Professional Documents
Culture Documents
Reader
To my inexplicable brother
Joel Gamba
To my friends
And influenced me to be
What I am now
2
Table of Contents
Online anonymity………………………………………………………………………………………………………………………….30
3
Health information technology: Challenges in Ethics, Science, and
uncertainty…………………………………………………………………………………………………………………………………………40
Information Overload…………………………………………………………………………………………………………………56
Email Spam………………………………………………………………………………………………………………………………………….58
Other Articles
Auctioning Virginity…………………………………………………………………………………………………………………72
4
Ethics and College Student Life – Kenneth A. Strike |
Pamela A. Moss…………………………………………………………………………………………………………………………………79
IEEE……………………………………………………………………………………………………………………………………………………………87
ICCI Bank………………………………………………………………………………………………………………………………………………89
ITC e-choupal……………………………………………………………………………………………………………………………………91
EFF issues…………………………………………………………………………………………………………………………………………112
5
The Fortune at the bottom of the Pyramid
Amazonlink:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“MNCs (Multi National Companies) often assume that the default rate among the poor is likely
to be higher than that of the rich customers. The opposite is often true. The poor pay on time
and default rates are very low. In the case of ICICI Bank, out of a customer base of 200,000 the
default rate is less than 1 percent. The default rate at Grameen Bank, a microfinance pioneer in
Bangladesh, is less than 1.5 percent among 2,500,000 customers. The lessons are clear.
Through persistent effort and the provision of world-class quality, private-sector businesses can
create mutual trust and responsibility between their companies and BOP customers. Trust is
difficult to build after 50 years of suspicion and prejudice based on little evidence and strong
stereotyping.”
Book Review:
This chapter by C.K. Prahalad gives a brief overview on the purpose of this book. The
author emphasizes that we should stop looking at the poor as the unfortunate, instead we
should look consider them as profit opportunities. We might think that this is just about taking
advantage of the poor, but the truth is that we are promoting the social responsibility as
humans.
We should stop the belief that poor people are nuisance and instead we should look at
them as opportunity for a business to increase market sales. The key is proper pricing,
companies should price their products low enough for the BOP to buy but not so low that they’ll
lose money. BOP dictates if a company will survive or not because they are the largest group of
population, so basically the company that is able to get the interest of the BOP will have the
biggest sales. We should keep in mind that we should treat everyone as customers and that
includes the bottom of the pyramid, the poor people.
6
What I have learned:
Integrative Question:
2. Who are the people the people that is considered as the bottom of the pyramid?
3. What are the benefits of organizations that will do business with the bottom of the
pyramid?
4. How can an organization start to conduct business at the bottom of the pyramid?
7
The Fortune at the bottom of the Pyramid
Amazon link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
To learn the products and services that are in-demand at the bottom of the pyramid to
ensure high profit
Quote:
“It might appear that the new philosophy of innovation for the BOP market requires too many
changes to the existing approach to innovation for developed markets. It does require
significant adaptation, but all elements of innovation for the BOP described here might not
apply to all businesses. Managers need to pick and choose and prioritize. Although effective
participation requires changes to the philosophy of innovation, I argue that the pain of change
is worth the rewards that will be reaped from the BOP as well as from traditional markets.”
Book Review:
This chapter discussed about what the BOP wants, needs, and what the MNCs need to
do so that the BOP will purchase their products and services. The wants and needs by the BOP
are the practical products that they could use, something that is important in everyday life. Ten
years ago, cell phones are luxury items, only people from the upper middle class and above
could avail these products, but looking at the present scenario, cell phones became a necessity,
and these became our primary tool for communication because of its mobility and ease of use.
Everyone could now procure cell phones for as low as one thousand pesos or lesser for second
hand phones, I remember in our community service, we went to a community which belongs to
the BOP, people who earn below the standard salary, most of them own at least one cell phone
unit. Now we see that cell phones companies could still sell their old models for a low price to
the BOP, giving MNCs sales instead of just trashing the old cell phone models.
The key for MNCs to succeed is educating the BOP on how to use their products, most
people at the BOP are illiterate so most cases, and they don’t purchase products that they don’t
know how to use, because they cannot understand the instructions inscribed on the product’s
user manual. MNCs should be patient enough to teach the BOP about their products, doing
8
product shows to introduce their product to the market, and make their prices reasonable for
the product they sell.
I learned the basic things needed to know if you want to do business at the bottom of
the pyramid
Integrative Question:
5. Are low prices the most important factor for the BOP market?
9
The Fortune at the bottom of the Pyramid
Amazon link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“The more interesting lesson for MNCs from operating in the BOP market is about costs-for
innovation, distribution, manufacturing, and general ‘costs of organization’. Because the BOP
forces an extraordinary emphasis on price performance, firms must focus on all elements of
costs. Shortage and the cost of capital force firms in BOP markets to be very focused on the
efficiency of capital use. MNCs tend to impose their management systems and practices on
BOP markets and find that it is hard to make a profit. The choices are simple: Change the
management systems to cut costs or lose significant amounts of money.”
Book Review:
This chapter gave several examples of BOP markets that are now globalized. An
example is a salt that is sprayed with iodine coated with chemical that could prevent spoilage
on transportation of the salt and distribution of them.
The reasons why there are global opportunity on the BOP? 1) BOP markets are large,
no doubt about that; 2) innovations can be made on the BOP 3) BOP markets can change can
influence how the MNCs think about doing business. This chapter already mentioned several
MNCs doing innovations to help the BOP and still make money, hopefully in the next few years,
more MNCs will follow the steps of the MNCs mentioned and improve their products and make
it affordable to the BOP who is the largest number of consumers.
I learned that when BOP strategy is globalized will change the world radically
10
Integrative Question:
11
The Fortune at the bottom of the Pyramid
Amazon link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“Ultimately, the goal in development is to bring as many people as possible to enjoy the
benefits of an inclusive market. Transaction governance capacity is a prerequisite. The market
based ecosystem might provide us an approach to building the basic infrastructure for inclusion
of BOP consumers. It also allows large firms to build new and profitable growth markets.”
Book Review:
Based on C.K. Prahalad’s interview on the one Shakti Amma, the market-based
ecosystem imposes a solid symbiotic relationship between the large firms and the BOP
consumers. They too are “little entrepreneurs” that directly help companies to expand their
business to the less-fortunate sector. The Shakti Amma is very loyal to her company because
she loves what she is doing. It also increases her social status in her community because people
see her as a distributor of goods as well as an educator.
12
To maintain a good relationship between your employer and co-workers will give you
economic benefits
Integrative Question:
13
The Fortune at the bottom of the Pyramid
Amazon link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
Looking at the 3rd-world countries in the world, we could see that they are actually rich
in resources, mentioned in this book as “trapped resources” by Prahalad. These resources of
unrealized wealth are actually a result of inadequate rules and regulatory organizations. Laws
and government agencies may actually already exist but any enforcement is limited to those
who don’t have connection to those in power. The main goal in getting the private corporations
and the BOP to work together is creating a win-win situation wherein private corporations gain
profit, while poverty is lessened. For private sectors to achieve this, they must innovate wherein
they could satisfy the needs of the BOP and still gain profits.
Book Review:
This chapter discussed about corruption being an evasive adversary. It will try to bail
itself out just to continue on feeding on people’s money. Information technology is one of
corruption arch-rival. The project eSeva has made gigantic strides into repelling corruption. It
still is a work in progress, but the promises are very delighting. They have turned the
government-centric system into a citizen-centric system, this way, people have easy access to
what they need from the government.
14
Guiding principles of the CGG in Andhra Pradesh
Integrative Question:
1. What is TGC?
15
The Fortune at the bottom of the Pyramid
Amazon link:
http://www.amazon.com/Fortune-Bottom-Pyramid-Eradicating-Poverty/dp/0131467506
Quote:
“How will these changes impact life at the BOP? As BOP consumers get an opportunity
to participate in and benefit from the choices of products and services made available through
market mechanisms, the accompanying social and economic transformation can be very rapid.
The reason for this is that BOP consumers are very entrepreneurial and can easily imagine ways
in which they can use their newly found access to information, choice and infrastructure.”
Book Review:
This chapter is about being a developed country. In order for a country to be developed,
everyone must contribute. This may be the reason why our country which is the most
developed country in the Southeast Asia region several years ago still remains as a 3 rd-world
country while our neighboring countries are well developed like Singapore and Malaysia. There
is no unity, some do protest on the street, others don’t, but 24 years ago, our country showed
the world that we can unite and protest to demand resignation of a corrupt president and
protect our rights. And now, do we still need to wait for another martial law to be united? Why
can’t we be united in improving our country and not just for overthrowing some corrupt official?
On this chapter, it was mentioned that there is this capability in order to become
profitable by way of staying or targeting the BOP. But the question is how will we earn money
and encourage them to buy our products or services. With all the advancement in technology, I
believe it will not be too difficult for us to innovate to lessen its cost with no depreciation in
quality.
16
The transactions at the private sector and the BOP
Integrative Question:
17
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“We call our society ‘the information society’ because of the pivotal role played by intellectual,
information-intensive services intangible assets”
Book Review:
Why is it that our society called “the information society”? Basically, we are entitled to
be the information in the society. Why? It’s because each one of us can give information. When
the earth is created by our God, all of what He created is very powerful knowing the fact that
each one of those is included with information. Since the information is all provided, all we have
to do is to discover it. For instance, God created the nature. All facts about it already exist like,
the W’s and H questions on a particular thing. The humans make a discovery all out of it. And
what’s the output? All of these discoveries will lead other people knowing the information. The
information now is just passed away into the society and many people will know it. For those
who want to be into discovering, they must know it. This introduction is very useful because it is
the foundation of everything all about information. The technology we have right now is
because of information. The information is also conversation because we can get information
through it. Every one of us has a power if we have information the money include. But on the
physical side, its information make the world go around. One of the reason and fact is that we
are on the “knowledge-based economy” era wherein information turns into knowledge.
Humans are the main element on ethical issues thus giving them the greatest
responsibility
18
Integrative Question:
4. What is infosphere?
19
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Cyberethics takes the view that the structure of the machine or of the organism is an index of
the performance that may be expected from it”
Book Review:
On this chapter, it was stated that the field of information ethics was born
unintentionally and almost accidentally in the middle of the Second World War. One of the
greatest philosophers that we have was Norbert Weiner together with his group of scientist and
engineers; they created digital computers, radar, and the creation of a new kind of antiaircraft
cannon that could perceive the presence of an airplane, can gather information about its speed
and trajectory, can predict its future position a few seconds later, decide where to aim and
when to fire shell, and lastly can carry out that decision. Later on, Norbert Weiner and his
colleagues realized that their inventions have good impacts but at the same time deadly. It now
depends on how their inventions were used to determine if it was good or bad.
This book is basically the foundation of information ethics which involves human and
technology. Weiner based his study on this way by evaluating the human perspective on health,
happiness, security, freedom, knowledge, opportunities, and person’s ability. He based his idea
on this so that it is the side of human and to be based on ethical and moral values, naturally.
The “cyberethic view of human nature and society” was really a big help giving foundational
ideas on ethics for the “purpose of human life”. In referring to life as a conclusion is that a
purpose of a human life is to “flourish as the kind of information-processing organisms that is
human in a natural way”. This means that Weiner are really basing in a natural point of view.
20
What I have learned:
That in natural way, idea will come out as what human thinks
Integrative Question:
21
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“IT studies the moral questions that are associated with the development, application, and use
of computers and computer science.”
Book Review:
This chapter talks about cyber ethics with a computer concept. In short, this is called
the computer ethics. From the moral questions mixed up with computer related topic through
development, and application. Professionals and other people who are involved in computer
technology have many questions on what is right and what is wrong on particular ethical issues
or ethical questions. It is hard to identify which is which and specifically it is hard if there are no
references justifying the ethical or moral values. If you are an I.T person, it is hard to identify
your point of view. Even you cannot identify it. Justifying answers is hard to formulate because
you must know also the basis of a particular topic is.
22
comes to be a universal technology because of its logical and malleability. The computer can
also simulate, communicate, recreate, and calculate and so on. These are the features of
computers that can be use by people. It’s unimaginable because in the past centuries, they only
predicted all of these. And here we are in the 21 st century, we are dealing with them with an
ethical values involved. Another description of computers is that it is a universal technology
because of its unique feature, logical malleability. It is constitutive technology which serves as
an essential part of our lives.
The natural aspect and technological aspect of ethics are combined which gives an
interaction to the user
Integrative Question:
23
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
To know what is the meaning of value sensitive design and information systems
Quote:
“Value Sensitive Design is a theoretically grounded approach to the design of technology that
accounts for human values in a principled and comprehensive manner throughout the design
process.”
Book Review:
Value system design on this discussion is made specifically for technology for human
values. It is stated here that it employs an integrative and iterative methodology. It simply
means that in every value that they made are very much important with an integrative and
iterative point of view. Integrative means to put concepts together and iterative means in an
incremental form. When we combine these two concepts, it results to a mixture concepts and
may result to a value sensitive design.
During the early period of computerization, Wiener again, (stated in the previous
chapter) a scientist and cyberneticist stated on his book that technology could help make us
better human beings and create more just society. But most of all, because of the features that
technology given to us, we must take control of what we created. Maybe in future, or a
prediction, technology will rule over than human being. In his perspective, we must reject
worshipping our created new technological advancement here on earth. The human value
system design has emerged as stated on this chapter. These are in computer ethics, social
information, Computer-supported cooperative work, and participatory design. These functions
can really affect the lives of humans. These functions are very sensitive to us specifically in
ethics. It can change our morality because we are following this value. It is explained here that
in computer ethics particularly, it advances our way of thinking that intersect in computer
24
technology and human lives. With these values, it can really affect the live of the people.
Another thing is that in other values, these are all the same.
Integrative Question:
25
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
Book Review:
The first part of this chapter discusses about what is intellectual property. It is explained
at introduced here that intellectual property are all based on individual personality. Since each
one of us has a individual personality, we assume that we have also intellectual property as well.
We must be knowledgeable to develop ourselves. Innovating ourselves is one way of changing
our lives. It is explained here that we must fight our strength and weaknesses. We have
strength, then maintain it and make you good as possible. On the other hand, weakness is your
fear as an individual, therefore fight your fears. This is to justify yourself to be intellectual
person.
Its non-physical, which means, it is all based on ideas, on mental reasoning. The people
must collaborate with all ideas we have. One must share ideas to others and ideas must be in a
collaborative way of distributing it. It surrounds the control of physical appearance of the
knowledge of the people. Each expression could be different but there is only one intellectual or
rational idea.
This chapter is focusing on three aspects. These are the personality-based, rule-
utilitarian and Lockean Justifications. The first one is the personality-based where an individual
is just focusing on his/her personality. He/she has own ideas on a particular perspective. Only
26
him/ her can understand it and no one can interfere his/her ideas. Once it is shared to other
person, there is surely a conflict between ideas. The intellectual property has now conflict. We
can’t fight against it because, as explained, each one of us has an intellectual property. The
analogy is that you can’t dive to the intellectual property of others because it is private and only
he/she can only understand it. That’s for personality-based. The next one is the rule utilitarian.
This is where utilitarian of intellectual properties used. Once the idea is passed to another
person, then the person who will be receiving it is considered to be a utilitarian. He/she just use
the intellectual idea of a particular person for the benefit for him / her. That’s absurd! Because
making use of an individual’s idea is considered to be a utilitarian. It can give both positive and
negative effects for the people. It will now depend on us if we use the utilitarian point of view.
The last one is Lockean Justification where the justifications of human are more sensitive.
Because it is where the human correct or justify his/her humanity in terms of his/her ideas in
life.
Integrative Question:
2. What is personality-based?
3. What is rule-utilitarian?
4. What is justification?
27
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“It would seem that privacy is not simply a static concept, but instead has a dynamic
component”
Book Review:
This chapter discusses all about informational privacy. To start with, let us define the
concept of privacy. It is usually a separate side where a state of being is apart from other
people. Only those people within the privacy boundary will just exchange ideas and more
information regarding a particular topic. Unlike public, it is publicly announced to the people
who they are addressing to. When we say privacy, it is very sensitive because no one among
those states being will pass the information they conversed. That means, that topic is very
sensitive and powerful. Those private people don’t want to be shared to other people. That’s
the basic analogy, example, and concept of privacy.
As the chapter goes, it is explained that the privacy is not simply a static concept, but
instead, it has dynamic component. This only means that privacy cannot be changed at all.
What is trying to say with this concept is that it should not be in a fixed position. This privacy
must also be a dynamic aspect so that people within an organization knows what is happening
in that particular issue. Well, of course, the privacy only needs the people who are in the
authority to make assumptions. That’s the concept of privacy on our physical lives. What about
informational privacy?
28
It’s discussed here those theories like “reductionist” and “ownership-based” accounts
are part of informational privacy. Let’s define first the reductionist concept. Basically it aims for
simplification of a particular thing. Privacy visualized here as the utility that will help that are
very useful to us. It can also preserve human dignity as well. It is a very useful utility for us
because if privacy applied, there are no problems to you as a person. People cannot argue with
you because they don’t know what the topics are for you. The restricted access theory is quite
different. The “zones” of privacy should be in a limited form.
Integrative Question:
1. What is privacy?
29
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Anonymity was used to denote a number of things that are connected like nameless,
detachment, unidentifiability, lack of recognition, loss of sense of identity, or sense of self, and
so on.”
Book Review:
When we say the word “Anonymity”, the first concept comes into our mind is that it is
questionable, or in other words, unidentifiable. We have no idea about it. We don’t know how
to define it, that’s why, anonymity is defined also as a freedom from identification. It is
anonymous, in a way that we don’t know everything about it, and because we have no idea
about it, we must think something for it, we must define it as much as possible to give
description to it. Because of this, the word “freedom” came out. And since freedom is so much
powerful to a person, we have a power to choose it and a power to have a responsibility over it.
Anonymity is the state of not knowing of something and therefore, it considered as a lack of
distinctiveness. We know that this is existed but we have no description over it. No one can
define unless, if we have more information about it, there’s a big possibility that we could
define it formally. For the next part of this chapter, we will deal the purpose and the impact of
anonymity in the social environment.
30
instance, If a person asked you to define a particular character in the movie and that character
role is very mysterious, then we have to think that this character only done a particular role
which is a big role in the film, but you can’t identify his/her name especially when that
actor/actress is not that popular, therefore, the first perception is that “who is this character in
real life?” As a result, it is called the anonymous character in the movie. So, the next time you so
this character, we will think that “This is the character in the movie”. But still, it is anonymous to
you because you have no information about it. As an analogy to social environment, If there is
something existed and people have an issue about it, the people just think that this is
anonymous simply because they have no idea for it. And since it is spontaneous, we will
immediately forget about this issue. And if you have no interest with it, therefore, it will mislay
into your mind.
Integrative Question:
1. What is anonymity?
31
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
““how much harm is caused depends on whether the target is a public, private, commercial, or
noncommercial entity.”
Book Review:
Many people say that hacking is wrong and some say that hacking is right. Well, it
depends. We cannot determine the real act of hacking unless we do it in actual. For most
people even an ordinary people, they say that hacking is wrong because hacking is exploring
the private property of anyone without asking an official permission to the owner. Hacking is a
skill wherein hackers do their best to access file that are protected. The word hacking is known
in digital world because for computer people hacking is the term of destroying a security. The
more malicious acts in hacking, the more people cause harm because hackers ruin their
personal life. For computer technology, hacking constitutes a digital trespass onto a property of
another person. This means that are those people who try to hack a private property, he/she
may do so, but the conscience of guilt is still there.
32
Ethical issues involved here because in computer security also involves the morality of
human rights. Asking question what is right and what is wrong. How do they do the wrong
thing if they intend to do it in wrong way and likewise. Ethical is so much powerful that can give
us more strength to do a particular thing. Again, it’s matter of what is right and what is wrong. If
a computer hacker wants to hacks the system, it’s fine, but make sure that this will not harm
other people because it is considered as a wrongdoing. If it is for good, then do it.
Integrative Question:
1. What is hacking?
2. What is hacktivism?
5. Is hacking illegal?
33
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Librarians and governing bodies should maintain that parents - - and only parents - - have the
right and the responsibility to restrict the access of their children - - and only their children - - to
library resources. Parents who do not want their children to have access to certain library
services, materials or facilities should so advise their children. Librarians and library governing
bodies cannot assume the role of parents or the functions of parental authority in the private
relationships between parent and child.”
Book Review:
Librarianship is also a profession. Thus, this chapter discusses how a librarian makes a
contribution to the modern world. As a librarian, the primary role of this job is to organize
books collected around the world. It is a distinct or clearly different position because this
profession shows the natural aspect of job. For library, it is purely manual because books are
only collected however, it is a relatively development to the world, to publish a book, lots of
process must be made. Press, collections of works, printing and etc. Collection may be a larger
and more complex and it is relatively different development. In creating a greater need for
someone, it is devoted to organizing cataloging such as collections.
34
interesting. First and foremost, librarians are universal, meaning that they are suited for all
library works around the world. The collection, organization and preservation of books and
documents is there primary job.
The relation of this profession to computer ethics is that it librarians are the primary
source of information of books and other stuffs related to it. Therefore, since they are in the
right position of doing this, they are also considered as a professional that can organize
information.
Base on this chapter, consider the challenges that confront the librarian in carrying out
his or her professional duties, in particular with regard to selection of materials and the
organization of these materials. Since the ethical obligations of librarians as professionals will
at least partly be determined by the role that librarians play in society, to understand the
mission and values of the librarian in order to understand what those ethical obligations are. 1)
Books are for use. 2) Every person his or her book 3) every book its reader 4) save the time to
read 5) the library is a growing organism. These are their primary job or mission which is very
important to our society as well as in modern world.
Integrative Question:
1. What is librarianship?
35
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Service learning, a concept that is becoming a part of the mission of many higher education
institutions, also influences the choice between open source software and proprietary software.
Consider a scenario in which a software engineering class is to produce a piece of software for
local charity. The choice between open source alternatives and proprietary alternatives is not to
be taken lightly. Seemingly, open source software makes good sense for both the students and
the charitable organization. The cost is low and, presumably, the quality is sufficient. Yet there
are long term costs that are faced by the charity (as well as any business making such a
choice).”
Book Review:
While the Internet’s rapid expansion has enabled an equally rapid expansion of web
based professional services, it has not been matched by the consideration and understanding of
the related ethical implications. The growth of new opportunities is accompanied by equal, if
not greater, growth in ethical issues for businesses seeking to expand their offerings via the
Internet. These issues include the quality of services and information, privacy and security,
nature of relationship, forms of delivery, contractual considerations, and regulation and
enforcement.
36
software engineers must commit themselves to making software engineering a beneficial and
respected profession. In accordance with that commitment, software engineers shall adhere to
the following Code of Ethics and Professional Practice.
The Code contains eight Principles related to the behavior of and decisions made by
professional software engineers, including practitioners, educators, managers, supervisors and
policy makers, as well as trainees and students of the profession. The Principles identify the
ethically responsible relationships in which individuals, groups, and organizations participate
and the primary obligations within these relationships. The Clauses of each Principle are
illustrations of some of the obligations included in these relationships. These obligations are
founded in the software engineer’s humanity, in special care owed to people affected by the
work of software engineers, and in the unique elements of the practice of software engineering.
The Code prescribes these as obligations of anyone claiming to be or aspiring to be a software
engineer.
Integrative Question:
2. Why is it free?
37
The Hand book of information and Cyber Ethic
Chapter 11: Internet research ethics: The field and its critical issues
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“The principle of justice mandates that the selection of research subjects must be the result of
fair selection procedures and must also result in fair selection outcomes. The justice of subject
selection relates both to the subject as an individual, and to the subject as a member of social,
racial, sexual, or ethnic groups.”
Book Review:
Internet research nowadays and ethics is going to have an effect on the forms of
research that are sanctioned or even permissible, the ways that we understand Internet culture,
and our larger understandings of individuals and society. This suggests that there are significant
consequences to hindering the participation of certain disciplines and preventing some kinds of
histories from being produced. A truly ethical model of Internet research ethics would
acknowledge such outcomes and encourage a variety of histories and disciplines. It would
develop guidelines and rules that consider these problems at the same time as it foregrounds
their possible effects
Academics from varied institutions and countries are engaged in the important task of
articulating ethical guidelines for those who research the Internet. However, they have failed to
provide users and researchers with important information because they do not address the
ways that Internet material is mediated and constructed. The ethical issues and dilemmas
38
involved in Internet research include researchers who ignore the screen, varied icons, repetitive
motifs, and produced content. Addressing constructed material is important because Internet
settings abound with ageist, classist, homophobic, racist, and sexist imagery and ideas. The
current writing about ethical Internet research behaviors can enable such intolerant
conceptions by encouraging academics and other users to presume that Internet settings
provide access to the truth about individuals or are a direct conduit to people. In other words,
conceiving of Internet material as people and human subjects without foregrounding the
constructed aspects of users’ proclaimed “self-representations” makes it seems like Internet
material is exacting and natural.The global reach of the Internet means that research
participants may be drawn from a wide range of nations and cultures.
Integrative Question:
1. What is IRE?
39
The Hand book of information and Cyber Ethic
Chapter 12: Health information technology: challenges in ethics, science and uncertainty
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“medical records usually contain a large amount of personal information, much of it quite
sensitive. This information is continuous, extending from cradle to grave; it is broad, covering
an extraordinary variety of detail; and, with new information technologies, it is accessible as
never before.”
Book Review:
It is sadly and too often the case that many professionals regard ethics as a source
of codes for the edification of the not-yet-virtuous, as a place where pointy-headed
bowfins pass judgment on heathens, as an office to call in search of someone with a horse
and a sword to come .round to smite the evildoers.
There is arguably no better trigger for reflection on morality and its relationship to
the lawand society than privacy and its cousin, confidentiality. The demands of privacy
are intuitively straightforward and the consequences of its violation obvious
The chapter even included privacy in health information technology. Privacy is,
most generally, as discussed in the chapter, the right entitlement or reasonable
expectation people have that they are and will be secure from intrusion. Given the
example in the chapter, it is obvious that society values both personal privacy and the law
enforcement but in some cases, the police officer investigating a crime may and, in fact,
must take steps to justify that her official need is worth the intrusion. ―Put differently,
privacy rights are not absolute, but may be balanced against other values. The same is
true for confidentiality, which applies to information—medical records, for instance.
40
Where privacy is customarily about people, confidentiality applies to information about
people. Privacy is also sometimes regarded as including within its scope people’s concern
about protecting confidentiality. Privacy is a broader concept.‖ – indeed as a broader
concept yet privacy still serve as one of the most studied factor in information technology
and one that is most protected.
Since we are talking here about health information, I can say that computers
complicate medical privacy and confidentiality in interesting ways. According to a
sentinel Institute of Medicine analysis, a number of entities demand patient information
to ―assess the health of the public and patterns of illness and injury; identify unmet.
The issues surrounding the medical and scientific world are as much important as their
jobs
Integrative Question:
1. What is privacy?
2. What is confidentiality?
41
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Before I can’t discuss why business has a strong influence on ethical issues of information. I
need to lay the groundwork and explain why businesses have an interest in information. The
aim of business organizations according to standard economic theory is the maximization of
profits. Such organizations will, therefore, aim to minimize cost and maximize revenue.
Information has a value for business if it can contribute to either of these aims. The business
value of information is thus linked to financial gains it can achieve. This is independent of the
philosophical debate in information ethics of whether information has an intrinsic value.”
Book Review:
Computers have changed the way offices are organized and the tasks done. They have
changed manufacturing, purchasing, marketing, finance, and management. The ethical issues
are therefore not simply issues that are involved in computers and their use and in information
technology more broadly, but in the way business is done in the Information Age. We can
distinguish five different kinds of ethical problems connected with information technology: 1
Ethical issues in the use of technology in business 2 Ethical issues in the information technology
business 3 Ethical issues dealing with the Internet 4 Ethical issues in e-business 5 Ethical issues
resulting from the impact of computers and information technology on society, both nationally
and internationally The five are interrelated. Lurking behind all of them is the Myth of Amoral
Computers and Information Technology. This is the widespread belief that computers and
information technology have nothing to do with ethics. Computers, of course, are a type of
machine and are not moral beings. But they are developed, programmed, and used by human
beings. Nonetheless, “The computer is down” is often taken as a valid excuse, as if no one is to
blame for this and no moral blame should be assessed.
The appropriate use of digital communications such as email and text messaging is
another area that must be clearly understood by the employee and it is the employer’s
42
responsibility to set the guidelines. Many employees need to be taught that text based
communications can be more often misinterpreted than spoken communications because
other verbal and body language cues are not present.
In the IT side of business, knowing how to use a computer is important, but knowing
your limitation is more important
That it is the responsibility of employers to guide their employees on the proper use of
information systems
Integrative Question:
2. What is morality?
43
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
To learn how these responsibilities help information on the internet be more reliable
To learn the benefits of having responsibilities for the information on the internet
Quote:
“According to Friedman, if they were to have these responsibilities, then these responsibilities
might easily conflict with their obligations to make profits for the stakeholders.”
Book Review:
We, as online users, have our own responsibilities in handling our own source of
information – ourselves. The government, in my point of view, should be more concerned
in this issue but other than that, we need to take action ourselves because the internet is a
huge place for information to be spread and that alone is not really something I would
think as just a petty file share. Of course, file sharing is another thing but what about
copyright? Piracy? Infringement? There are a lot of issues we have to dwell with right
after knowing what it is that needs to be done but still, be responsible enough to take
extra protective measures with what you do online.
It takes an enormous amount of work to understand what theories mean for real-world
situations, issues, and decisions, and in some sense, we don’t understand theories until we
understand what they imply about real-world situations. Practical ethics is best
understood as the domain in which there is negotiation between theory and real-world
situations.
44
What I have learned:
That information in general was restricted on the issue of ISP’s responsibilities with
regard to clearly illegal or immoral content
Integrative Question:
2. What is information?
4. What is ISP?
45
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Technologies raise important ethical questions about the way in which they represent reality
and the misinterpretations, biased representations, and offensive representations that they
may contain.”
Book Review:
The endoscope is maneuvered in the duodenum until the major duodenal papilla is
identified. The papilla is a nodular protuberance on the medial wall of the duodenum
through which the bile duct and pancreatic duct expel bile and pancreatic juice
respectively into the duodenum to aid in the process of digestion. After the endoscope is
positioned near the major duodenal papilla, a catheter is inserted through a channel of the
endoscope and directed into the desired ductal system (biliary or pancreatic) by changing
the position of the flexible endoscope tip in relation to the papilla. An ―elevator‖
apparatus at the tip of the endoscope can also be utilized to adjust the angle at which the
catheter enters the papilla. To guide the catheter into the papilla, the physician relies on
visual feedback from the endoscopic video display and tactile resistance encountered
when advancing the catheter. In diagnostic ERCP, contrast dye is injected through the
catheter while fluoroscopic images are observed and roentgenograms are obtained.
How technology can do such wonders for our benefits and allows us to experience
something more than what we should have experienced back then.
46
What I have learned:
Integrative Question:
4. What is avatar?
5. Give example of virtual reality and explain why they are considered as such
47
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“The future of biology is strongly tied to that of bioinformatics, a field of research that collects
all sort of biological data, tried to make sense of living organisms in their entity and then make
predictions.”
Book Review:
48
What I have learned:
Integrative Question:
49
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Besides cyber attacks conducted for pleasure or personal gain, the paper does not consider
revenge attacks by insiders – all of which are generally regarded as unethical.”
Book Review:
The issue of law and cyber conflict is something that while relatively new, is something
that people, nation states, and military organizations have been working on for the last 10
years at least. Many countries have robust cyber warfare rules of engagement, and the
more interesting part about this is that any country with an internet connection can
engage in cyber conflicts. Attribution (IE Knowing who is attacking you, and being able
to act appropriately against the real place that is attacking you) has long been a problem.
Zombies, bot nets, jump points, and the millions of compromised computers both
Windows and Linux are the cannon fodder of cyber warfare. Attributing the attacker back
to the point of origin is going to be difficult if not impossible without some smart people
having unrestricted access to packets, and to compromised systems. Legally though, it
gets more interesting as the state of cyber law is often well behind the state of cyber
warfare tools.
With the advancing technology, even internet can cause war to countries. It could be a
silent war; no one would get hurt… physically. Cyber conflict may result to chaos to the
concerned parties. Such as what happened in September 2000, wherein Israelite teenage
hackers created a website that successfully jammed six websites in Lebanon, causing a
50
huge turmoil in different websites in Israel, including those of the Palestinians and at
least one U.S. site. They made two main types of attacks, the website defacement and
distributed denial of service.
Integrative Question:
1. What is cyberspace?
2. What is hacktivism?
51
The Hand book of information and Cyber Ethic
Chapter 18: A practical mechanism for ethical risk assessment – A SoDIS inspection
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“The availability of high-quality software is critical for the effective use of information
technology in organizations.”
Book Review:
The quantitative nature of the tool allows a company to determine whether or not it has
successfully decreased its ethical risk over time. But the qualitative aspect of the tool
allows the organization to identify and address specific risk-prone areas by minimizing
risks that can be controlled and by instigating effective measures to counteract
unavoidable risks.
In developing their tool, the pair looked at two existing measures of ethical risk that were
ultimately found lacking: the Global Reporting Initiative (GRI) and the Ethics Resource
Center Ethics Quick Test.
The GRI takes a broad look at social performance measures, looking at how a company
adhered to multinational codes and standards in the past, Berman explained. ―It’s really
backward-looking. It really says what we’ve done, and not what kinds of risks we have
and how do we manage them. It doesn’t help us manage the risk going forward, so
unfortunately, we didn’t find it super helpful.‖
52
The Ethics Quick Test focuses on 12 areas of an organization’s commitment to ethics,
such as how ethics factors into its organizational values, strategies, goals, objectives,
policies and procedures. It looks at organizational incentives, decision-making, and tone
at the top, as well as ethics evaluation, education, and training. But the major downfall of
the Quick Test, Berman noted, was that it focuses on organizational dynamics as ethical
risk factors, without really getting at individual or industrial-level factors.
Integrative Question:
1. What is SoDIS?
53
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Degrading internet performance will not obviously harm many people very much, depending
of course on the degradation.”
Book Review:
This technological, industrial and social innovation has risen to the very top of the major
public policy priorities. As a result, the desire to correct certain inconsistencies, gaps or
dangers in the current situation has become part of the international political agenda. A
certain number of tensions have also resulted. Due to its UN framework, the Summit had
as prerequisites the plurality of the actors and the equal acceptability of their viewpoints.
The debates that resulted, whether formal or informal, whether included in the official
program or led in parallel, emphasize the need to coordinate, if not harmonize, complex
balances of power.
To examine how the regulation of the Internet has emerged as an object of global
governance in the context of the United Nations. Secondly, using a neo-Foucauldian
governmentality perspective, to explore and explain how these UN-initiated regulatory
activities have been driven and shaped by a cluster of concerns, principals and imageries
about technological features of the Internet and its relationship to socio-political
transformations. This exploration gives important insights into the contemporary shape of
Internet regulation and the principals and knowledge bases that have given momentum to
and shaped this emergent object of global governance. In particular, the paper shows how
54
technological features of the Internet have come to function as models for the shape of its
regulation.
This inaugural lecture by Jonathan Zittrain proposes a theory about what lies around the
corner for the Internet, how to avoid it, and how to study and affect the future of the
internet using the distributed power of the network itself, using privacy as a signal
example.
That inside the nebulous “internet governance” there coexist different regulatory
models, more or less founded in the law, more or less specialized, more or less
effective.
