- Published: September 14, 2022
- Updated: September 14, 2022
- University / College: The London School of Economics and Political Science (LSE)
- Language: English
- Downloads: 35
Is it unethical for Mr. Shabaev to have sold the virus application he developed? Provide a descriptive opinion.
It is unethical for Mr. Shabeav to have sold the virus application he developed because this caused a lot to tension and losses to many firms. This is evident because the security experts believed that the software this young Russia developed were of great effect to the security systems. Research through earlier version of the software state that the digital footprint included the name –ree4 and the young Russian sold the software to other people. It was associated with selling of software and email address on the facebook page he had created.
It is also unethical because he offered to sell of the version of a computer virus used against his target. This is evident in the security researchers who tracked the Russia-linked cybercrime. Though he argues that he invented the software for sale and not for his use, it is unethical because this software is used by other specialists to hack security systems.
Most of the companies are committed to offering the highest standards of the products they produce. This is ethical because the commitments and the rule observations are all based on how clear the company believes on ethics.
The business code that implements all the rules and regulations in the company also leads to an expression of core values and a framework for decision making.
The virus damages the target in such a way that the criminals plants a virus in the target’s system and they end up getting all the important information. For instance, the criminal may end up getting all the information on the cards’ magnetic strips, expiration dates, security codes and full names. This leads to lack of confidential information and encourages hacks of the systems. This is a risk on credit cards because thieves only needs the names of the owner and impersonate.
References
Aycock, John Daniel. Computer viruses and malware. New York: Springer, 2006. Print.
Carr, Jeffrey, and Lewis Shepherd. Inside cyber warfare: mapping the cyber underworld. Russia [u. a.: O’Reilly, 2010. Print.