Skip to main content

The impact of computer ethics on my research project

Since I am going to progress to DMU and study cybersecurity, the topic of computing ethics is essential and important to me. My research project in Computer Skills and Research module is about passwords and the ways of authentication in general. Such topic is an important issue in industry mostly due to the violation of computer ethics by a number of users either because of harmful intends or the lack of knowledge in computer security.

(Magnificentexceptionalaeb, 2017)

 

The Ten Commandments of computer ethics have been defined by the Computer Ethics Institute. My project covers mostly all of them, since the user with bad intends can exploit weak passwords in a multiple ways such as stealing the work of other people, causing harm to individuals and communities, stealing valuable physical and/or virtual goods as well as intellectual property. However, some exploits are still not well-regulated by law and could not be seen in the jurisprudential field. Therefore, the only way of judging for example social network intrusion due to bad password is computer ethics (Weckert, 2007).


This blog post is dedicated to the amendment 8:

Thou shalt not appropriate other people's intellectual output: Copying somebody else’s program without proper authorisation is software piracy and is unethical. Intellectual property is a form of ownership, and may be protected by copyright laws.


This statement is the topic of a number of discussions online, since there is a group of people who think that all information on the internet should belong to everyone (Einar, 2007). Those people claim that information itself must be free and available to every person. Therefore, such people do not recognise intellectual property and do not hesitate to execute attacks with the intent to steal and then distribute intellectual property online. The summary of such ideas can be expressed in one sentence – information wants to be free.


Firstly, such attitude does not withstand any proper discussion, since it is obvious to every educated person that information nowadays is not seen as a raw resource, but as product of intellectual effort and work of people. People do have right to protect their intellectual property – the product they have made. Moreover, the idea of taking the product of intellectual work from the author is deeply unethical and could not be justified from the position of morality (Einar, 2007).


Secondly, intellectual property should not only be protected by law, but also with the attitude of the society towards this particular issue. Computer ethics help a lot of people to stay conscious and to resist the idea of using the product of intellectual effort of other people without permission, since a lot of unlicenced software can be found online. It is necessary to understand that every person who violates intellectual property rights causes harm not only to the developer, but significantly demotivates potential developers of future products, hence speeds the progress of all the humankind down.


In conclusion, protecting information and intellectual property rights is the duty of every conscious person. As a potential employee in cybersecurity field, I do recognise this issue as one of the most important today, since the cost of information is getting higher every day and the cost of getting information is decreasing. Information requires proper protection as well as it requires facilities where it can be legally spread.



Reference:

Einar, K. (2007) Internet security: hacking, counterhacking, and society. London: Jones and Bartlett.

Magnificentexceptionalaeb (2017) Constructive Summary: Reason, Relativity, and Responsibility in Computer Ehics [Online]. Available at: https://magnificentexceptionalaeb.wordpress.com/2017/04/26/first-quiz-march-1-2017/ (Accessed: 2 November 2021).


Weckert, J. (2007) Computer Ethics. 1st edn. London: Routledge.

Comments

  1. To add to this post, please consider choosing one of the commandments that you feel connects with your main project theme the most and discuss it - is it relevant still in todays technology, can it be monitored and enforced, for instance.

    ReplyDelete
    Replies
    1. Thank you for the feedback. I've made further research in the 8th commandment and added it to the blog

      Delete

Post a Comment

Popular posts from this blog

Software review: Hashcat

In the following blogpost the way I used software called hashcat in my project is described. The example of using this software for dictionary attack is demonstrated. In my work I used information provided by Tavarez (2020) .   According to Porup (2020) hashcat is one of the most popular password crackers all around the world. Moreover, hashcat is included in the list of basic tools in Kali linux – linux distribution widely used by cybersecurity specialists. I installed Kali linux virtual machine in order to use this program and to show the example of a dictionary attack (Author's screenshot) However, before looking at the examples of using hashcat on practise, it is useful to understand in which areas hashcat is using. In plain words, hashcat is a password guesser which includes a number of features and pre-installed functionalities for cracking passwords by penetrating brute-force and dictionary attacks. The way it works is not too sophisticated, it hashes considerable numbe...

Major project theme

Every person has heard about how important it is to have a well-built strong password. An essential number of people would agree that password hygiene is as important as the personal hygiene is, since violation of first may lead to much more serious consequences. However, the statistics show that 59% of users use their names and dates of birth as their passwords, 43% shared their passwords with other people and only 45% would change a password after a breach (O’Driscoll, 2020). The aim of this post is to show how to create strong passwords. It is necessary to know how passwords are cracked in order to properly understand what password can be referred as strong one. There are to ways to execute an attack: online and offline.  Online attack is done by trying different passwords one by one through a normal log in process. Usually, such attacks are unsuccessful since they are easy to detect and block if necessary (Burnett and Kleiman, 2006).  I think everybody encountered situatio...