Ethical Systems Essay

1125 words - 5 pages

Ethical Systems


Without puporting to have any panacea solutions, this paper briefly explores the intersection of two related questions that seem to appear as subtext throughout the ethics literature for our class: to what extent can individuals holding differing ethical conceptions maintain a fruitful dialogue; and under what circumstances, if any, may an individual claim that a given ethical system embraced by another person is wrong? I will first outline the proposed problems individually and then compare them to one another in order to highlight their relationship. My intention is to show that an informed understanding of both questions will help expose an unproductive line of reasoning that initially held sway over this author.

To begin with our first question, "To what extent can individuals holding differing ethical conceptions maintain a fruitful dialogue?", let us first clearly explain what this asks. If two individuals disagree over a fundamental tenent of ethics (such as the choice between consequentialism and nonconsequentialism), whether or not this is obvious at the outset, extended discussion involving justification for their respective ideologies will eventually make this point clear. One participant will claim that an action under a specified set of circumstances has a particular moral value and the other participant will disagree; conference ensues. The discussion usually ends when one participant claims that s/he disagrees on a certain point and that nothing more can be said about the matter. Does this constitiute fruitful dialogue?
As this story has been told, no. It leaves the members of the discussion in the negative position of affirming their ethics at the cost of declaring the other member's ethics false. This, in my opinion, promotes intolerance and contempt for others, and nurtures a sense of moral superiority which hampers interpersonal relationships with people not of identical thinking. It appears to leave the participants with the feeling that discussion is over, cooperation is impossible, and that progress is doomed since we have no ally in the ethically dissenting. To end an ethical conversation with a declaration of incontestible incompatibility fosters an "Us versus Them" mentality in which the only way to acheive any sort of goal is at the expense of those who oppose us; and we naturally oppose any actions taken by the opposite side which we consider immoral. Life becomes an ethical zero-sum game in which there can only be one winner: the ethically correct.

The second question is now visible in this dicussion: under what circumstances, if any, may an individual claim that a given ethical system embraced by another person is wrong? Does this not commit the sin of intolerance and absolutism? But then where is the line between ethical imperialism and refusing to tacitly condone a moral atrocity with silence? Clearly, the difference between consequentialism and nonconsequentialism is bound up in...

Find Another Essay On Ethical Systems

An analysis of strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx Corporation

5469 words - 22 pages Date: 4 April, 2010To: Mr. WillsonFrom: Wang Qin and Xin Jun FangSubject: Strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and emerging technologies, and information systems security within FedEx CorporationEnclosed you will find my analysis with regard to four sections of this report, namely strategic role of information systems, specific social, ethical and legal issues, IT infrastructure and

Why Do Companies Need Ethical Hacking?

1411 words - 6 pages performing regular security checkups. Hiring ethical hackers minimizes the business risk of their systems being hacked by un-authorization hackers, but they can never eliminate these risks completely. However, if a system can be checked thoroughly by experts it can become difficult for the hackers to access the systems and steal data without being detected. The organization cannot act until they know about the security breach this is why they need to

Ethical Hacking and Ethical Hackers

1703 words - 7 pages effort to learn the system's weaknesses so that they can be repaired." they are also called or known as "samurai" or perhaps, "white hat hacker".Ethical hackers typically have very strong programming and computer networking skills and have years of experience in the computer and networking business. They are also adept at installing and maintaining systems that use the more popular operating systems e.g. Windows, Unix and etc. However, besides

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages The use of hacking can be very beneficial as a means of identifying weaknesses in computer security. Nowadays, numerous companies and governments use this technique to assess the level of security of their systems and determine if any valuable information is at risk of being accessed unlawfully. Ethical hackers are employed to identify potential threats on a single computer or a whole network of computers. The found potential exploits are later

Gray-Hat Hacking

2153 words - 9 pages employed by corporations and work on the good side to secure computer systems without breaking into them. Black-hat hackers work on the bad side and attempt to compromise systems in illegal ways. Gray-hat hackers occupy the gray space of hacking and break into systems to learn and expose flaws, often as a service to the computer community. The ethical line dividing white-hat hackers and black-hat hackers is clear. However, the line that separates

