Discuss About The Survey Of Cyber Attack Detection Strategies?
People have made their life easier by using the benefits of advances in technology, due to which, the usage of internet is at its best. On the one hand where there are various benefits of the internet usage, there are some privacy issues also that are related to it among which ethical issues and the behavior of the internet users are the prime ones (Stahla et al., 2014). When it comes to primary schools, the cyberbullying has a great catch over the ethical issues which needs to be considered by the researchers to provide safe information and communication technology to the schools. The investigation includes serious topics like cybercrime, internet frauds, cyberbullying, hacking of networks, and much more (Spiekermann, 2015).
The internet is a vital part of information and communication technology that has become quite important in the day-to-day life to make the hectic communication easy with various offers it serves with (Floridi, 2010). Although, it gives a great positive impact; it also contains some negative impact of the internet which is considered to be unethical regarding the confidentiality and accessibility of the information. Following are some of the ethical considerations that should be known.
Copyright: One needs to mark the word copyright while downloading any file from the internet. This has become quite common currently which needs to be followed in proper conduct. However, if it is downloaded without permission, it would violate the regulations set by the authorities (Rainer et al., 2013).
Files like documents, music, eBooks, software, applications, etc. are found to be downloaded with ease in nearly all the countries and this act is labeled as unethical. Although this act has not been given due significance as it has not yet harmed the cyber economy of any country (Holt and Bossler, 2015). This practice is widely performed while sharing files through the internet without any hindrance as people mostly look for free options rather than paying for them.
Hacking: Hacking is another illegal action performed by the students of the primary schools that damages the protocol and steals the confidential information in cyberspace. The process of hacking includes aspects like classifying the information, stealing confidential information like passwords, credit card details, and much more (Stahla et al., 2014).
This activity is widely processed when the computers are common or accessible. Such activity takes place when the hackers are able to drive another person’s concentration through their attractive traps. There are students who have the passion to become professional hackers, and hence they commit illegal protocols (Reynolds, 2011). A good example of this issue was seen in 2014 when 14 branches of the Affin Bank, Bank Islam, and Al Rajhi Bank were hacked through their ATMs by a hacking gang.
Cyber Bullying : Cyber bullying is an illegal act that is carried by harassing individuals with the help of internet. The act has grabbed various primary school students resulting in the destruction of their psychological condition (Spiekermann, 2015). This result turns to be hilarious when the user is having no idea about cyber bullying and fails to protect himself/herself against it (Floridi, 2010). The act also includes irritation caused by speeches that scare people and frustrate them. The primary school girls are the prime victims of cyber bullying where they are delivered with threatening messages or voice messages that hinder their privacy. The common result seen in various students is changing the school, and the worst result of such bullying is the commitment to suicide by the victim (Whitman and Mattord, 2012).
Data Privacy: Everyday, the internet is used to store various files and data that can be counted in a million gigabytes. When it comes to maintaining this data, the privacy of the same has been of crucial concern. The Internet contains various personal data of the people that is quite sensitive (Laudon, 2016). When an individual looks forward to any deals or rights on the internet, they are generally asked to go through the agreement that is labeled under the privacy policy of the user’s right and data privacy terms (Raiyn, 2014). The policy helps to know which portion of the data can be used and modified by the authorities.
Here are some situations and causes that lead to violations regarding the copyright laws.
When it comes to cybercrime, hacking has been the most common one, that has resulted in the increase of fraud cases. The hackers generally try to trap the internet user for gaining maximum information from them. Hacking through credit cards is a widely observed crime around the world; as nearly 90% of the total credit card users are found carrying online transactions.
Hacking has hence, become a widely spread crime due to the system bugs or the carelessness of the cyber authorities. The lack of updating of the systems is also a major reason that makes it easy for the hackers to perform their activities (Heersmink, 2011).
The major reason behind the cyber bullying is the increased use of social media, mostly by the children that lead to psychological harm. Here are some reasons for the increase in cyber bullying:
Conclusion and Solutions to the Internet Problems
All the disasters regarding the internet occur due to improper maintenance of cyber ethical issues along with workplace ethics (Floridi, 2010). No doubt the speed of the communication through the internet has given many benefits, there are events where it is misused also. However, proper control over all these measures can also limit the cyber crimes which can be carried as follows:
Reference
Floridi L. 2010. The Cambridge Handbook of Information and Computer Ethics. Cambridge University Press. Available from: https://books.google.co.in/books?hl=en&lr=&id=iK3UjU9yfiEC&oi=fnd &pg=PA41&dq=computer+ethics+information+systems+%2B2010&ots=1c65IAbFFj&sig=w5YpUHqDkTXW8X5zawhNMFUoHSQ#v=onepage&q=computer%20ethics%20information%20systems%20%2B2010&f=false. [Accessed 18th September, 2017]
Heersmink R. 2011. Bibliometric mapping of computer and information ethics. Journal of Ethics and Information Technology [Online], Volume 1 / 1999 – Volume 19 / 2017. pp. 1388-1957. Available from: https://link.springer.com/article/10.1007/s10676-011-9273-7. [Accessed 18th September, 2017]
Holt T., Bossler A. 2015. Cybercrime in Progress: Theory and Prevention of Technology-enabled Offenses [Online]. Routledge. Available from: https://books.google.co.in/books?hl=en&lr=&id=xMQ0CwAAQBAJ&oi=fnd&pg=PP1&dq=cyber+crime+%2B2019&ots=gsEUnDgQnL&sig=2S0IZx-VbJ4Ignavjx8lmWeccCY#v=onepage&q=cyber%20crime%20%2B2019&f=false. [Accessed 18th September, 2017]
Laudon K., Laudon J. 2016. Management Information System. Pearson Education India. Available from: https://books.google.co.in/books?hl=en&lr=&id=4RAwDwAAQBAJ&oi=fnd&pg=PP2&dq=computer+ethics+information+systems+%2B2016&ots=CErXp2XlVi&sig=azHtMhbUj4vREJbwh5HnRk4jdXs#v=onepage&q&f=false. [Accessed 18th September, 2017]
Reynolds G. 2011. Ethics in Information Technology. Cengage Learning. Available from: https://books.google.co.in/books?hl=en&lr=&id=vcYJAAAAQBAJ&oi=fnd&pg=PT6&dq=computer+ethics+information+systems+%2B2011&ots=FaPgzvQzzu&sig=m67hJizBlK38iIa6vdLEqJH4E6s#v=onepage&q=computer%20ethics%20information%20systems%20%2B2011&f=false. [Accessed 18th September, 2017]
Rainer R., Cegielski C., Hogeterp, H. Rodriguez C. 2013. Introduction to Information Systems, Third Canadian Edition. John Wiley & Sons. Available from: https://books.google.co.in/books?hl=en&lr=&id=LAIeCgAAQBAJ&oi=fnd&pg=PA280&dq=computer+ethics+information+systems+%2B2013&ots=-XjV-EIgvY&sig=zAQHwiCvlyy4IusB7K_Jqj1UpxA#v=onepage&q=computer%20ethics%20information%20systems%20%2B2013&f=false. [Accessed 18th September, 2017]
Raiyn J. 2014. A survey of Cyber Attack Detection Strategies. International Journal of Security and Its Applications[Online]. Vol.8,(Issue 1), pp.247-256. Available from: https://dx.doi.org/10.14257/ijsia.2014.8.1.23 [Accessed 18th September, 2017]
Stahla B., Eden G., Jirotka M., Coeckelbergha M. 2014. From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics-related research in information systems. Information & Managemen [Online]t. Volume 51 (Issue 6), pp. 810-818. Doi: https://doi.org/10.1016/j.im.2014.01.001 [Accessed 18th September, 2017]
Spiekermann S. 2015. Ethical IT Innovation: A Value-Based System Design Approach [Online]. CRC Press. Available from: https://books.google.co.in/books?hl=en&lr=&id=WI3wCgAAQBAJ&oi=fnd&pg=PP1&dq=innovation+in+ict+%22computer+ethics%22+%2B2015&ots=ivKwPbccBr&sig=RQAoZ35DamuKvALJ9pIAFMLzajM#v=onepage&q&f=false. [Accessed 18th September, 2017]
Whitman M., Mattord H. 2012. Principles of Information Security. Cengage Learning Available from: https://books.google.co.in/books?hl=en&lr=&id=L3LtJAxcsmMC&oi=fnd&pg=PR9&dq=computer+ethics+information+systems+%2B2011&ots=6WB3VRiMwP&sig=AcnlUB99-VoE_d4gpxhI5CXxvzE#v=onepage&q=computer%20ethics%20information%20systems%20%2B2011&f=false. [Accessed 18th September, 2017]
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download