Ethical Aspects of Information Security and Privacy

  • Philip Brey
Part of the Data-Centric Systems and Applications book series (DCSA)

Abstract

This chapter reviews ethical aspects of computer and information security and privacy. After an introduction to ethical approaches to information technology, the focus is first on ethical aspects of computer security. These include the moral importance of computer security, the relation between computer security and national security, the morality of hacking and computer crime, the nature of cyberterrorism and information warfare, and the moral responsibilities of information security professionals. Privacy is discussed next. After a discussion of the moral importance of privacy and the impact of information technology on privacy, privacy issues in various information-processing practices are reviewed. A concluding section ties the two topics together.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    H. Tavani, Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, Wiley, 2004.Google Scholar
  2. 2.
    D. Johnson, Computer Ethics, 3rd edn, Upper Sadle River: Prentice Hall, 2000Google Scholar
  3. 3.
    R. Spinello, H. Tavani, “Security and Cyberspace”, In: Readings in Cyberethics, 1st edn, ed by R. Spinello and H. Tavani, Jones and Bartlett, Sudbury MA, 2001 pp. 443–450Google Scholar
  4. 4.
    D. Halbert, Intellectual Property in the Information Age: The Politics of Expanding Ownership Rights, Quorum, Westport CT, 1999Google Scholar
  5. 5.
    J. Van den Hoven, “Equal Access and Social Justice: Information as a Primary Good” in: Proceedings of ETHICOMP95, vol. 1, DeMontfort University, Leicester UK, 1995Google Scholar
  6. 6.
    J. Bullock, et al, Introduction to Homeland Security, 1st edn, Butterworth-Heinemann, 2005Google Scholar
  7. 7.
    H. Nissenbaum, “Where Computer Security Meets National Security”, Ethics and Information Technology 7, pp. 61–73, 2005CrossRefGoogle Scholar
  8. 8.
    D. Davis, B. Silver, “Civil liberties vs. security: Public opinion in the context of the terrorist attacks on America”, American Journal of Political Science 48(1), pp. 28–46, 2004Google Scholar
  9. 9.
    K. Himma, (ed.), Readings on Internet Security: Hacking, Counterhacking, and Other Moral Issues, Jones & Bartlett, forthcomingGoogle Scholar
  10. 10.
    S. Levy, Hackers: Heroes of the Computer Revolution, Doubleday, Garden City NY, 1984Google Scholar
  11. 11.
    P. Himanen, The Hacker Ethic: A Radical Approach to the Philosophy of Business, Random House, New York, 2001Google Scholar
  12. 12.
    S. McQuade, Understanding and Managing Cybercrime, Allyn & Bacon, 2005Google Scholar
  13. 13.
    D. Mainon, A. Goodrum, “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic”, Computers and Society, 30(2), pp. 14–19, 2000Google Scholar
  14. 14.
    D. Denning, “Activism, Hacktivism, and Cyberterrorism: the Internet as a Tool for Influencing Foreign Policy”, In Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. J. Arquilla, D. Ronfeldt, Rand Corporation, 2002. Available at http://www.rand.org/publications/MR/MR1382/Google Scholar
  15. 15.
    D. Denning, Information Warfare and Security, Addison-Wesley, Reading MA, 1999Google Scholar
  16. 16.
    G. Rattray, Strategic Warfare in Cyberspace, MIT Press, Cambridge MA, 2001Google Scholar
  17. 17.
    ISSA, “ISSA Code of Ethics”, In Information Systems Security Association, Available at: http://www.issa.org/codeofethics.html 2005Google Scholar
  18. 18.
    T. Bynum, S. Rogerson (eds.), Computer Ethics and Professional Responsibility: Introductory Text and Readings, Blackwell, 2003Google Scholar
  19. 19.
    S. Warren, L. Brandeis, The Right to Privacy, Harvard Law Review 4, pp. 193–220, 1890CrossRefGoogle Scholar
  20. 20.
    F. Schoeman, “Introduction”, In Philosophical Dimensions of Privacy: An Anthology, ed. F. Schoeman, Cambridge University Press, Cambridge UK, 1984Google Scholar
  21. 21.
    P. Brey, “The Importance of Privacy in the Workplace”, In The Ethics of Privacy in the Workplace, ed. S. O. Hansson, E. Palm, Peter Lang, Brussels, 2005 pp. 97–118Google Scholar
  22. 22.
    J. Moor, “Towards a Theory of Privacy for the Information Age”, Computers and Society 27(3), pp. 27–32, 1997Google Scholar
  23. 23.
    A. Westin, Privacy and Freedom, Atheneum, New York, 1967Google Scholar
  24. 24.
    D. Lyon, Surveillance Society. Monitoring Everyday Life, Open University Press, Buckingham UK, 2001Google Scholar
  25. 25.
    R. Clarke, Information Technology and Dataveillance, Communications of the ACM 31(5), pp. 498–512, 1988CrossRefGoogle Scholar
  26. 26.
    S. Hansson, E. Palm, (eds.), The Ethics of Privacy in the Workplace, Peter Lang, Brussels, 2005Google Scholar
  27. 27.
    M. Steward, “Electronic Medical Records-Privacy, Confidentiality, Liability”, Journal of Legal Medicine 26(4), pp. 491–506, 2005CrossRefGoogle Scholar
  28. 28.
    G._T. Laurie, Genetic Privacy: A Challenge to Medico-Legal Norms, Cambridge University Press, Cambridge UK, 2002Google Scholar
  29. 29.
    C. Bennett, “Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web”, Ethics and Information Technology 3(3), pp. 195–208, 2001CrossRefGoogle Scholar
  30. 30.
    L. van Wel, L. Royakker, “Ethical Issues in Web Data Mining”, Ethics and Information Technology 6, pp. 129–140, 2004CrossRefGoogle Scholar
  31. 31.
    H. Nissenbaum, “Protecting Privacy in an Information Age: The Problem of Privacy in Public” Law and Philosophy 17: pp. 559–596, 1998Google Scholar
  32. 32.
    P. Brey, “Ethical Aspects of Face Recognition Systems in Public Places”, In Readings in Cyberethics, 2nd edn, ed. by R. Spinello, H. Tavani, Jones and Bartlett, Sudbury, MA, 2004, pp. 585–600Google Scholar
  33. 33.
    R. Clarke, “Biometrics and Privacy”, 2001, Available at: http://www.anu.edu.au/people/Roger.Clarke/DV/Biometrics.htmlGoogle Scholar
  34. 34.
    W. Weber, J. Rabaey, E. Aarts, (eds.): Ambient Intelligence, Springer, Berlin Heidelberg New York, 2005Google Scholar
  35. 35.
    M. Langheinrich, “Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems”, In Lecture Notes In Computer Science; Vol. 2201 Archive, Springer, Berlin Heidelberg New York, 2001, pp. 273–291Google Scholar
  36. 36.
    P. Brey, “Freedom and Privacy in Ambient Intelligence, Ethics and Information Technology 7, pp. 157–166, 2006CrossRefGoogle Scholar
  37. 37.
    H. Nissenbaum, “Values in Technical Design”, In Encyclopedia of Science, Technology and Society, ed. by C. Mitcham, MacMillan, New York, 2005, lxvi–lxxGoogle Scholar
  38. 38.
    P. Brey, “Disclosive Computer Ethics”, Computers and Society 30(4), 10–16, 2000Google Scholar
  39. 39.
    B. Friedman, “Value Sensitive Design”, Encyclopedia of Human-Computer Interaction, Great Barrington, MA: Berkshire, 2004, pp. 769–774Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Philip Brey
    • 1
  1. 1.University of TwenteThe Netherlands

Personalised recommendations