You are on page 1of 117

Ethics

Reader

Ultimately, the goal in development is to bring as many people as


possible to enjoy the benefits of an inclusive market. Transaction
governance capacity is a prerequisite. The market based ecosystem By:
might provide us an approach to building the basic infrastructure for
inclusion of BOP consumers. It also allows large firms to build new and
JomelGamba
profitable growth markets. – CK Prahalad

This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0


Philippines License.
Dedication

To my loving and supportive parents

Noel and Grace Gamba

To my inexplicable brother

Joel Gamba

To my friends

And everyone that

Made an impact on my life

And influenced me to be

What I am now

2
Table of Contents

Fortune at the bottom of the pyramid

Market at the bottom of the pyramid………………………………………………………………………….6

Product and Services at the bottom of the pyramid………………………………………8

BOP: A global opportunity……………………………………………………………………………………………………10

The ecosystem for wealth creation………………………………………………………………………………12

Reducing Corruption: Transaction Governance Capacity……………………………14

Development as Social Transformation………………………………………………………………………16

The Handbook of information and computer ethics

Foundations of Information Ethics…………………………………………………………………………….18

Milestones in the History of Information and Computer Ethics………20

Moral methodology and information technology……………………………………………….22

Value Sensitive design and information system…………………………………………….24

Personality-base, rule-utilitarian, and Lockean Justifications of


Intellectual property ………………………………………………………………………………………………………….26

Informational Privacy: Concepts, Theories, and Controversies………28

Online anonymity………………………………………………………………………………………………………………………….30

Ethical issues involving computer security: hacking, hacktivism,


and computer hacking……………………………………………………………………………………………………………….32

Information ethics and library profession……………………………………………………….34

Ethical interest in free and open source software………………………………….36

Internet research ethics: the field and critical issues……………………38

3
Health information technology: Challenges in Ethics, Science, and
uncertainty…………………………………………………………………………………………………………………………………………40

Ethical issues of information and business…………………………………………………….42

Responsibilities for Information on the internet…………………………………….44

Virtual Reality and Computer simulation………………………………………………………………46

Genetic Information: Epistemological and Ethical Issues……………………48

The ethics of Cyber Conflict……………………………………………………………………………………………50

A practical mechanism for ethical risk assessment – A SoDIS


inspection………………………………………………………………………………………………………………………………………….52

Regulation and Governance on the internet……………………………………………………….54

Information Overload…………………………………………………………………………………………………………………56

Email Spam………………………………………………………………………………………………………………………………………….58

The matter of plagiarism: What, why, and if………………………………………………….60

Intellectual property: Legal and moral challenges of online file


sharing………………………………………………………………………………………………………………………………………………….62

Censorship and Access to expression…………………………………………………………………………64

The gender agenda in computer ethics………………………………………………………………………66

The digital divide: A perspective for the future…………………………………….68

Intercultural information ethics……………………………………………………………………………….70

Other Articles

Auctioning Virginity…………………………………………………………………………………………………………………72

10 things learned from CK Prahalad……………………………………………………………………………74

Ethics 101 – John C. Maxwell……………………………………………………………………………………………75

There’s no such thing as “Business Ethics” – John C. Maxwell………77

4
Ethics and College Student Life – Kenneth A. Strike |
Pamela A. Moss…………………………………………………………………………………………………………………………………79

12 Principles of Innovation – Unilab………………………………………………………………………81

CASAS Bahia – 20 integrative questions…………………………………………………………………84

CASAS Bahia – 12 innovation principles…………………………………………………………………86

IEEE……………………………………………………………………………………………………………………………………………………………87

ICCI Bank………………………………………………………………………………………………………………………………………………89

ITC e-choupal……………………………………………………………………………………………………………………………………91

Jaipur Foot case study……………………………………………………………………………………………………………93

Hindustan Lever Limited case study……………………………………………………………………………95

Book of Eli – movie review…………………………………………………………………………………………………98

Voxiva case study…………………………………………………………………………………………………………………………99

Copyright, Privacy, and Anonymity……………………………………………………………………………101

Bahnsen’s basic training defending the faith part 1……………………………102

Bahnsen’s basic training defending the faith part 2……………………………104

Bahnsen’s basic training defending the faith part 3……………………………106

Authority of God’s law today…………………………………………………………………………………………108

Transcendental Argument for the existence of God……………………………………110

EFF issues…………………………………………………………………………………………………………………………………………112

5
The Fortune at the bottom of the Pyramid

Chapter: The market at the bottom of the pyramid

Amazonlink:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

What I expect to learn:

 To learn what is the market at the bottom of the pyramid

Quote:

“MNCs (Multi National Companies) often assume that the default rate among the poor is likely
to be higher than that of the rich customers. The opposite is often true. The poor pay on time
and default rates are very low. In the case of ICICI Bank, out of a customer base of 200,000 the
default rate is less than 1 percent. The default rate at Grameen Bank, a microfinance pioneer in
Bangladesh, is less than 1.5 percent among 2,500,000 customers. The lessons are clear.
Through persistent effort and the provision of world-class quality, private-sector businesses can
create mutual trust and responsibility between their companies and BOP customers. Trust is
difficult to build after 50 years of suspicion and prejudice based on little evidence and strong
stereotyping.”

Book Review:

This chapter by C.K. Prahalad gives a brief overview on the purpose of this book. The
author emphasizes that we should stop looking at the poor as the unfortunate, instead we
should look consider them as profit opportunities. We might think that this is just about taking
advantage of the poor, but the truth is that we are promoting the social responsibility as
humans.

We should stop the belief that poor people are nuisance and instead we should look at
them as opportunity for a business to increase market sales. The key is proper pricing,
companies should price their products low enough for the BOP to buy but not so low that they’ll
lose money. BOP dictates if a company will survive or not because they are the largest group of
population, so basically the company that is able to get the interest of the BOP will have the
biggest sales. We should keep in mind that we should treat everyone as customers and that
includes the bottom of the pyramid, the poor people.

6
What I have learned:

 I learned about what is the bottom of the pyramid

Integrative Question:

1. Is there a fortune at the bottom of the pyramid?

2. Who are the people the people that is considered as the bottom of the pyramid?

3. What are the benefits of organizations that will do business with the bottom of the
pyramid?

4. How can an organization start to conduct business at the bottom of the pyramid?

5. Why is investing at this business strategy a good or a bad move?

7
The Fortune at the bottom of the Pyramid

Chapter: Product and services for the bottom of the pyramid

Amazon link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

What I expect to learn:

 To learn the products and services that are in-demand at the bottom of the pyramid to
ensure high profit

Quote:

“It might appear that the new philosophy of innovation for the BOP market requires too many
changes to the existing approach to innovation for developed markets. It does require
significant adaptation, but all elements of innovation for the BOP described here might not
apply to all businesses. Managers need to pick and choose and prioritize. Although effective
participation requires changes to the philosophy of innovation, I argue that the pain of change
is worth the rewards that will be reaped from the BOP as well as from traditional markets.”

Book Review:

This chapter discussed about what the BOP wants, needs, and what the MNCs need to
do so that the BOP will purchase their products and services. The wants and needs by the BOP
are the practical products that they could use, something that is important in everyday life. Ten
years ago, cell phones are luxury items, only people from the upper middle class and above
could avail these products, but looking at the present scenario, cell phones became a necessity,
and these became our primary tool for communication because of its mobility and ease of use.
Everyone could now procure cell phones for as low as one thousand pesos or lesser for second
hand phones, I remember in our community service, we went to a community which belongs to
the BOP, people who earn below the standard salary, most of them own at least one cell phone
unit. Now we see that cell phones companies could still sell their old models for a low price to
the BOP, giving MNCs sales instead of just trashing the old cell phone models.

The key for MNCs to succeed is educating the BOP on how to use their products, most
people at the BOP are illiterate so most cases, and they don’t purchase products that they don’t
know how to use, because they cannot understand the instructions inscribed on the product’s
user manual. MNCs should be patient enough to teach the BOP about their products, doing

8
product shows to introduce their product to the market, and make their prices reasonable for
the product they sell.

What I have learned:

 I learned the basic things needed to know if you want to do business at the bottom of
the pyramid

Integrative Question:

1. What is the BOP?

2. What is Hybrid Solution?

3. Is using old technologies effective in the BOP?

4. Is hybrid solution able to help the need of the BOP market?

5. Are low prices the most important factor for the BOP market?

9
The Fortune at the bottom of the Pyramid

Chapter: Bottom of the pyramid: A Global Opportunity

Amazon link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

What I expect to learn:

 To learn the advantages and disadvantages of globalizing BOP strategy

Quote:

“The more interesting lesson for MNCs from operating in the BOP market is about costs-for
innovation, distribution, manufacturing, and general ‘costs of organization’. Because the BOP
forces an extraordinary emphasis on price performance, firms must focus on all elements of
costs. Shortage and the cost of capital force firms in BOP markets to be very focused on the
efficiency of capital use. MNCs tend to impose their management systems and practices on
BOP markets and find that it is hard to make a profit. The choices are simple: Change the
management systems to cut costs or lose significant amounts of money.”

Book Review:

This chapter gave several examples of BOP markets that are now globalized. An
example is a salt that is sprayed with iodine coated with chemical that could prevent spoilage
on transportation of the salt and distribution of them.

The reasons why there are global opportunity on the BOP? 1) BOP markets are large,
no doubt about that; 2) innovations can be made on the BOP 3) BOP markets can change can
influence how the MNCs think about doing business. This chapter already mentioned several
MNCs doing innovations to help the BOP and still make money, hopefully in the next few years,
more MNCs will follow the steps of the MNCs mentioned and improve their products and make
it affordable to the BOP who is the largest number of consumers.

What I have learned:

 I learned that when BOP strategy is globalized will change the world radically

10
Integrative Question:

1. What are the two ways in attracting the BOP?

2. What are the local growth opportunities?

3. What does Capital Intensity means?

4. Could we apply BOP strategy in the global market?

5. What are the standards of innovation for BOP?

11
The Fortune at the bottom of the Pyramid

Chapter: The Ecosystem for Wealth Creation

Amazon link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

What I expect to learn:

 To learn the advantages and disadvantages of globalizing BOP strategy

Quote:

“Ultimately, the goal in development is to bring as many people as possible to enjoy the
benefits of an inclusive market. Transaction governance capacity is a prerequisite. The market
based ecosystem might provide us an approach to building the basic infrastructure for inclusion
of BOP consumers. It also allows large firms to build new and profitable growth markets.”

Book Review:

In this chapter, ecosystem is defined as a system which consists of a wide variety of


institutions coexisting and completing each other. As we all know, ecosystem is like a chain,
wherein every member of the ecosystem has a specific role to perform for the ecosystem to be
successful. The idea of ecosystem has been used to illustrate the market-oriented ecosystem.
The market-based ecosystem is a framework that allows private sector and social actors. In
market-based ecosystem, which these two acts together to create wealth and relationship, just
like in ecosystem, which in all paths of life, everything has a part to play.

Based on C.K. Prahalad’s interview on the one Shakti Amma, the market-based
ecosystem imposes a solid symbiotic relationship between the large firms and the BOP
consumers. They too are “little entrepreneurs” that directly help companies to expand their
business to the less-fortunate sector. The Shakti Amma is very loyal to her company because
she loves what she is doing. It also increases her social status in her community because people
see her as a distributor of goods as well as an educator.

What I have learned:

 Reducing inequalities in contracts

 The essence of maturation model

12
 To maintain a good relationship between your employer and co-workers will give you
economic benefits

 The ecosystem for wealth creation

Integrative Question:

1. What is a market-based ecosystem?

2. What are the two-sectors that a market-based ecosystem allows?

3. What kind of relationship does the market-based ecosystem creates?

4. What does encourage people to be loyal to their company?

5. How does education help BOP to expand the market?

13
The Fortune at the bottom of the Pyramid

Chapter: Transaction governance capacity

Amazon link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

What I expect to learn:

 To learn how to reduce corruption through BOP

Quote:

“Corruption, as we said, is a market for privileged access. It thrives in a system that


allows for opaque decision-making. The cost of being inside the system will decrease only if
governments tackle the issues of access, and transparency and recognize the changes needed
in both the regulations and the laws. The experiment in Andhra Pradesh is one example of how
digital technologies can be used to creatively enhance TGC (transaction governance capacity)
through better access and transparency.”

Looking at the 3rd-world countries in the world, we could see that they are actually rich
in resources, mentioned in this book as “trapped resources” by Prahalad. These resources of
unrealized wealth are actually a result of inadequate rules and regulatory organizations. Laws
and government agencies may actually already exist but any enforcement is limited to those
who don’t have connection to those in power. The main goal in getting the private corporations
and the BOP to work together is creating a win-win situation wherein private corporations gain
profit, while poverty is lessened. For private sectors to achieve this, they must innovate wherein
they could satisfy the needs of the BOP and still gain profits.

Book Review:

This chapter discussed about corruption being an evasive adversary. It will try to bail
itself out just to continue on feeding on people’s money. Information technology is one of
corruption arch-rival. The project eSeva has made gigantic strides into repelling corruption. It
still is a work in progress, but the promises are very delighting. They have turned the
government-centric system into a citizen-centric system, this way, people have easy access to
what they need from the government.

What I have learned:

 The Andhra Pradesh e-Governance Story

14
 Guiding principles of the CGG in Andhra Pradesh

 The good governance model

 Building transaction governance capacity (TGC)

Integrative Question:

1. What is TGC?

2. Are the poor really poor?

3. Is the lack of natural resources the reason why a country is poor?

4. How can we reduce poverty?

5. In what way does IT industry could stop or at least reduce corruption?

15
The Fortune at the bottom of the Pyramid

Chapter: Development as Social Transformation

Amazon link:

http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506

What I expect to learn:

 To learn development as a social transformation

Quote:

“How will these changes impact life at the BOP? As BOP consumers get an opportunity
to participate in and benefit from the choices of products and services made available through
market mechanisms, the accompanying social and economic transformation can be very rapid.
The reason for this is that BOP consumers are very entrepreneurial and can easily imagine ways
in which they can use their newly found access to information, choice and infrastructure.”

Book Review:

This chapter is about being a developed country. In order for a country to be developed,
everyone must contribute. This may be the reason why our country which is the most
developed country in the Southeast Asia region several years ago still remains as a 3 rd-world
country while our neighboring countries are well developed like Singapore and Malaysia. There
is no unity, some do protest on the street, others don’t, but 24 years ago, our country showed
the world that we can unite and protest to demand resignation of a corrupt president and
protect our rights. And now, do we still need to wait for another martial law to be united? Why
can’t we be united in improving our country and not just for overthrowing some corrupt official?

On this chapter, it was mentioned that there is this capability in order to become
profitable by way of staying or targeting the BOP. But the question is how will we earn money
and encourage them to buy our products or services. With all the advancement in technology, I
believe it will not be too difficult for us to innovate to lessen its cost with no depreciation in
quality.

What I have learned:

16
 The transactions at the private sector and the BOP

 Identity for the individual

 The real test: from pyramid to diamond

 Breaking down the barriers to communication

Integrative Question:

1. Is there a need to check and balance? Why or why not?

2. Is innovation needed in the BOP market?

3. Who are the BOP markets?

4. What is the “real” test?

5. Who can participate once legal identity is achieved?

17
The Hand book of information and Cyber Ethic

Chapter 1: Foundations of Information ethics

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The basic foundation of ethics in society

Quote:

“We call our society ‘the information society’ because of the pivotal role played by intellectual,
information-intensive services intangible assets”

Book Review:

Why is it that our society called “the information society”? Basically, we are entitled to
be the information in the society. Why? It’s because each one of us can give information. When
the earth is created by our God, all of what He created is very powerful knowing the fact that
each one of those is included with information. Since the information is all provided, all we have
to do is to discover it. For instance, God created the nature. All facts about it already exist like,
the W’s and H questions on a particular thing. The humans make a discovery all out of it. And
what’s the output? All of these discoveries will lead other people knowing the information. The
information now is just passed away into the society and many people will know it. For those
who want to be into discovering, they must know it. This introduction is very useful because it is
the foundation of everything all about information. The technology we have right now is
because of information. The information is also conversation because we can get information
through it. Every one of us has a power if we have information the money include. But on the
physical side, its information make the world go around. One of the reason and fact is that we
are on the “knowledge-based economy” era wherein information turns into knowledge.

What I have learned:

 The function and structure of “infosphere”

 Humans are the main element on ethical issues thus giving them the greatest
responsibility

18
Integrative Question:

1. What is information society?

2. What are the benefits of having an information society?

3. How could we achieve it?

4. What is infosphere?

5. What are the structures of infosphere?

19
The Hand book of information and Cyber Ethic

Chapter 2: Milestones in the History of Information and Computer Ethics

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The milestones in information and computer ethics

 The history in developing computer ethics

Quote:

“Cyberethics takes the view that the structure of the machine or of the organism is an index of
the performance that may be expected from it”

Book Review:

On this chapter, it was stated that the field of information ethics was born
unintentionally and almost accidentally in the middle of the Second World War. One of the
greatest philosophers that we have was Norbert Weiner together with his group of scientist and
engineers; they created digital computers, radar, and the creation of a new kind of antiaircraft
cannon that could perceive the presence of an airplane, can gather information about its speed
and trajectory, can predict its future position a few seconds later, decide where to aim and
when to fire shell, and lastly can carry out that decision. Later on, Norbert Weiner and his
colleagues realized that their inventions have good impacts but at the same time deadly. It now
depends on how their inventions were used to determine if it was good or bad.

This book is basically the foundation of information ethics which involves human and
technology. Weiner based his study on this way by evaluating the human perspective on health,
happiness, security, freedom, knowledge, opportunities, and person’s ability. He based his idea
on this so that it is the side of human and to be based on ethical and moral values, naturally.
The “cyberethic view of human nature and society” was really a big help giving foundational
ideas on ethics for the “purpose of human life”. In referring to life as a conclusion is that a
purpose of a human life is to “flourish as the kind of information-processing organisms that is
human in a natural way”. This means that Weiner are really basing in a natural point of view.

20
What I have learned:

 The basic function of cyberethics

 That in natural way, idea will come out as what human thinks

 The relevance of computer ethics in our society

Integrative Question:

1. What is good about computer ethics?

2. What is cyber ethics?

3. What is the basic function of cyber ethic?

4. How did Weiner come up with this idea?

5. What are the implications of ‘Humans use of human beings’?

21
The Hand book of information and Cyber Ethic

Chapter 3: Moral Methodology and Information Technology

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is moral methodology

 To know what is its relation with information technology

Quote:

“IT studies the moral questions that are associated with the development, application, and use
of computers and computer science.”

Book Review:

This chapter talks about cyber ethics with a computer concept. In short, this is called
the computer ethics. From the moral questions mixed up with computer related topic through
development, and application. Professionals and other people who are involved in computer
technology have many questions on what is right and what is wrong on particular ethical issues
or ethical questions. It is hard to identify which is which and specifically it is hard if there are no
references justifying the ethical or moral values. If you are an I.T person, it is hard to identify
your point of view. Even you cannot identify it. Justifying answers is hard to formulate because
you must know also the basis of a particular topic is.

In the field of IT, it is everywhere. Information technology department is a must for a


company today in order to survive simply because we are in the 21 st century and companies
must be innovative as much as possible. What if a problem occurs regarding the ethical values?
What would be the basis of this particular problem? Well, it is all indicated here. As we review
this chapter, we will learn how moral methodology and information technology works.

According to the methodology of information technology, they described that there


are surely specific properties of computers need to be accommodated in our moral thinking
about it. At the end we are the one who will take advantage of the computers specifically in
information technology. They describe this as the following. It is Ubiquitous and pervasive and

22
comes to be a universal technology because of its logical and malleability. The computer can
also simulate, communicate, recreate, and calculate and so on. These are the features of
computers that can be use by people. It’s unimaginable because in the past centuries, they only
predicted all of these. And here we are in the 21 st century, we are dealing with them with an
ethical values involved. Another description of computers is that it is a universal technology
because of its unique feature, logical malleability. It is constitutive technology which serves as
an essential part of our lives.

What I have learned:

 The relevance of information technology in our society

 The natural aspect and technological aspect of ethics are combined which gives an
interaction to the user

Integrative Question:

1. What is good about Information Technology?

2. How do they describe the methodology of information technology?

3. How did they apply the ethical values?

4. Does it change because of Information Technology?

5. What are the benefits of information technology?

23
The Hand book of information and Cyber Ethic

Chapter 4: Value sensitive design and information systems

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is the meaning of value sensitive design and information systems

 Approaches in value system design

Quote:

“Value Sensitive Design is a theoretically grounded approach to the design of technology that
accounts for human values in a principled and comprehensive manner throughout the design
process.”

Book Review:

Value system design on this discussion is made specifically for technology for human
values. It is stated here that it employs an integrative and iterative methodology. It simply
means that in every value that they made are very much important with an integrative and
iterative point of view. Integrative means to put concepts together and iterative means in an
incremental form. When we combine these two concepts, it results to a mixture concepts and
may result to a value sensitive design.

During the early period of computerization, Wiener again, (stated in the previous
chapter) a scientist and cyberneticist stated on his book that technology could help make us
better human beings and create more just society. But most of all, because of the features that
technology given to us, we must take control of what we created. Maybe in future, or a
prediction, technology will rule over than human being. In his perspective, we must reject
worshipping our created new technological advancement here on earth. The human value
system design has emerged as stated on this chapter. These are in computer ethics, social
information, Computer-supported cooperative work, and participatory design. These functions
can really affect the lives of humans. These functions are very sensitive to us specifically in
ethics. It can change our morality because we are following this value. It is explained here that
in computer ethics particularly, it advances our way of thinking that intersect in computer

24
technology and human lives. With these values, it can really affect the live of the people.
Another thing is that in other values, these are all the same.

What I have learned:

 How useful value sensitive design in devising a particular principle

 That human values will be determined by creating a value sensitive design

Integrative Question:

1. What is good about “value sensitive design”?

2. Why is it called value sensitive design?

3. Who are involved in these values?

4. How to create a formal value sensitive design?

5. What are the implications in using value sensitive design?

25
The Hand book of information and Cyber Ethic

Chapter 5: Personality-based, Rule-Utilitarian, and Lockean Justifications of Intellectual


Property

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 the basics of intellectual property

 the purpose of this aspect of cyber ethics

Quote:

“Intellectual property is generally characterized as nonphysical property that is the product of


cognitive processes and whose value is based upon some idea or collection”

Book Review:

The first part of this chapter discusses about what is intellectual property. It is explained
at introduced here that intellectual property are all based on individual personality. Since each
one of us has a individual personality, we assume that we have also intellectual property as well.
We must be knowledgeable to develop ourselves. Innovating ourselves is one way of changing
our lives. It is explained here that we must fight our strength and weaknesses. We have
strength, then maintain it and make you good as possible. On the other hand, weakness is your
fear as an individual, therefore fight your fears. This is to justify yourself to be intellectual
person.

Its non-physical, which means, it is all based on ideas, on mental reasoning. The people
must collaborate with all ideas we have. One must share ideas to others and ideas must be in a
collaborative way of distributing it. It surrounds the control of physical appearance of the
knowledge of the people. Each expression could be different but there is only one intellectual or
rational idea.

This chapter is focusing on three aspects. These are the personality-based, rule-
utilitarian and Lockean Justifications. The first one is the personality-based where an individual
is just focusing on his/her personality. He/she has own ideas on a particular perspective. Only

26
him/ her can understand it and no one can interfere his/her ideas. Once it is shared to other
person, there is surely a conflict between ideas. The intellectual property has now conflict. We
can’t fight against it because, as explained, each one of us has an intellectual property. The
analogy is that you can’t dive to the intellectual property of others because it is private and only
he/she can only understand it. That’s for personality-based. The next one is the rule utilitarian.
This is where utilitarian of intellectual properties used. Once the idea is passed to another
person, then the person who will be receiving it is considered to be a utilitarian. He/she just use
the intellectual idea of a particular person for the benefit for him / her. That’s absurd! Because
making use of an individual’s idea is considered to be a utilitarian. It can give both positive and
negative effects for the people. It will now depend on us if we use the utilitarian point of view.
The last one is Lockean Justification where the justifications of human are more sensitive.
Because it is where the human correct or justify his/her humanity in terms of his/her ideas in
life.

What I have learned:

 How to utilize my intellectual ideas

 That intellectual property secures all your works

Integrative Question:

1. What is intellectual property?

2. What is personality-based?

3. What is rule-utilitarian?

4. What is justification?

5. What is the purpose of these aspects?

27
The Hand book of information and Cyber Ethic

Chapter 6: Informational Privacy: Concepts, Theories, and Controversies

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The concept of privacy

 The importance of privacy

 The issues regarding international privacy

Quote:

“It would seem that privacy is not simply a static concept, but instead has a dynamic
component”

Book Review:

This chapter discusses all about informational privacy. To start with, let us define the
concept of privacy. It is usually a separate side where a state of being is apart from other
people. Only those people within the privacy boundary will just exchange ideas and more
information regarding a particular topic. Unlike public, it is publicly announced to the people
who they are addressing to. When we say privacy, it is very sensitive because no one among
those states being will pass the information they conversed. That means, that topic is very
sensitive and powerful. Those private people don’t want to be shared to other people. That’s
the basic analogy, example, and concept of privacy.

As the chapter goes, it is explained that the privacy is not simply a static concept, but
instead, it has dynamic component. This only means that privacy cannot be changed at all.
What is trying to say with this concept is that it should not be in a fixed position. This privacy
must also be a dynamic aspect so that people within an organization knows what is happening
in that particular issue. Well, of course, the privacy only needs the people who are in the
authority to make assumptions. That’s the concept of privacy on our physical lives. What about
informational privacy?

28
It’s discussed here those theories like “reductionist” and “ownership-based” accounts
are part of informational privacy. Let’s define first the reductionist concept. Basically it aims for
simplification of a particular thing. Privacy visualized here as the utility that will help that are
very useful to us. It can also preserve human dignity as well. It is a very useful utility for us
because if privacy applied, there are no problems to you as a person. People cannot argue with
you because they don’t know what the topics are for you. The restricted access theory is quite
different. The “zones” of privacy should be in a limited form.

What I have learned:

 The basic concept of privacy

 How people use privacy in a correct way

 Four distinct kinds of privacy

Integrative Question:

1. What is privacy?

2. What is privacy in the corporate world?

3. How can privacy assist us in doing what is right?

4. What are the four distinct kinds of privacy?

5. What are the theories of informational privacy?

29
The Hand book of information and Cyber Ethic

Chapter 7: Online Anonymity

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The meaning of anonymity

 Its relevance with cyber ethic

 How it can be implemented

Quote:

“Anonymity was used to denote a number of things that are connected like nameless,
detachment, unidentifiability, lack of recognition, loss of sense of identity, or sense of self, and
so on.”

Book Review:

When we say the word “Anonymity”, the first concept comes into our mind is that it is
questionable, or in other words, unidentifiable. We have no idea about it. We don’t know how
to define it, that’s why, anonymity is defined also as a freedom from identification. It is
anonymous, in a way that we don’t know everything about it, and because we have no idea
about it, we must think something for it, we must define it as much as possible to give
description to it. Because of this, the word “freedom” came out. And since freedom is so much
powerful to a person, we have a power to choose it and a power to have a responsibility over it.
Anonymity is the state of not knowing of something and therefore, it considered as a lack of
distinctiveness. We know that this is existed but we have no description over it. No one can
define unless, if we have more information about it, there’s a big possibility that we could
define it formally. For the next part of this chapter, we will deal the purpose and the impact of
anonymity in the social environment.

Anonymity maybe deliberately sought or something that occurs spontaneously from


the sheer complexity of modern life. That’s the effect in our lives. As we can see, it occurs
spontaneously, therefore, we don’t know everything about it and we are clueless about it. For

30
instance, If a person asked you to define a particular character in the movie and that character
role is very mysterious, then we have to think that this character only done a particular role
which is a big role in the film, but you can’t identify his/her name especially when that
actor/actress is not that popular, therefore, the first perception is that “who is this character in
real life?” As a result, it is called the anonymous character in the movie. So, the next time you so
this character, we will think that “This is the character in the movie”. But still, it is anonymous to
you because you have no information about it. As an analogy to social environment, If there is
something existed and people have an issue about it, the people just think that this is
anonymous simply because they have no idea for it. And since it is spontaneous, we will
immediately forget about this issue. And if you have no interest with it, therefore, it will mislay
into your mind.

What I have learned:

 How anonymity affect human life

 The importance of knowing anonymity

Integrative Question:

1. What is anonymity?

2. What is online anonymity?

3. How can we use this in defending ourselves?

4. What is the importance of knowing anonymity?

5. Does this follow the 10 commandments of cyber ethics?

31
The Hand book of information and Cyber Ethic

Chapter 8: Ethical Issues Involving Computer Security: Hacking,

Hacktivism, and Counter hacking

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The meaning of hacking, hackitivsm, and counter hacking

 What is illegal and what is not

Quote:

““how much harm is caused depends on whether the target is a public, private, commercial, or
noncommercial entity.”

Book Review:

Many people say that hacking is wrong and some say that hacking is right. Well, it
depends. We cannot determine the real act of hacking unless we do it in actual. For most
people even an ordinary people, they say that hacking is wrong because hacking is exploring
the private property of anyone without asking an official permission to the owner. Hacking is a
skill wherein hackers do their best to access file that are protected. The word hacking is known
in digital world because for computer people hacking is the term of destroying a security. The
more malicious acts in hacking, the more people cause harm because hackers ruin their
personal life. For computer technology, hacking constitutes a digital trespass onto a property of
another person. This means that are those people who try to hack a private property, he/she
may do so, but the conscience of guilt is still there.

32
Ethical issues involved here because in computer security also involves the morality of
human rights. Asking question what is right and what is wrong. How do they do the wrong
thing if they intend to do it in wrong way and likewise. Ethical is so much powerful that can give
us more strength to do a particular thing. Again, it’s matter of what is right and what is wrong. If
a computer hacker wants to hacks the system, it’s fine, but make sure that this will not harm
other people because it is considered as a wrongdoing. If it is for good, then do it.

What I have learned:

 Hacking is determined if its legal or not depending on its purpose

 I learned the different kinds of hackers

Integrative Question:

1. What is hacking?

2. What is hacktivism?

3. What is counter hacking?

4. What are the 3 kinds of hackers?

5. Is hacking illegal?

33
The Hand book of information and Cyber Ethic

Chapter 9: Information ethics and the library profession

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The relation of library profession with information ethics

 The other function of information ethics

Quote:

“Librarians and governing bodies should maintain that parents - - and only parents - - have the
right and the responsibility to restrict the access of their children - - and only their children - - to
library resources. Parents who do not want their children to have access to certain library
services, materials or facilities should so advise their children. Librarians and library governing
bodies cannot assume the role of parents or the functions of parental authority in the private
relationships between parent and child.”

Book Review:

Librarianship is also a profession. Thus, this chapter discusses how a librarian makes a
contribution to the modern world. As a librarian, the primary role of this job is to organize
books collected around the world. It is a distinct or clearly different position because this
profession shows the natural aspect of job. For library, it is purely manual because books are
only collected however, it is a relatively development to the world, to publish a book, lots of
process must be made. Press, collections of works, printing and etc. Collection may be a larger
and more complex and it is relatively different development. In creating a greater need for
someone, it is devoted to organizing cataloging such as collections.

As stated from this particular chapter, Librarianship as a distinct profession, however, is


relatively a recent development? With the advent of the printing press, collections of works
became larger and more complex, thus creating a greater need for someone devoted to
organizing and cataloging such collections. For those people who organize, and preserved
books, and other documents, they are also considered as a authentic librarian because they did
their job by doing these things. This job is also important not just for our individual perspective
but also in society as a whole. Some people think that this job is boring but this job is

34
interesting. First and foremost, librarians are universal, meaning that they are suited for all
library works around the world. The collection, organization and preservation of books and
documents is there primary job.

The relation of this profession to computer ethics is that it librarians are the primary
source of information of books and other stuffs related to it. Therefore, since they are in the
right position of doing this, they are also considered as a professional that can organize
information.

Base on this chapter, consider the challenges that confront the librarian in carrying out
his or her professional duties, in particular with regard to selection of materials and the
organization of these materials. Since the ethical obligations of librarians as professionals will
at least partly be determined by the role that librarians play in society, to understand the
mission and values of the librarian in order to understand what those ethical obligations are. 1)
Books are for use. 2) Every person his or her book 3) every book its reader 4) save the time to
read 5) the library is a growing organism. These are their primary job or mission which is very
important to our society as well as in modern world.

What I have learned:

 A librarian is an information giver

 The code of librarianship is intellectual freedom

Integrative Question:

1. What is librarianship?

2. Why is the relationship of librarian with information ethics?

3. What is the core value of librarianship?

4. Why is it a distinct profession?

5. How important is collection of information?

35
The Hand book of information and Cyber Ethic

Chapter 10: Ethical interest in free and open source software

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 Why is it that many are interested in open source free software

 The relation of ethical values with open source software

Quote:

“Service learning, a concept that is becoming a part of the mission of many higher education
institutions, also influences the choice between open source software and proprietary software.
Consider a scenario in which a software engineering class is to produce a piece of software for
local charity. The choice between open source alternatives and proprietary alternatives is not to
be taken lightly. Seemingly, open source software makes good sense for both the students and
the charitable organization. The cost is low and, presumably, the quality is sufficient. Yet there
are long term costs that are faced by the charity (as well as any business making such a
choice).”

Book Review:

While the Internet’s rapid expansion has enabled an equally rapid expansion of web
based professional services, it has not been matched by the consideration and understanding of
the related ethical implications. The growth of new opportunities is accompanied by equal, if
not greater, growth in ethical issues for businesses seeking to expand their offerings via the
Internet. These issues include the quality of services and information, privacy and security,
nature of relationship, forms of delivery, contractual considerations, and regulation and
enforcement.

Computers have a central and growing role in commerce, industry, government,


medicine, education, entertainment and society at large. Software engineers are those who
contribute by direct participation or by teaching, to the analysis, specification, design,
development, certification, maintenance and testing of software systems. Because of their
roles in developing software systems, software engineers have significant opportunities to do
good or cause harm, to enable others to do good or cause harm, or to influence others to do
good or cause harm. To ensure, as much as possible, that their efforts will be used for good,

36
software engineers must commit themselves to making software engineering a beneficial and
respected profession. In accordance with that commitment, software engineers shall adhere to
the following Code of Ethics and Professional Practice.

The Code contains eight Principles related to the behavior of and decisions made by
professional software engineers, including practitioners, educators, managers, supervisors and
policy makers, as well as trainees and students of the profession. The Principles identify the
ethically responsible relationships in which individuals, groups, and organizations participate
and the primary obligations within these relationships. The Clauses of each Principle are
illustrations of some of the obligations included in these relationships. These obligations are
founded in the software engineer’s humanity, in special care owed to people affected by the
work of software engineers, and in the unique elements of the practice of software engineering.
The Code prescribes these as obligations of anyone claiming to be or aspiring to be a software
engineer.

What I have learned:

 The distinction between free and open source software

 The difference of open source from proprietary software

 How proprietary software developer deals with customers

Integrative Question:

1. What is open source software?

2. Why is it free?

3. What are the ethical responsibilities of software developers?

4. What is proprietary software?

5. What is the difference of open source and proprietary software?

37
The Hand book of information and Cyber Ethic

Chapter 11: Internet research ethics: The field and its critical issues

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The role of internet research ethics in critical issues

 How to control critical issues

 How do people use internet for research

Quote:

“The principle of justice mandates that the selection of research subjects must be the result of
fair selection procedures and must also result in fair selection outcomes. The justice of subject
selection relates both to the subject as an individual, and to the subject as a member of social,
racial, sexual, or ethnic groups.”

Book Review:

Philosophical Foundations: Sources, Frameworks, and Initial Considerations


Philosophers who examine extant statements on research ethics from diverse disciplines and
diverse countries will recognize that these make use of at least two familiar.

Internet research nowadays and ethics is going to have an effect on the forms of
research that are sanctioned or even permissible, the ways that we understand Internet culture,
and our larger understandings of individuals and society. This suggests that there are significant
consequences to hindering the participation of certain disciplines and preventing some kinds of
histories from being produced. A truly ethical model of Internet research ethics would
acknowledge such outcomes and encourage a variety of histories and disciplines. It would
develop guidelines and rules that consider these problems at the same time as it foregrounds
their possible effects

Academics from varied institutions and countries are engaged in the important task of
articulating ethical guidelines for those who research the Internet. However, they have failed to
provide users and researchers with important information because they do not address the
ways that Internet material is mediated and constructed. The ethical issues and dilemmas

38
involved in Internet research include researchers who ignore the screen, varied icons, repetitive
motifs, and produced content. Addressing constructed material is important because Internet
settings abound with ageist, classist, homophobic, racist, and sexist imagery and ideas. The
current writing about ethical Internet research behaviors can enable such intolerant
conceptions by encouraging academics and other users to presume that Internet settings
provide access to the truth about individuals or are a direct conduit to people. In other words,
conceiving of Internet material as people and human subjects without foregrounding the
constructed aspects of users’ proclaimed “self-representations” makes it seems like Internet
material is exacting and natural.The global reach of the Internet means that research
participants may be drawn from a wide range of nations and cultures.

What I have learned:

 That internet is not the most reliable source of information

 That internet is not safe for minors

Integrative Question:

1. What is IRE?

2. What are the roles of IRE in our lives?

3. What are the common issues that emerged because of internet?

4. Why is internet not a reliable source of information?

5. What does IRE builds?

39
The Hand book of information and Cyber Ethic

Chapter 12: Health information technology: challenges in ethics, science and uncertainty

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The function of information technology in the medical society

 The challenges in ethics, science and uncertainty

 If health information technology is globally accepted

Quote:

“medical records usually contain a large amount of personal information, much of it quite
sensitive. This information is continuous, extending from cradle to grave; it is broad, covering
an extraordinary variety of detail; and, with new information technologies, it is accessible as
never before.”

Book Review:

It is sadly and too often the case that many professionals regard ethics as a source
of codes for the edification of the not-yet-virtuous, as a place where pointy-headed
bowfins pass judgment on heathens, as an office to call in search of someone with a horse
and a sword to come .round to smite the evildoers.

There is arguably no better trigger for reflection on morality and its relationship to
the lawand society than privacy and its cousin, confidentiality. The demands of privacy
are intuitively straightforward and the consequences of its violation obvious

The chapter even included privacy in health information technology. Privacy is,
most generally, as discussed in the chapter, the right entitlement or reasonable
expectation people have that they are and will be secure from intrusion. Given the
example in the chapter, it is obvious that society values both personal privacy and the law
enforcement but in some cases, the police officer investigating a crime may and, in fact,
must take steps to justify that her official need is worth the intrusion. ―Put differently,
privacy rights are not absolute, but may be balanced against other values. The same is
true for confidentiality, which applies to information—medical records, for instance.

40
Where privacy is customarily about people, confidentiality applies to information about
people. Privacy is also sometimes regarded as including within its scope people’s concern
about protecting confidentiality. Privacy is a broader concept.‖ – indeed as a broader
concept yet privacy still serve as one of the most studied factor in information technology
and one that is most protected.

Since we are talking here about health information, I can say that computers
complicate medical privacy and confidentiality in interesting ways. According to a
sentinel Institute of Medicine analysis, a number of entities demand patient information
to ―assess the health of the public and patterns of illness and injury; identify unmet.

What I have learned:

 I have learned what health information technology is

 That most people trust this technology because of private reasons

 The issues surrounding the medical and scientific world are as much important as their
jobs

Integrative Question:

1. What is privacy?

2. What is confidentiality?

3. What is the difference of privacy and confidentiality?

4. What is health information technology?

5. What are the challenges of computer ethics?

41
The Hand book of information and Cyber Ethic

Chapter 13: Ethical issues of information and business

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 The effects of ethics with information and business

 The ethical issues that information and business encounter

Quote:

“Before I can’t discuss why business has a strong influence on ethical issues of information. I
need to lay the groundwork and explain why businesses have an interest in information. The
aim of business organizations according to standard economic theory is the maximization of
profits. Such organizations will, therefore, aim to minimize cost and maximize revenue.
Information has a value for business if it can contribute to either of these aims. The business
value of information is thus linked to financial gains it can achieve. This is independent of the
philosophical debate in information ethics of whether information has an intrinsic value.”

Book Review:

Computers have changed the way offices are organized and the tasks done. They have
changed manufacturing, purchasing, marketing, finance, and management. The ethical issues
are therefore not simply issues that are involved in computers and their use and in information
technology more broadly, but in the way business is done in the Information Age. We can
distinguish five different kinds of ethical problems connected with information technology: 1
Ethical issues in the use of technology in business 2 Ethical issues in the information technology
business 3 Ethical issues dealing with the Internet 4 Ethical issues in e-business 5 Ethical issues
resulting from the impact of computers and information technology on society, both nationally
and internationally The five are interrelated. Lurking behind all of them is the Myth of Amoral
Computers and Information Technology. This is the widespread belief that computers and
information technology have nothing to do with ethics. Computers, of course, are a type of
machine and are not moral beings. But they are developed, programmed, and used by human
beings. Nonetheless, “The computer is down” is often taken as a valid excuse, as if no one is to
blame for this and no moral blame should be assessed.
The appropriate use of digital communications such as email and text messaging is
another area that must be clearly understood by the employee and it is the employer’s

42
responsibility to set the guidelines. Many employees need to be taught that text based
communications can be more often misinterpreted than spoken communications because
other verbal and body language cues are not present.

What I have learned:

 In the IT side of business, knowing how to use a computer is important, but knowing
your limitation is more important

 The moral norms involved in any sector of the society

 That it is the responsibility of employers to guide their employees on the proper use of
information systems

Integrative Question:

1. How can IT help businesses?

2. What is morality?

3. Do businesses have their own set of moral standards?

4. How do businesses use ethics in their workplace?

5. Where do ethics as theory of morality plays an important role?

43
The Hand book of information and Cyber Ethic

Chapter 14: Responsibilities for information on the internet

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To learn how these responsibilities help information on the internet be more reliable

 To learn the benefits of having responsibilities for the information on the internet

Quote:

“According to Friedman, if they were to have these responsibilities, then these responsibilities
might easily conflict with their obligations to make profits for the stakeholders.”

Book Review:

We, as online users, have our own responsibilities in handling our own source of
information – ourselves. The government, in my point of view, should be more concerned
in this issue but other than that, we need to take action ourselves because the internet is a
huge place for information to be spread and that alone is not really something I would
think as just a petty file share. Of course, file sharing is another thing but what about
copyright? Piracy? Infringement? There are a lot of issues we have to dwell with right
after knowing what it is that needs to be done but still, be responsible enough to take
extra protective measures with what you do online.

It takes an enormous amount of work to understand what theories mean for real-world
situations, issues, and decisions, and in some sense, we don’t understand theories until we
understand what they imply about real-world situations. Practical ethics is best
understood as the domain in which there is negotiation between theory and real-world
situations.

44
What I have learned:

 That information in general was restricted on the issue of ISP’s responsibilities with
regard to clearly illegal or immoral content

Integrative Question:

1. What are the responsibilities for information in the internet?

2. What is information?

3. What is the relation between internet and information?

4. What is ISP?

5. What are the conditions of responsibility?

45
The Hand book of information and Cyber Ethic

Chapter 15: Virtual Reality and computer simulation

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To learn what is virtual reality and computer simulation

 To learn the relation of the two with cyber ethics

 To know the difference between virtual and reality

Quote:

“Technologies raise important ethical questions about the way in which they represent reality
and the misinterpretations, biased representations, and offensive representations that they
may contain.”

Book Review:

The endoscope is maneuvered in the duodenum until the major duodenal papilla is
identified. The papilla is a nodular protuberance on the medial wall of the duodenum
through which the bile duct and pancreatic duct expel bile and pancreatic juice
respectively into the duodenum to aid in the process of digestion. After the endoscope is
positioned near the major duodenal papilla, a catheter is inserted through a channel of the
endoscope and directed into the desired ductal system (biliary or pancreatic) by changing
the position of the flexible endoscope tip in relation to the papilla. An ―elevator‖
apparatus at the tip of the endoscope can also be utilized to adjust the angle at which the
catheter enters the papilla. To guide the catheter into the papilla, the physician relies on
visual feedback from the endoscopic video display and tactile resistance encountered
when advancing the catheter. In diagnostic ERCP, contrast dye is injected through the
catheter while fluoroscopic images are observed and roentgenograms are obtained.

How technology can do such wonders for our benefits and allows us to experience
something more than what we should have experienced back then.

46
What I have learned:

 That computer simulation are sensitive activities that exist nowadays

Integrative Question:

1. What is virtual reality?

2. What is computer simulation?

3. What is the difference between reality and virtual?

4. What is avatar?

5. Give example of virtual reality and explain why they are considered as such

47
The Hand book of information and Cyber Ethic

Chapter 16: Genetic Information: Epistemological and Ethical Issues

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To learn about different epistemological issues

 To learn more about ethical issues

 To learn what is genetic information

Quote:

“The future of biology is strongly tied to that of bioinformatics, a field of research that collects
all sort of biological data, tried to make sense of living organisms in their entity and then make
predictions.”

Book Review:

Identify an ethical question or case regarding the integration of information technology


into society. Typically this focuses upon technology-generated possibilities that could
affect (or are already affecting) life, health, security, happiness, freedom, knowledge,
opportunities, or other key human values. Clarify any ambiguous or vague ideas or
principles that may apply to the case or the issue in question. If possible, apply already
existing, ethically acceptable principles, laws, rules, and practices that govern human
behavior in the given society.

It was explained ―that genetic information is the genes containing an amount of


information (the so-called TACG amino acids sequence) and able to build a human being
up is today a seldom challenged triviality. This idea is fundamental to the so-called
―Central Dogma‖ of genetics. The ―Central Dogma‖, as originally formulated by Crick, is
a negative hypothesis, which states that information cannot flow downward from protein
to DNA.‖ No, DNAs are not really my professional concern but I am aware that like
DNAs, computers withhold an amazing degree of information no man can memorize but
can definitely determine.

48
What I have learned:

 The concept of information

 The notion of genetic information

 The ideological use of a model and ethical issues in fund-raising

 The cooperation and public access of data

Integrative Question:

1. What is semantic theory?

2. What is synthetic theory?

3. What is genetic information?

4. What did Berlinski contribute?

5. What did Maynard mentioned?

49
The Hand book of information and Cyber Ethic

Chapter 17: The ethics of cyber conflict

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To learn more about the cyberspace

 To learn the ethics of cyber conflict

 To learn about the different cyber attacks in the past

Quote:

“Besides cyber attacks conducted for pleasure or personal gain, the paper does not consider
revenge attacks by insiders – all of which are generally regarded as unethical.”

Book Review:

The issue of law and cyber conflict is something that while relatively new, is something
that people, nation states, and military organizations have been working on for the last 10
years at least. Many countries have robust cyber warfare rules of engagement, and the
more interesting part about this is that any country with an internet connection can
engage in cyber conflicts. Attribution (IE Knowing who is attacking you, and being able
to act appropriately against the real place that is attacking you) has long been a problem.
Zombies, bot nets, jump points, and the millions of compromised computers both
Windows and Linux are the cannon fodder of cyber warfare. Attributing the attacker back
to the point of origin is going to be difficult if not impossible without some smart people
having unrestricted access to packets, and to compromised systems. Legally though, it
gets more interesting as the state of cyber law is often well behind the state of cyber
warfare tools.

With the advancing technology, even internet can cause war to countries. It could be a
silent war; no one would get hurt… physically. Cyber conflict may result to chaos to the
concerned parties. Such as what happened in September 2000, wherein Israelite teenage
hackers created a website that successfully jammed six websites in Lebanon, causing a

50
huge turmoil in different websites in Israel, including those of the Palestinians and at
least one U.S. site. They made two main types of attacks, the website defacement and
distributed denial of service.

What I have learned:

 Jus ad bellum – the law of conflict management

 Jus in bello – the law of war

 Distinction of combatants from non combatants

 When does cyber attack constitute the use of force

Integrative Question:

1. What is cyberspace?

2. What is hacktivism?

3. What happened in the law of war?

4. What is the doctrine of self defense?

5. What is hack back and force?

51
The Hand book of information and Cyber Ethic

Chapter 18: A practical mechanism for ethical risk assessment – A SoDIS inspection

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To learn the generic standards for risk analysis models

 To learn a practical mechanism for ethical risk assessment

 To learn what is SoDIS inspection model

Quote:

“The availability of high-quality software is critical for the effective use of information
technology in organizations.”

Book Review:

The quantitative nature of the tool allows a company to determine whether or not it has
successfully decreased its ethical risk over time. But the qualitative aspect of the tool
allows the organization to identify and address specific risk-prone areas by minimizing
risks that can be controlled and by instigating effective measures to counteract
unavoidable risks.

In developing their tool, the pair looked at two existing measures of ethical risk that were
ultimately found lacking: the Global Reporting Initiative (GRI) and the Ethics Resource
Center Ethics Quick Test.

The GRI takes a broad look at social performance measures, looking at how a company
adhered to multinational codes and standards in the past, Berman explained. ―It’s really
backward-looking. It really says what we’ve done, and not what kinds of risks we have
and how do we manage them. It doesn’t help us manage the risk going forward, so
unfortunately, we didn’t find it super helpful.‖

52
The Ethics Quick Test focuses on 12 areas of an organization’s commitment to ethics,
such as how ethics factors into its organizational values, strategies, goals, objectives,
policies and procedures. It looks at organizational incentives, decision-making, and tone
at the top, as well as ethics evaluation, education, and training. But the major downfall of
the Quick Test, Berman noted, was that it focuses on organizational dynamics as ethical
risk factors, without really getting at individual or industrial-level factors.

What I have learned:

 The generic standards for risk analysis models

 The risk identification

 The risk analysis

 The limitations of the generic standards

Integrative Question:

1. What is SoDIS?

2. What is risk assessment?

3. Is risk assessment necessary?

4. What is jus ad bellum?

5. What is jus in bello?

53
The Hand book of information and Cyber Ethic

Chapter 19: Regulation and Governance of the internet

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To recognize the regulation and governance of the internet

 To learn what is censorship

 To know internet regulations: moral arguments

Quote:

“Degrading internet performance will not obviously harm many people very much, depending
of course on the degradation.”

Book Review:

This technological, industrial and social innovation has risen to the very top of the major
public policy priorities. As a result, the desire to correct certain inconsistencies, gaps or
dangers in the current situation has become part of the international political agenda. A
certain number of tensions have also resulted. Due to its UN framework, the Summit had
as prerequisites the plurality of the actors and the equal acceptability of their viewpoints.
The debates that resulted, whether formal or informal, whether included in the official
program or led in parallel, emphasize the need to coordinate, if not harmonize, complex
balances of power.

To examine how the regulation of the Internet has emerged as an object of global
governance in the context of the United Nations. Secondly, using a neo-Foucauldian
governmentality perspective, to explore and explain how these UN-initiated regulatory
activities have been driven and shaped by a cluster of concerns, principals and imageries
about technological features of the Internet and its relationship to socio-political
transformations. This exploration gives important insights into the contemporary shape of
Internet regulation and the principals and knowledge bases that have given momentum to
and shaped this emergent object of global governance. In particular, the paper shows how

54
technological features of the Internet have come to function as models for the shape of its
regulation.

This inaugural lecture by Jonathan Zittrain proposes a theory about what lies around the
corner for the Internet, how to avoid it, and how to study and affect the future of the
internet using the distributed power of the network itself, using privacy as a signal
example.

What I have learned:

 That inside the nebulous “internet governance” there coexist different regulatory
models, more or less founded in the law, more or less specialized, more or less
effective.

 That internet governance in the past years and until now provides fuel for debates
within the WSIS regarding the management of the technical resources of the internet

Integrative Question:

1. What is censorship?

2. What is content regulation?

3. What is internet governance?

4. What is the difference between censorship and content regulation?

5. To what extent does the technology allow for effective regulation?

55
The Hand book of information and Cyber Ethic

Chapter 20: Information overload

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To learn what and the effects of information overload

 To understand information

 To know what is A Novel, Recurrent, or Ever-present phenomenon

Quote:

“Some of these information goods are end-products (films, videogames, and newspapers),
while others as agents of control (advertisement and e-mail messages) that help to manage the
accelerating processes of production and consumption.”

Book Review:

The most obvious locus of information inundation is the office: e-mail, voice mail, phone
calls, meetings, business journals, faxes, memos, manuals, Web research. The list goes
on. Far from bringing about the anticipated ―paperless office‖ and reduced work load,
technological innovations have increased both areas.

Information technology, in fact, often diminishes workplace efficiency. Scientific


American (―Taking Computers to Task,‖ July 1997) pointed out that despite the $1
trillion spent annually across the globe, ―productivity growth measured in the seven
richest nations has instead fallen precipitously in the last 30 years … Most of the
economic growth can be explained by increased employment, trade and production
capacity. Computers’ contributions, in contrast, nearly vanish in the noise.‖ Blame can
be pinned on everything from sound cards to solitaire, that numbing front-desk babysitter.

We can say that Data is like food. A good meal is served in reasonably-sized portions
from several food groups. It leaves you satisfied but not stuffed. Likewise with
information, we’re best served when we can partake of reasonable, useful portions,

56
exercising discretion in what data we digest and how often we seek it out. Unfortunately,
we often do the opposite, ingesting information constantly to the point of choking on it.
The risk of information asphyxiation touches all of us — managers, Web surfers, even
lazy couch tubers. That’s the analogy of it.

What I have learned:

 The consequences of information overload

 The definition of information and information oveload

Integrative Question:

1. What is information overload?

2. What is information?

3. What are the causes of information overload?

4. What are the consequences of information overload?

5. Explain the brief history of phrase.

57
The Hand book of information and Cyber Ethic

Chapter 21: Email Spam

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is email spam

 To know how to determine a spam

 To know what is Unsolicited Commercial Bulk Emails (UCBE)

Quote:

“A fundamental problem with any philosophical discussion of email spam is definitional.


Exactly what constitutes spam?”

Book Review:

E-mail spam, also known as junk e-mail, is a subset of spam that involves nearly identical
messages sent to numerous recipients by e-mail. A common synonym for spam is
unsolicited bulk e-mail (UBE). Definitions of spam usually include the aspects that email
is unsolicited and sent in bulk. ―UCE‖ refers specifically to unsolicited commercial e-
mail.

Furthermore, E-mail spam has steadily, even exponentially grown since the early 1990s
to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail
users. Laws against spam have been sporadically implemented, with some being opt-out
and others requiring opt in e-mail. The total volume of spam (over 100 billion emails per
day as of April 2008) has leveled off slightly in recent years, and is no longer growing
exponentially. The amount received by most e-mail users has decreased, mostly because
of better filtering. About 80% of all spam is sent by fewer than 200 spammers. Botnets,
networks of virus-infected computers, are used to send about 80% of spam. Since the cost
of the spam is borne mostly by the recipient, it is effectively postage due advertising.
Definitions of spam usually include the aspects that email is unsolicited and sent in bulk
―UCE‖ refers specifically to unsolicited commercial e-mail. The total volume of spam

58
(over 100 billion emails per day as of April 2008) has leveled off slightly in recent years,
and is no longer growing exponentially.

Now you know what spam emails are and thanks to Google and wiki for the definition.
Anyway, spam emails is not something we want but it is a method of some websites to
endorse their investors to other people.

What I have learned:

 A short history of spam emails

 The content of an email

 That deceptive emails meant to defraud are condemned, spam or emails between well-
meaning friends are probably not spam

 The ethics of reducing the number of spam emails read after they are sent

 The ethics of suggestions to reduce the number of emails sent

Integrative Question:

1. What is Email?

2. What is Email Spam?

3. What is Email message?

4. What is Unsolicited Commercial Bulk Emails (UCBE)?

5. What the accountability of the sender and the degree of deception?

59
The Hand book of information and Cyber Ethic

Chapter 22: The matter of plagiarism: What, Why, and If

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is plagiarism

 the relation of plagiarism to cyber ethics

Quote:

“The emphasis on impropriety is important. There are a wide variety of situations where it
seems acceptable to repeat prior expressions while ignoring a possible attribution and making
no attempt to seek permission from a putative source.”

Book Review:

Plagiarism occurs when students fail to acknowledge that the ideas of others are being
used. Specifically it occurs when: other people’s work and/or ideas are paraphrased and
presented without a reference; other students’ work is copied or partly copied; other
people’s designs, codes or images are presented as the student’s own work; phrases and
passages are used verbatim without quotation marks and/or without a reference to the
author or a web page; lecture notes are reproduced without due acknowledgement. By
this, we can identify what’s the meaning of this.

When plagiarism is suspected, a staff member involved in unit assessment is required to


put the matter to the student, identify the passages which are alleged to be plagiarised and
their source and report the matter to the Chief Examiner (or nominee). If it is alleged that
an internet site is the source of plagiarism, it would be advisable to print out the material
in case the site is changed.

According to the book, The present author believes that, in some contexts, new
technology has tended to increase the importance we should place on acknowledgment
and to lessen the importance that we should place on authorization.

60
For academic publication and technology, the digital technology has shifted the major
costs of typesetting

away from the publisher to the authors and editors who produce print-ready digital The
situation, however, is really very complicated. We noted above that today’s technology
has created problems for a film industry that seeks to recoup high production costs when
piracy is cheap and easy.

What I have learned:

 the concept of plagiarism

 lack of authorization – economic foundations

 lack of authorization – natural or moral rights

 lack of authorization – no infringing plagiarism

Integrative Question:

1. What is plagiarism?

2. Why is it very sensitive?

3. What is the role of plagiarism in cyber ethics?

4. How can this be implemented through cyber ethics, digital technology?

5. How is it complicated to cyber ethics as well as in natural literature?

61
The Hand book of information and Cyber Ethic

Chapter 23: Intellectual property: Legal and Moral Challenges of Online File Sharing

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is intellectual property

 To know the legal and moral challenges of Online File Sharing

Quote:

“Lost in the thicket of lawsuits and policy challenges are the ethical issues associated with the
use and distribution of file sharing software. Is the downloading or “sharing” of copyrighted
music morally reprehensible? Quite simply, are we talking about sharing or pilfering? Is social
welfare enhanced by a legal regime of indirect liability? And should we hold companies like
Napster, Grokster, or BitTorrent morally accountable for the direct infringement of their users,
particularly if they intentionally design the code to enable the avoidance of copyright liability?
Or does such accountability stretch the opposite moral notion of cooperation too far? In this
overview, we will present the conflicting arguments on both sides of this provocative debate.
Although our primary focus will be on the ethical dimension of this controversy, we cannot
neglect the complex and intertwined legal issues.”

Book Review:

What is an intellectual property? According to this chapter, it is a property from original


thought protected by law. An original creative work manifested in tangible form that can be
legally protected. So that means that this property must be protected by laws at all cost. Many
of us make a mistake about this topic because it’s complicated and we don’t understand which
is which, and what is what. For beginners, they don’t understand this topic well especially those
beginners who will be creating something for them. They did it very well. But other people will
just use it without permission to the owner. That is calling a copyright infringement. As stated
here that all unauthorized property is against ethical values. For example, in downloading
copyright files online can be considered as an infringement because the downloaders don’t
have a permission to the owner to use it. Even if it is fair use, they don’t have rights to download
these files. The only key to download this to avoid copyright infringement is that pay for that
property and make a permission to use that thing.

62
We are now in 21st century and as we go along, many people and many cases involved
copyright infringement. The intellectual property of a person must be protected at all cost.
Let’s say you did something for the good of others, and another person did something good for
others but the way of doing it is stealing from you. That is considered also as a copyright
infringement because that person doesn’t have a permission to do such thing. Since technology
is fast growing more and more cases involved in copyright infringement. It is one of the best
case spread in the world. We don’t have a control with this stuff and that is the reality.

For internet, it is called a gatekeeps because of Internet Service Providers and search
engines. Gatekeepers are the one who are in the position to don’t interfere in copyright
infringement. Good thing that gatekeepers are trusted to prevent copyright infringements.

What I have learned:

 Sharing or theft

 Secondary Liability

 MGM V. Grokster

 Moral Considerations

Integrative Question:

1. What is piracy?

2. What is intellectual property?

3. What are the legal challenges of online file sharing?

4. What is the secondary liability of file sharing?

5. Who is Grokster?

63
The Hand book of information and Cyber Ethic

Chapter 24: Censorship and access to expression

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is censorship

 To know what is access to expression

Quote:

“The benefits we receive from having these interests satisfied (and the harms from not having
them satisfied) will not be easily overridden. Second, we have to ask ourselves not what in
principle it might be good to censor. We have to ask ourselves what in actual practice would be
the consequences of having policies in place that restrict access. It is at this point that “slippery
slope” and “chilling effect” arguments might have some force.”

Book Review:

We are now in 21st century and we are now involved in technology. For ancient times,
censorship was also applicable. Those who have an authority can order a restriction of a
particular issue or event. We are now in the modern times, and we are still doing this act. Of
course all of us need privacy. Each individual should be protected at all cost. In order to prevent
the exposure of private, the censorship is applied. What is this censorship? Well basically,
censorship role is to condemn person’s action. In other words, condemn is considering
something guilty about a particular act. So in order to avoid guiltiness, censorship is applied.

Without getting clear on what we mean by censorship, this chapter tells us that it is
very hard to know exactly what is wrong with a particular act and indeed, it is always wrong. We
must find out the real truth about censorship. By finding it, of course, we don’t know where to
start because it was censored. There is no information about it. For example, there was an
illegal transaction between a businessman and a group that sells drugs and it was recorded in
the video, it was censored when it was first shown because they don’t want to reveal that
transaction. When a person who are in the authority who wants to reveal the truth, he/she must
make information out of it and try to release this video at all cost. But, the problem is that it is
censored. That’s the main point of the problem. That’s why it is difficult to release it even if it is

64
an evidence for the case. Without getting clear on what we mean by censorship, it is difficult to
get a grip on exactly what is wrong with it, and indeed, on whether it is always wrong.

What I have learned:

 the types of harm and arguments against censorship

 inherently harmful access

 instrumentally harmful access

 creating a market

 hostile atmosphere

Integrative Question:

1. What is censorship?

2. Should censorship be implemented? State at least two reasons.

3. Why are people interested in accessing other people’s computer?

4. Give two types of harm against censorship.

5. What is inherently harmful access?

65
The Hand book of information and Cyber Ethic

Chapter 25: The gender agenda in computer ethics

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is the gender agenda in computer ethics

 To know why does gender preferences is included in computer ethics

 To know how computer ethics can be affected by the gender

Quote:

“The idea that gender is a major (possibly even the major) way of classifying and ordering our
world has been propounded by a number of authors, mainly, although not exclusively, writing
from a feminist position.1 The recognition of continuing differences between men’s and
women’s lots, at home, in the workplace, and in education, even in societies that have seen
considerable opening up of opportunities for women in the space of a generation or so, has
been a major force in developing contemporary feminist writing.2 Coupled with this, we
continue to be fascinated by differences between men and women, putative differences in
behavior, differences in interests, differences in management style, differences in parenting
approach, and so on. This suggests that, in the process of ordering and classifying our world
into that which is feminine, that is, belonging to or pertaining to women, and that which is
masculine, that is, pertaining to men, we may polarize this binary in a search for, and perhaps
even a maintenance of, difference.”

Book Review:

At the first part of this chapter, noticed that the main topic is feminine. The question is
that why do they need to focus on them? The answer to that is that woman is powerful also as
man. It is much better than the abilities of man. As they discussed here, Woman’s ethical values
is the number one debates and issue for our world today. The world in reality can’t accept the
man’s ability and other would tell that it is not good for woman because some abilities of man
can’t do it by woman. But then morality again is the issue here.

Care cyber ethics. It’s the first time I heard that. According to this chapter, care ethics is
a cornerstone of most difficult approaches towards feminist ethics. The main actor here again is

66
the feminine. They are the main emphasis on this chapter. As we all know, the characteristics of
woman is unique. They are the one who make things better not just only in society but
especially on families. Mothers are considered the light of house. Their responsibilities are big
therefore they should take these responsibilities for their family. In relating to computer ethics,
it’s the same, as stated on this chapter, they give more emphasis on feminine side, therefore,
and they have big responsibilities in society.

For computer ethics, researches told us that decision of man and woman is very
important specifically in computer ethics problem. They have a power to rule over it. The fact is,
nobody owns cyber ethics and that means it’s for us. We must take this responsibility owning it.
Taking a good decision will really help people in making good things towards the computer
ethics.

The gender, ethics and information technology, in that work, the hope must be
strengthened and theoretical dimensions must be broadened. Ethical decisions of man and
woman are said to be important so that decisions made are strong.

For academic publication and technology, the digital technology has shifted the major
costs of typesetting away from the publisher to the authors and editors who produce print-
ready digital. The situation, however, is really very complicated. We noted above that today’s
technology has created problems for a film industry that seeks to recoup high production costs
when piracy is cheap and easy.

What I have learned:

 Gender and computer ethics studies

 Quantitative vs. Qualitative research methodologies

 The under theorizing of gender and ethics

 Cyber stalking

Integrative Question:

1. What do you mean by feminist ethics?

2. Explain the male-female binary as stated on this chapter.

3. Define cyber stalking.

4. Define what a hacker community is.

5. Explain the concept of Quantitative vs. Qualitative Research methodologies.

67
The Hand book of information and Cyber Ethic

Chapter 26: The digital divide: A perspective for the future

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is digital divide

 To know a perspective for the future

Quote:

“In the developing world, poverty and the suffering it causes is considerably worse. Here
poverty is characteristically “absolute” in the sense that people do not have enough to
consistently meet their basic needs. People in absolute poverty lack consistent access to
adequate nutrition, clean water, and health care, as well as face death from a variety of
diseases that are easily cured in affluent nations. Indeed, 15 million children die every year of
malnutrition in a world where the food that is disposed of as garbage by affluent persons is
enough to save most, if not all, of these lives.”

Book Review:

This chapter explains the role of Digital Divide for the people. Let us define first what is
digital divide? As stated here on this particular chapter, Digital divide is a new term for right
which means that it occupies the main component of global lingua franca. The word lingua
franca is only for the internet which is accepted as a language from our language. Those words
by lingua franca came from us but these words were modernized because of internet. These
words defined by human and can understand by people who are into computers or internet
enthusiasts. It’s more on digital words I should say because, it is modernized by people to make
it more attractable and meaningful. This is to signify that in essential terms, one thing: the
fundamental disparity between information haves and have-nots. These words are too techy
and I don’t understand it either. It is stated here that these will depend upon who is on the sides
of comparison.

What do people expect from this topic? Again, it is a literature of words that is full of
technical definition. There are many doubts about digital divide because people cannot easily

68
detect in digital divide literature. The big problem of this topic is that it is hard to understand
this particular language and more people will not and discourage them to understand this. It is a
learning tool for us bet yet, no one in the world will try to understand and learn it. Only those
people who are interested. It is stated here that this was too narrow to certainly understand the
revolution. The network had to expand, by all means so that it will be accessible for people who
like to use this as a primary tool.

What I have learned:

 How poverty was transformed into what it is now

 That digital divide is the division between those who have access to ICT and are using it
effectively, and those who are not

Integrative Question:

1. What is the title of section 103?

2. What is the title of section 1201?

3. What is the title of section 1202?

4. Explain the limitations on liability for copyright infringement.

5. Explain the limitations on liability relating to online material.

69
The Hand book of information and Cyber Ethic

Chapter 27: Intercultural Information Ethics

Amazonlink:

http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1

What I expect to learn:

 To know what is IIE

 To know why it is called as an emerging discipline

 To know the impact of IIE to ICT

Quote:

“Intercultural Information Ethics (IIE) can be defined in a narrow or in a broad sense. In a


narrow sense it focuses on the impact of information and communication technology
(ICT) on different cultures as well as on how specific issues are understood from
different cultural traditions. In a broad sense IIE deals with intercultural issues raised not
only by ICT, but also by other media as well, allowing a large historical comparative
view. IIE explores these issues under descriptive and normative perspectives. Such
comparative studies can be done either at a concrete or ontic level or at the level of
ontological or structural presuppositions.”

Book Review:

When we say intercultural it is within the culture. Combining this to ethics means
a lot to the information ethics topic. We all know that information ethics is part of ethical
values made by human. We all know that information is everywhere. It will go out
somewhere just like water. But the problem of this is that information is very much
sensitive. Once information is leaked, more people will know it and as a result, people
will react and react about that issue. The information now turns out to issue. That’s the
informal way of knowing the information. Information must be in a good side wherein
people must make use of it in a right and better way. Now, for uneducated people, they
don’t know how to handle the information, they keep leaking this and sometimes this
particular information will go to some professionals. It’s complicated in sharing
information especially if that information is sensitive.

70
As stated here on this chapter. IIE will not deal with the question of the impact of
ICT on local cultures but explores also how specific ICT issues or, more generally, media
issues can be analyzed from different IIE perspective. We are talking here again about the
cultures and we all know that we have different cultures and at the same time, we have
different beliefs. So this statement from this chapter proves that Intercultural Information
of ethics is different and has different impact to ICT for local cultures, different
understanding for different cultures.

What I have learned:

 How diverse our world culture is

 How can we adapt in different cultures

 That there are intercultural information ethics that are used by different cultures

 That there are at least three major global or spherical projects in European history

Integrative Question:

1. What is culture?

2. What is IIE?

3. Why is it called an emerging discipline?

4. What is the foundational perspective that focuses on IIE?

5. How does IIE impact the world?

71
Auctioning Virginity
Utilitarian Perspective:

Agree – Ynte

Under the concept of utilitarianism, prostitution is justifiable if the costs of the action are less
than the benefits received. Of course many would say that the means does not justify the ends.
However in Utilitarianism, this is the least of the concerns. the act of prostitution is not une
thical if it serves or benefits a greater number of people while harming a smaller
number. Moreover if the consequences of the action provide benefit such as economic, to the
person who undertakes it then it follows that the action cannot be condemned on moral
grounds.

Disagree – Gamba

Ms. Dylan’s action is wrong because having sex should be done with the person you love and
not because of the money you will receive from your partner. Her method of getting money for
her studies is incorrect because of the consequence of her losing her virginity to someone she
does not love.

Kantian Perspective:

Disagree - Ynte

Many liberal and radical philosophies/ philosophers’ stress that prostitution is no more
inherently wrong or harmful than any other type of service work. I believe that prostitution
violates the Kantian “principle of humanity,” because it reflects a disrespectful attitude, which
is expressed in the casual use of the human body as a mere means to achieve some goal, and in
this case, it is to achieve one’s sexual needs and desires. All sexual activities express subjectivity
and different point of views, but not all sexual activities entail mutual respect. Some sexual
activities reflect a person’s attempt to determine another subject, by receiving the other’s
recognition of the person’s will, without yielding to the other’s influence, recognizing the
other’s will, and thus without incurring an obligation to them. The wrongfulness of actions,
sexual or not, dwells in this assault to another person’s dignity.

Agree – Gamba

Her action is correct in selling her virginity to some stranger because now she will be able to
finance her MBA degree.

Nietzcheian Perspective:

Agree – Ynte

For someone who contracted syphilis from prostitutes (I’m pertaining to Nietszche), I believe
that the craftsman of master morality will definitely agree with Dylan auctioning her virginity.

72
Dylan demonstrated her master morality by showing that she’s in control of her whole life and
she knows that she will definitely benefit on this deal.

Disagree – Gamba

Based on nietzche’s theory, I would say that she follows master morality, but the consequence
is bad, because on this transaction, Natalie is the loser because she lost something important,
her virginity.

Aristotlean Perspective:

Disagree – Ynte

The happiness that Dylan will acquire in this act will only be temporary, and according to
Aristotle, human happiness is a lifelong process. It is continuously ongoing and the purpose has
the end in itself. Happiness is an activity of the soul and in that is an ongoing actualization of
the soul’s potential for virtue. Being virtuous is self- sufficient in itself and therefore leads to
human happiness.

Agree – Gamba

Using the golden mean as a philosophy, what Natalie did is correct because she knows what she
wants which is to get money for her MBA degree, and then she will be able to receive the
money for her education by offering her virginity. She obtained what she wants but not
degrading herself as a prostitute like her sister.

References:

http://www.humboldt.edu/

http:www/academon.com

73
10 things learned from CK Prahalad

10 things that I’ve learned

1) Every person should have access to the benefits of the global economy
2) Treat the poor as a customer not a nuisance
3) All products and services should be affordable to everyone
4) Everyone should have access to the global market
5) “to change things we must not only change things in America, but we need to change things
globally”
6) Start small, scale fast
7) Pricing is very important
8) What we need most are imagination, courage, passion, humanity, and intellect
9) We have to look at poor people as opportunity not as problem.
10) Every people as consumer. Every people as producer.

74
Ethics 101

Chapter 1: Whatever happened to business ethics?

Amazonlink:

http://www.amazon.com/Ethics-101-Every-Leader-
Needs/dp/0446578096/ref=sr_1_1?ie=UTF8&s=books&qid=1267404937&sr=8-1

What I expect to learn:

 To learn what ethics does businesses follow at present

Quote:

“Companies that are dedicated to doing the right thing, have a written commitment to social
responsibility, and act on it consistently are more profitable than those who don’t.”

Book Review:

A survey made by George Barna showed that 6 out of 7 people are unwilling to give
their complete trust to teachers, lesser to company executives, government official, TV
reporters, and priests. This result just show how terrible is the state of ethics in the society. The
author mentioned three reasons why people make unethical choices: 1) we do what’s most
convenient; 2) we do what we must to win; 3) we rationalize our choices with relativism. First,
we do what’s most convenient, the author wrote a quote, an ethical dilemma can be defined as
something undesirable or unpleasant choices relating to a moral principle or practice, I agree
with this reason of the author, for example is when the cashier gives us an extra change, isn’t it
more convenient to us to not give back the extra and just accept it as a bonus. Second, we do
what we must to win, we see this scenario on every competition, and players do everything
they can just to win, but some uses drugs like steroids to boosts their bodies ability to produce
muscles and prevents muscle breakdown. Third, we rationalize our choice with relativism,
wherein people determine what is right depending on the situation, which results to what the
author says mentioned as “ethical chaos”, wherein ethics are based on decisions, you are
ethical if your action makes you feel good.

The author also presented some solutions for the current marketplace. First, outsource
ethics instruction wherein companies hire firms to conduct ethics classes and produce ethics
manuals. Second, perform an ethical flea dip, where ethical offenders that are caught will be
punished, but the problem is those offenders are just doing it again. Third, rely on the law,

75
some companies have given up on determining what is ethical and what is not, so their solution
is just to rely on the law, and using what’s legal as their standard.

According to Ethics Resource Center in Washington D.C., companies that are dedicated
to doing the right thing, have a written commitment to social responsibility, and act on it
consistently are more profitable than those who don’t. It also revealed that companies that are
practicing proper ethics are making much more money in the long run than those who don’t.

What I have learned:

 The reasons why people make unethical choices

 Some solutions for this dilemma

Integrative Question:

1. When you think of ethics, what is your reaction? Is it positive or negative?

2. Do you believe it’s possible and desirable to use just one standard in every area of life?

3. What is ethical chaos?

4. Choose one reason why people make unethical choices and relate it to your everyday l
life

5. Choose one solution for this problem

76
There’s no such thing as “BUSINESS” ETHICS

Chapter 4: Living a 24-Karat-Gold life

Amazonlink:

http://www.amazon.com/Theres-Such-Thing-Business-
Ethics/dp/0446532290/ref=sr_1_1?ie=UTF8&s=books&qid=1267405164&sr=8-1

What I expect to learn:

 To learn how to live a 24-karat-gold life

Quote:

“There are really only three kinds of people. Those who don’t succeed, those who achieve
success temporarily, and those who become and remain successful. Character is the only way
to sustain success.”

Book Review:

The author interviewed Coach Mark Richt of University of Georgia’s football team,
which uses a different kind of education to his players. “If you have good character, you’re a
diligent worker and you do what your coaches ask you to do,” says Richt. He introduced a
fifteen minute class several times a week called “Men of character between the hedges” which
is a course on character.

Character is the key to living a life of integrity and ethical excellence and supported this
claim by these statements: 1) Character is more than talk, means that we should act what we
say, when we say we are ethical, we should show this by doing things that are considered
ethical; 2) Talent is a gift – Character is a choice, there are things that are already given to us,
and there is nothing much that we could do to change this, but character is different, we are
free to choose what character we should portray to others; 3) Character brings lasting success
with people, trust is essential when working with other people; 4) People cannot rise above the
limitations of their character, there are only three kinds of people, those who don’t succeed,
those who achieve success temporarily, and those who become and remain successful,
character is the only way to achieve success, not talent, money, and appearance.

The author gave guidelines for people who desire to live a life of character and to live by
the golden rule: 1) adopt the golden rule as the integrity guideline for your life, on every
instance we should ask ourselves, “how would I like to be treated in this situation?”, and if you

77
believe with the golden rule then take the advice of nineteenth-century novelist George Eliot
who said, “keep doing true, never be ashamed of doing right, decide on what you think is right
and stick to it.” 2) Make your Decisions based on this integrity guideline, the author mentioned
that we should live by this rule and think about all our decisions if it concur with the golden rule,
according to Confucius, “To know what is right and not do it is the worst cowardice.” The bigger
decision, the more courage is required. 3) Manage your decision based on this integrity
guideline, when we manage our life and all the little decisions by one guideline – the golden rule
– we create an ethical predictability in our life, which means that when we follow one rule, we
become trustworthy and people will have confidence is us , knowing that we consistently do the
right thing. 4) Ask others to hold you accountable for your actions, in order for one person to
grow is to have someone to monitor their actions, that they should be living by high ethical
standards.

What I have learned:

 I learned how to live a 24-karat-gold life

 I learned why character is important more than anything else

Integrative Question:

1. What is a 24-karat-gold-life?

2. What is the “men of character between the hedges”?

3. What is character?

4. What is the golden rule?

5. How do we make decisions based on the golden rule?

78
Ethics and college student life

Chapter 6: Sex, Relationships, and Power

Amazonlink:

http://www.amazon.com/Ethics-College-Student-Kenneth-
Strike/dp/0205173470/ref=sr_1_5?ie=UTF8&s=books&qid=1267405138&sr=8-5

What I expect to learn:

 To learn what ethics does businesses follow at present

Quote:

“…forced sex is a form of exploitation. One person uses another person for his own ends. Thus
forced sex violates the principle of respect for persons. This seems true enough, but perhaps it
understates the case. Rape seems a particularly serious and violent form of exploitation. The
act itself can be experienced as highly degrading, painful, and intrusive, and often it has quite
emotionally destructive long-term consequences for the victim.”

Book Review:

The author suggested few approaches and questions about the ethics of sex. First,
discuss minimal standards for sexual conduct. Second, we want to make a few suggestions
about how one might think of sex as part of durable and meaningful human relationships, and
compare this position to another view of significance of sex. In most western societies, the
minimal standard for sexual conduct between adults is that it should be consensual. Coerced
sex or rape is commonly criminalized. Why? 1) One response is that forced sex is a form of
exploitation. One person uses another person for his own ends. Thus forced sex violates the
principle of respect for persons. This seems true enough, but perhaps it understates the case.
Rape seems a particularly serious and violent form of exploitation. The act itself can be
experienced as highly degrading, painful, and intrusive, and often it has quite emotionally
destructive long-term consequences for the victim.

Perhaps we should not treat rape and seduction as different acts. What should define
rape is not force, but more simply the lack of consent. This thinking lies behind the idea of
criminalizing adult sex with minors which is called a statutory rape. Statutory rape is considered
a violation of minor even when no violence or threat of violence used, because minors are
presumed to be unable to give meaningful consent to sex.

79
One might argue that rape and seduction are different for legal purposes, but not moral
ones. They are different legally because the ambiguity about consent makes it difficult to know
the extent which sex was consensual. Consider, for example, that it has been common for
women to marry men whom they would not otherwise wed for the economic security that such
marriage can provide.

What I have learned:

 The difference of rape and seduction

 Sexual and relationship obligations

Integrative Question:

1. What’s the difference between rape and seduction?

2. What makes rape wrong? Is seduction wrong?

3. Which of the couple should decide whether or not to take abortion? Why?

4. Do friends have an obligation to tell friends painful truths, or should their role be only
supportive?

5. Do we incur ethical obligations by having sex with someone, even if only once? If so,
what kinds of obligations?

*questions were taken from the book

80
12 principles of innovation - Unilab

Pair Work – Unilab run united for wellness

1) Price Performance

A) Gamba – The price is already low because of the inclusive time chip

B) Bernas – The price is not affordable to the bottom of the pyramid

Score: 0

2) Innovation

A) Bernas – they will use time chips for accurate timing

B) Gamba – there is nothing new with the event, most racing events before already did what
this event is offering

Score: 1

3) Scale of operation

A) Gamba – They assigned traffic enforcers to ensure the safety of the runners

B) Bernas – No, because they are causing heavy traffic

Score: 1

4) Eco-Friendly

A) Bernas – Yes, because they want to let us know that we can run long distances and to not
rely on automobiles

B) Gamba – on sports event like this, participants leave a lot of trash, plastic cups, etc.

Score: 1

5) Identifying functionality

A) Gamba – the event’s main purpose is to promote health and wellness of the family

81
B) Bernas – it’s just a waste of time, it’s too early and everybody can run anytime or just go to
gym for workout

Score: 1

6) Process Innovation

A) Bernas – Yes because they are running at different places

B) Gamba – No, this kind of event is common nowadays

Score: 0

7) Deskilling of work

A) Gamba – Yes, everybody is capable of running

B) Bernas – No, because they should also consider people that are disabled

Score: 1

8) Education of customers

A) Bernas – Yes, because it teaches us physical exercise

B) Gamba – I think running is something that is already embedded on us, we don’t need any
formal training

Score: 1

9) Designing for hostile

A) Gamba – The event continues even if it rains

B) Bernas – No, because participants might get sick, and remember that they are promoting
health and wellness

Score: 0

10) Interfaces

A) Bernas – yes, because they divided their services on age and distance category

B) Gamba – No, because they don’t entertain walk-in runners because they already set a
deadline for registration

82
Score: 1

11) Distribution: Accessing the customer

A) Gamba – they created a website for online registration, and posted billboards and other
advertisements regarding the running event

B) Bernas – No because not all people can pay for the running event

Score: 1

12) BOP markets

A) Bernas – Yes, because anyone can join the event

B) Gamba – the problem is the registration fee which most of the BOP cannot afford, and to
think that they need that much money just to participate in a running event, when they can just
run whenever and anywhere they want

Score: 0

Total: 8 / 12

83
Casas Bahia – 20 integrative questions

1) When was CASAS BAHIA founded?

-1958

2) Who was the founder of CASAS BAHIA?

-Samuel Klein

3) What is the center of CASAS BAHIA’s business model?

-credit financing

4) What is the most noteworthy issue that CASAS BAHIA is facing?

-long-term plan succession

5) What important growth factor does CASAS BAHIA’s competitor does not invest in?

-technology

6) What challenge does expansion pose for CASAS BAHIA?

-to conduct further studies on the behavior of customers and new distribution demands

7) What is CASAS BAHIA’s distinction in Brazil?

-largest retail chain in Brazil

8) How area the sales on installment basis called in the CASAS BAHIA business model?

-credit sales

9) What percentage of the CASAS BAHIA’s revenue is spent on technology?

-8 percent

10) Where does CASAS BAHIA get information about the credit history of their customers?

-service of credit protection

11) Why does CASAS BAHIA prefer to get local employees to man their stores?

-for their employees to have a sense of pride and ownership, familiarity on the area, and
proximity to the store

12) What has the company applies so as to allow them to quickly respond to unforeseen problems that
might arise?

-unique network infrastructure that allows them to respond quickly to problems

84
13) How many levels or categories of economic status does Brazil have?

-five levels

14) What are the high income classes of these levels?

-classes A and B

15) What are the low income classes of these levels?

-classes C, D, and E

16) What role does technology have in the company?

-It enables CASAS BAHIA to increase productivity and client satisfaction but lessen the cost of
operations

17) As of 2004, what percentage of the Brazilian population belongs to the lower income classes?

-84 percent

18) Where does work primarily focused in the company?

-to maximize their customer’s buying experience

19) How many initiatives do CASAS BAHIA handles?

-four

20) On average, how many contracts every month that CASAS BAHIA handles?

-800,000

85
Casas Bahia – 12 innovation principles

1) Price performance: 1

- yes, because they focus on modernization and evolving technology

2) Innovation: 1

-they focus on modernization and evolving technology

3) Scale of operation: 1

-they are targeting everyone in the society as customers to reach success

4) Sustainable development: 1

-they contribute resources economically

5) Functionality: 1

-their primary function is to analyze

6) Process Innovation: 1

-business evolves as the generation does

7) Deskilling of work: 0

- Knowledge is important in order for them to be competitive

8) Education of customers: 1

- customers could easily understand how the business works

9) Infrastructure: 1

-the flow of data is well organized

10) Interface: 1

-it evolves with the existing technology

11) Accessing the customer: 1

-customers will bring success to CASAS BAHIA

12) BOP markets: 1

-they were able to connect with the BOP market

TOTAL: 11/12

86
IEEE

Ethics book Strength Weakness


1) ACM code of ethics and S1 – the codes inspire the W5 – the directives in the code
professional conduct members of a profession to tends to be inconsistent and
behave ethically contradicting with other codes
S3 – the codes educate the W7 – the code only focuses on
members of a profession about the code and profession itself
their professional obligations
S4 – the codes discipline the
members whenever they violate
a code
2) BCS Code of conduct S3 – the codes educate the W1 – the code is too general and
members of a profession about vague
their professional obligations W4 – the code is ineffective and
S5 – the codes tend to sensitize lacks the power to enforce
members of a profession to discipline
ethical issues and alert them to W7 – the code only focuses on
ethical aspects that they might the code and profession itself
overlook
S6 – the codes informs the
public about the nature and
roles of profession
3) IEE code of ethics S1 – the codes inspire the W1 – the code is too general and
members of a profession to vague
behave ethically W4 – the code is ineffective and
S2 – the codes guide the lacks the power to enforce
members of a profession in discipline
ethical choices
S3 – the codes educate the
members of a profession about
their professional obligations
S5 – the codes tend to sensitize
members of a profession to
ethical issues and alert them to
ethical aspects that they might
overlook
S7 – codes enhance the
profession in the eyes of the
public
4) Australian computer society S1 – the codes inspire the W4 – the code is ineffective and
code of ethics members of a profession to lacks the power to enforce
behave ethically discipline
S3 – the codes educate the W7 – the code only focuses on
members of a profession about the code and profession itself

87
their professional obligations
S6 – the codes informs the
public about the nature and
roles of profession
S7 – codes enhance the
profession in the eyes of the
public
5) Software engineering code of S3 – the codes educate the W1 – the code is too general and
ethics and professional practice members of a profession about vague
their professional obligations W4 – the code is ineffective and
S5 – the codes tend to sensitize lacks the power to enforce
members of a profession to discipline
ethical issues and alert them to W6 – the code does not
ethical aspects that they might distinguish between micro and
overlook macro ethics issues
S6 – the codes informs the W7 – the code only focuses on
public about the nature and the code and profession itself
roles of profession
S7 – codes enhance the
profession in the eyes of the
public

88
ICICI Bank

1. What is ICICI Bank's innovation?


Empowering the poor and convert them into customer

2. What is special about RBI's pilot project with NABARD in 1991?


RBI's pilot project with NABARD is for purveying micro credit to the rural poor by linking self
help groups with banks

3. According to Mahajan, why are the transaction costs of savings in formal institutions as high as 10%
for the rural poor?
Transaction costs of savings in formal institutions as high as 10% for the rural poor because of
the small average size of transactions and distance of the branches from the villages

4. What are some of the problems of MFIs in India?


Some problems of MFIs in India is access to credit

5. What are the two innovative BOP models of the ICICI?


Bank-led model and indirect channels partnership model

6. What is the connection between Grameen Bank and Bank of Madura?


Both banks provides small loans to clients that belong to the bottom of the pyramid

7. Describe ICICI's three-tier system. Discuss why it is three-tiered.


They had three-tier system for increased distribution points

8. What are the 3 essential steps in the SHG process? Comment on why each step is necessary.
a) learn to save
b) learn to lend what you saved
c) learn to borrow responsibly

89
9. Discuss the NABARD checklist for SHG's. Comment on why each item on the checklist is necessary.
The checklists correlate with high repayment rates and characteristics of the SHGs, whenever
SHG meets a certain number of criteria, the loan officer is instructed to grant the loan immediately. If
the SHG is lacking many areas, loan application is suspended and the group is granted 4-6 months to
improve its operation

10. What is the impact of micro lending in a household according to a NABARD study?
The micro lending has a significant positive impact on income levels and income-generating
activities. The involvement of the members in SHG activities has contributed to their self confidence and
communication skills.

11. Discuss the possible implementation of a smart-card based payment system? Would it work? Why?
The use of smart-card system is to eliminate costs associated w/ cash handling. Some of the
problems about smart-card are high cost and lack of technological infrastructure for widespread
adoption. It would work because they already launched it in October 2000 at Infosys Campus in
Bangalore and at Manipal Academy of Higher Education.

12. Discuss the quote: "Banking with the poor has undergone a paradigm shift. It is no longer viewed as
a mere social obligation. It is financially viable as well". Do you think this quote can be applied in the
Philippines? Discuss.
I think what it says is that banking has shift from average people and higher class people using
the bank to poor people up until the high class people. This would be possible in the Philippines if there
are corporations that are willing to help and devote their time in thinking how this will work for the poor
people.

90
ITC e-choupal

1. What is the innovation of the e-Choupal?

E-choupal is a link of ITC limited, a multi business conglomerate in India, directly with
rural farmers for buying supplies and selling their products to the internet via phone lines or
VSAT connection.

2. Discuss the paradox of Indian Agriculture?

Indian agriculture is characterized by fragmented farms, weak infrastructure, and


involvement of numerous intermediaries who makes most of the profit

3. Why is soya an important innovation in the Indian oilseed complex?

Soya resulted in better utilization of scarce resources and greater cropping application

4. Describe the marketing process before the introduction of e-Choupal.

Before the introduction of e-choupal, intermediaries buy the products of farmers with an
unfair means in judging the quality of products therefore farmers earn lesser as compared to
when E-choupal was implemented, intermediaries are eliminated, and farmers could make
transaction with the buyers through internet

5. Why is the mandi not an optimal procurement channel?

Mandi is ineffective and frequently dishonest on stating prices for the quality of the
products

6. What were the advantages of ITC's competitors? How did ITC address them?

The horizontal integration deficiency was addressed through CRM-based solutions to


identify and provide nonstandard needs of customers in an industry where basic services are
standardized. Customized IT application and realignment of business goals and processes will be
implemented to deal with the risk.

7. How did ITC "re-engineer as opposed to reconstruct"?

ITC identified the good qualities of their current system then thought of improvements to
further develop their system

8. How did ITC "address the whole, not just a part"?

They assigned a sanchalak, a trained farmer to host the PC with e-choupal

91
9. Was it wise for ITC to install an IT-driven solution where most people would not?

Yes, because with this IT solution, farmers could easily transact with buyers far from
their area, they could also learn good farming practices.

10. Why does the ITC insist that the sanchalaks NOT give up farming?

ITC insists sanchalaks to not give up farming, this would compromise the trust the
sanchahlaks commands.

11. Why did the samyojaks introduce the ITC to the sanchalaks?

They introduce ITC to sanchalaks because ITC’s communications with the samyojaks
carried clear messages, a conscious effort was made to divert revenue to samyojaks and every
effort was made to maintain the level of samyojaks’ trust.

12. Describe the new ITC value chain. How different is it from the former value chain?

The new value chain includes the stage pricing, inbound logistics, inspection grading,
weighting payment and hub logistics.

13. What is the social impact of the e-Choupals?

It improved the income of the farmers

14. Describe Wave 6 of the e-Choupal. DO you think it is feasible?

Wave 6 of e-choupal is sourcing IT-enabled services from rural India. Some services are
telemedicine, ecotourism, traditional medicine, and traditional crafts. I think this is feasible
because these are easier by far as compared to the crops.

15. Can something similar to an e-Choupal be implemented in the Philippines?

Yes, so that farmers on the provinces could sell their products for a fair price

92
Jaipur Foot case study

1. What is the innovation of Jaipur Foot?

Jaipur Foot is an artificial limb which only costs $30. It is tailored to the active lifestyle of
the poor and it is much cheaper and affordable than the ones produced in the U.S.

2. What is the business of Jaipur Foot?

Their business is to provide cheap and affordable prosthetic limbs to bottom of the
pyramid which is suitable in their living environment.

3. Who are the main beneficiaries of Jaipur Foot's products?

Amputees who are in the bottom of the pyramid

4. Why is Afghanistan one of the markets of Jaipur Foot?

Afghanistan have been on several wars, and there are a lot of incidents wherein people
accidentally steps on landmines thus getting their feet or limbs amputated

5. How does Jaipur Foot's product pricing compare with the West?

It is a lot cheaper than those sold in the west

6. What is the Gait Cycle?

It describes the way people walk.

7. How was the first Jaipur Foot artificial limb developed?

It was made by Ram Chandra who was born in a family of artisans. He made the first
Jaipur Foot from rubber where he got the idea from having a flat tire while thinking of an
alternative way of having a prosthetic foot that is flexible enough to squat or cross-leg.
With the help of other doctors, they developed an artificial limb.

8. What are the design considerations in the Jaipur Foot Design Process?

They designed the prosthetic limbs that gives flexibility to the user and helps them
perform their usual jobs.

9. What are the constraints in the development for Jaipur Foot?

The major constraints in the development of Jaipur Foot are the following:

93
 The target market is the lower class and as a result they need to design their in a way
that poor people can afford it.
 Importation of foreign materials is limited.
 Limited Manpower.

10. How can you compare the raw materials for Jaipur Foot vs. other products?

It is cheaper and locally made.

11. Explain a typical fitting day for a Jaipur Foot? How does it compare with the West?

Jaipur Foot does not focus on speed of service alone, they see to it that they also meet
the psychological needs of the patients and serve free food and accommodations for
their patient’s relatives.

12. What is the BMVSS? How does Jaipur Foot conduct community outreach?

Bhagwan Mahaveer Viklang Sahayata Samiti (BMVSS) is a nongovernment, nonprofit


and non-religious organization that primarily fabricates and fits Jaipur Foot.

13. Compare Jaipur Foot with Ossur - which one is more competitive? Why?

Jaipur is more competitive because Jaipur’s pricing is cheaper but at the same time they
are still able to provide a product that is of good quality.

14. Is the Jaipur Foot model scalable? Explain.

Yes, through the camp system which allow them to reach to remote areas of India

15. What is the significance of Jaipur Foot's cooperation with ISRO?

It allows them to reduce the cost of manufacturing and also allowed them to make the
product lighter.

94
Hindustan Lever Limited case study

1. What is the innovation that HLL introduced in the area of diarrheal disease prevention?

They helped increase awareness on diarrheal disease prevention. According to them


the best way to prevent this disease is hand washing.

2. Why is hand washing an excellent preventive measure against diarrheal disease?

Because washing hands with soap can reduce diarrhea attacks by 48 percent. Also since
a lot of the food we eat needs to be touched by our hands we need to clean our hands in order
to prevent germs or bacteria from entering our system.

3. Why is an MNC in the best position to influence behavioral change in combating diarrheal
disease?

A multinational corporation especially in the soap industry has the capacity to reach out
to all the social levels in India.

4. According to Yuri Jain of HLL, what is the connection between diarrheal disease prevention
and HLL products?

HLL is a very popular retailer of soap. This is why any messages that they send out can
be heard by a lot of people. When they inform the people about the dangers of not washing
your hands because it can lead to diarrheal diseases many people will listen because they trust
HLL.

5. According to Harpreet Singh Tibb, what is the connection for HLL between economy, beauty
and health?

According to Tibb, if the HLL could successfully establish why health is important or
why soaps contribute to the reduction of health incidents, then they can save money from
medical bills which can be a long term savings.

6. What was the impact of the Central American Hand washing Initiative to its beneficiaries?

It helped people develop a habit of washing their hands before and after eating which
helped reduce the risk of diarrheal disease.

7. What was the reason for Dr. Vedana Shiva's opposition to the PPP? Is it justified?

Dr. Shiva thinks that women in Kerala are literate enough to know about health and
hygiene. Having PPP would be an insult to them.

8. If you were in a position to decide how to go ahead with PPP while knowing the opposition
how would you go about it?

95
I would go ahead because even though it is insulting to a lot of people there is still a
large number of people out there who does not know the dangers of refusing to wash their
hands.

9. How did Lifebuoy re-brand itself? Do you agree with HLL Chairman Marvinder Sing Banga's
decision? Why?

Lifebuoy re-branded itself through creation of other products other than soap wherein
they also plan to have products such as talc powder, shampoos, and others.

10. What is Chairman Banga's approach to costing Lifebuoy? Do you agree with this approach?

They made it in such a way that they can price it low enough for the masses to afford. I
agree with this approach because by doing this they would be able to increase awareness of
diarrheal disease and the same time increase their sales because more and more people will
purchase their products.

11. What is the key to sustained community behavioral change according to Harpreet Singh
Tibb?

The key is to be interactive. They must encourage the communities that they have
reached to pass along what they have learned to other people and other communities.

12. The Lifebuoy Swasthya Cheetna program decided to go through the local school system?
Would this approach work in the Philippines?

I think that this will work in the Philippines because there are soaps in our country that
are cheap enough for the masses. Also i think that Filipinos are open to learning new things.

13. What is the Lifebuoy Swasthya Cheetna's process for creating behavioral change?

a) Initiation and Information

b) Large Scale Propagation

c) Reinforcement and preparing for sustainability

14. Each exposure in the behavioral change process involved 5 key communication tactics? Can
you add or subtract to these tactics? Would these tactics work in the Philippines?

I think that these tactics would work in the Philippines.

15. Explain the germ-glow demonstration. Do you think it was effective? Are there any
alternatives?

The germ-glow demonstration was able show the people that visually clean hands are
not safe clean.

96
16. How did you think the Swasthya Cheetna program impact HLL? Was it a success?

Yes it was a success, it improved the image of HLL. It also helped increase customer
loyalty.

17. How can wealthier Indian populations benefit from the health and hygiene messages?

It would help remind them to maintain their hygiene.

18. Is the PPP scalable? What about the Swatshya Cheetna program?

No it is not scalable.

19. Yuri Jain claims that PPP has scale. Do you agree with him?

Yes, since some benefits can be quantifiable, it can be scaled.

20. Why do you think PPP was slowed down while the Swathsya Cheetna program pushed
through?

It is due to same goals that results to confusion to both projects.

97
Book of Eli – movie review

The Book of Eli has an interesting story about a man in post-apocalyptic America to convey an
unnamed book somewhere part of the west coast. It happened thirty (30) years after an immense war
which blew a hole in the sky, much like a nuclear war, that ruined the totality of the world. Eli has been
travelling under the most miserable of circumstances for thirty (30) years which only proved that he has
a powerful conviction and determination to the calling. On his journey to the west he encountered
hijackers and cannibals that he needs to avoid and fight. Eli manages himself and takes down anyone
who tries to get in his way. The essential of the movie happens when he breaks off in a small town
headed by Gary Oldman and his cruel motorcycle riding gangs. The succeeding conflict is yet another
test of Eli's convictions. The movie ended in a surprisingly manner that would definitely make the
viewers think back of the previous scenes.

Denzel Washington (Eli) is a remarkable actor that possesses the undoubtedly charisma he
convey to all of his roles. Talking about the making of the movie itself, the movie has exhibits an action
sequence that made it more stimulating for the viewers. For me, the movie has a philosophical message
that I considered spiritual. Spiritual in the way it presents the role of the bible in today's modern world.
It also exhibits the power of the spoken and written words in combination with faith in times of
catastrophe. Definitely, I would suggest watching the movie for the film holds a certain attribute that is
most of the time lacking in the today’s film. The Book of Eli seems to be a combination of Western,
action, drama, and etc. all combined in a futuristic yet historical and spiritual way.

98
Voxiva case study

1. What is the innovation of Voxiva?

To collect data in real time from large numbers of dispersed people and to enable
communications and messaging services that affect immediate change.

2. What are the 3 ingredients of an effective system of disease surveillance and response?

a) threat

b) early detection

c) urgent reaction and a basic communications infrastructure

3. According to Meyer, what are his finding regarding ICT projects?

a) most of the projects dedicated to bridging the digital divide were not scalable

b) Donors suffered from dot-com fever – there was a significant investment going to projects or
programs that improved connectivity, such as tele-centers or computers at schools, but there
was also a lack of architectural forethought into how the technology and connectivity can be
integrated into wider systems to solve fundamental problems in conveying the service to public

4. What is Meyer’s observations regarding the use of telephones worldwide?

Meyer observed that people were ignoring the fact there are a lot more telephones in the world
and deduced that telephones is more accessible, a practical device for most people other than
internet

5. What was the problem that Voxiva was originally designed to solve?

The first application is a solution that combines the internet and telephone to extend the
benefits of software application to people without access to the internet

6. What are Alerta Pilot’s benefits?

a) Allows 2-way communication among users of the disease surveillance system

b) Facilitates and simplifies the coordination among the different management and operation
levels that are concerned with the disease surveillance

99
c) Provides a unique DB for all users, to make a technical and specialized analysis in near-real-
time or historical trend analysis

d) Reduce errors in the DB since the person who enters data is the same reporter

e) Permits exporting the data to DBF, excel and others

f) Conforms to use any format within specialized or legacy software

7) How can Voxiva help eradicate diseases?

Faster response to the needs

8) How can Voxiva be used for bioterrorism preparedness?

It can be used for quick information dissemination since communications are improved

9) What are some of the lessons learned in Voxiva’s deployment in other countries?

The cost and needs for implementation would vary depending on the country

10) What are some of Voxiva’s challenges?

To gain full support from the public sector in implementing their projects in healthcare services

11) What is Meyer’s belief’s regarding diversity? What is its connection to innovation?

He believes that India is a market where their product could be sold easily. Most people from
the BOP doesn’t have access to internet but have mobile phones for communication, thus
makes them accessible to the health services

12) Can this system be implemented in the Philippines? What target disease would you recommend?

Yes, this system could be used in case of another epidemic just like H1N1

100
Copyright, Privacy, and Anonymity

1) What is EFF?

Is an international non-profit digital rights advocacy and legal organization based in the United States

2) Who is Lawrence Lessig?

He is an American academic and political activist. He is best known as a proponent of reduced legal
restrictions on copyright, trademark, and radio frequency spectrum, particularly in technology
applications.

3) What is creative commons?

Is a non-profit corporation dedicated to making it easier for people to share and build upon the work of
others, consistent with the rules of copyright

4) Who is Bruce Schneier?

He is an American cryptographer, computer security specialist, and writer. He is the author of several
books on computer security and cryptography, and is the founder and chief technology officer of BT
Counterpane, formerly Counterpane Internet Security, Inc.

5) What is Advanced Encryption Standard?

In cryptography, it is an encryption standard adopted by the US government. It is based on a design


principle known as Substitution permutation network. It is fast in both software and hardware.

6) What is PGP?

Pretty Good Privacy is a computer program that provides cryptographic privacy and authentication.
PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail
communications.

7) Who is Phil Zimmermann?

He is the creator of PGP, the most widely used email encryption software in the world. He is known for
his work in VoIP encryption protocols, notably ZRTP and Zfone.

101
Bahnsen’s basic training defending the faith part 1

Part 1: The myth of neutrality

Amazon link:

http://cshayden.blogspot.com/2005/12/bahnsens-basic-training-for-defending.html.

What I expect to learn:

 The myth of neutrality

 Bahnsen’s training method

 How could I defend my faith by knowing the myth of neutrality

Quote:

“Christ is the source of all truth and righteousness. He alone possesses the key to wisdom, so
we will fail in any endeavor that refuses to acknowledge His Lordship.”

Book Review:

Dr. Greg Bahnsen was an influential Calvinist philosopher, apologist, and debater. He
was an ordained minister in the Orthodox Presbyterian Church and a full time Scholar in
Residence for the Southern California Center for Christian Studies. He puts to rest this notion
that Christians are biased, while others are truly objective. He presented two very basic yet
profound statements that run contrary to much of modern Christian apologetics: First, they are
not neutral. Second, we should not even try to be neutral.

Bahnsen encourages us to resist the intellectual bullying we will inevitably encounter


and to avoid returning bullying. We will not glorify God or win favor with our adversaries if we
start bullying, even if our opponents try to bully us into subjection. We must learn genuine
humility and refrain from “winning argument” by introducing concepts or using terminology
that our opponents do not understand. If they try this tactic on us, we should acknowledge that
we are unfamiliar with their concepts or terminology and ask them for clarification. Finally, we
should realize that the world, including college professors, will have double standards. Such
professors demonstrate that neutrality is impossible as they selectively emphasize or silence
ideas according to their personal preferences, beliefs, and priorities.

102
Among his important points were the following:

 God wants us to be consecrated, holy, and set apart to Him. We cannot do this if we
embrace neutrality, which compromises our standing before Him
 Neutrality will rob us of our ability to gain knowledge and wisdom. We must fear
the Lord in order to have wisdom. The unbeliever should live in dread of God; it is
supremely irrational for an unbeliever to live without fearing God’s judgment upon
their rebellion and pretended autonomy. If we embrace neutrality, we rob ourselves
of the treasures of wisdom and knowledge in Christ.
 We should reject so-called “wisdom” and “knowledge” that runs contrary to God’s
Truth. Everyone has a system of presuppositions and a notion about truth called a
worldview, and we should evaluate the ideas we hear in terms of their adherence to
Scripture.

What I have learned:

 The myth of neutrality

 That Christians should not aim for neutrality

 That neutrality will rob us of our ability to gain knowledge

Integrative Question:

1. What is the myth of neutrality?

2. What is Bahnsen’s defense on this myth?

3. Why should we not aim for neutrality?

4. What is the notion about Christians?

5. What are the two statements given by Bahnsen that run contrary to much of modern
Christian apologetics?

103
Bahnsen’s basic training defending the faith part 2

Part 2: Introduction to worldviews

Amazonlink:

http://cshayden.blogspot.com/2005/12/bahnsens-basic-training-for-defending_23.html

What I expect to learn:

 An introduction to worldviews

 How could I defend my faith by knowing the worldviews

Quote:

“The Christian has counterparts for every metaphysical, epistemological, and ethical
presuppositions of the unbeliever. In short, we believe in creation, the fall, redemption, and
final consummation. These things have definite implications in every area. God is the Creator,
and this is His universe. Thus, His Word teaches us about metaphysics. We have sinned and are
fallen creatures before Him. We can become renewed in our godly image and apprehend true
knowledge, so our faith has definite implications in epistemology.”

Book Review:

Dr. Bahnsen defines worldview as a network of presuppositions which are not tested by
natural science and in terms of which all experience is related and interpreted. These
presuppositions are very fundamental and logically basic assumptions. They are preconditions
for thinking and provide a basis by which to determine what problems are important and to
evaluate solutions for solving them. Not everyone realizes that worldviews are inescapable;
some will deny that they possess a worldview. Our goal must be to force them to think
consistently in terms of their worldview.

A worldview is a packaged deal. We as Christians are committed to Christ in our


thoughts and actions. Dr. Bahnsen makes the important point that if we commit ourselves to
Christ at any point, we must yield to Him in everything. To deny His Lordship in one area is to
surrender His sovereignty over everything. We cannot serve two masters, so we must make
Christ preeminent in every area; we must have a distinctively Christian way of looking all areas.
Dr. Bahnsen clearly rejects religious pluralism and syncretism as he concludes that Christianity
is not just one idea among many that can be integrated with other belief systems; its claims are
exclusive and singular, and we must accept or reject the system as a whole. We cannot pick
those areas in which we wish to exalt Christ as Supreme.

104
Dr. Bahnsen presented three categories of questions that every worldview must
answer. First is metaphysics, study of origin, structure, and nature of equality. Second is
epistemology, the theory of knowledge, this deal with the nature and limits of knowledge as
well as methods used to pursue knowledge, It asks how one justifies and accounts for
knowledge and explores concepts such as truth and beliefs. Third is ethics, the study of good
and bad, right and wrong, It deals with attitudes and actions, moral responsibility and
obligations.

What I have learned:

 The definition of a worldview

 Three categories of questions that every worldview must answer

 Four basic worldview options

Integrative Question:

1. What is worldview?

2. What is monism?

3. What is dualism?

4. What is atomism?

5. What is pragmatism?

105
Bahnsen’s basic training defending the faith part 3

Part 3: Worldviews in conflict

Amazonlink:

http://cshayden.blogspot.com/2005/12/bahnsens-basic-training-for-defending_30.html

What I expect to learn:

 How do worldviews came into conflict with one another

 How to defend the faith with these worldviews in conflict

Quote:

“God has made Himself clear and given us plenty of evidence. He pours His wrath and judgment
upon unbelieving cultures and also reveals Himself in creation. The problem is not with Him but
with our sin and unbelief. Unbelievers rationalize God away and try to justify their unbelief.
They invent ideas and worldviews that say it is impossible for finite minds to interact with an
infinite God. They make excuses for their sin and declare themselves righteous. They suppress
the truth and then say there is no truth to be found. Make no mistake: God did not fail to get His
point across. The problem is sin and unbelief, not lack of evidence.”

Book Review:

Dr. Bahnsen extends this training about worldviews beyond simply diagnosing the
various philosophies we will encounter. He discusses the antithesis between Christians and
unbelievers, sharing insight on how this plays out in our ideas and actions.

We must understand the concept of antithesis as we confront hostile and rival claims
against our faith. As Christians, we have an irresolvable conflict between our faith and various
other outlooks on reality, knowledge, and ethics. Starting at the fall of Adam and Eve and
continuing to the present, God has ordained an antithesis between the seed of the woman and
the seed of the serpent – between our world and life view and theirs.

Although unbelievers and believers are often inconsistent in terms of their own
worldviews, our thoughts should lead us in completely divergent directions. Sometimes we say
similar things and act in similar ways as unbelievers, even when these thoughts and actions are
consistent with Christianity. Unbelievers can make truthful statements and perform seemingly
good actions.

106
Dr. Bahnsen concludes that our key to defending the faith is to demonstrate the vanity,
unreasonableness, and inherent contradictions in other worldviews. He says we do not all need
to totally devote our lives to studying philosophy, ideas, and worldviews. Christians must be
equipped to think like Christians and defend the faith against all rival claims. We must
recognize the antithesis between God’s people and humanists. We must understand that
Christians and unbelievers, in principle, have nothing in common. Any truth or righteousness
that they profess is borrowed from us and does not square with their professed
presuppositions.

What I have learned:

 That Christians must be equipped to think like Christians and defend the faith against
all rival claims.

 That the problem is sin and unbelief, not lack of evidence

Integrative Question:

1. What must we do when confronting hostile and rival claims against our faith?

2. What should be our objective?

3. Why do unbelievers sometimes borrow from our worldview?

4. Is lack of evidence the problem? Why or why not?

5. What is the key for defending the faith?

107
Authority of God’s law today

1) What is the purpose of this book?

This is systematically basic to Christian ethical reasoning. It asks a question which is impossible
to avoid and which influences every other aspect of one’s ethical theory.

2) Christian ethics depends on?

It naturally depends upon God’s self-revelation and the proper understanding of His word.

3) What is disturbing in Christian ethics in answering normative questions?

The disturbing thing is that so many Christian teachers and writers answer them without sufficient
Biblical proof or concern for consistency. It is as though personal feelings give them subsequently
seeking some kind of reason.

4) On what standards should Christians live?

The standards that the Christians live should not be restricted to the New Testament but includes
the law of God revealed in the Old Testament.

5) According to this article, explain the word of the Lord

The word of the Lord is the sole, supreme, and unchallengeable standard for the actions and
attitudes of all men in all areas of life; this word naturally includes God’s moral directives.

6) What do God’s standing laws reflect?

It reflects His immutable moral character and, as such, are absolute in the sense of being non-
arbitrary, objective, universal, and established in advance of particular circumstances.

7) What is the obligation of civil magistrates in all ages and places?

It is to conduct their offices as ministers of God, avenging divine wrath against criminals and
giving an account on the final day of their service before the King of kings, their creator and
judge.

8) What is Theonomic ethics?

108
It rejects legal positivism and maintains that there is a law above civil law to which appeal can
be made against the tyranny of rulers and the anarchy of overzealous reformers alike.

9) Where can we turn for socio-political wisdom which can effectively counter the degeneration and
disintegration of our culture?

Turn to God’s directives for social justice, and those are found in the Old Testament
commandments to Israel as a nation, a nation facing the same moral problems about life, sex,
property, and truth which all nations must face, including our own.

10) Do people consistently maintain their position of holding only to the New Testament ethics?

No, Christians do not find it a workable policy to follow, departing from the position whenever
it seems convenient or necessary to do so. That simply opens the door to arbitrariness.

