Wednesday, June 5, 2019
Ethical Arguments Of Electronic Surveillance Information Technology Essay
honourable Arguments Of Electronic Surveillance Information Technology Essay1.1 conceptionIn his dystopian masterpiece, 1984, George Orwell portrays a society in which government surveillance has become totally too pervasive with nightmarish consequences. Even though Orwell never envisioned the advent of the internet and how it has become intermit of our daily lives, he understood the dangers of a culture of surveillance and much of what he wrote has become startlingly true. Indeed governments have moved on from traditional spying to electronic surveillance, thanks to the internet and new(prenominal) electronic forms of communication. Corporations too have jumped on the surveillance bandwagon, though for different purposes. This has led to ethical concerns, as illustrated in the case of the research firm Phorm.1.2 Ethical Concerns that Could ArisePhorm is a company in the United Kingdom that developed softw ar that allows it to monitor users online pieceivities without their co nsent. This has ratified ramifications as allowing such activities has caused the European Commission to investigate the UK for breaching rules pertaining to consent to interception of online trans actions. However, the issue has an ethical dimension as well. Phorm has tried to justify its actions citing the returnss to customers and the companies involved. However, is it honourablely and ethically in effect(p) for a corporation, no matter how innocent its purpose, to secretly monitor the activities of internet users without their consent? Do the advantages, both in financial and non- financial terms kisser this seeming violation of basic human right fields? These argon some of the ethical dilemmas posed by this case and they will be critically examined in this report.1.3 Ethical Arguments in Support of Electronic SurveillanceCorporate surveillance is a new form of surveillance by companies of people and groups. The aim is to bring in info for trade purpose which is used by the corporation itself or as in the case of Phorm, sold to third fragmentizey corporations or the government (Brooks and Dunn, 2010). From the companys perspective, this is an first-class form of business intelligence as the data collected can be used to refine marketing strategies to reach the target audience. Direct marketing excessively employs online collective surveillance as evidenced by Google and Yahoo (New York Times, 2007). Governments also make use of corporate surveillance data to monitor the activities of users and collect information to do profiling. The U.S. government has used this approach to a greater extent often in recent years to track down terrorists, and this may be nigh(a) in a sense.The ethical argument in champion of this type of initiative is that it benefits various stakeholders. Electronic surveillance can remedy marketing activities and this leads to more revenue which in turn benefit sh areholders and the employees of the corporation that uses the services of electronic surveillance company data. Supposedly, when shareholder and employee wealth is truismized, it elevates the standard of living and thus, benefits society as a whole. True, customers are literally spied on but there is no physical damage done. Most customers are oblivious and what they do non make do would not harm them. In fact, such improved marketing could even help them make better terminations when buying products and services since they will receive advertisements on things that engagement them. These are some of the arguments that are used to support electronic surveillance by corporations.1.4 Ethical Arguments Against this Type of InitiativeTo answer why corporate electronic surveillance is unethical and unjustifiable, we need to frame it in ethical terms. Let us look at it from the theory of consequentialism. Consequentialists are intent on maximizing the utility produced by a decision (Ermann et al, 1990). For them, the rightness of an act dep ends on its consequences. Consequentialism holds that an act is morally right if and solely if that act maximizes the net good. In other words, an act and therefore a decision is ethical if its favourable consequences outweigh its negative consequences. Moreover, some believe that only the act that maximizes the net benefit of favourable minus the negative consequences is morally right or ethical. Philosophers also debate what consequences should be counted, how they should be counted and who deserves to be included in the set of change stakeholders that should be considered (Brooks and Dunn, 2010).Therefore, corporate electronic surveillance is morally wrong because it does not maximize the net good. True, it may improve sales slightly if done in secret but if customers are aware that they are being spied on, they will feel violated and alienate the company altogether. Other potential customers may timid away from the company as well. In the end, such a move could seriously back fire and negatively impact shareholders. The net disadvantages dramatically outweigh the advantages. It is also illegal since such activities constitute a breach of international laws on internet privacy.Deontology is different from consequentialism in that deontologists focus on the obligations or duties motivating a decision or actions that on the consequences of the action (MacKinnon, 1998). Deontological ethics takes the incline that rightness depends on the respect turn inn for duty, and the rights and fairness that those duties reflect. Consequently, a deontological approach raises issues relating to duties, rights and justice considerations and teaches students to use moral standards, rules and rules as a guide to fashioning the best ethical decisions (Caroll, 1991).Deontological reasoning is largely based on the thinking of Immanuel Kant. He argued that a rational individual devising a decision about what would be good to do, would consider what action would be good fo r all members of society to do. Such an act would improve the well-being of the decision maker and the well-being of society as well. Kant began to search for an overriding principle that would guide all action an imperative that everybody should follow without exception, which could therefore be considered universal or categorical (Brooks and Dunn, 2010). His search led to what is have it awayn as Kants Categorical Imperative, which is a dominant principle or rule for deontologists. Kants pencil lead indicates that there is a duty or imperative to always act in such a way that you can also will the maxim of your action should become a universal law (MacKinnon, 1998). This means that if you cannot will that everyone follow the same decision rule, your rule is not a moral one.As a universal principle, everyone should follow it. Moreover, the Golden Rule do unto others as you would have them do unto you would readily qualify as a universal headliner (Forrester and Morrision, 199 0). Using the same approach could yield a universal respect for human rights and for fair treatment of all. This can be best achieved by adopting the position that one must fulfil obligations or duties that respect moral or human rights and legal or contract rights (Flaherty, 1989). Furthermore, it can only he achieved if individuals act with enlightened self- rice beer rather than pure self-interest. Under enlightened self-interest, the interests of individuals are taken into account in decisions (Verschoor, 1988). They are not simply ignored or overridden. Individuals are considered ends rather than used as means to achieve an end or objective. Actions based on duty, rights and justice considerations are particularly important to tradeals, directors and executives who are expected to fulfil the obligations of a fiduciary (Wartick and Cochran, 1985).In classical management, it has been repeatedly argued that the only fiduciary duty management owes is to the shareholders of a corpo ration. Thus, if activities are disadvantageous to customers, it does not matter. However, such thinking has gradually gone out of favour as corporations now realize the importance of embracing all their stakeholders (Freeman, 1984). Hence, electronic surveillance would be deemed enlightened self-interest in the old way of thinking but it is now regarded as pure self-interest. Companies that spy on customers are violating their privacy and show them no respect, which is a breach of duty of care . Electronic surveillance also goes against the Golden Rule so there is no deontological basis in support of electronic surveillance.From the above discussion, it is obvious that the arguments against electronic surveillance far outweigh those in support of it. For every argument in support, there are a few against it. Hence, corporations should stop it and use other methods that are more respectable, ethical and legal to gather marketing data.1.5 ConclusionThe ethical arguments in support of corporate electronic surveillance are scant and specious. At best, it leads to improved sales and happy shareholders but it severely undermines the basic principle of respecting the privacy of others. The right to privacy is a right to be free from certain intrusions. It is highly intrusive to have all of ones online activities monitored and used to create a database about the users likes and preferences, specially when the user is an unwilling party. From all ethical perspectives, whether utilitarian, deontological consequentialism, there is small-minded or no basis in support of such activities.Task Two2.1 IntroductionTo Phorm, its monitoring bundle may be a legitimate form of business. However, as a software developer, it must yield by the professional reckon of conduct regarding professional responsibility. The question here is whether there is a conflict of interest between its business activities and its professional responsibilities.2.2 Conflicts with software developer s professional responsibilitiesSoftware ontogeny and engineering is a profession. As such, it has professional associations which like all other professional associations have their own code of conduct regarding professional responsibility. This is done to safety device the reputation of the profession and to maintain the highest standards of ethics. Among the professional associations for software developers are AMC, IEEE, APEGBC and the Institute for Certification of Computing Professionals (ICCP). To be a member of these associations, one must abide by the respective code of ethics and professional responsibility. Failure to do so would result in suspension or revocation of license to enforce the profession.The Software Engineering Code of Ethics and Professional Practice states that software developers should be committed to devising the design, compendium, development, testing and maintenance of software a esteem and beneficial profession and that all engineers should adh ere to eight basic principles. Principle 6 relates to professional responsibility. This clearly stipulates that software developers shall advance the integrity and reputation of the profession that is consistent with the public interest. Among other things, a software developer should not promote their own interest at the expense of the profession, client or employer (6.05), obey all laws governing their work, unless in exceptional circumstances, compliance is inconsistent with the public interest (6.06) and avoid associations with businesses and organizations which are in conflict with this code (6.10).Based on this principle alone, Phorm has made many breaches of professional ethics. Monitoring software such as the one developed by Phorm goes against this professional responsibility code. In fact, this action goes against the interest of customers since it monitors their online activities without their knowledge. Similarly, such an action is inconsistent with public interest as it is morally, ethically and legally wrong for companies to do surveillance on the public without their knowledge (Flaherty, 1989). Phorm should know better than to conduct business that is in conflict with a professional code of conduct. Even though its software developers may not be members of this particularized professional organization, they are sure to be