Wednesday, May 6, 2020
Every Click You Take Theyââ¬â¢ll Be Watching You â⬠MyAssignmenthelp.com
Question: Discuss about the Every Click You Take Theyll Be Watching You. Answer: This article talks about an advanced technological tool that is inbuilt in iPhones so that it can help out the law to find out any type of criminal activities (The Sydney Morning Herald, 2017). The inbuilt technology of iPhones has the ability to retain the information even after it has been removed by the user. According to the forensic research team, most of the iPhone users have no idea about completely removing all the information. Jonathan Zdziarski is a well known former hacker. He had written a book named iPhone Forensics. The law agencies had asked him to train and teach them about the information storage as well as the retrieval of information from iPhone. This phone has an automatic capability of capturing images when the user switches from one application to another. The Urbanspoon application helps to find out restaurants in the city. The iPhone has the ability to store everything that is typed and stored for autocorrect purpose. A person with great expertise knowledge will be able to find out what the user has messaged to several months ago even if the original message and email has been deleted. The in-built mapping or tracking application will keep track of every move of the iPhone users by taking screenshots of the activity and storing in the device (The Sydney Morning Herald, 2017). The photos that are present in the phone are tagged that identify specific information regarding the place and time. Other information stored in the system is the browser history and the other details. This essay analyses the article in terms of the four main classical theories of ethics. The theories that are used in this essay in order to find out whether this act is ethical or not are the Utilitarianism theory, Virtue Ethics, Deontology theory as well as the Contract theory. The Utilitarianism theory focuses on the utility of huge number of people. Utility here refers to the pleasure of the people is not related to the usage (Arntzenius, 2014). This theory is based on consequences of an act or policy. If any act or policy produces happiness among maximum number of people then it is said that the act that is performed or the policy that is implemented is ethical in nature (Broad, 2014). In this article it is seen that iPhone has the ability to store data even after the users delete it. It is used for detecting any crime and identifying criminal activities. The users who are not involved in any criminal activities can feel that they do not have enough privacy. Privacy is a human right. A hacker can track any targeted user at any time. From the perspective of the users this act does not spread happiness and therefore it cannot be considered to be ethical. From the perspective of the police this act is ethical because it helps to keep the society happy by id entifying criminals and reducing the rate of criminal activities. Utilitarianism theory will support the tracking ability of iPhone as it will reduce crime and keep the society happy. Deontological ethics is based on obeying rules and carrying out duties in an ethical manner (Lazar, 2017). It focuses on justice. This justification will pay attention to the entity that is being surveyed. The inbuilt technology of the iPhone is said to store details of the activities of the users. In the given article it is said that the police can use this technology to arrest criminals ((Ross, 2013). Here the entity is the criminal and he or she deserves to be monitored. Therefore this activity will protect the society and will punish the criminals. Deontological theory will accept the concept of tracking individual record for the purpose of identifying criminals and arresting them for the welfare of the society. Virtue ethics focuses on the character and the moral values of an individual person (At hanassoulis, 2013). Every person has a certain character based on development and training that has been provided to them in their entire life. This inbuilt technology in iPhone will make the users conscious before committing any kind of criminal activity (Van Hooft, 2014). If a person is being constantly monitored then he or she tends to behave in a proper and ethical way. This will develop the ethical sense and the moral values of a person. Therefore from the perspective of Virtue Ethics, this act is ethically correct. Contract theory states that the presence of a contract will promote ethical acts. The contract acts as a promise (Fried, 2015). The person will feel obligated to perform activities in an ethical manner. In this case if an iPhone user wants to commit a crime then he or she will hesitate (K?szegi, 2014). The users will feel obligated to perform morally correct activities. Therefore, the contract theory suggests that this technology of tracking the records act as a con tract and it is ethically permissible. This essay concludes that the inbuilt technology of iPhone will promote ethical activities because the criminals will become aware of the technology and hesitate to commit any crime. This essay has taken four theories of ethics into account and judges the article. The Utilitarianism theory supported this technology because it promotes the happiness of the society by indentifying the criminals and punishing them. The Virtue Ethics and Social Contract theory also said that it is an ethical act because it promotes ethical behavior among the users. The Deontology theory said that the inbuilt application that records the data of the users helps to monitor the criminal activities and therefore it is ethical. The inbuilt application that records the data can be only retrieved by the forensic department and police in order to find out whether the user has committed any crime or not. Therefore, it is ethically permissible. References Arntzenius, F. (2014). Utilitarianism, decision theory and eternity.Philosophical Perspectives,28(1), 31-58. Athanassoulis, N. (2013).Virtue ethics. AC Black. Broad, C. D. (2014).Five types of ethical theory(Vol. 2). Routledge. Fried, C. (2015).Contract as promise: A theory of contractual obligation. Oxford University Press, USA. K?szegi, B. (2014). Behavioral contract theory.Journal of Economic Literature,52(4), 1075-1118. Lazar, S. (2017). Deontological Decision Theory and Agent-Centered Options.Ethics,127(3), 579-609. Ross, D. (2013).Foundations of ethics. Read Books Ltd. The Sydney Morning Herald. (2017).Every click you take, they'll be watching you. Retrieved 19 September 2017, from https://www.smh.com.au/digital-life/iphone/every-click-you-take-theyll-be-watching-you-20100917-15gbx.html Van Hooft, S. (2014).Understanding virtue ethics. Routledge. Vaughn, L. (2015).Doing ethics: Moral reasoning and contemporary issues. WW Norton Company. ed of any crime then the police along with the Apple Inc will be able to retrieve the data.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.