Skip to main content

Part of the book series: Data-Centric Systems and Applications ((DCSA))

Abstract

This chapter reviews ethical aspects of computer and information security and privacy. After an introduction to ethical approaches to information technology, the focus is first on ethical aspects of computer security. These include the moral importance of computer security, the relation between computer security and national security, the morality of hacking and computer crime, the nature of cyberterrorism and information warfare, and the moral responsibilities of information security professionals. Privacy is discussed next. After a discussion of the moral importance of privacy and the impact of information technology on privacy, privacy issues in various information-processing practices are reviewed. A concluding section ties the two topics together.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. H. Tavani, Ethics and Technology: Ethical Issues in an Age of Information and Communication Technology, Wiley, 2004.

    Google Scholar 

  2. D. Johnson, Computer Ethics, 3rd edn, Upper Sadle River: Prentice Hall, 2000

    Google Scholar 

  3. R. Spinello, H. Tavani, “Security and Cyberspace”, In: Readings in Cyberethics, 1st edn, ed by R. Spinello and H. Tavani, Jones and Bartlett, Sudbury MA, 2001 pp. 443–450

    Google Scholar 

  4. D. Halbert, Intellectual Property in the Information Age: The Politics of Expanding Ownership Rights, Quorum, Westport CT, 1999

    Google Scholar 

  5. J. Van den Hoven, “Equal Access and Social Justice: Information as a Primary Good” in: Proceedings of ETHICOMP95, vol. 1, DeMontfort University, Leicester UK, 1995

    Google Scholar 

  6. J. Bullock, et al, Introduction to Homeland Security, 1st edn, Butterworth-Heinemann, 2005

    Google Scholar 

  7. H. Nissenbaum, “Where Computer Security Meets National Security”, Ethics and Information Technology 7, pp. 61–73, 2005

    Article  Google Scholar 

  8. D. Davis, B. Silver, “Civil liberties vs. security: Public opinion in the context of the terrorist attacks on America”, American Journal of Political Science 48(1), pp. 28–46, 2004

    Google Scholar 

  9. K. Himma, (ed.), Readings on Internet Security: Hacking, Counterhacking, and Other Moral Issues, Jones & Bartlett, forthcoming

    Google Scholar 

  10. S. Levy, Hackers: Heroes of the Computer Revolution, Doubleday, Garden City NY, 1984

    Google Scholar 

  11. P. Himanen, The Hacker Ethic: A Radical Approach to the Philosophy of Business, Random House, New York, 2001

    Google Scholar 

  12. S. McQuade, Understanding and Managing Cybercrime, Allyn & Bacon, 2005

    Google Scholar 

  13. D. Mainon, A. Goodrum, “Terrorism or Civil Disobedience: Toward a Hacktivist Ethic”, Computers and Society, 30(2), pp. 14–19, 2000

    Google Scholar 

  14. D. Denning, “Activism, Hacktivism, and Cyberterrorism: the Internet as a Tool for Influencing Foreign Policy”, In Networks and Netwars: The Future of Terror, Crime, and Militancy, ed. J. Arquilla, D. Ronfeldt, Rand Corporation, 2002. Available at http://www.rand.org/publications/MR/MR1382/

    Google Scholar 

  15. D. Denning, Information Warfare and Security, Addison-Wesley, Reading MA, 1999

    Google Scholar 

  16. G. Rattray, Strategic Warfare in Cyberspace, MIT Press, Cambridge MA, 2001

    Google Scholar 

  17. ISSA, “ISSA Code of Ethics”, In Information Systems Security Association, Available at: http://www.issa.org/codeofethics.html 2005

    Google Scholar 

  18. T. Bynum, S. Rogerson (eds.), Computer Ethics and Professional Responsibility: Introductory Text and Readings, Blackwell, 2003

    Google Scholar 

  19. S. Warren, L. Brandeis, The Right to Privacy, Harvard Law Review 4, pp. 193–220, 1890

    Article  Google Scholar 

  20. F. Schoeman, “Introduction”, In Philosophical Dimensions of Privacy: An Anthology, ed. F. Schoeman, Cambridge University Press, Cambridge UK, 1984

