The topic chosen is how computer ethics relate to human spirituality and religion. Computer ethics refers to the practical philosophy that is concerned about the way computer professionals must take decisions regarding the social and professional conduct. The ethical decision is majorly influenced by the personal code of the individuals, the informal ethical code of conduct existing in the workplace and the exposure to the formal code of ethics (Rehg 2015).
There are various schools of ethical theories that influence the situation and the final outcome. The relativism theory believes that there are no universal moral norms relating to right or wrong. When a person decides what is right and what is wrong then it is known as moral relativism. When the society’s moral belief structure decides what is right and what is wrong then it is known as anthropological relativism. However, deontology states that the moral laws that guide the actions of the individuals are universal in nature (Vaughn 2015).
Utilitarianism states that an action benefits the people if it is good and it harms the individuals if it is bad. The Act Utilitarianism states that if an action is good then it shall create more happiness than unhappiness while Rule Utilitarianism states that if the moral rules are followed by everybody then it shall increase the level of overall happiness (Broad 2014). The virtue ethics states that the virtue or the character of the moral agent must be the major factor of consideration rather than focusing on the rules that define what is right and what is wrong.
Privacy is one of the major issues that has aroused after the advent of internet. In most of the cases, the user has to give his personal information in order to sign up or register for online services. This has raised the concerns regarding the privacy of internet users. Therefore, it becomes necessary to identify the ethical issues and to find the best possible solution to the issues (Burmeister 2013). Considering these issues, various international and local professional organizations have come up with various code of ethics documents in order to provide the computing professionals and the users with the basic behavioral guidelines (Prettyman 2015).
Morality refers to the categorization of the actions, intentions and decisions of the individuals into proper and improper. Morality refers to the principles that are derived from the code of conduct from some specific religion, philosophy or culture or from a universal belief. Ethics is often used interchangeably with morality (Staub 2013). Therefore, it can be stated that there is deep relation between computer ethics and human spirituality and religion.
The key goal of the research is to critically analyze the relation between computer ethics and human spirituality and religion.
The objectives of the study are mentioned below:
The questions of the study are as follows:
The literature review discusses the several types of relevant concepts and theories that are related to the particular topic of research study.
According to Ming et al. (2015), computer ethics refers to the practical philosophy that is concerned about the way computer professionals must take decisions regarding the social and professional conduct. The ethical decision is influenced by the personal code of the individuals, the informal ethical code of conduct existing in the workplace and the exposure to the formal code of ethics.
According to Floridi (2015), humans are the tool-maker as the creation of artifacts has become a part of our identity as humans. The connection of humans with spirituality is profound. Humans make religious icons in order to meditate their relation with God and to be sacred in their mindset. One of the typology suggests that the ethical concerns in relation with the misuse of technology are parallel to the spiritual rejection of worshipping.
In other words, Kerschner and Ehlers (2016) stated that the attitude of humans towards technology also reflects the spiritual relationship of humans with the nature and the religion. However, technology often provides the power over nature when the humans are led by the temptation of distorting the authentic dominion of humans into sinful dominions. Various critics have also linked science and technology with the patriarchal models of the relationship between God, nature and humanity that leads the humans to spirituality of confession and repentance (Dhiman 2016).
Figure 1: Ten commandments of computer ethics (Source: Author’s work)
Research methodology deals with different types of tools, techniques and methods
of conducting research. Flick (2015) stated that research methodology is a systematic process that aids in conducting the entire research process in an organized way. Research methodology results in understanding of the various techniques pertaining to research. Therefore, research method can be described as a research process that is well-structured.
There are mainly three types of study of research. These comprise of the exploratory, descriptive and hypothesis testing research. As defined by Creswell (2013), exploratory research design aids the researcher when he does not have the clear idea about a particular research topic. This research study helps in conducting the entire research process with the help of some scientific view point.
On the other hand, Hancock and Algozzine (2015) stated that descriptive research study aids in conducting the research with the help of some relevant theories and concepts. This method links the given research topic with some relevant theory or model.
However, in hypothesis testing research, the researcher is initially fixes the hypothesis and later on, the researcher tries to analyze the theories in respect of relevant model and principles.
For this research purpose, the researcher shall apply the descriptive research study for in depth analysis of the relevant topic.
Figure 2: Methods of data collection (Source: Taylor, Bogdan and DeVault 2015)
Several data is required for a research process. Therefore, primary and secondary data are required while conducting a research. Primary data refers to the data that is collected directly from the respondents of the research. Primary data is usually obtained from surveys, questionnaires and interviews (Mills 2015).
On the other hand, secondary data refers to the data that is obtained from the journals, websites and books. Secondary data are easily available through various journals and websites (Clark 2013). It helps the researcher to know the relevant concepts about topic. The researchers are required to collect both primary and secondary data in order to successfully carry out the research process. However, in this case only secondary data shall be collected.
For this research study, the researcher shall collect the secondary data from various journals and newspapers. Secondary sources of data shall provide theoretical views of the topic that shall be useful in analyzing the relation between computer ethics and human spirituality and religion.
The researchers have to face various issues with respect to the accessibility of relevant data during the research process. The secondary data may not be exactly related to the research topic. Sometimes it is difficult to find the authentic sources of secondary data. At times, the data provided by the secondary sources might not be correct. Therefore, the researcher might face a few accessibility issues while the research process is conducted.
Every researcher needs to consider some ethical issues while conducting the entire research process. The researcher needs to be confident of the fact that the secondary data shall never be utilized for any kind of purposes that are unethical. The researcher must be very careful while using the secondary data and must ensure that the data is collected from some authentic source.
There are possibilities of some limitations within a research process. In this case, the time and the finance shall be the main limitations of the particular research. Limited time and limited finance will be the limitations of the research.
The proposed dissertation should cover five parts. The first part shall be the introduction chapter that shall contain the research aim related to the topic and relevant research questions. The second part shall contain the literature review that shall consider the various relevant theories and concepts of the given research topic. The third part shall contain the research methodology, data collection process, accessibility issues and ethical issues. The fourth part shall contain the findings and analysis of the data. Lastly, the last part shall contain the conclusion pertaining to the entire research.
Main activities/ stages
|
1-10 April |
11-20 April
|
21-25 April |
26-30 April |
1-10 May |
11-18 May |
Topic Selection |
Yes |
|||||
Data collection from secondary sources |
Yes |
Yes |
||||
Framing layout of the research |
Yes |
|||||
Literature review |
Yes |
Yes |
Yes |
|||
Formation of the Research Plan |
Yes |
Yes |
||||
Selection of the Appropriate Research Techniques |
Yes |
Yes |
||||
Secondary data collection |
Yes |
Yes |
||||
Analysis & Interpretation of Data Collection |
Yes |
Yes |
||||
Conclusion of the Study |
Yes |
|||||
Formation of Rough, Draft |
Yes |
|||||
Submission of Final Work |
Yes |
Table 3: Time horizon (Source: Author’s work)
Figure 4: Gnatt chart (Source: Author’s work)
1st April to 10th April shall be used for selecting the topic with the help of various secondary data such as books and journals. 11th April to 20th April, the researcher shall be involved in reading various relevant journals and books in order to enrich his/her knowledge. Framing the layout of the research shall also be done along with preparing the literature review. 21st to 25th April, the researcher shall form the research plan and shall select the appropriate tools, techniques and methods related to the research. 26th to 30th April, the researcher shall collect secondary data and shall ensure that the data is collected from authentic sources. The collection of secondary data shall further continue throughout the month of April of the research process. From 1st May to 10th May, the researcher shall analyze the findings of the secondary data. The researcher shall also find out the conclusion of the entire research process and finally between 11th May to 18th May, the researcher shall draw the last completion of the research project.
Conclusion:
The research proposal tries to find out the relation between computer ethics with human spirituality and religion. The report stated that computer ethics refers to the practical philosophy that is concerned about the way computer professionals must take decisions regarding the social and professional conduct. However, morality is comprised of the principles that are derived from the code of conduct from some specific religion, philosophy or culture or from a universal belief. Therefore, it can be stated that ethics is often used interchangeably with morality. Hence, it can be concluded that the attitude of humans towards technology reflects the spiritual relationship of humans with the nature and the religion. However, technology often provides the power over nature when the humans are led by the temptation of distorting the authentic dominion of humans into sinful dominions. Therefore, it becomes the responsibility of the program developers to ensure that the software has positive impact on the society. The software must not pose any harm to the religious sentiments and human spirituality. Human spirituality is against harming others and even all the religions across the world preach that one should not harm others. In the similar manner, computer ethics also states not to harm the other people by refraining from stealing information, spreading wrong information, accessing one’s personal files without any authorization, spreading malicious software or virus, copying or pirating the original software and using abusive language over the internet communication. Following these computer ethics shall indirectly lead to following the religion and positive human spirituality.
References:
Barquin, R.C., 2014. Ten commandmenTs oF compuTeR eThics. Bursting the Big Data Bubble: The Case for Intuition-Based Decision Making, p.213.
Broad, C.D., 2014. Five types of ethical theory (Vol. 2). Routledge.
Burmeister, O.K., 2013. Achieving the goal of a global computing code of ethics through an international-localisation hybrid. Ethical Space, 10(4), pp.25-32.
Carroll, J.M., 2014. Computer security. Butterworth-Heinemann.
Clark, G., 2013. 5 Secondary data. Methods in Human Geography, p.57.
Creswell, J.W., 2013. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications
Dhiman, S., 2016. Epilogue: The Ethics and Spirituality of Sustainability. In Spirituality and Sustainability (pp. 235-252). Springer International Publishing.
Flick, U., 2015. Introducing research methodology: A beginner’s guide to doing a research project. Sage.
Floridi, L., 2015. The onlife manifesto. Springer-Verlag GmbH.
Greenfield, P.M., 2014. Mind and media: The effects of television, video games, and computers. Psychology Press.
Hancock, D.R. and Algozzine, B., 2015. Doing case study research: A practical guide for beginning researchers. Teachers College Press..
Kerr, E.B. and Hiltz, S.R., 2013. Computer-mediated communication systems: Status and evaluation. Academic Press.
Kerschner, C. and Ehlers, M.H., 2016. A framework of attitudes towards technology in theory and practice. Ecological Economics, 126, pp.139-151.
Kiesler, S., 2014. Culture of the Internet. Psychology Press.
Mills, J.A., Teplitsky, C., Arroyo, B., Charmantier, A., Becker, P.H., Birkhead, T.R., Bize, P., Blumstein, D.T., Bonenfant, C., Boutin, S. and Bushuev, A., 2015. Archiving primary data: solutions for long-term studies. Trends in Ecology & Evolution, 30(10), pp.581-589.
Ming, T.M., Jabar, M.A., Sidi, F. and Wei, K.T., 2015. A systematic literature review of computer ethics issues. Journal of Theoretical and Applied Information Technology, 78(3), p.360.
Prettyman, S.S., Furman, S., Theofanos, M. and Stanton, B., 2015, August. Privacy and security in the brave new world: The use of multiple mental models. In International Conference on Human Aspects of Information Security, Privacy, and Trust (pp. 260-270). Springer International Publishing.
Quinn, M.J., 2014. Ethics for the information age. Pearson.
Rehg, W., 2015. Discourse ethics for computer ethics: a heuristic for engaged dialogical reflection. Ethics and Information Technology, 17(1), pp.27-39.
Rosenberg, R.S., 2013. The social impact of computers. Elsevier.
Scott, A. and Barlowe, S., 2016, October. How software works: Computational thinking and ethics before CS1. In Frontiers in Education Conference (FIE), 2016 IEEE (pp. 1-9). IEEE.
Staub, E., 2013. Positive social behavior and morality: Social and personal influences. Elsevier.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Vaughn, L., 2015. Doing ethics: Moral reasoning and contemporary issues. WW Norton & Company.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download