1. Assuming that all the details of Marlinspike's account are correct, do you think that Marlinspike acted ethically in rejecting the request from the telecom? Why, or why not? (15 pts)
Marlinspike acted ethically in rejecting the request from the telecom if we consider below arguments –
• As we assume that the details provided by Marlinspike are correct, so the information he provided is factual
• An ultimatum to Marlinspike that he is working with the terrorist gang could also be the reason the project was declined.
• The company did not give an alternative to him or the reasons why he thought of rejecting.
• The project requirement never specified clearly that the company will use the software only for terrorist threat and …show more content…
It was an ethical decision on Marlinspike’s behalf.
3. Apply the virtue approach to ethical analysis. Show how this approach applies specifically to these facts. Does this change either answer? (20 pts)
Considering the virtues discussed in class and from below link the ethical analysis is as follows – http://www.scu.edu/ethics/practicing/decision/ethicsandvirtue.html Virtues Explanation
Honesty Considering the informational shared by Marlinspike was factual, he was honest about the information the company expected to retrieve
Courage It was courageous on Marlinspike’s behalf to stand against invasion of privacy and exploitation of data of people
Compassion Marlinspike definitely cared about people who would be impacted with the release of this information except the terrorists
Fidelity Duty and faithfulness towards the public protection
Self-Control Marlinspike never lost the control when the company gave him an ultimatum about involvement with the …show more content…
Raises a national issue where government is asking a software engineer to get information than asking an ally country or United Nations for help.
2. It would still include unauthorized access of information, privacy concerns, misuse of surveillance information, and exploitation of information if someone steals the information.
What, if anything, should Marlinspike have done differently? Why? (15 pts)
Hacking in itself is very open ended. I don’t think Marlinspike should have done anything differently. When the company approached him to develop the product to get surveillance information, he did not judge them. But after discussing design documents and other details, he realized that it was unethical for him to be a part of this program. Considering the fact that the information could be misused, Marlinspike’s concern and judgment was fair.
Do you agree with his assessment? If so, what role should software engineers/developers/hackers play in this new environment? (15 pts)
Yes, I agree with this assessment. Software Engineers/Developers/Hackers should:
1. Understand the criticality of the product they are designing, gathering the requirements and paying attention to the history of the