ITEthics Reader
ITEthics Reader
ITEthics Reader
ReaDer
1
This book is dedicated to you.
2
CONTENTS
3
The
CYBeR
eTHiCS
4
Book: Cyber Ethics
Quote:
The information stored in the world's libraries and computers doubles every eight years.
In a sense the computer age and the information age seem to go hand in hand
Learning Expectation:
It also underlies the study of ethics in the cyberspace and the significance of
understanding the effect of computer to mankind. Furthermore, I am expecting to learn about
how the information in the cyberspace is being used.
Review:
The information stored in the world's libraries and computers doubles every eight years.
In a sense the computer age and the information age seem to go hand in hand. Enforcement
will also be a problem for several reasons. One reason is the previously stated problem of
jurisdiction. Another is that police departments rarely train their personnel in computer abuse
and fraud. Computer fraud also raises questions about the role of insurance companies. How
do companies insure an electronic asset? What value does computer information have? These
5
questions also need to be addressed in the future. The rapid development and deployment of
computing power however has also raised some significant social and moral questions. People
in this society need to think clearly about these issues, but often ignore them or become
confused.
Lesson Learned:
We must be conscious on what information we would like to divulge about ourselves for
self-preservation purposes. I have learned that the computer technologies do not constitute a
safe medium of providing relevant information that could be used by different government
agencies.
Integrative Questions:
What are the tips in order to protect relevant information about you?
6
Book: Cyber Ethics
Quote:
Medical services and many other necessities of life move more and more into
cyberspace, will gaps between the rich and the poor become even worse.
Lesson Expectation:
Review:
7
copy programs, so this is only an issue with very knowledgeable people, or large bootleggers;
not an issue for everyday people. What is an important issue, though, is the illegal copying of
information on the Internet
Lesson Learned:
Most of the crime being committed is stealing private property of one another. Even the
identity of these people could be stolen as well.
Integrative Questions:
8
Book: Cyber Ethics
QUOTE:
The stakes are much higher, and consequently considerations and applications of
Information Ethics must be broader, more profound and above all effective in helping to realize
a democratic and empowering technology rather than an enslaving or debilitating one.
Learning Expectation:
If we can avoid policies that result in significant harm to others, that would be a good
beginning toward responsible ethical conduct. Some policies are so obviously harmful that they
are readily rejected by our core-value standards.
Review:
It is the same sort of pyramid scheme that exists over telephone or mail, but no laws
covered it for a while. Also, many email chain letters have allowed urban legends to spread at
an accelerated rate and created alarm over hoaxes concerning many food and drug products.
These emails only bog down email systems and servers, but do not seem to be ending.
Morality must play catch-up to technology that has leap-frogged ahead. Without a
knowledge of computer ethics, you will not be fully equipped to enter the new world of online
society - and you will need to enter that world, whether you choose a career in art,
programming, business, or anything else.
What is difficult to comprehend is what impact this will have on human life. Surely,
some of the effects will be quite positive and others quite negative. With the newly acquired
advantages of computer technology, few would want to put the genie completely back into the
bottle. Aspects of the computer revolution will continue to spring up in unpredictable ways.
9
Lesson Learned:
Other policies easily meet our standards. Building computer interfaces which facilitate
use by the disabled is a clear example. And of course, some policies for managing computer
technology will be disputed. However, as I have been emphasizing, some of the ethical policies
under dispute may be subject to further rational discussion and resolution.
Integrative Question:
10
Book: Cyber Ethics
Quote:
(Critchley 1999)
Learning Expectation:
More particularly, we are concerned with the way in which the interest of some become
excluded through the operation of closure as an implicit and essential part of the design of
information technology and its operation in social-technical networks.
Review:
In this essay I will discuss what makes computers different from other technology and
how this difference makes a difference in ethical considerations. In particular, I want to
characterize computer ethics and show why this emerging field is both intellectually interesting
and enormously important.
Computers provide us with new capabilities and these in turn give us new choices for
action. Often, either no policies for conduct in these situations exist or existing policies seem
inadequate. A central task of computer ethics is to determine what we should do in such cases,
i.e., to formulate policies to guide our actions. Of course, some ethical situations confront us as
individuals and some as a society. Ethics is always and already the 'other' side of politics
(Critchley 1999). When we use the term 'politics' (with a small 'p')--as indicated above--we refer
to the actual operation of power in serving or enclosing particular interests, and not others. For
politics to function as politics it seeks closure--one could say 'enrolment' in the actor network
theory language. Decisions (and technologies) need to be made and programmes (and
technologies) need to be implemented. Without closure politics cannot be effective as a
programme of action and change. Obviously, if the interests of the many are included--in the
11
enclosure as it were--then we might say that it is a 'good' politics (such as democracy). If the
interests of only a few are included we might say it is a 'bad' politics (such as totalitarianism).
Nevertheless, all political events of enclosing are violent as they always include and exclude as
their condition of operation.
Lesson Learned:
Integrative Questions:
What is totalitarianism?
12
Book: Cyber Ethics
Quote:
Although I do not want to belabour this point here, it is worth noting that ‘mainstream’
ICTs studies have tended to view the idea of gender as an analytical dimension as, at best,
something to be added on after the main business.
Dutton, 1996).
Lesson Expectation:
The study will further help me to understand the role of the women in cyber
technology. It will also help me define gender issues in the computer technology. In addition,
what are the laws that are being implemented to protect the well-being of the women.
Review:
While pornography had been traded over the Internet since the 1980s, it was the
invention of the World Wide Web in 1991 as well as the opening of the Internet to the general
public around the same time that led to an explosion in online pornography.
It also allows access to pornography by people whose access is otherwise restricted for
legal or social reasons.Looking toward other more radical approaches to ethics throws into
relief the question of power structures in relation to our use of information technology. Gender
and technology studies have proved successful in exposing power relations in the development
and use of technologies. At the same time, major developments in feminist ethics over the last
two decades, particularly in terms of Gilligan’s (1982) ‘ethic of care’ make this an area at least
as important as computer ethics in terms of overall contribution to philosophical ethics. I claim
that bringing feminist ethics to bear on computer ethics offers a novel and fruitful alternative to
current directions in computer ethics in two major ways: firstly in revealing continuing
inequalities in power and where liberal approaches to power do not work; and secondly, in
13
offering an alternative, collective approach to the individualism of the traditional ethical
theories encapsulated in computer ethics. Nowhere are these issues more important than in
thinking about gender and computing in a networked age. This is a well recognized
phenomenon. Recognizing it is one thing; suggesting what to do about it is quite another. But I
argue that the sort of liberal, inclusive, consultative measures, already becoming enshrined in
computing bodies’ codes of ethics and other policy documents, may not have the effect of
properly involving women users in decision making about computer systems and women in
computing in general, despite the will to do so.
Lesson Learned:
Through the spread of pornography, women became vulnerable to men. It is about time
that the government should implement grave laws to preserve women as they are. We must be
able to implement laws that would not discredit the people in the internet, most specially the
women.
Integrative Questions:
What is pornography?
14
Book: Cyber Ethics
Quote
The world is slowly witnessing the development of the global information infrastructure
(GII), a seamless web of communication networks, computers, databases and consumer
electronics that will put vast amounts of information at user's finger tips (United States.
Information Infrastructure Task Force 1994).
Lesson Expectation:
Review:
The Internet has made possible entirely new forms of social interaction, activities and
organizing, thanks to its basic features such as widespread usability and access.
Social networking websites such as Facebook and MySpace have created a new form of
socialization and interaction. Users of these sites are able to add a wide variety of items to their
personal pages, to indicate common interests, and to connect with others. It is also possible to
find a large circle of existing acquaintances, especially if a site allows users to utilize their real
names, and to allow communication among large existing groups of people.
Sites like meetup.com exist to allow wider announcement of groups which may exist
mainly for face-to-face meetings, but which may have a variety of minor interactions over their
group's site at meetup.org, or other similar sites.
In democratic societies, the Internet has achieved new relevance as a political tool. The
presidential campaign of Howard Dean in 2004 in the United States became famous for its
ability to generate donations via the Internet. Many political groups use the Internet to achieve
a whole new method of organizing, in order to carry out Internet activism.
15
Many countries, including the United States, have enacted laws making the possession
or distribution of certain material, such as child pornography, illegal, but do not use filtering
software. There are many free and commercially available software programs with which a user
can choose to block offensive websites on individual computers or networks, such as to limit a
child's access to pornography or violence. See Content-control software.
The Internet has been a major source of leisure since before the World Wide Web, with
entertaining social experiments such as MUDs and MOOs being conducted on university
servers, and humor-related Usenet groups receiving much of the main traffic. Today, many
Internet forums have sections devoted to games and funny videos; short cartoons in the form
of Flash movies are also popular. Over 6 million people use blogs or message boards as a means
of communication and for the sharing of ideas.
Lesson Learned:
It is simply not one solid or static thing. And despite the many differences which exist
from culture to culture and country to country, the globalization of information provides
opportunities for a better understanding of all of these. Therefore, despite cultural differences,
certain universal understandings of ethical concepts are possible and universal rules can be
reached to govern this new global village of sorts.
Integrative Questions:
16
Book: Cyber Ethics
Chapter 7: APPLYING ETHICAL AND MORAL CONCEPTS AND THEORIES TO IT ETHICS: KEY
PROBLEMS AND CHALLENGES
Quote:
We are but whirlpools in a river of ever-flowing water. We are not stuff that abides, but
patterns that perpetuate themselves.
(Wiener 1954)
Lesson Expectation:
“Computer and information ethics”, in the broadest sense of this phrase, can be
understood as that branch of applied ethics which studies and analyzes such social and ethical
impacts of ICT. The present essay concerns this broad new field of applied ethics.
Review:
These “policies” — to borrow a helpful word from Moor (1985) — constitute a “received
policy cluster”; and in a reasonably just society, they can serve as a good starting point for
developing an answer to any information ethics question. Wiener's methodology is to combine
the “received policy cluster” of one's society with his account of human nature, plus his “great
principles of justice”, plus critical skills in clarifying vague or ambiguous language. In this way,
he achieved a very effective method for analyzing information ethics issues. Cyberethics, also
referred to as internet ethics, is a branch of ethics that studies the ethical dilemmas brought on
by the emergence of digital technologies. With the advent of the internet conflicts over privacy,
property, security, accuracy, accessibility, censorship and filtering have arose. Since then,
controversy over who or what should be responsible for governing and maintaining ethical
conventions in cyberspace have been heatedly debated, ruled upon and amended. Despite
being a universal topic, cyberethics may change from country to country, where cultural and
societal ethics may differ and therefore are reflected in the debates over the ethics of
cyberspace. With the speed at which the internet changes, cyberethics evolves as well.
17
Although he coined the name “cybernetics” for his new science, Wiener apparently did not see
himself as also creating a new branch of ethics. As a result, he did not coin a name like
“computer ethics” or “information ethics”. These terms came into use decades later. (See the
discussion below.) In spite of this, Wiener's three relevant books (1948, 1950, 1963) do lay
down a powerful foundation, and do use an effective methodology, for today's field of
computer and information ethics. His thinking, however, was far ahead of other scholars; and,
at the time, many people considered him to be an eccentric scientist who was engaging in
flights of fantasy about ethics. Apparently, no one — not even Wiener himself — recognized
the profound importance of his ethics achievements; and nearly two decades would pass
before some of the social and ethical impacts of information technology, which Wiener had
predicted in the late 1940s, would become obvious to other scholars and to the general public.
Lesson Learned:
Integrative Questions:
What is cybernetics?
18
Book: Cyber Ethics
Quote:
Gotterbarn (1991).
Lesson Expectation:
Because of the global impact of computing in recent years, and because of the merging
of computing and communications technologies that has also recently occurred, the field of
computer ethics might be perceived as one that is currently in a state of flux or transition.
Review:
19
they accord with a general rule. Computer users may be classified as either aware or unaware
of security aspects. The former group mistrusts unfamiliar agents while the latter group are not
at all aware of potential security risks associated with agent computing. A framework to analyse
the security risks of agent computing will create and raise awareness of how secure agents are.
Intuitive assessment of agent behaviour may be misleading and it can be argued that a
systematic ethical analysis will provide a more reliable basis for assessment. For example the
actions of Clippy may be considered as unethical by an expert user due to Clippy’s obtrusive
character – however the systematic ethical analysis of Clippy’s actions in section 4.2, reveals
that Clippy’s actions can at most be considered irritating, but certainly not unethical.
Lesson Learned:
Regarding the contemplation, and in particular the performance of some action, one
would thus need to determine whether unjust means would be required to facilitate
performance of the action by the user, the agent or the host. Therefore, if it is not possible to
achieve the envisaged end (performance of the action) without utilizing unjust means, the
requirement of just consequentialism is not satisfied.
Integrative Questions:
20
Book: Cyber Ethics
Chapter 9: The Internet as Public Space: Concepts, Issues and Implications in Public Policy
Quote:
"A typical problem in computer ethics arises because there is a policy vacuum about
how computer technology should be used"
(Moor, 2000).
Lesson Expectation:
Review:
Anyone can find ways to publish a web page, a blog or build a website for very little
initial cost. Publishing and maintaining large, professional websites full of attractive, diverse
and up-to-date information is still a difficult and expensive proposition, however. Many
individuals and some companies and groups use "web logs" or blogs, which are largely used as
easily updatable online diaries. Some commercial organizations encourage staff to fill them
with advice on their areas of specialization in the hope that visitors will be impressed by the
expert knowledge and free information, and be attracted to the corporation as a result.
Collections of personal web pages published by large service providers remain popular, and
have become increasingly sophisticated. Whereas operations such as Angelfire and GeoCities
have existed since the early days of the Web, newer offerings from, for example, Facebook and
MySpace currently have large followings. These operations often brand themselves as social
network services rather than simply as web page hosts. Advertising on popular web pages can
be lucrative, and e-commerce or the sale of products and services directly via the Web
continues to grow.
21
More recently, websites are more often created using content management or wiki
software with, initially, very little content. Contributors to these systems, who may be paid
staff, members of a club or other organisation or members of the public, fill underlying
databases with content using editing pages designed for that purpose, while casual visitors view
and read this content in its final HTML form. There may or may not be editorial, approval and
security systems built into the process of taking newly entered content and making it available
to the target visitors. Public places to use the Internet include libraries and Internet cafes,
where computers with Internet connections are available. There are also Internet access points
in many public places such as airport halls and coffee shops, in some cases just for brief use
while standing.
Lesson Learned:
If you take precautions (such as forcing people to log in with laborious security
measures) then I'd argue perhaps your private areas could be effected - you can't very well
argue you stumbled inadvertently into an area that forces you to log in with a secure
password). If you end up offended. However, if crimes are committed there, especially against
children, I will support law enforcement in stringing up your sorry tuck us - online or not.
Integrative Questions:
What is internet?
What are the laws implemented to safeguard privacy in the computer world?
22
Book: Cyber Ethics
Quote:
"The telecoms are too large, too heterogeneous, too turbulent, too creatively chaotic to
be governed wholesale, from the top down,"
(Huber)
Lesson Expectation:
If we are trying to create a genuine dialog about ethical values and ethical reasons in the
multicultural internet world, we cannot be bound solely to this tradition, because, Chinese and
Indians have engaged in ethical thought and ethical reasoning and the grounds for the
resolution of their ethical dilemmas may or may not be the same as those offered in Western
society.
Review:
The new book lays down the possible parameters for a Law of Cyber-Space, and argues
in favour of starting negotiations with the full participation of the three concerned stake-
holders, namely, the governments, the private sector, and civil society.
Kamal believes that, in many ways, the current situation in cyber-space is similar to the
problems once faced on the open ocean, where the absence of any jurisdiction or consensus
legislation had also created a lawless situation. The international community finally woke up to
the challenge, and started negotiations on the Law of the Sea. Those negotiations went on for
almost a decade before they succeeded and Kamal writes that the world is much better off as a
result. Kamal asserts that in the case of cyber-space the challenge appears to be far greater;
"The speed of change is phenomenal, new shoals and icebergs appear every day, the
dangers affect all countries without exception, yet global responses are sporadic or non-
23
existent. That is why a globally negotiated and comprehensive Law of Cyber-Space is so
essential."
What will be sketched here is a brief summary of the strands that have now come to
make up information ethics. In fact, it can now be seen as a confluence of the ethical concerns
of media, journalism, library and information science, computer ethics (including cyberethics),
management information systems, business and the internet. In the process of showing this
evolution, several bibliographic references will be highlighted, although given the brevity of this
article, the set of references provided is in not intended to be comprehensive.
Lesson Learned:
Law and Disorder in Cyberspace presents a thesis revolutionary in the truest sense of
the word: it argues for overthrowing the existing corrupt order by returning to earlier, better,
more fundamental values. So defiant a book naturally reads, to quote its dust jacket, as a
"polemic." Yet Law and Disorder in Cyberspace merits serious attention from scholars and
policy wonks. Huber makes a strong case for abolishing the FCC and relying on common law to
rule the telecosm. The flaws of Law and Disorder in Cyberspace make it not irrelevant, but all
the more interesting.
Integrative Questions:
Who is Kamal?
What is cybernetics?
24
Book: Cyber Ethics
Quote:
We also know there are known unknowns; that is to say we know there are some things
we do not know. But there are also unknown unknowns--the ones we don't know we don't
know. (Rumsfeld, 2002)
Lesson Expectation:
A three part approach inspired by the Carl Mitcham's philosophy of technology has been
employed. Each section has touched on some ideas whose elucidation are in no way complete
Review:
An excellent example is the 2007 North American meeting of IACAP, which keynoted
free software and open access. The argumentative approach I have selected is borrowed from
the philosophy of technology, in particular the work of Carl Mitcham and Andrew Feenberg, to
present practical and moral advantages of the FOS option. Finally, I will offer a third approach
based on its potential epistemological advantages. James Moor suggested that "conceptual
muddles" and "policy vacuums" exist where there are problems lacking a philosophical
framework to address them, and this is particularly true of computer technology (Moor, 1985).
Likewise, Walter Maner proposed that innovations in computer technology create unique, new
ethical problems (Maner, 1995). For years, this conceptual vacuum has been filling with the
musings of self-proclaimed accidental revolutionaries like Richard Stallman, Eric Raymond, and
Linus Torvalds, the creator of the Linux kernel, as well as industry leaders like Bill Gates and Tim
O'Reilly.
James Moor suggested that "conceptual muddles" and "policy vacuums" exist where
there are problems lacking a philosophical framework to address them, and this is particularly
true of computer technology (Moor, 1985). Likewise, Walter Maner proposed that innovations
in computer technology create unique, new ethical problems (Maner, 1995). For years, this
25
conceptual vacuum has been filling with the musings of self-proclaimed accidental
revolutionaries like Richard Stallman, Eric Raymond, and Linus Torvalds, the creator of the Linux
kernel, as well as industry leaders like Bill Gates and Tim O'Reilly. In Thinking through
Technology: the Path between Engineering and Philosophy, Carl Mitcham introduced the
Engineering Philosophy of Technology (EPT) as the field of study focused on determining the
best way to conduct engineering and technological endeavors (Mitcham, 1994). This work is
from the insider's perspective, and the obvious starting point to transfer insights from the
technical arena to the academic study of FOSS. There is a ready set of commonly cited practical
benefits supported by empirical research as well as the methodologies used to evaluate,
organize, and execute such projects (Lerner and Tirole, 2005).
Lesson Learned:
Software piracy is very tempting due to the relatively high cost of commercial
applications, the easy transfer of digital information, and the lack of a perception of doing
harm. Software piracy is especially common among curious academics and hobbyists
Integrative Question:
26
Book: Cyber Ethics
Quote:
Any content-based regulation of the Internet, no matter how benign the purpose, could
burn the global village to roast the pig." U.S. Supreme Court majority decision, Reno v. ACLU
(June 26, 1997)
Lesson Expectation:
A proposal that we rate our online speech is no less offensive to the First Amendment
than a proposal that publishers of books and magazines rate each and every article or story, or
a proposal that everyone engaged in a street corner conversation rate his or her comments. But
that is exactly what will happen to books, magazines, and any kind of speech that appears
online under a self-rating scheme.
Review:
The concept began with Bradbury's short story "Bright Phoenix," written in 1947 but
first published in the Magazine of Fantasy and Science Fiction in 1963. The original short story
was reworked into the novella, The Fireman, and published in the February 1951 issue of
Galaxy Science Fiction. The novel was also serialized in the March, April, and May 1954 issues of
Playboy magazine. Bradbury wrote the entire novel on a pay typewriter in the basement of
UCLA's Powell Library. His original intention in writing Fahrenheit 451 was to show his great
love for books and libraries.
Fahrenheit 451 is a dystopian speculative fiction novel authored by Ray Bradbury and
first published in 1953.
The novel presents a future American society in which the masses are hedonistic, and
critical thought through reading is outlawed. The central character, Guy Montag, is employed as
a "fireman" (which, in this future, means "book burner"). The number "451" refers to the
27
temperature (in Fahrenheit) at which the books burn when the "firemen" burn them "for the
good of humanity". Written in the early years of the Cold War, the novel is a critique of what
Bradbury saw as an increasingly dysfunctional American society.
Bradbury has stated that the novel is not about censorship; he states that Fahrenheit
451 is a story about how television destroys interest in reading literature, which leads to a
perception of knowledge as being composed of "factoids", partial information devoid of
context, e.g., Napoleon's birth date alone, without an indication of who he was.
Lesson Learned:
People from all corners of the globe people who might otherwise never connect
because of their vast geographical differences can now communicate on the Internet both
easily and cheaply. One of the most dangerous aspects of ratings systems is their potential to
build borders around American- and foreign-created speech. It is important to remember that
today; nearly half of all Internet speech originates from outside the United States.
Integrative Questions:
What are the six reasons why self-rating schemes are wrong for the Internet?
Is cyberspace burning?
28
Book: Cyber Ethics
Quote:
To give up the fight, without exhausting our defenses, could cost the surrender of our
"soul". (Leo Tolstoy)
Lesson Expectation:
Review:
Filtered Internet - Other so called internet filtering companies say that they will protect
your home. Put our Filtered Internet filtering up against theirs and other companies will be
found lacking... Do not just consider filtering for your home, but for your Church, Work, and
School... Sign up as an affiliate or become a reseller and have our services branded in your
organizations name and offer Filtered Internet.
Content-control software, also known as censor ware or web filtering software, is a term
for software designed and optimized for controlling what content is permitted to a reader,
especially when it is used to restrict material delivered over the Web. Content-control software
determines what content will be available on a particular machine or network; the motive is
often to prevent persons from viewing content which the computer's owner(s) or other
authorities may consider objectionable; when imposed without the consent of the user,
content control can constitute censorship. Common use cases of such software include parents
who wish to limit what sites their children may view from home computers, schools performing
the same function with regard to computers found at school, and employers restricting what
29
content may be viewed by employees while on the job. Some content-control software includes
time control functions that empowers parents to set the amount of time that child may spend
accessing the Internet or playing games or other computer activities. While many have seen the
danger of such invasion of privacy from the government, we fail to recognize or prefer to ignore
a greater source of intrusion to our privacy -- private companies and institutions (many we do
not suspect), including "non-profit" organizations, medical institutions, etc. Tracking the
behavior of individuals and groups has been a preoccupation of social scientists, poll takers, the
advertising industry and all companies that have something to sell. However, previous studies
or "ratings" usually just involved a small "statistical sample" of a population. With the coming of
the internet and increasing power of computers in terms of speed, automation and storage
capacity, it is now theoretically possible to monitor the behavior of every individual connected
to the internet.
Lesson Learned:
If all of us who care about these issues can band together, we may be able to shape the
future of the internet so that we can create an internet community that would be more
respecting of our privacy and humanity. This is almost a quixotic goal and many of my friends
have dissuaded me from embarking on such path.
Integrative Questions:
What is Internet?
What is privacy?
30
Book: Cyber Ethics
Chapter 14: Censorship: The Internet and the Child Pornography Law of 1996: A Critique
Quote:
When the law speaks universally, then, and a case arises on it which is not covered by
the universal statement, then it is right, where the legislator fails us and has erred by over-
simplicity, to correct the omission—to say what the legislator himself would have said had he
been present, and would have put into his law if he had known (Aristotle)
Learning Expectation:
The ‘net gives all of its users a vast expressive power if they choose to take advantage of
it. Therefore, courts, when examining whether material is obscene, consider whether the
material tends to "deprave or corrupt" people who are likely to use the material. The focus on
the consumer of the material has been criticized on the grounds that it fails to acknowledge
harms to the non-consumers of the material like women.
Review:
Therefore, this effort to protect privacy is a notable free speech issue. Intellectual
property rights are also tantamount to restrictions on free speech. If someone has property
rights to a trademark, others cannot use that form of expression freely. Finally, one way in
which users seek to secure their data is encryption, but encryption in the wrong hands could be
a threat to national security, and therefore, many argue that encryption needs to be subject to
government control.
As a result, the issue of free speech and content control in cyberspace has emerged as
arguably the most contentious moral problem of the nascent Information Age. Human rights
such as free speech have taken a place of special prominence in this century. In some respects,
these basic rights now collide with the state’s inclination to reign in this revolutionary power
enjoyed by Internet users. Although the United States has sought to suppress on line
31
pornography, the target of some European countries, such as France and Germany, has been
hate speech.
In addition, speech is at the root of most other major ethical and public policy problems
in cyberspace, including privacy, intellectual property, and security. These three issues are
discussed in future chapters where the free speech theme continues to have considerable
saliency.
Lesson Learned:
For example, as a result of New York v. Ferber, the Miller obscenity standard does not
apply because the Supreme Court ruled that child pornography is by definition obscene
(Akdeniz 1996). The court took this stand for a number of reasons. First, the production of such
pornography with children as subjects is harmful to them; second, the value of the material is
negligible at best; and third, the distribution of child pornography is inseparable from its role in
the abuse of children (Akdeniz 1996).
Integrative Question:
What is Pornography?
32
Book: Cyber Ethics
Quote:
Restricting inappropriate materials at their source is not well suited to the international
nature of the Internet, where an information source may be in a different legal jurisdiction than
the recipient. Moreover, materials may be legal and appropriate for some recipients but not
others, so that any decision about whether to block at the source will be incorrect for some
audiences.
(Paul Resnick)
Lesson Expectation:
Review:
It does not specify how selection software or rating services work, just how they work
together. PICS-compatible software can implement selective blocking in various ways. One
possibility is to build it into the browser on each computer, as announced by Microsoft and
Netscape. A second method-one used in products such as CyberPatrol and SurfWatch-is to
perform this operation as part of each computer's network protocol stack. A third possibility is
to perform the operation somewhere in the network, for example at a proxy server used in
combination with a firewall. Each alternative affects efficiency, ease of use, and security. For
example, a browser could include nice interface features such as graying out blocked links, but
it would be fairly easy for a child to install a different browser and bypass the selective blocking.
The network implementation may be the most secure, but could create a performance
bottleneck if not implemented carefully. PICS does not specify how parents or other supervisors
33
set configuration rules. Even that amount of configuration may be too complex, however.
Another possibility is for organizations and on-line services to provide preconfigured sets of
selection rules. For example, an on-line service might team up with UNICEF to offer "Internet
for kids" and "Internet for teens" packages, containing not only preconfigured selection rules,
but also a default home page provided by UNICEF.
Some clients might choose to request labels each time a user tries to access a
document. Others might cache frequently requested labels or download a large set from a label
bureau and keep a local database, to minimize delays while labels are retrieved.
Lesson learned:
Others regard that as the pot calling the kettle black. PICS was, after all, developed by
people fearful of government censorship and who were apparently ignorant of the
repressiveness of some governments.
Integrative Question:
What is PICS?
What is Metadata?
What is labeling?
34
Book: Cyber Ethics
Chapter 16: Internet Service Providers and Defamation: New Standard of Liability
Quote:
Pete Leisure
Lesson Expectation:
Where there is neither actual knowledge of the defamation nor awareness of any facts
or circumstances from which a certain institution could reasonably have been expected to be
aware of the defamation, and the institution has taken reasonable care in relation to
publication of the statement in question, the defense is likely to be available to the institution.
Review:
Provider (ISP) Liability Overview paper considers the extent to which institutions are
responsible for content which is made available on their computer systems.
An Internet service provider (ISP, also called Internet access provider or IAP) is a
company that offers its customer’s access to the Internet. The ISP connects to its customers
using a data transmission technology appropriate for delivering Internet Protocol datagram,
such as dial-up, DSL, cable modem or dedicated high-speed interconnects.
ISPs may provide Internet e-mail accounts to users which allow them to communicate
with one another by sending and receiving electronic messages through their ISPs' servers. (As
part of their e-mail service, ISPs usually offer the user an e-mail client software package,
developed either internally or through an outside contract arrangement.) ISPs may provide
35
other services such as remotely storing data files on behalf of their customers, as well as other
services unique to each particular ISP.
Just as their customers pay them for Internet access, ISPs themselves pay upstream ISPs
for Internet access. An upstream ISP usually has a larger network than the contracting ISP
and/or is able to provide the contracting ISP with access to parts of the Internet the contracting
ISP by itself has no access to.
In the simplest case, a single connection is established to an upstream ISP and is used to
transmit data to or from areas of the Internet beyond the home network; this mode of
interconnection is often cascaded multiple times until reaching a Tier 1 carrier. In reality, the
situation is often more complex. ISPs with more than one point of presence (PoP) may have
separate connections to an upstream ISP at multiple PoPs, or they may be customers of
multiple upstream ISPs and may have connections to each one of them at one or more point of
presence.
Lesson learned:
'Distributors', such as bookstores or newsstands, exert very little if any editorial control,
and have the benefit of the 'innocent disseminator' defense. Innocent disseminators are
protected from liability for defamation if they did not know of the libelous statement, there
were no circumstances that ought to have led them to suppose it contained a libel, and they
were not negligent in being ignorant of the libel.
Integrative Question:
What is libel?
What is pornography?
36
Book: Cyber Ethics
Quote:
The legal power to create closed technology platforms and exclude competitors from
interoperating with them. Worst of all, DRM technologies are clumsy and ineffective; they
inconvenience legitimate users but do little to stop pirates.
Timothy B. Lee
Lesson Expectation:
This article will further expand the meaning of Digital Millennium Copyrights Act. It will
also highlight the importance of DMCA for the mankind. Likewise, it will also enumerate the
disadvantages of the said act.
Review:
While working for Elcomsoft in Russia, he developed The Advanced eBook Processor, a
software application allowing users to strip usage restriction information from restricted e-
books, an activity legal in both Russia and the United States. Paradoxically, under the DMCA, it
is not legal in the United States to provide such a tool. Sklyarov was arrested in the United
States after presenting a speech at DEF CON and subsequently spent nearly a month in jail. The
DMCA has also been cited as chilling to legitimate users, such as students of cryptanalysis
(including, in a well-known instance, Professor Edward Felten and students at Princeton), and
security consultants such as Niels Ferguson, who has declined to publish information about
vulnerabilities he discovered in an Intel secure-computing scheme because of his concern about
being arrested under the DMCA when he travels to the US. The DMCA has had an impact on the
worldwide cryptography research community, since an argument can be made that any
cryptanalytic research violates, or might violate, the DMCA.
37
Lesson Learned:
The DMCA has been criticized for making it too easy for copyright owners to encourage
website owners to take down allegedly infringing content and links which may in fact not be
infringing. When website owners receive a takedown notice it is in their interest not to
challenge it, even if it is not clear if infringement is taking place, because if the potentially
infringing content is taken down the website will not be held liable.
Integrative questions:
What is DMCA?
What is copyright?
What is cryptography?
38
Book: Cyber Ethics
Quote:
"Our main goal," said Gross, "is to build a strong, solid record to take to the appeals
court, where civil liberties are taken more seriously."
