Socio-Technical Influences of Cyber Espionage: A Case Study of the GhostNet System

نویسندگان

  • Xue Lin
  • Rocci Luppicini
چکیده

Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other government offices in 103 countries and infected at least 1,295 computers. The following case study explores the influences of GhostNet on affected organizations by critically reviewing GhostNet documentation and relevant literature on cyber espionage. The research delves into the socio-technical aspects of cyber espionage through a case study of GhostNet. Drawing on Actor Network Theory (ANT), the research examined key socio-technical relations of Ghostnet and their influence on affected organizations. Implications of these findings for the phenomenon of GhostNet are discussed in the hope of raising awareness about the importance of understanding the dynamics of socio-technical relations of cyber-espionage within organizations. DOI: 10.4018/978-1-4666-2931-8.ch009

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Espionage and Illegitimate Information Retrieval

One of the most serious threats to a modern country’s trade, industry and long-term economic development is cyber espionage and insiders. The activities are directed against high-technological industries and companies with advanced basic research. The defence and telecoms sectors are of particular interest, just as biotechnics, medical and material technology. Behind this kind of espionage ther...

متن کامل

The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism

The recent emergence of the targeted use of malware in cyber espionage versus industry requires a systematic review for better understanding of its impact and mechanism. This paper proposes a basic taxonomy to document major cyber espionage incidents, describing and comparing their impacts (geographic or political targets, origins and motivations) and their mechanisms (dropper, propagation, typ...

متن کامل

Socio-Cultural and Technical Issues in Non-Expert Dubbing: A Case Study

Advances in computer sciences and the emergence of innovative technologies have entered numerous new elements of change in translation industry, such as the inseparable usage of software programs in audiovisual translation. Initiated by the expanding reality of fandubbing in Iran, the present article aimed at illuminating this practice into Persian in the Iranian context to partly address the l...

متن کامل

Language and the Socio-Cultural Worlds of Those Who Use it: A Case of Vague Expressions

 The present study is an attempt to investigate the use of vague expressions by intermediate EFL learners. More specifically, the current study focuses on the structures and functions of one of the most common categories of vague language, i.e. general extenders. The data include a 22-hour corpus of English-as-a-foreign-language conversations. A comparison is also made between this corpus and a...

متن کامل

The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

Along with the USA and Russia, China is often considered one of the leading cyberpowers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990’s, influenced their cyber-operations in the early 2000’s. In particular, we examine the ideas of Unrestricted Warfare and Active Offense and discuss how they can permit for the theft of intellectual property. We the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJT

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011