Thursday, December 12, 2019

Essay on Information Technology Ethics Topics

Question: Describe about the Topics In Information Technology Ethics. Answer: This paper is aimed to shed some light on one of the biggest ICT ethical issues that have surfaced in the recent past. The essay would provide a detailed insight into the incident, only to reveal the unethical (or ethical) sides of it according to two of the most popular ethical theories. The essay would also provide several useful recommendations to fellow citizens who find themselves in similar situations, thus providing them with an option for avoiding the consequences. The incident: According to the reports published in The Sydney Morning Herald, Roy Tabalbag, the accused had stabbed to death Amin Sthapit, whom he had found "having sex" with his girlfriend, Geecy Rebucas (Begley, 2015).Tabalbag handed himself to the police later on, as the reports say, and has pleaded guilty: not to murder but to manslaughter. The defense council has also claimed that Roy Tabalbag was provoked in harming Sthapit when he found his girlfriend lying naked with the later in his bedroom. However, further investigations revealed that the incident was much more of a planned nature than that of a mere accident resulting from an instantaneous provocation: Tabalbag had long been using various information technology tools and techniques to find out his girlfriend's social activities. Braddon Hughes, the Crown prosecutor, argued at the Supreme Court that Tabalbag had long been confronting Geecy Rebucas on her relationships with other guys as he was sure of the fact that she indeed was involved with someone other than him: these confrontations eventually lead to strong arguments as Rebucas kept on denying the accusations. According to the Crown prosecutor, Tabalbag started using several ICT tools so as to gather proof of Rebucass infidelity: he started using a software tool named Dr. Fone so as to retrieve the text messages that his partner had been deleting (Begley, 2015). The very same software provided him with copies of phone bills (Geecy Rebucass), which Tabalbag utilized to track down the numbers that Ms. Rebucas had been talking to. The evidence submitted at the court indicated that Tabalbag started using the tool the day before the incident happened. Mr. Hughes has also informed the court that Tabalbag, on that very night, had also gained access to Ms. Rebucass laptop and had found out that she was no joining her cooking classes scheduled on the very next day. On the day of the incident, Tabalbag used a program named Find My Phone in order to track Ms. Rebucass location: the application indicated her presence at the couple's home. Tabalbag rushed back to his place, where having found Amin Sthapit on his bed with Ms. Rebucass, he picked up Sthapits Chef Knife and stabbed him to death. Ethical Theory 1: Deontology. According to researchers Stahl et al. (2014), deontology is that particular ethical theory which considers incidents or activities to be moral or ethical when the said activity adheres to all concerned rules and regulations. In the incident being considered, the accused started using Software programs and tools to gain unauthorized access to certain data sets that his partner had already deleted, thus indicating that she did not want them to be found. He had also gained access to her laptop and had gone through her personal mails. Besides this, on the day of the accident, Tabalbag used a software application to track down her girlfriend, with the aim of catching her red handed. In his defense, Tabalbag claimed that his girlfriend's infidelity provoked him: however, since we are only concerned about the ICT ethical issues of the incident, we would not be commenting on any of her activities. However, the activities that Tabalbag did were indeed unethical: at the very first place, he had installed a software application on Geecys phone ( without informing her) and gained access to all her deleted texts and telephone bills, which clearly violated her privacy (Melden, 2013). He also accessed her laptop, in the very same manner. On the day of the incident, he also took advantage of an application named Find My Phone': the program is utilized to track down lost phones, but Tabalbag used it to track down the location of her girlfriend which was clearly a misuse of technology (Peters, 2015). Thus, it can be said that the in accordance with the ethical theory of Deontology, the activities conducted by Tabalbag were out and out unethical. Ethical Theory 2: Just Consequentialism. According to researcher Dion (2012), Just Consequentialism is that particular ethical theory which considers the mere consequences of an incident to comment on the morality of the said incident. As discussed in the sections above, the software applications that Tabalbag downloaded and used had gained him unethical access to such information that Geecy Rebucas had no intention of sharing with him (Bannister Connolly, 2014). Besides this, on the day of the incident Tabalbag had also taken advantage of a software tool to find Rebucass location: this very incident ultimately resulted in him finding Amin Sthapit with Rebucas and stabbing him to death. The discussion made in the section above clearly indicates that the Tabalbag not only violated Rebucass privacy and misused technology but eventually killed Amin Sthapit (Burmeister et al. 2014). Thus, even when the consequences of the incidents are considered, none of the activities performed by Roy Tabalbag can be deemed ethical (Guerrette, 2015). Recommendations. The information discussed in this essay clearly demonstrates the fact that Tabalbag had somehow become aware of the fact that his girlfriend was having an affair with some other person. This very thought lead him to misuse his knowledge of information technology which ultimately resulted in the death of Sthapit. Since we are allowed to comment on the IT issues of this incident, it is being recommended to our fellow citizens to not misuse their ICT proficiency for any personal or professional reasons, as such activities, besides being unethical, are capable of producing disastrous results. On the other hand, the people of Australia are also being advised to secure their personal computing devices and phones such that they do not fall victim to such technology misuses. References Bannister, F., Connolly, R. (2014). ICT, public values and transformative government: A framework and programme for research. Government Information Quarterly, 31(1), 119-128. Begley, P. (2015).Amin Sthapit murder trial: accused Roy Tabalbag 'provoked' into killing girlfriend Geecy Rebucas's lover.The Sydney Morning Herald. Retrieved 25 May 2016, from Burmeister, O., Al-Saggaf, Y., Schwartz, M., Johnson, L. (2014). Internet resources to help Australian ICT professionals identify and solve ethical challenges. ACIS. Dion, M. (2012). Are ethical theories relevant for ethical leadership?.Leadership Organization Development Journal,33(1), 4-24. Guerrette, R. H. (2015). Ethical Theories and Moral Narratives in Art: A Gallery Tour Through the Corporate Moral Forest. Melden, A. (2013).Ethical theories. Read Books Ltd. Peters, R. S. (2015). Psychology and Ethical Development (Routledge Revivals): A Collection of Articles on Psychological Theories, Ethical Development and Human Understanding. Routledge. Stahl, B. C., Eden, G., Jirotka, M., Coeckelbergh, M. (2014). From Computer Ethics to Responsible Research and Innovation in ICT: The transition of reference discourses informing ethics-related research in information systems.Information Management,51(6), 810-818.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.