Wednesday, December 14, 2005

MoDuLe 10

THE UNTOLD LEGEND

Once upon a time, in a faraway kingdom there lived a wise and good King. The kingdom that he ruled was peaceful and in progress and so happiness and contentment reigned in the kingdom. Everybody was of course happy because they have plenty of food and there was order everywhere.

One day, a powerful barbarian arrived in the kingdom. His name was Pornography and he was famous because of the great controversies that involved him. According to legends, this man can bring chaos with him and the places where he goes gets destroyed. The subjects were very much terrified and so they immediately went to the wise and good king.

The king, seeing his loyal people, immediately consulted the wise men of the kingdom. Four wise men came from the East, they belong to the Order of the Preliminary.Another three came from the West, and they head of the Council of Finalists. And so a great debate was assembled and everyone was invited to see the historic assembly.

The assembly was started and the king was the first to speak, “We all know that a great turmoil has arrived to this peaceful kingdom. And so I summoned these wise men to seek council about this Pornography. I would like to ask if I will allow his entry upon my kingdom.”

A young but calm-looking wizard immediately answered, “I am Relativism and I speak for the Order of the Preliminary. Your highness, in dealing with Pornography we have to consider many things. You see, he has not only visited our kingdom but also other kingdoms as well. He has already a large army all over the land of Internet under his command. So the question on jurisdiction must be answered. Shall we arrest his armies outside of our kingdom? Also there are many kingdoms especially in the western countries that do not even care what Pornography does. There are also kingdoms in which pornography very much defies their culture and a very good example of which is the kingdom of Philippines. Another thing is that it can’t be denied that in some parts of the globe there are people who don’t even know what Pornography does. Perhaps because of the illiteracy or perhaps they just didn’t see what chaos Pornography brought to the Land of the Internet. So my king, I believe we just have to let Pornography into our kingdom so that less blood shall be shed. We simply cannot stop him.“

The people nodded in approval but suddenly the wizard beside Relativism stood up to silence them. He spoke in an almost authoritative voice and said to the king.

“Highness, I am Absolutism and I advice you not to heed Relativism’s view because it is not right. The place where Pornography attacked does not matter anymore because his spells very much destroy the minds of the young. Pornography drives peoples’ minds crazy and some end up raping and attacking women. Whatever the culture, wherever the location, I think, does not change the possible dangers that Pornography brings. We cannot always check who encounters Pornography and who gets in his attacks. Although people will say that it really depends on how the person will interpret what he sees, preventing him from seeing Pornography can on the other hand eliminate all the possibilities that he will be used in bad acts. So I think prevention is still the best cure, that is why Pornography must be banned in the Internet especially in our kingdom. Many people have the potential be victims now because he is everywhere in the Land of Internet.” Before he could finish Egoism spoke to them.

“My king, what they are speaking are just the ill powers of Pornography. I am Egoism and speak for the people who want to join Pornography. There are also certain good things that Pornography brings. Take for example, criminals who can’t have a wife of their own. They can simply go to Pornography and can see naked women and other things, which could satisfy their hunger for flesh. So in this way, we are instead preventing rape and similar crimes because these criminals can now have an outlet for their lust. My king, we also have to consider these things.”

“I am Altruistic your highness and I am very much against what my twin Egoism here said. Egoism, you are only looking for individual satisfaction and not for the welfare of the many. My king, although this does not necessarily apply to everyone, it can’t be denied that there are some people who can’t control their lust. Seeing pictures of naked people stirs up their imagination and they end up raping poor victims contrary to what Egoism said. This is a bad side of Pornography and this would make Pornography evil. If people continue supporting pornography, this would make Pornography more powerful. This is not good especially when we know that there are minors who are victims. Because of the difficulty in looking for money, for example in the kingdom of Philippines, there are many people that resort to Pornography just to earn a living. They invest their body and their dignity just to earn little amount of money. “

After hearing the Order of the Preliminaries, the king spoke, “Although each of the wizards from the Preliminaries have a point I still am not satisfied, so lets hear from the Council of the Finalists.”