That internet governance in the past years and until now provides fuel for debates
within the WSIS regarding the management of the technical resources of the internet
Integrative Question:
1. What is censorship?
55
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
To understand information
Quote:
“Some of these information goods are end-products (films, videogames, and newspapers),
while others as agents of control (advertisement and e-mail messages) that help to manage the
accelerating processes of production and consumption.”
Book Review:
The most obvious locus of information inundation is the office: e-mail, voice mail, phone
calls, meetings, business journals, faxes, memos, manuals, Web research. The list goes
on. Far from bringing about the anticipated ―paperless office‖ and reduced work load,
technological innovations have increased both areas.
We can say that Data is like food. A good meal is served in reasonably-sized portions
from several food groups. It leaves you satisfied but not stuffed. Likewise with
information, we’re best served when we can partake of reasonable, useful portions,
56
exercising discretion in what data we digest and how often we seek it out. Unfortunately,
we often do the opposite, ingesting information constantly to the point of choking on it.
The risk of information asphyxiation touches all of us — managers, Web surfers, even
lazy couch tubers. That’s the analogy of it.
Integrative Question:
2. What is information?
57
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
Book Review:
E-mail spam, also known as junk e-mail, is a subset of spam that involves nearly identical
messages sent to numerous recipients by e-mail. A common synonym for spam is
unsolicited bulk e-mail (UBE). Definitions of spam usually include the aspects that email
is unsolicited and sent in bulk. ―UCE‖ refers specifically to unsolicited commercial e-
mail.
Furthermore, E-mail spam has steadily, even exponentially grown since the early 1990s
to several billion messages a day. Spam has frustrated, confused, and annoyed e-mail
users. Laws against spam have been sporadically implemented, with some being opt-out
and others requiring opt in e-mail. The total volume of spam (over 100 billion emails per
day as of April 2008) has leveled off slightly in recent years, and is no longer growing
exponentially. The amount received by most e-mail users has decreased, mostly because
of better filtering. About 80% of all spam is sent by fewer than 200 spammers. Botnets,
networks of virus-infected computers, are used to send about 80% of spam. Since the cost
of the spam is borne mostly by the recipient, it is effectively postage due advertising.
Definitions of spam usually include the aspects that email is unsolicited and sent in bulk
―UCE‖ refers specifically to unsolicited commercial e-mail. The total volume of spam
58
(over 100 billion emails per day as of April 2008) has leveled off slightly in recent years,
and is no longer growing exponentially.
Now you know what spam emails are and thanks to Google and wiki for the definition.
Anyway, spam emails is not something we want but it is a method of some websites to
endorse their investors to other people.
That deceptive emails meant to defraud are condemned, spam or emails between well-
meaning friends are probably not spam
The ethics of reducing the number of spam emails read after they are sent
Integrative Question:
1. What is Email?
59
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“The emphasis on impropriety is important. There are a wide variety of situations where it
seems acceptable to repeat prior expressions while ignoring a possible attribution and making
no attempt to seek permission from a putative source.”
Book Review:
Plagiarism occurs when students fail to acknowledge that the ideas of others are being
used. Specifically it occurs when: other people’s work and/or ideas are paraphrased and
presented without a reference; other students’ work is copied or partly copied; other
people’s designs, codes or images are presented as the student’s own work; phrases and
passages are used verbatim without quotation marks and/or without a reference to the
author or a web page; lecture notes are reproduced without due acknowledgement. By
this, we can identify what’s the meaning of this.
According to the book, The present author believes that, in some contexts, new
technology has tended to increase the importance we should place on acknowledgment
and to lessen the importance that we should place on authorization.
60
For academic publication and technology, the digital technology has shifted the major
costs of typesetting
away from the publisher to the authors and editors who produce print-ready digital The
situation, however, is really very complicated. We noted above that today’s technology
has created problems for a film industry that seeks to recoup high production costs when
piracy is cheap and easy.
Integrative Question:
1. What is plagiarism?
61
The Hand book of information and Cyber Ethic
Chapter 23: Intellectual property: Legal and Moral Challenges of Online File Sharing
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“Lost in the thicket of lawsuits and policy challenges are the ethical issues associated with the
use and distribution of file sharing software. Is the downloading or “sharing” of copyrighted
music morally reprehensible? Quite simply, are we talking about sharing or pilfering? Is social
welfare enhanced by a legal regime of indirect liability? And should we hold companies like
Napster, Grokster, or BitTorrent morally accountable for the direct infringement of their users,
particularly if they intentionally design the code to enable the avoidance of copyright liability?
Or does such accountability stretch the opposite moral notion of cooperation too far? In this
overview, we will present the conflicting arguments on both sides of this provocative debate.
Although our primary focus will be on the ethical dimension of this controversy, we cannot
neglect the complex and intertwined legal issues.”
Book Review:
62
We are now in 21st century and as we go along, many people and many cases involved
copyright infringement. The intellectual property of a person must be protected at all cost.
Let’s say you did something for the good of others, and another person did something good for
others but the way of doing it is stealing from you. That is considered also as a copyright
infringement because that person doesn’t have a permission to do such thing. Since technology
is fast growing more and more cases involved in copyright infringement. It is one of the best
case spread in the world. We don’t have a control with this stuff and that is the reality.
For internet, it is called a gatekeeps because of Internet Service Providers and search
engines. Gatekeepers are the one who are in the position to don’t interfere in copyright
infringement. Good thing that gatekeepers are trusted to prevent copyright infringements.
Sharing or theft
Secondary Liability
MGM V. Grokster
Moral Considerations
Integrative Question:
1. What is piracy?
5. Who is Grokster?
63
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“The benefits we receive from having these interests satisfied (and the harms from not having
them satisfied) will not be easily overridden. Second, we have to ask ourselves not what in
principle it might be good to censor. We have to ask ourselves what in actual practice would be
the consequences of having policies in place that restrict access. It is at this point that “slippery
slope” and “chilling effect” arguments might have some force.”
Book Review:
We are now in 21st century and we are now involved in technology. For ancient times,
censorship was also applicable. Those who have an authority can order a restriction of a
particular issue or event. We are now in the modern times, and we are still doing this act. Of
course all of us need privacy. Each individual should be protected at all cost. In order to prevent
the exposure of private, the censorship is applied. What is this censorship? Well basically,
censorship role is to condemn person’s action. In other words, condemn is considering
something guilty about a particular act. So in order to avoid guiltiness, censorship is applied.
Without getting clear on what we mean by censorship, this chapter tells us that it is
very hard to know exactly what is wrong with a particular act and indeed, it is always wrong. We
must find out the real truth about censorship. By finding it, of course, we don’t know where to
start because it was censored. There is no information about it. For example, there was an
illegal transaction between a businessman and a group that sells drugs and it was recorded in
the video, it was censored when it was first shown because they don’t want to reveal that
transaction. When a person who are in the authority who wants to reveal the truth, he/she must
make information out of it and try to release this video at all cost. But, the problem is that it is
censored. That’s the main point of the problem. That’s why it is difficult to release it even if it is
64
an evidence for the case. Without getting clear on what we mean by censorship, it is difficult to
get a grip on exactly what is wrong with it, and indeed, on whether it is always wrong.
creating a market
hostile atmosphere
Integrative Question:
1. What is censorship?
65
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“The idea that gender is a major (possibly even the major) way of classifying and ordering our
world has been propounded by a number of authors, mainly, although not exclusively, writing
from a feminist position.1 The recognition of continuing differences between men’s and
women’s lots, at home, in the workplace, and in education, even in societies that have seen
considerable opening up of opportunities for women in the space of a generation or so, has
been a major force in developing contemporary feminist writing.2 Coupled with this, we
continue to be fascinated by differences between men and women, putative differences in
behavior, differences in interests, differences in management style, differences in parenting
approach, and so on. This suggests that, in the process of ordering and classifying our world
into that which is feminine, that is, belonging to or pertaining to women, and that which is
masculine, that is, pertaining to men, we may polarize this binary in a search for, and perhaps
even a maintenance of, difference.”
Book Review:
At the first part of this chapter, noticed that the main topic is feminine. The question is
that why do they need to focus on them? The answer to that is that woman is powerful also as
man. It is much better than the abilities of man. As they discussed here, Woman’s ethical values
is the number one debates and issue for our world today. The world in reality can’t accept the
man’s ability and other would tell that it is not good for woman because some abilities of man
can’t do it by woman. But then morality again is the issue here.
Care cyber ethics. It’s the first time I heard that. According to this chapter, care ethics is
a cornerstone of most difficult approaches towards feminist ethics. The main actor here again is
66
the feminine. They are the main emphasis on this chapter. As we all know, the characteristics of
woman is unique. They are the one who make things better not just only in society but
especially on families. Mothers are considered the light of house. Their responsibilities are big
therefore they should take these responsibilities for their family. In relating to computer ethics,
it’s the same, as stated on this chapter, they give more emphasis on feminine side, therefore,
and they have big responsibilities in society.
For computer ethics, researches told us that decision of man and woman is very
important specifically in computer ethics problem. They have a power to rule over it. The fact is,
nobody owns cyber ethics and that means it’s for us. We must take this responsibility owning it.
Taking a good decision will really help people in making good things towards the computer
ethics.
The gender, ethics and information technology, in that work, the hope must be
strengthened and theoretical dimensions must be broadened. Ethical decisions of man and
woman are said to be important so that decisions made are strong.
For academic publication and technology, the digital technology has shifted the major
costs of typesetting away from the publisher to the authors and editors who produce print-
ready digital. The situation, however, is really very complicated. We noted above that today’s
technology has created problems for a film industry that seeks to recoup high production costs
when piracy is cheap and easy.
Cyber stalking
Integrative Question:
67
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
“In the developing world, poverty and the suffering it causes is considerably worse. Here
poverty is characteristically “absolute” in the sense that people do not have enough to
consistently meet their basic needs. People in absolute poverty lack consistent access to
adequate nutrition, clean water, and health care, as well as face death from a variety of
diseases that are easily cured in affluent nations. Indeed, 15 million children die every year of
malnutrition in a world where the food that is disposed of as garbage by affluent persons is
enough to save most, if not all, of these lives.”
Book Review:
This chapter explains the role of Digital Divide for the people. Let us define first what is
digital divide? As stated here on this particular chapter, Digital divide is a new term for right
which means that it occupies the main component of global lingua franca. The word lingua
franca is only for the internet which is accepted as a language from our language. Those words
by lingua franca came from us but these words were modernized because of internet. These
words defined by human and can understand by people who are into computers or internet
enthusiasts. It’s more on digital words I should say because, it is modernized by people to make
it more attractable and meaningful. This is to signify that in essential terms, one thing: the
fundamental disparity between information haves and have-nots. These words are too techy
and I don’t understand it either. It is stated here that these will depend upon who is on the sides
of comparison.
What do people expect from this topic? Again, it is a literature of words that is full of
technical definition. There are many doubts about digital divide because people cannot easily
68
detect in digital divide literature. The big problem of this topic is that it is hard to understand
this particular language and more people will not and discourage them to understand this. It is a
learning tool for us bet yet, no one in the world will try to understand and learn it. Only those
people who are interested. It is stated here that this was too narrow to certainly understand the
revolution. The network had to expand, by all means so that it will be accessible for people who
like to use this as a primary tool.
That digital divide is the division between those who have access to ICT and are using it
effectively, and those who are not
Integrative Question:
69
The Hand book of information and Cyber Ethic
Amazonlink:
http://www.amazon.com/Handbook-Information-Computer-
Ethics/dp/0471799599/ref=sr_1_1?ie=UTF8&s=books&qid=1233037513&sr=1-1
Quote:
Book Review:
When we say intercultural it is within the culture. Combining this to ethics means
a lot to the information ethics topic. We all know that information ethics is part of ethical
values made by human. We all know that information is everywhere. It will go out
somewhere just like water. But the problem of this is that information is very much
sensitive. Once information is leaked, more people will know it and as a result, people
will react and react about that issue. The information now turns out to issue. That’s the
informal way of knowing the information. Information must be in a good side wherein
people must make use of it in a right and better way. Now, for uneducated people, they
don’t know how to handle the information, they keep leaking this and sometimes this
particular information will go to some professionals. It’s complicated in sharing
information especially if that information is sensitive.
