SlideShare a Scribd company logo
Changes to value systems as a result of interactive media David Phillips
Learning outcomes 1.  To assess the degree to which individuals are able and willing to undertake illegal or immoral activities online 2.  To discuss the implications of this for society and for organisations
An Anomalous Picture 1 1. A brand-new PhD recipient proudly tells his mother he has just published his first article. She asks him how much he was paid for it. He makes a face and tells her "nothing," and then begins a long, complicated explanation... 2. A fellow-researcher at that same university sees a reference to that same article. He goes to their library to get it: "It's not subscribed to here. We can't afford that journal. (Our subscription/license/loan/copy budget is already overspent)" 3. An undergraduate at that same university sees the same article cited on the Web. He clicks on it. The publisher's website demands a password: "Access Denied:Only pre-paid subscribing/licensed institutions have access to this journal." 4. The undergraduate loses patience, gets bored, and clicks on Napsterto grab an MP3 file of his favourite bootleg CD to console him in his sorrows.
An Anomalous Picture 2 5. Years later, the same PhD is being considered for tenure. His publications are good, but they're not cited enough; they have not made enough of a "research impact." Tenure denied. 6. Same thing happens when he tries to get a research grant: His research findings have not had enough of an impact: Not enough researchers have read, built upon and cited them. Funding denied. 7. He decides to write a book instead. Book publishers decline to publish it: "It wouldn't sell enough copies because not enough universities have enough money to pay for it. (Their purchasing budgets are tied up paying for their inflating annual journal subscription/license/loan costs...)"
An Anomalous Picture 3 8. He tries to put his articles up on the Web, free for all, to increase their impact. His publisher threatens to sue him and his server-provider for violation of copyright. 9. He asks his publisher: "Who is this copyright intended to protect?" His publisher replies:  "You!" What is wrong with this picture? (And why is the mother of the PhD whose give-away work people cannot steal, even though he wants them to, in the same boat as the mother of the recording artist whose non-give-away work they can and do steal, even though he does not want them to?) Source: Stevan Harnad  http://www.ecs.soton.ac.uk/~harnad/Tp/resolution.htm#Picture
The Gutenberg effect Johannes  Gutenberg (c. 1398 – c. February 3, 1468)  goldsmith and inventor is usually considered to have invented the European technology of printing with movable type in 1447. A similar printing technology was known in Korea and China by at least in 1234,  The ability to produce many copies of a new book was a revolution in Europe – and cause a few plus a number of wars
The Value System A value system refers to how an individual or a group of individuals organize their ethical or ideological values. A well-defined value system is a moral code. In politics: http://news.xinhuanet.com/english/2006-10/18/content_5220576.htm   In Business:  Wenstøp, Fred and Myrmel, Arild (2006). Structuring organizational value statements. Norwegian School of Management BI. Oslo. In a University http://www.adec.edu/clemson/papers/weiser.html
The Internet effect Transparency More information is made available to gain competitive advantage – the interaction exposes its value system Porosity Information about people and institutions is 'leaked' or becomes available because of technologies – to expose the internal application of value systems Agency Value systems are changed by people, technologies or combinations of both
Social/self justification The system is wrong (social value system dissonance e.g. MP3) Avoiding the value system is easy (e.g. illegal or corrupt, viruses, grooming, multiple personalities)
Cyber Crime Economic and cybercrime have come of age in a digital society where we now entrust our identity and finances on a daily basis to organisations across the world.  http://www.silicon.com/research/specialreports/ecrime/0,3800011283,39152955,00.htm
Value Systems threatened  1 ID Theft  Online Fraud  Identity Theft  Online Crime  Email Fraud  Phishing  x Spoofing  x Typical source for information  http://www.legalday.co.uk/current/cybercrime.htm
Value Systems threatened 2 Intellectual property Copyright Trademarks Software Plagiarism  x Role of  Creative Commons
Value Systems threatened 3 Identity Theft ( Fraud ) Personal abuse (including children) Blackmail Attacks on cultures
Options Controls Legal sanction Policing 'Moral Majority' watchdogs Corporate and personal hygiene
Learning outcomes 1.  To assess the degree to which individuals are able and willing to undertake illegal or immoral activities online 2.  To discuss the implications of this for society and for organisations
Additional reading Kessler International Technology to detect copyright infringement Examples over 5 years old Internet watch

More Related Content

PPT
Internet Resources Power Point
PPT
E Marketing Week02
PDF
Data Science 101
PPTX
Information literacy studies for webinars
PPTX
UIUC SLIS LIS531 MiniCourse Endangered Data Week
PDF
Charleston Conference 2013 - 13_1107
Internet Resources Power Point
E Marketing Week02
Data Science 101
Information literacy studies for webinars
UIUC SLIS LIS531 MiniCourse Endangered Data Week
Charleston Conference 2013 - 13_1107

Viewers also liked (8)

ODP
Comminities and activism
PPTX
Monitoring And Evaluation
ODP
Landscaping
PPT
Lecture One
PPS
Ranking de padres
PPTX
Online communication trends
ODP
Tactics Channels and Timescales
ODP
Approaches to understanding the Internet as a social medium
Comminities and activism
Monitoring And Evaluation
Landscaping
Lecture One
Ranking de padres
Online communication trends
Tactics Channels and Timescales
Approaches to understanding the Internet as a social medium
Ad

Similar to Changed Value Systems (20)

PDF
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)
PPTX
Working with ict ethical social and legal issues
DOCX
Review questions
PPTX
Networked Information Economy / Benkler
PDF
239 325 ethics
PDF
The Blur/Banff proposal
PPT
Bramble Tsinghua Presentation
PPTX
Introduction to intellectual property oct 2011
PDF
A week is a long time in computer ethics
PPTX
Social media
PPTX
اخلاقيات الثالث
ODP
Glyn Moody - from openness to abundance
DOCX
New approaches to openness – beyond open educational resources
PDF
Cutting the trees of knowledge
PDF
New Media as Institutions: Ownership & Business Models
PPTX
Why is online piracy ethically different from theft? A vignette experiment.
DOC
Dan l. Burk on privacy.
PPTX
Online legal consideration
ODP
Necessary freedoms for information society
PPT
Computer Ethics
Lecture 2011.01: General Introduction and Open Access (Digital Sustainability)
Working with ict ethical social and legal issues
Review questions
Networked Information Economy / Benkler
239 325 ethics
The Blur/Banff proposal
Bramble Tsinghua Presentation
Introduction to intellectual property oct 2011
A week is a long time in computer ethics
Social media
اخلاقيات الثالث
Glyn Moody - from openness to abundance
New approaches to openness – beyond open educational resources
Cutting the trees of knowledge
New Media as Institutions: Ownership & Business Models
Why is online piracy ethically different from theft? A vignette experiment.
Dan l. Burk on privacy.
Online legal consideration
Necessary freedoms for information society
Computer Ethics
Ad

More from David Phillips (20)

PPTX
Transformative technologies
PPTX
Twitter Followers report
PPTX
Managing crisis world vision
PPTX
Issues and crisis management
PPT
Network theory
PPT
Communication theory 2
PPT
Communication theory 1
PPTX
Future pr
PPT
Ethics Lecture 2012
PPTX
PR performing well at interviews mar 2012
PPTX
Writing a CV
PPTX
The new pr 2012
PPTX
Online communications
PPTX
Lisbon 3
PPTX
Hey boss
PPTX
Guerrilla marketing
PPSX
Celebrity marketing
PPTX
Approaching digital
PPTX
Developing effective corporate communication ci m
PPTX
Managing corporate reputation ci m part 3
Transformative technologies
Twitter Followers report
Managing crisis world vision
Issues and crisis management
Network theory
Communication theory 2
Communication theory 1
Future pr
Ethics Lecture 2012
PR performing well at interviews mar 2012
Writing a CV
The new pr 2012
Online communications
Lisbon 3
Hey boss
Guerrilla marketing
Celebrity marketing
Approaching digital
Developing effective corporate communication ci m
Managing corporate reputation ci m part 3

Recently uploaded (20)

PPTX
Amazon (Business Studies) management studies
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PDF
IFRS Notes in your pocket for study all the time
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Business model innovation report 2022.pdf
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
DOCX
Business Management - unit 1 and 2
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPT
340036916-American-Literature-Literary-Period-Overview.ppt
PDF
Types of control:Qualitative vs Quantitative
PPT
Chapter four Project-Preparation material
PPTX
Probability Distribution, binomial distribution, poisson distribution
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Amazon (Business Studies) management studies
Reconciliation AND MEMORANDUM RECONCILATION
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
IFRS Notes in your pocket for study all the time
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
WRN_Investor_Presentation_August 2025.pdf
Laughter Yoga Basic Learning Workshop Manual
Business model innovation report 2022.pdf
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Business Management - unit 1 and 2
Ôn tập tiếng anh trong kinh doanh nâng cao
340036916-American-Literature-Literary-Period-Overview.ppt
Types of control:Qualitative vs Quantitative
Chapter four Project-Preparation material
Probability Distribution, binomial distribution, poisson distribution
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Nidhal Samdaie CV - International Business Consultant
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx

Changed Value Systems

  • 1. Changes to value systems as a result of interactive media David Phillips
  • 2. Learning outcomes 1. To assess the degree to which individuals are able and willing to undertake illegal or immoral activities online 2. To discuss the implications of this for society and for organisations
  • 3. An Anomalous Picture 1 1. A brand-new PhD recipient proudly tells his mother he has just published his first article. She asks him how much he was paid for it. He makes a face and tells her "nothing," and then begins a long, complicated explanation... 2. A fellow-researcher at that same university sees a reference to that same article. He goes to their library to get it: "It's not subscribed to here. We can't afford that journal. (Our subscription/license/loan/copy budget is already overspent)" 3. An undergraduate at that same university sees the same article cited on the Web. He clicks on it. The publisher's website demands a password: "Access Denied:Only pre-paid subscribing/licensed institutions have access to this journal." 4. The undergraduate loses patience, gets bored, and clicks on Napsterto grab an MP3 file of his favourite bootleg CD to console him in his sorrows.
  • 4. An Anomalous Picture 2 5. Years later, the same PhD is being considered for tenure. His publications are good, but they're not cited enough; they have not made enough of a "research impact." Tenure denied. 6. Same thing happens when he tries to get a research grant: His research findings have not had enough of an impact: Not enough researchers have read, built upon and cited them. Funding denied. 7. He decides to write a book instead. Book publishers decline to publish it: "It wouldn't sell enough copies because not enough universities have enough money to pay for it. (Their purchasing budgets are tied up paying for their inflating annual journal subscription/license/loan costs...)"
  • 5. An Anomalous Picture 3 8. He tries to put his articles up on the Web, free for all, to increase their impact. His publisher threatens to sue him and his server-provider for violation of copyright. 9. He asks his publisher: "Who is this copyright intended to protect?" His publisher replies: "You!" What is wrong with this picture? (And why is the mother of the PhD whose give-away work people cannot steal, even though he wants them to, in the same boat as the mother of the recording artist whose non-give-away work they can and do steal, even though he does not want them to?) Source: Stevan Harnad http://www.ecs.soton.ac.uk/~harnad/Tp/resolution.htm#Picture
  • 6. The Gutenberg effect Johannes Gutenberg (c. 1398 – c. February 3, 1468) goldsmith and inventor is usually considered to have invented the European technology of printing with movable type in 1447. A similar printing technology was known in Korea and China by at least in 1234, The ability to produce many copies of a new book was a revolution in Europe – and cause a few plus a number of wars
  • 7. The Value System A value system refers to how an individual or a group of individuals organize their ethical or ideological values. A well-defined value system is a moral code. In politics: http://news.xinhuanet.com/english/2006-10/18/content_5220576.htm In Business: Wenstøp, Fred and Myrmel, Arild (2006). Structuring organizational value statements. Norwegian School of Management BI. Oslo. In a University http://www.adec.edu/clemson/papers/weiser.html
  • 8. The Internet effect Transparency More information is made available to gain competitive advantage – the interaction exposes its value system Porosity Information about people and institutions is 'leaked' or becomes available because of technologies – to expose the internal application of value systems Agency Value systems are changed by people, technologies or combinations of both
  • 9. Social/self justification The system is wrong (social value system dissonance e.g. MP3) Avoiding the value system is easy (e.g. illegal or corrupt, viruses, grooming, multiple personalities)
  • 10. Cyber Crime Economic and cybercrime have come of age in a digital society where we now entrust our identity and finances on a daily basis to organisations across the world. http://www.silicon.com/research/specialreports/ecrime/0,3800011283,39152955,00.htm
  • 11. Value Systems threatened 1 ID Theft Online Fraud Identity Theft Online Crime Email Fraud Phishing x Spoofing x Typical source for information http://www.legalday.co.uk/current/cybercrime.htm
  • 12. Value Systems threatened 2 Intellectual property Copyright Trademarks Software Plagiarism x Role of Creative Commons
  • 13. Value Systems threatened 3 Identity Theft ( Fraud ) Personal abuse (including children) Blackmail Attacks on cultures
  • 14. Options Controls Legal sanction Policing 'Moral Majority' watchdogs Corporate and personal hygiene
  • 15. Learning outcomes 1. To assess the degree to which individuals are able and willing to undertake illegal or immoral activities online 2. To discuss the implications of this for society and for organisations
  • 16. Additional reading Kessler International Technology to detect copyright infringement Examples over 5 years old Internet watch