Download presentation
Presentation is loading. Please wait.
Published byMonica Eileen McBride Modified over 9 years ago
1
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr. 2012..
2
Cyber attacks on IT systems would become a criminal offence punishable by at least two years in prison throughout the EU. Possessing or distributing hacking software and tools would also be an offence, and companies would be liable for cyber attacks committed for their benefit. IP Spoofing, Cyber-Attack tools, Liability of Legal Persons
3
1. Ethical Issue - Is it right to make Hacking IT systems a criminal offense 2. Stakeholders in case and what they want - Government wants to penalize hackers with up to two years in prison - Hackers believe this is not a criminal act - Companies that were attacked want this to be stopped. 3. Three Possible Solutions - Hacking is a crime punishable up to 2 years - this is the one I would choose - They do nothing about it and let it happen - Compromise, make it less of a crime
4
4. Evaluate Solution - Cyber attacks should be a criminal offense. This can hurt many people and ruin lives. 5. Nature of Solution - This solution is for the safety of the people and Government. This could be made a universal law. 6.Would the majority agree with the solution - Yes for the majority this would be poplular solutions. - Some businesses may not like it because they were gaining information based of these attacks.
5
7. Solution Commitment - I would commit to this solution because of how harmful this can be. This solution is chosen for privacy of the people.. 8. Philosophy of Decision - I feel this relates to all philosophical views. Although it could lean a bit more towards realism.
6
Hackers Violate ACM 1.2: Avoid harm to others ACM 1.3: Be honest and trustworthy ACM 1.7: Respect the privacy of others ACM 2.8: Access computing and communication resources only when authorized to do so. ACM 3.3: Acknowledge and support proper and authorized uses of an organizations computing and communication resources.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.