroughly because having a
planned future isnt exciting at all like for rich families and Chinese families whose
futures are already planned where they have to take over their family business and
they are also planned to marry someone they dont love it is called arrange
48 | P a g e

marriage this is done because of the business relations, if you have a business and
you know someone who also has a business and you want your children to marry to
make your business big and huge because it will increase you assets and
investments because for sure the parents of the one that your son or daughter will
marry will invest a lot to your company because you are now one family. On the
positive side it is good because you dont have to look for a partner anymore but
what if you found someone you love and its qualifications doesnt meet your
parents and what if they are not Chinese then it is unfair and we should do
something or just follow our parents wish because it is for our future.
What I have learned:
6. We
7. We
8. We
9. We
10.We

should now plan our future.


should not allow our parents to control our future.
should have our freedom to decide for our own future.
cannot let other control us even if it is our parents.
should do what we want not what they want.

Integrative Question:
6. What is the relation of the chapter of the future to ethics?
7. What is the relation of the chapter to IT?
8. What are the other issues regarding the future?
9. What can be the possible solution to the issue or the problem?
10.Why do parents control and plan the future of their children?

Chapter 27: Intercultural Information Ethics


Amazon Link: http://www.amazon.com/Handbook-InformationComputerEthics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1269175801&sr=8-1

Quote: Intercultural Information Ethics (IIE) can be defined in a narrow orin a broad
sense.
What I expect to learn: What I expect to learn from this chapter is the definition of
Intercultural Information Ethics and what it is all about.
Review: The chapter talks about the culture of information ethics and where it
originated from studying the history of information ethics is important because
knowing and understanding the meaning of information ethics will make us
understand the heart and core of computer ethics more. Knowing this information
ethics definition is important by knowing this we will be professionals and know the
core and what is the relation of information ethics and computer ethics. And we will
know why is it invented and why is it related each other. We will also know how or
what is the relation of the word computer and information and how is it invented.
Knowing all of these things will give us new ideas and knowledge in relation to our
49 | P a g e

course and it is a good thing because there are many people who dont know that
what they are doing is unethically wrong because they did not study what Is the
good or bad in the internet or how to use it properly. That is why we have to teach
them on how to use the internet properly to decrease the users of the internet who
loves to do naughty things and uses the internet in a wrong and bad way. Doing all
this things will not just help our self but the country too and the people around us it
will make them realize what is good or wrong and by realizing that we should help
them analyze and wrong what is good or bad in the usage of internet and how to
use it wisely.
What I have learned:
6. History of information ethics is important.
7. After knowing its history it can now be related to computer ethics.
8. Relating and applying these things are very important.
9. We can now differentiate computer and information ethics.
10.We should help other people realize that what they are doing is wrong or
right.
Integrative Questions:
6. Why do people use the internet in a bad way?
7. What are the benefits of the bad people who treats internet in a bad way?
8. How can we teach these people the right way to use the internet?
9. What is its relation to ethics or IT?
10.What are the possible solutions to the problem regarding this chapters issue?

Chapter 1: Introduction to Sociotechnical Computer Ethics


Study Questions:
1. What is encompassed in the question why computer ethics? in other words,
what more specific questions are included in the broad question?
Computer ethics is very important because without computer ethics we wont
have any basis on what is right and wrong in the Information technology
world. Knowing the definition of computer ethics will let us know what
computer ethics is all about and its relation to other things in the world that is
also related to IT. There are many kinds of ethics and computer ethics is one
of them and we should also ask ourselves what is the importance of
computer ethics? And its relation to our daily lives.
2. Give a concise summary of Moors standard account of computer ethics.

