of 31
8/14/2019 Handbook of Ethics
1/31
Rocky L. Ho
Part 1: Handbook of information and computer ethics.
Chapter 1
Title: Foundations of Information Ethics by
Luciano Floridi
Quote: The information society has been made possible by a cluster of information and
communication technologies infrastructures.
Expectations:
I expect to learn a lot from this chapter since it is the first part of the handbook.
Book Review:
The author of this chapter is Luciano Floridi. IE was one of the topic which was
discussed, it is said that the IE is the ethics for information resources. ERPT was also discussed,
which means external, resource, product, target, and it is a model. There were stages that were
mention in this chapter. The stages talks about how the environment evolves when time
passes. Technology were produced to help us guide ourselves in our work.
Things I have learned:
I learned that the organization policy drives information technology development.
Integrity Questions:
1.) What is ECPT?2.) What IE?3.) What are the limitations that were discussed?4.) Who is Luciano Floridi?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
2/31
Part 1: Handbook of information and computer ethics.
Chapter 2
Title: Milestones in the History of Information and Computer Ethics by
Terrell Ward Bynum
Quote: The academic field of information ethics was born unintentionally and almost
accidentally in the middle of the second war.
Expectations:
I expect to learn about the milestones in the history of information and computer ethics.
Book Review:
The author of this chapter is Terrell Ward Bynum. The topic wieners account of a good
life was discussed, based on my readings, they say that we have to live well, and we have to be
free and be creative as much as possible, because in our generation, being a new model is
something that we all must achieve. Next which was discussed was about the information
ethics methodology, and it says that people tends to find something which was already
discovered or has been found by somebody else. There are information that does not need to
be extracted from where it came from.
Things I have learned:
I learned that this chapter cares for policies, thus it is very complicated to understand
new things.
Integrity Questions:
1.) What is unique?2.) What is influencial computer ethics theory?3.) What is ETHICOM96?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
3/31
Part 1: Handbook of information and computer ethics.
Chapter 3
Title: Moral Methodology and Information Technology by
Jeroen van den Hoven
Quote: Computer ethics is a form of applied or practical ethics.
Expectations:
I expect to learn the moral methodology and information.
Book Review:
The author of this chapter is Jeroen van den Hoven. He said that the moral questions
was the development of associating and same goes for the applications and the usage of the
computers. Since ethics is most likely talking about the computer based part in the information
technology world, it gives out benefits on how to justify our answers. For further information,
about ethics, it was given that it is a responsibility for software error, equal access, and
autonomous agents is one thing it says that for us to be able to get the solutions for our
problems, we can guide ourselves by using the given samples.
Things I have learned:
I learned that there are processes on how to obtain certain things and patch it up to
create a new answer for our problem.
Integrity Questions:
1.) What is conceptualization?2.) What is moral methodologies?3.) What is applied ethics?
8/14/2019 Handbook of Ethics
4/31
4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
5/31
Part 1: Handbook of information and computer ethics.
Chapter 4
Title: Value Sensitive Design and Information Systems by
Batya Friedman, Peter H. Kahn Jr., and Alan Borning
Quote: It employs an integrative and iterative tripartite methodology, consisting of
conceptual, empirical, and technical investigations.
Expectations:
I expect to learn about the values sensitive design and information systems.
Book Review:
The authors of this chapter are Batya Friedman, Peter H. Kahn Jr., and Alan Borning.
They discussed the same chapter which means that have to agree on something which is based
on value sensitive design and information systems. Value sensitive design was discussed, which
means that it is an approach which was made or designed of the technology that will eventually
helps human lives and values. There were cases in this chapter were there are people who
debates about the usage of the land and transportation, fairness, support on the process of
being a diverse range of different consumers or stakeholders.
Things I have learned:
I learned that the value sensitive design is the main point of design for technology. It is
an interesting topic.
Integrity Questions:
1.) What is value sensitive design?2.)
What is value?
3.) What is system design?4.) What is empirical investigations?5.) What is technical investigations?
8/14/2019 Handbook of Ethics
6/31
Part 2: Handbook of information and computer ethics.
Chapter 5
Title: Personality-Based, Rule-Utilitarian, and Lockean Justificationsof Intellectual Property by
Adam D. Moore
Quote: Care is needed so that we do not confuse moral claims with legal ones.
Expectations:
I expect to learn about what intellectual property means.
Book Review:
The author of this chapter is Adam Moore. The meaning of intellectual property was
discussed, it simply means that it is the normal characterized of a generally property which is
owned, it is a value which is based on the ideas. The secrets for trading was also discussed,
according to the book consist of any formula, pattern, device, or compilation of information
that is used in ones business.
Things I have learned:
I learned that the meaning of intellectual property can somehow be obtained when weget the respect of other people. Like we give them their own rights.
Integrity Questions:
1.) What is intellectual property?2.) What does the alternatives to patents talks about?3.) What is copyright?4.) Who is the author of this chapter?5.) What is trade secret and social utility?
8/14/2019 Handbook of Ethics
7/31
Part 2: Handbook of information and computer ethics.
Chapter 6
Title: Informational Privacy: Concepts, Theories, and Controversies by
Herman T. Tavani
Quote: it would seem that privacy is not simply a static concept, but instead has a dynamic
component.
Expectations:
I expect to learn about the informational privacy, concepts, theories, and controversies.
Book Review:
The author of this chapter is Herman Tavani. He discussed the concept of privacy, for
what I have understood about this topic, it is the complain of privacy where in it is being used
to someone else, and changing the things which does not belong to them. Since it is privacy,
they have no right to intrude into someone elses stuff, file, projects, etc. since privacy is a big
issue for everyone, it can somehow be related to hacking into somebody elses files and calim it
as your own.
Things I have learned:
I learned that privacy is a big issue for all of us, because it is the centralized topic which
is very important to the one who makes the work done.
Integrity Questions:
1.) What is the concept of privacy?2.) What unitary?3.) What is derivative?4.) What is cluster definition?5.) What is decisional privacy?
8/14/2019 Handbook of Ethics
8/31
Part 2: Handbook of information and computer ethics.
Chapter 7
Title: Online Anonymity by
Kathleen A. Wallace
Quote: The term anonymity has been used to denote a number of related things:
namelessness, detachment, unidentifiability, lack of recognition, loss of sense of identity or
sense of self, and so on.
Expectations:
I expect to learn about the topic online anonymity.
Book Review:
The author of this chapter is Kathleen Wallace. From the beginning of the chapter,
anonymity as a feature of complex social structures was discussed, according to what I have
read Before turning to a discussion of the concept of anonymity itself, it is worth noting that
recent concerns about anonymity may be an expression of a widespread feature of
contemporary social organization and of the extent to which technological features of
that organization affect with whom we interact, how we interact with one another, and
how we think of ourselves as related, socially and ethically, to others this statement talks
about how fast the things can passes, and how others receives the information so fast.
Things I have learned:
I learned that anonymity can help us to have a modern life when It comes to ethical
world in information technology.
Integrity Questions:
1.) What is anonimity?2.) What is complex social structures?3.) What is online anonimity?4.) What is the concept of anonimity?5.) What is data mining?
8/14/2019 Handbook of Ethics
9/31
Part 2: Handbook of information and computer ethics.
Chapter 8
Title: Ethical Issues Involving Computer Security: Hacking,Hacktivism, and Counterhacking by
Kenneth Einar Himma
Quote: Certain assumptions about hacker and related terms should be made explicit.
Expectations:
I expect to learn about the ethical issues involving computer security, hacking,
hacktivism, and counter hacking.
Book Review:
The author of this chapter is Einar Himma. This chapter talks about hacking where
people does not have the authority to snoop around other peoples file, as an information
technology person, they should know that is is a negative thing to do because it is written in the
ten commandments of information technology world. There are also positive things when it
comes to hacking. For what I know, there is this guy who hacked the system, luckily he hacked
is after that, he was know for some people, what he did was correct.
Things I have learned:
I learned that hacking is not always negative thing to do, there are positive sides when it
comes to hacking.
Integrity Questions:
1.) What is hacktivism?2.) What is counter attacking?3.)
Are there limitations when it comes to hacking?
4.) Who was the first person who was known as a hacker?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
10/31
Part 3: Handbook of information and computer ethics.
Chapter 9
Title: Information Ethics and the Library Profession by
Kay Mathiesen and Don Fallis
Quote: We begin this chapter by considering the mission of the librarian as an informationprovider and the core value that gives this mission its social importance.
Expectations:
I expect to learn about the information ethics and the library profession.
Book Review:
The author of this chapter are Kay Mathiesen and Don Fallis. They discussed the core
value of the library profession, selection, bias, neutrality, the classification of labeling, how
children gets access to the information that are been made. Several years ago, almost
everybody puts newly information in the library. Its like a mission for them to put information.Selection means that they have the ability or right to choose from, bias talks about how other
people discriminate other races, and how they treat others unfairly. Neutrality talks about how
people treats other people fairly and has the equal rights.
Things I have learned:
I learned that computer ethics can be known in the world, we can get the references in
the library which supports information for what we need.
8/14/2019 Handbook of Ethics
11/31
Integrity Questions:
1.) What is bias?2.) What is selection?3.) What is neutrality?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
12/31
Part 3: Handbook of information and computer ethics.
Chapter 10
Title: Ethical Interest in Free and Open Source Software by
Frances S. Grodzinsky and Marty J. Wolf
Quote: It is beyond the scope of this paper and its author to develop a detailed integration
of ideas of Kant and Aristotle around the virtues.
Expectations:
I expect to learn about the ethical interest in free and open source software.
Book Review:
The author of this chapter are Fances Grodzinsky and Marty Wolf. In this chapter the
free software and open source software is the main topic. They discussed the importance of
open source and free software. We can say that it is a free software if we downloaded it from
the internet without paying a single amount of money. It is an open source if it is legal without
being hesitated by anyone. We can get free software from the one who made the software
himself or herself.
Things I have learned:
I learned that not all free things in the world can be easily obtained. There are still prices
which we have to pay.
Integrity Questions:
1.) What is free software?2.) What is open source?3.) What are the differences among free software and open source?4.) Who is the author of this chapter?5.) Where do we get free software and open source?
8/14/2019 Handbook of Ethics
13/31
Part 3: Handbook of information and computer ethics.
Chapter 11
Title: Internet Research Ethics: The Field and Its Critical Issues by
Elizabeth A. Buchanan and Charles Ess
Quote: internet research ethics is an emerging multi and interdisciplinary field that
systematically studies the ethical implications that arise from the use of internet as a space orlocale of , and/or tool for, research.
Expectations:
I expect to learn about the internet research ethics which discusses the fields and its
crucial issues.
Book Review:
The author of this are Elizabeth Buchanan and Charles Ess. From the beginning of the
chapter, they discussed the introduction to the internet which research about the ethics, also
the background of all major issues in the literature. Followed by the history of the IRE, next is
the philosophical foundations which tackles the sources, frameworks and the initial
considerations. Next that was discussed was the specific of IRE issues. Then the definition of
revealing identities was next discussed, here in this topic, they said that it is an online identities
are very similarly complex. We have to give respect for other person, since we are the same as
a human being, we can understand what or how they think.
Things I have learned:
I learned that the source, framework and initial considerations are the main topic whichusually discussed for this chapter.
8/14/2019 Handbook of Ethics
14/31
Integrity Questions:
1.) What is source?2.) What is framework?3.) What is initial considerations?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
15/31
Part 3: Handbook of information and computer ethics.
Chapter 12
Title: Health Information Technology: Challenges in Ethics, Science, and Uncertainty by
Kenneth W. Goodman
Quote: there is arguably no better trigger for reflection on morality and its relationship to
the law and society than privacy and its cousin, confidentiality.
Expectations:
I expect to learn about the health information technology which talks about the
challenges in ethics, science and uncertainly.
Book Review:
The author of this chapter is Kenneth Goodman. At the beginning of this chapter, the
privacy and confidentiality was discussed, inside this topic, the definitions were given and said
that there are lots of us who usually violates the right of being a human being, I can relate this
to ethics since I am taking up ethics class, I can say that we all have the right to be able to
acknowledge things on our own because we have our own life and we can reason out our belief
which can be believed by the public.
Things I have learned:
I learned that we have our own privacy which others cannot take away from us.
Integrity Questions:
1.) What is diagnostic expert systems?2.) What prognostic scoring systems?3.) What does the standard view talks about?4.) Who is the author of this chapter?5.) What does progressive caution talks about?
8/14/2019 Handbook of Ethics
16/31
Part 3: Handbook of information and computer ethics.
Chapter 13
Title: Ethical Issues of Information and Business by
Bernd Carsten Stahl
Quote: Businesses and the economic system they work in have an important influence onethical issues arising from information and information and communication technology.
Expectations:
I expect to learn about the ethical issues of information and business.
Book Review:
The author of this chapter is Bernd Carsten Stahl. The concept of business was
discussed, since the concept of the society which is the main topic which everyone uses as the
most count of argument, I can say that it is the liberal democratic states. It can affect the
business which can affect our daily lives. Next is the shareholders and the stakeholders, it says
that the ethical business can approach the stakeholders. Next is the shared norms and values,
this topics says that it can either be democratic or egalitarian as it can be offered by some
businessman.
Things I have learned:
I learned that the stakeholders and stockholders have the same attributes.
Integrity Questions:
1.) What is stockholders?2.) What is stakeholders?3.) What are the differences between stockholders and stakeholders?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
17/31
Part 4: Handbook of information and computer ethics.
Chapter 14
Title: Responsibilities for Information on the Internet by
Anton Vedder
Quote: One of the most fascinating aspects of the Internet is that very few accidentshappen.
This not only holds for the technical infrastructure and maintenance, but also for the
communication and information transmitted through the network.
Expectations:
I expect to learn about the responsibilities for information on the internet.
Book Review:
The author of this chapter is Anton vedder. The responsibilities for information on the
internet was the topic for this chapter, we all know that we all bare responsibilities when it
comes to the responsibilities. We can do anything as long as we will not hurt anybody. E can get
tons of information in the internet, since the internet is the center of all attraction in our
generations today, almost everybody uses it to amaze themselves.
Things I have learned:
I learned that the internet can sometimes be harmful to us, it is also the center of all
attraction to us.
Integrity Questions:
1.) What is internet?2.) What can we do with internet?3.)
How can internet harm other people?
4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
18/31
Part 4: Handbook of information and computer ethics.
Chapter 15
Title: Virtual Reality and Computer Simulation by
Philip Brey
Quote: Virtual reality and computer simulation have not received much attention fromethicists. It is argued in this essay that this relative neglect is unjustified, and that
there are important ethical questions that can be raised in relation to these technologies.
Expectations:
I expect to learn about the virtual reality and computer simulation.
Book Review:
The author of this chapter is Philip brey. According to the book which I have read,
virtual reality is the technology which was made during 1980, it has been in the market for
several years, since it can help us to make time pass faster, we can enjoy it and play with it, not
just by playing, we can do anything which we cannot do in the real world, its like 3D animation
and you may or can think that we are in the game itself, it is also a computer based program.
Things I have learned:
I learned that the virtual reality is a computer based program which can be the
attraction for our generation.
Integrity Questions:
1.) What is virtual reality?2.) What is computer simulation?3.) What are the difference between virtuality and reality?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
19/31
Part 4: Handbook of information and computer ethics.
Chapter 16
Title: Genetic Information: Epistemological and Ethical Issues by
Antonio Marturano
Quote: The quantity of information in a system can be understood roughly as theamount of order in that system, or the inverse of the entropy (disorder) that all closed
physical systems accumulate over time.