    Google Scholar 

  21. P. Brey, “The Importance of Privacy in the Workplace”, In The Ethics of Privacy in the Workplace, ed. S. O. Hansson, E. Palm, Peter Lang, Brussels, 2005 pp. 97–118

    Google Scholar 

  22. J. Moor, “Towards a Theory of Privacy for the Information Age”, Computers and Society 27(3), pp. 27–32, 1997

    Google Scholar 

  23. A. Westin, Privacy and Freedom, Atheneum, New York, 1967

    Google Scholar 

  24. D. Lyon, Surveillance Society. Monitoring Everyday Life, Open University Press, Buckingham UK, 2001

    Google Scholar 

  25. R. Clarke, Information Technology and Dataveillance, Communications of the ACM 31(5), pp. 498–512, 1988

    Article  Google Scholar 

  26. S. Hansson, E. Palm, (eds.), The Ethics of Privacy in the Workplace, Peter Lang, Brussels, 2005

    Google Scholar 

  27. M. Steward, “Electronic Medical Records-Privacy, Confidentiality, Liability”, Journal of Legal Medicine 26(4), pp. 491–506, 2005

    Article  Google Scholar 

  28. G._T. Laurie, Genetic Privacy: A Challenge to Medico-Legal Norms, Cambridge University Press, Cambridge UK, 2002

    Google Scholar 

  29. C. Bennett, “Cookies, Web Bugs, Webcams and Cue Cats: Patterns of Surveillance on the World Wide Web”, Ethics and Information Technology 3(3), pp. 195–208, 2001

    Article  Google Scholar 

  30. L. van Wel, L. Royakker, “Ethical Issues in Web Data Mining”, Ethics and Information Technology 6, pp. 129–140, 2004

    Article  Google Scholar 

  31. H. Nissenbaum, “Protecting Privacy in an Information Age: The Problem of Privacy in Public” Law and Philosophy 17: pp. 559–596, 1998

    Google Scholar 

  32. P. Brey, “Ethical Aspects of Face Recognition Systems in Public Places”, In Readings in Cyberethics, 2nd edn, ed. by R. Spinello, H. Tavani, Jones and Bartlett, Sudbury, MA, 2004, pp. 585–600

    Google Scholar 

  33. R. Clarke, “Biometrics and Privacy”, 2001, Available at: http://www.anu.edu.au/people/Roger.Clarke/DV/Biometrics.html

    Google Scholar 

  34. W. Weber, J. Rabaey, E. Aarts, (eds.): Ambient Intelligence, Springer, Berlin Heidelberg New York, 2005

    Google Scholar 

  35. M. Langheinrich, “Privacy by Design-Principles of Privacy-Aware Ubiquitous Systems”, In Lecture Notes In Computer Science; Vol. 2201 Archive, Springer, Berlin Heidelberg New York, 2001, pp. 273–291

    Google Scholar 

  36. P. Brey, “Freedom and Privacy in Ambient Intelligence, Ethics and Information Technology 7, pp. 157–166, 2006

    Article  Google Scholar 

  37. H. Nissenbaum, “Values in Technical Design”, In Encyclopedia of Science, Technology and Society, ed. by C. Mitcham, MacMillan, New York, 2005, lxvi–lxx

    Google Scholar 

  38. P. Brey, “Disclosive Computer Ethics”, Computers and Society 30(4), 10–16, 2000

    Google Scholar 

  39. B. Friedman, “Value Sensitive Design”, Encyclopedia of Human-Computer Interaction, Great Barrington, MA: Berkshire, 2004, pp. 769–774

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Brey, P. (2007). Ethical Aspects of Information Security and Privacy. In: Petković, M., Jonker, W. (eds) Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69861-6_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69861-6_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69860-9

  • Online ISBN: 978-3-540-69861-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics