You are on page 1of 142

MARK THE MAN’S

ETHICS READER

BOOK REVIEW

COMPILATION

Created by:

Mark Justin B. Lumantao


This work is licensed under a Creative Commons Attribution-Noncommercial-
Share
Alike 3.0 Philippines License.
Preface

My book contains the 3 books that my professor Mr.


PAUL PAJO, gave to us as a task for his
requirements, so the 3 books named CYBERETHICS
which is a rare book, than the HANDBOOK OF
CYBERETHICS and lastly the book name THE
FORTUNE OF THE BOTTOM OF THE pyramid.

The book reviews is made by chapter by chapter by


each book and it is a summarization of each chapter,
which contained the learning expectation, reviews and
insites about the chapter and what I have learned
while doing the book review
Dedication
I dedicate this book to all my fans out there

Especially my mom, and my family my cousins


and the people out there that knows me

I dedicate to all of my friends from Don Bosco


Mandaluyong and in the College of Saint
benilde.

I dedicate my work to the millions and millions of


people out there that need inspiration from me,

Lastly to all of my friends out there GOD BLESS


always

A quote to remember always

“JUST DO IT” - NIKE


Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Ethics and Information Revolution

Library Reference: N/A

Amazon: N/A

Quote: “Humans are in charge for there own decisions”.

This quote that I have found in the chapter talks about human beings own
decision because as we know that it is a free country or a free world so that is
why decisions of people are very well been just for them alone.

Learning Expectation:

My learning expectation in this chapter is to learn about the first chapter in


cyber ethics book and also to learn the basics of ethics and information
revolution.

Review:

To start of with the chapter the chapter first talks about computers and
how computers can help people in there every day life.

Computers are logically malleable in that they can be shaped and molded
to do any activity that can be characterized in terms of inputs, outputs and
connecting logical operation. Because logic applies everywhere, the potential
applications of computer technology appear limitless. The computer is the
nearest thing we have to a universal tool. Indeed, the limits of computers are
largely the limits of our own creativity.

Then also computer ethics has been used to refer to applications by


professional philosophers of traditional Western theories like utilitarianism,
Kantianism, or virtue ethics, to ethical cases that significantly involve computers
and computer networks. “Computer ethics” also has been used to refer to a kind
of professional ethics in which computer professionals apply codes of ethics and
standards of good practice within their profession. In addition, other more specific
names, like “cyberethics” and “Internet ethics”, have been used to refer to
aspects of computer ethics associated with the Internet.
What I’ve learned:

1.) I learned about basics of computers


2.) Basics of cyberethics
3.) What significance of computers to ethics
4.) More information about information ethics.
5.) The future of computer ethics.

Integrative Questions:

1.) What is cyber ethics


2.) What is difference of cyber ethics to information ethics
3.) What is the importance of computers to information ethics
4.) What is the significance of computers to ethics
5.) What is the future of computer ethics.
Mark Justin B. Lumantao

BS-IS/ IT-ETHICS

Book review: Ethics online

Library Reference: N/A

Amazon: N/A

Quote: “Ethics online is very important in life”

The quote that I have just created is a quote that is very important in life
because ethics is very important in life because without ethics people will just
what ever that they want without even knowing that they are doing things in the
wrong ways,

Especially in the ethics in the information system because for me as


future I.T practitioner information ethics is very important for me to be in the right
way to do my work well because I believe that information ethics is important for
me to lead me in a successful life.

Learning Expectation:

My learning expectation in this chapter is to learn about ethics online and


the different kinds of ethics that is given in life, also for me as a I.T practitioner I
should learn this kinds of ethics.

Plus I also believe that in real life I will be able to use the information that
is given in the book for me to learn lots more information about technology.

Review:

The chapter talks about computer ethics and also show how important it is
for people to follow good computer ethics at all times. If people don't obey these
basic rules, the Internet will become either an anarchic wasteland, or a super
regulated government tool without the freedom that the

Internet needs to grow and improve. The Internet is a useful tool, and
amazing communication device, but it will only stay this way with good computer
ethics. It is important that all of us, and regular users of the Internet, obey
computer ethics and make sure that it will continue to stay such a wonderful
place for years to come.
What I’ve learned:

1.) online ethics


2.) I learned about the values of online ethics
3.) I learned about the things to be done in the cyberworld

Integrative Questions:

1.) What is online ethics


2.) What is ethics
3.) What is cyber ethics
4.) What is the difference between cyber ethics in ethics
5.) What values to we learn in cyber ethics.
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Reason, Relativity and Responsibility and Computer Ethics

Library Reference: N/A

Amazon: N/A

Quote: “2nd Generation is arising”

The quote is telling us people to be aware about the 2nd generation


because as we know that technology is fast growing so that is why people should
know that technology one day will over come use humans and mainly do lots of
works for us.

Learning Expectation:

My learning expectation in this chapter is to learn the reasons relativity


and responsibility of computer ethics.

Review:

The logical malleability of computer technology, said Moor, makes it


possible for people to do a vast number of things that they were not able to do
before. Since no one could do them before, the question never arose as to
whether one ought to do them. In addition, because they could not be done
before, no laws or standards of good practice or specific ethical rules were

We need thoughtful analyses of situations in which computers have an


impact, and we need to formulate and justify policies for using them ethically.
Although we need to analyze before we can formulate and justify a policy, the
process of discovery often comes in the reverse order. We know that computing
technology is being employed in a given situation, but we are puzzled how it
should be used. There is a policy vacuum.

For example, should a supervisor be allowed to read a subordinate’s


email? Or should the government be allowed to censor information on the
Internet? Initially, there may be no clear policies on such matters. They never
arose before. There are policy vacuums in such situations. Sometimes it may be
simply a matter of establishing some policy, but often one must analyze the
situation further.
What I’ve learned:

1.) I learned to become responsible in computer ethics


2.) More information about computer ethics
3.) More aware of the damages in computer ethics.
4.) Reasons why there is computer ethics
5.) Relative information about ethics.

Integrative Questions:

1.) What are the responsibilities in computer ethics


2.) What are the damages if you do not follow computer ethics
3.) What is computer ethics
4.) What is information sharing
5.) What is file sharing.
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Disclosive Computer Ethics

Library Reference: N/A

Amazon: N/A

Quote: “Cheating and fraud is a crime”

This quote tells about the in appropriate use of ethics in the computer
ethics field because some point in time ethics is not used by people because all
they want to do is are things that they want to do, like just to make money.

Learning Expectation:

I would like to learn in this chapter is the different kinds of disclosive


ethics, in the computer ethics field.

Review:

The moral problems considered by computer ethicists. At one end of the


spectrum are those who believe that, essentially, there is nothing new or special
about ethical issues involving the use of computers. Proponents of this view
claim that privacy violations are privacy violations and that theft is theft whether
or not the particular privacy violations or particular thefts happen to involve the
use of computers.

If one starts from the vantage point of technology, for example, one is
drawn to the uniqueness of many of the features of computers. On the other
hand, if one starts with ethics, one focuses more broadly on human behavior and
human values. What brings the two starting points together, she argues, is the
recognition that technology provides the instrumentation of human action

Clarifying conceptual confusions surrounding those issues, and then


formulating and justifying new policies for those areas in which either there are
no existing policies or where existing policies cannot be adequately extended.

These convergences, moreover, are supported by structures of ethical


pluralism that help articulate both important differences and agreements in
Internet research ethics.
What I’ve learned:

1.) I learned more about information ethics


2.) I learned about the disclosive ethics
3.) I learned about the cheating and frauding of people.
4.) I learned more about internet ethics

Integrative Questions:

1.) What is internet ethics?


2.) What is the difference between privacy and public
3.) What is the advantage to know ethics?
4.) What is the autonomy in ethics?
5.) What kinds of people do not do ethics?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Gender and Computer Ethics

Library Reference: N/A

Amazon: N/A

Quote: “Women are equal to men”

The quote is saying that women are equal to men in term of work skills,
sometimes it is true that women are more mature of a thinker than men, but skill
the skill level of a man is more of dominant than females.

Learning Expectation:

My learning expectation in this chapter is to learn about the equality of


women in the cyber ethics field, because in my experience people sometimes
discriminate women due to there skill level and how they do there works.

Because as we know that men are more dominant than women so that is
why men often get good futures than women.

Review:

This chapter is saying that professional ethics serve to enshrine male


expertise at the expense of women making their voices heard. In addition to the
studies outlined above, the relatively few papers which have tackled ethical
questions

from a feminist point of view tend not to take a consistently philosophical


approach to the ethics they question. In other words the question posed is rather
whether it is ethical, in a broad sense, to treat women in the computer industry in
one way or another

Another is feminist concerns have some part to play in the continued


development of computer ethics. It also brings these issues to a mainstream
computing audience.

However I argue that calls for ethical conduct in relation to women's issues
will not carry the debate as far as it could fruitfully be taken. A potentially more far
reaching approach would be to ask how far the development of feminist ethics
could be applied to computer ethics, to use feminist ethics to criticize the
traditional ethical view implicit in computer ethics
What I’ve learned:

1.) equality of male and female


2.) I learned that gender issues is not an issue
3.) I learned that women can match up to men

Integrative Questions:

1.) What are the different gender issue covered.


2.) Who is adam
3.) What is the morality between men and woman?
4.) Which is more dominant man or woman?
5.) Which has the more capacity man or woman?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: is the Global Information Infrastructure Democratic Technology

Library Reference: N/A

Amazon: N/A

Quote: “The Law is very important”

The quote that I just created is mainly about the chapter because as we
know that the chapter that is on review is about the law making in cyberspace,
the law is very important because without the law people will just may trouble and
will not be that disciplined .

Law making is important for the discipline of people because without


discipline people will just make excuses and just do what ever they want even it
is wrong, plus ethics play an important factor in this chapter because ethics is
somewhat connected with the law.

Learning Expectation:

My learning expectation in this chapter is to learn about the different ethics


in the cyber space, and the different laws ins the cyberspace field plus, the
different black-holes and the decentralization process in the ethics field.

Review:

This chapter talks about the importance of computer ethics show how
important it is for people to follow good computer ethics at all times. If people
don't obey these basic rules, the Internet will become either an anarchic
wasteland, or a super regulated government tool without the freedom that the
Internet needs to grow and improve. The Internet is a useful tool, and amazing
communication device, but it will only stay this way with good computer ethics. It
is important that all of us, and regular users of the Internet, obey computer ethics
and make sure that it will continue to stay such a wonderful place for years to
come.

Also this chapter talks about the individuals to stop prying into other
peoples' business. If people respect the online privacy of others, there would be
no need for encryption or fear. This is where the question of ethics comes up. It
is important that private emails sent online stay private, or else the Internet will
be a much more fearful and less useful tool.
What I’ve learned:

1.) Black holes in ethics


2.) The decentralization in ethics.
3.) Law making in cyberethics.
4.) Different types of laws in cyberethics.
5.) Advantage and disadvantage of ethics
6.) More information about ethics.

Integrative Questions:

1.) What are the black-holes in ethics.


2.) What is decentralization in cyber ethics?
3.) State 4 laws in cyberethics
4.) What are the advantage of laws in ethics
5.) What are the disadvantage of laws in ethics.
Mark Justin B. Lumantao

BS-IS/ IT-ETHICS

Book review: Applying ethical and moral concepts and theories to IT Contexts:
Key Problems and Challenges

Library Reference: N/A

Amazon: N/A

Quote: “Cyberethics is important in I.T infrastructures”

As we know that ethics is very important in every field of a person


because ethics is like the commandments, we should have our ethics to become
good people because if do not value our ethics people will just be lost in real life
they will just become corrupt officials and bad people to.

The importance of cyberethics for us i.t practitioners ethics is important


because as we know that i.t is very essential due to technology of today i.t
people can just hack and steal from cyberspace so that is why information ethics
is required for the people in the cyber world.

Learning Expectation:

My learning expectation in this chapter is to learn more information about


cyber ethics and example in applying ethics and moral concepts to i.t contexts,
plus also to learn more about the ethical theories in information ethics.

Review:

This chapter talks about Even when a job is not eliminated by computers,
it can be radically altered. For example, airline pilots still sit at the controls of
commercial airplanes; but during much of a flight the pilot simply watches as a
computer flies the plane. Similarly, those who prepare food in restaurants or
make products in factories may still have jobs; but often they simply push buttons
and watch as computerized devices actually perform the needed tasks.

Plus in this chapter in this way, it is possible for computers to cause “de-
skilling” of workers, turning them into passive observers and button pushers.
Again, however, the picture is not all bad because computers also have
generated new jobs which require new sophisticated skills to perform

What I’ve learned:


1.) More information about ethical theories
2.) More knowledge about moral concepts in ethics
3.) Applying ethics in real life.

Integrative Questions:

1.) How do ethics effect life?


2.) What is the importance of ethics in real life?
3.) What are the different moral concepts in ethics?
4.) How can you apply ethics in real life a student?
5.) What are the different ethical theories?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Just Consequentialism and Computing

Library Reference: N/A

Amazon: N/A

Quote: Computer ethics is important to IT practitioners

Well this quote talks about the different kinds of computer ethics because
as we know that people doesn’t value ethics anymore I can understand them
because life is very hard now, so that is why people are being practical in life
were they get the opportunity, they will definitely grab it.

Money is always the objects in life, as we know that money can move
mountains and definitely can move people, so here ethics comes into place
people should be well trained in ethics while they are young to avoid people who
doesn’t even value there ethics.

Learning Expectation:

My learning expectation in this chapter is to know the meaning of


“Consenquentialism” because it is a new term for me, so that is why I am
interested in learning its meaning.

Plus to learn more about ethics especially the kinds of ethics that can
move people to inspire them not to do bad things.

Review:

Well this chapter is saying that, there is nothing new or special about
ethical issues involving the use of computers. Proponents of this view claim that
privacy violations are privacy violations and that theft is theft whether or not the
particular privacy violations or particular thefts happen to involve the use of
computers. At the other extreme are those such as Walter Maner who hold that
computer use has generated a series of new and unique ethical issues that could
not have existed if computer technology had not been invented. Maner argues
that the "failure to find satisfactory non-computer analogies" for moral issues
involving computers "testifies to the uniqueness of computer ethics."

Plus this chapter also talks about the new policies in response to certain
vacuums generated by computing technology. On Moor’s analysis, then,
computer ethics is the specialized field of identifying policy vacuums created by
computers, clarifying conceptual confusions surrounding those issues, and then
formulating and justifying new policies for those areas in which either there are
no existing policies or where existing policies cannot be adequately extended.

What I’ve learned:

1.) I learned the meaning of Consequentialism.


2.) More information about ethics.
3.) Different policies in ethics
4.) More knowledge about ethics.

Integrative Questions:

1.) What is Consequentialism?


