A Guide to Being an Ethical Person Morally By: Dylan Armand Ngo 1 2 Table of Contents Preface xi Acknowledgement xii About the Author xiii Introduction (All About Ethics) 7 Introduction (Information Ethics) 8 Chapter I 10 Chapter II 12 Chapter III 14 Chapter IV 22 Chapter V 24 Chapter VI 28 Chapter VII 30 References 33 3 Preface It is said that in the last ten years information and computer ethics becomes an important part of ethics and plays a huge part and role in the flow of years as we upgraded and become a more modern world. Information ethics also became an important part of applied philosophy in terms of professionals, students and computer majors. Now a days many ethical problems occurred including the issues about the use and creation of technology thus guides about it needs to be learned by people in order for them to manages using and creating technologies ethically. Also issues about hackers, cyber crimes and even terrorist are rising and we need to act about it thats why this novels and handbooks about ethical issues are really important and useful. Each chapter on this novel is an inspiring story and is based to some true story and some to educate that is really done to solve this issues about ethics. Also every chapter on this book is written originally even though we set an example on some thats why we have articles there that we got from different great authors to educate more the readers because of this amazing and full of leanrnings examples. This book unlike others has a different style as it doesn't focus only on one topic but it has many style like stories, novel and theory type that will let the user adjust on what type of it they can learn more and faster. After reading this book, readers will be more systematically and ethically more intelligent and also they can reflect on the story that are experienced by our beloved examples that finds success in their lives and maybe our readers will be inspired by it and eventually they will become a better person morally. 4 Acknowledgement The author would like to acknowledge the support he get from his professor and fellow author and classmates. It helps him to understand more about the topic he was sharing. Dylan Ngo whom is the author of this book also acknowledges the handbook of information and computer ethics for the sources that is used on this book to add learnings to the readers. Also the author is grateful for the stories shared by some people to him to be used and be putted in this book. We are also grateful that nanowrimo's novel month which is november serves as an inspiration and motivation to finish this book and for the national library for accepting our book and giving it the a privilege to be published and be putted in their library. Most importantly we acknowledge our school, college of saint benilde and the national library for giving us the chance to educate and share our learnings to people who wants to learn more and people who have no idea about information and computer ethics because that is the main reason and purpose of this book and hoping this will serves as a history that helped many. 5 About the Author The author would like to acknowledge the support he get from his professor and fellow author and classmates. It helps him to understand more about the topic he was sharing. Dylan Ngo whom is the author of this book also acknowledge the handbook of information and computer ethics for the sources that is used on this book to add learnings to the readers. Also the author is grateful for the stories shared by some people to him to be used and be putted in this book. We are also grateful that nanowrimo's novel month which is november serves as an inspiration and motivation to finish this book and for the national library for accepting our book and giving it the a privilege to be published and be putted in their library. Most importantly we acknowledge our school, college of saint benilde and the national library for giving us the chance to educate and share our learnings to people who wants to learn more and people who have no idea about information and computer ethics because that is the main reason and purpose of this book and hoping this will serves as a history that helped many. 6 A Guide to Being an Ethical Person Morally 7 Introduction I. All about ethics, what does ethics really means? Ethics is something all of us should know and understand. This is being moral to others ethically. This novel will mainly focus on IT which is about technology that almost all of us has idea on already this novel will guide you in understanding more and be ethically good about cyber and IT ethics. This will also contain topic about contemporary moral problems and some blogs review from the internet to give you readers learnings from other branches of ethics. We filipinos is said to be morally good and hospitable so I think these will all be easy to apply in our lives. After reading this you will know how to deal with things especially in IT ethically and you don't have to ask yourself "how do I do these things morally?". The main purpose and reason of ethics is for us to respect others. We already know what is right or wrong we just need to chose which one to do. This novel will also have stories regarding cyber ethics and my reflection from it to help you readers to understand it further. Normally we do things according to our want and not by knowledge which is wrong because we need to think of things first before acting it and our wants is not mandatory to it but it is normal doing our wants because we are human beings but if we just learn things about ethics, our perspective and knowledge about things can change and could be better and if everyone just be this kind of person well peace and happier life can happen to the philippines and also the world but after all of this it still depend on us if we will make the change on ourselves. We live in a world where whats fun is sometimes the wrong things and people don't care about anything just to be happy. We lack now people that are truly good and people who will fight for it because in our time now people just tend to get along with others to avoid diferrences with them for example a teenager who's generation are most likely to smoke that teenager even though he dont want to smoke, he will do it because thats what everyone else does. He refuses to be diferrent and he will refuse to be good to earn some friends and not become out of place. This is the time when a normal citizen is hurt or offended by politicians no one bats an eye but when a politician or a government official is hurt or offended by a normal citizen an issue occur and sometimes law is produced in order for that issue to not happen again and best example of the is the cyber crime law bill. We still dont understand the real problem and the best solution to that will always come to each everyone of us. We cant always blame goverment official because we need to face it, they would never change because they aim for money thats why they run for places on the government even the most quiet of all of them that seems diferrent and good but we dont know he or she could be the worst. What would you choose for example a government official ask for information of other people from you? Almost all will give it some because of fear and some because they think they should obey and follow the goverment, but some will do the right thing and will not give that information because that person trust them with that information and not just because the government want it you should give it to them. That few people who will not surrender and give that information to the government are the people who I can say are morally ethical and thus I respect those people. 8 They say now we live in an information society because we are more intellectual and more advanced. Information is really important these days, so important that we almost need it on everything in order to know and understand it. Also they said that this is now a knowledge-based world that without knowledge it will be hard to be successful and it is hard to go along with others because people now are more intelligent than people 50 years ago. II. Information Ethics In this information society whats really important is our responsibility should be done right. Being moral ethically is said to be adaptable because if a person is really open to things and is open minded anything can be learn and understand or like they said adapted. We programmers tend to understand cyber ethics more than other people who are not technical so I think we should be models and preachers and be responsible also for others to learn more about this. That four moral principle is very important as it is about null laws. The information and computer ethics is something we should also focus on as it is something that we should do and learn from. It is a milestone in our history that is remembered by everyone and passes to the next generations for learnings. Knowing about this milestone and history is a key to a good life and a more moral life. The exponential growth of information technology ethics is really adding up because of continuous growth also on technologies and many new invented ones. As time passes our existing technologies upgrades thus our technological ethics also grow and are updated in some point. A ethic on something will actually never be deleted or removed in our history but it will surely be updated and also multiply in the sense of improvement and it goes with the flow on how the people upgrade or evolve also because as a person evolves as his mind, perspective and capacity improves also. In the other hand the moral methodology of ethics is about applied and practical ethics the means the ethics that we use and apply practically in our daily life. It is something we should apply and be practical about. We will always be with others socializing so we need to be ethical so show respect to other people. 9 Part I Stories and Novels about Ethics 10 Chapter I The Boy who pursue to be successful There was a child named christian he loves to play computer. Five years ago he dreamed of being good in using computer in the way of programming, web designing and also inventing new products that will change the world and make his name be remembered like his idol steve jobs the creator of apple. As time pass he will soon be graduating and will be going to college. He take entrance exams on famous universities around the world to explain it further christian is a son of a governor on Switzerland so basically he is a son of a rich man. Going back to the story one of the school Christian passes was Harvard university and he chooses to went there and take a bachelor degree on information system, at first he struggle on the works and loads of requirements from the school but because christian is a smart and genius kid he manages it to get high grades using his hard work and intelligence. Also he is very active on his school that he almost joined all the activities and events on it and by that he learned more and more. Later on on his 3rd year google company apple and microsoft corporation bats an eye on him and wanted him to be a part of their organization and their team. So christian become a scholar and gets allowance from both google apple and microsoft as they compete on whos gonna get him when he graduate. Then the time comes christian graduated with a degree on information systems and he choose to work on apple as what is said earlier he idolized steve jobs and admire his works. Christian, with his knowledge, skills, ability, motivation and dedication becomes a very productive, useful and important employee on the company so later on promotions floods him as other competitor companies tries to pirate him from apple. Now christian works on samsung as a head on inventing smart technologies and as rated has the highest pay on his position compared to other companies. Christian now for short is a very successful man and it's all because of his hard work and sacrifice. Now the problem about christian was he don't care about anything all he cared about was succeeding he didn't notice he was being unethical to others specially on his work and later on people complain and complain about his works and samsung was too afraid for people to hate their company because of christian thats why later on christian was terminated. Christian was too depressed that he almost committed suicide; he became unreliable and lost many of his fortune and wealth. Then Christian later on come to think of it that he can’t live in the past forever and waste all his effort and time achieving was he achieved so he went to school again to study and have a degree about ethics. Now Christian is an owner of an ethical phone company is now one of the richest ethical people in the world and he sets as an example and inspiration to all of us. The Moral on this Story is that we should also be ethical morally because being good at what we do is not enough because later on people will hate and not like you eventually so one should be ethical also in order to find his success in life. 11 Here’s An Issue about Google and Nsa that I reviewed 1. What is Mike Hearn thanking Edward snowden for? He is thanking Snowden for revealing a secret that the government is hiding from Google which is the taping of the government to Google lines to access their private informations and database for spying purposes without the permission of Google. 2. Describe what Mike Hearn and his team did- before and after the GCHQ/NSA exploit Before the gchq/nsa exploit Hearn and snowden was guarding and trying to secure google for the last 10 years. After this happening hearn's fist solution was creating this blog in order to aware and inform users for the incident. Thus NSA should pay for the illegal act. People including me are just disappointed with NSA. Also here’s an Issue Review About Google and Author’s Guild This issue has an advantage for the both sides while google has its resources and books from other authors, the authors has a free advertising of their book that leads them to higher income. Downside and disadvantage for the author is when almost all the details of his or her book is in the web then it will lead to lower income because people will just use the internet rather than buying the book itself and for google it's disadvantage is when a book contains wrong details also google will always be sued we cant avoid that. Overall for me google really provides significant public benefits to the readers or researchers and also to the authors. But still in the end of this case the Author's guild is still not satisfied and are disappointed by the courts decision. I think the Author's guild should just sacrifice a little bit for the greater good and that is the benefits and satisfaction of readers and researchers that are more likely 70% of our population. 12 Chapter II A Filipino Story about Ethics-True Story There was a man who lives in bacolod. He is 23 years old and now working here in manila as a guard on a dormitory. He didn't graduate even elementary, he only studied up to grade 3 and never really has parents to teach and support him in his life because his parents are separated and already have a family of their own. His name is mark he is a good guy but sometimes what he think is right is wrong maybe because nobody was there to teach him moral goods and nobody was there to teach him what the difference between right and wrong. Nobody can blame him though and besides of his lack of knowledge he still manages to get along with people and be a good guy on his own way. One day his friends suggested for him to continue his study even just up to high school but he responded there is no need and he said studying is not a mandatory and not really important on a person's life. There comes his knowledge about life, he doesn't understand the important thing because he really doesn’t know which ones are right and which ones are wrong. Later on Mark was always starting a fight he don't even wanted because he didn't know if someone is already offended or mad to him, in short he was insensitive also. So days go by and he always catching up fights and when his boss finds out he was terminated as a guard on that dormitory. After that mark finds it hard to look for a new job as he just become a guard on that dorm because his uncle works on it, mark pursue his studies by or as a working student. He sell goods on buses and after a few years he finishes elementary and after realizing that he was not good enough morally he decided to go to missionary school in order to learn good things by God. Now mark is hoping someday he could become a priest and I know he could really be someday. The moral of this story is one should not let his past be a reason to live good and hard work is all we need in order to find the success in each one of us. God has plans for us and maybe your life is not like what the others are living but you just need to take it as a challenge then eventually we will find our purpose on this world that God has given to us. On the other hand here are some of the cyber crime bill petitions that I have found Interesting and reviewed: G.R. No. 203299 This is about our freedom of speech and our right of privacy when it comes to communications and this is something that is important to each every one of us. This bill contain that it should not allow government people or official to get certain or specific record for their own use. This government people that I stated are specifically the National Bureau of Investigation and Philippine National Police. Only 13 case that this bill is not to be followed is if that person is a wanted man and if he isn't then they should be illegal. G.R. No. 203335 This bill is about cyber crime law and act. This proposes to change or revise what is stated on the current cyber crime law. Well my comment on cyber crime law is negative in the sense that I don't agree with it's existence because we cant sue or blame others for expressing their opinion it like cutting out their freedom of speech. Also we should respect thoughts from each other and this law should not be approved just because some government official is offended by an opinion of a normal Filipino citizen. Maybe this bill can be perform to specific websites but both on social ones where people interact and states opinion with each other. Then this bill will be effective. G.R. No. 203515 It is stated in this petition that what the government is trying to implement and do is unethical and will violate the freedom of speech and the freedom of expression of the filipinos. Now a days we more interact and we are more productive in the web or internet because of the technological shift in our time so if government claim the rights of the people who uses this, where they can express their thoughts and thus this government will not be a democratic one and never be "by the people" as our president benigno aquino said. We Filipinos have a democratic government thus we citizens are the one who has the more power to decide and to choose what to do because it is the right way. 14 Chapter III Contemporary Moral Problems Review Part1 Review Questions 1.) Explain the legend of Gyges. What questions about morality are raised by the story? The Legend of Gyges is about a shepherd who is said to found a magic ring in a fissure opened by the earthquake. That ring can make its wearer invisible that can make him do anything without being noticed. Without limits some people do bad things with their self-interest this story defines the difference between ethical egoism and psychological egoism. The question here is whether a man do an act ethically or psychologically? 2.) Distinguish between psychological and ethical egoism. Psychological egoism is something that is done by the many it’s like imitating what is done or what is the self-interest of the people around you. An ethical egoism is all about yourself and what you want because you do these things with your self-interest regardless what others normally do. 3.) Rachels discusses two arguments for psychological egoism. What are these arguments, and how does he reply to them? He said that psychological egoism is false and confused. It is false mainly because people do the act unselfishly even though the act is a selfish one literally and they don’t do this with their self-interest and it is confused because doesn’t really explain the difference between selfishness and self-interest. 4.) What three commonplace confusions does Rachels detect in the thesis of psychological egoism? First is that it fails to distinguish selfishness and self-interest that it confused people. Second is that it let you understand that every action is done by either self-interest or motives of others. Third is that it ignores the fact of one’s own welfare which is concern for the welfare of others. 5.) State the argument for saying that ethical egoism is inconsistent. Why doesn’t Rachels accept this argument? Ethical egoism is inconsistent simply because almost everybody care about others and only a few do not. Rachels doesn’t accept this argument because he believes that it is not consistent and it cannot be decisively refuted. 15 6.) According to Rachels, why shouldn’t we hurt others, and why should we help others? How can the egoist reply? According to Rachels we should do these good things because we humans are born to care about others and not just about ourselves this is already fundamental thus there are egoists that are rare. Discussion Questions 1.) Has Rachels answered the question raised by Glaucon, namely “Why be moral?” If so, what exactly is his answer? Rachels didn’t answer this question directly but he said that people should be concerned of being morally right. But for me be moral if you interest to be good. 2.) Are genuine egoists are rare, as Rachels claims? Is it a fact that most people care about others, even people they don’t know? Yes, genuine egoists are rare because almost everyone care about not just themselves but also on others. Also people care about people they don’t know basically because it is fundamental already and we have this thing called conscience on us that makes us care about others even if we don’t know them. 3.) Suppose we define ethical altruism as the view that one should always act for the benefit of others and never in one’s own self-interest. Is such a view immoral or not? It is not immoral because ethical altruism is like the heroism or the goodness for others inside of us. It’s a moral that many of us don’t have but I can say a person who has this moral is a hero. 16 Part2 Review questions 1.) According to Arthur, how are morality and religion different? Religion is something that is essential and if there is no religion people would not be expected to do right things and it is necessary in order to provide guidance to people while in the other hand morality is social. 2.) Why isn’t religion necessary for moral motivation? Religion is necessary but not for moral motivation because these two are different and without each other the other one could function. Moral motivation dictates to you what you do while religion just lets you know what is right and wrong. 3.) Why isn’t religion necessary as a source of moral knowledge? Religion isn’t necessary a source of our moral knowledge because religion teach us what is right or wrong but it is not responsible for the actions that we are doing. Our moral knowledge is when for example we want to kill someone you asked yourself “what if I got caught?” and on the religion side of the story you tell yourself “This is not right, this is a bad thing, it’s a sin”. 4.) What is the divine command theory? Why does Arthur reject this theory? The divine command theory means that God has a relation to moral law as the legislature has to statutes it enacts. Arthur reject this theory by defending that God has no relation with the moral law for example the law about limiting people’s speed on driving that is not a law from god but a law from the legislatures that are decided to be done by them not by God. And he thinks without the divine command theory we can still create laws to follow morally. 5.) According to Arthur, how are morality and religion connected? Morality and religion do sometimes influence each other. There is a historical influence religion gave to morality and also on politics and law. Many leaders of moral groups are also leaders of religious groups. Thus morality also influences religion for example the issue of abortion in with the Catholic Church also take a debate on it. At the end of the day the two have helped and influence each other but they will always interact when it comes to the personal level. 6.) Dewey says that morality is social. What does this mean, according to Arthur? According to Arthur this means that one’s morality is social because of conscience that lets us foreknow and foreknowledge an act. You see morality of a person somehow connects its self to others. We reject our own perspective in the favour of others and thinking how will person responses on an act that you’re going to do thus this defines why morality is social. 17 Discussion Questions 1.) Has Arthur refuted the divine command theory? If not, how can it be defended? Arthur disagree and somehow was against the divine command theory by his explanation that we can’t depend of something is right because God said it was and he is arguing the fact that some that is not commanded by God are also right but in the divine command theory it is stating that if something is not commanded by God then it is morally wrong. In the sense that we have many kinds of religion, this theory will simply not fit for everyone with different perspective. 2.) If morality is social, as Dewey says, then how can we have any obligations to non human animals? (Arthur mentions this problem and some possible solutions to it in footnote 6.) We still have an obligation to animals for example torturing them not because other people see it wrong but because the animal itself will surely disapprove. Morality is social in nature and on the dictates of someone’s conscience he can decide if he will torture the animal morally. 3.) What does Dewey mean by moral education? Does a college ethics class count as moral education? Moral education now days are taught by knowledge and experience of the professor or teacher. A college ethic class is considered and counted as a moral education. This is simply taught by how to act morally normally and what is almost done by people. 18 Part3 Review Questions 1.) How does Nietzsche characterize a good and healthy society? Nietzsche said that to have a good and healthy society we should allow superior individual to exercise their will of power. Also superior individuals like us should follow a so called “master-morality” as distinguished from a “slave-morality”. 2.) What is Nietzsche’s view of injury, violence and exploitation? He said it is nihilistic and that it is a denial of life. These things come normally and already a part of life, we naturally encounter these things either we are the one doing it or we are the one being done unto. 3.) Distinguish between master-morality and slave-morality. Slave morality is the softness inside of us like kindness, sympathy and also humility while master morality is composed of morality values that are pride, strength and nobility. Slave morality is about the goodness and evilness of our intentions while on the other hand master morality is about how good or bad a consequence is on our act. Nietzsche defined master morality as the morality of the strong willed and also he said that it is sentiment while slave morality unlike master morality is literally re-sentiment. To make it short slave morality is the inverse of master morality. 4.) Explain the will of power. The “will of power” is a dominant principle of organic function. He said without the will of power society will not and cannot develop. The will wills itself he said thus the will to power is important and essential in the enhancing of life. In short the will of power is the will to life. Discussion Questions 1.) Some people view Nietzsche’s writings as harmful and even dangerous. For example, some have charged Nietzsche with inspiring Nazism. Are these charges justified or not? Why or why not? It is normal for people to think this way about Nietzsche because even I thought of that first. This charges is not justified as we all have our own beliefs and knowledge because not all religions are the same and if we just think of it as a whole without differences we can see the points of Nietzsche is true that life revolves on a master who dictates things but that master depends on us in what we believe. 