logo

Ethical Analysis of Hacker-for-hire Website Case Study

8 Pages1680 Words444 Views
   

Added on  2019-11-08

About This Document

This report provides an ethical analysis of the case study of Hacker-for-hire website that leaked the details of around 60 clients from Australia in public without their consent. The report uses four different ethical theories, namely Utilitarianism Theory, Deontology Theory, Virtue Theory, and Contract Theory, to evaluate the act and concludes that it is ethically and morally wrong.

Ethical Analysis of Hacker-for-hire Website Case Study

   Added on 2019-11-08

ShareRelated Documents
Ethical Analysis of Hacker-for-hire Website Case Study_1
Ethical AnalysisTable of ContentsIntroduction.................................................................................................................................................3Ethical Analysis: Utilitarianism Theory......................................................................................................3Ethical Analysis: Deontology Theory..........................................................................................................4Ethical Analysis: Virtue Theory..................................................................................................................4Ethical Analysis: Contract Theory...............................................................................................................5Conclusion and Recommendations..............................................................................................................6References...................................................................................................................................................72
Ethical Analysis of Hacker-for-hire Website Case Study_2
Ethical AnalysisIntroductionHacking refers to the practice of accessing the computer systems and information in anunauthorized manner. There are various illegal hackers that are carrying out such services andone of such websites based out of Australia is Hacker-for hire. The website provides its servicesto the people of Australia and Sweden. The website executes the hacking services for the clientsthat contact the website from these regions. There are certain details that are required from theclients, such as, their name, address, contact information, purpose etc. Recently, Hacker-for-hirereleased the details of around 60 clients from Australia in the public without any consent fromthem (Tung, 2015). An ethical analysis has been performed on the case study and the results have been covered inthe report. There are four different theories that have been used for the purpose of analysis. Ethical Analysis: Utilitarianism TheoryEthical theory of Utilitarianism evaluates the ethics and their justification on the basis of theutility of actions that are involved. If the utility of the actions that are performed are beneficialfor the parties involved and are positive in nature, then the ethical justification is found to be trueand vice versa. In this theory, utility simply refers to the pleasure and benefits that are gained outof an action. Hacking services can be termed as legal only when they are approved by the Government of thecountry in which such services are executed. Hacker-for-hire is not a registered organizationlegalized to carry out hack jobs. The clients that get associated with the website have thisknowledge and choose to carry out the hacking services because of the pleasure and content thatthey will receive as a result. These hack jobs will enable then to know about the activities thatare being carried out by the person they will be spying upon. However, such targets will lose theprivacy and confidentiality of their information which may be private and sensitive in nature(Bentham, 2005). The website also performed another action which included the release of the 60 of their clients inpublic. This action caused negative utility for the clients as they had to face social and personalhumiliation. 3
Ethical Analysis of Hacker-for-hire Website Case Study_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Analysis Report 9/10/2017 Introduction Hacker-For Hire
|8
|1620
|171

Ethical Analysis Report Ethical Theories
|7
|1618
|117

Rent-a-Hacker Site Leaks Australian Buyers' Names and Addresses
|6
|2194
|71

Hacking and crime: a study of four classical ethical theories
|9
|1670
|480

The jobs killer is coming: How driverless trucks could change Australia
|7
|1730
|32

Article - Sweden To Australia | Hiring Hackers
|4
|1187
|124