The Net movie made in 1995 does a great job in terms of highlighting the ethical issues in cyber espionage. The software virus can be used by any entity such as business, government, hackers, etc. to steal information for personal gains. Angela Bennett is a computer expert discovers computer virus disguised in a concert game that can access mainframe of any network such as airlines, nuclear plants, defense, etc.
The ethical issues surrounding this film is personal privacy which shows the "bad guys" found out everything about Angela Bennett such as what kind of drink she liked, what cigarettes she used to smoke, what movies she liked, etc. This information can be pieced together by hackers who gains unauthorized access to a computer or network and use to steal information, money, property, or tamper with data (Emily, 2006).
The information can be accessed through the preferences you establish for search engines, such as Google, “a tracking cookie takes the regular cookie process one step further and sends a log of your online activities, usually tied to your Internet Protocol (IP) address, to a remote database for analysis. Many tracking cookies are benign and want
…show more content…
only to use your information, along with the data of millions of other anonymous users, for marketing analysis.” (Tom’s Guide, 2013, para 8). There are ways to avoid or minimize of tracking cookies by regularly clearing out cookies that store private information onto the web browsers. Another way to limit tracking is by limit the access cookies have to your personal data or disallow third party cookies to be downloaded onto to your computer. Final step is to ensure you’re vising web site that are legally required to disclose information of using tracking cookies. (Tom’s Guide, 2013). Another aspect of the movie that I thought was far fetch when the “bad guys” were able to use this information to completely erase her identity.
Even if you consider the amount of information available about people on the internet through MySpace or Facebook that can only lead to potential risk of identity theft. Hackers try to get inside your computer and get personal information trash, email, or phishing to lure internet users to bogus websites. Hackers can send email pretending to have issues with your current service and requesting information like credit card, social security number or PIN number to resolve issue. The best way to protect against identity theft is not to give out information over the internet, always call the service provide to verify the issue (Ebert & Griffin,
2013). When it comes to erasing someone's identity, I do not think the movie realistically portrayed that issue especially when hacker motivated by fun/thrill and financial gains. Thycotic a software firm conducted a survey of 127 hackers at Black Hat USA 2014 to try and understand their thinking. The company found that 51% of the hacker were driven by fun/thrill and only 19% did it for financial gain. The survey also found that 86% of the hacker were confident they will never face repercussions for their activities. “99 percent said they believed that simplistic hacking tactics such as phishing are still effective, and when asked which types of employees they would most likely target first in order to gain login credentials for a particular company, 40 percent said they would start with a contractor.” Clearer to stay under radar stop giving out personal information to a phishing email or phone calls. 47% of user are learning to avoid the phishing tactic. Hackers target 70% of IT admin and contractor to gain access, hence organization must do a better job protecting the passwords and privileged login credentials. 88% of the hacker believe their own information is at risk which is not surprising since the majority of the hacker are doing it for fun/thrill. (Williams, n.d.).
To start off with, you cant just give out information to anyone. You must give out only the basic information. If u decide to give out more then the information that's needed that puts you at a high risk of getting your information stolen. According to passage 1 " Social Networks Can Jeopardize Your Data Privacy" Hadley Jones says " This can be he user's first and last names, and email address, for example. Some networks go further and ask about user's interest, activities, or location. In many cases,the idea is to facilitate conversations online between users
I realized that sometimes it is fine for things to just be, and I don’t know why. Much of the film has to do with how we think, and what we do in private. Collectively, through these moral and ethical acts (or lack thereof) we can impact the public. Also, by sharing these thoughts and concepts with the public in the documentary, it can affect our thoughts and actions in our private lives; I know it has, at least for myself. One of the earliest topics in the film that I took note of was the ethics of certain matters, in a way that I had never considered before.
Highlight the main ethical issues that this case brings to light and critically apply :
Based on what I watched and understood in the movie Lars Von Trier’s “Breaking the Waves”, relating it to the Kierkegaardian concept of the teleological suspension of the ethical, Bess McNeill shows ethical acts to her husband, Jan. But the question is, what is ethical? Ethical means that the thing or action which a society follows or a set of standards or norms that to be followed. It is applicable to the universal and it is in ethical that which distinguishes either our action is good or bad. It doesn’t destroy any law or order in the society. In relation to Bess, as the wife of Jan, she did the ethical acts as a wife such as taking care of her husband, doing the household chores, making Jan happy, and doing her sexual obligation to her husband
Our generation is the first to travel within cyberspace, a virtual world that exists with all the computers that form the global network. For most people today, cyberspace is still a bewildering and alien place. How computers work and how they affect our lives is still a mystery to all but the experts, but expertise doesn't necessarily guarantee morality. Originally the word hacker meant computer enthusiasts but now that the internet has revealed its potential for destruction and profit the hacker has become the outlaw of cyberspace. Not only do hackers commit crimes that cost millions of dollars, they also publicize their illegal techniques on the net where innocent minds can find them and be seduced by the allure of power and money.
There are three areas of cyber conflict that hackers choose to think are the ethical issues, but are the most problematic.
One person in the film claimed she put up a façade in the public eye, but behind closed doors, she is different. Such implications reveal partisan allegations as they aim to suggest that she is a person who lacked integrity. Therefore, she cannot become President of the United States. The public derided the film with harsh reactions after its release claiming its propaganda. Nonetheless, major civil society organizations such as the Annenberg Public Policy Center went ahead and analyzed the movie through itsfactcheck.org project.
... led to a diversification of the people who create and maintain them. This can be anyone. Putting personal information into the hands of a stranger is risky outside of the Internet, but even more so online. The ease and speed of the mobility of information means no information is safe on Facebook. Anyone who can see it can copy, save, or redistribute the information at will. A broad and deep aggregate source of information makes search and retrieval of anything posted on Facebook quick and easy. If somebody wants information about you they know how and where to look. Finally, this information can be passed along and analyzed in order to draw conclusions about you and your lifestyle. These can be stereotypical and false. Facebook and other social media sites, and more broadly information technology in general has greatly impacted our lives and our right to privacy.
Being involved socially online can open many doors to hackers and scammers. Posting too much information online can be a way for scammers to steal information.
Cookies are used to gather statistics on how customers use the site. For example, to:
In today's society, many aspects of crime are committed on a regular basis. Civilians take advantage of people all the time using online resources such as fraudulent websites requiring credit card information to get a free monthly trial. Other examples of cyber crimes include online chat websites, full of predators, or websites needing a downloadable program that contains a hacking virus. Sadly, there are many cases of cyber crime all over the internet. The acts of cyber crimes are considered violent acts like any other.
Because of what you post hackers have better chances of hacking passwords, bank account numbers, and much more. People put so much personal information on their profiles that identity theft is easier than ever before. Everybody heard about the huge celebrity nude icloud hacking scandal. There was a list of about 100 different celebrities that had nude pictures of them leaked all over social media sites. Jennifer Lawrence, Mary Elizabeth Winstead and Kate Upton immediately confirmed that the nude images were truly them. The hacker made it into their icloud through the app “find my iphone.” Most apple services will lock someone out after several failed logon attempts. But at that time find my iphone did not. The hacker was able to do what is called a “brute force attack” and test thousands of potential passwords until an account was entered (Duke). Because of what is posted on their social media sites the hacker had access to dates, important events, important names, and more. All these could be used to potentially guess a password. Nearly a decade ago, Paris Hilton 's Sidekick cell phone was accessed when a hacker guessed her password was Tinkerbell, the name of her famous teacup chihuahua
Many factors play right into the advantage of identity theft through social media. One of the most important is the lack of user knowledge of the social media or website they are using. Social media such as Facebook, twitter, LinkedIn, among others have insecure data for their
One of the things though is that we don’t only see schemes on social networks it could happen on any site that requires you to share information. Things like online shopping require you to share some of your personal information along with your bank information so if the site doesn’t have a strong security system it can have consequences. There are intelligent hacker1s and scammers that can breach the security system and steal your bank information. Three simple steps such as typing your name, birthdate, and zip code is more than enough for someone to try and steal your identity or use your information to their advantage. Theodore Claypoole in “Privacy and Social Media” said how the United States is trying its best to pass laws and keep up to date with new software in order to help protect people from falling into the realms of cyber criminals (Privacy and Social Media). As time passes technology is advancing and sharing our information is becoming easier, so it’s necessary for our security software to be up to
However, much like any other part of the internet, social networks can be frought with serious security risks, both for your person, and your data.