References: [1] Alexander, L., Moore, M. (2020). Deontological ethics. In: E. N. Zalta (Ed.), The Stanford encyclopedia of philosophy. Metaphysics Research Lab. https://plato.stanford.edu/archives/win2020/entries/ethics-deontological/ [2] Azmak, O., Bayer, H., Caplin, A., Chun, M., Glimcher, P., Koonin, S., Patrinos, A. (2015). Using big data to understand the human condition: the Kavli HUMAN project. Big data, 3 (3) 173-188. [3] Blanken-Webb, J., Palmer, I., Deshaies, S. E., Burbules, N. C., Campbell, R. H., Bashir, M. (2018). A Case Study-based Cybersecurity Ethics Curriculum. In: 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18). [4] Blanken-Webb, J., Palmer, I., Campbell, R. H., Burbules, N. C., Bashir, M. (2019). Cybersecurity Ethics. In: J. T. F. Burgess& E. Knox (Eds.), Foundations of Information Ethics (p. 91—101). American Library Association. [5] Bradbury, D. (2017, August 16). In search of an ethical code for cybersecurity. Info security. https://www.infosecuritymagazine. com/magazine-features/search-ethical-code-cybersecurity/ [6] Christen, M., Gordijn, B., Loi, M. (Eds.) (2020). The Ethics of Cybersecurity. Springer Nature. [7] Davis, B., Whitfield, C., Anwar, M. (2018, August). Ethical and Privacy Considerations in Cybersecurity. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST) (p. 1-2). IEEE. [8] Dewey, J. (1997). How we think. Courier Corporation. [9] Dipert, R. R. (2010). The ethics of cyberwarfare. Journal of Military Ethics, 9 (4) 384-410. [10] Engster, D. (2005). Rethinking care theory: The practice of caring and the obligation to care. Hypatia, 20 (3) 50-74. [11] Friedman, M. (2015). Privacy, surveillance, and care ethics. Care Ethics and Political Theory, 108-126. [12] Gentil Kiwi. (2014). Overpass-the-hash [article]. Blog de Gentil Kiwi. https://blog.gentilkiwi.com/ [13] Gilligan, C. (1993). In a different voice: Psychological theory and women’s development. Harvard University Press. [14] Gilligan, C., Snider, N. (2018). Why does patriarchy persist?. John Wiley & Sons. [15] Glennon, T. (1992). Lawyers and caring: Building an ethic of care into professional responsibility. Hastings Law Journal, 43 (4) 1175-1186. [16] Greenberg, A. (2017). He perfected a password-hacking tool—Then the Russians came calling. WIRED. https://www.wired.com/story/how-mimikatz-became-go-to-hacker-tool/ [17] Greenberg, A. (2020). The confessions of Marcus Hutchins, the hacker who saved the internet. WIRED. https://www.wired.com/story/confessions-marcus-hutchins-hacker-who-saved-the-internet/ [18] Hoppa, M. A. (2018). Automating Ethical Advice for Cybersecurity Decision-Making. In Proceedings of the International Conference on Information and Knowledge Engineering (IKE) (p. 170-171). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp). [19] Kenneally, E., Bailey, M. (2014). Cyber-security research ethics dialogue & strategy workshop. ACM SIGCOMM Computer Communication Review, 44 (2) 76-79. [20] Knowels, A. (2016, October 12). Tough challenges in cybersecurity ethics. Security intelligence. https://securityintelligence.com/tough-challenges-cybersecurity-ethics/ [21] Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9 (3) 49-51. [22] Lee, L. (n.d.). Cybersecurity Fundamentals. https://360.articulate.com/review/content/67330073-4c70-4c0e-9375-5d26670d99e7/review [23] Leonhard, G. (2016). Technology vs. humanity. Fast Future Publishing. [24] Lio, M., Christen, M. (2020). Ethical frameworks for cybersecurity. In: M. Christen, B. Gordijn, & M. Loi (Eds.) The ethics of cybersecurity. Springer Nature. (p. 73—93). [25] Luck, M. (2019). Entrapment behind the firewall: the ethics of internal cyber-stings. Australasian Journal of Information Systems, 23. [26] Manjikian, M. (2017). Cybersecurity ethics: An introduction. Routledge. [27] Metcalf, S. (2015). Red vs. blue: Modern active directory attacks, detection, & protection. Black hat USA 2015. https://www.blackhat.com/docs/us-15/materials/us-15-Metcalf-Red-Vs-Blue-Modern-Active-Directory-Attacks-Detection-And-Protection.pdf [28] Metcalf, S. (2018). Unofficial guide to Mimikatz & command reference. Active directory security. https://adsecurity.org/?page_id=1821 [29] Miller, S. (2019). Machine Learning, Ethics and Law. Australasian Journal of Information Systems, 23. [30] Nair, I., Bulleit, W. M. (2020). Pragmatism and care in engineering ethics. Science and Engineering Ethics, 26 (1) 65-87. [31] Nelsen, P. (2013). The inquiry of care. Educational Theory, 63 (4) 351-368. [32] Noddings, N. (2002). Starting at home: Caring and social policy. University of California Press. [33] Noddings, N. (2013). Caring: A relational approach to ethics and moral education. University of California Press. [34] Pantazidou, M., Nair, I. (1999). Ethic of care: Guiding principles for engineering teaching & practice. Journal of Engineering Education, 88 (2) 205-212. [35] Ramirez, R., Inagaki, S., Shimaoka, M., Magata, K. (2020). A Cybersecurity Research Ethics Decision Support UI. USENIX Association, (August). [36] Samonas, S., Coss, D. (2014). The CIA Strikes Back: Redefining Confidentiality, Integrity and Availability in Security. Journal of Information System Security, 10 (3). [37] Schneier, B. (2018). Click here to kill everybody: Security and survival in a hyper-connected world. WW Norton & Company. [38] Seigfried, C. H. (1991). Where are all the pragmatist feminists?. Hypatia, 6 (2) 1-20. [39] Shoemaker, D., Kohnke, A., Laidlaw, G. (2019). Ethics and cybersecurity are not mutually exclusive. EDPACS, 60 (1) 1- 10. [40] Tronto, J. C. (1993). Moral boundaries: A political argument for an ethic of care. Psychology Press. [41] Webb, A. (2019). The big nine: How the tech titans and their thinking machines could warp humanity. Hachette UK. |