logo

Topics in Information Technology Ethics

   

Added on  2023-01-10

6 Pages1434 Words98 Views
 | 
 | 
 | 
Running head: TOPICS IN INFORMATION TECHNOLOGY ETHICS
Topics in Information Technology Ethics
Name of Student
Name of University
Author Note
Topics in Information Technology Ethics_1

1
TOPICS IN INFORMATION TECHNOLOGY ETHICS
Introduction
The case study opted for this report is related to the dilemma or ethical issue that is faced
by the programmers related to the unethical and the illegal activities that might be present in an
organization. The case study provides an idea of the main issues that are faced by the
programmers who are asked to copy the code to develop a website or an application. The chosen
case study is examined on the principle of the four ethics theories of utilitarianism, deontology,
contract, and virtue. The analysis is mainly related to the demonstration of the ethical dilemma
arising in a case. The case demonstrates that when an intern was facing challenges with
developing a website, the intern was instructed to develop the same by taking the source code
from an open source, that is by copying. The ethical analysis of the situation is indicated in the
following sections.
1. Utilitarianism Theory
The consequence-based ethical theory of Utilitarianism is solely based on the
consequence of a particular situation and not on the action behind the situation (Lucas et al.,
2016). Therefore, it can be commented that Utilitarianism theory considers the interest of others
beyond one’s interest. As a part of the Utilitarianism theory, the particular situation will be
analyzed. When the intern faced challenges while preparing the website, the intern was
instructed to create the website using copying the code, which was unethical as the consequences
of copying could be wrong. Thinking about the consequences, the intern objected the activity,
which was ethically correct. The act of copying the source is ethically wrong and should be
against the norms of an organization. The Utilitarianism theory of ethics does not support such
actions, and therefore, the scenario of copying the source code is not ethical. The company
Topics in Information Technology Ethics_2

2
TOPICS IN INFORMATION TECHNOLOGY ETHICS
should have motivated the intern to produce his code or should have helped him in producing
his/her source code. The particular situation is further analyzed, based on the deontology theory.
2. Deontology Theory
The deontology ethics judge the morality of the situation based on the particular action.
The morality of a situation is based on the actions associated with the same (Broad, 2014).
Deontology is the ethical theory that analyses that if the actions of a said situation are not
justified, the situation is not ethical. The chosen scenario indicates a case where an intern is told
to copy the code to finish the development of a website. The action of the company in either
encouraging or forcing the intern to copy the source code is unethical. This is a major issue as
the intern will never learn the importance of hard work. Furthermore, copying an open source
code is not an option. The interns should be motivated to produce their source code, and
therefore, the action of designing the website by taking the source code from an open source is
completely wrong as the system is not producing the authenticated data. Since the deontological
ethical theory judges a situation based on whether a situation is right or wrong, it can be said that
this particular ethical theory focuses on the right implications (Mizzoni, 2017). The act of
copying data or the source code cannot be justified even if it is only for the sake of presenting to
the client. The clients are not provided with a genuine or authenticated work, and therefore, this
act is unethical in accordance to the deontological ethical theory. Furthermore, the copying of
source code needs the permission of the owner as well, which is not considered in this case
(Davies, 2016). The manipulation of the code for personal use is completely wrong, and
therefore, it should be avoided.
3. Contract Theory
Topics in Information Technology Ethics_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ethical Theory Analysis
|5
|1145
|78

TOPIC IN IT ETHICS.
|6
|1271
|40

Applying Ethical Theory to Data Collection: Harvesting Personalities Online
|5
|1872
|396

Topics in IT Ethics: Data Collection: “Harvesting” Personalities Online
|7
|1423
|23

Moral Theories Of Deontology
|5
|1264
|10

Ethical Analysis of Social Media Use in Spreading Inappropriate Content
|6
|1360
|347