50 | P a g e

Based on the text According to moor, the computer revolution will occur in
two stages. The first stage is that of technological introduction in which
computer technology is developed and refined while the second stage is the
one that industrialized world has once recently entered. Meaning he is the
one who predicted what will happen to the world and the world of computer
ethics were there will be a new technology that will be introduced to
everyone and how it will be fully developed and equipped.
3. What is a policy vacuum? Give an example, and explain it using the standard
account.
Based on the text According to Moor, when computer create new
possibilities, there is a vacuum of policies. Meaning there are tons of policies
that you have to consider when creating software you have many things to
consider like the culture and norms. We may think that creating software is
easy but publishing it is not and it will take through a lot process before it
should be published and can be used by users.
4. What Is a conceptual muddle, and how do they get in the way of filling policy
vacuums? Illustrate with an example.
Based on the text to illustrate a conceptual muddle, consider another case
from the early days of computing computer software, where they figure out
how to conceptualize the invention of computer softwares. With this they
have to do everything just to make sure that the software will be published
like they have to process the papers on publishing this software that they had
created.
5. What is wrong with the standard account of computer ethics? Identify at least
two criticisms, and explain.
Based on the text the problem had to do with fitting computer software or
prevailing intellectual property law, copyright and patent seemed the best
possibilities meaning they have to do all of these just to publish a software
and this is related to computer ethics because you have to think and consider
first if the software that you will publish is ethical or not and the second one
is the new inventors would have to get permission from a private owner to
use one of the building blocks this is not a good idea because in the
computer world if you would like to create a software in your own means it
will be great but having to ask permission to a private owner takes a lot of
time how can a software developer create a software with his own idea if he
still needs to ask permission and they have policies I think it may be hard to
create and publish a software that is fully developed and created by him
there may be some revisions on it because there are policies that should be
followed.
6. What are the two tenets of the view referred to as technological
determinism? What is the STS critique of each tenet?
The two tenets of technological determinism is based on the text first is the
technology develops independently from society and second when a
51 | P a g e

technology is take p and use in a society, it determines the character of that


society. This it the critique by scientist experts who has their own idea on
what STS is all about their point of view are different from others. They said
that developers of this technology are isolating their selves in their own
worlds.
7. What is wrong with the thinking of technology as merely material objects?
It is wrong because even if it is developed through material object knowledge
of a certain person is still used and without this knowledge that they have
they wont be working or have a chance to use these invented technologies.
They are not just material objects they also have their values and importance
because without them our life wont be easier.
8. What is a sociotechnical system?
Based on the text STS is science, technology and society, we will develop a
foundation for IT ethics using STS insights, concepts, and theories
9. Choose a familiar technology and describe its values.
Technology of internet and how fast it is today without internet we will still be
right long letters at a sheet of paper and send it to our loved ones in far
places where they will received it after 3 days unlike wiring a letter in an
email which will takes a minute or two for them to receive your email to them
this is important because it has improve how fast people communicate with
one another and it is really fast and convenient.
10.What is the difference between micro-level ethical issues and macro-level
ethical issues? Give and example of each.
Micro level ethical issues focus on the minor issues of ethics for example in
the internet where they copy and paste everything which is called plagiarism.
While the macro level ethical issues is the study of a one big problem of a
society or a major problem that they have to solve problems like these are
the hacking of computer systems in a country their government has been
hacked by some unknown people and has many virus on it.
11.Why is the study of ethics and technology needed? Why is the study of ethics
and IT in particular, needed?
The study of ethics and technology is needed because the world is
modernized today many high tech technologies are being developed and
released and by using these we need to first learn how to use this morally we
have to use this properly and not use it in bad things this is created for our
lives to be easier not to destroy other peoples lives. The study of ethics and
IT in particular is needed because IT is in demand and many people are
taking up this course and IT people are increasing that is why they have to
study all of these to have a knowledge on how important it is and what is its
relation to ethics.
Chapter 2: Ethics and Information Technology
Study Questions

52 | P a g e

1. How do descriptive (empirical) claims and prescriptive (normative) claims


differ? Give examples of each kind of claim.
Based on the text descriptive text are statements that describe a state of
affairs in the world. For example: the car is the driveway. While normative
claims are based on the text cannot be supported simply by pointing to the
facts about what individuals do or say or believe. Meaning they have to
explain it in every detail properly it should be detailed for the listener to
understand on what you are talking about.
2. Describe a discussion of a moral issue that is currently receiving attention in
the media. Identify the different claims and arguments that were put forward
and defended. List the claims in an order that illustrates dialectic about this
issue, with one claim and argument leading to another claim and another
argument, and so on. Are there some claims that are still being presented in
the media that have, in your judgment, already been rejected in the dialectic?
Moral issue that is currently receiving attention to the media is about the
hong kong hostage incident. it is morally wrong when many tv networks are
on the spot doing anything just to have a footage of the video which is live
because the hostage lasted after many hours. The media did not think that
they are causing the delay of the process of talking to the hostage taker
because they are doing everything like when they talked to the hostage taker
when a radio interviewed him and said something that made him more angry
which caused him to kill hong kong citizens. They should be more careful
because they are doing this for the sake of their network but not thinking on
the consequences that will happen they are not thinking of the bad things
and the negative side of it they should had a plan for them not to fail and not
to be blamed by many people.
3. Explain the difference between ethics is relative as a descriptive claim and
as a normative claim.
In a descriptive claim we can explain the word ethics is relative by just
saying that ethics is virtual. But by using a normative claim we can say ethics
is relative because it can be used in many things and there are many kinds of
ethics in different fields and can be used in a different way by different
people.
4. What evidence can be used to support ethics is relative as a descriptive
claim?
Ethics is relative as a descriptive claim because it is understood that
whatever kind of ethics that is and in whenever kind of field we can still
understand it that the main question that we will be asking ourselves if this is
morally wrong or not. And if this is unethical or ethical?
5. What are the three problems with ethics is relative as a normative claim?
Based on the text first problem is it is not just about attacking the evidence
but questioning whether it supports the conclusion second one is to move
the dialectic forward to treat ethics as relative as normative claim third one
is the this ethics is relative claim does not provide much help in making
moral decisions, especially not with decisions in tough situations.
53 | P a g e

6. What is the basic principle of utilitarianism?


Based on the text utilitarianism begin by focusing on values and asking what
is so important, so valuable to human beings, that we could use to ground
and ethical theory. Meaning utilitarianism is about the study of what is the
most important thing that we should consider in our life and the life of other
people.
7. What is the difference between an instrumental good and intrinsic good?
Instrumental good are things that are materials and we want to have like
money because money can buy you everything while the intrinsic good is
what money cant buy like happiness and knowledge of a person having a
strong relationship with your family is a example of intrinsic good.
8. Why do utilitarians believe that happiness is the ultimate basis of morality?
They believe in this because based on the text what is valuable, will not stop
until you get to happiness meaning we wont get content or happy until we
get what we wanted for them we are like selfish people who seeks for
happiness in every way and will do everything in order to feel or gain
happiness.
9. What is the difference between act-utilitarianism and rule-utilitarianism?
Act utilitarianism is based on the text put the emphasis on individual actions
rather than rules where they focus more on the actions of people and how
they perform it. While the rule utilitarianism is based on the text if followed
by everyone, would in the long run maximize happiness this is when you
follow all rules and regulations you will be happy even if you are controlled by
another person.
10.What is the major criticism of utilitarianism? Explain it using an example
other than the distribution of scare medical sources.
Based on the text one of the most important criticism of utilitarianism is that
when it is applied to certain cases, it seems to go against some of our most
strongly held moral intuitions meaning we should apply utilitarianism in
good way not in a bad way.
11.What is the unique characteristic of human beings according to
deontologists? How is this quality connected to morality?
Humans are good when they want to seeks for happiness they are not
treating everything and is not giving up whenever they have problems but
this still depends on the attitude on how a certain human deals with his
problem.
12.What is the categorical imperative? Give two examples of violations of the
categorical imperative.
Categorical imperative is about the definite and certain importance of a
certain thing it should not be violated and we should consider the most
important thing out of it.
13.How can rights be based on deontological theory? How can rights be based
on utility theory?

