Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph

Science and Engineering Ethics 26 (3):1267-1285 (2020)
  Copy   BIBTEX

Abstract

Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies. The pervasiveness and democratization of ICTs have allowed people from all backgrounds to access and use them, which has resulted in new information-based assets. At the same time, this phenomenon has brought a new class of problems, in the form of activists, criminals and state actors that target the new assets to achieve their goals, legitimate or not. Cybersecurity includes the research, tools and techniques to protect information assets. However, some cybersecurity measures may clash with the ethical values of citizens. We analyze the synergies and tensions between some of these values, namely security, privacy, fairness and autonomy. From this analysis, we derive a value graph, and then we set out to identify those paths in the graph that lead to satisfying all four aforementioned values in the cybersecurity setting, by taking advantage of their synergies and avoiding their tensions. We illustrate our conceptual discussion with examples of enabling technologies. We also sketch how our methodology can be generalized to any setting where several potentially conflicting values have to be satisfied.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,503

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
Toward a Human-Centric Approach to Cybersecurity.Ronald J. Deibert - 2018 - Ethics and International Affairs 32 (4):411-424.
The ‘Faith’ factor in the Internet World.T. Gopal - 2004 - International Review of Information Ethics 2.
Effective coloration.Dwight R. Bean - 1976 - Journal of Symbolic Logic 41 (2):469-480.
Playing with networks: how economists explain. [REVIEW]Caterina Marchionni - 2013 - European Journal for Philosophy of Science 3 (3):331-352.
On graph-theoretic fibring of logics.A. Sernadas, C. Sernadas, J. Rasga & M. Coniglio - 2009 - Journal of Logic and Computation 19 (6):1321-1357.
Graph-Based Bootstrapping for Coreference Resolution.P. Ranjani, T. V. Geetha & J. Balaji - 2014 - Journal of Intelligent Systems 23 (3):293-310.
Graph Spectra for Communications in Biological and Carbon Nanotube Networks.Stephen F. Bush & Sanjay Goel - forthcoming - Ieee Journal on Selected Areas in Communications:1--10.

Analytics

Added to PP
2019-09-30

Downloads
18 (#824,856)

6 months
5 (#629,992)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Privacy and Freedom.Alan F. Westin - 1970 - Science and Society 34 (3):360-363.
Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.

Add more references