Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities

Science and Engineering Ethics 20 (3):701-715 (2014)
  Copy   BIBTEX

Abstract

Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and “its” security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,853

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
The Transhuman Security Dilemma.Daniel McIntosh - 2010 - Journal of Evolution and Technology 21 (2):32-48.
The ethics of care: a feminist approach to human security.Fiona Robinson - 2011 - Philadelphia: Temple University Press.
Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.

Analytics

Added to PP
2014-04-30

Downloads
52 (#306,126)

6 months
13 (#194,369)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Toward a Human-Centric Approach to Cybersecurity.Ronald J. Deibert - 2018 - Ethics and International Affairs 32 (4):411-424.
Securitizing cyberspace: Protecting political judgment.Hedvig Ördén - 2022 - Journal of International Political Theory 18 (3):375-392.

Add more citations

References found in this work

Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
Artificial Evil and the Foundation of Computer Ethics.Luciano Floridi & J. W. Sanders - 2001 - Springer Netherlands. Edited by Luciano Floridi & J. W. Sanders.
The Ethics of Cyberwarfare.Randall R. Dipert - 2010 - Journal of Military Ethics 9 (4):384-410.
Towards an ontological foundation of information ethics.Rafael Capurro - 2006 - Ethics and Information Technology 8 (4):175-186.

View all 9 references / Add more references