Utilitarianism was the first to speak up of the three. He spoke as if in a trance state, “Those actions that bring happiness are considered morally right while those actions that inhibit happiness are considered morally wrong. If people feel they are happy in joining Pornography then I think that is right for them. We cannot also forbid them to see Pornography because in that case we might possibly inhibit their happiness. So my king, the people can perhaps ask themselves what they really make them happy. We cannot simply force them.“

The wizard with blue cloak spoke next, “My king, I am called Categorical Imperatives and I think it’s not what happiness that is more important. What is important my king is the Shield of Will of the person who chooses to do the act. If the people uses the Shield of Will no matter what Pornography does to them, whatever spells he may cast on them, Pornography cannot control them. No matter how much we allow Pornography in our kingdom, if people have the Shield of Will, Pornography has no power against us. Even if we know that we are not necessarily happy in what we are doing, as long as it is our will then it is what is right.”

The king was still has not decided, and the people were getting reluctant. After a moment of silence, the last of the wise men finally spoke up.

“I am simply called as Nicomachean. Pornography has no match against the weapon to which each of us has been endowed with. We don’t know this but if we only look into our hearts then we can know what is right or what is wrong. Each of us was born with this and I think that is what protects us from Pornography’s power. The greatest weapon that I am telling you is our rationality. The other wise men said that if we are happy then that is more important, another said that it is the Shield of Will that will protect us. Others said that we should allow Pornography to dwell in this kingdom because we can’t simply defeat him. Or we shouldn’t allow him to prevent him from inflicting us with his powers. My people whatever their reasons are, I would like to emphasize that we have the power to choose. And that is what differentiates us from the minions of Pornography. We have to simply choose and it is the only power that we can hold on to.”

Hearing what the last wizard said, the good king and the people of the kingdom felt enlightened. For the first time in their lives they were not afraid and they never felt any fear. So they faced Pornography with awesome courage and zeal. And so peace once again reigned in the land and they lived happily ever after.

Wednesday, December 07, 2005

MoDuLe 9

I would chose the issue on digital divide as the most prevalent issue on the internet. We cannot deny that because of poverty there are people who haven’t even seen a computer in their entire life. There are people that do not have access because access on the internet means additional cost especially to ordinary citizens. The government doesn’t have major programs that aim to teach people about computers.

To compensate for the number of people who don’t have access to computers, there must be quality in terns of people who are studying in the field of computing. As a student, I must study hard, so that when I graduate I can compete with the quality of I.T graduates in other countries. Also students can conduct extension works and conduct computer literacy in depressed areas, so that peole who can’t afford to have access can now have opputunity to learn even just the basics of computer use.

THE GOVERNMENTAL RESPONSE

The term “digital divide” first emerged in the United States in 1993. The theme was important to citizen pressure groups who argument that government should force the new Internet companies to pay the additional costs of extending their products and services to the poor. But the Clinton Administration proved cool to this view. The framers of the 1996 US Telecommunications Act, after noting the existence of the digital divide, disappointed social activists by insisting it wasn’t government’s role to redress it. The various federal government programs that had been set up to close the Digital Divide in the Clinton era were discontinued under Bush. After 2000, with the dot-com bust, pressure on high-tech companies to respond to digital divide largely evaporated.

But if concern as concern over the Digital Divide declined in the US, is surged in developing countries. Just as economist Joseph Stiglitz gave legitimacy to the view that the “Washington consensus” in intergovernmental affairs was weighted against the interests of developing countries, many developing countries searched for a formula to close the Digital Divide. Hundreds of conferences and seminars were held to discuss Digital Divide ­ you can find 1.4 million references to speeches and project descriptions by Google search. The concern culminated in Geneva’s World Summit on Information Society, with 13,000 delegates from protect themselves against the common view that they would fall further and further behind as the internet industries spread their influence across the planet. But despite all the speech-making and hundreds of pilot projects set up to address the divide, the perception persists that the Digital Divde is growing not declining and, what’s worse, no formula has been offered to suggest how to harness the market forces that shape ICT products and services.

If there is an axiom that defines the digital economy it is this: 80% of the profits of telecom and IT companies come from the top 20% of the market. Thus, the entire culture of those industries is focused on “end to end” solutions of the most affluent customers. There have been some examples in the history of high tech when companies have tried to ignore this reality. For example, the founder CEO of one of the early US computer companies got excited by the idea in the mid-80s

Phase one: Offering carro Many of the first intergovernmental task forces to close the digital divide were created at the height of the dot-com boom when their organizers sought to become “honest brokers” for huge trust funds they thought would be established by billionaire moguls and G-7 governments. The World Bank strategy, following the pattern of debt-relief negotiations, was to offer carrots, in order to coak governments to privatize their telecommunications companies and other policy changes that could reduce prices and lead to better quality of service. But as the dot-com bust took hold, few carrots could be seen. The Japanese Ministry of Foreign Affairs (MOFA) made a pledge of $15 billion in development assistance to developing countries to promote closing the digital divide. The gesture was made as part of MOFA’s role as host of the 2000 Okinawa G-7 Summit, in which President Clinton extolled the virtues of digital technology and urged the G-7 nations to pool funds to close the divide. But the Japanese have found it difficult to fulfill the pledge after neither the US nor other high tech nations chipped in. Adding to the disappointment, some developing countries found that they were unable to gain revenue from spectrum license fees, or by mobilizing foreign direct investment into the rural telecom sector. Adding to the gloom, venture capitalists curtailed experimental projects in emerging markets in 2000 and only began to rise again in late

Phase two e-Readin: Wanting to embolden reformers, influential researchers in universities, such as economist Jeff Sachs, joined forces with reformers to promote a concept called “e-readiness,” or “network readiness.” The term refers to quantitative rankings of countries regarding the extent to which they were able to muster the complex policy changes that would be needed to become an “information society.”. By 2001 it was clear that some countries were doing a terrific job becoming e-ready, while others were not - a reality that was actually deepening the digital divide between countries. A study by National University of Singapore professor Wong Poh Kam showed that this pattern of deepening inequities between nations was particularly evident in Asia

Phase three: Taking on the PT Certainly more must be done than e-readiness research to strengthen the hand of reformers in countries where entrenched interests prevented reforms. Soon, the reformers set their sights on a common target: the “PTTs.” They are the incumbent “Post, Telegraph and Telephone” companies which tightly control the path and pace of a country’s transition as an information society. Like tenured college professors past their prime, many PTTs protect their status by extending favors to political allies, controlling the setting of standards and other aspects of regulation. After fifty years of telephony most fixed-line infrastructures were expensive, slow, bulky, and narrowly confined to cities. By 2000, most developing countries had only between 2-5% phone penetration rate, despite prodding by the World Trade Organization’s telecom services act. There was clear evidence that restructuring telecommunications was a pre-requisite to e-readiness. An ITU study found that countries that liberalized or privatized their telecom sector had doubled telephone penetration between 1996 and 2000, compared with only incremental growth by the unreformed countries.

Phase four: Wireless emerges as “disruptive technology,” and alliances between reformers and wireless entrepreneurs are born. &nbsReformers soon found that it wasn’t easy to dislodge the entrenched power of the PTTs, even after the governments mandated telecommunications sector reform. Just as in the business sector, some reformers evoked the name of Austrian-born economist Joseph Schumpeter, to argue that the only way to accelerate each country’s transition into information society’s is to promote “disruptive technologies” by backing entrepreneurs whose business models promise to undermine the control of the old guard.

In China, for example, China Telecom is a huge and politically powerful telephone company that employs more than one million employees. In recent years a rebellious anti-Telecom coalition rallied around a competing carrier, China Unicom. Unicom’s alliance included an assortment of players that each had separate reasons to counter the strength of Telecom: competing ministries, bureaus, scholars, entrepreneurs and multinational corporations. They each had separate motives, said one author assessing the coalition. “Some had a philosophical stance embracing free competition, some wanted to contain the power of government ministries tied to the incumbent, some were competing business interests that financially benefited from lessening China Telecom’s power."

In March 2003, the European Community became the first Official Development Assistance (ODA) donor to explicitly declare itself willing to provide financial support to wireless coalitions that aim to counter the dominance of incumbent telecoms in Europe. So far, no such example of this sort has occurred in Asia. But there are signs that the approach may emerge soon in Indonesia.

A country with a huge potential market of as many as 200 million new wireless customers, Indonesia offers another example that shows how rival coalitions can use the digital divide issue to advance their strategic position. Thanks to IMF pressures, Indonesia’s telecommunications market officially opened in 1999. Seeing an opportunity, two of Singapore’s flagship telecom carriers, Singtel and Singapore Telemedia Technologies (STT) made billion dollar investments to claim stakes in the Indonesian telecom market, the biggest investments in Indonesia since the Asian economic crisis in 1997. With its future dominance in doubt, the incumbent carrier, PT Telkom joined with a group of Korean investors to announce an “e-Indonesia” project.

The project, announced with farfare in the Indonesian media, is intended to close Indonesia’s digital divide. But Telkom’s rivals were worried. They feared it would give Telkom’s platforms unfair advantage: special access to the booming “e-government” and small/medium enterprise markets. Critics grumbled that eIndonesia would give Telkom control over a “universal services fund,” established to help low-income areas. They feared it would be used to subsidize Telkom’s own rural market-building activities.

Reformers in Indonesia wonder if e-Indonesia will provoke a counter proposal among competing wireless carriers, which would offer a different path for closing Indonesia’s digital divide. One important question is what position would be taken on this issue by Indonesia’s Consultative Group of Donors (CGD), an informal alliance between the World Bank, other UN agencies, and bilateral donors from OECD countries, such as Japan and the United States. “In the past three years the CGD group has held many meetings on Indonesia’ digital divide, and many now agree that the key to extending ICT to the poor is circumventing the influence of the incumbent telco,” said Idris Sulaiman, a Jakarta-based consultant to the US Agency for International Development. He adds, “The sudden emergence of Singaporean corporate stakeholders in our wireless market is causing many to wonder if these companies could be mobilized into a path of reform. The formation of such alliances may be politically risky and awkward for many of the players, but it may be the only way to trigger the changes needed to close Indonesia’s digital divide.”

Source: http://www.digitaldivide.org/governments.html

Wednesday, November 30, 2005

MoDuLe 7 AnD 8

Please bear with my opinions. I know it's not that great but i still hope you'll learn something from it. Enjoy! :-)

COMPUTER ABUSES. There are some activities however that most educators would agree are misuses of computer technology in a school environment. They include: profanity and obscenity, harassment, hacking, spamming, password sharing/"sniffing", deploying, viruses/trojan horses/worms, copying copyrighted software and inappropriate virtual interaction with minor children. Other grayer areas of computer misuse might include: use of internet filters, restricting free speech, commercialism, political content, art/health issues vs. obscenity and sharing files via peer-to-peer networks.

"Data Diddling" - Probably the most common method used to commit computer crime because it does not require sophisticated technical knowledge and is relatively safe. Information is changed at the time of input to the computer or during output. For example, at input, documents may be forged, valid disks exchanged, and data falsified.
"Browsing" - Another common method of obtaining information which can lead to crime. Employees looking in others' files have discovered personal information about coworkers. Ways to gain access to computer files or alter them have been found in trash containers by persons looking for such information. Disks left on desks have been read, copied, and stolen. The very sophisticated browser may even be able to look for residual information left on the computer or on a storage media after the completion of a job.
"Trojan Horse" - This method assumes that no one will notice that a computer program was altered to include another function before it was ever used. A computer program with a valid, useful function is written to contain additional hidden functions that exploit the security features of the system.
"Trap Door" - This method relies on a hidden software or hardware mechanism that permits system protection methods to be circumvented. The mechanism is activated in some nonapperent manner. Sometimes the program is written so that a specific event, e.g., number of transactions processed or a certain calender date, will cause the unauthorized mechanism to function.
"Salami Technique" - So named because this technique relies on taking slices so small that the whole is not obviously affected. This technique is usually accomplished by altering a computer program. For example, benefit payments may be rounded down a few cents and these funds, which can be considerable in the aggregate, diverted to a fraudulent account.
"Supperzapping" - Named after the program used in many computer centers which bypasses all system controls and is designed to be used in time of an emergency. Possession of this "master key" gives the holder opportunity to access, at any time, the computer and all of its information.

PRIVACY ISSUES. Yes. Many people expect that their online activities are anonymous. They are not. It is possible to record virtually all online activities, including which newsgroups or files a subscriber accesses and which web sites are visited. This information can be collected by a subscriber's own ISP and by web site operators.

Cookies. When you "surf" the web, many web sites deposit data about your visit, called "cookies," on your hard drive When you return to that site, the cookie data will reveal that you've been there before. The web site might offer you products or ads tailored to your interests, based on the contents of the cookie data.
Most cookies are used only by the web site that placed it on your computer. But some, called third-party cookies, communicate data about you to an advertising clearinghouse which in turn shares that data with other online marketers. Your web browser and some software products enable you to detect and delete cookies, including third-party cookies.

Web Bugs. A web bug is a graphic in a web site or an "enhanced" e-mail message that enables a third party to monitor who is reading the page or message. The graphic may be a standard size image that is easily seen, or it may be a nearly invisible one-pixel graphic. E-mail messages that include graphic displays like web sites are known as enhanced messages, also called stylized or HTML e-mail. The web bug can confirm when the message or web page is viewed and record the IP address of the viewer. The IP address is a multi-digit number that uniquely identifies a computer or other hardware device (such as a printer) attached to the Internet.
You can defeat web-bugs by reading your email while offline, an option on most email programs. You can also install a software program that detects web bugs. To learn more about web bugs, visit http://www.bugnosis.org/. This site offers a free bug detection program. Many software products that detect and delete third-party cookies are also able to detect web bugs. The latest version of Microsoft Internet Explorer enables users to turn off third-party cookies and disable web bugs.

Marketing uses and "spam." Records of browsing patterns are a potentially valuable source of revenue for online services and commercial web site operators. Direct marketers can use such data to develop targeted lists of online users with similar likes and behaviors. Such data can also lead to unsolicited e-mail, known as "spam." Additionally, browsing data may prove embarrassing for users who have accessed sensitive or controversial materials online.

Browsers. It's important to be aware of the information transmitted to remote computers by the software you use to browse web sites. The major browsers are Netscape Navigator and Microsoft Internet Explorer.
Most web browsers invisibly provide web site operators with information about your ISP as well as information about other web sites you have visited. Some web browsers, particularly if they have not been updated with security fixes, may be tricked into reporting the user's default e-mail address, phone number, and other information in the "address book" if the browser also handles your e-mail. (See the demonstration in Additional Resources to learn more about the information transmitted by your browser.)

SOURCE: http://www.privacyrights.org/fs/fs18-cyb.htm

COMMENTS PLEASE..

Wednesday, November 23, 2005

MoDuLe No. 6

1. Pornography
Strictly speaking, I think pornography doesn't violate any of the computer ethics commandments. As what I've said before the action depends on the intention of the person visiting the pornographic sites. But I think I can give an example where pornography violates the several of the commandments. It is the situation in which a person used a computer in editing a picture and making it pornographic. For example, pictures of actors/actresses are attached to naked bodies in such a way that you can barely notice the fraud from the real picture. Advancement in technology is used to achieve this and would very much humiliate the people involved. This would very much violate laws such as thinking of other people's welfare, and using the computer to harm other people.

2. Spamming
Thou Shalt Not Interfere With Other People's Computer Work. This is what I hate specially when using free emails. Spamming involves sending advertisements, announcements, and product endorsements to email accounts in bulk. This violates the commandments especially on the one that involves other people's work. This violates because first it is a burden in erasing thousand of unwanted messages. In my experience, if I go to the Internet café just to check important emails, I ended up using all of my time in deleting these spams. The time I should have spent in reading and replying to important emails was consumed on deleting useless emails. Another violation is the disk space these spam mails are occupying in the email account. This violates the use of other people's resources. Spamming is really not a good thing.

3. Hacking
This situation entails close analysis. This is so complex because of the many sides that we have to look at. For the sake of discussion, we'll take the bad side of hacking, the one which is harmful such as breaking into secured systems just to extract restricted information. Although we know the more appropriate term is "cracking', we also know that these act quite violates many of the existing commandments. First, using the computer to harm other people (this is self-explanatory). Second, snooping in other people's file, and lastly using the computer in stealing. Whatever the motive of hacking, most of the time this involves breaking into other people's computers.

4. Sending chain letter emails(such as prayer and novena)
Just like spam mails, chain letters is another nightmare of people using emails. If you entertain this kind of emails, this is quite a burden because just like the spams, all your time will be spent on forwarding and deleting this mails. Its because these mails contain threatening contents such as bad luck if not forwarded, death to loved ones, years of suffering, death and many more so people have no choice but to concede to these useless emails. Sometimes they even use the Lord in threatening people. Because of this, I think this violates messing other people's work. Also this occupies a lot of disk space so this is another violation, using other people's resources without proper consent.

ADDITIONAL INPUTS:

Viewing this in altruistic point of view, this would violate two strong commandments:

Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing. Although this does not necessarily apply to everyone, it can't be denied that there are some people who can't control their lust. Seeing pictures of naked people stirs up their imagination and they end up raping poor victims. This is a bad side of pornography and this would make pornography bad.

Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans. If people continue supporting pornography, this would also promote human trafficking. This is not good especially when we know that there are minors who are involved in this. Because of the difficulty in looking for money, for example here in the Philippines, there are many people that resort to this just to earn a living. They invest their body and their dignity just to earn little amount of money. This is a sad reality in our society especially in our country. If no one supports pornography, there will be no human trafficking and other similar crimes.

Lets now take a look sa hacking in altruistic side.

The best example of hacking in altruistic side is the movie SWORDFISH, starring Hugh Hackman and John Travolta. In the movie, Hugh has already given up on being a cracker for his family but he was searched and blackmailed by John. Amidst his futile attempt to resist, he was forced to break inside one of the government agencies because if he refused to do so his daughter would be killed. I think this does not violate any of the commandment its because what is at stake is not codes or programs. In the movie, what is at stake is the life of Hugh's daughter. I think this is a very good example.


PLEASE SEND SOME COMMENTS. THANKS!

MoDuLe 5

I would choose the problem on freedom.

I think this would summarize all other problems on the morality. As we can see, all other problems will just be a part of the problem on freedom because the other problems are just based on some restrictions, which mean they have no freedom in totality. If we were to ask ourselves what is morally right, what is wrong, it would take time because we have to take many considerations. But what if there were no considerations that we have to base on? What if we can do anything? I think that's what limits man and his actions. If there's nothing that can stop man from doing anything, then they say that he has no morality. Worse, since we people are used to basing our actions on some standard so we can't fully express our feelings of hate, fear, and other struggles in life.

I'm not saying that people should fully express their feelings because if we express our feelings without considering others then we might hurt somebody without we knowing it. As what they say, we are free to do anything to our hearts desire but the question is whether our action is right. We can but is it right? To better understand this we will look at an example.

Example. This is a common issue among the youth today and in fact it is very controversial. What I'm talking about is the issue on pornography, such as visiting pornographic sites. Is viewing of pornographic materials in these sites bad or good? If we use computers in the internet café, it is impossible for the café-in-charge to check whether the users are visiting the appropriate websites. The café-in-charge could not accommodate all the users. No matter how many posters are posted which disallows the visiting of pornographic sites it goes to the user, it is the user's decision whether to open it or not. He is of course aware that he can do anything he wills, in other words he has the freedom to do anything. He knows that no one will restrain him but if he is moral, he will not visit these sites. He knows his freedom to do it but he has to ask himself if it is right. As I was saying, this all depends on the person using the café.


PLEASE POST SOME COMMENTS. THANKS!

Thursday, November 17, 2005

EthiCs in The ComPutiNg WoRLd

Based on the lectures, I think it would be the Nicomachean Ethics which dominate the computing world. I want to emphasize that there is no specific theory that will fit computing exactly but I think Nicomachean ethics will describe it in a much large scope. I want to point examples that would make other finalist theories invalid.

BUYING LICENSED SOFTWARES. It was clearly pointed out in the lecture that most people buy licensed not by their own will but in compliance to the law. If people will be given the choice between licensed and pirated, they are more inclined in choosing pirated softwares because of the significant price difference. If this is the case, this defies the theory on categorical imperatives because the theory said an act is good not because of certain consequences that occur in its performance, or on the basis of its end-result, but because of the "will" that accompanies the act. Also because people are suppressed in choosing their own free will, this will also inhibit their happiness. Now based on the utilitarian view, what inhibits happiness is morally wrong which is not true for this case because we all know that piracy is illegal.

DEVELOPING SOFTWARE\PROGRAMS. This will again make categorical imperatives out of the picture because nowadays people make softwares not because they "will" it but because they are paid to do it. For people who develop viruses or other evil softwares it is their happiness to develop such softwares, but this is not morally good because viruses destroy other people's work. This a contradiction to the utilitarianism theory.

Final Word: Man has intellectual capabilities which means that he has been given the choice to do or not to do. The world of computing is so complex in itself so to live in that world, man must weigh the consequences of his action, decide for himself not depending on others and using the arguments of reason he can do things that are morally right. This was described in the Nicomachean Ethics and that based on these arguments, I believe it is the one dominating the computing world.

Wednesday, November 16, 2005

This iS FoR MoDuLe 3..

Module 3 - Preliminary Theories

(hmmmm..Medyo marami marami din ito so please bear with me..hehehe..)

Sticky situation: Fiel designed a computer software that would make detection of enemy codes easier.
Comment: Wo yeah!(Fiel is my name by the way..hehehe!)The emphasis on ethical egoism can be explained if we take Fiel's side in creating this computer software, I think he also thought of taking advantage of his creation. In other words, maybe Fiel created this software to make his work easier in the future because if he suspects invasion in a certain program, he doesn't have to go over long lines of code. He simply have to use his software to confirm his doubts. On the other hand we cannot also eliminate the altruism part, because it is a valid assumption that when he made the program, he was thinking of making other people's work easier. If this is the case then this is ethical altruism.

Sticky situation: Mona plans to buy licensed software in the US using royalties from the sales of her book on computer ethics and donate the software to her alma mater.
Comment: We can think that the hidden purpose of what she is doing maybe is to boost the sales of her book which will show ethical egoism. If she will show people that the sales goes to chartable works, then people will sympathize and will try to buy her book not knowing of her hiiden agenda. For the altruistic side, we can also say that Mona's desire was to donate softwares and she was doing a great favor to her alma mater. Not thinking of her self-interest, she did this promote the good and welfare of her alma mater. This is a clear manifestation of altruism.

Sticky situation: Franchele wants to create a virus that affects only linux O.S.
Comment: For Franchele this would be a great accomplishment for himself 'coz if he can do that he has just surpassed years of making Linux virus-free and secure. This would become his resume surely for in the past decades no one (so far.. I think!) has yet made a virus specifically suited for Linux O.S. If we view this on the altruistic side, we have got to consider two sides, depending on which side Franchele is on. If he is against Linux, then he gives Microsoft a big advantage, coz he will be destroying Linux's reputation of being virus-free. If he is for Linux, then his virus will inspire Linux programmers to work harder on security. His virus will tell them that Linux's security still has room for improvement.

Sticky situation: Lilian debugged a secret code of NBI and sabotage the whole system as form of revenge for what she considers NBI violation of her human rights.
Comment: The only advantage that behind her act is the satisfaction of her hunger for revenge. Although i couldn't agree with her coz I believe "revenge makes you even with your enemy but forgiving them makes you greater than them". Viewing this in an altruistic view, it will just be the same with the previous situation such that she will be helping NBI unknowingly because by debugging the codes, the NBI still has to do more in keeping their system secure. Their security still has room for improvement.

Sticky situation: Jhong contracted Benson to design the web site of a government agency at the cost of 1 million and added free consultancy service.
Comment: From what I understand of this problem, in exchange of the contract Benson is made to pay 1 million to Jhong. (Hopefully I interpreted this correctly). Based on my intepretation, Jhong showed ethical egoism by giving Benson the contract in exchange for the benefit that he will get which is the 1 million. Not only has he shown egoism but also altruism. I think he used this part to cover up for his motives, (kung baga, ito ang kanyang promo!). He gave Benson a chance to earn money and he also added free consultancy to it. (Hmmm.. I think Jhong is still up to the money)

Hey!I'd love to hear from yah. If you have time, kindly post some comments alright? Thanks for reading my opinions. Jah bless you!

PLEASE SEND COMMENTS..THANKS A LOT..

Wednesday, November 09, 2005

Jake Vs. EtHiCs

CaSe No. 2
Jake bought licensed computer software at MouseNBrowse. Because of the high price he paid for the purchase of the software, Jake thought of reproducing copies of it to be sold to friends and acquaintances. Jake knew he would be violating the law. Nevertheless, he executed his plan and sold pirated software.

My CoMmEnt (HeRe We Go AgAin.. whEw!)
I shall be dividing my comments into four parts. One for each law that we have discussed, as to whether Jake violated or was in conformity wit the said laws.
DIVINE LAW. As we all know, piracy is a punishable crime in our society today because as most people say, it is a form of stealing. Since it is so, stealing computer software or whatever thing is automatically a violation to the divine law because a violation on other laws is a violation of the divine law.
NATURAL LAW. Jake is clearly violating the natural law. Although there is no clear agreement between Jake and the company, as a person Jake should be aware that he is stealing money from the company. It is because the money paid to him should have been used by his friends in purchasing original softwares.
PHYSICAL LAW. Although we can say that physical laws can never be violated, because it is the law running without we being aware of it, I can say that Jake did not violate any physical law. "In every action there is an equal and opposite reaction". Jake did not simply consider the consequences of his act. He did not view the effect of his plan in totality. He only thought of enriching himself, not even thinking of the software company.
MORAL LAW. Stealing is morally bad, Jake was aware of it, yet he still did so. He violated the moral law. Period! No questions asked!

Thanks for reading my blog. Hope you learned something from it. Till next time. Ciao! -ntrl_mystc-

URLs..CheCk ThiS OuT..

LiLian - http://liliangalamiton.blogspot.com
Ruby - http://rawbee4.blogspot.com
SiR MaR - http://lsu-cs192.blogspot.com
Franchele - http://franchele.blogspot.com
Marrisa - http://mariz118.tripod.com
Jonah Flor - http://jonski0718.tripod.com
Joselito - http://gurz7195.tripod.com
Maan - http://marieanyte060785.tripod.com
Dante - http://jhongix.blogspot.com
Marlon - http://marzams11.blogspot.com
JoyCe - http://aileenjoyce1212.blogspot.com
FiEL - http://fcasinillo.blogspot.com
GieBenson - http://gperturbos.blogspot.com
PhoeBe Cates - http://phoebecates11.blogspot.com

EtHiCs Vs. CiNdY'S AcT

CasE No. 1
Cindy is a student from a prestigious university. They were given a case scenario on which they are ask to raise their opinion based on the ethical principles discussed in their ethics class. Cindy was so resourceful that she found quite good opinions and explanations from the internet. Consequently she simply copy- pasted and the online-material. She submitted her output with minor edits on the contents. As the result, her professor was so impressed by her work.

My oPiNiOn (aNd So i ThOuGht..)
This case is a classic example of one of the many world's most debated sentence. "The end does not justify the means". In this case, the end of Cindy's actions is that she impressed her "superb" work when in fact she only copied it from the internet. In the definition of ethics in the class, ethics is an area of philosophy that deals with man's pursuit of the “good life”, such that the attainment of “good life” is predicated upon one's adherence to ethics. This is means that ethics is used as a means to reach a particular end which justifies the “good life”. As we have seen, the means in which Cindy used to achieve "good life" is very much unethical because she gets all the credit when in fact she was not the one who made her work. If we read the case closely, the teacher required the student's opinion, in this case Cindy's, so she got to make her opinion and must not rely on others for her assignment.