| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.

View
 

FrontPage

Page history last edited by Erwin Genuino 10 years, 5 months ago

23

 


Wen Genuino - PbWiki page  

                                       

You are visitor #  

   


 

slide errorPlugin error: That plugin is not available.

 

 

Creative Commons License

This work is licensed under a Creative Commons Attribution-No Derivative Works 3.0 Philippines License.

 

 


VERTSOL 

 

95 theses

 

first batch 1 to 15

 

Second batch 16 to 30

 

Third Batch 31 to 45

 


ITETHIC

 

Contemporary moral reflections

 

Chapter 1:

Egoism and moral scepticism

Religion, morality and conscience

Master and slave morality

Trying out one's new sword

Utilitarianism

The debate over Utilitarianism

The categorical imperative

Happiness and virtue by Aristotle 

The nature and value of rights by Joel Feinberg  

Taking Rights seriously by Ronald Dworkin

A theory of justice by John Rawls

The need for more than justice by Annete Baier

 

Compiled

 

Fortune at the bottom of the pyramid

 

The market at the bottom of the pyramid

Products and services for the BOP

BOP: A global opportunity

The ecosystem of wealth creation

Reducing Corruption: Transaction Governance Capacity

Development as social transformation 

 

 

The Handbook of information and computer ethic  

 

Foundations of Information Ethics

Milestones in the History of Information and Computer Ethics

Moral Methodology and Information Technology

Value Sensitive Design and Information System

Personality-base, rule-utilitarian, and Lockean Justifications of Intellectual Property

Informational Privacy: Concepts, Theories, and Controversies

Online Anonymity

Ethical Issues involving computer security: hacking, hacktivism, and computer hacking

Information ethics and library profession

Ethical Interest in Free and Open Source Software

Internet Research Ethics: the field and critical issues

Health Information Technology: Challenges in Ethics, Science, and Uncertainty 

Ethical Issues of Information and business  

Responsibilities for Information on the Internet

Virtual Reality and Computer Simulation

Genetic Information: Epistemological and Ethical Issues

The ethics of Cyber Conflict

A practical mechanism for ethical risk assessment - A SoDIS Inspection

Regulation and Governance on the Internet

Information Overload

Email Spam

The matter of plagirism: what, why and if

Intellectual property: Legal and Moral Challenges of online file sharing

Censorship and access to expression

The gender agenda in Computer Ethics

The Digital Divide: A perspective for the future

Intercultural information ethics

 

Other assignments:

How to make wealth by Paul Graham

CEMEX case study

Natalie Dylan case study

ICCI bank

E-Choupal case study

Book of Eli Review

Jaipur Foot Case Study

Hindustan Limited Case Study

Copyright privacy and anonymity : 7 questions

Copyright privacy and anonymity, Spicy Elephant

Voxiva case study

Bahnsen part 1  

Bahnsen part 2

Bahnsen part 3

Authority of god's law today

25 laws for non-lawyers

TAG

EFF

25 most dangerous programming errors

Multidimensional Scale Graph

Multidimensional Ethic Scale

Multidimensional ethics scale survey result

 


 

Contact info

 

Facebook

Twitter

Wordpress

 

     Email : genuino.erwin@gmail.com

     ym : erwingenuino@yahoo.com

 


 

Recent Vistors: 

 

 

    You now

     

     

Comments (1)

Donn S. Abrenica said

at 7:25 am on Jan 25, 2010

bakla...

You don't have permission to comment on this page.