logo

Applying Classical Ethical Theories

9 Pages1907 Words62 Views
   

Added on  2020-04-07

Applying Classical Ethical Theories

   Added on 2020-04-07

ShareRelated Documents
Running head: APPLYING CLASSICAL ETHICAL THEORIESInternet is world's 'greatest spying machine': AssangeEssay Writing [Student Name Here][Institution’s Name Here] [Professor’s Name Here][Date Here]
Applying Classical Ethical Theories_1
APPLYING CLASSICAL ETHICAL THEORIES2IntroductionInformation technology has helped to advance technology beyond its originally outlinedobjectives. This outcome is based on the efficiencies and benefits it provides more so, throughthe internet which is the major component of the technology. However, while it may providemany benefits, its widespread application and pervasiveness make it a convenient tool for spyingon people’s privacy. Now, according to Julian Assange (renown whistleblower), the internet andparticularly the social media websites such as Facebook enable governments to enact totalitarianregimes that continuously spy on the general public thus infringe on their security, privacy andintellectual property[ CITATION SMH11 \l 1033 ]. In light of these events, this report analyses theethical issues of the internet as outlined by Assange and based on the four classical ethicaltheories.AnalysesThis analysis is based on an article written by the SMH[ CITATION Kin11 \l 1033 ] which outlinesthe negative role of the internet, an outcome that even led to the great Arab uprising. Therefore,while information access is extensively provided, the users are subjected to environments thatpromote the sinister objectives of governments including collecting vital user information that isthen used to interrogate suspects based on inconclusive evidence. Classical ethical theoriesUtilitarianism: At hand are actions whose results affect the general good of the public byinfringing on their personal rights. This conclusion is based on the activities promoted by theinternet where it’s used to spy on the general public. Utilitarian principles are based on theactions of individuals which should promote the greater good of the majority more so, bypromoting their happiness. However, the article at hand depicts a contrary image where social
Applying Classical Ethical Theories_2
APPLYING CLASSICAL ETHICAL THEORIES3media sites such as Facebook are used to interrogate and even torture suspects[ CITATION Mil152 \l1033 ]. Furthermore, the internet while facilitating information access allows governments to snoop onpeople’s private affairs which inherently interfere with their privacy. Moreover, the public isgenerally unaware of the illicit actions conducted using the internet which intensifies the ethicalissues at hand as there are few individuals who can keep the perpetrators in check. Therefore,although the internet may promote the information access, its pervasive and anonymous naturenegatively affects the greater good of the people which contradicts the utilitarianprinciples[ CITATION Mil01 \l 1033 ]. In addition to this, the internet promotes other sinister actionsamong the users such as cybercrime because of the nature of its environment. Deontology: On the other hand, consider the duties of the parties involved, where governmentsare supposed to protect their citizens. This protection should include the rights to privacy andsecurity, an outcome that is not exhibited by the existing conditions as outlined in the article.Therefore, even without considering the actions taken by the government, their roles and dutiesshould propel moral conducts where the general good is practised. Now deontological theoriesare centred on the duties held by individuals which outlines the ethical issues at hand wheregovernments through the internet fail to exercise their moral duties[ CITATION Lac15 \l 1033 ].Furthermore, the same theories outline two core principles or duties; first prohibitory dutieswhere parties involved are supposed to exercise some levels of restrictions e.g. they should notlie. However, the internet is used to further the course of governments without the knowledge ofthe public. Secondly, there are the social duties which are based on the promises made,particularly through the constitution. In any given country, the rights of the citizens are clearlystipulated in the general law of the constitution which includes their privacy and security. These
Applying Classical Ethical Theories_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Essay on Cyber Security And Privacy
|9
|1930
|38