Premium Essay

Ethical Theories in Information Technology

In: Computers and Technology

Submitted By LadyT84
Words 1571
Pages 7
Abstract
This assignment will define and discuss the ethical theory of Kantianism. Kantian ethics is based on abiding by moral laws that are universal for everyone. It allows us to rationalize our decisions based on our duty to do what is right. This assignment will also discuss how Kantianism represents my personal principles. Kantianism provides moral laws that provide a sense of equality for all people. There are also several arguments that are against Kantianism and will dispute the theory. But the overall goal of Kantianism is to ensure that every person is treated with respect. In addition, this assignment will discuss and defend my position on a contemporary IT issue using a practical ethical theory.

Unit 1 Assignment 1
Ethical Theory-Kantian The ethical theory that I have chosen that best represents my personal principles is Kantianism. This theory was named after the German philosopher Immanuel Kant. According to Quinn, “Kant believed that people’s actions ought to be guided by moral laws, and that these moral laws were universal” (Quinn, 2013, para. 2). The universal law is the belief that everyone tries to do the right thing and be a rational person and therefore rational decisions can be applied to everyone in the world. Kantianism does not consider the consequences of the ethical issues to be important, rather it is based on what should be done or doing the right thing regardless of the consequences. Kant’s decision is based on the theory that nothing is good without qualification. This means that the only thing that is good is good will or good intentions. The belief is that if a person does a good deed without expecting to gain something or having a hidden agenda for doing that good deed is a good person (“Kant’s moral theory,” n. d.). For example, if a person donates a car, money or clothes to a charity in order to get a break on taxes he…...

Similar Documents

Premium Essay

Ethics in It

...Ethics in Information Technology Dustin Hughson Kaplan University Introduction Ethical theories date back to the times of Socrates and Aristotle, the problem with ethical and moral theories is that information technology was not even a possibility when first developed. Lines can be crossed and personal ambiguity can help people act bolder then he/she may normally want too. Ethical theories are being used more and more to help the professional and computing world handle the rapid change while government and legislation try to catch up. Law and guidelines have been made, but in the haste to create them many are poorly designed and implemented, hurting people that have seemed to do nothing wrong. Information technology is a global profession and increases the difficulty when dealing with different scenarios. Presented with the same scenario an IT professional in Japan may handle it completely different than another professional in the USA. Setting standards and ideals for all computing professionals is key to the continuing growth of information technology. Legal and Ethical Issues The computing professional faces legal and ethical issues in information technology every day. Many of the biggest issues that IT professionals face include the ever growing concern with piracy and ownership of information. Current laws and regulations allow software and intellectual property to be coved by both copyrights and patents. However the bigger concern is how software...

Words: 2660 - Pages: 11

Premium Essay

Ethical Principles of Business

...ETHICAL PRINCIPLES IN BUSINESS 3.1 Ethics Ethics has been defined as concerned with the development of moral standards by which actions, situations and behaviour can be judged. (Boyd et al) Oelgeschlager. et al gave the simplest definition of ethics as standards conduct. Ethics is the discipline that examines one’s moral standards or the moral standards of a society. It asks how these standards apply to our lives and whether these standards are reasonable or unreasonable, that is, whether they are supported by good reasons or poor ones. Therefore, a person starts to do ethics when he or she takes the moral standards absorbed from the family, church and friends and asks: “What do these standards imply for the situations in which I find myself? Do these standards really make sense? What are the reasons for or against these standards? Why should I continue to believe in them? What can be said in their favour and what can be said against them? Are they really reasonable for me to hold? Are their implications in this or that particular situation reasonable?” Ethics is the study of moral standards, the process of examining the moral standards of a person or society to determine whether these standards are reasonable or unreasonable in order to apply them to concrete situations and issues. The ultimate aim of ethics is to develop a body of moral standards that we feel are reasonable to hold standards that we have thought about carefully and have decided are justified standards for......

Words: 4743 - Pages: 19

Free Essay

Ethical Thinking

...Ethical issue The issue is whether it is ethical for Google to collect payload data using its Street View vehicles through unencrypted Wi-Fi network. Google's street view project was intended to capture images and also Wi-Fi data which are then used to map businesses and landmarks. However Google was found to be collecting 'payload' data which was unnecessary for its location database project. Numerous investigations ensued, questioning the ethicality of the Street View debacle. Theoretical Perspectives This section will look at 3 schools of ethical theories. From a virtue ethics point of view, though Google's s slogan "Don't Be Evil" and its Google Code of Conduct established a baseline for honest decision-making, it is more action-based rather than character based. Being an Internet service provider that handles an immense amount of data, Google should aspire to be an organisation that is honest and truthful. Therefore a virtue ethicist will say that Google's data sniffing debacle is unethical since it is against what a virtuous organisation ought to do. Consequentialist theories can be classified based on the type of consequences, the primary beneficiary of the action and if it is agent-centered or agent neutral (Frost). Using the theory of ethical egoism, the consequences for the agent are taken to matter more than any other result. In the design document of the Street View Project, it was stated that Wi-Fi data Google gathered would "be analyzed offline for use......

