The article/case study provided in interact as the title of your essay, so that the lecturer knows which article you are analysing.
The report aims at depicting a case scenario that is related to one of the most concerning issues in the modern technological environment, namely information and technology ethics. The case study chosen for this particular study is that of “Cybercrime Attribution: An Eastern European Case Study.” The report comprises of an analysis of the provided case study, whereby the concept of cybercrime has been the buzzword. It provides us with various implications related to cybercrime. Cybercrime refers to the crime which involves a system and a network. Net-crime is in fact a criminal exploitation of the internet (Kshetri, 2013). This report therefore describes all ethical issues and also the ways to deal with them whether individually or organizationally. It generates information about concepts of ethical issues and that technological enhancement responsible for ethical concerns. This report discusses information rights, privacy, ethical policy, and intellectual property.
Information Communication Technology (ICT) has resulted innovative ethical concerns related to the protection of personal privacy, user responsibility, protecting intellectual property, software licenses as well as piracy, access and utilization of information, etc. An effective ICT related policy should be capable of considering these considerably, and several associated issues. The extensive growth of internet and its functionalities have allowed the whole industries to drive their business operations as well as money within internet (Lucas & Mason, 2008). This has naturally led to the growth of criminal activities that take place virtually. Though cybercrime is not a new thing, yet computer systems have been valuable targets, and this has therefore changed our thoughts about security, threats, and risks (Jung, 2009). As referred to in the case study, the entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection.
East European hackers utilize more efficient technologically advanced malware as well as detection evasion methods as compared to the East Asian hackers. Despite an increased number of cyber-attacks introduced by the East Asian hackers against firms as well as governmental institutions across the globe in recent years, the cybercriminals of this region are considered more sophisticated challenge towards global internet security (Jingtao, Yuanyuan & Xiaoling, 2010). As per the given case scenario, cybercrimes are quite common these days, but there are certain differences in the ways these are conducted. As per research, the cybercriminals of east Europe are way too ahead of the times. It is rightly depicted that the east Europeans are masters in malware development. These hackers would use null-day exploits that targets previously uncertain vulnerabilities, and also spear phishing for compromising target’s computer system, but then will depend upon basic malware as well as third party tools for maintaining and expanding their accessibility on target’s network (Pivec, 2011). Contrast to this, east European hackers utilizes exploits developed by others to initiate penetration, but malware programs are specifically customized to respective goals and functionalities. It is analyzed that Information and Technology security personnel have to often access confidential data as well as knowledge regarding individual or business networks as well as systems which give greater power (Frank & Felix, 2012). This power may be abused inadvertently or deliberately. Analyzing the case scenario would identify the need for ethical guidelines (Vaccaro & Madsen, 2009). The training of the professionals like security specialists focus upon technical knowledge as well as skills.
As mentioned in the case that investment has been stable in the sector of ethics in information and communication technology. However, as per research it is identified that business firms are investing heavily into computer systems as designed to enhance the efficiency as well as effectiveness. These are sometimes complex as replacing manual processes which earlier defied automation, introducing innovative functions into the automated process. There are ethical agenda related to the use of the ICT in the firms (Chang, 2012). This combines aspects common to several professions as well as issues which are specific to ICT. The following are some important methods by which organizations may establish such an agenda as well as address all ethical issues prevalent in ICT: the organizational policies need to be decided in relation to ICT. This needs to take complete account of organizational objectives as derived from mission statement. This includes using organizational key values, set out within the code of practices to guide in determining the ways to resolve ethical aspects (Winmill, Metcalf & Band, 2014). It also states the policy scopes in context to matters that are to be covered.
As referred to the European landscape, the trend in ICT has been identified significantly. The move towards increased computational power, along with decreasing cost as well as size, may make improved changes and new technological advancements would provide enhanced opportunities. Some of the mentionable trends are ever-rising computational power apart from decreased size and cost, technological advances creating new interfaces, the capability of staying connected anytime, anywhere with service demands, creation of virtual places and services along with the service providers (Brenner & Schwerha IV, 2004). The applications which the EU perceives as relevant for the coming years are reflected within the key challenges. These are divided into two groups: reinforcing Europe’s industrial strengths and that of overcoming technology roadblocks, and also taking up opportunities by applying ICT for addressing challenges. With several challenges presented the applications that EC perceives the central in advancing policy agenda. The cybercriminals of east Europe are way too ahead of the times. It is rightly depicted that the east Europeans are masters in malware development (Bowern, Burmeister, Gotterbarn & Weckert, 2006). These hackers would use null-day exploits that targets previously uncertain vulnerabilities, and also spear phishing for compromising target’s computer system, but then will depend upon basic malware as well as third party tools for maintaining and expanding their accessibility on target’s network (Koski, 2003). Contrast to this, east European hackers utilizes exploits developed by others to initiate penetration, but malware programs are specifically customized to respective goals and functionalities.
A key problem which arises while working with cybercrime is that almost all crimes transit data by means of a multitude of international borders prior to reaching the final goal. This has an impact upon investigation of cybercrimes and that of application of laws. An instance of legal restriction faced with foreign incidents arrives from ‘searching as well as seizing of computers and obtaining electronic evidence within criminal investigations’ manual for the US department of justice. It reports that while seeking support from ISPs overseas, all officers should work along with the country’s consent that refers to certain formalities required to be solved before proceeding. Some of the mentionable trends are ever-rising computational power apart from decreased size and cost, technological advances creating new interfaces, the capability of staying connected anytime, anywhere with service demands, creation of virtual places and services along with the service providers (Backus, Spinello & Tavani, 2004). The applications which the EU perceives as relevant for the coming years are reflected within the key challenges. The entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection.
Conclusion:
The case analyses confirms a fact that cybercrime is now a global growing issue. This report therefore describes all ethical issues and also the ways to deal with them whether individually or organizationally. It generates information about concepts of ethical issues and that technological enhancement responsible for ethical concerns. This report discusses information rights, privacy, ethical policy, and intellectual property. As referred to in the case study, the entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection. East European hackers utilize more efficient technologically advanced malware as well as detection evasion methods as compared to the East Asian hackers. Despite an increased number of cyber-attacks introduced by the East Asian hackers against firms as well as governmental institutions across the globe in recent years, the cybercriminals of this region are considered more sophisticated challenge towards global internet security.
References
Backus, A., Spinello, R., & Tavani, H. (2004). Genomics, Ethics, and ICT. Ethics And Information Technology, 6(1), 1-3. doi:10.1023/b:etin.0000036199.21906.ac
Bowern, M., Burmeister, O., Gotterbarn, D., & Weckert, J. (2006). ICT Integrity: bringing the ACS code of ethics up to date. AJIS, 13(2). doi:10.3127/ajis.v13i2.50
Brenner, S., & Schwerha IV, J. (2004). Introduction—Cybercrime: A Note on International Issues.Information Systems Frontiers, 6(2), 111-114. doi:10.1023/b:isfi.0000025779.42497.30
Chang, Y. (2012). Combating cybercrime across the Taiwan Strait: investigation and prosecution issues. Australian Journal Of Forensic Sciences, 44(1), 5-14. doi:10.1080/00450618.2011.581246
Frank, I., & Felix, O. (2012). Application of MIMO Technology to Systems Beyond 3G. International Journal Of Informatics And Communication Technology (IJ-ICT), 1(2). doi:10.11591/ij-ict.v1i2.1482
Jingtao, Z., Yuanyuan, F., & Xiaoling, M. (2010). The latest progress report on ICT application in Chinese basic education. British Journal Of Educational Technology, 41(4), 567-573. doi:10.1111/j.1467-8535.2010.01083.x
Jung, I. (2009). Ethical judgments and behaviors: Applying a multidimensional ethics scale to measuring ICT ethics of college students. Computers & Education, 53(3), 940-949. doi:10.1016/j.compedu.2009.05.011
Koski, G. (2003). Ethical Issues in Antiepileptic Trials: Old Issues in a New World. Epilepsia, 44, 16-18. doi:10.1046/j.1528-1157.44.s7.8.x
Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electron Commer Res, 13(1), 41-69. doi:10.1007/s10660-013-9105-4
Lucas, R., & Mason, N. (2008). A survey of ethics and regulation within the ICT industry in Australia: ethics education. J Of Inf, Com & Eth In Society, 6(4), 349-363. doi:10.1108/14779960810921141
Pivec, F. (2011). Codes of Ethics and Codes of Conduct for Using ICT in Education. Organizacija,44(3). doi:10.2478/v10051-011-0007-8
Vaccaro, A., & Madsen, P. (2009). Corporate dynamic transparency: the new ICT-driven ethics?. Ethics And Information Technology, 11(2), 113-122. doi:10.1007/s10676-009-9190-1
Winmill, B., Metcalf, D., & Band, M. (2014). Cybercrime: Issues and challenges in the United States.DEESLR, 7(0). doi:10.14296/deeslr.v7i0.1921
Woollacott, P. (2007). Cybercrime comes of age. ITNOW, 49(2), 6-7. doi:10.1093/combul/bwl110
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download