Tuesday, December 10, 2019

IT Ethics Techniques and Theories

Question: Discuss about the IT Ethics Techniques and Theories. Answer: Introduction Here in this document we will analyze the article and explain it through using two different classical ethical theories and will observe what exactly its impact using DET (Doing Ethic Techniques). There is some unethical work that is performed in Australia, which is related to hacking. In the given case study it has been observed that so basically the article tells about how other persons are hiring hackers to hack into something which is entirely unethical. Hacking in Australia is completely unethical, but somehow people do need them to utilize them for their personal and professional reasons. Mainly it's personal, for example, a wife needs to hack her husband phone to check if he is cheating on her or not. Likely, a student wants to get good marks so he needs a hacker too (Pro et al., 2015). So in this regard, the owner of Hacker for hire website has decided to publish their client details on the website so that it goes public so that everyone should know what their order was. The presented document explains the chosen unethical activity and it in terms of ethical theories. Discussion on Virtue ethic and Deontology Deontology is something which is related to action rather than the consequences. For example, if a person wants to do a job and before starting the job he or she needs to think what the job is and if it is a right thing to do or not, then it can be called as Deontology (Sunstein, 2013). The reason is that Deontology first review the task purpose then goes to the consequences of it. The Virtue ethic is some very practical it rather relate to someone's character rather than action. For example, if an individual needs to perform a task, he will first consider him or her to be Virtue, which means that the person has to have honesty, integrity, happiness and other character elements rather than thinking about rules and consequences. Let us consider one example to understand the Virtue ethics in much detail. In a bank the cashier is given responsibility to keep a significant amount to transfer it tomorrow to the banks vault, the number is too big and if the clerk stole it, then it will cha nge is life completely. Here Virtue ethics plays an important role; the person needs to have honestly on his work and integrity that he will never perform such act and will be loyal to the company or bank he or she operates in (Hursthouse, 2013). So the Virtue ethics rather focus on the character than the consequences or rules. The bank employee has to feel happy about the action he or she is going to perform. Describing Virtue Ethics on hacking and other factors The primary purpose of obtaining these ethics is that to be happy based on their day to day activities by been Virtue. Aristotle describes that there should be Virtue persons in this world. What he was meant to say is that people should have happiness, integrity, honesty in their character then the world will be a better place (Harrist Richardson, 2014). On the topic above the individuals who are hiring the hackers need to understand that the job they are outsourcing to a hacker does not have any integrity and honesty in it, even though they know that it is completely wrong they do perform such task. Now this implies to the service provider as well; they do know that the job is completely unethical but they still complete the job. So this needs to be stopped by a government to protect the people from going against their virtue (integrity, honesty and happiness (Weiss, 2014). So they are happy with the outcome but they are failing regarding their characters. Describing Deontology on hacking and other factors Deontology is related to their action and asks two questions to them if the task is right or wrong rather than thinking about the consequences (Thomas, 2015). So here, this theory explains the importance of action that is rather than the consequences. Let us consider the article for an example if we see the case study we can observe that there are few hackers like Jarmaa, who has hacked a company database for a certain amount of money, but he also wrote that the performed task is ethical or not can be decided based on the effectiveness (Jackson Smith, 2015). The hacker wanted to say that hacking can be ethical if it does not hurt anyone in any way or another. But here as per the theory hacking is completely unethical and it needs to be stopped at any cost and immediately. Because as per the Australian government law hacking is a crime and can lead to a maximum of 10 years of incarceration. So basically here the hackers and the individuals who are hiring them for their works need to understand that hacking is a wrong thing and it has to be stopped. Recommendation Securing Social media websites: The government needs to focus on secure the social media sites because people share all their social life activities in social media pages and it can lead to many other consequences (Bertot et al., 2012). Legal Action Taken: The police commander of NSW of the Fraud Cybercrime Squad needs to take some serious actions against such website owners and charge them with high penalties and legal action should be taken against both the service buyer and provider. High Authentication Required: The authentication procedure needs to be much more strong and better. An awareness program can be conducted using a video promoting how unethical is hacking and its impacts and effects. Conclusion The study explains about the two different theories that are implied in the case study and is analyzed accordingly. The document describes two theories one is Deontology and another one is Virtue Ethics. These two methods are applied in the case study and an essay is written by the researcher. The document explains how virtue ethics and deontology is significant and what kind of impact does it leave for individuals. What needs to be done and what exactly has to be done to apply those theories based on the case study is discussed. References Bertot, J. C., Jaeger, P. T., Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations. Government information quarterly, 29(1), 30-40. Harrist, R. S., Richardson, F. C. (2014). Pathologizing the Normal, Individualism, and Virtue Ethics. Journal of Contemporary Psychotherapy, 44(3), 201-211. Hursthouse, R. (2013). Normative virtue ethics.ETHICA, 645. Jackson, F., Smith, M. (2015). The Implementation Problem for Deontology.Weighing Reasons, 279. Pro, I., IT, S., addresses, R. (2015).Rent-a-hacker site leaks Australian buyers' names and addresses.The Sydney Morning Herald. Retrieved 27 May 2016, from https://www.smh.com.au/it-pro/security-it/rentahacker-site-leaks-australian-buyers-names-and-addresses-20150529-ghca3f.html Sunstein, C. R. (2013). Is Deontology a Heuristic? On Psychology, Neuroscience, Ethics, and Law. On Psychology, Neuroscience, Ethics, and Law (August 1, 2013). Thomas, A. J. (2015). Deontology, Consequentialism and Moral Realism. MinervaAn Open Access Journal of Philosophy, 19. Weiss, J. W. (2014).Business ethics: A stakeholder and issues management approach. Berrett-Koehler Publishers.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.