Cyber crime is becoming a threat for the implementation of the advanced technology. The main concern about the happening of the cyber crime is the threat from the data breaching. This causes the violation of the security and the confidentiality of the information which belongs to the users. Apart from that many activities like cyber bullying and the misuse of data can be happened as the consequence of the cyber crime (Upadhyaya & Jain, 2016). These activities has the negative effects on the life of the people and the society. The ethical work is expected to have the positive benefits on the individual and the society. The main objective of this paper is to evaluate the activity related to the cyber from the ethical point of view. The practice of the hacking other cyber crime related activities are evaluated on the basis of four classical ethical theories (Sharma, Mittal & Verma, 2015). The discussion will indicate if the activities related to the cyber crime is an ethical practice. The main objective of this paper is to come to a conclusion about the maintaining of the ethics in the doing of things and provide proper justification.
Utilitarianism Theory/Perspective
According to the theory of utilitarianism an action can be regarded as ethical act if the result of the action can become the cause of the benefits and happiness for most of the people. The act of cyber crime can be evaluated on the basis of utilitarianism. The cyber crime involves breaching of the data. The breaching of data related to the people and the organizations will face the violation of the security. Apart from that it will also violate the security and the confidentiality of the data (Rawal, 2017). These information can be misused and the people and the organizations can face problems due to this. Regarding all these factors it can be said that the breaching of the data can not cause greater happiness or benefits for the people (Sharma, Mittal & Verma, 2015). The other type of cyber crime involves the application of the ransom ware and denial of service attacks in the system (Kieseberg, Segou & Roli, 2015). In this case, the files in the system get corrupted and the users loose the control over the system. In both the cases, the users of the system suffer the most. This indicates that the consequences of the cyber crime effect negatively on the people (Hubman et al.,2015). It can be said , in this case that according to the theory of utilitarianism the acts related to the cyber crime are not ethical.
According to the theory of deontology the moral support of the action is dependent on the rightness of the action under various rules. The main feature of the deontology is that the rightness of the action is dependent on the rules rather than the consequences of the action. The activities related to the cyber crime do not follow the basic rule. The basic rule regarding this includes the maintenance of the safety and privacy of the people (Hussein, 2018). The breaching of the data from the system does not support this rule. On the other hand usage of the ransom ware and the implementation of denial of service attack for making the system disable are not permitted as act (Sharma, Mittal & Verma, 2015). The cyber crime causes many consequences which have the adverse effect on the society and is not according to the rule (Hubman et al.,2015). Some of these practices are the cyber bullying, usage of the confidential data unethically. All these practices do not support the theory of deontology. In this case, according to the act of deontology these practices are not ethical.
Virtue theory includes the judging of the action depending on the virtue of the act. It can be said that the good act have good consequences (Hubman et al.,2015). The practices regarding the cyber crime do not have positive virtue (Hubman et al.,2015). It can be said from the consequences from the happening of the cyber crime that this type of practice are not have the positive influences on the people (Hubman et al.,2015). The use of the cyber crime increase the tendency of the cyber bullying and misuse of the personal information. These activities are not acceptable for the society (Li,2016). It has been seen that in many cases, after the cyber attack, the attackers want large amount of money from the users to free the system. This tendency is also not acceptable as it increases security threats for the society (Czech,2016). Apart from that the goodwill of the society gets hampered due to the illegal activities related to the cyber crime (Hubman et al.,2015). It can be said that the mitigation of the activities related to the cyber crime can be mitigated through the social awareness. Therefore it can be said that from the perspective of the virtue theory the practices related to the cyber crime are not ethical.
Social contract theory defines the significance of the laws and the regulations for living in the society. It is applicable for the human being to live in the society. In order to live in the society some of the rules and regulations are needed to be followed (Hubman et al.,2015). The social contract theory approves those practices which are suitable for the people and approve them to live in the society. The consequences regarding the actions in this case are needed to be positive. The practices related to the cyber crime influences the increasing crime rate. It approves the breaching of the data that violates the privacy of the organizations and the individuals (Taddeo, 2016). On the other hand the practices regarding the spreading of ransom ware and virus and making people influenced about the denial of service attack are not good practices for the society (Hui, Kim & Wang, 2017). It will effect on the social bonding among the people. Apart from that these acts also violates the security and safety of the people in the society (Hubman et al.,2015) . Apart from that the usage of the ransom ware and other hacking tools and techniques will lead to the wastage of the resources. Considering all these factors it can be said from the social contract theory perspective the acts related to the cyber crime are not ethical.
The practices related to the cyber crime have been discussed on the basis of the different ethical theories. It can be said with the application of all these theories , the act of cyber crime has been defined from the different perspective (Marsh, 2017). Some of the organizations supported the idea of using the cyber crime techniques to revile the truth (Sharma, Mittal & Verma, 2015). However, in this case the usage of the cyber criminal activity is not applicable. The activities of the cyber crime have the negative consequences o the people and the organizations (Hubman et al.,2015). Apart from that the violation of the security and the privacy of the public life is done through the cyber crime (Kundu et al.,2018). Apart from that the wastage of the resources and other hazards can be raised with the increased practice of the cyber crime (Hubman et al.,2015). It has been seen that with the advancement of the technology the detection process and the prevention process of the threats from the cyber crime are getting complex (Ienca & Haselager,2016). In this situation the advanced technology and the techniques are needed to be used for the mitigation of the cyber crime. Apart from that people are made aware about the consequences of the cyber crime (Hubman et al.,2015). Proper authentication and the password are needed to be used while using the system. It can be said that the cyber crime is not an ethical practice and all the theories regarding ethics do not approve the practices related to the cyber crime.
Conclusion
The discussion is regarding the evaluation of the activities regarding the cyber crime. The discussion has been evaluated on the basis of the ethical theories. This discussion has helped to discuss the activity regarding cyber crime from the different perspective. The discussion indicates that the activities regarding the cyber crime have the negative effect on the society, people and the organizations. On the other hand, the wastage of the resources and the systems can be done through the usage of cyber crime. The main motive of the cyber criminals is focused on the personal benefits using the confidential resources of the people. The nature of this practice is not according to the rules and regulations. People can face problems and the threats regarding the security due to this practice. From this situation it can be said that cyber crime is not an ethical practice and the tendency of the cyber crime needed to be mitigated through the awareness programs and the use of advanced techniques.
References
Czech, M. (2016). Real-world evidence and Big Data in medicine: Is there a financial and legal risk linked to cyber crime?. In Managing Cyber Risk in the Financial Sector (pp. 128-145). Routledge.
Hubman, J. M., Doyle, Z. B., Payne, R. L., Woodburn, T. F., McDaniel, B. G., & Giordano, J. V. (2015). Ethical Considerations in the Cyber Domain. In Evolution of Cyber Technologies and Operations to 2035 (pp. 163-174). Springer, Cham.
Hui, K. L., Kim, S. H., & Wang, Q. H. (2017). Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks. Mis Quarterly, 41(2), 497.
Hussein, Z. (2018). Cybercrime: Do Security and Software Influence Students’ Perception?. In Proceedings of the Art and Design International Conference (AnDIC 2016) (pp. 325-332). Springer, Singapore.
Ienca, M., & Haselager, P. (2016). Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity. Ethics and Information Technology, 18(2), 117-129.
Kieseberg, P., Segou, O. E., & Roli, F. (2015). CyberROAD: Developing a Roadmap for Research in Cybercrime and Cyberterrorism. ERCIM NEWS, (102), 50-51.
Kundu, S., Islam, K. A., Jui, T. T., Rail, S., Hossain, M. A., & Chowdhury, I. H. (2018, February). Cyber crime trend in Bangladesh, an analysis and ways out to combat the threat. In 2018 20th International Conference on Advanced Communication Technology (ICACT) (pp. 474-480). IEEE.
Li, X. (2016). Defining cybercrime based on roles of data processing systems. Pandora’s Box, (2016), 127.
Marsh, D. (2017). Are Ethical Hackers the Best Solution for Combating the Growing World of Cyber-Crime? (Doctoral dissertation, University Honors College, Middle Tennessee State University).
Rawal, B. G. D. R. (2017). Exploration of Cognitive Skills in Kids through Cyber Crime Ethics Education: A Prevention Method.
Sharma, M., Mittal, S., & Verma, A. (2015). Cyber Ethics in Security Application in the Modern Era of Internet. IITM Journal of Management and IT, 6(1), 140-143.
Taddeo, M. (2016). The Ethics of Cyber Conflicts: An Introduction.
Upadhyaya, R., & Jain, A. (2016, April). Cyber ethics and cyber crime: A deep dwelved study into legality, ransomware, underground web and bitcoin wallet. In Computing, Communication and Automation (ICCCA), 2016 International Conference on (pp. 143-148). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download