Ethical Perspectives

1229 words - 5 pages that each associate must abide by. Understanding character, we see that ethical decisions are made naturally because it is right. I do my best to uphold Bank of America's code in everything I do.In conclusion, there are many differences to the types of ethical perspectives with few related qualities. Individuals from diverse walks of life and belief systems come to their own ethical perspective conclusion in many different ways. My personal ethics

Development of a code of ethics: IT challenges

1721 words - 7 pages 29). Ethics in IT [Magazine]. Computerworld, 41(44), 34. Retrieved from: // http:search.proquest.com/proxy1.ncu Jennings, M. M. (2012). Business Ethics, Case Studies and Selected Readings (Seventh edition.). Phukan, S., & Dhillan, G. (2001). Ethical and intellectual property concerns in a multicultural global economy [Journal]. The electronic journal of information systems in developing countries, 7(3), 1-8. Retrieved from: http://www.ejisdc.org

Ethical Hacking: The Different Types of Hacking

1061 words - 4 pages Certified Ethical Hacker (CEH).” (Simpson, 2010, p. 6). Based off the CEH exam, 22 domains or categories are to be proficiently mastered in order to pass. This exam is the hardest and most challenging to complete. Another exam recognized in the industry is the CISSP (Certified Information Systems Security Professional). One of the requirements of this exam is that one must be sponsored by a user who already holds the CISSP title. This exam

Personal Ethics Paper

827 words - 3 pages , and beliefs as they grow up. This paper will focus on personal ethics development that examines my personal ethical systems, and ground rules. It will focus on the developmental aspect and define the underlying ethical system with the primary concepts, and sources that shapes my ethics. Finally, it will describe what effects ethics has on my work performance, and provide my personal experience while showing why ethics is important to individuals

Technology and The Workplace

1776 words - 7 pages responsibility as the ethical environment reflects managerial value system including personal and organizational perceptions and preferences of morality and known to be fundamental on a person’s attitude towards ends and means believes that ethics are values that traditionally sprouted from religious or organizational influences and may evolve from personal experiences. There is importance in combination of value systems that leads to generalized

Organization Ethics

1349 words - 5 pages ethical behaviors by continue screening applicants before hiring, implementing more training programs for training in ethical standards and self-discipline, mentoring and role model for employees , rewards and appraisal systems for their performance. Employees also need to make sure the Organizational culture will support their Code of Ethics by implementing suggestions from our reading by Kinicki and Kreitner (2009). 1. Enforce

Similar Essays

Teleological And Deontological Ethical Systems Essay

671 words - 3 pages Given the choice between being judged under the teleological and deontological ethical systems most would choose the more lenient system. Teleological ethical systems can be seen as more forgiving than deontological ethical systems, because it believes that good is defined by results. Jeremy Bentham was a supporter of utilitarianism which is a type of teleological ethical system. Utilitarianism system focuses on the consequences of the action

Ethical Issue In Information Systems Essay

1115 words - 4 pages place to protect them. Public and private information can be complex when some individual(s) do not expect their communication to be read outside of their online community. What will be discussed are some ethical responsibilities that need to take place in the United States. Respecting the individual privacy and honor confidentiality is a must in this country. Information Systems such as a computer, internet or tablets are public communication

Ethical Issues In Information Systems Essay

4412 words - 18 pages Ethical Issues in Information Systems Table of Contents 1. Introduction New Technology And New Ethical Issues 2. Networks Definition of a Network 3. Behavior on the Network New Standards of Conduct Netiquette Acceptable Use Policies Exporting Through the Networks Copyrights 4. Networks Access 5. Networks and Privacy 6. Databases Data Mosaics Data Sharing and Consequences 7. Geographic Information Systems International Data: Taking and Sharing

Is Ethical Hacking The Answer To Ensuring The Safety Of Company’s Computer Systems?

1445 words - 6 pages spots are in the security of their computer systems. When a company learns what their security weaknesses are and are able to fix the problems, it will prevent the company from losing income, save the company money and time they may have to spend in fixing cyber attacks, save a company’s reputation, and will save the company from losing valuable company secrets or client data. This is imperative to keeping a company in business. Ethical hackers who