Cyber Crime and Ethics
VerifiedAdded on  2023/06/08
|9
|2307
|294
AI Summary
This paper evaluates the activity related to cyber crime from an ethical point of view. The discussion is based on four classical ethical theories, including utilitarianism, deontology, virtue theory, and contract theory. The conclusion indicates that cyber crime is not an ethical practice and needs to be mitigated through awareness programs and the use of advanced techniques.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER CRIME AND ETHICS
CYBER CRIME AND ETHICS
Name of the Student:
Name of the University:
Author Note:
CYBER CRIME AND ETHICS
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER CRIME AND ETHICS
Table of Contents
Introduction......................................................................................................................................2
Discuss.............................................................................................................................................2
Utilitarianism Theory/Perspective...............................................................................................2
Deontology Theory/Perspective..................................................................................................3
Virtue Theory/Perspective...........................................................................................................3
Contract theory:...........................................................................................................................4
The thinking regarding the practice of the cyber crime:..............................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
Table of Contents
Introduction......................................................................................................................................2
Discuss.............................................................................................................................................2
Utilitarianism Theory/Perspective...............................................................................................2
Deontology Theory/Perspective..................................................................................................3
Virtue Theory/Perspective...........................................................................................................3
Contract theory:...........................................................................................................................4
The thinking regarding the practice of the cyber crime:..............................................................5
Conclusion.......................................................................................................................................6
References........................................................................................................................................7
2CYBER CRIME AND ETHICS
Introduction
Cyber crime is becoming a threat for the implementation of the advanced technology.
The main concern about the happening of the cyber crime is the threat from the data breaching.
This causes the violation of the security and the confidentiality of the information which belongs
to the users. Apart from that many activities like cyber bullying and the misuse of data can be
happened as the consequence of the cyber crime (Upadhyaya & Jain, 2016). These activities has
the negative effects on the life of the people and the society. The ethical work is expected to have
the positive benefits on the individual and the society. The main objective of this paper is to
evaluate the activity related to the cyber from the ethical point of view. The practice of the
hacking other cyber crime related activities are evaluated on the basis of four classical ethical
theories (Sharma, Mittal & Verma, 2015). The discussion will indicate if the activities related to
the cyber crime is an ethical practice. The main objective of this paper is to come to a conclusion
about the maintaining of the ethics in the doing of things and provide proper justification.
Discuss
Utilitarianism Theory/Perspective
According to the theory of utilitarianism an action can be regarded as ethical act if the
result of the action can become the cause of the benefits and happiness for most of the people.
The act of cyber crime can be evaluated on the basis of utilitarianism. The cyber crime involves
breaching of the data. The breaching of data related to the people and the organizations will face
the violation of the security. Apart from that it will also violate the security and the
confidentiality of the data (Rawal, 2017). These information can be misused and the people and
Introduction
Cyber crime is becoming a threat for the implementation of the advanced technology.
The main concern about the happening of the cyber crime is the threat from the data breaching.
This causes the violation of the security and the confidentiality of the information which belongs
to the users. Apart from that many activities like cyber bullying and the misuse of data can be
happened as the consequence of the cyber crime (Upadhyaya & Jain, 2016). These activities has
the negative effects on the life of the people and the society. The ethical work is expected to have
the positive benefits on the individual and the society. The main objective of this paper is to
evaluate the activity related to the cyber from the ethical point of view. The practice of the
hacking other cyber crime related activities are evaluated on the basis of four classical ethical
theories (Sharma, Mittal & Verma, 2015). The discussion will indicate if the activities related to
the cyber crime is an ethical practice. The main objective of this paper is to come to a conclusion
about the maintaining of the ethics in the doing of things and provide proper justification.
Discuss
Utilitarianism Theory/Perspective
According to the theory of utilitarianism an action can be regarded as ethical act if the
result of the action can become the cause of the benefits and happiness for most of the people.
The act of cyber crime can be evaluated on the basis of utilitarianism. The cyber crime involves
breaching of the data. The breaching of data related to the people and the organizations will face
the violation of the security. Apart from that it will also violate the security and the
confidentiality of the data (Rawal, 2017). These information can be misused and the people and
3CYBER CRIME AND ETHICS
the organizations can face problems due to this. Regarding all these factors it can be said that the
breaching of the data can not cause greater happiness or benefits for the people (Sharma, Mittal
& Verma, 2015). The other type of cyber crime involves the application of the ransom ware and
denial of service attacks in the system (Kieseberg, Segou & Roli, 2015). In this case, the files in
the system get corrupted and the users loose the control over the system. In both the cases, the
users of the system suffer the most. This indicates that the consequences of the cyber crime
effect negatively on the people (Hubman et al.,2015). It can be said , in this case that according
to the theory of utilitarianism the acts related to the cyber crime are not ethical.
Deontology Theory/Perspective
According to the theory of deontology the moral support of the action is dependent on the
rightness of the action under various rules. The main feature of the deontology is that the
rightness of the action is dependent on the rules rather than the consequences of the action. The
activities related to the cyber crime do not follow the basic rule. The basic rule regarding this
includes the maintenance of the safety and privacy of the people (Hussein, 2018). The breaching
of the data from the system does not support this rule. On the other hand usage of the ransom
ware and the implementation of denial of service attack for making the system disable are not
permitted as act (Sharma, Mittal & Verma, 2015). The cyber crime causes many consequences
which have the adverse effect on the society and is not according to the rule (Hubman et
al.,2015). Some of these practices are the cyber bullying, usage of the confidential data
unethically. All these practices do not support the theory of deontology. In this case, according
to the act of deontology these practices are not ethical.
the organizations can face problems due to this. Regarding all these factors it can be said that the
breaching of the data can not cause greater happiness or benefits for the people (Sharma, Mittal
& Verma, 2015). The other type of cyber crime involves the application of the ransom ware and
denial of service attacks in the system (Kieseberg, Segou & Roli, 2015). In this case, the files in
the system get corrupted and the users loose the control over the system. In both the cases, the
users of the system suffer the most. This indicates that the consequences of the cyber crime
effect negatively on the people (Hubman et al.,2015). It can be said , in this case that according
to the theory of utilitarianism the acts related to the cyber crime are not ethical.
Deontology Theory/Perspective
According to the theory of deontology the moral support of the action is dependent on the
rightness of the action under various rules. The main feature of the deontology is that the
rightness of the action is dependent on the rules rather than the consequences of the action. The
activities related to the cyber crime do not follow the basic rule. The basic rule regarding this
includes the maintenance of the safety and privacy of the people (Hussein, 2018). The breaching
of the data from the system does not support this rule. On the other hand usage of the ransom
ware and the implementation of denial of service attack for making the system disable are not
permitted as act (Sharma, Mittal & Verma, 2015). The cyber crime causes many consequences
which have the adverse effect on the society and is not according to the rule (Hubman et
al.,2015). Some of these practices are the cyber bullying, usage of the confidential data
unethically. All these practices do not support the theory of deontology. In this case, according
to the act of deontology these practices are not ethical.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4CYBER CRIME AND ETHICS
Virtue Theory/Perspective
Virtue theory includes the judging of the action depending on the virtue of the act. It can
be said that the good act have good consequences (Hubman et al.,2015). The practices regarding
the cyber crime do not have positive virtue (Hubman et al.,2015). It can be said from the
consequences from the happening of the cyber crime that this type of practice are not have the
positive influences on the people (Hubman et al.,2015). The use of the cyber crime increase the
tendency of the cyber bullying and misuse of the personal information. These activities are not
acceptable for the society (Li,2016). It has been seen that in many cases, after the cyber attack,
the attackers want large amount of money from the users to free the system. This tendency is also
not acceptable as it increases security threats for the society (Czech,2016). Apart from that the
goodwill of the society gets hampered due to the illegal activities related to the cyber crime
(Hubman et al.,2015). It can be said that the mitigation of the activities related to the cyber crime
can be mitigated through the social awareness. Therefore it can be said that from the perspective
of the virtue theory the practices related to the cyber crime are not ethical.
Contract theory:
Social contract theory defines the significance of the laws and the regulations for living in
the society. It is applicable for the human being to live in the society. In order to live in the
society some of the rules and regulations are needed to be followed (Hubman et al.,2015). The
social contract theory approves those practices which are suitable for the people and approve
them to live in the society. The consequences regarding the actions in this case are needed to be
positive. The practices related to the cyber crime influences the increasing crime rate. It
approves the breaching of the data that violates the privacy of the organizations and the
individuals (Taddeo, 2016). On the other hand the practices regarding the spreading of ransom
Virtue Theory/Perspective
Virtue theory includes the judging of the action depending on the virtue of the act. It can
be said that the good act have good consequences (Hubman et al.,2015). The practices regarding
the cyber crime do not have positive virtue (Hubman et al.,2015). It can be said from the
consequences from the happening of the cyber crime that this type of practice are not have the
positive influences on the people (Hubman et al.,2015). The use of the cyber crime increase the
tendency of the cyber bullying and misuse of the personal information. These activities are not
acceptable for the society (Li,2016). It has been seen that in many cases, after the cyber attack,
the attackers want large amount of money from the users to free the system. This tendency is also
not acceptable as it increases security threats for the society (Czech,2016). Apart from that the
goodwill of the society gets hampered due to the illegal activities related to the cyber crime
(Hubman et al.,2015). It can be said that the mitigation of the activities related to the cyber crime
can be mitigated through the social awareness. Therefore it can be said that from the perspective
of the virtue theory the practices related to the cyber crime are not ethical.
Contract theory:
Social contract theory defines the significance of the laws and the regulations for living in
the society. It is applicable for the human being to live in the society. In order to live in the
society some of the rules and regulations are needed to be followed (Hubman et al.,2015). The
social contract theory approves those practices which are suitable for the people and approve
them to live in the society. The consequences regarding the actions in this case are needed to be
positive. The practices related to the cyber crime influences the increasing crime rate. It
approves the breaching of the data that violates the privacy of the organizations and the
individuals (Taddeo, 2016). On the other hand the practices regarding the spreading of ransom
5CYBER CRIME AND ETHICS
ware and virus and making people influenced about the denial of service attack are not good
practices for the society (Hui, Kim & Wang, 2017). It will effect on the social bonding among
the people. Apart from that these acts also violates the security and safety of the people in the
society (Hubman et al.,2015) . Apart from that the usage of the ransom ware and other hacking
tools and techniques will lead to the wastage of the resources. Considering all these factors it can
be said from the social contract theory perspective the acts related to the cyber crime are not
ethical.
The thinking regarding the practice of the cyber crime:
The practices related to the cyber crime have been discussed on the basis of the different
ethical theories. It can be said with the application of all these theories , the act of cyber crime
has been defined from the different perspective (Marsh, 2017). Some of the organizations
supported the idea of using the cyber crime techniques to revile the truth (Sharma, Mittal &
Verma, 2015). However, in this case the usage of the cyber criminal activity is not applicable.
The activities of the cyber crime have the negative consequences o the people and the
organizations (Hubman et al.,2015). Apart from that the violation of the security and the privacy
of the public life is done through the cyber crime (Kundu et al.,2018). Apart from that the
wastage of the resources and other hazards can be raised with the increased practice of the cyber
crime (Hubman et al.,2015). It has been seen that with the advancement of the technology the
detection process and the prevention process of the threats from the cyber crime are getting
complex (Ienca & Haselager,2016). In this situation the advanced technology and the techniques
are needed to be used for the mitigation of the cyber crime. Apart from that people are made
aware about the consequences of the cyber crime (Hubman et al.,2015). Proper authentication
and the password are needed to be used while using the system. It can be said that the cyber
ware and virus and making people influenced about the denial of service attack are not good
practices for the society (Hui, Kim & Wang, 2017). It will effect on the social bonding among
the people. Apart from that these acts also violates the security and safety of the people in the
society (Hubman et al.,2015) . Apart from that the usage of the ransom ware and other hacking
tools and techniques will lead to the wastage of the resources. Considering all these factors it can
be said from the social contract theory perspective the acts related to the cyber crime are not
ethical.
The thinking regarding the practice of the cyber crime:
The practices related to the cyber crime have been discussed on the basis of the different
ethical theories. It can be said with the application of all these theories , the act of cyber crime
has been defined from the different perspective (Marsh, 2017). Some of the organizations
supported the idea of using the cyber crime techniques to revile the truth (Sharma, Mittal &
Verma, 2015). However, in this case the usage of the cyber criminal activity is not applicable.
The activities of the cyber crime have the negative consequences o the people and the
organizations (Hubman et al.,2015). Apart from that the violation of the security and the privacy
of the public life is done through the cyber crime (Kundu et al.,2018). Apart from that the
wastage of the resources and other hazards can be raised with the increased practice of the cyber
crime (Hubman et al.,2015). It has been seen that with the advancement of the technology the
detection process and the prevention process of the threats from the cyber crime are getting
complex (Ienca & Haselager,2016). In this situation the advanced technology and the techniques
are needed to be used for the mitigation of the cyber crime. Apart from that people are made
aware about the consequences of the cyber crime (Hubman et al.,2015). Proper authentication
and the password are needed to be used while using the system. It can be said that the cyber
6CYBER CRIME AND ETHICS
crime is not an ethical practice and all the theories regarding ethics do not approve the practices
related to the cyber crime.
Conclusion
The discussion is regarding the evaluation of the activities regarding the cyber crime. The
discussion has been evaluated on the basis of the ethical theories. This discussion has helped to
discuss the activity regarding cyber crime from the different perspective. The discussion
indicates that the activities regarding the cyber crime have the negative effect on the society,
people and the organizations. On the other hand, the wastage of the resources and the systems
can be done through the usage of cyber crime. The main motive of the cyber criminals is focused
on the personal benefits using the confidential resources of the people. The nature of this practice
is not according to the rules and regulations. People can face problems and the threats regarding
the security due to this practice. From this situation it can be said that cyber crime is not an
ethical practice and the tendency of the cyber crime needed to be mitigated through the
awareness programs and the use of advanced techniques.
crime is not an ethical practice and all the theories regarding ethics do not approve the practices
related to the cyber crime.
Conclusion
The discussion is regarding the evaluation of the activities regarding the cyber crime. The
discussion has been evaluated on the basis of the ethical theories. This discussion has helped to
discuss the activity regarding cyber crime from the different perspective. The discussion
indicates that the activities regarding the cyber crime have the negative effect on the society,
people and the organizations. On the other hand, the wastage of the resources and the systems
can be done through the usage of cyber crime. The main motive of the cyber criminals is focused
on the personal benefits using the confidential resources of the people. The nature of this practice
is not according to the rules and regulations. People can face problems and the threats regarding
the security due to this practice. From this situation it can be said that cyber crime is not an
ethical practice and the tendency of the cyber crime needed to be mitigated through the
awareness programs and the use of advanced techniques.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7CYBER CRIME AND ETHICS
References
Czech, M. (2016). Real-world evidence and Big Data in medicine: Is there a financial and legal
risk linked to cyber crime?. In Managing Cyber Risk in the Financial Sector (pp. 128-
145). Routledge.
Hubman, J. M., Doyle, Z. B., Payne, R. L., Woodburn, T. F., McDaniel, B. G., & Giordano, J. V.
(2015). Ethical Considerations in the Cyber Domain. In Evolution of Cyber Technologies
and Operations to 2035 (pp. 163-174). Springer, Cham.
Hui, K. L., Kim, S. H., & Wang, Q. H. (2017). Cybercrime deterrence and international
legislation: evidence from distributed denial of service attacks. Mis Quarterly, 41(2), 497.
Hussein, Z. (2018). Cybercrime: Do Security and Software Influence Students’ Perception?.
In Proceedings of the Art and Design International Conference (AnDIC 2016) (pp. 325-
332). Springer, Singapore.
Ienca, M., & Haselager, P. (2016). Hacking the brain: brain–computer interfacing technology
and the ethics of neurosecurity. Ethics and Information Technology, 18(2), 117-129.
Kieseberg, P., Segou, O. E., & Roli, F. (2015). CyberROAD: Developing a Roadmap for
Research in Cybercrime and Cyberterrorism. ERCIM NEWS, (102), 50-51.
References
Czech, M. (2016). Real-world evidence and Big Data in medicine: Is there a financial and legal
risk linked to cyber crime?. In Managing Cyber Risk in the Financial Sector (pp. 128-
145). Routledge.
Hubman, J. M., Doyle, Z. B., Payne, R. L., Woodburn, T. F., McDaniel, B. G., & Giordano, J. V.
(2015). Ethical Considerations in the Cyber Domain. In Evolution of Cyber Technologies
and Operations to 2035 (pp. 163-174). Springer, Cham.
Hui, K. L., Kim, S. H., & Wang, Q. H. (2017). Cybercrime deterrence and international
legislation: evidence from distributed denial of service attacks. Mis Quarterly, 41(2), 497.
Hussein, Z. (2018). Cybercrime: Do Security and Software Influence Students’ Perception?.
In Proceedings of the Art and Design International Conference (AnDIC 2016) (pp. 325-
332). Springer, Singapore.
Ienca, M., & Haselager, P. (2016). Hacking the brain: brain–computer interfacing technology
and the ethics of neurosecurity. Ethics and Information Technology, 18(2), 117-129.
Kieseberg, P., Segou, O. E., & Roli, F. (2015). CyberROAD: Developing a Roadmap for
Research in Cybercrime and Cyberterrorism. ERCIM NEWS, (102), 50-51.
8CYBER CRIME AND ETHICS
Kundu, S., Islam, K. A., Jui, T. T., Rail, S., Hossain, M. A., & Chowdhury, I. H. (2018,
February). Cyber crime trend in Bangladesh, an analysis and ways out to combat the
threat. In 2018 20th International Conference on Advanced Communication Technology
(ICACT) (pp. 474-480). IEEE.
Li, X. (2016). Defining cybercrime based on roles of data processing systems. Pandora's Box,
(2016), 127.
Marsh, D. (2017). Are Ethical Hackers the Best Solution for Combating the Growing World of
Cyber-Crime? (Doctoral dissertation, University Honors College, Middle Tennessee
State University).
Rawal, B. G. D. R. (2017). Exploration of Cognitive Skills in Kids through Cyber Crime Ethics
Education: A Prevention Method.
Sharma, M., Mittal, S., & Verma, A. (2015). Cyber Ethics in Security Application in the Modern
Era of Internet. IITM Journal of Management and IT, 6(1), 140-143.
Taddeo, M. (2016). The Ethics of Cyber Conflicts: An Introduction.
Upadhyaya, R., & Jain, A. (2016, April). Cyber ethics and cyber crime: A deep dwelved study
into legality, ransomware, underground web and bitcoin wallet. In Computing,
Communication and Automation (ICCCA), 2016 International Conference on (pp. 143-
148). IEEE.
Kundu, S., Islam, K. A., Jui, T. T., Rail, S., Hossain, M. A., & Chowdhury, I. H. (2018,
February). Cyber crime trend in Bangladesh, an analysis and ways out to combat the
threat. In 2018 20th International Conference on Advanced Communication Technology
(ICACT) (pp. 474-480). IEEE.
Li, X. (2016). Defining cybercrime based on roles of data processing systems. Pandora's Box,
(2016), 127.
Marsh, D. (2017). Are Ethical Hackers the Best Solution for Combating the Growing World of
Cyber-Crime? (Doctoral dissertation, University Honors College, Middle Tennessee
State University).
Rawal, B. G. D. R. (2017). Exploration of Cognitive Skills in Kids through Cyber Crime Ethics
Education: A Prevention Method.
Sharma, M., Mittal, S., & Verma, A. (2015). Cyber Ethics in Security Application in the Modern
Era of Internet. IITM Journal of Management and IT, 6(1), 140-143.
Taddeo, M. (2016). The Ethics of Cyber Conflicts: An Introduction.
Upadhyaya, R., & Jain, A. (2016, April). Cyber ethics and cyber crime: A deep dwelved study
into legality, ransomware, underground web and bitcoin wallet. In Computing,
Communication and Automation (ICCCA), 2016 International Conference on (pp. 143-
148). IEEE.
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.