Ethical Theories Of Kantianism And Utilitarianism

Great Essays
Information system Ethics Review – Joseph Sionetuato

In this review I will discuss the ethical theories of Kantianism and Utilitarianism, followed by an assessment of three ethical issues relates to 1. IT Professionals 2. Privacy and 3. Hacking
Ethics is a field of study that defines the difference between right from wrong, and good from bad. Ethics analyses the moral of human behaviours, the policies relates, laws abide and social structures. People that study ethics attempt to justify their moral judgments by developing ethical principles of theories that attempt to capture our moral ways about what is wrong and what is right. There are two theoretical approaches that are common in ethics are Utilitarianism (consequentialism) and Kantianism
…show more content…
Kant view is focus on the actions which totally disregard the consequences. In the other hand, utilitarianism makes their decisions based on the consequences of the actions. Individuals that uses the Kantianism theory believes that pure good comes from human reasons disregarding the consequences. This reasons discussed by Kant state that it should be without the influence of emotion or what we desire. The utilitarian view state that the mean of the action are not important, just the consequences. Kant theory state a good action would take place because of obligation to the categorical imperative. However, according to utilitarian theory, a good decision is display from the amount of happiness that the action creates. This are the major different between Kantianism and Utilitarianism by John …show more content…
Schoeman, F.: Introduction. In: Philosophical Dimensions of Privacy: An
Anthology, ed. Schoeman, F. (Cambridge University Press, Cambridge UK, 1984)
2. Brey, P.: The Importance of Privacy in the Workplace. In: The Ethics of Privacy in the Workplace, ed S. O. Hansson, S., Palm, E. (Peter Lang, Brussels, 2005) pp. 97-118
3. Moor, J.: Towards a Theory of Privacy for the Information Age. Computers and Society 27(3), 27-32 (1997)
4. Westin, A.: Privacy and Freedom (Atheneum, New York, 1967)
5. Lyon, D.: Surveillance Society. Monitoring Everyday Life (Open University Press, Buckingham UK, 2001)
6. Clarke, R.: Information Technology and Dataveillance. Communications of the ACM 31(5), 498-512 (1988)
7. Hansson, S. and Palm, E. (eds.): The Ethics of Privacy in the Workplace (Peter Lang, Brussels, 2005)
8. http://www.investopedia.com/terms/p/property_rights.asp
9. ISSA: ISSA Code of Ethics. In: Information Systems Security Association Website. http://www.issa.org/codeofethics.html (2005). Cited 14 Mar 2006
10. Bynum, T. and Rogerson, S. (eds.): Computer Ethics and Professional Responsibility: Introductory Text and Readings (Blackwell,

Related Documents

  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Hrm/300 Week 2

    • 1986 Words
    • 8 Pages

    1. In your own words, describe what privacy means and what privacy protection companies should give employees. I feel that privacy in the workplace means personal information that an individual shares with an organization is protected and will not be shared with any other individual or entity other than those who are required and have access to the information and those who have consent to view the information. In addition, privacy can refer to the degree that an employer observes and gathers facts on the activities such as various forms of communication such as telephone conversations and emails sent on work computers. Privacy protection in the workplace given to employees should include protection of their personal information.…

    • 1986 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Dbq Privacy

    • 800 Words
    • 4 Pages

    Privacy should be kept intact even for sake of security. One of the main supporting arguments for security is that if an individual has nothing to hide, then they have nothing to fear. In The Accountability Matrix by David Brin, Brin highlights the fact of having tools…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The communication privacy theory focuses on privacy boundaries and what information one chooses to withhold from another person. This privacy management system is focused on three parts: privacy ownership, privacy control, and privacy turbulence. Privacy ownership is our private information that only we know and others do not. This also encompasses our personal privacy boundaries. Depending on the person, our privacy boundaries could either be thin and porous, or thick and hard to break through (Griffin p. 151).…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Background of the Problem Forty-six percent of American adults now own and can describe his or her smart device as iPhone, Blackberry or Android smart device (A. Smith, 2011). The various device makers each have their own mobile application stores connected to their specific mobile devices. Linux mobile devices use the Google Play and Amazon App Store that work specifically with the Android operating system environment The public has been concerned with privacy over a hundred years now, going back to 1890, Warren and Brandeis wrote their article, “The Right to Privacy” (Barbas, 2012). Supreme Court Justices Warren and Brandeis’ article discussed many issues concerning the “tangible” and “intangible” aspects of privacy and what they viewed…

    • 282 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There has been an increased interest and knowledge in relation to privacy rights and issues. The reason for this is that they are a fundamental right which ensures the personhood of individuals by allowing them to control who has access to personal information about them. Privacy issues are also of importance because it helps individuals avoid unwanted intrusions in their personal dealings. Consequently, for the reason that privacy is such a complex concept, there have been ongoing concerns and discussions in relation to the legal concept of privacy rights. Various theorists have provided their interpretation of privacy which includes an understanding of how privacy rights should be defined as well as what they should protect.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As a result of social networking and involuntarily giving out our personal data, we have mostly agreed and consented to our invasion of privacy. Throughout the essay,…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Why Privacy Matters

    • 1428 Words
    • 6 Pages

    In this essay the author Solove has contends that the issue of privacy influences more than just people concealing an off-base. He clarifies how this argument originates from a lacking meaning of what privacy is and the worth that privacy has. The disciples of the nothing-to-hide argument express that in light of the fact that the information won't be uncovered to the general population, the privacy hobby is negligible, and the security enthusiasm for…

    • 1428 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Kant starts right off by talking about the only thing that can be considered good without limitations is that of a good will. He describes how the things that bring forth happiness can also cause arrogance unless a good will is present (4:393). He talks about how moderation in affects and passions, as well as self-control and calm reflection are not only good for all purposes, but they even effect the inner worth of a person. Kant believes without the basic principles of good will they can become evil (4:394). He tells us how a good will is good do only its volition, meaning it itself is good.…

    • 1351 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    In the branch of normative ethics, a person discerns what is right or wrong behavior. There are several theories about what is right or wrong conduct, but two of the most popular ideas is Utilitarianism and Kantianism. Both set up strict methods of deciding how a person would know what the right thing to do in a situation would be. On one hand, utilitarianism claims that you can use intuition to discern what the greatest good for the greatest number of people is. On the other side, Kantianism claims that you can use reasoning and logic to discern moral obligations and rules.…

    • 957 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Introduction ( thesis ) - James Zeigler, Justin Sanford The use of monitoring software in a business setting carries ethical questions about the level of monitoring conducted by employers and how this monitoring and restriction of access effects employee morale, and corporate trust. Employees will shop, do their banking, check up on personal emails, catch up on social media, tweet and in extreme cases watch their favorite Netflix series or television show. While some of these employees do this on occasion or on a short break such as lunch, others will abuse this access creating a problem for the company. Access to information comes easy these days and with the ability to obtain this information with just the click of a button can create hostile, unproductive environments in the workplace and even cause legal issues within the company.…

    • 2171 Words
    • 9 Pages
    Great Essays