70
As stated here on this chapter. IIE will not deal with the question of the impact of
ICT on local cultures but explores also how specific ICT issues or, more generally, media
issues can be analyzed from different IIE perspective. We are talking here again about the
cultures and we all know that we have different cultures and at the same time, we have
different beliefs. So this statement from this chapter proves that Intercultural Information
of ethics is different and has different impact to ICT for local cultures, different
understanding for different cultures.
That there are intercultural information ethics that are used by different cultures
That there are at least three major global or spherical projects in European history
Integrative Question:
1. What is culture?
2. What is IIE?
71
Auctioning Virginity
Utilitarian Perspective:
Agree – Ynte
Under the concept of utilitarianism, prostitution is justifiable if the costs of the action are less
than the benefits received. Of course many would say that the means does not justify the ends.
However in Utilitarianism, this is the least of the concerns. the act of prostitution is not une
thical if it serves or benefits a greater number of people while harming a smaller
number. Moreover if the consequences of the action provide benefit such as economic, to the
person who undertakes it then it follows that the action cannot be condemned on moral
grounds.
Disagree – Gamba
Ms. Dylan’s action is wrong because having sex should be done with the person you love and
not because of the money you will receive from your partner. Her method of getting money for
her studies is incorrect because of the consequence of her losing her virginity to someone she
does not love.
Kantian Perspective:
Disagree - Ynte
Many liberal and radical philosophies/ philosophers’ stress that prostitution is no more
inherently wrong or harmful than any other type of service work. I believe that prostitution
violates the Kantian “principle of humanity,” because it reflects a disrespectful attitude, which
is expressed in the casual use of the human body as a mere means to achieve some goal, and in
this case, it is to achieve one’s sexual needs and desires. All sexual activities express subjectivity
and different point of views, but not all sexual activities entail mutual respect. Some sexual
activities reflect a person’s attempt to determine another subject, by receiving the other’s
recognition of the person’s will, without yielding to the other’s influence, recognizing the
other’s will, and thus without incurring an obligation to them. The wrongfulness of actions,
sexual or not, dwells in this assault to another person’s dignity.
Agree – Gamba
Her action is correct in selling her virginity to some stranger because now she will be able to
finance her MBA degree.
Nietzcheian Perspective:
Agree – Ynte
For someone who contracted syphilis from prostitutes (I’m pertaining to Nietszche), I believe
that the craftsman of master morality will definitely agree with Dylan auctioning her virginity.
72
Dylan demonstrated her master morality by showing that she’s in control of her whole life and
she knows that she will definitely benefit on this deal.
Disagree – Gamba
Based on nietzche’s theory, I would say that she follows master morality, but the consequence
is bad, because on this transaction, Natalie is the loser because she lost something important,
her virginity.
Aristotlean Perspective:
Disagree – Ynte
The happiness that Dylan will acquire in this act will only be temporary, and according to
Aristotle, human happiness is a lifelong process. It is continuously ongoing and the purpose has
the end in itself. Happiness is an activity of the soul and in that is an ongoing actualization of
the soul’s potential for virtue. Being virtuous is self- sufficient in itself and therefore leads to
human happiness.
Agree – Gamba
Using the golden mean as a philosophy, what Natalie did is correct because she knows what she
wants which is to get money for her MBA degree, and then she will be able to receive the
money for her education by offering her virginity. She obtained what she wants but not
degrading herself as a prostitute like her sister.
References:
http://www.humboldt.edu/
http:www/academon.com
73
10 things learned from CK Prahalad
1) Every person should have access to the benefits of the global economy
2) Treat the poor as a customer not a nuisance
3) All products and services should be affordable to everyone
4) Everyone should have access to the global market
5) “to change things we must not only change things in America, but we need to change things
globally”
6) Start small, scale fast
7) Pricing is very important
8) What we need most are imagination, courage, passion, humanity, and intellect
9) We have to look at poor people as opportunity not as problem.
10) Every people as consumer. Every people as producer.
74
Ethics 101
Amazonlink:
http://www.amazon.com/Ethics-101-Every-Leader-
Needs/dp/0446578096/ref=sr_1_1?ie=UTF8&s=books&qid=1267404937&sr=8-1
Quote:
“Companies that are dedicated to doing the right thing, have a written commitment to social
responsibility, and act on it consistently are more profitable than those who don’t.”
Book Review:
A survey made by George Barna showed that 6 out of 7 people are unwilling to give
their complete trust to teachers, lesser to company executives, government official, TV
reporters, and priests. This result just show how terrible is the state of ethics in the society. The
author mentioned three reasons why people make unethical choices: 1) we do what’s most
convenient; 2) we do what we must to win; 3) we rationalize our choices with relativism. First,
we do what’s most convenient, the author wrote a quote, an ethical dilemma can be defined as
something undesirable or unpleasant choices relating to a moral principle or practice, I agree
with this reason of the author, for example is when the cashier gives us an extra change, isn’t it
more convenient to us to not give back the extra and just accept it as a bonus. Second, we do
what we must to win, we see this scenario on every competition, and players do everything
they can just to win, but some uses drugs like steroids to boosts their bodies ability to produce
muscles and prevents muscle breakdown. Third, we rationalize our choice with relativism,
wherein people determine what is right depending on the situation, which results to what the
author says mentioned as “ethical chaos”, wherein ethics are based on decisions, you are
ethical if your action makes you feel good.
The author also presented some solutions for the current marketplace. First, outsource
ethics instruction wherein companies hire firms to conduct ethics classes and produce ethics
manuals. Second, perform an ethical flea dip, where ethical offenders that are caught will be
punished, but the problem is those offenders are just doing it again. Third, rely on the law,
75
some companies have given up on determining what is ethical and what is not, so their solution
is just to rely on the law, and using what’s legal as their standard.
According to Ethics Resource Center in Washington D.C., companies that are dedicated
to doing the right thing, have a written commitment to social responsibility, and act on it
consistently are more profitable than those who don’t. It also revealed that companies that are
practicing proper ethics are making much more money in the long run than those who don’t.
Integrative Question:
2. Do you believe it’s possible and desirable to use just one standard in every area of life?
4. Choose one reason why people make unethical choices and relate it to your everyday l
life
76
There’s no such thing as “BUSINESS” ETHICS
Amazonlink:
http://www.amazon.com/Theres-Such-Thing-Business-
Ethics/dp/0446532290/ref=sr_1_1?ie=UTF8&s=books&qid=1267405164&sr=8-1
Quote:
“There are really only three kinds of people. Those who don’t succeed, those who achieve
success temporarily, and those who become and remain successful. Character is the only way
to sustain success.”
Book Review:
The author interviewed Coach Mark Richt of University of Georgia’s football team,
which uses a different kind of education to his players. “If you have good character, you’re a
diligent worker and you do what your coaches ask you to do,” says Richt. He introduced a
fifteen minute class several times a week called “Men of character between the hedges” which
is a course on character.
Character is the key to living a life of integrity and ethical excellence and supported this
claim by these statements: 1) Character is more than talk, means that we should act what we
say, when we say we are ethical, we should show this by doing things that are considered
ethical; 2) Talent is a gift – Character is a choice, there are things that are already given to us,
and there is nothing much that we could do to change this, but character is different, we are
free to choose what character we should portray to others; 3) Character brings lasting success
with people, trust is essential when working with other people; 4) People cannot rise above the
limitations of their character, there are only three kinds of people, those who don’t succeed,
those who achieve success temporarily, and those who become and remain successful,
character is the only way to achieve success, not talent, money, and appearance.
The author gave guidelines for people who desire to live a life of character and to live by
the golden rule: 1) adopt the golden rule as the integrity guideline for your life, on every
instance we should ask ourselves, “how would I like to be treated in this situation?”, and if you
77
believe with the golden rule then take the advice of nineteenth-century novelist George Eliot
who said, “keep doing true, never be ashamed of doing right, decide on what you think is right
and stick to it.” 2) Make your Decisions based on this integrity guideline, the author mentioned
that we should live by this rule and think about all our decisions if it concur with the golden rule,
according to Confucius, “To know what is right and not do it is the worst cowardice.” The bigger
decision, the more courage is required. 3) Manage your decision based on this integrity
guideline, when we manage our life and all the little decisions by one guideline – the golden rule
– we create an ethical predictability in our life, which means that when we follow one rule, we
become trustworthy and people will have confidence is us , knowing that we consistently do the
right thing. 4) Ask others to hold you accountable for your actions, in order for one person to
grow is to have someone to monitor their actions, that they should be living by high ethical
standards.
Integrative Question:
1. What is a 24-karat-gold-life?
3. What is character?
78
Ethics and college student life
Amazonlink:
http://www.amazon.com/Ethics-College-Student-Kenneth-
Strike/dp/0205173470/ref=sr_1_5?ie=UTF8&s=books&qid=1267405138&sr=8-5
Quote:
“…forced sex is a form of exploitation. One person uses another person for his own ends. Thus
forced sex violates the principle of respect for persons. This seems true enough, but perhaps it
understates the case. Rape seems a particularly serious and violent form of exploitation. The
act itself can be experienced as highly degrading, painful, and intrusive, and often it has quite
emotionally destructive long-term consequences for the victim.”
Book Review:
The author suggested few approaches and questions about the ethics of sex. First,
discuss minimal standards for sexual conduct. Second, we want to make a few suggestions
about how one might think of sex as part of durable and meaningful human relationships, and
compare this position to another view of significance of sex. In most western societies, the
minimal standard for sexual conduct between adults is that it should be consensual. Coerced
sex or rape is commonly criminalized. Why? 1) One response is that forced sex is a form of
exploitation. One person uses another person for his own ends. Thus forced sex violates the
principle of respect for persons. This seems true enough, but perhaps it understates the case.
Rape seems a particularly serious and violent form of exploitation. The act itself can be
experienced as highly degrading, painful, and intrusive, and often it has quite emotionally
destructive long-term consequences for the victim.
Perhaps we should not treat rape and seduction as different acts. What should define
rape is not force, but more simply the lack of consent. This thinking lies behind the idea of
criminalizing adult sex with minors which is called a statutory rape. Statutory rape is considered
a violation of minor even when no violence or threat of violence used, because minors are
presumed to be unable to give meaningful consent to sex.
79
One might argue that rape and seduction are different for legal purposes, but not moral
ones. They are different legally because the ambiguity about consent makes it difficult to know
the extent which sex was consensual. Consider, for example, that it has been common for
women to marry men whom they would not otherwise wed for the economic security that such
marriage can provide.
Integrative Question:
3. Which of the couple should decide whether or not to take abortion? Why?
4. Do friends have an obligation to tell friends painful truths, or should their role be only
supportive?
5. Do we incur ethical obligations by having sex with someone, even if only once? If so,
what kinds of obligations?
80
12 principles of innovation - Unilab
1) Price Performance
A) Gamba – The price is already low because of the inclusive time chip
Score: 0
2) Innovation
B) Gamba – there is nothing new with the event, most racing events before already did what
this event is offering
Score: 1
3) Scale of operation
A) Gamba – They assigned traffic enforcers to ensure the safety of the runners
Score: 1
4) Eco-Friendly
A) Bernas – Yes, because they want to let us know that we can run long distances and to not
rely on automobiles
B) Gamba – on sports event like this, participants leave a lot of trash, plastic cups, etc.
