Tuesday, May 5, 2020

Experts Report For IT Risk Management Ethical Issues In Cyber Crime

Question: Discuss about the Report for IT Risk Management for Ethical Issues. Answer: Ethical issues in cyber crime Introduction: Ethics is the study of considering what is right and what is wrong (Buhalis, 2012). With the advancement in the trends and technology of the computer and information technology, it is necessary to understand the ethics associated with the computer security, issues related to the privacy and the negative impact which flourish on the computer world. The global problem in the field of computer technology is of cyber crime. Cyber crime is an illegal activity which is related with the computer (Dewanjee Vyas, 2013). Major consideration should be given on the development of the strategies to overcome the problem of ethical issues related with the computer and the information technology. The problems which are related with the cyber crime are categorized as security issues related with the financial transaction, unauthorized access of credit card information, confidentiality related to the emails and other data, and many other illegal activities. There are some questions which have to be a nswered in considering ethics in computer world. They are summarized below: What type of information related to the individual should be public? What type of security mechanism should be used in keeping the confidential data of the individual? What mechanism should be used to handle the pirated data over the network? To which individual accessing to the data and information should be given? What safeguards should be used for restricting the unauthorized access to the information? Ethical Issues related to computer technology: The ethical issues related to the computer technology are divided into three categories: Individual piracy: When the data is transmitted from a single individual to the large population then the condition of individual piracy occurs. The condition arises of disclosure and violation of the data and information. Authorized and unauthorized access: Only authorized persons should be given access to the information and the unauthorized persons should be restricted from giving access the confidential information. Negative actions: The action which has negative consequences is categorized under negative action. In computer language, the action which modifies the files, replication, or any unusual activity is known by the term computer viruses. Types of Cyber crime: When the crime takes place on the network it is called as cyber crime. From the survey, it has been discovered that the ratio of cyber crime is increases up to 11 percent every year. More than 500,000 cases have been recorded in the anti fraud command centre. More than 400,000 malware have been developed every week which increases the actions which results into the cyber crime. Cyber crimes are broadly classified as follows: Crime which is related to telecommunication Crime which is related with personnel issues Crime which is related to telecommunication: This type of cyber crime effects large number of individuals. In this cyber crime, criminals hide their identities by using different frond end mechanism. It is mainly done in the companies which depend on digital information system. Sometimes, the criminal uses the access of PBX for dial in and dial out to do communication over the network (Gunarto, 2014). The criminals pirate the digital content of the information. When the unauthorized accessing and using of the information has been carried out it comes under the category of telecommunication cyber crime. Crime which is related with personnel issues: Sometimes due to misunderstanding and unintentionally cyber crime takes place. Most of the time, Individuals just for making fun send spam messages, unauthorized accessing of the data, wrong usage social media, and many more (Fanfiski, 2010). Sometimes stealing of the identity takes place to gather unauthorized accessing of the confidential information. Social media and chat rooms are another platform to commit cyber crime. The psychological sick person may also commit cyber crime to harm others. Challenges in ethics related to cyber crime. Social problems is one of the major challenge faced by the ethics related to the cyber crime such as problem of virus, unauthorized access, hacking, negative effect on the youth and teenagers, and others. Various steps have been taken to overcome the problem of cyber crimes such as development of the technologies like virtual private network, IDS environment, password, protocols, firewalls, and etc. Evidences of Cyber crime: From the survey, it has been discovered that many type of illegal information is available on the internet which is summarized in the table below: Information Type Percentage of availability on the internet Fraud information 78% Privacy violation 72% Negative rumors 60% Information related to obscene 58% Information related to libel 55% Violation of civil right 48% Information related to Gambling 10% Solutions: The global problem in the field of computer technology is of cyber crime. The step forward should be taken to educate the people about the negative impact of cyber crime on society. There are many legislation act has been passed by the government to overcome the problem of ethical issues related with cyber crime such as Act of freedom of information, act of privacy protection, act of computer security, act of consumer internet privacy protection, act of data privacy, act of MITI legislation for e-commerce, act of information technology, act of NSW electronic transaction, act of data protection, and act of electronic transaction regulation (Kadar, 2013). To overcome the problem of cyber crime, the question such as who is the victim? What the prevention measures taken? What are negative effects of the act? and others which helps to the high extent. Steps taken in Ethical conduct: Contribute positively in the welfare of human being and society Harming others should be avoided on the highest priority Discrimination should be avoided in taking any action Individual should follow the act of honor property right Proper emphasis should be given on intellectual property Privacy of the others should be respected Confidentiality of the data should be maintained The problem of ethics should be solved legally as well as technically. Strategies: The strategies should be developed to cope with the ethical issues which are encountered which working with internet. Some of the strategies are summarized below: The step forward should be taken to overcome the problem of unemployment and underemployment Government should take step if the exploitation of the individual has been taken place The job environment should be interesting and challenging Proper planning should be done for educating about cyber space safeguards should be used for restricting the unauthorized access to the information Mechanism should be used to handle the pirated data over the network security mechanism should be used in keeping the confidential data of the individual Conclusion: The Problem of social, ethical, and political are associated with the advancement of trends and technology in the world of computers. Proper steps should be taken to overcome the problem of personnel privacy, negative actions, and authorized and unauthorized access to the information. Legal laws should be followed to overcome the problem of cyber crime. Cyber crime is an illegal activity which is related with the computer (Diaz, 2015). Major consideration should be given on the development of the strategies to overcome the problem of ethical issues related with the computer and the information technology. Social media and chat rooms are becoming major platform to commit to encounter cyber crime. The proper education should be provided about cyber crime not only to the victim but also protesters, IT professionals, Laws professionals, and cyber community. With the advancement in the technology and the use of internet, the cyber crime is becoming a global problem. References: Buhalis, D. (2012). Understanding cybercrime: Phenomenon, challenges and legal response (1st ed.). ITU. Retrieved from https://www.itu.int/ITU-D/cyb/cybersecurity/docs/Cybercrime%20legislation%20EV6.pdf Dewanjee, R. Vyas, R. (2013). Cyber Crime: Critical View (1st ed.). Retrieved from https://www.ijsr.net/archive/v5i1/NOV152579.pdf Gunarto, H. (2014). Ethical Issues in Cyberspace and IT Society (1st ed.). Ritsumeikan Asia Pacific University. Retrieved from https://www.apu.ac.jp/~gunarto/it1.pdf Fanfiski, S. (2010). Mapping and Measuring Cybercrime (1st ed.). Retrieved from https://www.oii.ox.ac.uk/archive/downloads/publications/FD18.pdf Kadar, A. (2013). Eth ical Issues in Computer use: A Study from Islamic Perspective (1st ed.). Bangladesh. Retrieved from https://globaljournals.org/GJCST_Volume13/2-Ethical-Issues-in-Computer.pdf Diaz, M. (2015). An Ethical Analysis of Cybercrime Manny Diaz (1st ed.). Retrieved from https://www.academia.edu/9133082/An_Ethical_Analysis_of_Cybercrime

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.