Analysis of Ethical Frameworks in US Cybersecurity Policy (ITC506)
VerifiedAdded on 2025/04/28
|6
|1155
|256
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes ethical theories in cybersecurity.

ITC506 - ASSIGNMENT 4
Page | 1
Page | 1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
Introduction......................................................................................................................................3
Ethical theories................................................................................................................................3
Utilitarianism Theory.......................................................................................................................3
Deontology Theory..........................................................................................................................4
Virtue Theory...................................................................................................................................4
Contract Theory...............................................................................................................................5
Conclusion.......................................................................................................................................5
References........................................................................................................................................6
Page | 2
Introduction......................................................................................................................................3
Ethical theories................................................................................................................................3
Utilitarianism Theory.......................................................................................................................3
Deontology Theory..........................................................................................................................4
Virtue Theory...................................................................................................................................4
Contract Theory...............................................................................................................................5
Conclusion.......................................................................................................................................5
References........................................................................................................................................6
Page | 2

Introduction
In accordance to the case study in the article depicts that President Trump issued an Executive
order 13800 for strengthening out the infrastructure of the cyber security and its networks so as
to improve the country cyber-related posture and capabilities to face the threats in relation to the
cyber security. The main focus of this order is to modernize the infrastructural information
technology by working with the local and state governments and partners of the private sectors
for securing the critical infrastructure. This assist in reducing the national risk related to cyber
security.
Ethical theories
As per the abovementioned case study, it mainly focuses on the matter to prevent risk in relation
to the cyber security of the nation (White house, 2018). For this purpose, the government takes
initiatives to improve cyber security capabilities so as to deals with the concern of the threat with
this matter. In this context, ethical theories assist in establishing a strong foundation to guide in
making decisions for dealing with challenging situations. Further, ethical theories assist in
dealing with the principles of morality and support in deciding between the right and wrong by
conducting the obligations, rights, fairness, and rules in such a manner which is not against the
interest of the society. In this context, there are several ethical issues in a case study which are
resolved with the application of different ethical theories are mentioned below:
Utilitarianism Theory
It is a normative ethical theory which is based upon the right and wrong on the consequences of
deciding one action over the other action. It means to work beyond the interest of own and
consider the interest of others. This theory mainly works on the concept of the greatest good for
the grates number of people. This theory helps in making the decision which is beneficial for the
majority of the population (Arntzenius, 2014). Based on the theory of utilitarianism, it is
important that all the government department and security agencies responded ethically in the
interest of society. Using this theory as a lens, it assists in deciding ethically by seeking help to
make the cyber security base stronger. After examination of this ethical; theory, it assists in
evaluating the choices and allows the government to make a stronger strategy for protecting the
Page | 3
In accordance to the case study in the article depicts that President Trump issued an Executive
order 13800 for strengthening out the infrastructure of the cyber security and its networks so as
to improve the country cyber-related posture and capabilities to face the threats in relation to the
cyber security. The main focus of this order is to modernize the infrastructural information
technology by working with the local and state governments and partners of the private sectors
for securing the critical infrastructure. This assist in reducing the national risk related to cyber
security.
Ethical theories
As per the abovementioned case study, it mainly focuses on the matter to prevent risk in relation
to the cyber security of the nation (White house, 2018). For this purpose, the government takes
initiatives to improve cyber security capabilities so as to deals with the concern of the threat with
this matter. In this context, ethical theories assist in establishing a strong foundation to guide in
making decisions for dealing with challenging situations. Further, ethical theories assist in
dealing with the principles of morality and support in deciding between the right and wrong by
conducting the obligations, rights, fairness, and rules in such a manner which is not against the
interest of the society. In this context, there are several ethical issues in a case study which are
resolved with the application of different ethical theories are mentioned below:
Utilitarianism Theory
It is a normative ethical theory which is based upon the right and wrong on the consequences of
deciding one action over the other action. It means to work beyond the interest of own and
consider the interest of others. This theory mainly works on the concept of the greatest good for
the grates number of people. This theory helps in making the decision which is beneficial for the
majority of the population (Arntzenius, 2014). Based on the theory of utilitarianism, it is
important that all the government department and security agencies responded ethically in the
interest of society. Using this theory as a lens, it assists in deciding ethically by seeking help to
make the cyber security base stronger. After examination of this ethical; theory, it assists in
evaluating the choices and allows the government to make a stronger strategy for protecting the
Page | 3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

computer networks. This theory is result based and helps in acted the best interest of the society
and also supports increasing the funds to make effective and efficient measures for preventing
cyber security risk.
Deontology Theory
The main aim of this theory is to bring an idea which assists in treating the people with respect
and dignity. It assists in identifying the duty and acting accordingly. It defines the relationship
between duty and morality of human actions. This action is ethically considered good because it
holds some acts that are obligatory in regardless of its consequences to human welfare. This
theory gives priority to moral judgments instead of rules or principles (Hooker, 2012). For
managing the cyber security-related risk, President Trump directed the department and agency to
actively manage the risk by working on the direction. It is important that the organizations must
follow professionalism and its code of conduct for performing the duty of moral duties. The
terms of this theory, assist in regulating the services to deals with online privacy from
unauthorized access, fraud, disruption, and theft. This theory applies to this case as this theory
considered the outcome of taking the preventive actions against the cybersecurity risk, for
instance, there is active engagement by building the national power to deter the malicious cyber
activity against the security of the United Nations.
Virtue Theory
This theory considers what virtues make the relation from the public good. The terms of this
theory deal with person honesty and morality. It assists in practicing good habits which includes
generosity and honesty which must be possessed by the person. It assists a person without any
particular rules to determining the ethical complexity. It considers the character of an individual
as a key element for ethical thinking. This theory influences the workers of the information
systems for the protection of the IS assets (Bibus, 2017). This theory supports in influencing the
ethical intentions of the worker of the information system. In this, the decision of the individual
is influenced by theories and norms by providing them training and ethical practices. The
Page | 4
and also supports increasing the funds to make effective and efficient measures for preventing
cyber security risk.
Deontology Theory
The main aim of this theory is to bring an idea which assists in treating the people with respect
and dignity. It assists in identifying the duty and acting accordingly. It defines the relationship
between duty and morality of human actions. This action is ethically considered good because it
holds some acts that are obligatory in regardless of its consequences to human welfare. This
theory gives priority to moral judgments instead of rules or principles (Hooker, 2012). For
managing the cyber security-related risk, President Trump directed the department and agency to
actively manage the risk by working on the direction. It is important that the organizations must
follow professionalism and its code of conduct for performing the duty of moral duties. The
terms of this theory, assist in regulating the services to deals with online privacy from
unauthorized access, fraud, disruption, and theft. This theory applies to this case as this theory
considered the outcome of taking the preventive actions against the cybersecurity risk, for
instance, there is active engagement by building the national power to deter the malicious cyber
activity against the security of the United Nations.
Virtue Theory
This theory considers what virtues make the relation from the public good. The terms of this
theory deal with person honesty and morality. It assists in practicing good habits which includes
generosity and honesty which must be possessed by the person. It assists a person without any
particular rules to determining the ethical complexity. It considers the character of an individual
as a key element for ethical thinking. This theory influences the workers of the information
systems for the protection of the IS assets (Bibus, 2017). This theory supports in influencing the
ethical intentions of the worker of the information system. In this, the decision of the individual
is influenced by theories and norms by providing them training and ethical practices. The
Page | 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

decision of the United State government involves moral considerations which impact the use of
IS system security that affects overall the security posture of the organizations. This ethical
theory supports in providing guidance in relation to the information security system because this
theory is based upon the development of the character traits in the person for making an ethical
choice. This theory assists in influencing the ISWS application and also guides in the application
of the security guidelines and policies.
Contract Theory
The main aim of this theory is to study the way organization and people construct an agreement
for developing legal relations. Thus theory guides the contract formation under the presence of
asymmetric information (Kőszegi, 2014). This theory states that people live in a society together
under an agreement that guides moral and political behavioral rules. In accordance to this theory,
it is important that the government of the USA enters into the social contract with the
organizations like insurance companies which states that the data of the customers remain safe
but they failed in the protection of the flow of data. To reduce the global cyber risk, the
government enters into the international treaties and contracts to take action against malicious
actors in the cyberspace. Further, to reduce such actions this theory helps in directing such
countries to reduce such malpractices.
Conclusion
With the above-mentioned discussions, it concludes that all the above theories having their own
important in identifying and resolving the cybercrime and guides the government to take
appropriate actions to prevent such issues. By analyzing the above theories, it assists in figure
out ethics that are applicable and suitable to the cyber security in comparison to the actions
guided under the theories of the utilitarianism or deontology. Both these theories are the focus
over the moral action without considering the internalize ethics.
Page | 5
IS system security that affects overall the security posture of the organizations. This ethical
theory supports in providing guidance in relation to the information security system because this
theory is based upon the development of the character traits in the person for making an ethical
choice. This theory assists in influencing the ISWS application and also guides in the application
of the security guidelines and policies.
Contract Theory
The main aim of this theory is to study the way organization and people construct an agreement
for developing legal relations. Thus theory guides the contract formation under the presence of
asymmetric information (Kőszegi, 2014). This theory states that people live in a society together
under an agreement that guides moral and political behavioral rules. In accordance to this theory,
it is important that the government of the USA enters into the social contract with the
organizations like insurance companies which states that the data of the customers remain safe
but they failed in the protection of the flow of data. To reduce the global cyber risk, the
government enters into the international treaties and contracts to take action against malicious
actors in the cyberspace. Further, to reduce such actions this theory helps in directing such
countries to reduce such malpractices.
Conclusion
With the above-mentioned discussions, it concludes that all the above theories having their own
important in identifying and resolving the cybercrime and guides the government to take
appropriate actions to prevent such issues. By analyzing the above theories, it assists in figure
out ethics that are applicable and suitable to the cyber security in comparison to the actions
guided under the theories of the utilitarianism or deontology. Both these theories are the focus
over the moral action without considering the internalize ethics.
Page | 5

References
Arntzenius, F. (2014). UTILITARIANISM, DECISION THEORY AND
ETERNITY. Philosophical Perspectives, 28(1), 31-58
Bibus, A. (2017). Virtue Ethics. Social Work, 62(1), 95.
Hooker, B. (2012). Developing deontology: New essays in ethical theory (Ratio book
series). Oxford: Wiley-Blackwell.
Kőszegi, B. (2014). Behavioral contract theory. Journal of Economic Literature, 52(4),
1075-1118.
White house, (2018). Strengthening the Cybersecurity of Federal Networks and Critical
Infrastructure. Retrieve from:https://www.whitehouse.gov/articles/strengthening-the-
cybersecurity-of-federal-networks-and-critical-infrastructure/
Page | 6
Arntzenius, F. (2014). UTILITARIANISM, DECISION THEORY AND
ETERNITY. Philosophical Perspectives, 28(1), 31-58
Bibus, A. (2017). Virtue Ethics. Social Work, 62(1), 95.
Hooker, B. (2012). Developing deontology: New essays in ethical theory (Ratio book
series). Oxford: Wiley-Blackwell.
Kőszegi, B. (2014). Behavioral contract theory. Journal of Economic Literature, 52(4),
1075-1118.
White house, (2018). Strengthening the Cybersecurity of Federal Networks and Critical
Infrastructure. Retrieve from:https://www.whitehouse.gov/articles/strengthening-the-
cybersecurity-of-federal-networks-and-critical-infrastructure/
Page | 6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