Eric Corley
Learning Expectation:
Review:
The MPAA has since brought suit against him in his native Norway as well. Johansen
testified on Thursday that he announced the successful reverse engineering of a DVD on the
mailing list of the Linux Video and DVD Project (LiViD), a user resource center for video- and
DVD-related work for Linux. The Electronic Frontier Foundation (EFF), an organization based in
San Francisco which supports civil liberties in digital arenas, is providing a legal defense that
cites, among other issues, fair use. After all, the EFF argues, if you buy a DVD, why can't you
play it on any machine you want?
39
Lessons Learned:
By taking his stand, Corley has brought key issues of the digital age to trial. Among them
is the right to experiment and to share knowledge, he said. The case also points to the DMCA's
broad protections, which for the first time not only give copyright to creative work but also to
the software -- or any other technology -- that protects it.
The judge in the case, the honorable Lewis Kaplan of the US District Court in southern
New York, issued a preliminary injunction against posting DeCSS. Corley duly took down the
code, but did not help his defense by defiantly linking to myriad sites which post DeCSS.
Still open is the question of whether the injunction against Corley, or the fight against
DeCSS itself, is not a vain struggle in the face of inevitable change. Judge Kaplan, whom the
defense requested recuse himself based on conflict of interest, said last Thursday to Mikhail
Reider, the MPAA's chief of Internet antipiracy, "You are asking me to issue an injunction
against the guy who unlocked this barn, [telling him] not to unlock it again --- even though
there is no horse in it." "It's good to see that [the judge] is realizing the futile nature of dealing
with these issues this way," said Robin Gross, an EFF attorney and a member of the defense
team. Though the MPAA may not be able to stop DeCSS, there are other issues at stake that are
unrelated to digital piracy. Copyright is not the issue to supporters of the defense in this trial.
Integrative Questions:
What is DeCSS?
What is Trial ?
What is the copyright issue of the defense trial?
Who is the Judge?
What is the plans ?
40
Book: Cyber Ethics
Quote:
Without that balance, there is a danger of absolutizing the claims to ownership and
control to the detriment of other interested parties, something we have noted in recent
legislative proposals.
Samuelson, 1997
Lesson Expectation:
First it presents some cases that illustrate the range of possible intellectual property
rights. Next it examines the traditional justifications for such rights. It then critiques those
justifications, not to refute them, but to show their limits. Finally it proposes a different way of
looking at the problem, using traditional natural law ethics.
Review:
The ink marks can be translated into regions of magnetic polarization on a computer
disk, and the intellectual property, and whatever claims there are to that property, will be the
same. The owner of a song claims control, not of the CD on which the song is recorded, but of
the song itself, of where when and how it can be performed and recorded. But how can you
build a fence around a song? What does it mean to "own" an idea? Where are the locks that
keep other people from "driving" it? Intellectual property is an odd notion, almost an
oxymoron. Property usually refers to tangible assets over which someone has or claims control.
Originally it meant land. Now it could also refer to a car, a milling machine, a jacket or a
toothbrush. In all these cases the property claim is of control of the physical entity. If I claim a
plot of land as my property, I am saying I can control who has access to that land and what they
do there. I can build a fence around it, rent it out, or drill for oil on it. If a car is my property, I
get the keys to it. I can exclude others from using it and use it myself for whatever I want, as
long as I do not threaten the lives or property of others.
41
It was only when inexpensive reproductions became feasible that it was seen as
necessary to give authors more control over how their works were used by creating copyrights.
Intellectual property has always been closely tied to technology. Technology arises from
intellectual property in the form of new inventions. But technology also supports intellectual
property by providing new, more powerful and more efficient ways of creating and
disseminating writing, musical composition, visual art, and so on.
Lesson learned:
Integrative Question:
What is information?
What is copyright?
What is plagiarism?
42
Book: Cyber Ethics
Quote:
It seems that there must be a balance between the legitimate claims of the developers
of intellectual products and the public's interest in their widest possible availability.
(Samuelson, 1997)
Lesson Expectation:
For example facts that are commonly accessible cannot be owned by a few individuals
just because they record them in a database. As another example, the sharing of design ideas
and knowledge can increase efficiency in the integration and interoperation of different
products, promote healthy competition, and lead to new ideas and greater creativity.
Review:
I can exclude others from using it and use it myself for whatever I want, as long as I do
not threaten the lives or property of others. Intellectual property is different because its object
is something intangible, although it usually has tangible expression. The intellectual property in
a book is not the physical paper and ink, but the arrangement of words that the ink marks on
the paper represent. The ink marks can be translated into regions of magnetic polarization on a
computer disk, and the intellectual property, and whatever claims there are to that property,
will be the same. The owner of a song claims control, not of the CD on which the song is
recorded, but of the song itself, of where when and how it can be performed and recorded.
Intellectual property is an odd notion, almost an oxymoron. Property usually refers to tangible
assets over which someone has or claims control. Originally it meant land. Now it could also
refer to a car, a milling machine, a jacket or a toothbrush. In all these cases the property claim is
of control of the physical entity. If I claim a plot of land as my property, I am saying I can control
who has access to that land and what they do there. I can build a fence around it, rent it out, or
drill for oil on it. If a car is my property,
43
Technology arises from intellectual property in the form of new inventions. But
technology also supports intellectual property by providing new, more powerful and more
efficient ways of creating and disseminating writing, musical composition, visual art, and so on.
In fact it was the technology of the printing press that originally gave rise to intellectual
property as a legal and moral issue. Before, when it took almost as much of an effort to
reproduce a document as it took to create it, there was little need to impose limits on copying.
Lesson Learned:
In general, then, I would claim there is a tendency to think that intellectual property is a
place to apply our "public goods/incentives theory" rather than our "anti-monopoly/free-flow
of information" theory. All by itself, this might push rhetoric and analysis towards more
expansive property rights. The tendency is compounded, however, by two others. First, courts
are traditionally much less sensitive to First Amendment, free speech and other "free flow of
information arguments" when the context is seen as private rather than public, property rather
than censorship.
Integrative Question:
What is politics?
What is environmentalism?
44
Book: Cyber Ethics
Quote:
A property right is the relationship between individuals in reference to things. Cohen (1935)
Lesson Expectation:
Is non-conformance with these laws a calculated risk against being caught, equivalent to
parking at a meter beyond the specified time period, or is it a matter of ethics? This paper
examines the relationship between intellectual property rights and ethics, focusing for the most
part on copyright. The focus is on two key questions: 1) what is the relationship between ethics
and copyright law and practice in the United States; and, 2) is the concept of private ownership
of intellectual property inherently ethical?
Review:
Theoretically copyright law in the United States takes the first view, stating that authors
have no natural right in their creation but only the rights that the state has conferred by reason
of policy to encourage the creation of new works (H.R. REP. No. 2222). This approach assumes
that the content of products of mind (not the objects in which they are embedded) belong to
society as a whole, but that society would benefit more if more such products were available,
and that in order to encourage production the creator of such products should be given rights
that will allow him or her to reap some economic benefits from the creation. As Branscomb
(1984) observed this is encouraging access by legislating scarcity. The ethics of copyright can be
approached in two ways: (1) If, as Hettinger suggests, every creator stands on the shoulders of
giants what is the essential morality in allowing the last contributor to reap the full reward or to
have the right to prevent others from building on her contribution; and (2) If, as postulated by
Locke, an individual is entitled to what he or she creates, what are the ethics of limiting a
creators rights in regards to his or her creation?
45
It has become what is often called an equitable rule of reason, which attempts to
balance the rights of authors with the rights of users. It is often not clear whether this balance
is to be obtained by granting rights via law or by recognizing the intrinsic rights of each.
However, if copyright is indeed only a matter of law there should be no rights other than those
granted by the law. What both creators and users then have are expectations, but, as Cohen
(1985) observed, the law finds value in protecting legitimate expectations. Earlier United States
copyright law was better aligned with the encouragement theory and the ethical position that
creative works belonged to society as a whole. Only the exact copying of a work was prohibited,
not new works based on a previous work. Subsequent authors were free to adapt novels to the
stage, abridge scholarly works for the masses, and translate works into other languages without
paying a license fee to the creator or to whom ever the creator had transferred his or her
copyright.
Lesson learned:
Ethics are often raised as well in regard to copying software. The Software Publisher’s
Association (SPA), which merged with the Information Industry Association (IIA) in January of
1999 to form the Software & Information Industry Association (SIIA), offers a guide on Software
Use and the Law (SPA 1997) which states it is intended to provide “a basic understanding of the
issues involved in ethical software use.
Integrative Question:
46
Book: Cyber Ethics
Chapter 22: On the Web, Plagiarism Matters More Than Copyright Piracy
Quote:
Plagiarism epidemic is mainly a result of a simple fact that the web has made plagiarism
much easier than it used to be in the print environment.
Cronin (2003)
Lesson Expectation:
A new term ”cyber-plagiarism” has since been introduced to describe the process by
which students copy ideas and information from the Internet without giving attribution, or
downloading research papers in whole or in part, and submit the paper as their own work.
Plagiarism and academic honesty have become controversial and widely debated issues.
Review:
Most people are aware that taking the exact texts or words of another person without
attribution is plagiarism, but they then believe that paraphrasing the original work is
acceptable. Yet taking someone else’s idea and changing the words is like stealing a car and
changing its colour. However, literary works that are stolen differ in many ways from physical
properties that are the targets of ordinary theft. Ideas are less tangible and identifiable than
physical objects. Objects that are stolen remain stolen even if they are taken apart and
recombined, but not for ideas. Building new ideas from old ones, using existing information and
combining them, might be called creativity, not plagiarism. Plagiarism can be briefly defined as
the expropriation of another author’s text, and its presentation as one’s own. This includes
using others’ ideas, information without giving credit and acknowledgement. It is clear that
piracy is the infringement of copyright, and plagiarism is the failure to give credit to the author.
However, many people easily get confused between those two terms, and one may usually
commit both offences. It would be plagiarism but not piracy for us to take the works of an
47
obscure 18th century poet and try to use them as our own. Since the copyright will have
expired on such works, this is not piracy.
There is hardly a clear way to determine which idea counts as a brand new and which
requires acknowledgment as a variation on old ideas. In areas such as computer programming
and musical composition, what counts as plagiarism is usually highly ambiguous and debatable.
Snapper (1999) indicated that cyber-plagiarism was growing rapidly and raising many concerns
over its impacts. [9]He also stated that in a period of a few years, students have been able to
buy papers on a various subjects from the Internet. As students can gain access to these papers
without much effort, the issues have become really important and raised serious concerns.
Lesson learned:
Unlike physical objects those belong to, and are in possession of someone else alone,
we can pick up ideas somewhere and treat them as our own. We may remember ideas without
remembering where they come from because without careful notations, recalling a source is
much more difficult than recalling the idea itself. Therefore it is not easy to totally avoid
unintentional plagiarism.
Integrative Question:
What is plagiarism?
What is piracy?
What is copyright?
What is cyber-plagiarism?
48
Book: Cyber Ethics
Quote:
“It is important to our company that you know our exact process we take for the
education and understanding on how is the ethical evaluation on web site Linking”
Learning Expectation:
This procedure is not a huge factor in our search engine optimization services but we
have found it very functional for the end user getting them where they want to be in a site for
information they may be looking for and possibly get the website owner the sale or lead in that
specific area. In case people do not understand me on this an interior link can be spotted as a
underlined or highlighted keyword on a specific page that moves you to another URL on that
website.
Review:
Scam and Spam search engine optimization companies eat this up because they realize
that some words have no competition to them and can be achieved with very little effort, and if
you're locked into their contract, you will sometimes have to shell out more money because
they claim they have much more to do. Which from an ethical stand point Keyword
Performance has a problem with that especially because they are not looking at your company
with ethical standards just their bottom lines. For the most part we consult with the person or
team of people for that company on the most important keywords they would like to rank high
for. Nine out of ten times we find that the keywords the companies like to see are not their only
main or lateral phrases for keyword placement and top search engine rankings. In fact I have
had keywords come across to me that really have no relevancy to their web sites goals for
success.
49
Lessons Learned:
This will also help to improve traffic by other audiences finding your website through
another site on the World Wide Web. This is a very important factor in driving your website to
the top for your relevant keyword terms. Each category will be built for a unique area targeting
links that compliment the website services as well as other high Google page ranking
directories.
Integrative Questions:
50
Book: Cyber Ethics
Quote:
Learning Expectation:
The Cathedral and the Bazaar is an essay by Eric S. Raymond on software engineering
methods, based on his observations of the Linux kernel development process and his
experiences managing an open source project, fetchmail. It was first presented by the author at
the Linux Kongress on May 27, 1997 and was published as part of a book of the same name in
1999
Review:
It's rather to warn you, the lay reader--this guy may have attained some sort of status in
the open source community which needs such figures, but it doesn't mean that what he has to
say is any good or even true. In his works (including "Cathedral"), Eric makes a very one-sided
analysis of software engineering methodologies. It's a complete ra-ra piece which fails to
seriously address the very many shortcomings of open-source development, including, most
critically, the inability to scale timewise as well as commercial software (while not under the
GNU licence, two years ago Raymond was predicting the success of the open-source Mozilla
browser initiative, which is at this point a complete fiasco). Instead, he talks about obscure
supporting sociological constructs such as that of "gift cultures" that would only convince the
already converted. Raymond's standard talk begins with references to himself as an ordinary
but experienced IT guy of sorts who, without any sort of formal training in sociology,
psychology, marketing, business, or the like, has become the chronicler of the "gnu generation"
(not his quote, just a common one) and predictor of open source things to be. this talk in front
51
of academics. Thankfully, he has little shame, or he'd have dropped dead long ago from the
subtle looks and snickers that inevitably result from his bombast.
Lessons Learned:
What people should be getting out of this book (or a book like this) is a balanced,
informed view of open source vs commercial software, undertaken with sound research on
various cost/effectiveness metrics and some case studies. What we have here is a bible for a
community that desperately needs one, because, as Eric's whole thrust implies, it is largely ego
driven.
Integrative Questions:
Who is Raymond?
52
Book: Cyber Ethics
Quote:
“Our revolution will not be in gathering data—don’t look for TV cameras in your bedroom—but
in analyzing the information that is already willingly shared”.
Larry Hunter
Lesson Expectation:
While philosophical theories have long acknowledged the relationship between privacy
and information about persons, and have argued for limits on allowable practices of
information gathering, analyzing, and sharing as a means of protecting privacy, their efforts
have primarily applied to intimate and sensitive information. While not denying the importance
of protecting intimate and sensitive information, this paper insists that theories of privacy
should also recognize the systematic relationship between privacy and information that is
neither intimate nor sensitive and is drawn from public spheres.
Review:
The Information Age, also known commonly as the Computer Age or Information Era, is
an idea that the current age will be characterized by the ability of individuals to transfer
information freely, and to have instant access to knowledge that would have previously have
been difficult or impossible to find. The idea is heavily linked to the concept of a Digital Age or
Digital Revolution, and carries the ramifications of a shift from traditional industry that the
Industrial Revolution brought through industrialization, to an economy based around the
manipulation of information.
The Internet was originally conceived as a distributed, fail-proof network that could
connect computers together and be resistant to any one point of failure; the Internet can't be
totally destroyed in one event, and if large areas are disabled, the information is easily re-
53
routed. It was created mainly by DARPA; its initial software applications were email and
computer file transfer.
It was with the invention of the World Wide Web in 1989 that the Internet really
became a global network. Today the Internet has become the ultimate place to accelerate the
flow of relevant information and the fastest growing form of media.
Nowadays, many people tend to think of the Information Age in terms of cell phones,
digital music, high definition television, digital cameras, email on the Internet, the Web,
computer games, and other relatively new products and services that have come into
widespread use. The pace of change brought on by such technology has been very rapid.
Lesson learned:
Although Hunter, in the passage quoted earlier, may have understated the extent that
the sheer growth in data gathering affects privacy and the extent to which technological means
allows intrusion into and surveillance of even private, enclosed spaces, he accurately predicted
not only that analysis of information will be a major source of privacy invasion, but that
because the information analyzed is willingly shared, people are, in some sense, complicit in the
violation of their own privacy.
Integrative Question:
What is cyber-plagiarism?
54
Book: Cyber Ethics
Chapter 26: The Structure of Rights in Directive 95/46/ec on the Protection of the individuals
with regard to the Processing Personal Data and the free movement of such Data
Quote:
To determine the act that protects personal data information. In addition, to be able to
understand the necessity of having the directives. Furthermore, to be able to assess the
advantage of having the directives.
Lesson Expectation:
Review:
The Act on Personal Data Protection introduced detailed rules on personal data protection in
Poland, and up to 1 May 2004, i.e. up to Poland’s accession to the European Union, included in
the Polish legal order all principles specified in the Directive 95/46/EC of the European
Parliament and of the Council. The provisions of the Act have been in force since 30 April 1998.
The principles of personal data protection established in the Directive 95/46/EC were
implemented into the Polish legal order by the Act of 29 August 1997 on the Protection of
Personal Data (unified text: Journal of Laws of 2002 No. 101, item 926 with amendments).
Implementation of the provisions on personal data protection into the Polish legal system
allowed Poland to sign in April 1999 and to ratify in May 2002 the Convention No. 108 of the
Council of Europe. Those activities reflected increasing democratisation of public life in Poland
as well as concern for the protection of privacy of its every citizen. The Act on Personal Data
Protection while realizing the requirements of the Community specified the constitutional right
to decide on the fact to whom, in what scope and for what purpose we give our personal data,
and gave statutory guarantees of compliance with this right by providing the data subjects with
55
measures used for exercise of this right and competent authorities and services – with the legal
remedies which guarantee compliance with this right. The main premise of the Act is granting
every individual the right to have his/her data protected. The Act on Personal Data Protection
determined a legal framework of personal data handling, as well as the principles to be used in
the processing of personal data.
Lesson Learned:
The new Constitution of 1997 was the first one to guarantee the protection of personal
data in Poland. Its Art. 47 guaranteed citizens the right to privacy and Art. 51 guaranteed each
person the right to the protection of his/her information.
Integrative Question:
What is privacy?
56
Book: Cyber Ethics
Quote:
Learning Expectation:
Moreover, the concept has historical origins in well known philosophical discussions, most
notably Aristotle's distinction between the public sphere of political activity and the private
sphere associated with family and domestic life. Yet historical use of the term is not uniform,
and there remains confusion over the meaning, value and scope of the concept of privacy.
Review:
Other critiques argue that privacy interests are not distinctive because the personal
interests they protect are economically inefficient (Posner, 1981) or that they are not grounded
in any adequate legal doctrine (Bork, 1990). Finally, there is the feminist critique of privacy, that
granting special status to privacy is detrimental to women and others because it is used as a
shield to dominate and control them, silence them, and cover up abuse (MacKinnon, 1989).
There are several skeptical and critical accounts of privacy. According to one well known
argument there is no right to privacy and there is nothing special about privacy, because any
interest protected as private can be equally well explained and protected by other interests or
rights, most notably rights to property and bodily security (Thomson, 1975).
Other commentators defend privacy as necessary for the development of varied and
meaningful interpersonal relationships (Fried, 1970, Rachels, 1975), or as the value that accords
us the ability to control the access others have to us (Gavison, 1980; Allen, 1988; Moore, 2003),
or as a set of norms necessary not only to control access but also to enhance personal
57
expression and choice (Schoeman, 1992), or some combination of these (DeCew, 1997).
Discussion of the concept is complicated by the fact that privacy appears to be something we
value to provide a sphere within which we can be free from interference by others, and yet it
also appears to function negatively, as the cloak under which one can hide domination,
degradation, or physical harm to women and others.
Lessons Learned:
If distinguishing public and private realms leaves the private domain free from any scrutiny,
then these feminists such as Catharine MacKinnon (1989) are correct that privacy can be
dangerous for women when it is used to cover up repression and physical harm to them by
perpetuating the subjection of women in the domestic sphere and encouraging
nonintervention by the state. Jean Bethke Elshtain (1981, 1995) and others suggest that it
appears feminists such as MacKinnon are for this reason rejecting the public/private split, and
are, moreover, recommending that feminists and others jettison or abandon privacy altogether.
But, Elshtain points out, this alternative seems too extreme.
Integrative Questions:
Is privacy relative?
58
Book: Cyber Ethics
Chapter 28: Toward and Approach to privacy in public: Challenges of Information technology
Quote:
Privacy provides the necessary context for relationships which we would hardly be
human if we had to do without-the relationships of love, friendship and trust.
Charles Fried
Lesson Expectation:
The articles discuss the importance of privacy in public. It also highlights philosophical
views that necessitate the importance of privacy in public. Further more, it also discusses the
lack of privacy in the computer technology.
Review:
Although Fried conceived of privacy as control over all information about oneself, he
defended a moral and legal right to privacy that extends only over the far more limited domain
of intimate, or personal, information. He accepted this narrowing of scope because even a
limited domain of intimate or personal information provides sufficient "currency" for people to
differentiate relationships of varying degrees of intimacy. Prominent among contemporary
philosophical works on privacy is Charles Fried's. Fried (1984) argued that privacy is important
because it renders possible important human relationships. The danger of extending control
over too broad a spectrum of information is that privacy may then interfere with other social
and legal values.
According to Fried, the precise content of the class of protected information will be
determined largely by social and cultural convention. Prevailing social order "designates certain
areas, intrinsically no more private that other areas, as symbolic of the whole institution of
privacy, and thus deserving of protection beyond their particular importance". Other
philosophers also have focused on the interdependence between privacy and a personal or
59
intimate realm. Robert Gerstein (1984), for example, contended that "intimacy simply could not
exist unless people had the opportunity for privacy. Privacy's purpose, he wrote, is to insulate
"individual objectives from social scrutiny. Social scrutiny can generally be expected to move
individuals in the direction of the socially useful. Privacy insulates people from this kind of
accountability and thereby protects the realm of the personal". Schoeman, unlike Fried (1984)
however, holds that there are domains of life that are essentially private and not merely
determined to be so by social convention.
Lesson Learned:
The views of Schoeman, Fried, and Gerstein, though differing in detail, rest on a
common core. Each held that properly functioning, psychically healthy individuals need privacy.
A person's right to privacy restricts access by others to this sphere of personal, undocumented
information unless, in any given case, there are other moral rights that clearly outweigh
privacy. Although many other writers who have highlighted the connection between privacy
and the personal realm have not attended merely to the status of the "non-personal" realm. If
information is not personal information or if it is documented, then action taken with respect to
it simply does not bear on privacy.
Integrative Question:
60
Book: Cyber Ethics
Quote:
“The rights and requirements make no sense regarding anonymous data and group
profiles.”
Lesson Expectation:
The lesson will identify the importance of privacy to individual. Furthermore, it will also
highlight the significance of KDD and fairness. It also imbues understanding of privacy.
Review:
Persons are judged and treated more and more as members or group, i.e., of the
reference group that makes up the data or information subject, rather than as individuals with
their own characteristics and merits. This consequence of KDD using or producing personal data
in the broad sense may, at first sight, seem rather innocent. It loses, however, much of its
innocent appearance where the information contained in the profile is of a sensitive nature
because it is typically susceptible to prejudice and taboo or because it can be used for
selections in allocation procedures.
So, for instance, information about persons having a certain probability of manifesting
certain diseases, of lifestyles, or of having been involved in crime, etc. may easily give rise to
stigmatization and discrimination. The information may also be used for giving or denying
access to provisions, like insurance, loans, or jobs. Increasing use and production of group
profiles may even result in growing unfairness in social interaction in other ways. This is
poignantly clear in the case of what I will call non-distributive profiles, as opposed to
distributive profiles. Distributive profiles assign certain properties to a group of persons in such
a way that these properties are actually and unconditionally manifested by all the members of
that group.
61
Distributive profiles are put in the form of down-to-earth, matter-of-fact statements.
Non-distributive profiles, however, are framed in terms of probabilities and averages and
medians, or significant deviance from other groups.
Lesson Learned:
Integrative Questions:
What is KDD?
What is privacy?
What is individuality?
What is fairness?
62
Book: Cyber Ethics
Quote:
Data warehousing is the strategy of ensuring that the data used in an organization is
available and accurate from wherever it is needed.
Lesson Expectation:
Recently, issues about information privacy have emerged with the dramatic growth of
data storage, computer processing power, and networks. From the findings, this paper will
investigate how the current U.S. policy of privacy is shaped, and then propose a new guideline
to set up privacy policies to minimize the conflicts between data privacy and data mining.
Review:
Privacy. It’s a loaded issue. In recent years privacy concerns have taken on a more
significant role in American society as merchants, insurance companies, and government
agencies amass warehouses containing personal data. The concerns that people have over the
collection of this data will naturally extend to any analytic capabilities applied to the data. Users
of data mining should start thinking about how their use of this technology will be impacted by
legal issues related to privacy. Data can be one of the most important assets of companies for
their marketing plan. Thus, businesses became interested in collecting and managing
consumer’s data. Though the term data mining is relatively new, data mining attracts
tremendous interest in commercial market place. Lots of businesses pay attention to data
mining recently. Why are data mining and data warehousing mushrooming so greatly now?
Over the next few years we should expect to see an increased level of scrutiny of data
mining in terms of its impact on privacy. The sheer amount of data that is collected about
individuals, coupled with powerful new technologies such as data mining, will generate a great
63
deal of concern by consumers. Unless this concern is effectively addressed, expect to see legal
challenges to the use of data mining technology.
Lesson Learned:
With the development of computing and communication technology, now data can be
captured, recorded, exchanged, and manipulated easier than before. By one estimate, the
amount of information in the world doubles every 20 months, and that means the size of
databases also does, even faster. Today we consciously or unconsciously diffuse our data
somewhere. Whenever we shop, use credit card, rent a movie, withdraw money from ATM,
write a check and log on the Internet, our data go somewhere.
Integrative Question:
What is privacy?
64
Book: Cyber Ethics
Quote:
“Each person is to have an equal right to the most extensive basic liberty compatible
with a similar liberty for others.”
Learning Expectation:
Review:
It has been traditionally accepted that employers have a right to engage in such
activities. At the foundation of this view is a conception of the employment relationship as
involving a voluntary exchange of property. Exceptions to the employment-at-will doctrine
include firing someone for serving on jury duty, for reporting violations of certain federal
regulations, or for impermissible race, sex, or age discrimination on the employer’s part.
Accordingly, the terms and conditions of employment are largely up to the parties to decide.
Conceived as a free exchange, the employment relationship, in the absence of some express
contractual duration requirement, can be terminated at will by either party for nearly any
reason.
65
Lessons Learned:
The persons in the original position have no information as to which generation they
belong. In order to carry through the idea of the original position, the parties must not know
the contingencies that set them in opposition.
Rawls argues that fair terms of cooperation are most likely to be chosen from behind a
veil of ignorance, which he describes as follows: “no one knows his place in society, his class
position or social status, nor does any one know his fortune in the distribution of natural assets
and abilities, his intelligence, strength, and the like. Nor again does anyone know his
conception of the good, the particulars of his rational plan of life, or even the special features of
his psychology such as his aversion to risk or liability to optimism or pessimism. More than this,
I assume that the parties do not know the particular circumstances of their own society.
Integrative Questions:
What are the principles require employers to refrain from collecting data?
66
Book: Cyber Ethics
Quote:
“It is not non-exclusion that makes retaliation impossible (for there may be other ways of
punishing the free-rider than by excluding him), but anonymity of the free-rider. Clearly in a
small group it is easier to spot the free rider and sanction him in one of many possible ways
once he is identified than in a large group, where he can hide in the crowd".
Learning Expectation:
Review:
The privacy issue is concerned more specifically with the question how to balance the
claims of those who want to limit the availability of personal information in order to protect
individuals and the claims of those who want to make information about individuals available in
order to benefit the community. The privacy issue lies at the heart of an ongoing debate in
nearly all Western democracies between liberalists and communitarians over the question how
to balance individual rights and collective goods. This essential tension emerges in many privacy
discussions, e.g. undercover actions by the police on the internet, use of Closed Circuit
Television in public places, making medical files available for health insurance purposes or
epidemiological research, linking and matching of databases to detect fraud in social security,
soliciting information about on-line behavior of internet users from access providers in criminal
justice cases. Communitarians typically argue that the community benefits significantly from
having knowledge about its members available. According to communitarians modern Western
democracies are in a deplorable condition and our unquenchable thirst for privacy serves as its
epitome. Who could object to having his or her data accessed if honorable community causes
are served? Communitarians also point out that modern societies exhibit high degrees of
67
mobility, complexity and anonymity. As they are quick to point out, crime, free riding, and the
erosion of trust are rampant under these conditions. Political philosopher Michael Walzer
observes that "Liberalism is plagued by free-rider problems, by people who continue to enjoy
the benefits of membership and identity while no longer participating in the activities that
produce these benefits.
The modern Nation States with their complex public administrations need a steady
input of personal information to function well or to function at all. In post-industrial societies
'participation in producing the benefits' often takes the form of making information about one-
self available. Those who are responsible for managing the public goods therefore insist on
removing constraints on access to personal information and tend to relativize the importance
of privacy of the individual.
Lesson Learned:
The game-theoretical structure and the calculability of community gains make the
arguments in favor of overriding privacy seem clear, straightforward and convincing. Both in
the private as well as in the public sector IT is seen as the ultimate technology to resolve the
problem of anonymity. Information and communication technology therefore presents itself as
the technology of the logistics of exclusion and access-management to public goods and goods
involved in private contracts. Whether IT really delivers the goods is not important for
understanding the dynamics of the use of personal data.
Integrative Question:
Define privacy.
68
Book: Cyber Ethics
Quote:
The U.S. Department of Defense's (DoD) Defense Information Systems Agency (DISA)
has completed in-depth research on computer crime. From 1992 to 1995, DISA attacked their
own DoD computer systems using software available on the Internet.
Learning Expectation:
Convincing victims who have suffered a loss to report the crime to police constitutes
another hurdle facing law enforcement agencies. Surprisingly, many individuals, network
administrators, and corporate managers do not realize that attacks against their networks
constitute a crime. Worse, many victims who understand that a crime has taken place may
deliberately keep these facts from the police.
Review:
Even though the computer is not directly used for criminal purposes, it is an excellent
device for record keeping, particularly given the power to encrypt the data. Crime statistics
69
facilitate benchmarking and analysis of crime trends. Crime analysts use criminal statistics to
spot emerging trends and unique modi operandi. Patrol officers and detectives use this data to
prevent future crimes and to apprehend offenders. Therefore, to count computer crime, a
general agreement on what constitutes a computer crime must exist. In many police
departments, detectives often compile and report crime data. Thus, homicide detectives count
the number of murders, sexual assault investigators examine the number of rapes, and auto
detectives count car thefts. Computer crime, on the other hand, comprises such an ill-defined
list of offenses that various units within a police department usually keep the related data
separately, if they keep them at all.
Lesson Learned:
Generally, crime statistics can provide approximations for criminal activity. Usually,
people accurately report serious crimes, such as homicide, armed robbery, vehicle theft, and
major assaults. But, new evidence suggests that computer crime may be the most
underreported form of criminal behavior because the victim of a computer crime often remains
unaware that an offense has even taken place. Sophisticated technologies, the immense size
and storage capacities of computer networks, and the often global distribution of an
organization's information assets increase the difficulty of detecting computer crime.
Integrative Question:
70
Book: Cyber Ethics
Quote:
The fact that there are limits on the scope of even a legitimate state’s permission to
coercively enforce the law suggests, rightly, that civil disobedience is sometimes morally
justified. In cases where an otherwise legitimate state has enacted a sufficiently unjust law that
falls outside the scope of its coercive authority, citizens have a qualified moral permission to
disobey it
Learning Expectation:
First, I argue that it wrongly presupposes that committing civil disobedience is morally
permissible as a general matter of moral principle; in an otherwise legitimate state, civil
disobedience is morally justified or excusable only in certain circumstances. Second, I attempt
to identify a reliable framework for evaluating civil disobedience that weighs the social and
moral values against the social and moral disvalues. Third, I apply this framework to acts of
electronic civil disobedience. I argue that such acts typically result in significant harms to
innocent third-parties that are not morally justified as an expression of free speech – and
especially not as the expression of a view that is deeply contested in society.
