Home| Contact Us| New Journals| Browse Journals| Journal Prices| For Authors|

Print ISSN: 2349-8161
Online ISSN: 2349-817X


  About ISEJ
  Home
Aims & Scope
Editorial Board
Current Issue
Next Issue
Previous Issue
Self-archiving policy
Alert Services
Be a Reviewer
Publisher
Paper Submission
Contact us
 
  For Authors
  Guidelines for Contributors
Online Submission
Statement of Ethics and Responsibilities
Review Policies
Transfer of Copyright
Archiving Policy
Call for Papers
 
 
RELATED JOURNALS
Journal of Digital Information Management (JDIM)
Journal of Multimedia Processing and Technologies (JMPT)
International Journal of Web Application (IJWA)

 

 
Information Security Education Journal (ISEJ)
 

Cybersecurity and the Ethics of Care
Jane Blanken-Webb, Ryan Cloutier
Wilkes University, University in Wilkes-Barre, Pennsylvania, USA & Security Studio, Greater Minneapolis, USA
Abstract: This paper addresses mounting calls for ethical inquiry in cybersecurity by proposing consideration of the ethics of care as a guiding philosophical framework. It offers a general introduction to the ethics of care in relation to cybersecurity, followed by a targeted discussion of care ethics’ unique contribution as a philosophical framework for considering cybersecurity’s position at the edge of technological innovation. From there, the paper puts forth a firsthand example, based on the second author’s personal experience as a cybersecurity professional, demonstrating a lived experience of the ethic of care in the midst of professional practice in cybersecurity. This opens into broader consideration of a fundamental ethical paradox in cybersecurity, discussed through the lens of the ethics of care, followed by discussion of the significance of the relational context—or ethos—that surrounds ethical action in cybersecurity education and practice. In closing, the paper proposes that the field of cybersecurity is inherently linked with care.
Keywords: Cybersecurity Ethics, Ethics of Care, Philosophical Foundations of Cybersecurity Ethics Cybersecurity and the Ethics of Care
DOI:https://doi.org/10.6025/isej/2020/7/2/31-39
Full_Text   PDF 192 KB   Download:   1  times
References:

[1] Alexander, L., Moore, M. (2020). Deontological ethics. In: E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy. Metaphysics Research Lab. https://plato.stanford.edu/archives/win2020/entries/ethics-deontological/
[2] Azmak, O., Bayer, H., Caplin, A., Chun, M., Glimcher, P., Koonin, S., Patrinos, A. (2015). Using big data to understand the human condition: the Kavli HUMAN project. Big data, 3 (3) 173-188.
[3] Blanken-Webb, J., Palmer, I., Deshaies, S. E., Burbules, N. C., Campbell, R. H., Bashir, M. (2018). A Case Study-based Cybersecurity Ethics Curriculum. In: 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18).
[4] Blanken-Webb, J., Palmer, I., Campbell, R. H., Burbules, N. C., Bashir, M. (2019). Cybersecurity Ethics. In: J. T. F. Burgess& E. Knox (Eds.), Foundations of Information Ethics (p. 91—101). American Library Association.
[5] Bradbury, D. (2017, August 16). In search of an ethical code for cybersecurity. Info security. https://www.infosecuritymagazine. com/magazine-features/search-ethical-code-cybersecurity/
[6] Christen, M., Gordijn, B., Loi, M. (Eds.) (2020). The Ethics of Cybersecurity. Springer Nature.
[7] Davis, B., Whitfield, C., Anwar, M. (2018, August). Ethical and Privacy Considerations in Cybersecurity. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST) (p. 1-2). IEEE.
[8] Dewey, J. (1997). How we think. Courier Corporation.
[9] Dipert, R. R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9 (4) 384-410.
[10] Engster, D. (2005). Rethinking care theory: The practice of caring and the obligation to care. Hypatia, 20 (3) 50-74.
[11] Friedman, M. (2015). Privacy, surveillance, and care ethics. Care Ethics and Political Theory, 108-126.
[12] Gentil Kiwi. (2014). Overpass-the-hash [article]. Blog de Gentil Kiwi. https://blog.gentilkiwi.com/
[13] Gilligan, C. (1993). In a different voice: Psychological theory and women’s development. Harvard University Press.
[14] Gilligan, C., Snider, N. (2018). Why does patriarchy persist?. John Wiley & Sons.
[15] Glennon, T. (1992). Lawyers and caring: Building an ethic of care into professional responsibility. Hastings Law Journal, 43 (4) 1175-1186.
[16] Greenberg, A. (2017). He perfected a password-hacking tool—Then the Russians came calling. WIRED. https://www.wired.com/story/how-mimikatz-became-go-to-hacker-tool/
[17] Greenberg, A. (2020). The confessions of Marcus Hutchins, the hacker who saved the internet. WIRED. https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/
[18] Hoppa, M. A. (2018). Automating Ethical Advice for Cybersecurity Decision-Making. In Proceedings of the International Conference on Information and Knowledge Engineering (IKE) (p. 170-171). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
[19] Kenneally, E., Bailey, M. (2014). Cyber-security research ethics dialogue & strategy workshop. ACM SIGCOMM Computer Communication Review, 44 (2) 76-79.
[20] Knowels, A. (2016, October 12). Tough challenges in cybersecurity ethics. Security intelligence. https://securityintelligence.com/tough-challenges-cybersecurity-ethics/
[21] Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9 (3) 49-51.
[22] Lee, L. (n.d.). Cybersecurity Fundamentals. https://360.articulate.com/review/content/67330073-4c70-4c0e-9375-5d26670d99e7/review
[23] Leonhard, G. (2016). Technology vs. humanity. Fast Future Publishing.
[24] Lio, M., Christen, M. (2020). Ethical frameworks for cybersecurity. In: M. Christen, B. Gordijn, & M. Loi (Eds.) The ethics of cybersecurity. Springer Nature. (p. 73—93).
[25] Luck, M. (2019). Entrapment behind the firewall: the ethics of internal cyber-stings. Australasian Journal of Information Systems, 23.
[26] Manjikian, M. (2017). Cybersecurity ethics: An introduction. Routledge.
[27] Metcalf, S. (2015). Red vs. blue: Modern active directory attacks, detection, & protection. Black hat USA 2015. https://www.blackhat.com/docs/us-15/materials/us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection.pdf
[28] Metcalf, S. (2018). Unofficial guide to Mimikatz & command reference. Active directory security. https://adsecurity.org/?page_id=1821
[29] Miller, S. (2019). Machine Learning, Ethics and Law. Australasian Journal of Information Systems, 23.
[30] Nair, I., Bulleit, W. M. (2020). Pragmatism and care in engineering ethics. Science and Engineering Ethics, 26 (1) 65-87.
[31] Nelsen, P. (2013). The inquiry of care. Educational Theory, 63 (4) 351-368.
[32] Noddings, N. (2002). Starting at home: Caring and social policy. University of California Press.
[33] Noddings, N. (2013). Caring: A relational approach to ethics and moral education. University of California Press.
[34] Pantazidou, M., Nair, I. (1999). Ethic of care: Guiding principles for engineering teaching & practice. Journal of Engineering Education, 88 (2) 205-212.
[35] Ramirez, R., Inagaki, S., Shimaoka, M., Magata, K. (2020). A Cybersecurity Research Ethics Decision Support UI. USENIX Association, (August).
[36] Samonas, S., Coss, D. (2014). The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security. Journal of Information System Security, 10 (3).
[37] Schneier, B. (2018). Click here to kill everybody: Security and survival in a hyper-connected world. WW Norton & Company.
[38] Seigfried, C. H. (1991). Where are all the pragmatist feminists?. Hypatia, 6 (2) 1-20.
[39] Shoemaker, D., Kohnke, A., Laidlaw, G. (2019). Ethics and cybersecurity are not mutually exclusive. EDPACS, 60 (1) 1- 10.
[40] Tronto, J. C. (1993). Moral boundaries: A political argument for an ethic of care. Psychology Press.
[41] Webb, A. (2019). The big nine: How the tech titans and their thinking machines could warp humanity. Hachette UK.


Copyright 2013 socio.org.uk