pingky's blog

Thursday, February 24, 2005

An example of social justice issue

In the Philippines, Digital Divide exists due to geographical regions. This divide is seen to increase unless pro-poor Information and Communication Technology (ICT) strategies will be developed.

In 1990, the Philippines prepared a twenty year National Telecommunications Development Plan (1991-2010). It listed some of the potential benefits that telecommunication services provide, namely:
1. Reduce transport cost and energy consumption
2. Reduce isolation of remote areas;
3. Improve response to national and personal emergencies;
4. Improved resource usage;
5. Improve efficiency of freight transport;
6. More efficient ordering, collection, and distribution of agricultural and fishing
7. Better financial control;
8. Improved feasibility of organizational decentralization;
9. Additional foreign exchange earning from export business aided or made possible by improved telecommunications;
10. Reduction in the need for personal travel;
11. Maintenance of family ties;
12. Provision of health and education services to outlying areas;
13. Reduction of migration from rural to urban areas.

As such, the diffusion of knowledge and information has been an acknowledged strategy in nation building and for better governance. This is why the policy framework used by the government is geared towards “dispersing ICT capabilities across a broad range of economic activities and income groups… And as a parallel social goal, ICT shall be harnessed to bridge the digital divide amount different regions and communities in the country.

Local Strategies for Bridging Information to the Last Mile

1. Telecenter Concept/Community E-centers or CEC’s
2. Philippine Council for Health Research and Development (PCHRD) Multi-purpose Community Telecenter (MCT) project.
3. The e-Barangay Project.
4. Call Centers: Connecting with the Migrant Worker
5. E-governance via Cellular Phones
6. I-Governance
7. Satellite and Wireless Connection like Batanes Connect
8. Wireless Local Loop Technology like SMS to Television in Classrooms.From:

Briging The Information Divide. A Philippine Guidebook on ICT for Development. By Erwin Alampay. Richard Heeks and Peter Paul A. Soliva.

Friday, February 11, 2005

An example of violation of privacy

Privacy Issues

All software development engineers in the company I work for are bound or should strictly abide to the Non-Disclosure Agreement for the security of information. Every one of us is required to observe discretion and respect to the confidential nature of the information made available to us or specifically on information acquired in the conduct of our duty.

The following acts constitute violation of confidentiality:
1. Infidelity in the custody of company and/or documents.
2. Unauthorized disclosure of confidential information.

On Transparency:

In the company I worked for is required to make adequately transparent our operations and transactions; and shall comply with reporting and disclosure requirements of regulatory agencies such as the Securities and Exchange Commission, the Anti-Money Laundering Council, and the Bureau of Internal Revenue.

Friday, February 04, 2005

An example of Computer Abuse

Denial of service is a computer abuse that I think is morally wrong. Denial of service is in contrast to the physical law and moral law. Physical law is regularity and imperativeness. When system that becomes operative its efficiency remains constant and permanent. Denial-of- service are attacks on the systems that destruct the normal operation of system thus preventing system to operate normally. Moral law is concerned with the precepts of good and virtuous conducts. It is against the 2 commandment for computer ethics which is “Thou shalt not interfere with other people’s computer works.