StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Social and Ethical Implications of Cyber Crimes - Essay Example

Cite this document
Summary
The paper "Social and Ethical Implications of Cyber Crimes" is an outstanding example of an information technology essay. Cybercrimes or computer crimes refer to crimes carried out that involve the use of a network and a computer. In defining computer crimes, the motive of these crimes is of equal magnitude since most of those involved in committing cyber crimes are usually with the aim of compromising security…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97% of users find it useful

Extract of sample "Social and Ethical Implications of Cyber Crimes"

Name: Professor: Title: Date: SOCIAL AND ETHICAL IMPLICATIONS OF CYBER CRIMES Cybercrimes or computer crimes, refers to crimes carried out that involve the use of a network and a computer. In defining computer crimes, the motive of these crimes is of equal magnitude since most of those involved in committing cybercrimes are usually with the aim of compromising security or causing financial damages to their victims (McEwen 33). Those involved in committing cybercrimes mainly do so through use of computer viruses, malware, fraud or cyber stalking. Moreover, others use phishing scans ton target their victims who are usually unaware of the danger that they are in. According to Kizza, businesses and organizations have over the years become victims of random cyber-attacks (Kizza 54). While these crimes pose huge financial losses for the respective companies, it also provokes significant implications to third party user and subscribers of these organizations. Statistics indicate that almost half of the exchanges made by the World Federation of Exchanges, an exchange company, have been victims of these attacks over a period of one year. It is important to note that in as much as cyber cries are a norm in the financial sector, these cybercrimes are not limited here, but rather, spread across a broad platform. Government agencies and companies, Moreover, the fact that more and more companies are becoming dependent on technology greatly increases this menace. In looking at cybercrimes, we lay particular emphasis on hacking. SOCIAL CHALLENGES IN CYBERCRIMES Undoubtedly, the rapid revolution in Information Technology has had a monumental impact on individuals as well as businesses in a wide variety of ways. However, the misuse of computer and computer systems has equally brought in many social evils and challenges linked with virus infections, privacy rights and the adverse effect it has on the younger generations. The society thus, in addressing the issue of cybercrimes will inevitably have to tackle these major social challenges as outlined here in this essay. 1. Hacking. Hacking is basically the process of accessing a closed computer system with the motive of gaining access to the information and knowledge contained in the system. Hackers compromise intimate information that does not belong to them. This, among other issues, have raised serious ethical as well as social concerns and challenges regarding the information and also guarding it from unauthorized access (Tayani 88).It is common knowledge that hacking is not a new practice. Network managers across various industries have been faced with the daunting task of having to ensure that their security systems do not leave loop holes that encourage hackers and their activities. Hacking has been undoubtedly one of the biggest social challenges in Information Technology. 2. Privacy Rights for Employees. Essentially, companies come up with security measures to monitor employee activities in the course of their employment. This has posed some serious and rather interesting questions, one of them being, ‘Do employees have the right to look at the employer’s system?’ While it is extremely easy for employers to access employers’ emails, it is impossible for the converse to happen. This, therefore, raises serious concerns on the extent to which employees possess the right to privacy that should actually bar them from intrusion by their employers. On one hand, employers hold the opinion that it is paramount for them to monitor the activities of their employees electronically so as to check on and prevent frauds, thefts, enhance job performance and other activities deemed illegal. On the other hand, employers argue that this form of surveillance helps to develop efficiency, productivity, and ensure quality control measures are enhanced. 3. Loss of Reputation. An organization whose sensitive information has been interfered gets negative publicity. Ultimately, clients realizing that their information is not secure with your organization makes them wary of conducting any business with the organization. Most of the cybercrimes that take place involve compromising an organization’s data. If there are not enough measures to control this vice, and cyber criminals get to access this information, then there is usually the danger that a company or organization may lose important clients and also lose future potential clients (Kizza 134). Therefore, businesses should ensure they put in place efficient detection systems to curb intrusion of their networks to avoid damage to their reputation. These social challenges can be dealt with fully or to a great extent by engaging technology based solutions. It is, therefore, important for organizations to use prevention mechanisms such as encrypting their files to ensure unauthorized persons cannot access the data. Moreover, use of passwords on screen savers to ensure only those with passwords can gain access to the information. In addition to this, organizations can embark on using Intrusion Detection Systems that allow system and Network Administrators to locate the sources and address of the hackers. However, even the use of technological solutions alone to approach this issue is insufficient. The real cause of these cybercrimes lies in the individual and society conducts (McEwen 61). Therefore, the more holistic solution is to approach the social challenges by first seeking to find out the underlying causes of these social problems. ETHICAL CHALLENGES Ethics refers to an accepted code of conduct. In the context of business, ethical challenges encompass the challenges faced by organizations in their day to day operations. Basically, organizations strive to maintain competence professionally as well as effectiveness. Moreover, it is the primary responsibility of businesses to secure their systems. As business tackle this security issue, there are several ethical challenges that are bound to surface. These include. 1. Privacy Essentially, this looks the amount of information that one should disclose about themselves to others. Moreover, this seeks to address the right of individuals to keep some information to themselves while also giving some freely. In designing systems, Information experts have in store a database which keeps all information in an organized manner for future access. As employers and clients, you are sometimes required to give out your information. This information, over time and as you interact with more organizations becomes a substantial amount. As your information goes to different databases, this does not give organizations the right to merge your information. This is critical as doing so could reveal information that an individual may not want disclosed. While the value of the information may have great value to the organization, the ethical implication of these type of decisions is an important consideration that business should consider. 2. Accuracy. Designing information in databases requires that the systems administrators verify the information to make sure that it is reflective of the actual information intended. It is unethical for any organization to give out unverified information (Kshetri 96). Organizations face the challenge of safeguarding data from interference by unauthorized persons. Moreover, employees tasked with the duty of entering data in the database should ensure that the information given out is not only precise but also regularly updated since this information can be required to make important decisions for the company. In this regard, companies should carry out regular audits on information systems to ensure the integrity, accuracy and safety of the information. In addition to this, organizations should be vigilant to ensure any information released regarding the organization or its employees is verified and checked to see if it meets set specific standards. 3. Access. Individuals working in the Information Technology sector should possess the intellectual capability to deal with information. This includes basic skills such as calculating, writing, reasoning and reading. When organizations design websites, the key role of these organizations is usually to ensure that their clients can get information regarding their products or access online services through this system. However, cyber criminals may penetrate these websites and gain unauthorized access (Forester 70). The issues of access to information systems raise serious concerns in organizations. It should also be noted that system processes should be granted reasonable access privileges to ensure that different levels of users each have specified privileges to access of this information. This is to mean that information intended to be accessed through a guest account contains information that is less critical than that which should be accessed through an administrator account. 4. Property. The issue of intellectual property rights is a pertinent issue that has both financial and ethical implications. The mode through which information is transmitted is a major issue for companies. Invariably, information that has taken intensive research and analytical procedures can get in the hands of individuals who may wish to reproduce it with effortless ease. IN such scenarios, the companies or organizations involved with the process of financing the research are bound to undergo huge financial losses (McEwen 19). While these losses may fail to be quantifiable accurately, it is beyond doubt that this kind of illegal reproduction of data is a great ethical issue. Safeguard of data therefore means that organizations have to secure the data from unauthorized persons. Moreover, it gets particularly difficult to secure the data in the case where the data has been maliciously obtained by one party. The only clear cut way of preventing such infringement to copyright laws is through protection of intellectual property rights. The use of encryption, patents, oaths of confidentiality and other means of establishing loyalty and trustworthiness are the major ways of ensuring protection to intellectual property. In analyzing ethical an social issues facing organizations, this approach deals with the issues that affect our code of conduct in businesses an also looks at it from a social point of view. It is beyond doubt that the sense of responsibility in the use of internet and computer networks is usually greatly diminished by the fact that those commuting these crimes have relative distance from the premises in which the actual information is sourced from (Kshetri 65). This, therefore, means that the actions and the effects are in completely distant making the moral aspect of these crimes less felt. Further, the convectional teachings on what is morally right or wrong are based entirely on the tangible and physical objects. However, when it comes to the use of virtual objects and other actions carried out virtually, it is harder to decipher. A hacker may be justified to argue that he or she does not comprehend the actual consequences of his malicious conduct, basing it on the fact that he does not possess the technical capability and competence to understand the magnitude of his behavior. In this light, organizations have at their disposal several options that they can use to ensure that their data is safeguarded from malicious access, misuse or distribution. One of the means is by use of data encryption techniques which involve protecting information through use of encryption keys. Moreover, companies should ensure that their Wi-Fi networks are password protected to alleviate the risk of intruders. In addition to these, business should ensure that they engage well qualified personnel in the information security department so as to have updated security measures. CONCLUSION. Cybercrimes have become a critical issue ranging from small businesses to multi-million dollar businesses. These external threats of data theft, manipulation and unauthorized access as well as hacking into a company’s security systems have become as real as physical burglary in companies’ premises. Cyber criminals are notorious for breaking into computer networks and illegally obtaining sensitive information (Forester 40). Moreover, these hackers spend considerable time assessing vulnerabilities in target companies before attacking. It is, therefore, the responsibility of every business to tighten security in its online system as well as taking considerable caution before giving out sensitive information to non-members of their organization (Kshetri 64). Reported cases of hacking in banks and other financial institutions have sky rocketed over the recent past, with records indicating on average $1 trillion is lost through these criminals. Equally contributing is the fact that security is hardly a priority for most software developers. Whilst companies may put in place the latest softwares, it is up to the software developers to ensure that these softwares are resistant to potential risks. Finally, it is the core responsibility of businesses to train their employees on ethical business praises and encourage them to be ethical and responsible in the articulation of their designated duties. REFERENCES McEwen, J T. Dedicated Computer Crime Units. Washington, D.C.: U.S. Department of Justice, National Institute of Justice, n.d.. Print. Kshetri, Nir. The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. Heidelberg: Springer, 2010. Print. Kizza, Joseph M. Ethical and Social Issues in the Information Age. London: Springer-Verlag, 2007. Internet resource. Forester, Tom, and Perry Morrison. Computer Ethics: Cautionary Tales and Ethical Dilemmas in Computing. Cambridge, Mass. [u.a.: MIT Press, 1995. Print. Tavani, Herman T. Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing. Hoboken, N.J: Wiley, 2011. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Social and Ethical Implications of Cyber Crimes Essay Example | Topics and Well Written Essays - 2000 words, n.d.)
Social and Ethical Implications of Cyber Crimes Essay Example | Topics and Well Written Essays - 2000 words. https://studentshare.org/information-technology/2069523-living-in-the-information-age-social-and-ethical-issues
(Social and Ethical Implications of Cyber Crimes Essay Example | Topics and Well Written Essays - 2000 Words)
Social and Ethical Implications of Cyber Crimes Essay Example | Topics and Well Written Essays - 2000 Words. https://studentshare.org/information-technology/2069523-living-in-the-information-age-social-and-ethical-issues.
“Social and Ethical Implications of Cyber Crimes Essay Example | Topics and Well Written Essays - 2000 Words”. https://studentshare.org/information-technology/2069523-living-in-the-information-age-social-and-ethical-issues.
  • Cited: 0 times
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us