Cybersecurity Ethics
An Introduction
- Author(s): Mary Manjikian,
- Publisher: Taylor & Francis
- Pages: 284
- ISBN_10: 1000828255
ISBN_13: 9781000828252
- Language: en
- Categories: Political Science / Political Freedom , Philosophy / Ethics & Moral Philosophy , Political Science / Privacy & Surveillance , Social Science / Privacy & Surveillance , History / Military / General , Political Science / Law Enforcement , Political Science / Political Process / Media & Internet , Computers / Computer Science , Political Science / General , Technology & Engineering / Military Science , Social Science / Sociology / General , Social Science / Criminology , Political Science / Peace , Law / Computer & Internet , Computers / Security / General ,
Description:... This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI, and Big Data.
The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy, and philosophy of science, three ethical frameworks – virtue ethics, utilitarian ethics, and communitarian ethics – and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance, and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, Big Data, and cyberwarfare. The overall aims of the book are to:
- Provide ethical frameworks to aid decision-making
- Present the key ethical issues in relation to computer security
- Highlight the connection between values and beliefs and the professional code of ethics
The textbook also includes three different features to aid students: "Going Deeper" features provide background on individuals, events, and institutions in cybersecurity; "Critical Issues" features contemporary case studies; and "Tech Talks" contain features that assume some familiarity with technological developments.
The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics, and information science.
Show description