Ethics in the Case against Perfection

Sandel deems that parents have a responsibility to support their childrens success. He acknowledges that they mutually do and overdo this through the use of orthodontics, Ritalin and in several other modes.

However, he questions if it is allowable and even venerable for parents to assist their children in these modes; why isnt it similarly venerable for parents to employ whatever genetic technologies that may surface to improve their childrens outlook, athletic skill, aptitude or musical skill?

An upcoming set of liberal eugenicists deem that eugenic actions, for instance embryo selection, are inoffensive and may be morally essential provided that the benefits and saddles are fairly disseminated all over the society.

However, Sandel is not a liberal eugenicist as he thinks that eugenic parenting is offensive as it demonstrates a misinterpretation of our position in creation and baffles our responsibilities with that of God. This paper discusses the ethics behind all these issues.

To begin with, cloning is ethically wrong because it infringes the right to self-sufficiency; by selecting a childs genetic composition beforehand, parents infringe the childs privilege to a liberal future. On the other hand, Sandel deems that cloning is fine.

Although most scientists consent that cloning is dangerous as it can create offspring with severe deformities, Sandel asserts that technology can be enhanced to ascertain that clones are at no increased risk than physically conceived children. According to him, there is no trouble with making a child who is a hereditary twin of a single parent, or of a popular superstar.

Secondly, a sportsperson with genetically improved muscles, similar to a drug-enhanced sportsperson, would have an unjust benefit over his unenhanced opponents. One problem with drugs is that they make someone to win even when he or she has put no efforts.

However, Sandel argues that making effort is not the peak of sports but excellence. He further asserts that excellence is partially exhibited in the innate gifts and talents that are not determined by the sportsperson who owns them (Sandel 81). He regards this as a sore reality for democratic communities as folks like to assume that victory, in life and sports, is rather earned than innate.

Sandel further asserts that muscle improvement therapy should be utilized to enhance sport performance. He also argues that it is traditionally known that some sportsmen are far gifted hereditarily than others, and hitherto we do not deem this to demoralize the justice of competitive games.

From this perspective, Sandel concludes that improved genetic disparities would be no terrible than innate ones, supposing that they were harmless and made accessible to every one.

Besides, the ethics of memory enhancement point to the risk of producing two categories of people; those who have to survive with their natural abilities and those who can afford enhancement technologies. The predicament here is that in case these enhancements are transmitted across age groups, the two categories may finally become types of people, the improved and the purely natural.

However, concern on access disregards the ethical position of enhancement itself. The basic query here should not be how to guarantee the same access to enhancement but if we are supposed to seek it at first. Sandel deems that cognitive enhancement would span the stroke amid enhancement and remedy.

He moreover clarifies that this enhancement could have merely non-therapeutic uses: for instance, by a public prosecutor seeking to memorize details for an impending trial.

In addition, height enhancement is ethically wrong as it is jointly self-overpowering as several become taller while others turn out to be shorter than the custom. Typically, not all children can turn out to be above the customary height.

Since the unenhanced will begin to think that they are very short, they too may look for treatment, resulting to a hormonal warfare that will leave everybody shoddier, particularly those who are not capable of obtaining their way up from the tininess.

Conversely, Sandel feels that if we were worried merely by the unfairness of adding tininess to the troubles of the deprived, we could cure that injustice by publicly promoting height enhancements (86). Because of the comparative height deprivation experienced by innocent onlookers, he asserts that they could be remunerated by taxing those who purchase their means to bigger height.

Eventually, Sandel demands to know whether we would desire to exist in a world where parents feel obligated to use their money to make perfectly healthy children some inches taller.

Furthermore, embryonic selection is ethically wrong since an embryo is a human being and hence should not be screened. Considering that an eight-sect embryo developing in a Petri-dish is ethically equal to a wholly developed person, disposing it is no better than terminating a pregnancy and both actions are equal to infanticide.

However, Sandel supposes that if sex choice by sperm categorization is offensive, it should be for causes that go beyond the dispute about the ethical status of the embryo. He explains that one such cause is that sex assortment is a tool of sex bias, characteristically against young women, as demonstrated in China and India.

He further articulates that for those who think that communities with considerably fewer women than men will not be much stable, more aggressive, and more inclined to crime or conflict are not supposed to t do so since those are obvious qualms that the sperm-sorting firm takes care of.

Again, the morality of giftedness, under the cordon in sports continues in the role of parenting. Here, genetic enhancement and bioengineering is capable of extricating it. In fact, to value kids as gifts is to acknowledge them as they arrive, not as matters of our devise, objects of our wish or tools of our desire.

This is so because parental love is not dependent on the gifts and traits of a child. Though we may select our partners and friends depending on the traits we find striking, we do not select our kids. Their traits are impulsive, and even the most diligent parents cannot be held totally accountable for the type of kids they own.

Finally, genetic enhancements generally demoralize our civilization by intimidating our ability to act liberally, to thrive by our own hard work, and to deem ourselves liable, credible of praise or fault, for our own actions and status. Certainly, the functions of enhancement and endeavor will be an issue of extent.

However, as the function of enhancement augments, our appreciation for the accomplishment diminishes as our esteem for the attainment shifts from the performer to his doctor. This implies that our ethical reaction to enhancement is a comeback to the weakened agency of the individual whose success is enhanced.

However, Sandel does not believe the major setback with genetic engineering and enhancement and is that they demoralize effort and corrode human agency. Instead, he asserts that the profound risk is that they symbolize a type of manic agency, an increased desire to rebuild nature.

In conclusion, cloning is ethically wrong because it infringes the right to self-sufficiency. However, Sandel asserts that technology can be enhanced to ascertain that clones are at no increased risk than physically conceived children. Again, a sportsperson with genetically improved muscles, similar to a drug-enhanced sportsperson, would have an unjust benefit over his unenhanced opponents.

However, Sandel argues that making effort is not the peak of sports but excellence. He further asserts that excellence is partially exhibited in the innate gifts and talents that are not determined by the sportsperson who owns them.

Moreover, the ethics of memory enhancement point to the risk of producing two categories of people; those who have to survive with their natural abilities and those who can afford enhancement technologies. Sandel deems that cognitive enhancement would span the stroke amid enhancement and remedy.

He also clarifies that this enhancement could have merely non-therapeutic uses: for instance, by a public prosecutor seeking to memorize details for an impending trial. In addition, height enhancement is ethically wrong as it is jointly self-overpowering as several become taller while others turn out to be shorter than the custom.

The problem here is that the unenhanced may begin to think that they are very short which would in turn provoke them to look for treatment. Eventually, this could result to a hormonal warfare that can leave everybody shoddier, particularly those who are not capable of obtaining their way up from the tininess.

Conversely, Sandel feels that if we were worried merely by the unfairness of adding tininess to the troubles of the deprived, we could cure that injustice by publicly promoting height enhancements. Because of the comparative height deprivation experienced by innocent onlookers, he asserts that they could be remunerated by taxing those who purchase their means to bigger height.

Also, embryonic selection is ethically wrong since an embryo is a human being and hence should not be screened. However, Sandel supposes that if sex choice by sperm categorization is offensive, it should be for causes that go beyond the dispute about the ethical status of the embryo.

He further articulates that for those who think that communities with considerably fewer women than men will not be much stable, more aggressive, and more inclined to crime or conflict are not supposed to t do so since those are obvious qualms that the sperm-sorting firm takes care of.

Again, the morality of giftedness, under the cordon in sports continues in the role of parenting. Though we may select our partners and friends depending on the traits we find striking, we do not select our kids.

Their traits are impulsive, and even the most diligent parents cannot be held totally accountable for the type of kids they own.

Finally, genetic enhancements generally demoralize our civilization by intimidating our ability to act liberally, to thrive by our own hard work, and to deem ourselves liable, credible of praise or fault, for our own actions and status. Genetic engineering and enhancement demoralizes ones effort and corrode human agency. From all these arguments, its explicit that genetic engineering and enhancements are ethically wrong.

Work Cited

Sandel, Michael. Justice: Whats the Right Thing to Do? New York: Farrar, Straus and Giroux, 2010

Information Systems: Ethical, Legal, and Security Issues

The rapid development of information technologies has offered many opportunities to individuals, businesses, and public organizations. However, it has also given rise to many problems such as Internet fraud, privacy violation or data theft.

This report is aimed at discussing the ethical, social, and legal issues related to the use of information systems. In most cases, they emerge when a persons right to privacy is disregarded. The problems identified in this paper require close attention of managers and legislators who must make sure that people know how their personal information can be collected, stored or shared.

Overall, the term information system can be defined as a combination of technologies, software solutions, and procedures that are needed for the collection, storage, and transfer of data (Prakken 38). At first, it is necessary to examine moral aspect of these tools. As a rule, ethical issues arise when businesses or organization use private data without the consent of customers or users. For example, one can refer to the activities of data brokers or organizations that collect information and sell it businesses (Dempsey 250).

Very often, this information can be collected with the help of cookies or data mining techniques that can throw light on peoples interests or values (Dempsey 250). Yet, these organizations do not receive peoples informed consent and customers do know much about their activities. This behavior violates the principles of public or interpersonal relations, established in the community. Moreover, the problem of consent is closely related to the work of medical institutions.

These organizations have to collect, store and share records about patients health (Goodman 59). To a great extent, these activities ensure the effective work of healthcare organizations (Goodman 59). The problem is that this information is very confidential and people do not want it to be accessible to others. It is probable that these records can be made public, and an individual may be able to address this risk. So, the use of information systems can violate a persons rights without his/her consent.

Additionally, it is important to remember about social issues that can be explained by some widespread changes in peoples behavior and their attitude toward such concepts as privacy and confidentiality. First of all, the development of information systems has enabled people to learn more about one another (Stair and Reynolds 392).

For instance, such social networks as Facebook, MySpace, or Twitter enable users to post information about themselves, and it should be available only to their friends or relatives (Stair and Reynolds 392). Nevertheless, this information can be easily used against them. For instance, their postings can be considered by law-enforcement agencies in order to detect people who can pose a threat to the society. This is one of the problems that should not be overlooked.

Similarly, it can be used by people who may want to obtain users emails, phone numbers, addresses, and sometimes even credit card information. Therefore, it is possible to say that information systems have become public, and this situation can imperil the security of peoples data.

It is also important to remember about legal problems that are closely related to the information systems. This issue is particularly important to many businesses that should defend their data from potential competitors (Calder & Watkins 316). This is one of the reasons why these organizations face legal issues and disputes. These problems occur in those cases, companies cannot secure of their patents, the information about their clients, trademarks, inventions or other forms of intellectual property (Calder & Watkins 316).

It should be noted that many businesses depend on the security of their intellectual property, and in some cases, they have to pursue those individuals who could use their intellectual property without the official permission of the company (Calder & Watkins 316). These legal problems can be very expensive and time-consuming for many organizations.

Thus, one can argue that private companies and public organizations should pay close attention to the security of their information systems that should be protected from intruders. The same problems are encountered by individuals who have to make sure that their confidential information is properly protected. In many cases, they have to create a system of passwords that prevent unauthorized access to their information. Provided no precautions are taken, a great number of people can be affected.

On the whole, these examples suggest that information systems give rise to a variety of ethical, social, and legal problems relevant to businesses, governmental organizations, and separate individuals. As a rule, they occur in those situations when a persons confidential information is used by other parties without his/her explicit agreement.

These issues should be addressed by policy-makers, legislators, and the leaders of businesses or public organizations. The most important task is to make sure that the users of information systems should know how their confidential data can be used by third parties. This is the main argument that can be advanced.

Works Cited

Calder, Alan, and S. Watkins. IT Governance: An International Guide to Data Security, New York: Kogan Page Publishers, 2012. Print.

Dempsey, John. Introduction to Private Security, New York: Cengage Learning, 2007. Print.

Goodman, Kenneth. Ethics, information technology, and public health: new challenges for the clinician-patient relationship. Journal of Law, Medicine & Ethics 38. 1 (2010): 58-63. Print.

Prakken, Ben. Information, Organization and Information Systems Design: An Integrated Approach to Information Problems, New York: Springer, 2000. Print.

Stair, Ralph, and G. Reynolds. Fundamentals of Information Systems. Boston: Cengage Learning, 2011. Print.

The Professional Computing Ethics

Introduction

Plagiarism is the practice of trying to pass off the words or ideas of someone else as your own. Thanks to the growth of the web, coupled with the explosion of electronic content, one can easily cut and paste the contents of an academic essay and other documents with little regard for quotation marks or even proper citation (Reynolds 2009, p. 201). The wide prevalence of online paper mills means that users can now easily download entire term papers. Several sites give the warning that their services are only meant for research purposes but not many users heed this warning. Some instructors can detect plagiarism on term papers submitted by students by familiarizing themselves with the writing style, vocabulary, and grammar of students. However, this can be a slow and inefficient process, especially when dealing with hundreds of term papers at a time. Thus, plagiarism detection systems become useful. These systems enable teachers, law firms, publishers, and corporations to match the text in various documents in a bid to identify possible plagiarism (Reynolrds, 2009, p. 211). Nonetheless, the submission of students term papers to the Turnitin system for plagiarism detection, along with retention of the same in the archives of the Turnitin database for use in comparing term papers submitted in the future remains a controversial ethical issue.

Plagiarism detection systems

Plagiarism detection systems work by comparing the materials submitted against several databases containing electronic content. Some of these databases include over 5 billion pages of electronic content that the public can access on the internet. We also have numerous pages of published works in electronic form, including magazines, journals, newspapers, and even electronic books. Papers that have previously been submitted by participating institutions for plagiarism detection services also form part of the database. Several plagiarism detection software and services are available in the market but Turnitin is the most popular and widely utilized.