Review:
Civil disobedience, by its nature, involves disobeying something that has the status of
law. It is one thing to assert that a law is unjust; it is another thing to deliberately and openly
behave in a manner that violates the law; the former is a pure speech act, while the latter is
behavior. Civil disobedience, then, might be expressive conduct, but it is primarily conduct and
secondarily expression. Ordinary views about the moral right to free speech commonly
distinguish between speech acts and expressive behavior. On these views, expressive behavior
is subject to more stringent moral limits than those to which pure speech is subject. One might
71
seek, for example, to make a point about sexual morality by having sex in public, but the moral
right to free speech is implausibly thought of as entailing a right to have sex in public for the
purpose of promoting some view about sexual morality.
The reason for this, of course, has something to do with the effects on other people of
these different kinds of act. Pure speech acts, other things being equal, affect only doxastic
states in any morally significant way. Conduct, however, has the potential to affect not only
doxastic states, but may also have significant effects on other states in which a person has a
strong interest. Someone who seeks to express anger with you by hitting you not only affects
your doxastic states, but also runs the risk of causing you physical and emotional injury
Lesson Learned:
The victims of such an attack, as well as third-parties, have a right to know exactly what
position is motivating the attack and why anyone should think it is a plausible position. The
willingness to impose morally significant costs on other people to advance fringe positions that
are neither clearly articulated nor backed with some sort of plausible justification is clearly
problematic from a moral point of view. It seems clear that such behavior amounts, at least in
most cases, to the kind of arrogance that is problematic on ordinary judgments.
Integrative Question:
Why might companies who try to privatize the internet be intimidated by hacktivism?
What is the difference between a hacktivist and a cyberterrorist? How can one differentiate the
two?
How does M&G's notion of hacktivism fare under the various ethical frameworks we studied?
Define hacking.
72
Book: Cyber Ethics
Quote:
Privacy not only allows us to develop healthy interpersonal relationships, it also seems
to be required for democratic states to function.
Lesson Expectation:
For this purpose I will start this section by discussing the concept of ideology. This will
lead to a discussion of ideological issues likely to be involved in debates on privacy and security
as identified by the literature.
Review:
73
action, which will be applied to the websites of Microsoft Vista and Trustworthy Computing.
The results of this discourse analysis support the contention that privacy and security can be
used for ideological purposes. The paper will conclude by discussing possible avenues to
address this problem. Concerning privacy laws of the United States, privacy is not guaranteed
per se by the Constitution of the United States. The Supreme Court of the United States has
found that other guarantees have "penumbras" that implicitly grant a right to privacy against
government intrusion, for example in Griswold v. Connecticut (1965). In the United States, the
right of freedom of speech granted in the First Amendment has limited the effects of lawsuits
for breach of privacy.
Lesson Learned:
In the final step, I have attempted a brief critical discourse analysis on Haberma's Theory
of Communicative Action to support the suspicion that the moral nature of privacy and security
can be used for ideological purposes. In this paper I have argued that privacy and security are
concepts with important moral connotations.
Integrative Question:
What aspects of security can both be protecting and limiting privacy at the same time?
74
Book: Cyber Ethics
Quote:
But public understanding is not, in my opinion, enough. Knowing where landmines are buried
can help people avoid them, but clearing the landmines is a more robust and lasting solution.
Learning Expectation:
Although answers to this foundational question will not immediately yield answers, it is
essential to understanding what is at stake in the answer to these question. For, after all is said
and done, we would not want to discover that the thing we have fought so hard to protect was
not worth protecting after all. My purpose here is not to suggest that anonymity in an
information age is impossible. I am mainly arguing that achieving it is a more demanding
business than merely allowing people to withhold their names.
Review:
I am mainly arguing that achieving it is a more demanding business than merely allowing
people to withhold their names. Although I do not mean to imply that contemporary networks
of information, and the compromise of opaque identifiers, are the result of insidious conspiracy
and subterfuge, I recognize, at the same time, that all interests are not equally served by
promoting a sufficient public understanding. An understanding of the natural meaning of
anonymity, as may be reflected in ordinary usage or a dictionary definition, is of remaining
nameless, that is to say, conducting oneself without revealing one's name.
75
consult a priest, doctor or lawyer and reveal personal information which is protected. In some
cases, for example confession in catholic churches, the confession booth is specially designed to
allow people to consult a priest, without seeing him face to face. The anonymity in confessional
situations is however not always 100 %. If a person tells a lawyer that he plans a serious crime,
some countries allow or even require that the lawyer tell the police.
Lesson Learned:
Integrative Question:
What is anonymity?
What is pseudonym?
How is the concept different from that prior to the computerization of the society?
76
Book: Cyber Ethics
Quote:
“Collecting medical data electronically requires, according to our moral belief, also some
kind of encryption.”
Learning Expectation:
Even the number of the patient in the doctor’s database will be replaced, because once
the doctor may be a researcher using the central database who recognizes one of the patients
based on the number. Both the patient identification in the data and the doctor identification in
the data must be anonymized. We skip the name and address; only the sex and the month-year
of birth will be sent from the doctor to the central database.
Review:
The receiver must decrypt that message first with his own secret key and second with
the public key of the sender according to the header. When the message is readable after this
double decryption, one can be sure that the message was meant to be received by the
decrypting receiver and the message was really sent by the sender named in the header of the
message. Thus: double encryption needs the sender identification in order to decrypt the
message with the senders public key. The problem with an anonymized electronic message is
that the senders identification was anonymized by the virtual postbox. To be sure that the data
are really sent by the sender of the electronic message, the double encryption of PGP is a
suitable and widely used protocol.
Lessons Learned:
77
This procedure requires the availability of a list with only public keys at the virtual
postbox, as well as a program to intervene the electronic communication. Unfortunately, so far
none of the network providers is willing or has been able to implement it. We are building it
ourselves first, to convince the technical feasibility. Meanwhile it is a nice example of ethical
constraints demanding new technology, instead of the opposite. To use double encryption for
anonym zed electronic communication, new requirements must be specified. In this paper we
suggest additional features that network providers must incorporate in the functionality of
electronic message handlers. In fact we propose to add some 'intelligence' to the virtual
postbox: instead of automatically forwarding, the postbox must now be able to read the sender
from the header, select the appropriate public key from that sender, decrypt the message with
that public key, replace the senders identification and encrypt the message with its own public
key.
Integrative Questions:
Is it a robust setup?
78
Book: Cyber Ethics
Quote:
When a biometric is translated into its digital representation or code it could theoretically be
copied, changed, etc. with the ease that only computers offer.
Learning Expectation:
If someone were to tell you today that your biometrics are going to be one of the
biggest ID theft problems of the future, what would you say? Would you laugh and think that
person was crazy? You might not want to repeat the past so you should be more careful and
listen this time.
Review:
Authentication happens when you use one biometric for comparison with an already
identified biometric in hopes of an exact match thereby authenticating an individual. When
biometrics are combined with powerful computer information systems they can be used in
ways which were previously impossible. Although the strengths of biometrics are increased, the
weaknesses may also be increased.
Biometrics refers to methods for uniquely recognizing humans based upon one or more
intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used
as a form of identity access management and access control. It is also used to identify
individuals in groups that are under surveillance.
The main operations a system can perform are enrollment and test. During the
enrollment, biometric information from an individual is stored. During the test, biometric
information is detected and compared with the stored information. Note that it is crucial that
storage and retrieval of such systems themselves be secure if the biometric system is to be
robust. The first block (sensor) is the interface between the real world and our system; it has to
79
acquire all the necessary data. Most of the times it is an image acquisition system, but it can
change according to the characteristics desired. The second block performs all the necessary
pre-processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing
background noise), to use some kind of normalization, etc. In the third block features needed
are extracted. This step is an important step as the correct features need to be extracted and
the optimal way. A vector of numbers or an image with particular properties is used to create a
template.
Lesson Learned:
Some strengths of using biometrics come from the “distinguishable (rather than unique)
physiological and behavioral traits (Chandra, Akhilesh 2005)” that make up one’s body and the
ease at which they can be used for identification and authentication. Unlike your passwords,
you will not forget your fingerprints, irises, or DNA when you go to work. They are a part of you.
They are also extremely distinguishable from another person’s biometrics. This means that they
can be used with great confidence. Since they are a part of you they are difficult for another
person to obtain or fake. They are also easy to use.
Integrative Questions:
In what ways are name, code, knowledge, and token-based identification schemes deficient?
What factors have led to the emergence of a consortium-based specification for a global
standard for biometric technologies?
In the context of identity determination and verification, what are the distinctions between a
'one to many' and 'one to one' match?
80
Book: Cyber Ethics
Quote:
‘A Physician’s Guide To Medical Writing’, an ideal medical write up framed along ethical
considerations,”
Learning Expectation:
The efficiency flowing into this professional stream, promises a brighter and strategically
stable future for this industry. But the emergence of certain negative trends in the practice of
this profession poses a threat to its ability to deliver quality contents with reliable information.
Review:
Ethical issues are the concerns that address subjects like, content reliability, data collection
techniques and presentation tactics, marketing strategy and the relevance of research and
development. They play a vital role in relieving the writers of regulatory pressures involved in
the process. Properly includes technical exposition on any subject related to medical science,
such as biochemistry, pharmacologic studies, sanitation and psychoanalysis”. It is the
responsibility of the writer to include necessary technical details under regulatory limitations to
establish a level of understanding among the readers. Such ethical responsibilities have to be
shared by the writer as well as the client.
The client or the researcher should generate complete information on the academic
background of the writer before allotting the assignment. This helps a client to understand the
performance level that could be extracted from a writer.
• Regular communication with the writer is an essential condition for the correct
formulation of the content.
81
• It is pivotal for a client to allow proper validation of the content written for him before
mass circulation.
Lessons Learned:
Ethical and legal considerations enhance the quality and reliability of the content. It is
true that the technical aspects in the profession of medical writing demand constant attention
and need to be presented with clarity. In absence of such considerations it will be impossible
for the clients to bridge the communication gaps between them and the target audience. It is
widely accepted by many researchers that legal and ethical issues can play the role of obstacles
in the progress of marketing a research as they impose certain limitations on the utilization of
research products.
Integrative Questions:
82
Book: Cyber Ethics
Quote:
Codes instruct practitioners about the standards that society expects them to meet, and
what their peers strive for and expect of each other. Codes are not meant to encourage
litigation, and they are not legislation; but they do offer practical advice about issues that
matter to professionals and their clients and they do inform policy makers.
Lesson Expectation:
Review:
The composition of the task force is multinational in both citizenship and in membership
in professional computing organizations. There were two ethical approaches of by members of
the task force to this project, but there was an achievement of consensus between them.
Several of the ethical discussions about the Code are related to the relative position of
rights/obligations based ethics versus virtue based ethics. This is reflected, for example, in
different values placed on privacy. This difference between rights and virtue based ethics as a
primary assumption was reflected in differing views on the actual and acceptable roles of
governments in the software development process and reflected in different values or
obligations related to the roles of government and individuals in protecting data integrity. The
lessons learned from developing of the Software Engineering Code of Ethics (www-
cs.etsu.edu/seeri) and relating these approaches to ethics provide indications on how to
improve the ethics education of computer professionals.
The observations in this paper were made during my tenure as chair of the task force
developing this Code of Ethics. The generalizations in this paper, like all generalizations are
83
subject to exceptions. With this cautionary word, I will now venture to blatantly categorize
ethical approaches. A software engineer is a person who applies the principles of software
engineering to the design, development, testing, and evaluation of the software and systems
that make computers or anything containing software, such as chips work. The IEEE-CS/ACM
Software Engineering Code of Ethics Archive documents the drafting, debate, and final
adoption of the joint IEEE Computer Society /ACMSoftware Engineering Code of Ethics and
Standards of Practice. Indirectly, the archive illustrates how software engineering developed
from an occupation to a profession. The drafting and approval of the Software Engineering
Code, carried out in substantial part by email, has produced a detailed record of the
development of a professional code of ethics. This correspondence, as well as related
documents, interviews, and publications, make up the contents of the IEEE-CS/ACM Software
Engineer’s Code of Ethics Archive.
Lesson Learned:
The software engineer as a practicing professional acts from a higher level of care for the
customer (virtue ethics) and conforms to the development standards of the profession
(right/obligations ethics). Both types of ethics are needed for the Professional engineer.
Addressing computer ethics issues for the professional and in the classroom needs to include
both of these approaches.
Integrative Questions:
Why did they develop a joint force ethical approach for software engineering?
Enumerate and explain the short version of the software engineering ethics.
84
Book: Cyber Ethics
Chapter 41: No, Papa,: Why incomplete Codes of Ethics Are Worse Than None at All”
Quote:
“Computer and information ethics”, in the broadest sense of this phrase, can be
understood as that branch of applied ethics which studies and analyzes such social and ethical
impacts”
Learning Expectation:
Some career counselors suggest a student also focus on "people skills" and business
skills rather than purely technical skills because such "soft skills" are allegedly more difficult to
offshore.It is the quasi-management aspects of software engineering that appear to be what
has kept it from being impacted by globalization.
Review:
“Computer ethics” also has been used to refer to a kind of professional ethics in which
computer professionals apply codes of ethics and standards of good practice within their
profession. In addition, other more specific names, like “cyber ethics” and “Internet ethics”,
have been used to refer to aspects of computer ethics associated with the Internet.
The more specific term “computer ethics” has been used to refer to applications by
professional philosophers of traditional Western theories like utilitarianism, Kantianism, or
virtue ethics, to ethical cases that significantly involve computers and computer networks.
Lessons Learned:
The same considerations are highly likely to apply to any moral code that is developed
(whether in computing or elsewhere). Authors of incomplete moral codes risk encouraging
others to act in immoral ways with the author's apparent sanction.
85
Related, broader, questions are considered, and it is advocated that there should always
be acknowledgment of the existence of 'external', potentially more important, moral issues.
The problem is that by focusing on these four areas of concern, attention may be taken away
from other, potentially more important, moral issues. Not all important moral issues in
information technology can be put under those headings.
Integrative Questions:
86
Book: Cyber Ethics
Quote:
“A key factor is whether the subsumptionist can prevent a conscious victim from calling
for help, and whether or not the subsumptionist enjoys toying with a victim who is aware of the
process. “
Learning Expectation:
The attacker takes all of the victim's memories, cognitive structures, and available
computronium, and incorporates them into emself. Usually this results in the death of the
victim, but in some cases the attacker retains an inactive backup copy, or keeps the victim as a
much-reduced emulation in a simulated environment.
Review:
As may be guessed, the motivations for doing so are rarely benign, and the experiences
of the survivor are not usually pleasant. The very rare restored survivors of such treatment have
compared it to such ancient human practices as lobotomy, emasculation, or blinding,
sometimes followed by various forms of torture.
87
Lessons Learned:
Whether this is because such events are actually rarer among transapients or whether
this is because they are difficult for SI<1 observers to detect is unknown. On the other hand, it
is not at all uncommon for lesser entities to be destroyed and/or incorporated when a
transapient ascends to a higher toposophic level. This is regarded as subsumption (and also as a
perverse transcend) in "civilized" parts of the Terragen sphere if the participants are unwilling.
It is considered a kind of voluntary amalgamation if they volunteer.
Most examples of subsumption have been carried out by sapient-grade entities, or even
by specialized sub-sapient (sentient-level) AIs. The number of subsumption events known to
have occurred between beings of higher toposophic levels is relatively small (the destruction of
numerous lesser sapient and transapient beings by the Archosaurian Entity in 9400 a.t. is a
recent exception).
Integrative Questions:
What is Subsumption?
Define subsumption?
88
Book: Cyber Ethics
Quote:
“It will provide readers with a clear knowledge of the complex ethical issues involved in
e-business and improve their understanding of widely discussed current issues in e-business
such as those of privacy, information management, data mining, intellectual property, and
consumer tracking.”
Learning Expectation:
The internet has revolutionized business by fundamentally changing the means by which
businesses operate and enlarging the opportunities available to them to reach and service
customers. However, in doing so, the development and practice of e-business also raises a host
of ethical issues, such as those pertaining to information security, privacy, data mining, and
intellectual property.
Review:
89
Lessons Learned:
The book will be written for scholars, professionals, and students interested in gaining a
better comprehension and appreciation of the moral issues encountered in the multifaceted
world of e-business. This book will aim to provide a comprehensive overview of the most
important ethical issues associated with the expanding world of e-business. Grounded solidly in
the most recent scholarship in business ethics, the book will apply the most relevant theoretical
frameworks to ethical issues in all significant areas of e-business.
Integrative Questions:
90
Book: Cyber Ethics
Quote:
Learning Expectation:
In this paper, I want to take a different approach that emphasises individual human
flourishing – although moral values and behaviours will also be discussed in the context of this
approach. I want to investigate to what extent virtue ethics can ground a conception of the
good life and, correspondingly, the good society, in relation to uses of information technology
and new media. Although virtue ethics has received attention in computer and information
ethics before (e.g., Grodzinsky 1999), the emphasis in previous discussion has been on virtue
ethics as a means to instil moral values and behaviours in computer professionals and
computer users through character formation.
Review:
91
and culture research, and economics. Second, Virtue Ethics has one unique feature which lacks
in the other major ethical methods and which renders it particularly interesting to the present
inquiry. This feature is its central concern with an areatically and ontologically conceived ethical
subject and her ‘flourishing’ by means of what is variously presented as the formation of
virtuous ‘habits’ or a virtuous ‘character’. By critiquing deontological approaches and strictly
universal rules-based accounts of ethics, Virtue Ethics is particularly agent-focused and agent-
based. This arguably means that a Kantian moral dilemma in which an ethical subject must
choose between two first-order moral rules and necessarily, therefore, violate one of them can
at least be conceptually addressed by Virtue Ethics in that attention is paid to the mechanisms
and the underlying moral virtues.
Lessons Learned:
Ethical subjects have histories and futures; they are engaged in development, identity-
and value-formation and self-reflection. And it is here that the recent work which relates to
Virtue Ethics is beginning to have some impact in a number of disciplines. It will be useful to
extend these applications to new media and information technology. Nevertheless, Virtue
Ethics does afford the moral theorist the perhaps only contemporaneous ethical account that
might address the crucial questions over the ways and processes in which an ethical subject
might come to be ethical. In other words, it is important to ask in relation to all major ethical
traditions how and why an agent might variously choose to enter into a given social and moral
contract, or embrace universal rule-based moral systems, or indeed become virtuous.
Integrative Questions:
92
What are the methods of virtues?
93
The HaNDBooK oF
iNFoRMaTioN
aND CoMPuTeR
eTHiCS
94
Book: Handbook of Computer Ethics
Chapter 1: Foundations of Information Ethics
Quote:
Information technology affects fundamental rights involving copyright protection,
intellectual freedom, accountability, and security.
Learning Expectations
It provides a critical framework for considering moral issues concerning informational
privacy, moral agency (e.g. whether artificial agents may be moral), new environmental issues
(especially how agents should one behave in the infosphere), problems arising from the life-
cycle (creation, collection, recording, distribution, processing, etc.) of information (especially
ownership and copyright, digital divide). Information Ethics is related to the fields of computer
ethics and the philosophy of information.
Review
Information are becoming increasingly important in a society that is defined as "the
information society". Information transmission and literacy are essential concerns in
establishing an ethical foundation that promotes fair, equitable, and responsible practices.
Information ethics broadly examines issues related to ownership, access, privacy, security, and
community.
95
Lessons Learned
A basis for making ethical decisions and applying ethical solutions to situations involving
information provision and use which reflect an organization’s commitment to responsible
information service. Evolving information formats and needs require continual reconsideration
of ethical principles and how these codes are applied. Considerations regarding information
ethics influence “personal decisions, professional practice, and policy .
Integrative Questions
4. What is literacy?
96
Book: Handbook of Computer Ethics
Chapter 2: Milestones in the History of Information and Computer Ethics
Quote:
The founder of this new philosophical field was the American scholar Norbert Wiener, a
professor of mathematics and engineering at MIT
Learning Expectations:
To learn the Developments in science and philosophy led to the creation of a new
branch of ethics that would later be called “computer ethics” or “information ethics”. The
founder of this new philosophical field was the American scholar Norbert Wiener, a professor
of mathematics and engineering at MIT.
Review:
Everything in the world is a mixture of both of these, and thinking, according to Wiener,
is actually a kind of information processing. Consequently, the braindoes not secrete thought
“as the liver does bile”, as the earlier materialists claimed, nor does it put it out in the form of
energy, as the muscle puts out its activity. Information is information, not matter or energy. No
materialism which does not admit this can survive at the present day. (Wiener 1948, p. 155)
Living organisms, including human beings, are actually patterns of information that
persist through an ongoing exchange of matter-energy. Thus, he says of human beings,
Using the language of today's “information age” we would say that, according to
Wiener, human beings are “information objects”; and their intellectual capacities, as well as
their personal identities, are dependent upon persisting patterns of information and
information processing within the body, rather than on specific bits of matter-energy.
97
Lessons Learned
Integrative Questions
4. what is milestone?
98
Book: Handbook of Computer Ethics
Chapter 3: Moral Methodology and Information Technology
Quote:
Learning Expectations:
Today, the term information technology has ballooned to encompass many aspects of
computing and technology, and the term has become very recognizable. The information
technology umbrella can be quite large, covering many fields. IT professionals perform a variety
of duties that range from installing applications to designing complex computer networks and
information databases. A few of the duties that IT professionals perform may include data
management, networking, engineering computer hardware, database and software design, as
well as the management and administration of entire systems.
Review:
The term Information Technology (IT) is sometimes said to have been coined by Jim
Domsic of Michigan in November 1981.[citation needed]
Domsic, who worked as a computer
manager for an automotive related industry, is supposed to have created the term to
modernize the outdated phrase "data processing".
Lessons Learned
99
(Leavitt & Whisler in Harvard Business Rev. XXXVI. 41/1 "The new technology does not yet have
a single established name.
Integrative Questions
100
Book: Handbook of Computer Ethics
Chapter 4: Value Sensitive Design and Information System
Quote:
Value-Sensitive Design is primarily concerned with values that center on human well
being, human dignity, justice, welfare, and human rights. Value-Sensitive Design connects the
people who design systems and interfaces with the people who think about and understand the
values of the stakeholders who are affected by the systems.
Learning Expectations:
Above all design for values is design of technology in its social, economic, and political
context. An understanding of design for values begins with the major strands of theoretical
work and must include methodological approaches. on the interactions of technological
development and social values.
Review:
The evaluation of past designs with a critical eye on the initial design, improvement of
specific designs, and the development of guidelines for designs. There is a specific design focus
distinct from those methods that are focused on critique rather than design. As opposed to
traditional technical approaches to socially responsible design, there is a focus on iteration and
the use of legal and social scholarship to refine or correct designs that builds upon computer
supported cooperative work.
Design is fundamental to all human activity. At the nexus of values, attitudes, needs and
actions, designers have the potential to act as a transdisciplinary integrators and facilitators.
The map of value systems and perspectives described by Beck and Cowan as ‘Spiral Dynamics’,
can serve as a tool in the facilitation of ‘transdisciplinary design dialogue’.
101
Lessons Learned
Integrative Questions
What are the nexus of values, attitudes, needs and actions, designers?
102
Book: Handbook of Computer Ethics
Chapter 5: Personality-Based, Rule-Utilitarian, and Lockean Justificatons of Intellectual
Property
Quote:
"The obvious line for justification is that each person is in possession of himself, if not by choice
or conscious act, then by a kind of natural necessity."
Learning Expectations:
The labor theory is called upon to aid the theory that possession is the root of title; yet it
depends for its own success upon the proposition that the possession of self is the root of title
to self.
Review:
It is unclear why Epstein should reach this conclusion. Locke never mentions one's
possession of one's body as the basis for one's property in one's body; he begins simply by
asserting one's body is one's property. Yet Epstein connects property to possession by saying, "
Epstein directly, albeit unknowingly, points out a critical difference: we are not in possession of
any particular external objects by a kind of natural necessity. If we were, the need for property
laws would be greatly diminished. Each person, like a tree, would be rooted to his own parcel of
external objects; this would be "of natural necessity," and no one would try to displace another
from his natural and necessary attachments.
Lessons Learned
His theory is largely a justification by negation: under his two conditions there are no
good reasons for not granting property rights in possessions. This has led scholars such as
Richard Epstein to a possession-based interpretation of Locke. Epstein argues that "first
103
possession" forms the basis for legal title and believes that this is the heart of Locke's position.
For Epstein, the talk of labor is a smokescreen hiding the fundamental premise of Locke's
argument that a person possesses his own body:
Integrative Questions
2. What is the conditions there are no good reasons for not granting property rights in
possessions?
104
Book: Handbook of Computer Ethics
Chapter 6: Informational Privacy: Concepts, Theories, and Controversies
Quote:
From a practical point of view, it might seem fruitful to approach privacy-related issues
and concerns simply from the vantage point of various stipulated interests.
Learning Expectations:
Some authors suggest that it is more useful to view privacy as either a presumed or
stipulated interest that individuals have with respect to protecting personal information,
personal property, or personal space than to think about privacy as a moral or legal right.
Review:
In terms of an economic interest and that information about individuals might be
thought of in terms of personal property that could be bought and sold in the commercial
sphere. Clarke (1999) has recently suggested that privacy can be thought of as an "interest
individuals have in sustaining personal space free from interference by other people and
organizations." From a practical point of view, it might seem fruitful to approach privacy-related
issues and concerns simply from the vantage point of various stipulated interests. Many
Western European nations have preferred to approach issues related to individual privacy as
issues of "data protection" for individuals -- i.e., as an interest in protecting personal
information -- rather than in terms of a normative concept that needs philosophical analysis.
Lessons Learned
Some of the philosophical and legal foundations of privacy will not only provide us with
a rich perspective on privacy itself, but will also be particularly useful in helping us to
understand what privacy is, why it is valued, and how it is currently threatened by certain
activities on the Internet. Such an examination will also help us to differentiate between some
subtle, yet significant, aspects of personal privacy. For example, it will enable us to differentiate
105
between the condition of privacy (what is required to have privacy) and a right to privacy, and
between a loss of privacy and a violation or invasion of privacy.
Integrative Questions
What is perspective privacy?
Ho to determine privacy?
Is privacy is ought to be right?
Is there a moral, legal or otherwise?
Is privacy helping us to understand?
106
Book: Handbook of Computer Ethics
Chapter 7: Online Anonymity
Quote:
More strictly, and in reference to an arbitrary within a well-defined set (called the
"anonymity set"), "anonymity" of that element refers to the property of that element of not
being identifiable within this set. If it is not identifiable, then the element is said to be
"anonymous".
Learning Expectations:
However, in other contexts what matters is that both anonymity and pseudonymity are
concepts that are, among other things, concerned with hiding a person's legal identity. In such
contexts people may not distinguish between anonymity and pseudonymity.
The problem of determining whether or not the identity of a communication partner is the
same as one previously encountered is the problem of authentication.
Lessons Learned
107
Integrative Questions
108
Chapter 8: Ethical Issues Involving Computer Security: Hacking,Hactivism, and Counter
hacking
Quote:
The objective of computer security can include protection of information from theft or
corruption, or the preservation of availability, as defined in the security policy.
Learning Expectations:
Review:
Systems designed with such methodology represent the state of the art of computer
security although products using such security are not widely known. In sharp contrast to most
kinds of software, they meet specifications with verifiable certainty comparable to
specifications for size, weight and power. Secure operating systems designed this way are used
primarily to protect national security information, military secrets, and the data of international
financial institutions.
Lessons Learned
In USA parlance, the term High Assurance usually suggests the system has the right
security functions that are implemented robustly enough to protect DoD and DoE classified
information. Medium assurance suggests it can protect less valuable information, such as
income tax information. Secure operating systems designed to meet medium robustness levels
of security functionality and assurance have seen wider use within both government and
commercial markets.
109
Integrative Questions
110
Book: Handbook of Computer Ethics
Chapter 9: Information Ethics and the Library Profession
Quote:
In addition to its holdings of relevant books and leading periodicals, the library contains
a comprehensive collection of codes of ethics, many now available online, and an extensive
collection of materials on other centers.
Learning Expectations:
The library has enhanced its computer resources in order to interact with other libraries,
as well as to conduct online searches. Staffed by a professional research librarian, the library
provides bibliographic assistance to researchers anywhere in the world and assists visiting
scholars and practitioners.
Review:
The American Library Association has a special concern for the free flow of information
and ideas. Its views have been set forth in such policy statements as the Library Bill of Rights
and the Freedom to Read Statement where it has said clearly that in addition to the generally
accepted legal and ethical principles and the respect for intellectual freedom which should
guide the action of every citizen, membership in the library profession carries with it special
obligations and responsibilities.
Special collections librarians share fundamental values with the entire library profession.
They should be thoroughly familiar with the ALA Code of Ethics and must adhere to the
principles of fairness, freedom, professional excellence, and respect for individual rights
expressed therein. Furthermore, special collections librarians have extraordinary
responsibilities and opportunities associated with the care of cultural property, the
preservation of original artifacts, and the support of scholarship based on primary research
materials. At times their commitment to free access to information may conflict with their
mission to protect and preserve the objects in their care. When values come into conflict,
111
librarians must bring their experience and judgment to bear on each case in order to arrive at
the best solution, always bearing in mind that the constituency for special collections includes
future generations.
Lessons Learned
Librarians have a special concern for the free flow of information and ideas. The
American Library Association has set forth its views in such policy statements as the Library Bill
of Rights and the Freedom to Read Statement where it is clearly stated that in addition to the
generally accepted legal and ethical principles and the respect for intellectual freedom which
should guide the action of every citizen, membership in the library profession carries with it
special obligations and responsibilities. The statement which follows sets forth certain ethical
norms which are basic to librarianship.
Integrative Questions
Has a special responsibility to maintain the principles of the Library Bill of Right?.
Should learn and faithfully execute the policies of the institution of which one is a part and
should endeavor to change those which conflict with the spirit of the Library Bill of Rights.?
Must protect the essential confidential relationship which exists between a library user and the
library?
Must avoid any possibility of personal financial gain at the expense of the employing
institution?
Has an obligation to insure equality of opportunity and fair judgment of competence in actions
dealing with staff appointments, retentions, and promotions. ?
112
Book: Handbook of Computer Ethics
Chapter 10: Ethical Interest in Free and Open Source Software
Quote:
Software that cannot be modified and redistributed without further limitation, but
whose source code is visible (e.g., “source viewable” or “open box” software, including “shared
source” and “community” licenses), is not considered here since such software doesn’t meet
the definition of OSS/FS. OSS/FS is not “freeware”; freeware is usually defined as proprietary
software given away without cost, and does not provide the basic OSS/FS rights to examine,
modify, and redistribute the program’s source code.
Learning Expectations:
Instead, this paper emphasizes quantitative measures (such as experiments and market
studies) to justify why using OSS/FS products is in many circumstances a reasonable or even
superior approach. I should note that while I find much to like about OSS/FS, I’m not a rabid
advocate; I use both proprietary and OSS/FS products myself. Vendors of proprietary products
often work hard to find numbers to support their claims; this page provides a useful antidote of
hard figures to aid in comparing proprietary products to OSS/FS.
Review:
Many proprietary software product licenses include clauses that forbid public criticism
of the product without the vendor’s permission. Obviously, there’s no reason that such
permission would be granted if a review is negative -- such vendors can ensure that any
negative comments are reduced and that harsh critiques, regardless of their truth, are never
published. This significantly reduces the amount of information available for unbiased
comparisons. Reviewers may choose to change their report so it can be published (omitting
important negative information), or not report at all -- in fact, they might not even start the
evaluation. Some laws, such as UCITA (a law in Maryland and Virginia), specifically enforce
113
these clauses forbidding free speech, and in many other locations the law is unclear -- making
researchers bear substantial legal risk that these clauses might be enforced.
Lessons Learned
Other alternative terms for OSS/FS, besides either of those terms alone, include “libre
software” (where libre means free as in freedom), “livre software” (same thing), free-libre /
open-source software (FLOS software or FLOSS), open source / Free Software (OS/FS), free /
open source software (FOSS or F/OSS), open-source software (indeed, “open-source” is often
used as a general adjective), “freed software,” and even “public service software” (since often
these software projects are designed to serve the public at large). I recommend the term
“FLOSS” because it is easy to say and directly counters the problem that “free” is often
misunderstood as “no cost”. However, since I began writing this document before the term
“FLOSS” was coined, I have continued to use OSS/FS here.
Integrative Questions
Is there no provision of the license may be predicated on any individual technology or style of
interface?
114
Book: Handbook of Computer Ethics
Chapter 11: Internet Research ethics: The Field and Its Critical Issues
Quote:
Research is a broad term. Here, it is used to mean "looking something up (on the Web)".
It includes any activity where a topic is identified, and an effort is made to actively gather
information for the purpose of furthering understanding.
Learning Expectations:
Review:
First of all, online existence involves a bodily abstraction which implies abstraction from
bodily identity and individuality. Secondly, online existence also entails abstraction from our
situational orientation - an orientation which includes sharing time and space with others.
Thirdly, online existence is presence- as well as globally-oriented. Given the bodily abstraction
of online existence, we can also say that digital being-with-others tends to be ghostly-oriented.
These characteristics of online existence thus help sharpen the point: ethical dilemmas of
Internet research arise from the tension between the proper object of research, i.e. online
existence, and bodily existence. The borderline between these two phenomena is interface
communication itself.
115
Lessons Learned
The body is the primordial medium of our being-in-the-world. We can take a distance
from it only in a derivative way and make it an object within, for instance, the digital casting.
The digital casting concerns our existence, i.e., the way we share the world with others as well
as, more fundamentally, the way we cast Being itself. (There is a difference between digital
ontology and digital metaphysics. From a metaphysical point of view, the real is the digital and
vice versa. To put it in Berkeley's formula: To be, is to be digital or Esse est computari (Capurro
1999, Berkeley 1965, 62).)
Integrative Questions
116
Book: Handbook of Computer Ethics
Chapter 12: Health Information Technology: Challenges in Ethics, Science and Uncertainly
Quote:
Health IT will help consumers gather all of their health information in one place so they
can thoroughly understand it and share it securely with their health care providers so they get
the care that best fits their individual needs.
Learning Expectations:
Review:
This environment also poses new challenges and opportunities for protecting
individually identifiable health information. In health care, accurate and complete information
about individuals is critical to providing high quality, coordinated care. If individuals and other
participants in a network lack trust in electronic exchange of information due to perceived or
actual risks to individually identifiable health information or the accuracy and completeness of
such information, it may affect their willingness to disclose necessary health information and
could have life-threatening consequences.
Lessons Learned
Coordinated attention at the Federal and State levels is needed both to develop and
implement appropriate privacy and security policies. Only by engaging all stakeholders,
particularly consumers, can health information be protected and electronically exchanged in a
manner that respects variations in individuals’ views on privacy and access.
117
Integrative Questions
What are the Early detection of infectious disease outbreaks around the country?
What are the enabled by the collection of de-identified price and quality information that can
be compared?
118
Book: Handbook of Computer Ethics
Chapter 13: Ethical Issues of Information and Business
Quote:
Business ethics is one of the forms of applied ethics that examines ethical principles and
moral or ethical problems that can arise in a business environment.
Learning Expectations:
Review:
The term CSR came in to common use in the early 1970s although it was seldom
abbreviated. The term stakeholder, meaning those impacted by an organization's activities, was
used to describe corporate owners beyond shareholders as a result of an influential book by R
Freeman in 1984.
119
Whilst there is no recognized standard for CSR, public sector organizations (the United
Nations for example) adhere to the Triple Bottom Line (TBL). It is widely accepted that CSR
adheres to similar principals but with no formal act of legislation.
Lessons Learned
Managing risk is a central part of many corporate strategies. Reputations that take
decades to build up can be ruined in hours through incidents such as corruption scandals or
environmental accidents. These events can also draw unwanted attention from regulators,
courts, governments and media. Building a genuine culture of 'doing the right thing' within a
corporation can offset these risks
Integrative Questions
Find the Issues regarding the moral rights and duties between a company and its shareholders:
fiduciary responsibility, stakeholder concept v. shareholder concept.?
120
Book: Handbook of Computer Ethics
Chapter 14: Responsibilities for Information on the Internet
Quote:
The same connection allows that computer to send information to servers on the
network; that information is in turn accessed and potentially modified by a variety of other
interconnected computers.
Learning Expectations:
Using and citing information found on the Internet is a little like swimming on the beach
without a lifeguard. How can you tell whether or not an Internet resource is appropriate for a
research project? A researcher should evaluate Internet pages to make sure that they are
appropriate information sources for a particular assignment.
Review:
When referring to a database, it could refer to the content being broken up into specific
fields that have been indexed to maximize search capability. Design is a criterion that surfaces
frequently with regard to web pages and web sites. The pages should be properly linked
externally and internally to facilitate navigation. There should not be any broken links. The
design should be appropriate to the content, and maximize utility. Files and graphics should be
of a size that allows them to be loaded quickly. the design should be based upon an easily-
grasped hierarchy or logic. The use of frames in the web site should not result in the user
becoming lost, or take up valuable screen area. The users' primary method of accessing the site
should be considered. If the site is designed for network access primarily, then the greater
bandwidth of that medium can be employed. If dialup modem is the primary means of access,
then the site should conform to those standards. Although multimedia hardware such as
graphics accelerators, better graphics cards, and sound cards are now more commonplace, site
hardware requirements should be clearly identified and conform to generally-used standards.
121
Lessons Learned
Integrative Questions
122
Book: Handbook of Computer Ethics
Chapter 15: Virtual Reality and Computer Simulation
Quote:
This is different from the current, technologically achievable concept of virtual reality.
Virtual reality is easily distinguished from the experience of "true" reality; participants are never
in doubt about the nature of what they experience. Simulated reality, by contrast, would be
hard or impossible to distinguish from "true" reality.
Learning Expectations:
However, such messages have not been made public if they have been found, and the
argument relies on the messages being truthful. As usual, other hypotheses could explain the
same evidence. In any case, if such constants are in fact infinite, then at some point an
apparently meaningful message will appear in them (this is known as the infinite monkey
theorem), not necessarily because it was placed there.
Review:
123
Lessons Learned
Taken one step further, the "fine grained" elements of our world could themselves be
simulated since we never see the sub-atomic particles due to our inherent physical limitations.
In order to see such particles we rely on other instruments which appear to magnify or
translate that information into a format our limited senses are able to view: computer print
out, lens of a microscope, etc. Therefore, we essentially take on faith that they're an accurate
portrayal of the fine grained world which appears to exist in a realm beyond our natural senses.
Assuming the sub-atomic could also be simulated then the processing power required to
generate a realistic world would be greatly reduced.
Integrative Questions
Define simulation?
124
Book: Handbook of Computer Ethics
Chapter 16: Genetic Information: Epistemological and Ethical Issues
Quote:
Philosophy has remained an intellectual enterprise, which deals with ideas or concepts
by way of creating, criticizing and justifying it.
Learning Expectations:
To begin with, there is no doubt that personal experiences are socially and theoretically
constructed, and that it is in this manner that knowledge is produced. The implication is that
knowledge is a product of personal, social and theoretical experience. It is equally true, that
such socially bound problems especially the ethics related issues and phenomenon stem from
epistemological experiences. The claim to be advanced in this paper is that there are no
genuine ethical problems; that ethical problems are not necessarily religious problems as they
are often concerned, and most of all, that what we call ethical problems are some sort of
epistemological problems moralized.
Review:
From the very on-set, it is necessary to differentiate between ethics and morality. Until
such distinction is made, it might appear too difficult to ascertain whether ethical problems are
epistemological problems or not. There is no claim here that, the two concepts – ethics and
morality may not or cannot in certain circumstances be used interchangeably. Scholars often
correctly use the two terms as though they are the same. J.A. Aigbodioh for instance refers to
ethics as one of the moral disciplines. Jacques Maritain says ethics or morals are the practical
science which aims at procuring man are unqualified good.
Properly understood however, while ethics is a branch of philosophy concerned with the
study of the fundamental principles of morality and human conduct, morality on the other hand
is connected with the rightness of action or behaviour of individuals, class, group or society at
large. i The difference lies on the point that while morality concerns itself with the set of rules
and principles involved in the assessment of actions of individuals or groups. The morality of a
125
class or group has to do with the right beliefs or behaviours recommended and approved for
the class or group in question. Ethics on the other hand is a step further from morality. It is an
intellectual reflection on those approved norms and principles of morality with the intent of
proffering answers to question that are raised on the moral principles and norms of morality.
Lessons Learned
The consequence of this is that, ethical problems are systematic or intellectual problems
requiring conceptual analysis, clarification and deeper reflection. Ethics therefore does not
aim at describing how individuals, group or people behave, neither does it only try to identify
the pattern, norm or principles of conduct of an individuals or people ought to behave, as well
as why such principles or norms should be considered good or bad, appropriates or otherwise.
Integrative Questions
126
Book: Handbook of Computer Ethics
Chapter 17: The Ethics of Cyber Conflict
Quote:
Cyberethics, also referred to as internet ethics, is a branch of ethics that studies the
ethical dilemmas brought on by the emergence of digital technologies. With the advent of the
internet conflicts over privacy, property, security, accuracy, accessibility, censorship and
filtering have arose.
Learning Expectations:
Since then, controversy over who or what should be responsible for governing and
maintaining ethical conventions in cyberspace have been heatedly debated, ruled upon and
amended. Despite being a universal topic, cyberethics may change from country to country,
where cultural and societal ethics may differ and therefore are reflected in the debates over the
ethics of cyberspace. With the speed at which the internet changes, cyberethics evolves as
Review:
Accessibility, censorship and filtering bring up many ethical issues that have several
branches in cyberethics. Many questions have arisen which continue to challenge our
understanding of privacy, security and our participation in society. Throughout the centuries
mechanisms have been constructed in the name of protection and security. Today the
applications are in the form of software that filters domains and content so that they may not
be easily accessed or obtained without elaborate circumvention or on a personal and business
level through free or content-control software. Internet censorship and filtering are used to
control or suppress the publishing or accessing of information.
Lessons Learned
The legal issues are similar to offline censorship and filtering. The same arguments that
apply to offline censorship and filtering apply to online censorship and filtering; whether people
127
are better off with free access to information or should be protected from what is considered
by a governing body as harmful, indecent or illicit. The fear of access by minors drives much of
the concern and many online advocate groups have sprung up to raise awareness and of
controlling the accessibility of minors to the internet.
Integrative Questions
What are the data record-keeping systems whose very existence is secret?
Find out what information about the person is in a record and how it is used?
Is there a a way for a person to prevent information about the person that was obtained for
one purpose from being used or made available for other purposes without the person's
consent.
Is there a way for a person to correct or amend a record of identifiable information about the
person?
128
Book: Handbook of Computer Ethics
Chapter 18: A Practical Mechanism for Ethical Risk
Quote:
In the risk sciences, it is common to distinguish between “objective risk” and “subjective
risk”.
Learning Expectations:
Review:
Issues of risk have given rise to heated debates on what levels of scientific evidence are
needed for policy decisions. The proof standards of science are apt to cause difficulties
whenever science is applied to practical problems that require standards of proof or evidence
other than those of science.
Two major types of errors are possible in a decision whether or not to accept a scientific
hypothesis. The first of these consists in concluding that there is a phenomenon or an effect
when in fact there is none. This is called an error of type I (false positive). The second consists in
missing an existing phenomenon or effect. This is called an error of type II (false negative). In
the internal dealings of science, errors of type I are in general regarded as more problematic
than those of type II. The common scientific standards of statistical significance substantially
reduce the risk of type I errors but do not protect against type II errors.
Lessons Learned
According to the conventional division of labour between the two disciplines, moral
philosophy provides assessments of human behaviour in well-determined situations. Decision
theory takes assessments of these cases for given, adds the available probabilistic information,
129
and derives assessments for rational behavior in an uncertain and indeterministic world. On this
view, no additional input of moral values is needed to deal with indeterminism or lack of
knowledge, since decision theory operates exclusively with criteria of rationality.
Integrative Questions
130
Book: Handbook of Computer Ethics
Chapter 19: Regulation and Governance of the Internet
Quote:
It is upon this layer that the other two layers (logical and content) are built, and
governance of the infrastructure layer is therefore critical to maintaining the seamlessness and
viability of the entire network.
Learning Expectations:
Moreover, as we shall discuss further later, the lack of adequate competition policies
and inadequately developed national markets also play a significant role in raising access costs
for end-users. Increasing connectivity within regions has reduced some of the concerns for the
costs of connection to major backbones, as has absolute cost of undersea optical cable services.
Review:
This situation is particularly problematic for developing countries, which generally lack
ownership of Tier 1 infrastructure and are often in a poor position to negotiate favourable
access rates. By some accounts, ISPs in the Asia-Pacific region paid companies in the United
States US$ 5 billion in “reverse subsidies” in 2000; in 2002, it was estimated that African ISPs
were paying US$ 500 million a year. One commentator, writing on access in Africa, argues that
“the existence of these reverse subsidies is the single largest factor contributing to high
bandwidth costs”. 16
It should be noted that not everyone would agree with that statement, and that high
international access costs are not by any means the only reason for high local access costs. A
related – indeed, in a sense, the underlying – problem is the general lack of good local content
in many developing countries. It is this shortage of local content, stored on local servers, that
leads to high international connectivity costs as users are forced to access sites and information
stored outside the country.
131
Lessons Learned
Most importantly, this section attempts to make clear the real importance of Internet
governance by drawing links between apparently technical decisions and their social, economic
or political ramifications. Indeed, an important principle (and difficulty) of Internet governance
is that the line between technical and policy decision-making is often blurred. Understanding
the “real world” significance of even the most arcane technical decision is essential to
understanding that decision and its processes, and to thinking of new ways to structure
Internet governance.
Integrative Questions
Find the Universal access is frequently taken to mean access across geographic areas?
What are the digital divide, to refer to the need for equitable access?
132
Book: Handbook of Computer Ethics
Chapter 20: Information Overload
Quote:
People nowadays are logging in to the net not only to surf or browse but to donate or
share a piece of information. According to Sohora Jha, journalists are using the web to conduct
their research, getting information regarding interviewing sources and press releases, updating
news online, and thus it shows the gradual shifts in attitudes because of the rapid increase in
the Internet.[
Learning Expectations:
Review:
Recent research suggests that an "attention economy" of sorts will naturally emerge
from information overload, allowing Internet users greater control over their online experience
with particular regard to communication mediums such as e-mail and instant messaging. This
could involve some sort of cost being attached to e-mail messages. For example, managers
charging a small fee for every e-mail received - e.g. $5.00 - which the sender must pay from
their budget. The aim of such charging is to force the sender to consider the necessity of the
interruption.
According to Steve Beller, “I’m defining information overload as a state of having more
information available that one can readily assimilate, that is, people have difficulty absorbing
133
the information into their base of knowledge. This hinders decision-making and judgment by
causing stress and cognitive impediments such as confusion, uncertainty and distraction” [
-“A symptom of the high-tech age, which is too much for one human being to absorb in
an expanding world of people and technology. It comes from all sources including TV,
newspapers, magazines as well as wanted and unwanted regular e-mail and faxes. It has been
exacerbated enormously because of the formidable number of results obtained from web search
engines.”
Lessons Learned
Media like the internet are conducting research to promote awareness of information
overload. In , Kyunghye Kim, Mia Liza A. Lustria, Darrell Burke, and Nahyun Kwon conducted a
study regarding people who have encountered information overload while searching for health
information about cancer and what the impact on them was. The conclusion drawn from the
research discusses how health information should be distributed and that information
campaigns should be held to prevent irrelevant or incorrect information being circulated on the
internet.
Integrative Questions
134
Book: Handbook of Computer Ethics
Chapter 21 : Email Spam
Quote:
E-mail spam has steadily, even exponentially grown since the early 1990s to several
billion messages a day. Spam has frustrated, confused, and annoyed e-mail users.
Learning Expectations:
Often, image spam contains nonsensical, computer-generated text which simply annoys
the reader. However, new technology in some programs try to read the images by attempting
to find text in these images. They are not very accurate, and sometimes filter out innocent
images of products like a box that has words on it.
A newer technique, however, is to use an animated GIF image that does not contain
clear text in its initial frame, or to contort the shapes of letters in the image (as in CAPTCHA) to
avoid detection by OCR tools.
Review:
Spam is legally permissible according to the CAN-SPAM Act of 2003 provided it follows
certain criteria: a truthful subject line; no false information in the technical headers or sender
address; "conspicuous" display of the postal address of the sender; and other minor
requirements. If the spam fails to comply with any of these requirements, then it is illegal.
Aggravated or accelerated penalties apply if the spammer harvested the email addresses using
methods described earlier.
A review of the effectiveness of CAN-SPAM in 2005 showed that the amount of sexually
explicit spam had significantly decreased since 2003 and the total volume had begun to level
off. Senator Conrad Burns, a principal sponsor, noted that "Enforcement is key regarding the
CAN-SPAM legislation." In 2004 less than 1% of spam complied with the CAN-SPAM Act of 2003.
135
Several countries have passed laws that specifically target spam, notably Australia and all the
countries of the European Union.
Lessons Learned
In order to send spam, spammers need to obtain the e-mail addresses of the intended
recipients. To this end, both spammers themselves and list merchants gather huge lists of
potential e-mail addresses. Since spam is, by definition, unsolicited, this address harvesting is
done without the consent (and sometimes against the expressed will) of the address owners. As
a consequence, spammers' address lists are inaccurate. A single spam run may target tens of
millions of possible addresses — many of which are invalid, malformed, or undeliverable.
Integrative Questions
136
Book: Handbook of Computer Ethics
Chapter 22: The Matter of Plagiarism: What, Why, and If
Learning Expectations:
Likewise, professors need to trust their students. They have to have confidence in the
truthfulness of students' statements in class, the honesty of their efforts to learn, and their
trustworthiness in the papers and projects they submit for grading
Review:
Plagiarism is the use or close imitation of the language and ideas of another author and
representation of them as one's own original work.
Plagiarism is not copyright infringement. While both terms may apply to a particular act, they
are different transgressions. Copyright infringement is a violation of the rights of a copyright holder,
when material protected by copyright is used without consent. On the other hand, plagiarism is
concerned with the unearned increment to the plagiarizing author's reputation that is achieved through
false claims of authorship.
Lessons Learned
Generally, although plagiarism is often loosely referred to as theft or stealing, it has not been set
as a criminal matter in the courts.[10] Likewise, plagiarism has no standing as a criminal offense in the
137
common law. Instead, claims of plagiarism are a civil law matter, which an aggrieved person can resolve
by launching a lawsuit. Acts that may constitute plagiarism are in some instances treated as copyright
infringement, unfair competition, or a violation of the doctrine of moral rights. The increased availability
of intellectual property due to a rise in technology has furthered the debate as to whether copyright
offences are criminal.
Integrative Questions
What is the deepen their commitments, and to develop their capacities for service."
138
Book: Handbook of Computer Ethics
Chapter 23: Intellectual Property: Legal and Moral Challenges of Online File Sharing
Quote:
File sharing can be implemented in a variety of storage and distribution models. Current
common models are the centralized server-based approach and the distributed peer-to-peer (P2P)
networks.
Learning Expectations:
Recently, Facebook opened its API to 3rd party developers which has allowed for a new type of
file-sharing service to emerge. Box.net and FreeDrive.com[1] are two examples of companies that have
specific Facebook applications that allow file sharing to be easily accomplished between friends.
Review:
The first generation of peer-to-peer file sharing networks over the Internet had a centralized
server system. This system controls traffic amongst the users. The servers store directories of the shared
files of the users and are updated when a user logs on. In the centralized peer-to-peer model, a user
would send a search to the centralized server of what they were looking for. The server then sends back
a list of peers that have the data and facilitates the connection and download. The server-client system
is efficient because the central directory is constantly being updated and all users had to be registered
to use the program. However, there is only a single point of entry, which could result in a collapse of the
network. In addition, it is possible to have out-of-date information or broken links if the server is not
refreshed.[3]
The first file-sharing programs on the Internet marked themselves by inquiries to a server, either
the data to the download held ready or in appropriate different Peers and so-called Nodes further-
obtained, so that one could download there. Two examples were Napster (today using a pay system)
and eDonkey2000 in the server version (today, likewise with Overnet and KAD - network decentralized).
Another notable instance of peer to peer file sharing, which still has a free version, is Limewire.
139
Lessons Learned
The Internet existed prior to WWIVnet, but it was only available to academic institutions,
governments and large corporations. FidoNet was a hierarchical (server/client) based network thus not
peer-to-peer. WWIVnet was the first widely available distributed network model that you could bring to
your home. That all being said, it did not have the capability to share files built in. It was not until the
introduction of Linker34 by Jayson Cowan did we see the first P2P application over a distributed end
user network.[2] Requests for file lists and specific files where handled by the peer much in the same way
as second generation peer-to-peer file sharing and no central server was used for this process.
Integrative Questions
140
Book: Handbook of Computer Ethics
Chapter 24: Censorship and Access to Expression
Quote:
"Censorship through consensus" is also a real possibility. There are countries where the
adherence to a shared social, though not religious, code is a fact of life. Understanding that entails
discerning where the boundaries of expression are, and where they might be interfered with in a
consensus situation.
Learning Expectations:
To understand censorship, and the impulse to censor, it is necessary to strip away the shock
epithet value that is attached to the word at first utterance.
Review:
Censorship -- the control of the information and ideas circulated within a society -- has been a
hallmark of dictatorships throughout history. In the 20th Century, censorship was achieved through the
examination of books, plays, films, television and radio programs, news reports, and other forms of
communication for the purpose of altering or suppressing ideas found to be objectionable or offensive.
The rationales for censorship have varied, with some censors targeting material deemed to be indecent
or obscene; heretical or blasphemous; or seditious or treasonous. Thus, ideas have been suppressed
under the guise of protecting three basic social institutions: the family, the church, and the state.
One must recognize that censorship and the ideology supporting it go back to ancient times, and
that every society has had customs, taboos, or laws by which speech, dress, religious observance, and
sexual expression were regulated. In Athens, where democracy first emerged, censorship was well
known as a means of enforcing the prevailing orthodoxy. Indeed, Plato was the first recorded thinker to
formulate a rationale for intellectual, religious, and artistic censorship. In his ideal state outlined in The
Republic, official censors would prohibit mothers and nurses from relating tales deemed bad or evil.
Plato also proposed that unorthodox notions about God or the hereafter be treated as crimes and that
formal procedures be established to suppress heresy. Freedom of speech in Ancient Rome was reserved
141
for those in positions of authority. The poets Ovid and Juvenal were both banished, and authors of
seditious writings were punished severely. The emperor Nero deported his critics and burned their
books.
Lessons Learned
Not all censorship is equal, nor does all arise from government or external force. People self-
censor all the time; such restraint can be part of the price of rational dialogue. The artist Ben Shahn's
poster illustration reads: "You have not converted a man because you have silenced him." Silence can
indicate a forced assent, or conversely, it can be contemplative, a necessary part of dialogue that rises
above the din of quotidian life.
Integrative Questions
What is Military censorship is the process of keeping military intelligence and tactics?
What is Religious censorship is the means by which any material objectionable to a certain faith is
removed?
142
THe BoTToM
oF THe
PYRaMiD
143
Book: The Fortune at the Bottom of the Pyramid
Quote:
“Trust is difficult to build after 50 years of suspicion and prejudice based on little
Learning Expectations:
I also expected that the writer may teach use about the potentials of those in the
Review:
Mr. Prahalad says that this market remains untapped because of the dominant logic
held by companies. Companies held that the poor are not a viable market, pricely because they
do not have money to buy nor they can afford their products and services; that the poor do not
have use for their produces; that only developed countries appreciate and can pay for
technological innovations; that BOP market is not critical for long-term growth; and that it is
difficult to recruit managers for BOP markets. But the writer contradicts these assumptions
saying that people comprising the BOP market represent 70% of the population of developing
world with purchasing power parity of about $3 trillion; the poor are getting connected and
networked as they readily accept advanced technology. What is left for the firms is to convert
the poor into consumers . The market development can make services and products
144
affordable, accessible and available to the poor. This means the involvement of the private
sector in the market: resulting to a harmonious relationship between the poor and the private
sector replacing mistrust into trust. And companies through persistent effort and the provision
of world-class quality, mutual trust and responsibility between them and BOP consumers. The
needs of the poor are many and the growth opportunity in this market can only be tapped if
Lessons Learned
The chapter provides insight about the new approach in poverty alleviation. It involves
focusing on the poor who are at the bottom of the pyramid. The approach calls for a
collaboration and partnership between the poor and companies, civil society and private and
public sector.
Integrative Questions
3. What is the dominant logic concerning BOP market held by companies and private sector?
145
Book: The Fortune at the Bottom of the Pyramid
Quote :
“I believe that more innovative, sustainable solutions will increasingly emerge from
serving the BOP markets than from the developed markets ”- C.K. Prahalad
Learning Expectations
I also wish to understand the principles of innovation that are develop for companies
Review:
As he writes, the market development calls for significant forgetting curve in the
organization, this is an ability to discard traditional approaches. He believes that this market
represents an opportunity to create economic value in a fundamentally new way. What is also
interesting to note from the chapter is that the needs of the consumer might not be even
obvious to them nor to the companies. Companies through their managers need to invest in
research to understand the needs of this market. They are gigantic which might surprise them.
In summed, the writer says that companies need a new philosophy of innovation and product
and service delivery to the BOP markets. But companies need to start with zero-based view of
innovations and begin to rethink and re-examine their assumptions. The BOP markets,
according to the writer can serve as catalysts for new burst of creativity.
146
Lessons Learned
There are many lessons that I learned from this chapter. I begin to understand why the
BOP markets are attractive for companies. From the writer we learned that BOP markets
Integrative Questions
147
Book: The Fortune at the Bottom of the Pyramid
Quote:
“ What we see here is the convergence of the traditional roles of the firm and the
Learning Expectations:
I expected that I may learn about the needed approach in engaging the BOP.
Review
Shortage and the cost of capital force firms in BOP markets to be very focused on the
efficiency of capital use. In operating in BOP markets, the companies’ boundaries expand
beyond its legal parameters and begin to engage and empower the large and economically
isolated segment or the informal sectors. Besides working at the BOP enable companies to
learn rapidly that they have to learn to live with a wide variety of relationships with a large
number of institutions. As such the firm had to learn to cope with the differing priorities time
scales, decision cycles and perspectives of both the causes of the problem and the nature and
efficacy of the solution. In the end, these companies learn how to transform their ideals of
good corporate citizenship and social responsibility into their core business of delivering value
on a day-to-day business basis. Private sector involvement in development can be a win for
both the BOP consumers and the private sector. They all learn and flow of ideas, knowledge
148
and innovation will become a two-way street from the developed countries to the developing
countries as well and vice versa. Companies can help BOP markets to develop, and also learn
Lessons Learned:
From this chapter I learned about the role of BOP markets in the global economy. As
pointed out in the chapter, the writer helps me learned the sources of opportunites for
Integrative Questions:
149
Book: “ The Fortune at the Bottom of the Pyramid”
Quote:
“Ultimately the goal in development is to bring as many people as possible to enjoy the
Learning Expectations:
In reading this chapter, I expect to understand the ecosystem for wealth creation.
Review
Market-based ecosystem is defined as a framework that allows private sector and social
actors with different traditions and motivations, varying in sizes and areas of influence to act
together and create wealth in a symbiotic relationship. In the symbiotic relationship each
constituent has a role to play and is dependent of each other. The system adapts and r\evolves
and can be resilient and flexible. While there could be distortions at the margin, the system is
always oriented toward a dynamic equilibrium. The market-based ecosystem provides social
collateral of open and honest entrepreneurship. It provides the tools for the poor and the
disadvantaged to be connected seamlessly with the rest of the world in a mutually beneficial
and non-exploitative way. The ecosystem provides them with skills and opportunity that are
often denied to them. A nodal firm in the ecosystem is that which facilitates the entire
150
functioning of the network. It provides expertise and establishes technical standards for a wide
villages. The impact of the market-based ecosystem and that of the nodal firm is very important
in developing the disciplines of the market that includes: respect for contracts, understanding
mutuality of benefits, being local and at the same time getting the benefits of being national
and global. But most important of all both parties recognized the benefits of transparency in
marketing ecosystem: help the poor understand that there is a win-win situation for them and
the firm by respecting contracts. Respect for the contract must transcends to people everyday.
Market-based ecosystems can be a source of educating the poor of the benefits of transparency
in transactions. Individuals are taught to respect contracts, be they implicit or explicit with the
company. The private sector can reduce the asymmetries in information, choice, ability to
enforce contracts and social standing like using information technology to build a network can
create a powerful motivation to be part of the system; understanding the rationales for the
contracting system: the hows and the whys- reduce the cost of capital and increases access to
capital.
151
Lessons Learned
In reading this chapter, I learned about market-based ecosystem. From this knowledge I
Integrative Questions:
markets?
152
Book: The Fortune at the Bottom of the Pyramid
Quote:
“Corruption is about providing privileged access to resources and recognizing the time
Learning Expectations:
TGC I also expect to learn the different degrees of TGC among countries.
Review:
Transparency results from widely understood and clearly enforced rules. It is the
transactions and the ability to enforce commercial contracts. Specifications for TGC are
fourfold. There is a system of laws that allows for ownership and transfer of property; a clear
process for changing the laws governing property rights; a system of regulations that
accommodates complex transactions; and have institutions that allow the laws to be
implemented fairly, in timely and with transparency. Countries have varying degree of TGC.
There are countries that are arbitrary and authoritarian where laws do not exist; and if exist
are not enforced; countries where laws and institutions of a market economy exist and yet the
country does not reach its potential; and countries with well-developed laws, regulations,
153
institutions and enforcement systems. Access to information and transparency for all
eliminated; speed with which the processes can be completed and trust in the system are the
criteria for working TGC.The specifications for TGC are fourfold: First there should be a system
of laws that allows for ownership and transfer of property; there should be a process for
changing the laws governing property rights that is clear and unambiguous. There should be a
system of regulations that accommodates complex transactions when societies become more
complex. The last requirement is for having institutions that allow the laws to be implemented
Lessons Learned
From this chapter I learned about the importance for governments for transaction
governance capacity for the developing the market economy for BOP. I learned that TGC of
Integrative Questions:
154
Book: The Fortune at the Bottom of the Pyramid
Quote:
“ For the BOP consumers, gaining access to modern technology and good products
designed with their needs in mind enables them to take a huge step in improving their lives”-
C.K. Prahalad.
Learning Expectations:
I expect to learn how these developments impact on the lives of people at the bottom
of the pyramid. In addition it is important what is the ultimate goal of this development in BOP
markets.
Review
In looking at the BOP as a viable and profitable growth market, the writer is positive
about the transformation that will happen with the collaboration between the market and the
private sectors and other players including companies. The development allows the people get
an opportunity to participate in and benefit from the choices of products and services through
market mechanism. Rapid transformation follows because BOP consumers are very
entrepreneurial and can easily imagine ways in which they can use their newly found access to
upgrade themselves. Having access to information, the consumers from the bottom will always
155
look to something better that fits their needs. In transforming BOP into consumer market, the
poor can have an identity. They will have legal identity. This is very important in order to
access the services they need like credit. In the past there has been very little attention given to
Lessons Learned
I learned from this chapter the impact of development of market at the BOP. The
transformation of consumers at BOP is rapid because as I have learned they are very
entrepreneurial.
Integrative Questions:
1. What is the reason for expecting rapid transformation for people at BOP consumers?
156