Ethical Analysis of ICT: Case Study, Theories, and Implications Report

Verified

Added on  2019/10/31

|7
|1514
|162
Report
AI Summary
This report provides an in-depth analysis of ICT ethics, focusing on a case study involving hacking. The introduction establishes the importance of ethical decision-making in the context of ICT, emphasizing the need for ethical theories to address issues like piracy and hacking. The case study examines a scenario where individuals or organizations hire hackers for various purposes, including gaining access to sensitive information or altering grades. The analysis applies both consequential and deontological theories to evaluate the ethical implications of these actions. Consequential theory assesses the outcomes of hacking, highlighting its negative consequences, such as privacy breaches and intellectual property theft. Deontological theory examines the ethical obligations and principles involved, focusing on the violation of rights and regulations. The report concludes by summarizing the legal and ethical ramifications of hacking, emphasizing the potential for severe penalties and the importance of ethical behavior in the ICT field. References to relevant literature are also included.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
report
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
Introduction......................................................................................................................................2
Case study analysis..........................................................................................................................2
Analysis Using Consequential Theory............................................................................................3
Analysis through deontological theory............................................................................................4
Conclusion.......................................................................................................................................5
References........................................................................................................................................6
Document Page
Introduction
The moral and the ethical values are based on the daily decision-making processes, where CIT
ethics need the ethical theories to unify the consequentiality and the deontological aspects with
proper analysis of the ethics. The standards are set with the right and the wrong decisions which
are set in the ethical theories and making decisions on which the theories are made. The theories
involve the reasoning and setting the ethical principles with consistent breach. The ICT is for
handling the ethical principles with consist breach, where the ethical standards are including the
piracy engagement (Deegan et al., 2017). The Kantianism theory relies mainly on the moral
intuition with working on the Just Consequentialism which is based on uploading the justice with
major emphasis of the consequences. The paper seeks us for the use of The Kantianism Theory
with the classical theory of the ICT to analyse the hacking which is required with facing ethical
issue.
Case study analysis
As per the comments in the article link:
http://www.smh.com.au/it-pro/security-it/rentahacker-site-leaks-australian-buyers-names-and-
addresses-20150529-ghca3f.html
the focus has been on different reasons which include the change in grade or the Australian
woman working on hiring a website hacker to find the activities of the husband or the business
organisation. The Australians need to think about hiring a hacker from any website and make
them work for maintaining the personal identity of the system. The condition includes how the
different hackers are not able to keep the secret and indulge in the activities with the legal actions
Document Page
against all the personnel. The standards are set with the unethical demands and the grades to gain
access to the database of the rival company (Heavey, 2017). The company need to focus on the
people for sum lump sum amount for the ethical and the unethical hacking. The Australian work
on the different hacking requests from different people, where Charles Tendell could be listed for
hiring for the different reasons and working on the standards to use the browser and running over
the automated scripts for accessing the site information.
It has been seen that the Suburban school received the approximate 9 bomb threats from the
different sources in a week which led to a major police force working on-board. It has been seen
that the administration processes are based on handling the sites for the social networking and
then working on the different processing of the computer systems. There are local police
departments which need to work on handling the networking forms with proper identification of
the information in the network. The sending of fake articles or the culprit loading in the story
proves to work on the malware with installation of the same in the system. There are different
keystrokes that are recorded through the malware and the police who is caught for the culprit
with the different evidence factors. The analysis is also based on how one can crack the requests
and regain access to the accounts of the other people account. The enterprising user with the
sought of the “semi-unethical hacker” is to hack in the database for between amount $100-
$1000. It has been seen that there are different people who make use of the web crawling activity
to scour the information that is on the website and find the requests for the different unlawful
standards (el Ata et al., 2016). There are offences like the hacking where the jobs are mainly for
the professional IT security contractors. This includes how the individual hires tend to hack a
platform for the illegal actions like the hacking into the online account etc.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Analysis Using Consequential Theory
The consequentially theorists are set with the end of any action, which is important. The
consequences are based from the action which determined the rightness or wrongness with the
action. The case is being discussed with the hacking that has been employed with the breaching
into the privacy, and then performing the forgery with stealing any of the intellectual property of
the rival company. The activities are found to be wrong with the negativity and so the site works
on the marketing with promising the absolute security rather than leaking any information which
is confidential. The instance is based on the trust violation and the privacy of the customers,
where the information is needed to be used with enforcement of laws and the authorities to take
hold of the wrong doers (lin, 2016). There are different laws and regulations need to make and
protect the rights of the people who are the individuals. The legalities are violated with the
hacking, when the business is being handle with the employing of the different unethical strategy
professionals. The spouses and the lovers have their privacy standards where no one has the right
to interfere with the privacy. The standards are set with altering the grading amounts which are
important for the tit. The altering grades amounts to the forgery and the trust which includes the
acts of the ethical hacking which is illegal. The theory of consequentialism is set with the result
of the actions that are bad and considered to be unethical and wrong.
Analysis through deontological theory
The theory includes the working on Immanuel Kant with the ethical standards set with the laws
and regulations. There are different obligations here the individual need to follow the right and
the fair of the users (Wilkens, 2017). The violation of privacy, security and the other different
rights of the targets. The hacker need to list all the customer data that will help the authorities in
Document Page
taking hold of the people who are in the illegal activity and functioning. This will depend mainly
on the activity with the selfish purposes (Barapatre et al., 2017). The action planning with the
information availability is mainly used by the law enforcers, knowingly and unknowingly. The
rightness of the action of the company is based on finalising and understanding the attention after
doing any unethical thing.
Conclusion
As per the analysis, there are different Australian rules and the regulations which are set for all
the illegal hacking offense where one end to face the jail depending upon the crime that has been
done. The hiring of the hacker for the criminal activities is considered important and a crime
with the punishment for the community services. The hacking into the system is mainly to
recover the data and consider about the illegal activities which are important to be noticed for
any of the unauthorised access which tend to lead to the prosecution of the system. There are
different cyber-crimes which have a major effect. The hacker and the crackers work on the
programming capability with the details of the system that are based on providing the technology
belief with the security standards set for improving it. The hackers need to make use of the skills
with evil reasons where one tends to breach any legal activity. They generally cause harm to gain
profit or take revenge (Baum, 2016). The major objective of the cracker is to make the money
with the data that has been stolen through hacking.
Document Page
References
BARAPATRE, H., NIMJE, P., & NIMBALKAR, A. (2017). Software Piracy
Protection. Imperial Journal of Interdisciplinary Research, 3(4).
Baum, K. (2016, October). What the Hack Is Wrong with Software Doping?. In International
Symposium on Leveraging Applications of Formal Methods(pp. 633-647). Springer
International Publishing.
Deegan, A., Khalid, Y., Kingue, M., & Taboada, A. (2017). Cyber-ia: The Ethical
Considerations Behind Syria’s Cyber-War. Journal Article| March, 22(5), 17am.
el Ata, N. A., & Schmandt, R. (2016). Consequentialism Is Necessary. In The Tyranny of
Uncertainty (pp. 75-81). Springer Berlin Heidelberg.
Heavey, P. (2017). Consequentialism and the synthetic biology problem. Cambridge Quarterly
of Healthcare Ethics, 26(2), 206-229.
Lin, P. (2016). Why ethics matters for autonomous cars. In Autonomous Driving (pp. 69-85).
Springer Berlin Heidelberg.
Wilkens, P. (2017). Machine Intelligence and Medical Ethics. Reflections on Healthcare
Management, 1(1), 16.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]