Three Distinct Perspectives of Applied Ethics in IT: A Case Study of Ransomware Attack in Atlanta
Verified
Added on 2023/06/08
|7
|2789
|275
AI Summary
This paper analyses the ethical issues caused by the spreading of Ransomware in Atlanta from professional, philosophical, and sociological ethical perspectives. It discusses the impact of the attack and the ethical issues related to it for both the cybercriminals and people affected by it.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
SCHOOL OF COMPUTING AND MATHS, Charles Sturt University IT Ethics Assignment 1: Three Distinct Perspectives of Applied Ethics Your Name Student Number Word Count:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT Ethics 1.Introduction The increasing developments in the ICT industry in the recent times have provided the society with the different type of advantages and disadvantages. To tackle the issues related to there is a need of implementing the different types of ethicalperspectives (Popescul & Georgescu, 2014). The three different types of ethical perspectives discussed in this paper are professional ethical perspectives, philosophical ethical perspectives and sociological ethical perspectives. In this paper, the ethical issues caused due to the spreading of Ransomware in the city of Atlanta is discussed. During the attack the entire city was affected by it, vital data was on hostage in an infected IT network connection(Dacier et al., 2017). The impact ofthat attack after several months is stated and along with that the ethical issue related to it for both the cyber criminals and people affected by it is discussed in details through the different ethical perspectives as per the ICT solutions. 2.Professional Ethics Perspectives The professional ethics is the type of ethics by which every individual working on an organization should be maintaining a specific behavioral professional. The professional aspect of every employee working in a particular organization should perform no such activities in their action so that it would not harm their profession or the organization they are attached with. Any sort of activities that have a capability of working against the corporation or any employee can be stopped by using the professional ethical perspectives. A professional attitude is developed with the employee which helps them in various types of purposes throughout their professional life(Durkheim, 2013). Talking about this particular attack in the city of Atlanta where the cyber criminals infected the security systems of the entire city it breaks the professional ethical perspectives. The ransomware virus transfer is a major ethical implication that should have been kept way from the world for the cyber criminals who uses them to breach out the vital data that are not authorized to them. Speaking of the basic ethical factor in case of every data of an individual, it should be their sole ownership by the authorized personals, others should not be having any type of access to their systems for retrieving any type of data(Thomas, Burmeister & Low, 2017). In proper professional balance should be there between the organization and the employees so that there is effective productivity. There was an urgent need of maintaining the professional code of ethics after that attack to restore balance to the system. There is need to change the professional ethics of the cyber criminals who are developing the programs as the program should be developed in such a way so that it should have a positive impact on the user of that program not affecting people because of it. The benefit of the organization and the people should be prioritized before releasing any product on the market. But in this case, the main aim of the attackers was only to harm the society and extort huge money from them and use them for personal purposes which is completely unethical. Speaking of the professional ethical perspectives it can be found that the organization which are initially affected by that worm did not have a secured network system(Loukaka & Rahman, 2017). The impacted organization should have been more cautious about the security of their organization as it may have an impact on the entire industry of that country. 3.Philosophical Ethics Perspectives The philosophical ethics is a type of ethics which gives the idea of being ethically right or wrong of the activities within the organization(Manjikian, 2017). Thesense of justification and unjustification Your Name
IT Ethics of any type of action can be known with the help of this type of perspective. Every employee of an organization should be having their own instincts and ethical perceptions which guides them to do any anything or take any type of decisions, they should be morally correct when it comes to their life. But the ethical perspectives which every individual follow should not be different in their personal and professional life it will cause major complexities in their life. The perception regarding any issue should be considered the same in both professional and personal time. The philosophical ethical perspectives are very much important in their own way as it helps them to guide everyone in the right way in all aspects of their life. A whole lot of success and failure ratio of an individual depends upon choosing the ethically right philosophy (Weckert & Lucas, 2013). Making those choices is the toughest part of the of any individual as sometimes they are diverged from the right way, they move on choosing the negative option which might provide them temporary satisfaction but ethically speaking they will be way behind them in terms of long term success. So, in spite of having personal ethics every individual should be adopting certain philosophies which will have a positive impact on them as well the environment in which they are working on (Stahl et al., 2014). Speaking of the philosophical ethical perceptive of the cyber-attack which happened in Atlanta it can be said that there can be two types of perspectives that can be studied. One study involves from the point of view of the attackers and the other from the point of view of the residents of Atlanta. There should be changes in the philosophical perspectives of the attackers as they are completely unethical and completely an incorrect way of expanding their way. The other important factor of this attack is the philosophical perspectives of the authorized technicians who are in charge of the systems which are affected by it in the initial phases(Floridi, 2013). Sociological/Descriptive Ethics Perspectives The sociological perspective are the types of perspectives which gives an idea about the various types of sociological impacts due to the moral (Hämäläinen, 2016). The sociological impact should be considered before implementing any type of plans in the society. The application of any type of program in a society is bound to create an impact, it may be for good reasons or bad they that should be critically examined before implementation. There are different types of sociological ethical perspectives such as normative ethics, meta ethics, descriptive ethics and applied ethics. The normative ethics is defined as the types of ethics which every person working on the environment should follow happily after knowing its impact whereas meta ethics is the type of ethics by which the actual ethical theories arerelated to the ethical execution behind thebehavioral action of an individual.The concept of descriptive ethical perspective bridges the gap between these two increasing aspects of the ethical behavior of an employee. The descriptive ethical perspective also refers to the detailed analysis of the attitude of a wide range of employees of an organization (Troitskiy, 2015). Speaking of the sociologicalethical perspectives of the cyber-attack in Atlanta it can be said that the developers of the cyber-criminal develop such a program that would have a direct negative impact on the society. They initially targeted few sensitive areas all around the world to spread their worms and Atlanta is one of them, they targeted the city and worked on their network system and acknowledged about the loopholes before captivating the data from different corporations of the city. The attackers took complete control of the devices and blocked any data retrieval process from the users and asked for huge amount of money for returning of giving them their data. The most Your Name
IT Ethics vulnerable networks were identified by them and they started working on those networks initially before taking control of the wholecity (Троицкий, 2014). This attackclearly gives us the idea of the moral values of the attackers, they knew that they were violating the ethical laws but still, they continued they activity and impacted the economy of the city. The authorities of the organization who are impacted by the attacked were made to pay those huge amounts to the attackers, sometimes the attackers used to blackmail them whenever they pay the amount by different kinds of unethical ways. All the preventive measures adopted by the citizens of Atlanta was in vain due to the advanced capabilities of the worm, they wanted to stop the collateral damage but could not stop it("Consequences of ransomware heat up in Atlanta -- GCN", 2018). The financial infrastructure of the city was completely destroyed for many months and there are still many impacted areas where they still do not use internet connection due to the fear that was created after that attack so they are doing all their activities in an offline method.From the point of view of the perspective of descriptive ethics it can be said that the decisions made by the authorities of the organization of the Atlanta city have been justified as ethically correct for handing out such a large amount of money to save all those important confidential data of the city from being misrepresented by the cyber criminals globally. Due to the use of the unethical ways the cyber-criminal extorted huge money which is completely a wrong way of income(Millard, 2013).There is an urgent need to educating about the different types of distinct perceptive in applied ethics to make people understand the true human values, more time should be invested in the security sector for any kinds of organization to be safe from any type of attack and most importantly special training should be given to them so that they have the proper approach on how to deal with the problem when it comes in the way. Your Name
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IT Ethics References Consequences of ransomware heat up in Atlanta -- GCN. (2018). Retrieved from https://gcn.com/articles/2018/07/03/continuous-data-protection.aspx Dacier, M., Bailey, M., Polychronakis, M., & Antonakakis, M. (Eds.). (2017).Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings(Vol. 10453). Springer. Durkheim, E. (2013).Professional ethics and civic morals. Routledge. Floridi, L. (2013). Distributed morality in an information society.Science and engineering ethics,19(3), 727-743. Hämäläinen, N. (2016). The Foundational Project of Ethics and a Different Way of Going Below the Surface. InDescriptive Ethics(pp. 27-35). Palgrave Macmillan, New York. Loukaka, A., & Rahman, S. (2017). Discovering new cyber protection approaches from a security professional prospective.Int. J. Comput. Netw. Commun.(IJCNC),9(4). Manjikian, M. (2017, June). Obstacles to the Development of a Universal Lexicon for Cyberwarfare. InEuropean Conference on Cyber Warfare and Security(pp. 602-609). Academic Conferences International Limited. Popescul, D., & Georgescu, M. (2014). Internet of Things–some ethical issues.The USV Annals of Economics and Public Administration,13(2 (18)), 208-214. Stahl, B. C., Eden, G., Jirotka, M., & Coeckelbergh, M. (2014). From computer ethics to responsible research and innovation in ICT: The transition of reference discourses informing ethics- related research in information systems.Information & Management,51(6), 810-818. Thomas, G., Burmeister, O. K., & Low, G. (2017). Issues of Implied Trust in Ethical Hacking. InProceedings of The 28th Australasian Conference on Information Systems, December(pp. 4-6). Troitskiy, K. (2015). The Categorical Imperative in Max Weber’s Thought.Almanac" Discourses of Ethics", (3). Millard, E. (2013). Alf Ross and Realist Conceptions of Legislation.The Theory and Practice of Legislation,1(1), 77-89. Weckert, J., & Lucas, R. (2013).Professionalism in the information and communication technology industry. ANU Press. Троицкий, К. Е. (2014). Категорический императив в мысли Макса Вебера.Дискурсы этики, (3), 51-68. Your Name
IT Ethics Do not remove the following marking sheet. Marking Sheet CriteriaStandards Mark s awar ded Use professional, philosophical, and sociological/desc riptive ethics perspectives to analyse the ethical issues involved in the case. (Value 70%) HD: Comprehensive understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through in-depth discussion and analysis of three most relevant ethical issues involved in your chosen case.(59.5-70) DI: Mostly comprehensive understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through in-depth discussion and analysis of three most relevant ethical issues involved in your chosen case.(52.5-58.8) CR: Some understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through some discussion and analysis of two relevant ethical issues involved in your chosen case.(45.5-51.8) PS: Basic understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through some discussion and analysis of two relevant ethical issues involved in your chosen case.(35-44.8) FL: Major omissions in understanding of the professional, philosophical, and sociological/descriptive ethics perspectives and irrelevant ethical issues are identified and analysed.(0-34.3) Writing & structure (Value 20%) HD: Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation errors.(17-20) DI: Well developed skills in expression & presentation of ideas.Fluent writing style appropriate to assessment task/document type.Grammar & spelling accurate.(15-16.8) CR: Good skills in expression & clear presentation of ideas.Mostly fluent writing style appropriate to assessment task/document type. Grammar & spelling contains a few minor errors.(13-14.8) PS: The text contains frequent errors in spelling, grammar, word choice, and structure, lacks clarity, and is not concise, but the meaning is apparent to the reader with some effort.(10-12.8) FL: Rudimentary skills in expression & presentation of ideas.Not all material is relevant &/or is presented in a disorganised manner.Meaning apparent, but writing style not fluent or well organised.Grammar & spelling contains many errors.(0-9.8) Referencing (Value 10%) HD: Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions.(8.5-10) DI: Very good referencing, including reference list and citations.High quality references.(7.5-8.4) CR:Good referencing, including reference list and citations. Good quality references.(6.5-7.4) PS:Referencing is comprehensive, mostly accurate according to APA style conventions, and demonstrates academic integrity. Some minor errors or omissions in style and formatting choices (e.g. italics, punctuation, etc) don’t impact on the transparency and traceability of the source, or demonstration of academic Your Name
IT Ethics integrity.(5-6.4) FL: Sub-standard (or no) referencing. Poor quality (or no) references.(0-4.9) Total Marks Your Name