Verified Document

Expert Security Software Programmer Works Top Secret Essay

¶ … expert security software programmer works top secret national government country Zulu. There is very little question as to what action a strict deontologist would do in the scenario for this assignment -- he or she would unequivocally adhere to his or her duty. The more pressing question, of course, revolves around just where that duty lies. For a deontologist, that duty would lie with the job at hand and its responsibilities. As one who took an oath to only program software in accordance to the company that he or she works for -- which is essentially operating as an extension of the government that wishes the programmer to 'push the button' and destroy millions of innocent lives in World War II -- it would strongly appear that such an individuals would consider it his or her duty to effectively start World War III.

Moreover, it is interesting to note that such a person would feel no remorse about the situation...

He or she would not feel culpable about the action or its effects that they produced -- whereas a consequentialist certainly would. A deontologist would believe that any action other than following one's duty would not be morally defensible. In fact, deontologists believe that morality is based on upholding virtues such as following procedures, performing one's duty, and other sorts of obligations that exist independent of their results. The duty of the programmer is to program code regardless of the ramifications of doing so. By following that obligation to perform his or her professional duties, such a deontologist effectively absolves himself of any moral complications or ambiguity resulting from such an action -- and indeed, is pleased to be of service and to have performed his or her duty well.
Although Kantian ethics is typically considered a part of deontology (and…

Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now