Tuesday, May 5, 2020

Ict Related Ethical Dilemma Cyber Crime-Case Study

Question: Discuss about theIct Related Ethical Dilemma Cyber Crime. Answer: Introduction In todays advanced technological era, ethical dilemma has become a major subject of concern for the business organizations. An ethical dilemma is a critical situation where people choose either a moral or an immoral act to perform. This research essay would also be useful to represent a case of ethical dilemma that is related to the ICT (Information and communication Technology). Moreover, this research essay would be helpful to present most awful ICT related issue that is theft of secret encryption keys from Android and iOS phones. ICT-Related Ethical Dilemma This research essay is based on a media article that mainly focuses on ICT related ethical issues. According to the media article, the ethical dilemma took place on iOS platform of Apple Inc. This media article was published on March 4, 2016. Along with this, the report of this ethical dilemma was covered by Mr. Mohit Kumar (the Cyber Security Analyst and Information Security Researcher). As per the report, the security researchers team (Tel Aviv University, Technion and The University of Adelaide) has created a plan to steal cryptographic keys that are used by the organization to protect Apple Pay accounts, Bitcoin wallets, and other sensitive services of Android and iOS devices (Kumar, 2016). According to the researchers, during the hacking of secret encryption keys, the hackers placed a magnetic probe close to an iPhone at what time the phone executes cryptographic operations. In this way, the theft of secret encryption keys from Android and iOS phones is a major ethical issue tha t is related to ICT (Information and communication Technology). According to the DET (Doing Ethics Technique), data hacking is major ethical issue that is related to ICT. DET is a process that plays a significant role in order to investigate ethical issues in a particular scenario. On the basis of the selected media article, it is observed that the hackers take help of Side-Channel Attack to steal data in an appropriate way. For case, with the help of Side-Channel Attack, the hackers probe the pattern of memory utilization that is produced during the decryption process (Ghosh, 2016). Moreover, they also investigate the electromagnetic outputs of the device in order to take out the secret crypto key from a system. In this way, data hacking has become a major ethical issue on the platforms of Android and iOS phones. Ethical Theories to Analysis an Ethical Dilemma Situation An ethical dilemma is dangerous for the success and growth of a business organization. Along with this, business organizations may take help of ethical theories to determine the rightness or wrongness of actions/decisions made in a particular case. For case, utilitarianism, and deontology are the two important classical ethical theories that are useful to resolve a situation of ethical dilemma in an effective way (Dwell, 2013). These ethical theories are described as below: Utilitarianism Theory: Utilitarianism is an important classical ethical theory. The major objective of utilitarianism theory is to create the most amount of happiness to the utmost number of people (MacKinnon and Fiala, 2014). According to this theory, the ethical things of an organization must be to the happiness of the people and society. The business organizations must focus on the happiness of the people to perform the ethical thing/activities. In the context of given case, the things performed by the hacking firms are only for the fulfillment of their personal goals. They hack the sensitive data and personal information of the people that is totally unethical activity. The data hacking is dangerous to all over the nation. People provide their confidential information to telecommunication firms. The firms are fully liable to protect their data and information. But, hackers are doing wrong and misusing the data and information of the people (Shaw, 2016). In this way, as per the utilitarianism theory, th is case is related to the trouble of people. The actions/decisions that are related to the theft of encryption keys are totally wrong and unethical. Deontology Theory: Deontology theory is also a major ethical theory that focuses on the idealistic customs of Kant. According to this theory, the activities performed by the people must be right. Moreover, the means or sources used to perform these activities must be fair. The business organizations must implements moral standards in order to perform business activities in an ethical way (Smith, 2008). Along with this, in the context of the given scenario, people did not perform ethical activities. They did not use decent sources to perform the business activities. For case, the case is related to the data hacking and hacking is not an ethical activity. In addition to this, the hackers are stealing secret encryption keys of Android and iOS and that is totally unethical or immoral activity performed by the hackers (Hayden, 2014). In this way, it can be said that, the case is a case of ethical dilemma and the actions performed by hackers are inappropriate or unethical. Conclusions/Recommendations On the basis of above discussion, it can be assumed that, nowadays, the business firms that are related to the advanced technologies mostly facing the situation of ethical dilemmas. The hackers are creating the questionable situation in front of the organizations. Along with this, it is also observed that, theft of secret encryptions keys is an unethical activity performed by the hackers. For that reason, it is recommended that, the business firms must adopt and implement strict and unbreakable policies to protect the data and information of the organization (Engebretson, 2013). Moreover, the business firms should hire experts who can work for the protection of the organization. In addition, the chief of the firm should not provide important and secure passwords or keys to the members of the organization. The chief of the firm should give instructions to the employees that they should work to protect the confidentiality of the organization. They must take care that the situation of a n ethical dilemma should not be happen within the organization (Kahate, 2013). In this way, by focusing on the protection of the privacy of business firm, the business firms would be able to perform all the business activities in an ethical manner. References Dwell, M. (2013). Bioethics: Methods, Theories, Domains. NY: Routledge. Engebretson, P. (2013). The basics of hacking and penetration testing: ethical hacking and penetration testing made easy. USA: Elsevier. Ghosh, A. (2016). Android and iOS phones under threat as secret crypto keys can be stolen for Bitcoin Wallets and Apple Pay. Retrieved From: https://www.ibtimes.co.uk/android-ios-phones-under-threat-secret-crypto-keys-can-be-stolen-bitcoin-wallets-apple-pay-1547538 Hayden, E. C. (2014). Ethical dilemma for Ebola trials. Nature, 515(7526), 177-8. Kahate, A. (2013). Cryptography and network security. Australia: Tata McGraw-Hill Education. Kumar, M. (2016). How to Steal Secret Encryption Keys from Android and iOS SmartPhones. Retrieved From: https://thehackernews.com/2016/03/encryption-keys-android.html MacKinnon, B. and Fiala, A. (2014). Ethics: Theory and Contemporary Issues. USA: Cengage Learning. Shaw, W.H. (2016). Utilitarianism and the Ethics of War. NY: Routledge. Smith, J.D. (2008). Normative Theory and Business Ethics. Australia: Rowman Littlefield Publishers.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.