Different ethical arguments

Assignment Help Basic Computer Science
Reference no: EM131386757

As your lecture points out, there are many different ethical arguments, but two large groups of thought are deontological (largely associated with the work of Immanuel Kant) and telelogical ethics (largely associated with John Stuart Mill). The first believes that we should judge our ethics based on the idea of universal understandings. For example, it is logical that all persons do not wish to be harmed, so ethically we can establish a principle based on this. So, under this line of thought, if it is ethically wrong to harm a person, then the death penalty must be ethically wrong, because it violates this principle. If you follow this ethical approach, all ethical questions must be evaluated in accordance to these universal principles. In contrast, telelogical ethics, which utilizes utilitarian thought, looks to the outcome of the action and weighs if it is good based on its impact on the majority. For example, in considering the idea of the death penalty again, one must weigh whether utilizing the death penalty benefits the majority of the population. If the majority is helped, then the action is viewed as ethically sound; if the majority is hurt, it is not. In understanding these thoughts and approaches, what do you think about cloning? Is there a universal thought it may violate? Or can it be considered as good for a majority? What are your thoughts, and what are the different questions that can be raised behind them?

Reference no: EM131386757

Questions Cloud

Linux servers versus windows servers : What advantages are offered by Linux servers versus Windows servers? Do a little research and discuss the types of Linux servers found in networks. What do you consider the most important role of Linux servers in a network?
Define and understand sip : We had to clearly define and understand SIP before we could get into SIP trunk. SIP Trunk provides the same service you get from a traditional analog phone line.
Implement the banker algorithm for deadlock avoidance : Implement the Banker's algorithm for deadlock avoidance, that works on a given set of N processes and M resource types (N
Set of odd integers : Let O = {x ∈ Z | x is odd} be the set of odd integers and E = {x ∈ Z | x is even} be the set of even integers. (a) Explain whether {O, E} is a partition of Z. (b) Explain whether {O × O, E × E} is a partition of Z × Z. If the answer is no for eith..
Different ethical arguments : As your lecture points out, there are many different ethical arguments, but two large groups of thought are deontological (largely associated with the work of Immanuel Kant) and telelogical ethics (largely associated with John Stuart Mill).
How each of the steps applies to your specific organization : Ascertain how each of the steps applies to your specific organization.Develop a strategy that illustrates how you would address each of the eight (8) stages of change:Establishing a sense of urgency,Creating coalition,Developing vision and strategy,C..
Critique a journal article : MGT 524 Research Methods in Business - Individual Assignment. Read the article you are to critique once to get an overview. Then read it again, critically. At this point you may want to make some notes to yourself on your copy. The following are so..
Consider the future growth and success of the company : Given the wide variety of employees in the company (ranging from senior executive staff to senior management, middle management, supervisors, laborers, and truck drivers), evaluate the compensation models and benefit packages that would be appropr..
Detect failures in distributed systems : Give an example of a traditional mechanism used to detect failures in distributed systems. Give an example of a traditional mechanism used to improve availability in distributed systems.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Demonstrate that the asymptotic behavior of the learn

The issue of interest is to demonstrate that the asymptotic behavior of the learn ingrate parameter η (x) in Eq. (4.85) does not converge to zero as the number of iterations increases to infinity.

  Anomalous behaviour of fifo

Describe Belady's anomaly and provide an example that illustrates anomalous behaviour of FIFO.

  Designing an active directory infrastructure

What are some factors or requirements when designing an Active Directory Infrastructure? How do you gather the requirements for the design? Please explain in approximately in two paragraphs.

  Discuss possible problems with this system of quality

Discuss possible problems with this system of quality management.

  Effects of compromised security

What do you think are some of the effects of compromised security in the key areas of security infrastructure design? Provide examples with your response.

  Convert fahrenheit to celsius

a program that will convert Fahrenheit to Celsius. The user will enter the degrees in Fahrenheit and the program will give the results in Celsius. This is to be done in Pseudo Code Only. good programming techniques. Must also use modular programmi..

  Change on integrative information technology

Examine the primary reasons why project management causes a cultural change and the impact of that change on integrative information technology.

  Key concept in information systems

Use the Internet or the Strayer Library to research one (1) concept in information systems that you have studied in this course. You may select a topic of your choice or you may use one (1) of the following:

  Supervisor describing the programming language

Write a memo to your supervisor describing the programming language you would use to develop this tool and the method for verifying the information Alexander Rocco management requested.

  Find and prove matching upper and lower bounds

You can place objects on each side of the scale and see which collection is heavier. Your goal is to find the heavier object, with the minimum number of weighings. Find and prove matching upper and lower bounds for this problem.

  Determine the next flavor of beer

Dell's Ideastorm, Best Buy's IdeaX, New York city's Simplicity, and Samuel Adams' Facebook application to determine the next flavor of beer are a few of the examples that use crowdsourcing. From the e-Activity, assess whether ideasourcing generates t..

  Create scenario making purchase or develop use case diagram

You are developing the requirements for an online shopping system. To place an order, a user connects to the system, searches to find items to purchase, selects one or more items, and supplies credit card information to pay for them.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd