06
Sep
09

Intercultural Information Ethics

Part 6: Handbook of  information and computer ethics.

Chapter 27

Title: “Intercultural Information Ethics” by

Rafael Capurro

Quote: “The distinction between cognitivism and noncognitivism presupposes that human

emotions have no cognitive value and, vice versa, that human cognition has a truthvalue

if and only if it is free of emotions.”

Expectations:

I expect to learn about the intercultural information ethics.

Book Review:

The author of this chapter is Rafael Capurro.  Rafael discussed the cultural part where intercultural information ethics has been occurred. There were frameworks were the cultured country has been surrounded by the common culture thru experience of existence in the world. They follow some traditions since they were given birth by their ancestors. Computer ethics can be followed in this chapter by means of cultivating  plans or by traditions.

Things I have learned:

I learned that the culture can be affected by means of computer ethics.

Integrity Questions:

1.)    Who is Toru Nishigaki?

2.)    What is culture?

3.)    Who is Terrell Ward Bynum?

4.)    Who is Bernd Frohmann?

5.)    Who is Lorenzo Magnani?

06
Sep
09

The Digital Divide: A Perspective for the Future

Part 6: Handbook of  information and computer ethics.

Chapter 26

Title: “The Digital Divide: A Perspective for the Future” by

Maria Canellopoulou-Bottis and Kenneth Einar Himma

Quote: “In the developing world, poverty and the suffering it causes is considerably

worse. Here poverty is characteristically “absolute” in the sense that people do not

have enough to consistently meet their basic needs.”

Expectations:

I expect to learn about the digital divide which tackles the topic a perspective for the future.

Book Review:

The author of this chapter are Maria Canellopoulou-Bottis and Kenneth Einar Himma.  They discussed the global distribution which will bother some conscientious individuals. Since the rate of money in our country is not consistent, it would suddenly rise or fall. We have to do something about it, to think carefully what to do in the mere future, being an information technology person can be helpful, we can use our knowledge on what we have learned and apply it to our work to be able to make the money growth normal in our country.

Things I have learned:

I learned that the poverty could be such a scary thing if that really happens to us.

Integrity Questions:

1.)    What is poverty?

2.)    What is global distribution?

3.)    How can we lessen the poverty?

4.)    What can we do to help the poor?

5.)    Who is the author of this chapter?

06
Sep
09

The Gender Agenda in Computer Ethics

Part 6: Handbook of  information and computer ethics.

Chapter 25

Title: “The Gender Agenda in Computer Ethics” by

Alison Adam

Quote: “The recognition of continuing differences between men and women lots, at home, in the workplace, and in education, even in societies that have seen considerable opening up of opportunities for women in the space of a generation or so, has been a major force in developing contemporary feminist writing.”

Expectations:

I expect to learn about the gender agenda in computer ethics.

Book Review:

The author of this chapter is Alison Adam.  Based on my understandings, the issue in this chapter is based on gender. It is said that “it is the major way of classifying and

ordering our world has been propounded by a number of authors, mainly, although not

exclusively, writing from a feminist position”. I can say that it is based on the authors, on how they put everything together and make something out of it.

Things I have learned:

I learned that the gender in this chapter is one of the major topic which was discussed.

Integrity Questions:

1.)    What does gender have to do in this chapter?

2.)    What is feminist ethics?

3.)    What are the studies of gender and computer ethics can be related to this chapter?

4.)    Who is the author of this chapter?

5.)    What do we get from this chapter?

06
Sep
09

Censorship and Access to Expression

Part 6: Handbook of  information and computer ethics.

Chapter 24

Title: “Censorship and Access to Expression” by

Kay Mathiesen

Quote: “One might hope that work in law or philosophy might provide the answer.However,

the concept of “censorship” is commonly used in ways that go much beyond the strict

confines of First Amendment law.”

Expectations:

I expect to learn about the cencorship and how to access to expression.

Book Review:

The author of this chapter is Kay Mathiesen.  In this chapter cencorship was discussed, from what I have read, it says that there is no one who wants to be a censor or no one wants to be called as a censor. There are many people who are interested in this topic since it is one of the attraction for them. What does censorship really means, it is the limitation access to a content. Censorship are harmful.

Things I have learned:

I learned that censorship is a really bad thing. Can’t really imagine how bad, but based on my readings they said it is really bad.

Integrity Questions:

1.)    What is censorship?

2.)    Is censorship a bad or a good thing?

3.)    What does censorship do?

4.)    Who is the author of this chapter?

5.)    What do we get from this chapter?

06
Sep
09

Intellectual Property: Legal and Moral Challenges of

Part 5: Handbook of  information and computer ethics.

Chapter 23

Title: “Intellectual Property: Legal and Moral Challenges of

Online File Sharing” by

Richard A. Spinello

Quote: “Lost in the thicket of lawsuits and policy challenges are the ethical issues associated

with the use and distribution of file sharing software.”

Expectations:

I expect to learn about the intellectual property.

Book Review:

The author of this chapter is Richard Spinello. He discussed the file sharing, file sharing can lessen the time where we can transfer files without standing that will cause us our precious time. We just have to use networking to be able to transfer files from a computer to another computer, we can also use email to store files and also to send. We don’t have to use and software to do networking, we just need the internet or a networking cable to be able to transfer files.

Things I have learned:

I learned that the networking can do easier task for us.

Integrity Questions:

1.)    What is networking?

2.)    What is peer to peer network?

3.)    What is sharing or theft?

4.)    What is secondary liability?

5.)    Who is Richard Spinello?

06
Sep
09

The Matter of Plagiarism: What, Why, and If

Part 5: Handbook of  information and computer ethics.

Chapter 22

Title: “The Matter of Plagiarism: What, Why, and If” by

John Snapper

Quote: “As with most ethical concepts, there is plenty of room for debate over the definition of “plagiarism.” Plagiarism will be treated here very broadly as expression that improperly incorporates existing work either without authorization or without documentation,

or both. The emphasis on impropriety is important.”

Expectations:

I expect to learn about the matter of plagiarism.

Book Review:

The author of this chapter is John Snapper.  In this chapter the topic is plagiarism. There are many of us still doesn’t know what plagiarism is, plagiarism is the act of action where we copy other person’s file and claim it as your own work. Plagiarism is not bad, but we have to put the citations where we copied the file itself. Because once the owner of the file sees his or her work which is being used by other people without citations, he or she will surely be furious, because they made use of the file without the permission of the owner.

Things I have learned:

I learned that we have to have the permission of the owner before using the file.

Integrity Questions:

1.)    What is plagiarism?

2.)    What are the concept of plagiarism?

3.)    What do we have to do if we copied other persons file?

4.)    Who is the author of this chapter?

5.)    What is authorization?

06
Sep
09

Email Spam

Part 5: Handbook of  information and computer ethics.

Chapter 21

Title: “Email Spam” by

Keith W. Miller and James H. Moor

Quote: “The conceptual muddles about defining spam have immediate philosophical and

legislative consequences.”

Expectations:

I expect to learn about the importance of email spamming.

Book Review:

The author of this chapter are Keith W. Miller and James H. Moor. They have discussed the importance and the meaning of email spamming. There are lots of us who tends to spam, it can make our email slow, it is very persistent, so we tend to delete all of the files which was spammed to us, to lessen the hassle  during deleting, or reading nonsense email.

Things I have learned:

I learned that spamming can cause hassleness to the one whose email was spammed.

Integrity Questions:

1.)    What is email spamming?

2.)    What are the intensions of other people who tends to spam?

3.)    What are the advantages in spamming?

4.)    What are the disadvantages in spamming?

5.)    What lesson do we get from this chapter?

06
Sep
09

Information Overload

Part 5: Handbook of  information and computer ethics.

Chapter 20

Title: “Information Overload” by

David M. Levy

Quote: “It should hardly be surprising if complaints about a flood, a fire hose, or a

blizzard of information are not only common but increasing.”

Expectations:

I expect to learn about the information overload.

Book Review:

The author of this chapter is David Levy. Some of us does not know that there are limitations for information sending or receiving, it is called information overload. We tend to get information from the internet. For what I know, the most famous search engine is the google, almost everybody get information in google, but for articles, there are lots of us uses Wikipedia, but Wikipedia cannot be trusted since there are most of us use Wikipedia as pranks and put false information.

Things I have learned:

I learned that the information overload has its limitations.

Integrity Questions:

1.)    What is information overload?

2.)    What is information?

3.)    What’s the difference between perception and reality?

4.)    Who is David Lewy?

5.)    What is the history of information overload?

06
Sep
09

Regulation and Governance of the Internet

Part 5: Handbook of  information and computer ethics.

Chapter 19

Title: “Regulation and Governance of the Internet” by

John Weckert and Yeslam Al-Saggaf

Quote: “There are at least two different questions involved in the governance of the Internet: who, if anybody should be in charge, and what, if anything, should be governed or regulated.”

Expectations:

I expect to learn about the regulating and governance of the internet.

Book Review:

The author of this chapter are John Weckert and Yeslam Al-Saggaf.  They discussed the internet governance. According to them “Internet governance is the development and application by Governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programs that shape the evolution and use of the Internet” for this statement, I can say that internet governance is somehow been able to help us thru our decision making.

Things I have learned:

I learned that the internet governance is the aid to our decision making.

Integrity Questions:

1.)    What is internet governance?

2.)    What WGIG?

3.)    What is ICANN?

4.)    What is W3C?

5.)    What is IAB?

06
Sep
09

A Practical Mechanism for Ethical Risk

Part 4: Handbook of  information and computer ethics.

Chapter 18

Title: “A Practical Mechanism for Ethical Risk

Assessment — A SoDIS Inspection” by

Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan

Quote: “Informaticians have been evolving and refining techniques to mediate risks of

developing software products that meet the needs of their clients.”

Expectations:

I expect to learn about the practical mechanism for ethical risk assessment.

Book Review:

The author of this chapter are Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan.  Risk management is the main point here in this chapter. Since all of us is in need of budget, we tend to to everything to gain money, to be able to raise money, we have to have money, in a company, risk management is important, we have to monitor the risk management to lessen the negativity of the company’s profile or the company’s image.

Things I have learned:

I learned that the risk management is important in a company to raise the its name.

Integrity Questions:

1.)    What is risk?

2.)    What is risk management?

3.)    How do we get profit?

4.)    Who is the author of this chapter?

5.)    What do we get from this chapter?




April 2024
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930