WGU D333 TASK 2 | ETHICS IN TECHNOLOGY | QUESTIONS
AND ANSWER
Normative statement - -provides an assessment of how things should be rather than how
they are: for example, "he was wrong to do that" or "being kind is more important than
being the most successful."
--Moral imagination - -Imagination that forms dealing with the morality of problems in
media and in real life.
--the Hippocratic Oath - -requires medical professionals to "use treatment to help the sick
according to my ability and judgment, but never with a view to injury and wrong-doing"
--Habitus - -the qualities of character that they have and the patterns of living that issue
from and reveal those qualities. That pattern of being is called a habitus.
--Deontology - -Most notably, deontology emphasizes the rightness or wrongness of an
action by reference to certain action-guiding principles. Depending on the context, these
principles can be described as laws, rules, maxims, imperatives, or commands.
--Kantian Ethics - -The notion that the universe is ordered by laws that can be apprehended
by human reason
--VIRTUE ETHICS - -is an approach to ethics organized around the idea of human flourishing
and human excellence. Its basic assumption is that all human beings share some basic
qualities of character, though we vary widely in how much we excel at those qualities and
how we express them, and each of us gets better (or worse) at them according to our
experiences.
--Communitarianism - -is an approach to ethics organized around self-realization in the
context of interdependence. Its basic assumption is that human beings exist in a state of
mutual reliance on one another.
--Utilitarianism/Consequentialism - -is an approach to ethics organized around the idea of
happiness. Like virtue ethics, utilitarianism is an outcome-based approach to ethics that
assumes that human beings are motivated by the desire to be happy. Building on the basic
assumption that humans are motivated by happiness, utilitarians argue that when it comes
to determining how we should act, we should first and foremost consider what kinds of
actions bring about the most happiness for the greatest number of people.
--Profession - -A profession has a core body of theoretical knowledge, this work requires a
combination of practical skill and knowledge. Has its own code of ethics and culture.
, --Conflict of interest - -A conflict of interest is a situation in which a professional is serving
multiple parties (possibly including the professional themself) and acting in the interest of
one party may harm another.
--Licensing - -requirements in order to practice the profession.
--Certification - -are not legally mandated like licenses but likewise serve as markers of
confidence and may be expected or preferred by employers.
--What are the core characteristics of a profession? - --Profession has a core body of
theoretical knowledge.
-specialized knowledge gives professionals authority.
-a professional has clients
-a profession gives special and often unique privileges by the community.
-a profession regulates itself with a code of ethics.
--Preventive Ethics - -rules and guidelines that govern behavior and are aimed at preventing
cases of professional misconduct and particular disasters
--Aspirational Ethics - -aimed at using technology for the betterment of humankind
--How does the IEEE Code of Ethics address the issue of discrimination? - -IEEE 8: "To treat
fairly all persons and to not engage in acts of discrimination based on race, religion, gender,
disability, age, national origin, sexual orientation, gender identity, or gender expression."
--What is the SECEPP, and what is its purpose? - -Software Engineering Code of Ethics and
Professional Practice - finer-grained subclauses of ethics.
--zero-day exploit - -A cyberattack that takes place before the security community and/or
software developers become aware of and fix a security vulnerability.
--What is it called when a threat combines various types of exploits and vulnerabilities in
one payload? - -Blended Threat
--In states where it is legal to spam, what are the usual requirements? - --Spammers cannot
disguise their identity by using a false return address
-the email must include a label specifying that it is an ad or solicitation
-the email must include a way for recipients to indicate they do not want future mass
mailings.
--APT - -A network attack in which an intruder gains access to a network and stays there—
undetected—with the intention of stealing data over a long period of time (weeks or even
months).
--Rootkit - -An attack in which a malicious hacker takes over computers via the Internet and
causes them to flood a target site with demands for data and other small tasks.
AND ANSWER
Normative statement - -provides an assessment of how things should be rather than how
they are: for example, "he was wrong to do that" or "being kind is more important than
being the most successful."
--Moral imagination - -Imagination that forms dealing with the morality of problems in
media and in real life.
--the Hippocratic Oath - -requires medical professionals to "use treatment to help the sick
according to my ability and judgment, but never with a view to injury and wrong-doing"
--Habitus - -the qualities of character that they have and the patterns of living that issue
from and reveal those qualities. That pattern of being is called a habitus.
--Deontology - -Most notably, deontology emphasizes the rightness or wrongness of an
action by reference to certain action-guiding principles. Depending on the context, these
principles can be described as laws, rules, maxims, imperatives, or commands.
--Kantian Ethics - -The notion that the universe is ordered by laws that can be apprehended
by human reason
--VIRTUE ETHICS - -is an approach to ethics organized around the idea of human flourishing
and human excellence. Its basic assumption is that all human beings share some basic
qualities of character, though we vary widely in how much we excel at those qualities and
how we express them, and each of us gets better (or worse) at them according to our
experiences.
--Communitarianism - -is an approach to ethics organized around self-realization in the
context of interdependence. Its basic assumption is that human beings exist in a state of
mutual reliance on one another.
--Utilitarianism/Consequentialism - -is an approach to ethics organized around the idea of
happiness. Like virtue ethics, utilitarianism is an outcome-based approach to ethics that
assumes that human beings are motivated by the desire to be happy. Building on the basic
assumption that humans are motivated by happiness, utilitarians argue that when it comes
to determining how we should act, we should first and foremost consider what kinds of
actions bring about the most happiness for the greatest number of people.
--Profession - -A profession has a core body of theoretical knowledge, this work requires a
combination of practical skill and knowledge. Has its own code of ethics and culture.
, --Conflict of interest - -A conflict of interest is a situation in which a professional is serving
multiple parties (possibly including the professional themself) and acting in the interest of
one party may harm another.
--Licensing - -requirements in order to practice the profession.
--Certification - -are not legally mandated like licenses but likewise serve as markers of
confidence and may be expected or preferred by employers.
--What are the core characteristics of a profession? - --Profession has a core body of
theoretical knowledge.
-specialized knowledge gives professionals authority.
-a professional has clients
-a profession gives special and often unique privileges by the community.
-a profession regulates itself with a code of ethics.
--Preventive Ethics - -rules and guidelines that govern behavior and are aimed at preventing
cases of professional misconduct and particular disasters
--Aspirational Ethics - -aimed at using technology for the betterment of humankind
--How does the IEEE Code of Ethics address the issue of discrimination? - -IEEE 8: "To treat
fairly all persons and to not engage in acts of discrimination based on race, religion, gender,
disability, age, national origin, sexual orientation, gender identity, or gender expression."
--What is the SECEPP, and what is its purpose? - -Software Engineering Code of Ethics and
Professional Practice - finer-grained subclauses of ethics.
--zero-day exploit - -A cyberattack that takes place before the security community and/or
software developers become aware of and fix a security vulnerability.
--What is it called when a threat combines various types of exploits and vulnerabilities in
one payload? - -Blended Threat
--In states where it is legal to spam, what are the usual requirements? - --Spammers cannot
disguise their identity by using a false return address
-the email must include a label specifying that it is an ad or solicitation
-the email must include a way for recipients to indicate they do not want future mass
mailings.
--APT - -A network attack in which an intruder gains access to a network and stays there—
undetected—with the intention of stealing data over a long period of time (weeks or even
months).
--Rootkit - -An attack in which a malicious hacker takes over computers via the Internet and
causes them to flood a target site with demands for data and other small tasks.