members of other organizations which would have similar guidelines.Phorms actions also conflict with principle one of this code which concerns the public. It states that software engineers should act consistently with the public interest. According to paragraph 1.03, software developers should approve software only if they have a well-founded belief that it is safe, meets specifications, passes appropriate tests and does not diminish the timberland of life, diminish privacy or harm the environment.Phorms monitoring software diminishes individual privacy. According to Warren and Brandies (1890), privacy can be defined as a rig ht to be left alone. It is widely regarded that privacy is a basic human right. Phorms case is a good illustration of the riddles concerning internet privacy. This is because while intimately agree that internet privacy must be protected, there is debate on the extent it should be protected. Should privacy breastplate be accorded to email manipulation or to websites visited as well? Privacy protection is a vital part of democracy but many countries in the world, most noticeably China, are not democracies and therefore have no qualms about seriously undermining internet privacy. Nevertheless, such arguments are mainly about the rights of governments to monitor the activities of citizens for the greater good, for instance protection against terrorism. However, in terms of corporate surveillance, laws and professional codes explicitly prohibit it.2.3 Suitability of an established code of computer ethics or an ethical decision making modelThere are many professional codes of ethics such as the one mentioned in the previous section that helps professionals make ethical decisions. The problem is that they are general and not company specific. Also, some employees in a corporation are not members of a professional organization and therefore do not feel obliged to follow the guidelines stipulated by these organizations. For example, software developers may be against developing monitoring software, but if the CEO compels them to do so, they have little choice but to follow orders or leave the organization. To overcome this problem, each corporation should have its own code of ethics and ethical decision making model to make the right choice.A decision making model must be designed to enhance ethical reasoning by providing insights into the credit and analysis of key issues to be considered and questions or challenges to be raised and approaches to combining and applying decision relevant factors into practical action (Brook and Dunn, 2010). A decision or action i s considered ethical or right if it conforms to certain standards. One standard alone is insufficient to ensure an ethical decision. Consequently, an ethical decision making framework should be designed so that decisions or actions are compared against four standards for a comprehensive assessment of ethical behaviour.The ethical decision making model assesses the ethicality of a decision or action by examining the consequences or well-offness created in terms of net benefits or costs, rights and duties affected, fairness involved and motivation or virtues expected (Paine, 1994).The first trinity of these considerations consequentialism, deontology and justice are examined by foc utilise on the impacts of a decision on shareholders and other affected stakeholders, an approach known as stakeholder impact analysis (Caroll, 1991). The fourth consideration, the motivation of the decision maker is known as virtue ethics (Pastin, 1986). It provides insights likely to be helpful when ass essing current and future governance problems as part of a normal risk management exercise. All four considerations must be examined thoroughly and appropriate ethical values must be applied in the decision and its implementation if a decision or action is to be defensible ethically.There are three steps for making an ethical decision (Velasquez, 1992). Step one is identifying the facts and all stakeholder groups and interests likely to be affected. Step two is to rank the stakeholders and their interest, identifying the most important and weighing them more than other issues in the analysis. The final step is to assess the impact of the proposed action on each stakeholder group interests with regard to their well-being, fairness of treatment and other rights, including virtue expectations, using a comprehensive framework of questions and making sure that the common pitfalls do not enter into the analysis. These pitfalls include conforming to an unethical corporate culture, misinter preting public expectations and concentrate on short term profits and shareholder only impacts (Paine, 1994).It may be helpful to organize an ethical decision analysis using the seven steps outlined by the American Accounting Association (1993) (Cited in Brooke and Dunn, 2010). One, determine the facts such as what, who, when, where and how. Two, define the ethical issues. Three, identify major principles, rules and values. Four, bound the alternatives. Five, compare values and alternatives and see if a clear decision emerges. Six, asses the consequences and finally make the decision.2.4 ConclusionThe development and implementation of involuntary electronic monitoring, such as done by Phorm conflicts with software developers professional responsibilities. This is because no professional association of software developers would ever sanction the creation of software that violates the privacy of users and goes against the best interest of society. To overcome such a situation, each IT organization must have its own corporate code of ethics. This should compliment the professional code of ethics of software developers and serve to ensure the highest ethical standards. Yet it is not enough for a company to create a good ethics policy. Implementation is the hard part and high ethical conduct must flow from top to bottom and there must be zero tolerance for breach of professional ethics. It is only by instituting such strict policies that activities like monitoring users internet usage can be curbed.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.