• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!



Page history last edited by Riela Isabel Antonio 14 years, 8 months ago

Hey There! Welcome to my Page! :)


"It is better to be happy for a moment and be burned up with beauty
than to live a long time and be bored all the while."
- Don Marquis -


Free Emoticon Courtesy of www.FreeSmileys.org 





Ethicified Ethicified rielaantonio by Riela Isabel T. Antonio




  BOOK reviews:


  The Fortune at the Bottom of the Pyramid

  1. The Market at the Bottom of the Pyramid
  2. Products and Services for the BOP
  3. BOP: A Global Opportunity
  4. The Ecosystem for Wealth Creation
  5. Reducing Corruption: Transaction Governance Capacity
  6. Development as Social Transformation

  The Handbook of Information and Computer Ethics

  1. Foundations of Information Ethics
  2. Milestones in the History of Information and Computer Ethics
  3. Moral Methodology and Information Technology
  4. Value Sensitive Design and Information Systems
  5. Personality-Based, Rule-Utilitarian, and Lockean Justifications of Intellectual Property
  6. Informational Privacy: Concepts, Theories, and Controversies
  7. Online Anonymity
  8. Ethical Issues Involving Computer Security: Hacking, Hacktivism, and Counterkacking
  9. Information Ethics and the Library Profession
  10. Ethical Interest in Free and Open Source Software
  11. Internet Research Ethics: The Field and Its Critical Issues
  12. Health Information Technology: Challenges in Ethics, Science, and Uncertainty
  13. Ethical Issues of Information and Business
  14. Responsibilities for Information on the Internet
  15. Virtual Reality and Computer Simulation
  16. Genetic Information: Epistemological and Ethical Issues
  17. The Ethics of Cyber Conflict
  18. A Practical Mechanism for Ethical Risk Assessment—A SoDIS Inspection
  19. Regulation and Governance of the Internet
  20. Information Overload
  21. Email Spam
  22. The Matter of Plagiarism: What, Why, and If
  23. Intellectual Property: Legal and Moral Challenges of Online File Sharing
  24. Censorship and Access to Expression
  25. The Gender Agenda in Computer Ethics
  26. The Digital Divide: A Perspective for the Future
  27. Intercultural Information Ethics

  Cyber Ethics

  1. Ethics and the Information Revolution
  2. Ethics On-Line
  3. Reason, Relativity, and Responsibility in Computer Ethics
  4. Disclosive Computer Ethics
  5. Gender and Computer Ethics
  6. Is the Global Information Infrastructure a Democratic Technology
  7. Applying Ethical and Moral Concepts and Theories to IT Contexts: Some Key Problems and Challenges
  8. Just Consequentialism and Computing
  9. The Internet as Public Space: Concepts, Issues, and Implications in Public Policy
  10. The Laws of Cyberspace
  11. Of Black Holes and Decentralized Law-Making in Cyberspace
  12. Fahrenheit 451 2: Is Cyberspace Burning
  13. Filtering the Internet in the USA: Free Speech Denied
  14. Censorship, the Internet, and the Child Pornography Law of 1996: A Critique
  15. PICS: Internet Access Controls Without Censorship
  16. Internet Service Providers and Defamation: New Standards of Liability
  17. Digital Millennium Copyright Act
  18. Note on the DeCSS Trial
  19. A Politics of Intellectual Property: Environmentalism for the Net
  20. Intellectual Property, Information, and the Common Good
  21. Is Copyright Ethical An Examination of the Theories, Laws, and Practices Regarding the Private
  22. On the Web, Plagiarism Matters More Than Copyright Piracy
  23. An Ethical Evaluation of Web Site Linking
  24. The Cathedral and the Bazaar
  25. Towards A Theory of Piracy for the Information Age
  26. The Structure of Rights in Directive 95 46 EC
  27. : Privacy Protection, Control of Information, and Privacy-Enhancing Technologies
  28. Toward an Approach to Privacy in Public: Challenges of Information Technology
  29. KDD, Privacy, Individuality, and Fairness
  30. Data Mining and Privacy
  31. Workplace Surveillance, Privacy, and Distributive Justice
  32. Privacy and Varieties of Informational Wrongdoing
  33. PICS: Internet Access Controls Without Censorship
  34. Defining the Boundaries of Computer Crime: Piracy, Break-Ins, and Sabotage in Cyberspace
  35. Terrorism or Civil Disobedience: Toward a Hacktivist Ethic
  36. Web Security and Privacy: An American Perspective
  37. The Meaning of Anonymity in an Information Age
  38. Written on the Body: Biometrics and Identity
  39. Ethical Considerations for the Information Professions
  40. Software Engineering Code of Ethics: Approved
  41. No, PAPA: Why Incomplete Codes of Ethics are Worse than None at All
  42. Subsumption Ethics
  43. Ethical Issues in Business Computing
  44. The Practitioner from Within: Revisiting The Virtues


You are the th visitor


This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Philippines License.


Comments (0)

You don't have permission to comment on this page.