IT ETHIC READER

Chapter: The Practitioner from Within: Revisiting The Virtues

Chapter: The Practitioner from Within: Revisiting The Virtues
Library Reference: Not Applicable

Amazon:

Quote: ethical responsibility begins by taking the ethical points of view, we must respect others and their core values if we can avoid policies that result in significant harm to others that would be a good beginning toward responsible ethical behaviour. Awareness to others is the key to this role putting aside your selfish desire and putting your feet in other shoes is very important to the moral ethics

What I expect to learn: to gain knowledge about The Practitioner from Within: Revisiting the Virtues, Learn and understand The Practitioner from Within: Revisiting the Virtues

Review:
Western society is confronted with moral and ethical problems on a daily basis tabloids, soap operas and scandals screams about breaches of ethical, lying ,immoral behaviour etc. that bounce seriousness’ of the front page information technology, we are faced with a myriad if ethical problems generated by computer mediated action, invasions of privacy using the internet for pornography, and illegal to information and system have become as news worthy as the sex scandals and more far-reaching the response these issues at least in the united states has been to try to pass laws to stop the abuse, as we have seen these attempts at regulation are seriously disputed by those who values the freedom associated with the global information infrastructure and are hacked around by those with technological expertise. The reality of computers technology is that sooner or later we will all become practitioners from within on many different levels , we therefore need infrastructure of information and communication technology, use should through moral agency does not negate serious attention to action nor concern for objects in the information infrastructure rather it adds one more dimension to a complex field and approaches computers ethics as the integrative, global field that it is.

What I’ve learned:
Ethics
Morality
Character forming vs. Action guiding theories
Need for contemporary moral theory
Revisiting the virtues
Core vales
Practitioner from within
Imagination and narrative genre

Integrative Questions:
1. Enumerate the core values and explain each.
2. What do you mean by revisiting the virtues?
3. What virtues are mentioned?
4. What are their similarities?
5. What do you learn from this chapter?

Chapter: Ethical Issues in Business Computing

Chapter: Ethical Issues in Business Computing
Library Reference: Not Applicable

Amazon:

Quote: all companies of what ever size should be consider their use of computer system. We should be adopting the words new technologies. The world of offers machine and gadgets to help us to run more efficiently our business it’s up to us to accept it.

What I expect to learn: to gain knowledge about Ethical Issues in Business Computing, Learn and understand Ethical Issues in Business Computing

Review:
I’ve heard computers and computers software develop very rapidly indeed. What is science fiction today could be predictable tomorrow and my be common practice the day after, managers responsible for computer system need to be aware not only of the current situation, but of future potentials. First is the nature of data. This means what the data is and what it can give to me as a person. Second is category. This means the data is in what category. The questions that will be raised here is “Can I access this kind of data?” The main role of computers in business is to solve the problems of the business. I agree to it since we should use its functionality in order to achieve our goal.

What I’ve learned:
Scope of business computing
Business computing itself
Size issues
Level one
Level Two
Level Three
Level four
The tasks of business computing
Data considerations
Awareness by stakeholders and users

Integrative Questions:
1. What is business computing?
2. What is the purpose of a business computing system?
3. What are the penalties for computer misuse?
4) Give examples in level two business.
5) Give examples in level three business.

Chapter: Subsumption Ethics

Chapter: Subsumption Ethics
Library Reference: Not Applicable

Amazon:

Quote: American common law subsumes juridical decisions, and a half dryer subsumes an electric motor. Subsumption in computers is different because there is so much more subsumption going on than in simple machines.

What I expect to learn: to gain knowledge about No, PAPA: Why Incomplete Codes of Ethics are worse than none at All, Learn and understand No, PAPA: Why Incomplete Codes of Ethics are worse than none at All

Review:
This part of the chapter talks about Subsumption Ethics. This chapter talks about subsumption ethics. Subsumption ethics means the process in which the decision will be operated by a machine that would make a decision as to run or to stop it. The difference of computers and human is that we can make decisions. Computers would only do what the users wants him to do. We, humans can choose what is best for us. This chapter suggest that because we are human, we should do the right action and not the wrong action. The issue is more of a man vs machine like the terminator.

What I learned:
Subsumption ethics
Systems Development
Organizational policy drives IT development
Axious of Subsumption ethics
Four axioms
Ethical Framework
Philosophical frameworks applied to subsumption ethics
Unnecessary complexity to common C programmers
Popclient becomes fetchmail
Fetchmail grows up
Few more lessons from fetchmail
Necessary preconditions for the bazaar style
The social context of open-source software
On management and the maginot line

Integrative Questions:
1. What is subsumption ethics?
2. What is systems development?
3. What are the axioms of subsumption ethics?
4. Can you give examples of subsumption ethics?
5. How does subsumption ethics works?

Chapter: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All

Chapter: No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All
Library Reference: Not Applicable

Amazon:

Quote: any moral code whether in computing or else where can be turned to by someone feeling pressure to find a relatively easy way out of a morally thickly situation, thus they any moral code could be looked at in the hope that it will provide an excuse for potential immoral acts. It is profitable or we can say good to have moral ethics, or ethical codes `but there are disadvantages of this. For example giving a code of ethics that is not complete gives some people groups of organization chance to do the things that is not written in the code of ethics without violating any form of moral act. There are playing with the law, just like some of out attorneys here in the Philippines they are finagling out what is not written in the law and taking that against their and advantages to themselves.

What I expect to learn: to gain knowledge about No, PAPA: Why Incomplete Codes of Ethics are worse than none at All, Learn and understand No, PAPA: Why Incomplete Codes of Ethics are worse than none at All

Review:
I think all the computer companies and all of these who have a connection in the computer word, should be unite there selves to form a complete code of ethics by this collaboration, they are strengthening the code and putting enough power to it . If this will be possible this code of ethics will have its weapon to punish violators and the future of the computer realm orders to every aspect.

What I’ve learned:
I’ve discover that we do not have a complete code of ethics in the computer industry some of the untackle issues are the possible danger to life a weapon system and whether it might be increased or reduced by a new system being developed

Definition of PAPA
Weapons or the question of whether the technology for use in weapons systems ought to be developed
Environmental impact of these systems
Teleworking
Telecommuting
Protecting the weak against the strong
Importance of the PAPA issues
The pressures to look for loopholes on codes
Incomplete moral codes
Complete moral codes
Avoiding accidental incomplete moral codes

Integrative Questions:

1. What do you mean by PAPA?
2. Define teleworking.
3. Define telecommuting.
4. What are the strong and weak points?
5. Why it is that incomplete code of ethics are worse than none at all?

Chapter: Software Engineering Code of Ethics: Approved!

Chapter: Software Engineering Code of Ethics: Approved!
Library Reference: Not Applicable

Amazon:

Quote:

What I expect to learn: to gain knowledge about Software Engineering Code of Ethics: Approved! Learn and understand Software Engineering Code of Ethics: Approved!

Review:
This part of the chapter talks about Software Engineering Code of Ethics: Approved! The rules and essential guidelines. For the appropriate use of lousiness computers are awareness by senior management of the actual. And potential uses of company computer system is just as important as knowledge of any others activity. The purpose of a business computer system (and/or application) should be made specific before it is installed. There should never be unofficial changes in this use. Should changes be later considered essential discussion and formal agreement are necessary and approval should not be considered automatic? All use of company computer system should be within these specified rules and guidelines. It is important that development of company rules is not merely a pape exercise staff should be trained in both policy and implementation.

What I’ve learned:
I’ve learned computers and computer software develop very rapidly indeed. What is science fiction today could be practicable tomorrow and maybe common practice the day after, managers responsible for computers systems need to e aware not only of the current situation. Of the potential future.

IEEE-CS/ACM Joint task force on software engineering ethics
professional practices
The short version of the software engineering ethics
Public
Client
Employer
Product
Judgment
Management
Profession
Colleagues
self
The full version
The applied principles

Integrative Questions:
1. What does IEEE-CS stands for?
2. What does ACM stands for?
3) What is Robert McChesney view?
4) Give some code of ethics.
5) What are the different phases of ethical considerations?

Chapter: Ethical Considerations for the Information Professions

Chapter: Ethical Considerations for the Information Professions
Library Reference: Not Applicable

Amazon:

Quote: Ethics will continue to be put through new tests as technologies race ahead of many social and cultural conventions and norms.

What I expect to learn: to gain knowledge about Ethical Considerations for the Information Professions, learn and understand Ethical Considerations for the Information Professions

Review:
This chapter talks about ethical considerations for the professional people. I believed that this chapter is very significant because this talks about the reason why there is a need to have code of ethics. In class, I learned that there are many code of ethics. This is maybe the main reason why it is important. Many businesses nowadays have seen the importance of having code of ethics and they really implement code of ethics in their business. What is code of ethics? Code of ethics is to give us a guide to be professional and especially to act as professional. There is a need for this in order to remind the professional people to act as professional. There is a big difference to act as a professional and a professional because sometimes there are professional people, but the important thing for them is money or to earn money.

What I’ve learned:
Philosophical foundations
Major issues
Flagrant quantitative imbalance
Inequality in information resources
De facto hegemony
Lack of information in developing countries
Survival of the colonial era
Code of ethics
Issue definition and evaluation
Action/Inaction Evaluation and implementation

Integrative Questions:

1. What are the ethical considerations for the information profession?
2. Explain the flagrant quantitative imbalance.
3. What is Robert McChesney view?
4. Give some code of ethics.
5. What are the different phases of ethical considerations?

Chapter: Written on the Body: Biometrics and Identity

Chapter: Written on the Body: Biometrics and Identity
Library Reference: Not Applicable

Amazon:

Quote: So we are stuck with a riddle” How can a biometric identifier be both identifying and not saying anything particular about you? I think the key to this riddle may be found in the idea that meaning is not something intrinsic, but, following determined by use. Following this kind of reasoning, we should perhaps not expect to be able to determine any intrinsic meaning of biometric data, or the biometric body in general, but investigate quite specifically what uses and practices biometrics will become part of.

What I expect to learn: to gain knowledge about Written on the Body: Biometrics and Identity learn and understand Written on the Body: Biometrics and Identity.

Review:
Biometrics is often described as the next big thing in information technology since the revolution in IT with all its new forms of communication has change so many aspects of social and economic life in western countries the new level of complexity call forth a need for new ways of maintaining order and providing security. major buyers of biometrics technology can be found in the private sectors particularly among corporation with high security interest and a limited access areas alike banks and nuclear power plants but important impetus comes from government and government related department and services. Catering to client populations of thousands of termillitars of people.

What I’ve learned:
I learned that there are some question in what sense “ identity” is at stakes in biometric identification techniques. There are some indications that these techniques actively involve every narrow concepts of identity which may not be very significant from a social theoretical or philosophical perspective.

Use of biometrics
ATMs
Identifying biometric identity
Virtual identities
Questioning the biometric body

Integrative Questions:
1. What is a biometric?
2. How can a biometric identify our identity?
3. What is the reason behind double decryption?
4. Compare emails before and now.
5. What is the process of double decryption?

Chapter: The Meaning of Anonymity in an Information Age

Chapter: The Meaning of Anonymity in an Information Age
Library Reference: Not Applicable

Amazon:

Quote: the natural meaning of anonymity as many be reflected in ordinary usage or a dictionary definition is of remaining nameless that is to say conducting oneself without revealing one’s name. We easily may be able to identify him without throwing his name although in the past most dared and effective way of getting at a person was through his offer name.

What I expect to learn: to gain knowledge about The Meaning of Anonymity in an Information Age, learn and understand The Meaning of Anonymity in an Information Age.

Review:
In the computerized world with the system of information that we currently have in place namelessness by itself is no larger sufficient for protecting what is at stake in anonymity. If it is true as I have suggested that one can gain access to a person through bits or constellation of bits of information then protecting anonymity today amounts to more than merely withholding a name it meant withholding the information of constellation of information it now takes target at or get to a person. Anonymity is define as hiding one true identity.

What I’ve learned:
We must think not only of how a person can prevent his/her name from being developed. But how a person can prevent all the crucial bits of information from being divulged. Especially the bits of information that when divulged would enables access to him or her.

Brief definition of anonymity
Data-flow
Information registration
Gatekeepers
Analysis after admission
Methods
Anonymity of sender
First encryption with a public and secure key
Double encryption twice applied
Encryption procedure with an anonymity sender

Integrative Questions:
1. What is Data-flow?
2. Who are the gatekeepers?
3. What is anonymity?
4. Is it really necessary to analyze after admission?
5. Explain the encryption procedure with an anonymity sender.

Chapter: Web Security and Privacy: An American Perspective

Chapter: Web Security and Privacy: An American Perspective
Library Reference: Not Applicable

Amazon:

Quote: the right of the people to be secure in their persons, houses papers and effect and effect against unreasonable searches and seizures shall not be violated and so warrants shall issue, but upon probable supported by death or affirmation particularly describing the place to be searched and the persons or things to be sized.

What I expect to learn: to gain knowledge about Web Security and Privacy: An American Perspective, learn and understand Web Security and Privacy: An American Perspective.

Review:
The privacy implications are that people on their surveillance are not likely to express views an go to assemblies or religious meeting with which the agencies of surveillance are likely to disagree, the freedom to read is the freedom to read without fear of surveillance the court has ruled that the right to privacy covers memberships and personal associations confirming the rights of member to pursue their lawful private interest privately and to associate freely with others.

What I’ve learned:
There are pracy promises of information technology. Many of the conflits between data availability and privacy can be resolved.

Access Control List
Definition of security
Definition of integrity
Availability
Private key encryption
A replay attack
Simple replay attacks fall with public key cryptography
Browsing information
Provided technical services
Browser client connects
Definition of the following:
ISP
IP
DNS
Web proxy
Legal Issues and Societal Implications
Web activities

Integrative Questions:

1. What does ISP mean?
2. What does IP mean?
3. What does DNS mean?
4. What is Web Proxy?
5. What is the Web Activities Mentioned?

« Older entries