Assignment Phil212 (M) - Computer Ethics
Assignment Phil212 (M) - Computer Ethics
Assignment Phil212 (M) - Computer Ethics
This is because happiness is the ultimate intrinsic human goal, some go so far as to say that
everything else has only secondary value (Eggleston, 2017). At its core, utilitarianism is the idea
that the morally right course in any situation is the one that produces the most happiness for the most
people (Hollander, 2016). Utilitarian believe that happiness will not stop until you get what you
deem valuable. By this they argue than an individual cannot be happy unless he gets what he thinks.
This in turn can make a person selfish and make him seek happiness in ways which are not ethical.
There are two alternative versions of utilitarianism: rule and act (Ryder, 2017). In the former, a
set of rules are adopted and, if followed by everyone, greater happiness ensues. In the latter the
weight is on person’s actions rather than a set of instructions. If the outcome of a particular action
results in greater happiness then it is good, regardless of how it was achieved or the motives for the
action (Hollander, 2016). In rule utilitarianism telling the truth might be codified as a rule and the
individual would strive in all situations to tell the truth. In act utilitarianism lies would be tolerated
if the greater good is ultimately achieved.
2. Write four arguments that can be given in defense of hacking? What are the counters to each of these
arguments? [5]
According to Cobb (2016), there are many arguments that can be given in defense of hacking.
The four arguments include that the knowledge should be free. Knowledge are the skilled or the
valuable information that an individual gets or acquires through experience or the information.
Knowledge is acquired in different ways and highly needed in hacking. It is argued that knowledge
should be free. There are many counter arguments for this. Some individual argues that although
knowledge is free it should have its value but should not be used in unethical way (Reinicke,
Cummings and Kleinberg, 2017). They argue that teaching hacking in school can lead to a problem
of security to the secure networks. The second argument in defense of hacking is break ins to
illustrate security issues to those that can do something about it. The counter argument for this is that
it removes freedom or the autonomy.
The third argument for defense of hacking is when a hacker hacks he or she does not harm, this
is because the hacker does not change anything (Cooper, 2016). It is argued that the person hacking
gets to learn with no cost to anyone. There are many counter arguments for this. Some individual
argues that although the hackers do not harm, he does not have the right to undermine other people’s
right to privacy (Reinicke et al., 2017). The fourth argument for defense of hacking is that the
hackers protects people from big brother. The counter argument for this is that they are still invading
the privacy.
Page 1 of 3
The field of computing is very broad as it involves various fields with different kind of jobs.
Computing will be considered a profession only if it qualifies to have various characteristics which
include mastery of an mysterious body of knowledge, freedom, codes of ethics and social function
(Iqbal and Beigh, 2018).
According to Kakabadse and Kakabadse (2017), computing is considered to be a profession
because it has an esoteric perspective of profession. To gain skills and training required to carry on
computing job, one has to undergo training for several weeks, and some even require one to have a
Bachelor Degree if not more. Computing is considered to be a profession because it meets several
autonomy aspects. When it comes to formal organization, computing does not necessarily meet these
aspects although organization today are considering various certifications and requirements from
their employees. Computing is a profession because one must hold a degree in the field of
computing and also some other certifications in this field to prove that one is fit to work in
computing field.
The computing profession is to meet the code of ethics features of a profession. People working
in the field of computing are expected to observe various codes of practice and ethics. Among these
codes in the workplace include hacking, confidentiality and privacy, use of computers, crimes in
computers such as cybercrime and cyberbullying, responsibility of professional property among
others (Ang et al., 2015). This, therefore, indicates that computing is considered a profession with
these set of codes.
Computing as a profession plays a significant role in the society, although this does not
necessarily mean that it has to perform society functions, it contributes to a great extent in numerous
fields with strong societal functions. This field of computing has important professional figures who
contribute a lot in the activities that enhance societal functions, and they include database analysts,
computer engineers and programmers, software developers among others (Iqbal and Beigh, 2018).
Without these professionals, very many crucial professions would not be in the point they are today.
The computing profession has been very significant in technological advancement and innovation
and consequently impacting other professions which have a broad contribution to society.
I think computing is regarded as a strong profession. Although it does not strictly follow the
stipulated professional characteristics, obtaining the relevant skills required to be a computing
professional is very difficult, and the field is changing and growing as well. In contrast with other
professional fields such as customer service workers and servers, computing profession is seen to
possess many more characteristics than these jobs (Ang et al., 2015). Computing profession is not a
one-time training profession as it requires continuous exercise and practice to learn new things and
improve on skills and expertise.
Page 2 of 3
References
Bird, G., 2016. Kant's Theory of Knowledge: An Outline of One Central Argument in the ‘Critique of Pure
Reason'. Routledge.
Brittan Jr, G.G., 2015. Kant's theory of science. Princeton University Press.
Cobb, S., 2016. Mind this Gap: Criminal hacking and the global cybersecurity skills shortage, a critical analysis.
In Virus Bulletin Conference (pp. 1-8).
Cooper, P., 2016. Cognitive active cyber defense: finding value through hacking human nature. JL & Cyber
Warfare, 5, p.57.
Eggleston, B., 2017. Mill’s moral standard.
Hollander, S., 2016. Thomas Robert Malthus and the Utilitarian. History of Economics Review, 64(1), pp.2-26.
Reinicke, B., Cummings, J. and Kleinberg, H., 2017. The right to digital self-defense. IEEE Security &
Privacy, 15(4), pp.68-71.
Ryder, R.D., 2017. Speciesism, pianism and happiness: A morality for the twenty-first century (Vol. 47).
Andrews UK Limited.
Iqbal, J. and Beigh, B.M., 2018. Software Engineering A Profession: Indian Perspective.
Ang, S., Joseph, D. and Slaughter, S.A., 2015. IT Professionals and the IT Profession. Wiley Encyclopedia of
Management, pp.1-6.
Kakabadse, N.K. and Kakabadse, A.K., 2017. ‘Professional Professional Ethics: An IT Perspective. In Creating
Futures: Leading Change Through Information Systems (pp. 237-252). Routledge.
Page 3 of 3