Ransomware Ethical Dilemma: A Multi-Perspective Analysis in IT Ethics

Verified

Added on  2023/06/08

|6
|1864
|240
Essay
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Topic in IT Ethics
TOPIC IN IT TOPICS
Assignment 1 : three perceptive of applied ethics
Student name
Word count: 1400
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Topic in IT ETHICS
Introduction
In the last 6 months, there are many issues that took place. One of the ethical dilemmas is
related with Ransomware. It is a type of malicious software which is created to block the access
of the computer system and also it threatens the information. One of the factors which are related
to this is the data breach. Ransomware attack took place in 2018 and it has taken important
information about people (Brewer, 2016).
This report will elaborate about Ransomware by focusing on three perspectives which are
a professional ethics, philosophical ethics, and sociological ethics. Ransomware has given a
negative impact on the people and there are many issues which are raised. In the society, it has
been evaluated that safety is one of the important factors that is considered by the individuals.
But in this case, the impact is seen in the privacy of the people and they suffered loss due to this.
Day by day the hackers are enhancing which are giving a negative impact on the people and
earning more profits. The important information of the people was leaked through this software.
This paper will emphasize the entire incident which took place in 2018.
Professional ethics perceptive
Professional ethics are taken into consideration when the discussion is made about this
perceptive. Ethics is one of the factors that are considered by the professionals of the
organization. It is essential to emphasize on the proper code of conduct so that ethical operations
can take place in the competitive environment (Brecher, 2014). It has been it is important to
follow the proper code of conduct so that the company can grow their business. It has been seen
that corrective steps are linked to the code of conduct. If there is proper code of conduct then it
can be easy to consider corrective decisions. Code of conduct show the right direction for the
activities and also privacy can be maintained by the individuals.
When emphasis is given on the case ransomware attack it has been evaluated that cyber
hackers affected private information of the people. This attack is called an unethical act as the
privacy of the people has been hindered and also negative impact is seen in society. Ethics is
related to the concept in which it is important to secure the data of the individual so that private
data cannot be leaked in front of people. Hackers are the people who misuse the information of
1
Document Page
Topic in IT ETHICS
the people and use the information for their own benefit (Dooley, 2017). Hackers are the people
who create various codes so that information of the people can be leaked. When emphasis is
given on developers it has been evaluated that they should focus on the concept of ethics at the
time of creating the software so that privacy of the people can be safeguard. Hackers are the
people who destroy the software and also earn profits by giving a negative impact on the people.
Philosophical ethics perceptive
In this perceptive, it has been analyzed that morals play an important role. In this ethics,
it has been seen that moral laws are important to be followed as it has been evaluated that ethics
are not for less time but it is for a long time. The operations which take place should be
completed by focusing on the moral. Morals laws in context of humans should be there so that
activities can be done in a proper manner (Gasparski, 2018). Morality is an important factor that
should be present in the personal life of the people so that it can be easy to complete the
operations on time. If there is morality then it can maintain the privacy of the individuals.
In context of ransomware case, it has been analyzed that there are two perspectives which
are included in this. First is related to cybersecurity and the next is related to maintain the
privacy of the information. The personal life of the people has been affected when personal
information is leaked. Individuals want to maintain their privacy but due to hackers, they are not
able to maintain their privacy. Next factor is related with the safeguard of information. The
hackers who steal the information of the people try to give a negative impact on their life. In this
professional code of conduct should be considered so that it can be simple to manage the entire
operations. It has been evaluated that if a professional code of conduct is not followed then it can
give negative or adverse effect on the individuals. Also if the code of conduct is followed then it
can be simple to complete the operations in the right direction. Security is maintained of the
people then it can be easy to give a positive effect which can help to conduct the operations of
the company (Kaur, Dhir & Singh, 2017).
Sociological ethics perspective
Security is also one of the important factors so that activities can take place in the right
direction. The sociological perspective is one of the perceptive in which the emphasis is given on
2
Document Page
Topic in IT ETHICS
the privacy that should be managed by the people. In this sociological perspective, there are
various ethics like normative, Meta and also descriptive.
If the focus is given on Metaethics it has been seen that it discusses the theories that are
linked to the behavior of the individuals and their acts according to ethics. Ethics should be
followed so that activities can take place in the right direction. In descriptive ethics, the
operations are completed by emphasizing on the ethical concepts related to the person in context
to the profession. It is important for the individual to focus on the attitude so that activities can
be done in the right manner. In this, it has been seen that attitude has an essential part as it
impacts the entire activities. In the last 6 months, people have faced issues related to the
insecurity of the private information and also suffered a huge loss due to these types of software
(Mansfield-Devine, 2016).
The software was created with the intention to destroy the system of the individuals and
also to give a negative impact on the individuals. The developer who designed the software has
an intention to cover the personal information of people. It is important to consider ethical laws
so that the operations can take place in a proper manner. After hacking the information of the
people, hackers claim for the amount so that they can earn easily. People do not deny as it has
been seen that every individual wants to safeguard their information (Ritzer & Stepnisky, 2017).
In descriptive ethics, it has been seen that decisions are taken by considering the
situation. It is not according to ethics but these acts are considered by the individuals so that
proper safety can be maintained from the acts. It can be said that it is unethical to harm other so
that advantage can be gained by the third person.
It is essential to focus on minimizing these types of attacks by focusing on ethics and
values so that adverse impact can be reduced. People should not pay for their security it is
important to give proper security to the individuals. By hacking people jack the information of
the individual which is not according to the ethics and values (Trabelsi & McCoey, 2016).
According to this case, ethics and values should be taken into consideration so that safety
can be maintained by the people. The companies who are facing issues should consider safety
policies so that the information of the customers cannot be leaked. It is important to safeguard
the information of the customers so that satisfaction level can be maintained. The attitude of the
3
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Topic in IT ETHICS
individual should also emphasize on the ethical laws that should be considered by the authorities
related to ransomware. If policies are implied in the right direction then it can give a positive
impact on the safety of the people. By safety policies the privacy of the people cannot be affected
and also the satisfaction level can be maintained in a proper manner. Also, the activities should
be completed with proper safety so that information cannot be leaked to the third party or a
person. Proper safety should be considered of the people by emphasizing the values and morals
so that it people can complete their activities with proper satisfaction. In this case, there is a lack
of morality and values and it should be there so that privacy and safety can be maintained (Reilly
& Jorgensen, 2016).
4
Document Page
Topic in IT ETHICS
References
Brecher, B. (2014). What is professional ethics?. Nursing ethics, 21(2), 239-244.
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network
Security, 2016(9), 5-9.
Dooley, J. F. (2017). Ethics and Professional Practice. In Software Development, Design and
Coding (pp. 283-304). Apress, Berkeley, CA.
Gasparski, W. W. (2018). Human action in business: Praxiological and ethical dimensions.
Routledge.
Kaur, G., Dhir, R., & Singh, M. (2017). Anatomy of ransomware malware: detection, analysis
and reporting. International Journal of Security and Networks, 12(3), 188-197.
Mansfield-Devine, S. (2016). Ransomware: taking businesses hostage. Network
Security, 2016(10), 8-17.
Reilly, G., & Jorgensen, J. (2016, January). Classification considerations for cyber safety and
security in the smart ship era. In Proceedings of the International Smart Ships Technology
Conference (pp. 26-27).
Ritzer, G., & Stepnisky, J. (2017). Modern sociological theory. SAGE Publications.
Trabelsi, Z., & McCoey, M. (2016). Ethical hacking in Information Security
curricula. International Journal of Information and Communication Technology Education
(IJICTE), 12(1), 1-10.
5
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]