SlideShare a Scribd company logo
A week is a long time in
computer ethics
Prof. Simon Rogerson
Originally published as ETHIcol in the IMIS Journal Volume 14
No 2 (April 2004)
It seems the more sophisticated we become in developing and using technology the
greater the risk that it will be used in a detrimental way against individuals, organisations
or society at large. We seem to be constantly grappling with new concepts that
simultaneously pose new opportunities and new problems, or rushing to pass through
new legislation to counter some new threat or redefining societal norms for our shrinking
technologically-dependant world. Is this paranoia or reality? Consider the evidence.
Several major online news services were sampled for the week commencing 15 March
2004 to identify the current challenges that we face from technology. The findings were
concerning.
Over 30 news items covered a range of problems and focused on three perspectives:
occurring incidents, technological countermeasures and legislation. The news items fall
into several broad categories.
Globalisation.
A number of articles addressed various aspects of globalisation. Controversy over
offshore call centres and technology development in India was reported in one article.
Those for and against such moves sadly seem to align with the political stances of the
developed and developing world. In a range of articles about viruses, information access
and intellectual property theft the underlying message was the extent and speed of
impact due to the global nature of new technologies.
Intellectual Property.
This continues to be a hot topic. During the week Microsoft was reported as continuing
aggressively to protect its trademarks across the world. Meanwhile the European
Parliament passed a draft directive on enforcing intellectual property rights. It was
reported that, "Campaigners still believe the move will damage activities such as the
development of open source software." There were several reports on content theft.
There was a spate of content theft from websites central to the activities of several
companies and individuals. Peer-to Peer (P2P) file-sharing appeared in a number of
reports. UK firms were shown to be lacking in recognising their professional obligations
to society by allowing widespread illegal P2P. Parental obligation was under scrutiny in
an article which revealed many parents were either ignorant that swapping copyrighted
1
A week is a long time in computer ethics
files was illegal, or knew it was illegal but did nothing about it, or did it themselves
having learnt from their children. In the entertainment world a movie piracy ring had
been discovered through a server containing many pirate motion pictures. Finally, the
music industry continues to worry about P2P and the fact it cannot control the Internet.
Identity Theft.
The growing problem of identity theft seems to be of little concern of many people. For
example it was reported that one in five Britons were willing to give financial details to
unsolicited contacts and were not bothered when £500 was taken from their accounts
fraudulently.
Viruses and Hacking.
Computer viruses and malware are the scourge of the modern global society. During the
week there were several reports on the variants of Bagle and other viruses such as
MyDoom and Netsky The Trojan horse Phatbot was wreaking havoc as computers
continued to be connected to a P2P network of infected machines.
There was growing pressure to address Bluetooth security problems in mobile phones
which allowed hacking into the personal data held on mobile phones. But phone
manufacturers view the problem as relatively minor. Symantec’s biannual Internet
Security report confirmed growing severity of hacking incidents. One article reported
that work had started on threat and vulnerability tests to ensure that the National Identity
Register database, which will form the basis of the UK’s controversial ID card scheme, is
secure from hacker attacks.
Countermeasures were the subject of several articles. A new antivirus chip was reported
in one, another announced that, "A public inquiry has been launched into the Computer
Misuse Act (CMA), which could spell the end for current loopholes in the law", whilst
one article Recognising that hacking cannot be prevented extolled the virtues of taking
out adequate insurance cover.
Junk Mail and Spamming.
China was reported as the second largest target for spam with one third of all emails
being junk mail. Generally the deluge of junk mail has led to frenetic anti-spam software
development. The latest types were reported as using complex Bayesian techniques to
weed out spam from legitimate mail.
Information Access and Denial.
It was reported that China had closed two Internet sites used by many thousands of
people because they carried content deemed to be objectionable by the State. A second
report explained that TeliaSonera in Sweden had closed down a web site of the Islamic
2
A week is a long time in computer ethics
group Hamas because it violated the acceptable use policy. By contrast one article
focussed on content filters to restrict access to information for school children to combat
such things as plagiarism. Legitimacy of information services was the subject of a
contrasting article on fake escrow sites. These spoof sites are used to dupe consumers.
Surveillance.
Warnings were given about the need to be sensitive to employees’ needs when
implementing and operating surveillance systems. A new software tool to detect
paedophiles in Internet chatrooms was unveiled. One article gave warnings about how
every day accessories such as mobiles phones were increasingly used for surveillance
and that such intelligence gathering was commonly shared and condoned.
Health.
Our physical health can be at risk from technology. It was reported that those using
multiple workstations were at greater risk of developing RSI-type injuries.
Conclusion.
In one week the news has carried many disturbing stories about information and
communication technology. Each issue has a flip side such as these.
Freedom of expression Censorship by the state
Global reach Local impact
Prevention of computer misuse Cure from outcomes of computer misuse
Individual ownership Community share
Information Junk
Surveillance Freedom
We need to have the ability, tools and confidence to address such issues. A week may be
a long time in computer ethics but if we do not address such issues the consequences will
resonate for lifetimes.
News services accessed as part of the research for this article.
Financial Times - (
 ¢¡£¡¥¤§¦©¨£¨!¥¡$#¥%'(¨)¡00#' £(%¢1£%)2¢3
)
Guardian Unlimited Online - (
 ¢¡£¡¥¤§¦©¨£¨4£¢5!267¥8£9@)7)§$#¥%AB6DCE¨£%4(1D@FE0¨
)
Silcon.com - (
 ¢¡£¡¥¤§¦©¨£¨4£¢5$¢@10@¥#¥%G#¥%'
)
Tech - Reuters - (
 D¡£¡¥¤¦©¨¢¨4££5H8D)6¢¡0¥8E$#¥%
)
VNUNET - (
 D¡£¡¥¤¦©¨¢¨4££5!I¥£6£¡5$#¥%'
)
3
A week is a long time in computer ethics
ZDNET - (
 ¢¡£¡¥¤§¦©¨£¨!P£9¥Q¡5$#£%AB6¢C
)
Please send your views on ethical and social responsibility issues and cases of ethical
dilemmas to:
Professor Simon Rogerson
Director
Centre for Computing and Social Responsibility
Faculty of Computing Sciences and Engineering
De Montfort University
The Gateway
Leicester
LE1 9BH
Tel:(+44) 116 257 7475
Fax:(+44) 116 207 8159
Email:srog@dmu.ac.uk
Home Page: (
 ¢¡£¡¥¤¦$¨£¨4££$#£#£485$#£QRH9Q¢6S7E#B6¢C
)
4

More Related Content

What's hot

Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésGim Andrade Vidal
 
Getting out of the fast lane
Getting out of the fast laneGetting out of the fast lane
Getting out of the fast laneAngelo Lerro
 
Navigating the New Health Care Delivery System
Navigating the New Health Care Delivery SystemNavigating the New Health Care Delivery System
Navigating the New Health Care Delivery System
Pew Research Center's Internet & American Life Project
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
Charles Mok
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
Joel D'souza
 
Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019
Chris Marsden
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...FecomercioSP
 
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
The International Journal of Business Management and Technology
 
Cyberspace
CyberspaceCyberspace
Cyberspace
SarpongGodfred
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
Krishna De
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is Good
Nicole Black
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
Lillian Ekwosi-Egbulem
 
State of the Internet 2009: Pew Internet Project Findings and Implications fo...
State of the Internet 2009: Pew Internet Project Findings and Implications fo...State of the Internet 2009: Pew Internet Project Findings and Implications fo...
State of the Internet 2009: Pew Internet Project Findings and Implications fo...
Pew Research Center's Internet & American Life Project
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
Pew Research Center's Internet & American Life Project
 
Coming up next in technology...
Coming up next in technology...Coming up next in technology...
Coming up next in technology...Shiv Krishnan
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
IOSR Journals
 
As japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a rideAs japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a rideUltraUploader
 

What's hot (20)

Delincuencia Cibernética- Inglés
Delincuencia Cibernética- InglésDelincuencia Cibernética- Inglés
Delincuencia Cibernética- Inglés
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 
Getting out of the fast lane
Getting out of the fast laneGetting out of the fast lane
Getting out of the fast lane
 
Navigating the New Health Care Delivery System
Navigating the New Health Care Delivery SystemNavigating the New Health Care Delivery System
Navigating the New Health Care Delivery System
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.Should Government Control Internet and Its Content.
Should Government Control Internet and Its Content.
 
Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019
 
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
Ii congresso de crimes eletrônicos e formas de proteção – 27 09-2010 – aprese...
 
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
UK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child ProtectionUK Independent Parliamentary Report Into Online Child Protection
UK Independent Parliamentary Report Into Online Child Protection
 
Legal Technology: Change is Good
Legal Technology: Change is GoodLegal Technology: Change is Good
Legal Technology: Change is Good
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
State of the Internet 2009: Pew Internet Project Findings and Implications fo...
State of the Internet 2009: Pew Internet Project Findings and Implications fo...State of the Internet 2009: Pew Internet Project Findings and Implications fo...
State of the Internet 2009: Pew Internet Project Findings and Implications fo...
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
Coming up next in technology...
Coming up next in technology...Coming up next in technology...
Coming up next in technology...
 
Mobile computing application risks in Zimbabwe
Mobile computing application risks in ZimbabweMobile computing application risks in Zimbabwe
Mobile computing application risks in Zimbabwe
 
As japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a rideAs japanese bring work home, virus hitches a ride
As japanese bring work home, virus hitches a ride
 

Viewers also liked

Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013Dave Eilken
 
Accurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilegeAccurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilegeUltraUploader
 
How an Attack by a Cyber-espionage Operator Bypassed Security Controls
How an Attack by a Cyber-espionage Operator Bypassed Security ControlsHow an Attack by a Cyber-espionage Operator Bypassed Security Controls
How an Attack by a Cyber-espionage Operator Bypassed Security ControlsVenafi
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
INSIGHT FORENSIC
 
Transparency kills the privacy (issues)
Transparency kills the privacy (issues)Transparency kills the privacy (issues)
Transparency kills the privacy (issues)Rob Heyman
 
Exploring Kyozou
Exploring KyozouExploring Kyozou
Exploring Kyozou
Kyozou Inc.
 
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Open Analytics
 
Unisa 2010
Unisa 2010Unisa 2010
Unisa 2010
Jenny Reid
 
01 overview of_industrial_automation_sp15
01 overview of_industrial_automation_sp1501 overview of_industrial_automation_sp15
01 overview of_industrial_automation_sp15
John Todora
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
kschermerhorn
 
Security Onion
Security OnionSecurity Onion
Schedule 11
Schedule 11Schedule 11
Targeting Your Users (Identifying Library Stakeholders)
Targeting Your Users (Identifying Library Stakeholders)Targeting Your Users (Identifying Library Stakeholders)
Targeting Your Users (Identifying Library Stakeholders)
LIBER Europe
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
Mike Spaulding
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
G3 intelligence Ltd
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
vishalgohel12195
 
Anti forensic
Anti forensicAnti forensic
Anti forensicMilap Oza
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
Andrew Sharpe
 

Viewers also liked (20)

Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013Cyber Intelligence Vision Information Sheet 20Nov2013
Cyber Intelligence Vision Information Sheet 20Nov2013
 
Accurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilegeAccurately detecting source code of attacks that increase privilege
Accurately detecting source code of attacks that increase privilege
 
How an Attack by a Cyber-espionage Operator Bypassed Security Controls
How an Attack by a Cyber-espionage Operator Bypassed Security ControlsHow an Attack by a Cyber-espionage Operator Bypassed Security Controls
How an Attack by a Cyber-espionage Operator Bypassed Security Controls
 
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)(120715) #fitalk   the era of cyber sabotage and warfare (case study - stuxnet)
(120715) #fitalk the era of cyber sabotage and warfare (case study - stuxnet)
 
Transparency kills the privacy (issues)
Transparency kills the privacy (issues)Transparency kills the privacy (issues)
Transparency kills the privacy (issues)
 
Exploring Kyozou
Exploring KyozouExploring Kyozou
Exploring Kyozou
 
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
 
Unisa 2010
Unisa 2010Unisa 2010
Unisa 2010
 
01 overview of_industrial_automation_sp15
01 overview of_industrial_automation_sp1501 overview of_industrial_automation_sp15
01 overview of_industrial_automation_sp15
 
Cyberbullying Class
Cyberbullying ClassCyberbullying Class
Cyberbullying Class
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Schedule 11
Schedule 11Schedule 11
Schedule 11
 
Web spoofing (1)
Web spoofing (1)Web spoofing (1)
Web spoofing (1)
 
Targeting Your Users (Identifying Library Stakeholders)
Targeting Your Users (Identifying Library Stakeholders)Targeting Your Users (Identifying Library Stakeholders)
Targeting Your Users (Identifying Library Stakeholders)
 
Windows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti ForensicsWindows 8 Forensics & Anti Forensics
Windows 8 Forensics & Anti Forensics
 
Cyber intelligence for corporate security
Cyber intelligence for corporate securityCyber intelligence for corporate security
Cyber intelligence for corporate security
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Anti forensic
Anti forensicAnti forensic
Anti forensic
 
Presentation1
Presentation1Presentation1
Presentation1
 
Data Protection (Download for slideshow)
Data Protection (Download for slideshow)Data Protection (Download for slideshow)
Data Protection (Download for slideshow)
 

Similar to A week is a long time in computer ethics

Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
jeanettehully
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
Debabrata Samanta
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
Write My Statistics Paper Vestal
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
ericbrooks84875
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
debishakespeare
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ronnasleightholm
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
Amir Khan
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
briancrawford30935
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
YogeshIJTSRD
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 

Similar to A week is a long time in computer ethics (16)

Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1          .docxRunning Head THE CHANGING NATURE OF CYBER CRIME 1          .docx
Running Head THE CHANGING NATURE OF CYBER CRIME 1 .docx
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime modified
Cyber crime modifiedCyber crime modified
Cyber crime modified
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docxESSENTIALS OF Management Information Systems 12eKENNETH C..docx
ESSENTIALS OF Management Information Systems 12eKENNETH C..docx
 
ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.ESSENTIALS OF Management Information Systems 12eKENNETH C.
ESSENTIALS OF Management Information Systems 12eKENNETH C.
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docxPROTECTING THE NATION’S CYBER SYSTEMS    9WHAT ARE THE .docx
PROTECTING THE NATION’S CYBER SYSTEMS 9WHAT ARE THE .docx
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 

More from UltraUploader

01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hackingUltraUploader
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)UltraUploader
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manualUltraUploader
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...UltraUploader
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manualeUltraUploader
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)UltraUploader
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)UltraUploader
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoriaUltraUploader
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorUltraUploader
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applicationsUltraUploader
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worriesUltraUploader
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...UltraUploader
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyUltraUploader
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesUltraUploader
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer virusesUltraUploader
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virologyUltraUploader
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksUltraUploader
 

More from UltraUploader (20)

1 (1)
1 (1)1 (1)
1 (1)
 
01 intro
01 intro01 intro
01 intro
 
01 le 10 regole dell'hacking
01   le 10 regole dell'hacking01   le 10 regole dell'hacking
01 le 10 regole dell'hacking
 
00 the big guide sz (by dr.to-d)
00   the big guide sz (by dr.to-d)00   the big guide sz (by dr.to-d)
00 the big guide sz (by dr.to-d)
 
[E book ita] php manual
[E book   ita] php manual[E book   ita] php manual
[E book ita] php manual
 
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...[Ebook   ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa ...
 
[Ebook ita - database] access 2000 manuale
[Ebook   ita - database] access 2000 manuale[Ebook   ita - database] access 2000 manuale
[Ebook ita - database] access 2000 manuale
 
(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)(E book) cracking & hacking tutorial 1000 pagine (ita)
(E book) cracking & hacking tutorial 1000 pagine (ita)
 
(Ebook ita - inform - access) guida al database access (doc)
(Ebook   ita - inform - access) guida al database access (doc)(Ebook   ita - inform - access) guida al database access (doc)
(Ebook ita - inform - access) guida al database access (doc)
 
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
(Ebook   computer - ita - pdf) fondamenti di informatica - teoria(Ebook   computer - ita - pdf) fondamenti di informatica - teoria
(Ebook computer - ita - pdf) fondamenti di informatica - teoria
 
Broadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitorBroadband network virus detection system based on bypass monitor
Broadband network virus detection system based on bypass monitor
 
Botnetsand applications
Botnetsand applicationsBotnetsand applications
Botnetsand applications
 
Bot software spreads, causes new worries
Bot software spreads, causes new worriesBot software spreads, causes new worries
Bot software spreads, causes new worries
 
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
Blended attacks exploits, vulnerabilities and buffer overflow techniques in c...
 
Blast off!
Blast off!Blast off!
Blast off!
 
Bird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassemblyBird binary interpretation using runtime disassembly
Bird binary interpretation using runtime disassembly
 
Biologically inspired defenses against computer viruses
Biologically inspired defenses against computer virusesBiologically inspired defenses against computer viruses
Biologically inspired defenses against computer viruses
 
Biological versus computer viruses
Biological versus computer virusesBiological versus computer viruses
Biological versus computer viruses
 
Biological aspects of computer virology
Biological aspects of computer virologyBiological aspects of computer virology
Biological aspects of computer virology
 
Biological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networksBiological models of security for virus propagation in computer networks
Biological models of security for virus propagation in computer networks
 

A week is a long time in computer ethics

  • 1. A week is a long time in computer ethics Prof. Simon Rogerson Originally published as ETHIcol in the IMIS Journal Volume 14 No 2 (April 2004) It seems the more sophisticated we become in developing and using technology the greater the risk that it will be used in a detrimental way against individuals, organisations or society at large. We seem to be constantly grappling with new concepts that simultaneously pose new opportunities and new problems, or rushing to pass through new legislation to counter some new threat or redefining societal norms for our shrinking technologically-dependant world. Is this paranoia or reality? Consider the evidence. Several major online news services were sampled for the week commencing 15 March 2004 to identify the current challenges that we face from technology. The findings were concerning. Over 30 news items covered a range of problems and focused on three perspectives: occurring incidents, technological countermeasures and legislation. The news items fall into several broad categories. Globalisation. A number of articles addressed various aspects of globalisation. Controversy over offshore call centres and technology development in India was reported in one article. Those for and against such moves sadly seem to align with the political stances of the developed and developing world. In a range of articles about viruses, information access and intellectual property theft the underlying message was the extent and speed of impact due to the global nature of new technologies. Intellectual Property. This continues to be a hot topic. During the week Microsoft was reported as continuing aggressively to protect its trademarks across the world. Meanwhile the European Parliament passed a draft directive on enforcing intellectual property rights. It was reported that, "Campaigners still believe the move will damage activities such as the development of open source software." There were several reports on content theft. There was a spate of content theft from websites central to the activities of several companies and individuals. Peer-to Peer (P2P) file-sharing appeared in a number of reports. UK firms were shown to be lacking in recognising their professional obligations to society by allowing widespread illegal P2P. Parental obligation was under scrutiny in an article which revealed many parents were either ignorant that swapping copyrighted 1
  • 2. A week is a long time in computer ethics files was illegal, or knew it was illegal but did nothing about it, or did it themselves having learnt from their children. In the entertainment world a movie piracy ring had been discovered through a server containing many pirate motion pictures. Finally, the music industry continues to worry about P2P and the fact it cannot control the Internet. Identity Theft. The growing problem of identity theft seems to be of little concern of many people. For example it was reported that one in five Britons were willing to give financial details to unsolicited contacts and were not bothered when £500 was taken from their accounts fraudulently. Viruses and Hacking. Computer viruses and malware are the scourge of the modern global society. During the week there were several reports on the variants of Bagle and other viruses such as MyDoom and Netsky The Trojan horse Phatbot was wreaking havoc as computers continued to be connected to a P2P network of infected machines. There was growing pressure to address Bluetooth security problems in mobile phones which allowed hacking into the personal data held on mobile phones. But phone manufacturers view the problem as relatively minor. Symantec’s biannual Internet Security report confirmed growing severity of hacking incidents. One article reported that work had started on threat and vulnerability tests to ensure that the National Identity Register database, which will form the basis of the UK’s controversial ID card scheme, is secure from hacker attacks. Countermeasures were the subject of several articles. A new antivirus chip was reported in one, another announced that, "A public inquiry has been launched into the Computer Misuse Act (CMA), which could spell the end for current loopholes in the law", whilst one article Recognising that hacking cannot be prevented extolled the virtues of taking out adequate insurance cover. Junk Mail and Spamming. China was reported as the second largest target for spam with one third of all emails being junk mail. Generally the deluge of junk mail has led to frenetic anti-spam software development. The latest types were reported as using complex Bayesian techniques to weed out spam from legitimate mail. Information Access and Denial. It was reported that China had closed two Internet sites used by many thousands of people because they carried content deemed to be objectionable by the State. A second report explained that TeliaSonera in Sweden had closed down a web site of the Islamic 2
  • 3. A week is a long time in computer ethics group Hamas because it violated the acceptable use policy. By contrast one article focussed on content filters to restrict access to information for school children to combat such things as plagiarism. Legitimacy of information services was the subject of a contrasting article on fake escrow sites. These spoof sites are used to dupe consumers. Surveillance. Warnings were given about the need to be sensitive to employees’ needs when implementing and operating surveillance systems. A new software tool to detect paedophiles in Internet chatrooms was unveiled. One article gave warnings about how every day accessories such as mobiles phones were increasingly used for surveillance and that such intelligence gathering was commonly shared and condoned. Health. Our physical health can be at risk from technology. It was reported that those using multiple workstations were at greater risk of developing RSI-type injuries. Conclusion. In one week the news has carried many disturbing stories about information and communication technology. Each issue has a flip side such as these. Freedom of expression Censorship by the state Global reach Local impact Prevention of computer misuse Cure from outcomes of computer misuse Individual ownership Community share Information Junk Surveillance Freedom We need to have the ability, tools and confidence to address such issues. A week may be a long time in computer ethics but if we do not address such issues the consequences will resonate for lifetimes. News services accessed as part of the research for this article. Financial Times - (  ¢¡£¡¥¤§¦©¨£¨!¥¡$#¥%'(¨)¡00#' £(%¢1£%)2¢3 ) Guardian Unlimited Online - (  ¢¡£¡¥¤§¦©¨£¨4£¢5!267¥8£9@)7)§$#¥%AB6DCE¨£%4(1D@FE0¨ ) Silcon.com - (  ¢¡£¡¥¤§¦©¨£¨4£¢5$¢@10@¥#¥%G#¥%' ) Tech - Reuters - (  D¡£¡¥¤¦©¨¢¨4££5H8D)6¢¡0¥8E$#¥% ) VNUNET - (  D¡£¡¥¤¦©¨¢¨4££5!I¥£6£¡5$#¥%' ) 3
  • 4. A week is a long time in computer ethics ZDNET - (  ¢¡£¡¥¤§¦©¨£¨!P£9¥Q¡5$#£%AB6¢C ) Please send your views on ethical and social responsibility issues and cases of ethical dilemmas to: Professor Simon Rogerson Director Centre for Computing and Social Responsibility Faculty of Computing Sciences and Engineering De Montfort University The Gateway Leicester LE1 9BH Tel:(+44) 116 257 7475 Fax:(+44) 116 207 8159 Email:srog@dmu.ac.uk Home Page: (  ¢¡£¡¥¤¦$¨£¨4££$#£#£485$#£QRH9Q¢6S7E#B6¢C ) 4