This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by distinguishing four important value clusters that should be considered when deciding on cybersecurity measures. These clusters are security, privacy, fairness and accountability. Each cluster consists of a range of further values, which can be viewed as articulating specific moral reasons relevant when devising cybersecurity measures. In addition to the four value clusters, domain-specific values that are served by computer systems, such as health, are important. Following a detailed discussion of the four relevant value clusters, potential value conflicts and value tensions are considered. The relationships of five pairs of values (privacy-...
With powerful regulations surrounding security and privacy of information, the authors attempt to id...
The ethical issues raised by cybersecurity practices and technologies are of critical importance. Ho...
It is challenging to ensure security and to minimize economic impacts due to cyber-attacks because o...
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by...
Cybersecurity is of capital importance in a world where economic and social processes increasingly r...
Cybersecurity is of capital importance in a world where economic and social processes increasingly r...
This White Paper outlines how the ethical discourse on cybersecurity has developed in the scientific...
Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various ma...
This article presents a conceptual investigation into the value impacts and relations of algorithms ...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
Current approaches to cyber-security are not working. Rather than producing more security, we seem t...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
The SHAPES Horizon 2020 project supports the well-being of the elderly at home. The growing complexi...
With powerful regulations surrounding security and privacy of information, the authors attempt to id...
The ethical issues raised by cybersecurity practices and technologies are of critical importance. Ho...
It is challenging to ensure security and to minimize economic impacts due to cyber-attacks because o...
This chapter analyses some of the main values, and values conflicts, in relation to cybersecurity by...
Cybersecurity is of capital importance in a world where economic and social processes increasingly r...
Cybersecurity is of capital importance in a world where economic and social processes increasingly r...
This White Paper outlines how the ethical discourse on cybersecurity has developed in the scientific...
Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various ma...
This article presents a conceptual investigation into the value impacts and relations of algorithms ...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
This chapter provides a political and philosophical analysis of the values at stake in ensuring cybe...
Current approaches to cyber-security are not working. Rather than producing more security, we seem t...
Information security breaches are increasingly motivated by fraudulent and criminal motives. Reducin...
A Comparative Analysis of Cybersecurity Initiatives Worldwide The worst possible consequences of ris...
The SHAPES Horizon 2020 project supports the well-being of the elderly at home. The growing complexi...
With powerful regulations surrounding security and privacy of information, the authors attempt to id...
The ethical issues raised by cybersecurity practices and technologies are of critical importance. Ho...
It is challenging to ensure security and to minimize economic impacts due to cyber-attacks because o...