We have been given new challenges by the “Information Age”. In the virtual world of cyber crime, cyber warfare and Big Brother, where the power of formal law is doubtful, where club law dominates, where we has had not enough time to develop well-established formal and informal rules yet, one of our greatest challenge is to form the new rules for the new world or, better to say, for ourselves. I have been collecting ICT related news for a long time. In this paper I provide a set of problematic fields and questions. These questions should be answered by ourselves, the sooner the better. It depends on us now whether we can form the new world of well-established rules, both written and unwritten, based on eternal human values – or the one in which human values will not play, a world without civilisation and culture. Now it is time to decide what kind of a basis the ethics of this new world will have, or whether it will have any ethics at all.
Ethics in the Age of Cyber Crime and Cyber War, Science Journal of Business and Management. Special Issue:Ethical Challenges in the 21st Century.
Vol. 4, No. 1-1,
2016, pp. 29-35.
Ball, J. (2013). Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 06. 09. 2013. http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security.
Ball, J. (2015). GCHQ captured emails of journalists from top international media. The Guardian, 19. 01. 2015., http://www.theguardian.com/uk-news/2015/jan/19/gchq-intercepted-emails-journalists-ny-times-bbc-guardian-le-monde-reuters-nbc-washington-post.
Bodó, B. - Lakatos Z. (2010) Afilmek online feketepiacaés a moziforgalmazás [Online black market of movies and cinema distribution] In: Szociológiai Szemle 20(3): 34-75. Online (in Hungarian): http://www.szociologia.hu/dynamic/szocszemle_2010_3_all.pdf.
Chertoff, M. – Simon, T. (2015).The Impact of the Dark Web on Internet Governance and Cyber Security. In: Global Commission on Internet Governance, paper series: No. 6., Feb. 2015. https://ourinternet-files.s3.amazonaws.com/publications/GCIG_Paper_No6.pdf.
Crawford, A. (2014). Webcam sex with fake girl Sweetie leads to sentence. BBC News, 21.10.2014., http://www.bbc.com/news/technology-29688996.
EFF (2012).Capitol v. Thomas.Electronic Frontier Foundation, 11. 09. 2012. https://www.eff.org/cases/capitol-v-thomas.
European, C [ommission]. (2015). COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS – The European Agenda on Security. 28. 04. 2015. http://ec.europa.eu/dgs/home-affairs/e-library/documents/basic-documents/docs/eu_agenda_on_security_en.pdf.
Facebook (2015).Data policy. 30. 01. 2015. https://www.facebook.com/privacy/explanation.
Free Snowden – In Support of Edward Snowden, The Courage Foundation, https://www.freesnowden.is/.
GReAT (2015). Equation: The Death Star of Malware Galaxy. Securelist – Kaspersky Lab, 16. 02. 2015. https://securelist.com/blog/research/68750/equation-the-death-star-of-malware-galaxy/.
Haines, L. (2006). Google and Yahoo! take a beating. In: The Register, 16. 02. 2006. http://www.theregister.co.uk/Print/2006/02/16/china_committee/ and related materials.
Hoven, J. - Weckert, J. (ed.) (2008). Information Technology and Moral Philosophy.Cambridge University Press, 2008.
Kiss, G. (2011), A Comparison of Informatics Skills by schooltypes in the 9-10th grades in Hungary, in: International Journal of Advanced Research in Computer Science, Volume 2, No. 2, pp. 279-284.
Kiss, G. (2012a), Measuring Computer Science Knowledge Level of Hungarian Students specialized in Informatics with Romanian Students attending a Science Course or a Mathematics-Informatics Course, in: TOJET: The Turkish Online Journal of Education Technology, Volume 11, Issue 4, pp. 222-235. Oct. 2012.
Kiss, G. (2012b), Measuring Hungarian and Slovakian Students’ IT Skills and Programming Knowledge, in: Acta Polytechnica Hungarica, Volume 9., No. 6, 2012, ISSN: 1785-8860, pp. 195-210.
Legeza, L. (2013). Mérnökietika [Engineers' ethics], 2nd ed., Budapest.
Menn, J. (2013). Exclusive: Secret contract tied NSA and security industry pioneer. Reuters, Edition U. S., 20. 12. 2013. http://www.reuters.com/article/2013/12/21/us-usa-security-rsa-idUSBRE9BJ1C220131221.
Moor, J. (1998). Reason, Relativity, and Responsibility in Computer Ethics. Computers and Society, March 1998
Munson, L. (2014). Lavabit appeals contempt of court ruling surrounding handover of SSL keys. Naked Security, Award-winning security news from Sophos, 29. 01. 2014. http://nakedsecurity.sophos.com/2014/01/29/lavabit-appeals-contempt-of-court-ruling-surrounding-handover-of-ssl-keys/.
Munson, L. (2015/A). Apple, Google and others urge Obama to say no to backdoors. Naked Security, Award-winning security news from Sophos, 20. 05. 2015. https://nakedsecurity.sophos.com/2015/05/20/apple-google-and-others-urge-obama-to-say-no-to-backdoors/.
Munson, L. (2015/B). Facebook's Deep Face facial recognition technology has human-like accuracy. Naked Security, Award-winning security news from Sophos, 06. 02. 2015. https://nakedsecurity.sophos.com/2015/02/06/facebooks-deepface-facial-recognition-technology-has-human-like-accuracy.
Oberholzer-Gee, F. – Strumpf, K. (2009).File-Sharing and Copyright. NBER's Innovation Policy and the Economy series, volume 10. ed. Joshua Lerner and Scott Stern. MIT Press. 2009. Online: http://www.unc.edu/~cigar/papers/File-Sharing_and_Copyright_2009-05-16.pdf.
Omand, D. (2013). Ethics and Intelligence: A Debate. In: International Journal of Intelligence and Counter Intelligence, Volume 26, Issue 1, 2013 p/pp. 38-63.
Ragan, S. (2015). Hacking Team hacked, attackers claim 400GB in dumped data. CSO Online, 05. 07. 2015. http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html.
Sanger, D.E. (2014).N. S. A. Devises Radio Pathway In to Computers. The New York Times [online], 2014. 01. 14. http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html.
Scahill, J. – Begley, J. (2015). The Great SIM Heist – How Spies Stole the Keys to the Encription Castle. The Intercept, 19.02. 2015. https://firstlook.org/theintercept/2015/02/19/great-sim-heist/.
Stockley, M. (2015). The Dark Web: anarchy, law, freedom and anonymity. Naked Security, Award-winning security news from Sophos, 20. 02. 2015. https://nakedsecurity.sophos.com/2015/02/20/the-dark-web-anarchy-law-freedom-and-anonymity.
The Local (2015). Vandals attack German Facebook headquarters. The Local – Germany's News in English, 13.12.2015. http://www.thelocal.de/20151213/vandals-attack-german-facebook-hq-with-rocks-and-paint
Vaas, L. (2014). Microsoft deluged with support in its email privacy battle against US government. Naked Security, Award-winning security news from Sophos, 17. 12. 2014. https://nakedsecurity.sophos.com/2014/12/17/microsoft-deluged-with-support-in-its-email-privacy-battle-against-us-government/.
Vaas, L. (2015). School rule-breakers to hand over Facebook and Twitter passwords.Naked Security, Award-winning security news from Sophos, 17. 12. 2014. https://nakedsecurity.sophos.com/2015/01/23/school-rule-breakers-to-hand-over-facebook-and-twitter-passwords.
Vaas, L. 2015/B). David Cameron wants to ban encrypted apps like iMessage and Whats app. Naked Security, Award-winning security news from Sophos, 14. 01. 2015. https://nakedsecurity.sophos.com/2015/01/14/david-cameron-wants-to-ban-encrypted-apps-like-imessage-and-whatsapp/.
Whats App (2012). Terms of Service – In the Event of Merger, Sale, or Bankruptcy.07.07.2012. http://www.whatsapp.com/legal/.