.

Tuesday, April 30, 2019

434Mod1Case Essay Example | Topics and Well Written Essays - 750 words

434Mod1Case - Essay ExampleOften cyber ethics precept is based on one significant possibility or combination of two theories. The two major(ip) theoretical approaches are teleological and deontological theories. Teleological theories states treats consequences to be a measure of actions good. On the other hand deontological theories consider actions righteousness to be above goodness. Utilitarian foundation is a part of teleological theories. This foundation states that action of an individual should be equal to maximize happiness and good for all who are affected by such actions. It highlights the factor that actions of a person should be based on probable consequences that may be resulted by the action to begin with it is been executed. This theory claims that a person should think about each and every individual and not scarce person taking a decision. Deontological theory is an ethical study based on duties. It considers duty and faithfulness toward principle to be most es sential factors (Gold, 2010). This theory states that an actions consequences are not that weighty in comparison to rightness of the action. As per this theory an action is said to be valid if actions that are taken by individuals do not lead to any mannikin of contradiction. The basic concept of this theory is that individuals should work according to their intelligence and virtue act justly, should tell truth and avoid any form of injury towards others. Both the theories have different elements which state the importance of cyber ethics. This form of education has gained its importance in the recent years where stealing music or video is considered to be equivalent to actual theft. Students are made aware about the different cyber crimes and its impact on others (Starr, 2011). Information technology in the prove scenario has given liberty to individuals to access various data but also it has posed a curse to ones privacy.In American schools

No comments:

Post a Comment