Advertisement

Towards an Ethical Security Platform

  • Scott CadzowEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10901)

Abstract

The world of Information & Communications Technology (ICT) security has been dominated by the Confidentiality Integrity Availability (CIA) paradigm for several decades now and has been very effective in countering relatively simple document based security threats of masquerade, exposure of confidential data, and verification of integrity. Unfortunately real world security problems are not discrete or document based but are complex multi-domain, multi-value ones. In such environments the conventional CIA paradigm is no longer the ideal fit and in particular as we become more reliant on ICT for living support then hard security in the context of CIA needs to be reconsidered. This means taking into account issues that are traditionally “soft” such as Ethics and Dignity and making them “hard” and developing solutions that allow us to treat them. Our starting position is that humans design, operate and are the net beneficiaries of most systems. However humans are fallible and make mistakes. At the same time humans are adaptable and resourceful in both designing systems and correcting them when they go wrong. In contrast machines have in the main been designed to follow rules and are often constrained to produce the same output for the same input over and over again. As we move towards autonomous and intelligent machines the older models of ICT and ICT security based on the CIA paradigm, or deterministic code execution become more and more challenged. Into this mix we then bring a requirement for making ethical decisions.

Keywords

Security Safety Ethics Artificial Intelligence Machine Learning 

Notes

Acknowledgements

Contributions made by the author in development of this paper have in part been supported by EU projects i-locate (grant number 621040), SUNSHINE (grant number 325161) and UNCAP (grant number 643555).

References

  1. [E-TVRA]
  2. [JOHARI]
    Luft, J., Ingham, H.: The Johari window, a graphic model of interpersonal awareness. In: Proceedings of the Western Training Laboratory in Group Development, Los Angeles (1955)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Cadzow Communications Consulting Ltd.SawbridgeworthUK

Personalised recommendations