Assignment:-
In 2013, Google Ideas and  Arbor Networks created a live data visualization of DDoS attacks around the world. In October 2013, the United States was one of the most popular destination countries for these types of attacks.  (To see the map, visit www.digitalattackmap.com.)

============================================================================

In your opinion, is it ethically acceptable to use a denial-of-service attack to shut down a Web server that distributes child pornography?  (What type of hacker would do this?  a. hacker, b. cracker, c. hactivist –Explain.)

State which ethical theory may support your position/answer to the question.

Part One:
https://www.youtube.com/watch?v=ePcNwSg769o
1. Go over the attached link. (It is a 9 to 10 minutes YouTube Video.)
2. Who are the major stakeholders involved in this issue?  How are they affected/not affected by this issue? (List those stakeholders directly stated in the scenario and those who could possibly be affected.)

Part Two:
Discuss the following question: 

Should A.I. technology be implemented into all employment sectors?  (Pick one theory/principle that may support your position/answer. Explain how.)
Theories list: 1.Utilitarianism 2.Deontology 3.Kant’s Categorical Imperative

Read the attached article. 

Ethics of Technology Needs More Political Philosophy; https://cacm.acm.org/magazines/2020/1/241714-ethics-of-technology-needs-more-political-philosophy/fulltext

Johannes Himmelreich
Incorporating considerations of reasonable pluralism, individual agency, and legitimate authority.

State your opinion to the following question:

Do you agree with the author’s assessments that ‘political philosophy’ should be included in making ethical decisions?