Logo en.artbmxmagazine.com

Privacy or comfort? cybercrime and the use of IT information technologies

Table of contents:

Anonim

The high demand for information technologies has led to the development of systems with great storage and response capacity. Thanks to the great development of these systems, and to contemporary dependence, cyberspace is a vast place that, in addition to presenting great benefits, can also function as a medium for all kinds of illicit activities. Although the internet is the tool of the century and makes life much easier for us, it can be a very insecure instrument if it is not used with caution.

In the XXI century and under the technological revolution, the use of information technologies has led to the development of systems with great storage and response capacity. In this sense, governments and companies have been able to exploit the exponential increase in technology. But in the same way, you must invest in secure systems that provide reliability and privacy for the user.

Cybercrime is a problem that concerns us all. In a globalized world, with the reach and penetration of information technologies, it is necessary to be well informed to avoid being victims of any of these attacks. Privacy on the web is a very sensitive issue. Not only is cybercrime a subject of global controversy, also the espionage revealed by Edward Snowden has led to the mistrust of internet users. Knowing that the government can interfere in your private life through the web is an ethical dilemma on a large scale and of different aspects. Faced with this highly complex situation, there is a great conflict of interest from various parties. On the one hand, the government tries to provide a solution to national security and with this idea it justifies the espionage carried out on the population.On the other hand, there are large technology companies such as Google, Facebook, Yahoo !, etc… who are priority participants in the security and treatment that they provide to our personal information, and who refuse to work with the government for the extraction and possession of data. Finally, we users who represent the most aggrieved in this situation, but who denote a clear irresponsibility and ignorance about our digital rights.but that we denote a clear irresponsibility and ignorance about our digital right.but that we denote a clear irresponsibility and ignorance about our digital right.

In a world where information technologies are used worldwide in practically any activity management, security in this environment represents a factor of vital importance.

ADVANTAGES AND DISADVANTAGES

Despite the fact that IT is extremely useful, it has created a space for new threats to privacy and security, since the operation and control of various companies and governments properly resides in these systems.

According to Maroto (2009), “Critical infrastructures, made up of public and private institutions, constitute the nervous system of developed nations. Cyberspace is essential for its operation and, therefore, for the security of the nation ”. The integration of technology in these critical systems makes them vulnerable, being reachable from any point. "An attack against the computer system of a critical infrastructure can generate a lot of damage with minimal risk to the attacker" (Maroto, 2009). The factor of distance and difficulty of identification allows offenders to carry out this type of action.

Despite the vulnerabilities and the critical factor in these systems, Medero (2013) argues that “ICTs have caused an unprecedented revolution. Globalization has shaken the pillars of the institutions and the foundations of our society, to the point of suggesting the birth of another parallel society, which is known as the Society of the

Information and communication". In this sense, it is well known that the internet makes life much easier for us due to its ease and promptness of information.

However, the use to a large extent of technological services affects a large scale if they are not found with adequate security for their operation. The damage caused by a security breach in these systems goes beyond obtaining information. Maroto (2009) affirms that "these networks also control physical facilities, such as electricity transformer stations, hydroelectric power plants, oil and gas pipeline pumps, stock markets, etc." So the economy and security are immediate secondary targets.

CYBERCRIME AND CYBER ESPIONAGE

Cybercrime and cyber espionage are latent problems in the virtual world. Governments and international companies are increasingly concerned about the security of their systems. Unfortunately, the exponential growth of Internet users opens the door to a greater number of "cybercrimes", making it impossible to manage the security of each one of the people.

In this sense, Maroto (2009) states that “At present, attacks in cyberspace have become widespread. Thus, India suffered in 2008 infiltration problems on government websites. According to its analysts, the National Security Council and the

Ministry of Foreign Affairs were raped by Chinese hackers ”. Examples like this generate distrust of international governments. Following a one-day summit in Brasilia this February, negotiators from Brazil and Europe reached an agreement to lay a $ 185 million fiber optic cable spanning the 3,476 miles between Fortaleza and Lisbon. The cable will be built by a consortium of Spanish and Brazilian companies. According to the Economist (2014) "according to the president of Brazil, Dilma Rousseff, it will be" to protect freedom. " No longer will the Internet traffic from South America be routed through Miami, where American spies could see it. "

In these arguments lies an important ethical dilemma. On the one hand we have governments that allude to take care of national security over personal privacy. And on the other hand, the international distrust between the countries due to the espionage that exists between them. In a way, both arguments generate controversy since based on a utilitarian ethic (the best good for the greatest number of people), there is no way to conclude whether cyber espionage is good or bad.

Actions taken by former analyst and computer expert Edward Snowden, former CIA employee and former NSA contractor, have jeopardized the delicate balance of international security in several respects. The accusations made to the North American government for spying on personalities from various countries and millions of citizens, call into question the actions of various international entities.

The forms of questioning that are attributed to the acting of Snowden are different. On the one hand we have the ethical justification. According to Nusshold (2013) “Working is not only producing but transforming the world and transforming oneself. The possibility of discussing and rethinking the rules with which we work will not only allow us to generate better results at a professional level but also to contribute to the world what is right. " Perhaps under this argument Snowden justifies his actions. Upon learning of the PRISM program, his ethical principles and personal values ​​inevitably led him to disclose such information. On the other hand, from an ethical-professional point of view, Snowden acted incorrectly. This, from the perspective of Núñez (2013) “He did not act in accordance with the deontological codes that protect his profession.If it could certainly be argued that Snowden acted freely, on the other hand it would be argued that he did not act responsibly. To be a free man, you first have to be responsible ”.

Despite being accused of espionage and treason, Snowden justifies his actions by pointing out the rights of freedom of expression and privacy that citizens have. Spying on the servers of Google, Facebook, Yahoo! and other large information and communication technology companies, contradict and attack these statutes. It is known that the US government promotes controversial actions from the perspective of international law, human rights, agreements and violation of the sovereignty of other states.

CONCLUSION.

The points covered in this essay are diverse, as well as the solutions to these situations start in different areas. In the first place, the education of users is fundamental in this problem. Although it is not necessary to be experts in the area, it is important to have minimum notions and concepts of security, more than anything good habits when browsing the net. On the other hand, the investment that the government represents for technological development plays an important role. Although it is the companies that develop and administer this technology, the government is in charge of applying and especially legislating on digital rights. The network is an extension of our daily chores and like any other mass-use medium, it must be regulated by the corresponding authorities.Beyond the morbidity of the leaks and the issue of privacy, Ligorría (2013) suggests that “the central point of reflection revolves around the handling of sensitive information”. In this digital age where power revolves around data, the problem in our society revolves around our use of technology.

Bibliography

Allard Young, C. (2013). Evolutions in Cyberlaw. Signal, 14.

Economist. (2014). Thieves in the Night. Economist, 84.

Ligorría, J. (March 7, 2013). Economic America. Obtained from Analysis and Opinion:

www.americaeconomia.com/analisis-opinion/el-caso-snowden-el-protagonismode-la-etica-y-el-crimen

Matthews, O. (2015). Russia's Greatest Weapon May Be Its Hackers. Newsweek.

Núñez, R. (July 1, 2013). Free Journal. Obtained from Diario Libre:

www.diariolibre.com/opinion/el-caso-snowden-asunto-de-traicin-y-ticaBCDL390652

Nusshold, P. (September 1, 2013). THE NATION. Obtained from Economics:

www.lanacion.com.ar/1615843-el-dilema-etico-de-snowden

Singer, PW (2015). Nowhere to Hide. Popular Science, 58-63.

Sorcher, S. (2015). Hacker Challenge Helps NSA Develop Future Cyberwarriors. Christian Science Monitor.

Yan, L. (2015). Is a Cyberwar Coming? Beijing Review.

Maroto, JP (2009). Cyber ​​espionage and cybersecurity. In The violence of the XXI century. New dimensions of war (pp. 45-76). Spanish Institute for Strategic Studies.

Medero, GS (2013). Cyber ​​espionage. Derecom, (13), 9.

Download the original file

Privacy or comfort? cybercrime and the use of IT information technologies