Expectations:
I expect to learn about the genetic information, epistemological and ethical issues.
Book Review:
The author of this chapter is Antonio Marturano. This chapter talks about the concept
which are being used to genetics for two different levels that can be taken and can be made or
extracted to a new information. Since it can transfer information from one place to another, it
has the ability to make something extraordinary things. The topic eggs as computermachineries made me think how can eggs be a part of computer machineries.
Things I have learned:
I learned that the computer machineries can be related to computer ethics.
Integrity Questions:
1.) What are the concept of information?2.) What is genetic information?3.) What is computer machinery?4.) Who usually use this theory?5.) What can we obtain in this chapter?
8/14/2019 Handbook of Ethics
20/31
Part 4: Handbook of information and computer ethics.
Chapter 17
Title: The Ethics of Cyber Conflict by
Dorothy E. Denning
Quote: cyber-terrorismthe integration of cyber attacks with terrorism.Although cyber-terrorism is abhorrent and clearly unethical, hacktivism raises ethical
questions.
Expectations:
I expect to learn about the ethics for cyber conflict.
Book Review:
The author of this chapter is Dorothy Denning. At the beginning of the reading
materials, they said that this chapter talks about the attack of cyber to be able to clearly state
the unethical things which is illegal. The attack of computer viruses in our computer is very
harmful, it can easily destroy our computer files, sometimes it cannot be returned to you once
the virus was already spread. For the time being, we can avoid these sort of things by setting
some samples like putting anti-virus, put on the windows firewall. Viruses are threats for us.
Things I have learned:
I learned that the organization computer virus can kill our computer.
Integrity Questions:
1.) What is cyber-terrorism?2.) What is a virus?3.) How can we prevent computer virus attacks?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
21/31
Part 4: Handbook of information and computer ethics.
Chapter 18
Title: A Practical Mechanism for Ethical RiskAssessment A SoDIS Inspection by
Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan
Quote: Informaticians have been evolving and refining techniques to mediate risks ofdeveloping software products that meet the needs of their clients.
Expectations:
I expect to learn about the practical mechanism for ethical risk assessment.
Book Review:
The author of this chapter are Don Gotterbarn, Tony Clear, and Choon-Tuck Kwan. Risk
management is the main point here in this chapter. Since all of us is in need of budget, we tend
to to everything to gain money, to be able to raise money, we have to have money, in a
company, risk management is important, we have to monitor the risk management to lessenthe negativity of the companys profile or the companys image.
Things I have learned:
I learned that the risk management is important in a company to raise the its name.
Integrity Questions:
1.) What is risk?2.) What is risk management?3.) How do we get profit?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
22/31
Part 5: Handbook of information and computer ethics.
Chapter 19
Title: Regulation and Governance of the Internet by
John Weckert and Yeslam Al-Saggaf
Quote: There are at least two different questions involved in the governance of the Internet:who, if anybody should be in charge, and what, if anything, should be governed or regulated.
Expectations:
I expect to learn about the regulating and governance of the internet.
Book Review:
The author of this chapter are John Weckert and Yeslam Al-Saggaf. They discussed the
internet governance. According to them Internet governance is the development and
application by Governments, the private sector and civil society, in their respective roles, of
shared principles, norms, rules, decision-making procedures, and programs that shape the
evolution and use of the Internet for this statement, I can say that internet governance is
somehow been able to help us thru our decision making.
Things I have learned:
I learned that the internet governance is the aid to our decision making.
Integrity Questions:
1.) What is internet governance?2.) What WGIG?3.) What is ICANN?4.) What is W3C?5.) What is IAB?
8/14/2019 Handbook of Ethics
23/31
Part 5: Handbook of information and computer ethics.
Chapter 20
Title: Information Overload by
David M. Levy
Quote: It should hardly be surprising if complaints about a flood, a fire hose, or ablizzard of information are not only common but increasing.
Expectations:
I expect to learn about the information overload.
Book Review:
The author of this chapter is David Levy. Some of us does not know that there are
limitations for information sending or receiving, it is called information overload. We tend to
get information from the internet. For what I know, the most famous search engine is the
google, almost everybody get information in google, but for articles, there are lots of us uses
Wikipedia, but Wikipedia cannot be trusted since there are most of us use Wikipedia as pranks
and put false information.
Things I have learned:
I learned that the information overload has its limitations.
Integrity Questions:
1.) What is information overload?2.) What is information?3.) Whats the difference between perception and reality?4.) Who is David Lewy?5.) What is the history of information overload?
8/14/2019 Handbook of Ethics
24/31
Part 5: Handbook of information and computer ethics.
Chapter 21
Title: Email Spam by
Keith W. Miller and James H. Moor
Quote: The conceptual muddles about defining spam have immediate philosophical andlegislative consequences.
Expectations:
I expect to learn about the importance of email spamming.
Book Review:
The author of this chapter are Keith W. Miller and James H. Moor. They have discussed
the importance and the meaning of email spamming. There are lots of us who tends to spam, it
can make our email slow, it is very persistent, so we tend to delete all of the files which was
spammed to us, to lessen the hassle during deleting, or reading nonsense email.
Things I have learned:
I learned that spamming can cause hassleness to the one whose email was spammed.
Integrity Questions:
1.) What is email spamming?2.) What are the intensions of other people who tends to spam?3.) What are the advantages in spamming?4.) What are the disadvantages in spamming?5.) What lesson do we get from this chapter?
8/14/2019 Handbook of Ethics
25/31
Part 5: Handbook of information and computer ethics.
Chapter 22
Title: The Matter of Plagiarism: What, Why, and If by
John Snapper
Quote: As with most ethical concepts, there is plenty of room for debate over the definitionof plagiarism. Plagiarism will be treated here very broadly as expression that improperly
incorporates existing work either without authorization or without documentation,
or both. The emphasis on impropriety is important.
Expectations:
I expect to learn about the matter of plagiarism.
Book Review:
The author of this chapter is John Snapper. In this chapter the topic is plagiarism. There
are many of us still doesnt know what plagiarism is, plagiarism is the act of action where we
copy other persons file and claim it as your own work. Plagiarism is not bad, but we have to put
the citations where we copied the file itself. Because once the owner of the file sees his or her
work which is being used by other people without citations, he or she will surely be furious,because they made use of the file without the permission of the owner.
Things I have learned:
I learned that we have to have the permission of the owner before using the file.
Integrity Questions:
1.) What is plagiarism?2.)
What are the concept of plagiarism?
3.) What do we have to do if we copied other persons file?4.) Who is the author of this chapter?5.) What is authorization?
8/14/2019 Handbook of Ethics
26/31
Part 5: Handbook of information and computer ethics.
Chapter 23
Title: Intellectual Property: Legal and Moral Challenges ofOnline File Sharing by
Richard A. Spinello
Quote: Lost in the thicket of lawsuits and policy challenges are the ethical issues associatedwith the use and distribution of file sharing software.
Expectations:
I expect to learn about the intellectual property.
Book Review:
The author of this chapter is Richard Spinello. He discussed the file sharing, file sharing
can lessen the time where we can transfer files without standing that will cause us our precious
time. We just have to use networking to be able to transfer files from a computer to another
computer, we can also use email to store files and also to send. We dont have to use and
software to do networking, we just need the internet or a networking cable to be able to
transfer files.
Things I have learned:
I learned that the networking can do easier task for us.
Integrity Questions:
1.) What is networking?2.) What is peer to peer network?3.) What is sharing or theft?4.) What is secondary liability?5.) Who is Richard Spinello?
8/14/2019 Handbook of Ethics
27/31
Part 6: Handbook of information and computer ethics.
Chapter 24
Title: Censorship and Access to Expression by
Kay Mathiesen
Quote: One might hope that work in law or philosophy might provide the answer.However,the concept of censorship is commonly used in ways that go much beyond the strict
confines of First Amendment law.
Expectations:
I expect to learn about the cencorship and how to access to expression.
Book Review:
The author of this chapter is Kay Mathiesen. In this chapter cencorship was discussed,
from what I have read, it says that there is no one who wants to be a censor or no one wants to
be called as a censor. There are many people who are interested in this topic since it is one of
the attraction for them. What does censorship really means, it is the limitation access to a
content. Censorship are harmful.
Things I have learned:
I learned that censorship is a really bad thing. Cant really imagine how bad, but based
on my readings they said it is really bad.
Integrity Questions:
1.) What is censorship?2.) Is censorship a bad or a good thing?3.) What does censorship do?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
28/31
Part 6: Handbook of information and computer ethics.
Chapter 25
Title: The Gender Agenda in Computer Ethics by
Alison Adam
Quote: The recognition of continuing differences between men and women lots, at home, inthe workplace, and in education, even in societies that have seen considerable opening up of
opportunities for women in the space of a generation or so, has been a major force in
developing contemporary feminist writing.
Expectations:
I expect to learn about the gender agenda in computer ethics.
Book Review:
The author of this chapter is Alison Adam. Based on my understandings, the issue in this
chapter is based on gender. It is said that it is the major way of classifying and
ordering our world has been propounded by a number of authors, mainly, although not
exclusively, writing from a feminist position. I can say that it is based on the authors, on how
they put everything together and make something out of it.
Things I have learned:
I learned that the gender in this chapter is one of the major topic which was discussed.
Integrity Questions:
1.) What does gender have to do in this chapter?2.) What is feminist ethics?3.) What are the studies of gender and computer ethics can be related to this chapter?4.) Who is the author of this chapter?5.) What do we get from this chapter?
8/14/2019 Handbook of Ethics
29/31
Part 6: Handbook of information and computer ethics.
Chapter 26
Title: The Digital Divide: A Perspective for the Future by
Maria Canellopoulou-Bottis and Kenneth Einar Himma
Quote: In the developing world, poverty and the suffering it causes is considerablyworse. Here poverty is characteristically absolute in the sense that people do not
have enough to consistently meet their basic needs.
Expectations:
I expect to learn about the digital divide which tackles the topic a perspective for the
future.
Book Review:
The author of this chapter are Maria Canellopoulou-Bottis and Kenneth Einar Himma.
They discussed the global distribution which will bother some conscientious individuals. Since
the rate of money in our country is not consistent, it would suddenly rise or fall. We have to dosomething about it, to think carefully what to do in the mere future, being an information
technology person can be helpful, we can use our knowledge on what we have learned and
apply it to our work to be able to make the money growth normal in our country.
Things I have learned:
I learned that the poverty could be such a scary thing if that really happens to us.
8/14/2019 Handbook of Ethics
30/31
Integrity Questions:
1.) What is poverty?2.) What is global distribution?3.) How can we lessen the poverty?4.) What can we do to help the poor?5.) Who is the author of this chapter?
8/14/2019 Handbook of Ethics
31/31
Part 6: Handbook of information and computer ethics.
Chapter 27
Title: Intercultural Information Ethics by
Rafael Capurro
Quote: The distinction between cognitivism and noncognitivism presupposes that humanemotions have no cognitive value and, vice versa, that human cognition has a truthvalue
if and only if it is free of emotions.
Expectations:
I expect to learn about the intercultural information ethics.
Book Review:
The author of this chapter is Rafael Capurro. Rafael discussed the cultural part where
intercultural information ethics has been occurred. There were frameworks were the cultured
country has been surrounded by the common culture thru experience of existence in the world.
They follow some traditions since they were given birth by their ancestors. Computer ethics can
be followed in this chapter by means of cultivating plans or by traditions.
Things I have learned:
I learned that the culture can be affected by means of computer ethics.
Integrity Questions:
1.) Who is Toru Nishigaki?2.) What is culture?3.) Who is Terrell Ward Bynum?4.) Who is Bernd Frohmann?5.) Who is Lorenzo Magnani?