SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : and there was no one left to speak for me

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Bill Jackson who wrote (80)9/17/1998 11:04:00 PM
From: INFO_DART  Read Replies (1) of 276
 
Free speech may be essential for survival.

I just wanted to start an analytical organization of your ideas that would help me explore their structure and implications.

You may want to get a piece of paper and draw this picture.
You have a 2x2 matrix, defined by 2 rows and 2 columns. The rows represent the Veracity of the statement. That is, row 1 is True and row 2 is False. The columns identify the Type of Source. Column 1 is the information was obtained in an "honest way." Column 2, information obtained in a dishonest way.

Counting the cells of the matrix across the columns and starting with the first row, we have OKAY, INVASION OF PRIVACY, <empty>, and FAKED.

So far we have 2 dimensions each taking on two levels. I think we might need to add an additional dimension of, I'll it call Intent (or Motive). It has two levels (1) Malicious and (2) Benevolent.

-- Think of the guy who stole the tobacco secrets or who stole the info that Swiss bank still held accounts from holocaust victims.

The statements they made were true, but the information was obtained dishonestly. Therefore, their behavior falls into the punishable INVASION OF PRIVACY cell.

However, their Motives were honorable. Should they be punished?

If you want to continue with paper and pencil we would now have two identical matrices as described above, except one is labeled Benevolent Intent and the other Malicious Intent.

You might find it interesting to fill in the cells of these two new matrices and see what you come up with. It's a way of crystallizing and evaluating your ideas.

Cheers.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext