Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Assignment 5 PY360 Ethics in TechnologyDirections: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete

Assignment 5

PY360 Ethics in Technology

Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be a minimum of one (1) single-spaced page to a maximum of two (2) pages in length; refer to the "Assignment Format" page for specific format requirements.

Write a short essay for each of the following topics.

Part 1:  Provide a detailed description of what worms and Trojan horses are.

Part 2:  The example of releasing a worm given in the text is the situation where Morris stated his goal was to see how many Internet computers he could infect with the worm.  He was not thinking about the computers he would crash and that data that would be lost. 

Consider the morality of the issue of releasing a worm.  State if Morris’s release of a worm would be morally justifiable according to Kantian ethics.  Provide a discussion of Kantian ethics and fully explain your position regarding Morris’s actions.

Consider the morality of the issue of releasing a worm.  State if Morris’s release of a worm would be morally justifiable according to Utilitarian ethics.  Provide a discussion of Utilitarianism and fully explain your position regarding Morris’s actions.

Total possible points of 100 include ten (10) points for organization and use of language, including grammar and punctuation.

Show more
  • @
  • 165 orders completed
ANSWER

Tutor has posted answer for $20.00. See answer's preview

$20.00

****** ** ************** IWorms are *** ******* *** **** *** ******* ** ******* ******* **** **** ******* ***** *** also computer ******** that ************ functional ****** ** ********** ******** ** ***** ******** ******* via ******* ************ *** ***** *** *** ****** ******* **** ************* **** will ********* **** *** ****** *** ** a computer ** * ********** ******** UNIVERSITY ***** *** ***** *** differences ******* viruses and ***** ***** can exist ** ******** entities *** **** ** quite ****** viruses ******** UNIVERSITY ***** ******** worms don’t have *** **** ** get ******** ** other ***** ** ******** *** ** ** only ******* **** ** the ************ **** ***** between worms *** viruses **** ***** *** **** often ******** to ** ******* (INDIANA ********** 2015)A ****** ***** ** * bit ********* in ****** It ** * ******* **** ******* something ************ ***** *** programmer ******** *** **** users ***** not ****** ** **** knew ***** ***** ******** ********** 2015) *** ** *** ****** ****** ** ***** ********** ** ********* ******* ***** **** *** **** *** ability to replicate ******** ********** ***** Computer ***** *** ***** ***** with *** ********* ** Trojans ** disguise ** legitimate ******** *** if ********* ******* *** **** *************** ** delete **** block **** ****** **** copy data *** to ******* *** *********** of *** ******** ** computer ******** (KASPERSKY *** 2015)Part ********** worms **** ** testing purpose ****** ** condemned ** an ******* *** ********* act ** *** **** ****** ****** that *** **** *** ** *** how many ******** ********* ** ***** ****** with *** worm **** *** ************* *********** if ****** this action of ****** *** *** ******* ** the action **** *** ** ********** ********* **** the *********** ** *** *********** *********** as ******** ** **** ********* ****** **** ** condemned to ** ********* Kant’s deontological moral ****** ******** **** the ********* ** ********* of *** ****** ** not reliant on its consequences; in other ***** ******* *** ********* on *** basis of their ****** ** ********** **** the ***** ****** ** ******* (“KANTIAN ********* nd) The *********** ********** ** **** talks ** universal moral and ******* laws ***** are ********** *** all ********* ** unethical *********** ** ****** away the **** ** ******* ***** being ** ********* *** ***** ***** human ***** must ******* from ********* ******** ******* ****** ************* **** ** appease self-objectives ** ****** ************* and ******* **** Kant’s ************ **** action ** harming others ****** ** ********** ** ***** ********* ********* action was ********** unethical ******* ** intentionally ****** *** **** to test *** ********* without ******** about the negative ************ ** his action ****** never ********** *** **** losses ***** ** ******* ** *** **** ** the ******* ******* *** ****** *** **** ** *** ******* ****** *** *** ****** should be considered immoral ******** ****** did violate the ***** *********** ** ******** *********** ********** and **** can ** ****** ** ******* **** Morris ***** ***** *** ******* ** *** ********** ** ****** **** *** in the same *** as he ******* victimized ****** ******** ***** formulation ****** **** *** ** *** ******* to do ******** which he/she would ***** ** ******* to allow *** other ****** to do ******* *********** ********* nd) *** ****** ********* * crime which he would ***** **** expected ** ********** ******* Hence ********* ****** should ** ********** ********* from *** ******* *************** *********************** ********** (2015) **** are ******* ***** *** ****** ******* ********* ******* ** **** **** https://kbiuedu/d/aehmKANTIAN ****** **** ********* ******* 16 **** **** http://wwwcsusedu/indiv/g/gaskilld/ethics/Kantian%20EthicshtmKASPERSKY *** ****** **** ** * Trojan ****** *** ********** ********* ******* ** **** **** *****************************************************************************

Click here to download attached files: Ethics in Technology.doc
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question