Expert Security Software Programmer Works Top Secret Essay

PAGES
2
WORDS
618
Cite

¶ … expert security software programmer works top secret national government country Zulu. There is very little question as to what action a strict deontologist would do in the scenario for this assignment -- he or she would unequivocally adhere to his or her duty. The more pressing question, of course, revolves around just where that duty lies. For a deontologist, that duty would lie with the job at hand and its responsibilities. As one who took an oath to only program software in accordance to the company that he or she works for -- which is essentially operating as an extension of the government that wishes the programmer to 'push the button' and destroy millions of innocent lives in World War II -- it would strongly appear that such an individuals would consider it his or her duty to effectively start World War III.

Moreover, it is interesting to note that such a person would feel no remorse about the situation...

...

He or she would not feel culpable about the action or its effects that they produced -- whereas a consequentialist certainly would. A deontologist would believe that any action other than following one's duty would not be morally defensible. In fact, deontologists believe that morality is based on upholding virtues such as following procedures, performing one's duty, and other sorts of obligations that exist independent of their results. The duty of the programmer is to program code regardless of the ramifications of doing so. By following that obligation to perform his or her professional duties, such a deontologist effectively absolves himself of any moral complications or ambiguity resulting from such an action -- and indeed, is pleased to be of service and to have performed his or her duty well.
Although Kantian ethics is typically considered a part of deontology (and…

Cite this Document:

"Expert Security Software Programmer Works Top Secret" (2013, April 19) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/expert-security-software-programmer-works-89906

"Expert Security Software Programmer Works Top Secret" 19 April 2013. Web.24 April. 2024. <
https://www.paperdue.com/essay/expert-security-software-programmer-works-89906>

"Expert Security Software Programmer Works Top Secret", 19 April 2013, Accessed.24 April. 2024,
https://www.paperdue.com/essay/expert-security-software-programmer-works-89906

Related Documents

" (Information Society and Media, 2005) f. The eContent Programme and the eTen Programme The 100 million dollar eContent Programme (2001-2005) focuses on encouraging growth and development of tie European digital content industry. This programme funds projects with short time-to-market and as well experiments with new models in business and partnerships through use of technology that is presently available. The programme's stated 'main thrust' is to; Improve access to an expand the

This piece of information revealed that the malware program had infected resulted in heavy damage for the Iranian nuclear enrichment facilities. The program became the very first of its kind as there had never been any cyber attacks that lead to a computer program resulting in physical damage to mechanical systems on a large scale basis as was the desired attacked of the program. Additionally, the malware program also

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Open Source Social Science
PAGES 13 WORDS 3536

Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global

Released by the FBI and
PAGES 65 WORDS 17274

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

For his activities, he was banned from using the Oxford University computers. Here he also built his first computer from scratch, using a soldering iron, TTL gates, and M6800 processor and a television. Later, Berners-Lee worked with CERN, a nuclear research organization in Europe. Here he created a hypertext prototype system to facilitate sharing and updating information. Later, Berners-Lee combined hypertext with the Internet, and the World Wide Web was