{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T23:40:47Z","timestamp":1713051647746},"reference-count":34,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4,1]]},"abstract":"<p>Technoethical inquiry deals with a variety of social, legal, cultural, economic, political, and ethical implications of new technological applications which can threaten important aspects of contemporary life and society. GhostNet is a large-scale cyber espionage network which has infiltrated important political, economic, and media institutions including embassies, foreign ministries and other government offices in 103 countries and infected at least 1,295 computers. The following case study explores the influences of GhostNet on affected organizations by critically reviewing GhostNet documentation and relevant literature on cyber espionage. The research delves into the socio-technical aspects of cyber espionage through a case study of GhostNet. Drawing on Actor Network Theory (ANT), the research examined key socio-technical relations of Ghostnet and their influence on affected organizations. Implications of these findings for the phenomenon of GhostNet are discussed in the hope of raising awareness about the importance of understanding the dynamics of socio-technical relations of cyber-espionage within organizations.<\/p>","DOI":"10.4018\/jte.2011040105","type":"journal-article","created":{"date-parts":[[2011,10,19]],"date-time":"2011-10-19T16:52:27Z","timestamp":1319043147000},"page":"65-77","source":"Crossref","is-referenced-by-count":0,"title":["Socio-Technical Influences of Cyber Espionage"],"prefix":"10.4018","volume":"2","author":[{"given":"Xue","family":"Lin","sequence":"first","affiliation":[{"name":"University of Ottawa, Canada"}]},{"given":"Rocci","family":"Luppicini","sequence":"additional","affiliation":[{"name":"University of Ottawa, Canada"}]}],"member":"2432","reference":[{"key":"jte.2011040105-0","unstructured":"Armin, J. (2009). Hacker deploys cloud to smash passwords. Retrieved from http:\/\/news.hostexploit.com\/cyber-security-news\/4739-hacker-deploys-cloud-to-smash-passwords.html"},{"key":"jte.2011040105-1","author":"P.Bocij","year":"2006","journal-title":"The dark side of the Internet"},{"issue":"1","key":"jte.2011040105-2","doi-asserted-by":"crossref","first-page":"96","DOI":"10.5840\/monist197760134","article-title":"Towards a technoethics.","volume":"60","author":"M.Bunge","year":"1977","journal-title":"The Monist"},{"key":"jte.2011040105-3","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-1-349-07408-2_2","article-title":"The sociology of an actor-network: The case of the electric vehicle","author":"M.Callon","year":"1986","journal-title":"Mapping the dynamics of science and technology"},{"key":"jte.2011040105-4","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293475"},{"key":"jte.2011040105-5","author":"H.Cooper","year":"2010","journal-title":"Research synthesis & meta-analysis: A step-by-step approach"},{"key":"jte.2011040105-6","author":"P.Cornish","year":"2009","journal-title":"Cyber security and politically, socially and religiously motivated cyber attacks"},{"key":"jte.2011040105-7","author":"J.Creswell","year":"2007","journal-title":"Qualitative inquiry & research design: Choosing among five approaches"},{"key":"jte.2011040105-8","author":"J.Creswell","year":"2009","journal-title":"Research design, qualitative, quantitative, and mixed methods approaches"},{"key":"jte.2011040105-9","doi-asserted-by":"crossref","unstructured":"Dartnell, M. (2003). Weapons of mass instruction: Web activism and the transformation of global security. Millennium: Journal of International Studies, 477-499.","DOI":"10.1177\/03058298030320030701"},{"key":"jte.2011040105-10","unstructured":"F-Secure. (2003). Iraq War and information security. Retrieved from http:\/\/www.fsecure.com\/virus-info\/iraq.shtml"},{"key":"jte.2011040105-11","doi-asserted-by":"publisher","DOI":"10.4018\/9781591408727.ch002"},{"key":"jte.2011040105-12","first-page":"257","article-title":"The Internet and varieties of moral wrongdoing","author":"V. D. J.Hoven","year":"2000","journal-title":"Internet ethics"},{"key":"jte.2011040105-13","year":"2009","journal-title":"Tracking GhostNet: Investigating