Security for the Digital World Within an Ethical Framework


Book Description

People now view digital services and applications as an essential part of their lives and as carriers of great benefits. Nevertheless, because they provide a new space for criminals, terrorists and others with malicious intent, digital technologies also present significant threats. How can we maintain the freedom and benefits offered by the digital ecosystem while also building into that system safeguards against attacks? The Digital Enlightenment Forum (DigEnlight) takes the view that the new regulatory and legal safeguards required for our digital world must be developed within a framework that incorporates what they call 'digital ethics'. This White Book attempts to draw together the various strands which have emerged from the intense debate within DigEnlight over the last three years. It focuses on how we can negotiate the changing emergent behavior and ethical issues that arise at the heart of debates about the digital world, covering areas such as national security, internet governance, and approaches to privacy and trust, as well as making recommendations to help realize a global social compact for digital security and privacy based on ethical principles. The book represents a meaningful contribution to the ongoing efforts to deal with these important issues, and will be of interest to all those with concerns about the future of our digital world.




The Code of Honor


Book Description

A comprehensive and practical framework for ethical practices in contemporary cybersecurity While some professions – including medicine, law, and engineering – have wholeheartedly embraced wide-ranging codes of ethics and conduct, the field of cybersecurity continues to lack an overarching ethical standard. This vacuum constitutes a significant threat to the safety of consumers and businesses around the world, slows commerce, and delays innovation. The Code of Honor: Embracing Ethics in Cybersecurity delivers a first of its kind comprehensive discussion of the ethical challenges that face contemporary information security workers, managers, and executives. Authors Ed Skoudis, President of the SANS Technology Institute College and founder of the Counter Hack team, and Dr. Paul Maurer, President of Montreat College, explain how timeless ethical wisdom gives birth to the Cybersecurity Code which is currently being adopted by security practitioners and leaders around the world. This practical book tells numerous engaging stories that highlight ethically complex situations many cybersecurity and tech professionals commonly encounter. It also contains compelling real-world case studies – called Critical Applications – at the end of each chapter that help the reader determine how to apply the hands-on skills described in the book. You'll also find: A complete system of cybersecurity ethics relevant to C-suite leaders and executives, front-line cybersecurity practitioners, and students preparing for careers in cybersecurity. Carefully crafted frameworks for ethical decision-making in cybersecurity. Timeless principles based on those adopted in countless professions, creeds, and civilizations. Perfect for security leaders, operations center analysts, incident responders, threat hunters, forensics personnel, and penetration testers, The Code of Honor is an up-to-date and engaging read about the ethically challenging world of modern cybersecurity that will earn a place in the libraries of aspiring and practicing professionals and leaders who deal with tech every day.




Internet Communication and Qualitative Research


Book Description

`Internet Communication and Qualitative Research is a trailblazing introduction to data sources that will come to the fore in the new millennium. Its cogent discussion of the techniques, ethics and methods of analysis of Internet data should be read by every qualitative researcher′ - David Silverman, Goldsmiths College `The internet is exploding with possibilities for conducting social research. Mann and Stewart offer the first in-depth consideration of the prospects and potentials for doing qualitative research on-line. This wide ranging, clearly-written book is essential reading for researchers working at the cutting edge of qualitative methodology′ - James A. Holstein, Marquette University `This is e-scholarship. The book is a transformative project which brings the best skills of the old print scholarship to the cyberworld. The authors are no mere theoreticians - but hands-on net-users, who have made the imaginative leap to the dot.com world, and who have mapped the way for net research and researchers. The authors are pioneers in the realm of digit-crit - opening the way with their critical evaluation of the digital media and net research. They profile the skills required by the online researcher and evaluate the context in which they are used - in relation to privacy, security, ethics and legal considerations. They also take up issues of power; they explore the social and political implications of the digital media, (with specific reference to gender) and the role of the online researcher. An absolute must for cybercitizens and an indispensable guide for students, researchers, and knowledge workers in the dot.com world′ - Dale Spender `Mann and Stewart have prized open the mysteries of on-line qualitative research. For those new to this methodology the technology review demystifies; the social science research ethics issues are re-addressed with reference to the on-line situation; methods of conducting online focus groups and interviews, in particular, are detailed. The tone is both analytical and practical with a host of techniques suggested. I recommend this accessible text for all qualitative researchers, both academic and practitioner′ - Rehan Ul-Haq, University of Birmingham Business School `Here is the clear, useful guide to the Internet research needed by all of us interested in on-line relationships and research. The authors address such issues as ethics, confidentiality, the theory and practice of on-line research, and on-line power relationships (which will be of concern in distance learning plans and programs). A very valuable book.′ - Cheris Kramarae, Center for the Study of Women in Society, University of Oregon `Wonderful - "beyond the software" and into on-line interaction to aid and abet our qualitative research. This book shines the light. Mann and Stewart are to be congratulated in offering qualitative researchers effective and authentic ways forward through electronic communication. I′ll use and recommend it!′ - Gilly Salmon, Centre for Information and Innovation, Open University Business School `Opens to view a whole new avenue for social research. Internet communication is the wave of the future. Mann and Stewart capture its potential with insight, caution, and consummate procedural skill. Pathbreaking in its area of research methodology! Students and researchers will be very pleased with its clarity and usefulness′ - Jaber F Gubrium, Department of Sociology, University of Florida `The authors have produced a timely and stimulating publication with handy explanations of Internet terms and qualitative research applications. This work should be made readily available not only for reference to academics and practitioners of marketing, but also to those with a lay interest in it′ - Professor Len Tiu Wright, De Montfort University Internet Communication and Qualitative Research is the first textbook to examine the impact of Internet technology on qualitative research methods. Drawing on many pioneering studies using computer-mediated communication (CMC), the authors show how online researchers can employ Internet-based qualitative methods to collect rich, descriptive, contextually-situated data. They discuss the methodological, practical and theoretical considerations associated with such methods as: in-depth online interviewing, virtual focus groups, participant observation in virtual communities. This is a comprehensive and practical guide that: - reviews online research practice and basic Internet technology - looks in detail at the skills required by the online researcher - examines the ethical, confidentiality, security and legal issues involved in online research - considers the theoretical challenges surrounding data collected in a ′virtual venue′ - addresses the social and cultural impact of researching online through a discussion of power, gender and identity issues in the virtual world. Internet Communication and Qualitative Research will be an indispensable guide for all students and researchers working in the digital age.




The Ethics of Cybersecurity


Book Description

This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.




Multidisciplinary Approaches to Ethics in the Digital Era


Book Description

The digital era has redefined our understanding of ethics as a multi-disciplinary phenomenon. The newness of the internet means it is still highly unregulated, which allows for rampant problems encountered by countless internet users. In order to establish a framework to protect digital citizenship, an academic understanding of online ethics is required. Multidisciplinary Approaches to Ethics in the Digital Era examines the concept of ethics in the digital environment through the framework of digitalization. Covering a broad range of topics including ethics in art, organizational ethics, and civil engineering ethics, this book is ideally designed for media professionals, sociologists, programmers, policymakers, government officials, academicians, researchers, and students.




Applied Ethics in a Digital World


Book Description

As advances in disruptive technologies transform politics and increase the velocity of information and policy flows worldwide, the public is being confronted with changes that move faster than they can comprehend. There is an urgent need to analyze and communicate the ethical issues of these advancements. In a perpetually updating digital world, data is becoming the dominant basis for reality. This new world demands a new approach because traditional methods are not fit for a non-physical space like the internet. Applied Ethics in a Digital World provides an analysis of the ethical questions raised by modern science, technological advancements, and the fourth industrial revolution and explores how to harness the speed, accuracy, and power of emerging technologies in policy research and public engagement to help leaders, policymakers, and the public understand the impact that these technologies will have on economies, legal and political systems, and the way of life. Covering topics such as artificial intelligence (AI) ethics, digital equity, and translational ethics, this book is a dynamic resource for policymakers, civil society, CEOs, ethicists, technologists, security advisors, sociologists, cyber behavior specialists, criminologists, data scientists, global governments, students, researchers, professors, academicians, and professionals.




Ethical and Social Issues in the Information Age


Book Description

An introduction to the social and policy issues which have arisen as a result of IT. Whilst it assumes a modest familiarity with computers, the book provides a guide to the issues suitable for undergraduates. In doing so, the author prompts students to consider questions such as: * How do morality and the law relate to each other? * What should be covered in a professional code of conduct for information technology professionals? * What are the ethical issues relating to copying software? * Is electronic monitoring o employees wrong? * What are the moral codes of cyberspace? Throughout, the book shows how in many ways the technological development is outpacing the ability of our legal systems, and how different paradigms applied to ethical questions often proffer conflicting conclusions. As a result, students will find this a thought-provoking and valuable survey of the new and difficult ethical questions posed by the Internet, artificial intelligence, and virtual reality.




Encyclopedia of Information Ethics and Security


Book Description

Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial. The Encyclopedia of Information Ethics and Security is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool includes topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. This encyclopedia is a useful tool for students, academics, and professionals.




Trustworthy AI


Book Description

An essential resource on artificial intelligence ethics for business leaders In Trustworthy AI, award-winning executive Beena Ammanath offers a practical approach for enterprise leaders to manage business risk in a world where AI is everywhere by understanding the qualities of trustworthy AI and the essential considerations for its ethical use within the organization and in the marketplace. The author draws from her extensive experience across different industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders have about the ethics of AI. Filled with deep insights and actionable steps for enabling trust across the entire AI lifecycle, the book presents: In-depth investigations of the key characteristics of trustworthy AI, including transparency, fairness, reliability, privacy, safety, robustness, and more A close look at the potential pitfalls, challenges, and stakeholder concerns that impact trust in AI application Best practices, mechanisms, and governance considerations for embedding AI ethics in business processes and decision making Written to inform executives, managers, and other business leaders, Trustworthy AI breaks new ground as an essential resource for all organizations using AI.




Information and Cyber Security


Book Description

This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019. The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.