logo

Theories of Ethics: Just Consequentialism, Utilitarianism, and Deontology in Information Ethics

   

Added on  2023-04-26

4 Pages731 Words141 Views
Philosophy
 | 
 | 
 | 
Running head: THEORIES OF ETHICS
THEORIES OF ETHICS
Name of Student
Name of University
Author’s Note
Theories of Ethics: Just Consequentialism, Utilitarianism, and Deontology in Information Ethics_1

1THEORIES OF ETHICS
How does "just-consequentialist" theory incorporate aspects of utilitarian and
deontological theories?
The computer as well as information ethics along with various other fields require
numerous ethical theories that usually unite consequentialism and deontological aspects of the
ethical analysis. James Moor had introduced four theories that fall under classical ethics which
include ends based thinking, the golden rule, Aristotle’s Golden Mean and rule based thinking.
Among these the theory of just consequentialism concentrates on the policies that are present
within the constraints of justice (Moor, 2017). This makes it a theoretical and practical approach
to various ethical problems of information ethics and computer. Utilitarian approach implies that
none of the moral acts or rules is right or wrong. The overall matter of right or wrong is the
matter of nonmoral good that is produced in consequences of doing the act or following the rule.
This matter has been incorporated in the consequentialist theory as well. The Deontological
consists of three features, these include duty must be done for the sake of duty, the right or
wrong of a specific act or rule is a usually a matter of moral features of that rule or act (Iqbal &
Maqbool, 2017). Acts like promise breaking, lying and murdering are wrong and hence should
not be committed. These principles of utilitarian and deontology consists in the theory of just
consequentialism,
A contemporary moral issue affecting cybertechnology
In terms of cyber technology, there are various ethical issues, the chosen aspect is
personal privacy, IT allows the exchange of data on a huge scale from anybody, on various
locations of the world. In this case, there are chances that the data might get disclosed which
might result in violating the violating privacy of a specific group or an individual (Tavani, 2017).
Theories of Ethics: Just Consequentialism, Utilitarianism, and Deontology in Information Ethics_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethics in Cyberspace: The Case of Mr. Tabalbag
|6
|1709
|80

Elevating Professional Standards: Building Trust in Accounting Professionals
|9
|1940
|333

Ethical Issues in IT
|5
|1086
|242

IT Ethical Issues
|7
|1706
|198

Utilitarian Approach to Genetic Enhancement.
|9
|3177
|12

Understanding Classical Theories and Ways to Resolve Cyber-Crime: Petya Cyber Attack
|5
|828
|74