Unit 1 Research Project. Eddie S. Jackson. Kaplan University. IT590 Legal and Ethical Issues in IT. Professor Linnea Hall, JD, MSBA

Similar documents
Lecture 7 Act and Rule Utilitarianism. Based on slides 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

Chapter Two: Normative Theories of Ethics

Do we have a strong case for open borders?

Dr. Mohammad O. Hamdan

Ethics in the age of Informatics, Big Data and AI

Topic 1: Moral Reasoning and ethical theory

Engineering Ethics. Interaction Rules Settling Conflicts Moral Theories The Ethical Engineer Resource Allocation

TERMS AND CONDITIONS OF PURCHASE

Application Terms of Use

Consequentialist Ethics

Ethics of Information Security

Narrative Manifesto PREPARED BY

Utilitarianism, Game Theory and the Social Contract

Ethical Theories CSC 301 Spring 2018 Howard Rosenthal

LME App Terms of Use [Google/ Android specific]

Utilitarianism Revision Help Pack

Bahrain s Draft Law on Computer Crimes

Distributive Justice Rawls

Utilitarianism and business ethics

Utilitarian Ethics and Counselor Decision-Making

Hacking and the Law. John MacKenzie

LEGAL TERMS OF USE. Ownership of Terms of Use

Privacy Policy & Terms of Use

The Conflict between Notions of Fairness and the Pareto Principle

WEBSITE TERMS OF USE AGREEMENT

NOBLE MOBILITY CHARTER OF CORPORATE SOCIAL RESPONSIBILITY

LICENSE TO USE THIS SITE

Data, Social Media, and Users: Can We All Get Along?

PART OF THE QUINTESSENTIALLY GROUP

Critical Thinking: Pro-Choice. Eddie S. Jackson

Glossary of Terms for Business Law and Ethics

The Determinacy of Republican Policy: A Reply to McMahon

Can Negative Utilitarianism be Salvaged?

COMPARATIVE ADVANTAGE

Site Builder End User License Agreement

Lecture 17 Consequentialism. John Stuart Mill Utilitarianism Mozi Impartial Caring

Medical Malpractice in Israel and the Financial and Non-financial Damage to the Victim

Utilitarian Moral Theory: Parallels between a Sport Organization and Society

John Stuart Mill ( ) Branch: Political philosophy ; Approach: Utilitarianism Over his own body and mind, the individual is sovereign

C. What products and service this Agreement actually covers

Sarbanes-Oxley Voluntary Compliance Policies

The following definitions shall have the following meaning as used in these general terms and conditions:

Chapter 6. Disparagement of Property 8/3/2017. Business Torts and Online Crimes and Torts. Slander of Title Slander of Quality (Trade Libel) Defenses

The Internet and the Tragedy of the Commons

Running Head: POLICY MAKING PROCESS. The Policy Making Process: A Critical Review Mary B. Pennock PAPA 6214 Final Paper

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

The Standard of Utility. What makes an action right?

Phil 115, June 13, 2007 The argument from the original position: set-up and intuitive presentation and the two principles over average utility

Terms of Use. Last modified: January Acceptance of these Terms of Use

Distributive Justice Rawls

Running Head: The Consequentialism Debate 1. The Consequentialism Debate. Student s Name. Course Name. Course Title. Instructors name.

Prepared for: MBA 8111 Prepared by: E x p e r i e n t i a l P a p e r

The use of the Service for the following activities is prohibited:

Issue Brief. A Public Policy Paper of the National Association of Mutual Insurance Companies July 2005

Reconciling Educational Adequacy and Equity Arguments Through a Rawlsian Lens

Game Theory and the Law: The Legal-Rules-Acceptability Theorem (A rationale for non-compliance with legal rules)

Justice, fairness and Equality. foundation and profound influence on the determination and administration of morality. As such,

SYLLABUS.

6 Question Types for IELTS Writing Task 2

Chapter 2 Positive vs Normative Analysis

IN THE CIRCUIT COURT FOR THE STATE OF OREGON FOR MULTNOMAH COUNTY. Case No.

Matthew Adler, a law professor at the Duke University, has written an amazing book in defense

Kannaway Terms of Use Agreement

1 Aggregating Preferences

in relation to the credit worthiness, business or financial situation of any person; or in respect of any content, service, product, material or

Rules and regulations for the Participation at Molten Jump Shot Photo Contest

(c) In addition to complying with the terms of the CPS, Company shall comply with each of the following obligations:

Telecommunications Information Privacy Code 2003

Phil 115, May 24, 2007 The threat of utilitarianism

Motivations and Barriers: Exploring Voting Behaviour in British Columbia

JW PLASTIC SURGERY. Terms of Service

The LTE Group. Anti-Bribery Policy Produced by. The LTE Group. LTEG anti-bribery policy v4 06/2016

Qualities of Effective Leadership and Its impact on Good Governance

Living in a Globalized World

AMERICAN EXPRESS CO-BROWSE TERMS AND CONDITIONS

Handout 6: Utilitarianism

PHI 1700: Global Ethics

UOB BUSINESS APPLICATION TERMS AND CONDITIONS

L14. Electronic Voting

Any non-welfarist method of policy assessment violates the Pareto principle: A comment

CHAPTER 19 MARKET SYSTEMS AND NORMATIVE CLAIMS Microeconomics in Context (Goodwin, et al.), 2 nd Edition

Terms and Conditions for Use of Patton Redirection Services and Server Use

The Criminal Justice Policy Process Liz Cass

Analysis of Directive 2013/40/EU on attacks against information systems in the context of approximation of law at the European level

Amnesty International CONFLICTING RIGHTS

At a time when political philosophy seemed nearly stagnant, John Rawls

Publicizing malfeasance:

Computer Search and Seizure

KOAT-TV and KOAT.COM U LOCAL NEW MEXICO LOTTERY AUTHORITY I LOVE NEW MEXICO PHOTO CONTEST Official Rules

The 2017 TRACE Matrix Bribery Risk Matrix

Running head: MOST SCRIPTURALLY CORRECT THEORY OF GOVERNMENT 1. Name of Student. Institutional Affiliation

Definition: Property rights in oneself comparable to property rights in inanimate things

Areeq Chowdhury: Yeah, could you speak a little bit louder? I just didn't hear the last part of that question.

Definition: Institution public system of rules which defines offices and positions with their rights and duties, powers and immunities p.

Utilitarianism (annotated) By John Stuart Mill

Ownership of Site; Agreement to Terms of Use

Saturday, 7 November 15

WHAT IS PUBLIC OPINION? PUBLIC OPINION IS THOSE ATTITUDES HELD BY A SIGNIFICANT NUMBER OF PEOPLE ON MATTERS OF GOVERNMENT AND POLITICS

READINGS The following books available in paperback editions are required. Malcolm Gladwell, The Tipping Point (Boston: Back Bay Books, 2000).

PLEASE READ THE TERMS OF USE, PRIVACY POLICY, AND PRIVACY PRACTICES FOUND ON THIS WEBSITE.

Transcription:

Running head: UNIT 1 RESEARCH PROJECT 1 Unit 1 Research Project Eddie S. Jackson Kaplan University IT590 Legal and Ethical Issues in IT Professor Linnea Hall, JD, MSBA 12/23/2014

UNIT 1 RESEARCH PROJECT 2 Table of Contents Abstract....3 Introduction..........4 Ethical Theory..........4 Act Utilitarianism...............5 Personal Perspective.............5 Contrast Argument............6 Counter Argument...............6 Contemporary Issue........7 Hacking.............7 Personal Perspective.............8 Applied Ethics...........8 Conclusion............9 References......... 10

UNIT 1 RESEARCH PROJECT 3 Abstract The unit one research project discusses ethics and ethical theory. The main objective of the project is to analyze legal and ethical issues of information technology, while gaining an appreciation for ethical theory. There are two parts to the project. In part one, an ethical theory is to be selected and the details of the theory discussed. In part two of the project, a current information technology issue is to be chosen, a position clearly stated, and then that position defended using ethical theory. The research project should contain the concepts and ideas of ethical theory, supported research, and personal perspectives. Keywords: ethics, ethical theory, Act Utilitarianism, hacking

UNIT 1 RESEARCH PROJECT 4 Unit 1 Research Project Ethics is the philosophical analysis of morality and the assessment of people s behavior (Quinn, 2013, p. 53). Studying ethics is important, because it provides an organized approach to understanding the core values of society. There are three primary values most people share; they are life, happiness, and having the opportunity to achieve goals (Quinn, 2013, p. 69). When considering ethics, and how it applies to life, there are two ways people see the world: (1) is a selfish view, where only the integrity of one s own values matter; (2) is where a person acknowledges the importance of other people s core values. Each of these perspectives spawn numerous questions, many of which are based upon a social context. This is where the underlying principles of ethics that focus on morality can be applied to gain insight into human conduct. It is this human conduct, and how it relates to happiness, that is a central theme to ethical studies. Certainly, ethics are essential to understanding morality; however, ethics itself spans a broad range of philosophies and practices. Consequently, ethical theory has been created to address the complexities of morality, social norms, and happiness. Ethical Theory Ethical theories provide ideas and concepts that examine what is good and bad, or what is right and wrong. The principles of ethical theories create a framework for adapting and applying knowledge to the various morals and standards of society. Ethical theory addresses specific principles that are deemed essential for a well-functioning society. Of course, what is socially acceptable is always changing; thus ethical theory continues to be a work in progress. There are many ethical theories for example, Egoism, Utilitarianism, Deontology, and Care Ethics, just to name a few. The research in this project will focus on Utilitarianism, specifically Act Utilitarianism (Iowa State University, 2012, slide 12).

UNIT 1 RESEARCH PROJECT 5 Act Utilitarianism According to LaFollette (2000), Act Utilitarianism is a principle of utility that supports the welfare of humans (LaFollette, 2000, p. 165). The primary objective of the theory is to understand how maximizing happiness is connected to good or goodness. The viewpoint of Act Utilitarianism is that people should choose activities, events, and make decisions that make them happy (Internet Encyclopedia of Philosophy, n.d). In doing so, a person can maximize positive outcomes, and consequently obtain the greatest amount of happiness. This may sound slightly self-centered; however, Act Utilitarianism means to create a society where the most happiness is produced when factoring in the needs of society. For example, if a person has two choices go to the theater to watch a movie, or to help a neighbor clean up their yard because helping a neighbor clean up their yard will render the greatest amount of happiness for everyone involved, the person should help the neighbor. As easy as this may sound, Act Utilitarianism is not considered a simple theory. When determining what is best for society, variables such as morality, religion, state and federal laws, and character traits have to be considered (Internet Encyclopedia of Philosophy, n.d., para. 5). Ultimately, Act Utilitarianism aims to evaluate what influences people s choices, and then to create a system that produces the greatest utility. Personal Perspective After reviewing the initial research on Act Utilitarianism, I would say this theory best supports some of my own personal principles. For example, the theory s primary goal is seeking happiness for society, which is something I believe is severely lacking. This is not to say some people are not happy, because they are. Though, I do believe many Americans are just unhappy with their lives, possibly due to only thinking about themselves. In addition to the happiness element of Act Utilitarianism, the theory includes goodness, pleasure, and human welfare. What

UNIT 1 RESEARCH PROJECT 6 this means to me, and why I support this theory, is that for our society to maximize positive outcomes, there needs to be a social strategy that addresses the needs of the masses; I believe Act Utilitarianism is that strategy. Act Utilitarianism is a practical theory, based upon morality, which offers a systematic approach to achieving the greatest amount of happiness, and these are the reasons I have selected this theory. Contrast Argument As impressive as Act Utilitarianism is, not everyone supports the theory. There are two common criticisms of Act Utilitarianism: (1) linking utility to personal inclinations is impossible; (2) measuring happiness and suffering are not in any way definitive (Utilitarian, n.d.). Considering utility, how does one create a universal standard that will reliably provide the greatest utility from a person s decisions? It does seem, unless controlled by an outside force, that a person s own inclinations, biases, and desires would supersede any kind of universal standard. Additionally, right and wrong do not always have a clear definition. This fact alone can prevent a person from making the [right] decision that will maximize happiness. Similarly, when trying to quantify happiness, and how it relates to suffering, there is no single method to determine that happiness will always be maximized. As happiness is often based upon intensity, duration, and certainty, adding a social constraint does not guarantee a good decision; meaning, the best choice may not always favor society (Quinn, 2013, p. 69). Both of these criticisms present valid issues in the Act Utilitarianism ethical theory. Though, due to the principle of utility usually choosing society over the individual, creating universal standards are not as complex as they may seem. Counter Argument Act Utilitarianism presents its principle of utility as a way of increasing happiness by

UNIT 1 RESEARCH PROJECT 7 maximizing positive outcomes. Conversely, there is criticism that questions whether or not happiness can be accurately quantified. If happiness cannot be measured, then the core concepts of Act Utilitarianism are inadequate. Furthermore, cynics point out that even if happiness could be properly calculated, there is no way to guarantee a person would subject themselves to a universal standard, one that works on the behalf of society rather than the individual. Evidently, the skeptic has failed to acknowledge all the components of the principle of utility. The principle consists of a set of checks and balances that addresses happiness and personal inclinations; for example, actions that benefit a person are considered good; actions that hurt a person are consider bad; and, happiness that has the highest impact on self or community is considered the most advantageous. The argument could still be made that those principles would not compel a person to choose community over self. This is where understanding happiness and maximizing positive outcomes is critical. Eventually, which is the goal of Act Utilitarianism, the person making the decisions would choose to weigh their personal choices with the needs of the community; and thus, a sort of social equilibrium would emerge. It is in this awareness of community and society that makes Act Utilitarianism an attractive ethical theory. Contemporary Issue Moving from ethical theory to applied ethics, ethics can be directly applied to a contemporary IT issue; that issue is hacking, that is, hacking with malicious intentions. In 2014 alone, dozens of high profile hacks caused data breaches, data loss, and tarnished company reputations. Businesses, such as Home Depot and Target, reported millions of dollars in losses due to hackers exploiting weaknesses in their computer and networking systems (Finkle & Bose, 2014, para. 1). But, what exactly is hacking? Hacking is the activity of gaining unauthorized access to a computer system, where the attacker can upload viruses and worms, steal data, and

UNIT 1 RESEARCH PROJECT 8 render systems useless (Phys, 2013). From Business Insider (2014), the suggested reason why hackers are costing companies millions of dollars, is because businesses just do not feel as though cyber threats apply to them, until it is too late that is (Business Insider, 2014). Hacking damages computer systems, hurts people, and can affect company revenue in a big way. Thus, the term hacking has come to have a negative connotation, linking it with illegal activities. Personal Perspective From a personal and professional perspective, I have spent most of my life working on computer systems. I feel as though anyone wanting to damage those systems should receive extremely harsh penalties. One problem I have with hacking, is the effect that viruses and worms have on a system of network computers. It is one thing to have a single computer at the workplace with a virus; it is quite another to have thousands of computers infected. Another concern I have with hacking, is that it is a violation of privacy. For a business, let us say for the one I work for, customer data is arguably the greatest asset we possess. If a hacker gains unauthorized access to our computer systems, they could steal or modify customer data, and damage the systems in ways that affect business operations, especially those operations that deal with customers. To say the least, I do not approve of hacking, and consider it to be a criminal activity. Applied Ethics To support the personal perspective with ethical theory, there are three principles of Act Utilitarianism that can be used to demonstrate why hacking is bad. One of the core principles of Act Utilitarianism state that happiness, and thus goodness, is when total happiness is increased for everyone involved (Quinn, 2013, p. 76). Businesses and people who have had their computers and networks compromised, are not happy. Therefore, hacking is in direct

UNIT 1 RESEARCH PROJECT 9 contravention of the happiness principle. A subsequent principle establishes that an action is considered bad if it hurts someone. Not only does hacking hurt someone, it can literally impact millions of computer systems and people at one time. Hence, hacking is in violation of the second principle. Finally, a third Act Utilitarianism principle dictates that activities, events, and decisions should ultimately maximize positive outcomes. As hacking is an illegal activity, a positive outcome is not possible; thus hacking, once again, ends up in the bad category (NCSL, 2014). Conclusion The study of ethics examines the values of good and bad, and is motivated by a sense of moral obligation. Approaches to understanding ethics is not always simple. Thus, ethical theory has been created, and has been challenged, to provide insight into moral principles. Of course, identifying good and bad, right and wrong, requires in-depth research into human conduct. It is this study of human conduct where happiness, goodness, and moral responsibility can be properly defined. In Act Utilitarianism, increasing happiness and positive outcomes are based upon the rightness or wrongness of a person s actions. Consequently, if a person s decisions are of pure intent ones that consider the needs of society the greatest amount of happiness can be achieved. When applying Act Utilitarianism to a real world example, as in hacking, it is evident that ethical theory can be used to clearly define the boundaries of good and bad. Inasmuch, the Act Utilitarianism theory can been seen as a practical system that encourages happiness, while maximizing utility. The final thought is this, could the world become a better place if Act Utilitarianism was applied to mainstream society?

UNIT 1 RESEARCH PROJECT 10 References Business Insider. (2014, July 6). Hackers are costing companies millions and it s going to only get worse. Retrieved from http://www.businessinsider.com/hackers-are-costingcompanies-millions--and-its-going-to-get-worse-2014-7 Finkle, J., & Bose, N. (2014, September 18). Home Depot breach bigger than Target at 56 million cards. Retrieved from http://www.reuters.com/article/2014/09/18/us-homedepot-dataprotection-iduskbn0hd2j420140918 Internet Encyclopedia of Philosophy. (n.d.). Act and Rule Utilitarianism. Retrieved from http://www.iep.utm.edu/util-a-r/ Iowa State University. (2012, September 3). Moral theories. Retrieved from http://www2.econ. iastate.edu/classes/econ362/hallam/presentations/moraltheories.pdf LaFollette, H. (2000). The Blackwell Guide to Ethical Theory. Oxford, OX, UK: Blackell Publishers. NCSL. (2014, January 9). Computer crime statutes. Retrieved from http://www.ncsl.org/ research/telecommunications-and-information-technology/computer-hacking-andunauthorized-access-laws.aspx Phys. (2013, April 5). Explainer: What is hacking? Retrieved from http://phys.org/news/2013-04-hacking.html Quinn, M.J. (2013). Ethics for the Information Age. Boston: Addison-Wesley. Utilitarian. (n.d.). Most common criticisms of Utilitarianism. Retrieved from http://www. utilitarian.org/criticisms.html