This paper critiques existing governance in cyber-security ethics through providing an overview of some of the ethical issues facing researchers in the cybersecurity community and highlighting shortfalls in governance practice. We separate these issues into those facing the academic research community and those facing the (corporate) practitioner community, drawing on two case studies. While there is overlap between these communities, there are also stark differences. Academic researchers can often rely on research ethics boards (REBs) to provide ethical oversight and governance which are typically unavailable to the practitioner community. However, we argue that even within the academic community the constitution of REBs is such that they ...
Cryptographic ransomware, a malware capable of destroying data, is a serious threat if used against ...
Purpose – The purpose of this paper is to attempt to investigate how Information and Communications...
This paper contributes to the literature on cybersecurity governance by suggesting an approach based...
This White Paper outlines how the ethical discourse on cybersecurity has developed in the scientific...
The ethical conduct of research is a cornerstone of modern scientific research. Computer science and...
This open access book provides the first comprehensive collection of papers that provide an integrat...
Within the Computer Science community, many ethical issues have emerged as significant and critical ...
In recent years a new field of study called Cyberethics (the field of study that examines moral, leg...
It is common for speakers at computer security conferences to tell audiences that 'they should do' t...
Abstract. The organizing question around which this panel at WECSR 2011 rallied was how to move towa...
<p>Our lives are increasingly intertwined with the digital realm, and with new technology, new ethic...
Our lives are increasingly intertwined with the digital realm, and with new technology, new ethical ...
Advancements in computer technology over the past twenty years have created ethical dilemmas and rai...
Computer security research frequently entails studying real computer systems and their users; studyi...
This paper could be subtitled "Are we teaching the next generation of computer criminals and interne...
Cryptographic ransomware, a malware capable of destroying data, is a serious threat if used against ...
Purpose – The purpose of this paper is to attempt to investigate how Information and Communications...
This paper contributes to the literature on cybersecurity governance by suggesting an approach based...
This White Paper outlines how the ethical discourse on cybersecurity has developed in the scientific...
The ethical conduct of research is a cornerstone of modern scientific research. Computer science and...
This open access book provides the first comprehensive collection of papers that provide an integrat...
Within the Computer Science community, many ethical issues have emerged as significant and critical ...
In recent years a new field of study called Cyberethics (the field of study that examines moral, leg...
It is common for speakers at computer security conferences to tell audiences that 'they should do' t...
Abstract. The organizing question around which this panel at WECSR 2011 rallied was how to move towa...
<p>Our lives are increasingly intertwined with the digital realm, and with new technology, new ethic...
Our lives are increasingly intertwined with the digital realm, and with new technology, new ethical ...
Advancements in computer technology over the past twenty years have created ethical dilemmas and rai...
Computer security research frequently entails studying real computer systems and their users; studyi...
This paper could be subtitled "Are we teaching the next generation of computer criminals and interne...
Cryptographic ransomware, a malware capable of destroying data, is a serious threat if used against ...
Purpose – The purpose of this paper is to attempt to investigate how Information and Communications...
This paper contributes to the literature on cybersecurity governance by suggesting an approach based...