Science Journal of Business and Management

| Peer-Reviewed |

Ethics in the Age of Cyber Crime and Cyber War

Received: 30 November 2015    Accepted: 07 December 2015    Published: 03 September 2016
Views:       Downloads:

Share This Article

Abstract

We have been given new challenges by the “Information Age”. In the virtual world of cyber crime, cyber warfare and Big Brother, where the power of formal law is doubtful, where club law dominates, where we has had not enough time to develop well-established formal and informal rules yet, one of our greatest challenge is to form the new rules for the new world or, better to say, for ourselves. I have been collecting ICT related news for a long time. In this paper I provide a set of problematic fields and questions. These questions should be answered by ourselves, the sooner the better. It depends on us now whether we can form the new world of well-established rules, both written and unwritten, based on eternal human values – or the one in which human values will not play, a world without civilisation and culture. Now it is time to decide what kind of a basis the ethics of this new world will have, or whether it will have any ethics at all.

DOI 10.11648/j.sjbm.s.2016040101.15
Published in Science Journal of Business and Management (Volume 4, Issue 1-1, January 2016)

This article belongs to the Special Issue Ethical Challenges in the 21st Century

Page(s) 29-35
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Ethics, ICT Ethics, Computer Ethics, Cybernetics, Paradigm Shift

References
[1] Ball, J. (2013). Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 06. 09. 2013. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
[2] Ball, J. (2015). GCHQ captured emails of journalists from top international media. The Guardian, 19. 01. 2015., http://www.theguardian.com/uk-news/2015/jan/19/gchq-intercepted-emails-journalists-ny-times-bbc-guardian-le-monde-reuters-nbc-washington-post.
[3] Bodó, B. - Lakatos Z. (2010) Afilmek online feketepiacaés a moziforgalmazás [Online black market of movies and cinema distribution] In: Szociológiai Szemle 20(3): 34-75. Online (in Hungarian): http://www.szociologia.hu/dynamic/szocszemle_2010_3_all.pdf.
[4] Chertoff, M. – Simon, T. (2015).The Impact of the Dark Web on Internet Governance and Cyber Security. In: Global Commission on Internet Governance, paper series: No. 6., Feb. 2015. https://ourinternet-files.s3.amazonaws.com/publications/GCIG_Paper_No6.pdf.
[5] Crawford, A. (2014). Webcam sex with fake girl Sweetie leads to sentence. BBC News, 21.10.2014., http://www.bbc.com/news/technology-29688996.
[6] EFF (2012).Capitol v. Thomas.Electronic Frontier Foundation, 11. 09. 2012. https://www.eff.org/cases/capitol-v-thomas.
[7] European, C [ommission]. (2015). COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS – The European Agenda on Security. 28. 04. 2015. http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf.
[8] Facebook (2015).Data policy. 30. 01. 2015. https://www.facebook.com/privacy/explanation.
[9] Free Snowden – In Support of Edward Snowden, The Courage Foundation, https://www.freesnowden.is/.
[10] GReAT (2015). Equation: The Death Star of Malware Galaxy. Securelist – Kaspersky Lab, 16. 02. 2015. https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/.
[11] Haines, L. (2006). Google and Yahoo! take a beating. In: The Register, 16. 02. 2006. http://www.theregister.co.uk/Print/2006/02/16/china_committee/ and related materials.
[12] Hoven, J. - Weckert, J. (ed.) (2008). Information Technology and Moral Philosophy.Cambridge University Press, 2008.
[13] Kiss, G. (2011), A Comparison of Informatics Skills by schooltypes in the 9-10th grades in Hungary, in: International Journal of Advanced Research in Computer Science, Volume 2, No. 2, pp. 279-284.
[14] Kiss, G. (2012a), Measuring Computer Science Knowledge Level of Hungarian Students specialized in Informatics with Romanian Students attending a Science Course or a Mathematics-Informatics Course, in: TOJET: The Turkish Online Journal of Education Technology, Volume 11, Issue 4, pp. 222-235. Oct. 2012.
[15] Kiss, G. (2012b), Measuring Hungarian and Slovakian Students’ IT Skills and Programming Knowledge, in: Acta Polytechnica Hungarica, Volume 9., No. 6, 2012, ISSN: 1785-8860, pp. 195-210.
[16] Legeza, L. (2013). Mérnökietika [Engineers' ethics], 2nd ed., Budapest.
[17] Menn, J. (2013). Exclusive: Secret contract tied NSA and security industry pioneer. Reuters, Edition U. S., 20. 12. 2013. http://www.reuters.com/article/2013/12/21/us-usa-security-rsa-idUSBRE9BJ1C220131221.
[18] Moor, J. (1998). Reason, Relativity, and Responsibility in Computer Ethics. Computers and Society, March 1998
[19] Munson, L. (2014). Lavabit appeals contempt of court ruling surrounding handover of SSL keys. Naked Security, Award-winning security news from Sophos, 29. 01. 2014. http://nakedsecurity.sophos.com/2014/01/29/lavabit-appeals-contempt-of-court-ruling-surrounding-handover-of-ssl-keys/.
[20] Munson, L. (2015/A). Apple, Google and others urge Obama to say no to backdoors. Naked Security, Award-winning security news from Sophos, 20. 05. 2015. https://nakedsecurity.sophos.com/2015/05/20/apple-google-and-others-urge-obama-to-say-no-to-backdoors/.
[21] Munson, L. (2015/B). Facebook's Deep Face facial recognition technology has human-like accuracy. Naked Security, Award-winning security news from Sophos, 06. 02. 2015. https://nakedsecurity.sophos.com/2015/02/06/facebooks-deepface-facial-recognition-technology-has-human-like-accuracy.
[22] Oberholzer-Gee, F. – Strumpf, K. (2009).File-Sharing and Copyright. NBER's Innovation Policy and the Economy series, volume 10. ed. Joshua Lerner and Scott Stern. MIT Press. 2009. Online: http://www.unc.edu/~cigar/papers/File-Sharing_and_Copyright_2009-05-16.pdf.
[23] Omand, D. (2013). Ethics and Intelligence: A Debate. In: International Journal of Intelligence and Counter Intelligence, Volume 26, Issue 1, 2013 p/pp. 38-63.
[24] Ragan, S. (2015). Hacking Team hacked, attackers claim 400GB in dumped data. CSO Online, 05. 07. 2015. http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html.
[25] Sanger, D.E. (2014).N. S. A. Devises Radio Pathway In to Computers. The New York Times [online], 2014. 01. 14. http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html.
[26] Scahill, J. – Begley, J. (2015). The Great SIM Heist – How Spies Stole the Keys to the Encription Castle. The Intercept, 19.02. 2015. https://firstlook.org/theintercept/2015/02/19/great-sim-heist/.
[27] Stockley, M. (2015). The Dark Web: anarchy, law, freedom and anonymity. Naked Security, Award-winning security news from Sophos, 20. 02. 2015. https://nakedsecurity.sophos.com/2015/02/20/the-dark-web-anarchy-law-freedom-and-anonymity.
[28] The Local (2015). Vandals attack German Facebook headquarters. The Local – Germany's News in English, 13.12.2015. http://www.thelocal.de/20151213/vandals-attack-german-facebook-hq-with-rocks-and-paint
[29] Vaas, L. (2014). Microsoft deluged with support in its email privacy battle against US government. Naked Security, Award-winning security news from Sophos, 17. 12. 2014. https://nakedsecurity.sophos.com/2014/12/17/microsoft-deluged-with-support-in-its-email-privacy-battle-against-us-government/.
[30] Vaas, L. (2015). School rule-breakers to hand over Facebook and Twitter passwords.Naked Security, Award-winning security news from Sophos, 17. 12. 2014. https://nakedsecurity.sophos.com/2015/01/23/school-rule-breakers-to-hand-over-facebook-and-twitter-passwords.
[31] Vaas, L. 2015/B). David Cameron wants to ban encrypted apps like iMessage and Whats app. Naked Security, Award-winning security news from Sophos, 14. 01. 2015. https://nakedsecurity.sophos.com/2015/01/14/david-cameron-wants-to-ban-encrypted-apps-like-imessage-and-whatsapp/.
[32] Whats App (2012). Terms of Service – In the Event of Merger, Sale, or Bankruptcy.07.07.2012. http://www.whatsapp.com/legal/.
Author Information
  • Keleti Faculty of Business and Management, óbuda University, Budapest, Hungary

Cite This Article
  • APA Style

    András Keszthelyi. (2016). Ethics in the Age of Cyber Crime and Cyber War. Science Journal of Business and Management, 4(1-1), 29-35. https://doi.org/10.11648/j.sjbm.s.2016040101.15

    Copy | Download

    ACS Style

    András Keszthelyi. Ethics in the Age of Cyber Crime and Cyber War. Sci. J. Bus. Manag. 2016, 4(1-1), 29-35. doi: 10.11648/j.sjbm.s.2016040101.15

    Copy | Download

    AMA Style

    András Keszthelyi. Ethics in the Age of Cyber Crime and Cyber War. Sci J Bus Manag. 2016;4(1-1):29-35. doi: 10.11648/j.sjbm.s.2016040101.15

    Copy | Download

  • @article{10.11648/j.sjbm.s.2016040101.15,
      author = {András Keszthelyi},
      title = {Ethics in the Age of Cyber Crime and Cyber War},
      journal = {Science Journal of Business and Management},
      volume = {4},
      number = {1-1},
      pages = {29-35},
      doi = {10.11648/j.sjbm.s.2016040101.15},
      url = {https://doi.org/10.11648/j.sjbm.s.2016040101.15},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.sjbm.s.2016040101.15},
      abstract = {We have been given new challenges by the “Information Age”. In the virtual world of cyber crime, cyber warfare and Big Brother, where the power of formal law is doubtful, where club law dominates, where we has had not enough time to develop well-established formal and informal rules yet, one of our greatest challenge is to form the new rules for the new world or, better to say, for ourselves. I have been collecting ICT related news for a long time. In this paper I provide a set of problematic fields and questions. These questions should be answered by ourselves, the sooner the better. It depends on us now whether we can form the new world of well-established rules, both written and unwritten, based on eternal human values – or the one in which human values will not play, a world without civilisation and culture. Now it is time to decide what kind of a basis the ethics of this new world will have, or whether it will have any ethics at all.},
     year = {2016}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Ethics in the Age of Cyber Crime and Cyber War
    AU  - András Keszthelyi
    Y1  - 2016/09/03
    PY  - 2016
    N1  - https://doi.org/10.11648/j.sjbm.s.2016040101.15
    DO  - 10.11648/j.sjbm.s.2016040101.15
    T2  - Science Journal of Business and Management
    JF  - Science Journal of Business and Management
    JO  - Science Journal of Business and Management
    SP  - 29
    EP  - 35
    PB  - Science Publishing Group
    SN  - 2331-0634
    UR  - https://doi.org/10.11648/j.sjbm.s.2016040101.15
    AB  - We have been given new challenges by the “Information Age”. In the virtual world of cyber crime, cyber warfare and Big Brother, where the power of formal law is doubtful, where club law dominates, where we has had not enough time to develop well-established formal and informal rules yet, one of our greatest challenge is to form the new rules for the new world or, better to say, for ourselves. I have been collecting ICT related news for a long time. In this paper I provide a set of problematic fields and questions. These questions should be answered by ourselves, the sooner the better. It depends on us now whether we can form the new world of well-established rules, both written and unwritten, based on eternal human values – or the one in which human values will not play, a world without civilisation and culture. Now it is time to decide what kind of a basis the ethics of this new world will have, or whether it will have any ethics at all.
    VL  - 4
    IS  - 1-1
    ER  - 

    Copy | Download

  • Sections