2.) What are the different polices in ethics?
3.) What are the laws in cyber ethics?
4.) What is privacy violation?
5.) What can people do to avoid unethical people?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The internet as public space: Concepts Issues and Implications in
Public Policy.

Library Reference: N/A

Amazon: N/A

Quote: “Internet is open to the public.”

Well this quote talks about the internet being open to the public as we all
know that it is true because, internet and internet information is very open to the
public due to the reason of privacy but there some sites that do not give access
to the public, but for example for the company alone.

But generally the internet and all of its information is open to the public,
this is why people can easily research about the projects and just lets the internet
do the research for them, rather than going to the library to research they it can
take you ages trying to research about it.

Learning Expectation:

My learning expectation in this chapter based from the title I would expect
to learn more about the internet and the concepts and issues behind it, plus more
knowledge about public policy, with the internet.

Especially to learn why the internet is very open to the public, and also
what are its advantages and disadvantages.

Review:

The chapter talks about the various points of convergence, finally, make it
possible to begin articulating a series of guidelines for Internet research that
appear to reflect both shared agreements on basic norms and values and a
recognition of the ethical legitimacy of more than one interpretation or application
of those norms and values.

While a complete guide to Internet research ethics that reflects these


convergences is beyond the scope of this introduction, it may be helpful to close
with a brief indication of at least five elements such an ethics will likely include.
in the specific contributions collected here. These convergences,
moreover, are supported by structures of ethical pluralism that help articulate
both important differences and agreements in Internet research ethics.

What I’ve learned:

1.) More information about ethics.


2.) More information about the internet.
3.) More laws about the internet.
4.) The concepts and issues about the internet.
5.) What is public policy.

Integrative Questions:

1.) What is public Policy?


2.) What the law ins the internet?
3.) What is privacy?
4.) What is internet privacy?
5.) What is internet hacking?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Law of Cyberspace

Library Reference: N/A

Amazon: N/A

Quote: “The law is important”

As we know that the law is very important in our lives because without the
law people will just cause trouble and with that there will just be chaos in world
because of people who are not using the law properly.

The law is important because it is the reason for people to become more
discipline, and to learn more things about the law, the can make people follow
other people.

Learning Expectation:

My learning expectation in this chapter is learn about the law of


cyberspace and the different ethical issues behind cyberspace plus more
information about the cyberspace.

Plus to learn more information about the internet and also cyberethics to
help me in my growth for the better good.

Review:

This chapter seems pretty clear that the applicants knew -- or reasonably
should have known that they weren't supposed to see the status of their
applications, and that the portion of the ApplyYourself website they went to
wasn't supposed to be accessed by the public. In that regard, not only did they
open themselves up to ethical retribution, but to potential criminal prosecution
under both federal and local law. But that doesn't answer the entire question.

Plus the chapter talks about website developer may know what he or she
wants to be available to the public, this may not always be the same as what had
been made available to the public.

Even an innocent surfer may not always know whether information


floating around is intended to be public, or just happened to become so. The
ordinary rules of behavior tend not to apply in cyberspace.
What I’ve learned:

1.) More information about cyberethics


2.) I learned the some parts of the law of cyberspace.
3.) The importance of law of cyberspace
4.) The advantage and disadvantage of the law of cyberspace.

Integrative Quesitons:

1.) What is the law of cyberspace.


2.) What are the different laws of cyberspace?
3.) How important is the law of cyberspace?
4.) What are its advantage and disadvantage?
5.) How can the law of cyberspace a help for people?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Of Black holes and Decentralized Law-Making in Cyberspace

Library Reference: N/A

Amazon: N/A

Quote: “The Law is very important”

The quote that I just created is mainly about the chapter because as we
know that the chapter that is on review is about the law making in cyberspace,
the law is very important because without the law people will just may trouble and
will not be that disciplined .

Law making is important for the discipline of people because without


discipline people will just make excuses and just do what ever they want even it
is wrong, plus ethics play an important factor in this chapter because ethics is
somewhat connected with the law.

Learning Expectation:

My learning expectation in this chapter is to learn about the different ethics


in the cyber space, and the different laws ins the cyberspace field plus, the
different black-holes and the decentralization process in the ethics field.

Review:

This chapter talks about the importance of computer ethics show how
important it is for people to follow good computer ethics at all times. If people
don't obey these basic rules, the Internet will become either an anarchic
wasteland, or a super regulated government tool without the freedom that the
Internet needs to grow and improve. The Internet is a useful tool, and amazing
communication device, but it will only stay this way with good computer ethics. It
is important that all of us, and regular users of the Internet, obey computer ethics
and make sure that it will continue to stay such a wonderful place for years to
come.

Also this chapter talks about the individuals to stop prying into other
peoples' business. If people respect the online privacy of others, there would be
no need for encryption or fear. This is where the question of ethics comes up. It
is important that private emails sent online stay private, or else the Internet will
be a much more fearful and less useful tool.
What I’ve learned:

7.) Black holes in ethics


8.) The decentralization in ethics.
9.) Law making in cyberethics.
10.) Different types of laws in cyberethics.
11.) Advantage and disadvantage of ethics
12.) More information about ethics.

Integrative Questions:

6.) What are the black-holes in ethics.


7.) What is decentralization in cyber ethics?
8.) State 4 laws in cyberethics
9.) What are the advantage of laws in ethics
10.) What are the disadvantage of laws in ethics.
Mark Justin B. Lumantao

BS-IS/ IT-ETHICS

Book review: Fahrenheit 451.2: Is Cyberspace Burning?

Library Reference: N/A

Amazon: N/A

Quote: “Cyberspace can have its limitation”

Well in this quote it is telling us people that cyberspace has its limits
because as I’ve been though in my subject last term that the internet is only
limited I didn’t quite recall the term used but it is said that the internet can loss its
hosting some point in time.

Plus the internet is very useful to us people because the internet is the life
now of the world because communication, information can be gathered using the
internet, even entertainment can be used in the internet, the internet has many
functions and people will just have to develop its functions for people to use it as
publicly as possible.

Learning Expectation:

My learning expectation in this chapter is to learn more about the


cyberspace, and also to learn that is the cyberspace really burning.

Review:

The chapter noted that Federal and state governments are already
vigorously enforcing existing obscenity, child pornography, and child solicitation
laws on the Internet. In addition, Internet users must affirmatively seek out
speech on the Internet; no one is caught by surprise.

Also in this chapter tells that Many sites offering commercial transactions
on the Net contain warnings concerning the security of Net information. Sites
containing sexually explicit material often begin with a statement describing the
adult nature of the material. Chat rooms and newsgroups have names that
describe the subject being discussed. Even individual e-mail messages contain a
subject line.
What I’ve learned.

I learned that the reasons of the cyberspace is burning because of the


miss use of the internet, such as developers creating porno sites that are not
suitable for all ages and also the use of hacking of people and the miss use of
the e-mail.

Integrative Questions:

1.) What is the cyberspace?


2.) Is the cyberspace really burning?
3.) What are porn sites?
4.) What are the actions used to avoid this kind of behavior
5.) What is digital Fahrenheit?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Filtering Internet in the USA: Is Free Speech Denied?

Library Reference: N/A

Amazon: N/A

Quote: “Fight for your right”

Well this quote talks about the freedom of every person to do actions that
are not against the law, it is true because people should definitely fight for there
rights because it is Gods given grace that every people has the right for there
rights.

If people doesn’t practice using there rights they will just be ended up
being bullied by lots of people because people that does not practice there rights
will just be outcast, they must learn to fight for there rights.

Learning Expectation:

My learning expectation in this chapter is how the united states of America


can filter out the content that definitely does not belong to the internet, and also
to learn about the different rights of people as a human being.

Plus ways and explanation in dealing with the internet and the content that
they don’t what lastly, ethical theories about the internet and how to resolve it.

Review:

This chapter tells about our privacy is motivated mainly by the increasing
competition among various entities who view us mainly as consumers of their
products or services.

Thus the internet is still at its infancy; and yet, if you look closely, you will
find that the "800-pound gorillas" in each sector of the industry want to annihilate
the competition.

Lasly this chapter talks about the freedom to speak our mind also requires
the responsibility to be sensitive to the feelings and rights of others. We forgot
that we exist not solely as individuals but also as members of a community.

What I’ve learned:


I learned about the freedom of speech,
I learned how ways to block malicious content site
I learned more about morality/

Integrative Questions:

1.) What is trade-off?


2.) What is the freedom of speech?
3.) What is freedom?
4.) What is speech?
5.) What is privacy?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Censorship: The Internet and the Child Pornography Law of 1996:
A Critique

Library Reference: N/A

Amazon: N/A

Quote: “Child pornography is a crime”

As we know that child pornography is a crime, that is a fact but, we cannot


avoid this kind of matter because will just pay people to the jobs for them, then
money is always the object here, so that is why people don’t hesitate to do thing
that are out of there league.

Plus people should teach there children proper sex education for there
children not to end up in, sexually active children

Learning Expectation:

My learning expectation in this chapter is how people can censor this kind
of mentality, and how people can avoid pornography, plus how people can adopt
to the law without pornography.

Review:

The chapter tells that the telephone communications analogy was the one
most often cited by the judges in the Supreme Court and in the earlier district
court case. The reason for the use of this analogy over the other was the
acceptance that clicking on a hyperlink is like dialing a telephone number; in
other words, positive steps on the part of a person must be made to access the
information.

This analogy also leaves the option open that the Internet could be
regulated as a common carrier, that is, as a telephone company.

The law was attached to the Telecommunications Reform Act of 1996 and
passed by congress on February 1st of the same year. It was signed by President
Clinton the following week.

On the same day the bill was signed the American Civil Liberties Union
filed suit in Philadelphia on the ground that that the statute banned speech
protected by the First Amendment and subjected the Internet to restrictions that
were out of line with regulations faced by other mediums.

What I’ve learned:

I learned about different kind of pornography


I learned about how people blocks certain websites.

Integrative Questions:

1.) What is pornography?


2.) What do people think of porn?
3.) Is childporno legal?
4.) What are the laws behind child porno?
5.) What do people can do to avoid child porno?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: PICS: INTERNET ACCESS CONTROLS WITHOUT CENSORSHIP

Library Reference: N/A

Amazon: N/A

Quote: “Censorship is important especially to minors.”

Much of the literature on such endeavors is pitched in terms of


technologies of freedom, with an expectation that public-spirited experts in
advanced economies will provide tools for use by human rights activists and
ordinary people in repressive economies.

Learning Expectation:

My learning expectation in this chapter is to learn how people can control


censorship, and how internet access can be controlled.

Review:

The chapter tells about when attention was focused on the US


Communications Decency Act, the theory was generally accepted without
question. Few people stopped to consider the power of the technology; that, in
fact, technology which empowers parents to control the access of their children,
equally empowers governments to control the access of their adult citizens

By then Since that time, many of the original PICS advocates have
become alarmed by the extent to which PICS makes the Web censor friendly.
Increasingly, PICS is said to be the devil.

Then the chapter tells about by late 1997, PICS developers had become
less inclined to attempt to gloss over the fact that PICS provides a helpful tool for
government censorship. Nevertheless some, if not all, of those people regard the
issue as being neither their concern nor responsibility. That, however, is cold
comfort to the people who are forced to use the technology they have created.

Lastly this chapter tells that less than twelve months after PICS was
announced, indications arose in Australia and shortly thereafter in the UK, that
governments would enforce or coerce the use of PICS facilitated systems. The
probability of mandatory self-rating and prosecution for inadvertently mislabeling,
or failing to label, became obvious.
What I’ve learned:

I learned about PICC and how people can control censorship, and how
internet access can be controlled.

Plus I learned a lot of things in how the people can control the internet and
how they can block certain sites in the internet to protect there privacy and also
mainly to protect there children from bad education.

Integrative Questions:

1.) What is the communication act?


2.) What is pornography?
3.) What are the charges behind child porno?
4.) What is censorship?
5.) How can privacy be maintained?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: INTERNET SERVICE PROVIDERS AND DEFAMATION: NEW


STANDARD OF LIABILITY

Library Reference: N/A

Amazon: N/A

Quote: “Technology is rapidly evolving”

As we know that technology is rapidly evolving and we are in the 2nd


generation because as we know that technology is fast growing so that is why
people should know that technology one day will over come use humans and
mainly do lots of works for us.

Learning Expectation:

My learning expectation in this chapter is how is the internet service


providers gets the liability for people who are miss using the internet plus, what is
defamation and what are the different service providers.

Review:

The chapter is telling that the institution has taken reasonable care in
relation to publication of the statement in question, the defense is likely to be
available to the institution. Upon receipt of notice of a claimed defamation, the
institution should, of course, remove the posting straight away.

Plus the internet service provider liability overview paper considers the
extent to which institutions are responsible for content which is made available
on their computer systems.

And in this chapter it has been in the highly confrontational area of


defamation law where litigation has determined where legal responsibility lies for
the online hosting, publishing and possession of unlawful and illegal content.

The general rule of UK defamation law is that the publisher of defamation


faces liability and this applies to institutions as publishers in the same way as to
any other publisher. So where an institution maintains control over what its users
publish, it is likely to be considered a publisher of this material for the purposes of
defamation.

What I’ve learned:


I learned a lot in this chapter, about defamation and how the ISP can be
liable in the content of people are showing over the internet.

Integrative questions:

1.) What are ISP?

2.) What is the purpose of an ISP?

3.) Why is the ISP liable?

4.) What is defamation?

5.) What are moderate content?


Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Intellectual Property, Information and the Common Good

Library Reference: N/A

Amazon: N/A

Quote: “Information can always be bad nor be always be good”

In this quote it is saying that people can always be good or bad, but
information will always be information, but still people should always accept the
fact that information weather in real life or in cyberspace, it can always be good
or bad.

Information must always be for the common good, and people should
always respect the fact that people can only accept always the good part in life.

Learning Expectation:

My learning expectation in this chapter is to learn about the intellectual


property of ethics

Another is about the information for the common good.

Review:

The chapter talks about the labor theory is often used today, implicitly at
least, to justify claims to intellectual property rights. For example software
developers who want to discredit "pirates" who use their products without paying,
cite the enormous time and effort that goes into developing a piece of
commercial software and the unfairness of others benefiting from it without
compensating the developer.

But still in the chapter it is saying that the extension is obvious. It takes
much thought, time and effort to create a book, a musical composition, or a
computer program. Those who worked to create it have the strongest claim to the
benefits of its use, over anyone else who contributed nothing to the project.

Plus the product becomes his. He can use it as he wants, whether to sell
or to heat his house, and, more importantly, he can exclude others from its use.
This theory works well in a commercial environment. Not only does it offer a
credible justification for private property, but it also provides incentives for people
to work hard and therefore create wealth.
What I’ve learned:
I learned about the different information to do the common good, and
mainly about more about ethics online, and what and what not to do about ethics,
especially in real life.

