Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2020
DOI: 10.1007/978-3-030-29053-5_6
|View full text |Cite
|
Sign up to set email alerts
|

A Care-Based Stakeholder Approach to Ethics of Cybersecurity in Business

Abstract: This chapter focuses on ethical issues in cybersecurity in business. It first sketches the main ethical issues discussed in the academic literature thus far. Next, it identifies some important topics that have not yet received the attention they deserve. The chapter then focuses on one of those topics, ransomware attacks, one of the most prevalent cybersecurity threats to businesses today. It provides a brief overview of the main types of ransomware attacks and discusses businesses' responsibilities to their s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 12 publications
(20 reference statements)
0
8
0
Order By: Relevance
“…The methodology follows the privacy framework of Nissenbaum [68] that views privacy as contextual integrity and extends it with "social norms and expectations affecting all human interactions that are constitutive of an established social practice" [50]. When discussing ethical issues in the context of business, the book focuses more on specific domains, such as healthcare, or on ensuring cybersecurity for businesses (see [59,80]).…”
Section: Related Workmentioning
confidence: 99%
“…The methodology follows the privacy framework of Nissenbaum [68] that views privacy as contextual integrity and extends it with "social norms and expectations affecting all human interactions that are constitutive of an established social practice" [50]. When discussing ethical issues in the context of business, the book focuses more on specific domains, such as healthcare, or on ensuring cybersecurity for businesses (see [59,80]).…”
Section: Related Workmentioning
confidence: 99%
“…The Menlo Report (2012) 1) respect for persons, 2) beneficence, and 3) justice Loi and Christen (2020) 1) privacy, 2) data protection, 3) non-discrimination, 4) due process and free speech, and 5) physical integrity Weber and Kleine (2020) 1) efficiency and quality of service, 2) privacy of information and confidentiality of communication, 3) usability of services, and 4) safety. Morgan and Gordijn (2020) 1) privacy, 2) protection of data, 3) trust, 4) control, 5) accountability, 6) confidentiality, 7) responsibility on business to use ethical codes of conduct, 8) data integrity, 9) consent, 10) transparency, 11) availability, 12) accountability, 13) autonomy, 14) ownership, and 15) usability.…”
Section: Source Ethical Principlesmentioning
confidence: 99%
“…An alternative approach to incorporating privacy is to include it as a separate ethical principle that attempts to incorporate the diversity of definitions noted above (e.g., Van de Poel, 2020 ;Loi and Christen, 2020 ;Morgan and Gordijn, 2020 ). While such an approach might more accurately reflect the multifaceted character of privacy, it perpetuates principle proliferation by ignoring the conceptual relationships between privacy and existing principles as summarised within Table 2 .…”
Section: Source Ethical Principlesmentioning
confidence: 99%
See 2 more Smart Citations