Cybersecurity is of capital importance in a world where economic and social processes increasingly rely on digital technology. Although the primary ethical motivation of cybersecurity is prevention of informational or physical harm, its enforcement can also entail conflicts with other moral values. This contribution provides an outline of value conflicts in cybersecurity based on a quantitative literature analysis and qualitative case studies. The aim is to demonstrate that the security-privacy-dichotomy—that still seems to dominate the ethics discourse based on our bibliometric analysis—is insufficient when discussing the ethical challenges of cybersecurity. Furthermore, we want to sketch how the notion of contextual integrity could help t...
Enabling cybersecurity and protecting personal data are crucial challenges in the development and pr...
The ethical framework for cyber security puts out a number of ethical frameworks that can be used to...
This edited collection examines the ethical trade-offs involved in cybersecurity: between security a...
Cybersecurity is of capital importance in a world where economic and social processes increasingly r...
This White Paper outlines how the ethical discourse on cybersecurity has developed in the scientific...
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by...
Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various ma...
This open access book provides the first comprehensive collection of papers that provide an integrat...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. ...
NTRODUCTION Hacking as defined by Hacker.com is "the act of penetrating a closed computer syste...
The ethical issues raised by cybersecurity practices and technologies are of critical importance. Ho...
This chapter aims to identify and analyse the ethical problems of security, particularly cyber and d...
In this paper I examine the issue of cybersecurity in the context of the conventionally understood e...
Enabling cybersecurity and protecting personal data are crucial challenges in the development and pr...
The ethical framework for cyber security puts out a number of ethical frameworks that can be used to...
This edited collection examines the ethical trade-offs involved in cybersecurity: between security a...
Cybersecurity is of capital importance in a world where economic and social processes increasingly r...
This White Paper outlines how the ethical discourse on cybersecurity has developed in the scientific...
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by...
Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various ma...
This open access book provides the first comprehensive collection of papers that provide an integrat...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. ...
NTRODUCTION Hacking as defined by Hacker.com is "the act of penetrating a closed computer syste...
The ethical issues raised by cybersecurity practices and technologies are of critical importance. Ho...
This chapter aims to identify and analyse the ethical problems of security, particularly cyber and d...
In this paper I examine the issue of cybersecurity in the context of the conventionally understood e...
Enabling cybersecurity and protecting personal data are crucial challenges in the development and pr...
The ethical framework for cyber security puts out a number of ethical frameworks that can be used to...
This edited collection examines the ethical trade-offs involved in cybersecurity: between security a...