Ask a question from expert

Ask now

Ethical Analysis Report 9/10/2017 Introduction Hacker-For Hire

8 Pages1620 Words171 Views
   

Added on  2019-11-08

About This Document

Ethical Analysis Ethical Analysis Report 9/10/2017 Introduction 3 Analysis as per Utilitarianism Theory 3 Analysis as per Deontology Theory 4 Analysis as per Virtue Theory 4 Analysis as per Contract Theory 5 Recommendations and Conclusion 5 References 7 Introduction Hacker-for hire is a website that gave out the names of their clients who had requested the execution of the hacking services. Analysis as per Utilitarianism Theory Utilitarianism theory of ethics states that an action is ethically justified only when the utility of the action

Ethical Analysis Report 9/10/2017 Introduction Hacker-For Hire

   Added on 2019-11-08

BookmarkShareRelated Documents
Ethical AnalysisReport
Ethical Analysis Report 9/10/2017 Introduction Hacker-For Hire_1
Ethical AnalysisTable of ContentsIntroduction.................................................................................................................................................3Analysis as per Utilitarianism Theory.........................................................................................................3Analysis as per Deontology Theory.............................................................................................................4Analysis as per Virtue Theory.....................................................................................................................4Analysis as per Contract Theory..................................................................................................................5Recommendations and Conclusion..............................................................................................................5References...................................................................................................................................................72
Ethical Analysis Report 9/10/2017 Introduction Hacker-For Hire_2
Ethical AnalysisIntroductionHacker-for hire is a website that gave out the names of their clients who had requested theexecution of the hacking services. The website is based out of Australia and Sweden andprovides its clients with the hacking processes and services. In order to carry out the hackingservices, the site asked its clients, that is, the buyers for their demographics and contact details.The buyers trusted the site to keep their information private; however, the privacy of theinformation was violated by releasing the details of 60 buyers in public (Tung, 2015). The report analyzes the situation on the basis of a number of different ethical principles andtheories. Analysis as per Utilitarianism TheoryUtilitarianism theory of ethics states that an action is ethically justified only when the utility ofthe action is positive and accurate. The ethical justification is decided on the utility as a primemeasure. The utility of an action is the pleasure that the doer and the associated parties receive inthe form of pleasure and with the absence of any form of negativity or evil attached with it. The website in this case study deals in the line of business that is not legal and is not approved bythe Government. The buyers, that is, the customers that contract the website for the execution ofhack jobs receive the pleasure and satisfaction in return. They may also feel disturbed with theresults of the hacking services. Also, the system/application/device owners may suffer from theleaking of their private details and information (Bentham, 2005). The website then revealed the buyer details in public without their knowledge or consent. Thisled to a lot of social and personal embarrassment for the victims. Also, their personal lives weredisturbed.The utility of the actions that were executed by the website caused more damage and sufferingsas compared to the pleasure and enjoyment. As per this theory of ethics, the actions executed bythe website are termed as completely unethical (Gamlund, 2012). 3
Ethical Analysis Report 9/10/2017 Introduction Hacker-For Hire_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Analysis of Hacker-for-hire Website Case Study
|8
|1680
|444

Ethical Analysis Report Ethical Theories
|7
|1618
|117

Rent-a-Hacker Site Leaks Australian Buyers' Names and Addresses
|6
|2194
|71

Hacking and crime: a study of four classical ethical theories
|9
|1670
|480

Article - Sweden To Australia | Hiring Hackers
|4
|1187
|124

Understanding Classical Theories and Ways to Resolve Cyber-Crime: Petya Cyber Attack
|5
|828
|74