a cyber espionage network"},{"key":"jte.2011040105-14","unstructured":"Information Warfare Monitor & Shadowserver Foundation. (2010). Shadows in the cloud: Investigating cyber espionage 2.0. Retrieved from: http:\/\/shadows-in-the-cloud.net"},{"key":"jte.2011040105-15","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1648.003.0003","article-title":"The rise of law on the global network","author":"D.Johnson","year":"1997","journal-title":"Borders in cyberspace"},{"key":"jte.2011040105-16","first-page":"13","article-title":"Ontology for cross-organizational communication.","author":"T.Kurokawa","year":"2007","journal-title":"The Quarterly Review"},{"key":"jte.2011040105-17","doi-asserted-by":"crossref","unstructured":"Latour, B. (1991). Technology is society made durable. In J. Law (Ed.), A sociology of monsters: Essays on power, technology and domination (pp. 196-233). London, UK: Routledge. Law, J. Law, J. (1999). After ANT: Complexity, naming and topology. The Sociological Review, 46, 1-14.","DOI":"10.1111\/1467-954X.46.s.1"},{"key":"jte.2011040105-18","first-page":"1","article-title":"Introducing technoethics","author":"R.Luppicini","year":"2008","journal-title":"Handbook of research on technoethics"},{"issue":"1","key":"jte.2011040105-19","first-page":"5","article-title":"Technoethical inquiry: From technological systems to society.","volume":"2","author":"R.Luppicini","year":"2009","journal-title":"Global Media Journal"},{"key":"jte.2011040105-20","doi-asserted-by":"publisher","DOI":"10.1108\/09593840410542510"},{"key":"jte.2011040105-21","doi-asserted-by":"publisher","DOI":"10.4018\/9781591408727.ch014"},{"key":"jte.2011040105-22","doi-asserted-by":"publisher","DOI":"10.2307\/248873"},{"key":"jte.2011040105-23","unstructured":"Micro, T. (2009). Data-stealing malware on the rise\u2014solutions to keep businesses and consumers safe. Retrived from http:\/\/us.trendmicro.com\/imperia\/md\/content\/us\/pdf\/threats\/securitylibrary\/data_stealing_malware_focus_report_-_june_2009.pdf"},{"key":"jte.2011040105-24","unstructured":"Mills, E. (2010). Report unearths targeted attacks on oil firms. Retrieved from http:\/\/news.cnet.com\/security\/?keyword=espionage"},{"key":"jte.2011040105-25","unstructured":"Nagaraja, S., & Anderson, R. (2009). Snooping dragon: Social malware surveillance of the Tibetan movement (Tech. Rep. No. 746). Cambridge, UK: University of Cambridge."},{"key":"jte.2011040105-26","doi-asserted-by":"crossref","DOI":"10.5040\/9798216006688","author":"A. R.Spinello","year":"2002","journal-title":"Regulating cyberspace: The policies and technologies of control"},{"key":"jte.2011040105-27","author":"R. M.Stair","year":"1996","journal-title":"Principles of information systems: A managerial approach"},{"key":"jte.2011040105-28","author":"K.Stephens","year":"2010","journal-title":"Cyber espionage: Is the United States getting more than its giving?"},{"key":"jte.2011040105-29","unstructured":"Stevens, S. (2010). Google studies. Retrieved from http:\/\/www.discoverdecaturil.com\/"},{"key":"jte.2011040105-30","author":"D.Wall","year":"2003","journal-title":"Cyberspace crime"},{"key":"jte.2011040105-31","doi-asserted-by":"publisher","DOI":"10.1080\/713999739"},{"key":"jte.2011040105-32","first-page":"71","article-title":"Botnets, cybercrime, and cyberterrorism: Vulnerabilities and policy issues for Congress","author":"C.Wilson","year":"2009","journal-title":"Cybersecurity, botnets, and cyberterrorism"},{"key":"jte.2011040105-33","author":"R. K.Yin","year":"2003","journal-title":"Case study resarch: Design and methods"}],"container-title":["International Journal of Technoethics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=54756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,13]],"date-time":"2024-04-13T22:32:36Z","timestamp":1713047556000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jte.2011040105"}},"subtitle":["A Case Study of the GhostNet System"],"short-title":[],"issued":{"date-parts":[[2011,4,1]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jte.2011040105","relation":{},"ISSN":["1947-3451","1947-346X"],"issn-type":[{"value":"1947-3451","type":"print"},{"value":"1947-346X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,4,1]]}}}