logo

IT Ethics - Assignment PDF

   

Added on  2021-06-17

7 Pages1547 Words71 Views
Running Head: IT ETHICSIT Ethics5 Extremely Private Things Your iPhone KnowsAbout You
IT  Ethics  -  Assignment PDF_1
2IT ETHICSIntroduction and Case study analysis Now day’s all iPhone, iPad and iPod becomes more popular among the young generation.They also are able to attract the users by focusing more on user interface and the metallic phonebody (Stahl et al., 2014). The main advantage and disadvantage of using iPhone is their securitypart, in case of advantage they restrict any other mobile users to get connected with the deviceswhich helps to get the mobile secure from various virus attacks and data losses, on other side,disadvantage highlights user not able to either download or share any information by doingdevice to device connection other than any iPhone (Vaughn, 2015). However, in this case study it mainly discuss about sharing personal information at thetime of using any types of iOS devices which can be known or access by any Apple personnel orthe third-party developers (HuffPost Australia., 2017). Utilitarianism theory of EthicsIn the context of ICT, utilitarianism is one of the ethical theories that mainly focus on locus ofright and wrong determination based on outcomes of choosing any policy over other policy. Itfocuses on the scope of any one’s interests and also focuses on other interests. It is also known asanother version of consequentialism.Mill, (2016) discusses that the main aim of utilitarianismtheory is “securing of greatest good on greatest number”. In this case article, as per the ActUtilitarianism, the user can share the personal details where sharing these details they get theaccess of the iOS devices which provide best user interface and system configuration experienceto the user (Broad, 2014). However, on other side, as per Rule Utilitarianism, the user should not
IT  Ethics  -  Assignment PDF_2
3IT ETHICSshare any personal information with the iOS devices where there is the chance of misusing thesedetails. Deontology theory of EthicsIn the context of moral philosophy, deontology or deontological ethic is one of the normativeethic positions that mainly judge the morality of action depending on implemented rules. It alsocan also be known as obligation or rule or duty – based ethics which also highlight rule is bindyou towards your duty. According to Vitell and Hunt (2016), there are 2 types of deontologytheory which include Deontological Universalism, shows that their rule is applicable to everyonewithout respect to circumstances, in this case study, if all phone users need to be put theirpersonal details to access the phone then it will be deontological universalist (Vaughn, 2015). Onthe other hand, Deontological Relativism shows that their rules will be applicable to whomdepending on circumstances, in this case study, only the iphone user needs to be sharing theirdetails to access the phone then it will become deontological relativist. Virtue theory of EthicsIt is another type of ethics approach which mainly highlights on any individual aspect as one ofthe key elements of ethical thinking rather than the rules about the acts of themselves and theconsequences (Kagan, 2018). In the context of this virtue theory, as per this selected mediaarticle, it shows as iphone shows better user interface, more conscious regarding security issues,and storing of lots of data without making the phone slow. This makes the iphone moredemandable among the users. However, this is only to be expected from any phone. This makesthe iphone to stand out from all types of phones available in market (Valentine, 2015). Anotherexample of this is the face recognition technology which an iphone is providing but it is also
IT  Ethics  -  Assignment PDF_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
A Brief Study on Cyber Crime and Ethical Hacking
|6
|1709
|80

IT Ethics: Article
|8
|1779
|52

Report about IT Ethics 2022
|7
|1096
|26

Assignment Information Technology Ethics
|9
|1616
|36

Targeting a Broken Heart: Applying Ethical Theory - Desklib
|7
|1929
|205

5 Active Mobile Threats Spoofing Enterprise Apps: Applying Ethical Theory
|7
|1311
|91