Saturday, May 2, 2020

Applying Ethical Theory Apple and FBI

Question: Discuss about the Applying Ethical Theory for Apple and FBI. Answer: Introduction Apple Vs FBI: All you Need to Know This case study enlightens the disputes and arguments between Apple and FBI showcases various advantages and disadvantages of the high security provided in the Apples iPhones. The case study focuses on the negative aspects of the security and authorization promoted in the iPhones while the Apple defends the situation by claiming that the security and authorization are for the safety and privacy of the users data which cannot be compromised at any cost. The huge concern in this case study is the rising disputes and disagreements between the technical or IT companies and the government firms. There are several clashed between them due to the data access rights and authorization processes. In this case study, the US FBI identifies a criminal and also investigates that the criminal used the iPhone (Litschka et al, 2011). The FBI also claims that more information about the criminal and his companions can be extracted by using the iPhone as a key element. This phone requires passwords for the phone lock which the FBI requested iPhone to unlock (Haidt Jonathan, 2012). Apple however responded claiming that providing the key or solution to the locks and granting the access and authorization without the passwords would require software and would be completely unsafe. The company defended their decision by claiming that if the such kind of unlocking key or solutions would be developed then the significance of the locks would not remaining powerful anymore. Ethical Issues, Cyber Crime and Security The ethical issue here is the safety and security provided by the company. It has been stated that the government agency FBI wanted to use the unlocking software or key which request was avoided by Apple. The company needs such high end security providing devices which cannot be tempered by anyone and the security must be so strong for anybody to unlock it easily for solving this issue. The FBI found another solution of getting the phone unlocked by some another agent or company. It was for governmental use where the government agency hired another agency to unlock the system of the iPhone (Bergum Dossetor, 2005). This was an ethical step taken by the FBI to get the correct details of the shooter. The company did focus on securing and maintaining the privacy of the users data. The security features of Apple are quite stronger but are yet broken and tempered by another company (Ravven Heidi, 2013). As per Apple, (2016) the ratio of cyber crime has increased as the security and privacy gets enhanced. The safety and security provides a shield to the criminals under the influence of which, the criminals are able to commit various cybercrime. However for the governmental bodies, these security aspects must be compromised. Social inclusion describes the inclusion of the society which results in the positive changes and actions that are taken positively by the company, this case study reveals that the results may be positive in fact there are some action steps that may be a beneficiary for FBI. In the given case study, there are community and identity as the topics which consists of the common interests of the company as such there are common standards, norms and values carried out by the company to positively plan for the increase in the awareness of cyber crime (Ravven Heidi, 2013). As discussed, privacy and security are important for cyber crime, so are these concepts important. Pervasive computing are the wireless technologies with advanced form but are sometimes dangerous as they seem to be the privacy advocate which is concerned with a practical standpoint. At the end these ethical issues are considered and the results are considered that Apple stuck on the success with defending civil liberties (Ung Hee, 2013). The consequentialism and deontological Theories and their implications on the case study In this case the consequentialism theory can be applied to identify the exact need and importance of the demand made by the governmental bodies. This theory helps in identifying the right thing to do as per the consequences. If the condition is extreme where the company can get a solution to a huge problem just with the cooperation of the IT firm, then both the parties must mutually understand the requirements and propose a solution. IN this case too, the court identified a solution according to the situation (Pojman Fieser, 2009). Apple was not ready to compromise with its security and safety aspects while the FBI was demanding the company to unlock several features and provide solution to get access to the phone which gets the consequentialism theory into action. In this case none of the side was ready to compromise thus the court decided to find a third party which can help in unlocking the phone and extracting the data. This mission and idea was successful and the solution was obtained. The consequentialism theory thus states that identification of the correct action to perform is very important and necessary.This theory helps immensely in identifying the proper and required solution and to get the beneficial outcomes from the solutions (Ravven Heidi, 2013). The deontology theory states that to break a promise given to the other person is seen as a lack of respect and is completely a wrong practice (Pojman Fieser, 2009). In this case, applying the deontoligical theory for Apple, the company believes that it has promised its customers for providing security and safety for their data and breaking the promise made to the customers while providing decoding and unlocking solutions to the FBI would break the trust of the customers and is ideally wrong practice to follow in the market. Thus the company decided to stand by the decision of keeping the promise made to the customers of securing their data and not providing the FBI with the decoding solutions (Bergum Dossetor, 2005). The significance of the deontological theory here is to identify the promises made ot the customers and maintain the trust of the customers by following the promises made.This theory would help into getting a trustworthy base and a reliable reputation and gives a solution which is highly beneficial. Recommendations It has been witnessed that after identifying the different theories and applying it on the case study, the problems can be solved by applying the feasible and proposed solutions which are documented in the theories. The ethical theories like deontological and consequential theories, provides guidance regarding the action to be taken when an adverse situation arises. The in depth analysis of the problem and the identification of correct solution and methodology is provided by these theories which would help in getting an effective and efficient result. https://www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html References: Apple (2016). Ethical Conflicts between Apple and FBI US. Available at: www.apple.com last accessed: 15th sep 2016. Bergum, V., Dossetor, J. (2005). Relational ethics. The full meaning of respect.Hagerstown, MD: University Publishing Group. Haidt, Jonathan (2012), The Righteous Mind : Why Good People Are Divided by Politics and Religion, New York: Pantheon Books. Keyton, J. Shockley-Zalabak, P. (2006). Case studies for organizational communication (2nd Ed.). Los Angeles, CA: Roxbury Publishing Company. Litschka, M., Suske, M., Brandtweiner, R. (2011). Decision Criteria in Ethical Dilemma Situations: Empirical Examples from Austrian Managers. Journal of Business Ethics, 104(4), 473-484. Tomescu, M., Popescu, M. A. (2013). Ethics And Conflicts of Interest In The Public Sector. Contemporary Readings in Law and Social Justice, 5(2), 201-206. Ung Hee, L., Hye Kyoung, K., Young Hyung, K. (2013). Determinants of Organizational Citizenship Behavior and Its Outcomes. Global Business Management Research, 5(1), 54-65. Pojman, L.P. Fieser, J. (2009). Ethics: Discovering right and wrong. Stamford, CT: Wadsworth Cengage Learning. Ravven, Heidi M. (2013), The Self Beyond Itself: An Alternative History of Ethics, the New Brain Sciences, and the Myth of Free Will, New York: The New Press.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.