logo

Mobile Threats Spoofing Enterprise Apps is Unethical

   

Added on  2022-12-20

5 Pages645 Words26 Views
 | 
 | 
 | 
Running head: IT ETHICS
IT ETHICS - MOBILE THREATS SPOOFING ENTERPRISE APPS IS
UNETHICAL
Name of the University
Name of the Student
Author Note
Mobile Threats Spoofing Enterprise Apps is Unethical_1

1
IT ETHICS
Mobile threats spoofing enterprise application is unethical
Mobile threat spoofing application is unethical as it has the potential to impact the
sensitive information related to the users. Thus from the case study it can be stated that this
application possess some real threats towards the information of the user. This information will
be further used for gaining money by performing illegal methods. Moreover it is observed that
there is a high chance of losing the money related to people that is maintained by an
organization. There is a high threat from spoofing activity towards the society. Thus the
organization needs to think significantly about the harms that will come with this application.
However the organization states that this application will be used for the purpose of
gaining information from terrorist for protecting the peoples from attacks. But there are several
reasons to state that the mobile threat spoofing application is an unethical app and should not be
used by the organization.
According to the utilitarianism theory of ethics an act is considered to be legal when it is
able to provide maximum benefits towards a huge number of people. However from this case
study it can be stated that the number of benefits obtained with this application is less than the
disadvantages. The application has the ability to effect the sensitive information stored.
Moreover the application has the potential to cause damage too an individual or towards an
organization. Thus it can be stated that these is an unethical act.
According to the deontological theory of ethics every act needs to be assessed based on
the individuality of that activity. That is to what extent the activity is right or wrong instead of
focusing on the results. After analyzing the case study it is observed that there is a high chance of
Mobile Threats Spoofing Enterprise Apps is Unethical_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
5 Active Mobile Threats Spoofing Enterprise Apps: Applying Ethical Theory
|7
|1311
|91

5 Active Mobile Threats Spoofing Enterprise Apps
|4
|1201
|378

Applying Ethical Theory
|7
|1550
|28

5 Active Mobile Threats Spoofing Enterprise Apps
|6
|2194
|130

5 Active Mobile Threats Spoofing Enterprise Apps
|5
|1337
|153

1.1. mobile threats spoofing enterprise apps is unethical.
|1
|119
|37