Explaining the Hacking of Society's Information Systems from the Point of View of Ethical Theories

Publish Year: 1403
نوع سند: مقاله ژورنالی
زبان: English
View: 19

This Paper With 11 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_IJETH-6-2_002

تاریخ نمایه سازی: 15 مرداد 1403

Abstract:

Introduction: One of the important topics in the field of information technology is hacking the information systems of societies, that is, finding the security weaknesses of a system to penetrate and access its information. which can be done with various motivations, such as measuring penetration, finding system flaws, curiosity, causing disturbance, breaking the security of systems and harming them, personal gain, and so on. Hacking information systems will have favorable or unfavorable consequences for communities and citizens. Therefore, the purpose of this research is to explain the validity or moral impropriety of this act based on three important moral theories of consequentialism, deontologism, and virtuism. Material and Methods: This research was carried out using a descriptive analytical method based on library sources. Conclusion: Based on the results of the present study, it can be said: from the point of view of utilitarianism, the greater the amount of social benefit from the action of the influencers, the more ethical their action is, and the more harmful it is to the society, the more unethical their action is. Ethical values ​​such as trustworthiness, not prying into the privacy of others, not harming people, maintaining human dignity, protecting public interests, are among the ethical rules governing the act of hacking. And the benevolent motives of hackers only when they are compatible with these moral rules, is the moral justification of their action from the perspective of rule-oriented duty-bearers. The specific personal, social, cultural and economic conditions of the hacker are effective in the moral judgment of his actions from the perspective of practical duty-oriented people. In the end, it should be said: Knowing the ethical behavior of hackers and its effect on their actions is the main condition for the ethical evaluation of information systems hacking, although it will be very difficult to achieve such knowledge.

Authors

Noah Zhang

Department of Computer Science, Faculty of Engineering, University of Canterbury, New Zealand

Liam Wang

Department of Computer Science, Faculty of Engineering, University of Canterbury, New Zealand

Isla Wilson

Department of Computer Science, Faculty of Computing and Mathematical Sciences, University of Waikato, New Zealand

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • Segers R, Erp M, Meij L, et al. Hacking history ...
  • Lubke J, Britt VG, Paulus TM, Atkins DP. Hacking the ...
  • Shaqiri A. Management information system and decision making. Academic Journal ...
  • Al-fuhaidi B, Al-Sorori W, Maqtary N, Al-Hashedi A H, Al-Taweel ...
  • Chng S, Lu H, Kumar A, Yau D. Hacker types, ...
  • Yaokumah W. Predicting and explaining cyber ethics with ethical theories. ...
  • Dhirani LL, Mukhtiar N, Chowdhry BS, Newe T. Ethical Dilemmas ...
  • Maurushat A. Ethical hacking. ۱st ed. Canada: Univerity of Ottawa ...
  • Pattison J. From defence to offence: The ethics of private ...
  • Mancic Z. Cyberpiracy and morality: Some utilitarian and deontological challenges. ...
  • Bhatti M, Zahra A, Mugees Asif M, Ahmad M, Zafar ...
  • Spafford E H. Are computer hacker break-ins ethical? Journal of ...
  • Hatfield J M. Virtuous human hacking: the ethics of social ...
  • Alashti Z F, Bojnordi A J J, Sani S M ...
  • Wu X, Duan R, Ni J. Unveiling security, privacy and ...
  • Rodriguez Duque S, Tal E, Barbic S P. The role ...
  • Haywood A. Rewards for hacking -good, bad or ugly? Infosecurty, ...
  • Cohen D, Elalouf A, Zeev R. Collaboration or separation maximizing ...
  • نمایش کامل مراجع