Discussion: Utilitarianism Theory/Perspective
Cybercrime is becoming a threat for the use of the emerging technologies. The increase in the cyber-attack has been notices as the application of the advanced technology are happening in the different fields of industry (Hawdon et al.,2017). Cybercrime includes the cyber-attacks, attacks from ransomware and acquiring the control of the system. The consequence of the cybercrime can hamper the business and technical processes of the organization. Apart from that it can become a major threat for the security of the individuals (Wick et al.,2017). The breaching of the data can be happened due to the cybercrime. The data transferred between two secured devices may contain confidential information regarding the organization or the users. The breaching of the data can violate the security of the data. In this paper the act of cybercrime has been discussed with respect to the ethical theories (Watters, Watters & Ziegler,2015). This discussion will indicate if the act of cybercrime and the reason behind the cybercrime can be stated as ethical. In order to do this different ethical theories has been discussed.
Utilitarianism Theory defines tan act ethical if the consequences or the actions of that act can able to do greater good for the most of the people (Watters, Watters & Ziegler,2015). The consequence of the ethical act needs to bring the happiness for most of the people. The cybercrime can be evaluated through the perspective of Utilitarianism Theory (Gillespie, 2015). There are several consequences of the cybercrime. One of the main consequence of the cybercrime is the breaching of the data (Watters, Watters & Ziegler,2015). The system contains the data which are co9nfidential in nature and hold the information about the several users along with their personal details (Hawdon et al.,2017). The breaching of the data can violate the security of those users which is not desirable (Hui, Kim & Wang,2017). Apart from that cyber-attack in the system can become problematic for most of the people as it can create problem in everyday work. It can be said that the act of the cyber is not ethical according to the Utilitarianism Theory.
Deontology Theory states the act ethical on the basis of the rules and regulation. The specialty of the Deontology Theory is dependent on the relevance of the act on the basis of the certain rules and regulations (Shapiro & Stefkovich, 2016). The act of cybercrime can be evaluated on the basis of this theory. Stealing the confidential data is not a right act. The consequence of cybercrime includes the breaching of the data (Hawdon et al.,2017) . Data breaching denotes the stealing of the information (Hawdon et al.,2017). The stealing of the confidential information is not permitted according to the Deontology Theory(Watters, Watters & Ziegler,2015). Apart from that the losing of the data can cause many difficulties for the organizations which is not desirable (Watters, Watters & Ziegler,2015). The problems people are facing for the loss of the data and the breaching of the data is not right according to the rules and the regulations. In this context it can be said that the act of the cybercrime and the practices of the cybercrime does not deliver the results those are abide by the rules and the regulations (Watters, Watters & Ziegler,2015). In this case, it can be said that the act of the cybercrime is not permitted according to the Deontology Theory.
Deontology Theory/Perspective
The act is judged on the basis of the consequences in Virtue Theory. It can be said that the consequence of the good act will be good. In case of cybercrime the consequence of the act is not good (Holt & Bossler,2014). The result of the cybercrime includes the breaching of the data and the loss of information along with the damaging of the system. These consequences are not good for the individuals and the organizations (Hawdon et al.,2017). Apart from that the violation of the data is not desirable for the greater good of the people (Watters, Watters & Ziegler,2015). The damaging of the system along with the loss of information can be threat for the individuals and the companies (Bossler & Holt, 2015). From the virtue theory it can be said that the act of the cyber is not ethical as the result of the cybercrime does not deliver positive results of the people and the organizations.
Contract theory signifies the importance of the rules and regulations for living in the society. There are some rules and regulations which are needed to be followed while living in the society. The contract theory approves those practices those are relevant as per the rules and regulations needed to be maintained in the society of the people (Klein & Cooper,2018). According the contract theory the practice of the cybercrime can be judged. The act of cybercrime violates the rules in the society by exposing the sensitive information (Bossler, 2016). Apart from that cybercrime disables the systems for working which is not acceptable according to the social contract theory. The loss of the data can become problem for the company and the individuals (Hawdon et al.,2017). Apart from that the cyber-attack at large scale may affect the company in a large scale and the company may not recover the loss. In this context it can be said that the cybercrime is not an ethical practice.
The cybercrime includes the usage of the technology against the technology. It has been seen that the practice of cybercrime has been increased since the advancement of the technology. The cyber attackers are using the advanced tools for intruding into the systems. There are several negative consequences of the cybercrime (Bossler & Holt, 2015). One of the main negative effect of the cybercrime is the breaching of the data. The data breaching can lead to the serious amount of data loss and the threats to the security (Hawdon et al.,2017). The data stored in the system are confidential and sensitive in nature (Hawdon et al.,2017). Those data can be the users and consumers of the organization or the information regarding the operations of the organization (Vera, 2017). In this case, the exposing of the data and information can be a threat for the organization and the individuals. The cyber-attack can become constraint for the daily functioning of the organizations as it has been seen that in many cases the cyber-attacks disables the system (Watters, Watters & Ziegler,2015). Apart from that the attack of the ransomware affects the organization and the individuals in a bad way (Harrison, 2015). The attackers of the ransomware take the control of the system and the data in the system. They claim the money of the freeing the system and the data (Watters, Watters & Ziegler,2015). This raises the issues regarding the loss of the resources. The act of cyber-crime has been discussed along with the different perspective of the ethical theories (Watters, Watters & Ziegler,2015). It can be said that the discussion regarding the evaluation of the cybercrime on the different ethical perspective denotes that the act of cybercrime is not ethical.
Virtue Theory/Perspective
Conclusion
The discussion is regarding the cybercrime and evaluate the act of cyber-crime is ethical or not. The discussion is based on the various ethical theories and perspectives. It can be said all the perspective has mentioned that the act of the cybercrime is not ethical as the consequences of the cybercrime is not doing greater good for the people. The act has been discussed on the different point of view. All the point of view indicates the negative consequences and the negative nature of the cybercrime. It can be said that the cybercrime is not an ethical practice as it does not permit the data security and the ability of the smooth working of the system. The discussion also points out that the technology is using against technology. It has been seen that most of the advanced technologies are using for the data breaching and the practices of the cybercrime which is alarming. The consequences of the cybercrime violates the privacy of the people and the organizations which are not desirable. The breaching of the data thus imposes the threats for the people and the organizations. Apart from that the organizations are losing the information and the data for the cyber-attacks. The overall discussion indicates that the practices regarding the cybercrime is not ethical.
References
Bossler, A. M. (2016). 3 Cybercrime research at the crossroads: where the field currently stands and innovative strategies to move forward. In Cybercrime through an interdisciplinary lens (pp. 51-69). Routledge.
Bossler, A., & Holt, T. J. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offenses. Routledge.
Gillespie, A. A. (2015). Cybercrime: key issues and debates. Routledge.
Harrison, T. (2015). Virtuous reality: moral theory and research into cyber-bullying. Ethics and Information Technology, 17(4), 275-283.
Hawdon, J., Costello, M., Ratliff, T., Hall, L., & Middleton, J. (2017). Conflict management styles and cybervictimization: extending routine activity theory. Sociological Spectrum, 37(4), 250-266.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20-40.
Hui, K. L., Kim, S. H., & Wang, Q. H. (2017). Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks. Mis Quarterly, 41(2), 497.
Klein, J. L., & Cooper, D. T. (2018). Deviant Cyber-Sexual Activities in Young Adults: Exploring Prevalence and Predictions Using In-Person Sexual Activities and Social Learning Theory. Archives of sexual behavior, 1-12.
Shapiro, J. P., & Stefkovich, J. A. (2016). Ethical leadership and decision making in education: Applying theoretical perspectives to complex dilemmas. Routledge.
Vera, J. S. E. (2017). Human rights in the ethical protection of youth in social networks-the case of Colombia and Peru. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 6(4), 71-79.
Watters, P. A., Watters, M. F., & Ziegler, J. (2015, January). Maximising eyeballs but facilitating cybercrime? Ethical challenges for online advertising in New Zealand. In System Sciences (HICSS), 2015 48th Hawaii International Conference on (pp. 1742-1749). IEEE.
Wick, S. E., Nagoshi, C., Basham, R., Jordan, C., Kim, Y. K., Nguyen, A. P., & Lehmann, P. (2017). Patterns of Cyber Harassment and Perpetration among College Students in the United States: A Test of Routine Activities Theory. International Journal of Cyber Criminology, 11(1).