54 | P a g e

Rights can be based on deontological theory by rules, following rules that are
made for you to follow. While the utility theory is doing everything in order to
have happiness. Rights can be based on deontological theory by following the
rules of a certain country because this not only for their own good but for
everyone and for the whole country while the utility theory is doing
everything and taking risk for happiness.
14.What is the veil of ignorance on the original position in Rawls social contract
theory?
Based on the text according to rawls, justice is what individuals in the
original position would agree to. Meaning human beings are rational this is
like buying a cellphone or a computer which you dont know its specifications
and how good it is you just bought it because it attracts you outside but you
know its features inside?
15.What are the two principles of justice in Rawls theory?
Based on the text the two principles are first each person should have an
equal right to the most extensive basic liberty compatible with a similar
liberty for others. While the second one is based on the text social and
economic inequalities should be arranged so that they are both reasonably
expected to be everyones advantage and attached to positions and offices
open to all.
16.How does virtue ethics theory differ in focus from other theories discussed in
this chapter?
Virtue ethics theory is important because this is the study on the main or
major characteristic on what ethics is all about in its relation to the different
theories a certain ethics have analyzing this ethics will help us understand
more the virtue of ethics and its value to other people.
17.What is the analogical reasoning? Give an example of how it can be used in
computer ethics.
Analogical reasoning is analyzing something on a thing like based on the text
an IT is analyzing on what the world would be without internet for sure many
people will go crazy like what happened in Cairo where their president
removed all their internet connections which made the people really mad.
18.Why should we always use caution when arguing on the basis of analogies?
We should be careful when analyzing and arguing this analogies because we
dont know where this analogies came from and we have different point of
views but if this is more knowledgeable than us then we should be careful on
the arguments that we will take not and analyze in the future.

Chapter 3: Ethics in IT-Configured Societies


Study Questions:

55 | P a g e

1. This chapter considers how technology should be conceptualized. What are


the advantages of thinking about technology as the instrumentation of
human action?
The advantage of technology as the instrument of human action is that it will
make our lives more easier and it is more convenient because we dont have
to do many things and it can save a lot of time we have to think the benefits
that will effect in our lives like using the technology that we have today and it
being a big help to our world is a big think in the IT industry specially
developers.
2. What is captured, and what is lost, when certain forms of IT are
conceptualized as robots, and when human beings are conceptualized as
cyborgs?
Even if the world is more modern it doesnt have to be too much where they
will use robots this is not called convenience but laziness even if we can do a
thing we will just rely on this robots to a certain thing for us. Like in the movie
irobots where they have these robots who will clean their house and
everything but they dont realized that in the end this robots wants to kill
them and we have to work an d clean this is like our exercise not exercising is
bad for our health.
3. How does the scope of communication on the internet differ from other form
of communication such as telephone, television, newspaper, and talking face
to face?
Scope of communication in the internet is differ because it is more
convenient and communicating through internet and email will make you
more express your feeling by writing a long letter and fee while on the
telephone where you have to pay per minute if you are talking to someone
many people tend to express their feelings in a letter or by writing a email
because it is more convenient and fast.
4. Why is not accurate to say that communication on the internet is
anonymous? What is different or distinctive about the identity conditions in
the internet when compared to the identity face to face?
Communication in the internet is not anonymous because if you want to meet
someone and if you want to know someone about you of course they will look
into your information and you want these informations to be more accurate
for them to know the real you. Sometimes it is not accurate because many
people are using fake pictures when where they meet in personal many
people is shocked because they look way more different in the picture the
disadvantage of communicating through internet is that you actually not
seeing the one that your are talking to.
5. What is reproducibility and why is it significant?
Reproducibility Is about the accuracy of a certain thing it is significant
because many people are making sure that you are real and you are not
using a fake account on face book because they dont wan to talk to people
who lie on who they are.

