Cybercrime Attribution: An Eastern European Case Study – Analysis And Implications

Information and Technology Ethics

The article/case study provided in interact as the title of your essay, so that the lecturer knows which article you are analysing.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The report aims at depicting a case scenario that is related to one of the most concerning issues in the modern technological environment, namely information and technology ethics. The case study chosen for this particular study is that of “Cybercrime Attribution: An Eastern European Case Study.” The report comprises of an analysis of the provided case study, whereby the concept of cybercrime has been the buzzword. It provides us with various implications related to cybercrime. Cybercrime refers to the crime which involves a system and a network. Net-crime is in fact a criminal exploitation of the internet (Kshetri, 2013). This report therefore describes all ethical issues and also the ways to deal with them whether individually or organizationally. It generates information about concepts of ethical issues and that technological enhancement responsible for ethical concerns. This report discusses information rights, privacy, ethical policy, and intellectual property.

Information Communication Technology (ICT) has resulted innovative ethical concerns related to the protection of personal privacy, user responsibility, protecting intellectual property, software licenses as well as piracy, access and utilization of information, etc. An effective ICT related policy should be capable of considering these considerably, and several associated issues. The extensive growth of internet and its functionalities have allowed the whole industries to drive their business operations as well as money within internet (Lucas & Mason, 2008). This has naturally led to the growth of criminal activities that take place virtually. Though cybercrime is not a new thing, yet computer systems have been valuable targets, and this has therefore changed our thoughts about security, threats, and risks (Jung, 2009). As referred to in the case study, the entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection.

East European hackers utilize more efficient technologically advanced malware as well as detection evasion methods as compared to the East Asian hackers. Despite an increased number of cyber-attacks introduced by the East Asian hackers against firms as well as governmental institutions across the globe in recent years, the cybercriminals of this region are considered more sophisticated challenge towards global internet security (Jingtao, Yuanyuan & Xiaoling, 2010). As per the given case scenario, cybercrimes are quite common these days, but there are certain differences in the ways these are conducted. As per research, the cybercriminals of east Europe are way too ahead of the times. It is rightly depicted that the east Europeans are masters in malware development. These hackers would use null-day exploits that targets previously uncertain vulnerabilities, and also spear phishing for compromising target’s computer system, but then will depend upon basic malware as well as third party tools for maintaining and expanding their accessibility on target’s network (Pivec, 2011). Contrast to this, east European hackers utilizes exploits developed by others to initiate penetration, but malware programs are specifically customized to respective goals and functionalities. It is analyzed that Information and Technology security personnel have to often access confidential data as well as knowledge regarding individual or business networks as well as systems which give greater power (Frank & Felix, 2012). This power may be abused inadvertently or deliberately. Analyzing the case scenario would identify the need for ethical guidelines (Vaccaro & Madsen, 2009). The training of the professionals like security specialists focus upon technical knowledge as well as skills.

Analyzing Cybercrime Attribution

As mentioned in the case that investment has been stable in the sector of ethics in information and communication technology. However, as per research it is identified that business firms are investing heavily into computer systems as designed to enhance the efficiency as well as effectiveness. These are sometimes complex as replacing manual processes which earlier defied automation, introducing innovative functions into the automated process. There are ethical agenda related to the use of the ICT in the firms (Chang, 2012). This combines aspects common to several professions as well as issues which are specific to ICT. The following are some important methods by which organizations may establish such an agenda as well as address all ethical issues prevalent in ICT: the organizational policies need to be decided in relation to ICT. This needs to take complete account of organizational objectives as derived from mission statement. This includes using organizational key values, set out within the code of practices to guide in determining the ways to resolve ethical aspects (Winmill, Metcalf & Band, 2014). It also states the policy scopes in context to matters that are to be covered.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

As referred to the European landscape, the trend in ICT has been identified significantly. The move towards increased computational power, along with decreasing cost as well as size, may make improved changes and new technological advancements would provide enhanced opportunities. Some of the mentionable trends are ever-rising computational power apart from decreased size and cost, technological advances creating new interfaces, the capability of staying connected anytime, anywhere with service demands, creation of virtual places and services along with the service providers  (Brenner & Schwerha IV, 2004). The applications which the EU perceives as relevant for the coming years are reflected within the key challenges. These are divided into two groups: reinforcing Europe’s industrial strengths and that of overcoming technology roadblocks, and also taking up opportunities by applying ICT for addressing challenges. With several challenges presented the applications that EC perceives the central in advancing policy agenda. The cybercriminals of east Europe are way too ahead of the times. It is rightly depicted that the east Europeans are masters in malware development (Bowern, Burmeister, Gotterbarn & Weckert, 2006). These hackers would use null-day exploits that targets previously uncertain vulnerabilities, and also spear phishing for compromising target’s computer system, but then will depend upon basic malware as well as third party tools for maintaining and expanding their accessibility on target’s network (Koski, 2003). Contrast to this, east European hackers utilizes exploits developed by others to initiate penetration, but malware programs are specifically customized to respective goals and functionalities.

A key problem which arises while working with cybercrime is that almost all crimes transit data by means of a multitude of international borders prior to reaching the final goal. This has an impact upon investigation of cybercrimes and that of application of laws. An instance of legal restriction faced with foreign incidents arrives from ‘searching as well as seizing of computers and obtaining electronic evidence within criminal investigations’ manual for the US department of justice. It reports that while seeking support from ISPs overseas, all officers should work along with the country’s consent that refers to certain formalities required to be solved before proceeding. Some of the mentionable trends are ever-rising computational power apart from decreased size and cost, technological advances creating new interfaces, the capability of staying connected anytime, anywhere with service demands, creation of virtual places and services along with the service providers (Backus, Spinello & Tavani, 2004). The applications which the EU perceives as relevant for the coming years are reflected within the key challenges. The entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection.

Conclusion:

The case analyses confirms a fact that cybercrime is now a global growing issue. This report therefore describes all ethical issues and also the ways to deal with them whether individually or organizationally. It generates information about concepts of ethical issues and that technological enhancement responsible for ethical concerns. This report discusses information rights, privacy, ethical policy, and intellectual property. As referred to in the case study, the entrance of organized crime within the arena has increased the concern, along with the tremendous growth of internet botnets which have the power to cause greater damage to potential victims. The case relates to the analysis of multiple aspects that will allow a better understanding about prevention as well as protection. East European hackers utilize more efficient technologically advanced malware as well as detection evasion methods as compared to the East Asian hackers. Despite an increased number of cyber-attacks introduced by the East Asian hackers against firms as well as governmental institutions across the globe in recent years, the cybercriminals of this region are considered more sophisticated challenge towards global internet security.

References

Backus, A., Spinello, R., & Tavani, H. (2004). Genomics, Ethics, and ICT. Ethics And Information Technology6(1), 1-3. doi:10.1023/b:etin.0000036199.21906.ac

Bowern, M., Burmeister, O., Gotterbarn, D., & Weckert, J. (2006). ICT Integrity: bringing the ACS code of ethics up to date. AJIS13(2). doi:10.3127/ajis.v13i2.50

Brenner, S., & Schwerha IV, J. (2004). Introduction—Cybercrime: A Note on International Issues.Information Systems Frontiers6(2), 111-114. doi:10.1023/b:isfi.0000025779.42497.30

Chang, Y. (2012). Combating cybercrime across the Taiwan Strait: investigation and prosecution issues. Australian Journal Of Forensic Sciences44(1), 5-14. doi:10.1080/00450618.2011.581246

Frank, I., & Felix, O. (2012). Application of MIMO Technology to Systems Beyond 3G. International Journal Of Informatics And Communication Technology (IJ-ICT)1(2). doi:10.11591/ij-ict.v1i2.1482

Jingtao, Z., Yuanyuan, F., & Xiaoling, M. (2010). The latest progress report on ICT application in Chinese basic education. British Journal Of Educational Technology41(4), 567-573. doi:10.1111/j.1467-8535.2010.01083.x

Jung, I. (2009). Ethical judgments and behaviors: Applying a multidimensional ethics scale to measuring ICT ethics of college students. Computers & Education53(3), 940-949. doi:10.1016/j.compedu.2009.05.011

Koski, G. (2003). Ethical Issues in Antiepileptic Trials: Old Issues in a New World. Epilepsia44, 16-18. doi:10.1046/j.1528-1157.44.s7.8.x

Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electron Commer Res13(1), 41-69. doi:10.1007/s10660-013-9105-4

Lucas, R., & Mason, N. (2008). A survey of ethics and regulation within the ICT industry in Australia: ethics education. J Of Inf, Com & Eth In Society6(4), 349-363. doi:10.1108/14779960810921141

Pivec, F. (2011). Codes of Ethics and Codes of Conduct for Using ICT in Education. Organizacija,44(3). doi:10.2478/v10051-011-0007-8

Vaccaro, A., & Madsen, P. (2009). Corporate dynamic transparency: the new ICT-driven ethics?. Ethics And Information Technology11(2), 113-122. doi:10.1007/s10676-009-9190-1

Winmill, B., Metcalf, D., & Band, M. (2014). Cybercrime: Issues and challenges in the United States.DEESLR7(0). doi:10.14296/deeslr.v7i0.1921

Woollacott, P. (2007). Cybercrime comes of age. ITNOW49(2), 6-7. doi:10.1093/combul/bwl110

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.