Words: 1537 - Pages: 7

Free Essay

Legal and Ethical

...Legal and Ethical Issue The growth and development of internet use has influenced considerable innovations globally. More than a few organizations rely on internet use to operate and to enhance their productivity among other aspects. However, organizational planning in most organizations has recognized that malicious attacks, threats, and vulnerabilities are the major factors affecting organizations. Over the years, Amazon organization has been leading in terms of online business for many years. As a result, there are a number of factors that have influenced its growth and development. One of the major factors that has influenced the growth and development of the organization is effective strategic management. However, despite the growth and development of the company, research shows that the company has faced legal and ethical issues. The two major legal and ethical issues related to Amazon Company include contempt to intellectual property and confidentiality. This paper will describe legal and ethical issue faced by Amazon Inc. Com. Company Description Amazon is one of the major online retailer and other computing services that are normally used in businesses for the benefit of clients. One of the contributing factors of Amazon performance is its globalization. The impact of globalization has effectively enhanced the growth and development of more than a few factors within and outside the organization. The effect or impact of globalization has......

Words: 3675 - Pages: 15

Premium Essay

The Effect of a Broken Family

...PhD Thesis 1998 Social, environmental and ethical factors in engineering design theory: a post-positivist approach Terence Love Department of Mechanical and Materials Engineering University of Western Australia Social, environmental and ethical factors in engineering design theory: a post-positivist approach Terence Love B.A. (Hons) Engineering This thesis is presented for the degree of Doctor of Philosophy of The University of Western Australia. Department of Mechanical and Materials Engineering 1998 Abstract This research investigated how social, environmental and ethical factors can be better included in theories of engineering design. The research focused on designing as an essentially human activity via consideration of the epistemological and ontological issues involved in constructing coherent design theory. The research investigations led to a clearer understanding of the roles of ontology, epistemology and methodology in design research and this clarification enabled the construction of a post-positivist approach to engineering design theory that better includes social, environmental and ethical factors alongside the existing products of scientific engineering design research. Other contributions to knowledge that emerged from the research process and which underpin the conclusions include; clarification of the terminology and......

Words: 105471 - Pages: 422

Premium Essay

Pepsi Privacy

...regulatory controls it can also subvert democratic values. Information technology is not in fact neutral in its values; we must be intentional about design for democracy. (Pottie, 2004) Information and communication technology, ICT, has led to the emergence of global web societies. The subject of this article is privacy and its protection in the process of urbanization and socialization of the global digital web society referred to as the e-polis. Privacy is a fundamental human right recognized in all major international agreements regarding human rights such as Article 12 of the Universal Declaration of Human Rights (United Nations, 1948), and it will be discussed in the chapter under the heading Different Views of Privacy. Today’s computer network technologies are sociologically founded on huntergatherer principles. As a result, common users may be possible subjects of surveillance and sophisticated Internet-based attacks. A user may be completely unaware of such privacy breaches taking place. At the same time, ICT offers the technical possibilities of embedded privacy protection obtained by making technology trustworthy and legitimate by design. This means incorporating options for socially acceptable behavior in technical systems, and making privacy protection rights and responsibilities transparent to the user. The ideals of democratic government must be respected and even further developed in the future e-government. Ethical questions and privacy of communications......

Words: 3586 - Pages: 15

Premium Essay

Bbuuuuurp

...PhD Thesis 1998 Social, environmental and ethical factors in engineering design theory: a post-positivist approach Terence Love Department of Mechanical and Materials Engineering University of Western Australia Social, environmental and ethical factors in engineering design theory: a post-positivist approach Terence Love B.A. (Hons) Engineering This thesis is presented for the degree of Doctor of Philosophy of The University of Western Australia. Department of Mechanical and Materials Engineering 1998 Abstract This research investigated how social, environmental and ethical factors can be better included in theories of engineering design. The research focused on designing as an essentially human activity via consideration of the epistemological and ontological issues involved in constructing coherent design theory. The research investigations led to a clearer understanding of the roles of ontology, epistemology and methodology in design research and this clarification enabled the construction of a post-positivist approach to engineering design theory that better includes social, environmental and ethical factors alongside the existing products of scientific engineering design research. Other contributions to knowledge that emerged from the research process and which underpin the conclusions include; clarification of the terminology and......

Words: 105471 - Pages: 422

Premium Essay

Ethics

...Webster's Collegiate Dictionary defines "ethics" as the "discipline dealing with what is good and bad and with moral duty and obligation," "a set of moral principles or value" or "a theory or system of moral values." Ethics assists individuals in deciding when an act is moral or immoral, right or wrong. Ethics can be grounded in natural law, religious tenets, parental and family influence, educational experiences, life experiences, and cultural and societal expectations. Ethics in business, or business ethics as it is often called, is the application of the discipline, principles, and theories of ethics to the organizational context. Business ethics have been defined as "principles and standards that guide behavior in the world of business." Business ethics is also a descriptive term for the field of academic study in which many scholars conduct research and in which undergraduate and graduate students are exposed to ethics theory and practice, usually through the case method of analysis. Ethical behavior in business is critical. When business firms are charged with infractions, and when employees of those firms come under legal investigation, there is a concern raised about moral behavior in business. Hence, the level of mutual trust, which is the foundation of our free-market economy, is threatened. Although ethics in business has been an issue for academics, practitioners, and governmental regulators for decades, some believe that unethical, immoral, and/or illegal......

Words: 760 - Pages: 4

Premium Essay

Making It Possible

... The Many Challenges on Working on IT I. Introduction Information technology in combination with changes in organizational structures and methods of working has led to an increasing amount of information and also to totally new forms of information and in the creation of records. Much of the information previously produced on paper is now being produced in electronic form, for example as e-mail and in databases. The Dutch archive theoretician Eric Ketelaar [1999] has invented the word “archivalisation” to describe the phenomenon where more and more material is deemed to be worthy of documenting and archiving. This means that a considerably larger amount of information requires handling. Electronically generated and stored information is also exposed to change and manipulation in quite a different way to that involved with paper-bound information. The e-government services, where the whole idea is to exchange information electronically, will radically redirect paperbound information and documents towards electronically generated and managed information and documents. A 10-year period is a long time when dealing with the preservation of electronic records. This is of course due to the rapid technological development, and includes, for example, the problems associated with obsolete software and file formats. Goldstein [2004]0 stresses the need for a quick solution to the problem of archiving electronic information for the future. Furthermore, he states that the major......

Words: 5537 - Pages: 23

Premium Essay

Computer Ethics

...of computer ethics are investigated by information ethics, a branch of philosophical ethics established by Luciano Floridi. Computer ethics is a very important topic in computer applications. The importance of computer ethics increased through the 1990s. With the growth of the Internet, privacy issues as well as concerns regarding computing technologies such as spyware and web browser cookies have called into question ethical behavior in technology. Identifying issues Identifying ethical issues as they arise, as well as defining how to deal with them, has traditionally been problematic in computer ethics. Some have argued against the idea of computer ethics as a whole. However, Collins and Miller proposed a method of identifying issues in computer ethics in their Paramedic Ethics model. The model is a data-centered view of judging ethical issues, involving the gathering, analysis, negotiation, and judging of data about the issue. In solving problems relating to ethical issues, Davis proposed a unique problem-solving method. In Davis's model, the ethical problem is stated, facts are checked, and a list of options is generated by considering relevant factors relating to the problem. The actual action taken is influenced by specific ethical standards. Some questions in computer ethics There are a number of questions that are frequently discussed under the rubric of computer ethics. One set of issues deal with some of the new ethical dilemmas that have emerged, or taken......

Words: 6774 - Pages: 28

Premium Essay

Blah

...Case #1: Energy Cooperative Ethical Problems The Energy Cooperative is a nonprofit organization that provides education to the public in regards to energy, new technology, startup of new energy companies, and public forums on their website for blogs and complaints. They also provide new energy companies with a central hub to learn about new technologies, standards and regulations which are good for new companies to know. Kant, Mill, Locke, Rawls, and Kohlberg would have many different views and approaches based on their ethical theories. Energy cooperative’s dilemma is ethical and it has some conflict of interest. All members of the board have signed agreements that while serving on the board, they will act without bias and have no commitment to a specific corporation. The case states that the board members “must sign a statement to that effect before they are appointed”. The company needs to make it clear what the consequences are for not following the signed agreement they have. The first ethical problem is the misrepresentation. Because each director is calling as a director of the cooperative, his is misrepresenting his position to each client he calls. The Cooperative has no business dealing with the personal clients of the board members. This may make the personal clients feel that the cooperative supports their interest when they don’t have any desire too. The second problem is conflict of interest. The board members are acting as a consultant and should never......

Words: 1313 - Pages: 6

Free Essay

Ethics

...Ethical Framework in Practice Nursing is an admirable, dignified career. Nurses respect the self-sufficiency and self-esteem of all their patients in every matter. Patients share their confidential information to the nurses, because they trust the nurse. Nurses care for the sick and needy population. Nurses take care of the patient’s deepest and painful needs in an intimate way compared to other disciplines in the health care team (Nazarko, 2009). Nurses frequently encounter ethical dilemmas and issues related to providing confidential information. This paper analysis is about the ethical recommendations on breach of privacy act between the nurses and the patient. Hippocratic Oath evidently explains about the importance of confidentiality in medical ethics. The oath is like this," That whatsoever I shall see or hear of the lives of my patients that are not fitting to be spoken, I will keep in confidence" (Hippocratic Oath, 2010). In Nightingale’s pledge for nursing, says that ‘‘I will hold in confidence of all personal matters in the practice of nursing” (Gretter, 1893). All nurses take Nightingale’s pledge at their graduation oath. Nurses are dedicated to provide better care for their patient based on their patient’s values and beliefs to maintain confidentiality. The provision of health care is comprehensive and people’s needs are often complex. Modern technology has made advanced changes in healthcare. With the many advances changes in health care a......

Words: 978 - Pages: 4

Premium Essay

Ict Architecture and Security

... Word count: 1665 Executive summary This report, authorised by Justin Debuse in Introduction to ICT, BUS108, looks at ICT architecture and security in an organisation. This report found that the major security threats within an organisation’s ICT are; Cracking into an organisation’s wireless intranet in search for vital corporate information; Former employees accessing wireless intranets and extranets without authorization; Information sent via an extranet could be intercepted in its transit; Viruses and Trojans accidentally downloaded by employees and been spread around the LAN. Solutions to these threats are; WiFi protected access (WPA) password and hide the network; ICTs should be protected with a login screen for the users; To secure an extranet, organisations should use a virtual private network (VPN); Any organisation should provide basic training in how to detect viruses and Trojans. This is a proactive way to prevent an infection in a whole organisation’s LAN. This report also found that the major legal and ethical issues within an organisation’s ICT are; Employee monitored by computer technology and in the building; Privacy on e-mail stored on an organisation’s computer; Illegal and offensive use of an organisation’s computer. Solutions to these issues are; the organisations have to inform their employees about the monitoring and the non-privacy on their work e-mail. The organisations are legally allowed to monitor and read the employees......

Words: 2419 - Pages: 10

Free Essay

Ethical Issues on Confidentiality and Privacy of Patients

...Ethical issues on confidentiality and privacy of patients According to American nursing association article regarding patients medical information’s privacy and confidentiality shows us “Advances in technology, including Computerized Medical Databases, The Internet and Tele-Health, have opened the door to potential, unintentional breaches of private /confidential information of patients, so nurses and other health professionals who regularly work with patients and their confidential medical records should contribute the development of standards ,policies and laws that protect patient privacy and confidentiality of health records .” Due to the fast advancement of technology, it is very hard to protect our privacy in the areas of medical sectors. Many people have access to patient’s medical records including the attending physician, house staff, student, consultant, nurses, social workers, pharmacists, billing staffs and insurance company employees. Although computerized medical records have vital roles to improve the access to medical information efficiently, they allow more serious breaches of confidentiality. For example, confidentiality can be violated at any computer station, and fax and e-mail also present opportunities for confidentiality to be broken. I think in my opinion, keeping medical information confidentially shows respect for patents that except physician to maintain confidentiality, and it plays a vital role in improving employees ethics at work. Furthermore,...

Words: 610 - Pages: 3

Free Essay

Cyber

...monitoring their citizens through the use of surveillance technologies. Initially, privacy concerns involving computer technology arose because citizens feared that a strong centralized government could easily collect and store data about them. For the last decade in the United States, the federal government drastically increased its ability to monitor its citizens due to both changes in its laws and due to advancements in surveillance technologies. Together, the unfolding revelations opened a window into the growth of government surveillance that began under the Bush administration after the terrorist attacks of Sept. 11, 2001, and has clearly been embraced and even expanded under the Obama administration. In 2007, the United States National Security Agency (NSA) even launched the PRISM program. The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier, and to get data that is easier to handle, among other things. However, just because we are able to do something it is not always the best decision to do so. For instance, is it wise or even ethical for the government to use this level of surveillance on its citizens in its CHIAO 1 broad unrestricted searches for terrorists. Let examine the ethics governmental monitoring from the perspective of a variety of ethical models such as the Social Contract model, Kantian model......

Words: 1506 - Pages: 7