Premium Essay

It590 Assignment 1

In:

Submitted By canaanp
Words 1099
Pages 5
If I had to choose just one of the ethical theories presented in the reading to base all of my ethical decision making on, it would probably have to be Kantianism (Quinn, 2011). Although many ethical theories may sound appealing in one aspect or another, Kantianism is very appealing because it offers a logical reasoning behind all decisions.
While examining the known ethical theories, it is somewhat easy to temporarily “try it on” in a sense, by imagining how you may react in a certain situation while following that theory instead of your own. For example, subjective relativism is probably the easiest alternative to try out. This is because it is very easy to internally rationalize what is actually right or wrong. As the name of the theory implies, this is subjective to each person, and therein lies the problem. When a person takes an action that harms another, it may not seem bad to that person because no harm has come to them. However, to the other person that action is bad because it did cause harm to them. Therefore, when the same action is viewed by multiple persons, the moral alignment of that action will not likely be viewed as the same by each person.
Going back to Kantianism, it seems to have the most appeal because it very closely resembles the divine command theory. A major difference, however, is that the divine command theory may state that it is wrong to steal because it says so in the Bible; whereas Kantianism suggests a logical approach to the situation. By attempting to create a universal law from a moral rule, we can test if it is reasonable or not. The example used in our text states that you should not give a false promise; if everyone gave a false promise then promises would not be believed (Quinn, 2011). Once you apply “everyone” to the same action you are contemplating, it becomes clearer as to whether it is morally right or wrong.
I feel

Similar Documents

Premium Essay

It590 Unit 6

...Unit 6 Evaluating Ethics LJ IT590 Legal and Ethical Issues in IT September 22, 2015 Professor Unit 6 Evaluating Ethics Introduction: Ethics has a vital role when it comes to companies and how they are run. Baase (2013) stated, “Many professional organizations have codes of professional conduct. They provide valuable guidance for new and young members” (p. 406). Baase (2013) stated, These codes provide general statement of ethical values and remind those that are in that particular profession that ethical behavior is essential to doing their job correctly and professionally. For this assignment I will identify stakeholders, the risks, issues, problems, and consequences. I will also discuss the benefits, responsibilities of the decision makers, the rights of the stakeholders, and the impact of the actions of the options on stakeholders. Identify Stakeholders: According to Businessdictionary.com (2015), “a stakeholder is a person, group, or organization that has interest or concern in an organization” (para. 1). Stakeholders can affect or be affected by changes within the organization such as objectives, issues, problems, and policies. For this organization the stakeholders are consists of employees, directors, owners, suppliers, the community, unions, and creditors. Risks, Issues, Problems, and Consequences: The problem that lies here is that there is a loophole in which those who are not authorized to have personnel access do have it; they are able to see confidential...

Words: 1074 - Pages: 5

Premium Essay

It 590 Unit 4 Assignment

...Veronica McNutt IT590 Unit 4 Assignment Professor DePriest September 2, 2014 Unit 4 Assignment Essay Questions Scenario 1: You are working as a designer for a university that offers a program in Computer Science. One of the tracts is computer security. One of your colleagues has recommended adding a course addressing network security. In this course, students learn about the history of networks and study network attacks that have caused significant damage to the network that was the subject of the attack. During the second term of this two semester course, the students are taught how to hack into a system, how to create malware (including Trojan horses, viruses, and worms), and how to perpetrate a DOS attack. Choose one or more of the ethical theories discussed in Chapter 2 and combine that with research to determine whether this course should be taught. Be sure to discuss both sides of the issue before taking a specific side. Would it make a difference if this were a graduate or PhD level course instead of an undergraduate level course? Explain. Disadvantages According to research, there are many concerns for offering hands-on training to students in a computer network class. According to Trabelsi & Ibrahim (2013), UAE conducted a survey of the students who used the skills learned in the hands-on DOS attack class. Eighty five percent of students used the skills learned outside the isolated network university lab. These concerns would be the following: that the...

Words: 1270 - Pages: 6

Premium Essay

It 590 Unit 3

...Assignment 3 Privacy: Perspectives, Public Information, and U.S. Legislation Maria A Castro 11/25/2014 IT590 Legal and Ethical Issue in IT Professor Ellen Raineri Kaplan University Table of Contents Abstract 1. Part 1. Explain the Fair Information Practices Act. Compare and contrast the Code of Fair Information Practices with the private sector’s use of information. Is the private sector better at self-policing than the government, or should the government’s rules be extended to include private database ………………………………………………………………………….. 4 Part 2. What are your rights with regards to the information that you post or text? Does your level of privacy increase depending on your network/cell phone provider? The social media site that you are using? Explain.................................................................................................. 6 Part 3. Research legislation related to technology that has been proposed or passed within the last five years. Describe the legislation. Indicate whether it passed, or if it is still in consideration. Then, explain the benefits and drawbacks of the legislation you chose. ………………….. 8 Conclusion Reference Abstract This paper provide an overview of what are the main points of the Fair Information Practice Act, and how this regulations are impacting the use of private and personal information within the digital transmissions. The increase number of user’s texting and sharing information in social networks...

Words: 2301 - Pages: 10