Ethical Issues in ICT Operation: Australian Buyers' Names

Verified

Added on  2021/05/31

|7
|1580
|46
Essay
AI Summary
This essay analyzes the ethical issues arising from the "Rent-a-hacker site leaks Australian buyers' names and addresses" case. The student explores the implications of hacking and data breaches, examining the scenario through the lenses of four ethical theories: social contract theory, utilitarianism, deontology, and virtue ethics. The essay details how each theory applies to the case, considering the motivations of hackers, customers, and those whose data is compromised. It highlights the ethical dilemmas and potential harms caused by unethical hacking practices, including financial loss and operational disruptions. Finally, the essay recommends security enhancements such as encryption and network infiltration protection. The conclusion reinforces the importance of ethical considerations in the context of technological advancements and remote data access.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ETHICAL ISSUE IN ICT OPERATION
Ethical Issue in ICT Operation
Article: Rent-a-hacker site leaks Australian buyers' names and addresses
Name of the Student:
Student ID:
Name of the University:
Author’s note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ETHICAL ISSUE IN ICT OPERATION
Introduction
According to Wilson and Wilson (2015), the technology innovation had seen the
development of the remote access to a number of databases. People are able to access varied data
sets by proper authentication or by unethical means. The growth of unethical hacking is one of
the major factors that have resulted in harming the security and integrity of the data stored. The
ethical issues have been growing due to the advent of more integrated and advanced hacking
methods. The following essay has been developed on the article of “Rent-a-hacker site leaks
Australian buyers' names and addresses”. The use of the four theories namely social contract
theory, utilitarianism theory, deontology theory, and virtue ethics theory has been done for
ensuring that the scenario had been developed based on each of the ethical theories.
Analysis of the situation on Ethical Theories
The article of Rent-a-hacker site leaks Australian buyers' names and addresses has shown
that the people have become more aware of the extent of hacking methodologies. They have
taken it as a profession for earning their perks (Tung, 2018). The hackers have been hired by a
number of people for extracting information from varied data sources. The hire a hacker is a
service provider that helps people for extracting information for their benefits. The evaluation of
the scenario in terms of the various ethical theories have been given below,
Social Contract Theory: The social contract theory rotates around the individual's
inclination and intrigue. The social association of the individual is done when the individual
doesn't have the risk of giving up the person's self intrigue. In the scenario mentioned above, the
people have started using the services by the hire a hacker for extracting information from the
mentioned sources. The growth of using the service had resulted in forming the growth of ethical
Document Page
2ETHICAL ISSUE IN ICT OPERATION
issues and dilemma for the people whose data has been hacked and misused. In any case, the
agreement hypothesis is being made for understanding the way that social contract or
collaboration is just conceivable, when every one of the individual is getting some advantage
from the agreement/participation. The extraction of the information occurring can be analysed as
a factor for harming the development of the operations. The gatherings of the social contract are
being estimated for offering help to the participation of the person alongside the completion of
self issues. The implication of the social contract theory had shown that,
Hackers are interested in getting paid for the hacking operations done
Customers are interested in getting the services for data access of other people
People whose data is hacked into would have to face the loss (both financially and
operability
Utilitarianism Theory: The utilitarianism hypothesis is the moral hypothesis causing the
adjustment of inspiration and antagonism for a particular capacity (Ryan, 2015). The sending of
the phenomenal advancement factor for expanding either sides of the hypothesis would be
limited for building up the adjustment in the activities. The hypothesis would assess the
conceivable outcomes of shaping the most precise and changed capacities for the improvement
of the activities. The hypothesis is being demonstrated for supporting the most reasonable
activity for the advancement of the exact and fitting improvement of the tasks. In the scenario
mentioned above, the people have started using the services by the hire a hacker for extracting
information from the mentioned sources. The implication of the social contract theory had shown
that hackers are interested in getting paid for the hacking operations done, customers are
interested in getting the services for data access of other people, and people whose data is hacked
