Please review the attached slides. Details of applications are in the slides.
1. Wikileaks
2. Encryption and government
3. The ethics of bug bounties
Out of the three applications listed above, pick one and thoroughly discuss the ethical considerations.
Comment on a theory that you will choose to argue your position. (Consequentialist, Non-consequentialist, Agent-based) and the sub-theory (for example: consequentialist: utilitarian).
Comment on a framework (Consequentialist, Duty, Virtue)
Think about the actions/outcomes/intentions in this case. in terms of permissible, impermissible, obligatory, supererogatory
Format:
One-page essay
Single spaced
Times New Roman, 12 point
Cite all your sources on the second page.