Sign In
Not register? Register Now!
Essay Available:
You are here: HomeResearch PaperIT & Computer Science
Pages:
2 pages/≈550 words
Sources:
5 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 9.95
Topic:

Ethical Theory Critical Thinking IT & Computer Science Research Paper (Research Paper Sample)

Instructions:

Ethical Theory on the use of computers

source..
Content:


Ethical Theory Critical Thinking
Author’s Name
Affiliation
Ethical Theory Critical Thinking
The last decade has seen significant growth in the use of computers. The advancement in technology means that there is increased access to information and automation. However, computers’ increasing power has created an opportunity for some people to create malicious programs intended to steal and manipulate data. The stealing of information has evolved such that some of the perpetrators use crude methods to hold companies hostage, through the use of ransomware (Wiener, 2018). The malicious software is instigated by employees and foreign agencies seeking to utilize weaknesses for their gain. The unethical practices have contributed to financial loss. Thus, in this article, the unethical use of data shall be discussed based on various theories’ perspectives.
* Kant’s Deontological Theory
Kant’s theory is one of the most controversial analogies in ethics. Deontology’s ethics are encapsulated in Kant’s philosophy that a person can understand and utilize morality in all situations. Spahn (2020) agreed that deontological ethics revolve around the rightness and wrongness of an action, independent of a person’s character. In the digital age, Kant’s deontology and motivational rationalism have been utilized as the moral agency to determine acts of malicious acts of data theft. The conceptualization of digital deontology has seen many hackers offer valid explanations for their actions. Therefore, this theory has evolved to assist digital theft of data.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Information Governance and Cyber Security IT Research Paper
    Description: Information governance is the technology, strategies and policies of a firm used in optimizing the information to meet the needs and regulations of the business by minimizing risks (Mukherjee, 2019). It controls the information in the organization such as usage, storage and creation of data...
    8 pages/≈2200 words| 13 Sources | APA | IT & Computer Science | Research Paper |
  • Modern-day Cryptography IT & Computer Science Research Paper
    Description: Cryptography is an art as old as mankind. Over time it has been used as a secure means of communication that only those initiated into the group could understand. Some examples of cryptography were witnessed in Egyptian hieroglyphs and Julius Caesar's cipher system that was used to facilitate...
    3 pages/≈825 words| 7 Sources | APA | IT & Computer Science | Research Paper |
  • Computer Science and Cybercrime IT & Computer Science Research Paper
    Description: Cybercrimes have been a cause of concern because of the increased reliance on information technology. Cybercrime can be costly for the government because functions such as military, surveillance, and internal security can be affected by the theft of information or materials (Pomerleau, 2015)....
    3 pages/≈825 words| 6 Sources | APA | IT & Computer Science | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!