Free

Ethics and Technology - Case Study Example

Comments (0) Cite this document
Summary
This research begins with the statement that in the light of the current economic trend, the laying off of H-1 workers before firing full-time American citizens would be morally wrong. According to Kant, morality can only be defined by rationalizing about ‘whether one is inflicting evil on others’…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.3% of users find it useful
Ethics and Technology
Read TextPreview

Extract of sample "Ethics and Technology"

Part A
Answer 1b
The whistle-blower, except in special circumstances, has exhausted all internal channels for dissent before going public.

Answer 2a
True
Answer 3a
True
Answer 4b
There is almost universal government protection for whistle-blowers.
Answer 5a
True


Part B

Answer 6
In the light of current economic trend, the laying off of H-1 workers before firing full time American citizens would be morally wrong. According to Kant, morality can only be defined by rationalizing about ‘whether one is inflicting evil on others’. Emmanuel Kant has been emphatic that moral obligations are imperatives and his two Rules define the categorical imperatives: Rules of Universality; and Rules of Respect. The first one makes says that people at all time must act appropriately and the second rules promotes the value of respect and says that well being al all individuals is important and therefore, one should not use others for their own vested interests. Thus the rules that are universally acceptable should be applied, especially when applied to themselves under same circumstances.

Answer 7
‘Anonymous whistle-blowing is never morally justified, because it violates the rights of those who are accused to face their accusers’. This statement would not be true according to utilitarian theory. Consequences of an action should be important criteria for the people. It has been maintained that various philosophers like Bantham had pursued the philosophy that actions, which result in maximum happiness for maximum number of people, are invariable good and therefore, the end justifies the means if it generates happiness for people. Popularised as act utilitarian theory, the actions, that are designed to benefit or have beneficial cascading effects on others, are morally and ethically right.

Answer 8
In the highly competitive environment of global business, internet security has become a critical factor. Thus, when it comes to internet security, especially the flaws, the dilemma of divulging the information to its various stakeholders becomes highly delicate matter. But looking at the various pros and cons of the situation and huge implication of exploitation of the information by the vested interest, it would be advisable that organizations become more transparent in their operations and corporate governance. ‘Disclosure of good and relevant information reduces asymmetry, lowers the return which investors demand, and thus lowers the cost of the capital to the firm’ (Diamond & Verrechia, 1991). They are also the most important thrust components which facilitate and proffer platform to demonstrate the practice of competent and responsible corporate governance.
In the fast changing environment of globalization, business compulsions have become more stringent in their nature and factors like accountability, responsibility and reliability have become important pre-requisites for business to create a credible environment for their trade and investment. The lack of effective controls vis-à-vis malpractices in accounts and auditing, security of confidential information, corrupt practices in the higher hierarchy of management, disparity in rules and regulation etc. have become crucial risks factors that have resulted in huge economic loss for its shareholders as well adversely affecting its credibility in the market. The transparency in the Corporate Governance would create effective control measurements that would safeguard the interest of all its stakeholders, investors and business partners.

Answer 9
The computer-security class at Sonoma State University where students are taught to breach the security of anti-virus software by creating computer viruses has become highly controversial. The ethics and morality of the courseware has come under cloud primarily because it encourages development of computer viruses. But the wider implications of the same vis-à-vis how the students’ use their expertise later on in their lives has become more crucial factor, both for the industry and people at large. The moral and ethical delivery of their outcome has become a strong contending issue within and outside the academia.
If one looks from the academia point of view, developing capacity to create computer viruses is as important as developing antivirus software because both the issues are intrinsically linked to each other. Hence developing appropriate creativity and capability to develop computer virus would automatically result in exploring and developing anti-dote to that virus. When it is taught is academia, it becomes transparent and industry is welcomed to contribute towards developing myriad anti-virus software for viruses that are created by vested interests. Hence, course curricula and teaching at Sonoma State University is absolutely correct and essential in the contemporary environment of fast evolving technology and globalization.
Reference

Diamond, D. and Verrechia, R. (1991). Disclosure, liquidity, and the cost of equity capital. Journal of Finance, 46(4): 1325-1360.
Sarbanes – Oxley Act 2002. Available from: [Accessed 5 December, 2009]. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Ethics and Technology Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Ethics and Technology Case Study Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/technology/1730566-ethics-and-technology
(Ethics and Technology Case Study Example | Topics and Well Written Essays - 1000 Words)
Ethics and Technology Case Study Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/technology/1730566-ethics-and-technology.
“Ethics and Technology Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/technology/1730566-ethics-and-technology.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Ethics and Technology

Ethics In Information Technology

...?Computer ethics is a subdivision of practical viewpoints which deals with how computing professionals ought to make decisions concerning professional and social conduct. It entails the moral guidelines or standards of conduct with regard to computers. These standards may be categorized into copyright and intellectual property, Netiquette, and the general day-to-day ethics and have been summarized into the Ten Commandments for computer ethics by Computer Ethics Institute. In the current age of information technology computers have been applied in varied disciplines including medicine in the field of embryonic stem cell research. Stem cell research has...
3 Pages(750 words)Research Paper

Society, Ethics and Technology

...? Society, Ethics and Technology Society, Ethics and Technology Technological innovations have for a long time created ethical problems to the human civilization. Technological systems are a credible proof of an industrialized society as they demonstrate the increasing complexity of life and development of agriculture. The information on the interlock between technology, society and ethics, is crucial in understanding the impacts of technological advancement and strategies that can be applied in minimizing them. This paper discusses the sociological aspects of...
5 Pages(1250 words)Essay

Ethics in Technology

...? Ethics in Technology Ethics in Technology Part Detailed of Worms and Trojan Horses Worms and Trojan Horses are actually programs that were created to infect computer files and databases through replicating itself (worms) and by stealing personal and crucial information (Trojan Horses). The apparent difference between the two is the worms’ capability for replication, which is not at all possible for Trojan Horses; but both could be sent through various forms and guises, including being sent as a joke. Concurrently, when differentiating worms from virus, research on the subject made one recognize that worm parallels a virus as a distinctly identified unit of code which...
3 Pages(750 words)Essay

Information technology ethics

...ID # Computer Supported Crimes With the passage of time, huge developments have been done in the field of computer science. The computer is being used in every field of life. Computer is being used in scientific research, medical department, missile technology, banking, laboratory, and other walks of life. The concept of the cyber world and the Internet has revolutionized the World to a great extent. Every technology has some pros and cons. The above mentioned are the advantages of computer but there are also some weak points of this technology. The computers have mechanized the whole world too much and people heavily depend too much on computers. On the other hand the biggest...
3 Pages(750 words)Essay

Ethics & Technology

...? Ethics & Technology Electronic monitoring at workplace: Position of employer The of ethics in workplace is one of the major implementations bythe employer for starting a venture. An ethical culture is one such characteristic trait that helps an organization to prosper in the long run. The adherence to ethical culture in the workplace is developed with the help of strict enforcement policies of the employer which is circulated among the employees. The employer views the employees as heterogeneous set of individuals who have the quality to meet organizational goals. The employer also demands discipline and workplace ethics from its...
3 Pages(750 words)Essay

Ethics in Information Technology

...Your Ethics in Information Technology Introduction The moral issue at hand is the question of privacy - on both the sides of employers and employees. Employers have the right to privacy so as actual events that transpire inside the work area - especially the negative ones be not broadcast in the open so that it ruins the its reputation. On the other hand, employees have the right to their private lives so that their posts on the social networking sites should not be monitored worse limited by their employers since they are only bound by their responsibilities inside the work area. The question of what should be the limit of the employers in monitoring the activities of its employees is a vague one...
5 Pages(1250 words)Case Study

Ethics in Technology

...Ethics in Technology: Nuclear Energy Ethics in nuclear energy Since nuclear energy was discovered, it has found a number of uses both in weaponry and in the production of energy for domestic as well as industrial use. The ethical issues around the use of nuclear power continue to be debated by so many people. The use of nuclear weapons is one issue with its many controversies; however, this paper will look at the ethical issues in the use of nuclear technology to provide for power for domestic and industrial use. There are those who feel that the use of nuclear energy is too risky for human kind. Others argue that the risks are not so...
6 Pages(1500 words)Research Paper

Ethics & Information Technology

...Ethics & Information Technology Ethics & Information Technology is a fundamental topic in the modern world because the continued use of computers and advanced technologies has raised significant ethical issues that the society must address. This topic revolves around defining information ethics by analyzing the correlation between the ethical standards and moral values that the society must adopt and the process of developing, organizing, distributing, and using technological information. Indeed, the interaction of modern computer technologies,...
6 Pages(1500 words)Essay

Ethics in Information Technology

...Ethics in Information Technology Affiliate Ethics in Information Technology Recognize that there is a moral issue Ethics is an important dogma that should be embraced ad practiced in the working environment. It becomes important for people to recognize the fact that discipline and proper mode of conduct in the work place increases the chances of working in a positive environment. The moral issue in the particular case is Privacy in the Work place (Reynolds, 2014). The consideration of various things becomes important when looking at privacy in a certain work setting. Privacy refers to the maintaining of confidentiality of information found in the computer of an individual. Determine the actor -whose moral issue is it? Privacy... employees...
3 Pages(750 words)Essay

Ethics in Information Technology

...and the negative aspect of technology which comes in the form of security threat. I learnt this aspect and will help me working more actively and safely on the medium of internet. I also got familiar with the security aspect of cloud computing which is a concept of future days. How has this impacted my understanding of ethical issues? It has given me a broader view of the ethical issues that are faced by the common internet user in the daily operations performing on internet. It will create awareness towards safe browsing and transactions of large scale. What will u do differently? Through this learning, I will adopt number of different things like ensure more security towards passwords,...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Ethics and Technology for FREE!

Contact Us