Session 3 - introduction to ethics - Part 2
Session 3 - introduction to ethics - Part 2
Practices
Session 3 – Ethics – Part 2
Ethics
grey
area
Law
Areas of Ethical Problems
• Safety
• Personal intrusion
• Privacy
• Deception
• Security
• Hacking
• Reliability/goodness of fit
• Intellectual property
• Inappropriate use/abuse of technology
• Social responsibility
In class activity
• Nimal, a data analyst for a major stock brokering firm, is working after
normal business hours to finish an important task. He realizes that he is
missing data that had been sent to his coworker Sunil. Nimal had
inadvertently observed Sunil typing his password several days ago and
decides to log into Sunil’s computer and resend the data to himself. Upon
doing so, Nimal sees an open email regarding some illegal activities Sunil has
been doing that might seriously affect the credibility of the company if
discovered by the customers. This might even lead to the cancellation of the
license of the company thereby risking the jobs of over 200 employees.
• Nimal knows he should report this but would have to admit to violating the
company’s information technology regulations by logging into Sunil’s
computer. If he warns Sunil to stop these activities, he will also have to
reveal the source of his information.
• What should Nimal do in this situation?
Professional practice
• Relativism
• Utilitarianism
• Deontology
• …
Relativism
• Ethical relativism is the theory that holds that morality is relative to
the norms of one's culture.
• That is, whether an action is right or wrong depends on the moral
norms of the society in which it is practiced.
• The same action may be morally right in one society but be morally
wrong in another.
• For the ethical relativist, there are no universal moral standards --
standards that can be universally applied to all peoples at all times.
• The only moral standards against which a society's practices can be
judged are its own.
• If ethical relativism is correct, there can be no common framework
for resolving moral disputes or for reaching agreement on ethical
matters among members of different societies.
Utilitarianism
• The utilitarian ethical theory is founded on the ability to predict the consequences
of an action.
• To a utilitarian, the choice that yields the greatest benefit to the most people is
the choice that is ethically correct.
• There are two types of utilitarianism: act utilitarianism and rule utilitarianism.
• Act utilitarianism adheres exactly to the definition of utilitarianism as described
above. In act utilitarianism, a person performs the acts that benefit the most
people, regardless of personal feelings or the societal constraints such as laws.
• Rule utilitarianism takes into account the law and is concerned with fairness. A
rule utilitarian seeks to benefit the most people but through the fairest and most
just means available.
.
Deontology
• Deontological (duty-based) ethics are concerned with what people do, not with the consequences of their actions.
• The word 'deontological' comes from the Greek word deon, which means 'duty'.
• Duty-based ethics are usually what people are talking about when they refer to 'the principle of the thing'.
• Duty-based ethics teaches that some acts are right or wrong because of the sorts of things they are, and people have
a duty to act accordingly, regardless of the good or bad consequences that may be produced.
• It is wrong to kill innocent people, It is wrong to steal, It is wrong to tell lies, It is right to keep promises
• People have a duty to do the right thing, even if it produces a bad result.
In class activity – Continued…
• Nimal, a data analyst for a major stock brokering firm, is working after
normal business hours to finish an important task. He realizes that he is
missing data that had been sent to his coworker Sunil. Nimal had
inadvertently observed Sunil typing his password several days ago and
decides to log into Sunil’s computer and resend the data to himself. Upon
doing so, Nimal sees an open email regarding some illegal activities Sunil has
been doing that might seriously affect the credibility of the company if
discovered by the customers. This might even lead to the cancellation of the
license of the company thereby risking the jobs of over 200 employees.
• Nimal knows he should report this but would have to admit to violating the
company’s information technology regulations by logging into Sunil’s
computer. If he warns Sunil to stop these activities, he will also have to
reveal the source of his information.
• What should Nimal do in this situation?
Credits 29
• Thank you.