logo

Ethical Analysis Report Ethical Theories

7 Pages1618 Words117 Views
   

Added on  2020-02-24

Ethical Analysis Report Ethical Theories

   Added on 2020-02-24

ShareRelated Documents
qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwEthical AnalysisReport
Ethical Analysis Report Ethical Theories_1
Ethical AnalysisTable of ContentsIntroduction.................................................................................................................................................3Utilitarianism Theory..................................................................................................................................3Deontology Theory......................................................................................................................................3Virtue Theory..............................................................................................................................................4Contract Theory...........................................................................................................................................5Recommendations and Conclusion..............................................................................................................5References...................................................................................................................................................72
Ethical Analysis Report Ethical Theories_2
Ethical AnalysisIntroductionHacker-for-hire website released the names of the buyers and their respective addresses online.The website provided the hacking services in Sweden and Australia. It asked for the name andaddress of the buyer along with the reason for the hack job to be done. The buyers believed thatthe information that they provided would be kept a secret; however, the details of 60 Australianswere revealed to the public (Tung, 2015). The report covers the ethical analysis of the activity using different ethical theories, such as,Utilitarianism, Deontology, Virtue Theory and Contract Theory of Ethics. Utilitarianism TheoryAs per the principles that are defined under this theory of Ethics, an act is evaluated as ethicallycorrect or incorrect on the basis of the utility of the same. Utility in this case refers to thepleasure that is gained as a consequence of the action and the absence of the evil or sufferingcaused by the action. In the case study, hacker-for-hire is a website that provides illegal services to the customers. Theexecution of such hacking services may cause pleasure to the buyer in terms of understanding thedetails of the accounts or systems that are hacked. However, it will result in suffering for theparty that is hacked. The private and sensitive information of the hacked account or system willbe exposed in front of the unauthorized entities (Bentham, 2005). The line of business that the web site deals in is not legal in itself. However, releasing the detailsof its customers to the public can also not be justified. It will lead to the embarrassment for thecustomers and will also cause a lot of humiliation. It can be seen that the utility of the action is causing more suffering as compared to the pleasure.Therefore, the activity has been termed as ethically incorrect and unjustified as per theUtilitarianism Theory of Ethics (Gamlund, 2012). 3
Ethical Analysis Report Ethical Theories_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Analysis Report 9/10/2017 Introduction Hacker-For Hire
|8
|1620
|171

Ethical Analysis of Hacker-for-hire Website Case Study
|8
|1680
|444

Hacking and crime: a study of four classical ethical theories
|9
|1670
|480

Ethical Issues Regarding Information Technology
|7
|1580
|46

IT Ethics Assignment Essay
|10
|2217
|91

IT Ethics Privacy will Hit Tipping Point in 2016
|10
|1674
|188