Ethics in the Age of Cyber Crime and Cyber War
Science Journal of Business and Management
Volume 4, Issue 1-1, January 2016, Pages: 29-35
Received: Nov. 30, 2015; Accepted: Dec. 7, 2015; Published: Sep. 3, 2016
Views 2948      Downloads 45
Author
András Keszthelyi, Keleti Faculty of Business and Management, Óbuda University, Budapest, Hungary
Article Tools
Follow on us
Abstract
We have been given new challenges by the “Information Age”. In the virtual world of cyber crime, cyber warfare and Big Brother, where the power of formal law is doubtful, where club law dominates, where we has had not enough time to develop well-established formal and informal rules yet, one of our greatest challenge is to form the new rules for the new world or, better to say, for ourselves. I have been collecting ICT related news for a long time. In this paper I provide a set of problematic fields and questions. These questions should be answered by ourselves, the sooner the better. It depends on us now whether we can form the new world of well-established rules, both written and unwritten, based on eternal human values – or the one in which human values will not play, a world without civilisation and culture. Now it is time to decide what kind of a basis the ethics of this new world will have, or whether it will have any ethics at all.
Keywords
Ethics, ICT Ethics, Computer Ethics, Cybernetics, Paradigm Shift
To cite this article
András Keszthelyi, Ethics in the Age of Cyber Crime and Cyber War, Science Journal of Business and Management. Special Issue:Ethical Challenges in the 21st Century. Vol. 4, No. 1-1, 2016, pp. 29-35. doi: 10.11648/j.sjbm.s.2016040101.15
Copyright
Copyright © 2016 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
Ball, J. (2013). Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 06. 09. 2013. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
[2]
Ball, J. (2015). GCHQ captured emails of journalists from top international media. The Guardian, 19. 01. 2015., http://www.theguardian.com/uk-news/2015/jan/19/gchq-intercepted-emails-journalists-ny-times-bbc-guardian-le-monde-reuters-nbc-washington-post.
[3]
Bodó, B. - Lakatos Z. (2010) Afilmek online feketepiacaés a moziforgalmazás [Online black market of movies and cinema distribution] In: Szociológiai Szemle 20(3): 34-75. Online (in Hungarian): http://www.szociologia.hu/dynamic/szocszemle_2010_3_all.pdf.
[4]
Chertoff, M. – Simon, T. (2015).The Impact of the Dark Web on Internet Governance and Cyber Security. In: Global Commission on Internet Governance, paper series: No. 6., Feb. 2015. https://ourinternet-files.s3.amazonaws.com/publications/GCIG_Paper_No6.pdf.
[5]
Crawford, A. (2014). Webcam sex with fake girl Sweetie leads to sentence. BBC News, 21.10.2014., http://www.bbc.com/news/technology-29688996.
[6]
EFF (2012).Capitol v. Thomas.Electronic Frontier Foundation, 11. 09. 2012. https://www.eff.org/cases/capitol-v-thomas.
[7]
European, C [ommission]. (2015). COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS – The European Agenda on Security. 28. 04. 2015. http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf.
[8]
Facebook (2015).Data policy. 30. 01. 2015. https://www.facebook.com/privacy/explanation.
[9]
Free Snowden – In Support of Edward Snowden, The Courage Foundation, https://www.freesnowden.is/.
[10]
GReAT (2015). Equation: The Death Star of Malware Galaxy. Securelist – Kaspersky Lab, 16. 02. 2015. https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/.
[11]
Haines, L. (2006). Google and Yahoo! take a beating. In: The Register, 16. 02. 2006. http://www.theregister.co.uk/Print/2006/02/16/china_committee/ and related materials.
[12]
Hoven, J. - Weckert, J. (ed.) (2008). Information Technology and Moral Philosophy.Cambridge University Press, 2008.
[13]
Kiss, G. (2011), A Comparison of Informatics Skills by schooltypes in the 9-10th grades in Hungary, in: International Journal of Advanced Research in Computer Science, Volume 2, No. 2, pp. 279-284.
[14]
Kiss, G. (2012a), Measuring Computer Science Knowledge Level of Hungarian Students specialized in Informatics with Romanian Students attending a Science Course or a Mathematics-Informatics Course, in: TOJET: The Turkish Online Journal of Education Technology, Volume 11, Issue 4, pp. 222-235. Oct. 2012.
[15]
Kiss, G. (2012b), Measuring Hungarian and Slovakian Students’ IT Skills and Programming Knowledge, in: Acta Polytechnica Hungarica, Volume 9., No. 6, 2012, ISSN: 1785-8860, pp. 195-210.
[16]
Legeza, L. (2013). Mérnökietika [Engineers' ethics], 2nd ed., Budapest.
[17]
Menn, J. (2013). Exclusive: Secret contract tied NSA and security industry pioneer. Reuters, Edition U. S., 20. 12. 2013. http://www.reuters.com/article/2013/12/21/us-usa-security-rsa-idUSBRE9BJ1C220131221.
[18]
Moor, J. (1998). Reason, Relativity, and Responsibility in Computer Ethics. Computers and Society, March 1998
[19]
Munson, L. (2014). Lavabit appeals contempt of court ruling surrounding handover of SSL keys. Naked Security, Award-winning security news from Sophos, 29. 01. 2014. http://nakedsecurity.sophos.com/2014/01/29/lavabit-appeals-contempt-of-court-ruling-surrounding-handover-of-ssl-keys/.
[20]
Munson, L. (2015/A). Apple, Google and others urge Obama to say no to backdoors. Naked Security, Award-winning security news from Sophos, 20. 05. 2015. https://nakedsecurity.sophos.com/2015/05/20/apple-google-and-others-urge-obama-to-say-no-to-backdoors/.
[21]
Munson, L. (2015/B). Facebook's Deep Face facial recognition technology has human-like accuracy. Naked Security, Award-winning security news from Sophos, 06. 02. 2015. https://nakedsecurity.sophos.com/2015/02/06/facebooks-deepface-facial-recognition-technology-has-human-like-accuracy.
[22]
Oberholzer-Gee, F. – Strumpf, K. (2009).File-Sharing and Copyright. NBER's Innovation Policy and the Economy series, volume 10. ed. Joshua Lerner and Scott Stern. MIT Press. 2009. Online: http://www.unc.edu/~cigar/papers/File-Sharing_and_Copyright_2009-05-16.pdf.
[23]
Omand, D. (2013). Ethics and Intelligence: A Debate. In: International Journal of Intelligence and Counter Intelligence, Volume 26, Issue 1, 2013 p/pp. 38-63.
[24]
Ragan, S. (2015). Hacking Team hacked, attackers claim 400GB in dumped data. CSO Online, 05. 07. 2015. http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html.
[25]
Sanger, D.E. (2014).N. S. A. Devises Radio Pathway In to Computers. The New York Times [online], 2014. 01. 14. http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html.
[26]
Scahill, J. – Begley, J. (2015). The Great SIM Heist – How Spies Stole the Keys to the Encription Castle. The Intercept, 19.02. 2015. https://firstlook.org/theintercept/2015/02/19/great-sim-heist/.
[27]
Stockley, M. (2015). The Dark Web: anarchy, law, freedom and anonymity. Naked Security, Award-winning security news from Sophos, 20. 02. 2015. https://nakedsecurity.sophos.com/2015/02/20/the-dark-web-anarchy-law-freedom-and-anonymity.
[28]
The Local (2015). Vandals attack German Facebook headquarters. The Local – Germany's News in English, 13.12.2015. http://www.thelocal.de/20151213/vandals-attack-german-facebook-hq-with-rocks-and-paint
[29]
Vaas, L. (2014). Microsoft deluged with support in its email privacy battle against US government. Naked Security, Award-winning security news from Sophos, 17. 12. 2014. https://nakedsecurity.sophos.com/2014/12/17/microsoft-deluged-with-support-in-its-email-privacy-battle-against-us-government/.
[30]
Vaas, L. (2015). School rule-breakers to hand over Facebook and Twitter passwords.Naked Security, Award-winning security news from Sophos, 17. 12. 2014. https://nakedsecurity.sophos.com/2015/01/23/school-rule-breakers-to-hand-over-facebook-and-twitter-passwords.
[31]
Vaas, L. 2015/B). David Cameron wants to ban encrypted apps like iMessage and Whats app. Naked Security, Award-winning security news from Sophos, 14. 01. 2015. https://nakedsecurity.sophos.com/2015/01/14/david-cameron-wants-to-ban-encrypted-apps-like-imessage-and-whatsapp/.
[32]
Whats App (2012). Terms of Service – In the Event of Merger, Sale, or Bankruptcy.07.07.2012. http://www.whatsapp.com/legal/.
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186