logo

5 Active Mobile Threats Spoofing Enterprise Apps: Applying Ethical Theory

   

Added on  2022-11-01

7 Pages1311 Words91 Views
SCHOOL OF COMPUTING AND MATHS, CHARLES STURT UNIVERSITY
5 active mobile threats
spoofing enterprise apps
Assignment 4: Applying Ethical Theory
Your Name
Student Number
Word count

1
Introduction
The objective of this paper is to evaluate the article titled “5 active
mobile threats spoofing enterprise apps” in order to identify the ethical
concerns which are raised in this article. This article is written by Ryan
Francis, who identified a number of threats which are faced by users in
the modern era of smartphones and the internet. Cyber criminals are
using ‘impersonating apps’ which looks similar to other popular
applications in order to mislead users into installing them in their devices
(Francis, 2019). These apps contain malware that collects private data of
users by gaining unauthorised access. Shuanet is also the way which is
used by hackers to breach the security of users. It has the ability to
automatically root users’ device who did not understand how to protect
them, which leads to leakage of their private data (Francis, 2019).
AndroRAT also assists hackers in controlling devices of users and
collect their contacts, call logs, location, text messages and others
(Ahmad, 2018). UnsafeControl is also used in order to collect contact
information of users, and it allows cyber criminals to exploit sensitive
information of enterprises and users. PJApps is also used in order to leak
the victim’s phone number and location for monetary gains and violating
their privacy. Ooqqxx is another malware which is used by hackers to
show advertisements on users’ smartphone, which enforce them to
download malware and other harmful files on their devices (Francis,
2019). This essay will evaluate this article to identify ethical concerns by
using utilitarianism, deontology, contract and virtues ethical theory.

2
Utilitarianism theory
This theory is also called Consequentialism that is used in order to
evaluate the morality of a situation through an evaluation of the
consequences of actions of the parties. The elements of this theory
include a focus on consequences rather than actions and achievement of
greater happiness for a large number of people (Tobia, 2013). The actions
that fulfil these elements and lead to positive consequences to a
significant number of people are considered ethical as per this theory. The
article posted by Francis (2019) highlighted most active mobile threats
spoofing enterprise apps that are used by cyber criminals in order to gain
unauthorised access to private data of users and use their sensitive data
for illegal purposes. These actions are taken by hackers to gain personal
advantage on the expense of a large number of people that rely on these
applications to conduct their day-to-day activities (Francis, 2019). These
actions did not lead to greater happiness for a significant number of
people based on which these actions are unethical.
Deontology theory
This theory provides an opposing view when compared with
consequentialism since it focuses on the duties of parties rather than the
consequences of their actions. This theory provides that a just and ethical
society cannot be established if parties continued to violating their duties
despite the fact that they could have positive consequences (Salama & El-
Gohary, 2013). The key element of this theory focuses on the maxim of
parties, which is referred to their intention to take specific actions. The
applications highlighted in this article are designed for illegal purposes,
and they are used by parties for gaining personal benefits on the expense
of others. The maxim of cyber criminals is to gain an unfair advantage
while violating their basic legal duties which enforce them to make sure
that they take ethical decisions without violating the rights of other
parties (Francis, 2019). Since the duties of the parties are violated, the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
5 Active Mobile Threats Spoofing Enterprise Apps
|4
|1201
|378

Ethical Issues in IT
|5
|1086
|242

Applying Ethical Theory
|7
|1550
|28

5 Active Mobile Threats Spoofing Enterprise Apps
|6
|2194
|130

5 Active Mobile Threats Spoofing Enterprise Apps
|5
|1337
|153

Ethical Aspects of Mobile Spoofing
|7
|1635
|70