2.) What does it mean to be “a creator of values”? A creator of values as Nietzsche said is someone who is noble that regards himself as a determiner of values that what is injurious to him is injurious to itself. He honours such morality he recognises in himself. That noble one also honours itself as the powerful one, him who has power over himself. 19 Part4 Review Questions 1.) What is “moral isolationism”? This simply means that our world is divided into separate societies, each with different thoughts and religions. It’s like something forbids us to any other culture. 2.) Explain the Japanese custom of tsujigiri. What questions does Midgley ask about this custom? Tsujigiri which means to try out one’s new sword on a chance of wayfarer, also literally means crossroad-cut. The Japanese culture about samurai is about testing the sword in order to prove its value by cutting some one’s body in one blow, this culture may be criticize by many but they don’t understand it because they don’t belong in that Japanese culture. For someone it is like a cruelty but for Japanese people it is a sign of honour. Does the isolating barrier work both ways? Are people in other cultures equally unable to criticize us? These are the questions asked by Midley about the custom. 3.) What is wrong with moral isolationism, according to Midgley? She said that there is a contradiction and we shouldn’t judge other culture and we should respect them. Also if we criticize other’s culture then we should not be mad when they criticize ours. She suggested that if we just accept the possibility of praising elements of other culture then there would be no isolation. 4.) What does Midgley think is the basis for criticizing other cultures? Midgley said that for you to criticize other cultures you first must know the culture and that you should criticize them with respect. Criticizing other cultures should make you also open that your culture can be criticized too. Discussion Questions 1.) Midgley says that Nietzsche is an immoralist. Is that an accurate and fair assessment of Nietzsche? Why or why not? I think Midgley is wrong in that part and she should apply to herself what she said about criticizing other culture that she can’t just criticize Nietzsche because they have a different point, view, perspective and culture in life that not because it seems wrong to her it is wrong already. What happened there isn’t fair for me because like what she said we should respect others. 2.) Do you agree with Midgley’s claim that the idea of separate and unmixed cultures is unreal? Explain your answer. 20 I agree that a separate and unmixed culture is unreal because first of all we all live in a one world with different culture it just means that even though we have different beliefs in some point our cultures will cross its path because we live with each other in this world. Also because of these differences there comes an interaction about this cultures like debates and also some people changes their culture. 21 "Saving 10,000" (Suicide) A lot of people have a lot of problem. Problem is better shared than kept but in some cases a person who has problems doesn’t have anyone to talk to and nobody is there to listen. Suicide is really a big problem because it has killed millions every year. I think one of the main reasons why japan has a large percentage of suicide every year is because of their history and culture which are about samurais etc. Some Japanese think that suicide is beautiful also they have this book about suicide that most or almost everybody knows but doesn’t care about it but for some it is an influence that leads them to commit suicide because it is stating advantages and explaining suicide positively. Media is also one of the causes of suicide in japan because there are many shows which shows them a part where someone commit suicide which they don’t care if someone is influenced by it they just do business and Japanese is said to have this mentality to imitate person whether it is a good or a bad thing. I think life insurance companies should have a new policy that suicide is not included in the insurance this is to lessen people who commit suicide in order to give money to their families. Suicide is done only by people who have mental illness and depression because a normal person would not think of that. When it comes to the youth suicide happens because of pressures where they get directly from their parents mostly about grades and bullying that leads to being sad and depressed. 22 Chapter IV Some of my review on some blogs (Online) ONLINE QUIZ: If you were ind Ladar Levison's shoes, what would you have done? If I were in Ladar levision's shoes I would do exactly what he did because it is the right thing and more people will benefit in that act. He protected the information or data of many people which is why he refuses to agree to the government. In the other hand the government should just agree with what Ladar is proposing which is to give the government what they want but the people of Ladar will find it for them and they cant have any access to it. The government should not let others pay for a problem of one. But If this will become the last option to solve the problem I suggest that Ladar and the government should have an agreement and a contract which states the if Ladar hand them over this encryption keys thus they will be held responsible for whatever problems that will occur to it and be responsible to any complains about it, for the sake of solving that problem of the government. Online Quiz: 1. Should bloggers in principle charge for writing? A blogger can be also charge for writing if he/she did something wrong like plagiarism and copyright even though they say that a blog is the opinion of the blogger it still applies. 2. Are there copyright issues for posting a private conversation? There wouldn't be any issue if all people involving the conversation agreed to it. 3. Should SciAm have taken down Dr. Lee's post? Yes, because Dr.Lee's post has nothing to do with SciAm. 4. What makes this a racism issue? A sexism issue? 23 Racism occur in this issue because Dr. Lee is a black woman and this black thing is really almost defines racism because of almost all racism events comes from this black thing issue. Sexism can also be an issue because she was called a "whore" 5. What do you think Dr. Lee means when she asks writes, "I am trying to make myself redundant"? I think Dr.Lee just wants it to become a lesson to others. 24 Chapter V All About IT September 11 2013 Based on the blog of Steve Losh, We document in order to teach and guide people who have no or limited idea about the project because if you want someone to learn things they don't know you teach them. For example I want my little brother to learn how to play basketball then I should teach him and guide him. Documentation usually takes the creators place in teaching and guiding the learner like I want to teach my brother but I can’t be there playing with him then the "document" that I made will take place that I can teach and guide him with the use of paper where he will get knowledge about basketball. According to Steve Losh a good documentation can be divided into four parts which are first contact, The black triangle, The hairball and The reference. First Contact- Here is where we introduce our project and this is where we should get the interest of our reader and to do this successfully we should imagine ourselves as if we are the reader. Black Triangle- these serves as a guide and a proof that the project will work and run. Also this is where you prove the importance and the usefulness of your project. Hairball- This is where the reader learned how to use the project. This is where they understand and get the information need in using the project. Also they should become an expert here. Reference- Here the user or the reader is already an expert that knows the project well and how it functions but this reference will serves as its guide in future problems as they use this in their daily works. We need a high-quality documentation to meet the standards of the user that should be satisfied and educated from the documentation and to achieve that well we should do the four parts of documenting right and precise yet easy to understand for the users. In this topic I think the four parts of documenting is the most important thing that I should learned because first it is the main purpose of this blog. But for me the most useful thing I learned here is when making documentation we should be taking the shoe of the user to know what a user will want and to apply it. Documenting is very important in our course especially when we create a system that is needed 25 to be documented in order for the user to be an expert on it thus we should document in a high-quality for our high-quality system. An example ethic on working people about their company Which is created and authorized by Mark Putman Reading your company's technology Acceptable Use Policy might be as interesting as reading the dictionary or your favorite IRS publication. But before you sign it and file it away, take some time to familiarize yourself with it and dig a little deeper. What is contained in this document may have more practical, real-life application for your every day job than anything else in the stack of compliance stuff that you sign to get your job. Without rehashing your Acceptable Use Policy here, there are some serious ethical considerations. First, understand that the company-owned computer is not yours. Just because your puppy's picture is on the desktop and you have the high score on solitaire, doesn't make it any more yours, even if you're the only person who ever uses it. The reality is, your two thousand dollar laptop is merely borrowed equipment. Someone else paid for it and that owner has the right do what he or she wants with "your" computer. Your ethical responsibility is to treat it like anything else you borrow: with respect and care. Additionally, the rightful owner can ask for it back anytime and dictate what you can and can't do. You have no Constitutional right to privacy here. Your company email, web surfing, and most everything you do on that machine is open for review by your employer. If you invent something that will solve the world's energy problems while on the company computer on company time, guess who owns that invention? That's right, your employer. A good perspective is to look at your computer as just another piece of office equipment that you use to make your job easier. Using the company computer for personal use will always present ethical boundary issues. There are probably only a handful of people walking the planet who haven't checked their personal email, shopped online, or composed a personal letter on their work computer. So how can you resolve this? First, find out what the boundaries are. Maybe your company allows occasional use or maybe it doesn't. Or, maybe it doesn't officially allow personal use but usually overlooks it. Whatever the case may be, find out the truth and don't make any assumptions. Second, if occasional use is allowed, it may be tempting to go overboard and reinterpret "occasional" to mean something different. Consider your occasional use of the computer to be the same as the phone, copy machine, or any other piece of office equipment. You may use the phone occasionally to make personal appointments during lunch or breaks, but not to chat with distant relatives at length or call 900 26 numbers. Your company may allow a few personal photocopies now and then but certainly does not want this to take the place of Kinko's. It's the same for computers. You must show restraint, good judgment, and boundaries. Of course the most costly and devastating ethical problem with computers is security. Keeping your computer secure, both physically and in the cyber world is the most critical security consideration you have. You hear about government laptops getting lost, computer viruses or worms bringing corporations to their knees, or hackers stealing ideas and identities. You can't be sloppy in how you protect your machine. You need to guard it against hackers and viruses, not store sensitive data on your machine, secure your computer, and obey any and all guidelines and recommendations from your company. If your IT department sounds paranoid, they have very good reason to be. But in a more subtle way, use of computers provides fundamental moral challenges to our notion of honesty and ethics. The critical question here is, "What's really on that iPod?" Most people wouldn't go into a store and steal a CD or a piece of software, but downloading it for "free" from the Internet can be rationalized. Software piracy and other music and video piracy cannot be allowed any latitude on your computer. An ethical person should not only make this a rule at work but at home as well. The problem with software piracy and copyright is that doing something illegal has never been so easy and widely rationalized. No matter what the culture says, the moral principle of stealing remains - if you didn't pay for it, it is stealing. You should be able to sit down at your computer and identify every application, music file, or video as being 100% legitimate. There is no good excuse for a person who purports to be "ethical" but has stolen files on his or her computer. The bottom line is this: Cyber ethics is no different from any other kind of ethics. To be ethical, you must make the moral choice to obey the laws, respect people and property, and play by the rules. In every area of life, you should do the right thing no matter who's the boss or who's watching. An Acceptable Use Policy should be a clear reminder that in the cyber world, your ethics should not be virtual but be real. This is a review about the popular internet USB, the dropbox Dropbox: Dropbox is more popular than its competitors because even though they have similar functionalities, Dropbox based its strategy to the customer or user unlike its competitors that mostly too busy wanting their program to be perfect they forget the user needs and wants. 