56 | P a g e

6. Did anyone do anything wrong in the virtual rape case? If so, who? What was
the wrong doing? Develop analogies between the behavior in this case and
other kinds of behavior that occur offline.
Yes something is wrong because what they had done to her is unethical and
morally wrong.
7. Explain the statement that social networking sites shape, and are shaped by,
friendship.
Networking sites are shaped by friendship because this is the place where
friends update one another on their status and everything, every detail can
be found in you facebook page and this is the means of communication
through social networking sites.
8. What characteristics of IT and the internet change the environment for
plagiarism and plagiarism detection?
Many developers developed and created a software for plagiarism to check
and make sure that your are not copying the works of other people and to
make sure that what you are doing is right and wrong.
9. Identify and explain the four arguments made to show that the internet is a
democratic technology.
The first argument explains that it allows users to share information with
other people. The second one explains that it is directly connected and can
be viewed through videos by other people like youtube.Third one is can be
access by many people and the last one is it is independent.
10.Do any of the four arguments in question #9 hold up to critical scrutiny?
Explain which argument you think holds up the best. Do you think that his
best argument is convincing?
The best argument Is number one where it is true that many people are
knowing the information about you because you are sharing it but it still
depends on which kind of people you will share your information with is.
Chapter 4: Information Flow, Privacy, and Surveillance
Study Questions
1. What are the significant differences between personal information flow with
IT and personal information flow without IT?
Personal information flow is a personal information within the ITS structure
and personal flow with IT is also included and related with the personal
information of ITS structure. Without the information flow or personal
information flow without IT is like not depending on something and not having
any information on the steps on how to do a thing that relates to IT.
2. What are the three arguments that can be made for why we shouldnt worry
about privacy? How can each of the three be encountered?
First we should not worry about privacy because there are many things that
can protect us. Second there are many kinds of securities out there like anti
viruses for our computer to detect the virsues that will come to our personal

57 | P a g e

computers and lastly protection of these anti viruses are safe because they
will notify you if a virus attacked your computer.
3. Explain rachels argument that privacy is necessary for a diversity of
relationships.
Privacy is necessary and needed in a relationship because many relationships
that we see is not what we always see there could be other things that is
happening while there alone and while were not seeing them but that
because it is private and good thing they are doing it in private not in public.
4. What does gossip have to with privacy?
Gossip is like ruining ones privacy and going on inside with their life and
digging in other things that will make their life miserable like stating the
things they are weak at and saying the things they had badly done.
5. Nissenbaums account of privacy as contextual integrity explains privacy in
terms of two norms. Explain.
When going in to a privacy of a person we have to consider its norms
because this is the most important we might not know that we are going
through the privacy of a person and knowing their norms are kind of not a
good idea at all.
6. What is the panopticon? How do prisoners experience themselves differently
when they are in panopticon prisons?
Panopticon is a prison building for prisoners this is the building or the place
where they stay. They experience their selves by getting used to the place
because they dont have a choice.
7. What happens to people who are watched all the time according to reiman?
People that are being watched all the time are getting paranoid and sick of
them being watched and they are getting crazier than before.
8. Pick a domain of human activity in which information about individuals is
gathered?
Information of individuals Is gathered through registration and introducing
and starting ones personal information.
9. What would be the benefits and drawbacks of limiting organizations to using
only crude categories in their information gathering practices?
Benefits of drawbacks is not know how to operate something using gathering
information on some things that are important.
10.What are the five principles of the code of fair information practices?
Principles of the code of fair information practices are very important and
should consider if it is right or wrong it is made for us to have a basis on what
the code of information is all about.
11.How would transparency policies protect privacy?
Transparency policies can protect privacy because they have certain rules
which a person should follow regarding ones own privacy.
12.What is the difference between opt-in policies and opt-out policies?
Opt in policies are policies inside a information or within a policy while the opt
put policies are the policies outside the information and is far related to opt In
policies.

58 | P a g e

13.What do you think are the three most significant personal steps an individual
can take to protect his or personal information?
This steps can help us gather more information on how to protect our own
privacy and the privacy of a certain person. This steps can help us be a better
person.
Chapter 5: Digital Intellectual Property
Study Questions:
1. What is software? What is hardware?
Software is the one that we are using and the one that is produced by many
developers today while the hardware is the one that is used through the
software it used within the software and has different hardware and software
requirements.
2. What are the differences between object programs, sources programs, and
algorithms?
Object programs are the objects that are used within a program where there
is a actual design and value of something. While the source program is the
source code within the program it is where all the source and where it
originated and lastly algorithms are declared variables and values that are
used within the source code and source program.
3. What is the aim of the us copyright system?
The aim of the us copyright system is to keep others from copying each other
works for them to have their own originality and for them to express their
own ideas and apply the knowledge that they have learn from school.
4. What is copyright problematic for protecting software ownership?
Copyright is problematic for protecting ownership because copyright is
sometimes hard to get and obtain that is why many people and developers
are skipping this process and going through the whole process without
checking if there is a copyright or not.
5. What does a copyright holder have to show to prove infringement?
A copyright holder have the right to prove that the software that they have is
copyright and the other party doesnt have any right to be against what the
copyright holder is saying.
6. What must copyright holders show in order to prove that they had a
legitimate trade secret?
The copyright holders must show the certificate of the copyright and the
receipt because they will pay for it to show the proof that they did really pay
for that copyright and it is approved by the law.
7. Why is trade secrecy problematic for the protection of software ownership?
Trade secrecy is problematic because trading something to other people or
other people needs security because there are many treats out there
specially in our country that is why we have to be more careful.
8. How is patent a monopoly?
Patent monopoly is like having a copyright or is accepted already by an
agency and they will keep it and register for another one for the trademark to
59 | P a g e

