Question? Call Us  +1 (817) 546-4770

3002111 Information Technology Ethics

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

3002111 Information Technology Ethics

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

3002111 Information Technology Ethics

0 Download7 Pages / 1,616 Words

Course Code: 3002111
University: Southern Cross University is not sponsored or endorsed by this college or university

Country: Australia

Analyze the article/case study from the perspective of four classical ethical theories including utilitarianism, deontology, contract, and virtue. You should present well-reasoned arguments for your assessments and recommendations. 

Computer ethics refers to the set of the principles, procedures, practices, and values that govern the overall utilisation and the consumption of the computer technology. These also includes the related disciplines which guide the entities to use the computer technology in the best possible manner without damaging or violating the moral values and beliefs of the organisations and society as a whole. The fact that computer technologies give the humans a number of choices also creates a policy vacuum for the efficient manner to use such technologies after due consideration to the personal and the social policies (Moor, 2017). The essay is aimed at discussing the four principle ethical theories of the computer ethics and analysing the article “Students and sensors: data, education, privacy, and research,” in the light of the above ethical theories. The essay will draw conclusions on the ethical theories being the critical part of the conduct of the various computer operations and the decisions.
The four principle computer ethical theories are utilitarianism, deontology, contract, and virtue theories. The above-mentioned theories aid in the evaluation of the actions and the issues arising out of the use of the information technology, in a systematic, comprehensive and a consistent manner (Tavani, 2011). The article chosen for the analysis is “Students and sensors: data, education, privacy, and research, by Irina Raicu”. The article is about the collection and analysis of the student data at a University in Arizona, through the student ID cards (Raicu, 2018). The analysis eventually became the part of the student retention efforts and the academic success.
Utilitarianism Theory
Jeremy Bentham had developed the ethical theory of utilitarianism. The theory accords the consideration of group interests and the happiness of all, above the individual interests and the benefits (Kizza, 2016). According to this ethical theory, actions must be analysed from a perspective of utility and happiness to population as a whole. Thus, applying the theory to the above actions mentioned in the article, the analysis of the student data, routines and relationships can be beneficial to both the students and the universities, if the same aids in the retention of the students and improve the academics of the students. While the analysis of the data, would be useful for the university from the overall management point of view, the same would be useful for the students and the academic advisers to choose the subjects after their freshman year (Liao, 2018). There are situations when students certain subjects at the time of the entrance to the colleges, however, the subjects do not go well with the personalities and the background of the students. In this event, if the research data can be correlated to the subjects chosen, this would lead the students to efficiently complete their courses. Thus, from the perspective of the utilitarianism, the actions of the university to gather, store and analyse the student data would bring happiness and the utility to everyone and are justified. The utilitarian must however consider that the data in question is not used for any other purposes, other than for academic purposes.
Deontology Theory
The theory of deontology is further divided into two parts. The duty based ethical theory was developed by Immanuel Kant (NC University, 2018). The theory stresses that loyalty toward one’s own duties and the ethical principles is an important factor, and the same must be incorporated while using the information technology practices and products. Locke and Hobbes further developed the second part of the deontology and named it as the right based ethical theory (NC University, 2018). According to the said theory, an individual must uphold his or her rights concerning privacy or the other human and the legal rights. While the duty based theory focuses on the viability of the action itself and not the consequences, the right based theory focuses on the upholding of the moral principles such as the truth, just and fair treatment, equitable approach and such. On application of the above theories, to the given case study it can be said that harvesting and analysing the student data from their individual swipe is not morally correct. This is mainly because of the fact that the usage was not revealed beforehand to the students and their guardians. Though the university has a wider perspective for the use of the data and it is for the benefit of the students only, still the disclosure on the university’s part is must. Thus, it can be said that from a deontological perspective, it is always ethically wrong to use an individual’s rightful property without prior consent. It does not matter that the said individual is the student of the university and the consequences of such an act does them good in the end or not. The researchers of the university are thus suggested to disclose the fact to the students and their academic advisers that how the data is being analysed to help them with their academics. 
Social Contract Theory
The theory is also simply known as the contract theory. The theory is focussed towards the relationship between the one’s occupational roles and social responsibilities pertaining to that occupation (Reynolds, 2015). The theory states that the entities are equally responsible towards the societies and the communities who have given them the license to work. Thus, it can be said that the entities owe a morally responsible behaviour towards the stakeholders concerned. We are part of the society that involves a number of laws and legislations and in order to avoid the negative consequences, the same must be abide by (Martin, 2016). From the perspective of the contract theory it can be said that if one part of the university’s contract is the obligation towards students to provide them with the best academic services and teachings the other obligation is to keep the data in relation to them, safe and secure. Thus, as also discussed in the theory of deontology, the consequences are acceptable and justifiable when the acts are disclosed on the University of Arizona’s part.
Virtue Theory
The ethical theory believes that entities must inculcate the moral habits and the virtues in their behaviour, no matter the same are expressly mentioned to be followed or not (Mason, 2017). The play of the virtues and the morals come in the picture in case of the complex and the unpredictable situations in the field of the information technology. The universities and the colleges have the main responsibility of the providing the support to the students as and when needed. On application of the virtue theory it can be said that University understands its responsibility and thus had devised a medium to co relate the student behaviour, moral, habits and the background of each of theme to the academic field. However, a major problem in the theory is that establishing of the virtues is a difficult and a crucial concept. This is because of the existence of a number of the cultures, communities, religion and other diversified measures (Dark, 2010). The virtues can be of different types such as just behaviour, regard to right and wrong actions and more. Thus, the same would be different in different scenarios and the regions of the operations of the entities.
Thus as per the discussions held in the previous parts it can be concluded that computer ethics is an integral part of the management and the operations of the computer technology and the related systems and disciplines. There have been prescribed the four ethical theories to guide the behaviour of the entities while making use of such technologies. These technologies in addition, provide a set of the comprehensive approach to analyse the morality of the actions. On application of the above theories on the given case study it can be said that though University is right on its part to support the students in their academics, by analysing the gathered data from their swipe cards, the approach cannot be said altogether right. This is because of the existence of the various human and legal rights on the part of the students and the ethics and virtues on the part of the University of Arizona. The approach can be improvised by simply disclosing the data and the fact that the same is being utilised to the students and their guardians. For now, the students are completely unaware of such data harvesting and pooling, while they have a legal right on the same. Thus, the university and the researchers are recommended to protect and use the data in the question only for the academic and support purposes and disclose the same to students as well.
Dark, M. J. (2010). Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives. IGI Global.
Kizza, J. M. (2016) Ethics in Computing. Geneva: Springer International Publishing.
Liao, S. (2018). University of Arizona tracks student ID cards to detect who might drop out. Retrieved from:
Martin, K. (2016). Understanding privacy online: Development of a social contract approach to privacy. Journal of Business Ethics, 137(3), 551-569.
Mason, R. O. (2017). Four ethical issues of the information age. In Computer Ethics, Oxon: Routledge. 41-48.
Moor, J. H. (2017). What is computer ethics?. In Computer Ethics. Oxon: Routledge, 31-40.
NC University. (2018). Ethics in Computing. Retrieved from:
Raicu, I. (2018). Students and Sensors: Data, education, privacy, and research. Retrieved from:
Reynolds, G. W. (2015). Ethics in Information Technology. (5th Ed.). Boston MA: Cengage Learning.
Tavani, H. T. (2011). Ethics and technology: Controversies, questions, and strategies for ethical computing. (3rd ed.). New Jersey: John Wiley & Sons.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.


