Ethical Theories Of Kantianism And Utilitarianism

Great Essays
Information system Ethics Review – Joseph Sionetuato

In this review I will discuss the ethical theories of Kantianism and Utilitarianism, followed by an assessment of three ethical issues relates to 1. IT Professionals 2. Privacy and 3. Hacking
Ethics is a field of study that defines the difference between right from wrong, and good from bad. Ethics analyses the moral of human behaviours, the policies relates, laws abide and social structures. People that study ethics attempt to justify their moral judgments by developing ethical principles of theories that attempt to capture our moral ways about what is wrong and what is right. There are two theoretical approaches that are common in ethics are Utilitarianism (consequentialism) and Kantianism
…show more content…
Kant view is focus on the actions which totally disregard the consequences. In the other hand, utilitarianism makes their decisions based on the consequences of the actions. Individuals that uses the Kantianism theory believes that pure good comes from human reasons disregarding the consequences. This reasons discussed by Kant state that it should be without the influence of emotion or what we desire. The utilitarian view state that the mean of the action are not important, just the consequences. Kant theory state a good action would take place because of obligation to the categorical imperative. However, according to utilitarian theory, a good decision is display from the amount of happiness that the action creates. This are the major different between Kantianism and Utilitarianism by John …show more content…
Schoeman, F.: Introduction. In: Philosophical Dimensions of Privacy: An
Anthology, ed. Schoeman, F. (Cambridge University Press, Cambridge UK, 1984)
2. Brey, P.: The Importance of Privacy in the Workplace. In: The Ethics of Privacy in the Workplace, ed S. O. Hansson, S., Palm, E. (Peter Lang, Brussels, 2005) pp. 97-118
3. Moor, J.: Towards a Theory of Privacy for the Information Age. Computers and Society 27(3), 27-32 (1997)
4. Westin, A.: Privacy and Freedom (Atheneum, New York, 1967)
5. Lyon, D.: Surveillance Society. Monitoring Everyday Life (Open University Press, Buckingham UK, 2001)
6. Clarke, R.: Information Technology and Dataveillance. Communications of the ACM 31(5), 498-512 (1988)
7. Hansson, S. and Palm, E. (eds.): The Ethics of Privacy in the Workplace (Peter Lang, Brussels, 2005)
8. http://www.investopedia.com/terms/p/property_rights.asp
9. ISSA: ISSA Code of Ethics. In: Information Systems Security Association Website. http://www.issa.org/codeofethics.html (2005). Cited 14 Mar 2006
10. Bynum, T. and Rogerson, S. (eds.): Computer Ethics and Professional Responsibility: Introductory Text and Readings (Blackwell,

Related Documents

  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Post 9/11 Privacy

    • 1178 Words
    • 5 Pages

    However, the scope of this tradeoff has overreached their expectations of reasonable privacy infringement and this balance between security and personal privacy has become the hallmark of the privacy debate. In fact, the events of 9/11 helped to solidify the already growing situation in which technology developments were making information gathering simpler and existing laws for information gathering were undergoing drastic changes (Shamsi & Abado,…

    • 1178 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Rhetorical Analysis: Why Privacy Matters While listening to and reading the lecture, Why Privacy Matters, given by Glenn Greenwald at the TedGlobal event in 2014, it because clear to me that this speech presented information that was methodically and strategically conceived to make an argument that would try to change the perception of its targeted audience. The main argument in this lecture is about our privacy when it comes to the internet and its various forms such as services like, Google, or Facebook. The author argues that in an era where more and more intrusion is occurring into our digital lives, people are conforming their actions around the notion that they may be under the watchful eyes of various entities. That’s where the importance…

    • 962 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This still remains the case even if information from these programs were not relevant to the people who possessed it (739). The concept of openness to the public or the government about personal information on the topic, not only occurs in the United States, but in Great Britain as well. The author Solove addresses that many individuals create faulty assumptions of what privacy and value really define as (734). The author also addresses the concept of people believing that the government may zone in on their lives, for they have nothing to hide if the intensions are to reveal terrorist threats.…

    • 666 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Gleen Greenwald believes those who say that privacy does not matter to them instinctively take action in protecting their privacy. He talks about how people being social animals still need their own privacy and how scrutinized people’s perspective on privacy is in today’s world. He expresses his thoughts and examines examples of where people unconsciously choose to protect their privacy even after they verbally deny the importance of privacy. He also says how mass surveillance has invaded our privacy and how it controls our behaviours as people becomes obedient and compliant. He talks about the history of mass surveillance and how important it is to go against such an invasive idea.…

    • 650 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Privacy is the ability to control who has access to information about us as well as our ability to use this control to establish different types of relationships in our everyday life. (Rachels, 1975 page 326) In the article by Rachels, (1975 page 325) it is discussed that value of…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Name: Sumeng Chen Course: Eng108 Date: 9/13/2015 Writing a Rhetorical Analysis The article Why Privacy Matters Even if You Have 'Nothing to Hide ' is written by Professor Daniel Solove and was published in the year 2011 as an excerpt of the book Nothing to Hide: The False Tradeoff between Privacy and Security by the same author. The research on the article is individually sponsored; however, the author takes a neutral stance and examines the issue associated with privacy thus revealing various statistics that support the findings. Being a professor of Law at George Washington University, the author is internationally recognized in the field as an expert in the exploration of privacy laws.…

    • 1213 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Kantianism is a theory of the moral law of Immanuel Kant in the 18th century. Kant tried a moral system based solely on the reason for the hope that a moral philosophy that is objectively true and is universal. Kant stated the importance to base our actions on a reason why this is the only way to ensure that our morality is objective and is selfish in no way. Kantianism focused on: “the moral status of an action is not determined by its consequences. We are not morally obligated to seek the best overall outcome by our actions, but rather to perform those actions that accord with our moral duty—the fundamental demand that we should treat others, and ourselves, in a manner that is consistent with human dignity and worth” (Practical Guide, p. 72).…

    • 2231 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Technology is a ubiquitous force that surrounds us on a day to day basis. It can also take on many different forms including: computers, tablets, medicine, tables, and much more. However, technology is also one of the most degrading when it comes to personal privacy. In chapter 3 of Helen Nissenbaum’s Privacy in Context: Technology, Policy, and the Integrity of Social Life (2010), the overall theme of the chapter is discussing how technology is propagating personal information all over the high-tech world. The precarious outcome of these happenings are very detrimental to the state of privacy.…

    • 1151 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    There has been an increased interest and knowledge in relation to privacy rights and issues. The reason for this is that they are a fundamental right which ensures the personhood of individuals by allowing them to control who has access to personal information about them. Privacy issues are also of importance because it helps individuals avoid unwanted intrusions in their personal dealings. Consequently, for the reason that privacy is such a complex concept, there have been ongoing concerns and discussions in relation to the legal concept of privacy rights. Various theorists have provided their interpretation of privacy which includes an understanding of how privacy rights should be defined as well as what they should protect.…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Background of the Problem Forty-six percent of American adults now own and can describe his or her smart device as iPhone, Blackberry or Android smart device (A. Smith, 2011). The various device makers each have their own mobile application stores connected to their specific mobile devices. Linux mobile devices use the Google Play and Amazon App Store that work specifically with the Android operating system environment The public has been concerned with privacy over a hundred years now, going back to 1890, Warren and Brandeis wrote their article, “The Right to Privacy” (Barbas, 2012). Supreme Court Justices Warren and Brandeis’ article discussed many issues concerning the “tangible” and “intangible” aspects of privacy and what they viewed…

    • 282 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Introduction ( thesis ) - James Zeigler, Justin Sanford The use of monitoring software in a business setting carries ethical questions about the level of monitoring conducted by employers and how this monitoring and restriction of access effects employee morale, and corporate trust. Employees will shop, do their banking, check up on personal emails, catch up on social media, tweet and in extreme cases watch their favorite Netflix series or television show. While some of these employees do this on occasion or on a short break such as lunch, others will abuse this access creating a problem for the company. Access to information comes easy these days and with the ability to obtain this information with just the click of a button can create hostile, unproductive environments in the workplace and even cause legal issues within the company.…

    • 2171 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Kant starts right off by talking about the only thing that can be considered good without limitations is that of a good will. He describes how the things that bring forth happiness can also cause arrogance unless a good will is present (4:393). He talks about how moderation in affects and passions, as well as self-control and calm reflection are not only good for all purposes, but they even effect the inner worth of a person. Kant believes without the basic principles of good will they can become evil (4:394). He tells us how a good will is good do only its volition, meaning it itself is good.…

    • 1351 Words
    • 6 Pages
    Improved Essays