be new and with new sources and will or agreement to the agency or
company.
9. What test must a patent claim to satisfy to obtain a us patent?
The test for the patent is by evaluating the software or business if it is really
good in quality and it is a good choice to test if the software or product will
click to the mass media and other countries.
10.What cannot be patented in the United States why?
What cannot be patented in united states in the products that are not made
by them and made by other races because all us business should be from a
citizen only not from another nationality and approval of patent can be
obtained if the business is legal and is in good terms with other businesses.
11.What are the three different forms of digital shanng discussed in this chapter?
Three different forms of digital sharing are Bluetooth, infared and file transfer
protocol.
12.What are the four freedoms that FS advocates try to preserve?
Four freedoms of FS advocates to preserve are really important because they
are the core of the advocates or patents of a company.
13.What is lockes labor theory of property? Why doesnt it necessarily apply to
ownership of computer software?
Lockes theory of property is to protect the privacy of a security and a
persons own property by not sharing the information gathered to other
people.
14.What natural rights to arguments can be made for and against ownership of
software?
Natural rights that are made to the software is that they have all the power to
do what they want to do with the software and name the price that they want
because they are the one who made and developed that software.
15.The authors argue that software copying is immoral because it is illegal. List
the logical steps they used to arrive at this condition. Is the argument valid?
Software copying is of course immoral and illegal and we have to consider the
point of view of other people. Many people tend to buy softwares that are
copied or what we called fake ones because there are more affordable than
the original ones that you will just have to sue for a week for your subject in
school and it is expensive specially for students.
16.What is creative commons?
Creative commons is a creative point of view and opinion common to all
people specially programmers, developers, IT specialist and IT professionals.

Chapter 6: Digital Order


Study Questions:
1. What is the difference between security and reliability? How are they related?
Security is the one that a person need and a software and reliability is the
assurance in something to make sure that thing will happen. Security and
60 | P a g e

2.

3.

4.

5.

6.

7.

8.

9.

reliability are related because the security needs reliability and assurance
that it is really secured.
If you own a personal computer, how secure is that machine? How did you
decide how much security was enough?
For my personal computer I will ensure that the computer has anti-virus and
is always updated because reformatting a computer cost a lot and is really
expensive for students like us.
If you use a computer system that is run by an organization have you ever
carefully read the security policies that you are supposed to know as a
systems user?
When using a computer system from an organization we have to carefully
ready the policies because we will be charged or will have an offence if we
visited a site that is prohibited by that organization.
If your machine is being used as a drone by a hacker to send spam emails,
are you victim, a perpetrator, or both?
If this will happen I am a victim because that hacker is hacking my system
and getting my systems information and files.
If you make a living by selling security software to individuals who own
personal computers are you happy or sad when hacker activity increases?
Of course I am happy when hacker activity increases because many people
will buy more anti virus from me because they know that it is more safe and a
computer really does need a anti virus from protecting the computer not only
from virus but from threats.
Have you ever received an email that indicated someone else had sent out
spam with your return email address on it? How would you feel about it?
Yes I had received an emall like this and after reading that the content is
weird I understood immediately that it is a virus because I dont understand a
thing on what the content says.
Have you ever compromised physical security for convenience? If so, what
did you do? If not have you seen anyone else do this?
Yes because we have to do something if our life is in danger because we have
to secure and protect our selves from other people who have bad motives.
Why is the issue of children being exposed to pornography online a difficult
one to resolve? Is this the only reason that received so much publicity?
It is publicity because many people or children that are exposed to
pornography are not influenced because of the pornography online but it is
what they see from their parents and other people specially from poor people
that is why many of them have many children because their children also
knows how to do something that they had learned from their parents because
they saw them doing it.
Do you think the 9/11 terrorist attack have substantially changed peoples
attitudes toward the trade offs between privacy and security?
Yes because many people are know much more secure and protecting their
selves and always at their place because they are scared that something
might happen to them and they are more alert and warned than before
because they dont know what will happen.
61 | P a g e

