Main Menu

My Account
Online Free Samples
   Free sample   Doing ethics technique

Doing Ethics Technique - Unraveling and Solving the Dilemma

Question

Discuss in detail Doing Ethics Technique.

Answer

Introduction
Doing Ethics Technique: In a particular scenario, Doing Ethics Technique allows the performer to draw out the issues if any with the said scenario, both ethical as well as unethical. The researchers have certain questions, which require to be answered, and Doing Ethics Technique helps in finding those answers. The process involved with Doing Ethics Technique, is initiated with the first step, which is to find some rudimentary information pertaining to the topic, and subsequently answering the questions arising out of the information procured. This is aimed at unraveling and solving the Ethical Dilemma that is related to a particular incident.

Discussed below is an incident where Doing Ethics was utilized by researchers in order to analyze the characteristics of the incident.

Scenario
Incident: The incident that is being inspected in this essay can be found at the following link:
https://arstechnica.co.uk/tech-policy/2016/07/cybercrime-hacking-computer-viruses-online-fraud-ons/

This news article, which speaks about nearly four million British people being victims of online crimes such as hacking, online frauds and viruses, was published online on July 27, 2016. The people being focused on belonged to England and Wales. There was a plethora of ethical concerns arising out of this issue (Ars, 2016).

Performance of DET, based on the information provided by the article
A whopping four million individuals pertaining to England and Wales were subjected to cyber crimes such as fraud, viruses and hacking (Guha & Hyder, 2016). The ethical dilemmas and concerns arising out of these issues are numerous.

The Facts: The population in England and Wales that was subjected to these cybercrimes was over four million, out of which nearly twenty-five percent were subjected to frauds (Riek et al., 2016). In order to target their prey, the hackers used to process of unauthorized software access as well as by copying sensitive data belonging to people. The targeted spaces for such acts were airports and restaurants in England and Wales. Out of the four million instances reported, approximately sixty three percent of the cases were pertaining to banking frauds and credit cards. Another statistic suggests that nearly sixty-three percent of these cases involved frauds of non-investment nature, which included cases such as computer service calls, online shopping etc. the cyber crimes were not only restricted to common people but numerous organization of repute were also targeted by these hacking's (Johnson, 2016). A number of these organized were hacked for retrieving sensitive data for monetary benefits, such as credit card and banking information. Another purpose that was served through these hacking's was corporate espionage. Viruses installed into systems within organization resulted in loss of vital information dealing a severe blow to organizations.

The Resulting Issues: Ethical and Non-Ethical
The ethical as well as non-ethical issues and concerns that were presented in this incident are as follows:

  1. The hackers having unauthorized access to personal information and other sensitive data from public places such as airports and restaurants resulting in approximately over a million British people being roped into fraudulent investments can be categorized as an ethical concern.
  2. Numerous companies took steps against such hacking instances by incorporating systems capable of recognizing any attempts to hack into the organization’s network (Lee, 2016), can be categorized as a non-ethical concern, even though the organizations themselves made unauthorized access into the system. The differentiating factor is that the attempts from the organizations themselves were an attempt at preventing malicious entities from accessing sensitive data.

Counter Measures: The first and foremost step, which is also the most effective step, is for the government to take. The regulations and associated penalties for cybercrimes need to be enforced thoroughly, in order to set an example for cyber offenders. Airports, restaurants and other organizations that are the most frequent targets for such cyber attacks, must beef up their cyber security to safe guard the private data and confidential information of the customers. Individuals can also contribute to their own safety by refraining from disclosing their sensitive information to shady websites and at high-risk cyber avenues. Customers need to be careful and vigilante whenever they provide their personal data (Saridakis et al., 2016).

Conclusion
By analyzing the scenario above, it can be safely concluded that performing DET can be extremely helpful for not digging out all material facts about the issue, but also for understanding the true characteristics of the incident. By considering the above incident for instance, it can be safely assumed that if proper precautionary steps are taken, then the frequency of such instances can be minimized. Doing Ethics Technique assignments are being prepared by our IT assignment help experts from top universities which let us to provide you a reliable best assignment help service.

References:
Ars Technica UK. (2016). Cybercrime: 4 million Brits are victims of hacking, viruses, online fraud. [online] Available at: https://arstechnica.co.uk/tech-policy/2016/07/cybercrime-hacking-computer-viruses-online-fraud-ons/[Accessed 6 Aug. 2016].

Guha, S. K., & Hyder, M. N. A. CYBER CRIME AND THE IMPACT OF THE ICT ACT, 2006: AN ANALYSIS.

Johnson, M. (2016). Cyber Crime, Security and Digital Intelligence. Routledge.

Lee, J. K. (2016). Invited Commentary—Reflections on ICT-enabled Bright Society Research. Information Systems Research, 27(1), 1-5.

Riek, M., Bohme, R., & Moore, T. (2016). Measuring the influence of perceived cybercrime risk on online service avoidance. IEEE Transactions on Dependable and Secure Computing, 13(2), 261-273.

Saridakis, G., Benson, V., Ezingeard, J. N., & Tennakoon, H. (2016). Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technological Forecasting and Social Change, 102, 320-330.

NEXT SAMPLE

Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment

FREE PARAPHRASING TOOL

PARAPHRASING TOOL
FREE PLAGIARISM CHECKER

FREE PLAGIARISM CHECKER

PLAGIARISM CHECKER
FREE PLAGIARISM CHECKER

FREE ESSAY TYPER TOOL

ESSAY TYPER
FREE WORD COUNT AND PAGE CALCULATOR

FREE WORD COUNT AND PAGE CALCULATOR

WORD PAGE COUNTER



AU ADDRESS
9/1 Pacific Highway, North Sydney, NSW, 2060
US ADDRESS
1 Vista Montana, San Jose, CA, 95134
ESCALATION EMAIL
support@totalassignment
help.com