<?xml version="1.0" encoding="utf-8"?>
<journal>
<title>International Journal of Ethics and Society</title>
<title_fa>مجله بین المللی اخلاق و جامعه</title_fa>
<short_title>Int. J. Ethics Soc</short_title>
<subject>Literature &amp; Humanities</subject>
<web_url>http://ijethics.com</web_url>
<journal_hbi_system_id>1</journal_hbi_system_id>
<journal_hbi_system_user>admin</journal_hbi_system_user>
<journal_id_issn>2981-1848</journal_id_issn>
<journal_id_issn_online>2676-3338</journal_id_issn_online>
<journal_id_pii></journal_id_pii>
<journal_id_doi>10.22034</journal_id_doi>
<journal_id_iranmedex></journal_id_iranmedex>
<journal_id_magiran></journal_id_magiran>
<journal_id_sid>34486</journal_id_sid>
<journal_id_nlai>8888</journal_id_nlai>
<journal_id_science>13</journal_id_science>
<language>en</language>
<pubdate>
	<type>jalali</type>
	<year>1403</year>
	<month>4</month>
	<day>1</day>
</pubdate>
<pubdate>
	<type>gregorian</type>
	<year>2024</year>
	<month>7</month>
	<day>1</day>
</pubdate>
<volume>6</volume>
<number>2</number>
<publish_type>online</publish_type>
<publish_edition>1</publish_edition>
<article_type>fulltext</article_type>
<articleset>
	<article>


	<language>en</language>
	<article_id_doi></article_id_doi>
	<title_fa></title_fa>
	<title>Explaining the Hacking of Society's Information Systems from the Point of View of Ethical Theories</title>
	<subject_fa>تخصصي</subject_fa>
	<subject>Special</subject>
	<content_type_fa></content_type_fa>
	<content_type>Review Article</content_type>
	<abstract_fa></abstract_fa>
	<abstract>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:12px;&quot;&gt;&lt;span style=&quot;font-family:Times New Roman;&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Introduction&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;: One of the important topics in the field of information technology is hacking the information systems of societies, that is, finding the security weaknesses of a system to penetrate and access its information. which can be done with various motivations, such as measuring penetration, finding system flaws, curiosity, causing disturbance, breaking the security of systems and harming them, personal gain, and so on. Hacking information systems will have favorable or unfavorable consequences for communities and citizens. Therefore, the purpose of this research is to explain the validity or moral impropriety of this act based on three important moral theories of consequentialism, deontologism, and virtuism.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;line-height:107%&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Material and Methods&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;: This research was carried out using a descriptive analytical method based on library sources.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;line-height:107%&quot;&gt;&lt;b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;line-height:107%&quot;&gt;: Based on the results of the present study, it can be said: from the point of view of utilitarianism, the greater the amount of social benefit from the action of the influencers, the more ethical their action is, and the more harmful it is to the society, the more unethical their action is. Ethical values ​​such as trustworthiness, not prying into the privacy of others, not harming people, maintaining human dignity, protecting public interests, are among the ethical rules governing the act of hacking. And the benevolent motives of hackers only when they are compatible with these moral rules, is the moral justification of their action from the perspective of rule-oriented duty-bearers. The specific personal, social, cultural and economic conditions of the hacker are effective in the moral judgment of his actions from the perspective of practical duty-oriented people. &lt;/span&gt;&lt;span lang=&quot;EN&quot;&gt;&lt;span style=&quot;line-height:107%&quot;&gt;In the end, it should be said: Knowing the ethical behavior of hackers and its effect on their actions is the main condition for the ethical evaluation of information systems hacking, although it will be very difficult to achieve such knowledge&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;line-height:107%&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&amp;nbsp;&lt;/span&gt;&lt;/div&gt;</abstract>
	<keyword_fa></keyword_fa>
	<keyword>Hacking, Ethics, Information systems, Society</keyword>
	<start_page>9</start_page>
	<end_page>19</end_page>
	<web_url>http://ijethics.com/browse.php?a_code=A-10-325-1&amp;slc_lang=en&amp;sid=1</web_url>


<author_list>
	<author>
	<first_name>Noah</first_name>
	<middle_name></middle_name>
	<last_name>Zhang</last_name>
	<suffix></suffix>
	<first_name_fa></first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa></last_name_fa>
	<suffix_fa></suffix_fa>
	<email>zhang.noah@gmail.com</email>
	<code>10031947532846003525</code>
	<orcid>10031947532846003525</orcid>
	<coreauthor>Yes
</coreauthor>
	<affiliation>Department of Computer Science, Faculty of Engineering, University of Canterbury, New Zealand</affiliation>
	<affiliation_fa></affiliation_fa>
	 </author>


	<author>
	<first_name>Liam</first_name>
	<middle_name></middle_name>
	<last_name>Wang</last_name>
	<suffix></suffix>
	<first_name_fa></first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa></last_name_fa>
	<suffix_fa></suffix_fa>
	<email>wangliam@yahoo.com</email>
	<code>10031947532846003526</code>
	<orcid>10031947532846003526</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Department of Computer Science, Faculty of Engineering, University of Canterbury, New Zealand</affiliation>
	<affiliation_fa></affiliation_fa>
	 </author>


	<author>
	<first_name>Isla</first_name>
	<middle_name></middle_name>
	<last_name>Wilson</last_name>
	<suffix></suffix>
	<first_name_fa></first_name_fa>
	<middle_name_fa></middle_name_fa>
	<last_name_fa></last_name_fa>
	<suffix_fa></suffix_fa>
	<email>Wilson6252@gmail.com</email>
	<code>10031947532846003527</code>
	<orcid>10031947532846003527</orcid>
	<coreauthor>No</coreauthor>
	<affiliation>Department of Computer Science, Faculty of Computing and Mathematical Sciences, University of Waikato, New Zealand</affiliation>
	<affiliation_fa></affiliation_fa>
	 </author>


</author_list>


	</article>
</articleset>
</journal>