10.Go on the website and if you found something offensive. Having viewed this
material that you find objectionable, would you favor legislation to ban this
kind of material from the web?
I will favor this kind of ban because internet is where we also do business and
seeing something like this is so unprofessional and unethical there are certain
places for it should be done and I dont think internet is the right choice.

Chapter 7: Professional Ethics in Computing


Study Questions:
1. What are the professional ethics issues central to therac-25 case?
Professional ethics issues are the one that is most talked about because it is
the high standard and the one that should be more considered and talked
about.
2. Explain the pact that professions could be said to have with the society in
which they operate.
Society consist of people that are professionals and experts in which they
should know each others profession and their values on what to do and their
experiences and how they can help the society.
3. What five characteristics are usually associated with professions? Explain
Five characteristics of professions are first you should be a good professional
and a person who had a good degree. 2 nd a professional should be good
enough 3rd they should do their job 4th they should be respected by everyone
and the last one is that they should be a good and productive leader that
many people and their subordinates will look upon.
4. Use the five characteristics of professions to describe the state of computing.
Which characteristics does computing have? Which characteristics does it
lack?
State of computing is really hard to know and determine that is why a person
need to have a certain profession to study and analyze a thing for it to know
and determine what state of computing is all about.
5. What functions can a professional code of ethics serve?
What a professional can contribute is their skills and abilities in the field that
they are good at and from the school that they graduated.
6. How is software engineering more like a profession that other fields within
computing?
Software engineering is like a one field in IT where many people are doing
software and building it they are like developers and should be taken
seriously.
7. How does categorical imperative apply to the employer-employee
relationship? How does it constrain employers in treating employees? Explain
Categorical imperative is applied to employer and employee relationship
because a employer has high position that the employee which makes them
categorized to one another.
62 | P a g e

8. Are there limits to the loyalty an employee owes an employer?


There are limits because even though an employee works for the employer
for so long it cannot be still be measured on something and it still depends
on the situation. Situation like these today are not happening anymore
because of how bad the economy is and how jobless people are.
9. How do the agency, paternalistic, and fiduciary models of client-professional
relationships deal with the disparity of knowledge between the client and
professional? What is wrong, if anything with each of these models?
Agencies deal with them by having human resource managers who knows
how to handle this kind of people and they are professionals who know what
are the different characteristics and reactions of a individual.
10.Blowing the whistle on ones employer might be thought of as a manifestation
of conflicting responsibilities in the role of computer professional. Explain
Doing something that will break the trust of the employer is the like the end
of discussion and the end of connection between everything that you and
employer have because once a incident happen the employers trust is hard
to regain and it is better to look for other jobs than waste your time begging
for your employers trust.
11.How does categorical imperative apply to the buying and selling of software?
Categorical imperative is related to buying and selling of software because
hardware and software are categorized and has their own uses because they
are produced by many people and different software developers.
12.What Is negligence? How it is determined?
Negligence is doing a thing or crime that is not meant to happen. If you
accidentally bumped onto someone while driving it is called negligence
because it is negligence due to carelessness because you are driving
carelessly.
13.What is the difference between a gun for hire and a professional?
Gun for hire is like a person that is hired even though they dont have any
experiences on the desired job because that position is really in need why a
professional is the one that has all the power and the position is compatible
and related to his course and his wants.
14.Take one of the scenarios at the beginning of the chapter and use material
introduced in the chapter to analyze the situation of the computer
professional in the scenario.

63 | P a g e

Anda mungkin juga menyukai