Score: 1
5) Identifying functionality
A) Gamba – the event’s main purpose is to promote health and wellness of the family
81
B) Bernas – it’s just a waste of time, it’s too early and everybody can run anytime or just go to
gym for workout
Score: 1
6) Process Innovation
Score: 0
7) Deskilling of work
B) Bernas – No, because they should also consider people that are disabled
Score: 1
8) Education of customers
B) Gamba – I think running is something that is already embedded on us, we don’t need any
formal training
Score: 1
B) Bernas – No, because participants might get sick, and remember that they are promoting
health and wellness
Score: 0
10) Interfaces
A) Bernas – yes, because they divided their services on age and distance category
B) Gamba – No, because they don’t entertain walk-in runners because they already set a
deadline for registration
82
Score: 1
A) Gamba – they created a website for online registration, and posted billboards and other
advertisements regarding the running event
B) Bernas – No because not all people can pay for the running event
Score: 1
B) Gamba – the problem is the registration fee which most of the BOP cannot afford, and to
think that they need that much money just to participate in a running event, when they can just
run whenever and anywhere they want
Score: 0
Total: 8 / 12
83
Casas Bahia – 20 integrative questions
-1958
-Samuel Klein
-credit financing
5) What important growth factor does CASAS BAHIA’s competitor does not invest in?
-technology
-to conduct further studies on the behavior of customers and new distribution demands
8) How area the sales on installment basis called in the CASAS BAHIA business model?
-credit sales
-8 percent
10) Where does CASAS BAHIA get information about the credit history of their customers?
11) Why does CASAS BAHIA prefer to get local employees to man their stores?
-for their employees to have a sense of pride and ownership, familiarity on the area, and
proximity to the store
12) What has the company applies so as to allow them to quickly respond to unforeseen problems that
might arise?
84
13) How many levels or categories of economic status does Brazil have?
-five levels
-classes A and B
-classes C, D, and E
-It enables CASAS BAHIA to increase productivity and client satisfaction but lessen the cost of
operations
17) As of 2004, what percentage of the Brazilian population belongs to the lower income classes?
-84 percent
-four
20) On average, how many contracts every month that CASAS BAHIA handles?
-800,000
85
Casas Bahia – 12 innovation principles
1) Price performance: 1
2) Innovation: 1
3) Scale of operation: 1
4) Sustainable development: 1
5) Functionality: 1
6) Process Innovation: 1
7) Deskilling of work: 0
8) Education of customers: 1
9) Infrastructure: 1
10) Interface: 1
TOTAL: 11/12
86
IEEE
87
their professional obligations
S6 – the codes informs the
public about the nature and
roles of profession
S7 – codes enhance the
profession in the eyes of the
public
5) Software engineering code of S3 – the codes educate the W1 – the code is too general and
ethics and professional practice members of a profession about vague
their professional obligations W4 – the code is ineffective and
S5 – the codes tend to sensitize lacks the power to enforce
members of a profession to discipline
ethical issues and alert them to W6 – the code does not
ethical aspects that they might distinguish between micro and
overlook macro ethics issues
S6 – the codes informs the W7 – the code only focuses on
public about the nature and the code and profession itself
roles of profession
S7 – codes enhance the
profession in the eyes of the
public
88
ICICI Bank
3. According to Mahajan, why are the transaction costs of savings in formal institutions as high as 10%
for the rural poor?
Transaction costs of savings in formal institutions as high as 10% for the rural poor because of
the small average size of transactions and distance of the branches from the villages
8. What are the 3 essential steps in the SHG process? Comment on why each step is necessary.
a) learn to save
b) learn to lend what you saved
c) learn to borrow responsibly
89
9. Discuss the NABARD checklist for SHG's. Comment on why each item on the checklist is necessary.
The checklists correlate with high repayment rates and characteristics of the SHGs, whenever
SHG meets a certain number of criteria, the loan officer is instructed to grant the loan immediately. If
the SHG is lacking many areas, loan application is suspended and the group is granted 4-6 months to
improve its operation
10. What is the impact of micro lending in a household according to a NABARD study?
The micro lending has a significant positive impact on income levels and income-generating
activities. The involvement of the members in SHG activities has contributed to their self confidence and
communication skills.
11. Discuss the possible implementation of a smart-card based payment system? Would it work? Why?
The use of smart-card system is to eliminate costs associated w/ cash handling. Some of the
problems about smart-card are high cost and lack of technological infrastructure for widespread
adoption. It would work because they already launched it in October 2000 at Infosys Campus in
Bangalore and at Manipal Academy of Higher Education.
12. Discuss the quote: "Banking with the poor has undergone a paradigm shift. It is no longer viewed as
a mere social obligation. It is financially viable as well". Do you think this quote can be applied in the
Philippines? Discuss.
I think what it says is that banking has shift from average people and higher class people using
the bank to poor people up until the high class people. This would be possible in the Philippines if there
are corporations that are willing to help and devote their time in thinking how this will work for the poor
people.
90
ITC e-choupal
E-choupal is a link of ITC limited, a multi business conglomerate in India, directly with
rural farmers for buying supplies and selling their products to the internet via phone lines or
VSAT connection.
Soya resulted in better utilization of scarce resources and greater cropping application
Before the introduction of e-choupal, intermediaries buy the products of farmers with an
unfair means in judging the quality of products therefore farmers earn lesser as compared to
when E-choupal was implemented, intermediaries are eliminated, and farmers could make
transaction with the buyers through internet
Mandi is ineffective and frequently dishonest on stating prices for the quality of the
products
6. What were the advantages of ITC's competitors? How did ITC address them?
ITC identified the good qualities of their current system then thought of improvements to
further develop their system
91
9. Was it wise for ITC to install an IT-driven solution where most people would not?
Yes, because with this IT solution, farmers could easily transact with buyers far from
their area, they could also learn good farming practices.
10. Why does the ITC insist that the sanchalaks NOT give up farming?
ITC insists sanchalaks to not give up farming, this would compromise the trust the
sanchahlaks commands.
11. Why did the samyojaks introduce the ITC to the sanchalaks?
They introduce ITC to sanchalaks because ITC’s communications with the samyojaks
carried clear messages, a conscious effort was made to divert revenue to samyojaks and every
effort was made to maintain the level of samyojaks’ trust.
12. Describe the new ITC value chain. How different is it from the former value chain?
The new value chain includes the stage pricing, inbound logistics, inspection grading,
weighting payment and hub logistics.
Wave 6 of e-choupal is sourcing IT-enabled services from rural India. Some services are
telemedicine, ecotourism, traditional medicine, and traditional crafts. I think this is feasible
because these are easier by far as compared to the crops.
Yes, so that farmers on the provinces could sell their products for a fair price
92
Jaipur Foot case study
Jaipur Foot is an artificial limb which only costs $30. It is tailored to the active lifestyle of
the poor and it is much cheaper and affordable than the ones produced in the U.S.
Their business is to provide cheap and affordable prosthetic limbs to bottom of the
pyramid which is suitable in their living environment.
Afghanistan have been on several wars, and there are a lot of incidents wherein people
accidentally steps on landmines thus getting their feet or limbs amputated
5. How does Jaipur Foot's product pricing compare with the West?
It was made by Ram Chandra who was born in a family of artisans. He made the first
Jaipur Foot from rubber where he got the idea from having a flat tire while thinking of an
alternative way of having a prosthetic foot that is flexible enough to squat or cross-leg.
With the help of other doctors, they developed an artificial limb.
8. What are the design considerations in the Jaipur Foot Design Process?
They designed the prosthetic limbs that gives flexibility to the user and helps them
perform their usual jobs.
The major constraints in the development of Jaipur Foot are the following:
93
The target market is the lower class and as a result they need to design their in a way
that poor people can afford it.
Importation of foreign materials is limited.
Limited Manpower.
10. How can you compare the raw materials for Jaipur Foot vs. other products?
11. Explain a typical fitting day for a Jaipur Foot? How does it compare with the West?
Jaipur Foot does not focus on speed of service alone, they see to it that they also meet
the psychological needs of the patients and serve free food and accommodations for
their patient’s relatives.
12. What is the BMVSS? How does Jaipur Foot conduct community outreach?
13. Compare Jaipur Foot with Ossur - which one is more competitive? Why?
Jaipur is more competitive because Jaipur’s pricing is cheaper but at the same time they
are still able to provide a product that is of good quality.
Yes, through the camp system which allow them to reach to remote areas of India
It allows them to reduce the cost of manufacturing and also allowed them to make the
product lighter.
94
Hindustan Lever Limited case study
1. What is the innovation that HLL introduced in the area of diarrheal disease prevention?
Because washing hands with soap can reduce diarrhea attacks by 48 percent. Also since
a lot of the food we eat needs to be touched by our hands we need to clean our hands in order
to prevent germs or bacteria from entering our system.
3. Why is an MNC in the best position to influence behavioral change in combating diarrheal
disease?
A multinational corporation especially in the soap industry has the capacity to reach out
to all the social levels in India.
4. According to Yuri Jain of HLL, what is the connection between diarrheal disease prevention
and HLL products?
HLL is a very popular retailer of soap. This is why any messages that they send out can
be heard by a lot of people. When they inform the people about the dangers of not washing
your hands because it can lead to diarrheal diseases many people will listen because they trust
HLL.
5. According to Harpreet Singh Tibb, what is the connection for HLL between economy, beauty
and health?
According to Tibb, if the HLL could successfully establish why health is important or
why soaps contribute to the reduction of health incidents, then they can save money from
medical bills which can be a long term savings.
6. What was the impact of the Central American Hand washing Initiative to its beneficiaries?
It helped people develop a habit of washing their hands before and after eating which
helped reduce the risk of diarrheal disease.
7. What was the reason for Dr. Vedana Shiva's opposition to the PPP? Is it justified?
Dr. Shiva thinks that women in Kerala are literate enough to know about health and
hygiene. Having PPP would be an insult to them.
8. If you were in a position to decide how to go ahead with PPP while knowing the opposition
how would you go about it?
95
I would go ahead because even though it is insulting to a lot of people there is still a
large number of people out there who does not know the dangers of refusing to wash their
hands.
9. How did Lifebuoy re-brand itself? Do you agree with HLL Chairman Marvinder Sing Banga's
decision? Why?
Lifebuoy re-branded itself through creation of other products other than soap wherein
they also plan to have products such as talc powder, shampoos, and others.
10. What is Chairman Banga's approach to costing Lifebuoy? Do you agree with this approach?
They made it in such a way that they can price it low enough for the masses to afford. I
agree with this approach because by doing this they would be able to increase awareness of
diarrheal disease and the same time increase their sales because more and more people will
purchase their products.
11. What is the key to sustained community behavioral change according to Harpreet Singh
Tibb?
The key is to be interactive. They must encourage the communities that they have
reached to pass along what they have learned to other people and other communities.
12. The Lifebuoy Swasthya Cheetna program decided to go through the local school system?
Would this approach work in the Philippines?
I think that this will work in the Philippines because there are soaps in our country that
are cheap enough for the masses. Also i think that Filipinos are open to learning new things.
13. What is the Lifebuoy Swasthya Cheetna's process for creating behavioral change?
14. Each exposure in the behavioral change process involved 5 key communication tactics? Can
you add or subtract to these tactics? Would these tactics work in the Philippines?
15. Explain the germ-glow demonstration. Do you think it was effective? Are there any
alternatives?
The germ-glow demonstration was able show the people that visually clean hands are
not safe clean.
96
16. How did you think the Swasthya Cheetna program impact HLL? Was it a success?
Yes it was a success, it improved the image of HLL. It also helped increase customer
loyalty.
17. How can wealthier Indian populations benefit from the health and hygiene messages?
18. Is the PPP scalable? What about the Swatshya Cheetna program?
No it is not scalable.
19. Yuri Jain claims that PPP has scale. Do you agree with him?
20. Why do you think PPP was slowed down while the Swathsya Cheetna program pushed
through?
97
Book of Eli – movie review
The Book of Eli has an interesting story about a man in post-apocalyptic America to convey an
unnamed book somewhere part of the west coast. It happened thirty (30) years after an immense war
which blew a hole in the sky, much like a nuclear war, that ruined the totality of the world. Eli has been
travelling under the most miserable of circumstances for thirty (30) years which only proved that he has
a powerful conviction and determination to the calling. On his journey to the west he encountered
hijackers and cannibals that he needs to avoid and fight. Eli manages himself and takes down anyone
who tries to get in his way. The essential of the movie happens when he breaks off in a small town
headed by Gary Oldman and his cruel motorcycle riding gangs. The succeeding conflict is yet another
test of Eli's convictions. The movie ended in a surprisingly manner that would definitely make the
viewers think back of the previous scenes.
Denzel Washington (Eli) is a remarkable actor that possesses the undoubtedly charisma he
convey to all of his roles. Talking about the making of the movie itself, the movie has exhibits an action
sequence that made it more stimulating for the viewers. For me, the movie has a philosophical message
that I considered spiritual. Spiritual in the way it presents the role of the bible in today's modern world.
It also exhibits the power of the spoken and written words in combination with faith in times of
catastrophe. Definitely, I would suggest watching the movie for the film holds a certain attribute that is
most of the time lacking in the today’s film. The Book of Eli seems to be a combination of Western,
action, drama, and etc. all combined in a futuristic yet historical and spiritual way.
98
Voxiva case study
To collect data in real time from large numbers of dispersed people and to enable
communications and messaging services that affect immediate change.
2. What are the 3 ingredients of an effective system of disease surveillance and response?
a) threat
b) early detection
a) most of the projects dedicated to bridging the digital divide were not scalable
b) Donors suffered from dot-com fever – there was a significant investment going to projects or
programs that improved connectivity, such as tele-centers or computers at schools, but there
was also a lack of architectural forethought into how the technology and connectivity can be
integrated into wider systems to solve fundamental problems in conveying the service to public
Meyer observed that people were ignoring the fact there are a lot more telephones in the world
and deduced that telephones is more accessible, a practical device for most people other than
internet
5. What was the problem that Voxiva was originally designed to solve?
The first application is a solution that combines the internet and telephone to extend the
benefits of software application to people without access to the internet
b) Facilitates and simplifies the coordination among the different management and operation
levels that are concerned with the disease surveillance
99
c) Provides a unique DB for all users, to make a technical and specialized analysis in near-real-
time or historical trend analysis
d) Reduce errors in the DB since the person who enters data is the same reporter
It can be used for quick information dissemination since communications are improved
9) What are some of the lessons learned in Voxiva’s deployment in other countries?
The cost and needs for implementation would vary depending on the country
To gain full support from the public sector in implementing their projects in healthcare services
11) What is Meyer’s belief’s regarding diversity? What is its connection to innovation?
He believes that India is a market where their product could be sold easily. Most people from
the BOP doesn’t have access to internet but have mobile phones for communication, thus
makes them accessible to the health services
12) Can this system be implemented in the Philippines? What target disease would you recommend?
Yes, this system could be used in case of another epidemic just like H1N1
100
Copyright, Privacy, and Anonymity
1) What is EFF?
Is an international non-profit digital rights advocacy and legal organization based in the United States
He is an American academic and political activist. He is best known as a proponent of reduced legal
restrictions on copyright, trademark, and radio frequency spectrum, particularly in technology
applications.
Is a non-profit corporation dedicated to making it easier for people to share and build upon the work of
others, consistent with the rules of copyright
He is an American cryptographer, computer security specialist, and writer. He is the author of several
books on computer security and cryptography, and is the founder and chief technology officer of BT
Counterpane, formerly Counterpane Internet Security, Inc.
6) What is PGP?
Pretty Good Privacy is a computer program that provides cryptographic privacy and authentication.
PGP is often used for signing, encrypting and decrypting e-mails to increase the security of e-mail
communications.
He is the creator of PGP, the most widely used email encryption software in the world. He is known for
his work in VoIP encryption protocols, notably ZRTP and Zfone.
101
Bahnsen’s basic training defending the faith part 1
Amazon link:
http://cshayden.blogspot.com/2005/12/bahnsens-basic-training-for-defending.html.
Quote:
“Christ is the source of all truth and righteousness. He alone possesses the key to wisdom, so
we will fail in any endeavor that refuses to acknowledge His Lordship.”
Book Review:
Dr. Greg Bahnsen was an influential Calvinist philosopher, apologist, and debater. He
was an ordained minister in the Orthodox Presbyterian Church and a full time Scholar in
Residence for the Southern California Center for Christian Studies. He puts to rest this notion
that Christians are biased, while others are truly objective. He presented two very basic yet
profound statements that run contrary to much of modern Christian apologetics: First, they are
not neutral. Second, we should not even try to be neutral.
102
Among his important points were the following:
God wants us to be consecrated, holy, and set apart to Him. We cannot do this if we
embrace neutrality, which compromises our standing before Him
Neutrality will rob us of our ability to gain knowledge and wisdom. We must fear
the Lord in order to have wisdom. The unbeliever should live in dread of God; it is
supremely irrational for an unbeliever to live without fearing God’s judgment upon
their rebellion and pretended autonomy. If we embrace neutrality, we rob ourselves
of the treasures of wisdom and knowledge in Christ.
We should reject so-called “wisdom” and “knowledge” that runs contrary to God’s
Truth. Everyone has a system of presuppositions and a notion about truth called a
worldview, and we should evaluate the ideas we hear in terms of their adherence to
Scripture.
Integrative Question:
5. What are the two statements given by Bahnsen that run contrary to much of modern
Christian apologetics?
103
Bahnsen’s basic training defending the faith part 2
Amazonlink:
http://cshayden.blogspot.com/2005/12/bahnsens-basic-training-for-defending_23.html
An introduction to worldviews
Quote:
“The Christian has counterparts for every metaphysical, epistemological, and ethical
presuppositions of the unbeliever. In short, we believe in creation, the fall, redemption, and
final consummation. These things have definite implications in every area. God is the Creator,
and this is His universe. Thus, His Word teaches us about metaphysics. We have sinned and are
fallen creatures before Him. We can become renewed in our godly image and apprehend true
knowledge, so our faith has definite implications in epistemology.”
Book Review:
Dr. Bahnsen defines worldview as a network of presuppositions which are not tested by
natural science and in terms of which all experience is related and interpreted. These
presuppositions are very fundamental and logically basic assumptions. They are preconditions
for thinking and provide a basis by which to determine what problems are important and to
evaluate solutions for solving them. Not everyone realizes that worldviews are inescapable;
some will deny that they possess a worldview. Our goal must be to force them to think
consistently in terms of their worldview.
104
Dr. Bahnsen presented three categories of questions that every worldview must
answer. First is metaphysics, study of origin, structure, and nature of equality. Second is
epistemology, the theory of knowledge, this deal with the nature and limits of knowledge as
well as methods used to pursue knowledge, It asks how one justifies and accounts for
knowledge and explores concepts such as truth and beliefs. Third is ethics, the study of good
and bad, right and wrong, It deals with attitudes and actions, moral responsibility and
obligations.
Integrative Question:
1. What is worldview?
2. What is monism?
3. What is dualism?
4. What is atomism?
5. What is pragmatism?
105
Bahnsen’s basic training defending the faith part 3
Amazonlink:
http://cshayden.blogspot.com/2005/12/bahnsens-basic-training-for-defending_30.html
Quote:
“God has made Himself clear and given us plenty of evidence. He pours His wrath and judgment
upon unbelieving cultures and also reveals Himself in creation. The problem is not with Him but
with our sin and unbelief. Unbelievers rationalize God away and try to justify their unbelief.
They invent ideas and worldviews that say it is impossible for finite minds to interact with an
infinite God. They make excuses for their sin and declare themselves righteous. They suppress
the truth and then say there is no truth to be found. Make no mistake: God did not fail to get His
point across. The problem is sin and unbelief, not lack of evidence.”
Book Review:
Dr. Bahnsen extends this training about worldviews beyond simply diagnosing the
various philosophies we will encounter. He discusses the antithesis between Christians and
unbelievers, sharing insight on how this plays out in our ideas and actions.
We must understand the concept of antithesis as we confront hostile and rival claims
against our faith. As Christians, we have an irresolvable conflict between our faith and various
other outlooks on reality, knowledge, and ethics. Starting at the fall of Adam and Eve and
continuing to the present, God has ordained an antithesis between the seed of the woman and
the seed of the serpent – between our world and life view and theirs.
Although unbelievers and believers are often inconsistent in terms of their own
worldviews, our thoughts should lead us in completely divergent directions. Sometimes we say
similar things and act in similar ways as unbelievers, even when these thoughts and actions are
consistent with Christianity. Unbelievers can make truthful statements and perform seemingly
good actions.
106
Dr. Bahnsen concludes that our key to defending the faith is to demonstrate the vanity,
unreasonableness, and inherent contradictions in other worldviews. He says we do not all need
to totally devote our lives to studying philosophy, ideas, and worldviews. Christians must be
equipped to think like Christians and defend the faith against all rival claims. We must
recognize the antithesis between God’s people and humanists. We must understand that
Christians and unbelievers, in principle, have nothing in common. Any truth or righteousness
that they profess is borrowed from us and does not square with their professed
presuppositions.
That Christians must be equipped to think like Christians and defend the faith against
all rival claims.
Integrative Question:
1. What must we do when confronting hostile and rival claims against our faith?
107
Authority of God’s law today
This is systematically basic to Christian ethical reasoning. It asks a question which is impossible
to avoid and which influences every other aspect of one’s ethical theory.
It naturally depends upon God’s self-revelation and the proper understanding of His word.
The disturbing thing is that so many Christian teachers and writers answer them without sufficient
Biblical proof or concern for consistency. It is as though personal feelings give them subsequently
seeking some kind of reason.
The standards that the Christians live should not be restricted to the New Testament but includes
the law of God revealed in the Old Testament.
The word of the Lord is the sole, supreme, and unchallengeable standard for the actions and
attitudes of all men in all areas of life; this word naturally includes God’s moral directives.
It reflects His immutable moral character and, as such, are absolute in the sense of being non-
arbitrary, objective, universal, and established in advance of particular circumstances.
It is to conduct their offices as ministers of God, avenging divine wrath against criminals and
giving an account on the final day of their service before the King of kings, their creator and
judge.
108
It rejects legal positivism and maintains that there is a law above civil law to which appeal can
be made against the tyranny of rulers and the anarchy of overzealous reformers alike.
9) Where can we turn for socio-political wisdom which can effectively counter the degeneration and
disintegration of our culture?
Turn to God’s directives for social justice, and those are found in the Old Testament
commandments to Israel as a nation, a nation facing the same moral problems about life, sex,
property, and truth which all nations must face, including our own.
10) Do people consistently maintain their position of holding only to the New Testament ethics?
No, Christians do not find it a workable policy to follow, departing from the position whenever
it seems convenient or necessary to do so. That simply opens the door to arbitrariness.
109
Transcendental Argument for the Existence of God
Transcendental argument attempts to prove that the Christian God is the precondition of all human
knowledge and experience, by demonstrating the impossibility of having logic, reason, or morality
without God. The argument proceeds as follows:
1. Knowledge is possible
The TAG argues that, because the triune God of the Bible, being completely logical, uniform, and good,
exhibits a character in the created order and the creatures themselves, human knowledge and
experience are possible. This reasoning implies that all other world views, when followed to their logical
conclusions, descend into absurdity, arbitrariness or inconsistency. One aspect on the TAG regards
objective morality. The argument asserts that an omnibenevolent God provides the basis for attributing
right and wrong to any thought or action. In creation God equips humanity to act as moral beings, and
in self-revelation God demonstrates how people should act, and commands them to do so. People then
have an objective source for their standard of morality by which to condemn evil thoughts and actions.
No moral assertions, it is argued, can be explained by the relativist’s worldview; they are instead
derived from unconsciously “borrowed capital” from Christianity, proving the truth of the Christian
worldview. Matthew Slick’s TAG is an attempt to demonstrate the existence of God using logical
absolutes. The oversimplified argument goes as follows: logical absolutes exists, logical absolutes are
conceptual by nature, are not dependent on space, time, physical priorities, or human nature. They are
not the product of the physical universe, because if the physical universe disappear, logical absolutes
would still be true. Logical absolutes are not the product of human minds, because human minds are
different, not absolute. But, since logical absolutes are always true everywhere, and not dependent
upon human minds, it must be an absolute transcendent mind that is authoring them. This mind is
called God. Greg Bahnsen offered a defense against all criticisms of TAG, entitled “The transcendental
argument for God’s existence”, which examines the TAG along with the transcendental arguments in
the contemporary philosophical literature and defends them against objections. As the most common
objection is the claim that the TAG involves circularity, the defense will be briefly outlined. Proponents
of the argument claims that worldview level considerations are supposed to be circular as a sign of
internal cohesion. In dealing with the inevitable circularity of worldviews, Bahnsen maintains that two
criteria must be met to demonstrate a given worldview as true:
1. Interal consistency – the statements made by the worldview do not contradict one another or
otherwise lead to internal contradictions. Logical Positivism fails this test by its claim
that “A statement is literally meaningful if and only if it is either analytic or empirically
verifiable, “a statement that is not itself verifiable analytically or empirically.