109
Transcendental Argument for the Existence of God

Transcendental argument attempts to prove that the Christian God is the precondition of all human
knowledge and experience, by demonstrating the impossibility of having logic, reason, or morality
without God. The argument proceeds as follows:

1. Knowledge is possible

2. If there is no god, knowledge is not possible

3. Therefore God exists

The TAG argues that, because the triune God of the Bible, being completely logical, uniform, and good,
exhibits a character in the created order and the creatures themselves, human knowledge and
experience are possible. This reasoning implies that all other world views, when followed to their logical
conclusions, descend into absurdity, arbitrariness or inconsistency. One aspect on the TAG regards
objective morality. The argument asserts that an omnibenevolent God provides the basis for attributing
right and wrong to any thought or action. In creation God equips humanity to act as moral beings, and
in self-revelation God demonstrates how people should act, and commands them to do so. People then
have an objective source for their standard of morality by which to condemn evil thoughts and actions.
No moral assertions, it is argued, can be explained by the relativist’s worldview; they are instead
derived from unconsciously “borrowed capital” from Christianity, proving the truth of the Christian
worldview. Matthew Slick’s TAG is an attempt to demonstrate the existence of God using logical
absolutes. The oversimplified argument goes as follows: logical absolutes exists, logical absolutes are
conceptual by nature, are not dependent on space, time, physical priorities, or human nature. They are
not the product of the physical universe, because if the physical universe disappear, logical absolutes
would still be true. Logical absolutes are not the product of human minds, because human minds are
different, not absolute. But, since logical absolutes are always true everywhere, and not dependent
upon human minds, it must be an absolute transcendent mind that is authoring them. This mind is
called God. Greg Bahnsen offered a defense against all criticisms of TAG, entitled “The transcendental
argument for God’s existence”, which examines the TAG along with the transcendental arguments in
the contemporary philosophical literature and defends them against objections. As the most common
objection is the claim that the TAG involves circularity, the defense will be briefly outlined. Proponents
of the argument claims that worldview level considerations are supposed to be circular as a sign of
internal cohesion. In dealing with the inevitable circularity of worldviews, Bahnsen maintains that two
criteria must be met to demonstrate a given worldview as true:

1. Interal consistency – the statements made by the worldview do not contradict one another or
otherwise lead to internal contradictions. Logical Positivism fails this test by its claim
that “A statement is literally meaningful if and only if it is either analytic or empirically
verifiable, “a statement that is not itself verifiable analytically or empirically.

2. Arbitrariness – the statements must not be believed simply out of convenience, tradition, or
prejudice

Several criticisms of the TAG have emerged. One says that TAG is not a distinctive form of
argument: this objection claims that the form of the TAG is really just a reworking of the standard

110
deductive and inductive forms of reasoning; it claims that there is really not much difference between
Thomas Aquinas and Cornelius Van Til. The TAG does not fulfill the necessary prerequisites for an
Argument of Proof – that is, to have already proved the foundational premises before the conclusion is
made. Any premise that has not been proved, by its very nature, is an assumption and is considered to
be begging the question. An assumption, by definition, might be wrong. Therefore, an Argument of
Proof cannot be based on foundational premises that are assumptions. Every premise must be proven
prior to the conclusion being made. Those versions of TAG that are dependent on the foundational
premise that “something not conceptual must be physical” yet this notion has not been proved.
Therefore, that premise is an assumption. Thus TAG cannot be offered as proof. The TAG moves from
conceptual necessity to necessary existence. This criticism argues that proving the conceptual necessity
of a worldview doesn’t establish its ontological reality. In other words: one may need think about the
world in a certain way in order to make sense of one’s experience and knowledge, but that doesn’t
prove that the world actually is that way. David P. Hoover has raised this objection in his article “For the
sake of Argument”. The TAG uses another form of begging the question, circular reasoning: the TAG
assumes, from the beginning, what it intends to establish by its conclusion. The TAG does not provide a
uniqueness proof: even if the TAG can prove the existence of a god, it doesn’t prove that of the
Christian god. Any sufficiently similar god, such as Allah, would do. John Warwick Montgomery
presented this objection in the article “Once upon an A Priori…”, presented in Van Til’s festschrift,
Jerusalem and Athens. In argumentation, apologists will attempt to demonstrate that only the
Christian worldview satisfies these conditions and is therefore coherent. However, Van Tillian
presuppositionalists also point out that these conditions are applicable only because they themselves
presuppose Christianity. To say that Christianity is true because it meets these conditions is to say that
a greater standard exists than that of the God of the Bible. However, if you accept the fundamental
Christian assertion that the Bible is the direct word of God, then such a charge would be without
warrant as the Bible would then be the final epistemological authority of Christianity. Using this
rationale, the preconditions of intelligibility are determined merely by Scripture not by autonomous
human reasoning. But the divine origins of the Bible are not universally accepted, and the idea of the
Bible being a product of man rather than being from a divine source has been debated in modern circles
since at least 1878 when Julius Wellhausen first published Prolegomena zur Geschichte Israels. The
question has yet to be definitively answered by scholars. A critique of the argument from morality is
that since there is no evaluative domain from which to demonstrate a source for morality, it can’t be
said that morals are anything more than opinions that we force other people to follow. On the other
hand, it cannot be demonstrated that the source is absolutely subjective either. Without a measurable
source of morality, it cannot be demonstrated absolutely that morality has either an objective or
subjective source. Criticism of Matt Slick’s version of TAG says that it can be dismissed because logical
absolutes are truth statements based on the law of identity, and are not things. When these are
confused, the argument becomes circular. A truth statement is a concept, which does not exist without
a mind to think it, as stated in Matt’s definition. For example, if you make the law of identity statement,
“This apple is an apple, and it is not not an apple”, the truth about the apple is not contingent on the
mind making the statement, the statement itself is the thing contingent on the mind. At the point of
this confusion, the argument becomes circular, a form of begging the question and offers of an
explanation are not necessary since the premise is flawed and no logical syllogism can be made.

After all these criticisms and defense on existence of God, my position remains the same, I
believe that GOD exists, I don’t care on what they said about looking for proof of His existence, for me
He do exists, I don’t have a proof if He really do, but me and my family share the same FAITH in Him,
and this faith will never falter with any criticism. Faith is a choice of every individual; it is believing all of
the Christian worldview or not.

111
EFF issues

1) What is critical to sustaining free speech?

Preserving the internet’s open architecture

2) What is Anonymity?

Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose
behind the Bill of Rights and of the First Amendment in particular: to protect unpopular
individuals from retaliation at the hand of an intolerant society.

3) What are the rights of a blogger?

Bloggers are entitled to free speech.


Bloggers have the right to political speech.
Bloggers have the right to stay anonymous.
Bloggers have freedom from liability for hosting speech the same way other web hosts do

4) What is CyberSLAPP?

CyberSLAPP are cases that involve defending people’s rights to remain anonymous
when they post comments on message boards, as well as making sure that anonymous
speakers’ due process rights are accepted.

5) What is fair use?

That’s what the courts call when you quote someone on your blog, insert clips of CNN
into your own video news report, or using a song sample in a music parody, your free speech
often depends on incorporating and referencing other people’s creations as part of your own.

6) What is innovation?

Innovation is a new way of doing something or new stuff that is made useful.

7) Explain “accessibility for the reading disabled”.

New technology has the potential to dramatically improve the lives of those with
reading disabilities -- including the blind and profoundly dyslexic, and those with spinal injuries.
Information in electronic formats can be made accessible using technologies like text-to-
speech and refreshable Braille, opening up whole new worlds to people who have previously
been unable to access information.

8) What is broadcast flag?

Today, you can use any device you like with your television: VCR, TiVo, DVD recorder,
home theater receiver, or a PC combining these functions and more. But if the broadcast flag
mandate is passed, Hollywood and federal bureaucrats will get a veto over innovative devices
and legitimate uses of recorded programming.

112
9) What is Coder’s right project?

EFF's Coders' Rights Project protects programmers and developers engaged in cutting-
edge exploration of technology in our world. Security and encryption researchers help build a
safer future for all of us using digital technologies, yet too many legitimate researchers face
serious legal challenges that prevent or inhibit their work.

10) What is digital rights management?

Major entertainment companies are using "digital rights management," or DRM (aka
content or copy protection), to lock up your digital media. These DRM technologies do nothing
to stop copyright pirates, but instead end up interfering with fans' lawful use of music, movies,
and other copyrighted works. DRM can prevent you from making back ups of your DVDs and
music downloaded from online stores, recording your favorite TV programs, using the portable
media player of your choice, remixing clips of movies into your own home movies, and much
more.

11) What is net neutrality?

Net Neutrality is a principle proposed for user access networks participating in the
Internet that advocates no restrictions on content, sites, or platforms, on the kinds of
equipment that may be attached, and on the modes of communication allowed, as well as
communication that is not unreasonably degraded by other traffic.

12) What is a patent?

A patent is a set of exclusive rights granted by a state (national government) to an


inventor or their assignee for a limited period of time in exchange for a public disclosure of an
invention

13) What is trusted computing?

Trusted computing" initiatives propose to solve some of today's security problems


through hardware changes to the personal computer. Changing hardware design isn't
inherently suspicious, but the leading trusted computing proposals have a high cost: they
provide security to users while giving third parties the power to enforce policies on users'
computers against the users' wishes -- they let others pressure you to hand some control over
your PC to someone else.

14) What is intellectual property?

Intellectual property is a term referring to a number of distinct types of legal


monopolies over creations of the mind, both artistic and commercial, and the corresponding
fields of law.

15) What is digital radio?

Digital radio describes radio technologies which carry information as a digital signal, by
means of a digital modulation method.

16) What is digital video?

113
Digital video is a type of video recording system that works by using a digital rather
than an analog video signal.

17) What is DMCA?

Digital Millennium Copyright Act, has become a serious threat that jeopardizes fair use,
impedes competition and innovation, chills free expression and scientific research, and
interferes with computer intrusion laws.

18) What is File sharing?

File sharing is the practice of distributing or providing access to digitally stored


information, such as computer programs, multi-media (audio, video), documents, or electronic
books.

19) What is Terms of Use/Service?

Using a TOS, online service providers can dictate their legal relationship with users
through private contracts, rather than rely on the law as written. In the unregulated and
unpredictable world of the Internet, such arrangements often provide the necessary ground
rules for how various online services should be used.

20) Explain “international”.

The Internet is global and so are threats to online freedom. Learn about how EFF is
fighting for your digital rights around the world and support our efforts by donating or
becoming a member.

21) What is ACTA?

The Anti-Counterfeiting Trade Agreement (ACTA) is a proposed plurilateral trade


agreement for establishing international standards on intellectual-property-rights enforcement
throughout the participating countries.

22) What is broadcasting treaty?

It is a protection racket for middlemen in the TV and internet worlds

23) What is the development agenda?

It gives WIPO the opportunity to move beyond the narrow view that they and all IP
protection is beneficial, and choose instead to act strategically to spur economic growth, foster
innovation, and help humanity.

24) What is EFF Europe?

EFF has hundreds of donors and thousands of active supporters throughout Europe. As
part of our expanded international work, EFF has been increasing its participation in European
issues, providing publicity and logistical support for combating bad European tech policy in co-
operation with the many digital rights groups across Europe to fight effectively for consumers'
and technologists' interests.

25) What is FTAA?

114
Free Trade Agreement of Americas IP chapter contains a provision that would require
all FTAA countries to ban the circumvention technological protection tools.

26) What is Global Network Initiative?

The Global Network Initiative is a coalition of information and communications


companies, major human rights organizations, academics, investors and technology leaders to
produce guidance and oversight for companies facing civil liberties challenges in the ICT
industries. EFF has participated in the process since its inception, providing technical and policy
advice together with other NGO in the human rights

27) What is WIPO?

The World Intellectual Property Organization (WIPO) is the UN agency responsible for
treaties involving copyright, patent, and trademark laws. WIPO can be a force for progressive
change, helping the world take into account public interest and development needs.

28) What is privacy?

Privacy is a state in which one is not observed or disturbed by others.

29) What is the purpose of CALEA?

CALEA's purpose is to enhance the ability of law enforcement and intelligence agencies
to conduct electronic surveillance by requiring that telecommunications carriers and
manufacturers of telecommunications equipment modify and design their equipment, facilities,
and services to ensure that they have built-in surveillance capabilities, allowing federal agencies
to monitor all telephone, broadband internet, and VoIP traffic in real-time.

30) What is cell tracking?

Cell tracking or mobile phone tracking tracks the current position of a mobile phone
even on the move.

31) What is a digital book?

An e-book (short for electronic book,or EBook), also known as a digital book, is an e-
text that forms the digital media equivalent of a conventional printed book, sometimes
restricted with a digital rights management system.

32) What is locational privacy?

Locational privacy (aka location privacy) refers to the the ability of an individual to
move in public space with the reasonable expectation that their location will not be
systematically and secretly recorded for later use.

33) What is NSA spying?

The U.S. government, with assistance from major telecommunications carriers


including AT&T, has engaged in a massive program of illegal dragnet surveillance of domestic
communications and communications records of millions of ordinary Americans since at least
2001.

115
34) What is online behavioral tracking?

Online Behavioral Tracking is a new web technology created many unexpected ways for
corporations to track your web activity without your knowledge. Countless advertising
networks are able to secretly monitor you across multiple websites and build detailed profiles of
your behavior and interests.

35) What is pen trap?

Pen trap also known as a pen register is an electronic device that records all numbers
dialed from a particular telephone line. The term has come to include any device or program
that performs similar functions to an original pen register, including programs monitoring
Internet communications.

36) What is Real ID?

The REAL ID Act of 2005 is a U.S. federal law that imposes certain security,
authentication, and issuance procedures standards for the state driver's licenses and state ID
cards, for them to be accepted by the federal government for "official purposes", as defined by
the Secretary of Homeland Security. The Secretary of Homeland Security has defined "official
purposes" as presenting state driver's licenses and identification cards for boarding
commercially operated airline flights and entering federal buildings and nuclear power plants.

37) What is RFID?

RFIDs — technologies that can be used to pinpoint the physical location of whatever
item the tags are embedded in. While RFIDs are a convenient way to track items, they are also a
convenient way to do something far less benign: track people and their activities through their
belongings

38) What are search engines?

Examples of search engines are Google, MSN, Yahoo, AOL, and other search engines
record your search queries and maintain massive databases that reach into the most intimate
details of your life.

39) Explain “search incident to arrest”.

In the United States, citizens are protected by the Fourth Amendment to the United
States Constitution against unreasonable search and seizure. In most cases, a search warrant is
required to perform a lawful search. An exception to this requirement is searches incident to a
lawful arrest. This is also known as the Chimel Rule after the case that established it,Chimel v.
California (1969). This rule permits an officer to perform a warrantless search during or
immediately after a lawful arrest. This search is limited to only the person arrested and the area
immediately surrounding the person in which the person may gain possession of a weapon, in
some way effect an escape, or destroy or hide evidence.

40) What are social networks?

116
Sites like Facebook and Twitter provide users with a place to share personal
information with friends, family, and the public — an activity that's proven to be hugely
compelling to Internet users.

41) Explain “travel screening”.

Before you get on an airplane, the government wants to sift through the personal
details of your life. If the data analysis says you're a security risk, too bad -- you may have no
way of challenging the error. Worse still, that black mark could follow you for the rest of your
life, and there may be little stopping the government from using your data for purposes far
outside of travel screening.

42) What is transparency?

Transparency, as used in the humanities and in a social context more generally, implies
openness, communication, and accountability. It is a metaphorical extension of the meaning a
"transparent" object is one that can be seen through. Transparent procedures include open
meetings, financial disclosure statements, the freedom of information legislation, budgetary
review, audits, etc.

43) What is E-voting?

Electronic voting is a term encompassing several different types of voting, embracing


both electronic means of casting a vote and electronic means of counting votes.

44) What is FOIA Litigation for Accountable Government (FLAG)?

EFF's FOIA Litigation for Accountable Government (FLAG) Project aims to expose the
government's expanding use of new technologies that invade Americans' privacy. Through
Freedom of Information Act (FOIA) requests, the project helps to protect individual liberties
and hold the government accountable.

45) What is “test your ISP”?

The Test Your ISP project previously released a much simpler piece of software called
pcapdiff. Pcapdiff is a simple command line tool that lets you compare "pcap" packet captures
from either end of an Internet communication; it reports when packets are dropped and
spoofed between the endpoints ("pcap" packet captures can be recorded with standard packet
sniffing tools liketcpdump and wireshark). Running tests with pcapdiff is a technically involved
process; we have a whitepaper outlining the steps involved

117

You might also like