In this review I will discuss the ethical theories of Kantianism and Utilitarianism, followed by an assessment of three ethical issues relates to 1. IT Professionals 2. Privacy and 3. Hacking
Ethics is a field of study that defines the difference between right from wrong, and good from bad. Ethics analyses the moral of human behaviours, the policies relates, laws abide and social structures. People that study ethics attempt to justify their moral judgments by developing ethical principles of theories that attempt to capture our moral ways about what is wrong and what is right. There are two theoretical approaches that are common in ethics are Utilitarianism (consequentialism) and Kantianism …show more content…
Kant view is focus on the actions which totally disregard the consequences. In the other hand, utilitarianism makes their decisions based on the consequences of the actions. Individuals that uses the Kantianism theory believes that pure good comes from human reasons disregarding the consequences. This reasons discussed by Kant state that it should be without the influence of emotion or what we desire. The utilitarian view state that the mean of the action are not important, just the consequences. Kant theory state a good action would take place because of obligation to the categorical imperative. However, according to utilitarian theory, a good decision is display from the amount of happiness that the action creates. This are the major different between Kantianism and Utilitarianism by John …show more content…
Schoeman, F.: Introduction. In: Philosophical Dimensions of Privacy: An
Anthology, ed. Schoeman, F. (Cambridge University Press, Cambridge UK, 1984)
2. Brey, P.: The Importance of Privacy in the Workplace. In: The Ethics of Privacy in the Workplace, ed S. O. Hansson, S., Palm, E. (Peter Lang, Brussels, 2005) pp. 97-118
3. Moor, J.: Towards a Theory of Privacy for the Information Age. Computers and Society 27(3), 27-32 (1997)
4. Westin, A.: Privacy and Freedom (Atheneum, New York, 1967)
5. Lyon, D.: Surveillance Society. Monitoring Everyday Life (Open University Press, Buckingham UK, 2001)
6. Clarke, R.: Information Technology and Dataveillance. Communications of the ACM 31(5), 498-512 (1988)
7. Hansson, S. and Palm, E. (eds.): The Ethics of Privacy in the Workplace (Peter Lang, Brussels, 2005)
8. http://www.investopedia.com/terms/p/property_rights.asp
9. ISSA: ISSA Code of Ethics. In: Information Systems Security Association Website. http://www.issa.org/codeofethics.html (2005). Cited 14 Mar 2006
10. Bynum, T. and Rogerson, S. (eds.): Computer Ethics and Professional Responsibility: Introductory Text and Readings (Blackwell,