Jude Osamor
Ethical implications of WannaCry: A cybersecurity dilemma
Osamor, Jude; Odum, Jane; Iwendi, Celestine; Olajide, Funminiyi; Peter-Osamor, Isaac; Onyenagubom, Victor; Ayodele, Innocent
Authors
Jane Odum
Celestine Iwendi
Funminiyi Olajide
Isaac Peter-Osamor
Victor Onyenagubom
Innocent Ayodele
Abstract
The WannaCry ransomware attack of May 2017 marked a critical turning point in cybersecurity history, prompting profound ethical discussions about software vulnerability management. This comprehensive analysis examines the ethical dimensions of the WannaCry incident, focusing on the responsibilities of government agencies, technology companies, and security professionals in handling zero-day vulnerabilities. The study investigates the complex balance between national security interests and global cybersecurity while proposing ethical frameworks for future practice. Through a detailed examination of the attack's global impact and subsequent incidents, we demonstrate the ongoing relevance of lessons learned from WannaCry to contemporary cybersecurity challenges.
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 20th International Conference on Cyber Warfare and Security (ICCWS 2025) |
Start Date | Mar 28, 2025 |
End Date | Mar 29, 2025 |
Acceptance Date | Mar 3, 2025 |
Online Publication Date | Mar 24, 2025 |
Publication Date | Mar 24, 2025 |
Deposit Date | Mar 30, 2025 |
Publicly Available Date | Apr 1, 2025 |
Journal | International Conference on Cyber Warfare and Security |
Peer Reviewed | Peer Reviewed |
Volume | 20 |
Issue | 1 |
Pages | 354-360 |
Series ISSN | 2048-9889 |
Book Title | Proceedings of the 20th International Conference on Cyber Warfare and Security, ICCWS 2025 |
ISBN | 9781917204316 |
DOI | https://doi.org/10.34190/iccws.20.1.3353 |
Public URL | https://uwe-repository.worktribe.com/output/14152180 |
Files
Ethical Implications of WannaCry: A Cybersecurity Dilemma
(1.1 Mb)
PDF
Licence
http://creativecommons.org/licenses/by-nc-nd/4.0/
Publisher Licence URL
http://creativecommons.org/licenses/by-nc-nd/4.0/
You might also like
The evolution of phishing and future directions: A review
(2025)
Presentation / Conference Contribution
A machine learning-based intrusion detection algorithm for securing bioinformatics pipelines
(2025)
Presentation / Conference Contribution
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search