Ethical Considerations in the Cyber Domain

  • Justin M. Hubman
  • Zachary B. Doyle
  • Robert L. PayneIII
  • Thomas F. Woodburn
  • Branden G. McDaniel
  • Joseph V. Giordano

Abstract

Cybersecurity is a dynamic and ever-changing field. In today’s information intensive environment, cyber-related incidents such as online fraud, cybercrime, cyber terrorism, and cyber espionage are on the rise. Our national security, personal safety, and economic health are at risk because of our dependence on cyber technologies. Threats from the cyber domain can include hacking, white collar crime, fraud, identity theft or stealing proprietary information. The perpetrators exist on a continuum (basic hackers, organized cybercrime groups, terrorists and even well-funded nation state actors). Recently, we have seen a proliferation of Internet-connected devices such as automobiles, set-top boxes, home appliances, and energy consuming devices on a smart-grid. This proliferation is projected to continue as we move towards the Internet of Everything. This will only serve to increase the number of entry point that the adversaries can exploit.

References

  1. 1.
    2014 Verizon Wireless Data Breach Investigations Report (2014). In Verizon Enterprise. Retrieved 26 Apr 2015. http://www.verizonenterprise.com/DBIR/2014/reports/rp_dbir-2014-executive-summary_en_xg.pdf
  2. 2.
    Baldor LC (2015). New Pentagon strategy warns of cyberwar capabilities. http://abcnews.go.com/Technology/wireStory/pentagon-strategy-warns-cyberwar-capabilities-30520063
  3. 3.
    Busch NE, Givens AD (2014) The business of counter terrorism public- private partnerships in Homeland Security, vol 4. Peter Lang, New York, pp. 87–137Google Scholar
  4. 4.
    Clark BA (2008) The ethics of terrorism. In: Spectacle. Retrieved Apr 2015, from http://www.spectacle.org/0408/clark.html
  5. 5.
    Eng J (2015) Homeland security to open satellite cyber office in Silicon Valley. http://www.nbcnews.com/tech/security/homeland-security-open-satellite-cybersecurity-office-silicon-valley-n345706
  6. 6.
    FBI: Cyber-attacks surpassing terrorism as major domestic threat. 14 Nov 2014. In RT. Retrieved Apr 2015, from http://rt.com/usa/fbi-cyber-attack-threat-739/
  7. 7.
    Goodman M (2015) Future crimes. Published in the United States by Doubleday, a sub division of Random House LLC, New York, and in Canada by Random House of Canada Limited, Toronto, Penguin Random House companiesGoogle Scholar
  8. 8.
    Hayden M (2011) The future of things cyber. Strat Stud Q 5(1):3–8Google Scholar
  9. 9.
    Korns SW, Kastenberg JE (2009) Georgia’s cyber left hook. Parameters 60–65Google Scholar
  10. 10.
    Lai RC-II, Syed (Shawon) Rahman P (2012) Analytic of China cyberattack. Int J Multimedia Appl (IJMA) 4(3):46–47Google Scholar
  11. 11.
    McNeal GS (2014) Six things you should know about Amazon’s drones. Forbes. Retrieved from http://www.forbes.com/sites/gregorymcneal/2014/07/11/six-things-you-need-to-know-about-amazons-drones/
  12. 12.
    Walters R (2014). Cyber attacks on U.S. companies in 2014: issue brief 4289 on National Security and Defense . In: The Heritage Foundation. Retrieved from http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Justin M. Hubman
    • 1
  • Zachary B. Doyle
    • 1
  • Robert L. PayneIII
    • 1
  • Thomas F. Woodburn
    • 1
  • Branden G. McDaniel
    • 1
  • Joseph V. Giordano
    • 1
  1. 1.Economic Crime, Justice Studies and CybersecurityUtica CollegeUticaUSA

Personalised recommendations