27 1. What does it mean when you think in terms of UX design? Thinking in UX design simply means thinking in the customer side first and then thinking about the program. User experience design follows certain rules that if followed, will surely be wanted by customers. In short to have this UX design possible you need to simply satisfy the customer so that he/she will love the program. 2. Why is UX design or design-thinking important nowadays? In today’s time technologies upgrades and people learn more faster about it and more companies rises because technologies becomes a need in some point but these companies differ in one thing and it is in satisfying their customer. Thinking like the customer and designing your product according to it will give you advantages against other companies. 3.) How does UX design yield advantage? Some people look at quality and some people are ready to purchase an expensive product if that product will satisfy their want and to have a customer satisfied he/she should have an amazing experience from your product. If you get your customer satisfaction it is clearly an advantage from competitors. If I will choose 1 object in my life that is not technical but really important it would be a wallet: A.) Wallet B.) Wallet because this is where I put some of my important things like pictures, cards, School ID, License, receipts and of course money. In my life I never lost a wallet and just keep them when I want to use a new one, without a wallet in my pocket I feel uncomfortable in the sense that I feel that I don’t have money, ID etc even though I have it in my pocket. Also without it I can’t save money because it also function as my piggy bank that I have a certain place there where I put my savings. This is my favourite object simply because you just have to put there things or objects and it will be compiled and becomes like a one object already also this will help you not to lost certain things and not left them at home. 28 Chapter VI Political Ethics I want to share to you a nice and accurate article written by Carrie Jaffe Pickett What are the ethical issues in political campaigns? What roles do money and influence play in outcomes? How can high ethical standards be maintained and upheld before, during, and after campaigns? These were just a few of the issues raised during the Government Ethics Roundtable held November 15, 2013, at The Markkula Center for Applied Ethics, Santa Clara University. The panelists were: Rich Robinson, expert in strategic planning, public policy development, and government relations, and founder of Robinson Communications; and Dan Schnur, director of the Jesse M. Unruh Institute of Politics at the University of Southern California. Judy Nadler, Senior Fellow in Government Ethics and former mayor of the city of Santa Clara, moderated the panel. The "rule of three" served as a theme for both presenters, each of whom outlined three central talking points, similar in concept but with different perspectives. "There are three things the public gets mad about," began Robinson, who served as northern California Director for Bill Clinton for President, and worked on Barack Obama for President, as well as the campaigns for Gary Hart, Alan Cranston, John Kerry, and Joe Biden. First, Dishonest Campaigns reflect the inherent ethical quandaries of politics: There are no regulations on the honesty of a campaign, or what is deemed appropriate or inappropriate. Robinson argued that a "negative campaign" is not necessarily a bad thing, if the accusations about the candidate are true, but he said that lying during campaigns has become commonplace, often with little distinction between fact and opinion, leading to misjudgments and misinformation among voters. And what about transparency? For example, if a candidate is running for a financial office, is it fair to demand the disclosure of his or her personal bankruptcy? A second ethical dilemma in political campaigns is inconsistency, Robinson noted, emphasizing the importance of "cleaning house" for both Democrats and Republicans within their own parties and the unfortunate double standards that exist. He pointed out parallel scenarios in the cases of the sex scandals for Republican senator Bob Packwood, and later, Bill Clinton. "Many Democrats were quick to call for Packwood's resignation," Robinson said. "But when it happened with Bill Clinton, they were quiet." Political parties have to be willing to call out wrongdoing on the part of their own members, Robinson argued. A third ethical quandary is the Role of Money in campaigns. Contrary to popular thought, money does not determine outcomes in elections, especially at the national level. We do not now have, for example, President Mitt Romney or Governor Meg Whitman. Money can play a role, however, in "down-ballot" races, and continually changing rules on contributions, expenditures, and reporting, can make almost any politician appear unethical at some point during his or her campaign. Dan Schnur's trio of challenges to ethical conduct in political campaigns included: the influence of money in politics; lying and deception; and disenchantment among voters. Using as analogy the wellknown myth of Icarus, whose flight too close to the sun led to his ultimate downfall, Schnur suggested that, essentially, power corrupts. And, the potential to behave unethically grows with stature and influence. "We've seen too much of this," he commented, referring to "candidates behaving in ways they never thought they would" when they started out as idealistic newcomers in public life. On lying, Schnur asked and answered: "What motivates someone to lie about someone else? You lie about the enemy. The temptation to lie in politics comes from our hyper-partisanship." Shnur, who is 29 also adjunct instructor at the University of California at Berkeley's Institute of Governmental Studies, drew from his "Future of California" class to illustrate the 40-yard line solution for public policy. The loudest voices are in the bleachers, he said, but the solutions need to be found in midfield. In an interesting commentary on how social media and other technologies are impacting the issue, Schnur held up his iPhone as both empowering and isolating. Technology, he said, is both social and anti social. Our ability to create the "Me network' through technology creates an echo chamber, he said, "and those who disagree with us suddenly become the enemy." Regarding disenchantment among voters, Schnur pointed out that there is only a 9 percent favorability rating for Congress. The challenge is not only how to communicate to an electorate that doesn't trust politicians or finds them relevant, but also how to restore confidence when the bad actors of the political world get headlines, while countless hardworking and ethical public officials are overlooked. A concluding discussion among members of the roundtable about potential solutions to these ethical dilemmas focused on a "power to the people" approach, such as a citizen watchdog or "credibility center" on the local level to determine minimum ethical standards. Carrie Jaffe-Pickett is the assistant director of communications for the Markkula Center for Applied Ethics. November 2013 In this article I realize that you will really have a hard time seeing a politician that is ethical because even some of them has knowledge about being ethical, they still choose not to be for the sake of money and fame. They set standards and money becomes more important than being ethical, that’s why people hated them and now a day’s even if there is a politician that is ethical he can’t prove it anymore because the people are really bias already on what they see on politician well basically because of experience so if I’m that politician I’ll ask my self why should I be ethical when nobody believes in me. Then it will come to me what if I just be like the other politician and be corrupt because what can I lose? People hate me already for doing nothing and being good so I’ll just be what they think I ‘am and be corrupt. I earn money despite of them hating me rather not earning anything and they still hate me. 30 Chapter VII Ethical Phone I got an article about this ethical phone from the creators of it: Sebastian Salek wrote this article to advertise and promote the First Ethical Phone in the world: The world’s first fair-trade smartphone will be unveiled to the public in London this week, marking a leap forward in ethical technology. The Dutch firm behind the phone said it had worked closely with pressure groups to ensure the smartphone, called Fairphone, was the most ethically sourced product available. Smartphone makers such as Apple and Samsung have in the past been criticised for failing to reveal that their products were made from resources mined in conflict zones and manufactured in Far East factories where labour practices have been called into question. The new handset, with a screen size of 4.3 inches (10.9cm), half-way between the iPhone 5 and Samsung Galaxy SIII, will retail at £272, but is not available until December. Almost 15,000 have already been pre-ordered. Potential customers will be able to handle the new product at the London Design Festival on Wednesday A number of minerals used in smartphones often come from conflict zones, such as the Democratic Republic of Congo (DRC). The three Ts – tantalum, tin and tungsten – in particular, are extracted from mines in the region and armed groups controlling them are alleged to benefit, with profits fuelling the fighting. Fairphone’s tin and tantalum are extracted from conflict-free mines – those where profits aren’t used for the purchase of arms. Product manager Miquel Ballester said he decided to start building a fair-trade phone rather than simply campaigning against existing phones because “it would be too easy to stand by and criticise others”. The business started out as a campaign for fair wages and working conditions across the supply chain of smartphone makers, but evolved into a social enterprise. “It’s only as a manufacturer that you’re playing by the same rules as the big brands. Then you can have real impact,” he said. Mr Ballester is using tin from mines in South Kivu, in eastern DRC, despite on-going fighting among militias for control of the mineral trade, but insists that the company is working hard to ensure its workers are fairly treated and the profits don’t get into the hands of the militias. “The whole point of the Fairphone social enterprise and the campaign that came before it is to intervene on the ground where the problems have originated,” he explained. 31 In contrast to Apple’s sealed devices, the Fairphone handset can be opened by consumers and is easy to repair, extending its lifespan. It runs a custom version of Google’s Android operating system, built by the London-based developers Kwame Corporation. One innovative feature is a dual SIM card slot, which allows for business and personal phones to be merged into one, reducing the number of devices in circulation. This is a common feature of phones in Africa and Asia. Mr Ballester admitted that Fairphone is not fully ethical, but claimed this was not the point. “With the classical social auditing of manufacturers that’s been done for the past 20 years, you can tick a few boxes and earn a certification, but once you turn around and leave the factory there’s nothing to stop things from changing. For us, it’s about creating a business environment that favours ethical treatment from the outset.” In this article the phone was described and it’s advantages is stated against apple and some other competitor’s product. This phone is made and process ethically that it is also called a Fair phone because it is created with fairness and moral. The phone has now many investors and also pre-orders, it is a click to be short because if you are a concerned person, this phone will really struck and catches your mind. Also this phone that will be produced first in London is really cheaper compared to Samsung’s S4 and apple’s Iphone 5s thus it aims a mission to an ethical use and creation of phone and not to profit. 32 References Alfino, M. and Pierce, L. (1997). Information Ethics for Librarians. McFarland & Co., Jefferson, NC. Buchanan, E.A. (1999). An overview of information ethics issues in a world-wide context. Ethics and Information Technology, 1(3), 193–201. Bynum, T. (2001). Computer ethics: basic concepts and historical overview. In: Edward, N.Z. (Ed.), The Stanford Encyclopedia of Philosophy. http://plato.stanford.edu/entries/ethicscomputer. Bynum, T.W.E. and Rogerson, S.E. (Eds.). (1996). Global Information Ethics. Opragen Publications. (A special issue of the journal Science and Engineering Ethics, April 1996.) Capurro, R. (2006). Toward an ontological foundation of information ethics. Ethics and Information Technology, 8(4), 175–186. Cavalier, R.J. (2005). The Impact of the Internet on Our Moral Lives. State University of New York Press, Albany, NY. Einstein, A. (1954). Ideas and Opinions. Crown Publishers, New York. Ess, C. (2006). Ethical pluralism and global information ethics. Ethics and Information Technology, 8(4), 215–226. Floridi, L. (1995). Internet: which future for organized knowledge, Frankenstein or Pygmalion? International Journal of Human-Computer Studies, 43, 261–274. Floridi, L. (1999a). Information ethics: on the philosophical foundations of computer ethics. Ethics and Information Technology, 1(1), 37–56. Reprinted, with some modifications, in The Ethicomp Journal, 1(1), 2004. http://www.ccsr.cse.dmu.ac.uk/journal/articles/floridi_ l_philosophical.pdf. Abridged French translation in L.Agora, 5.4 (July–August 1998), pp. 19–20. Polish translation in Ethos, the journal of the John Paul II Institute at the Catholic University of Lublin (August–September 2005). Floridi, L. (1999b). Philosophy and Computing: An Introduction. Routledge, London, 33 New York. Floridi, L. (2002). Information ethics: an environmental approach to the digital divide. Philosophy in the Contemporary World, 9(1), 39–45. Floridi, L. (2003). On the intrinsic value of information objects and the infosphere. Ethics and Information Technology, 4(4), 287–304. Floridi, L. (Ed.). (2004). The Blackwell Guide to the Philosophy of Computing and Information. Blackwell, Oxford, New York, 40–61. Floridi, L. (2005a). Information, semantic conceptions of. In: Edward, N.Z. (Ed.), Stanford Encyclopedia of Philosophy. http://plato.stanford.edu/entries/information-semantic/. Floridi, L. (2005b). An interpretation of informational privacy and of its moral value. Proceedings of CEPE 2005—6th Computer Ethics: Philosophical Enquiries Conference, Ethics of New Information Technologies, University of Twente, Enschede, The Netherlands. Floridi, L. (2005c). The ontological interpretation of informational privacy. Ethics and Information Technology, 7(4), 185–200. Floridi, L. (2005d). The philosophy of presence: from epistemic failure to successful observability. Presence: Teleoperators and Virtual Environments, 14(6), 656–667. Floridi, L. (2006a). Four challenges for a theory of informational privacy. Ethics and Information Technology, 8(3), 109–119. Floridi, L. (forthcoming). Information ethics: its nature and scope. In: van den Hoven, J. and Weckert, J. (Eds.), Moral Philosophy and Information Technology. Cambridge University Press, Cambridge. Floridi, L. (2006b). Information technologies and the tragedy of the good will. Ethics and Information Technology, 8(4), 253–262. Floridi, L. and Sanders, J.W. (1999). Entropy as evil in information ethics. Etica & Politica, Special Issue on Computer Ethics, 1(2). 34 Floridi, L. and Sanders, J.W. (2001). Artificial evil and the foundation of computer ethics. Ethics and Information Technology, 3(1), 55–66. Floridi, L. and Sanders, J. (2002a). Mapping the foundationalist debate in computer ethics. Ethics and Information Technology, 4(1), 1–9. Floridi, L. and Sanders, J.W. (2002b). Computer ethics: mapping the foundationalist debate. Ethics and Information Technology, 4(1), 1–9. Revised version published in the 2nd edition. In: Spinello, R. and Tavani, H. (Eds.), Readings in Cyberethics. Jones and Bartlett, Boston, pp. 81–95. Floridi, L. and Sanders, J.W. (2004a). The method of abstraction. In: Negrotti, M. (Ed.), Yearbook of the Artificial-Nature, Culture, and Technology, Models in Contemporary Sciences. Peter Lang, Bern, pp. 177–220. Floridi, L. and Sanders, J.W. (2004b). On the morality of artificial agents. Minds and Machines, 14(3), 349–379. Floridi, L. and Sanders, J.W. (2005). Internet ethics: the constructionist values of Homo Poieticus. In: Cavalier, R. (Ed.), The Impact of the Internet on Our Moral Lives. SUNY, New York. Froehlich, T.J. (1997). Survey and Analysis of Legal and Ethical Issues for Library and Information Services, G.K. Saur, M€unich. UNESCO Report (Contract no. 401.723.4), for the International Federation of Library Associations. IFLA Professional Series. Froehlich, T.J. (2004). A brief history of information ethics. Textos universitaris de biblioteconomia i documentacio, http://www.ub.es/bid/13froel2.htm Greco, G.M. and Floridi, L. (2004). The tragedy of the digital commons. Ethics and Information Technology, 6(2), 73–82. Hauptman, R. (1988). Ethical Challenges in Librarianship. Oryx Press, Phoenix. Hepburn, R. (1984). Wonder and Other Essays. Edinburgh University Press, Edinburgh. 35 Himma, K.E. (2004). There.s something about Mary: the moral value of things qua information objects. Ethics and Information Technology, 6(3), 145–159. Huizinga, J. (1970). Homo ludens: a study of the play element in culture. Paladin, first published 1938 London. Johnson, D.G. (2006). Computer systems: moral entities but not moral agents. Ethics and Information Technology, 8(4), 195–204. Koenig, M.E.D., Kostrewski, B.J., and Oppenheim, C. (1981). Ethics in information science. Journal of Information Science, 3, 45–47. Leopold, A. (1949). The Sand County Almanac. Oxford University Press, New York. Maner,W. (1996). Unique ethical problems in information technology. Science and Engineering Ethics, 2(2), 137–154. Mather, K. (2005). Object oriented goodness: a response to Mathiesen.s .what is information ethics?. Computers and Society, 34(4), http://www.computersandsociety.org/sigcas_ofthefuture2/ sigcas/subpage/sub_page.cfm?article¼919&page_number_nb¼911 Mathiesen, K. (2004). What is information ethics? Computers and Society, 32(8), http://www. computersandsociety.org/sigcas_ofthefuture2/sigcas/subpage/sub_page.cfm?article ¼909&page_number_nb¼901 Mintz, A.P. (Ed.). (1990). Information Ethics: Concerns for Librarianship and the Information Industry: Proceedings of the Twenty-Seventh Annual Symposium of the Graduate Alumni and Faculty of the Rutgers School of Communication, Information and Library Studies, April 14, 1989. Jefferson, NC, McFarland, London. Moore, A.D. (Ed.). (2005). Information Ethics: Privacy, Property, and Power. University of Washington Press, London, Seattle, Washington. Naess, A. (1973). The shallow and the deep, long-range ecology movement. Inquiry, 16, 95– 100. 36 Nash, R.F. (1989). The Rights of Nature. The University of Wisconsin Press, Madison, Wisconsin. Rawls, J. (1999). A Theory of Justice, revised edition. Oxford University Press, Oxford. Severson, R.J. (1997). The Principles of Information Ethics. M.E. Sharpe, Armonk, NY. Sicart, M. (2005). On the foundations of evil in computer game cheating. Proceedings of the Digital Games Research Association.s 2nd International Conference–Changing Views: Worlds in Play, June 16–20, Vancouver, British Columbia, Canada. Siponen, M. (2004). A pragmatic evaluation of the theory of information ethics. Ethics and Information Technology, 6(4), 279–290. Smith, M.M. (1996). Information Ethics: An Hermeneutical Analysis of an Emerging Area in Applied Ethics, Ph.D. Thesis. The University of North Carolina at Chapel Hill, Chapel Hill, NC. Smith, M.M. (1997). Information ethics. Annual Review of Information Science and Technology, 32, 339–366. Spinello, R.A. (1997). Case Studies in Information and Computer Ethics. Prentice Hall, Upper Saddle River, NJ. Spinello, R.A. (2003). Case Studies in Information Technology Ethics and Policy, 2nd edition. Prentice Hall, Upper Saddle River, NJ. Stichler, R.N. and Hauptman, R. (Eds.). (1998). Ethics, Information, and Technology: Readings. Jefferson, NC, McFarland, London. Tavani, H.T. (2002). The uniqueness debate in computer ethics: what exactly is at issue, and why does it matter? Ethics and Information Technology, 4(1), 37–54. Turilli, M. (2007). Ethical protocols design. Ethics and Information Technology, 9(1), 49–62. Van Den Hoven, J. (1995). Equal access and social justice: information as a primary good. ETHICOMP95: An International Conference on the Ethical Issues of Using Information 37 Technology. De Montfort University, Leicester, UK. Weckert, J. and Adeney, D. (1997). Computer and Information Ethics. Greenwood Press, Westport, Connecticut. White, L.J. (1967). The historical roots of our ecological crisis. Science, 155, 1203–1207. Wiener, N. (1954). The Human Use of Human Beings: Cybernetics and Society. Revised Edition. Houghton Mifflin, Boston. Woodbury, M.C. (2003). Computer and Information Ethics. Stipes, Champaign, Ill. York, P.F. (2005). Respect for the world: universal ethics and the morality of terraforming. Ph.D. Thesis. The University of Queensland. Adam, A. (2000). Gender and computer ethics. Computers and Society, 30(4), 17–24. Adam, A., and Ofori-Amanfo, J. (2000). Does gender matter in computer ethics? Ethics and Information Technology, 2(1), 37–47. Anderson, R. Johnson, D., Gotterbarn, D. and Perrolle, J. (1993). Using theACMcode of ethics in decision making. Communications of the ACM, 36, 99–107. Begg, M.M. (2005). Muslim Parents Guide: Making Responsible Use of Information and Communication Technologies at Home. Centre for Computing and Social Responsibility, De Montfort University, Leicester, UK. Brey, P. (2000). Disclosive computer ethics. Computers and Society, 30(4), 10–16. Brey, P. (2006). Evaluating the social and cultural implications of the Internet. Computers and Society, 36(3), 41–44. Brey, P., Introna, L., and Grodzinski, F. (2005). Ethics of new information technologies. Proceedings of the 6th Computer Ethics—Philosophical Enquiries Conference. University of Twente, The Netherlands. Bynum,T.W. (1982).Adiscipline in its infancy. The Dallas Morning News, Dallas, TX, at http:// www.southernct.edu/organizations/rccs/resources/research/introduction/bynum_dallas. 38 html. Bynum, T.W. (Ed.) (1985). Computers and Ethics. Blackwell, Oxford, UK. [Published as the October, 1985 issue of the journal Metaphilosophy]. Bynum, T.W. (1999). The development of computer ethics as a philosophical field of study. The Australian Journal of Professional and Applied Ethics, 1(1), 1–29. Bynum, T.W. (2000). The foundation of computer ethics. Computers and Society, 30(2), 6–13. Bynum, T.W. (2001). Computer ethics: basic concepts and historical overview. Stanford Encyclopedia of Philosophy. Available at http://plato.stanford.edu/entries/ethics-computer/. Bynum, T.W. (2004). Ethical challenges to citizens of the “automatic age”: NorbertWiener on the information society. Journal of Information, Communication and Ethics in Society. 2(2), 65–74. Bynum, T.W. (2005). NorbertWiener.s vision: the impact of the “automatic age” on our moral lives. In: Cavalier, R.J. (Ed.), The Impact of the Internet on Our Moral Lives. SUNY Press, Albany, NY, pp. 11–25. Bynum, T.W. (2006). Flourishing ethics. Ethics and Information Technology, 8(4), 157–173. Bynum,T.W. (2007). NorbertWiener and the rise of information ethics. In: van den Hoven,W.J. andWeckert, J. (Eds.), Moral Philosophy and Information Technology. Cambridge University Press, Cambridge, UK. Bynum, T.W. and Schubert, P. (1997). How to do computer ethics—a case study: the electronic mall Bodensee. In: van den Hoven, W.J. (Ed.), Computer Ethics–Philosophical Enquiry. Erasmus University Press, Rotterdam, pp. 85–95 (Proceedings of CEPE97). Bynum, T.W. and Rogerson, S. (Eds.), Computer Ethics and Professional Responsibility. Blackwell, Oxford, UK. Capurro, R. (2007a). Information ethics for and from Africa. International Review of Information Ethics, 7, 2–10. 39 Capurro, R. (2007b). Intercultural information ethics. In: Capurro, R., Fr€uhbauer, J. and Hausmanninger, T. (Eds.), Localizing the Internet: Ethical Issues in Intercultural Perspective, ICIE Series, Vol. 4, Fink, Munich. Capurro, R. (2006). Toward an ontological foundation for information ethics. Ethics and Information Technology, 8(4), 157–186. Capurro, R. (2004). The German debate on the information society. The Journal of Information, Communication and Ethics in Society, 2, Supplement, 17–18. Cavalier, R.J. (Ed.) (2005). The Impact of the Internet on Our Moral Lives. SUNY Press, Albany, NY. Edgar, S.L. (1997). Morality and Machines: Perspectives on Computer Ethics. Jones and Bartlett, Sudbury, MA. Elgesem, D. (1995). Data privacy and legal argumentation. Communication and Cognition 28 (1), 91–114. Elgesem, D. (1996). Privacy, respect for persons, and risk. In: Ess, C., (Ed.), Philosophical Perspectives on Computer-Mediated Communication, SUNY Press, Albany, NY. Elgesem, D. (2002). What is special about the ethical problems in internet research? Ethics and Information Technology, 4(3), 195–203. Elgesem, D. (2007). Information technology ethics. In: van den Hoven, W.J. and Weckert, J. (Eds.), Moral Philosophy and Information Technology. Cambridge University Press, Cambridge, UK. Ess, C. (1996). The political computer: democracy, CMC, and Habermas. In: Ess, C. (Ed.), Philosophical Perspectives on Computer-Mediated Communication. SUNY Press, Albany, NY, pp. 197–230. Ess, C. (2001a). What.s culture got to do with it? Cultural collisions in the electronic global village. In: Ess, C. (Ed.), Culture, Technology, Communication: Towards an Intercultural 40 Global Village. SUNY Press, Albany, NY, pp. 1–50. Ess, C.(Ed.) (2001b). Culture, Technology, Communication: Towards an Intercultural Global Village. SUNY Press, Albany, NY. Ess, C. (2005a). Computer-Mediated Communication and Human-Computer Interaction. In: Floridi, L. (Ed.), The Blackwell Guide to the Philosophy of Computing and Information. Blackwell, Oxford, UK, pp. 76–91. Ess, C. (2005b). Moral imperatives for life in an intercultural global village. In: Cavalier, R.J. (Ed.), The Impact of the Internet onOur Moral Lives.SUNYPress, Albany,NY, pp. 161–193. Fairweather, B. (1998). NoPAPA:Whyincomplete codes of ethics are worse than none at all. In: Collste, G. (Ed.), Ethics and Information Technology. New Academic Publishers, Delhi, India. Flanagan, M., Howe, D., and H. Nissenbaum, H. (2007). Values in design: theory and practice. In: van den Hoven, W.J. and Weckert, J. (Eds.), Information Technology and Moral Philosophy. Cambridge University Press, Cambridge UK. Floridi, L. (1999). Information ethics: on the theoretical foundations of computer ethics. Ethics and Information Technology, 1(1), 37–56. Floridi, L. (Ed.) (2004). The Blackwell Guide to the Philosophy of Computing and Information. Blackwell, Oxford, UK. Floridi, L. (2005a). Information ethics: its nature and scope.Computers and Society, 36(3), 21–36 Floridi, L. (2005b). Internet ethics: the constructionist values of homopoieticus. In:Cavalier, R.J. (Ed.), The Impact of the Internet on OurMoral Lives.SUNYPress, Albany,NY, pp. 195–214. Floridi, L. (2006). Information technologies and the tragedy of the good will. Ethics and Information Technology, 8(4), 253–262. Floridi, L. and Sanders, J.W. (2004). The foundationalist debate in computer ethics. In: Spinello, R.A. and Tavani, H.T. (eds.), Readings in CyberEthics, 2nd edition. Jones, 41 Bartlett, pp. 81–95. Friedman, B. (Ed.) (1997). Human Values and the Design of Computer Technology, Cambridge University Press, Cambridge, UK. Friedman, B. and Nissenbaum, H. (1996). Bias in Computer Systems. ACM Transactions on Information Systems, 14(3), 330–347. Gert, B. (1998). Morality: Its Nature and Justification. Oxford University Press, Oxford, UK. Gert, B. (1999). Common morality and computing. Ethics and Information Technology, 1(1), 57–64. Gorniak-Kocikowska, K. (1996). The computer revolution and the problem of global ethics. In: Bynum, T.W. and Rogerson, S. (Eds.), Global Information Ethics, a special issue of Science and Engineering Ethics, 2(2), 177–190. Gorniak-Kocikowska, K. (2005). From computer ethics to the ethics of global ICT society. In: Bynum, T.W., Collste, G., and Rogerson, S. (Eds.), Proceedings of ETHICOMP2005, published on a CD, Link€opings University, Sweden. Gorniak-Kocikowska, K. (2007). ICT, globalization and the pursuit of happiness: the problem of change. In: Proceedings of ETHICOMP2007. Meiji University