Yes, alert me for offers and important updates


Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 7 pages


*The content must not be available online or in our existing Database to qualify as

Cite This Work
To export a reference to this article please select a referencing stye below:


My Assignment Help. (2020). Information Technology Ethics. Retrieved from

“Information Technology Ethics.” My Assignment Help, 2020,

My Assignment Help (2020) Information Technology Ethics [Online]. Available from:[Accessed 18 December 2021].

My Assignment Help. ‘Information Technology Ethics’ (My Assignment Help, 2020) accessed 18 December 2021.

My Assignment Help. Information Technology Ethics [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from:

.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}


Thank you for your interest
The respective sample has been mail to your register email id


$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1

Account created successfully!
We have sent login details on your registered email.



Paraphrasing is a convenient way to avoid plagiarism issues in your assignments. However, if you are not aware of how to pull this off, it is ideal that you seek the essay help of the experts at Years of experience provide our experts with an edge over novice writers in avoiding plagiarism. Our experts resort to powerful paraphrase tools to provide you with genuine content. Thus, you receive online paraphrasing assistance without any traces of plagiarism. even has its own paraphrasing tool which is available online.

Latest Management Samples

div#loaddata .card img {max-width: 100%;

MPM755 Building Success In Commerce
Download :
0 | Pages :

Course Code: MPM755
University: Deakin University is not sponsored or endorsed by this college or university

Country: Australia

The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…

SNM660 Evidence Based Practice
Download :
0 | Pages :

Course Code: SNM660
University: The University Of Sheffield is not sponsored or endorsed by this college or university

Country: United Kingdom

Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :

Course Code: BSBHRM513
University: Tafe NSW is not sponsored or endorsed by this college or university

Country: Australia

Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :

Course Code: MKT2031
University: University Of Northampton is not sponsored or endorsed by this college or university

Country: United Kingdom

Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :

Course Code: MN506
University: Melbourne Institute Of Technology is not sponsored or endorsed by this college or university

Country: Australia

An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 


Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »