What Is The Method To Evaluate Equitable Accessibility?
Ethical dilemma is mainly referred as one of the situation in which choice is generally needed to be created between two options but none of the options on which choices are made is helpful in mitigating the problem associated with the situation in a proper ethical way (Lucas, Van & Maat, 2016). The paper mainly focusses on the case “Privacy will hit tipping point in 2016” for discussing the case scenario in context to four ethical theories inclusive of virtue, contract, psychology as well as utilitarianism.
The paper discuss the ethical dilemma that is related with the case study by utilizing the four ethical theories. In addition to this, proper recommendations are also provided in this paper which are very much helpful in resolving the issues as well as challenges that are mainly associated with ethical dilemma.
It is stated by Van and Roeser (2013) that Utilitarianism is referred as one of the theory of ethics that generally assists in enlisting the locus of correct and wrong only on the results of selection one action or policies over other actions as well as policies. As per the theory of utilitarianism it is identified that the action that is taken for minimizing the privacy issues are ethical. It is found that there are number of privacy related concerns as a result of which online privacy will be useful in getting the tipping point 2016 by prompting number of regulators for properly cracking down on consumers for more protection (Taylor, 2017).
The businesses are also facing number of privacy issues. In order to resolve the issues as well as challenges that the business generally faces the business must adopt strategies including paying for less ads, blocking various types of advertisements, proper regulatory actions against different privacy violators as this type of actions generally act as incubator for various types of privacy protections. It is identified that in order to avoid privacy related issues as well as challenges, Google is proactively testing various types of alternatives in order to monetize the data of the users with the help of various types of targeted ads and as result the contributor of the company generally pays $2to $10 per month for getting fewer number of ads when they generally visit the website. Thus, it is identified that the action that is taken by Google for reducing the privacy issues is considered to be ethical.
Deontology is mainly referred as one of the ethical theories that generally helps in determining the morality that is associated with an action that is further dependent on some of the specific rules and regulations (Vinnari, Vinnari & Kupsala, 2017). It is found that as the trends which are generally forecasted by the Forrester is considered to be moral as the tendencies are quite useful in preserving the privacy by minimizing the impact of various types of issues that are generally with privacy. Google proactively management in beta testing that is considered as an alternative method that helps in monetizing different types of information and data with their help of various types of targeted ads. It is found that contributors of Goggle generally pays around $2 to $10 so that they visit less number of ads while browsing.
In addition to this, apple latest operating system has a feature through which the users can be able to block adds, Furthermore the European union generally sets various types of new data protection acts that helps in making the entire company liable of 5 percent of the entire revenue if they are generally found violating the security or privacy (Taylor, 2017). This act is found to be very much advantageous as it generally helps in reducing the issues as well as challenges related with security by providing by taking proper privacy associated actions.
Virtue is mainly referred as a method that is mainly advantageous in emphasizing a character of a specific person as one of the effective key element for ethical thinking rather focussing on the act or the consequence (Rousseau, 2013). It is identified that as per the theory of virtue the European Union leads the company Apple to pay an amount of $32.5 million as a refund for all the customers in order to settle federal trade complainant that is done by the users. The complainant is mainly done in charge of app purchasing by the kinds without taking consent from parents.
In addition to this, it is identified that AT&T generally pays amount of around $25 million in order to settle the investigation around the case of data breaches. The law that is created generally impacts the organization and helps in maintaining ethics by resolving the privacy as well as security related challenges within the organization (Taylor, 2017). It is identified that the actions that are generally taken by the various organization is considered to be ethical and in order to resolve the privacy related challenges it is necessary to adopt proper ethical actions.
The social contract theory is considered as a philosophical responsibility that is mainly found to be based on the substantial contract agreement for successfully forming the society in which they generally live (Kotzin et al., 2016). As per the theory of contract 2 laws are generally signed with the help of the government of California in the year 2016. It is found that as per the contract theory the authorities generally want court warranty for accessing the electronic communication that is mainly associated with data and information that is mainly helpful in preventing the data breach regulation. It is identified that the action that is generally taken by the California government is very much helpful in reducing as well as minimizing security as well as privacy related challenges and issues. Some of the organizations generally take calculated risks by assuming that only customers with California based IP can only reside in the state however this act is totally wrong as it is very much difficult to maintain two sets of data management rule due to their expense. It is found that the likelihood of getting the geography of the customer is wrong.
Conclusion
It can be concluded from the entire assignment that there are numerous security related issues that mainly affects the privacy. It is found that the business organizations that are generally at risk due to number of attacks as well as regulatory related oversight can be resolved by taking proper actions. It is found that in order to resolve the problems as well as issues it is very much important to adopt strategies including blockage of ads, paying for the ads, utilization of various types of regulatory actions as well as various types of privacy violators. It is identified that in order to reduce the issues and challenges Google contributors generally pays 2-10 dollar per month so that they can be bale to see less number of ads while browsing. In addition to this, the Apple also provides the facility of blockage of ads. All this actions that are generally taken by the companies are helpful in maintaining privacy. In addition to this, number of recommendations that needs to be followed in order to resolve privacy related issues as well as challenges.
Authentication: Proper password cracking related technology generally creates number of security related challenges and therefore in order to resolve the problem, it is very much necessary to utilize proper method of authentication in order to secure both data and information.
Plugging from information leaks: It is found that sensitive information generally flows from the organization with the help of instant messaging as well as email and therefore proper security policies must be used in order to restrict the leakage of various types of information.
References
Kotzin, J. J., Spencer, S. P., McCright, S. J., Kumar, D. B. U., Collet, M. A., Mowel, W. K., … & Harman, C. C. (2016). The long non-coding RNA Morrbid regulates Bim and short-lived myeloid cell lifespan. Nature, 537(7619), 239.
Lucas, K., Van Wee, B., & Maat, K. (2016). A method to evaluate equitable accessibility: combining nursing theories and accessibility-based approaches. Transportation, 43(3), 473-490.
Mansell, S. (2015). Book Review: Rejoinder to Veldman’s review of Capitalism, Corporations and the Social Contract: A Critique of Stakeholder Theory (Vol. 22, No. 2, pp. 271-275). Sage UK: London, England: Sage Publications.
Rousseau, J. J. (2013). Ethics and deontology in public administration.
Sacco, D. F., Brown, M., Lustgraaf, C. J., & Hugenberg, K. (2017). The adaptive utility of deontology: deontological moral decision-making fosters perceptions of trust and likeability. Evolutionary Psychological Science, 3(2), 125-132.
Taylor, H. (2017). Privacy will hit tipping point next year: Study. CNBC. Retrieved 14 September 2017, from https://www.cnbc.com/2015/11/09/privacy-will-hit-tipping-point-in-2016.html
Van Wee, B., & Roeser, S. (2013). Ethical theories and the cost–benefit analysis-based ex ante evaluation of transport policies and plans. Transport reviews, 33(6), 743-760.
Vinnari, M., Vinnari, E., & Kupsala, S. (2017). Sustainability Matrix: Interest Groups and Ethical Theories as the Basis of Decision-Making. Journal of Agricultural and Environmental Ethics, 30(3), 349-366.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download