Featured Post
Love at First Sight- Personal Narrative
A second in time where two individuals feel an amazing association towards each other is delegated ââ¬Å"Love at First Sight. â⬠...
Thursday, October 31, 2019
434Mod1Case Essay Example | Topics and Well Written Essays - 750 words
434Mod1Case - Essay Example Often cyber ethics education is based on one significant theory or combination of two theories. The two major theoretical approaches are teleological and deontological theories. Teleological theories states actionââ¬â¢s consequences to be a measure of actionââ¬â¢s good. On the other hand deontological theories consider actionââ¬â¢s righteousness to be above goodness. Utilitarian foundation is a part of teleological theories. This foundation states that action of an individual should be able to maximize happiness and good for all who are affected by such actions. It highlights the factor that actions of a person should be based on probable consequences that may be resulted by the action before it is been executed. This theory claims that a person should think about each and every individual and not just person taking a decision. Deontological theory is an ethical study based on duties. It considers duty and fidelity toward principle to be most essential factors (Gold, 2010). This theory states that an actionââ¬â¢s consequences are not that important in comparison to rightness of the action. As per this theory an action is said to be valid if actions that are taken by individuals do not lead to any form of contradiction. The basic concept of this theory is that individuals should work according to their intelligence and virtue; act justly, should tell truth and avoid any form of injury towards others. Both the theories have different elements which state the importance of cyber ethics. This form of education has gained its importance in the recent years where stealing music or video is considered to be equivalent to actual theft. Students are made aware about the different cyber crimes and its impact on others (Starr, 2011). Information technology in the present scenario has given liberty to individuals to access various data but also it has posed a threat to oneââ¬â¢s privacy. In American schools
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.