cAmz’s Weblog

TITLE: Intercultural Information Ethics (Chapter 27)

AMAZON LINK: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233232091&sr=1-1

QUOTATION: The global distribution of material resources should bother any conscientious person.

LEARNING EXPECTATIONS:

–          I want to know what it is about foundational debate.

–          I want to understand the impact of ICT on local cultures from an IEE perspective.

–          I want to learn more about intellectual property.

REACTION:

This chapter is about the intercultural information ethics which covers theoretical and practical aspects of information ethics from an intercultural perspective. For the reason, some of our skills and knowledge today are based from technology and developed through technology itself. That’s also why we always clearly see the effects or the impact or having technology in our present life. And I do believe that in this coming years technology will continue to develop and evade the society, industry and people as well.

I believe that the impact of information technology on a global scale and on all aspects of human life gives, on the one hand, a plausible argument in favour of the uniqueness approach not only with regard to the subject matter but also to the theoretical approaches so far. But this does not mean that, on the other hand, the moral code itself and its ethical reflection will be superseded by another one.

The basic question concerning the status of moral persons, their respect or disrespect, remains unchanged although we may discuss as to what are the candidates and what this respect means in a specific situation. We may also discuss as to how this code has been interpreted (or not) within different ethical and cultural traditions and how it is being conceived with regard to the challenge of information technology.

It is true enough that Intercultural information ethics addresses questions concerning these intersections such as: How far is the Internet changing local cultural values and traditional ways of life? How far do these changes affect the life and culture of future societies in a global and local sense? Intercultural information ethics can be conceived as a field of research where moral questions of the “infosphere” are reflected in a comparative manner on the basis of different cultural traditions.

LESSON LEARNED:

–          With regard to IIE issues in today’s information societies, there are a lot of cultures that have not been analyzed, such as Eastern Europe and the Arabic world.

–           In a narrow sense it focuses on the impact of information and communication technology (ICT) on different cultures as well as on how specific issues are understood from different cultural traditions.

INTEGRATIVE QUESTIONS:

1.       What is information ethic?

2.       What is intercultural information ethic?

3.       Do we all have the same information ethic?

4.       What is IIE?

5.       What is ICT?

TITLE: The Digital Divide: A Perspective for the Future (Chapter 26)

AMAZON LINK: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233232091&sr=1-1

QUOTATION: Bridge across the digital divide will just lead poor people into consumerist quicksand.

LEARNING EXPECTATIONS:

–          To know the bidirectional relationship between absolute poverty and digital and information divides.

–          To know the moral basis for the idea that the various digital divides should be eliminated.

–          To know the empirical skepticism about the relationship between digital divides and absolute poverty.

REACTION:

According to this chapter, the global distribution of material resources should bother any conscientious person. In the developing world, poverty and the suffering it causes is considerably worse. People in absolute poverty lack consistent access to adequate nutrition, clean water, and health care, as well as face death from a variety of diseases that are easily cured in affluent nations.

This The digital divide is not any one particular gap between rich and poor, local and global, but rather includes a variety of gaps believed to bear on the world’s inequitable distribution of resources. Not that global and local poverty are problems of many dimensions that are extremely difficult to solve, but rather that the moral importance of the digital divide as a problem that needs to be addressed is linked to inequalities between the rich and the poor-and especially wealthy nations and nations in absolute poverty. Which means that it is true enough that Worldwide computerized reservation network used as a single point of access for reserving airline seats, hotel rooms, rental cars, and other travel related items by travel agents, online reservation sites, and large corporations.

This chapter also discussed about poverty, Poverty is the state for the majority of the world’s people and nations. Why is this? Is it enough to blame poor people for their own predicament? Have they been lazy, made poor decisions, and been solely responsible for their plight? What about their governments? Have they pursued policies that actually harm successful development? Such causes of poverty and inequality are no doubt real. But deeper and more global causes of poverty are often less discussed.

Behind the increasing interconnectedness promised by globalization are global decisions, policies, and practices. These are typically influenced, driven, or formulated by the rich and powerful. These can be leaders of rich countries or other global actors such as multinational corporations, institutions, and influential people.

LESSON LEARNED:

–          People in absolute poverty lack consistent access to adequate nutrition, clean water, and health care, as well as face death from a variety of diseases that are easily cured in affluent nations.

–          The digital divide is not any one particular gap between rich and poor, local and global, but rather includes a variety of gaps believed to bear on the world’s inequitable distribution of resources.

–          Not that global and local poverty are problems of many dimensions that are extremely difficult to solve, but rather that the moral importance of the digital divide as a problem that needs to be addressed is linked to inequalities between the rich and the poor-and especially wealthy nations and nations in absolute poverty.

INTEGRATIVE QUESTIONS:

  1. What is the meaning of “digital” in this chapter?
  2. What is the situation with world poverty today?
  3. What is important in terms of “bridging” the information gap?
  4. What is the relationship between the inequality produced by the digital divide and the inequalities we have known for centuries?
  5. Is it true that efforts to bridge the digital divide may have the effect of locking developing countries into a new form of dependency?

TITLE: The Gender Agenda in Computer Ethics (Chapter 25)

AMAZON LINK: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233232091&sr=1-1

QUOTATION: Gender issues is about men and women issues for most, and to this issues most of the times women are always compared to men in terms of abilities, knowledge and techniques/ ways as to how they deal with things, or even with life.

LEARNING EXPECTATIONS:

–          I want to learn more about Gender Agenda in Computer Ethics.

–          I want to know what is feminist ethics,

–          I want to understand what gender and ethics studies are.

–          I want to know which better Quantitative Versus Qualitative Research Methodologies is.

–          I want to know what ethical behavior is.

REACTION:

This chapter proves that it is true enough that when it comes to gender issues or agenda, most of the people in the society do argue well, depending on the case to be argued. But I can say that gender issues/ agenda are one of the best issues arising in the society and even in the cloud. Meaning opinions, ideas and the like are really arising when it comes to this topic. We all know that gender issues is about men and women issues for most, and to this issues most of the times women are always compared to men in terms of abilities, knowledge and techniques/ ways as to how they deal with things, or even with life.

According to the author, for centuries, the differences between men and women were socially defined and distorted through a lens of sexism in which men assumed superiority over women and maintained it through domination. As the goal of equality between men and women now grows closer we are also losing our awareness of important differences. In some circles of society, politically correct thinking is obliterating important discussion as well as our awareness of the similarities and differences between men and women. The vision of equality between the sexes has narrowed the possibilities for discovery of what truly exists within a man and within a woman. The world is less interesting when everything is same.

The different concepts are discussed through recognizing, understanding, discussing as well as acting skillfully in light of the differences between men and women can be difficult. Our failure to recognize and appreciate these differences can become a lifelong source of disappointment, frustration, tension and eventually our downfall in a relationship. Not only can these differences destroy a promising relationship, but most people will grudgingly accept or learn to live with the consequences. Eventually they find some compromise or way to cope. Few people ever work past these difficulties. People tend to accept what they don’t understand when they feel powerless to change it.

It discussed the information and computer ethics has emerged as an important area of philosophical and social theorizing, combining conceptual, meta-ethical, normative, and applied elements. As a result, academic interest in this area has increased dramatically, particularly in computer science, philosophy, and communications departments; business schools; information and library schools; and law schools.

LESSON LEARNED:

–          Computer ethics is a new area of applied ethics with a rapidly burgeoning portfolio of ethical case studies and problems.

–          Care ethics is a cornerstone of most approaches toward feminist ethics.

–          Gender and computer ethics include work on women’s under representation in the computing profession.

INTEGRATIVE QUESTIONS:

  1. What is ethical behavior?
  2. What is feminist ethics?
  3. Are Hacker Communities Egalitarian?
  4. What might “feminist computer ethics” offer feminist ethics?
  5. What is gender and computer ethics – a male0female binary?

TITLE: Censorship and Access to Expression (Chapter 24)

AMAZON LINK: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233232091&sr=1-1

QUOTATION: To censor is to restrict or limit access to an expression, portion of an expression, or category of expression, which has been made public by its author, based on the belief that it will be a bad thing if people access the content of that expression.

“Censorship through consensus” is also a real possibility. There are countries where the adherence to a shared social, though not religious, code is a fact of life. Understanding that entails discerning where the boundaries of expression are, and where they might be interfered with in a consensus situation.

LEARNING EXPECTATIONS:

–          I want to know more about Censorship and Access Expression.

–          I want to understand what the interest to access in expression is.

–          I want to know further how this chapter defined censorship.

–          I want to be familiar to the types and harm arguments about censorship.

–          I want to know the importance of censorship.

REACTION:

Censorship — the control of the information and ideas circulated within a society — has been a hallmark of dictatorships throughout history. In the 20th Century, censorship was achieved through the examination of books, plays, films, television and radio programs, news reports, and other forms of communication for the purpose of altering or suppressing ideas found to be objectionable or offensive. The rationales for censorship have varied, with some censors targeting material deemed to be indecent or obscene; heretical or blasphemous; or seditious or treasonous. Thus, ideas have been suppressed under the guise of protecting three basic social institutions: the family, the church, and the state.

One must recognize that censorship and the ideology supporting it go back to ancient times, and that every society has had customs, taboos, or laws by which speech, dress, religious observance, and sexual expression were regulated. In Athens, where democracy first emerged, censorship was well known as a means of enforcing the prevailing orthodoxy. Indeed, Plato was the first recorded thinker to formulate a rationale for intellectual, religious, and artistic censorship. In his ideal state outlined in The Republic, official censors would prohibit mothers and nurses from relating tales deemed bad or evil. Plato also proposed that unorthodox notions about God or the hereafter be treated as crimes and that formal procedures be established to suppress heresy. Freedom of speech in Ancient Rome was reserved for those in positions of authority. The poets Ovid and Juvenal were both banished, and authors of seditious writings were punished severely. The emperor Nero deported his critics and burned their books.

A policy of banning literature and works outweighs the positive effects. Restricting a child’s ability to reach their full intellectual potential is not worth the small chance that the music industry, media, and books can possibly have an effect on a child’s personality, attitude, or behavior. It is also evident that even though schools, churches, the media, parents, and the music industry have the power to control what the youth is exposed to do not mean that it is in the best interest of the child or young teenager to be protected.

LESSON LEARNED:

–          We have to ask ourselves what in actual practice would be the consequences of having policies in place that restrict access.

–          The slippery slope maybe an actual and not just a conceptual possibility, if human beings in fact tend not to be so good at distinguishing material they personally dislike from that which is harmful.

INTEGRATIVE QUESTIONS:

1.       What is religious censorship which any material objectionable to a certain faith is removed?

2.       What is moral censorship?

3.       Is the removal of materials that are obscene or otherwise morally questionable?

4.       What is political censorship?

5.       What is military censorship is the process of keeping military intelligence and tactics?

TITLE: Intellectual Property: Legal and Moral Challenges of Online File Sharing (Chapter 23)

AMAZON LINK: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233232091&sr=1-1

QUOTATION: File sharing can be implemented in a variety of storage and distribution models. Current common models are the centralized server-based approach and the distributed peer-to-peer (P2P) networks.

LEARNING EXPECTATIONS:

–          I want to know more about Intellectual property.

–          I want to know what are the legal and moral challenges of online file sharing.

–          I want to distinguish which is better sharing or theft.

–          I want to know what secondary liability is.

REACTION:

This chapter talks about more of intellectual property and online file sharing. First, we all know that networks can allow computers, servers, and other devices to talk to each other. There are a number of different types of networks, and it’s important to find the right one to fit your needs so that you don’t waste time and money with one that is too complex for your needs, or one that doesn’t fulfill your needs. And so through network we can say that having peer to peer network connection millions of users

The first generation of peer-to-peer file sharing networks over the Internet had a centralized server system. This system controls traffic amongst the users. The servers store directories of the shared files of the users and are updated when a user logs on. In the centralized peer-to-peer model, a user would send a search to the centralized server of what they were looking for. The server then sends back a list of peers that have the data and facilitates the connection and download. The server-client system is efficient because the central directory is constantly being updated and all users had to be registered to use the program. However, there is only a single point of entry, which could result in a collapse of the network. In addition, it is possible to have out-of-date information or broken links if the server is not refreshed.

The first file-sharing programs on the Internet marked themselves by inquiries to a server, either the data to the download held ready or in appropriate different Peers and so-called Nodes further-obtained, so that one could download there. Two examples were Napster (today using a pay system) and eDonkey2000 in the server version (today, likewise with Overnet and KAD – network decentralized). Another notable instance of peer to peer file sharing, which still has a free version, is Limewire.

LESSON LEARNED:

–          “Code is law,” and given the great power of software code as a logical constraint, software providers have a moral obligation to eschew the temptations of writing antiregulatory code.

–          “Purposeful, culpable expression and conduct” must be evident in order to impose legal liability under this sensible standard

INTEGRATIVE QUESTIONS:

  1. Why file-sharing enables people to share files?
  2. What feature allows you to access and share files?
  3. Is there a private sharing file?
  4. What is Peer to Peer file sharing?
  5. What are the technologies to use in file sharing?

TITLE: The Matter of Plagiarism: What, Why, and If (Chapter 22)

AMAZON LINK: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233232091&sr=1-1

QUOTATION: The right of placing its will in any and every thing, which thing is thereby mine

LEARNING EXPECTATIONS:

–          I want to know the matter of Plagiarism.

–          I want to understand the lack of authorization-economic Foundation means.

–          I want to estimate the lack of authorization—natural or moral rights means

–          I want to know lack of accreditation—non fringing plagiarism.

–          I want to know a personal vie of the matter means.

REACTION:

According to the Merriam-Webster Online Dictionary, to “plagiarize” means: to steal and pass off (the ideas or words of another) as one’s own to use (another’s production) without crediting the source; to commit literary theft; to present as new and original an idea or product derived from an existing source. In other words, plagiarism is an act of fraud. It involves both stealing someone else’s work and lying about it afterward. That’s why it is true enough that many people think of plagiarism as copying another’s work, or borrowing someone else’s original ideas. But terms like “copying” and “borrowing” can disguise the seriousness of the offenses.

Plagiarism is the use or close imitation of the language and ideas of another author and representation of them as one’s own original work. Plagiarism is not copyright infringement. While both terms may apply to a particular act, they are different transgressions. Copyright infringement is a violation of the rights of a copyright holder, when material protected by copyright is used without consent. On the other hand, plagiarism is concerned with the unearned increment to the plagiarizing author’s reputation that is achieved through false claims of authorship.

Within academia, plagiarism by students, professors, or researchers is considered academic dishonesty or academic fraud and offenders are subject to academic censure, up to and including expulsion. In journalism, plagiarism is considered a breach of journalistic ethics, and reporters caught plagiarizing typically face disciplinary measures ranging from suspension to termination.

Some individuals caught plagiarizing in academic or journalistic contexts claim that they plagiarized unintentionally, by failing to include quotations or give the appropriate citation. While plagiarism in scholarship and journalism has a centuries-old history, the development of the Internet, where articles appear as electronic text, has made the physical act of copying the work of others much easier, simply by copying and pasting text from one web page to another.

LESSON LEARNED:

–          The achievements of the “open source” software community, and we may note the viability of pirate organizations that ignore copyright policies.

–          Failure to have authorization is typically theft of intellectual property, most commonly a copyright infringement that deprives a copyright owner of income.

–          Plagiarism can be unintentional, both when there is a failure to authorize and when there is a failure to document.

INTEGRATIVE QUESTIONS:

  1. How to deepen their commitments, and to develop their capacities for service?
  2. Is it realistic to expect that he or she won’t do so later?
  3. Why does plagiarism matter?
  4. Is anyone really hurt by it?
  5. Is Plagiarism important?

TITLE: Email Spam (Chapter 21)

AMAZON LINK: http://www.amazon.com/Handbook-Information-Computer-Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233232091&sr=1-1

QUOTATION: E-mail spam has steadily, even exponentially grown since the early 1990s to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail users.

LEARNING EXPECTATIONS:

–          I want to know what email spam is.

–          I want to understand how searching for a characterization of “spam” was done.

–          I want to determine the number of identical email sent.

–          I want to know what Unsolicited Commercial Bulk Emails (UCBE) is.

–          I want to know the ethics of reducing the number of spam emails read after they are sent.

REACTION:

E-mail addresses are collected from chat rooms, websites, newsgroups, and viruses which harvest users’ address books, and are sold to other spammers. Much of spam is sent to invalid e-mail addresses. ISPs have attempted to recover the cost of spam through lawsuits against spammers, although they have been mostly unsuccessful in collecting damages despite winning in court.

Spam is legally permissible according to the CAN-SPAM Act of 2003 provided it follows certain criteria: a truthful subject line; no false information in the technical headers or sender address; “conspicuous” display of the postal address of the sender; and other minor requirements. If the spam fails to comply with any of these requirements, then it is illegal. Aggravated or accelerated penalties apply if the spammer harvested the email addresses using methods described earlier.

A review of the effectiveness of CAN-SPAM in 2005 showed that the amount of sexually explicit spam had significantly decreased since 2003 and the total volume had begun to level off. Senator Conrad Burns, a principal sponsor, noted that “Enforcement is key regarding the CAN-SPAM legislation.” In 2004 less than 1% of spam complied with the CAN-SPAM Act of 2003.

Several countries have passed laws that specifically target spam, notably Australia and all the countries of the European Union.

Article 13 of the European Union Directive on Privacy and Electronic Communications (2002/58/EC) provides that the EU member states shall take appropriate measures to ensure that unsolicited communications for the purposes of direct marketing are not allowed either without the consent of the subscribers concerned or in respect of subscribers who do not wish to receive these communications, the choice between these options to be determined by national legislation.

LESSON LEARNED:

–          Spam has rapidly spread to many forms of electronic communication.

–          An email that is from an unsolicited, commercial, bulk emailing, often considered spam, may provide a receiver with just the information that he/she does want.

–          Email, such as email informing someone that he/she is fired, is unwanted but not spam.

INTEGRATIVE QUESTIONS:

  1. What is gathering addresses?

2.       How to deliver spam messages?

3.       How to find Using Webmail services?

4.       Why other people’s computers?

5.       How to open relays?