Having a distinctive look at security can give a chance to see what is being done wrong. This proposal explores different possibilities of having a secure cyber space. The research itself is as qualitative, descriptive research. The proposal intends to explain the background of the research, the purpose of the research, the methodology that will be used to collect and analyze data and the literature review of the possible sources.
Since the introduction of computers, threats to cyber security has always proved to be a problem. While in the earliest days of computing cyber threats involved simply annoying messages sent out in large numbers to many computers, in the recent times, the attacks are becoming more sophisticated involving a high level of skills used to localized and personalize attacks for better penetration (Cox 2008). Furthermore, the attacks and threats have shifted from targeting individuals to big corporations, ones which are easily imagined to be invincible. For instance, a report published last year shows a list of United States companies that were attacked in the year 2016 alone, included big tech corporations such as Yahoo, Inc, Dropbox and even banking institutions such as Citibank (Walters 2016).
The purpose of this paper is to propose a passive approach towards cyber security that is based on trust rather than smart security programs. The basis of the idea is built on the view that because security companies advertise their programs as supreme, it poses a challenge to potential hackers and therefore they are tempted to hack into other people’s privacy. In addition, the idea pushes for an openness of the cyber space where privacy is built on mutual respect rather than one individual prowess against another’s.
The cyber space is the corner space of the modern society. In fact, we are living in an era defined as the Digital Era. Just like in the physical communities of the past, security in the cyber space is not only a basic need but also paramount. However, unlike the physical society where security one way or another involves physical protection from physical threat, in the cyber space security is intangible. It, therefore, makes it difficult to see threats coming and consequently to prevent. Although an approach already exists to counter the numerous security breaches that keep coming up, the approach has proven to fail with evidence of increased and seemingly highly sophisticated breaches. A different approach is, therefore, necessary to ensure that the cyber space is a place people can trust with their information and privacy. Basing on previous researches that show a correlation between challenge and unethical conduct among professional, there is hope that the cyber space can also exist on trust (Cai, Liu & Xiao 2003). This research proposal looks to introducing this conceptual approach into the cyber space.
The research question that this paper explores is:
Can cyber security be built exclusively based on trust rather than attack or defense prowess?
A report released by an American organization, Identity Theft Center, stated that the number of cyber-attacks in the United States of America hit an all-time high in 2016 (Identity Theft Resource Center 2016). At the same time, ironically, the Cyber Security Awards, holds a ceremony that honors individuals and companies that have “made advancement” in ensuring we live in a safe secure cyber environment. While it is true that great advancements have been made to ensure protection against potential threats, security breaches continue to increase and even worse, are more complex in sophistication (Cox 2008).
Such correlation such as the link between the increase in breach cases and the advancement in security provided shows that the traditional methods of providing security against cyber space threats no longer work. This well depicted by the threat that faces all countries including the superpowers who seem to have the best of security to protect themselves against such threats (Clapper, Lettre & Rogers 2017). A method that would work better would involve complete trust from all the parties involved. This is already shown in the financial and investment industry. Research has shown that competition in the financial industry is correlated to unethical business practice. For instance, firms that do not perform well in high competition markets tend to hide bigger shares of their revenues from being taxed (Cai, Liu & Xiao 2003). Modeling these findings to the cyberspace, we can expect the same results alluding, therefore, that there is a correlation between trust and ethics in many industries that involve services. This research paper is important in relating the similarities between the finance industry and the technology industry. Since both are service based, they will depend largely on trust for most of the relations and services offered.
In a paper published by the University of Washington and authored by Kristofer Erickson, one of the element found as a motivating factor among hackers was the quest for beating the system (Erickson 2008). The research collected data from hackers around the world by asking them their motivation of hacking and found out that a considerable number of them did so because they wanted to prove that the security they were trying to hack was weak or they felt the protected information was hiding something they should know (Erickson 2008). The outcome of this research shows the psychological aspect of superiority that pushes hackers into breaching whenever they feel that they are faced with a challenge. Such an outcome affirms the correlation between challenge or competition and unethical conduct. This research paper acts as a crucial point to show the need to let foster for trust in the cyber space.
“Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities” published in Science and Engineering Ethics by Myriam Dunn Cavelty explains better the need for trust in the cyber space. The paper first compares the current tackle of cyber security to a military rule which it attributes to the trust issues that exist in the cyber space (Cavelty 2014). That kind of scrutiny may give unnecessary curiosity to individuals who pry for data. In addition, such security as well paints the picture of a challenge to potential hackers who in return dedicate all their efforts towards breaching other people’s privacy. This type of approach to security as well promotes punishing of people who are involved in unethical hacking when these same people are the ones who understand best the security loopholes (Levy, Ramim & Hackney 2013).
Even better, the research paper, “Computer ethics beyond mere compliance” by Richard Volkman explains better the essence of ethics. The paper points out that for computer ethics to be effective in maintaining security, computer ethics should go beyond mere compliance (Volkman 2015). Since the cyber space is a dynamic industry with new challenges coming up frequently, it may be hard for existing regulations to ensure that the compliances set will still govern the breaches done soon. This source is important in showing that if ethics are embraced voluntarily, then high regard for other people’s data is considered.
The same idea is explained in “Moral Luck and computer ethics: Gauguin in cyberspace” by David Sanford Horner. In his paper, Horner states the difference between virtue ethics and duty ethics. Referring to duty ethics as compliance to existing laws which will not necessarily translate to virtue ethics (Horner 2010). Using the same argument described in this paper, indeed if people are trained to respect each other then there will be no need to have security since everyone will be acting out of their own will. But for this to happen, there must be some sense of openness in the cyber space to allow for trust grow.
