Tuesday, May 5, 2020

A Report on a Case Study Analysis Related To IT Ethics

Question: The article/case study provided in interact as the title of your essay, so that the lecturer knows which article you are analysing. Answer: Introduction: The report aims at depicting a case scenario that is related to one of the most concerning issues in the modern technological environment, namely information and technology ethics. The case study chosen for this particular study is that of Cybercrime Attribution: An Eastern European Case Study. The report comprises of an analysis of the provided case study, whereby the concept of cybercrime has been the buzzword. It provides us with various implications related to cybercrime. Cybercrime refers to the crime which involves a system and a network. Net-crime is in fact a criminal exploitation of the internet(Kshetri, 2013). This report therefore describes all ethical issues and also the ways to deal with them whether individually or organizationally. It generates information about concepts of ethical issues and that technological enhancement responsible for ethical concerns. This report discusses information rights, privacy, ethical policy, and intellectual property. Information Communication Technology (ICT) has resulted innovative ethical concerns related to the protection of personal privacy, user responsibility, protecting intellectual property, software licenses as well as piracy, access and utilization of information, etc. An effective ICT related policy should be capable of considering these considerably, and several associated issues. The extensive growth of internet and its functionalities have allowed the whole industries to drive their business operations as well as money within internet (Lucas Mason, 2008). This has naturally led to the growth of criminal activities that take place virtually. Though cybercrime is not a new thing, yet computer systems have been valuable targets, and this has therefore changed our thoughts about security, threats, and risks (Jung, 2009). As referred to in the case study, the entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets whic h have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection. East European hackers utilize more efficient technologically advanced malware as well as detection evasion methods as compared to the East Asian hackers. Despite an increased number of cyber-attacks introduced by the East Asian hackers against firms as well as governmental institutions across the globe in recent years, the cybercriminals of this region are considered more sophisticated challenge towards global internet security(Jingtao, Yuanyuan Xiaoling, 2010). As per the given case scenario, cybercrimes are quite common these days, but there are certain differences in the ways these are conducted. As per research, the cybercriminals of east Europe are way too ahead of the times. It is rightly depicted that the east Europeans are masters in malware development. These hackers would use null-day exploits that targets previously uncertain vulnerabilities, and also spear phishing for compromising targets computer system, but then will depend upon basic malware as well as third party to ols for maintaining and expanding their accessibility on targets network(Pivec, 2011). Contrast to this, east European hackers utilizes exploits developed by others to initiate penetration, but malware programs are specifically customized to respective goals and functionalities. It is analyzed that Information and Technology security personnel have to often access confidential data as well as knowledge regarding individual or business networks as well as systems which give greater power (Frank Felix, 2012). This power may be abused inadvertently or deliberately. Analyzing the case scenario would identify the need for ethical guidelines (Vaccaro Madsen, 2009). The training of the professionals like security specialists focus upon technical knowledge as well as skills. As mentioned in the case that investment has been stable in the sector of ethics in information and communication technology. However, as per research it is identified that business firms are investing heavily into computer systems as designed to enhance the efficiency as well as effectiveness. These are sometimes complex as replacing manual processes which earlier defied automation, introducing innovative functions into the automated process. There are ethical agenda related to the use of the ICT in the firms (Chang, 2012). This combines aspects common to several professions as well as issues which are specific to ICT. The following are some important methods by which organizations may establish such an agenda as well as address all ethical issues prevalent in ICT: the organizational policies need to be decided in relation to ICT. This needs to take complete account of organizational objectives as derived from mission statement. This includes using organizational key values, set out within the code of practices to guide in determining the ways to resolve ethical aspects (Winmill, Metcalf Band, 2014). It also states the policy scopes in context to matters that are to be covered. European Landscape: As referred to the European landscape, the trend in ICT has been identified significantly. The move towards increased computational power, along with decreasing cost as well as size, may make improved changes and new technological advancements would provide enhanced opportunities. Some of the mentionable trends are ever-rising computational power apart from decreased size and cost, technological advances creating new interfaces, the capability of staying connected anytime, anywhere with service demands, creation of virtual places and services along with the service providers (Brenner Schwerha IV, 2004). The applications which the EU perceives as relevant for the coming years are reflected within the key challenges. These are divided into two groups: reinforcing Europes industrial strengths and that of overcoming technology roadblocks, and also taking up opportunities by applying ICT for addressing challenges. With several challenges presented the applications that EC perceives the c entral in advancing policy agenda. The cybercriminals of east Europe are way too ahead of the times. It is rightly depicted that the east Europeans are masters in malware development (Bowern, Burmeister, Gotterbarn Weckert, 2006). These hackers would use null-day exploits that targets previously uncertain vulnerabilities, and also spear phishing for compromising targets computer system, but then will depend upon basic malware as well as third party tools for maintaining and expanding their accessibility on targets network (Koski, 2003). Contrast to this, east European hackers utilizes exploits developed by others to initiate penetration, but malware programs are specifically customized to respective goals and functionalities. International Cybercrime: A key problem which arises while working with cybercrime is that almost all crimes transit data by means of a multitude of international borders prior to reaching the final goal. This has an impact upon investigation of cybercrimes and that of application of laws. An instance of legal restriction faced with foreign incidents arrives from searching as well as seizing of computers and obtaining electronic evidence within criminal investigations manual for the US department of justice. It reports that while seeking support from ISPs overseas, all officers should work along with the countrys consent that refers to certain formalities required to be solved before proceeding. Some of the mentionable trends are ever-rising computational power apart from decreased size and cost, technological advances creating new interfaces, the capability of staying connected anytime, anywhere with service demands, creation of virtual places and services along with the service providers (Backus, Spinello Tavani, 2004). The applications which the EU perceives as relevant for the coming years are reflected within the key challenges. The entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection. Conclusion: The case analyses confirms a fact that cybercrime is now a global growing issue. This report therefore describes all ethical issues and also the ways to deal with them whether individually or organizationally. It generates information about concepts of ethical issues and that technological enhancement responsible for ethical concerns. This report discusses information rights, privacy, ethical policy, and intellectual property. As referred to in the case study, the entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection. East European hackers utilize more efficient technologically advanced malware as well as detection evasion methods as compared to the East Asian hackers. Despite an increased number of cyber-attacks introd uced by the East Asian hackers against firms as well as governmental institutions across the globe in recent years, the cybercriminals of this region are considered more sophisticated challenge towards global internet security. References Backus, A., Spinello, R., Tavani, H. (2004). Genomics, Ethics, and ICT.Ethics And Information Technology,6(1), 1-3. doi:10.1023/b:etin.0000036199.21906.ac Bowern, M., Burmeister, O., Gotterbarn, D., Weckert, J. (2006). ICT Integrity: bringing the ACS code of ethics up to date.AJIS,13(2). doi:10.3127/ajis.v13i2.50 Brenner, S., Schwerha IV, J. (2004). IntroductionCybercrime: A Note on International Issues.Information Systems Frontiers,6(2), 111-114. doi:10.1023/b:isfi.0000025779.42497.30 Chang, Y. (2012). Combating cybercrime across the Taiwan Strait: investigation and prosecution issues.Australian Journal Of Forensic Sciences,44(1), 5-14. doi:10.1080/00450618.2011.581246 Frank, I., Felix, O. (2012). Application of MIMO Technology to Systems Beyond 3G.International Journal Of Informatics And Communication Technology (IJ-ICT),1(2). doi:10.11591/ij-ict.v1i2.1482 Jingtao, Z., Yuanyuan, F., Xiaoling, M. (2010). The latest progress report on ICT application in Chinese basic education.British Journal Of Educational Technology,41(4), 567-573. doi:10.1111/j.1467-8535.2010.01083.x Jung, I. (2009). Ethical judgments and behaviors: Applying a multidimensional ethics scale to measuring ICT ethics of college students.Computers Education,53(3), 940-949. doi:10.1016/j.compedu.2009.05.011 Koski, G. (2003). Ethical Issues in Antiepileptic Trials: Old Issues in a New World.Epilepsia,44, 16-18. doi:10.1046/j.1528-1157.44.s7.8.x Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations.Electron Commer Res,13(1), 41-69. doi:10.1007/s10660-013-9105-4 Lucas, R., Mason, N. (2008). A survey of ethics and regulation within the ICT industry in Australia: ethics education.J Of Inf, Com Eth In Society,6(4), 349-363. doi:10.1108/14779960810921141 Pivec, F. (2011). Codes of Ethics and Codes of Conduct for Using ICT in Education.Organizacija,44(3). doi:10.2478/v10051-011-0007-8 Vaccaro, A., Madsen, P. (2009). Corporate dynamic transparency: the new ICT-driven ethics?.Ethics And Information Technology,11(2), 113-122. doi:10.1007/s10676-009-9190-1 Winmill, B., Metcalf, D., Band, M. (2014). Cybercrime: Issues and challenges in the United States.DEESLR,7(0). doi:10.14296/deeslr.v7i0.1921 Woollacott, P. (2007). Cybercrime comes of age.ITNOW,49(2), 6-7. doi:10.1093/combul/bwl110

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.