Integrative Questions:

1. What is Hegelian?

2. What is intellectual property

3. Who is Hughes, Justin.

4. What is the common good?

5. What is information?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Is copyright unethical? An examination of the theories, laws and


practices regarding private properties of intellectual work in the United States

Library Reference: N/A

Amazon: N/A

Quote: “Ethics will always be ethical”

This quote is telling the importance of ethics in everyday life because as


we know the ethics is really important in life because ethics I like the 10
commandments and it give people the sayings not to do things inappropriately
because ethics teaches people what and what not to do in life.

Plus people will definitely value ethics because in some point in time
ethics is like a success tool in life because if people value ethics they can
definitely be a success person in the near future.

Learning Expectation:

My learning expectation in this chapter is to learn a lot about ethics and to


know the reason why copyright ethics is un ethical, plus I believe that I can learn
in the chapter the different theories regarding ethics

Plus the different law and practices regarding private properties of


intellectual work in the united states.

Review:

The chapter talk about copyright has never protected facts or ideas. It only
protects expression. Therefore a scholar who has labored for years to research a
subject such as Lincoln’s death may find his work utilized without credit and have
no recourse under law

Also this chapter conclude, in view of the findings we must hold there was
not a sufficient copying to amount to an infringement.” In short, plagiarism may
be unethical but it is not illegal if it can be justified by fair use, which does not
specify that the source of work used by must be cited

Plus the chapter talks about while many circuit courts incorrectly
interpreted the 1909 Copyright Act as protecting compilations of information
based on labor this was clearly found unconstitutional by the Supreme Court in
Feist v. Rural Telephone ,

What I’ve learned:

I learned about the different examination of theories in ethics.


I learned about the different theories in ethics
I learned about why copyright and what they are saying is unethical
I learned about the different practices of intellectual work.

Integrative Questions:

1.) What is intellectual work?

2.) What are the different theories in ethic?

3.) Why are they saying the copyright is unethical?

4.) What are the different examinations in ethics?

5.) What is a copyright?


Mark Justin B. Lumantao
BS-IS/ IT-ETHICS
Book review: On the Web, Plagiarism Matters More Than Copyright Piracy

Library Reference: N/A

Amazon: N/A

Quote: “Plagiarism must be never used”

Plagiarism is a crime that almost every people in the right mind already
committed, because people doesn’t some times noticed that they are doing
plagiarism, like for example for students plagiarism is very rampant especially in
examinations in quizzes etc.

Same situation goes for the I.T practitioners plagiarism is definitely a crime
but for them they value the copyright piracy issue, people in the it industry never
forgets to copyright there works because without copyright people will just easily
plagiarize there works and say that they are the people who originally created the
piece of work.

Learning Expectation:

My learning expectation in this chapter is to learn about the different


matters about plagiarism, and to have a more clearer knowledge about the
copyright piracy issue, and also more information about the web, and why
plagiarism matters more than copyright piracy.

Review:

This chapter talks about that there are always questions about the
reliability and the precision of those figures as they are usually exaggerated.

This chapter gives n example is that a common Chinese who buys a


pirated American CD at the price of $0.50 may not pay $20 for the original copy.
Thus the publishers or the owners of the works may not suffer losses from such
pirates.

Plus more information about plagiarism is talks about that plagiarism presents
claims without any trace to their provenance.

That chapter is telling that this is a form of cheating the public which is
similar to creating false histories. It is easy to see that copyright piracy just harms
the owner alone and for some limited period of time. While plagiarism harms all
the readers and the whole academic and journalistic communities, and the
negative effects may last very long or they even cannot be solved.

What I’ve learned:

I learned about more information about plagiarism.


More information about copyright piracy
More information about copyright.
More information about the web.

Integrative Questions:

1.) What is copyright?


2.) What is piracy
3.) What is the web?
4.) What is plagiarism?
5.) What is plagiarism matters more that copyright?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Towards a Theory of Privacy for the Information Age

Library Reference: N/A

Amazon: N/A

Quote: “Theories and privacy is very important in life”

This quote talks about the real life importance of theories and privacy
because sometimes in life theories are some what connected with real life even
though people sometimes doesn’t prove the ethical theory but still people can
say that does theories are correct in some point in time.

But still people are still looking for answers about the different theories in
different walks about life and one is the theory of privacy, people and especially
the IT practitioners are looking for answers in the theory of privacy because as
we all know that the privacy theory is very important in life because privacy is a
right that God has given us.

Learning Expectation:

My learning expectation in this chapter is to learn about the privacy theory


and to learn about its key components as well as the people who are trying to
answer the particular theory.

Review:

This chapter talks about . In contemporary, technologically advanced


societies, it is commonplace for large sectors of populations to participate, in
varying degrees, in electronically networked interactions. Governments, as well
as individual and institutional agents of the private sector,

This people encourage such participation by their explicit expressions of


approval, by progressively increasing the ease of access, as well as speed and
declining prices

And also Information like email addresses, system characteristics, and a


trail of network-based activities are not only effortlessly recorded, but easily
combined with information from the physical world.

Plus in this activity information technology is doubly implicated as it acts


as the medium for transactions as well as repository for the information.
What I’ve learned:

I learned about the privacy theory


I learned about the components of the privacy theory
I learned about what privacy is all about
I learned about how people can destroy other peoples privacy

Integrative Questions:

1.) What is Privacy

2.) What is the theory of privacy?

3.) What is the importance of privacy?

4.) What can people do to protect there privacy?

5.) How can people destroy other peoples privacy.


Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Structure of Rights in Directive 95/46/ec on the Protection of


the individuals with regard to the Processing Personal Data and the free
movement of such Data

Library Reference: N/A

Amazon: N/A

Quote: “The computer is the one not to blame”

As we all know that the computer is the one not to blame in internet
hacking because the computer is just a tool in doing those kinds of deeds, that is
why people are so immature to blame the computer for hacking.

Maybe in the near future there will come a time where computers can
think like a human being, but still in our point of time people cannot still have the
right to blame computers for the reason of hacking personal information, hacking
in a series of databases, the one’s that are in really at fault is the people who
uses the computer for there evil intentions.

Learning Expectation:

My learning expectation in this chapter is to learn about the structure of


rights in directive 95/46/ec, to know that meaning of that and also the protection
of the individuals with regards to the processing of personal data and the free
movement of such data.

This chapter has a very long title so that is why I want to learn all about
what the chapter can give to me.

Review:

To give a short history about the chapter I search the internet and found
in wikepedia.org the information that I need to give a short and brief history of
the chapter the information are In 1990 works on relevant directive were
started. They resulted in the issuance of Directive of the European Parliament
and of the Council of 24 October 1995 (95/46/EC) on the protection of
individuals with regard to the processing of personal data and on the free
movement of such data. The deadline for its implementation in the legal orders
of Member States was set for 23 October 1998.
But this chapter talks about however, with time discrepancies in
legislations of particular EU Member States caused the need to harmonise them.
The fundamental task to be fulfilled by this regulation was to ensure minimum
and at the same time uniform for Member States level of protection of personal
data collected in the filing systems and to ensure a free flow of personal data
between Member States.

What I’ve learned:

I learn about the structure of rights in directive 95/46/ec on the protection


of the individuals with regard to the processing personal data and the free
movement of such data.

Integrative Questions:

1.) What is a directive?


2.) What is 95/46/ec?
3.) What is processing of personal data?
4.) What is the structure of rights?
5.) What is the chapter talking all about?
Mark Justin B. Lumantao

BS-IS/ IT-ETHICS

Book review: Toward and Approach to privacy in public: Challenges of


Information technology

Library Reference: N/A

Amazon: N/A

Quote: “Maintenance is important is every walk of life”

As we know that maintenance is important in life because maintenance is


very essential, life for technology people somewhat maintain there gadgets
everytime right period of time when people just maintain there gadgets people
just takes care of it.

It is essential for people for maintain because it is in our nature to


maintain valuable things in life, because money is very hard to earn this days.

Learning Expectation:

My learning expectation in this chapter is to learn about toward and


approach to privacy in public challenges of information technology

Review:

This chapter talks about public information would include any information
observed and recorded in a public place, in keeping with Reiman's suggestion
that the social practice of privacy "does not assert a right never to be seen even
on a crowded street. It would be reasonable to conclude, therefore, that
information harvested in a public place is "up for grabs" and not covered by
norms of privacy.

And also the existing theories that limit the scope of privacy to a personal
zone or to intimate and sensitive information fail to capture elements of common
real-world judgments. Public reaction to Lotus Marketplace: Households and
similar computerized databases of non-sensitive information indicates that, by
contrast, our common notion of privacy is not thus limited.
Lastly neglecting the broader sphere will rob from people the ease and
comfort of anonymity as they stroll through actual town squares as well as
electronic town squares, conduct trade, socialize, and engage in political and
recreational activity both on and off line. It will deprive them of privacy in public.

What I’ve learned:

I learned about the toward and approach to privacy in public challenges of


information technology.

And also I learned about more information about ethics.

Integrative Questions:

1.) What is the private realm?


2.) What is the public realm?
3.) What is privacy?
4.) What is the public challenges?
5.) What is information technology?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: KDD, PRIVACY, INDIVIDUALITY, AND FAIRNESS

Library Reference: N/A

Amazon: N/A

Quote: “the 4 titles are very important”

The quote is saying that KDD, PRIVACY, INDIVIDUALITY, and


FAIRNESS is important in life because, the internet and all of its information is
open to the public, this is why people can easily research about the projects and
just lets the internet do the research for them, rather than going to the library to
research they it can take you ages trying to research about it.

Learning Expectation:

My learning expectation is for more knowledge and to know the meaning


of
1.) KDD
2.) PRIVACY
3.) INDIVIDUALITY
4.) FAIRNESS

Review:

The chapter tells about the meaning of KDD and that is KDD is the
enormous scale on which data can be processed and profiles can be produced.
Relatively new. also, are the ever growing possibilities of discovering hitherto
unnoticed relationships between characteristics and features of persons, created
by KDD.

But however this may be, one can be sure that the profiles will be used
more and more as a basis for policy-making by public and private organizations.
Although many uses of the products o fKDD are morally acceptable, and even
desirable, many other possible applications are at odds with commonly held
values regarding the individuality of human persons.

And lastly information in the broad sense lies in a careful assessment of


the ways in which the profiles are in fact used and can be used. By meticulously
investigating and evaluating these applications, one may hope to find starting
points for restrictions of the purposes for which these data and profiles may be
produced and applied.
What I’ve learned:

I learned the meaning of:

 KDD
 PRIVACY
 INDIVIDUALITY
 FAIRNESS

Integrative Questions:

1.) What is KDD?


2.) What is privacy?
3.) What is individuality?
4.) What is fairness?
5.) Are all this important in cyber ethics?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Data Mining and Privacy

Library Reference: N/A

Amazon: N/A

Quote: “Data mining and Privacy is somewhat connected with each other”

As we know that technology is rapidly evolving and we are in the 2nd


generation because as we know that technology is fast growing so that is why
people should know that technology one day will over come use humans and
mainly do lots of works for us.

Learning Expectation

My learning expectations is to learn about


1.) Data mining
2.) More information about privacy

Review:

This chapter talks about the privacy concerns, while not originating from
the Internet, can be enhanced by the Internet. On the other hand, certain specific
concerns, which not possible before, now can be made possible by the Internet.

And also the chapter is saying that that the Internet is becoming an
emerging frontier for data mining. Thus, when we consider privacy threats related
to data mining, it is important to explore what characteristics of the Internet
facilitate the process of data mining and how data mining with the Internet can
exacerbate privacy.

2 reasons about data mining and privacy one is fairness and the other is
openness in consent. First, because data subjects are often “not informed” during
the data collection or data mining, sometimes it is impossible for them to set up a
new normatively private situation regarding the data. Secondly,

But also stated in this chapter because the personal data that data
subjects may have willingly granted for use in one context is often subsequently
mined for another context different from the original situation.
What I’ve learned:

I learned in this chapter the meanings and more knowledge about

1.) Data Mining


2.) Privacy

Integrative Questions:

1.) What is data mining?


2.) What is privacy?
3.) What can data mining do for you?
4.) What are the importance of privacy?
5.) How can privacy programs protect important informations?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: A Politics of Intellectual Property: Environmentalism for the net

Library Reference: N/A

Amazon: N/A

Quote: “Internet environment”

The internet as we know has its own environment so as well as people


they have there own environment, to choose from that is why there are blog sites
in the internet, in where people can set up there own blogs and join a community
of bloggers in the internet world.

Learning Expectation:

My learning expectation in this chapter is learn about the politics of


intellectual property, and the environmentalism for the net.

Review:

The chapter is popularizing complicated ideas is hard work. There were


brilliant books like Silent Spring and A Sand County Almanac, television
discussions, documentaries on Love Canal or the California kelp beds, op-ed
pieces in newspapers and pontificating experts on TV. Environmental groups
both shocking and staid played their part, through the dramatic theatre of a
Greenpeace protest, or the twenty respectability of the Audubon society.

And also this chapter suggests a strategy for the future of the politics of
intellectual property. In both areas, we seem to have the same recipe for failure
in the structure of the decision-making process. Decisions in a democracy are
made badly when they are primarily made by and for the benefit of a few stake-
holders.

Plus this chapter thinks of the costs and benefits of acid rain producing power-
generation or -- less serious, but surely similar in form -- the costs and benefits of
retrospectively increasing copyright term limits on works for which the copyright
had already expired, pulling them back out of the public domain. There are
obvious benefits to the heirs and assigns of authors whose copyright has
expired, in having the Congress put the fence back up around this portion of the
intellectual commons.
What I’ve learned:

I learned about more information about ethics.


More knowledge about intellectual property
More information about environmentalism
More information about information technology.
And about the politics of intellectual property.

Integrative Questions:

1.) What is intellectual property.


2.) What is environmentalism?
3.) What is information technology?
4.) What are the politics of intellectual property?
5.) What is the reason for environmentalism?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Privacy and Varieties of Informational Wrongdoing

Library Reference: N/A

Amazon: N/A

Quote: “Privacy and its varieties is important in ethics”

Privacy as we know is very important in life because without privacy


people cannot hide there deepest secrets, because as we know that privacy is
very important for business men because information of different companies is
very important and we all know that.

Learning Expectation:

My learning expectation in this chapter is to learn about the privacy and


varieties of informational wrongdoing.

Review:

This chapter talks about the order to prevent this the 'art of separation' of
spheres has to be practiced and blocked exchanges between them have to be
put in place. If the art of separation is effectively practiced and the autonomy of
the spheres of justice is guaranteed then 'complex equality' is established.

And also this chapter talks about he meaning and value of information is
local, and allocative schemes and local practices that distribute access to
information should accommodate local meaning and should therefore be
associated with specific spheres. Many people do not object to the use of their
personal medical data for medical purposes, whether these are directly related to
their own personal health affairs, to those of their family.

Then also perhaps even to their community or the world population at


large, as long as they can be absolutely certain that the only use that is made of
it is to cure people from diseases. They do object, however, to their medical data
being used to disadvantage them socio-economically, to discriminate against
them in the workplace, refuse them commercial services, deny them social
benefits

Lastly They would also object to these informational cross-contaminations


when they would benefit from them, as when the librarian would advise them a
book on low-fat meals on the basis of knowledge of their medical record and
cholesterol values, or a doctor poses questions, on the basis of the information
that one has borrowed a book

What I’ve learned:

I learned about privacy and varieties of informational wrongdoing.

Integrative Questions:

1.) What is privacy?


2.) What is varieties?
3.) What is informational wrong doing?
4.) What is informational inequality?
5.) What is inequality?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Terrorism or Civil Disobedience: Toward a Hacktivist Ethic

Library Reference: N/A

Amazon: N/A

Quote: Terrorism can be in the real world or in the cyber world.

As we know that terrorism is very rampant almost in every part of the


world because as we know that terrorism is very easy to do, weather in the real
life or in the cyber world but the difference between terrorism in real life people
uses guns to do terrorism while in cyber terrorism, people uses hacking and
computer to do there terrorism

Learning Expectation:

My learning expectation in this chapter is to learn about :

1.) Terrorism
2.) Civil disobedience
3.) Hacktivist
4.) And more information about ethics.

Review:

This chapter talks about the proponents of civil disobedience have offered
a number of reasons for thinking that the law should not, as a general matter,
punish even unjustified acts of civil disobedience. First, acts of civil
disobedience, even unjustified ones, can call attention to laws that ought to be
changed because they are unjust or because they lack sufficient support among
citizens. Like any other form of speech, acts of civil disobedience

Then also talked about in this chapter is the motivation for committing an
act of civil disobedience is typically a laudable one. Since acts of civil
disobedience are characteristically motivated by conscience, it is not entirely
clear what the legitimating point of punishment would be. One might think, for
example, that someone who commits an act of civil disobedience does not need
to be either rehabilitated or segregated for the protection of other people

And more emphasis on civil disobedience do not typically result in morally


significant harm to other persons. A sit-in at a local restaurant might
inconvenience other patrons, but minor inconvenience does not justify punishing
participants.
What I’ve learned:

I learn a lot in this chapter about:

1) terrorism
2) civil disobedience
3) hacktivist
4) and a lot mo information about ethics

Integrative Questions:

1.) What is terrorism?


2.) What is civil disobedience?
3.) What is hacktivist?
4.) What is information ethics?
5.) What is hacking?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Web Security and Privacy: An American Perspective

Library Reference: N/A

Amazon: N/A

Quote: “An American Perspective is respected by all”

Well this chapter talks about the perspective of an American because as


we all know that Americans are dominant in the world because America is the
most and I mean the really power country now in the world because America is a
super power, that is why Americans perspective is respected by all.

Another is American has also the technology to prove anything that they
have invented because America has the budget to do so.

Learning Expectation:

My learning expectation in this chapter is to learn about.


1.) Web security?
2.) More information about privacy
3.) And also to learn more about the American perspective.

Review:

The chapter will start with a review of the literature on privacy and
security, which will support the contention that these are ethical concepts. In a
subsequent step it will discuss the concept of ideology and critical research. This
will lead to a critical discourse analysis of a text from a commercial software
vendor, which will provide evidence of the ideological use of the terms privacy
and security

The chapter also discusses about sector because it has the potential to
determine the success or failure of many business ventures, most obviously e-
commerce activities. The location of privacy and security on the fault line of a
variety of discourses is one of the reasons for some of the problematic use of the
concepts that this paper will discuss.

This chapter also talks about the issues of security which have a moral
side. Security in computing is a major cost factor with estimates of overall cost of
security (or lack thereof) varying widely but always ranging in the billions of
Dollars, Euros, Pounds etc. Such costs are of course a moral issue from a
utilitarian point of view and they also prevent society from investing these
resources in other worthy causes. Security issues also play a large role in
computer crime and digital forensics. The ubiquity of computing in modern
society renders them an important ingredient of many types of. Hacking and
viruses are a major concern.

What I’ve learned:

I learned in this chapter about:

 Web security?
 More information about privacy
 And also to learn more about the American perspective.

Integrative Questions:

1.) What is web security?


2.) What is privacy?
3.) What is the significance of privacy?
4.) What is the American perspective?
5.) What is the world wide web?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Meaning of Anonymity in an Information Age

Library Reference: N/A

Amazon: N/A

Quote: “Anonymous is everywhere”

As we know sometimes when we check our e-mails we see people who


writes aliases and sometimes put there names are anonymous, because there is
a reason behind it, the privacy issue is behind all of it because privacy is a major
factor in life, people has the choice to let them to known in public or not or a
choice to let them in the privacy world:

Learning Expectation:

My learning expectation in this chapter is:

1.) The meaning of anonymity?


2.) What is the information age?
3.) More information about ethics?
4.) Is anonymity important in life

Review:

The chapter talks about Should anonymity be protected in electronic


interactions and communications? Would this be a good thing for community,
responsibility, free expression, political participation, and personal fulfillment.

Also this chapter , agreed that what is importantly at stake in anonymity is


the capacity to be unreachable in certain situations, then we must secure the
means to achieve this. This will include a dramatic reversal of current trends in
surveillance, as well as a relentless monitoring of the integrity of systems of
opaque identifiers.

And example of which is people may be identified with a high degree of


probability when various properties are compounded to include a smaller and
smaller set of individuals who satisfy them all. If an unnamed individual, who
regularly contributes to America Online discussion groups for Corvette owners
and stamp collectors, reveals that he shops at Safeway,
Then also whereas in the past, the most direct and effective way of getting
at a person was through his name, the electronic medium now offers many points
of entry, some of which may be even more effective than a name

What I’ve learned:

I learned in this chapter about:

 The meaning of anonymity?


 What is the information age?
 More information about ethics?
 Is anonymity important in life

Integrative Questions:

1.) What is anonymity?


2.) What is the meaning of anonymous?
3.) What is the information age?
4.) In anonymity really important in life?
5.) Why do people stay anonymous?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Written on the Body: Biometrics Identity

Library Reference: N/A

Amazon: N/A

Quote: “Biometrics can define identity”

It is a fact that people can define ones identity with just the use of
biometrics because in the states there are a lot of software that can determine
ones identity, most commonly used are the software in the hospitals in where
there are DNA testing among people, and also the software in IP tracking.

Learning Expectation:

My learning expectation in this chapter is to learn about:

1.) Biometrics
2.) How biometrics can reveal an identity.

Review:

This chapter is saying that computer system it is usually turned into a


digital representation of your physical trait. The physical trait needs to be
readable by the computer. Current systems do much to make this impossible
with encryption and hashing of biometrics.

Also talked about in this chapter that biometric systems are already being
compromised. People can easily defeat fingerprint scanners with gelatin or other
substances. Other methods and techniques will arise in the future. Again, the
biggest problem with this is that you cannot change your biometric identity like
you can your forgotten password.

Biometrics may become the future SSN. The problem of the SSN is
magnified with biometrics. Your biometrics will not change no matter how much
you complain. Once your biometrics are compromised, your identity will forever
be untrustworthy to all biometric systems. As with the SSN, you don’t have the
option of changing your DNA once compromised.

Passwords or account numbers are used for the same purposes but when
something goes wrong, they are easily changed. Once your SSN is
compromised, you don’t have the option of clicking on a button that resets your
SSN as you do with a password.

What I’ve learned:

I learned in this chapter is:

1.) Biometrics
2.) How biometrics can reveal an identity.

Integrative Questions:

1. What is biometrics?
2. How can biometrics reveal a persons identity?
3. What kind of software can use biometrics?
4. What is the meaning of SSN?
5. What is the meaning of DNA?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Software Engineering Code of Ethics: Approved!

Library Reference: N/A

Amazon: N/A

Quote: “Software Engineering is essential in ethics”

As we all know that software ethics is needed in everyday life because in


ethics life is to short, so that is why people should do there works as neatly as
possible and as good as possible

Now in this chapter the quote is saying that software engineering is very
essential in ethics because of the reason of ethics is need everywhere so that is
why people tend to have corruption every where in life so that is why ethics is
very well need in software engineering.

Learning Expectation:

My learning expectation in this chapter is to learn about:


1.) The essentials of ethics
2.) Then what is software engineering

Review:

The chapter talks about the difference between virtue ethics and
right/obligation ethics? Adherence to these behaviors could be clearly
measured. This is the Kantian moral law; moral principles were categorical and
were true and independent of personal or local circumstance.

Then the members of the Center for the Study of Ethics in the Professions
were participant observers, supported by a pilot grant from the National Science
Foundation. After receiving the Call for participation email, CSEP director Vivian
Weil contacted co-chair Donald Gotterbarn of the Software Engineering Ethic
Institute at East Tennessee State University and expressed interest in observing
the process. Gotterbarn assigned the IIT research team of Weil, Michael Davis
CSEP Senior Fellow, and Ilene Burnstein Computer Science, IIT to the
professional competence working group, the group that was to write the first draft
of the code of ethics.

Then this chapter talks about some of the disagreements that arise in
computer ethics are based on approaching ethics from two apparently
contradictory directions; one a virtue based ethics and the other a rights-duty
based ethics.

What I’ve learned:

I learned in this chapter the meaning of Software Engineering Code of


Ethics
And I also learned more information about ethics, and what it can do for
us.

Integrative Questions:

1. What is information ethics?


2. What is software engeneering?
3. Who is burnstein?
4. Who is Donald gotternbarn?
5. What is the meaning of CSEP?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Ethical Considerations for the information professions

Library Reference: N/A

Amazon: N/A

Quote: “Information can always be bad nor be always be good”

In this quote it is saying that people can always be good or bad, but
information will always be information, but still people should always accept the
fact that information weather in real life or in cyberspace, it can always be good
or bad.

Information must always be for the common good, and people should
always respect the fact that people can only accept always the good part in life.

Learning Expectation:

My learning expectation in this chapter is to learn about the intellectual


property of ethics

Another is about the information for the common good.

Review:

The chapter talks about the labor theory is often used today, implicitly at
least, to justify claims to intellectual property rights. For example software
developers who want to discredit "pirates" who use their products without paying,
cite the enormous time and effort that goes into developing a piece of
commercial software and the unfairness of others benefiting from it without
compensating the developer.

But still in the chapter it is saying that the extension is obvious. It takes
much thought, time and effort to create a book, a musical composition, or a
computer program. Those who worked to create it have the strongest claim to the
benefits of its use, over anyone else who contributed nothing to the project.

Plus the product becomes his. He can use it as he wants, whether to sell
or to heat his house, and, more importantly, he can exclude others from its use.
This theory works well in a commercial environment. Not only does it offer a
credible justification for private property, but it also provides incentives for people
to work hard and therefore create wealth.
What I’ve learned:
I learned about the different information to do the common good, and
mainly about more about ethics online, and what and what not to do about ethics,
especially in real life.

Integrative Questions:

6. What is Hegelian?

7. What is intellectual property

8. Who is Hughes, Justin.

9. What is the common good?

10. What is information?


Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: No PAPA: why incomplete codes of ethics are worst than none at
all.

Library Reference: N/A

Amazon: N/A

Quote: “Internet environment”

The internet as we know has its own environment so as well as people


they have there own environment, to choose from that is why there are blog sites
in the internet, in where people can set up there own blogs and join a community
of bloggers in the internet world.

Learning Expectation:

My learning expectation in this chapter is learn about the politics of


intellectual property, and the environmentalism for the net.

Review:

The chapter is popularizing complicated ideas is hard work. There were


brilliant books like Silent Spring and A Sand County Almanac, television
discussions, documentaries on Love Canal or the California kelp beds, op-ed
pieces in newspapers and pontificating experts on TV. Environmental groups
both shocking and staid played their part, through the dramatic theatre of a
Greenpeace protest, or the twenty respectability of the Audubon society.

And also this chapter suggests a strategy for the future of the politics of
intellectual property. In both areas, we seem to have the same recipe for failure
in the structure of the decision-making process. Decisions in a democracy are
made badly when they are primarily made by and for the benefit of a few stake-
holders.

Plus this chapter thinks of the costs and benefits of acid rain producing power-
generation or -- less serious, but surely similar in form -- the costs and benefits of
retrospectively increasing copyright term limits on works for which the copyright
had already expired, pulling them back out of the public domain. There are
obvious benefits to the heirs and assigns of authors whose copyright has
expired, in having the Congress put the fence back up around this portion of the
intellectual commons.
What I’ve learned:

I learned about more information about ethics.


More knowledge about intellectual property
More information about environmentalism
More information about information technology.
And about the politics of intellectual property.

Integrative Questions:

6.) What is intellectual property.


7.) What is environmentalism?
8.) What is information technology?
9.) What are the politics of intellectual property?
10.) What are ethical codes?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Subsumption ethics

Quote: no significant quotations.

Learning Expectation:

I expect to learn a lot in this chapter especially in the milestones and the
history of the information and computer ethics, I also want to know more about it
because it is in my field or in my career in short it is an obligation for me to know
about it because me as an information management student I must know the
ethics because information technology because for me I need to graduate in
benilde that I have my integrity and my dignity when I go to real world.

Review:

This chapter obviously talks about the information ethics and what it is its
milestones that it has achieved and the history behind it.

Well as I’ve research in the internet about the history of information and
computer ethics Computer ethics as a field of study was founded by MIT
professor Norbert Wiener during World War Two early 1940s while helping to
develop an antiaircraft cannon capable of shooting down fast warplanes. One
part of the cannon had to “perceive” and track an airplane, then calculate its likely
trajectory and “talk” to another part of the cannon to fire the shells. The
engineering challenge of this project caused Wiener and some colleagues to
create a new branch of science, which Wiener called “cybernetics” – the science
of information feedback systems. The concepts of cybernetics, when combined
with the digital computers being created at that time, led Wiener to draw some
remarkably insightful ethical conclusions. He perceptively foresaw revolutionary
social and ethical consequences. In 1948, for example, in his book Cybernetics:
or control and communication in the animal and the machine

With the information gathered I say and also what I’ve read in the chapter
is that it is important for us information systems people to know about the
milestones and the history of computer ethics because with that we have the
foundation that we need to back up our knowledge about information ethics.

What I’ve learned:


I learned a lot in this chapter because this chapter can back up our
knowledge in the information systems ethics that we know it can back us up in
the information that we know about ethics in the information systems field, and
also it is important for us to know this because us information systems
practitioners we must know these for us to teach to other people the values of
ethics.

Integrative Questions:

1.) What can sumsuption do?


2.) What is the subsumtion of ethics
3.) When did information ethics started?
4.) Who started Information Ethics?
5.) What is subsumption?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Ethical Issues in business computing

Library Reference: N/A

Amazon: N/A

Quote: “file sharing can be good sometimes”

There are lots of disadvantages of file sharing sometimes because file


sharing sometimes can cause plagiarism because people whom you shared the
file with tend to be tempted in just copying the file because In the society today
people becomes more lazy when people are just being a helpful person to then
and just gives all the work to the other person.

But file sharing can be helpful to, like with open source communities, file
sharing is a essential part in the community because with that programmers can
help fellow programmer in fixing bugs in open source software and also in
handing out different ideas In the online community.

Learning Expectation:

My learning expectation in this chapter is to learn more about the legal


and moral challenges of online file sharing and also to know the ethics behind the
said topic, plus to know what and what not to do, with online file sharing and
have more and clearer knowledge in the advantage and disadvantage of online
file sharing.

Review:

This chapter basically talks about the legal and moral challenges of online
file sharing, this chapter elaborates about the advantages and the disadvantages
of online file sharing and what can happen to people who are not responsible
enough to share files without any talks anymore.

But with online file sharing people can easily gain access to any bit of
information on the internet market for example in the research area people can
easily research in things that they need for there projects and what are the
missing parts of there project also, what information they need to cope up with
the projects that they do in the future.

Another is online file sharing is an advantage especially in the online


community because people can easily gain access on the information about a
certain topic because topics are well organized and just a mouse click away.
What’ I’ve learned:

I learned a lot in this chapter especially in the legal and moral challenges
in the file sharing category, and also I learned about the advantages and
disadvantages of online file sharing.

Integrative Questions:

1. What is a business?

2. What are the ethical issues in business?

3. What is computing ethical issues?

4. What are the different factors in a business?

5. What can people do to carry over there business?


Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The practitioner from within revising the virtues.

Library Reference: N/A

Amazon: N/A

Quote: “Morally good for affluent persons or nations to help impoverished


persons or nations”

Well this quote talks about the domino effect of people who are morally
good to people and with that it helps people in being more assertive that they will
follow the morally good person in terms of his/her doing because they will be
enlighten because of the graces that the morally good person is having rather
than the person who is not morally good.

Learning Expectation:

My Learning expectation in this chapter is to learn about the digital divide


and what are the ethics behind it and what it can do.

The also to learn about the perspective of the future because as we know
we as people have dreams for the future and with that we want to have a good
future for our future family and our future offspring if we were to have.

Review:

This chapter talks about the future and what will likely to happened in the
future if people will stop being responsible in the future and also ethics becomes
a big player in the future because with people who have proper ethics in life
those are the people whom will be successful in the near future because in little
way ethics can be keys for success.

This chapter also gives al thru out discussion about the ethics because as
we know that ethics comes into play many times in life because this chapter also
talks about the poverty issues of people and also the information systems gap in
world.

But still ethics can help people as clearly elaborated in the chapter
because ethics if people can do there ethics well people will likely to survive
because with ethics people will gain more friends and there jobs will still be
there’s because if people will not follow moral ethics people will just likely
become people with no future and just people with no place in the community
because there pride, soul, dignity, integrative will just be eaten by hell.
What I’ve learned:

I’ve learn a lot in this chapter especially about ethics because as I learned
ethics is very well needed in life because ethics is a key for success and people
should know that.

Integrative Questions:

1. What are virtues?

2. What are the ethical virtues?

3. What can people do to protect there virtues?

4. What is a practitioner?

5. Why do people need to revise there virtues?


Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Foundations of Information Ethics

Library Reference: N/A

Amazon: N/A

Quote: “An information ethics should be able to address and solve the ethical
challenges arising in the infosphere”

The quote tells about what will happened if people in the industry don’t
have the knowledge in ethics, because without the ethic knowledge the people
cannot solve the challenges that goes with technology because as we know that
technology always, becomes more and more advanced each and every day
because, people every can acquire more and more new knowledge to other
people.

Learning Expectation:

I expect to learn a lot in this chapter, because the title speaks for itself the
foundation of information ethics, why is that I want to learn ethics in the
technology level because it is related to my course and as we know I can be a
programmer or an analyst one day, with this new knowledge in information ethics
I learn the what and what not to do in the information systems area.

Review:

This chapter emphasizes about the information society, mainly this


chapter talks about the foundation of ethics, as we know in every book the first
chapter always talks about the introduction to the topic being discussed about the
book.

To start of with the review what first is information ethics, well as my


research in wikipedia.org the meaning of information ethics is the field that
investigates the ethical issues arising from the development and application of
information technologies. It provides a critical framework for considering moral
issues concerning informational privacy, moral agency whether artificial agents
may be moral, new environmental issues especially how agents should one
behave in the infosphere, problems arising from the life-cycle creation, collection,
recording, distribution, processing, of information especially ownership and
copyright, digital divide. Information Ethics is related to the fields of computer
ethics and the philosophy of information.
That is the meaning of information ethics as found in the site so the book
mainly talks about the information ethics in what and what not to do in the
information systems field why is that for the people who needs there integrity and
dignity first of all the must have ethics because without the ethics that they need
they will just end up as people without dignity and integrity because they will just
be corrupt and will just do the things that the people what just for the sake of
money.
What I’ve learned

I’ve learned a lot in this chapter especially the information ethics the us
information systems people needs to life there career with dignity and integrity
especially in our daily lives.

Integrative questions:

1.) What is information ethics?


2.) What is information society?
3.) What is the site in where I got the information about information ethics
4.) What will happened to people without ethics
5.) What is the infosphere.
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Milestones in the History of Information and Computer Ethics*

Library Reference: N/A

Amazon: N/A

Quote: no significant quotations.

Learning Expectation:

I expect to learn a lot in this chapter especially in the milestones and the
history of the information and computer ethics, I also want to know more about it
because it is in my field or in my career in short it is an obligation for me to know
about it because me as an information management student I must know the
ethics because information technology because for me I need to graduate in
benilde that I have my integrity and my dignity when I go to real world.

Review:

This chapter obviously talks about the information ethics and what it is its
milestones that it has achieved and the history behind it.

Well as I’ve research in the internet about the history of information and
computer ethics Computer ethics as a field of study was founded by MIT
professor Norbert Wiener during World War Two early 1940s while helping to
develop an antiaircraft cannon capable of shooting down fast warplanes. One
part of the cannon had to “perceive” and track an airplane, then calculate its likely
trajectory and “talk” to another part of the cannon to fire the shells. The
engineering challenge of this project caused Wiener and some colleagues to
create a new branch of science, which Wiener called “cybernetics” – the science
of information feedback systems. The concepts of cybernetics, when combined
with the digital computers being created at that time, led Wiener to draw some
remarkably insightful ethical conclusions. He perceptively foresaw revolutionary
social and ethical consequences. In 1948, for example, in his book Cybernetics:
or control and communication in the animal and the machine

With the information gathered I say and also what I’ve read in the chapter
is that it is important for us information systems people to know about the
milestones and the history of computer ethics because with that we have the
foundation that we need to back up our knowledge about information ethics.
What I’ve learned:

I learned a lot in this chapter because this chapter can back up our
knowledge in the information systems ethics that we know it can back us up in
the information that we know about ethics in the information systems field, and
also it is important for us to know this because us information systems
practitioners we must know these for us to teach to other people the values of
ethics.

Integrative Questions:

6.) Give 1 milestone of information ethics.


7.) What is a Milestone
8.) When did information ethics started?
9.) Who started Information Ethics?
10.) What is MIT?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Moral Methodology and Information Technology

Library Reference: N/A

Amazon: N/A

Quote: “Ethics Without Principles”,

This quote is a very powerful one because it is surely possible because


people without ethics is bound to also without any principles because ethics is
some how connected with principles, we need these principles in life because
without this principles there lives will just be a waste because life is in need of a
principle because without principles people will just be like robots that just do
thing that there masters want them to do.

Learning Expectation:

My learning expectation in this chapter is for me to learn about the moral


methodology in the information technology track because for me it is important to
learn this things because I am an information systems student, also to learn the
principles as an information systems student for me to have the dignity and
integrity that I need to survive the real world.

Review:

In this chapter 1 thing that I’ve noticed is the word Generalism which
means the possibility of a moral though and judgement depend on the provision
of a suitable supply of moral principles, the meaning that I came up with is when I
researched the word on the internet but still it still focuses on the methodology in
information ethics.

Another thing that I noticed in the chapter is that the information that is
gathered in the chapter is that focuses mainly on information and computer
ethics and discusses about the methodology behind it and also discusses about
the cognitive content and truth of meta ethical work with different means those
are what are being emphasized in the chapter.

What I’ve learned:

I’ve learned a lot in this chapter especially the part in where the people
can adopt well in the information and computer ethics field because with that
people can simple look at the internet and research about the methodology of
information and computer ethics and also a new word that is now being added in
my dictionary of words is generalism. And the different cognitive content, and the
truth about the meta ethical work.

Integrative Questions:

1.) What is Generalism?


2.) What is cognitive content?
3.) What is the methodology of information and computer ethics?
4.) Can people adopt well in the information ethics?
5.) What are meta ethical works?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Value Sensitive Design and Information Systems

Library Reference: N/A

Amazon: N/A

Quote: “information ethics is needed everywhere”

Since I didn’t found any quotes in the chapter so I though of a new quote
that I can do.

So basically it is true because information ethics is need everywhere in


every parts of the world because technology now is now being so advanced that
people cannot even keep track on the things that they need to know about
technology because as we know that technology just keeps getting better and
better every time passes.

Learning Expectation:

My learning expectation in this chapter is the for me to learn about the


value sensitive and information systems, because I believe that it is important for
me as a information systems student to know the value sensitive design in the
information systems because I believe that I can use this as time passes by
when I go to the real world.

Review:

The topic mainly in this chapter is the Value Sensitive Design and
Information Systems. Which means about the technological values that people
thought about and created a design with the information system there are many
example in where the design of the people are created with the design of the
people who made the information system value Sensitive design.

Then also involved is the theoretical ground approach which involve the
church or any part of the religion groups because ethics also comes from the
religion in where people treat the design as the 10 commandments because they
also follow it as well as ethics.

What I’ve learned:

I learned a lot in this chapter especially in the value sensitive design and
the information system because, I can really put the learning’s that I got In
reading the chapter to good use because the chapter focuses on the ethics that
people do for a living.

Integrative Questions:

1.) What is Ethics?


2.) What is Value Sensitive Design?
3.) What is information system?
4.) What is theoretical grounds?
5.) What is information ethics?
Mark Justin B. Lumantao

BS-IS/ IT-ETHICS

Book review: Personality-Based, Rule-Utilitarian, and Lockean Justications of


Intellectual Property

Library Reference: N/A

Amazon: N/A

Quote: “Patents yield the strongest form of protection”

This line is a powerful line that grants the person using the patent the
copyright that they need to protect there product. And also it is applicable to real
life because people can use this to protect there properties, the book that they
made and the poems the videos the music that they made to clearly state that
they are the people that originally made the piece of art.

Learning Expectation:

I expect to learn a lot in this chapter because I want to know who is Adam
in this chapter and also I noticed that the book is becoming more and more
interesting with that people can really learn what is to become a programmer that
has the copyright law behind them. And also help me to know what is more better
for me in the future, because I can gain more knowledge in this chapter.

Review:

The chapter basically talks about personality-based, rule-utilitarian, and


lockean justications of intellectual property of a person. To start I will just give the
meaning of the words stated above so with the help of the internet my research
will just be more easy for me.

Personality-based, well personality based simply talks about and even just
looks at the personality of the person being looked at

Rule-ultilitarian, well it just talks about utilitarianism and it s functions.

Intellectual Property, these are properties that is being owned by someone


legally
So with this I am able to learn the value of ownership because ownership
has a big value in the real world because for us to know who really made the
piece of art and what kind of people who made it because it is important to know
the original maker for him to be the originally be praised by the people.

What I’ve learned.

I learn a lot in this chapter because people can now know the value of
ownership because people know has there eyes opened in this kind of matter
because people can just leave there works and other people just fork it, must
know the value of copyright.

Integrative Questions:

1.) What is intellectual Property?


2.) What is Rule-Utilitarian?
3.) What is Personality Based?
4.) What is Utilitarianism
5.) Who is Adam D. Moore
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Informational Privacy: Concepts, Theories, and Controversies

Library Reference: N/A

Amazon: N/A

Quote: “We demand recognition of our right to privacy, we complain when


privacy is invaded”

This Quote is very striking when I saw this while reading the handbook
because it is a very natural mentality among us people that when our privacy is
invaded we tend to complain because as a matter of fact that our privacy is
invaded that it is a very very big deal to us because every human being has the
right for there own privacy and this goes well also with companies that want to
protect there privacies, especially with very confidential components of there
company that they want to protect.

Learning Expectation:

My learning expectation in this chapter is that I would likely to learn about


the information Privacy concepts and the different theories and controversies that
people who wrote the book I particularly the chapters point of view with the title of
the chapter

Review:

The book clearly talks about the Information Privacy, because as I read in
the book and based on my own understanding that privacy is very important
among companies and especially people because every people in his right mind
has the right for there privacy to be protected because it is clearly stated in the
law the people has the right to have there own privacy.

But the chapter talks in a different approach because the book talks about
the privacy of companies, that want to protect the company image and anything
and many more things the companies wants to protect for themselves and don’t
want others to especially there competitors, to know about there products.

And also talked about the chapter are the different theories about the
privacy issue and the different controversies the set aside the privacy issue of the
chapter.
What I’ve learned:

I learned a lot in this chapter because I learned how to value my privacy


because every human being has the right for there privacy to be private and you
the person who owns the privacy has to only right to violate it.

Integrative Questions:

1.) What is Privacy?


2.) What are Theories?
3.) What are Controversies?
4.) How can you violate ones privacy?
5.) What is Information Privacy?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Online Anonymity

Library Reference: N/A

Amazon: N/A

Quote: What is the area, the content of privacy, what is outside that area.

This quote talks about privacy also because in this quote privacy is
emphasized because this quote talks about what privacy is all about because as
we know that privacy is very hidden based from the word itself privacy means
private and that means we don’t know the meaning of the in short it is top secret
confidential etc. so I thought that many people are thinking of new ways to talk
about privacy because privacy is a term the literally means private and people
who only know the meaning of that can be the only people can has the access to
the privacy issue

Learning Expectation:

My learning expectation in this chapter is to widen my learning in the


privacy issue because with that I can learn about more privacy and can keep my
things the information that I know private. And with that I can gain the trust of
people with the privacy issue that I can give them.

Review:

This chapter talks about online anonymity, spontaneous anonymity,


cyberspace and many more. With that it is a privacy issue because with the
information that has been given people can easily know what privacy to public
means because with the people in the right mind knows the difference of public
to private

And also anonymity, is like being anonymous to put in to short words that
to let people reading your e-mail that has been send to for them not to know who
you are, because you are anonymous

What I’ve Learned

I learned a lot in this chapter because this chapter talks about the different
kinds of anonymity in short it teaches us how to be anonymous in some point in
our lives because keeping your identity secret is very important because mainly
you must always make your identity as clean as possible.

Integrative Questions:

1.) What is Cyberspace?


2.) What is anonymous?
3.) What is Anonymity
4.) What is the chapter all about?
5.) What is Privacy?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Ethical Issues Involving Computer Security: Hacking, Hacktivism,


and Counterhacking

Library Reference: N/A

Amazon: N/A

Quote: Sometimes hacking is good.

Yes it is true that sometimes hacking is good because hacking can be a


great help sometimes when in comes of criminal issues are involved because
hacking personal information of criminals is a great help for police people like the
FBI and the CIA to know the backround of there criminals

But sometimes hacking is being put to wrong use like when people are
hacking personal information of other people like credit card and ATM numbers
then hacking personal information of other people to black mail the and also
hacking a companies database, because although hacking can be good but the
effect of hacking can be very bad because companies can be bankrupt because
of hacking and people can be accused of offenses that they didn’t even do.

Learning Expectation:

My learning expectation in this chapter is to learn about the good and bad
effects of hacking because as I read some parts of the chapter it just emphasizes
on the different effect of hacking because as we know that hacking has a good
and bad side because hacking have some negative effects on people and some
positive effects on some people because hacking can be good nor bad some
time in life.

Review:

This book clearly talks about hacking, and gives emphasis involving
Computer Security Hacking, hacktivism, and counter hacking this chapter talks
about the different forms of hacking because as we know that this chapter talks
about hacking.

And also talks about the ethics of people in terms of hacking because this
book talks about hacking and with the some people can loose there dignity and
there integrity because they are using hacking to do crimes and to use it just for
themselves
Because as said so in the book the ethics in hacking has a mentality for
people because hacking can be very easy to use it for work for the hacker to gain
recognition.

What I’ve Learned:

I learned in this chapter the values of hacking because if I become a


hacker I can loose my integrity but if I use my hacking ability for the good there I
cannot loose my integrity.

Integrative questions:

1.) What is Integrity?


2.) What is Hacking?
3.) What is counterhacking?
4.) What is computer security?
5.) What is a Hacker?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Information Ethics and the Library Profession

Library Reference: N/A

Amazon: N/A

Quote: “An information ethics should be able to address and solve the ethical
challenges arising in the infosphere”

The quote tells about what will happened if people in the industry don’t
have the knowledge in ethics, because without the ethic knowledge the people
cannot solve the challenges that goes with technology because as we know that
technology always, becomes more and more advanced each and every day
because, people every can acquire more and more new knowledge to other
people.

Learning Expectation:

I expect to learn a lot in this chapter, because the title speaks for itself the
foundation of information ethics, why is that I want to learn ethics in the
technology level because it is related to my course and as we know I can be a
programmer or an analyst one day, with this new knowledge in information ethics
I learn the what and what not to do in the information systems area.

Review:

This chapter emphasizes about the information society, mainly this


chapter talks about the foundation of ethics, as we know in every book the first
chapter always talks about the introduction to the topic being discussed about the
book.

To start of with the review what first is information ethics, well as my


research in wikipedia.org the meaning of information ethics is the field that
investigates the ethical issues arising from the development and application of
information technologies. It provides a critical framework for considering moral
issues concerning informational privacy, moral agency whether artificial agents
may be moral, new environmental issues especially how agents should one
behave in the infosphere, problems arising from the life-cycle creation, collection,
recording, distribution, processing, of information especially ownership and
copyright, digital divide. Information Ethics is related to the fields of computer
ethics and the philosophy of information.
That is the meaning of information ethics as found in the site so the book
mainly talks about the information ethics in what and what not to do in the
information systems field why is that for the people who needs there integrity and
dignity first of all the must have ethics because without the ethics that they need
they will just end up as people without dignity and integrity because they will just
be corrupt and will just do the things that the people what just for the sake of
money.
What I’ve learned

I’ve learned a lot in this chapter especially the information ethics the us
information systems people needs to life there career with dignity and integrity
especially in our daily lives.

Integrative questions:

1. What is Information System?


2. What is library Iibrary Profession
3. What is the site in where I got the information about information ethics
4. What will happened to people without ethics
5. What is Information Ethics?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Ethical Interest in Free and Open Source Software

Library Reference: N/A

Amazon: N/A

Quote: The best source of Information is Open Source.

Even though that I didn’t see any quotation in the chapter I decided to
create my own quote to satisfy the blank that needed to be filled.

So based on the chapter that the chapter discusses is about free or open
source software or information because as we know as programmers open
source software are the best in the market because open source software just
like eclipse and tomcat apache those kinds of open source software has a
community of people that gives continuous development on the system that is
the advantage of open source software than software that is not in open source
category.

Learning Expectation:

My learning expectation in this chapter is the for me to learn about the


value sensitive and information systems, because I believe that it is important for
me as a information systems student to know the value sensitive design in the
information systems because I believe that I can use this as time passes by
when I go to the real world.

Review:

This chapter talks about open source software, from what I’ve read about
open source software is that the community inside the open source category is
very friendly because in the people who blogs a lot and those people who are
also programmers can easily give out what they have recently learned about the
open source software that they have, in particular they can give information
about the bugs that they have encountered while using the software and they can
also give out the source code to people who needs the codes that they have and
use it for future projects

And with the community the different versions of open source systems can
be easily perfected because the programmers for example on ruby on rails the
team of programmers that create ruby on rails. Gets the help of other people that
people can give out there comments and suggestions to the people who are
using the ruby on rails engine to perfect the system.

What I’ve Learned.

I’ve learned a lot in this chapter because this chapter talks about the
different open source software in the market and how the open source
community are helping out one another in creating there system of choice to
make it the best open source software in the market.

Integrative Questions:

1.) What is open source


2.) What is OSS
3.) What is information ethics
4.) What is the purpose of open source software?
5.) Is the open source community friendly?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Internet Research Ethics: The Field and Its Critical Issues

Library Reference: N/A

Amazon: N/A

Quote: “Critical Issues must be stated in every chapter”

I made the quote by my self because I didn’t see any striking quotation in
the book because the chapter talks about the field and its critical issues, with the
internet research ethics, because in internet research ethics the chapter talks
about what ethic values will a person will do in order to do what is right while
browsing the internet.

Learning Expectation:

My learning expectation in this chapter is with the title itself I tend to learn
about the meaning of internet research ethics and the fields behind It and also
the critical issues the internet research ethics has

And also I want to learn about this topic because it can affect my growth
for me as a kid in the 21st century its been half of my life that I have been using
the internet for by schooling options especially for researches and project to be
done in school.

Review:

Well to start of with the review of the chapter, I would like to make an
emphasis on the title of the chapter which is internet research ethics because in
this chapter as I read about it in the book cyberethics.

The chapter talks about the ethical values behind the internet research
field the book talks about what and what not to do while researching in the
internet also it talks about the internets flaws as a system and can lead people
into hacking other peoples personal information.

But now because of the internet, people can easily access any given
information in the world wide web.
What I’ve learned:

I learned a lot in reading this chapter because I learned in what and what
not to do in browsing the internet and also I learned the consequences in hacking
other peoples personal information in the world wide web.

Then I also learned how to use the internet more properly in the future
with me as a frequent internet user I now know what and what not to do in the
internet when I am conducting my researches.

Integrative Questions:

1.) What is internet research ethics?


2.) What is the field?
3.) What are the critical issues?
4.) Who is Jeremy Benthan?
5.) What is the World Wide Web?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: : Health Information Technology: Challenges in Ethics, Science,


and Uncertainty

Library Reference: N/A

Amazon: N/A

Quote: “Health also is need in the cyberethics field”

I created this quote because I didn’t found any quotes inside the chapter
but instead I created this quote to match the title of the chapter because the
chapter talks about that health information technology is also need in
cyberethics.

In any given date we know the ethics is everywhere in every kind of


subjects there is always ethics, because as we know the ethics is the study of
what and what not to do or the difference between good and bad ethics, it gives
people the choice to choose what is good for them and also the choose to do
what is bad for them, ethics basically is like the 10 commandments because to
do or not to follow the commandments is a sin but to follow it, it can give you
grace same goes for ethics because in ethics if you follow it your dignity and
integrity stays but if not your dignity and integrity disappears from you.

Learning Expectation:

My learning expectation in this chapter is about the health issues in the


book cyber ethics because also a we know the health is an important factor in life
because without health there will be no people behind it so in the book it is
important include health issue in ethics because even though people are
following the right ethics but still there health is not there priority that will be a
problem for the people.

Review:

The chapter clearly talks about the health information Technology and
talks also about challenges in ethics, science, and uncertainty behind the health
ethics. Because of these kind of publicity why it is so hard to trust people
nowadays, people can view your profile in your account which can help them
know personal information but also why are you willing to put an information
which you do not want others to see it.
Now with the use of the social networks people can easily look at other
peoples profiles and see what is there status.

What I’ve learned:

I learned a lot in this chapter because nowadays people are being health
conscious because sickness can be easily obtained nowadays in any short in life.

I learned to value my health in the information ethics field and also the
value for the information that I give in the WWW.

Integrative Questions:

1.) What is Health information Technology


2.) What are its advantage?
3.) What are its disadvantage?
4.) What can it do for the society?
5.) Who is Kenneth Goodman?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Ethical Issues of Information and Business

Library Reference: N/A

Amazon: N/A

Quote: “Ethics is everywhere”

I just created this quote because in the chapter there is not striking
quotation that I can find because in the chapter it just talks about everything
usual everything about ethics.

Well to start of ethics has been a big factory in the real life because as we
know that ethics is everywhere as been said so in the quote because ethics has
been found to be needed everywhere to make people learn what and what not to
do in there field of interest weather it is in the business filed in the information
systems field or anywhere else.

Learning Expectation:

My learning expectation in the said chapter is for me to learn about the


different kinds of ethics that can be found in the business and information ethics
field. With this I can gain lot of useful information and more knowledge for me to
gain my knowledge in ethics because in ethics it just basically what and what not
to do in the field that you are in so if you have the knowledge of ethics in your
chosen field it will be easy for you to know the difference between the right and
wrong in the field that you are into.

Review:

So this chapter basically talks about the different reviews in the business
and information ethics, so it clearly states that the information inside the chapter
talks about business ethics

To elaborate about the business ethics in my reading in the chapter that I


saw that the chapter just talks about the different ethics behind the business field
it just teaches and gives people knowledge in what and what not to do in the
business field and also it give the advantage and disadvantage in the business
ethics.

Also the chapter talks about the 2 kinds of level with pertains to the macro
and micro level
What I’ve learned:

I learned a lot in this chapter especially in the business side of ethics


because as we know that the book just talks about the information systems of
ethics and majority of the lessons that can be learned in the chapter is about
information ethics.

It can be a big factor in my life to learn business ethics because I am also


dreaming to become a business man someday so with the information that I have
learned in reading this chapter say that I have the values of a good business
man.

Integrative Questions:

1.) What is Business Ethics?


2.) What are the values of Business ethics?
3.) What are the advantage of business ethics?
4.) What is information ethics
5.) What can be done with ethics?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Responsibilities for Information on the Internet

Library Reference: N/A

Amazon: N/A

Quote: Ethics can be used on the internet.

This quote that I found in some part of the chapter is that I learned that
ethics is a major part in using the internet because there are some
responsibilities that is need with using it.

Like in the religious beliefs that porno is bad it goes as well in ethics but in
ethics there are the good and bad ways of using it, for example hacking based
from the word that hacking is bad but in ethics hacking can used for the good and
obviously can be used with the bad, so that is why it is important to have ethics
when using the internet because ethics can be a major role in the internet
industry.

Learning Expectation:

My learning expectation in this chapter is for me to have more


responsibility in using the internet because my use of the internet is not that
responsible enough now with the use of this chapter I can now know what and
what not to do in the internet filed

It gives me the responsibility in using the internet because the internet is a


crucial part in life because almost every information can be seen in the internet
classified or not I can be easily been seen on the internet. But now with the

New knowledge that I have acquire in using the internet I can say that I
am now a responsible internet user.

Review:

This chapter focuses on the responsibility of people in using the internet


because now in the industry internet is now being well used because internet can
be very helpful in the industry because internet can be used to easily gain access
to everything like the information needed in researches and many more uses of
the internet.
Also it give moral responsibility to people who are reading it to gain more
responsibility in using the internet especially for there own purposes.

What I’ve learned:

I learned a lot in this chapter because it teaches us readers to become


more responsible in the using of the internet and also It gave me more ethical
values in the information systems field.

Integrative Questions:

1.) What is the internet?


2.) What is Responsibility?
3.) What is Information?
4.) What can be done in the internet?
5.) What is Hacking?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Virtual Reality and Computer Simulation

Library Reference: N/A

Amazon: N/A

Quote: What is the area, the content of privacy, what is outside that area.

This quote talks about privacy also because in this quote privacy is
emphasized because this quote talks about what privacy is all about because as
we know that privacy is very hidden based from the word itself privacy means
private and that means we don’t know the meaning of the in short it is top secret
confidential etc. so I thought that many people are thinking of new ways to talk
about privacy because privacy is a term the literally means private and people
who only know the meaning of that can be the only people can has the access to
the privacy issue

Learning Expectation:

My learning expectation in this chapter is to widen my learning in the


privacy issue because with that I can learn about more privacy and can keep my
things the information that I know private. And with that I can gain the trust of
people with the privacy issue that I can give them.

Review:

This chapter talks about online anonymity, spontaneous anonymity,


cyberspace and many more. With that it is a privacy issue because with the
information that has been given people can easily know what privacy to public
means because with the people in the right mind knows the difference of public
to private

And also anonymity, is like being anonymous to put in to short words that
to let people reading your e-mail that has been send to for them not to know who
you are, because you are anonymous

What I’ve Learned

I learned a lot in this chapter because this chapter talks about the different
kinds of anonymity in short it teaches us how to be anonymous in some point in
our lives because keeping your identity secret is very important because mainly
you must always make your identity as clean as possible.

Integrative Questions:

1. What is Simulation?
2. What is cyberspace?
3. What is Virtual?
4. What is Virtual Reality?
5. What is Computer Simulation?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Genetic Information: Epistemological and Ethical Issues

Library Reference: N/A

Amazon: N/A

Quote: “the concept of civil disobedience expressly calls for the use of “non-
violent” means.”

Well to put it in lay mans terms that the use of violent means cannot
answer anything, but instead it just make the situation far more worst than it was
before because in my own experience violent means just make the situation
more worst to put in the boys point of view and even worst in the girls point of
view.

But the use of non-violent means is far better than using the violent mean
because using it can save relationships of friends, love ones etc.

Learning Expectation:

My learning expectation in this chapter is to learn about the different


ethical issue involving genetic information, and epistemological, and also to know
the meaning of each terms used in the chapter because it is so new to my
dictionary, then also to widen my understanding in ethics and also to enhance my
knowledge in ethics because in ethics I tend to now what is right and what is
wrong in life.

Review:

To start of with the review first of all what is the meaning of


epistemological, well as I research over the internet the of epistemological is
theory of knowledge is the branch of philosophy concerned with the nature and
scope (limitations) of knowledge. It addresses the questions:

• What is knowledge?
• How is knowledge acquired?
• What do people know?
• How do we know what we know?
• Why do we know what we know?
Well that is the meaning that I found out in researching the meaning well back to
the review the chapter talks about now about knowledge not anymore about
information ethics because now with the knowledge that we have for information
ethics we can now say that it is not enough not just to learn about the information
ethics but it is more likely to be more practical to know the different ethics there
is.

What I’ve learned:

I’ve learned a lot in this chapter especially for me that I learned new words
that words that I don’t even know and words that I have already seen just now

I learned in this chapter the value of knowledge, and also the knowledge
to know everything that I get possibly pick up in my future life.

Integrative Questions:

1.) What is Epistemological?


2.) What is Genetic Information?
3.) What are the ethics Issues?
4.) What is civil disobedience?
5.) What is knowledge?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Ethics of Cyber Conflict

Library Reference: N/A

Amazon: N/A

Quote: What is the area, the content of privacy, what is outside that area.

This quote talks about privacy also because in this quote privacy is
emphasized because this quote talks about what privacy is all about because as
we know that privacy is very hidden based from the word itself privacy means
private and that means we don’t know the meaning of the in short it is top secret
confidential etc. so I thought that many people are thinking of new ways to talk
about privacy because privacy is a term the literally means private and people
who only know the meaning of that can be the only people can has the access to
the privacy issue

Learning Expectation:

My learning expectation in this chapter is to widen my learning in the


privacy issue because with that I can learn about more privacy and can keep my
things the information that I know private. And with that I can gain the trust of
people with the privacy issue that I can give them.

Review:

This chapter talks about online anonymity, spontaneous anonymity,


cyberspace and many more. With that it is a privacy issue because with the
information that has been given people can easily know what privacy to public
means because with the people in the right mind knows the difference of public
to private

And also anonymity, is like being anonymous to put in to short words that
to let people reading your e-mail that has been send to for them not to know who
you are, because you are anonymous

What I’ve Learned

I learned a lot in this chapter because this chapter talks about the different
kinds of anonymity in short it teaches us how to be anonymous in some point in
our lives because keeping your identity secret is very important because mainly
you must always make your identity as clean as possible.
Integrative Questions:

1. What is cyber ethics?


2. What is hack back?
3. What is strike back?
4. What is hacker defense??
5. What is a hacker?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: A Practical Mechanism for Ethical Risk Assessment—A SoDIS


Inspection

Library Reference: N/A

Amazon: N/A

Quote: ““Protect public health, safety, and welfare.”

This quote is very striking because in this quote it talks about public health
and safety and welfare of other people because it is a essential part in life in
where health becomes an issue.

When ethics becomes an issue It goes a long way because there are
different kinds of ethics like ethics in health issues and also ethics in the business
issues and also the ethics in the information systems issue so there are lots of
ethical issues being toggled in the first place.

Learning Expectation:

My learning expectation in this chapter is very simple is just that I believe


that I can learn in this chapter the knowledge that there is in the health ethics
because me as a guy health safety and welfare is my priority because health is
very important in life, with poor health people will just die and cannot live there
lives the way that they want to.

Review:

Well this book talks about the ethical risk assessment as we know that risk
assessment is very common nowadays because now in life there is always a
choice in weather you will take the risk or not.

And also stated on this chapter is that people must always be ready and
will to be secure to do all of this on hand, because with out safety and always just
taking the risk people can always end up in disasters and event that will not be
good to see.

And also this chapter talks about the health issues in ethics in pertains to
the ethical risk assessment because in risk assessment it teaches us readers
what and what not do in terms of risk management and can lead us to the good
life.
What I’ve learned:

1.) Good Ethical Values


2.) Safety precautions in risk managements
3.) Proper way of dealing with safety
4.) Broader knowledge in risk assessment

Integrative Questions:

1.) What is Ethical Risk Assessment?


2.) What is risk management?
3.) What is Safety?
4.) What is SoDIS
5.) What is SoDIS audit processing?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Regulation and Governance of the Internet

Library Reference: N/A

Amazon: N/A

Quote: “Vicarious liability is the imposition of liability on one person for the
actionable conduct of another”

This quote tells about the liability of person in doing one thing that has
been assigned to him because sometimes in life that people are being assessed
with there liability just based from the title of the chapter it keep good and
regulated and good governance over the internet

Learning Expectation:

My learning expectation in this chapter to learn more about the good


governance of the internet and the regulations behind it and also the things the
people need to know in using the internet as responsible as possible.

Review:

This chapter talks about the different regulations and governance of the
internet it give people the knowledge to become more of a responsible user of
the internet because as we know people are just using the internet just for the
sake of fun because internet is very entertain and for children it is okey but for us
adult it is something to be talked about.

Because as we know people now are using internet for evil deeds like
hacking and going to sites that not good to enter and creating viruses to hack
other computers there are lots and lots of things that people especially the
hackers can do with the internet.

But know in the society today, there has been laws and regulations that
people needs to follow in using the internet because the internet is a very
sophisticated type of engine that bad deeds can be done with the help of the
internet.

What I’ve learned:

I learned a lot in this chapter especially the different rules and regulations
behind the internet and also I learned how to become a responsible user of the
internet and also how us the internet in a good and responsible way because
internet I very much need in the society now plus I learned how to give good
governance in the using of internet because internet must be very well looked
upon because bad deeds can be created with the use of the internet.

Integrative Questions:

1.) What is the internet?


2.) What is a Main frame?
3.) What is Regulation?
4.) What is Governance?
5.) What is Content Regulation?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Information Overload

Library Reference: N/A

Amazon: N/A

Quote: Faster more better

This quote for me is very useless because as we know that a more faster
approach can lead to a disaster because careful thinking is needed in every step
of the way in life, without careful thinking what will happened to a project it will
just end up in a way that people will not appreciate the output because it was
done as fast as possible and also with that kind of mentality it is better to think
first than to act fast because acting fast can always lead to a big problem in the
future.

Learning Expectation:

My expectation in this chapter is

1.) To learn about information overload.


2.) More knowledge about ethics
3.) More knowledge about people in the same industry
4.) To gain information about real life scenarios in using ethics
5.) To become more responsible
6.) To become more aware in the society today.

Review:

So the definition of information over is stress induced by reception of more


information than is necessary to make a decision or that can be understood and
digested in the time available and by attempts to deal with it with outdated time
management practices, that is with the help of the internet because to clearly
help the review people must know about the meanings first for them to know
what they are reading about.

The chapter also talks about how to evade information overload because
with the use of the internet information is unlimited and also discussed in the
chapter about the ethical issues regarding information overload to think of it that
there are ethics behind information overload.

Give also information about real life scenarios of people dealing with the
information overload matrix.
What I’ve learned:

1.) I’ve learned about information overload


2.) Real life scenarios regarding info overload.
3.) The causes of information overload
4.) What to priorities in information overload

Integrative Questions:

1.) What is information Overload?


2.) What is information?
3.) What are the causes of information overload?
4.) What are the remedies of information overload?
5.) What is perception?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Email Spam

Library Reference: N/A

Amazon: N/A

Quote: “What gender issues are involved in computer ethics”

Well now this quote is very striking because in this quote it give out the
gender issues in email spamming because as we know that in spam mail there
are always gay people who sends spam mail to there crushes and people who
are anonymous

This quote also tells about the gender issues that have now been a topic
in this chapter because gender issues are now being discussed in the chapter
because ethics is also involved in the chapter.

Learning Expectation:

My learning expectation in this chapter to learn more about spam mails


and the ethics behind spam mails to know weather it is right or wrong to send out
spam mails.

And also to know the ethical issues behind genders in spam mails and
also the ethical issues behind it.

Review:

Well spam mail in my on mind is a set of mail that has been errors in the
sending for example you send an e-mail using yahoo mail or google, mail when it
failed the message will become useless and will be lost in the world wide web of
e-mail so that is the mentality in which people always see mails inside there
spam folders.

Then also talked about in the chapter is the real life scenario about e-mails
because the system obviously cannot handle that much e-mails in a day to
tendency there will always be errors in the e-mail so that is why sometimes e-
mails arrive late or sometimes doesn’t even go to the people whom you send you
e-mail.
What I’ve learned:

I’ve learned the importance of e-mail spamming and the ethical issues
behind it and also what people thinks about e-mail spamming

Integrative Questions:

1.) What is UCC


2.) What is spamming?
3.) What is Spam Mail?
4.) What are the ethical issues in e-mail spam?
5.) Is spam mail useless?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Matter of Plagiarism: What, Why and If

Library Reference: N/A

Amazon: N/A

Quote: Plagiarism is very bad.

Well as I can say that plagiarism is very bad because it is like violating he
copyright law for people who created there masterpiece in a long period of time
and there will be just one person who will just steal his/her works

Plagiarism can be defined also as stealing because it is like copying the


idea of a person without proper consent therefore people who have been
plagiarized can report directly to the law and demand the person who copied the
work without prior notice especially with enough evidence.

Learning Expectation:

My learning expectation in this chapter is to widen my knowledge in the


plagiarism field and to know the ethic values behind plagiarism likely to know
more about the demand issues in plagiarism and also the boundaries weather it
is in fair use or not.

Review:

This review is very essential to many people because in the real world
there are lot of people who plagiaries work every day so with this review I can
give people the knowledge that they need In order to avoid using plagiarism.

Plagiarism Is a crime as said so in the chapter and there are lots of


advantages and disadvantage in plagiarizing like the advantage is people can
know you from the work that you plagiarized because you where the first person
who published the book or the novel. Without the original author knowing it

Then another advantage is people can give you lots of money because
your work will be famous especially if the content is very good

Then the disadvantage of plagiarism is that plagiarism is punishable by


law, with the proper evidence being seen to the person who copied the work
he/she can be sentenced to prison with an ample time to think about it.
What I’ve learned:

I learned a lot in this chapter especially the ethics behind plagiarism and
also the advantages and disadvantage in plagiarism. I also gained new
knowledge in copy right infringement and also what and what not to do in
plagiarism.

Integrative Questions:

1.) What is Infringement?


2.) What is the copy right law?
3.) What is the ethics behind plagiarism?
4.) What is plagiarism?
5.) What are the advantages and disadvantes?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Intellectual Property: Legal and moral challenges of online file
sharing

Library Reference: N/A

Amazon: N/A

Quote: “file sharing can be good sometimes”

There are lots of disadvantages of file sharing sometimes because file


sharing sometimes can cause plagiarism because people whom you shared the
file with tend to be tempted in just copying the file because In the society today
people becomes more lazy when people are just being a helpful person to then
and just gives all the work to the other person.

But file sharing can be helpful to, like with open source communities, file
sharing is a essential part in the community because with that programmers can
help fellow programmer in fixing bugs in open source software and also in
handing out different ideas In the online community.

Learning Expectation:

My learning expectation in this chapter is to learn more about the legal


and moral challenges of online file sharing and also to know the ethics behind the
said topic, plus to know what and what not to do, with online file sharing and
have more and clearer knowledge in the advantage and disadvantage of online
file sharing.

Review:

This chapter basically talks about the legal and moral challenges of online
file sharing, this chapter elaborates about the advantages and the disadvantages
of online file sharing and what can happen to people who are not responsible
enough to share files without any talks anymore.

But with online file sharing people can easily gain access to any bit of
information on the internet market for example in the research area people can
easily research in things that they need for there projects and what are the
missing parts of there project also, what information they need to cope up with
the projects that they do in the future.
Another is online file sharing is an advantage especially in the online
community because people can easily gain access on the information about a
certain topic because topics are well organized and just a mouse click away.

What’ I’ve learned:

I learned a lot in this chapter especially in the legal and moral challenges
in the file sharing category, and also I learned about the advantages and
disadvantages of online file sharing.

Integrative Questions:

1.) What is Moral?


2.) What is Legal?
3.) What is File sharing?
4.) What are its advantages?
5.) What are its disadvantages?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Censorship and Access to Expression

Library Reference: N/A

Amazon: N/A

Quote: “Censorship is always necessary”

I created this quote because as we know that censorship is very


necessary nowadays because information can easily be leaked everywhere
especially in the internet days as of today.

Information can be brought to other people in many ways now weather it is


from e-mail or in yahoo messenger it is still necessary for people to value the
censorship of there information.

Learning Expectation:

My learning expectation in this chapter is to learn more about censorship


and also based from the title of the chapter to learn the ethical theories behind
censorship and the do’s and don’ts behind censorship.

Review:

In this chapter it basically talks about the censorship issue behind


information ethics because as we know the censorship is very important because
in ethics it is wrong to be to vulgar in ways that people will not be pleased with
you, so that is why the value of censorship is very well elaborated in the said
chapter.

So as we know about censorship is, there are like limitation criteria like in
the movies or in television it blocks the limitation of the movie and does not let
people see things that are not supposed to be shown on television because it is
against the law to show content that are not PG material more over to porno
movies.

Also the chapter talks about the value and importance of censorship today
especially to the minors that love to watch things or minors that are very curious.
What I’ve learned:

I’ve learned a lot in this chapter especially the value of censorship to the
masses, and in the internet world

I’ve learned that censorship is very important in ethics because censorship


can give value to people who value there prides.

Integrative Questions:

1.) What is Censorship?


2.) Who is cohen?
3.) What is expressions
4.) What is PG?
5.) Is censorship important to people?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Gender Agenda in Computer Ethics

Library Reference: N/A

Amazon: N/A

Quote: “feminist ethics”

Well this quote that I have just created speaks for itself because in this
chapter it talks about the gender agenda in computer ethics clearly talking about
women and there characteristics.

Basically as we know that women are caring by nature and that supports
them in the computer ethics field why is that because if a woman in her right
mind has the knowledge about ethics she will tend to value her ethics and
preserve them because as we know that women are caring by nature and it is
there role as women to value information that has been seen on the internet.

Learning Expectation:

My learning expectation in this chapter is to learn about the gender


agenda in computer ethics and also to identify the ethics behind it and also do
never ending do’s and don’ts in the ethics in this type of category.

Review:

Well the chapter starts over the history of women because as we know
well that women has lesser rights than us men because women are just being
looked like as mothers of people’s offspring and also women rights are lesser in
the old days.

And also this chapter talks about the capabilities of women back in the
days where there power is lesser and just there characteristic of being caring just
been the point of it all

But the chapter talks about everything about women changed because
now in the 21st century women are being some what equal to men because
women can now compete with men in the intellectual level because experts say
that women are more hardworking than men.

Then this chapter also talks about the poverty and many more things
related to the issue of gender issues in computer ethics.
What I’ve learned:

I learned a lot in this chapter especially in not to discriminate women and


the different do’s and don’ts with women, I learned to respect women because
my mother is a woman

And also I learned that woman are not just caring but nature but they are
smart as us guys and more hard working.

Integrative Questions:

1.) What is a Woman?


2.) What are woman rights?
3.) What is feminist ethics?
4.) What do you mean by gender agenda?
5.) What is cyberstalking?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Digital Divide: A Perspective for the Future

Library Reference: N/A

Amazon: N/A

Quote: “Morally good for affluent persons or nations to help impoverished


persons or nations”

Well this quote talks about the domino effect of people who are morally
good to people and with that it helps people in being more assertive that they will
follow the morally good person in terms of his/her doing because they will be
enlighten because of the graces that the morally good person is having rather
than the person who is not morally good.

Learning Expectation:

My Learning expectation in this chapter is to learn about the digital divide


and what are the ethics behind it and what it can do.

The also to learn about the perspective of the future because as we know
we as people have dreams for the future and with that we want to have a good
future for our future family and our future offspring if we were to have.

Review:

This chapter talks about the future and what will likely to happened in the
future if people will stop being responsible in the future and also ethics becomes
a big player in the future because with people who have proper ethics in life
those are the people whom will be successful in the near future because in little
way ethics can be keys for success.

This chapter also gives al thru out discussion about the ethics because as
we know that ethics comes into play many times in life because this chapter also
talks about the poverty issues of people and also the information systems gap in
world.

But still ethics can help people as clearly elaborated in the chapter
because ethics if people can do there ethics well people will likely to survive
because with ethics people will gain more friends and there jobs will still be
there’s because if people will not follow moral ethics people will just likely
become people with no future and just people with no place in the community
because there pride, soul, dignity, integrative will just be eaten by hell.
What I’ve learned:

I’ve learn a lot in this chapter especially about ethics because as I learned
ethics is very well needed in life because ethics is a key for success and people
should know that.

Integrative Questions:

1.) What is Ethics?


2.) What is Digital Divide?
3.) What is poverty?
4.) Who is Kenneth Einar Himma?
5.) What are perceived failures?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Intercultural Information Ethics

Library Reference: N/A

Amazon: N/A

Quote: “Moral claims lack truth-value and are merely expressive of human
emotions of approval or disapproval”

This quote talks about the moral claims of people and clearly make there
understanding much more broader, and also with the truth0value and the human
emotions, people still needs the approval or disapproval of other people.

Learning Expectation:

My learning expectation in this chapter is to learn more about intercultural


information ethics, what are the ethics behind it and what are the do’s and don’ts
behind intercultural information ethics, plus to know the ethical issues behind the
said chapter, also to know the real life scenarios of people that gives them an
example in the intercultural information ethics fields then to know the people who
created the book more often and to value the knowledge that I gathered
especially the information that I have gathered will reading the said chapter.

Review:

This chapter talks about more clearly about morality because as we know
that ethics really speaks about morality because ethics is need by the society
and more often than that the chapter talks about people in the intercultural level.

This chapter discusses about the different ethics theories and the different
ethics issues being covered in the chapter because as we know the it is an ethics
book so that is why people must know the different theories and different ethical
issues that has be covered in the said chapter.

Plus the different real life scenarios in the chapter is very touching
because with that people can gain the value of ethics more and more because
the examples of the book make the reader feel that they are within reach of the
example.

Then lastly it talks about the pros and the cons of intercultural ethics
based on the title the pros and cons will always be there and also the advantages
and disadvantages of intercultural ethics.
What I’ve learned:

I learned a lot in this chapter especially the value of ethics in the country
and especially in the information and computer ethics area.

I learned the different kind of ethics that people should know in order to be
a moral person and lastly ethics is everywhere.

Integrative Questions:

1.) What is information ethics?


2.) What is Intercultural?
3.) What is Intercultural information ethics?
4.) Who is Lorenzo magnani?
5.) Who is Rafael Capurro?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Market at the Bottom of the Pyramid

Library Reference: N/A

Amazon: N/A

Quote: “There is a big market at the bottom of the pyramid”

Well this quote tells us about the big market definitely at the bottom of the
pyramid because every business man who just started his/her business must
accept the fact that he/she will definitely start from the bottom but still the bottom
of the pyramid still has its big player of customers.

There is still a wide range of varieties of opportunities for businessmen


who just started there business, because the bottom of the pyramid has the
biggest share in the profit sharing.

Learning Expectation:

My learning expectation in this chapter is to learn about the knowledge


that there is in the bottom of the pyramid, and also how to market at the bottom
of the pyramid, I would like to learn a lot in this chapter because it could help me
in my growth as a benildean because I for once is dreaming to become a
successful businessman in the near future.

Review:

Well first of all the topics in this chapter in the fortune at the bottom of the
pyramid says about the people or the markets at the bottom of the pyramid and
talks about different business strategies in the bottom of the pyramid, and it helps
its reader to gain more knowledge in what to do in the business world.

And also this chapter offers a high variety of strategies to do in the bottom
of the pyramid market, but still gives the enjoyment of reading, plus the chapter
give the proper motivation for future businessmen or even businesswomen, and
gives them tips and tricks in the business world.

Plus this chapter gives readers advices on how will they sell there
products and services to other people give the reader the necessary knowledge
in how make business talks because as we know in every business people
should always start from the bottom,
Because the bottom as said so in the chapter is always the stepping stone
for success.

What I’ve learned:

I learned a lot in this chapter especially in the business area I learned new
knowledge on how people can sell and give out information on there products
and also I learned that the bottom of the pyramid can be the best stepping stone
for a business success.

Integrative Questions:

1.) What is a business?


2.) What is the bottom of the pyramid?
3.) What are business strategies?
4.) What is the economic pyramid?
5.) What is the value for money?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Products and Services of the Bottom of the Pyramid

Library Reference: N/A

Amazon: N/A

Quote: “Sell Sell Sell”

Well this quote that I just created because I didn’t see any striking
quotations in the said chapter so I created my own quote, so well this quote is
saying sell sell sell because in the minds of a profit based businessman sales the
priority because it is a mentality that why will you open up a business because
you don’t want profit that is just a waste of time.

But now businessmen just think about profit because profit is very much
needed in the business world because without profit and revenue the business
will not be a success.

Learning Expectation:

My learning expectation in this chapter is to learn different business


strategies in selling or in analyzing the situation of the products and services.

Then also in creating new innovations to sell to people in order to gain


profits and revenues and more broader knowledge in business statistics and
business analysis

Review:

Well this chapter talks about the practically of a product and services
because it is telling us reader that if you want to start a new business there
should be practicality like the products and services that is being offered must be
very useful to people.

Because if the products and services is not useful to people chances are
the business will not be a success and with that money will just be wasted and
you will be haunted with the horror of the business being forfeited.

Another thing being talked about in the chapter the issue between
products and services in where which is more successful to sell products or to
sell services but in my own opinion services is the much more successful
business because in service there will be lesser work than in products because
of the inventory delivery rather than in the service field all you new is people just
like in the BPO kind of business.

What I’ve learned:

I learned a lot in this chapter especially in the products and services field
and also I learned that people must be practical in setting up his/her own new
business.

Integrative Questions:

1.) What are products?


2.) What are services?
3.) What are the difference between products and services?
4.) What is deskilling of work?
5.) What is innovation hybrids?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Bottom of the pyramid Global Opportunity.

Library Reference: N/A

Amazon: N/A

Quote: “Globalization is a factor”

Well in this quote as we know globalization is a key factor in the business


industry because in globalization it means the whole world is your market I mean
the meaning of making your products become an international brand, because
sometime in life business men tend to venture in there surroundings like, opening
business in terrains that have not been explored.

In short people who are risk takers because sometime in life people
should take that risk rather than being stuck to one place to another because risk
sometimes becomes money like if you take the risk in opening a new business in
terrains that have not been ventured and turn out okey then that is a good risk
but if not, try again just never give up

Learning Expectation:

My learning expectation in this chapter is learn about global opportunity to


learn new skills in my business mind and also to know the bottom of the pyramid
more well.

Then to gain new knowledge about the global market for me to know what
and what not to do in the global market.

Review:

Well the main topic of this book really is to hand out knowledge in making
money, in ways that people don’t even think that it is possible now in this chapter
the author is saying that people must try going to new ventures in there business
because to try out new ventures means that there is more risk involved, likely to
happened in every business.

Risk is always a factor in every business so that is why the first two parts
of the book talks about being practical in selling products and services because
that is a stepping stone in a businessman success, a businessman must first be
practical in the product line or the service that he/she offers because if the
products is useless then better go for bankrupts and say that it is a bad way to
waste precious investments.
What I’ve learned:

I learned the value or products


I learned the value or services
I learned to be practical
I learned to be careful in my investments

Integrative Question:

1.) What is opportunity?


2.) What is global opportunity?
3.) What is capital intensity?
4.) What is sustainable development?
5.) What is innovations?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: The Ecosystem for Wealth Creation

Library Reference: N/A

Amazon: N/A

Quote: “Develop Develop Develop”

Well developing is an important part in a business because it is where


customer satisfaction comes into place because with developing people will love
your products and as well as people will recognize your business as a business
that give the satisfaction for customers.

Then another issue in developing is developing your system because wil


developing a business system, the business will be able to run in a more an
systematic way and the procedures will be mo smooth transactions will be more
audited more well and inventory will be easily monitored.

Learning Expectation:

My learning expectation in this chapter is to learn about wealth creation


and also to learn more the ecosystem plus to learn more about the bottom of the
pyramid, then also to learn about the international marketing of people mainly to
become more successful.

Review:

Well this chapter is all about the ecosystem and how to look at the
ecosystem for wealth creation, and also this chapter talks about how the market
can be caught if the ecosystem of the community will be taken by the
businessman.

And also this chapter talks about the different companies that people set
upped to handle the ecosystem different companies has been made to satisfy the
people of the ecosystem like companies that makes, pig, beef, companies that
produces foods and vegetables and many more.

Then lastly the chapter talks about the pricing of people to satisfy the
peoples budget because as we know people are not all that rich to be able to
afford anything that they want, so that is why it is the job of the company to
satisfy the products and services to people that they are or people will be able to
afford them, because pricing is a critical factor in the business world because if
the pricing is to high tendency is people will not be able to buy there products
and services all the time but if it is low people will be able to buy there products
and service s all of the time.

What I’ve learned:

1.) Proper pricing


2.) Wealth creation
3.) The ecosystem
4.) Different companies.

Integrative Questions:

1.) What is proper pricing


2.) What is wealth creation
3.) What is the ecosystem
4.) What is bank capital
5.) What are investments?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Reducing Corruption: Governance Capacity

Library Reference: N/A

Amazon: N/A

Quote: “Corruption should be lessen”

This quote talks about the corruption that in every business and in every
government always have, as we know that corruption cannot be avoided
corruption is always there even though people or government officials fire or
kicks out the corrupted employee or the official that is corruption other people will
most likely to take there place.

A lesson in this corrupt people will never go away but corruption can
always be lessen because if people have the heart to lessen corruption and just
take small amounts of there kick backs, the company or the government will have
no problems in promoting projects and human resources will be utilitized.

Learning Expectation:

My learning expectation in this chapter is to learn about corruption


governance because in as always stated in my mind is corruption will never go
away but corruption may still be lessen in some point in time because people will
never be able to control themselves if big money is at there finger tips.

Plus I hope to learn in this chapter the tricks that corrupt people do to get
there kick backs for in the future I know what they are doing.

Review:

To start of with the review I search the internet for the meaning of
corruption and also with the help of wikepedia.org Corruption is essentially
termed as an "impairment of integrity, virtue or moral principle; depravity, decay,
and/or an inducement to wrong by improper or unlawful means, a departure from
the original or from what is pure or correct, and/or an agency or influence that
corrupts, so that is the meaning that I found out in the internet.

Then second I learned that there is technical side of corruption, will my


research also told me that the corruption in the technical side is when a system
does not work the way it is supposed to be.
And also this chapter also resembles the ethics that is need for people for
not be that much of a corrupt person.

What I’ve learned:

1.) Corruption
2.) TGC
3.) Technical side of corruption
4.) Tips and tricks
5.) Corruption governance.

Integrative Questions:

1.) What is corruption?


2.) What is corruption governance?
3.) What is TCG?
4.) What is eseva?
5.) What is governance?
Mark Justin B. Lumantao
BS-IS/ IT-ETHICS

Book review: Development as Social Transformation

Library Reference: N/A

Amazon: N/A

Quote: “knowledge is power”

In this quote is just created it because I can’t see any relevant quotes in
the chapter.

As we know knowledge is definitely gives us power because with


knowledge people can easily think of ways or different ways to do things or sets
up business that are successful.

And also because knowledge is essential in life because without


knowledge you are nothing in life you have no purpose so that is why people
treat education as everything because it is mainly for there own good.

Learning Expectation:

My learning expectation in this chapter is to learn about the social


transformation and what it really is also to clear my definition of development
because as I said in the different chapters development is an essential factor in
life of the business because it make the business much more easier to handle.

Review:

This chapter talks about on how to become a better business because


business can definitely give investors, business men lots of money if the
business is handled well by the owners.

And still business can be successful if the pricing is right and the products
and services is affordable to people in all people classes especially in the C
below level.

Another is this chapter talks about on how to develop business skill to


suite the peoples satisfaction and also to transform there society for the business
to be recognized by the people who uses the products and services.

Lastly in this chapter it talks about everything from chapter 1 of the bottom
of the pyramid bits and pieces in the chapters are merged in the chapter to give
more and broader meanings to the reader.
What I’ve learned:

1.) to develop a business


2.) proper pricing
3.) social transformation

Integrative Questions:

1.) What is social?


2.) What is social transformation?
3.) What is pricing?
4.) What is a business?
5.) What is development?

You might also like