A principlist framework for cybersecurity ethics

Computers and Security 109 (2021)
  Copy   BIBTEX


The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: beneficence, non-maleficence, autonomy, justice, and explicability. We then illustrate the advantages of this principlist framework by examining the ethical issues raised by four common cybersecurity contexts: penetration testing, distributed denial of service attacks (DDoS), ransomware, and system administration. These case analyses demonstrate the utility of this principlist framework as a basis for understanding cybersecurity ethics and for cultivating the ethical expertise and ethical sensitivity of cybersecurity professionals and other stakeholders.



External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Scoping the ethical principles of cybersecurity fear appeals.Marc Dupuis & Karen Renaud - 2020 - Ethics and Information Technology 23 (3):265-284.
Cybersecurity in health – disentangling value tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
International Conference on Cyberlaw, Cybercrime & Cybersecurity.Pavan Duggal - 2016 - International Review of Information Ethics 25.


Added to PP

2,574 (#2,963)

6 months
1,424 (#618)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Paul Formosa
Macquarie University

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references