The literature that this proposal uses explains the different dimensions that revolve around cyber space security. While the current approaches and structures focus only on punishing the behavioral aspect of security breaches, what seems to be most important is the psychological dimension of the security threats. The literature covers all the dimension with some sources focusing in entirety on the psychological aspect while some focus on the behavioral dimension. The literature as well explains the current cyber security situation and compares it with the current anti-threat measures to show the need for a different approach.
Since the research will be theoretical, a big part of the analysis will involve analyzing previously written research papers and drawing a conclusion from them. However, to support the findings of the previous researches and affirm their credibility, an online questionnaire will be used to collect data from a group of potential or practicing hackers.
A descriptive comprehensive analysis of previous researches will be conducted to determine the psychological role in any criminal activity then these findings will be mapped to the cyber space. A thorough analysis will also be done to explain why the current approach is not working and why cyber security should be built exclusively based on trust rather than attack or defensive prowess. Additionally, there will be an email based questionnaire that will be sent to students who have signed up classes for hacking and also random potential hackers. The main reason for supplying the questionnaire will be to try and determine their motivation for taking u hacking classes or their motivation for hacking. Email based questionnaires will be best for collecting data because many potential hackers and hackers or aspiring hackers may want to stay anonymous and therefore anonymous email questionnaires are the best option.
Since the data collected in will be highly sensitive, some people may not likely give accurate useful information that will help to make accurate conclusions about the industry. In addition, it may be hard to find practicing unethical hackers because of their fears of being exposed. Since there is no way to assert if the correspondents are actually hackers, collected data may not represent the views of hackers. However, these challenges can be offset by using already conducted quality research papers.
Data analysis will be done using excel. The main focus will be to determine the correlation if any between challenge and unethical hacking. Collected data from questionnaires will be plotted to shows the relationship between the two variables. Data presentation for the final report will be done using Microsoft Power Point and charts will be used to represent the variable.
Since the data will be collected solely from email questionnaires, there is a high possibility that the data may be inaccurate. Furthermore, the people giving the much necessary data may not be hackers and no nothing about hacking. As a result, the data may fail to represent the accurate views of the hackers or potential hackers.
To ensure professionalism in the research, the following considerations will be followed:
The following steps will be the detailed process in which the research will take place along with the required time frame for each stage.
Stage 1: Literature Study
This will take 5 to 6 weeks. It will involve finding the necessary research papers that will help understand the cyber space and psychology. The crucial point at this stage is to find the link between hacking and psychology and how strong that link may be.
Stage 2: Finalizing Research Problem
This will take a duration of 2 weeks. It will involve reviewing the research question to make it as descriptive as possible when and if necessary.
Stage 3: Planning Research Design
The third stage will involve coming up with methods that the research will adopt the methodologies of collecting data, ways of analysis of the data and its presentation. This stage will take 2 weeks.
Stage 4: Further Literature Studies
With the research design in place, the further reading material will be required to add on the existing literature to either expand the existing knowledge or to adjust the path.
Stage 5: Design Solution to Research Problem
Compile the information from the literature to design a solution that answers the research question.
While the current effort to counter cyber threats have made some progress, it is also evident that the current approach is not working or so, not enough to fight the underlying threat. It is inevitable to try new methods and test them to understand them better and see if they can work in the ever-dynamic cyber space. While this concept is purely theoretical and has many flaws because of potential insufficiency of data, it is very possible since the concept of building relationship based on trust already exists in other industries such as the finance and investment industry. This proposal calls for a different approach that may seem difficult to implement in a cyber space that involves very sensitive data. However, it is important to understand that the reason for all the trust issues that exist in the cyber space is because of the privacy in the first place. It may seem ironical to say, but the whole point of the research is to see if it is possible to achieve privacy, by first giving up privacy.
Reference:
Cai, H, Liu, & Xiao, 2003, University of Carlifonia Los Angeles, viewed 22 July 2017, <www.econ.ucla.edu/people/papers/Cai/Cai361.pdf>.
Cavelty, MD 2014, ‘Breaking the Cyber-Security Dilemma: Aligning’, Science and Engineering Ethics; New York, vol 20, no. 3, pp. 701-715.
Clapper, J, Lettre, M & Rogers, MS 2017, ‘Foreign Cyber Threats to the United States’, Hampton Roads International Security Quarterly; Portsmouth, 31 Jan 2017, p. 1.
Cox, J 2008, ‘Cyber security threats grow in sophistication, subtlety and power: Researchers say malware, botnets, cyber warfare, threats to VoIP and mobile devices, and the “evolving cyber crime economy”are ever-more sophisticated threats’, Network World (Online); Southborough, p. 12.
Erickson, K 2008, ‘The hacker mentality: Security, risk and control in the information society’, Phd Thesis, Universoty of Washington, Ann Arbor, Georgia.
Horner, DS 2010, ‘Moral luck and computer ethics: Gauguin in cyberspace’, Ethics and Information Technology; Dordrecht, vol 12, no. 4, pp. 299-312.
Identity Theft Resource Center 2016, ‘Data Breach Report 2016 End Year Report’, Cyber Scout.
Levy, Y, Ramim, M & Hackney, RA 2013, ‘ASSESSING ETHICAL SEVERITY OF e-LEARNING SYSTEMS SECURITY ATTACKS’, The Journal of Computer Information Systems; Stillwater, vol 53, no. 3, pp. 75-84.
Volkman, R 2015, ‘Computer ethics beyond mere compliance’, Journal of Information, Communication & Ethics in Society; Bingley, vol 13, no. 3/4, pp. 176-189.
Walters, R 2016, ‘Cyber Attacks on U.S. Companies in 2016’, The Heritage Foundation.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download