Document Page
3ETHICAL ISSUE IN ICT OPERATION
into would have to face the loss (both financially and operability. The activities can be viewed as
right if the activity would expand the likelihood of the event of good or it would limit the event
of terrible. The scenario of
Deontology Theory: The deontology hypothesis would permit the clients for
concentrating on the more prominent products thinking about humankind as entirety. The
deontology hypothesis would permit the clients for framing the investigation of the improvement
hypothesis of event of the issues and administration. There are a few techniques that would
assess the amplification of the activities of the tasks for framing the prevention to the more
noteworthy capacities. The demonstration is a portrayal of the individual flighty capacities for
building up the quicker and more proficient hypotheses. The implication of the social contract
theory had shown that hackers are interested in getting paid for the hacking operations done,
customers are interested in getting the services for data access of other people, and people whose
data is hacked into would have to face the loss (both financially and operability. The all inclusive
acknowledgment criteria had been conveyed for framing the intense advancement of the
capacities. In the scenario mentioned above, the people have started using the services by the
hire a hacker for extracting information from the mentioned sources.
Virtue Ethics Theory: The ideals morals hypothesis is being restored for framing the
examination of the characteristics of the distinct individual for performing right (Hursthouse,
2013). The human excellence and morals is the essential type of the investigation factor for the
morals of doing. In the scenario mentioned above, the people have started using the services by
the hire a hacker for extracting information from the mentioned sources. The hypothesis gives
the examination of a person's idea for acknowledging whether the individual's doing is great or
terrible. The ideals morals had been revealing the idea of building up the exact and effect tasks of
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ETHICAL ISSUE IN ICT OPERATION
the association. The real worry of the individual being great or awful would be assessed in this
hypothesis. The implication of the social contract theory had shown that hackers are interested in
getting paid for the hacking operations done, customers are interested in getting the services for
data access of other people, and people whose data is hacked into would have to face the loss
(both financially and operability.
Recommendations: Some recommendations are,
a. Security development using Encryption
b. Network infiltration protection using IDS/IPS
Conclusion
It can be concluded from the evaluation of the article titled “Rent-a-hacker site leaks
Australian buyers' names and addresses” that the technology innovation had seen the
development of the remote access to a number of databases. People are able to access varied data
sets by proper authentication or by unethical means. The growth of unethical hacking is one of
the major factors that have resulted in harming the security and integrity of the data stored. The
ethical issues have been growing due to the advent of more integrated and advanced hacking
methods. The following essay has been developed on the article of “Rent-a-hacker site leaks
Australian buyers' names and addresses”. The use of the four theories namely social contract
theory, utilitarianism theory, deontology theory, and virtue ethics theory has been done for
ensuring that the scenario had been developed based on each of the ethical theories.
Document Page
5ETHICAL ISSUE IN ICT OPERATION
References
Hursthouse, R. (2013). Normative virtue ethics. ETHICA, 645.
Iep.utm.edu. (2017). Social Contract Theory | Internet Encyclopedia of Philosophy. Retrieved
14 May 2017, from http://www.iep.utm.edu/soc-cont/
Kiran, A. H., Oudshoorn, N., & Verbeek, P. P. (2013). Designing norms: rethinking the
relationships between design, ethics and technology.
Mulgan, T. (2014). Understanding utilitarianism. Routledge.
Oosterlaken, I. (2015). Towards an Ethics of Technology and Human Development.
In Engineering Ethics for a Globalized World (pp. 109-125). Springer International
Publishing.
Ryan, A. (2015). 16. Utilitarianism and Bureaucracy: The Views of JS Mill.
Sacco, D. F., Brown, M., Lustgraaf, C. J., & Hugenberg, K. (2016). The Adaptive Utility of
Deontology: Deontological Moral Decision-Making Fosters Perceptions of Trust and
Likeability. Evolutionary Psychological Science, 1-8.
Tung, L. (2018). Rent-a-hacker site leaks Australian buyers' names and addresses. [online] The
Sydney Morning Herald. Available at: https://www.smh.com.au/technology/rentahacker-
site-leaks-australian-buyers-names-and-addresses-20150529-ghca3f.html [Accessed 12
May 2018].
Document Page
6ETHICAL ISSUE IN ICT OPERATION
Wilson, C., & Wilson, G. T. (2015). Taoism, Shintoism, and the ethics of technology: an
ecocritical review of Howl's Moving Castle. Resilience: A Journal of the Environmental
Humanities, 2(3), 189-194.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]