In the recent times there have been a great development in the field of technology. In addition to this the field of information technology is not new to the evolution in the business and ideas. Although with the rise of the technologies there has been development of some ethical issues with the said technologies. Now, the ethics are very important in all the aspects of life and the field of information technology is not new to this. There are some ethical guidelines that every person or organization should be following. There are the classical ethical theories that are to be followed. The case that is provided in this report is the case of the Volkswagen Company and the unethical issues that came up due to the adoption of certain policies by the company.
The Volkswagen Company was looking to incorporate the Amazon Alex’s AI into their cars. The AI would be bringing the virtual assistance to the users. The Volkswagen Company earlier had already established the Car-net functions into their cars. This time the company is looking to incorporate the Alexa Ai with this technology. The car net function allows the users to connect to their cars using their smartphones and helps the users to communicate with their cars very efficiently. The drivers would be able to add destinations for the car and also add the directions to the navigation systems of the cars. The integration would be providing useful details of the users to the AI and this raises the main issue of the report. The main ethical issue is that the privacy of the user is violated by this incorporation of the AI with the car net functions that are already pre-installed in the car.
The ethical issues that had arisen due to the cheating procedures applied by the company had also violated the classical ethical theories. The theory of Utilitarianism is concerned with the maximum utilization of the resource by the maximum people. The Ai that is implemented in the cars do not provide privacy to the users. Hence, they violated the Utilitarian Theory of classical ethics. In addition to this, the deontology theory was also violated by the company. The deontology theory deals with the duty towards all human beings (Chiu et al., 2014). The company is unable to provide proper security to the user data and hence they are violating the deontology theory. In addition to this there is the virtue ethics in the classical ethical theory (Paquette et al., 2015). It is believed according to the virtue ethics that if a person is morally correct he would not be conducting any kind of unethical behavior in his professional life or at the workplace. But the Ai that would be introduced by the company do not possess any kind of moral values and hence the virtue ethics was also violated (Hursthouse, 2013). In addition to this, there is the Contact theory and it deals with the justification of the events that occur. But the situation that is at is not at all justified and hence the contact theory is also violated (Magelssen et al., 2016).
The ethical issues can be solved by implementing some methods to the policies that are implemented by the car company. Firstly the company should look to incorporate some security measures into the algorithm that is incorporated within the car. In addition to this the company should ensure that the information about the uses is not leaked out. In addition to this, the users should also be aware of the circumstances before engaging themselves with this new technology.
For conclusion it can be said that the report has been used here to display the different types of ethical issues that are being raised in the field of information technology. In his report the details of the case of the Volkswagen Company integrating AI into their cars have been provided. In addition to this the classical ethical theories have also been discussed and it is also been shown that how the issue violates the ethical theories.
Chiu, C. M., Wang, E. T., Fang, Y. H., & Huang, H. Y. (2014). Understanding customers' repeat purchase intentions in B2C e?commerce: the roles of utilitarian value, hedonic value and perceived risk. Information Systems Journal, 24(1), 85-114.
Etzioni, A., & Etzioni, O. (2016). AI assisted ethics. Ethics and Information Technology, 18(2), 149-156.
Hursthouse, R. (2013). Normative virtue ethics. ETHICA, 645.
Magelssen, M., Gjerberg, E., Lillemoen, L., Førde, R., & Pedersen, R. (2016). Ethics support in community care makes a difference for practice. Nursing Ethics, 0969733016667774.
Paquette, M., Sommerfeldt, E. J., & Kent, M. L. (2015). Do the ends justify the means? Dialogue, development communication, and deontological ethics. Public Relations Review, 41(1), 30-39.
Pendyala, R. M., & Bhat, C. R. (2014). Activity-Travel Behavior Impacts of Driverless Cars. In 93rd Annual Meeting of the Transportation Research Board.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Ethics And Information Technology. Retrieved from https://myassignmenthelp.com/free-samples/ethics-and-information-technology.
" Ethics And Information Technology." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/ethics-and-information-technology.
My Assignment Help (2018) Ethics And Information Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/ethics-and-information-technology
[Accessed 30 March 2020].
My Assignment Help. ' Ethics And Information Technology' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/ethics-and-information-technology> accessed 30 March 2020.
My Assignment Help. Ethics And Information Technology [Internet]. My Assignment Help. 2018 [cited 30 March 2020]. Available from: https://myassignmenthelp.com/free-samples/ethics-and-information-technology.
MyAssignmenthelp.com has become one of the leading assignment help provider in New York City and Boston. We provide top class auditing assignment help. Not only auditing, but we also cover more than 100 subjects and our writers deal with all types of assignments with utmost expertise. To make writing process faster and accurate, we have segmented our assignment experts' teams as per their expertise on writing different types of assignments. We guaranteed that students who buy our assignment online get solutions worth their investment.
Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...Read More
Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...Read More
Answer: Introduction Augmented Reality (AR) has emerged different technologies and it uses artificial intelligence and machine learning algorithms for providing a superimposed images and videos of real things for better understanding. In this report, AR technology will discuss with their uses in different fields as well as how it is beneficial for education system. AR is a latest technology, which is highly used for understanding of different t...Read More
Answer: Introduction The foremost determination of the paper is to investigate the role of the automatic learning ability of the AI based systems. Most of the business organizations all over the world uses the automated learning ability of the AI based systems and this paper will be very much effective for the organizations who are planning to implement this technology in their working environment. Along with this accounting organizatio...Read More
Answer: Introduction: Flight management System or the FMS is the fundamental component that is included in the modern airliners avionics. This is one of the specialized computer systems which is associated with the automation of the various in-flight tasks along with helping in the reduction of the workload upon the flight crew up to a point where the modern civilian aircrafts no longer need to carry the flight engineers or the navigators (Zh...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
Awesome write up for my assignment!!! Worth the money paid!!! Will come back .....
I really appreciate how the editor understood what I really meant to say thus making me feel more confident in submitting my work. I am an extremely happy customer. I will definitely sen un update on my grade.
Excellent work. We got total of 68 marks and we are very satisfied with the score. We gave this assignment near to deadline which is 2 days before due date. The assignment was about 4000 words and they did it well and gave it before 8 hours of submis...
I can\'t complain, speedy service and got the assignment before the deadline and got full mark