espiritu, kevin russel t.

advertisement
50,000
WORDS ON ETHICS
BY
ESPIRITU, KEVIN RUSSEL T.
ACKNOWLEDGMENT
I would like to express my thankfulness and deepest regards to my family and my friends
because without them, I may not have enough strength, knowledge, and guidance to be able to
finish this ITETHIC book. I am thanking my family and friends for always supporting me in
everything I do.
I would like to thank my Professor, Sir Paul Amerigo Pajo for giving me an opportunity to
create this book. At first, I did not believe in myself that I would be able to finish this book ontime but everything has changed after going through the course. The help and guidance given
by him helped me to finish this book on-time. Everything that he has taught me for the whole
term has inspired me to write an entire book.
Kevin Russel Taino Espiritu
De La Salle – College of Saint Benilde
11151641
Bachelor of Science in Information Systems
PREFACE
In the 20th century, there has been a significant improvement in the technology used.
One of the most remarkable inventions and innovations created was the computer which has
helped a lot in the everyday lives of people, businessmen and families. With the evolution of the
internet the use of computers has been more popular; however, the evolution of technology and
cyberspace has had its disadvantages. Ethical issues have constantly evolved; thus, the author
has decided to write a book about cyber ethics.
The author decided to write about cyber ethics due to its relevance; since everything
nowadays has been done in the internet. Communication has now been faster and more public;
thus, it is important to observe proper ethics as to not step onto anyone’s foot. The author was
motivated to write on this particular subject due to the arising issues that has surfaced the
internet, news and through word of mouth; the author believes that when everyone is aware on
the impact these issues have on people, then the cyber world would not have a bad connotation
and there would be less issues.
This book will discuss cyber ethics and the internet, starting from the evolution of
technology in the old ages and how it has grown into what we know of today. The book will also
tap into the different cyber ethic theories and apply it to different situations where one might
find it useful. The author will also be discussing the advantages and disadvantages of internet
use.
This book is intended to educate readers especially the youth on cyber ethics. This book
will give awareness and show the different theories and issues in relation to cyber ethics and
how it affects us humans. The purpose is also to describe and discuss to the readers the
different theories on cyber ethics which can help readers academically and intellectually.
It has been a significantly long and meaningful journey in writing this book, a lot of
extensive research has been done in order to provide an in depth look and study about the
internet and cyber ethics. However, despite the long journey the author has learned throughout
writing this book, that having ethics is very important and when everyone values their values
and ethics of other people there will be less conflicts in the internet world. Also, another lesson
learned is that when it comes to the internet, one mistake, and one wrong word can rapidly
spread like wildfire and whatever it is put out will be up to the audience and the people to
judge. Therefore, we always have to be aware of what we say or do as not affect people in a bad
way. Moreover, one small insult or mistake done to one person can have significant effects to
others; we may perceive it as a simple mistake done, but to another person it can be a severe
effect emotionally and mentally.
Table of Contents
CHAPTER 1................................................................................................................................................... 1
CONTEMPORARY MORAL PROBLEMS............................................................................................................. 1
1.1 Egoism and Moral Scepticism – – James Rachels .................................................................... 1
1.2 Religion, Morality, and Conscience – – John Arthur ................................................................ 5
1.3 Master- and Slave-Morality – – Friedrich Nietzsche ................................................................ 9
1.4 Trying Out One’s New Sword – – Mary Midgley .................................................................... 11
1.5 Utilitarianism – – John Stuart Mill ............................................................................................ 13
1.6 A Debate over Utilitarianism – – James Rachels..................................................................... 16
1.7 The Categorical Imperative – – Immanuel Kant ..................................................................... 19
1.8 Happiness and Virtue – – Aristotle ........................................................................................... 21
1.9 Nature and Value of Rights – – Joel Feinberg ........................................................................ 23
1.10 Taking Rights Seriously – – Ronald Dworkin ........................................................................ 25
1.11 A Theory of Justice – – John Rawls ........................................................................................ 27
1.12 The Need for More Than Justice – – Annette Baier ............................................................. 29
CHAPTER 2................................................................................................................................................. 32
CYBER ETHICS ........................................................................................................................................... 32
2.1 INTRODUCTION.......................................................................................................................... 32
2.2 ADVANTAGES AND DISADVANTAGES OF TECHNOLOGIES................................................. 34
2.3 CYBER ETHICS AND THE INTERNET ......................................................................................... 35
2.4 COMPUTER VIRUSES .................................................................................................................. 39
CHAPTER 3................................................................................................................................................. 41
ALL ABOUT GAMES ..................................................................................................................................... 41
3.1 INTRODUCTION.......................................................................................................................... 41
3.2 GENRES OF VIDEO GAMES ....................................................................................................... 42
CHAPTER 4................................................................................................................................................. 44
THE LIFE OF A PERSON WITH A BIG DREAM ................................................................................................... 44
4.1 BEGINNING OF KYLE’S LIFE ....................................................................................................... 44
4.2 PRE- SCHOOL.............................................................................................................................. 45
4.3 GRADE SCHOOL ......................................................................................................................... 48
4.4 SOCIAL MEDIA: FRIENDSTER .................................................................................................... 54
4.5 GRADE SCHOOL GRADUATION ............................................................................................... 57
4.6 HIGH SCHOOL ............................................................................................................................ 58
4.7 SOPHOMORE YEAR .................................................................................................................... 60
4.8 TWENTY THREE: A NEW BEGINNING ...................................................................................... 62
4.9 HIGH SCHOOL GRADUATION .................................................................................................. 68
4.11 COLLEGE: DE LA SALLE COLLEGE OF SAINT BENILDE ......................................................... 69
CHAPTER 5................................................................................................................................................. 71
REFLECTIONS ............................................................................................................................................ 71
CHAPTER 6................................................................................................................................................. 75
STEALING AND ETIQUETTE ........................................................................................................................... 75
6.1 PATENT INFRINGEMENT – SAMSUNG V.S. APPLE ................................................................. 75
6.2 TAKING AWAY PROFIT............................................................................................................... 78
6.3 PROPER SOCIAL NETWORKING ............................................................................................... 85
CHAPTER 7................................................................................................................................................. 92
7.1 HACKING ......................................................................................................................................... 92
CHAPTER 8............................................................................................................................................... 109
THE TECHNOLOGY OF PRINTING ................................................................................................................. 109
8.1 THREE DIMENSIONAL PRINTING AVAILABLE TODAY ......................................................... 109
CHAPTER 9............................................................................................................................................... 111
ROBOTICS ............................................................................................................................................... 111
9.1 REPLACING HUMAN WITH ROBOTS ..................................................................................... 111
CHAPTER 10 ............................................................................................................................................ 116
TELCO WARS ........................................................................................................................................... 116
10.1 GLOBE VS PLDT ...................................................................................................................... 116
CHAPTER 11 ............................................................................................................................................ 122
PRIVACY ISSUES ...................................................................................................................................... 122
11.1 GOOGLE GLASS ...................................................................................................................... 122
11.2 APPLE ....................................................................................................................................... 128
CHAPTER 1
CONTEMPORARY MORAL PROBLEMS
1.1 ETHICAL THEORIES
ITETHIC – Egoism and Moral Scepticism – – James Rachels
Review Questions
1. Explain the legend of Gyges. What questions about morality are raised by the story?
- The legend of Gyges is about a shepherd who was said to have found a magic ring in a fissure
opened by an earthquake. The ring would make its wearer invisible and thus would enable him
to go anywhere and do anything undetected. Gyges used the power of the ring to gain entry to
the Royal Palace where he seduced the Queen, murdered the King, and subsequently seized the
throne. According to the legend that was recalled by Glaucon, there were two rings. These two
rings are given to two people. The first ring was given to a man of virtue. The second ring was
given to a rogue. The questions raised in the story about morality were of as follows. The first
question is “But how will the so-called virtuous man behave?”. The second question is “Why
shouldn’t a man simply do what he pleases?”. The third question is “What reason is there for him
to continue being “moral” when it is clearly not to his own advantage to do so?”.
2. Distinguish between psychological and ethical egoism.
- Glaucon said that these skeptical views are known to be firstly, Psychological Egoism and
secondly, Ethical Egoism. Psychological Egoism, as it was discussed in the book is a view that all
men are selfish in everything that they do, that is the only motive from which anyone ever acts is
self-interest. This means that the actions of one’s self are only for the benefit of only him or her.
In other words, a person will do a certain action because of his or her own self-Interest. While
Ethical Egoism as it was discussed in the book is, by contrast, a normative view about how men
ought to act. It is the view that, regardless of how men do in fact behave, they have no
obligation to do anything except what is in their own interest. This means that as an individual,
our actions should be morally right and at the same time that it should maximize one’s selfinterest.
1
3. Rachels discusses two (2) arguments for psychological egoism. What are these
arguments, and how does he reply to them?
- James Rachels discussed two (2) arguments and the first (1st) argument is that “If we describe
one person’s action as selfish, and another person’s action as unselfish, we are overlooking the
crucial fact that both cases, assuming that the action is done voluntarily.”. He replied to this
argument by saying that the agent is merely doing what he most wants to do. By agent, he is
referring to the person who is doing the actions. By saying that merely doing what he most
wants to do, this means that it depends on his choice whether he would act selfishly or he would
act unselfishly. The second argument of Psychological Egoism is the so -called “unselfish actions
always produce a sense of self-satisfaction in the agent, and since this sense of satisfaction is a
pleasant state of consciousness, it follows that the point of the action is really to achieve a
pleasant state of consciousness, rather than to bring about any good for others.”. He replied to
this argument by saying that the unselfish action that the agent has done was also satisfying
him or her. These arguments suffer from defects similar to the previous one. This means that
both actions were unselfish because the agent in both arguments chose to help a friend with his
or her studies because since the agent is unselfish, he or she wants his or her friend to succeed
as well because he or she simply cares for his or her friend.
4. What three commonplace confusions does Rachels detect in the thesis of psychological
egoism?
- Rachels have faced three commonplace confusions through the thesis Psychological Egoism.
The first confusion is that “the confusion of selfishness with self-interest.”. These two are
completely different from each other because selfishness means that when you are doing
something, you only do it for yourself because you put yourself above all other people. An
example for being selfish is that when you do not share something what you have to other
people. Another example for being selfish is that when you only think about yourself and not of
the well-being of the other people. While on the other hand, having self-interest means that
you only focus on the things that you desire or simply you do what you want but you do not
have to put yourself above any other person. An example for having self-interest is that when
you want to buy yourself something you want. This doesn’t mean that you are being selfish with
anyone else because no other person was put degraded. The second confusion is the
assumption that “every action is done either from self-interest or from other regarding
motives.”. Regardless of what is said from the second confusion above, the actions that were
committed was the choice of the smoker and it doesn’t mean that he or she is being selfish and
2
this is purely from his or her self-interest because he or she still wanted to smoke even though
that he or she learned that smoking leads to cancer. The third confusion is the “common but
false assumption that a concern for one’s own welfare is incompatible with any genuine concern
for the welfare of others.”. I can say that this is false because that’s why we have a conscience,
our conscience leads us to thinking whether the actions that we have done is morally right or
wrong. By having conscience, I am sure that since there are a lot of people around us, it is
impossible for us to not think about one’s self or the well-being of the other people. An example
of having to be concerned with other people is when we are just walking around the street and
we see some beggar, most of us would automatically think about something that concerns them
or that has something to do with them. Even if what we thought about does not have anything
to do with their well-being, we still had a chance to think about them, this means that we do not
completely only think about ourselves but also we think about the well-being of other people.
5. State the argument for saying that ethical egoism is inconsistent. Why doesn’t Rachels
accept this argument?
- The argument that Rachels has been saying that Ethical Egoism is inconsistent is that “To say
that any action or policy of action is right(or that it ought to be adopted) entails that it is right
for anyone in the same sort of circumstances.”. As for the example that was stated “I cannot hold
that it is all right for me to drink your beer and then complain when you drink mine.”, this would
be completely unfair and unjust. It is unfair because I get to drink your beer and when it comes
to my beer, I would not let you drink it. This is simply being selfish. This is unjust simply because
it is morally wrong. Rachels could not accept this argument because he thinks that from the
egoist’s position from a sympathetic way “we should say that he has in mind a certain kind of
world he would prefer over all others.; it would be a world in which his own interests were
maximized, regardless of the effects on other people.”.
6. According to Rachel, why shouldn’t we hurt others, and why should we help others? How
can the egoist reply?
- As it was said by Rachels, “The reason one ought not to do actions that would hurt other
people is: other people would be hurt. The reason one ought to do actions that would benefit
other people is: other people would be benefited.”. What is trying to be said here is that we do
not want to hurt people because it simply would hurt other people; this means that we are
concerned about the well-being of the people around us. We are concerned about the other
people and this makes us unselfish because I do believe that most of the people around us do
not want to hurt people because of this reason. Maybe there would be some people who would
hurt somebody else but I am sure he or she will be hurting this person for some reason we do
3
not know. But regardless of this reason of the person who will hurt somebody, it is still unjust for
him or her to hurt that person because there are a lot of ways for him or her to do besides
hurting that person. We should help other people simply because it is the right thing to do. We
are not obliged to help other people but when we see an opportunity, we should grab it so to
make us not look selfish. When we see somebody that is in need of help and we still did not
help this person even though we can, we would look selfish. The egoist in this part can reply in a
way that he would not be happy because “He will protest that we may accept this as a reason,
but he does not.”. This means that the egoist would say that most would accept the reason but
he will not accept it. He would believe in his own reason.
Discussion Questions
1. Has Rachels answered the question raised by Glaucon, namely, “Why be moral?” If so,
what exactly is his answer?
- Yes, I believe that James Rachels have answered the question raised by Glaucon. Rachels have
answered this question “Why be moral?” In a way of explaining what is Psychological Egoism
and Ethical Egoism. To recall, Psychological Egoism means that a person will do a certain action
because of his or her own self-Interest. While Ethical Egoism means that as an individual, our
actions are required to be morally right and at the same time it should maximize one’s selfinterest. James Rachels also answered the question in a way of explaining the three
commonplace confusions namely, “the confusion of selfishness with self-interest.”, “every action
is done either from self-interest or from other regarding motives.”.”, and “common but false
assumption that a concern for one’s own welfare is incompatible with any genuine concern for
the welfare of others.”. And lastly, Rachels also explained why we should not hurt other people
and why we should help other people.
2. Are genuine egoists rare, as Rachels claims? Is it a fact that most people care about
others, even people they don’t know?
- James Rachels claimed that genuine egoists are rare in a way of saying that one person should
care for another person not only about themselves that this is a fundamental fact of human
psychology. And yes it is a fact that most of the people care about other people as well even if
they do not know each other. We can prove this by saying that most of us have a conscience
that runs through our minds. If we have done something to another person, regardless whether
it is a good thing or a bad thing about what we’ve done, we would automatically think about
that action we have committed to that person. There are a lot of ways to show other people that
you care for the and one of these ways is to simply smile at other people when you pass by
them, you can also hold the door for them when you are about to go in or out, you can also
4
help a stranger carry some stuff when they look like they are having a hard time, you can also
invite your neighbors for dinner, and etc. If you have done some of these ways to show that you
care for another person, you will most likely receive or get back what you have done in return.
3. Suppose we define ethical altruism as the view that one should always act for the benefit
of others and never in one’s own self-interest. Is such a view immoral or not?
- I believe that this would not be immoral. I can say this because it does not matter about who
are you with or what situation you are in. If you act about helping another person, you helped
him, that’s it. You helped that person because you wanted to help him or her. It is not important
that you will only act for the benefit of another person only to those who are close to you. All
that matters is that most of the people help one another for the benefit of each other.
1.2 ETHICAL THEORIES
ITETHIC – Religion, Morality, and Conscience – – John Arthur
Review Questions
1. According to Arthur, how are morality and religion different?
- As it was said by John Arthur, the practices of morality and religion are importantly different.
The practice of Morality involves “our attitude toward various forms of behavior, typically
expressed using the notions of rules, rights, and obligations.”. What this means by various forms
of behavior is that we may act in a lot of ways such as lying to other people, killing other people,
and other such behaviors you can think about. But these behaviors do not have to be limited to
the bad things; these can also be good things that can benefit the well-being of other people.
And these behaviors are typically expressed by the idea of having rules, rights, and obligations.
These rules, rights, and obligations are present so that there could be a limit to our freedom.
There should be and always be a limit to our freedom because we cannot have all things that we
want or we cannot do everything we desire for. We have limits to our freedom so that there
could be a balance of doing good and doing bad. I believe that the limit to our freedom is when
we are already interfering with some other person’s freedom. By interfering, what I mean is
when we have done something that would make the other person feel hurt for the action that
we have committed. The practice of Religion involves “prayer, worship, beliefs about the
supernatural, institutional forms, and authoritative texts.”. Just by reading the two practices, we
can already say that these two are completely different from each other. If the practice of
Religion and the practice of Morality are the same, then we should be able to explain the
5
similarities of the two practices but it seems almost impossible to explain that both the practices
of Morality and Religion are the same.
2. Why isn’t religion necessary for moral motivation?
- It is said from the first claim is that “religion is necessary to provide moral motivation.”. But this
claim is not completely true because there is a problem with the argument that it was also said
that “religious motives are far from the only ones people have”. Religion is not necessary for
moral motivation because of many reasons that may come up as we are about to do an action
whether we should we do the right thing or we should do the bad thing. If we choose to do the
right thing, then we would most probably not suffer from the consequences that would happen
if we get caught doing the wrong thing. But whatever we choose to do all depends on us,
knowing that we have a God that is present at all times, I do believe that we should always do
the right thing since there is no reason for us to do the wrong thing. And besides, when we do
some good to other people, we would most likely get back what we have done to them.
3. Why isn’t religion necessary as a source of moral knowledge?
- Religion is not necessary as a source of moral knowledge because we would have to study a
lot more about both religion and revelation for religion to serve as a moral guidance or moral
knowledge to us. But it doesn’t mean that it is the only reason that makes it not necessary as a
source of knowledge, by it I was referring to “we have to study a lot more about religion and
revelation”. What the reason for religion being not necessary as a source of moral knowledge is
that we do not have to be completely religious for us to have a source of moral knowledge. And
it does not matter what Religion we have, we just have to think about what we think is the right
thing to do. And it was also stated from the article that I have read that using “revelation for
guidance often creates more questions and problems. ”.
4. What is the divine command theory? Why does Arthur reject this theory?
- The divine command theory, according to Bishop R. C. Mortimer, is the view that “the divine
command theory, would mean that God has the same sort of relation to moral law as the
legislature has to statutes it enacts: without God’s commands there would be no moral rules,
just as without a legislature there would be no statutes.”.
John Arthur rejects this theory
because of the reason that “is what it implies.”. This theory would be best explained in a way of
giving an example; let us say that in a school it says on the rules that cheating is the right thing
6
to do. It would appear to us that there is nothing wrong with cheating just because it was said
by the rules from the school.
5. According to Arthur, how are morality and religion connected?
- Before we can answer the question about how are morality and religion connected, we must
first know what morality is. Morality, I believe that is the difference between how right an action
is and how wrong the action is. It is stated in this article that “morality depends on God whether
or not one supports the divine command theory.”. Morality is connected to Religion in a way
that Religion requires us human beings to be moral. Religion is what teaches us to be moral.
Religion is something that can explain some questions that a person could not answer because
that person lacks knowledge and understanding of the topic.
6. Dewey says that morality is social. What does this mean, according to Arthur?
- There were some arguments that were discussed about Morality being social. The first
argument is that “the existence of morality assumes that we possess a socially acquired
language within which we think about our choices and which alternatives we ought to follow.”. I
believe that from the terms “acquired language” this simply means that we should have a
language literally so that we could communicate with another person, or, to say in other words,
so that we could exchange information. The second argument means that “morality is social in
that it governs relationships among people, defining our responsibilities to others and theirs to
us.”. By saying that “it governs relationships among people”, I believe that what is being said is
while we communicate with other people or while we socialize with another person we tend to
grow relationships with one another. And these relationships strengthen as you and the other
person continue to communicate with each other. By saying that “defining our responsibilities to
others and theirs to us.” means that we have different responsibilities with each of the
relationships we have with other people, it may be our friend, it may be our family, it may be our
lover, and it may also be a stranger to us. I believe that having the same treatment with our
friends, family, lover, or even a stranger would be extremely unfair because we all know that our
family comes above all other people and that we should prioritize our lover more than our
friends and our friends than the strangers around us. But these prioritizations do not make us
selfish in a way that we put someone else above the other person or it does not make us have
self-interest with who we chose to prioritize over the others. It just means that we have different
responsibilities with the different types of relationships we have with the people around us. The
third argument is that “morality is social in the sense that we are, in fact, subject to criticism by
others for our actions.”. What is meant by the third argument is that we hear about on how
7
moral our actions were, on how acceptable the decisions were made. We may hear about these
criticisms from most of the people we encounter through our daily lives.
Discussion Questions
1. Has Arthur refuted the divine command theory? If not, how can it be defended?
- Yes, Arthur has refuted the Divine Command Theory. He has refuted this theory by explaining
to us, first, what is the divine command theory, and secondly, why John Arthur rejected this
theory. John Arthur rejected this theory because of what it implies. What it is trying to say is that
an action does not become
2. If morality is social, as Dewey says, then how can we have any obligations to nonhuman
animals? (Arthur mentions this problem and some possible solutions to it in footnote 6:)
- About the questions that were stated in the footnote # 6, of course it is wrong to torture
animals. It is wrong not only because other people could be expected to disapprove but also
that it doesn’t mean that when they are nonhuman, they should not be respected for what they
are. We should respect everybody and everybody including animals and we should treat them
with goodness because doing the right thing is the correct thing to do. The answer to the
second question raised in the footnote was that, of course the animal itself would disapprove
because why would he or she even think of him or her being tortured in the first place? It just
makes no sense that an animal or even a person would think of himself or herself being
tortured. We can have obligations to these animals by saying that we need to take care of them
and we have to treat them with care.
3. What does Dewey mean by moral education? Does a college ethics class count as moral
education?
- According to John Dewey, “then it sees clear there is an important sense in which morality not
only can it be taught but must be.”. What he meant by moral education is that, morality, which is
the difference between how right an action is and how wrong the action is needs to be taught
to the people. It needs to be taught because it is what makes the people know what the right
things to do are and what the wrong things to do are. Yes, a college ethics class counts as a
moral education. It is considered to be a moral education because the ethics class itself is where
8
we would learn the different concepts and terminologies that are related to the rightness or
wrongness of an action or simply morality.
1.3 ETHICAL THEORIES
ITETHIC – Master- and Slave-Morality – – Friedrich Nietzsche
Review Questions
1. How does Nietzsche characterize a good and healthy society?
- According to Friedrich Nietzsche, a good and healthy society is for those who are superior
above the inferior people. By superior, I was referring to those people who practice their “will to
power”. These superior people follow a “master-morality” and they are called Barbarians while
the inferior people follow a “slave-morality”. The definition of master-morality and slavemorality will be explained in the question after the next.
2. What is Nietzsche’s view of injury, violence, and exploitation?
- Friedrich Nietzsche viewed injury, violence, and exploitation as a “Will to the denial of life, a
principle of dissolution and decay.”. This means that if we are to injure, to be violent, and to
exploit someone or something, we are growing into a harsh community. I am quite sure that no
person would like to have a harsh community filled with injuries, violence, and exploitation.
Exploitation, according to Nietzsche, “does not belong to a depraved, or imperfect and primitive
society: it belongs to the nature of the living being as a primary organic function; it is a
consequence of the intrinsic Will to Power, which is precisely the Will to Life.”. If you think about
injury, violence, and exploitation towards the good side, I believe that this is where we would
learn from our mistakes from these three.
3. Distinguish between master-morality and slave-morality?
- As I have said earlier, this is the part in which I would explain the definition of “MasterMorality” and “Slave-Morality”. Master-Morality is the morality that emphasizes power, strength,
egoism, and freedom. Slave-Morality is the morality that emphasizes weakness, submission,
sympathy, and love. Barbarians follow the “Master-Morality” since they have that trait.
Barbarians, as we know it, are physically strong, violent, and have desire for power.
9
4. Explain the Will to Power.
- Friedrich Nietzsche said that “…Will to Power, it will endeavour to grow, to gain ground, attract
to itself and acquire ascendency...”. I believe that what he is trying to say is that we, the people,
should master about what we do best. By saying “…to gain ground…”, I believe means that we
should have a good foundation for us to be good at something we want to do. By the terms
“…attract to itself…”, I believe that this means that we should have confidence with anything that
we do so we can accomplish it. And about “…acquire ascendancy…”, I believe that it means that
we should continue to improve because once we are good at something, it does not mean that
we should stop there.
Discussion Questions
1. Some people view Nietzsche’s writings as harmful and even dangerous. For example,
some have charged Nietzsche with inspiring Nazism. Are these changes justified or not?
Why or why not?
- I believe that Friedrich Nietzsche did not have any intention on inspiring Nazism because
Nietzsche’s only intention was to explain his view about a “good and healthy society” and about
what was the difference between a “Master-Morality” and a “Slave-Morality”. But it seems quite
obvious that Adolf Hitler follows a “Master-Morality” due to his trait of being strong-willed.
2. What does it mean to be “a creator of values”?
- As it was said in the book, a creator of values, “…honours whatever he recognizes in himself:
such morality is self-glorification.”. I believe that a creator of values is a type of person who
“does not require to be approved of; he passes the judgment: “What is injurious to me is
injurious in itself”; he knows that it is he himself who only confers honour on things;”. This is the
type of person who does the judging, does the approval, and he or she thinks highly of himself
or herself even when he or she is helping people who are not much well-off in life.
10
1.4 ETHICAL THEORIES
ITETHIC – Trying Out One’s New Sword – – Mary Midgley
Review Questions
1. What is “moral isolationism”?
- Moral Isolationism, according to Mary Midgley, is for “Those who recommend this hold that
the world is sharply divided into separate societies, sealed units, each with its own system of
thought.”. What this means for me is that, we should not be worried about the people that are
not with the society that we are in, because the people that are not a part of the society we are
in, is not accepted due to their separate society to ours. She also said that “People usually take it
up because they think that it is a respectful attitude to other cultures.”, but how will it be a
respectful attitude if the societies are sharply divided. I believe that for us to respect other
people or other societies around the world; we should be able to know them and we should be
able to understand them for us to give a “favourable judgement”.
2. Explain the Japanese custom of tsujigiri. What questions does Midgley ask about the
custom?
- The word Tsujigiri, means “crossroads-cut”. There is a Japanese saying which means “to try out
one’s new sword on a chance wayfarer.” And this saying refers to the practice of Samurais when
they are about to try out a new sword. The Samurais need to try out the sword on wayfarers to
know if it works very effective. By effective, I mean, if it could “slice through someone at a single
blow”. It is important for Samurais to strike with the least amount of tries so to have less effort
on killing. Midgley asked if “Does the isolating barrier work both ways?” and “Are people in
other cultures equally unable to criticize us?”.
3. What is wrong with moral isolationism, according to Midgley?
- As it was discussed by the past question, Moral Isolationism means to not worry about any
other society besides ours because they are separate from ours. What is wrong with Moral
Isolationism is that “Moral Isolationism forbids us to form any opinions on these matters”. It
forbids us to criticize other cultures because we do not understand their culture that much
because we are separate from others but we also do not criticize their culture because we
ourselves do not completely understand our own culture.
11
4. What does Midgley think is the basis for criticizing other cultures?
- I believe that the basis of Mary Midgley for criticizing other cultures is that we first need to
understand their culture and that we should be able to understand our culture completely for us
to contrast and compare or criticize our culture from the different societies that could be found
all over the world. And finally, we should never forget to respect other cultures because I am
quite sure that we would want the same amount of respect from other societies when it is them
who are doing the criticizing.
Discussion Questions
1. Midgley says that Nietzsche is an immoralist. Is that an accurate and fair assessment of
Nietzsche? Why or why not?
- No, I do not believe that Nietzsche is an immoralist because all what Friedrich Nietzsche did
was to characterize what he believes to be is a good and healthy society; and Friedrich Nietzsche
characterized his good and healthy society by saying that it only exists for the superior people
who are barbarians and the inferior people are below them. I believe that it is not an accurate
and fair assessment of Friedrich Nietzsche since all he did was to express what he thinks is a
good and healthy society and we all have that right of freedom to express. Each one of us has
our own rights and having to express what we would want to express is one of them.
2. Do you agree with Midgley’s claim that the idea of separate and unmixed cultures is
unreal? Explain your answer.
- Yes, I agree with Mary Midgley’s claim that the idea of separate and unmixed cultures is unreal
because we have different cultures all over the world and we have to try to understand these
different cultures for us to have an idea of what their culture is all about. We all live in one
world, so the least that we can do is to give respect about their culture so as to receive the
respect that we expect from them.
12
1.5 ETHICAL THEORIES
ITETHIC – Utilitarianism – – John Stuart Mill
Review Questions
1. State and explain the Principle of Utility. Show how it could be used to justify actions that
are conventionally viewed as wrong, such as lying and stealing.
- According to John Stuart Mill, the Principle of Utility, “holds that actions are right in proportion
as they tend to promote happiness, wrong as they tend to produce the reverse of happiness.”.
What this means is that the Principle of Utility will only be right if most of the people who would
be happy would outweigh the people would less be happy from the action and it would only be
wrong if it does not fit the definition which holds the greatest amount of happiness. An example
of this could be when there is a group of people who are talking about putting up a school or
not to put up a school. Of course the utilitarian would respond in a way that he or she wants to
put up a school because he or she knows that a lot of people would benefit from that school or
a lot of people would be happy when a school will be put up. An example that involves lying
and stealing is when there is a situation of a family that has sick children and that family does
not have enough money to buy some medicine so what he or she does is to lie to one of the
family members that he or she would just go somewhere to look for a way to get some money
for the children but all he or she is about to do is to steal some medicine for their children. This
is an example of the Principle of Utility regarding lying and stealing because it promotes the
greatest amount of happiness or benefits, it was promoted in a way that he or she lied and stole
medicine for the happiness or benefit of their children.
2. How does Mill reply to the objection that Epicureanism is a doctrine worthy only of
swine?
- John Stuart Mill replied to this objection by saying that, “To suppose that life has (as they
express it) no higher end than pleasure—no better and nobler object of desire and pursuit—
they designate as utterly mean and groveling; as a doctrine worthy only of swine...”. Mill also
stated that “… beast’s pleasures do not satisfy a human being’s conceptions of happiness.
Human beings have faculties more elevated than the animal appetites, and when once made
conscious of them, do not regard anything as happiness which does not include their
gratification.”. I believe that saying that human beings are not capable of pleasure is absurd,
because we people can do more things that gives us pleasure than a beast that only have a
limited amount of things to do that pleasures them.
13
3. How does Mill distinguish between higher and lower pleasures?
- How John Stuart Mill distinguished higher pleasure from lower pleasure is when Higher
Pleasure is all about the “…pleasures of intellect, of the feelings and imagination and of the
moral sentiments,” and the Lower Pleasure is “a much higher value as pleasures than to those of
mere sensation”. It was also stated here that the higher pleasure, is occasionally under the
influence of temptation. We all know what temptation can do to us especially when most of the
people around us are doing the same exact thing and we get peer-pressured into doing bad
habits.
4. According to Mill, whose happiness must be considered?
- The happiness that must be considered, as it was stated by John Stuart Mill, is “is an existence
exempt as far as possible from pain, and as rich as possible in enjoyments, both in point of
quantity and quality; the test of quality, and the rule for measuring it against quantity, being the
preference felt by those who in their opportunities of experience, to which must be added their
habits of self-consciousness and self-observation, are best furnished with the means of
comparison.”. I believe that this line means that we should consider the happiness that would
have the highest amount of enjoyment possible, just as how the Principle of Utility was
discussed.
5. Carefully reconstruct Mill’s proof of the Principle of Utility.
- John Stuart Mill’s Proof of the Principle of Utility means that “…the sole evidence it is possible
to produce that anything is desirable, is that people do actually desire it.”. We all have our own
desires, whether it may be a thing we want, whether it may be someone we want to be with, or
whether maybe it could be a place that we want to be in. All of this will lead us to achieving
something we desire for, which is to become happy. When we are happy, we tend to feel that
we are complete. We feel complete simply because it is the only thing we truly desire for, is for
us to be happy.
Discussion Questions
1. Is happiness nothing more than pleasure, and the absence of pain? What do you think?
- I do not believe that happiness is nothing more than just pleasure, and the absence of pain
because being happy is the only thing that we truly desire for. The only thing that we truly
desire for is for us to be happy because as I have just said, we feel that we are complete once we
14
become happy. And about the absence of pain, it does not have to do anything with happiness
because we can still be happy even though that we are feeling pain, whether it is physical or
mental pain. It does not also mean that we can only have one at a time; it does not work like
that. We can still be happy even though we have something in our minds that disturbs us by
simply making the most of the laughs that we are having when we are with our families, friends,
or loved ones. There could be a lot of signs to know that we are unhappy about our lives. One
sign could be when we feel like nothing that we do seems to be fun, maybe what we are doing
does not fit what we really want to do in life, or maybe we were just forced to do something we
do not really want, or maybe we were just forced to take up a course in college that we do not
really want so we grew not following what we desire for, and we end up hating why we did not
just follow what we truly desire for in the first place and we should not have to be dictated on
what we want for us to be happy, BUT it does not mean that we should do everything we want
without any limits. Another sign could be when we cannot sleep because we think too much or
we worry too much about what has been recently happening with us or around us. We should
not be too much affected with things that does not have to do anything with us because I
believe that there are some people that gets affected easily because they simply do not like
what the other person did and want the person to do is what they want, even though they do
not have to do anything with the business of another person.
2. Does Mill convince you that the so –called higher pleasures are better than the lower
ones? What about the person of experience who prefers the lower pleasures over the
higher ones?
- I am not convinced about higher-pleasures are better than lower-pleasures because of the
stated terms, “the higher pleasure, is occasionally under the influence of temptation” and as I
have discussed from the other question above there could be a lot of things that could happen
once we give in to the temptations that we may face. I believe that we should avoid these
temptations simply because it is a sin.
3. Mill says, “In the golden rule of Jesus of Nazareth, we read the complete spirit of the
ethics of utility.” Is this true or not?
- I can say that this is true because Jesus of Nazareth served as a model for us to follow. Jesus
has helped a lot of people and He has sacrificed a lot for us. What Jesus has done is a sample of
the Principle of Utility because His action served a lot of people and these people were
benefited. This is a sample that we should follow for us to be able to help other people because
15
once we do good stuff we would surely expect to receive the same treatment on how we treated
other people.
4. Many commentators have thought that Mill’s proof of the Principle of Utility is defective.
Do you agree? If so, then what mistake or mistakes does he make? Is there any way to
reformulate the proof so that it is not defective?
- Yes. I agree that the Proof of the Principle of Utility is defective because God created us
differently and no one can be completely the same as with another person. Each one of us has
different personalities and each one of us has handled a situation differently. There may come a
similar situation that happens with another person but I am quite sure that we will approach that
situation differently; we would act differently in a way that our actions correspond with our
personalities. And about happiness, we all may want a lot of things, we all may want someone to
be with, and we all may want to be in a place that looks special to us but I am sure that there
would no person be who would have similar wants.
1.6 ETHICAL THEORIES
ITETHIC – A Debate over Utilitarianism – – James Rachels
Review Questions
1. Rachels says that classical utilitarianism can be summed up in three proportions. What
are they?
- The first proportion that classical utilitarianism that is summed up is, that “actions are to be
judged right or wrong solely in virtue of their consequences.” The second proportion is that, “in
assessing consequences, the only thing that matters is the amount of happiness or unhappiness
hat is caused.”. The third and last proportion is that, “in calculating the happiness or
unhappiness that will be caused, no one’s happiness is to be counted as more important than
anyone else’s.”. The first proportion, I believe, means that nothing else matters but what the
right action is, of course the right action would have the best consequences because why would
the wrong action have the better consequence than the right action. Right actions lead to good
consequences while the wrong actions lead to the bad consequences. The second proportion, I
believe, means that the right actions give the best amount of happiness more than doing the
wrong action. And lastly, the third proportion, I believe, means that it is not enough for us to be
happy by considering only ourselves because as how utilitarianism is explained that most of the
people who are happy will overweigh the people who are least happy. So what we should do is
to consider not only ourselves but also the people around us for us all to be equally happy.
16
2. Explain the problem with hedonism. How do defenders of utilitarianism respond to this
problem?
-For us to explain the problem with Hedonism, we first must explain what Hedonism is. What is
Hedonism? Hedonism is “the idea that happiness is the one ultimate good (and unhappiness the
one ultimate evil)…”. The problem with Hedonism is that, “Hedonism misunderstands the nature
of happiness. Happiness is not something that is recognized as good and sought for its own
sake, with other things appreciated only as means of bringing it about.” And that “happiness is a
response we have to the attainment of things that we recognize as goods, independently and in
their own right.”. An example of this could be when you are a basketball player and you have
broken your shin bone split in half. This injury would make you feel unhappy because you know
that this injury could end your career. This example of Hedonism is showing unhappiness.
Another example of Hedonism can be when you are granted 100% scholarship from the school
that you want. You will be happy due to this grant because you know that the school is the one
that pays for your tuition. The defenders of Utilitarianism responded by saying that “…the
English philosopher G. E. Moore (1873—1958), have tried to compile short lists of things to be
regarded as good in themselves.”, “Moore suggested that there are three obvious intrinsic
goods—pleasure, friendship, and aesthetic enjoyment…”.
3. What are the objections about justice, rights, and promises?
- The first objection is about Justice and means that “Justice requires that we treat people fairly,
according to their individual needs and merits.”. The second objection is about Rights and
means that “Quite the reverse: it is a notion that places limits on how an individual may be
treated, regardless of the good purposes that might be accomplished.”. The third and last
objection is about Promises and an example could best fit the description, “Suppose you have
promised someone you will do something—say, you promised to meet him downtown this
afternoon. But when the time comes to go, you don’t want to do it—you need to do some work
and would rather stay at home.”. I believe that the first objection could be explained by how it
was stated above. A suggestion for the second objection is that we should practice our rights
and we should have them in mind so that we would know what we can do and what we cannot
do in life. It also gives us limits on what we do, in order for us to stay out of trouble.
17
4.
Distinguish between rule- and act-utilitarianism. How does rule-utilitarianism reply to
the objections?
- Rule-Utilitarianism, means that “…, is an unnecessarily watered-down version of the theory,
which gives rules a greater importance than they merit.”. Act-Utilitarianism, on the other hand
means that, “…, recognized to be a radical doctrine which implies that many of our ordinary
moral feelings may be mistaken. In this respect, it does what good philosophy always does—it
challenges us to rethink matters that we have heretofore taken for granted.”. The RuleUtilitarianism replied to the objections by saying that “… cannot be convicted of violating our
moral common sense, or of conflicting with ordinary ideas of justice, personal rights, and the
rest.”.
5. What is the third line of defense?
- The Third Line of Defense is about a “small group of contemporary utilitarians has had a very
different response to the anti-utilitarian arguments.”. It also stated that we could not rely on our
moral common sense because it may include various irrational elements, “…including prejudices
absorbed from our parents, our religion, and the general culture.”. This is an Act-Utilitarianism
because it talks about some of our senses, feelings about the people that are around us.
Discussion Questions
1. Smart’s defense of utilitarianism is to reject common moral beliefs when they conflict
with utilitarianism. Is this acceptable to you or not? Explain your answer.
- I would have to say that it is not acceptable for me simply because we all have different
perspectives on how we see things. What I mean by this is, what may make me happy may not
make other people happy and vice versa. But whatever our perspectives may be, we should and
always respect the perspectives on how other people see things.
2. A utilitarian is supposed to give moral consideration to all concerned. Who must be
considered? What about nonhuman animals? How about lakes and streams?
- I believe that we should consider all of people that are around us, all of the animals, all of the
other living things or even the non-living things, even lakes and streams because all of these
were made by one God and it is our responsibility to take care of what He has left for us. We
18
should keep in mind that we should respect one another because it is one way of showing that
we care for that person even though he or she may be a stranger to us.
3. Rachels claims that merit should be given moral consideration independent of utility. Do
you agree?
- Yes, I agree with Rachels because I believe that each one of us has different moral
considerations and it is important for each and every one of us to think first before we act so to
avoid hurting other people with what we have to say.
1.7 ETHICAL THEORIES
ITETHIC – The Categorical Imperative – – Immanuel Kant
Review Questions
1. Explain Kant’s account of the good will.
- According to Immanuel Kant, “IT IS IMPOSSIBLE to conceive anything at all in the world, or
even out of it, which can be taken as good without qualification, except a good will.”. I believe
that we should have a good motive for doing an act because if we do an act just because we
want to do it and we are not thinking about the welfare of other people, we would look like we
are selfish. The only way for us to consider that an act is good, we should have time to think not
only about us but also we should think about the person that we are going to help. And we
should have a clear conscience because it is also not right for us to help someone just because
we know that helping people is a good thing but if we are just forcing ourselves to help
someone, it would be like nothing because it is not really what we want to do. I believe that if
we would have good motive of helping someone, I am quite sure that they would be glad to
know that there are people who care for one another, and we would grow relationships due to
our good act.
2. Distinguish between hypothetical and categorical imperatives
- As it was stated, hypothetical imperative is, “… in general, I do not know beforehand what it
will contain—until its condition is given.”. To say this in other terms, what this line is trying to say
is that we do not know at first what we are going to do because we first have to analyze the
situation then we would find out what to do after. On the other hand, Categorical Imperatives
19
mean that, “… I know at once what it contains. For since besides the law this imperative contains
only the necessity that our maxim should conform to this law, while the law, as we have seen,
contains no condition to limit it, …”. I believe that the moment we are in a situation, we would
know right away what to do because it is automatic to us about what we must do.
3. State the first formulation of the categorical imperative (using the notion of a universal
law), and explain how Kant uses this rule to derive some specific duties toward self and
others.
- The first formulation of the categorical imperative is that, “Act only on that maxim though
which you can at the same time will that it become a universal law.”. And I can explain how
Immanuel Kant uses this rule to derive some specific duties towards self and others by saying
that, “… then even although we leave it unsettled whether what we call duty may not be an
empty concept, we shall still be able to show at least what we understand by it and what the
concept means. . . .”.
4. State the second version of the categorical imperative (using the language of means and
end), and explain it.
- The second version of the Categorical Imperative is, “…must be such that from the idea of
something which is necessarily an end for every one because it is an end in itself forms an
objective principle of the will and consequently can serve as a practical law.”. I believe that what
this is trying to tell us is that, we should have a good motive in whatever we are about to do and
we should treat each person with respect to another person.
Discussion Questions
1. Are the two versions of the categorical imperative just different expressions of one basic
rule, or are they two different rules? Defend your view
- I believe that the two versions of the Categorical Imperative show two different rules because
the first version talks about the universal law and the second version talks about the means and
end. It has two different rules but both of those rules guide us through our actions.
20
2. Kant claims that an action that is not done from the motive of duty has no moral worth.
Do you agree or not? If not, give some counterexamples.
- I do not agree with Kant’s claim and it does not mean that if an action was not done from the
motive of duty, it has no moral worth, because I believe that whatever our actions may be, as
long as we know that we have a good motive of doing an act, it already has the moral worth. All
that is important is that we do an action with good motive.
3. Some commentators think that the categorical imperative (particularly the first
formulation) can be used to justify non-moral or immoral actions. Is this a good
criticism?
- I have to say that it is a good criticism simply because the first formulation talks about the
universal laws. Our actions should be ethical for the action to be acceptable through the
universal laws that may apply.
1.8 ETHICAL THEORIES
ITETHIC – Happiness and Virtue – – Aristotle
Review Questions
1. What is happiness, according to Aristotle? How is it related to virtue? How is it related to
pleasure?
- According to Aristotle, happiness, “…argues that all human beings seek happiness, and that
happiness is not pleasure, honor, or wealth, but an activity of the soul in accordance with the
virtue.”. How is this related to virtue? First of all, virtue is the quality of being good and that
virtue has two kinds. The first kind is Moral, which means that it comes from training and habit.
The second kind is Intellectual, which is found in the activity of reasoning or contemplation.
These are related to pleasure by saying that good or happiness was identified to be pleasure.
21
2. How does Aristotle explain moral virtue? Give some examples.
- Aristotle has explained Moral Virtue by saying that it comes from training and habit, this
means that it does not come to us naturally and “… generally is a state of character that is a
mean between the vices of excess and deficiency.” An example of this that was stated is that “…
the virtue of courage as a mean between the extremes of rashness, which is the excess and
cowardice, which is the deficiency.”. He used this as an example because it is very hard to find
the intermediate between the two extremes.
3. Is it possible for everyone in our society to be happy, as Aristotle explains it? If not, who
cannot be happy?
- Of course it is possible for everyone in our society and in any other society to be happy.
Aristotle explained happiness by saying that some of the people identify pleasure as to be
happiness or goodness but it really is not. We tend to look for happiness in different things such
as money and power. It was also stated that “If happiness is activity in accordance with virtue, it
is reasonable that it should be in accordance with the highest virtue; …” I believe that what he is
trying to tell us here is that, if we do the virtuous activities rather than looking for money and
power, we would find our true happiness. And those who cannot be happy are the other animals
that are deprived of such activities.
Discussion Questions
1. Aristotle characterizes a life of pleasure as suitable for beasts. But what, if anything, is
wrong with a life of pleasure.
- Aristotle stated that Moral virtue “… is a mean between the vices of excess and deficiency” and
Intellectual virtue as, “… found in the activity of reason or contemplation”, a life of pleasure does
not have any place because pleasure is only mistaken to be happiness or goodness. Having
money and power will not make you truly happy but doing the virtuous activities will.
2. Aristotle claims that the philosopher will be happier than anyone else. Why is this? Do
you agree or not?
- I cannot say that a philosopher will be happier than anyone else because each one of us have
different things that could make us truly happy and what may seem to be happy for me, does
22
not seem to be happy for the other people out there. And I believe that Aristotle claims this
because philosophers have achieved a satisfaction for intelligence.
1.9 ETHICAL THEORIES
ITETHIC – Nature and Value of Rights – – Joel Feinberg
Review Questions
1. Describe “Nowheresville”. How is this world different from our world?
- As it was stated, Nowheresville is, “a world like our own except that people do not have rights.
As a result, people in this world cannot make moral claims when they are treated unjustly. They
cannot demand or claim just treatment, and so they are deprived of self-respect and human
dignity.”. It is different from our world by saying that people in Nowheresville do not have any
rights and it was said that if the flaw makes Nowheresville too ugly, we can also shape it to as
pretty as we can in other moral respects. Nowheresville is like a place of experiment because we
can think about the different types of situations with no limits at all.
2. Explain the doctrine of Logical Correlativity of Rights and Duties. What is Feinberg’s
position on this doctrine?
- The Doctrine of Logical Correlativity of Rights and Duties has two parts. The first part is that,
“all duties entail other people’s rights and…”. The second part is that “all rights entail other
people’s duties.”. Feinberg’s position on this is that, “It should not be surprising that my answer
is: “In a sense yes and in a sense no”.” Feinberg also said that, there are many people who
believe that they have to do something for another person in excess of what that person
demands of him or her. What I can say about this is that, a person does not have to help
another person because it is not their duty but helping other people is not a bad thing, it is the
point of thinking that you are required to help another person that makes it not agreeable.
3. How does Feinberg explain the concept of personal desert? How would personal desert
work in Nowheresville?
- Feinberg has explained this concept of personal desert by saying that it was compared to how
people treat each other because when a person does some good deed to another person. What
usually happens is that the person who helped would receive some good deed from the person
23
he or she had helped. It is just like giving and taking. An example of this concept that was stated
is when a servant has done a job less than what is expected, he or she would be paid in a lower
amount than usual because he or she did not meet the expected job. But if however the servant
has done a job more than what is expected of him or her, the employer does not have any
obligations of rewarding his or her servant and it all depends on the employer if he or she would
be morally sensitive enough to give his or her servant a reward because all what the servant has
done is his or her job.
4. Explain the notion of sovereign right monopoly. How would this work in Nowheresville
according to Feinberg?
- The notion of sovereign right monopoly, according to Feinberg is that, “… had a certain duty to
treat his subjects well, but this duty was owed not to the subjects directly, but to God, just as we
might have a duty to person to treat his property well, but of course no duty to the property
itself but only to its owner.”. I believe that what is being said here is that we should treat each
other well but we should devote what we do to God. In Nowheresville however, it was said that
“… that no one, hardly any one, has rights.” I believe that Nowheresville, serves like an
experiment for us if we want to look at things in different ways.
5. What are the Claim Rights? Why does Feinberg think they are morally important?
- The definition of Claim Rights is that it, “… logically entail other people’s duties.”. I believe that
these are morally important because all of us, as human beings, have rights, and these rights
were made for us to follow and so that we have a limit and for us to be equal with the rest of
the people.
Discussion Questions
1. Does Feinberg make a convincing case for the importance of rights? Why or why not?
- I do not believe that Joel Feinberg made a convincing case for the importance of rights
because almost everything that he had explained was explained through the imaginary world
just like ours and it is named Nowheresville. I would be more convinced if he gave examples
about our rights and our duties in more real life situations.
24
2. Can you give a non-circular definition of claim right?
- I don’t believe that there could be a non-circular definition of a claim right because the
definition itself means that it involves that a person has a duty to another person.
1.10 ETHICAL THEORIES
ITETHIC – Taking Rights Seriously – – Ronald Dworkin
Review Questions
1. What does Dworkin mean by right in the strong sense? What rights in this sense are
protected by the U.S. Constitution?
- What Dworkin means by right in the strong sense is that, “… In most cases when we say that
someone has “right” to do something, we imply that it would be wrong to interfere with his
doing it, or at least that some special grounds are needed for justifying any interference.”. I
believe that this means is that when a person is doing something and he or she does not harm
anything or anyone, it would be wrong for us to interfere with him or her until something wrong
has been done that is against the rights. An example that was stated here says that, “The claim
that citizens have a right to free speech must imply that it would be wrong for the Government
to stop them from speaking, even when the Government believes that what they will say will
cause more harm than good.”.
2. Distinguish between legal and moral rights. Give some examples of legal rights that are
not moral rights, and moral rights that are not legal rights.
- I believe that from the word legal itself, we could define what it is and this type of right are the
ones that has something to do with the law. Moral rights on the other hand, we could define
this by saying that it has something to do with our beliefs or in what we believe in.
3. What are the two models of how a government might define the rights of its citizens?
- The first model is that, “… has great plausibility, and most laymen and lawyers, I think, would
respond to it warmly.”. The second model is that, “… the more familiar idea of political equality.
This supposes that the weaker members of a political community are entitled to the same
concern and respect of their government”.
25
4. According to Dworkin, what two important ideas are behind the institution of rights?
- There are two important ideas behind the institution of rights that Ronald Dworkin mentioned
and the first idea is that, “… is therefore crucial, because it represents the majority’s promise to
the minorities that their dignity and equality will be respected”. The second idea is that it, “…
requires an act of faith on the part of the minorities, because the scope of their rights will be
controversial whenever they are important, and because the officers of the majority will act on
their own notions of what these rights are really are.”.
Discussion Questions
1. Does a person have a right to break the law? Why or why not?
- I believe that every person can break the law but then why would we choose to break the law
when we can always do the right thing, which is to not break the law. We should be able to
reason out about our actions. No one can control us and no one can stop us from doing what
we want to do so we better think before we act and we should make wise decisions in life so for
us to stay out of trouble.
2. Are rights in the strong sense compatible with Mill’s utilitarianism? (See the footnote
about institutional utilitarianism.)
- I believe that there is way that it could be compatible, such as John Stuart Mill’s Utilitarianism
promotes that the people who has the most amount of happiness would outweigh the people
who have a less amount of happiness.
3. Do you think that Kant would accept rights in the strong sense or not?
- Yes, I believe that Immanuel Kant would accept the rights in the strong sense.
26
1.11 ETHICAL THEORIES
ITETHIC – A Theory of Justice – – John Rawls
Review Questions
1. Carefully explain Rawls’s conception of the original position.
- I believe that Rawls’s conception of the original position is that, “these principles primarily
apply, as I have said, to be the basic structure of society,”. They are to be the basic structure of
society because these principles “govern the assignment of rights and duties and to regulate the
distribution of social and economic advantages”.
2. State and explain Rawls’s first principle of justice.
- According to Rawls’s, the first principle of justice is that, “Each person is to have an equal right
to the most extensive basic liberty compatible with a similar liberty for others.”. I believe that this
means is that each and every one of us should have the same rights and duties since no one
person is greater than another because we were created equally in the image and likeness of
God.
3. State and explain the second principle. Which principle has priority such that it cannot be
sacrificed?
- According to Rawls’s, the second principle of justice is that, “Social and economic inequalities
are to be arranged so that they are both (a) reasonably expected to be to everyone’s advantage,
and (b) attached to the positions and offices open to all. . . .”. I believe that the first principle has
a priority that it cannot be sacrificed due to what it means, since we were created equally in the
image and likeness of God, it believe that no one person should think or believe that he or she
has a right or duty higher than the other people.
Discussion Questions
1. On the first principle, each person has an equal right to the most extensive basic liberty
as this does not interfere with a similar liberty for others. What does this allow people to
do? Does it mean, for example, that people have a right to engage in homosexual
activities as long as they don’t interfere with others? Can people produce and view
27
pornography if it does not restrict anyone’s freedom? Are people allowed to take drugs
in the privacy of their homes?
- These rights were created for the people to follow and to have limits for us to stay out of
trouble and this allows us to have the freedom to do whatever we want and whenever we want
as long as we do not interfere with the other people around us. I do not believe that people
should engage in homosexual activities just because they do not interfere with other people and
it is morally wrong since we were created with two genders, each gender has its own role to play
and engaging in homosexual activities are not one of those roles that we should play. Producing
and viewing pornography does not restrict anyone’s freedom but then it would be morally
wrong and we should think before we act because we never know when our actions already
violate somebody because they might think that our actions are not suitable. People have a
choice to make and I am quite sure that people are aware of what drugs can do to them, so
choosing to take drugs in the privacy of their homes would not be an issue since no other
person gets interfered with and he or she chose to take drugs on his or her own knowing that
his or her health could be in danger.
2. Is it possible for free and rational persons in the original position to agree upon different
principles than those given by Rawls? For example, why wouldn’t they agree to an equal
distribution of wealth and income rather than an unequal distribution? That is, why
wouldn’t they adopt socialism rather than capitalism? Isn’t socialism just as rational as
capitalism?
- Yes, I believe that it is possible for free and rational persons to agree upon different principles
since each and every one of us has our own beliefs and we see life in different ways as well. They
would not agree to an equal distribution of wealth and income because there are some jobs that
are a bit harder than some other jobs and it would be completely unfair to the person who does
a harder job and would only receive the same amount of money to the person who does an
easier job.
28
1.12 ETHICAL THEORIES
ITETHIC – The Need for More Than Justice – – Annette Baier
Review Questions
1. Distinguish between the justice and care perspectives; According to Gilligan, how do
these perspectives develop?
- According to Baier, she distinguished justice and care perspectives in the means of arguing
that “… justice perspective by itself is inadequate as a moral theory. It overlooks inequalities
between people (as in parent-child relationships), it has an unrealistic view of freedom of choice,
and it ignores the importance of moral emotions such as love.” While Care Perspectives is, “… a
less authoritarian humanitarian supplement, a felt concern for the good of others and for
community with them”. These perspectives develop when people grow older and they tend to
learn from their mistakes.
2. Explain Kohlberg’s theory of moral development. What criticism do Gilligan and Baier
make of this theory?
- Kohlberg’s theory of moral development has three levels. The first level is “pre-conventional”
and It means that, “… where what is senn to matter is pleasing or not offending parental
authority-figures,”. The second level is “conventional” and it means that, “… the child tries to fit
in with a group, such as a school community, and conform to its standards and rules”. The third
and final level is “post-conventional” and it means that, “in which such conventional rules are
subjected to tests, and where those tests are of a Utilitarian, or, eventually, a Kantian sort—
namely ones that require respect for each person’s individual rational will, or autonomy, and
conformity to any implicit social contract such wills are deemed to have made, or to any
hypothetical ones they would make if thinking clearly.”. The criticism that Gilligan made about
this theory is that, “… wonder if there might not be a quite different pattern of development to
be discerned, at least in female subjects.”. The criticism of Baier about this theory is that, “the
most obvious point is the challenge to the individualism of the Western tradition, to the fairly
entrenched belief in the possibility and desirability of each person pursuing his own way …”.
29
3. Baier says that there are three important differences between Kantian liberals and their
critics. What are these differences?
- The three important differences between Kantian Liberals and their critics is that, firstly, “…
relative weight put on relationships between equals”. The second important difference is that, “…
relative weight put on freedom of choice”. The third and last important difference is that, “… the
authority of intellect over emotions”.
4. Why does Baier attack the Kantian view that the reason should control unruly passions?
- Baier stated that, “… tends to seem less useful when we are led to consider what sort of person
we need to fill the role of parent, or indeed want in any close relationship”. I do not believe that
“reason” should control unruly passion because in a relationship, reasoning does not matter that
much, what matters is that we are honest.
Discussion Questions
1. What does Baier mean when she speaks of the need “to transvalue the values of our
patriarchal past”? Do new values replace the old ones? If so, then do we abandon the old
values of justice, freedom, and rights?
- I believe that what Baier means when she said “to transvalue the values of our patriarchal past”
is that the values that have been taught before should be carried on and we should live with
these values. I do not believe that the new values should replace the old ones; I do believe
however that these values should keep on adding up.
2. What is wrong with the Kantian view that extends equal rights to all rational beings,
including women and minorities? What would Baier say? What do you think?
- I believe that what is wrong about the Kantian view is that, people should not have equal rights
that include minorities because I believe that minors should first be taken care of.
30
3. Baier seems to reject the Kantian emphasis on freedom of choice. Granted, we do not
choose our parents, but still don’t we have freedom of choice about many things, and
isn’t this very important?
- We do not have an option to choose which parents we would want because our parents are
the ones who created us and it is their decision. Yes, we have freedom of choice about many
things and we must decide carefully about our actions so to not regret it. And that we should
not let other people dictate what we should do because we know ourselves better than the
other people.
31
CHAPTER 2
CYBER ETHICS
2.1 INTRODUCTION
As a member of our society, each and every one of us has our own roles to play. We are
all living in a generation of technology that continuously develops. But before we move on, we
first must know what technology is. Technology I believe is the creation, application, adjustment,
and knowledge of looking for a solution to a problem. Technology can also improve a former
solution to a problem to be able to provide a better service or product.
Technology started with the Paleolithic or the Old Stone Age which was dating back
from 2.5 million years ago until 10,000 BC. Early human beings have been using stones as tools
and it has greatly helped their lives because it is the only tool that they have for them to
perform a task. There are a lot of kinds of stones and each and every kind of stone has its own
use depending on the situation that they may come up to. If we compare the uses of stones
back at the Paleolithic or the Old Stone Age and the modern day uses of stones, we would find
out that a lot of change has happened. Our human ancestors used stones as tools in order for
them to perform a task such as hunting, butchering skeletons, chopping, taking an animal’s skin,
forming another tool, and etcetera. While the uses of stones nowadays are just for building
structures, for industrial purposes such as extracting the chemical properties for farming and
manufacturing industry and etcetera. Just like the Paleolithic or the Old Stone Age, we also have
a lot of kinds of stones and the uses of each and every kind of stone has changed as well
depending on what it is made of, where we would put it to be used as a decoration, which stone
is better to use at constructing buildings, houses, and etcetera. There are machines nowadays
that could have a test on stones for them to achieve the different characteristics of stones that
depends on its kind. And there are also machines nowadays store a lot of information about the
different types of stones that could be found in the internet with only a few button presses. The
reason for these changes is that we have newly innovated tools which can perform much better
than how stones we used before. The tools that we use nowadays are much improved in a lot of
ways; I can say this because we do not have to use stones at our generation since there are a lot
of tools with different features and functions that have been created by different people. The
discovery of fire for our human ancestors was a turning point from the Paleolithic or the Old
Stone Age. The discovery of this is a turning point because they can now use fire when they are
feeling cold; they can now fire for cooking which improves not only the taste but also the
nutrients that they could gain from it. The use of fire for cooking can also widen the type of
foods that could be eaten. The clothing and shelter that were used by the early human beings
32
from the Paleolithic or the Old Stone Age were more of just fur and skins that could be taken
from an animal.
Neolithic Period or the New Stone Age dated back from 10,000 BC to 300 AD. This
evolution of technology from the Old Stone Age to this New Stone age has become more
technological in a lot of ways. There has been a great increase of population which means that
labor of different types would be more available. These people should be specialized in different
types so that they could focus on different things because imagine if there are a lot of people
specialized in just one type of work, people would just have to compete with each and every one
who is specialized in which he or she is specialized in. These people should work hand in hand
with each other for them to provide an effective service or for them to produce a product with
quality. Metal Tools stepped up at this period and has become more effective than using stones
as tools because they can build a more firm structure. These metals could also be used not only
for construction but also as a weapon, as a tool for cooking food, and etcetera. The uses of
these metals from before compared to how metals are used nowadays are somewhat the same
because some of the tools that we use are metal and the only thing that is different is how it
was made and what is it made of. And it was also stated that metals can be used as weapons
and nowadays, metals are still used to make weapons and the difference that we can state is
also that it was only designed in a different way and maybe another kind of metal was used to
create these weapons to make them more powerful than we could imagine. These weapons are
dangerous and some of these weapons could kill a person with just one hit. There are also
weapons that could kill hundreds of people or maybe could wipe out a place. There are a lot of
sources where energy could be achieved. And one of the first known ways to achieve energy is
by the use of wind power from the sailboat. Energy is one of the essential needs of machines
from different kinds of industries because it is what powers the machine, or in other terms, it is
what makes the machine work. To serve as an example of an industry, I would talk about the
Information Technology Industry because it is a part of what this book is intended to discuss
about. The machines in the Information Technology Industry requires a lot of energy because it
is what makes the machine work, it needs power to produce an output. These machines in the
Information Technology Industry are called computers. These computers have different uses that
depend on the situation or industry you are in. We use these computers for our workload to be
done easier and to produce more accurate outcomes. These computers can also be used to
store data or information. These computers can be used as a source of communication. That is
why these machines require a lot of energy because imagine if you have a lot of information
stored in a computer and you run out of energy. Do you think you would still have access to
your information even if there is no power that makes the machine work? The answer is no,
because these information are stored into the Hard Disk Drive. This Hard Disk Drive is where
your files get stored and retrieved For you to transport products to different places, you would
33
most likely need to travel by foot but when they have discovered wheeled wagons, the
transportation of products are made easier, faster, and less tiring.
The evolution of technology has been improving quickly and almost anything could be
done automated. The Medieval to the Modern Period was a great technological advancement
because it is the time when they have discovered that the electricity could be formed into a bulb
which produces light. We need electricity for these light bulbs to work because we would not
even have light to brighten up a room when it is dark, we would not have light to brighten up
the streets when it is already night. This is also the period where in they have discovered the
electric motor, which commonly runs inside machines. An example of machines that requires
electric motors is an electric fan, blower, machine tools, household appliances, and etcetera. All
of this advancement in technology allowed a lot of possibilities that we may think of. Almost all
of these inventions have now been improved to provide us the best services or products that we
may want. Our wants are just like the evolution of technology because there are infinite
possibilities for technology and our wants never ends, if we have satisfied something we want,
there would be another thing that we would want and the process goes on.
2.2 ADVANTAGES AND DISADVANTAGES OF TECHNOLOGIES
Our world has been continuously improving in every aspect of technology. Despite the
constant evolution of technology it also has its positive effects and negative effects. There are
several advantages and disadvantages that are about technologies. One of these advantages
that has a concern about students is that, a computer can analyze the specific mistakes the
student has made and can react in a different way from the usual teacher- this leads the student
not only to self-correction, but also to understanding the principles behind the correct solution.
This is an advantage because there is a lot of information that a teacher could not provide the
students and the internet can. I believe that a student could learn a lot of stuff through the
internet and these students must learn to be independent so that they will be able to study on
their own. Being curious with a lot of things is a good thing in some ways because it leads to
self-studying and you can learn a lot of information from the internet. Another advantage is
that, when you store data into a database that has a security system, is that all of your
information that is stored will be safe from unethical actions done by people. Such actions that
are unethical is about, hacking; the data that you have stored into the database will most likely
be hacked if those people know that they can use some important information against you.
There are a lot more advantages in the Information Technology Industry and all of these
advantages today have made a big change, I can say this because it has made our lives easier.
Communication has also been improved in a way that conversing with other people is made
34
possible through your cell phones. Imagine if this technology was not invented, the only way for
us to communicate with each other is through writing to each other or by talking face to face.
After going through all of these benefits that the Information Technology Industry has given us,
we should remember that there are always disadvantages to each action that has been done.
One of these disadvantages is that it eliminates the jobs of the people since almost everything
nowadays can be done automated. To serve as an example, the live receptionists in many
organizations have been replaced by automated telephone answering systems. Another
disadvantage is that there could be some security breaches since the information are placed in a
database which could be possible to hacked or breached. These information could be destroyed
so the best thing for us to do is that we should have a backup of our files to avoid losing the
files that are important to us.
2.3 CYBER ETHICS AND THE INTERNET
According to Wikipedia, Cyber Ethics is the “philosophic study of ethics pertaining
to computer networks, encompassing user behavior and what networked computers are
programmed to do, and how this affects individuals and society.” Cyber Ethics I believe entitles
people that we should be responsible not only in our daily lives but also in the internet. This is
because we do not own everything that we see on the internet. We should never attempt to
perform any illegal activity so to avoid being in trouble. These illegal activities can be accessing
other computers which are not yours, spreading viruses around the internet and etcetera. And if
we do not become responsible users, we might hurt somebody else’s feelings by our wrong
doings. As I have said earlier that we do not own everything on the internet, this means that we
should not plagiarize some other person’s work, we should not be a part of those people who
pirate software. For the internet to run smoothly without any problems or complaint, we should
follow the 10 commandments that were created in 1992 by the “Computer Ethics Institute”.
These 10 commandments were created to guide the people through the use of computers and
the internet with the good intention.
These are 10 Commandments of Computer Ethics:
1. Thou shall not use a computer in ways that may harm people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other people's computer files.
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to false witness
35
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people's computer resources without authorization or
proper compensation.
8. Thou shalt not appropriate other people's intellectual output.
9. Thou shalt think about the social consequences of the program you are writing or
the system you are designing.
10. Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans.

Commandment 1
o
Simply put: Do not use a computer in ways that may harm other people.
o
Explanation: This commandment says that it is unethical to use a computer to harm
another user. It is not limited to physical injury. It includes harming or corrupting
other users' data or files. The commandment states that it is wrong to use a
computer to steal someone's personal information. Manipulating or destroying files
of other users is ethically wrong. It is unethical to write programs, which on execution
lead to stealing, copying or gaining unauthorized access to other users' data. Being
involved in practices like hacking, spamming, phishing or cyber bullying does not
conform to computer ethics.

Commandment 2
o
Simply put: Do not use computer technology to cause interference in other users'
work.
o
Explanation: Computer software can be used in ways that disturb other users or
disrupt their work. Viruses, for example, are programs meant to harm useful
computer programs or interfere with the normal functioning of a computer.
Malicious software can disrupt the functioning of computers in more ways than one.
It may overload computer memory through excessive consumption of computer
resources, thus slowing its functioning. It may cause a computer to function wrongly
or even stop working. Using malicious software to attack a computer is unethical.

Commandment 3
o
Simply put: Do not spy on another person's computer data.
o
Explanation: We know it is wrong to read someone's personal letters. On the same
lines, it is wrong to read someone else's email messages or files. Obtaining data from
another person's private files is nothing less than breaking into someone's room.
36
Snooping around in another person's files or reading someone else's personal
messages is the invasion of his privacy. There are exceptions to this. For example,
spying is necessary and cannot be called unethical when it is done against
illegitimate use of computers. For example, intelligence agencies working on
cybercrime cases need to spy on the internet activity of suspects

Commandment 4
o
Simply put: Do not use computer technology to steal information.
o
Explanation: Stealing sensitive information or leaking confidential information is as
good as robbery. It is wrong to acquire personal information of employees from an
employee database or patient history from a hospital database or other such
information that is meant to be confidential. Similarly, breaking into a bank account
to collect information about the account or account holder is wrong. Illegal electronic
transfer of funds is a type of fraud. With the use of technology, stealing of
information is much easier. Computers can be used to store stolen information. One
should not forget though, that doing so is unethical.

Commandment 5
o
Simply put: Do not contribute to the spread of misinformation using computer
technology.
o
Explanation: Spread of information has become viral today, because of the Internet.
This also means that false news or rumors can spread speedily through social
networking sites or emails. Being involved in the circulation of incorrect information
is unethical. Mails and pop-ups are commonly used to spread the wrong information
or give false alerts with the only intent of selling products. Mails from untrusted
sources advertising certain products or spreading some hard-to-believe information,
are not uncommon. Direct or indirect involvement in the circulation of false
information is ethically wrong.

Commandment 6
o
Simply put: Refrain from copying software or buying pirated copies. Pay for software
unless it is free.
o
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of
code is the original work of the individual who created it. It is copyrighted in his
name. In case of a developer writing software for the organization he works for, the
37
organization holds the copyright for it. Copyright holds true unless its creators don't
announce it is not. Obtaining illegal copies of copyrighted software is unethical.

Commandment 7
o
Simply put: Do not use someone else's computer resources unless authorized to.
o
Explanation: Multi-user systems have user specific passwords. Breaking into some
other user's password, thus intruding his private space is unethical. It is not ethical to
hack passwords for gaining unauthorized access to a password-protected computer
system. Accessing data that you are not authorized to access or gaining access to
another user's computer without his permission is not ethical.

Commandment 8
o
Simply put: It is wrong to claim ownership on a work which is the output of
someone else's intellect.
o
Explanation: Programs developed by a software developer are his/her property. If he
is working with an organization, they are the organization's property. Copying them
and propagating them in one's own name is unethical. This applies to any creative
work, program or design. Establishing ownership on a work which is not yours is
ethically wrong.

Commandment 9
o
Simply put: Before developing a software, think about the social impact it can have.
o
Explanation: Looking at the social consequences that a program can have, describes
a broader perspective of looking at technology. A computer software on release,
reaches millions. Software like video games and animations or educational software
can have a social impact on their users. When working on animation films or
designing video games, for example, it is the programmer's responsibility to
understand his target audience/users and the effect it may have on them. For
example, a computer game for kids should not have content that can influence them
negatively. Similarly, writing malicious software is ethically wrong. A software
developer/development firm should consider the influence their code can have on
the society at large.
38

Commandment 10
o
Simply put: In using computers for communication, be respectful and courteous
with the fellow members.
o
Explanation: The communication etiquette we follow in the real world applies to
communication over computers as well. While communicating over the Internet, one
should treat others with respect. One should not intrude others' private space, use
abusive language, make false statements or pass irresponsible remarks about others.
One should be courteous while communicating over the web and should respect
others' time and resources. Also, one should be considerate with a novice computer
user.
2.4 COMPUTER VIRUSES
Computers are just like us, humans. How can I say this? I can explain this concept by
proving that both, computers and human beings are vulnerable to a lot of things. Similar to us
people, computers get infected as well. People have imperfections, same goes with machines,
computers, gadgets, and etcetera. That is why information technology experts constantly
improve these in order to fix and improve on imperfections. In a similar way, humans need
experts as well and they are called doctors. We may sometimes ask ourselves why our machines
or our computers become slower and slower while it ages. And even though we take care of our
machines or computers very well, we can never avoid getting infected with viruses. Even though
how strong our computers may be and even though we have anti-viruses installed, there will
always be that one virus that could penetrate our machines. What are computer viruses by the
way? A Computer Virus according to Wikipedia is “a type of malware that, when executed,
replicates by inserting copies of itself (possibly modified) into other computer programs,
data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas
are then said to be "infected". Viruses often perform some type of harmful activity on infected
hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting
data, displaying political or humorous messages on the user's screen, spamming their contacts,
or logging their keystrokes. However, not all viruses carry a destructive payload or attempt to
hide themselves — the defining characteristic of viruses is that they are self-replicating
computer programs which install themselves without the user's consent.” There are a lot of ways
for you to avoid getting infected with a virus. One of these ways is for you to install an anti-virus
that is highly recommended or with high quality. Having your computer installed with an antivirus really helps because it protects your machine from getting infected with a virus but this
39
does not mean that your computer is perfectly safe. As I have said earlier, “there will always be
that one virus that could penetrate our machines.” We could be infected with a virus by our
carelessness. I can explain this by relating how we use our emails. I am saying that we should not
just keep on reading every email we get, especially when the one who sent us an email is a
random person and we do not know them. Those people who send emails to random people
sometimes contain file attachments, and these file attachments might contain viruses that could
damage our computers, could access our files, and pretty much the one who created the virus
can let his or her virus do what he or she wants to do. It is not enough that we have an installed
anti-virus on our computers, we should be smart users as well, and we should not be easily
tricked into something that could lead us to getting infected with a virus. An example of these
tricks that could lead us to getting infected is by simply believing every advertisement tells that
you have just won this amount, you are the winner of, and etcetera. I do not mean by this that
every advertisement that you see on the internet are fake but we should know when they are
real and when they are fake. Another way is by having our computers or machines scanned
daily using our anti-virus software because it really helps knowing that there is an application
that would take care of getting rid of all these viruses.
40
CHAPTER 3
ALL ABOUT GAMES
3.1 INTRODUCTION
A game, according to Merriam Webster Dictionary, is “activity engaged in for diversion
or amusement”. Our daily lives are not all about pure hard work. Sometimes if we think too
much about our work, we tend to become stressed about them. Although feeling stressed is
normal since there are no person in our world that does not feel stressed. So having these
information about thinking too much about work and having stressed, said, how can we now
reduce the feeling of being stressed? The article on TheWeek’s website is saying that there are
several health benefits that you can get from playing video games.
A benefit of playing video games is that these video games are therapeutic for children
with chronic illnesses. As it was said from the website, this means that “The University of Utah
released a study last year that examined the effects of regular gaming on children diagnosed
with illnesses like autism, depression, and Parkinson's disease. Kids who played certain games,
including one designed just for the study, showed signs of improvement in "resilience,
empowerment, and a 'fighting spirit.'" Researchers believe the games' ability to act on "neuronal
mechanisms that activate positive emotions and the reward system" helped improve kids'
demeanors as they faced the daily challenges of their illnesses.”.
Another benefit of playing video games is that it reduces stress and depression, as I have
said it from the earlier paragraph which could be seen above. As it was said from the website,
this means that “2009's Annual Review of Cybertherapy and Telemedicine included a study that
found that gamers who suffered from mental health issues such as stress and depression were
able to vent their frustration and aggression by playing video games — and showed a noted
improvement. The study hypothesized that games gave certain "Type A" personalities time to
relax in "a state of relative mindlessness" that allowed them to avoid reaching "a certain level of
stressful arousal" as they tried to relax.”.
It also says that video games provide pain relief is another benefit of playing video
games. And as it was said from the website, this means that “Video games don't just provide
relief from emotional pain. They can also help those who are suffering from physical pain.
Psychologists at the University of Washington developed a game that helps hospital patients
suffering from immense physical pain by using an age-old mental trick: distraction. The virtual
reality game "Snow World" put patients in an arctic wonderland in which they throw an endless
41
arsenal of snowballs at a series of targets, such as penguins and snowmen. Military hospitals
found the experience helped soldiers recovering from their battlefield wounds. The soldiers who
played "Snow World" required less pain medicine during their recuperation. ”.
It also says that video games improve your decision-making skills. And as it was said
from the website, this means that “Most video games require fast reactions and split-second
decisions that can mean the difference between virtual life and virtual death. Cognitive
neuroscientists at the University of Rochester in New York found these games give players'
brains plenty of practice for making decisions in the real world. Researchers suggest that actionoriented games act as a simulator for the decision-making process by giving players several
chances to infer information from their surroundings and forcing them to react accordingly.”.
There are a lot more benefits that you could gain from playing video games, not only
video games by the way, but all kinds of games such as sports, tabletop games, role-playing
games, business games, and simulation. Playing games is not just for kids, it is for all ages
because it does not mean that when we grow up, we cannot play games anymore, this is a false
statement. I believe that playing games is not just fun but it can also be good for our health
because it reduces stress and we can also gain benefits from playing games. We can also learn a
lot from playing video games just like it was said a while ago, that playing video games help
improve our decision-making skills so this means that playing video games can also be used as
an educational tool. I believe that this would be a perfect activity for students because these
students does not only become happy but they also learn, but of course, we should pick what
kinds of games we would introduce to students for them to learn something from the activity
that will be done.
After talking about all of these benefits or advantages of playing video games, the
disadvantages about playing games will never be absent. And there are several disadvantages of
playing video games as well. One of these disadvantages is that there are some kinds of games
that are available for single player only. This means that it could isolate you from your family
and friends when you put too much attention to the game.
Another disadvantage of playing video games is that you could most likely be addicted
to playing video games and this is a bad thing because it could take you a lot of hours just
playing around rather than doing work. We should learn to balance the time when we will work
and the time when we will play around.
3.2 GENRES OF VIDEO GAMES
A Gamer, according to Merriam Webster Dictionary, is, “a person who plays games and
especially video or computer games”. Each gamer has his or her own preferred genre of a video
42
game and there are various genres of video games such as Action. According to Wikipedia,
Action Game Genre means that “An action game requires players to use quick reflexes, accuracy,
and timing to overcome obstacles. It is perhaps the most basic of gaming genres, and certainly
one of the broadest. Action games tend to have gameplay with emphasis on combat. There are
many subgenres of action games, such as fighting games and first-person shooters.”.
Another game genre is Adventure. According to Wikipedia, the Adventure Game Genre
means that “Adventure games were some of the earliest games created, beginning with the text
adventure Colossal Cave Adventure in the 1970s. That game was originally titled simply
"Adventure," and is the namesake of the genre. Over time, graphics have been introduced to the
genre and the interface has evolved… Unlike adventure films, adventure games are not defined
by story or content. Rather, adventure describes a manner of gameplay without reflex challenges
or action. They normally require the player to solve various puzzles by interacting with people or
the environment, most often in a non-confrontational way. It is considered a "purist" genre and
tends to exclude anything which includes action elements beyond a mini game.”.
Another game genre is Strategy. According to Wikipedia, the Strategy Game Genre
means that “Strategy video games focus on gameplay requiring careful and skillful thinking and
planning in order to achieve victory. In most strategy video games, says Andrew Rollings, "the
player is given a godlike view of the game world, indirectly controlling the units under his
command." Rollings also notes that "The origin of strategy games is rooted in their close
cousins, board games." Strategy video games generally take one of four archetypal forms,
depending on whether the game is turn-based or real-time and whether the game's focus is
upon strategy or military tactics. Real time strategy games are often a multiple unit selection
game (multiple game characters can be selected at once to perform different tasks, as opposed
to only selecting one character at a time) with a sky view (view looking down from above) but
some recent games such as Tom Clancy's EndWar, are single unit selection and third person
view. Like many RPG games, many strategy games are gradually moving away from turn based
systems to more real-time systems.”.
There are a lot more game genres available to play and having to focus on one game
genre would make you become a Hardcore Gamer. A Hardcore Gamer may be represented as a
game geek. They are called like this because they are most likely to be the ones who lead in the
game they chose to focus and play on.
43
CHAPTER 4
THE LIFE OF A PERSON WITH A BIG DREAM
4.1 BEGINNING OF KYLE’S LIFE
On the fourteenth (14th) day of September in the year nineteen ninety three (1993),
Marissa and Anthony gave birth to their second son, Kyle. Kyle is the second and youngest child.
He has a brother, Basile, he was born on the twenty first (21) day of December, in the
year nineteen ninety one (1991) and works at Hewlett Packard Company (HP). Basile is a two (2)
years older than Kyle, he graduated in La Salle Greenhills (LSGH) and in De La Salle College of
Saint Benilde (DLS-CSB) with a Magna Cum Laude award. Due to this, Kyle has always looked up
to his older brother in hopes of reaching and even surpassing his brother’s achievements. In
addition to this, Basile also gives a portion of his salary for Kyle’s tuition fee for his college
education. This gives Kyle the motivation to strive and study harder; in order to give in return for
his brother’s love and sacrifice.
His father’s name is Anthony, born on the sixteenth (16) of January nineteen sixty two
(1962); who currently works for Tupperware Brand Philippines. Although Kyle might have
different physical features than his father, he and his father are similar in other aspects; such as
in interests, Kyle grew up passionate for cars, whether it be in magazines, movies or even video
games; he has inherited this from his father which had drag car racing as a hobby when he was
younger.
And lastly, his mother Marissa, she was born on the fourteenth (14) of November,
nineteen sixty four (1964); she currently works as a bank manager at Bank of the Philippine
Islands (BPI). Marissa takes care of Kyle and his brother; since she and her husband split during
Kyle’s teenage years. Presently, Kyle’s mom pays for all the house bills and for Kyle’s schooling.
They live in a small house in SSS Village in Marikina City. Their house sheltered for ten
(10) people; where in all his relatives lived in. Due to this, he grew up to be a person who loves
and cares for his family. He has his Uncle Michael, Aunt Michelle; three cousins, Cyrill, Andrei
and Nathan; his grandparents Oscar and Soledad; his parents Marissa and Anthony and his big
brother Basile.
44
The house was an old house bought by Kyle’s grandparents; thus, old furnishings and
furniture is evident. The house is a wide bungalow type of house with four bedrooms, three (3)
bathrooms and two (2) living rooms. Once people enter the house, the living room will be the
first thing they will see, the living room is furnished with traditional wood furniture; from Laguna,
where Kyle’s grandparents are from. The living room is usually where everyone hangs out and
relaxes; thus, it has a flat screen television and surrounds sound good for movie nights with the
family. The second living room is where all the family pictures are placed and where all the toys
of his younger cousins are put in place. The second living room has a piano; however, no one in
the house plays it. Next to the living room is the dining area, it is circular table where most of
the people in the house dine; however, since the table cannot accommodate ten (10) people all
at once, people in the house eat in two batches. The dining area has the refrigerator, kitchen
counters and cabinets that serve as pantry where in all dry gods and chips are placed. There is a
door in the dining room leading to the kitchen; this is where the food is cooked. The house
usually cooks dishes which are specialties from Laguna and family recipes; Kyle’s mother and
grandmother usually does the cooking in the house aside from the maid. Kyle sleeps in a big
room together with his grandmother, grandfather, brother and maid. The room is where he
spends most of his time; the room is where his computer is placed, so he does all his play and
school work. There is also a small section of the room dedicated for fitness; there are gym
equipment such as weights and barbells. The house has a garage with three (3) cars; one (1)
green Toyota Starex van which is what he and his family uses most of the time, silver Toyota
Altis and a blue Tucson which is what his other relatives and cousins use when they need to get
somewhere.
4.2 PRE- SCHOOL
Kyle started schooling when he was three (3) years old; he studied in La Salle Green hills (LSGH)
because of his mother’s influence. Since Kyle was the youngest child, he grew up fond of his
mother and other relatives. His mom would always tell him that he was still his baby; sending
him to school was a difficult milestone to make. Since Kyle’s birthday was in September, he
turned four (4) in the middle of his nursery year. Little did he know that this will be the start of
the never ending flame and spirit brought about by his alma mater; La Salle.
During his pre-school years, he was the shy and quiet type of person; this may have been
the result of being the youngest in the family and a mama’s boy. Therefore, he did not like
joining in various pre-school presentations. Due to the fact that little Kyle was not used to being
45
away from home, there was an incident where he was walking through the school corridors
crying because he was so hungry; until a Lasallian brother from the school saw him and bought
him a doughnut from the school’s cafeteria. When Kyle was in his pre-school years, he was
already given money by his parents; as a result, Kyle started to save money as early as this. He
would save the money given by his parents so that he could buy himself toys and other things
he would want without asking from her parents.
He performed well in pre-school years and this is where his growth started to begin; Kyle
was the type of student who quietly participates in class and was never absent or late. As a result
to this, he incurred high grades that made him eligible to apply to the same school for his
elementary years.
Kyle’s pre-school graduation was a very memorable moment for everyone in the family;
as this marked the moving up of the family’s youngest member. Everyone attended Kyle’s
graduation, his parents, his brother, his grandparents and his aunts and uncles. This is where
Kyle and his classmates performed “You will be in my Heart” by Mr. Phil Collins from the movie
The Tarzan.
"You'll Be In My Heart"
Come stop your crying
It will be alright
Just take my hand
Hold it tight
I will protect you
From all around you
I will be here
Don't you cry
For one so small,
You seem so strong
My arms will hold you,
Keep you safe and warm
This bond between us
Can't be broken
I will be here
46
Don't you cry
'Cause you'll be in my heart
Yes, you'll be in my heart
From this day on
Now and forever more
You'll be in my heart
No matter what they say
You'll be here in my heart, always
Why can't they understand the way we feel?
They just don't trust what they can't explain
I know we're different but deep inside us
We're not that different at all
And you'll be in my heart
Yes, you'll be in my heart
From this day on
Now and forever more
Don't listen to them
'Cause what do they know (what do they know)?
We need each other
To have, to hold.
They'll see in time
I know
When destiny calls you
You must be strong (you gotta be strong)
I may not be with you
But you've got to hold on
They'll see in time
I know
We'll show them together
'Cause you'll be in my heart
Yes, you'll be in my heart
47
[another version says: "Believe me, you'll be in my heart"]
I'll be there from this day on,
Now and forever more
Oh, you'll be in my heart (you'll be here in my heart)
No matter what they say (I'll be with you)
You'll be here in my heart (I'll be there), always
Always
I'll be with you
I'll be there for you always
Always and always
Just look over your shoulder
Just look over your shoulder
Just look over your shoulder
I'll be there always.
4.3 GRADE SCHOOL
Kyle also continues his elementary schooling in La Salle Green hills (LSGH); and these
were the years where Kyle and his family travelled a lot. They went to Hong Kong (HK), where in
they got to experience and see what is was like and the family also got to bond in Disneyland.
They also went to the United States of America (USA) where they visited relatives in Los Angeles
(LA), California. This is when Kyle discovered his love for travelling and going to different places;
discovering new things, meeting new people and observing other people’s culture.
His elementary years were when he grew and became more independent as a person.
Unlike his experience during his pre-school year, due to the fact that he was moving up to the
same school; therefore, he adjusted very well to the environment and the people.
This is where he gained friends and fights with others; this is where he grew and
discovered more about himself. This is where he developed his skills and knowledge. Despite
gaining new friend; another part of his experience was fights he encountered with other
classmates. When Kyle was in the first grade he made friends and made buddies with them; this
made it hard for Kyle to transition himself to the second (2nd) grade because he was not used to
not being with his first (1st) grade friends. However, this made Kyle learn and experience that
people in life come and go that is why; he should be friendly and always treasure his friends so
that he can have someone to lean on in the future in times of trouble of problems.
48
Since Kyle is a Roman Catholic, on his third (3rd) grade in elementary he was already
preparing for his first communion. This was a milestone that he did not understand the
importance at first; however, now that he is all grown up, he has realized it importance and
significance for Catholics. Kyle grew as a God fearing person; because of the values and morals
instilled by his grandparents and parents who are very religious. He would go to church every
Sunday with the family and would pray before and after each meal and before they go to bed.
Thus, when Kyle was preparing for his first communion in school he had learned the significance
of the “Blood and Body of Christ” and the significance of confessing since to the Lord. Kyle’s first
communion was a remarkable memory for his family as all his relatives witnessed and watched
him go through what every other Catholic has gone through. The school would constantly
practice the flow of the holy mass until everyone got it perfect and knew it by heart. As a result
to this, Kyle has mastered the flow of the mass and all its prayers and songs played during mass.
Glory To God In The Highest
Glory to God in the highest
And peace to His people on earth
Glory to God in the highest
And peace to His people on earth
Lord God, Heavenly King, Almighty God and Father
We worship You
We give You thanks
We praise You for Your glory
Glory to God in the highest
And peace to His people on earth
Glory to God in the highest
And peace to His people on earth
Lord Jesus Christ, only Son of the Father
Lord God, Lamb of God
You take away the sins of the world
Lord, have mercy on us
You are seated at the right hand of the Father
Receive our prayer
49
Glory to God in the highest
And peace to His people on earth
Glory to God in the highest
And peace to His people on earth
For You alone are the Holy One
For You alone are the Lord
For You alone are the Most High
Jesus Christ
With the Holy Spirit
In the glory of God the Father
Glory to God in the highest
And peace to His people on earth
Glory to God in the highest
And peace to His people on earth
Anima Christi
Soul of Christ
Sanctify me
Body of Christ save me
Water from the side of Christ
Wash me, Passion of Christ
Give me strength
Chorus:
Hear me Jesus
Hide me in thy wounds
That I may never leave thy side
From all the evil that surrounds me
Defend me and when the call of death arrives
Bid me come to thee
That I may praise thee
With thy saints forever
50
Soul of Christ
Sanctify me
Body of Christ save me
Water from the side of Christ
Wash me, Passion of Christ
Give me strength
Chorus:
Hear me Jesus
Hide me in thy wounds
That I may never leave thy side
From all the evil that surrounds me
Defend me and when the call of death arrives
Bid me come to thee
That I may praise thee
With thy saints forever
One More Gift
One more gift
Refrain:
If there's one more gift
I'd ask of you,
Lord it would be peace here on earth
as gentle as your children's laughter
All around, all around
Verse 1:
Your people have grown weary
Of living in confusion
When will we realize
That neither heaven is at peace
When we will live not in peace
(Refrain)
One more gift
Refrain:
If there's one more gift
I'd ask of you,
51
Lord it would be peace here on earth
as gentle as your children's laughter
All around, all around
Verse 2:
Grant me serenity within
For the confusions around
Are mere reflections.
Of what's within.
What's within in me?
(Refrain)
One more gift
Refrain:
If there's one more gift
I'd ask of you,
Lord it would be peace here on earth
as gentle as your children's laughter
All around, all around
These are the songs that Kyle remembers singing in his first communion. This was
memorable for him because for Catholics, taking the body and blood for the first time is very
significant. After this, he has paid more attention when it comes to listening to the mass because
he is no longer a child; however, he is an angel and symbol of God.
With regards to his academic performance in grade school; he never had interest in Math
and Science subjects. Although he did not have much failing subjects; these subjects just do not
seem to catch his interest and attention. Thus, learning Science and Math became difficult for
him growing up. However, despite his lack of interest for Math and Science; he loved his
computer subject. He found himself very relaxed upon studying computers in class even when
he was still in elementary. He was fond of computers at a very early age and understood easily
lessons about them. Working with computers had him interested and he was a fast learner.
On his fourth (4th) grade, another significant milestone was experienced by Kyle. When
he was ten (10) years old, he was circumcised. Circumcision is the surgical removal of
the foreskin (prepuce) from the human penis. The procedure is most often elected for religious
reasons or personal preferences (Wikipedia, 2013) He underwent circumcision together with his
big brother, Basile, who was already in the seventh (7th) grade then. However, since at that time
Kyle did not have many friends who had gotten circumcised as well, he did not know what to
52
expect. He did not try using the computer and searching it online because computers then were
not as fast and were outdated. They both did it at the same time because they both wanted to
experience it together as brothers in order to keep themselves brave during the operation and
recovery period. They were circumcised in Medical City. They have both done this during their
summer breaks in order to not disrupt their schooling.
Aside from these, Kyle has also gotten into bad actions. There was an incident when Kyle
and his classmate had an argument. This resulted to both of them being sent to the principal’s
office. Kyle was not aware at that time that any form of violence towards students and teachers
on school premises. This led to Kyle’s first disciplinary warning; which made his mom very upset.
However, his mom forgave him right after once Kyle had explained the situation and had
happened. From this experience, he learned that it is very important to keep cool when tensions
start to rise and to always manage one’s temper, as to not make bad decisions which can result
to bad actions and effects that one will eventually regret after.
Kyle also went to fieldtrips facilitated by the school. He went to Enchanted Kingdom; a
theme park located somewhere in Laguna; it was his second (2nd) time being there when he
went. He found it fun because he was with all his friends. He rode all the rides his classmates
would ride except for the roller coasters. Kyle had a strong fear of roller coasters as it made him
feel like he was going to die. Therefore, as to this day, Kyle has never ridden a roller coaster.
Aside from this, Kyle also played different games in Enchanted Kingdom; games such as,
basketball, ring toss and other games which are usually found in fairs and theme parks. Despite
the simplicity of these games; it still is difficult for him because he has not mastered the skills
needed in order to do well on particular games. Thus, Kyle tried to make the most out if in order
for him to gain and learn new skills and also to keep him active. Presently, one can see the
significant difference between the games played in fair and traditional theme parks versus the
type of games the youth plays today; games played by younger generation focuses more on
computer skills and just require brain activity and minimal physical movement unlike games
such as the one in Enchanted Kingdom that keep people active. However, despite Enchanted
Kingdom’s popularity among families and kids, they still do not get rid of these traditional
games that take people away from the usual. Thus, Kyle will never ever forget his experience;
and up to this day, still remembers the cheerful song played throughout the park.
He also went to Manila zoo with his schoolmates; this is where he was and learned about
different animals. Which he then used for his science home works from school. It was his first
time going to Manila Zoo that time, he was amazed by all the animals and different creatures he
saw. He saw different insects such as beetles, moth, butterfly, worms, and so on. This is where he
learned that butterflies and moths were two completely different creatures. He learned a lot
53
about the habitat of various animals. He also saw exotic animals that can only be found in the
wild such as tigers, bears, peacock and so on. He also saw the different snakes and learned how
they live; he also learned that these snakes crush and wrap around their pray or bite them and
their venom in order to defend themselves and live. He also learned that these wild animals do
their best to survive; by either competing with others, depending on others or adapting to the
habitat they are in; since they do not have a choice and because they only have one chance for
survival. Throughout the tri he had learned that the animals he saw caged was there for a reason
in order to prolong and preserve it life and its existence; because by not doing so, these
creatures have a great chance of being extinct. As a result, the people keeping Manila Zoo alive
tries their best to produce and prolong the existence of specie and animals created by God in
order for others and for the younger generation to see, hold and learn about. Kyle has learned
all of this from his experience and journey to the zoo; which for him was much more valuable
and worthwhile rather than just Google-ing them online.
Studying for Kyle has been very difficult and challenging. Therefore, his mother enrolled
him in tutoring class to help him improve on his studies and help with studying; since his mom
is very busy and does not have time to teach and study with him. This helped Kyle with his
studies; he achieved the required grades in order for him to pass and make through his
elementary years. Tutoring Kyle was also an advantage because unlike today with the presence
of internet, he did not have enough resources at hand in order to help him study, do home
works and research.
4.4 SOCIAL MEDIA: FRIENDSTER
Another significant development during Kyle’s elementary years was Friendster.
According to Find the Best, Friendster is a leading global online social network. Friendster is
focused on helping people stay in touch with friends and discover new people and things that
are important to them. Online adults, 18 and up, choose Friendster to connect with friends,
family, school, social groups, activities and interests. Friendster prides itself in delivering an easyto-use, friendly and interactive environment where users can easily connect with anyone around
the world via www.friendster.com and m.friendster.com from any Internet-ready mobile device.
Friendster has a growing portfolio of patents granted to the company on social networking.
During Kyle’s elementary years, Friendster was a very popular social networking site and
one of the first that he and his peers have used. Due to this, he and his friends spent of their
time online using the computer. With this site, people could post pictures, messages,
54
relationship status and other personal information about a person, Thus, Friendster was a tool
used by others to meet new people.
One of the main features of Friendster is the ability to add friends which will enable them
to see one’s profile. Kyle would add and submit friend requests to his friends, family, celebrities
and even people he would like to get to know. This resulted to him meeting new friends and
making new friendships with other people.
“Pahingi ng testi!” (Can I have a testi?)
This was one of the marking memories Friendster would have on Kyle. This phrase was one of
the popular phrases he would hear and say to other people. Testi is short for testimonials. Based
from the Merriam-Webster dictionary, testimonial is a statement testifying to benefits received;
character reference; expression of appreciation; letter of recommendation. In Friendster, this is
where friends, families and strangers would comment on one’s profile writing things about the
user; it can either be funny, offensive and sweet. However, this fast trending activity was done by
a lot of people and people would even as for it!
Public sharing is another feature of Friendster; users would make profiles of themselves;
wherein they put information about themselves, interests, age, gender, relationship status, job,
school and etc. However, a good feature on Friendster is people have the choice to make their
profiles private or public; depending on their preferences towards their privacy.
Another aspect of public sharing is the sharing of thoughts and photos. People have the
privilege to post their thoughts; which can either be quotes, things that happened, something
they would want to tell others, announcements, news and etc. Kyle kept himself entertained at
times just by reading posts made by his friends. He was interested on reading how his other
friend’s days have been. His Friendster was filled with different posts; may it be about their
birthdays, storms, and issues, experiences in and outside of the country, cravings, wants,
different quotes on life and love and a lot more. Basically, the site promotes that anyone can
post anything under the sun; therefore, there is not really a rule or a filter whenever people post
offensive things online. This would result to feuds and fights among Kyle’s friends on Friendster.
He would see people saying bad things to other people; either it be about boys, school or issues
among friends. Kyle has witnessed this himself, he would see his friends post mean things about
others. This made him realize that publicity can harm other as well; due to the fact that most of
the things people may post can be seen publicly by other people.
55
Friendster also gives the privilege for people to post albums and photos for their friends
to see. With this, Kyle got to see his cousins from abroad which he has not seen in a long time.
For him, it seemed that the world was smaller and that the site brought people much closer
together because communication among friends and family was much easier; as compared to
old ways of communicating, such as e-mails, snail mails and etc.
Despite this, Kyle did not like the fact that he could not limit the people who can see his
photos; thus, people had the chance to see photos that were not meant to be seen by friends
only by family and photos meant to be seen by family and not by friends. Therefore, Kyle had
gone through people teasing him and making fun of him due to pictures posted; for the reason
that he knew that he could not please everyone he also knew that everyone had their own
opinion.
Another thing that Kyle liked about the social networking site was the groups; groups are
usually made by other Friendster users in order to promote a certain thought, celebrity, movie,
song, singer, actress and anything that interests them. Basically anyone who also had the same
interest could join the group; and there people could post things and testimonials on the
comment page. Kyle liked interacting and knowing that other people also had those same
interests as he has.
With the popularity of Friendster, issues such as stalking, threatening and even hacking
arose. Stalking was a problem most people had at that time, since most people can freely and
publicly post and view photos and information about a person. Most people stalk and follow the
people they idolize, hate and even have a crush on; which for most people found irritating,
annoying and scary.
When he was in sixth (6th) grade, the use of Friendster got out of hand, because one of
his friends had a fight with the teacher during class and he posted something rude and bad to
his teacher. This all started when his classmate, Michael got very noisy to the point that the
teacher yelled at him and embarrassed him in front of everybody in his class; in addition to that,
the teacher sent Michael to the principal’s office in which he got scolded by the principal. When
Kyle got home and checked his Friendster account, which was already part of his everyday
routine, he saw that Michael posted a cartoon picture, representing is teacher, with the caption:
“I am the worst teacher ever! I will make your life miserable!”
56
This post made by his friend lit up flames in Friendster; little did Michael know that what
his action would only make things worse. As a result to what he had done, he had been called to
go to the principal’s office the following day. This is where the principal, again, scolded him for
posting inappropriate words and pictures towards his teacher. The talk with the principal
resulted to a three day suspension given to Michael. As a result to the incident, all elementary
pupils of Kyle’s school was reminded and given a talk about the proper use of the internet and
social media. This is where the speakers emphasized that:
“Always be watchful and careful of everything you post and say publicly; not just in Friendster or
other social media sites but in real life as well.”
This is where Kyle learned that the use of social media also had its disadvantages,
although the use of Friendster turned out to be fun; he always remembered that it could easily
be a facilitator for fights and issues if people do not watch and monitor what they say.
In two thousand and five (2005), Kyle and his whole family went to Hong Kong (HK)for
three (3) days and two (2) nights; though the stay was short, he still had a lot of memories kept
and treasured. This was during his semester break; it was his first time to go out of the country
and so he was so excited and happy. Kyle would post pictures that he wanted to share with
everyone, such as pictures when he and his family went to Hong Kong (HK). They stayed at
Marco Polo Gateway Hotel; he found the hotel he stayed at unique because it had a shopping
mall under it. This is where he would take pictures and email it to relative in Manila to see if they
wanted them to buy something in Hong Kong (HK) as “pasalubong” to give out for other people
when they get back to the Philippines. Kyle’s first trip to China was a memorable experience for
him because that is where he saw the Chinese’ people passion for entrepreneurship and buying
and selling of goods. Malls in Hong Kong (HK) were jam-packed with shoppers and Chinese
sellers. He then went to Disney land and Ocean Park; he was so excited because he would just
see those places in the internet and on television before. He and his family took a lot of pictures
as remembrance and Kyle posted most of the pictures on his Friendster account because he
wanted to share his experience and his happiness to all his friends.
4.5 GRADE SCHOOL GRADUATION
Finally, after seven years in elementary, Kyle graduated in the year two thousand and
seven (2007). He graduated like how most of his batch mates graduated; having an average
performance throughout his elementary years. The school celebrated the graduation ceremony
57
on campus; where Kyle brought his whole family: his mom, dad, big brother, grandmother,
grandfather and nanny. Kyle’s parents took lots of pictures of him and his friends since some of
his best friends were leaving the school and moving to another school for high school and some
of his friends leaving for schooling out of the country. This is where he truly understood the
message and meaning of the alma mater of his school; because it was played during his
graduation and his whole batch sang it with heart and passion.
Alma Mater Hymm
Hail, Hail
Alma Mater,
Hail to De La Salle!
We'll hold your banner high and bright,
A shield of green and white,
We'll fight to keep your glory bright,
And never shall we fail,
Hail to thee our Alma Mater!
Hail! Hail! Hail!
This is where he realized, that he was part of a family, the Lasallian family. This was the
last moment they could all be together in school; thus, this was a bittersweet memory and
moment for Kyle. However, Kyle kept reminding his friends that they would still keep in touch
with each other, either through phone, e-mail (electronic mail) or Friendster.
4.6 HIGH SCHOOL
Kyle’s transition from elementary to high school was very hard for him; he did not expect
what will happen, how the teachers are going to be like and who his friends will be. The night
before his first (1st) day of classes, he checked his Friendster and Multiply account and ask other
people what their classes and sections were; he also saw a lot of posts from different friends
nervous and anxious about first day of classes, he knew for sure that he was not alone. He
prepared himself a week before the first (1st) day of classes, he bought new bags, school
supplies, had a new haircut and also read a lot of articles on what to expect on first day of
classes.
It was the most nerve wrecking day of two thousand and eight (2008), Kyle first day in
high school. Although he still went to the same school that he went when he was in elementary,
58
he still was nervous since he did not know if his old friends would talk to him or would have new
set of friends. Due to the fact that most of his friends transferred to a different school and for
some, to a different country; Kyle resorted to being his shy and timid self during first (1 st) day of
classes. During first (1st) day of classes he was seatmates with a guy; having curly hair and tan
skin, Francis, this was Kyle’s one of his best friends up to now. He thanked his lucky stars that all
was well for him in the first (1st) day of high school and this for him determined an amazing
journey to come.
One significant memory of Kyle is when his teacher, on the first (1st) day of school made
the, say seven (7) things that is unique about them. Kyle found this difficult because he thought
he was just like everybody else; the average teenager.
He did participate in the activity;
however, he did not finish the seven attributes and skills he only mentioned four.
1. Born on the fourteenth (14) of September in the year of nineteen ninety three (1993)
2. Youngest of two (2) brothers
3. Does not know how to swim
4. Loves playing and using the computer
Despite this, his teacher understood even him he did not accomplish the seven (7)
adjectives, the teacher lectured the class that it is normal that most people in the class would
not be able to finish the activity; due to the fact that it was just first (1st) day of classes and that
everyone will still have time to discover themselves and grow, throughout the four (4) years of
high school.
Physical Education (P.E.) was one of Kyle’s most hated subjects when he was in high
school. Though he was physically active, he did not like the fact that his physical education (P.E.)
subject required the class to go swimming. Kyle is not afraid of water; however, he did not know
how to swim and he found this embarrassing. So, his physical education (P.E.) subject really set
him back because he would cut classes during physical education (P.E.) class and pretends to be
sick, injured and even makes a fake excuse letter copied and pated from Google so that his
teachers would believe him and excuses him from class. Although his swimming class would
actually teach the students how to swim, he still did not like the feeling of being behind and
possibly being the only one who did not know how to swim. Although he has already been
given violation reports for skipping class and not attending physical education class, he still did
not mind this. As a result of this, Kyle got fairly average and low grades for his Physical
Education (P.E.) subject.
59
As said by his teacher during his first (1st) day of classes;
“High school will be the four (4) years of your life where you will learn more about yourself and
grow as a person.”
4.7 SOPHOMORE YEAR
Kyle has truly grown and experienced a lot during his high school years; he has learned
that he was the type of person who always wanted something new and something different. He
got bored with the routine activities and undertakings done in school. This is where he starts
thinking about other things he could do; he asked and talked to his friends on Facebook and
other social media sites on how to skip classes and on what to do in school. He also searched on
Google ways on how to cut and get out of the school without getting caught. Kyle already had
an initiative on skipping classes, he had the intention of making not going to school and just
copy and forge the signature of his parents so that he could get away with it.
On the first (1st) day of his intention of skipping class, he did not go inside the campus
and school when his mom sent him to school. He waited outside and sat on the waiting bench
telling his mom that he would just be waiting for his friends. Little did his mom know that Kyle
already spoke with some of his friends the night before that they would not be attending
classes. Although Kyle felt guilty by betraying and lying to his mother, he got tempted with the
option of going out with his friends rather than going to school and studying.
However, Kyle and his friends still did not get away with what they have done. All of
them have received violation reports and warning letters given by the principal with a letter of
warning indicating that they have already skipped classes for five (5) days already. This did not
stop Kyle with his agenda of not attending classes; he forged all the warning letters with the
signature of his mom so that he could get away with what he has done and do it again.
On the other hand, Kyle did not know that his mom was already getting suspicious about
what Kyle was doing. His mom searched online on what to do with the situation at hand. Since it
was a growing trend in her mom’s workplace to search and Google everything. She has read an
article on how to have a tracker on a phone. This is what Kyle’s mom did, she put and
programmed Kyle’s phone to have a tracker so that his mom would know where he is every
second and every minute of the day.
60
Kyle’s mom used the tracker the following day she got it installed on Kyle’s phone. This is
where his mom found out what Kyle has been doing. She knew immediately that Kyle was not at
school but in other places; such as Green hills, Megamall and other malls and public places near
La Salle Green hills (LSGH).
As a result to this, Kyle’s mom went to Kyle’s school (La Salle Green Hills) to talk with the
principal and find out how many days he has been absent and not attending classes. She then
found out that Kyle has been forging her mom’s signature so that he could get excused from
being absent all the time. This made Kyle’s mom very upset and disappointed because his mom
did not know that he could do such a thing.
The following day, he got called by the principal for a confidential meeting. It was to his
surprise to his mom there in the principal’s office. Right then and there he knew that he got
caught and he was in big trouble. The principal laid out all the excuse slips and warning letters
where Kyle had forged his mom’s signature; furthermore, the principal informed his mom of his
truancy case. This resulted to Kyle having a major offense of thirteen (13) forgery cases and
seven (7) unexcused truancy cases.
The principal of his school informed Kyle and his mom that he is subjected to expulsion
due to his numerous cases that were not backed up with exceptional grades. Therefore, Kyle got
really worried as he did not realize the gravity and effect of what he has done in the past.
Luckily, his grandmother and the vice principal are close friends; Kyle’s grandmother talked to
the vice principal pleading for consideration for Kyle. This was granted. However, Kyle signed a
promissory note or contract stating that from this day on he would not have any offenses, minor
or major or else it would cause for immediate expulsion. This really straightened up Kyle’s
behavior and attitude in school; he needed to have the proper uniform, haircut and he could not
be late or else he might get expelled.
Things for Kyle were not getting any better. Problems he had from schooled has moved
to their home. It was already usual and normal for Kyle’s parents to be arguing and fighting all
the time. However, as time went by during Kyle’s sophomore year, things have not been getting
better at home; they were only getting worse. His parent’s relationship was slowly getting
broken and Kyle did not expect this. Kyle grew being fond of his father, as they shared the same
interests; about cars, computers and even alcohol. To Kyle, his father was a very approachable
and cool man. That is why he did not expect that his parent’s relationship will be at its worst,
because he knew and expected that things will get better between them eventually. Yet this did
not happened, his parents fought more and more as days and weeks went by; and this really
61
worried Kyle and his brother Basile. Kyle was afraid because he did not know what it was like to
have an incomplete family; as he would just read those types of experiences in books, internet
and social media by posts written by his friends. One day all of a sudden on the verge of a very
bad fight; Kyle’s dad got and packed all his stuff and left the house. Kyle and his brother cried as
their father left the house; because they did not want anyone to fight and leave. However, this
did not stop his father. Up to now, his mom and dad are separated.
All of this happened d\uring Kyle’s sophomore year in high school. It can be said that
this was a roller coaster type of experience in his life.
4.8 TWENTY THREE: A NEW BEGINNING
Kyle’s junior year in high school started off as a pretty boring, ordinary and usual year;
due to the fact that he was not able to break rules anymore and also due to family problems at
home. The only thing that Kyle had to do to keep him company was his friends. He did
everything with his friends; and they spent every lunch together, went out together during the
weekends and even had study groups to make school more fun.
Although he was had a lot of limitations in school and is strictly bounded by rules that he
had to comply and follow; he still had a hard time coping with the studies of subjects and
grades for high school. Every day after school, he would go to a tutor where he will receive help
in terms of doing his homework, studying for a quiz or exam.
On the fifth (5th) of September in the year two thousand and nine (2009), Kyle and his
friends went to a mall to watch a concert of an international dance icon. He and his friends went
to Alabang Town Center (ATC) an old mall in Muntinlupa City where they watched
Jabbawockeez, a famous dance group that won in a hit American dance contest television
show, America’s Best Dance Crew (ABDC) which was produced by Randy Jackson, an icon known
for his appearances as judges for American Idol (AI). The Jabbawockeez dance crew won the first
season of America’s Best Dance Crew (ABDC) which made them very famous as they were the
pioneer winners of the show. The Jabbawockeez dance crew became a very famous in the
Philippines as some of their members are Filipinos and are from the Philippines.
Kyle and his friends watched Jabbawockeez dance crew’s very first dance concert in the
Philippines at Alabang Town Center (ATC) for free. They enjoyed and had a good time since this
62
was their first time going to Alabang Town Center (ATC) which was the farthest mall they have
ever gone together as a group.
When they were on the way home, walking around Alabang Town Center (ATC), one of
Kyle’s friends, Francis saw his cousin and aunt in Alabang Town Center (ATC). So Francis’ aunt
accommodated Kyle and his friends for free dinner at Burger King (BK). As Kyle and his friends
were waiting and sitting at the table waiting for their food, Janine’s school friends suddenly
came up and said “hi” to Janine and her friends snce they were all school mates. This is where
Kyle got attracted to one of the girl’s that came in. After the group of friends left Burger King
(BK) Kyle immediately asked Francis’ cousin, Janine “What is the name of the girl wearing
purple?” Right after, Janine gave him a cellphone number for Kyle to text.
When Kyle got home, he immediately texted the number his newly made friend gave
him. However, when he texted the number Janine mistakenly gave the wrong number and gave
another girl’s number instead of what Kyle was asking for. He then went online on Facebook,
talked to Janine and reassured that he wanted the number of the girl who was wearing purple;
Janine then came to her senses and gave the right number, the girl whom he was asking for was
Eunice, the girl who wore purple.
The following day, Kyle finally texted Eunice:
Kyle: Hello 
Eunice: Who is this? :)
Kyle: This is Kyle the guy from Burger King the other day. I asked your number from
Janine. Are you the one who was wearing purple that time? 
Eunice: Oh yes! I was wearing purple that time. Hey I do not have load anymore. Just
add me on Facebook maybe you could continue to talk to me there.  Eunice Vista.
Kyle and Eunice’ chat continued on Facebook when Kyle already added Eunice.
Kyle: Hey  So why were you at Alabang Town Center last Saturday?
Eunice: We were supposed to watch the Jabbawockeez dance concert but it was too
crowded so we watched a movie instead. 
Kyle: Well too bad the concert was great! We had a good spot so we had a nice
view of
the dance concert.
Eunice: Too bad! Where are you from? How did you know Janine? 
63
Kyle: I’m from La Salle Green Hills, and Janine is my best friend’s cousin. We did
expect to see her there; so we got surprised when Francis’ aunt invited us for
not
dinner
at
Burger King.
Kyle: I’m looking at you photos on Facebook.
Eunice: No do not look at them! I look ugly!
Kyle: No you do not. Hahaha! Where are you from?
Eunice: I am from San Beda College Alabang, I am scshool mates with Janine.
This was Kyle and Eunice’ first conversation; but during this time Kyle tried to take things
fast so he scared off Eunice and have not talked with each other since. Kyle was known to have a
lot of friends from different schools due to his tutoring classes, school soirees and because he
was friendly. He met a lot of girls during his junior year in high school and would text them
every morning greeting them a good morning, good afternoon or good evening.
After three (3) months, of not talking and keeping in touch with Eunice, Kyle texted her:
Kyle: How are you?
Eunice: I am good; It has been a long time since we last talked.
Their conversation took longer and continued on. Kyle and Eunice were texting with each
other every day. Kyle and Eunice’ relationship grew into a much deeper relationship. They both
now had feeling for each other after over a month of talking and socializing with each other.
Since Eunice had very strict parents; texting with boys was not allowed for her and going out
with boys as well. She would have a hard time lying to her parents about who she was texting;
because she was not used to lying. Kyle and Eunice had a big age gap, three (3) years, which is
why it was hard for Eunice to trust Kyle at first.
Kyle and Eunice’s first date was in Mall of Asia (MoA) this is the second time they saw
each other and their first official date. It was Eunice’ first time to go on a date because she was
not allowed to go to one; because of her parents. And so, she lied to her parents and asked the
help of her sister so that she and Kyle could go out. Their first date was a pretty memorable one,
while waiting for the movies to start, Kyle and Eunice waited by the bay where fireworks
suddenly started to explode and pop out! This for Eunice was one of the most memorable
nights; because she has always loved fireworks and she took it as a sign of destiny to be in the
exact spot at the exact moment in time. However, Kyle and Eunice’ date only lasted for three (3)
64
hours since Eunice had to leave early so that her parents would not find out what she has been
up to.
On the twenty third (23rd) of January of the year two thousand and ten (2010), this was
when Kyle and Eunice went for a date in Mall of Asia (MoA). Eunice brought her friends and Kyle
came along to spend to spend the day with Eunice. They watched a scary movie, Legion, where
in there were demons who eat people. This was when Kyle tried to kiss Eunice for the first time;
after this, Kyle asked Eunice “When do you think we could have own number?” and the Eunice
answered a short but simple answer “Twenty Three (23).” Kyle was ecstatic and happy to know
that he and Eunice are officially together. Although they were both happy at first, they both new
that it was just the start of a new journey they both would take part on together. Their
relationship had a theme song, which to them resembled and embodied their relationship very
well; and this was “I am Yours” written by Lamilla Soraya and sung by Mr. Jason Mraz a famous
singer in the western part of the globe.
“I’m Yours”- Jason Mraz
Well you done done me and you bet I felt it
I tried to be chill but you're so hot that I melted
Before the cool done run out I'll be giving it my bestest
And nothing's going to stop me but divine intervention
I reckon it's again my turn to win some or learn some
But I would not hesitate no more, no more
It cannot wait, I'm yours
Well open up your mind and see like me
Open up your plans and damn you're free
Look into your heart and you'll find love love love love
Listen to the music of the moment people, dance and sing
We are just one big family
And it's our God-forsaken right to be loved loved love love
So I would not hesitate no more, no more
It cannot wait, I'm sure
There's no need to complicate, our time is short
This is our fate, I'm yours
65
D-d-do do you, but do you, d-d-do
But do you want to come on
Scooch on over closer dear
And I will nibble your ear
I've been spending way too long checking my tongue in the mirror
And bending over backwards just to try to see it clearer
But my breath fogged up the glass
And so I drew a new face and I laughed
I guess what I be saying is there ain't no better reason
To rid yourself of vanities and just go with the seasons
It's what we aim to do, our name is our virtue
But I will not hesitate no more, no more
It cannot wait, I am yours
Open up your mind and see like me
(I will not hesitate)
Open up your plans and damn you are free
(No more, no more)
Look into your heart and you'll find that the sky is yours
(It cannot wait, I'm sure)
So please do not please do not, there is no need
(There is no need to complicate)
There is no need to complicate
(Our time is short)
Our time is short
(This is our fate)
This is, this is, this is our fate
I'm yours
Oh, I am yours
Oh, I am yours
Oh, whoa, baby you believe I am yours
You best believe, best believe I am yours
66
Since Eunice’ parents are strict and did not allow her to have a boyfriend; going out with
Kyle became a challenge for her. Since she was not used to lying to her parents she would get
caught most of the time and get scolded at for disobeying her parents. Although Eunice never
seemed to understand why her parents did not let her have a relationship; since Eunice had very
high grades and was one of the top students in her class; and even when having a boyfriend, it
does not affect her schooling at all.
This was the hardest part of their relationship where Eunice would give up most of the
time because she could no longer take the pain she got when her parents scold her. Eunice’
parents would get her phone so that she would not have any communication with Kyle.
However this did not stop the both of them with communicating; Eunice would talk to Kyle on
Facebook when her parents are not around or even leave an e-mail message time after time.
Sometimes, Eunice would lose hope and give up; however, Kyle would always cheer her up and
force her to fight and to never give up, because he knew that someday they would get through
this.
However there were also downs in terms of their relationship. Trust was an issue that
never seemed to go away for both of them. They would fight most of the time because Eunice
would open and hack Kyle’s account of Facebook (social media web site) and read his messages.
Although Kyle was open to Eunice’ questions about who he was talking to and what they were
talking about, Eunice was still skeptic and doubted the words said by Kyle. This led to a lot of
fights between Kyle and Eunice because Eunice would get upset that her boyfriend is talking to
other girls; while Kyle on the other hand would get angry because he does not understand why
he is not allowed to talk to other girls; because clearly he had nothing to hide and had done
nothing wrong.
Despite the fact that a lot of people doubted Kyle and Eunice’s relationship; they with
stood two years of having almost no means of communication and with only each other once in
two months, they beat the odds and shocked a lot of people on how strong the two of them
were. On their third year, luckily, Eunice’ parents finally accepted her having a boyfriend as long
as both of them would be open to the parents and follow curfew and limitations set by her
parents made Kyle and Eunice very happy and made their relationship even stronger. Eunice
thanked Kyle for never giving up on them despite the fact that she herself was already giving up;
this is when both of them realized that they were destined for each other and through thick and
thin they would both make it because they love each other.
67
Since Kyle and Eunice’s relationship was no longer illicit or prohibited to his girlfriend’s
parents, they had more freedom to do whatever they wanted, go wherever they wanted because
of the trust both of them earned. This made their relationship stronger and also made both of
them realize that everything that they both fought for is all worth it.
4.9 HIGH SCHOOL GRADUATION
After four (4) years of a whirlwind of emotions, experiences and leanings in high school.
Kyle has finally graduated; he was very proud of himself when he knew he as going to
graduated; due to the fact that he almost got expelled the previous school year due to his
offenses.
Similar to his grade school graduation, his graduation ceremony was held in the school,
La Salle Green Hills (LSGH) gymnasium. La Salle Green Hills (LSGH) gymnasium accommodated
about 1 thousand (1000) attendees; which was just enough to fit all the fourth (4th) year students
and their parents. At first Kyle got upset and dismayed because his dad did not go and come to
the graduation ceremony. However, he was determined that the situation would not ruins his
graduation; one of the most special and memorable moments in is life.
The graduation ceremony took longer as compared to his grade school graduation
because there were more speeches and ceremonies done; such as, the speech of valedictorian,
awarding of honor students and awarding of special awards. Although Kyle did not receive any
awards and special mentions; he and his parents were still very proud of him just the fact that he
graduated without any failing grades. This was also an emotional moment for Kyle and his
friends since this was, for them, the last time they would be all together in their school.
Therefore, Kyle made sure that he would savor and live the moment.
Alma Mater Hymm
Hail, Hail
Alma Mater,
Hail to De La Salle!
We'll hold your banner high and bright,
A shield of green and white,
We'll fight to keep your glory bright,
And never shall we fail,
Hail to thee our Alma Mater!
Hail! Hail! Hail!
68
Since Kyle was already determined that he was going to study college in De La Salle
College of Saint Benilde (DLS- CSB) he already knew which of his batch mates are going to go at
the same school as him. Also, since Kyle had strong school spirit and would only want to study
in La Salle, college choices for him were only between, De La Salle University Manila (DLSU) and
De La Salle College of Saint Benilde (DLS- CSB). Graduation high school would mean that most
of them would be separated and would go to different collages and even different countries,
ether to migrate or study. However, he did not fret because he knew that with the use of
internet whether it be through Facebook or any other future social media sites made in the
future; that they would still talk and see each other soon.
4.11 COLLEGE: DE LA SALLE COLLEGE OF SAINT BENILDE
Ever since Kyle was in fourth (4th) year in high school; he has already determined the
college he wanted to study at; and that was De La Salle University (DLSU) or De La Salle College
of Saint Benilde (DLS- CSB). However, he was interested at studying in De La Salle College of
Saint Benilde (DLS- CSB) because technology facilities such as computer are much newer as
compared to other local colleges such as; Mapua, University of Sano Tomas (UST), University of
the Philippines (UP, Ateneo De Manila University (ADMU), Adamson University (AdU) and other
well-known, popular and famous universities and colleges on the country. Since Kyle was
planning to take a computer related course, which was similar to the college course and the
degree his older brother had, John Basile; he concluded that he would study at De La Salle
College of Saint Benilde (DLS- CSB). Another reason why Kyle wanted to study at De La Salle
College of Saint Benilde (DLS- CSB) as because he did not want to have a different college
because since he was in pre- school he was already studying in La Salle; as a result to this, he did
not want to go to any other school and was loyal to his alma mater.
College for Kyle was so much better than high school; he liked the fact that in college, he
got to pick his course where in he had good subjects where he was actually interested in
learning; such as computer programming and information technology (IT) subjects and topics.
Due to this, Kyle had the motivation and determination to do well and study hard in school
because he liked the things he was learning and he also knew that this would be crucial and a
significant need and important for him in the future when he is already working.
Currently, Kyle is in second (3rd) year college studying Bachelor of Science major in
Information Systems at De La Salle College of Saint Benilde (DLS- CSB). He is a nearly graduating
student; however, he still has a long way to go in order for him to achieve his goal of graduating
69
and being a great programmer in the future. With all of his experiences in life, he as surely been
stronger and may have already distinguished who he really is and he thinks of himself. Through
self-development, determination and motivation; clearly he can do anything and everything he
desires in life.
70
CHAPTER 5
REFLECTIONS
5.1 SAVING 10,000: WINNING A WAY ON SUICIDE IN JAPAN
The movie “Saving 10,000: Winning a War on Suicide in Japan” is a story that talks about
the true causes of the high suicide rate in Japan. By watching the movie, we could learn about
why there are a lot of people that commits suicide in Japan. And to be exact about the rate of
suicide in Japan compared to the different countries around the world based on what was said
in the movie, the suicide rate in Japan is twice that of America, three times that of Thailand, nine
times higher than Greece, and twelve times higher than the Philippines. To answer that if the
rate of committing suicide is acceptable, I would have to say that it would never be acceptable
simply because why would one person want to die? I believe that it should not be an option for
anyone and I repeat that, it SHOULD NOT be an option even to those people who are not
wealthy, because being wealthy would not make you happier in life. Having to buy stuff with our
money will not make us happy either because it would just satisfy our wants. And we all know
that our wants are unlimited. It is unlimited because after we have satisfied our wants, there
would be something new that we would want after that but this does not mean that we could
not enjoy our wants. All I am saying is that it would not make us happy completely. We should
make the most out of our life because we only have one life to live. There are a lot of ways for us
to be happy rather than keep on buying stuff to satisfy our wants. When we are with our
families, we should focus on them and not to think about random stuff that happens at work,
about the deadlines in school, or any other stuff to think about that is not involving our families.
We should also laugh because laughing as we know it is the greatest antidepressant. We could
be happy by simply talking and laughing with our families, loved ones, and friends.
The movie also featured a book that talks about death. What the book contains is on
how you can commit suicide. It also contains different techniques about suicide. I believe that
the book was created for the people who wanted to go kill themselves. The thought of
committing suicide does not even go through my mind, not even a bit. If people during that
time thought that there is a way of committing suicide without any pain, then they have made a
mistake about it, because it is impossible for someone or anyone to not feel anything, physically
and mentally. It was also said that there is a beautiful place in Japan called Aoikigahara Forest
and that a lot of people commit suicide here and after all of those people who have already
committed suicide in this forest. And it seems like there are a lot of people who are talking,
71
promoting, and watching about those deaths and almost no one wants to do something about
suicide to avoid it.
The first question is making us think of an internet service or an application that would
make the idea of saving people who would want to commit suicide more viral in the Philippines.
The application that I can think about will operate on both iOS and Android. The application will
be named “Get-Up-And-Go”. It will be named like this simply because of the meaning. What it
means is like it motivates you to do something. Life can be a synonym for “Get-Up-And-Go”.
The use of this application is to educate the users and to give them some ideas on how to live a
more happy life, to live a less stressful life, and to make the most out of your life. Wherever you
are and you are with an electronic gadget that is operating on either iOS or Android, you could
access the application when you have some concerns about the uses of the application that was
stated above. This application was created to show the people that committing suicide is not an
option. The application can provide information about the history of suicide and about the
movie “Saving 10,000: Winning a War on Suicide in Japan”. It will provide information about the
movie because it is where I got the idea of helping people. Through this application, I hopefully
can help people by providing different information about life. The application can provide many
views on committing suicide through random people all over the world by using the forums that
would be found by accessing the application. People who would like to share what they have to
say about committing suicide or killing yourself can also be posted in the forums. The
application will provide a login feature for the users to create an account. Each user will be
provided a profile that he or she can customize the details and the design. This profile can be
set as public for people to see or can be set as private if he or she does not want random people
seeing his or her information. If the users have already registered and have already logged into
the application, they will be able to see a tab for the list of your friends and an “Add a Contact”
button will be available of course for you to add contacts. The use of the friends list is for the
chat feature if contacts or friends would like to talk. All of these information would be placed in
different tabs that could be always be found at the top part of the screen. The design of the
application would obviously have a design that would be pleasing.
Ethical Egoism, as it was discussed in the book “Contemporary Moral Problems” by
James White, is a normative view about how men ought to act. It is the view that, regardless of
how men do in fact behave, they have no obligation to do anything except what is in their own
interest. This means that as an individual, our actions should be morally right and at the same
time it should maximize one’s self interest. I understood John Stuart Mill’s Utilitarianism by
saying that, the needs of most of the people would outweigh the needs of the few people. This
means that the action that would be done will be the action that would benefit most of the
people or the action that would make you happy the most. To serve as an example for
Utilitarianism; let us say that there is a petition about removing a hospital for children and if they
72
are being asked to pay for a huge amount but the problem is that there are a lot of people who
benefit from that hospital because it is cheap there and sometimes the medication is free of
charge. Of course if it is the Utilitarian’s choice, he or she would not have the hospital
demolished or removed because a lot of people are benefitting from the hospital. The creator of
the movie acted in self-interest because the intention of the creator was to let people from all
over the world understand about what the situation in Japan is. What the creator of the movie
did was really helpful because I believe that with his action, there would be more concerned
people about what happened and I believe that someone who got informed through the movie
will do something about suicide to be prevented. The utilitarian purposes by creating the movie
will serve as information for a lot of people so that someone could possibly do something about
how to avoid suicide. The benefit of creating the movie and showing it to a lot of people would
be the help that they can get from people who would respond to the movie. The purposes of
this is that it helps a lot of people to create and give ideas to people so there could be
something done to that high suicide rate in japan.
5.2 FAIRPHONE SMARTPHONE
There are three types of Egoism that will be discussed in this reflection and these types
are Ethical Egoism, Psychological Egoism, and Rational Egoism. First of all, what is Egoism?
Egoism is the theory that one’s self is the inspiration of his or her own action or simply having
self-interest of what we do. Ethical Egoism means that as an individual, our actions are required
to be morally right and at the same time it should maximize one’s self-interest. As an example, if
one person decides to sell a certain product or service that he or she knows that a lot of people
will need it and there is no other competitor available, he or she can monopolize that certain
place so what he or she will do is to sell that product of provide the service to the people at his
or her own self-interest. Psychological Egoism means that the actions of one’s self are only for
the benefit of only him or her. In other words, a person will do a certain action because of his or
her own self-Interest. To serve as an example for this, a person might help or do something for
someone else because he or she feels like the work that will be done by the person he or she
helped is not good enough. So for him or her to feel better, he or she decides to help someone
with a work. In Rational Egoism, it means that an action of one’s self should be reasonable and
that his or her action should maximize his or her self-interest. An example of this could be when
a person allots a budget for a project to help people who are a victim of tragedy but keeps most
of the money for him or her instead because we all know that when we talk about money, we
would do anything for us to earn more than how much we earn now.
73
What is the Fairphone? The Fairphone is the very first “Ethical Smartphone” which has
just been launched in London last September 2013. I believe that the Fairphone Smartphone
was designed to promote the use of materials found from war zones or dangerous factories and
to give the people an idea from what their smartphones were made of. Not only does the
materials of a smartphone came from war zones or dangerous factories but also the workers
that have been working to create the smartphone have been treated badly, so bad that some
factory workers even commit suicide.
Ethical Egoism can be differentiated with Psychological Egoism in terms of how it will
affect someone by creating this Fairphone Smartphone by saying that it is said to be that the
materials of this Fairphone Smartphone came from conflict-free minerals, this is what made it an
Ethical Egoism. Ethical Egoism because the actions that were committed had been morally right
and at the same time it maximized their self-interest. It maximized their self-interest because
this is what the Fairphone Smartphone creators wanted in the first place, they wanted to change
the system of having badly treated factory workers into having well treated factory workers and
the materials of the smartphones to conflict-free minerals. As of Psychological Egoism, I believe
that it can be differentiated by saying that the Fairphone Smartphone Creators provided a way
to change the system into having well treated workers and to have a more conflict-free minerals
that will be made into the Fairphone Smartphone making it eco-friendly. It was differentiated by
saying that people now are getting to know more about what their smartphones were made of
and because the actions that were made by the people who created Fairphone created the
smartphone because of their own benefit and of their own self-interest. To look at this from the
Rational Egoism point of view, it can be said that the customers of the Fairphone Smartphone
will only buy the Fairphone Smartphone because of a specific feature which the other
smartphones do not have or the customers will only buy this Fairphone Smartphone because it
is a new phone, not because of what is behind the story why was the Fairphone Smartphone was
created. Rational Egoism because the actions that were done was with reason and maximized his
or her self-interest.
To conclude this reflection about the Fairphone Smartphone, if we do really want to help
change the system, we can start in small ways such as spreading the story that an Ethical
Smartphone called the Fairphone has been created and it promotes the reuse and recycling of
materials and treating workers well. But it will always depend on us if we will continue to be
selfish in everything we do and that we won’t be treating each person equally.
74
CHAPTER 6
STEALING AND ETIQUETTE
6.1 PATENT INFRINGEMENT – SAMSUNG V.S. APPLE
These two companies have been going around the news for quite some time because of their
rivalry about their technologies and products. These two companies both have a great icon to
the public. Who would have ever wondered that Samsung does not have much time to check
the patent of the products that they are going to produce? The image of Samsung has been
frowned upon by a number of people because of this action that they had a lack of care to
check. The following paragraph will contain the article regarding this issue against Samsung
versus Apple Patent Infringement.
According to the article that Silicon Valley wrote about the issue with Samsung and Apple, it
says that “SAN JOSE -- With a fresh $290 million jury verdict in hand, Apple (AAPL) got exactly
what it wanted from a federal jury Thursday in its continuing patent feud with archrival Samsung
-- another stern message that copying iPhone and iPad technology comes with a steep price.
On the third day of deliberations, an eight-member jury awarded Apple $290 million in damages
in the latest round of its legal battle with Samsung, close to the amount the Silicon Valley tech
giant sought for Samsung's copying of the iPhone and iPad in 13Samsung smartphones and
tablets.
Jurors said after the verdict that they were aware the outcome would send a broader message
about patent infringement, particularly in the valley's tech center.
"We felt that was the message of this trial," said juror Barry Goldman-Hall, a San Jose therapist.
"If you invent something, that's a valuable commodity. In this particular business, that's serious."
With the verdict, Apple is owed a total of nearly $930 million for its overall patent infringement
case against Samsung, including the results of last year's trial in which a separate jury found the
South Korean maker of Galaxy smartphones and tablets and other devices violated Apple's
patent rights in dozens of products.
In the most recent trial, the jury largely sided with Apple's demands to be compensated for 13
Samsung smartphones and tablets already found to have copied iPhone and iPad patents, such
as Apple's bounce back and pinch-to-zoom features. The jury broke down damages for each of
the smartphones, finding the Samsung Infuse 4G, at nearly $100 million, and the Droid Charge,
at $60 million, warranted the most damages.
75
The Samsung products are an older line of smartphones and tablets long since replaced by
newer models, but the damages case was considered important to the two rivals' patent feud
unfolding in courts around the world. The damages verdict also finally positions the case to
move forward to a federal appeals court, which may decide a host of key legal issues in the
evolving patent battles over smartphone and tablet technology.
U.S. District Judge Lucy Koh ordered a retrial of the damages issue on the 13 Samsung products
after she concluded the first jury improperly calculated damages and slashed more than $400
million from its original $1 billion verdict. The latest jury verdict restores much of that amount.
During the trial, Apple argued that Samsung owed nearly $380 million in damages for infringing
its iPhone and iPad technology, based on Apple's lost profits, Samsung's profits from selling
infringing products and royalties. Samsung, meanwhile, told the jury that Apple had inflated the
worth of its patents and overstated their importance to consumer choice, arguing damages
should not exceed $52 million.
Jurors said Samsung failed to produce much evidence to counter Apple's position. Colleen Allen,
the jury forewoman, said the panel agreed their verdict would "set precedent in the future for
our patent laws."
"If we don't award Apple much, we're saying it's OK to infringe out patent laws," added Allen, an
emergency room nurse from Aromas.
Apple praised the verdict, saying it shows "Samsung that copying has a cost." Samsung vowed
to appeal, calling the verdict "disappointing."
Barring a global settlement, which has eluded the two companies, Apple and Samsung are far
from done with each other. The competitors are set to square off again in March in another
patent trial, this time over more recent smartphones and tablets, although even that case will be
well behind the release of even newer versions of Apple and Samsung products.
In addition, a federal appeals court this week revived Apple's bid to block the U.S. sales of
Samsung infringing products in the case that has been resolved. The issue was sent back to Koh
for further review.
"There is no end in sight," said Brian Love, a Santa Clara University law professor.
Meanwhile, Apple and Samsung continue to dominate the worldwide market for smartphones
and tablets, fueling Apple's parallel rivalry with Google (GOOG) and its Android operating
system, which runs Samsung's products.
76
Howard Mintz covers legal affairs. Contact him at 408-286-0236 or follow him at
Twitter.com/hmintz
THE JURY's verdict
The breakdown by products from Thursday's jury verdict in the San Jose federal trial that
restored $290 million in damages awarded in Apple's lawsuit against Samsung for Samsung's
violation of patents in these older devices:
Captivate $21.1 million
Continuum $6.4 million
Droid Charge $60.7 million
Epic 4G $37.9 million
Exhibit 4G $2.4 million
Galaxy Prevail $22.1 million
Galaxy Tab $9.5 million
Gem $4.8 million
Indulge $9.9 million
Infuse 4G $99.9 million
Nexus S 4G $10.5 million
Replenish $3 million
Transform $2.1 million”
I believe that from this article, it is fair that Samsung should pay Apple for the damages that it
had incurred to Apple. I can say this that they should have checked the patent for each of the
products that they are going to produce. These actions should be highly present since they are
one of the biggest technology companies in the world. I believe that they should assign a team
or create a team to avoid losses of money such as this big. This amount of money could be a
great help for them rather than paying it to Apple for their patent issues regarding their
products.
From the Apple Company’s perspective, I believe that they are the opposite of Samsung
Company in a way that they are good with the patent of the products that they are producing.
The process of the Apple Company is complete in terms of filing their products patent because
they make sure that they are the first to create such products just like an Apple iPhone, Apple
iPod Touch, Apple iPod Nano, Apple Mac Book Pro, Apple Mac Book Air, Apple Mac Pro, Apple
iMac, Apple Mac Mini and the previous Apple products such as, Apple iPod Classic, Apple iPod
Photo, Apple iPod Video.
77
6.2 TAKING AWAY PROFIT
According to the article that ZDNet wrote about the issue with torrents, it says here that “Italy
looks set to block The Pirate Bay and four other file sharing sites, citing massive illegal
downloading of music, films and other copyrighted digital content.
It is the second time in five years that an Italian court has ordered ISPs to block access to The
Pirate Bay, which was founded in Sweden in 2003. An appeals court quashed the first block in
2008 just months after it had been instituted. Italy's highest court reinstated the block in 2010,
but earlier this year The Pirate Bay came back online in Italy, offering its services through a
different domain name.
The
other
four
sites
blocked
under
Thursday's
ruling
by
the
Bergamo
court
are 1337x.org, h33t.eu, extratorrent.com and torrenthound.com. The Pirate Bay, though blocked
on Friday, remains accessible in Italy through proxy servers.
Illegal downloading is said to be rampant in Italy and music streaming site Spotify wrote in a
recent report that three-quarters of residential Italian internet connections downloaded at least
one song illegally in 2012. The impetus for the court case came from Federazione Industria
Musicale Italiana (FIMI), Italy’s music industry lobby, which has been engaged in an ongoing
battle with file sharing sites. On Friday it defended its actions as both necessary and useful.
"Sure it's easy to get around the block, but no more than 10 to 15 percent of internet users in
Italy know what a proxy is or how to use it," said Luca Vespignani, general secretary of the
FIMI."Generic proxies are unstable, crash often and are exponentially slower than downloading
directly from a file sharing site. If The Pirate Bay sets up its own proxy for Italy, like it has done in
the past, that too will be shut down."
In announcing the court verdict, Italy’s finance police, the Guardia di Finanza, which filed the
case together with the FIMI, said The Pirate Bay’s headquarters were moved to Iceland and
then Saint Martin, an island in the Caribbean, after the site's founders were found guilty by a
Swedish court in 2009 of facilitating copyright infringement.
"Sharing copyrighted content through the internet still leads to heavy losses for the legal market
and leads to a loss of tax revenue (for Italy)," the finance police said in a statement. "This sort
ofillegal activity by the pirate sites generates large profits for their owners, above all through
advertising banners that are hosted on their web pages."
78
Vespignani said he was confident the court's decision would not be overturned on appeal since
Italy's highest court has already set the precedent of the illegality of the file sharing sites in the
previous The Pirate Bay case.
"We know illegal downloading of copyrighted material is not going to disappear," Vespignani
aid. "There is no magic wand to make it disappear. The idea is to get it under control and that is
what blocking these sites helps do."”
The issue here about using the idea of torrents is that, companies that get affected lose profits
because their customers would rather download their product than to purchase the original
copy which would be more expensive than just downloading the product which is for free. There
are numerous examples regarding this issue and one of these examples can be of the music
industry. The music industry is composed of music producers, music composers, artists
themselves, technical staff, and etcetera, who invests large amount of money for their industry
for them just to produce a single album for an artist. The issue here about the music industry is
that people from all over the world would only have access to an artist’s album through buying
the original copy or downloading it illegally by using torrents.
People both who upload and download these torrent files for other people to download are
considered as criminals in such ways because these people are the ones doing the illegal act by
not supporting the original copy of the artist’s album by purchasing them.
Another example of this can be in the movies industry, companies who invest in this industry
would most likely to lose more amount of money than the music industry because there would
be more personnel that are involved such as the movie producer, directors, movie artists,
cinematographers, the crew, and etcetera. The movie industry would have to invest more
amount of money for them to gain a large amount of profit as well. But they would not earn
their estimated amount of return in income if people who upload and download would not
support the movies by purchasing the original copy as well. And for them to cam cord the movie
would have another violation and some criminal charges, criminal penalties, and there is a law
regarding the Anti-Camcording Law which will be stated below.
79
“REPUBLIC ACT NO. 10088
AN ACT TO PROHIBIT AND PENALIZE THE UNAUTHORIZED USE, POSSESSION AND/OR
CONTROL OF AUDIOVISUAL RECORDING DEVICES FOR THE UNAUTHORIZED RECORDING OF
CINEMATOGRAPHIC FILMS AND OTHER AUDIOVISUAL WORKS AND/OR THEIR SOUNDTRACKS
IN AN EXHIBITION FACILITY, PROVIDING PENALTIES THEREFOR AND FOR OTHER PURPOSES
Be it enacted by the Senate and House of Representatives of the Philippines in Congress
assembled:
Section 1. Short Title. - This Act shall be known as the "Anti-Camcording Act of 2010".
Section 2. Definition of Terms. - For purposes of this Act:
(a)"Audiovisual work" means a work that consists of a series of related images which are
intrinsically intended to be shown by the use of machines or devices such as projectors, viewers
or electronic equipment, together with accompanying sounds, if any, regardless of the nature of
the material objects, such as films or tapes, in which the works are embodied.
(b)"Audiovisual recording device" means a digital or analog photographic or video camera, or
any other technology or device capable of enabling the recording or transmission of a
cinematographic film or other audiovisual work, or any part thereof, regardless of whether
audiovisual recording is the sole or primary purpose of the device.
(c)"Authorized person" means the members of the Philippine National Police (PNP) and the
National Bureau of Investigation (NBI) and/or any other person duly authorized by the same to
exercise powers conferred upon by this Act.
(d)"Camcording" means any of the unlawful acts enumerated under Section 3 of this Act.
(e)"Cinematographic film" means any audiovisual work consisting of a series of related images
which, when shown in succession, impart an impression of motion, together with accompanying
sounds, if any.
(f)"Copy" means any article or thing in which the visual images or sounds comprised in any
cinematographic film or audiovisual work are embodied, and includes the making of a copy
which is in electronic format or transient or incidental to some other use thereof.
(g)"Copyright owner" means any one who has the exclusive rights comprised in a copyright as
provided under Republic Act No. 8293, otherwise known as the Intellectual Property Code of the
80
Philippines and related international treaties, conventions or agreements to which the Republic
of the Philippines is a party.
(h)"Exclusive licensee" means a licensee who is authorized in writing and who, on behalf of the
owner or prospective owner of copyright, to the exclusion of all other persons, is authorized to
do an act within the Philippines that, by virtue of this Act, the owner of the copyright would, but
for the license, have the exclusive right to do or to perform.
(i)"Exhibition facility" means any cinema, film theater, screening room, projection room or other
venue that is used for the public exhibition of a cinematographic film or audiovisual work,
whether or not a fee is chargeable.
(j)"Operator of an exhibition facility" means any person or entity who holds or is required to
hold a license by the Securities and Exchange Commission CSEC, for companies and
partnerships), the Department of Trade and Industry ('DTI', for sole proprietorships), the Movie
and Television Review and Classification Board (MTRCB) or any and all other relevant
government offices that have, or will have jurisdiction over exhibition facilities to operate the
exhibition facility.
(k)"Relevant authority" means the officers, members and responsible personnel of law
enforcement agencies such as the PNP and their adjuncts and the NBI.
(l)'Transmit" means to convey by any means, whether over a path or a combination of paths,
provided by a material substance or by wireless means or otherwise, and whether or not in
response to a request made.
Section 3. Acts Constituting Unauthorized Possession, Use and/or Control of Audiovisual
Recording Devices. - It shall be unlawful for any person, at a time when copyright subsists in a
cinematographic film or other audiovisual work or its soundtrack and without the authorization
of the copyright owner or exclusive licensee thereof, to:
(a)use or attempt to use an audiovisual recording device to transmit or make a copy of any
performance in an exhibition facility of such cinematographic film or other audiovisual work or
its soundtrack, or any part thereof;
(b)have in his/her possession, an audiovisual recording device in an exhibition facility, with the
intent of using or attempts to use the audiovisual recording device to transmit or make a copy
of any performance in the exhibition facility of such cinematographic film or other audiovisual
work or its soundtrack, or any part thereof; or
(c)aid, abet or connive in the commission of the acts prohibited under this section.
81
Section 4. Penalties. - A person who will be found guilty of violating the provisions of Section 3
shall be subject to a fine of Fifty thousand pesos (Php50,000.00) but not exceeding Seven
hundred fifty thousand pesos (Php750,000.00) and imprisonment of six (6) months and one (1)
day to six (6) years and one (1) day.
If the purpose of the commission of the abovementioned acts is the sale, rental or other
commercial distribution of a copy of the cinematographic or audiovisual work or its soundtrack,
or any part thereof, the penalty shall be imposed in the maximum.
If the offender is an alien, said person shall immediately be deported after payment of the fine
and after serving his/her sentence. He/She shall thereafter be refused entry into the Philippines.
If the offender is a government official or employee, the penalty shall include perpetual
disqualification from public office and forfeiture of his/her right to vote and participate in any
public election for a period of five (5) years.
Section 5. Presumptions as to the Subsistence of Copyright and/or Ownership of Copyright. For purposes of Section 3, copyright shall be presumed to subsist in the subject
cinematographic film or other audiovisual work or its soundtrack if the accused does not put in
issue the question as to whether copyright subsists therein. However:
(a)where the accused puts such question in issue but does not satisfy the court that he/she does
so in good faith, the presumption as to the subsistence of copyright herein shall apply,
notwithstanding that the accused puts that question in issue;
(b)where the name of a person appears on copies of the subject cinematographic film or other
audiovisual work or its soundtrack as made available to the public in such a way as to imply that
the person was the maker thereof and, in the case of a person other than a body corporate, that
name was his/her true name or a name by which he/she was commonly known, that person shall
be presumed to be the maker thereof and the copyright owner thereof, unless the contrary is
established; and/or
(c)where the accused puts in issue the question of whether copyright subsists in the subject
cinematographic film or other audiovisual work or its soundtrack, or the ownership of the
copyright therein, an affidavit made in behalf of the copyright owner in which he/she makes
assertions of facts relevant to showing that: (1) copyright subsists in the work or other subject
matter; and/or, as the case may be, (2) he/she is the owner of the copyright, shall be admitted in
evidence and shall be prima facie proof of the matters stated therein until the contrary is
proved, unless the court requires that oral/testimonial evidence be adduced to prove those
matters.
82
Section 6. No Defense on Account of Use for Private or Domestic Purposes. - It shall not be a
defense that the transmission or making of the copy of the cinematographic film or other
audiovisual work or its soundtrack, or any part thereof, was for private or domestic purposes or
in connection with a fair use deal.
Section 7. Requirement for Posting of Notices in an Exhibition Facility on the Prohibition Against
the Bringing into Said Exhibition Facility of Audiovisual Recording Devices and the Like. - All
exhibition facilities, cinemas or theaters shall be required to conspicuously post in at least two
(2) areas in the exhibition facility including, but not limited to, the areas where tickets are sold
and the entrances of the exhibition facilities, notices or signages warning against the bringing of
audiovisual recording devices into the cinematographic film/audiovisual screening/exhibition
area, with a reservation that the management/operator of the exhibition facility will take into
preventive and temporary custody such audiovisual recording device/s until the film/movie
theater patron leaves the screening/exhibition area/facility.
Failure of the management/operator of the exhibition facility to comply with the foregoing
requirement will subject said management/operator liable to pay a fine of Fifty thousand pesos
(Php50,000.00).
Nothing in this Act shall prevent the management from performing such other precautionary
measures so as to prevent the commission of the acts punishable herein.
Section 8. Powers of Authorized Persons to Enter an Exhibition Facility and Search the Same. An authorized person, without a warrant and without payment of any admission fee or other
charge, may enter and search any exhibition facility if the authorized person has reasonable
ground to believe that any violation of this Act has been or is being committed and, due to the
delay necessary to obtain a warrant could result in the loss or destruction of evidence, or for any
other reason it would not be reasonably practicable to obtain a warrant.
Section 9. Other Powers of Authorized Persons. - An authorized person who has reasonable
ground to believe that a violation under this Act has been or is being committed may:
(a)search any person if the person subject of the search has in his/her actual possession, any
audiovisual recording device, in respect of which an offense under this Act has been or is being
committed;
(b)seize, remove or detain any audiovisual recording device or other object which appears to
contain, or likely to contain evidence of an offense committed under this Act;
(c)use reasonable force to remove any person or object obstructing the authorized person in the
exercise of any power conferred upon him/her by this Act;
83
(d)detain any person, within a reasonable time not exceeding eighteen (18) hours, found in any
place which the authorized person is empowered to enter and search if, after inquiry made, said
authorized person has reasonable ground to believe that the person subject of the search is
connected with the subject matter of the search and it is considered necessary to detain the
person subject of the search to be able to adequately perform the search; and
(e)require the operator of an exhibition facility or any other person who appears to be at the
time responsible for the control or management of the exhibition facility to give information or
render assistance that may be necessary to enable the authorized person to carry out the
functions under this Act.
Section 10. Forfeiture and Disposal of Unauthorized Copy of Cinematographic Film or Other
Audiovisual Work /Audiovisual Recording Devices Used in the Commission of the Acts Penalized
Under this Act. - The court before which a person charged with an offense in
violation/contravention of this Act, whether or not said person charged is convicted of the
offense, may order that any copy of a cinematographic film or other audiovisual work in which
copyright subsists, or parts thereof which appears to the court to be an unauthorized copy, and
any audiovisual recording device or other equipment in the possession of the alleged offender
or the court, be destroyed or delivered to the owner or the exclusive licensee of the copyright
owner concerned or otherwise dealt with in such a manner as the court deems fit.
In the event that the court retains representative samples of the unauthorized copy of a
cinematographic film or other audiovisual work, or audiovisual recording devices or other
equipment for evidentiary purposes in the prosecution of the offense for which an accused is
charged, the retained samples shall remain in custodia legis until the final resolution of the court
proceedings thereon.
Section 11. Enforcement. - The PNP, in coordination with the NBI, the Optical Media Board
(OMB), operators of the cinemas, theaters or exhibition facilities and owners of the
cinematographic films or audiovisual works and other soundtracks, shall enforce the provisions
of this Act. The PNP may deputize, for a defined period, the heads or personnel of such agencies
and instrumentalities of government or private sector representatives or stakeholders of rights
over cinematographic films/audiovisual works and their soundtracks, to perform, the
enforcement functions required under this Act.
Section 12. Separability Clause. - If any provision of this Act is declared invalid, the other parts or
provisions hereof not affected thereby shall remain and continue to be in full force and effect.
Section 13. Repealing Clause. - All laws, decrees, ordinances or rules and regulations which are
inconsistent with or contrary to the provisions of this Act are hereby amended or repealed.
84
Section 14. Effectivity. - This Act shall take effect fifteen (15) days after its complete publication
in at least two (2) newspapers of national circulation.”
Upon seeing and reading this Law, we should not be a supporter of those pirated copies of
movies, music albums, games, and applications so that those people who pirate these copies
would not be encouraged of pirating these products again and again. This is how we can control
the piracy of products.
But there is also a good side in supporting these torrent files and those who upload and
download these products because these products such as the movies, music albums, games,
and applications would be easily popular since the viewers, users, and listeners would greatly
increase because it is free for download.
6.3 PROPER SOCIAL NETWORKING
According to the article that Forbes’ has written, it says here that “After a long day at the office,
imagine logging onto Facebook to see what your friends have been up to, only to have your
boss or colleague message you about an urgent work matter. Aside from the fact that you are
officially off duty, is it appropriate for your coworker to reach out to you through a social
networking forum? Was it wise to accept a colleague or higher-up as a “friend” to begin with?
And–perhaps more importantly–in this day and age, when people are seemingly available
around the clock because of smart phones and our endless appetite for all things online, is
anyone ever really “off duty?”
As Facebook, Twitter and 24-hour BlackBerry access blur the lines between business and
personal lives, managers and employees are struggling to develop new social norms to guide
them through the ongoing evolution of communications technology. Wharton faculty and other
experts say the process of creating rules to cope with the ever-expanding reach of modern
communications has just begun, but will be shaped largely by individuals and organizations, not
top-down decrees from a digital Emily Post.
Generational differences in the approach to openness on the Internet will also be a factor in
coming to common understandings of how and when it is appropriate to contact colleagues,
superiors or clients.
85
“There are huge etiquette issues around the new social media, especially the interactive type,”
says Wharton management professor Nancy Rothbard. “What if your boss friends you on
Facebook? That’s a dilemma. How do you not accept that friend? What if you really are friends?”
According to Rothbard, new communications technology is eroding the boundaries
between home and office, which creates a “double-edged sword” for companies. “On the one
hand, it enables flexibility. In some ways, it makes you more effective. But it can also lead to a lot
of burnout. In the long term, it may lead to conflict about how you feel towards your other life
roles and your ability to be fully present in any one domain.”
For example, a BlackBerry can allow parents to attend their children’s soccer games while
remaining in contact with colleagues at the office in case an emergency comes up. But, she
adds, “you have your BlackBerry at your kid’s soccer game. That’s another … line you may be
crossing.”
The explosion in the popularity of Facebook has made the site a key battleground in the
struggle to establish consensus on correct social networking behavior. Rothbard notes that
initially, many businesspeople attempted to use LinkedIn for business contacts, reserving
Facebook for more personal interactions. Gradually, however, professional colleagues, clients
and supervisors have now become “friends.”
Wharton professor of legal studies and business ethics Andrea Matwyshynhad intended to keep
her Facebook page strictly personal, but was forced to open it up when colleagues in Europe
chose to use Facebook as a means for organizing a conference. Through that initial group of
professional friends, other business contacts began to reach out to Matwyshyn on Facebook. “I
felt social pressure to build out my social network, because at that point I had about three
friends,” she says. “That’s how Facebook gets you.”
Multiple ‘Selves’
For most people who use Facebook and other social networking sites, says Wharton marketing
professor Patricia Williams, “there is an understanding of the multiple roles we play. There is the
self we are for our friends, a self for our family [and] a professional self. What’s interesting is the
degree to which we are comfortable playing all of those ‘selves’ at one time.” And that is
something that people are not used to doing. Before the advent of such networks, it was
unusual for someone to display a persona that would seem familiar to friends, coworkers and
family–all at the same time.
86
“I’ve heard people say that Facebook is for personal friends and LinkedIn is for professional
contacts,” Williams notes. “But many of my Facebook friends are my colleagues–people who
work just down the hall–and I don’t have a problem with that. I do, however, have some
discomfort being ‘Facebook friends’ with my students, because it gives them access to my
personal self that’s not normally available to them.”
At the same time, Williams’ students, especially the undergraduates, have not yet developed a
sense of their professional self. Consequently, she believes, they may be less cautious about the
image they project on social networks, even when they may be visible to bosses, clients–or
teachers.
Williams and a colleague, Wharton marketing professor Americus Reed II, are conducting
research that examines the conflict between individuals’ various identities, “such as when my
role as a professional comes into conflict with my role as a mother,” Williams says. In mixing up
personal and professional roles, people can get themselves into embarrassing situations. “I think
some people are good, and some people are not so good, at finding a balance in these roles”
and keeping information that would be perceived as too personal out of a professional context.
Workplace conflicts have also come up at companies where managers have limited or banned
Facebook for being a distraction and monitor employees’ personal pages for images or
comments that might reflect poorly on the business. At the same time, Matwyshyn says some
companies require employees to maintain blogs or to Twitter as a way to market the
firm.Microsoft , she notes, encourages social networking on the job. “It all depends on how
people use the social media. For some people, Twitter feeds can be a great business outreach
mechanism, and so posting items to Twitter may be considered by some companies or
individuals to be part of their job.” Social networking can help personalize or humanize a
business culture, and many companies have their own Facebook page, she adds.
Generational Approaches
Communications researchers, and the companies that look to them for advice, have a lot to
learn about how or if employers should control or encourage their employees’ use of social
networks, according to Williams. Certainly, employees who are talking about their workplace on
Facebook could be considered to be “exposing the brand,” which can be good or bad,
depending on what aspect of the brand is being exposed. “So, the question is whether that is
helpful or harmful to the workplace or the brand.”
Monica McGrath, a Wharton adjunct management professor, says that some of the
misunderstanding about social networking is generational. Older workers and managers may
have a Facebook page, but it is not essential to them. Younger workers now entering the
87
corporate world rely heavily on Facebook, Twitter and other social media to communicate.
“Right now, there is tension between those two generational approaches,” notes McGrath.
While networking etiquette is in flux, standards will develop, she predicts. Typically, business
norms evolve through official policy disseminated by organizations and by “reality” that bubbles
up from the organization’s grassroots. “The question is: How accessible do you want to be?
[Today,] young people want to be very accessible, and in an international corporation you are
expected to be available [around the clock]. Time zones mean nothing. The norms will continue
to develop based upon generational leadership.”
While the norms are in transition, McGrath says she does not think that corporations will try to
create standards through official policies. “It really depends on the corporate context or even
the individual context. If you are working on an important project and a number of people
depend on your input, you would [want to] be much more available than if you have finished
the project and are on vacation. The etiquette of that is more dependent on the individual and
his or her priorities.”
McGrath, who is also a human resources consultant, says she–like most entrepreneurs–is
typically available around the clock. But “as long as nothing is perking,” she turns off her phone.
“People need to determine what makes sense. If the boss is up at midnight sending e-mail,
some people are OK with that, but other people are not. If you have family priorities that are
different than [those of] the boss, you have to work that out.”
Business consultant Terri Thompson, founder of Etiquette in Action in Paris, Ky., says the same
idea applies to managing the scope of social networks. Cautious friending is one way to keep a
Facebook page from becoming a business liability, she adds. “It’s not that impressive to have
500 friends on Facebook or LinkedIn whom you don’t know, and you don’t know what they
might say.”
BlackBerrys in Meetings
Sigal Barsade, a Wharton management professor, says the uncertainty over access etiquette is
the result of fundamental changes that computer-mediated technologies have made to basic
human communication. Much of the confusion is due to the inability to have a reciprocal
conversation in the context of, say, Twitter or Facebook postings. “So it’s hard to cue in exactly
as to what the etiquette should be at the moment, because it’s sequential. The brevity and lack
of richness of these computer-mediated technologies make it harder to behave in ways that
people are used to.”
88
She says there are likely to be two major paths to developing etiquette for today’s new forms of
communication. One is through the introduction of new people into an organization who bring
with them norms that gradually become accepted. For example, she recalls a student who had
worked at an investment bank in New York and transferred to an office in the Midwest. During a
one-on-one meeting with a manager, the newcomer made the mistake of answering his
BlackBerry. The manger scolded the transplant, who was baffled because his former manager in
New York had always answered his BlackBerry during meetings. For now, Barsade says, the
Midwest customs would prevail in that setting, but as others from outside organizations enter,
the office’s subculture is likely to change.
The other way that etiquette around new communication devices is likely to evolve is through
social information within the organization. “People influence each other,” she says. The most
important determinants of socialization in any organization are managerial role models. Workers
watch top managers and their immediate supervisors to learn what is accepted and, better yet,
rewarded in the organization. This is more powerful than corporate edicts issued by the human
resources department, and even stronger when senior leaders and operational managers are in
sync. “If this is something senior management cares about, it will be a top-down process, which
can be more systematic and effective than a bottom-up process,” she notes.
Given that power, wouldn’t managers demand all-access, all the time? Not necessarily, says
Barsade: “Senior management is increasingly recognizing the downside to constant availability,
and may well need to [rein] employees in from over-using the technology. This can be seen in
firms that have days, or times of day, that employees are told not to use computer-mediated
technology. Also, senior management would have to manage being [on the receiving end] of
that much access, which could be a problem in its own right.”
Communication ‘Pecking Order’
According to Thompson, there is a general “pecking order” in the business community when it
comes to responding to different forms of communication. E-mail should be answered within 24
hours and a telephone call returned even sooner. Social networking sites take the lowest
priority. The order makes sense because a phone call or e-mail seeks specific information from
the one individual being contacted. Social networks come last because, she notes, they are a
wide-open forum where communications is less targeted at one individual.
Then there is the question of the professional colleague on Facebook who, while eagerly
awaiting your response to a work-related deliverable, notices that you have been busy updating
your Facebook page with social news. Is it proper to call someone out for such an apparent
dereliction of duty? Again, it all boils down to context, says Williams. “I can imagine being in a
89
situation where maybe I need to take a break and blow off steam by saying something on
Facebook.”
Rothbard notes that Facebook itself is not likely to take a role in establishing norms to sort out
the conflicts between business and personal friending. “I don’t know if Facebook wants to be
Emily Post,” she says. Social networking sites might emphasize options that allow users or
organizations to tailor their own norms for dealing with problems that can crop up when mixing
business and personal communications, she suggests.
Matwyshyn does not expect another site to evolve as a replacement for the highly personal
space that once defined Facebook before it was infiltrated by business and professional users. “If
you have built up 500 Facebook friends, that’s a sunk cost,” she says. “If you stop using it, you’re
cutting off 500 connections and the switching costs are high. So, there’s a stickiness in the use of
the application.”
Meanwhile, the root of many of the awkward situations that arise around the use of Facebook
and other social networking sites is giving out too much information, faculty emphasize.
Rothbard says that in face-to-face communications, people are much more careful about the
volume and nature of the information they disclose. On the Internet, however, “there is a lot of
lack of awareness–or obliviousness–about who is receiving this information.” Someone using
Twitter, for example, may think that only 20 people will read their message; meanwhile, millions
of unknown people may stumble upon the information. Matwyshyn agrees that users of social
networking sites must be more cognizant of the viral nature of their posts, especially in any
context where work and private life are intertwined. “They have to realize there do potential
negative consequences that can flow from coworkers know more about you than is prudent.””
Upon seeing and reading this article, we may have to say that we should practice proper
networking etiquette because we may somehow affect someone else. There are some tips I
believe that would help to practice and follow the proper etiquette. The first practice that I have
thought about is to avoid taking selfies. Selfies, according to Oxford Dictionaries mean that it is
“a photograph that one has taken of oneself, typically one taken with a smartphone or webcam
and uploaded to a social media website”. If we would really want to contribute to the affected
people such as the victims of the Typhoon Yolanda or also known as the Typhoon Haiyan, we
should avoid taking these selfies because to some other people, it may seem like a sign of
disrespect. To explain what the Typhoon Yolanda or the Typhoon Haiyan means, according to
Wikipedia, they described it by saying that “Typhoon Haiyan, known as Typhoon Yolanda in the
Philippines, was an exceptionally powerful tropical cyclone that devastated portions of
Southeast Asia, particularly the Philippines, in early November 2013.” Rather than thinking only
about ourselves, we should also learn to think about the welfare of other people specially those
90
who are in affected. Another tip rather than taking selfies of your self is to take pictures of
statements that contain important details to help those in need.
Another thing that we should notice is that we should avoid taking pictures of food since there
are other people who are hungry.
Another thing is that we should stop joking around especially when the joke is about the
affected by the typhoon, because this would seem to be disrespectful as well.
Another thing is that we should not boast around and let other people know that we helped the
needy.
91
CHAPTER 7
CYBER CRIME
7.1 HACKING
According to the article that Yahoo! News have written that I have just read, it is about Microsoft
and hacking and it says that “REDMOND, Washington (Reuters) - The maker of the most popular
computer operating system in the world is launching a new strategy against criminal hackers by
bringing together security engineers, digital forensics experts and lawyers trained in fighting
software pirates under one roof at its new Cybercrime Center.
Microsoft Corp's expanded Digital Crimes Unit inside the 16,800-square foot, high-security
facility combines a wide array of tactics that have worked the best: massive data gathering and
analysis, gumshoe detective work, high-level diplomacy and creative lawyering.
The new approach, to be launched on Thursday, is the latest attempt to close the gap created in
the past decade as criminal hackers innovated in technology and business methods to stay
ahead of adversaries mired in the slow-moving world of international law enforcement.
Already, many of the biggest victories against organized online criminals have come when
private companies have worked together to seize control of the networks of hacked computers,
called botnets, that carry out criminal operations. Though it is at times derided for the security
shortfalls in its own products, Microsoft has led more of those seizures than any other company.
"Cybercrime is getting worse," Digital Crimes Unit chief David Finn told Reuters during an
exclusive visit to the Redmond, Washington, campus building this week. But Finn hopes that by
mixing specialists from various professional arenas, Microsoft can get better.
The center features a lab for dissecting malicious software samples that is accessible only with
fingerprint authorization. In another room, a monitor tracks the countries and Internet service
providers with the greatest number of machines belonging to some of the worst botnets.
Next to a situation room with a wall-sized, touch-screen monitor sit rows of empty offices for
visiting police, Microsoft customers or other allies expected to join specific missions for days or
weeks at a time.
92
There are hundreds or thousands of botnets, and Microsoft is trying to get only the biggest or
most damaging, or else to pursue fights that would establish key precedents.
In the past few years "at least half of the major, significant takedowns have been driven by
Microsoft," said Steve Santorelli, a former Microsoft investigator and Scotland Yard cybercrime
detective who now works at a security nonprofit group called Team Cymru.
Microsoft has tangled with a Mexican mafia family that proudly put brand labels on pirated
Xbox game CDs, a ring that took online payments via a parking garage in Malaga, Spain, and a
Russian virus writer paid with a paper bag full of cash -- by a 12-year-old boy on a bike.
Outside security experts praised the cross-pollination of fraud, security and software specialists.
"That kind of integration is only for the better. The financial sector has been thinking along
those lines as well," said Greg Garcia, a former cybersecurity official at the Department of
Homeland Security and at Bank of America who now advises the banking industry's main
cybersecurity coordination group, known as FS-ISAC.
The crimes unit doesn't tackle government spying, where Microsoft is among the major Internet
companies that have turned over large amounts of data on users to the U.S. National Security
Agency (it is suing for the right to disclose how much). And another unit within Microsoft is in
charge of making the company's products less susceptible to hacking.
PIRACY SQUAD PROTECTS WINDOWS
About 80 of the crime unit's 100 staffers have focused on the piracy of Microsoft products, with
far fewer devoted to deconstructing the methods of criminals attacking Microsoft users and
stopping them when possible.
But time and again, the piracy squad has found counterfeiters who were using botnets that also
sent spam or attacked websites with denial-of-service attacks, or who slipped malicious software
into copied Microsoft wares, or who had other ties to broader security issues.
In one test, undercover Microsoft employees bought 20 new computers in China the way
average consumers would. All had pirated versions of Windows, and all had at least traces of
malicious software. An expanded pool of 169 machines included 18 percent ready to receive
electronic commands as part of a botnet called Nitol.
93
More critically, the piracy people bring experience with unusually powerful U.S. copyright laws.
With a strong preliminary showing in court that their goods are being misrepresented, copyright
owners can win orders allowing them to seize the offending property without prior notice.
In an innovative and aggressive twist, Microsoft has been using that law to seize website
addresses, including those used by criminals to control botnets.
"Microsoft really has done a very positive job in a couple of areas, and one of those is
construction of legal frameworks that create precedents that allow future actions," said Jeff
Williams, head of security strategy at Dell Inc's SecureWorks Counter Threat Unit.
The Nitol case was remarkable in that it and other botnets were connecting to 70,000 addresses
at a Chinese web domain-name seller called 3322.org. Microsoft won the right to filter all
connections to those addresses and blocked more than 7 million attempts in 16 days. The owner
of 3322 agreed to settle Microsoft's lawsuit and to drop other bad addresses identified by
Microsoft or Chinese Internet security officials in the future.
Microsoft also felled a botnet called Rustock, once one of the biggest sources of spam on the
planet. More recently, it teamed with banks to seriously hurt two operations that sell do-ityourself kits for crafting smaller botnets that have stolen hundreds of millions of dollars from
online accounts.
The takedowns are often dramatic, with armed raids on multiple locations where servers are
housed. If there are many control computers and they don't get disconnected within minutes of
one another, the surviving machines can issue new commands and recreate the entire network.
During one raid in Pennsylvania, an executive at the bad web page's hosting company was
cooperating when the site's owner realized what was happening and changed his password
from afar, locking out the official. The Microsoft team pulled out the cables to save the day.
Finn and Microsoft crime expert Richard Boscovich, a fellow former federal prosecutor, said they
are working on new means to take down even more sophisticated botnets, which are controlled
through a peer-to-peer mechanism instead of through centralized servers.
"You'll be seeing some interesting stuff in the near future," Boscovich promised. "This is an area
where what is good for the business is good for society."”
94
Based from this article, I believe that this is a real turning point that Microsoft came up
with a new strategy to use against hackers. Cyber Crime has been going around the news for
quite some time now. And I believe that this is the right time to make a move against these
cyber criminals which are called the hackers. These hackers are so dangerous because they can
do almost what they want to do with your machine or your accounts. I believe that hackers are
so dangerous that they can get access to your machine or your accounts without you even
noticing. Good thing that Microsoft has found out a new system that is more secure. This would
really make us feel more secure since we know that a company, which is Microsoft, is doing
something against Cyber Crime. If hackers are to continue what they usually do, which is illegal,
they would be in a very big trouble, especially when it comes to the people or the companies or
the organizations that are really serious when it comes to illegal acts such as this and if they will
not stop hacking, they would have violations against the law, some criminal charges, criminal
penalties, and there is a law regarding the Cybercrime Law which will be stated below.
“Republic Act No. 10175
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION, INVESTIGATION,
SUPPRESSION AND THE IMPOSITION OF PENALTIES THEREFOR AND FOR OTHER PURPOSES
Be it enacted by the Senate and House of Representatives of the Philippines in Congress
assembled:
CHAPTER I
PRELIMINARY PROVISIONS
SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of 2012″.
SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and
communications industries such as content production, telecommunications, broadcasting
electronic commerce, and data processing, in the nation’s overall social and economic
development. The State also recognizes the importance of providing an environment conducive
to the development, acceleration, and rational application and exploitation of information and
communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or
delivery of information; and the need to protect and safeguard the integrity of computer,
computer and communications systems, networks, and databases, and the confidentiality,
integrity, and availability of information and data stored therein, from all forms of misuse, abuse,
and illegal access by making punishable under the law such conduct or conducts. In this light,
the State shall adopt sufficient powers to effectively prevent and combat such offenses by
95
facilitating their detection, investigation, and prosecution at both the domestic and international
levels, and by providing arrangements for fast and reliable international cooperation.
SEC. 3. Definition of Terms. — For purposes of this Act, the following terms are hereby defined
as follows:
(a) Access refers to the instruction, communication with, storing data in, retrieving data from, or
otherwise making use of any resources of a computer system or communication network.
(b) Alteration refers to the modification or change, in form or substance, of an existing computer
data or program.
(c) Communication refers to the transmission of information through ICT media, including voice,
video and other forms of data.
(d) Computer refers to an electronic, magnetic, optical, electrochemical, or other data processing
or communications device, or grouping of such devices, capable of performing logical,
arithmetic, routing, or storage functions and which includes any storage facility or equipment or
communications facility or equipment directly related to or operating in conjunction with such
device. It covers any type of computer device including devices with data processing capabilities
like mobile phones, smart phones, computer networks and other devices connected to the
internet.
(e) Computer data refers to any representation of facts, information, or concepts in a form
suitable for processing in a computer system including a program suitable to cause a computer
system to perform a function and includes electronic documents and/or electronic data
messages whether stored in local computer systems or online.
(f) Computer program refers to a set of instructions executed by the computer to achieve
intended results.
(g) Computer system refers to any device or group of interconnected or related devices, one or
more of which, pursuant to a program, performs automated processing of data. It covers any
type of device with data processing capabilities including, but not limited to, computers and
mobile phones. The device consisting of hardware and software may include input, output and
storage components which may stand alone or be connected in a network or other similar
devices. It also includes computer data storage devices or media.
(h) Without right refers to either: (i) conduct undertaken without or in excess of authority; or (ii)
conduct not covered by established legal defenses, excuses, court orders, justifications, or
relevant principles under the law.
96
(i) Cyber refers to a computer or a computer network, the electronic medium in which online
communication takes place.
(j) Critical infrastructure refers to the computer systems, and/or networks, whether physical or
virtual, and/or the computer programs, computer data and/or traffic data so vital to this country
that the incapacity or destruction of or interference with such system and assets would have a
debilitating impact on security, national or economic security, national public health and safety,
or any combination of those matters.
(k) Cybersecurity refers to the collection of tools, policies, risk management approaches, actions,
training, best practices, assurance and technologies that can be used to protect the cyber
environment and organization and user’s assets.
(l) Database refers to a representation of information, knowledge, facts, concepts, or instructions
which are being prepared, processed or stored or have been prepared, processed or stored in a
formalized manner and which are intended for use in a computer system.
(m) Interception refers to listening to, recording, monitoring or surveillance of the content of
communications, including procuring of the content of data, either directly, through access and
use of a computer system or indirectly, through the use of electronic eavesdropping or tapping
devices, at the same time that the communication is occurring.
(n) Service provider refers to:
(1) Any public or private entity that provides to users of its service the ability to communicate by
means of a computer system; and
(2) Any other entity that processes or stores computer data on behalf of such communication
service or users of such service.
(o) Subscriber’s information refers to any information contained in the form of computer data or
any other form that is held by a service provider, relating to subscribers of its services other than
traffic or content data and by which identity can be established:
(1) The type of communication service used, the technical provisions taken thereto and the
period of service;
(2) The subscriber’s identity, postal or geographic address, telephone and other access numbers,
any assigned network address, billing and payment information, available on the basis of the
service agreement or arrangement; and
97
(3) Any other available information on the site of the installation of communication equipment,
available on the basis of the service agreement or arrangement.
(p) Traffic data or non-content data refers to any computer data other than the content of the
communication including, but not limited to, the communication’s origin, destination, route,
time, date, size, duration, or type of underlying service.
CHAPTER II
PUNISHABLE ACTS
SEC. 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime
punishable under this Act:
(a) Offenses against the confidentiality, integrity and availability of computer data and systems:
(1) Illegal Access. – The access to the whole or any part of a computer system without right.
(2) Illegal Interception. – The interception made by technical means without right of any nonpublic transmission of computer data to, from, or within a computer system including
electromagnetic emissions from a computer system carrying such computer data.
(3) Data Interference. — The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message, without right,
including the introduction or transmission of viruses.
(4) System Interference. — The intentional alteration or reckless hindering or interference with
the functioning of a computer or computer network by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer data or program, electronic document,
or electronic data message, without right or authority, including the introduction or transmission
of viruses.
(5) Misuse of Devices.
(i) The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right, of:
(aa) A device, including a computer program, designed or adapted primarily for the purpose of
committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any part of a
computer system is capable of being accessed with intent that it be used for the purpose of
committing any of the offenses under this Act.
98
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent to use
said devices for the purpose of committing any of the offenses under this section.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to profit,
mislead, destroy reputation, and deprive others from registering the same, if such a domain
name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the registrant, in case of
a personal name; and
(iii) Acquired without right or with intellectual property interests in it.
(b) Computer-related Offenses:
(1) Computer-related Forgery. —
(i) The input, alteration, or deletion of any computer data without right resulting in inauthentic
data with the intent that it be considered or acted upon for legal purposes as if it were
authentic, regardless whether or not the data is directly readable and intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-related forgery
as defined herein, for the purpose of perpetuating a fraudulent or dishonest design.
(2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of computer data
or program or interference in the functioning of a computer system, causing damage thereby
with fraudulent intent: Provided, That if no
damage has yet been caused, the penalty imposable shall be one (1) degree lower.
(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another, whether
natural or juridical, without right: Provided, That if no damage has yet been caused, the penalty
imposable shall be one (1) degree lower.
(c) Content-related Offenses:
(1) Cybersex. — The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of a
computer system, for favor or consideration.
99
(2) Child Pornography. — The unlawful or prohibited acts defined and punishable by Republic
Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a computer
system: Provided, That the penalty to be imposed shall be (1) one degree higher than that
provided for in Republic Act No. 9775.
(3) Unsolicited Commercial Communications. — The transmission of commercial electronic
communication with the use of computer system which seek to advertise, sell, or offer for sale
products and services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or administrative announcements
from the sender to its existing users, subscribers or customers; or
(iii) The following conditions are present:
(aa) The commercial electronic communication contains a simple, valid, and reliable way for the
recipient to reject. receipt of further commercial electronic messages (opt-out) from the same
source;
(bb) The commercial electronic communication does not purposely disguise the source of the
electronic message; and
(cc) The commercial electronic communication does not purposely include misleading
information in any part of the message in order to induce the recipients to read the message.
(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the Revised Penal
Code, as amended, committed through a computer system or any other similar means which
may be devised in the future.
SEC. 5. Other Offenses. — The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully abets or aids
in the commission of any of the offenses enumerated in this Act shall be held liable.
(b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to commit
any of the offenses enumerated in this Act shall be held liable.
SEC. 6. All crimes defined and penalized by the Revised Penal Code, as amended, and special
laws, if committed by, through and with the use of information and communications
technologies shall be covered by the relevant provisions of this Act: Provided, That the penalty
to be imposed shall be one (1) degree higher than that provided for by the Revised Penal Code,
as amended, and special laws, as the case may be.
100
SEC. 7. Liability under Other Laws. — A prosecution under this Act shall be without prejudice to
any liability for violation of any provision of the Revised Penal Code, as amended, or special
laws.
CHAPTER III
PENALTIES
SEC. 8. Penalties. — Any person found guilty of any of the punishable acts enumerated in
Sections 4(a) and 4(b) of this Act shall be punished with imprisonment of prision mayor or a fine
of at least Two hundred thousand pesos (PhP200,000.00) up to a maximum amount
commensurate to the damage incurred or both.
Any person found guilty of the punishable act under Section 4(a)(5) shall be punished with
imprisonment of prision mayor or a fine of not more than Five hundred thousand pesos
(PhP500,000.00) or both.
If punishable acts in Section 4(a) are committed against critical infrastructure, the penalty of
reclusion temporal or a fine of at least Five hundred thousand pesos (PhP500,000.00) up to
maximum amount commensurate to the damage incurred or both, shall be imposed.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of this Act
shall be punished with imprisonment of prision mayor or a fine of at least Two hundred
thousand pesos (PhP200,000.00) but not exceeding One million pesos (PhP1,000,000.00) or
both.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2) of this Act
shall be punished with the penalties as enumerated in Republic Act No. 9775 or the “Anti-Child
Pornography Act of 2009″: Provided, That the penalty to be imposed shall be one (1) degree
higher than that provided for in Republic Act No. 9775, if committed through a computer
system.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3) shall be
punished with imprisonment of arresto mayor or a fine of at least Fifty thousand pesos
(PhP50,000.00) but not exceeding Two hundred fifty thousand pesos (PhP250,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 5 shall be
punished with imprisonment one (1) degree lower than that of the prescribed penalty for the
offense or a fine of at least One hundred thousand pesos (PhP100,000.00) but not exceeding
Five hundred thousand pesos (PhP500,000.00) or both.
101
SEC. 9. Corporate Liability. — When any of the punishable acts herein defined are knowingly
committed on behalf of or for the benefit of a juridical person, by a natural person acting either
individually or as part of an organ of the juridical person, who has a leading position within,
based on: (a) a power of representation of the juridical person provided the act committed falls
within the scope of such authority; (b) an authority to take decisions on behalf of the juridical
person: Provided, That the act committed falls within the scope of such authority; or (c) an
authority to exercise control within the juridical person, the juridical person shall be held liable
for a fine equivalent to at least double the fines imposable in Section 7 up to a maximum of Ten
million pesos (PhP10,000,000.00).
If the commission of any of the punishable acts herein defined was made possible due to the
lack of supervision or control by a natural person referred to and described in the preceding
paragraph, for the benefit of that juridical person by a natural person acting under its authority,
the juridical person shall be held liable for a fine equivalent to at least double the fines
imposable in Section 7 up to a maximum of Five million pesos (PhP5,000,000.00).
The liability imposed on the juridical person shall be without prejudice to the criminal liability of
the natural person who has committed the offense.
CHAPTER IV
ENFORCEMENT AND IMPLEMENTATION
SEC. 10. Law Enforcement Authorities. — The National Bureau of Investigation (NBI) and the
Philippine National Police (PNP) shall be responsible for the efficient and effective law
enforcement of the provisions of this Act. The NBI and the PNP shall organize a cybercrime unit
or center manned by special investigators to exclusively handle cases involving violations of this
Act.
SEC. 11. Duties of Law Enforcement Authorities. — To ensure that the technical nature of
cybercrime and its prevention is given focus and considering the procedures involved for
international cooperation, law enforcement authorities specifically the computer or technology
crime divisions or units responsible for the investigation of cybercrimes are required to submit
timely and regular reports including pre-operation, post-operation and investigation results and
such other documents as may be required to the Department of Justice (DOJ) for review and
monitoring.
SEC. 12. Real-Time Collection of Traffic Data. — Law enforcement authorities, with due cause,
shall be authorized to collect or record by technical or electronic means traffic data in real-time
associated with specified communications transmitted by means of a computer system.
102
Traffic data refer only to the communication’s origin, destination, route, time, date, size,
duration, or type of underlying service, but not content, nor identities.
All other data to be collected or seized or disclosed will require a court warrant.
Service providers are required to cooperate and assist law enforcement authorities in the
collection or recording of the above-stated information.
The court warrant required under this section shall only be issued or granted upon written
application and the examination under oath or affirmation of the applicant and the witnesses he
may produce and the showing: (1) that there are reasonable grounds to believe that any of the
crimes enumerated hereinabove has been committed, or is being committed, or is about to be
committed: (2) that there are reasonable grounds to believe that evidence that will be obtained
is essential to the conviction of any person for, or to the solution of, or to the prevention of, any
such crimes; and (3) that there are no other means readily available for obtaining such evidence.
SEC. 13. Preservation of Computer Data. — The integrity of traffic data and subscriber
information relating to communication services provided by a service provider shall be
preserved for a minimum period of six (6) months from the date of the transaction. Content data
shall be similarly preserved for six (6) months from the date of receipt of the order from law
enforcement authorities requiring its preservation.
Law enforcement authorities may order a one-time extension for another six (6) months:
Provided, That once computer data preserved, transmitted or stored by a service provider is
used as evidence in a case, the mere furnishing to such service provider of the transmittal
document to the Office of the Prosecutor shall be deemed a notification to preserve the
computer data until the termination of the case.
The service provider ordered to preserve computer data shall keep confidential the order and its
compliance.
SEC. 14. Disclosure of Computer Data. — Law enforcement authorities, upon securing a court
warrant, shall issue an order requiring any person or service provider to disclose or submit
subscriber’s information, traffic data or relevant data in his/its possession or control within
seventy-two (72) hours from receipt of the order in relation to a valid complaint officially
docketed and assigned for investigation and the disclosure is necessary and relevant for the
purpose of investigation.
SEC. 15. Search, Seizure and Examination of Computer Data. — Where a search and seizure
warrant is properly issued, the law enforcement authorities shall likewise have the following
powers and duties.
103
Within the time period specified in the warrant, to conduct interception, as defined in this Act,
and:
(a) To secure a computer system or a computer data storage medium;
(b) To make and retain a copy of those computer data secured;
(c) To maintain the integrity of the relevant stored computer data;
(d) To conduct forensic analysis or examination of the computer data storage medium; and
(e) To render inaccessible or remove those computer data in the accessed computer or
computer and communications network.
Pursuant thereof, the law enforcement authorities may order any person who has knowledge
about the functioning of the computer system and the measures to protect and preserve the
computer data therein to provide, as is reasonable, the necessary information, to enable the
undertaking of the search, seizure and examination.
Law enforcement authorities may request for an extension of time to complete the examination
of the computer data storage medium and to make a return thereon but in no case for a period
longer than thirty (30) days from date of approval by the court.
SEC. 16. Custody of Computer Data. — All computer data, including content and traffic data,
examined under a proper warrant shall, within forty-eight (48) hours after the expiration of the
period fixed therein, be deposited with the court in a sealed package, and shall be accompanied
by an affidavit of the law enforcement authority executing it stating the dates and times covered
by the examination, and the law enforcement authority who may access the deposit, among
other relevant data. The law enforcement authority shall also certify that no duplicates or copies
of the whole or any part thereof have been made, or if made, that all such duplicates or copies
are included in the package deposited with the court. The package so deposited shall not be
opened, or the recordings replayed, or used in evidence, or then contents revealed, except upon
order of the court, which shall not be granted except upon motion, with due notice and
opportunity to be heard to the person or persons whose conversation or communications have
been recorded.
SEC. 17. Destruction of Computer Data. — Upon expiration of the periods as provided in
Sections 13 and 15, service providers and law enforcement authorities, as the case may be, shall
immediately and completely destroy the computer data subject of a preservation and
examination.
104
SEC. 18. Exclusionary Rule. — Any evidence procured without a valid warrant or beyond the
authority of the same shall be inadmissible for any proceeding before any court or tribunal.
SEC. 19. Restricting or Blocking Access to Computer Data. — When a computer data is prima
facie found to be in violation of the provisions of this Act, the DOJ shall issue an order to restrict
or block access to such computer data.
SEC. 20. Noncompliance. — Failure to comply with the provisions of Chapter IV hereof
specifically the orders from law enforcement authorities shall be punished as a violation of
Presidential Decree No. 1829 with imprisonment of prision correctional in its maximum period
or a fine of One hundred thousand pesos (Php100,000.00) or both, for each and every
noncompliance with an order issued by law enforcement authorities.
CHAPTER V
JURISDICTION
SEC. 21. Jurisdiction. — The Regional Trial Court shall have jurisdiction over any violation of the
provisions of this Act. including any violation committed by a Filipino national regardless of the
place of commission. Jurisdiction shall lie if any of the elements was committed within the
Philippines or committed with the use of any computer system wholly or partly situated in the
country, or when by such commission any damage is caused to a natural or juridical person who,
at the time the offense was committed, was in the Philippines.
There shall be designated special cybercrime courts manned by specially trained judges to
handle cybercrime cases.
CHAPTER VI
INTERNATIONAL COOPERATION
Sec. 22. General Principles Relating to International Cooperation — All relevant international
instruments on international cooperation in criminal matters, arrangements agreed on the basis
of uniform or reciprocal legislation, and domestic laws, to the widest extent possible for the
purposes of investigations or proceedings concerning criminal offenses related to computer
systems and data, or for the collection of evidence in electronic form of a criminal, offense shall
be given full force and effect.
105
CHAPTER VII
COMPETENT AUTHORITIES
SEC 23. Department of Justice (DOJ). — There is hereby created an Office of Cybercrime within
the DOJ designated as the central authority in all matters related to international mutual
assistance and extradition.
SEC. 24. Cybercrime Investigation and Coordinating Center. — There is hereby created, within
thirty (30) days from the effectivity of this Act, an inter-agency body to be known as the
Cybercrime Investigation and Coordinating Center (CICC), under the administrative supervision
of the Office of the President, for policy coordination among concerned agencies and for the
formulation and enforcement of the national cybersecurity plan.
SEC. 25. Composition. — The CICC shall be headed by the Executive Director of the Information
and Communications Technology Office under the Department of Science and Technology
(ICTO-DOST) as Chairperson with the Director of the NBI as Vice Chairperson; the Chief of the
PNP; Head of the DOJ Office of Cybercrime; and one (1) representative from the private sector
and academe, as members. The CICC shall be manned by a secretariat of selected existing
personnel and representatives from the different participating agencies.
SEC. 26. Powers and Functions. — The CICC shall have the following powers and functions:
(a) To formulate a national cybersecurity plan and extend immediate assistance for the
suppression of real-time commission of cybercrime offenses through a computer emergency
response team (CERT);
(b) To coordinate the preparation of appropriate and effective measures to prevent and
suppress cybercrime activities as provided for in this Act;
(c) To monitor cybercrime cases being bandied by participating law enforcement and
prosecution agencies;
(d) To facilitate international cooperation on intelligence, investigations, training and capacity
building related to cybercrime prevention, suppression and prosecution;
(e) To coordinate the support and participation of the business sector, local government units
and nongovernment organizations in cybercrime prevention programs and other
related projects;
(f) To recommend the enactment of appropriate laws, issuances, measures and policies;
106
(g) To call upon any government agency to render assistance in the accomplishment of the
CICC’s mandated tasks and functions; and
(h) To perform all other matters related to cybercrime prevention and suppression, including
capacity building and such other functions and duties as may be necessary for the proper
implementation of this Act.
CHAPTER VIII
FINAL PROVISIONS
SEC. 27. Appropriations. — The amount of Fifty million pesos (PhP50,000,000.00) shall be
appropriated annually for the implementation of this Act.
SEC. 28. Implementing Rules and Regulations. — The ICTO-DOST, the DOJ and the Department
of the Interior and Local Government (DILG) shall jointly formulate the necessary rules and
regulations within ninety (90) days from approval of this Act, for its effective implementation.
SEC. 29. Separability Clause — If any provision of this Act is held invalid, the other provisions not
affected shall remain in full force and effect.
SEC. 30. Repealing Clause. — All laws, decrees or rules inconsistent with this Act are hereby
repealed or modified accordingly. Section 33(a) of Republic Act No. 8792 or the “Electronic
Commerce Act” is hereby modified accordingly.
SEC. 31. Effectivity. — This Act shall take effect fifteen (15) days after the completion of its
publication in the Official Gazette or in at least two (2) newspapers of general circulation.”
Upon seeing this Law, I believe that we should study the basics about hacking, not because we
want to hack people but we would like to have an idea on about how the real hackers are going
to approach our machines or our accounts.
Of course, having to study about hacking comes with good things and bad things. And one of
the bad things about knowing the basics of hacking is that, we might be overly impressed on
the power of hacking. And if this would continue to catch our interests and if we would continue
to practice our skills on hacking, we might turn into those hackers which we hate and who we
would really want to get caught because they are dangerous and they can get access to a lot of
people’s information.
The good thing about knowing the basics of hacking and that if we would continue to be on the
good side, is that we would know how to prevent these hackers that we are talking about from
107
having access to our information, machine, and accounts. Feeling and being secure is a must
because who would want their information to be on the hands of another person, knowing that
this person is a hacker and he or she does not have good intentions to do with that information
he or she has just stolen from you. This hacker could even gain access to your bank accounts
and could steal your money. So there are a few ways to be more secure and one way is for us to
change our passwords on our accounts every now and then. Another way is for us to install a
firewall on our computer. Another way for us to be secure is for us to install known or popular
anti-virus software because we would feel more safe knowing that we have the best and most
trusted anti-virus software installed on our machine.
108
CHAPTER 8
THE TECHNOLOGY OF PRINTING
8.1 THREE DIMENSIONAL PRINTING AVAILABLE TODAY
According to the article that Forbes’ has written, it says here that “There seems to be a
certain mismatch between legislators and reality here as Philadelphia passes a law that bans the
3D printing of guns like the Liberator. For rather the point about the 3D printing of guns is that
it doesn’t actually matter what the law says: anyone with a 3D printer can make them. But then
there is a certain disease that infects politicians which is that by making a speech, passing a law,
they have made that thing actually happen in the real world. Something that Healthcare.gov
should rather disabuse them of. The law says that people will be able to buy insurance on the
exchanges, the President has assured everyone that they will be able to by now. But reality can
be a tad stubborn at times.
Here’s a report of the announcement:
The Liberator made quite a name for itself a few months back when it became the first
functioning all-3D printed gun, and while its maker designed it with mass distribution in mind,
we now know one place where it’s unwelcome: Philadelphia. The city of Brotherly Love lived up
to its name yesterday, when the city council voted unanimously to ban folks from being able to
print plastic pistols with which to shoot each other. That’s right, it is now illegal to manufacture
guns via 3D printer in Philadelphia. As of this writing, Philly’s the first city to put such a ban in
place, and it’s not in response to a a rash of plastic pistols flooding the streets, either —
Philadelphia Magazine reports that it’s just a preventative measure.
The problem with this of course is that passing such a law is going to have absolutely no effect
whatsoever on the real world. It doesn’t matter whether you think that people should be able to
print guns in the privacy of their garage: or whether it’s an absolute outrage that people can
indeed print guns in their living room. The point is that whatever the law says they do now have
that technical capability. And the law isn’t really going to change the ability of anyone with a 3D
printer and an internet connection to do so.
Quite how simple this all is can be seen in Andy Greenberg’s excellent reporting here.
Now it could be that the Good Solons of the City of Brotherly Love know they are just making a
PR announcement here. But what worries me rather more is the idea that they might actually
109
think that by passing a law they have solved the real world problem. And this is an excellent
example of a law that will have no such effect at all. Whatever the law about it people will still be
able to print guns as they wish: meaning that if this is a problem that needs to be solved then
it’s one that needs to be solved in some other manner.”
Based from this article, we can say that it is more dangerous nowadays because we no
longer need a license to purchase a weapon; all we need is to have the machine for printing
three dimensional objects and the blueprint for the object which we would like to print.
On the positive note, these would be really helpful to a lot of people such as, engineers,
carpenters, workers, and etcetera. With this technology, they can easily produce their own tool
that they would need through printing it three dimensionally. If there would be missing parts,
or misplaced parts, or lacking parts, they do not need to purchase the parts from the store
anymore because they could just do it where the machine is located.
Behind every positive feature that this three dimensional printing is presenting to us, the
negative side will always be present. There are numerous threats that this technology presents,
one of the things that I have noticed with this technology is that the crime rates could greatly
increase and no one could track the bullets with each gun because there are no serial numbers
or what so ever.
110
CHAPTER 9
ROBOTICS
9.1 REPLACING HUMAN WITH ROBOTS
According to this article regarding artificial intelligence that TheGuardian has written, it
says here that “From personalised searches of Google to the seductive experience of driverless
cars, from educational robots that hone your French to prosthetics that are stronger and faster
than our own limbs: artificial intelligence is poised to revolutionise our lives.
Now scientists, legal experts and philosophers are joining forces to scrutinise the promise of
intelligent systems and wrangle over their implications. This week in Brighton, the fourth
EuCogIII members' conference is set to tackle these issues head on. "Fundamentally we're
interested in considering the ethical and societal impact of such systems," says Alan Winfield,
professor of electronic engineering at UWE Bristol. It is time, he says, to make some crucial
decisions. "If we get it wrong, there are consequences right now."
It's a point well illustrated by IBM's intelligent system, Watson. Two years after thrashing human
contestants at the quickfire quiz Jeopardy!, Watson has graduated from gameshows to medical
school and could soon be diagnosing diseases. This year commercial products based on Watson
were unveiled for clinical use, harnessing the system's ability to crunch through swaths of
medical information and make decisions.
"There is a huge amount of knowledge now that doctors can potentially have. Obviously they
can't absorb all of it and they can't necessarily remember all of it," says Tony Prescott, professor
of cognitive neuroscience at the University of Sheffield. With access to the latest developments
as well as the medical records of patients, systems such as Watson could suggest an accurate
diagnosis faster and more often, as well as predicting an individual's health risks.
But there is a hitch. With intelligent systems accessing medical records comes the fear of
compromised privacy and security, as many will be connected via the internet. Could we, or even
should we, be allowed to opt out of such an intelligent system? "It is a decision we have to make
as a society," says Prescott. "Whether we want to give up some of our privacy in order to get
improved services like better healthcare."
But how far can we trust such systems? Putting your faith in a "black box" may seem at best
naive, at worst reckless. It is an issue that boils down to trust, making it essential that doctors are
111
closely involved in training such systems, understanding how they work and confirming the
diagnoses are spot on.
At the heart of the revolution is you, the consumer. With computers getting smaller, more
powerful and more energy-efficient, few areas of our lives will remain untouched by intelligent
machines. Driverless cars are expected to cause a storm. "The technology is ready," says
Winfield. "The problem is insurance and legislation." While driverless cars could offer many
benefits, from bringing independence to the elderly to reducing the number of road accidents,
disasters ould still happen. Who then pays the damages – the owner, or the car producer?
Last year a European research project, RoboLaw, was created to tackle such legal conundrums
and will deliver its guidelines on regulations to the European commission in the spring. One
question is whether it's time to rethink liability to ensure safety and justice without
compromising the incentive for companies to develop the technology – "for instance, through
the usage of compulsory insurance schemes or by assessing so-called 'safe harbours' to shield,
in some cases under certain conditions, the liability of the producer of the car," explains Andrea
Bertolini, a post-doctoral fellow in private law at the Scuola Superiore Sant'Anna in northern Italy
and a member of the RoboLaw team.
And it is not just issues of liability that could be reformed. Fallible humans are constrained by
speed limits to reduce the number of crashes, but with an all-encompassing knowledge of road
layout and road users, intelligent cars could themselves decide how fast they travel, banishing
the need for fixed limits.
One of the greatest issues, says Bertolini, is that there are many types of robots each posing
different legal problems. State of the art prosthetic devices – essentially wearable intelligent
robots – could soon outperform our natural limbs, raising new concerns that the technology
could become available to individuals who may wish to trade in their healthy body parts for a
prosthesis. "Should this be regulated, and eventually if it should be regulated, how should it be
regulated?" asks Bertolini.
The questions become even more pressing when the possibility of implants are considered –
imagine a brain chip that could let you check your email, search the internet or tap in to GPS. It's
the ultimate "hands-free" device.
This possibility of becoming "bio-hybrid" may sound futuristic, unlikely even. But when
technology develops, it develops quickly. "It is moving way faster than legislation can keep up
and yes, it's a problem," says Tony Belpaeme, professor of cognitive systems and robotics at the
University of Plymouth.
112
And the issues are international. "The trouble is that your data is now globally spread and
legislation isn't the same across various regions across the planet," says Belpaeme. With recent
revelations over the access and use of data by various government agencies still reverberating,
issues of data storage, privacy and security need to be aired openly. "How much worse would it
be if there were such external and covert constraints on cognitive technology?" asks Dr Ron
Chrisley, reader in philosophy at the University of Sussex and one of the conference organisers.
With the possibility of technology becoming intertwined with our very bodies, the threat of
unauthorised access looms large.
Running scared is not an option. Intelligent systems offer us the chance to hone many
fundamental areas of our lives, including education. It's an effect Belpaeme has seen firsthand
through his research into use of social robots in education. While current computer systems can
support learning, robots, particularly those sporting a face and personalised conversation, evoke
a stronger response. "What we found is that if you have a robot there taking you through
exactly the same exercises, the children learn faster and better," says Belpaeme.
"I can just see a future where you have one or two robots sitting in the corner of a classroom,"
he says. "If you just need a little push or you want to be challenged, you get 20 minutes or half
an hour with a robot." According to Belpaeme, hospitals could benefit from such technology,
with robots teaching children how to manage their medical conditions, while in care homes such
robots could help the elderly with their daily exercises.
With such technological leaps set to transform our lives we, the public, need to be involved in
the discussion, shaping policy and priorities from the outset. "I think that the greatest risk with
these kinds of technologies is that they come along and they are a big surprise to people," says
Prescott. Which is why, before the conference, you are invited to post questions for experts to
discuss. You can also follow the event on Twitter through the hashtag #robotsandyou.
Intelligent machines could turn education, healthcare and daily life into optimised, tailored
experiences. Getting society on side is big, and it's clever.
FUTURE QUESTIONS
Driverless cars
Who pays damages in an accident?
Should children and the elderly be allowed to 'drive' them too?
Should such cars have to obey current road rules, such as speed limits?
Intelligent prostheses
113
Will robotic enhancements give users an unfair advantage?
Should intelligent prostheses be available to the able-bodied?
Who decides whether you should be allowed a prosthesis?
Social robots
Could faults in or hacking of intelligent robots cause physical harm to users?
Will intelligent robots redefine the roles of teachers, carers and others?
Implanted devices
Will intelligent implants mean the end of privacy?
Who will technically own the device and its data?
Will implants make exams worthless, as inherent ability becomes blurred?
Medical assistants
How far should doctors trust intelligent systems?
Who gives consent to sharing medical records with intelligent systems?
Will intelligent systems be able to democratise access to the best diagnostic medicine?”
Based from this article, I can say that this is really a turning point when it comes to
dealing with people because they will lose jobs. After they lose their jobs, they will not be able
to earn money for their children, families, wants, needs, and etcetera. Robots will be the
dominant work force that will take over the regular jobs that could be done by regular humans.
Of course the positive effects will always be present and one of the effects that I have
noticed is that robots do not eat or sleep which is really good for companies that never has time
to stop the process such as, security companies, fire departments, ambulances, hospitals, and
etcetera. Another thing that I have noticed is that high risk jobs would be done by the robots as
well. On the side of the military, it would be much better since fewer lives would be lost.
On the other hand, the negative effects will always be present as well; one of these
negative effects is that having to create your own private army is possible since they are only
robots and hackers could be able to program these robots to do something that they wish it
would do. These robots could be used to do crime rather than doing it yourself. Speaking of
114
these negative effects, robots are programmed through the Three Laws of Robots which was
made by Isaac Asimov, which are stated below:
“A robot may not injure a human being or, through inaction, allow a human being to come to
harm.
A robot must obey orders given it by human beings except where such orders would conflict
with the First Law.
A robot must protect its own existence as long as such protection does not conflict with the First
or Second Law.“
Upon seeing these three laws on robotics, we should be able to feel more safe since we
know that these robots cannot injure human beings or harm human beings, robots will obey the
orders given, and that the robot itself must protect its own existence.
115
CHAPTER 10
TELCO WARS
10.1 GLOBE VS PLDT
According to the article I have found in Rappler, telephone companies have initiated a
war, it says here that “MANILA, Philippines - The war between the country's two largest
telecommunication firms Globe Telecom and Philippine Long Distance Co (PLDT) is reaching
fever pitch.
In June, both claimed to be No. 1 in the postpaid segment – PLDT by number of subscribers and
Globe by revenue per subscriber in the first 3 months of 2012.
In August, a "word war," which used to be confined among industry players, intensified and
became more public. Globe CEO Ernest Cu lashed out at PLDT for the ads of its mobile arm
Smart Communications on dropped calls of "other networks."
"They choose to focus on a negative aspect of advertising against us. If you look at Globe, our
advertising has always been on the positive side… It's a little bit surprising to see this type of
advertising going on," he told Rappler at an August 23 press briefing.
In early September, Globe customers took to social media to vent their complaints about
connectivity problems. Smart, on the other hand, cited the social media posts to stress that
more subscribers want to shift carriers.
In the months ahead, both are racing to snap up customers for Long Term Evolution (LTE)
service, considered a faster and more reliable form of 4G technology. PLDT offered the first LTE
service for broadband on August 25. While Globe is following with a broadband LTE option,
called Tattoo Black, in September.
Rappler decided to take a closer look to see how the two competitors really match up. Rappler
interviewed top executives from both companies and reviewed nearly a decade of reports
submitted to the Philippine Stock Exchange.
We found that in terms of revenue and market share, PLDT still dominates the prepaid market,
which it has catered to historically. PLDT's lower-end brand Talk 'N Text is not only retaining
customers but pulling in the majority of the firm's prepaid growth.
116
Meanwhile, Globe, which has been strong in the lucrative postpaid market in the past, is
retaining customers and still brings in a bigger profit than its competitor. Yet PLDT has made
notable inroads in the postpaid segment, and is quickly closing the revenue gap and has even
surpassed Globe's postpaid subscriber count, thanks to the acquisition of rival Digital
Telecommunications Philippines Inc last year.
Globe's stronghold on postpaid
A key battle ground is the lucrative postpaid market, in which customers are bound by a service
contract and billed monthly. Postpaid subscribers have 3 key attributes prized by mobile phone
operators in a competitive environment – they are loyal, usually willing to pay more, and hungry
for broadband service.
For both firms, the postpaid segment is crucial as a source of future growth. Globe's senior
advisor for consumer business Peter Bithos explained: "As the Philippines gets more developed,
[and] as households get richer, more and more customers will choose postpaid."
It's a trend telecommunications companies have to invest in, he added.
Globe started out catering to premium postpaid users and has largely managed to hold onto
those users.
Churn rate, a market measure for how fast a company is losing customers, stood at a low 1.8%
in the first 6 months of the year. That number could reflect longtime subscribers' unwillingness
to change brands when their co-workers, friends or family members are on the same network.
This means they can take advantage of promotions that make connecting to those within the
same network cheaper.
By comparison, Smart lost a slightly higher 2.8% of postpaid customers for the same 6 month
period.
"Maybe in the past, Smart was not really the primary number, and, therefore, if it was not the
primary number, it was easier to shift out. I see that changing, given the fact that we're pushing
harder to deliver better services," explained the head of Smart's Wireless Consumer Division
Noel C. Lorenzana.
Globe also managed to add more postpaid customers than its rival brand Smart in the latest 3
month fiscal period.
From April to June, Globe added 59,322 postpaid subscribers or about 27 every hour, while
Smart added 24,862 or roughly 11 every hour. But Smart was coming from a lower base. The
117
two brands were neck-in-neck where it counts – growth rate, which stood at 4% quarter-onquarter.
The additions came at quite a cost to Globe, which shelled out P8,119 to attract each additional
customer. PLDT's first half financial report did not list subscriber acquisition cost for the period.
It remains to be seen if the seemingly high cost was worthwhile for Globe since, according to
Bithos, the company mainly added lower-paying customers. Still, those are customers who will
be locked into postpaid contracts with Globe temporarily.
As of end-June, postpaid market share by brand was led by Globe with 43%, followed by
Digitel's Sun Cellular brand with 39.7%, Smart with 17.2%, then Red Mobile with less than 1%.
Mobile brands Sun, Smart and, previously also Red Mobile, are all under the PLDT umbrella.
However, Smart-operator Philippine Long Distance Telephone Company (PLDT) has begun to
dominate pockets of the postpaid market that should worry its competitor.
PLDT's strategy in postpaid
As a group, PLDT holds the lion's share of postpaid customers since the group acquired Sun
Cellular operator Digital Telecommunications Philippines (Digitel) in late 2011. By end-June, 2.12
million postpaid customers were under the umbrella of PLDT companies, while Globe Telecom
held 1.6 million.
Aside from subscriber count, however, the creditors' and investors' points of view are also
important to consider given that this capital intensive industry constantly needs access to
financing. These creditors and investors also watch how much the companies are making from
each subscriber.
Although Globe was once primarily associated with the premium market and Smart with the
mass market, Smart has cornered a high-paying niche of the postpaid market. Smart now makes
more on average from each postpaid subscriber.
In the graph below, Smart has steadily been making more on average from customers, as
measured by the industry indicator known as ARPU, or average revenue per user. Looking at
gross ARPU for the first half of the year, Smart made P1,290 from each postpaid customer, while
Globe made P1,189.
*The 2011 period for Sun Cellular begins in October 26 when the brand and its subscribers were
acquired by PLDT.*The 2011 period for Sun Cellular begins in October 26 when the brand and its
subscribers were acquired by PLDT.
118
"The new customers that are coming in are very different than our historical postpaid base," said
Globe's Bithos.
"We're bringing many more customers than the competition into the business at the mid and
low-end, and that's bringing down the weighted average," he explained.
In a seeming flip-flop of strategies, Smart is now seeking to define itself as the top premium
brand.
"Well, apparently, that's their (Globe's) strategy now. They're actually choosing price to get subs
(subscribers). For us, our strategy is to provide quality. We are now the higher ARPU," said
Smart's Lorenzana.
"If that means pushing Smart above all the others, we will do that. It's now looking like Smart is
more and more the leading edge brand. Talk 'N Text becomes the everyday brand for every
Filipino. Filipinos love sachet pricing. Talk 'N Text will give them that. We need to cover all
relevant segments," said Lorenzana.
Acquiring Digitel has given PLDT flexibility to tailor its brands and target the high-end postpaid
market with Smart and the low-end prepaid market with Talk 'N Text. With more brands, PLDT is
able to focus in on different segments of the market. With Smart, Sun Cellular, and Talk N' Text
all under the same parent firm, each can take advantage of synergies, including a vast
infrastructure network system of the PLDT group.
In the Philippines, it is not uncommon for those who can afford a phone to have two, one for
each network, or a single phone with two SIM card slots. Thus, PLDT is hoping to harness more
partnerships between the brands it holds.
"Remember, the reason Sun [Cellular] grew was because it was the favorite second number.
What we'd like to do is, if there was a chance to make the Smart-Sun combo for the subscriber,
[then] why not? Because you have to go deep into what do the subscribers want. Maybe for the
primary number they want the cutting edge service like LTE, and for the secondary number they
want it for emergencies or the extended circle. It's all about circles, who is your primary circle
and who is your secondary circle," said Lorenzana.
Despite the advantage of partnering brands, PLDT's brands don't bring in as much total revenue
as Globe's. PLDT still has some catch-up to do since, in the first 6 months of the year, postpaid
revenue came in at P8.16, compared to Globe's P10.9 billion.
Prepaid still lion's share of profits
119
In the future, postpaid is an important market to keep an eye on, especially looking at
developed countries like the US, where service contracts are standard. Yet as a developing
country, much of the Philippines' present is dominated by pay-as-you-go, or prepaid, customers.
"Postpaid remains a very critical line of business for us. But prepaid is still the lion's share of
revenue and profitability," admitted Bithos.
From January to June, the prepaid market made up 67% of Globe's mobile revenues and 82% of
PLDT's – the most sizable chunk of the profit pie.
Of the over 95 million prepaid subscribers on the two networks, the majority (68.4%) reside with
PLDT and just under a third (31.6%) belong to Globe.
In terms of number of customers, average revenue from each, and total revenue, PLDT has
clearly retained its historic hold on the prepaid market.
*The 2011 period for Sun Cellular begins in October 26 when the brand and its subscribers were
acquired by PLDT.*The 2011 period for Sun Cellular begins in October 26 when the brand and its
subscribers were acquired by PLDT.
The average prepaid user may not bring in much revenue, but Smart has consistently made the
most money from each one over the years. Globe comes in with the second highest ARPU,
followed by Talk 'N Text and trailed by Red Mobile.
Most brands are losing customers at about the same rate. PLDT's Red Mobile was the exception,
losing 19.2% of its customers from January to June, when PLDT said it would surrender CURE,
Red Mobile's operator, to the National Telecommunications Commission.
Globe and Smart were neck and neck, respectively shedding 5.6% and 5.9% of customers during
the same 6 month period. Globe's Bithos was quick to point out that while the rates are similar,
Smart has many more prepaid customers so their equivalent number of lost customers
represents a greater overall loss.
However, one of PLDT's largest prepaid brands, Talk 'N Text, only lost 4.9% of its customers
during the period. Globe's equivalent brand, Touch Mobile, was relatively higher with a 6.3%
turnover.
What's different about the prepaid market today is that the majority of growth is coming from
Talk 'N Text.
120
PLDT's Talk 'N Text not only retained the most customers, but also grew 21% in the first half of
the year, compared to the same period in 2011. The high growth figure is affirmation of PLDT's
more targeted approach and shift away from Smart as its mass market brand. Prepaid customers
of main mobile brand Smart only grew a mere 1%.
Globe's growth wasn't nearly as robust at Talk 'N Text's. In the same period, Globe prepaid grew
9% and Touch Mobile increased 12%.
However, Globe's figures still show steady growth in the prepaid market.
Healthy competition
In the telco wars, it actually benefits the Filipino customer to have no clear winner. Battling it out
for subscribers forces both companies to improve their service as they see the opponent making
gains in key territory.
Arguably, even more competitors would benefit consumers. Lorraine Carlos Salazar's insightful
book "Getting a Dial Tone: Telecommunications Liberalization in Malaysia and the Philippines"
chronicles the high rate of dropped calls and the long time it took customers to get a phone
when PLDT was the only national network for decades before the turn of the century.
Customer favorites, like bucket unlimited pricing, are the result of a healthy 3 way competition
among telecommunications firms.
Filipinos should be worried if one competitor takes it all in the telco wars. - Rappler”
Based from this article, I can say that these two telephone companies are the ones who
are providing the best services to the Filipino People. The issue on this article is that if one of
these two telephone companies accepts its defeat against the other telephone company, the
Filipino people would have no choice but to follow the pricing offered by the monopolizing
company.
121
CHAPTER 11
PRIVACY ISSUES
11.1 GOOGLE GLASS
According to this article I have read about Google Glass, there are questions raised and
should be answered, and it says here that “To hear some people tell it, Google Glass is leading
us down a path toward a world where every citizen is a walking, hidden spy, surreptitiously
recording videos and photos of everything — and everyone — we see. What’s more, they’re
afraid that those videos and images are being posted on the Internet for all the world to see,
warts and all.
Some are afraid that Glass is auto-recording (or will) everything it can see or hear, and each
word you’ve ever spoken within earshot of Glass will be available in Google’s search index.
These fears typically come from people that don’t know how Glass works. They’ve never worn it.
And despite that lack of first-hand knowledge, they’ve decided that Glass is a privacy disaster
waiting to happen.
The problem: Those folks aren’t contributing anything of substance to a discussion that needs to
take place. Hysterical fear-mongering makes for good headlines, but it doesn’t advance the
conversation.
In this latest installment of our Google Glass Diary series, I’d like to make the case that some of
the privacy concerns with Google Glass are overblown, while others are very legitimate issues
that we should be discussing. I’m not arguing against any discussion on Glass and privacy; I’m
arguing for a more balanced and intelligent discussion than I’ve seen so far.
What They’re Saying About Google Glass & Privacy
A group of US Congress members sent Google a letter in mid-May with several privacy-related
questions about Glass. Among other things, they asked
if Glass unintentionally collects data (they referenced the recent Street View wifi sniffing mess)
if non-users are also covered by Google’s privacy policies and protections
if Google Glass will support facial recognition technology
if Glass stores user data and, if so, how is it protected
122
Canadian privacy officials followed suit in mid-June with their own letter to Google on Glass and
privacy. Among other things, they asked
how Glass complies with data protection laws
what data is collected via Glass and is that data shared with developers
is Google doing anything about the “surreptitious collection of information about other
individuals”
how does Google plan to deal with facial recognition issues in the future
Beyond governmental questions, some businesses have banned Glass from their premises over
privacy concerns. Numerous articles in recent months have covered how strip clubs, casinos,
movie theaters and at least a couple restaurants/cafés are putting up proverbial “no Glass
allowed”signs. (This NBC News article on the topic is pretty good.)
Consumer Watchdog, a group that’s been hammering Google for years over privacy issues,
recently described Glass as “one of the most privacy invasive devices ever” and called on Google
to give citizens a way to remove videos or photos taken of them by Glass users without
permission from Google’s servers.
Even Google reportedly banned Glass from its own shareholders’ meeting in June! (The
Consumer Watchdog quote is from a news release reacting to that news.) Word spread like
wildfire — and plenty of laughter did, too. Reality check: All recording devices were banned.
In a recent UK survey, 20 percent of consumers said they think Glass should be banned
completely due to privacy issues.
Clearly, there’s a lot of concern about Glass and privacy. Some of it is legitimate. Some of it is
born of ignorance about how Glass works. And some of it sounds like nothing more than
overstated hysterics.
Why Some Privacy Concerns Are Overstated
In its current form, the way Glass is built and the way it works makes some of the public fears
over Glass little more than hype. Many of those fears center on the idea that Glass wearers will
be secretly taking photos and recording videos of others. But consider this:
Glass goes into standby mode very quickly. And from there, it requires noticeable
movement/gestures to be activated. You either have to reach up and touch Glass to activate it,
or you have to tilt your head back (like “Randall Meeks” did in the hysterical Saturday Night Live
skit that wasn’t too far from reality).
123
When Glass is activated, the user can only photograph what s/he’s looking at. There’s no quiet
way to take pictures around corners or over walls like you could easily do with smartphones and
small cameras.
The camera isn’t very powerful and has no zoom capabilities. When I’m taking pictures or
shooting video, it’s hard to see people (and what they’re doing) unless they’re within 30-40 feet.
A still photographer with a DSLR camera that connects to the internet is much more capable of
violating someone’s privacy than I am when wearing Glass.
Photos and videos done with Glass aren’t uploaded publicly to the web, despite what some
would have you believe. They are uploaded privately to Google+ via Auto-Backup and can be
shared publicly from there. “Potential privacy violation!,” some scream. But that’s exactly how
iPhone photos work with Apple’s “Photo Stream” app. (However, unlike Photo Stream, you can’t
currently turn off the Auto-Backup feature on Glass. Google says that’s because Glass has
limited storage space — 16GB, minus space for application information and software libraries —
and it doesn’t want Glass users to lose their photos and videos or run out of space. I think
Google should give users the option of turning off Auto-Backup for Glass, just like they can do
when using iOS or Android devices.)
In a group of people, it’s almost impossible to activate Glass and take photos/videos without
being noticed. Many of the concerns and scenarios that people are dreaming up about Glass
could be applied just as equally to smartphones. Consider this:
A Glass vs. Smartphone Privacy Scenario
I walk up to you at our SMX East marketing conference with Glass on and join a conversation
that you’re having. You might be worried that I’m recording video without your knowledge.
There’s no red indicator light flashing, after all. Fair enough. But if I’m shooting video, you will
see the Glass display cube lit up, and that’s a signal I might be recording video. Or I might not.
Iphone-pocketBut what if I walked up to you and joined that conversation without Glass on, but
instead with my iPhone tucked into my shirt pocket — like you see in the image at right.
Just like Glass, there’s no flashing red light there to let you know that I’m shooting video. I could
record the whole conversation and you’d never know. With the smartphone’s superior battery
life, I could record a lot longer than with Glass. And with its superior audio and video quality, it’d
be a much better video than with Glass.
Or forget about the phone-in-pocket scenario. I could be holding my iPhone in my hand, down
at waist level, and still be recording the whole conversation without your knowledge.
124
But you don’t hear anyone talking about the privacy dangers of smartphones that can shoot
photos and video. Consumer watchdog groups aren’t calling for Apple and Samsung and other
phone manufacturers to give citizens a way to remove photos that are taken of them with
iPhones and other smartphones. You don’t see 20 percent of UK citizens saying smartphones
should be banned. There’s plenty of privacy fear surrounding Glass, but smartphones are
capable of the same things (and more) that are driving the fear.
(Despite the above, I do think that Google should add a small red light indicator that flashes
when Glass is recording video, primarily to calm people’s nerves.)
Google’s Response on Glass Privacy
Google addressed Glass and privacy with a few brief comments during its I/O conference in May
— when news of that Congressional letter broke.
It explained more in the four-page response to that Congressional privacy letter. Susan Molinari,
Google’s VP for Public Policy and Government Relations, talked about the social cues that make
it evident when Glass is in use.
Those social cues are laid out most clearly in a new Google Glass FAQ that the company has just
published.
Q: What have you done to inform non-Glass users if a picture or video is being taken?
A: We have built explicit signals in Glass to make others aware of what’s happening. First, the
device’s screen is illuminated whenever it’s in use, and that applies to taking a picture or
recording a video. Second, Glass requires the user to either speak a command — “OK Glass, take
a picture” or “OK Glass, record a video” — or to take an explicit action by pressing the button on
the top of Glass’s frame. In each case the illuminated screen, voice command or gesture all make
it clear to those around the device what the user is doing.
That FAQ contains the most comprehensive look at Glass and privacy — from Google’s point of
view and in Google’s words — that I’ve seen to date. It’s a welcome addition to the privacy
discussion, but I suspect Google will need to do much more about educating the public on the
subject of Glass and privacy.
Privacy Has To Be Discussed
Don’t get me wrong: I’m not saying Glass is free from privacy issues and that no one should
worry about or discuss Glass this way. Quite the contrary. There should be — has to be — a
discussion about Google Glass and privacy. But it needs less hype, less fear, and more balanced,
rational conversation. A few things that conversation should include:
125
Facial Recognition
This is one of the hot-button topics with Glass and privacy. There are fears that Glass could allow
wearers to learn information about anyone that its camera sees.
Google has already announced that it won’t approve any Glass apps that use facial recognition,
and the new FAQ says Google isn’t planning to add the technology to Glass itself.
Glass doesn’t do facial recognition, and we have no plans to add it.
Prior to that statement in the Glass FAQ, Google’s policy has been that it “won’t add facial
recognition features to our products without having strong privacy protections in place.” That
obviously opens the door to someday allow facial recognition in Glass (and other Google
products). So, this is something that needs to continue to be discussed.
Glass & User Data
The new FAQ addresses this topic in a couple different spots. It says that Google doesn’t always
know what the Glass user is doing or seeing; it points to the company’s privacy policy when
answering a question about what user data is collected; and it explains that apps specifically
indicate what account permissions they need when being installed.
Not mentioned is this little-known fact: Searches that you do via Google Glass don’t show up in
your Google account’s search history. As long as that’s the case, you could argue that Google
stores less user data from Glass than it does from other devices and platforms.
Still, given Google’s history with user data and privacy (think back to the WiSpy and Google Buzz
screw-ups, for example), this is a topic that needs to be discussed more as Glass and its app
ecosystem develop.
Glass for Prescription Glasses
Yikes. This is going to get dicey. In that Glass FAQ, Google says it expects to release frames that
will let users add prescription lenses to Google Glass.
Great news for glass (lowercase “g”) wearers! But just watch the privacy battles roll in left and
right.
Casinos, for example, are starting to ban Google Glass, just like they also ban the use of
smartphones while gambling. But if Joe Gambler is wearing Google Glass with his prescription
lenses, will they tell him he has to gamble with less than full vision? Movie theaters are also
starting to say “no Glass” just like they ban talking on phones and recording with smartphone
126
cameras. Are they going to tell Sally Moviefan that she has to take her prescription Google Glass
off if she wants to (try to) watch Iron Man 4?
Telling consumers they’re not allowed to wear prescription glasses because Google Glass is
attached sounds like a recipe for trouble.
Current Privacy Laws
In the US, we have laws that give citizens a “reasonable expectation of privacy” and protect them
from privacy invasions when such an expectation exists. I’m not a lawyer, but as I understand it,
that expectation doesn’t exist when you’re out shopping, at a sporting event or concert, or
pretty much anywhere in public. Others have the right to record you — whether it’s with Glass
or with any other device. (In Hawaii a couple weeks ago, I was perfectly within my rights to shoot
a photo of a stranger sitting on a beach admiring the sunset.)
We’d all be well-served to remember this when we’re discussing Glass and privacy. If you’re out
in public, the law already states that you shouldn’t expect privacy.
Final Thoughts
Glass isn’t the first piece of wearable computing. But it is the most mainstream, and that means
we’re getting into new territory where personal tech is concerned. Glass already raises many new
questions on privacy, and as time passes, there’s no doubt it’ll raise more — likely some
questions that we can’t even imagine right now.
But that doesn’t justify the hysterics and hype about outlandish scenarios where Glass turns us
all into walking spies, secretly recording every movement we make, and every movement the
people around us make.
The reality is, on one hand, that Glass does have a number of safeguards built in and there are
several ways in which it’s easier for you to be recorded by someone with other devices (digital
cameras, smartphones) than by someone wearing Glass. On the other hand, there are legitimate
privacy issues that we need to work through as more people begin to wear Glass.
As I said, I’m not dismissing all of the privacy concerns that Google Glass raises. I’m not
dismissing the privacy debate at all. It’s a discussion that needs to happen. When it does, let’s
make sure it’s based on real information and awareness, not on fear and hype.”
Based from this article regarding Google Glass, this is one of the first most advanced
wearable technologies that we have gotten our attention because you can now make phone
calls without even having to wear a set of earphones. The technology used for the audio sends
vibrations through the bones of the skull until they reach the inner ear. The technology has a
127
computer like capability because you can take photos, record videos, talk to people through
using the Bluetooth technology which is connected to your smartphone.
Regarding the Privacy Issues that struck Google Glass, if this technology was hacked, we
would never know if we are being recorded, stalked, being followed, or audio tracked, and may
have access to the photos we have taken, and the videos that we have shot.
11.2 APPLE
According to the article written in Wired, it says here that Apple collecting your iPhone
Location Data, and it says here that “iPhone and iPad customers were spooked Wednesday to
find out that their devices have recorded a detailed history of their geographical locations for
the past year in an unprotected file. But it turns out that Apple already explained its locationcollection practices in a detailed letter — almost a year ago.
And even though Apple has provided an explanation, there’s still a problem — the fact that this
file containing the data is so easily accessible to anyone, and the fact that this data is stored in
such an intricate manner that doesn’t seem to benefit the customer.
“I’m guessing someone screwed up,” said David Navalho, a pHD student specializing in location
services on mobile devices with advanced sensors. “It’s basically bad for users. If someone steals
the phone they have access to a lot of data.”
The privacy scare stems from a discovery by two data scientists, who revealed Wednesday that
iPhones and iPads contain an unencrypted file called “consolidated.db,” which has been tracking
and recording your location data in a log accompanied with time stamps for the past 10 months.
Apple’s general counsel Bruce Sewell in July 2010 sent a 13-page letter (.pdf) explaining its
location-data-collection techniques in response to a request from Congressmen Joe Barton and
Edward Markey asking for Apple to disclose such practices (.pdf). (Incidentally, Markey authored
the “Do Not Track” bill to stop online companies from tracking children.)
Apple doesn’t specifically note the “consolidated.db” file in the letter, but the letter explains how
and why Apple keeps such a detailed log of location data from mobile devices.
How is Apple collecting geodata?
According to Apple’s letter, geodata is being tracked and transmitted to Apple only if a
customer toggles the Location Services option in the settings menu to “On.” If it’s off, no
location-based information will be collected.
128
If the Location Services setting is flipped on, the iPhone, 3G iPad and, to a more limited extent,
the iPod Touch and the Wi-Fi iPad, are transmitting geodata to Apple under different
circumstances.
Apple is collecting information about nearby cell towers and Wi-Fi access points whenever you
request current location information. Sometimes it will also do this automatically when you’re
using a location-based service, such as a GPS app.
As for GPS information, Apple is collecting GPS location data only when a customer uses an
application requiring GPS capabilities.
Apple claims the collected geodata is stored on the iOS device, then anonymized with a random
identification number generated every 24 hours by the iOS device, and finally transmitted over
an encrypted Wi-Fi network every 12 hours (or later if there’s no Wi-Fi available) to Apple. That
means Apple and its partners can’t use this collected geodata to personally identify a user.
At Apple, the data gets stored in a database “accessible only by Apple,” the letter says.
“When a customer requests current location information, the device encrypts and transmits Cell
Tower and Wi-Fi Access Point Information and the device’s GPS coordinates (if available) over a
secure Wi-Fi Internet connection to Apple,” Apple wrote in the letter.
Why is Apple collecting geodata?
The purpose of all this, according to Apple, is to maintain a comprehensive location database,
which in turn provides quicker and more precise location services.
“Apple must be able to determine quickly and precisely where a device is located,” Apple said in
its letter. “To do this, Apple maintains a secure database containing information regarding
known locations of cell towers and Wi-Fi access points.”
In older versions of Apple’s mobile OS (1.1.3 to 3.1), Apple relied on Google and Skyhook
Wireless to provide location-based services — so Apple left data collection to them. But ever
since April 2010, starting with iPhone OS 3.2 and continuing into the current iOS 4 software,
Apple has started using its own databases to provide location-based services to iOS devices.
“These databases must be updated continuously to account for, among other things, the everchanging physical landscape, more innovative uses of mobile technology, and the increasing
number of Apple’s users,” Apple said in its letter.
Navalho explained that mobile location services work like this: To get your location, first the
iPhone or iPad pulls from Apple’s database containing previously stored information about
129
nearby cell towers and Wi-Fi spots to quickly triangulate your location, and then finally the GPS
chip analyzes how long it takes satellite signals to reach the device in order to pinpoint location.
In short, Apple’s stored location database is intended to assist and quicken location processes
on iOS mobile devices.
The problems
However, one problem here is that after this information is sent to Apple, there’s no customer
benefit for that geodata to be stored on your iPhone or iPad for any longer, Navalho said.
In other words, after that data is transmitted to Apple “every 12 hours,” Apple’s database should
already have the data needed to improve your location services, and there’s no reason for it to
stick around on your device — especially after 10 months.
Plus, Apple explicitly said this database is “accessible only to Apple” — but in actuality the
database of your approximate locations is accessible to anyone with physical or remote access
to your iPhone or iPad. Again, that’s a security issue.
“There’s really no reason for the information to be there,” Navalho said. “I’ll just assume they
didn’t erase it and that it’s a security issue, and hopefully they’ll fix it.”
Therefore, the core issue reported Wednesday remains the same: A hacker or thief gaining
access to your iPhone or iPad can easily dig into the consolidated.db file and figure out where
you live, or other places you’ve frequented. Apple uses rich geodata to assist your location
services, but it doesn’t need to be stored on your device permanently.
“What Apple is doing actually puts users very much at risk,” said Sharon Nissim, consumer
privacy counsel of the Electronic Privacy Information Center. “If one of these devices is stolen,
[the thief] could easily discover details about the owner’s movements.””
After reading and knowing about the article stated above, it would really feel
uncomfortable knowing that Apple has your Location Data because they could be able to track
you wherever you are without even asking for permission.
There are numerous positive and negative effects that this states, one of these positive
effects is that, when your phone gets stolen, there could still be a way for you to retrieve it back
knowing that apple has the Location Data of your phone, you could just contact them and tell
them about what happened and they might be able to track down your stolen phone for you to
retrieve it from thief.
One of the negative effects is that you are putting the trust with Apple about your
Location Data, and what if they do not use it for the good.
130
Reference:
http://en.wikipedia.org/wiki/Cyberethics
http://en.wikipedia.org/wiki/Electric_motor
http://tools4clil.wordpress.com/2012/08/08/advantages-and-disadvantages-in-usinginformation-technologies/
http://www.buzzle.com/articles/advantages-of-information-technology.html
http://smallbusiness.chron.com/disadvantages-information-technology-business-4020.html
http://en.wikipedia.org/wiki/Cyberethics
http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
http://plato.stanford.edu/entries/ethics-computer/
http://www.infosec.gov.hk/textonly/english/yourself/acceptable.html
http://en.wikipedia.org/wiki/Computer_virus
http://www.merriam-webster.com/dictionary/game
http://theweek.com/article/index/241121/7-health-benefits-of-playing-video-games
http://en.wikipedia.org/wiki/Video_game_genres
http://en.wikipedia.org/wiki/Gamer
http://www.siliconvalley.com/apple-vs-samsung/ci_24573092/apple-v-samsung-jury-awards290-million-patent-feud
http://www.zdnet.com/pirate-bay-and-four-more-torrent-sites-get-blocked-in-italy7000022115/
http://www.lawphil.net/statutes/repacts/ra2010/ra_10088_2010.html
http://www.forbes.com/2009/10/09/social-networking-etiquette-entrepreneurs-managementwharton.html
http://www.oxforddictionaries.com/us/definition/american_english/selfie
http://social-networking.findthebest.com/q/102/357/What-is-Friendster-social-networking-site
131
http://news.yahoo.com/microsofts-cybercrime-center-combines-tactics-against-hackinggroups-133609577--finance.html
http://www.gov.ph/2012/09/12/republic-act-no-10175/
http://www.forbes.com/sites/timworstall/2013/11/25/how-cute-philadelphia-passes-lawbanning-3d-gun-printing/
http://www.theguardian.com/technology/2013/oct/20/artificial-intelligence-impact-lives
http://www.auburn.edu/~vestmon/robotics.html
http://www.rappler.com/business/12269-globe-vs-pldt-who-is-winning-the-telco-wars
http://marketingland.com/the-google-glass-privacy-debate-whats-real-whats-overblown-hype50745
http://www.wired.com/gadgetlab/2011/04/apple-iphone-tracking/
132
Download