Ethics in Technology - D333 Leave the first rating Students also studied Terms in this set (73) Arts and HumanitiesPhilosophy Ethics Save
Ethics in Technology: Section 1 - 4 St...
90 terms oghugenutPreview AP Study Guide (Conscience and Au...24 terms amayahjones6 Preview Abortion Unit PHIL140 72 terms Roberts0613Preview
- theo
10 terms van Virtue ethicsan approach to ethics organized around the idea of human flourishing and human excellence. Its basic assumption is that all human beings share some basic qualities of character, though we vary widely in how much we excel at those qualities and how we express them, and each of us gets better (or worse) at them according to our experiences. It further assumes that human beings are concerned with how to live the good life and that ethics is a subset of what it means to live a full and happy life.Deontology Philisophical Theoryemphasizes the rightness or wrongness of an action by reference to certain action-guiding principles. Depending on the context, these principles can be described as laws, rules, maxims, imperatives, or commands. Whatever the terms used, these principles are said to place certain constraints on human action. These constraints apply—or at the very least must be seriously considered—even in situations in which the consequences of an action are understood to be desirable or good.Utilitarianism Philisophical Theoryan approach to ethics organized around the idea of happiness which assumes that human beings are motivated by the desire to be happy.Kantian ethicsa deontological ethical theory, focuses on the intrinsic rightness or wrongness of actions rather than their consequences. Moral principles are derived from rationality and are universal, meaning they apply to everyone, at all times, regardless of the outcomes.Ethicsthe philosophical study of morality. It involves the systematic analysis and evaluation of moral concepts and principles to determine what is right, wrong, or good, and seeks to create general principles or theories to explain and guide moral behavior.
Moralitypersonal or societal beliefs, values, and principles about what is right and wrong behavior. It often represents the actual practices or norms that guide how individuals or groups behave.Corporate social responsibilityThe concept that businesses have a responsibility beyond profit-making to contribute positively to society and the environment. It involves companies integrating social, environmental, and ethical considerations into their operations and decision-making processes Environmental, social, and governance policies Refers to a set of criteria used to evaluate a company's performance in areas related to sustainability, social responsibility, and corporate governance.Factors are considered by investors, regulators, and other stakeholders to assess the long-term risks, opportunities, and ethical impact of a company’s operations.These criteria go beyond traditional financial metrics to provide a broader view of a company's impact and resilience.Consequentialism Ethical TheoryAn ethical theory that evaluates the morality of an action based on its outcomes or consequences. An action is considered morally right if it leads to good or desirable results, and morally wrong if it leads to bad or harmful consequences.The primary focus of it is not the action itself, but the intent behind it, or the principles guiding it, but rather the results it produces.Relativism Ethical Theoryethical theory is the view that moral judgments and values are not absolute but rather relative to the individual, culture, or context. There is no single, objective standard of right or wrong that applies universally to all people at all times.Instead, what is considered morally right or wrong depends on the society, culture, or personal beliefs of those making the judgment.The 3 major approaches to ethical reasoningVirtue Ethics Deontology Consequentialism Virtue Ethical Theoryethical theory that emphasizes the role of character and virtues in moral philosophy rather than focusing solely on the rules or consequences of actions Accessthe idea of ensuring that individuals or groups have the ability to obtain, use, and benefit from resources, services, or opportunities.Accuracypertains to the importance of truthfulness, precision, and reliability in communication, information dissemination, and decision-making Propertyin ethics pertains to the moral and ethical considerations surrounding ownership, use, and distribution of property and resources. It encompasses various dimensions, including legal rights, social justice, and the ethical implications of how property is acquired and used.Privacymoral and ethical considerations surrounding individuals' rights to control their personal information, maintain confidentiality, and protect their personal space from intrusion.
What is a reason for organizations to pursue corporate social responsibility (CSR)? goals?gain goodwill Whistleblowingthe act of reporting or exposing misconduct, unethical behavior, or illegal activities within an organization, often by an employee or insider.Industrial espionagethe covert and often illegal act of gathering confidential or proprietary information from businesses or organizations for commercial advantage. This practice is typically conducted by competitors or rival firms to gain insights into trade secrets, business strategies, product designs, customer lists, marketing plans, and other sensitive information that can provide a competitive edge.Corruptionthe abuse of power or position for personal gain, typically involving unethical or illegal practices. It manifests in various forms, including bribery, embezzlement, nepotism, favoritism, and fraud, and can occur in both public and private sectors.Nepotismthe practice of favoring relatives or close friends when making hiring decisions, awarding contracts, or granting promotions, often regardless of their qualifications or merit.Perimeter Securitythe measures and systems put in place to protect the boundaries of a physical property or area from unauthorized access, intrusions, or attacks.Endpoint Securitythe practice of securing endpoints or devices that connect to a corporate network, such as computers, laptops, smartphones, tablets, and other connected devices.Layered Securityalso known as defense in depth, is a comprehensive cybersecurity strategy that employs multiple layers of security controls and measures to protect information and resources from a variety of threats.On-premises Securitythe measures and strategies implemented to protect data, applications, and physical assets within an organization's own facilities or local data centers. This approach typically involves using physical security controls, network security protocols, and various software solutions to safeguard information and resources that are stored or managed on-site, rather than in the cloud or through third-party services.Wiretap Actformally known as the Electronic Communications Privacy Act (ECPA) of 1986, is a United States federal law that establishes the legal framework for the interception and disclosure of electronic communications. It is primarily concerned with protecting the privacy of individuals in their communications, whether through telephone calls, emails, or other electronic means. It sets forth the conditions under which law enforcement and private parties may intercept or access electronic communications.Foreign Intelligence Surveillance ActUnited States federal law enacted in 1978 that governs the procedures for surveillance and collection of foreign intelligence information. It allows the government to conduct surveillance on foreign powers and agents of foreign powers, including international terrorists, while establishing a framework for protecting the privacy rights of U.S. citizens.
Gramm-Leach-Bliley Actalso known as the Financial Services Modernization Act of 1999, is a U.S. federal law that provides a framework for the regulation of financial institutions. The Act effectively repealed parts of the Glass-Steagall Act of 1933, which had previously established a separation between commercial banking, investment banking, and insurance services. It allows financial institutions to consolidate and offer a combination of these services, promoting competition and efficiency in the financial services industry.USA PATRIOT Acta significant piece of legislation enacted in the United States shortly after the September 11, 2001, terrorist attacks. The acronym stands for "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism." The Act was signed into law on October 26, 2001, and it expanded the government's surveillance and law enforcement powers in an effort to combat terrorism and enhance national security.General Data Protection Regulationa comprehensive data protection law enacted by the European Union (EU) that came into effect on May 25, 2018. aims to enhance individuals' control over their personal data and to unify data protection laws across Europe. It applies to all organizations that collect, process, or store personal data of individuals within the EU, regardless of where the organization is located.EU Data Protection Directiveofficially known as Directive 95/46/EC, was a foundational piece of legislation in the European Union that established a framework for data protection and privacy rights for individuals within the EU. Adopted in 1995, it was designed to harmonize data protection laws across EU member states and to protect the fundamental rights and freedoms of individuals with regard to the processing of personal data.Freedom of Information ActUnited States federal law enacted in 1966 that grants the public the right to access information held by federal government agencies. The FOIA is designed to promote transparency and accountability in government by allowing individuals to request and obtain government records, thereby fostering an informed citizenry.American Recovery and Reinvestment Actcommonly known as the Stimulus Act, was a piece of legislation enacted in the United States in response to the economic crisis of 2007-2008. Signed into law by President Barack Obama on February 17, 2009, it aimed to stimulate economic growth, create jobs, and provide relief to those affected by the recession.Fair Credit Reporting Actis a federal law enacted in the United States in 1970 that regulates the collection, dissemination, and use of consumer credit information. It is designed to protect consumers' privacy and ensure that the information contained in consumer credit reports is accurate and used fairly. The law applies to consumer reporting agencies, credit reporting companies, and other entities that use or provide consumer credit information.False Claims Acta federal law enacted in the United States in 1863 that allows individuals (known as "whistleblowers") to file lawsuits on behalf of the government against entities that commit fraud against federal programs or contracts. It is designed to combat fraud in government procurement and healthcare by imposing liability on individuals and companies that knowingly submit false claims for payment.