logo

Ethical Concerns Related to Mobile Threats

   

Added on  2022-12-15

8 Pages1540 Words339 Views
Running head: ETHICAL CONCERNS RELATED TO MOBILE THREATS
Ethical Concerns related to Mobile Threats
Name of the Student
Name of the University
Author’s note
Ethical Concerns Related to Mobile Threats_1
ETHICAL CONCERNS RELATED TO MOBILE THREATS1
Table of Contents
Argument Visualisation...................................................................................................................2
1. Introduction..................................................................................................................................3
2. Discussion....................................................................................................................................3
2.1 Classical Ethical Theory........................................................................................................3
2.1.1 Utilitarianism Theory......................................................................................................3
2.1.2 Deontology Theory.........................................................................................................4
2.1.3 Contractual Theory.........................................................................................................4
2.1.4 Virtue Theory..................................................................................................................5
3. Conclusion...................................................................................................................................6
References........................................................................................................................................7
Ethical Concerns Related to Mobile Threats_2
2ETHICAL CONCERNS RELATED TO MOBILE THREATS
Argument Visualisation
(Figure 1: The Argument Visualisation of the Case Study)
(Source: Created by author)
Ethical Concerns Related to Mobile Threats_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
1.1. #EnforceTheOrder. Support (because). Against (but)
|1
|270
|77

Information Technology Ethics
|7
|1807
|60

Enforce the Order: A Case Study on Ethical Theories
|7
|1468
|491

5 Active Mobile Threats Spoofing Enterprise Apps
|6
|2194
|130

ICT Ethical Issue
|9
|1513
|392

Information Technology Ethics: Blame on Social Media for Christchurch Video
|7
|2280
|38