The software has been in the market since 1999 and more than 5,000 academic institutions across the globe use it. Although there is the likelihood that the use of Turnitin service could somewhat infringe on the copyright laws of a student over the essay submitted, nonetheless, the use of the work of a student by Turnitin is still in compliance with the copyright and privacy laws in Australia. Copyright infringement occurs when iParadigms, the firm that owns the Turnitin product, accesses the archived papers of students without seeking their consent first while examining the originality of newly submitted term papers. On one occasion, the firm was sued by four high school students on grounds that it used its archived papers without first seeking the consent of the students. However, according to the ruling of both the court of appeal and a district court, the use of student papers to facilitate the detection of plagiarism is fair and as such, it does not constitute a copyright infringement. On the other hand, although the use of plagiarism detection software is a legal practice, the question of whether this is an ethical act or not, is still debatable.

Ethical issues of submitting student assignments for plagiarism detection

It is important to note that doing a certain activity such as the use of plagiarism detection systems could be legal, but this does not mean that it is an ethical practice. This is because all of us are advised to obey the law lest we are punished. On the other hand, the issue of ethics should be addressed from an individual point of view. For example, several students or institutions would not be comfortable with the use of the software detection systems and instead opt for a system that teaches the culprits the need to avoid plagiarism so that it may not even become necessary to detect the vice. A good example here is the case of a student at McGill University who declined to submit his work for plagiarism detection using the Turnitin service. The student in was opposed to the university policy that required students to submit their work through Turnitin for plagiarism detection, and he challenged the policy with success (Brown 2004; Churchill 2004). Following this incident, we have had mixed reactions from faculty members and students alike regarding the use of the software.

There should be a concerted effort to create awareness amongst the students and faculty members on the need to pursue academic integrity. Also, the faculty members should be pursuing other options to deter plagiarism, other than the use of plagiarism detection software. The key stakeholders at the university, including the administrative staff, teaching staff, student advocacy groups, and librarians should all be committed to promoting academic integrity among the students. Lampert (2004) aptly notes that in the same way that handling academic offenses is usually shared between administrators, the faculty, librarians, and student service officers, in the same way, they should also share the responsibility of educating the student on how to use information ethically.

Ethical issues of retaining papers submitted to Turnitin for plagiarism detection

We also need to question if the practice of Turnitin retaining papers submitted by students for subsequent analysis is ethical. Once a student has submitted his/her paper to Turnitin to check for possible plagiarism, such past papers are retained to act as reference material for checking papers sent in the future. In this case, the students do not derive any commercial advantage from this activity, even as they still retain the copyright to their works (Blake Dawson Waldron, 2004).

According to the ACS code of professional conduct and professional practice, a professional in the IT sector must always observe integrity and honesty in all their professional actions and decisions (Australian Computer Society 2005). While undertaking their professional duties, there are times when iParadigms, the owners of Turnitin may be tempted to deceive their clients and benefit in some way. Nonetheless, the firm should be aware that such gains are only short-term and in the long run, the companys image shall be dented by such actions. The issue of confidentiality is also important because IT professionals should desist from disclosing any information that might have been acquired while undertaking their professional work. The only exception is when consent has been sought from the client. In the case of Turnitin, the essays and term papers submitted by customers are usually retained by the company for use in checking plagiarism in papers submitted in the future by other customers.

The idea of retaining such papers and using them has elicited a heated debate amongst students who are opposed to this move. To them, Turnitin uses their work for commercial purposes and they do not benefit in any way from the ensuing financial gain. In addition, the institutions of higher learning shall have enlisted the services of Turnitin at a fee so that the students can then submit the paper to check for plagiarism. It appears as though Turnitin is benefiting from both the institutions and the students as well, and this is unethical. To clear the doubt of a student, he/she may be informed in advance that indeed their submitted work shall undergo the process of plagiarism detection and that the system would retain copies of the works submitted so that they may be used as source material while conducting plagiarism detection services in the future.

From a legal perceptive, such a practice could be okay but from an ethical point of view, the practice could elicit a heated debate (Johnson, 2011). To start with, we have students and faculty members who are opposed to the use of plagiarism detection systems. In the same way, some students would be consumed with guilt knowing that their work submitted to Turnitin is being used as reference material to check for plagiarism. Not only is the retention of a students essay an infringement of copyright, but because the company also benefits commercially when the previous papers stored in their database is used as a reference document to check for plagiarism, the fact that submitting a paper with the full knowledge of what to expect is a source of personal guilt, and hence unethical.

Conclusion

The use of plagiarism detection systems by institutions of higher learning has been a controversial activity. On the one hand, there are those students and faculty members who support the practice. On the other hand, there is a smaller group of students and faculty members who are opposed to the use of plagiarism detection software. The legal fraternity has argued that there is nothing wrong with retaining the term paper of a student as a point of reference in detecting possible plagiarism in papers submitted by students in the future. However, we need to appreciate the fact that what is legal may not necessarily be ethical. Some students are consumed by guilt when they knowingly submit their term papers to Turnitin and have such papers archived for later use. Even though they presumably retain the copyright to their work, the fact that their work is used for commercial purposes is a cause for concern to them.

Reference List

Australian Computer Society., 2005. ACS code of professional conduct and professional practice. Web.

Blake Dawson Waldron., 2004. Australian Legal Document. Web.

Brown, L., 2004. Toronto teen wins battle against McGill University over plagiarismdetector. Canadian Press Newswire, Web.

Churchill, L., 2004. Turnitin.com debated. McGill Daily. Web.

Johnson, C. E., 2011. Meeting the Ethical Challenges of Leadership: Casting Light Or Shadow. London: Sage.

Lampert, L. D., 2004. Integrating discipline-based anti-plagiarism instruction into the information literacy curriculum. Reference Services Review, Vol. 32, No. 4, pp. 347-355.

Reynolds, G., 2009, Ethics in Information Technology. Stamford, Mass: Cengage Learning.

Huntingtons Disease and Ethics

What defines Michael J. Sandel as a professor at Harvard? What makes his lecture on justice so stimulating and inspiring? The basic daily life of every instructor in a learning institution involves making appropriate decision in line with the Florida code of conduct for professionals. Every professional will in his everyday life strive to make right decisions that are for the best interest of his primary clients.

The code requires that the instructor acts in the best interest of the students. It further requires that a lecturer at a university who has plenty of time at his disposal would feel better offering his teaching services to students. The question to be answered in this case is whether this decision is wise enough and does it conform, to the stipulated educational guideline?

One of Michael J. Sandels famous examples is that torture is ethically justified especially in cases where it involves criminal activity. Are policemen right in torturing suspected criminals in order to get information out of them?

This case results in an ethical dilemma since the policemen on one hand is dealing with a dangerous criminal who may not cooperate unless tortured, but on the other hand is bound by professional codes of conduct requiring him respect the human rights of all suspects.

Since ethics is a set of mutual rights and obligations that ought to govern human relationships, the linkage between educational and ethical issues is hardly surprising. In any set up, like a university or college, disparities in knowledge and power between instructors and the institution managers is likely to create ethical dilemmas.

Any analysis of ethics on the discussion of leadership must eventually wrestle with the question of fairness. Impartiality and equitable treatment are essential to effective discussions; without them, efforts to encourage participation will be futile. These deliberations make us understand the ethical issues more clearly, especially in the medical field. Every decision a doctor has to make is pegged on matters of justice and ethics.

The advancement in technology in genetic testing places physicians in an awkward position. The patients risk being discriminated and consequent loss of healthcare benefits if there genetic influence is disclosed. This information may, however, help patients outline a plan for their future relationships and alignment of their objectives.

A child to a patient with Huntingtons Disease (HD) has a high probability of having inherited the abnormal gene from the parent thus possible development of HD (Terrenoire, p. 46). If patients do not know the outcome of their results, they live in fear and uncertainty. This leaves the doctor in a dilemma as to whether to perform predictive genetic testing for HD, an ultimately fatal disease.

The issue of who should participate in this testing vis avis family issues present ethical issues that physicians must handle with conscience (Terrenoire p. 92). While other predictive genetic tests allow patients to seek life-saving treatment before symptoms develop, no such option is available for patients with HD.

Even with the results of the test in hand, the only recourse patients currently have is to wait for the onset of symptoms. Siblings may differ in their desire to see the results of genetic testing if one parent is diagnosed with HD. Genetic counselors and other clinicians may hesitate to communicate results if not all family members are in agreement.

Autonomy includes an individuals right to self-rule and individual decision making without undue influence from others. To respect patients autonomy, clinicians and health care workers must communicate well with their patients. This includes both active listening and providing sufficient information to facilitate patients decision-making.

Clinicians must know what information a patient wants and, perhaps more importantly, what information a patient does not want to know. The clinician must respect the patients decision and not deviate from that it. This presents an ethical dilemma to clinicians especially in situations where patients are hesitant to pursue medication for diagnosed conditions.

Clinicians must adequately describe the process of HD genetic testing and the implications of its results. Patients should be encouraged to discuss the process with their family members before the testing, since the results could have significant implications for other relatives.

Once a decision is made, clinicians must respect and abide by that decision. It would not be ethically appropriate for a clinician to convince a patient to undergo testing that is not desired. Nor would it be appropriate for a clinician to disseminate results to individuals who choose not to see them.

Clinicians must fully inform couples of child-bearing age of the factors to consider in planning a pregnancy, performing prenatal testing, and available options after results are known (Hadley, w. 406). While the expected or future children of HD patients are not able to exercise their right to autonomy, their parents have to decide for them.

Beneficence involves taking an appropriate action for the good of the patient or [doing] whatever good one reasonably can for another person (Hadley, w. 400). Clinicians need to evaluate each case to ensure that treatments or testing is providing a net benefit for the individual.

What is in the best interest for one person may vary considerably for another individual, even if both are diagnosed with the same disease. Clinicians must consider the risks and benefits of each recommendation to provide a net benefit to each patient.

In the case of predictive genetic testing for HD, clinicians and other health care team members must consider the benefit to the patient. However, they are also ethically bound to consider the benefit to family members and potential children of HD patients. Beneficence may decide that clinicians share the results of HD testing with the children of a patient with HD.

Daughters of HD patients may acquire a greater benefit from this information as they consider planning their own families and future life plans (Hadley, w. 400). This concept also relates to the confidentiality of genetic testing information. With this information, daughters of HD patients can assess their plans for conceiving children normally with or without prenatal HD testing or choosing adoption.

At this time, the results of a prenatal screening test for HD will not affect the physicians ability to prevent, treat, or cure HD. However, the parents of these children may think that it is also beneficial to know as soon as possible in order to consider all life planning options.

The principle of non-maleficence relates closely to the principle of beneficence. In health care, non-maleficence is the principle that states that clinicians must do no harm and work to reduce damage to their patients (Hadley, w. 401). In conjunction with beneficence, there must be a net benefit to the patient. Again, the evaluation of damage and welfare must be individualized to each patient.

Similarly, children of HD patients may feel more pain if they are not told of their parents diagnosis than those who are aware of the disease. In order to comply with non-maleficence, clinicians must comply with their patients wishes in regard to performing genetic testing and the subsequent dissemination of results.

Clinicians and patients must also carefully consider options regarding pregnancy in patients who carry the HD gene. Should they allow a pregnant lady, suffering from the HD to continue carrying the baby? This question leads to ethical dilemma as the clinician is bounded by ethics to do no harm both to the mother and her unborn child as well.

In considering the implications regarding predictive testing for HD, one common requirement is clear, i.e., complete communication between patients with HD, their family members, and clinicians.

An individual who might never have consciously or otherwise contemplated the possibility of direct involvement might have life and hope blighted, and survival without development of the disease might be little compensation for a lifetime of anxiety, dread, and single status.

In order to make the best decision, I chose the solution that, the highest ethical approach to the dilemma of whether predictive genetic testing for HD should be performed. Allowing patients the option to seek out this study provides patients with the freedom to make their own decisions regarding their genetic fate.

All the parties involved must communicate clearly and frequently to ensure that everyone hears and understands the same information. To this end I find Sandels Justice Whats The Right Thing To Do? Whatever the action a physician takes in this case is ethically justified if it is in the benefit of the patient and any other involved close relative.

Works Cited

Hadley, Jack et al. Covering the Uninsured in 2008: Current Costs, Sources of Payment, and Incremental Costs. Health Affairs, 27.5 (2008): W 399-414. Print.

Terrenoire, Gwen. Huntingtons Disease and the Ethics of Genetic Prediction. Journal of Medical Ethics, Philadelphia: Carey, 1992. Print.

Ethical Behavior in Research

The norms of ethics play a prominent part in research because they imply that a person should respect other people who take part in a study and acknowledge the contributions of other scholars. This paper will focus on such notions as intellectual property, use of human subjects, and social responsibility.

In particular, it is necessary to explain how researchers should ensure that the rules of ethical behavior are followed. Overall, one can say that these requirements are obligatory almost for every kind of study but they become essential in those cases when the research involves human participants or when it significantly affect the life of a community.

The key concepts that are related to research ethics are honesty and integrity. One of the most important requirements is the disclosure of relevant information about research. In particular, those people, who take in the study, should know about the objective of this research, the use of confidential data, or possible risks, if there are any (Emanuel 59; Creswell 89).

These are the steps that a research or team should take to make sure the principles of openness or integrity are not violated. These ethical rules are important for both individual researchers and organizations. The thing is that an organization or company that sponsored an ethically flawed research can face legal action, social disapproval, and even loss of profits. When discussing the principles of openness and integrity, one should mention such an issue as the conflict of interest.

In many cases, the studied are funded by commercial or for-profit organizations that pursue some economic objectives (Caulfield and Williams-Jones 79). Thus, every researcher should acknowledge his or her affiliation with a commercial organization; otherwise the findings of the research or its methodology can be discredited. This is why the principles of openness and integrity should not be disregarded.

The use of human subjects is the main reason why so much attention is paid to the ethical aspects of research. The main principle that should be followed is the avoidance of harm to the participants. This task is of great relevance to social sciences and medicine. Under such circumstances, the researchers should build every safeguard ensuring that life and health of the subjects are at risk. Avoiding harm also means that the confidential information about subjects should be treated properly.

It should not be disclosed to any third-part or used for any purposes that have not been discussed with the subjects before. For example, phone numbers, medical records, or addresses of subjects cannot be transmitted to any third-parties. In other words, everything that can reveal the identity of subjects should be kept confidential (Creswell 90). One can reduce this risk by limiting the access to these data. This task is significant in those cases, when a great number of people participate in a research project.

Another issue which is also important for researchers is intellectual property. In particular, scholars and scientists should acknowledge the ideas that they borrowed from other people who work in the particular area (Eliott and Stern 101). This issue is relevant not only to people who conduct research but to the organizations that support this study.

One should remember that a significant violation of intellectual property rights can lead to legal problems and tarnish their reputation. In this case, a researcher or team can ensure ethical behavior in several ways. First of all, every person, who has taken part in conception of research project or its design, should be mentioned as an author or a contributor.

Secondly, it is necessary to give credit to those people whose findings or theoretical models were used by researchers. So, rules of academic citation should be followed. These are the main ways of acknowledging the intellectual property of other people as well as their contribution to a certain field of study. It is a sign of professionalism and respect for others.

The concept of social responsibility is also closely related to research. The task of a scientist or scholar is to think about the long-term effects of a study on the community. In particular, their research should strive to benefit a larger community, for example, other scholars, educators, students, or customers.

Secondly, they need to make sure that the research does not pose a threat to the interests of the community. For example, a person who works on the development of new technologies should think about their environmental impact. These are the main aspects of social responsibility in research.

Therefore, it is possible to argue ethical behavior is instrumental for avoiding the harm to the human subjects, preserving the reputation of an organization, or preventing any form of legal conflict. The norms and principles that have been described are applicable to various kinds of studies, especially those ones which involve human subjects. The interests of these people should be the top-most priority for researchers. This is why much attention should be paid to openness, integrity and social responsibility.

Works Cited

Caulfield, Timothy, and B. Williams-Jones. The Commercialization of Genetic Research: Ethical, Legal, and Policy Issues, New York: Springer, 1999. Print.

Creswell, John. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, New York: Sage Publications, 2009. Print.

Eliott, Den, and J. Stern. Research Ethics: A Reader, Lebanon: UPNE, 1997. Print.

Emanuel, Ezekiel. The Oxford Textbook of Clinical Research Ethics, Oxford: Oxford University Press, 2008. Print.

Smartphone-Related Cognitive and Ethical Issues

Abstract

Smartphones are substantially changing almost all facets of modern life. The use of modern cellphones to record the activities of unknowing subjects covertly is examined in this case studys discussion of moral and ethical dilemmas. This instance demonstrates how regular smartphones have been used maliciously to obtain private data. Moreover, it discusses why restrictions should be placed on teens and childrens smartphonesfocusing on issues such as smartphones adversely affecting their social connectivity. Finally, this case study demonstrates how challenging it is to address the cognitive issue with smartphones because they constantly divert users attention even when not in use.

The remarkable rise of smartphones and the rapid adoption of mobile computing are two of the most important developments in contemporary information and communication technology (ICTs). The mobile phone has evolved as a communication device with an endless list of features, such as a navigation system, a personal communications manager, and a gaming console. Because of these aspects, smartphones constitute an excellent topic for discussions on ethics. The ethical issues surrounding smartphones touch on several core concepts and principles.

The ramifications of the smartphones encroachment into every sphere of public and private life raise issues that merit discussion in ethics. The likelihood of mobile phone ringing in any given circumstance, and its ability to impede solitude or focus, have drawn attention to the socially acceptable use thresholds in various public and private locations (Akopova, 2020). This issue brings up more fundamental questions of decency and social propriety. A related and extensively discussed topic is the phenomenon of absent presence, which describes people using phones (Samal, 2019). At the same time, they are socially and physically present in another location but have their attention and focus elsewhere. It is a bigger problem, namely the potential emergence of a culture of constant communication distraction, which would limit peoples access to uninterrupted thinking time at work, at home, and school. It has been asserted that peoples preoccupation with digital relationships causes them to disregard individuals in their immediate social environment.

Specific technical flaws in smartphones present several security concerns. The technological characteristics and very nature of wireless radio transmissions make smartphone communication data susceptible to eavesdropping (Truong et al., 2019). The mobile communications network has rather inadequate default encryption settings for transmitted data. Malware spread through unsecured applications, or software updates is particularly dangerous to smartphones. Unauthorized access via such malware can be used to read confidential information. The fact is that cell phones make it more challenging to preserve your privacy because phone companies keep your data for at least two years (Samal, 2019). If necessary, authorities can access the data stored on your smartphone. Mobile carriers receive millions of subpoenas for user information, whether legal or unethical. Privacy is a fundamental human right and ethical value, yet smartphone usage has undermined it.

Other ethical concerns with telephones include issues of cyber bullying, academic dishonesty, and issues like terrorist strikes. In todays world, children and teens are using cell phones at increasingly younger ages, potentially leading to problems if the proper smartphone etiquette is not emphasized. Teenagers using their phones on campus and possibly even in class has increased, and the problem of cheating with cell phones in class follows (Al-Ghaith, 2021). Students may use their phones to avoid study time and pass exams. Additionally, although not literally, telephones could be used as weapons in attacks like the most recent shooting in San Bernadino. Through smartphones, cyber bullying can take place directly or indirectly. Instances in which the victim is directly involved are referred to as direct cyber bullying; examples include the willful sending of files containing viruses and privacy concerns (Samal, 2019). On the other hand, indirect cyber bullying is type of bullying in which the victim is unaware of the interaction. Examples include impersonating someone, reading someone elses email, and sending embarrassing information via mobile devices.

Why Restrictions Should Be Enhanced in Teens and Childrens Smart Phones

Most adults who are now raising teenagers grew up in an era before personal electronics were commonplace. A household could have a personal computer, but hardly anyone would have a mobile phone they could carry with them (Laudon & Laudon, 2019). In addition, nobody possessed a device that could be utilized to access the internet whenever needed. For the first time, parents must choose when to give their kids telephones and how much time to give them access to those devices. And many parents do not see any justification for restricting teenagers phone use. However, there should be certain limitations because smartphones are thought to harm teenagers.

Internet addiction is a severe issue, especially for young teenagers. As time passes, the teens learn that they want to use the smartphone more and more. It could lead to addiction from being a helpful tool or a source of enjoyment (Laudon & Laudon, 2019). When teenagers can use their phones to call their acquaintances, it is pretty simple to distance themselves from their families. The child or the teen frequently spends more time on the phone than conversing with family members over meals, movie nights, or game sessions. Secondly, most teenagers prefer to communicate with their colleagues online to those in person (Samal, 2019). Teenagers risk never learning how to relate to people in real life if they become overly dependent on their phones. Future significant debilitation may result from the teens lack of necessary social skills.

Thirdly, using a phone when a teen is at school might be distracting. It is elementary to get sidetracked from schoolwork, especially when a persons phone vibrates every minute to alert them to text messages, Snap Chat, or tweets. Fourthly, the lack of regulations on the internet allows children and teenagers to access content they would never be able to view in the actual world (Truong et al., 2019). Because the children have access to the internet on their phones, they may be viewing sites that are not of their age span. A person might not be able to protect them from this unless they take the time to set usage limitations because this is occurring on their phone, which is much tougher to monitor.

Additionally, banning teen and kid devices promotes communication. A child is more inclined to talk to and answer questions from their parents when they cannot hide behind their phone. If youngsters believe they can always take out their phones and tell their peers about what is happening, they will not feel the need to go to their guardians with their worries (Akopova, 2020). Teenagers will frequently start talking to the parent concerning their requirements instead of only reaching out to others outside the family if the guardian restricts their use of their phones. Finally, limiting teenagers phone use helps parents assert their authority. Teenagers who do not believe their activities have repercussions will frequently act out and engage in riskier behaviors to obtain their parents attention. A straightforward method to assert your authority as the rule maker is to set limits on how much time kids can spend on their phones, establish clear ground rules, and ensure those rules are obeyed.

Why the Issue of Cognitive Skills Cannot Be Solved in the Use of Smart Phones

Smartphones and other portable media players have improved their capacity to supplement or even replace specific mental processes. The devices may be used for various cognitive purposes and to satisfy many of our emotional urges. They can be used as appointment calendars, maps, phonebooks, gaming devices, internet portals, and tip calculators. While these technologies have enormous potential to boost welfare, their continued presence may have a cognitive cost. Sensationalist titles such as Are Smartphones Making Us Dumber? Support the claim that reliance on cellphones and related technologies boosts our ability to think and recall (Laudon & Laudon, 2019). The problem of cognitive skills with smartphones is difficult to fix since, despite user efforts to ignore them, smartphones can potentially disrupt sustained concentration.

How smartphone technology can severely interrupt or obstruct ongoing physical and mental work may be its most visual and noticeable impact on peoples daily lives. It might be helpful to categorize smartphone interruptions as either endogenous or exogenous. When users thoughts turn to smartphone-related activities, they experience endogenous interruptions, which manifest as an otherwise uninvited urge to start using the device. These cognitive costs primarily affect individuals with the highest smartphone dependence (Truong et al., 2019). When continuous goal-directed tasks are not regarded as rewarding, these endogenously motivated attention drifts may result from a need for more immediate pleasure. Once the focus has been diverted to the smartphone for one purpose, users frequently continue using it for unrelated tasks, lengthening the interruption. Furthermore, according to specific statistics, interruptions are likely to be more harmful to finishing the main task the more information a person encounters during one.

When an external trigger draws a users attention, exogenous interruptions happen. It frequently involves a notification from the smartphone. The use of a smartphone may also be influenced by external factors, such as seeing someone else using one or being reminded of a task that can be done on a smartphone. In one recent research, the philosophers discovered that, even when someone did not take the time to read the warning, exposure to smartphone alerts significantly reduced productivity on a concurrent attention-based task. It suggests that the participants ability to focus on the main task was diminished by just sound or vibration that conveyed the notification. The philosophers proposed that the signs led to the emergence of task-unrelated thoughts, resulting in a subpar performance in the primary activity (Truong et al., 2019). Moreover, even being physically aware of a cell phone can impair an individuals cognitive functioning.

According to research, phone use is slightly disruptive when performing demanding tasks. The adverse effects of cell phones on attention are particularly problematic when attention is required for safety, such as when driving when inattentive. The impacts of texting on driving abilities have been studied extensively over the past 12 years using driving simulations or closed tracks (Laudon & Laudon, 2019). A meta-analysis of this research found that almost all studied indicators of unsafe driving are affected by texting (Truong et al., 2019). Through the case study of smartphone interruptions, it has been indicated that individuals are adversely affected. Hence, this has an indirect induction to their cognitive skills where research has outlined it hard for individuals to ignore their smartphones when close to them. The analysis indicates it is hard to solve the issue of cognitive skills; however, it can be a remedy by accomplishing some tasks off the phone.

References

Akopova, M. (2020). Influence of smartphones on students attentional processes. Vestnik Universiteta, (6), 167-172. Web.

Al-Ghaith, W. (2021). International Journal of Computer Science and Information Technology, 13(2), 43-65. Web.

Laudon, K., & Laudon, J. (2019). Management information systems (16th ed., pp. 1-656). Pearson.

Samal, S. (2019). Journal of Advanced Research in Dynamical and Control Systems, 11(10), 373-379. Web.

Truong, J., Labhart, F., Santani, D., GaticaPerez, D., Kuntsche, E., & Landolt, S. (2019). Area, 52(1), 81-88. Web.

Facing Ethical Issues as a Software Engineer

Overview

The core of the ethical issue is that a particular software engineer has to make a decision to release software that did not go through all the necessary quality control checks, in order to be one hundred percent certain that there will be no catastrophic errors that will occur when already deployed.

The stakeholders are the investors of the company; the employees and staff; software engineers; the hospital staff and health professionals that will use the said software, as well as the patients of the hospitals. By looking at pertinent information the software engineer has two options.

The first one is to release the product even before it has passed the stringent quality control test required to determine that nothing can go wrong in the operational phase. The second option is to inform clients that there will be a delay in the deployment of the said software.

Ethical Theories

Applying the Kantian theory of ethics the software engineer will have to inform the stakeholders including the investors of the company and the clients that there will be a delay in the launching of the product. They will not be able to use the product because more tests are required to determine if the software will not negatively affect the lives of patients when it is already made operational.

Using the rule utilitarian approach the head software engineer will have to choose between two options and it hinders on the stakeholders that will be most affected by the action. Thus, the software engineer can say that since the bugs are only minor, then there will be no significant problems that may arise in the future.

This will negatively affect the position of the investors that anticipated the launching of the product. On the other hand if the clients outnumber the investors then the software engineer will not release the product knowing that more people will be affected in case of major problems that will arise.

Using the act utilitarianism will force the software engineer to halt the launching of the software because he will come to realize that more people will be upset if indeed the software proves to be problematic. This means that the investors and the people working in the software company are less in number when compared to the clients that will be potentially affected using the said device and software.

ACM Code

According to the Association of Computing Machinery Code of Ethics, there are so many things that has to be considered with regards to this issue. First of all the company must adhere to the idea that their organization must contribute to society and human well-being (ACM, par. 1). This means that the company must consider the quality of their product before they release it to the market.

The ACM Code also says that the company must avoid harm to others. The said software was not yet properly tested and therefore using the ACM Code, the company must not release the product yet. The ACM Code also stated that the company must be honest and trustworthy. The head software-engineer must tell the clients that expected delivery date is impossible because further tests are needed.

Finally the ACM Code says that there is a need to strive to achieve the highest quality, effectiveness, and dignity in both the process and products (ACM, par.1). There can be no dignity and effectiveness if the company will not divulge the problems that are inherent in the said product.

The software engineer responsible for making the decision to release the product or not is standing on shaky ground because he cannot prove without doubt that the software will work under different types of conditions and be assured that it will not fail during times of crisis when it is most needed.

Software Code

In the Software Engineering Code of Ethics and Professional Practice it has been made clear that the software engineer must only approve if they have well-founded belief that it is safe, meets specifications, passes appropriate tests, and does not diminish quality of life , diminish privacy or harm the environment (Software Code, par.1).

The software engineer in this case cannot give the assurance that it is entirely safe and will not diminish the quality of life of the clients. The software-engineer is not yet knowledgeable about the extent of the problem and if there is indeed a bug that can create significant problems for hospital staff.

The same code also says that it is the duty of the software-engineer to disclose potential problems to the clients. He must tell them the problem and therefore it is not possible for them to release the product ahead of schedule. A through test is needed and the software-engineer must continue to maintain communication between the company and the clients. They must be updated as to the reason of the delay and to tell them the progress of the evaluation and testing. These things must not be hidden from clients.

Summary

If the software-engineer will decide to release the product then there is a possibility of failure. Since he did not inform the hospital management, staff, and health professionals regarding the potential problem in the said software then the moment a crisis will hit then the software-engineer will lose credibility. But there is more than that, the problem in the software may be significant then it is possible to endanger the lives of the patients.

If the software-engineer will come out into the open and explain the problems then this action will negatively affect the investors and the owners of the company. They will have problems when it comes to expected profit. They will realize that instead of making money they may have lost some.

It will be a terrible blow to the image of the company. However, if there is something seriously wrong with the software and they still decided to release it then they were not doing their jobs. This will result to litigation. Thus, it is better to lose face for a while and announce that there is a need to assess the integrity of the system.

Works Cited

ACM Code of Ethics and Professional Conduct. 28 Feb. 2011. Association for Computing Machinery. 2011. <>

Software Engineering Code of Ethics and Professional Practice. 28 Feb. 2011.

Association for Computing Machinery. 2011. <>

An Introduction to Ethics

Abstract

Ethics is a necessity for organizations and human existence, without ethics, organizations or an individual action would be indiscriminate and purposeless. An ethical dilemma encompasses the decision to choose between two or more equitably satisfactory course of action, where one option constraints choosing the other, or obligation to choose amongst equally unacceptable options.

Introduction

The Economic Competitiveness Group, ECP is a global company consisting of professional planners, management consultants and economists dedicated in assisting clients attain viable economic success by embracing creativity, group based policy, distinct cooperative implementation practice and a multitude of associated organized and company building services (Economic Competitiveness Group, 2011).

More specifically, ECG has aided regions to design and implement action based economic development strategies to achieve their needs. In enduring to empower its clients to achieve economic goals, ECG is faced with unethical dilemma of corruption (Economic Competitiveness Group, 2011).

The weakness has been deeply ingrained in the organization as a precondition to win major contracts especially when competition exists among its competitors.

This paper discusses two ethical theories. The paper also relates these theories in the operations of the ECG.

Utilitarianism Theory

Utilitarian theory tends to characterize an organization trend in fulfilling its needs of self as well as fulfilling the needs of other people. The principle in the utilitarian approach designates that; any action should incorporate certain principles, which create satisfaction, within oneself and others. According to Nina (2005), an action that results in the moral rectitude and content should always be viewed as very useful.

As the theory asserts, an organization has to decide what is convenient for it to sustain integrity and remain unique among the others besides fulfilling the needs of its clients. ECG can incorporate this approach in assessing the unethical effect that corruption can stand in its quest for securing contracts from its clients.

Thus, according to Nina (2005), any activity that provides mutual satisfaction is right, and any action that provides otherwise is unfortunate. The utilitarian theory provides a organization and the human ethical guidelines, that reinforces moral principles and practices.

Kants moral approach

This moral theory is also known as the obligatory theory (deontology). Kants moral theory is in contrast with the utilitarian application and it depicts a small correlation exists between actual, moral philosophy and the consequences of an action (Hinman, 2007). The Kants approach observes that reverence for the ethical order must be present.

By embracing this approach, whenever an action is done positively, the cost, whether good or bad does not matter. Ethical law helps in defining what our consciousness sees is incorrect or good. Thus, it helps to free our minds from guilty thoughts. According to Hinman Naturally, moral principle asserts that bribing to obtain a favor is wrong (2007).

This theory can be of importance for ECG in assessing its business practices. A sincere, and transparency strategy of gaining or winning an organization improve support efficiency and integrity. ECG can appreciate the Kants moral philosophy. This will provide an opportunity in assessing the abhorrent practices of corruption in its quest in sustaining its competitive advantage among similar firms.

Thus, in recognizing the Kants theory, ECG will be in appropriate positioning in assessing the unethical implication of corruption. Correct choice of the instrumental value can results also in the attainment of an intrinsic value for ECG.

Reference List

Economic Competitiveness Group, (2011). . Web.

Hinman, L. M. (2007). Ethics: a Pluralistic Approach to Moral Theory, Connecticut: Cengage Learning.

Nina, R. (2005). The Moral of the Story: An Introduction to Ethics, New York: McGraw-Hill.

Ethics and Gender: Empowering Societies

Introduction

Many societies have failed to protect the rights and liberties of their people. It is agreeable that many governments and leaders have structured different human rights in order to protect their political needs (Gottlieb, Ackerman, and Ammar 209). Such laws protect the expectations of every powerful person in the society. This development has affected the lives of many people in the society. The topic Ethics and Gender highlights the major challenges affecting many people in the society. This essay examines how the above topic can empower different societies. The essay presents the best arguments in order to support the importance of this topic.

Ethics and Gender: Subject Matter

The topic Ethics and Gender offers numerous ideas that can support the lives of many people. Ethics can address the major issues facing humanity today. Several ethical theories such as utilitarianism encourage more people to promote the best actions. Such theories will support the needs of more people in the society. Many theorists encourage more communities to support their women. Many scholars are examining how various ethical considerations can support different gender roles (Bowden 28). Ethics and Gender also borrows several ideas from the Holy Bible. Some philosophical arguments have also redefined the roles and expectations of different people in the society.

A number of subtopics are also identifiable in this field. For instance, many scholars have been examining the issue of gender equality. The issue of gender is also applicable in different working environments and social positions. Ethical theories can also support the changing expectations of different people in the society. Women and men are expected to occupy specific positions in their respective societies (Bowden 39). Such individuals tend to have their unique liberties and freedoms. According to Bowden (87), ethics is a powerful field that encourages individuals to embrace the best actions and behaviors. Ethics and Gender can also address many challenges in every society. The field covers a wide range of issues that can produce the best socio-cultural practices.

Importance of the Above Topic

The topic Ethics and Gender is relevant because it examines the major issues affecting humanity. Many women in different societies have encountered numerous challenges due to gender inequality. A large number of children have failed to achieve their potentials due to discrimination. Some scholars and ethicists have presented powerful theories in order to support more people in the society. The issue of gender inequality has caused numerous debates in many societies (Bowden 78). Such debates have presented effective ideas in order to empower more women. Many scholars have used this knowledge in order to analyze different Biblical arguments. For instance, the book of 1 Peter 5: 5 encourages Women to honor their husbands.

Many ethical theories have empowered many victims of gender inequality. Such theories have also made it easier for them to achieve their potentials. New theories have emerged in order to determine produce the best relationships between females and males (Bowden 79). In 1 Corinthians 11:10, God explains why wives should have a sense of authority. This verse encourages Christians to support their women. Many people have benefited the most from this topic. Scholars should undertake more studies in order to support the needs of more women in the society (Gottlieb et al. 76).

How This Topic Informs Decision Making

Human beings should make appropriate decisions in order to address the challenges affecting them. To begin with, people can make useful decisions concerning the issues affecting their societies (Tilley 4). The above topic encourages decision-makers and leaders to embrace the best ethical concepts. This approach will ensure every society addresses its challenges.

People can also make accurate decisions the duties of children and women in the society or church (Tilley 8). Societies can use such decisions in order to address the issues affecting different minority groups. The issue of gender role is also common in many societies (Tilley 5). The above topic offers meaningful concepts that can redefine the roles of different people in the society. The knowledge also encourages more individuals to embrace the concept of gender difference whenever making their decisions (Tilley 9). This understanding will encourage more people to support the changing needs of their societies.

The topic Ethics and Gender can also encourage Christians to make the best decisions regarding their actions (Gottlieb et al. 72). A Christian ethic has the potential to inform ones actions. For instance, Ethics and Gender can encourage more people to help others (Tilley 12). Believers should use various Biblical verses in order to make the best ethical decisions. Such ideas will eventually support the needs of every person in the society.

Conclusion

The topic Ethics and Gender offers powerful ideas that can transform the universe. According to Gottlieb et al. (76), different minority groups have encountered numerous challenges in their lives. This situation has made it impossible for such groups to achieve their potentials. This knowledge encourages every society to promote the best ethical practices. The approach will deal with certain challenges such as discrimination and gender inequality. In the book of Genesis 1:27, the Bible explains how Jehovah created mankind in his own image. Human beings are equal and should respect one another. This discussion explains why proper ethical considerations will address the issue of gender inequality in every society.

Works Cited

Bowden, Peta. Caring: Gender-Sensitive Ethics. New York: Routledge, 2008. Print.

Gottlieb, Roger, Diane Ackerman and Nawal Ammar. Liberating Faith: Religious Voices for Justice, Peace, and Ecological Wisdom. New York, Rowman & Littlefield Publishers, 2003. Print.

Tilley, Elspeth. Ethics and Gender at the Point of Decision-Making: An Exploration of Intervention and Kinship. PRism 7.4 (2010): 1-19. Print.

Ethics in Video Al Dura  What Really Happened?

What is happening in the video?

The video podcast Al Dura  What really happened? broadcasted by FR2 Television Network shows a man and a teenage boy taking refuge behind a tank amidst flying bullets. The video shows two victims being fired at and succumbing to death as the bullets run through their bodies. This is very disturbing for the public to watch on national television such as the FR2 Television Network.

Players in the video

The two players in the podcast Al Dura  What really happened? are the FR2 Television Network who showed the raw video clip and the Palestinian government. Concerns have been raised regarding the validity of the said cold deaths of the two Palestinians in the video clip. First, the video is short and apparently just a small portion of the original version (HonestReportingVideo, 2008). In addition, the video was played on the FR2 Television Network which is a national television without verifying its validity.

The players loyalty

As the clip alludes, the victims were killed in cold blood by the Israeli troops (HonestReportingVideo, 2008). Public display of the deaths by the FR2 Television Network stirred fear and distress among the citizens. Showing the clip on national television was quite irresponsible of the FR2 Television Network media because that had far-reaching ramifications on the citizens. It was after the video was shown that the public went rampant rioting hence causing unnecessary commotion all over the country. The media should be responsible and uphold media ethics to avoid such incidences.

Media players values

The media has been used in the past as a tool to foster propaganda and false information either intentionally or unintentionally. Some media houses are simply under immense pressure to work round the clock and therefore may lack the time to verify the information they get. This gives freelance media an opportunity to create and prepare act scenes. The FR2 Television Network media, therefore, can be seen to have abandoned their responsibilities in fueling violence among citizens by showing such disturbing videos on national television.

The FR2 Television Network media should always be on the forefront to promote peace and practice discretion on such matters. The video presents a very emotive and sad event that had the potential of creating unimaginable violence in the country. Under all circumstances, the FR2 Television Network media is supposed to protect the audience from accessing such disturbing information for the sake of peace. After the FR2 Television Network showed the video, violence broke out in the entire city as the angered public reacted in response to the violent emotional pictures of a father and a son cornered by bullets.

Ethics with regard to the action on the video

Generally, ethics involved what is morally acceptable or unacceptable. For an action to be of moral worth, such an action is expected to achieve admirable consequences and the doing agent has the feeling of positive accomplishment that confirms restraint. Unfortunately, FR2 Television Networks video report was against this ethical measurement standard.

Specifically, conformity to an individuals duty which forms part of moral worthiness is accomplished through developing an intrinsic sagacity of duty to respect and uphold societal norm on morality and social behavior. By showing this raw motion picture with excessive violent and emotive content, FR2 Television Network did not practice the aspect of sui generis which should limit media reporting to its own values in consideration of the norms of that particular society (Ward, 2012).

In practically, moral worthiness of an action should operate on the periphery of personal conviction, rather than being influenced by secondary factors. In order to classify an action as of moral worthiness, the motive should be self generated without coercion or external motivation to prove a point. Reflectively, the FR2 Television Networks reporting of the raw video in the Islamic and very sensitive Palestine nation was unethical since it had the potential of inspiring hatred and politically inspired retaliation against Israel before confirming the facts (Ward, 2012).

Among the aspired ideals in the action vs. sanction, media ethics model should include the need for an individual or media institution to strive to develop good culture by fostering a strong alignment on the monitored path of achieving its goal of ethical reporting. The action vs. sanction utilitarianism defines permissible, obligatory, forbidden, and supererogatory aspects that appeal to respecting the fourfold distinction that distinguishes moral assessment in reporting (Ward, 2012).

The action by the FR2 Television Network is not ethical in the media profession since it is an unfair representation of information. The media is expected by law to take a neutral stand and spread their news in total fairness (Ward, 2012). Covering an emotive event and showing it in public causes tension and accumulates anger among the citizens, which is quite detrimental to political stability especially in the war-torn region of Palestine. It actually contravenes media ethics and amounts to fear and intimidation. The media should not be used to create tension among citizens hence causing chaos as was the case following the FR2 Television Network broadcast of this video.

References

HonestReportingVideo. (2008). Web.

Ward, S.J.A. (2012). . Web.