Press, Tokyo. Gotterbarn, D. (1991). Computer ethics: responsibility regained. National Forum: The Phi Beta Kappa Journal, 71, 26–31. Gotterbarn, D. (2001). Informatics and professional responsibility. Science and Engineering Ethics, 7(2), 221–230. Gotterbarn, D. (2002). Reducing software failures: addressing the ethical risks of the software development life cycle. Australian Journal of Information Systems, 9(2), 155–165. Gotterbarn, D., Miller, K., and Rogerson, S. (1997). Software engineering code of ethics. Information Society, 40(11), 110–118. Gotterbarn, D. and Miller, K. (2004). Computer ethics in the undergraduate curriculum: case 42 studies and the joint software engineer.s code. Journal of Computing Sciences in Colleges, 20(2), 156–167. Gotterbarn, D. and Rogerson, S. (2005). Responsible risk analysis for software development: creating the software development impact statement. Communications of the Association for Information Systems, 15, Article 40. Grodzinsky, F. (1997). Computer access for students with disabilities. SIGSCE Bulletin. ACM Press, March 1997. Grodzinsky, F. (1999). The practitioner from within: revisiting the virtues. Computers and Society, 29(2), 9–15. Grodzinsky, F., Miller, K., and Wolfe, M. (2003). Ethical issues in open source software. Journal of Information, Communication and Ethics in Society, (4) 193–205. Grodzinsky, F. and Tavani, H.T. (2002). Ethical reflections on cyberstalking. Computers and Society, 32(1), 22–32. Grodzinsky, F. and Tavani, H. (2004). Verizon vs. the RIAA: implications for privacy and democracy. In: Herkert, J. (Ed.), Proceedings of ISTAS 2004: The International Symposium on Technology and Society. IEEE Computer Society Press, Los Alamitos, CA. Himma, K.E. (2003). The relationship between the uniqueness of computer ethics and its independence as a discipline in applied ethics. Ethics and Information Technology, 5(4), 225–237. Himma, K.E. (2004a). The moral significance of the interest in information: reflections on a fundamental right to information. Journal of Information, Communication, and Ethics in Society, 2(4), 191–202. Himma, K.E. (2004b). There.s something about Mary: the moral value of things qua information objects. Ethics and Information Technology, 6(3), 145–159. 43 Himma, K.E. (2006). Hacking as politically motivated civil disobedience: Is hacktivism morally justified? In: Himma, K.E. (Eds.), Readings in Internet Security: Hacking, Counterhacking, and Society. Jones and Bartlett, Sudbury, MA. Himma, K.E. (2007). Artificial agency, consciousness, and the criteria for moral agency: What properties must an artificial agent have to be a moral agent? Proceedings of ETHICOMP2007. Meiji University Press Tokyo Japan Huff, C.W., Fleming, J.F., and Cooper, J. (1991). The social basis of gender differences in human-computer interaction. In: Martin, C.D. (Ed.), In Search of Gender-Free Paradigm for Computer Science Education. ISTE Research Monographs, Eugene, OR, pp. 19–32. Huff, C.W. and Finholt, T. (Eds.) (1994). Social Issues in Computing: Putting Computers in Their Place. McGraw-Hill. Huff, C.W. and Martin, D. (1995). Computing consequences: a framework for teaching ethical computing. Communications of the ACM, 38(12), 75–84. Huff, C.W. (2002). Gender, Software Design, and Occupational Equity. SIGCSE Bullet: Inroads, 34, 112–115. Huff, C.W. (2004). Unintentional power in the design of computing systems. In: Bynum, T.W. and Rogerson, S. (Eds.), Computer Ethics and Professional Responsibility. Blackwell, Oxford, UK (Originally presented as a paper at ETHICOMP95). Huff, C., Johnson, D., and Miller, K. (2007). Virtual harms and real responsibility. In: Brennan, L. and Johnson, V. (Eds.), Social, Ethical, and Policy Implications of Information Technology. Idea Group Information Science Publishing, Hershey, PA. Introna, L.D. (1997). Privacy and the computer: why we need privacy in the information society. Metaphilosophy, 28(3), 259–275. Introna, L.D. (2002). On the (im)possibility of ethics in a mediated world. Information and Organization, 12(2), 71–84. 44 Introna, L.D. (2005a). Disclosive ethics and information technology: disclosing facial recognition systems. Ethics and Information Technology, 7(2), 75–86. Introna, L.D. (2005b). Phenomenological approaches to ethics and information technology. The Stanford Encyclopedia of Philosophy. http://plato.stanford.edu/entries/ethics-it-phenomenology/. Introna, L.D. and Nissenbaum, H. (2000). Shaping the web: Why the politics of search engines matters. The Information Society, 16(3), 1–17. Introna, L.D. and Pouloudi, N. (2001). Privacy in the information age: stakeholders, interests and values. In: Sheth, J.N. (Eds.), Internet Marketing. Harcourt College Publishers, Fort Worth, TX, pp. 373–388. Johnson, D.G. (2001[1985,1994]). Computer Ethics, 1st edition 1985, Prentice-Hall, Englewood Cliffs, NJ. 2nd edition 1994, Prentice-Hall, Englewood Cliffs, NJ. 3rd edition 2001, Prentice-Hall, Upper Saddle River, NJ. Johnson, D.G. (1997a). Ethics online. Communications of the ACM, 40(1), 60–65. Johnson, D.G. (1997b). Is the global information infrastructure a democratic technology? Computers and Society, 27(4), 20–26. Johnson, D.G. (1999) Sorting out the uniqueness of computer-ethical issues. In: Floridi, L. (Ed.), Etica & Politica (special issue on computer ethics), Vol. 2. Available at http://www. univ.trieste.it/_dipfilo/etica_e_politica/1999_2/homepage.html. Johnson, D.G. (2004). Computer ethics. In: Floridi, L. (Ed.), The Blackwell Guide to the Philosophy of Computing and Information, Blackwell, Oxford, UK, pp. 65–75. Johnson, D.G. and Nissenbaum, H.(Eds.) (1995). Computing, Ethics & Social Values, Prentice Hall, Englewood Cliffs, NJ. Maner, W. (1980[1978]). Starter Kit on Teaching Computer Ethics. Self-published in 1978, published in 1980 by Helvetia Press in cooperation with the National Information and Resource Center on Teaching Philosophy, Hyde Park, NY. 45 Maner, W. (1996). Unique ethical problems in information technology, a keynote address at ETHICOMP95. In: Bynum, T.W. and Rogerson, S. (Eds.), Global Information Ethics, A Special Issue of Science and Engineering Ethics, 2(2), 137–154. Maner, W. (1999). Is computer ethics unique? In: Floridi, L. (Ed.), Etica & Politica (special issue on computer ethics), Vol. 2. Available at http://www.univ.trieste.it/_dipfilo/etica_e_politica/1999_2/homepage.html. Martin, C.D. and Martin, D.H. (1990). Professional codes of conduct and computer ethics education. Social Science Computer Review, 8(1), 96–108. Martin, C.D., Huff, C., Gotterbarn, D., and Miller, K., (1996a).Aframework for implementing and teaching the social and ethical impact of computing. Education and Information Technologies, 1(2), 101–122. Martin, C.D., Huff, C., Gotterbarn, D., and Miller, K. (1996b). Implementing a tenth strand in the computer science curriculum (second report of the Impact CS steering committee). Communications of the ACM, 39(12), 75–84. Mather, K. (2005). The theoretical foundation of computer ethics: stewardship of the information environment. Contemporary Issues in Governance. Monash University, Melbourne, Australia. (Proceedings of GovNet Annual Conference, Melbourne, Australia, pp. 28–30 November, 2005.) Miller, K. (2005b). Web standards: Why so many stray from the narrow path. Science and Engineering Ethics, 11(3), 477–479. Miller, K. and Larson, D. (2005a). Agile methods and computer ethics: raising the level of discourse about technological choices IEEE Technology and Society, 24(4), 36–43. Miller, K. and Larson, D. (2005b). Angels and artifacts: moral agents in the age of computers and networks. Journal of Information, Communication & Ethics in Society, 3(3), 151–157. Moor, J.H. (1979). Are there decisions computers should never make? Nature and System, 1 46 217–229. Moor, J.H. (1985). What is computer ethics? In: Bynum (Ed. ), Computers and Ethics (a special issue of Metaphilosophy), 16(4), 263–275. Moor, J.H. (1998[1996]). Reason, relativity and responsibility in computer ethics, a keynote address at ETHICOMP96 in Madrid, Spain. Later published in Computers and Society, 28 (1), 14–21. Moor, J.H. (1997). Toward a theory of privacy for the information age. Computers and Society, 27(3), 27–32. Moor, J.H. (1999). Just consequentialism and computing. Ethics and Information Technology, 1 (1), 65–69. Moor, J.H. (2001). The future of computer ethics: You ain.t seen nothin. yet. Ethics and Information Technology, 3(2), 89–91. Moor, J.H. (2005). Should we let computers get under our skin? In: Cavalier, R.J. (Ed.), The Impact of the Internet on our Moral Lives. SUNY Press, Albany, NY, pp. 121–138. Moor, J.H. (2006). The nature, importance, and difficulty of machine ethics. IEEE Intelligent Systems, 21(4), 18–21. Nissenbaum, H. (1995). Should I copy my neighbor.s software? In: Johnson, D.G. and Nissenbaum, H. (Eds.), Computers, Ethics and Social Values, Prentice-Hall, Englewood Cliffs, NJ. Nissenbaum, H. (1998[1997]). Can we protect privacy in public? Proceedings of Computer Ethics–Philosophical Enquiry 97 (CEPE97), Erasmus University Press, Rotterdam, The Netherlands, pp. 191–204. Reprinted in Law and Philosophy, 1998, 17, 559–596. Nissenbaum, H. (1998).Values in the design of computer systems. Computers in Society, 38–39. Nissenbaum, H. (2005a). Hackers and the contested ontology of cyberspace. In: Cavalier, R.J. (Ed.), The Impact of the Internet on our Moral Lives.SUNYPress, Albany,NY, pp. 139–160. 47 Nissenbaum, H. (2005b). Where computer security meets national security. Ethics and Information Technology, 7(2), 61–73. Parker, D. (1968). Rules of ethics in information processing. Communications of the ACM, 11, 198–201. Parker, D. (1979). Ethical Conflicts in Computer Science and Technology, AFIPS Press, Arlington, VA. Parker, D., Swope, S., and Baker, B.N. (1990). Ethical Conflicts in Information & Computer Science, Technology and Business. QED Information Sciences, Wellesley, MA. Pecorino, P. and Maner, W. (1985). A proposal for a course on computer ethics. In: Bynum (Ed.), Computers and Ethics, A Special Issue of Metaphilosophy, 16 (4), 327–337. Rogerson, S. (1996). The ethics of computing: the first and second generations. The UK Business Ethics Network News. Rogerson, S. (1998). Computer and information ethics. In: Chadwick R. (Ed.), Encylopedia of Applied Ethics. Academic Press, San Diego, CA, pp. 563–570. Rogerson, S. (2004). The ethics of software development project management. In: Bynum T.W. and Rogerson S. (Eds.), Computer Ethics and Professional Responsibility, Blackwell, Oxford, UK, pp. 119–128. Rogerson, S. and Bynum, T.W. (1995). Cyberspace: the ethical frontier. The Times Higher Education Supplement, No 1179, June 9, 1995, p iv. Rogerson, S., Fairweather, B., and Prior, M. (2002). The ethical attitudes of information systems professionals: outcomes of an initial survey. Telematics and Informatics, 19, 21–36. Rogerson, S. and Fairweather, B. (2003). Entitlement cards. IMIS Journal, 13(2). Rogerson, S. and Gotterbarn, D. (1998). The ethics of software project management. In: Collste G. (Ed.), Ethics and Information Technology. New Academic Publishers, Delhi, India, pp. 137–154. 48 Spinello, R.A. (1997). Case Studies in Information and Computer Ethics. Prentice-Hall, Upper Saddle River, NJ. Spinello, R.A. (2000). CyberEthics: Morality and Law in Cyberspace. Jones and Bartlett, Sudbury, MA. Spinello, R.A. and Tavani, H.T. (2001a). The Internet, ethical values, and conceptual frameworks: an introduction to cyberethics. Computers and Society, 31(2), 5–7. Spinello, R.A. and Tavani, H.T.(Eds.) (2004[2001b]). Readings in CyberEthics, 2nd edition 2004. Jones and Bartlett, Sudbury, MA. Spinello, R.A. and Tavani, H.T. (Eds.) (2005). Intellectual Property Rights in a Networked World: Theory and Practice. Idea Group/Information Science Publishing, Hershey, PA. Stahl, B.C. (2004a). Information, ethics and computers: the problem of autonomous moral agents. Minds and Machines, 14, 67–83. Stahl, B.C. (2004b). ResponsibleManagement of Information Systems. Idea Group, Hershey, PA. Stahl, B.C. (2005). The ethical problem of framing e-government in terms of e-commerce. Electronic Journal of E-Government, 3(2), 77–86. Stahl, B.C. (2006). Responsible computers? A case for ascribing quasi-responsibility to computers independent of personhood or agency. Ethics and Information Technology, 8 (4), 205–213. Tavani, H.T. (Ed.) (1996). Computing, Ethics, and Social Responsibility: A Bibliography. CPSR Press, Palo Alto, CA. Tavani, H.T. (1999). Privacy and the Internet. Proceedings of the Fourth Annual Ethics and Technology Conference. Boston College Press, Chestnut Hill, MA, pp. 114–125. Tavani, H.T. (2002). The uniqueness debate in computer ethics: What exactly is at issue and why does it matter? Ethics and Information Technology, 4(1), 37–54. Tavani, H.T. (2004). Ethics and Technology: Ethical Issues in an Age of Information and 49 Communication Technology, 2nd edition 2007. John Wiley and Sons, Hoboken, NJ. Tavani, H.T. (2005). The impact of the Internet on our moral condition: Do we need a new framework of ethics? In: Cavalier, R.J. (Ed.), The Impact of the Internet on our Moral Lives. SUNY Press, Albany, NY, pp. 215–237. Tavani, H.T. (2006). Ethics, Computing, and Genomics. Jones and Bartlett, Sudbury, MA. Turner, E. (2006). Teaching gender-inclusive computer ethics. In: Trauth, I. (Ed.), Encyclopedia of Gender and Information Technology: Exploring the Contributions, Challenges, Issues and Experiences of Women in Information Technology. Idea Group, pp. 1142–1147. Van den Hoven, M.J. (1997a). Computer ethics and moral methodology. Metaphilosophy, 28 (3), 234–248. Van den Hoven, M.J. (1997b). Privacy and the varieties of informational wrongdoing. Computers and Society, 27(3), 33–37. Van den Hoven, M.J. (1998). Ethics, social epistemics, electronic communication and scientific research. European Review, 7(3), 341–349. Van den Hoven, M.J. (1999). Knowledge and democracy in cyberspace. Etica e Politica 1(2) at http://www.univ.trieste.it/dipfilo/etica_e_politica/1999_2/index.html. Volkman, R. (2003). Privacy as life, liberty, property. Ethics and Information Technology, 5(4), 199–210. Vokman, R. (2005). Dynamic traditions: Why globalization does not mean homogenization. Proceedings of ETHICOMP2005. Published on CD. Link€opings University, Sweden. Volkman, R. (2007). The good computer professional does not cheat at cards. Proceedings of ETHICOMP2007. Meiji University Press, Tokyo. Weckert, J. (2002). Lilliputian computer ethics. Metaphilosophy, 33(3), 366–375. Weckert, J. (2005). Trust in cyberspace. In: Cavalier, R.J. (Ed.), The Impact of the Internet on our Moral Lives. SUNY Press, Albany, NY, pp. 95–117. 50 Weckert, J. and Adeney, D. (1997). Computer and Information Ethics. Greenwood Press, Westport, CT. Weizenbaum, J. (1976). Computer Power and Human Reason: From Judgment to Calculation. Freeman, San Francisco. Wiener, N. (1948). Cybernetics: or Control and Communication in the Animal and the Machine. Technology Press, John Wiley & Sons, New York. Wiener, N. (1954[1950]). The Human Use of Human Beings. Houghton Mifflin, Boston, 1950, 2nd edition Revised. Doubleday Anchor, New York, 1954. Wiener, N. (1964). God & Golem, Inc.: A Comment on Certain Points Where Cybernetics Impinges on Religion. MIT Press, Cambridge, MA. Anscombe, E. (1958). Modern Moral philosophy. Philosophy, 33. Berleur, J. and Brunnstein, K. (1996). Ethics of Computing. Chapman & Hall, London. Brey, P. (2000). Method in computer ethics: towards a multi-level interdisciplinary approach. Ethics and Information Technology, 125–129. Bynum, T.W. (2007). Flourishing ethics. Ethics and Information Technology, 8, 157–173. Collins, R. and Miller, K. (1995). Paramedic ethics for computer professionals. In: Johnson and Nissenbaum (Eds. ), Computers, Ethics and Social Values. Prentice Hall, Englewood Cliffs, NJ. Dancy, J. (2004). Ethics Without Principles. Oxford University Press, Oxford. Daniels, N. (1979). Wide reflective equilibrium and theory acceptance in ethics. Journal of Philosophy, 76(5), 256–82. Reprinted in Daniels, N. (Ed.), Justice and Justification: Reflective Equilibrium in Theory and Practice. Cambridge University Press, Cambridge, pp. 21–46. Floridi, L. (1999). Information ethics: on the philosophical foundations of computer ethics. Ethics and Information Technology, 1, 37–56. 51 Gert, B. (1999). Common morality and computing. Ethics and Information Technology, 1(1), 57–64. Friedman, B. (Ed.) (1998). Human Values and the Design of Computer Technology. Series: (CSLI-LN), Lecture Notes. Center for the Study of Language and Information, Stanford. Griffin, J. (1993). Howwe do ethics now. In: Griffiths, A.P. (Ed. ), Ethics. Cambridge University Press, Cambridge. Q3 Grodzinsky, F.S. (1999). The practitioner from within: revisiting the virtues. Computers and Society, 29. Q4 Himma, K.E. (2004). There.s something about Mary: the moral value of things qua information objects. Ethics and Information Technology, 6(3). Huff, C. and Rogerson, S. Craft and reform in moral exemplars in computing. Available at http://bibliotecavirtual.clacso.org.ar/ar/libros/raec/ethicomp5/docs/htm_papers/30Huff,% 20Chuck.htm. Kamm, F. (2007). Intricate Ethics. Cambridge University Press, Cambridge. Lessig, L. Available at http://www.lessig.org/. Maner,W. Heuristic method for computer ethics. Available at http://csweb.cs.bgsu.edu/maner/ heuristics/maner.pdf. Moor, J.H. (1985). What is computer ethics? Metaphilosophy, 16, 266–75. Nissenbaum, H. and Introna, L. (1999). Shaping the web; why the politics of search engines matters. Information Society, 16, 169–85. Nozick, R. (1993). The Nature of Rationality. Princeton University Press, Princeton. O.Neill, O. (2004). Modern moral philosophy and the problem of relevant descriptions. In: Hear, A.O. (Ed. ), Modern Moral Philosophy. Cambridge University Press, Cambridge. Posner, R.A. (1999). Problematics of Moral and Legal Theory. Belknal Press, Harvard University Press, Cambridge, MA. 52 Quine, W.V.O. and Ullian, J. (1970). The Web of Belief. Random House, New York. Shneiderman, B. (2002). Leonardo.s Laptop, Human Needs and the New Computing Technologies. MIT Press, Cambridge, MA. Tavani, H.T. (2002). The uniqueness debate in computer ethics: what exactly is at issue, and why does it matter? Ethics and Information Technology, 4(1), 37–54. Van den Hoven, J. and Lokhorst, G.J. (2002). Deontic logic and computer supported ethics. In: Moor, J.H. and Bynum, T.W. (Eds.), Cyberphilosophy. Blackwell, Oxford. Wiegel, V., van den Hoven, J. and Lokhorst, G. (2005). Privacy, deontic epistemic action logic and software agents. Ethics and Information Technology, 7(4), 251–264. Winner, L. (1980). Do artefacts have politics? Daedalus, 109, 121–36. Aberg, J. and Shahmehri, N. (2001). An empirical study of humanWeb assistants: Implications for user support inWeb information systems. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI 2000). Association for Computing Machinery Press, New York, NY, pp. 404–411. Ackerman, M.S. and Cranor, L. (1999). Privacy critics: UI components to safeguard users. privacy. In: Extended Abstracts of CHI 1999. ACM Press, pp. 258–259. Adler, P.S. and Winograd, T. (Eds.) (1992). Usability: Turning Technologies into Tools. Oxford University Press, Oxford. Agre, P.E. and Rotenberg, M. (Eds.) (1998). Technology and Privacy: The New Landscape. MIT Press, Cambridge, MA. Baier, A. (1986). Trust and antitrust. Ethics, 231(60), 231–260. Beck, A. and Katcher, A. (1996). Between Pets and People. Purdue University Press, West Lafayette, IN. Becker, L.C. (1977). Property Rights: Philosophical Foundations. Routledge & Kegan Paul, London, England. 53 Bellotti, V. (1998). Design for privacy in multimedia computing and communications environments. In: Agre, P.E. and Rotenberg, M. (Eds.), Technology and Privacy: The New Landscape. The MIT Press, Cambridge, MA, pp. 63–98. The Belmont Report. Ethical Principles and Guidelines for the Protection of Human Subjects of Research (1978). The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. Bennet,W.J. and Delatree, E.J. (1978). Moral education in the schools. The Public Interest, 50, 81–98. Bers, M.U., Gonzalez-Heydrich, J., and DeMaso, D.R. (2001). Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis. In: Proceedings of the Conference of Human Factors in Computing Systems (CHI 2001). Association for Computing Machinery, New York, NY, pp. 380–387. Bjerknes, G. and Bratteteig, T. (1995). User participation and democracy: a discussion of Scandinavian research on system development. Scandinavian Journal of Information Systems, 7(1), 73–97. Bødker, S. (1990). Through the Interface: A Human Activity Approach to User Interface Design. Lawrence Erlbaum Associates, Hillsdale, NJ. Borning, A., Friedman, B., Davis, J., and Lin, P. (2005). Informing public deliberation:Value Sensitive Design of indicators for a large-scale urban simulation. In: Proceedings of the 9th European Conference on Computer-Supported Cooperative Work, Paris, September 2005, pp. 449–468. Borning, A.,Waddell, P., and F€orster, R. (2008). UrbanSim: using simulation to inform public deliberation and decision-making, In: Chen, Hsinchun et al. (Eds.), Digital Government: Advanced Research and Case Studies. Springer-Verlag, New York, NY, pp. 439–466. Boyle, M., Edwards, C., and Greenberg, S. (2000). The effects of filtered video on awareness 54 and privacy. In: Proceedings of Conference on Computer Supported Cooperative Work (CSCW 2000). Association for Computing Machinery, New York, NY pp. 1–10. Bynum, T.W. (Ed.) (1985). Metaphilosophy, 16(4) 263–377. Camp, L.J. (2000). Trust and Risk in Internet Commerce. MIT Press, Cambridge, MA. Campbell, R.L. and Christopher, J.C. (1996). Moral development theory: a critique of its Kantian presuppositions. Developmental Review, 16, 1–47. Carroll, J.M. and Rosson, M.B. (2000). Dimension of participation in information system design. In: Zhang, P. and Galletta, D. (Eds.), Human-Computer Interaction and Management Information System. M.E. Sharpe, Armonk, NY. Cooper, M. and Rejmer, P. (2001). Case study: localization of an accessibility evaluation. In: Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI 2001). Association for Computing Machinery Press, New York, NY, pp. 141–142. Davis, J. (2006). Value Sensitive Design of interactions with UrbanSim indicators, Ph.D. dissertation. Department of Computer Science & Engineering, University of Washington. Dieberger, A., Hook, K., Svensson, M., and Lonnqvist, P. (2001). Social navigation research agenda. In: Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI 2001). Association of Computing Machinery Press, New York, NY, pp. 107–108. Dworkin, R. (1978). Taking Rights Seriously. Harvard University Press, Cambridge, MA. Egger, F.N. (2000). “Trust me, I.man online vendor”: towards a model of trust for e-commerce system design. In: Extended Abstracts of the Conference of Human Factors in Computing Systems (CHI 2000). Association for Computing Machinery, New York, NY, pp. 101–102. Ehn, P. (1989). Work-Oriented Design of Computer Artifacts. Lawrence Erlbaum Associates, Hillsdale, NJ. Faden, R. and Beauchamp, T. (1986). A History and Theory of Informed Consent. Oxford 55 University Press, New York, NY. Fogg, B.J. and Tseng, H. (1999). The elements of computer credibility. In: Proceedings of CHI 1999. ACM Press, pp. 80–87. Foot, P. (1978). Virtues and Vices. University of California Press, Berkeley and Los Angeles, CA. Frankena, W. (1972). Value and valuation. In: Edwards, P., (Ed.), The Encyclopedia of Philosophy. Vols. 7–8 Macmillan, New York, NY, pp. 409–410. Franklin, J., Waddell, P., and Britting, J. (2002). Sensitivity analysis approach for an integrated land development & travel demand modeling system. Presented at the Association of Collegiate Schools of Planning 44th Annual Conference, November 21–24, 2002, Baltimore, MD. Preprint available from www.urbansim.org. Freeman-Benson, B.N. and Borning, A. (2003). YP and urban simulation: applying an agile programming methodology in a politically tempestuous domain. In: Proceedings of the 2003 Agile Programming Conference. Salt Lake City. Preprint available from www. urbansim.org. Friedman, B. (Ed.) (1997a). HumanValues and the Design of Computer Technology. Cambridge University Press, New York, NY. Friedman, B. (1997b). Social judgments and technological innovation: adolescents. understanding of property, privacy, and electronic information. Computers in Human Behavior, 13(3), 327–351. Friedman, B., Howe, D.C., and Felten, E. (2002). Informed consent in the Mozilla browser: implementing Value-Sensitive Design. In: Proceedings of HICSS-35. IEEE Computer Society, Abstract, p. 247; CD-ROM of full papers, OSPE101. Friedman, B. and Kahn, P.H. Jr. (1992). Human agency and responsible computing: implications for computer system design. Journal of Systems Software, 17, 7–14. 56 Friedman, B. and Kahn, P.H. Jr. (2003). Human values, ethics, and design. In: Jacko, J. and Sears, A., (Eds.), The Human-Computer Interaction Handbook. Lawrence Erlbaum Associates, Mahwah, NJ. Friedman, B., Kahn, P.H. Jr., and Howe, D.C. (2000a). Trust online. Communications of the ACM, 43(12), 34–40. Friedman, B., Kahn, P.H. Jr., and Hagman, J. (2003). Hardware companions?: What online AIBO discussion forums reveal about the human-robotic relationship. In: Conference Proceedings of CHI 2003. ACM Press, New York, NY, pp. 273–280. Friedman, B., Kahn, P.H. Jr., Hagman, J., Severson, R.L., and Gill, B. (2006). The watcher and the watched: social judgments about privacy in a public place. Human–Computer Interaction, 21(2), 235–272. Friedman, B. and Millett, L. (1995). It.s the computer.s fault—reasoning about computers as moral agents. In: Conference Companion of the Conference on Human Factors in Computing Systems (CHI 95). Association for Computing Machinery Press, NewYork,NY, pp. 226– 227. Friedman, B., Millett,L., and Felten, E. (2000b). InformedConsentOnline:AConceptualModel andDesignPrinciples.University ofWashingtonComputerScience&EngineeringTechnical Report 00–12–2. Friedman, B. and Nissenbaum, H. (1996). Bias in computer systems. ACM Transactions on Information Systems, 14(3), 330–347. Friedman, B. and Nissenbaum, H. (1997). Software agents and user autonomy. Proceedings of the First International Conference on Autonomous Agents. Association for Computing Machinery Press, New York, NY, pp. 466–469. Fuchs, L. (1999). AREA: a cross-application notification service for groupware. In: Proceedings of ECSCW 1999. Kluwer Academic Publishers, Dordrecht Germany, pp. 57 61–80. Galegher, J., Kraut, R.E., and Egido, C. (Eds.) (1990). Intellectual Teamwork: Social and Technological Foundations of CooperativeWork. Lawrence Erlbaum Associates, Hillsdale, NJ. Gallopin, G.C. (1997). Indicators and their use: information for decision-making. In: Moldan, B., Billharz, S., and Matravers, R. (Eds.), Sustainability Indicators: A Report on the Project on Indicators of Sustainable Development. John Wiley & Sons, Chichester, England. Gewirth, A. (1978). Reason and Morality. University of Chicago Press, Chicago, IL. Greenbaum, J. and Kyng, M. (1991). Design at Work: Cooperative Design of Computer Systems. Lawrence Erlbaum Associates, Hillsdale, NJ. Grudin, J. (1988). Why CSCW applications fail: problems in the design and evaluation of organizational interfaces. In: Proceedings of the Conference on Computer Supported Cooperative Work (CSCW .88). Association for Computing Machinery Press, New York, NY, pp. 85–93. Habermas, J. (1979). Communication and the Evolution of Society. McCarthy, T. (trans). Beacon Press, Boston. Habermas, J. (1984). The Theory of Communicative Action,Vol. 1.McCarthy, T. (trans). Beacon Press, Boston. Hagman, J., Hendrickson, A., and Whitty, A. (2003). What.s in a barcode: informed consent and machine scannable driver licenses. In: CHI 2003 Extended Abstracts of the Conference on Human Factors in Computing System. ACM Press, New York, NY pp. 912–913. Hart, M. (1999). Guide to Sustainable Community Indicators., 2nd edition. Hart Environmental Data, North Andover, MA. Herskovits, M.J. (1952). Economic Anthropology: A Study of Comparative Economics. Alfred 58 A. Knopf, New York, NY. Hill, T.E. Jr. (1991). Autonomy and Self-Respect. Cambridge University Press, Cambridge. Isaacs, E.A., Tang, J.C., and Morris, T. (1996). Piazza: a desktop environment supporting impromptu and planned interactions. In: Proceedings of the Conference on Computer Supported Cooperative Work (CSCW, 96). Association for Computing Machinery Press, New York, NY, pp. 315–324. Jacko, J.A., Dixon, M.A., Rosa, R.H., Jr., Scott, I.U., and Pappas, C.J. (1999). Visual profiles: a critical component of universal access. In: Proceedings of the Conference on Human Factors in Computing Systems (CHI.99). Association for Computing Machinery Press, New York, NY, pp. 330–337. Jancke, G.,Venolia, G.D., Grudin, J., Cadiz, J.J., and Gupta, A. (2001). Linking public spaces: technical and social issues. In: Proceedings of CHI 2001,. pp. 530–537. Johnson, E.H. (2000). Getting beyond the simple assumptions of organization impact (social informatics). Bulletin of the American Society for Information, Science, 26(3), 18–19. Johnson, D.G. and Miller, K. (1997). Ethical issues for computer scientists and engineers. In: Tucker, A.B. Jr. (Ed.-in-Chief), The Computer Science and Engineering Handbook. CRC Press, pp. 16–26. Kahn, P.H. Jr. (1999). The Human Relationship with Nature: Development and Culture. MIT Press Cambridge, MA. Kahn, P.H. Jr. and Kellert, S.R. (Eds.) (2002). Children and Nature: Psychological, Sociocultural, and Evolutionary Investigations. MIT Press, Cambridge, MA. Kahn, P.H. Jr. and Turiel, E. (1988). Children.s conceptions of trust in the context of social expectations. Merrill-Palmer Quarterly, 34, 403–419. Kant, I. (1964). Groundwork of the Metaphysic of Morals. (Paton, H.J. trans.). Harper Torchbooks, 59 New York, NY (original work published in 1785). Kling, R., Rosenbaum, H. and Hert, C. (1998). Social informatics in information science: an introduction. Journal of the American Society for Information Science, 49(12), 1047–1052. Kling, R. and Star, S.L. (1998). Human centered systems in the perspective of organizational and social informatics. Computers and Society, 28(1), 22–29. Kyng, M. and Mathiassen, L. (Eds.) (1997). Computers and Design in Context. The MIT Press, Cambridge, MA. Leveson, N.G. (1991). Software safety in embedded computer systems. Communications of the ACM, 34(2), 34–46. Lipinski, T.A. and Britz, J.J. (2000). Rethinking the ownership of information in the 21st century: ethical implications. Ethics and Information Technology, 2(1), 49–71. MacIntyre, A. (1984). After Virtue. University of Nortre Dame Press, Nortre Dame. Mayer, R.C., Davis, J.H., and Schoorman, F.D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709–734. Millett, L., Friedman, B., and Felten, E. (2001). Cookies and web browser design: toward realizing informed consent online. In: Proceedings of CHI 2001. ACM Press, pp. 46–52. Moldan, B., Billharz, S., and Matravers, R. (Eds.) (1997). Sustainability Indicators: A Report on the Project on Indicators of Sustainable Development. Wiley & Sons, Chichester, England. Moore, G.E. (1978). Principia Ethica. Cambridge University Press, Cambridge (original work published in 1903). Nass, C. and Gong, L. (2000). Speech interfaces from an evolutionary perspective. Communications of the ACM, 43(9), 36–43. 60 Neumann, P.G. (1995). Computer Related Risks. Association for Computing Machinery Press, New York, NY. Nielsen, J. (1993). Usability Engineering. AP Professional, Boston, MA. Nissenbaum, H. (1998). Protecting privacy in an information age: the problem with privacy in public. Law and Philosophy, 17, 559–596. Nissenbaum, H. (1999). Can trust be secured online?Atheoretical perspective. Etica e Politca, 2 (electronic journal). Nissenbaum, H. (2001). Securing trust online: wisdom or oxymoron. Boston University Law Review, 81(3), 635–664. Norman, D.A. (1988). The Psychology of Everyday Things. Basic Books, New York. Northwest Environment Watch (2002). This Place on Earth 2002: Measuring What Matters. Northwest Environment Watch, 1402 Third Avenue, Seattle, WA 98101. Noth, M., Borning, A., and Waddell, P. (2003). An extensible, modular architecture for simulating urban development, transportation, and environmental impacts. Computers, Environment and Urban Systems, 27(2), 181–203. Olson, J.S. and Olson, G.M. (2000). i2iTrust in e-commerce. Communications of the ACM, 43 (12), 41–44. Olson, J.S. and Teasley, S. (1996). Groupware in the wild: lessons learned from a year of virtual collaboration. In: Proceedings of the Conference on Computer Supported CooperativeWork (CSCW 96). Association for Computing Machinery Press, New York, NY, pp. 419–427. Orlikowsi,W.J. and Iacono, C.S. (2001). Research commentary: desperately seeking the “IT” in ITresearch: a call to theorizing the ITartifact. Information SystemsResearch, 12(2), 121–134. Palen, L. and Dourish, P. (2003). Privacy and trust: unpacking “privacy” for a networked world. In: Proceedings of CHI 2003, pp. 129–136. Palen, L. and Grudin, J. (2003). Discretionary adoption of group support software: lessons from 61 calendar applications. In: Munkvold, B.E. (Ed.), Implementing Collaboration Technologies in Industry. Springer Verlag, Heidelberg. Palmer, K. (Ed.) (1998). Indicators of Sustainable Community. Sustainable Seattle, Seattle, WA. Phillips, D.J. (1998). Cryptography, secrets, and structuring of trust. In: Agre, P.E. and Rotenberg, M. (Eds.), Technology and Privacy: The New Landscape. The MIT Press, Cambridge, MA, pp. 243–276. Pruitt, J. and Grudin, J. (2003). Personas: practice and theory. In: Proceedings of DUX 2003, ACM Press. Rawls, J. (1971). A Theory of Justice. Harvard University Press, Cambridge, MA. Reeves, B. and Nass, C. (1996). The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places. Cambridge University Press and CSLI Publications, New York, NY and Stanford, CA. Riegelsberger, J. and Sasse, M.A. (2002). Face it: photos don.t make a web site trustworthy. In: Extended Abstracts of CHI 2002. ACM Press, pp. 742–743. Rocco, E. (1998). Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact. In: Proceedings of CHI 1998. ACM Press, pp. 496–502. Rosenberg, S. (1997). Multiplicity of selves, In: Ashmore, R.D. and Jussim, L. (Eds.), Self and Identity: Fundamental Issues. Oxford University Press, New York, NY, pp. 23–45. Sawyer, S. and Rosenbaum, H. (2000). Social informatics in the information sciences: current activities and emerging direction. Informing Science, 3(2), 89–95. Scheffler, S. (1982). The Rejection of Consequentialism. Oxford University Press, Oxford, England. Schiano, D.J. and White, S. (1998). The first noble truth of cyberspace: people are people (even when they MOO). In: Proceedings of the Conference of Human Factors in Computing 62 Systems (CHI 98). Association for Computing Machinery, New York, NY, pp. 352–359. Schneider, F.B. (Ed.) (1999). Trust in Cyberspace. National Academy Press, Washington, DC. Schoeman, F.D. (Ed.) (1984). Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge, England. Shneiderman, B. (1999). Universal usability: pushing human–computer interaction research to empower every citizen. ISR Technical Report. 99–72. University of Maryland, Institute for Systems Research, College Park, MD. Shneiderman, B. (2000). Universal usability. Communication of the ACM, 43(5), 84–91. Simpson, J.A. and Weiner, E.S.C. (Eds.) (1989). “value, n.” Oxford English Dictionary. Clarendon Press, Oxford; OED Online, Oxford University Press, 30 May 2003. Available at http://dictionary.oed.com/cgi/entry/00274678. Smart, J.J.C. and Williams, B. (1973). Utilitarianism For and Against. Cambridge University Press, Cambridge. Stephanidis, C. (Ed.) (2001). User Interfaces for All: Concepts, Methods, and Tools. Lawrence Erlbaum Associates, Mahwah, NJ. Suchman, L. (1994). Do categories have politics? The language/action perspective reconsidered. CSCW Journal, 2(3), 177–190. Svensson, M., Hook, K., Laaksolahti, J. and Waern, A. (2001). Social navigation of food recipes. In: Proceedings of the Conference of Human Factors in Computing Systems (CHI, 2001). Association for Computing Machinery, New York, NY, pp. 341–348. Tang, J.C. (1997). Eliminating a hardware switch: weighing economics and values in a design decision. In: Friedman, B. (Ed.), Human Values and the Design of Computer Technology. Cambridge University Press, New York, NY, pp. 259–269. Thomas, J.C. (1997). Steps toward universal access within a communications company. In: Friedman, B. (Ed.), Human Values and the Design of Computer Technology. Cambridge 63 University Press, New York, NY, pp. 271–287. Turiel, E. (1983). The Development of Social Knowledge. Cambridge University Press, Cambridge, England. Turiel, E. (1998). Moral development. In: Eisenberg, N. (Ed.), Social, Emotional, and Personality Development. In: Damon,W. (Ed.), Handbook of Child Psychology, 5th edition, Vol. 3. Wiley & Sons, New York, NY, pp. 863–932. Turiel, E. (2002). The Culture of Morality: Social Development, Context, and Conflict. Cambridge University Press, Cambridge, England. Turkle, S. (1996). Life on the Screen: Identify in the Age of the Internet. Simon and Schuster, New York, NY. Ulrich, R.S. (1984). View through a window may influence recovery from surgery. Science, 224, 420–421. Ulrich, R.S. (1993). Biophilia, biophobia, and natural landscapes. In:Kellert, S.R. and Wilson, E.O.(Eds.), The Biophilia Hypothesis. Island Press, Washington, DC, pp. 73–137. United Nations (2002). Report of the United Nations Conference on Environment and Development, held in Rio de Janeiro, Brazil, 1992. Available at http://www.un.org/esa/ sustdev/documents/agenda21/english/agenda21toc.htm. Waddell, P. (2002). UrbanSim: modeling urban development for land use, transportation, and environmental planning. Journal of the American Planning Association, 68(3), 297–314. Waddell, P., Borning, A., Noth, M., Freier, N., Becke, M., and Ulfarsson, G. (2003). Microsimulation of urban development and location choices: design and implementation of UrbanSim. Networks and Spatial Economics, 3(1), 43–67. Weiser, M. and Brown, J.S. (1997). The coming age of calm technology. In: Denning, P. and Metcalfe, B. (Eds.), Beyond Calculation: The Next 50 Years of Computing. Springer-Verlag, New York, NY, pp. 75–85. 64 Weizenbaum, J. (1972). On the impact of the computer on society: How does one insult a machine? Science, 178, 609–614. Wiener, N. (1985). The machine as threat and promise. In: Masani, P. (Ed.), Norbert Wiener: CollectedWorks and Commentaries, Vol. IV. The MIT Press, Cambridge, MA, pp. 673–678. reprinted from St. Louis Post Dispatch, December 13, 1953. Winograd, T. (1994). Categories, disciplines, and social coordination. CSCW Journal, 2(3), 191–197. World Commission on Environment and Development (Gro Harlem Brundtland, Chair) (1987). Our Common Future. Oxford University Press, Oxford. Wynne, E.A. and Ryan, K. (1993). Reclaiming Our Schools: A Handbook on Teaching Character, Academics, and Discipline. Macmillan & Co., New York. Zheng, J., Bos, N., Olson, J., and Olson, G.M. (2001). Trust without touch: jump-start trust with social chat. In: Extended Abstracts of CHI 2001. ACM Press, pp. 293–294. Becker, L.C. (1993). Deserving to own intellectual property. Chicago-Kent Law Review, 68. Boyle, J. (1996). Shamans, Software, and Spleens. Harvard University Press, Cambridge, MA. Bugbee, B. (1967). Genesis of American Patent and Copyright Law. Public Affairs Press, Washington, DC. Child, J.W. (1997). The moral foundations of intangible property. In: Moore, A. (Ed.), Intellectual Property: Moral, Legal, and International Dilemmas. Rowman and Littlefield, Lanham, MD. Croskery, P. (1993). Institutional utilitarianism and intellectual property. Chicago-Kent Law Review, 68, 631–657. Gordon,W.J. (1993). Property right in self expression: equality and individualism in the natural law of intellectual property. Yale Law Journal, 102, 1533–1609. 65 Gordon,W.J. (1994). Assertive modesty: an economics of intangibles. Columbia Law Review, 94, 2579–2593. Hettinger, E.C. (1997). Justifying intellectual property. Philosophy and Public Affairs, reprinted in: Moore, A. (Ed.), Intellectual Property: Moral, Legal, and International Dilemmas. Rowman and Littlefield, Lanham, MD 18, 31–52. Himma, K. (2006). Justifying intellectual property protection: why the interests of contentCreators usually wins over everyone else.s. In: Rooksby, E. (Ed.), Information Technology and Social Justice, Idea Group. Hughes, J. (1997). The philosophy of intellectual property. Georgetown Law Journal. Reprinted in: Moore, A. (Ed.), Intellectual Property: Moral, Legal, and International Dilemmas. Rowman and Littlefield, Lanham, MD 77, p. 287. Kuflik, A. (1989). The moral foundations of intellectual property Rights. In: Weil, V. and Snapper, J. (Eds.), Owning Scientific and Technical Information. Rutgers University Press, New Brunswick and London. Machlup, F. (1962). Production and Distribution of Knowledge in the United States. Princeton Moore, A.D. (1997). In: Moore, A. (Ed.), Intellectual Property: Moral, Legal, and International Dilemmas. Rowman & Littlefield, Lanham, MD. Moore, A.D. (2004[2001]). Intellectual Property and Information Control: Philosophic Foundations and Contemporary Issues. Transaction Publishing, New Brunswick, NJ, 2004, 2001, hardback. Moore, A.D. (2005). Intangible property: privacy, power, and information control. American Philosophical Quarterly, 35, 365–378. Reprinted in: Moore, A. (Ed.), Information Ethics: Privacy, Property, and Power. University of Washington Press. Nelkin, D. (1984). Science as Intellectual Property. Macmillan, New York. Palmer, T.G. (1997). Intellectual property: a non-posnerian law and economics approach. 66 Hamline Law Review, 261–304. Reprinted in: Moore, A. (Ed.), Intellectual Property: Moral, Legal, and International Dilemmas. Rowman and Littlefield, Lanham MD. Palmer, T.G. (2005). Are patents and copyrights morally justified? The philosophy of property rights and ideal objects. Harvard Journal of Law and Public Policy, 13, 817–866. Reprinted in: Moore, A. (Ed.), Information Ethics: Privacy, Property, and Power. University of Washington Press. Spooner, L. (1971). The Law of Intellectual Property. M & S Press (originally published in 1855). Tavani, H. (2005). Intellectual property rights: from theory to practical implementation (with Richard Spinello). In: Spinello, R.A. and Tavani, H.T. (Eds.), Intellectual Property Rights in a Networked World: Theory and Practice. Idea Group/Information Science Publishing, Hershey, PA, pp. 1–65. Waldron, J. (1993). From authors to copiers: individual rights and social values in intellectual property. Chicago-Kent Law Review, 68, 841–887. Weil, V. and Snapper, J. (Eds.). (1989). Owning Scientific and Technical Information. Rutgers University Press, New Brunswick and London. 67 68