Verified Document

Expert Security Software Programmer Works Top Secret Essay

¶ … expert security software programmer works top secret national government country Zulu. There is very little question as to what action a strict deontologist would do in the scenario for this assignment -- he or she would unequivocally adhere to his or her duty. The more pressing question, of course, revolves around just where that duty lies. For a deontologist, that duty would lie with the job at hand and its responsibilities. As one who took an oath to only program software in accordance to the company that he or she works for -- which is essentially operating as an extension of the government that wishes the programmer to 'push the button' and destroy millions of innocent lives in World War II -- it would strongly appear that such an individuals would consider it his or her duty to effectively start World War III.

Moreover, it is interesting to note that such a person would feel no remorse about the situation...

He or she would not feel culpable about the action or its effects that they produced -- whereas a consequentialist certainly would. A deontologist would believe that any action other than following one's duty would not be morally defensible. In fact, deontologists believe that morality is based on upholding virtues such as following procedures, performing one's duty, and other sorts of obligations that exist independent of their results. The duty of the programmer is to program code regardless of the ramifications of doing so. By following that obligation to perform his or her professional duties, such a deontologist effectively absolves himself of any moral complications or ambiguity resulting from such an action -- and indeed, is pleased to be of service and to have performed his or her duty well.
Although Kantian ethics is typically considered a part of deontology (and…

Cite this Document:
Copy Bibliography Citation

Related Documents

EU Open Source Software Legal
Words: 6964 Length: 25 Document Type: Term Paper

" (Information Society and Media, 2005) f. The eContent Programme and the eTen Programme The 100 million dollar eContent Programme (2001-2005) focuses on encouraging growth and development of tie European digital content industry. This programme funds projects with short time-to-market and as well experiments with new models in business and partnerships through use of technology that is presently available. The programme's stated 'main thrust' is to; Improve access to an expand the

Cyber Warfare Over the Ages
Words: 2213 Length: 7 Document Type: Essay

This piece of information revealed that the malware program had infected resulted in heavy damage for the Iranian nuclear enrichment facilities. The program became the very first of its kind as there had never been any cyber attacks that lead to a computer program resulting in physical damage to mechanical systems on a large scale basis as was the desired attacked of the program. Additionally, the malware program also

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Open Source Social Science
Words: 3536 Length: 13 Document Type: Term Paper

Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global

Released by the FBI and
Words: 17274 Length: 65 Document Type: Research Proposal

" Human development- behavioral shifts in human being that tae place during the course of an entire lifespan ("Human Behavior"). Risk Analysis- the activity of determining and analyzing the dangerous natural and human caused negative events. This analysis takes into consideration the risks these event pose to businesses individuals and governments. Within the domain of information technology risk analysis reports are utilized to tailor technology-related objectives with a an organization's business objectives.

Hackers Hacking Has an Interesting
Words: 1922 Length: 6 Document Type: Thesis

For his activities, he was banned from using the Oxford University computers. Here he also built his first computer from scratch, using a soldering iron, TTL gates, and M6800 processor and a television. Later, Berners-Lee worked with CERN, a nuclear research organization in Europe. Here he created a hypertext prototype system to facilitate sharing and updating information. Later, Berners-Lee combined hypertext with the Internet, and the World Wide Web was

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now