Abstract
This chapter reviews ethical aspects of computer and information security and privacy. After an introduction to ethical approaches to information technology, the focus is first on ethical aspects of computer security. These include the moral importance of computer security, the relation between computer security and national security, the morality of hacking and computer crime, the nature of cyberterrorism and information warfare, and the moral responsibilities of information security professionals. Privacy is discussed next. After a discussion of the moral importance of privacy and the impact of information technology on privacy, privacy issues in various information-processing practices are reviewed. A concluding section ties the two topics together.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
H. Tavani, Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, Wiley, 2004.
D. Johnson, Computer Ethics, 3rd edn, Upper Sadle River: Prentice Hall, 2000
R. Spinello, H. Tavani, “Security and Cyberspace”, In: Readings in Cyberethics, 1st edn, ed by R. Spinello and H. Tavani, Jones and Bartlett, Sudbury MA, 2001 pp. 443–450
D. Halbert, Intellectual Property in the Information Age: The Politics of Expanding Ownership Rights, Quorum, Westport CT, 1999
J. Van den Hoven, “Equal Access and Social Justice: Information as a Primary Good” in: Proceedings of ETHICOMP95, vol. 1, DeMontfort University, Leicester UK, 1995
J. Bullock, et al, Introduction to Homeland Security, 1st edn, Butterworth-Heinemann, 2005
H. Nissenbaum, “Where Computer Security Meets National Security”, Ethics and Information Technology 7, pp. 61–73, 2005
D. Davis, B. Silver, “Civil liberties vs. security: Public opinion in the context of the terrorist attacks on America”, American Journal of Political Science 48(1), pp. 28–46, 2004
K. Himma, (ed.), Readings on Internet Security: Hacking, Counterhacking, and Other Moral Issues, Jones & Bartlett, forthcoming
S. Levy, Hackers: Heroes of the Computer Revolution, Doubleday, Garden City NY, 1984
P. Himanen, The Hacker Ethic: A Radical Approach to the Philosophy of Business, Random House, New York, 2001
S. McQuade, Understanding and Managing Cybercrime, Allyn & Bacon, 2005
D. Mainon, A. Goodrum, “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic”, Computers and Society, 30(2), pp. 14–19, 2000
D. Denning, “Activism, Hacktivism, and Cyberterrorism: the Internet as a Tool for Influencing Foreign Policy”, In Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. J. Arquilla, D. Ronfeldt, Rand Corporation, 2002. Available at http://www.rand.org/publications/MR/MR1382/
D. Denning, Information Warfare and Security, Addison-Wesley, Reading MA, 1999
G. Rattray, Strategic Warfare in Cyberspace, MIT Press, Cambridge MA, 2001
ISSA, “ISSA Code of Ethics”, In Information Systems Security Association, Available at: http://www.issa.org/codeofethics.html 2005
T. Bynum, S. Rogerson (eds.), Computer Ethics and Professional Responsibility: Introductory Text and Readings, Blackwell, 2003
S. Warren, L. Brandeis, The Right to Privacy, Harvard Law Review 4, pp. 193–220, 1890
F. Schoeman, “Introduction”, In Philosophical Dimensions of Privacy: An Anthology, ed. F. Schoeman, Cambridge University Press, Cambridge UK, 1984
P. Brey, “The Importance of Privacy in the Workplace”, In The Ethics of Privacy in the Workplace, ed. S. O. Hansson, E. Palm, Peter Lang, Brussels, 2005 pp. 97–118
J. Moor, “Towards a Theory of Privacy for the Information Age”, Computers and Society 27(3), pp. 27–32, 1997
A. Westin, Privacy and Freedom, Atheneum, New York, 1967
D. Lyon, Surveillance Society. Monitoring Everyday Life, Open University Press, Buckingham UK, 2001
R. Clarke, Information Technology and Dataveillance, Communications of the ACM 31(5), pp. 498–512, 1988
S. Hansson, E. Palm, (eds.), The Ethics of Privacy in the Workplace, Peter Lang, Brussels, 2005
M. Steward, “Electronic Medical Records-Privacy, Confidentiality, Liability”, Journal of Legal Medicine 26(4), pp. 491–506, 2005
G._T. Laurie, Genetic Privacy: A Challenge to Medico-Legal Norms, Cambridge University Press, Cambridge UK, 2002
C. Bennett, “Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web”, Ethics and Information Technology 3(3), pp. 195–208, 2001
L. van Wel, L. Royakker, “Ethical Issues in Web Data Mining”, Ethics and Information Technology 6, pp. 129–140, 2004
H. Nissenbaum, “Protecting Privacy in an Information Age: The Problem of Privacy in Public” Law and Philosophy 17: pp. 559–596, 1998
P. Brey, “Ethical Aspects of Face Recognition Systems in Public Places”, In Readings in Cyberethics, 2nd edn, ed. by R. Spinello, H. Tavani, Jones and Bartlett, Sudbury, MA, 2004, pp. 585–600
R. Clarke, “Biometrics and Privacy”, 2001, Available at: http://www.anu.edu.au/people/Roger.Clarke/DV/Biometrics.html
W. Weber, J. Rabaey, E. Aarts, (eds.): Ambient Intelligence, Springer, Berlin Heidelberg New York, 2005
M. Langheinrich, “Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems”, In Lecture Notes In Computer Science; Vol. 2201 Archive, Springer, Berlin Heidelberg New York, 2001, pp. 273–291
P. Brey, “Freedom and Privacy in Ambient Intelligence, Ethics and Information Technology 7, pp. 157–166, 2006
H. Nissenbaum, “Values in Technical Design”, In Encyclopedia of Science, Technology and Society, ed. by C. Mitcham, MacMillan, New York, 2005, lxvi–lxx
P. Brey, “Disclosive Computer Ethics”, Computers and Society 30(4), 10–16, 2000
B. Friedman, “Value Sensitive Design”, Encyclopedia of Human-Computer Interaction, Great Barrington, MA: Berkshire, 2004, pp. 769–774
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Brey, P. (2007). Ethical Aspects of Information Security and Privacy. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-69861-6_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69860-9
Online ISBN: 978-3-540-69861-6
eBook Packages: Computer ScienceComputer Science (R0)