2. Arbitrariness – the statements must not be believed simply out of convenience, tradition, or
prejudice
Several criticisms of the TAG have emerged. One says that TAG is not a distinctive form of
argument: this objection claims that the form of the TAG is really just a reworking of the standard
110
deductive and inductive forms of reasoning; it claims that there is really not much difference between
Thomas Aquinas and Cornelius Van Til. The TAG does not fulfill the necessary prerequisites for an
Argument of Proof – that is, to have already proved the foundational premises before the conclusion is
made. Any premise that has not been proved, by its very nature, is an assumption and is considered to
be begging the question. An assumption, by definition, might be wrong. Therefore, an Argument of
Proof cannot be based on foundational premises that are assumptions. Every premise must be proven
prior to the conclusion being made. Those versions of TAG that are dependent on the foundational
premise that “something not conceptual must be physical” yet this notion has not been proved.
Therefore, that premise is an assumption. Thus TAG cannot be offered as proof. The TAG moves from
conceptual necessity to necessary existence. This criticism argues that proving the conceptual necessity
of a worldview doesn’t establish its ontological reality. In other words: one may need think about the
world in a certain way in order to make sense of one’s experience and knowledge, but that doesn’t
prove that the world actually is that way. David P. Hoover has raised this objection in his article “For the
sake of Argument”. The TAG uses another form of begging the question, circular reasoning: the TAG
assumes, from the beginning, what it intends to establish by its conclusion. The TAG does not provide a
uniqueness proof: even if the TAG can prove the existence of a god, it doesn’t prove that of the
Christian god. Any sufficiently similar god, such as Allah, would do. John Warwick Montgomery
presented this objection in the article “Once upon an A Priori…”, presented in Van Til’s festschrift,
Jerusalem and Athens. In argumentation, apologists will attempt to demonstrate that only the
Christian worldview satisfies these conditions and is therefore coherent. However, Van Tillian
presuppositionalists also point out that these conditions are applicable only because they themselves
presuppose Christianity. To say that Christianity is true because it meets these conditions is to say that
a greater standard exists than that of the God of the Bible. However, if you accept the fundamental
Christian assertion that the Bible is the direct word of God, then such a charge would be without
warrant as the Bible would then be the final epistemological authority of Christianity. Using this
rationale, the preconditions of intelligibility are determined merely by Scripture not by autonomous
human reasoning. But the divine origins of the Bible are not universally accepted, and the idea of the
Bible being a product of man rather than being from a divine source has been debated in modern circles
since at least 1878 when Julius Wellhausen first published Prolegomena zur Geschichte Israels. The
question has yet to be definitively answered by scholars. A critique of the argument from morality is
that since there is no evaluative domain from which to demonstrate a source for morality, it can’t be
said that morals are anything more than opinions that we force other people to follow. On the other
hand, it cannot be demonstrated that the source is absolutely subjective either. Without a measurable
source of morality, it cannot be demonstrated absolutely that morality has either an objective or
subjective source. Criticism of Matt Slick’s version of TAG says that it can be dismissed because logical
absolutes are truth statements based on the law of identity, and are not things. When these are
confused, the argument becomes circular. A truth statement is a concept, which does not exist without
a mind to think it, as stated in Matt’s definition. For example, if you make the law of identity statement,
“This apple is an apple, and it is not not an apple”, the truth about the apple is not contingent on the
mind making the statement, the statement itself is the thing contingent on the mind. At the point of
this confusion, the argument becomes circular, a form of begging the question and offers of an
explanation are not necessary since the premise is flawed and no logical syllogism can be made.
After all these criticisms and defense on existence of God, my position remains the same, I
believe that GOD exists, I don’t care on what they said about looking for proof of His existence, for me
He do exists, I don’t have a proof if He really do, but me and my family share the same FAITH in Him,
and this faith will never falter with any criticism. Faith is a choice of every individual; it is believing all of
the Christian worldview or not.
111
EFF issues
2) What is Anonymity?
Anonymity is a shield from the tyranny of the majority. It thus exemplifies the purpose
behind the Bill of Rights and of the First Amendment in particular: to protect unpopular
individuals from retaliation at the hand of an intolerant society.
4) What is CyberSLAPP?
CyberSLAPP are cases that involve defending people’s rights to remain anonymous
when they post comments on message boards, as well as making sure that anonymous
speakers’ due process rights are accepted.
That’s what the courts call when you quote someone on your blog, insert clips of CNN
into your own video news report, or using a song sample in a music parody, your free speech
often depends on incorporating and referencing other people’s creations as part of your own.
6) What is innovation?
Innovation is a new way of doing something or new stuff that is made useful.
New technology has the potential to dramatically improve the lives of those with
reading disabilities -- including the blind and profoundly dyslexic, and those with spinal injuries.
Information in electronic formats can be made accessible using technologies like text-to-
speech and refreshable Braille, opening up whole new worlds to people who have previously
been unable to access information.
Today, you can use any device you like with your television: VCR, TiVo, DVD recorder,
home theater receiver, or a PC combining these functions and more. But if the broadcast flag
mandate is passed, Hollywood and federal bureaucrats will get a veto over innovative devices
and legitimate uses of recorded programming.
112
9) What is Coder’s right project?
EFF's Coders' Rights Project protects programmers and developers engaged in cutting-
edge exploration of technology in our world. Security and encryption researchers help build a
safer future for all of us using digital technologies, yet too many legitimate researchers face
serious legal challenges that prevent or inhibit their work.
Major entertainment companies are using "digital rights management," or DRM (aka
content or copy protection), to lock up your digital media. These DRM technologies do nothing
to stop copyright pirates, but instead end up interfering with fans' lawful use of music, movies,
and other copyrighted works. DRM can prevent you from making back ups of your DVDs and
music downloaded from online stores, recording your favorite TV programs, using the portable
media player of your choice, remixing clips of movies into your own home movies, and much
more.
Net Neutrality is a principle proposed for user access networks participating in the
Internet that advocates no restrictions on content, sites, or platforms, on the kinds of
equipment that may be attached, and on the modes of communication allowed, as well as
communication that is not unreasonably degraded by other traffic.
Digital radio describes radio technologies which carry information as a digital signal, by
means of a digital modulation method.
113
Digital video is a type of video recording system that works by using a digital rather
than an analog video signal.
Digital Millennium Copyright Act, has become a serious threat that jeopardizes fair use,
impedes competition and innovation, chills free expression and scientific research, and
interferes with computer intrusion laws.
Using a TOS, online service providers can dictate their legal relationship with users
through private contracts, rather than rely on the law as written. In the unregulated and
unpredictable world of the Internet, such arrangements often provide the necessary ground
rules for how various online services should be used.
The Internet is global and so are threats to online freedom. Learn about how EFF is
fighting for your digital rights around the world and support our efforts by donating or
becoming a member.
It gives WIPO the opportunity to move beyond the narrow view that they and all IP
protection is beneficial, and choose instead to act strategically to spur economic growth, foster
innovation, and help humanity.
EFF has hundreds of donors and thousands of active supporters throughout Europe. As
part of our expanded international work, EFF has been increasing its participation in European
issues, providing publicity and logistical support for combating bad European tech policy in co-
operation with the many digital rights groups across Europe to fight effectively for consumers'
and technologists' interests.
114
Free Trade Agreement of Americas IP chapter contains a provision that would require
all FTAA countries to ban the circumvention technological protection tools.
The World Intellectual Property Organization (WIPO) is the UN agency responsible for
treaties involving copyright, patent, and trademark laws. WIPO can be a force for progressive
change, helping the world take into account public interest and development needs.
CALEA's purpose is to enhance the ability of law enforcement and intelligence agencies
to conduct electronic surveillance by requiring that telecommunications carriers and
manufacturers of telecommunications equipment modify and design their equipment, facilities,
and services to ensure that they have built-in surveillance capabilities, allowing federal agencies
to monitor all telephone, broadband internet, and VoIP traffic in real-time.
Cell tracking or mobile phone tracking tracks the current position of a mobile phone
even on the move.
An e-book (short for electronic book,or EBook), also known as a digital book, is an e-
text that forms the digital media equivalent of a conventional printed book, sometimes
restricted with a digital rights management system.
Locational privacy (aka location privacy) refers to the the ability of an individual to
move in public space with the reasonable expectation that their location will not be
systematically and secretly recorded for later use.
115
34) What is online behavioral tracking?
Online Behavioral Tracking is a new web technology created many unexpected ways for
corporations to track your web activity without your knowledge. Countless advertising
networks are able to secretly monitor you across multiple websites and build detailed profiles of
your behavior and interests.
Pen trap also known as a pen register is an electronic device that records all numbers
dialed from a particular telephone line. The term has come to include any device or program
that performs similar functions to an original pen register, including programs monitoring
Internet communications.
The REAL ID Act of 2005 is a U.S. federal law that imposes certain security,
authentication, and issuance procedures standards for the state driver's licenses and state ID
cards, for them to be accepted by the federal government for "official purposes", as defined by
the Secretary of Homeland Security. The Secretary of Homeland Security has defined "official
purposes" as presenting state driver's licenses and identification cards for boarding
commercially operated airline flights and entering federal buildings and nuclear power plants.
RFIDs — technologies that can be used to pinpoint the physical location of whatever
item the tags are embedded in. While RFIDs are a convenient way to track items, they are also a
convenient way to do something far less benign: track people and their activities through their
belongings
Examples of search engines are Google, MSN, Yahoo, AOL, and other search engines
record your search queries and maintain massive databases that reach into the most intimate
details of your life.
In the United States, citizens are protected by the Fourth Amendment to the United
States Constitution against unreasonable search and seizure. In most cases, a search warrant is
required to perform a lawful search. An exception to this requirement is searches incident to a
lawful arrest. This is also known as the Chimel Rule after the case that established it,Chimel v.
California (1969). This rule permits an officer to perform a warrantless search during or
immediately after a lawful arrest. This search is limited to only the person arrested and the area
immediately surrounding the person in which the person may gain possession of a weapon, in
some way effect an escape, or destroy or hide evidence.
116
Sites like Facebook and Twitter provide users with a place to share personal
information with friends, family, and the public — an activity that's proven to be hugely
compelling to Internet users.
Before you get on an airplane, the government wants to sift through the personal
details of your life. If the data analysis says you're a security risk, too bad -- you may have no
way of challenging the error. Worse still, that black mark could follow you for the rest of your
life, and there may be little stopping the government from using your data for purposes far
outside of travel screening.
Transparency, as used in the humanities and in a social context more generally, implies
openness, communication, and accountability. It is a metaphorical extension of the meaning a
"transparent" object is one that can be seen through. Transparent procedures include open
meetings, financial disclosure statements, the freedom of information legislation, budgetary
review, audits, etc.
EFF's FOIA Litigation for Accountable Government (FLAG) Project aims to expose the
government's expanding use of new technologies that invade Americans' privacy. Through
Freedom of Information Act (FOIA) requests, the project helps to protect individual liberties
and hold the government accountable.
The Test Your ISP project previously released a much simpler piece of software called
pcapdiff. Pcapdiff is a simple command line tool that lets you compare "pcap" packet captures
from either end of an Internet communication; it reports when packets are dropped and
spoofed between the endpoints ("pcap" packet captures can be recorded with standard packet
sniffing tools liketcpdump and wireshark). Running tests with pcapdiff is a technically involved
process; we have a whitepaper outlining the steps involved
117