Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Truth telling versus deception
Truth telling versus deception
Advantage of lying
Don’t take our word for it - see why 10 million students trust us with their essay needs.
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
As a counter-theory to consequentialism, deontological
…show more content…
The end goal for this development varies depending on the school of thought however it is often considered to be traits that make a ‘good person’. Another failing of virtue ethics is the subjectivity in what a ‘good person’ is defined as. In Emma’s circumstances her actions would be judged by how they reflect and develop her vices and virtues. This analysis will involve the ethical virtues rather than intellectual virtues due to the nature of the situation. Hacking into the system exemplifies vices such as inconsideration to established rules, deceitfulness and self-centeredness. On the other hand there are many virtues related to the difficulty of the task including creativity, dexterity and excellence which are exemplified by Emma’s ability to not only hack into the Canadian Security Intelligence but also eliminate any detectable trace of her actions. Much like deontology virtue ethics is concerned with the actions and their relations to pre established objectives which take the form of virtues in this ideology. This is because “the virtues do not make opposing demands or that one rule outranks another, or has a certain exception clause built into it”(Hursthouse, 2013). By this assumption Emma’s actions develop her character into one that is extremely skilled in practicality but is dishonest and selfish. The …show more content…
To quote Fredrich Nietzche “God is dead, and we have killed him” doesn’t literally mean that an omnipotent entity was slain by humans but rather that the idea, faith or belief that once gave humans meaning and purpose no longer exists. In a way humanity has overcome their own facticities during the enlightenment period and morality becomes an individualized concept. Without an assigned meaning all that remains is moral skepticism. A subcategory of moral skepticism; Dogmatic skepticism claims “that nobody is ever justified in holding any substantive moral belief.” (Sinnott-Armstrong, 2015). If morality is to be found, it cannot be located in the physical world. Following moralities discovery, there is no absolute justification that one morality is greater than another. Therefore in applying moral skepticism to Emma’s situation we find that there is a large indifference to the actions. As there is no inherent moral compass the actions Emma commits are neutral. They aren’t done out of spite or pleasure, it is just something that is done. This conclusion falls into the ideology of skepticism with moral falsehood with claims that “every substantive moral belief is false.” (Sinnott-Armstrong, 2015). If morality exists at all, then it cannot be verified to be true by any means. This gives way to nihilism, an absolute void of meaning and morality. Much like skepticism nihilism views
Virtue ethics is an approach that “deemphasizes rules, consequences and particular acts and places the focus on the kind of person who is acting” (Garrett, 2005). A person’s character is the totality of his character traits. Our character traits can be goo...
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.
While it is wrong to stereotype hackers as evil people with malicious criminal intentions, they cannot be stereotyped as compassionate freedom fighters as the hackers like to see themselves. Hackers must also realize that the actions of criminals will always reflect poorly on the hacker community as a whole, until the hacker community tries to police itself, which will never happen. Their actions are by definition, criminal. They can suffer consequences, which include being criminally prosecuted and hated by the information security community.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
This case study paper will examine the Hacking Into Harvard Case where actions executed by college students jeopardized their potential opportunities to further their education at selected universities. The purpose of this study is to look at the moral issue that raises concern; which is whether the college students unauthorized actions should qualify as unethical behavior amongst the business schools or should the actions of the students be justified by shifting the blame of unethical behavior to the arms of the business schools and their third party application software.
...difficult to try and tell someone that ethics and moral are important for an individual or our society. Hacktivism being a recent adaptation of computer hacking has spread through out the world consistently from years ago. Some are political activists trying to make a point and achieve some goals and getting through tot the people. Hacktivist show society what the new problems are in the world without permission of the law. Some show what could happen if there was a full on cyber terrorism placed against us. In the end, these actions that were used to only show what could happen have turned into being a message that shows us they are just as dangerous as anyone else. The fear people have of hackers is about the same as criminals on the street.
I am Stanley Egwuonwu from Salt Lake City Utah, I am currently a professor at Salt Lake Community College, and have been in Information Technology fields over 10 years now. I have worked for University of Utah as a Network Engineer, Dell EMC and RSA in different positions, my last position at RSA was Security engineer in their adaptive authentication group.
Virtue ethicists emphasize the role of character and virtue when considering what’s moral and what’s not, rather than doing one’s duty or acting to bring about good consequences. Furthermore, a virtue ethicist, such as Aristotle was, would not consider murder to be virtuous because being a murderer is not positive and would not be considered a moral virtue and neither is lying to Lizzie about being mad at her like Carol did. Therefore, they would say that Carol is a murderer, though she wanted to defend the rest, she still killed Lizzie and a virtuous person would not kill and that would be considered more of a vice. Yet, others might argue that it was virtuous of her to do so because she was being just and courageous in defending her people from being murdered and it not doing so she would be a coward which is a vice as
Many ethical dilemmas are philosophical in nature, an ethical issue can be described as a problem with no clear resolution. In order to solve the issue or dilemma a consensus between the parties involved must be reached. There are several reasons to come to an agreement over an ethical dilemma, it is the basis for all aspects of personal and professional dealings. Each one of us is part of a civilized society and as such it is our responsibility to be rational, honest and loyal in our dealings with others. (Alakavuklar, 2012) states that individuals make decisions for different situations in business life involving various ethical dilemmas. Each time either consciously or unconsciously individuals may follow some ethical approaches
The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,' the gap between technology and peoples' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of computers are a reactive approach. A proactive approach is to teach students about computer ethics in classrooms. An effective teaching method are the presentation of ethical scenarios. It is anticipated that through this method, students will personalize the need for developing ethical standards of behavior. The ultimate goal is for students, if necessary, to change their set of personal beliefs to include ethics.
Hacking was a term established in the 1960s. This word is the concept of unauthorised intrusion of a computer or network with malicious intentions behind them. This includes any technical effort of manipulating or damaging the normal behaviour of network connections/systems or stealing information. In this generation, hacking has become evidently significant and the debate of hacking being considered ethical or unethical arises. Therefore, will hacking ever be justified? The justification (reasonableness) of hacking has become a disputation of mixed opinions and emotions amongst society. These opinions range from hacking being considered immoral due to it being illegal activity and the vast negative impact it has on people. This includes the affirmative opinions on hacking; such as hacking being considered ethical due to the “white hat” hackers.
In my opinion, ethics give people free will to make right choices. People have free will to make choices that are governed with responsibility, accountability, and liability. We have a responsibility to perform in an ethical manner and be accountable for our choices or actions. Regardless of the circumstances and choices we make, there are consequences if we make the wrong choice. The question of whether an action or choice is ethical or not is fundamentally based on whether something is right or wrong. From an ethical standpoint, unethical choices and risky behavior can lead to increased liabilities. The liabilities result in the loss or damage sustained by a company or other party as result of an unethical and sometimes illegal decision. Although we exercise free will on a continuous basis, we are governed by the decisions we make and my belief is that the decisions we make daily do not just affect us. These decisions affect other people, such as family, friends, coworkers, instructors, neighbors, etc. The most prominent example of ethics can be recognized in the field of technology based on the growing amount of rapidly changing legislation and acts that under consideration in order to protect people from unethical practices.
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
Harvey, Brian."Computer Hacking and Ethics." Ed. Paul Goodman, P.G. Electrical Engineering and Computer Sciences. U of California, Berkeley, n.d. Web. 25 Jan. 2014.
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer