2013
DOI: 10.1007/s11948-013-9496-6
|View full text |Cite
|
Sign up to set email alerts
|

Critical Theory as an Approach to the Ethics of Information Security

Abstract: Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 48 publications
0
13
0
Order By: Relevance
“…Many papers address security and privacy problems regarding EHR (i.a. Barrows & Clayton 1996;Dong et al 2011;Ozair et al 2015;Rahim et al 2013;Stahl et al 2014). In those papers, different approaches of how to deal with security and privacy could be identified: particularly, that includes technical solutions (e.g.…”
Section: Summarizing the Results Of The Literature Searchmentioning
confidence: 99%
See 2 more Smart Citations
“…Many papers address security and privacy problems regarding EHR (i.a. Barrows & Clayton 1996;Dong et al 2011;Ozair et al 2015;Rahim et al 2013;Stahl et al 2014). In those papers, different approaches of how to deal with security and privacy could be identified: particularly, that includes technical solutions (e.g.…”
Section: Summarizing the Results Of The Literature Searchmentioning
confidence: 99%
“…-This regards firstly the concerns regarding access control, which comprises everything from an unclear data access authorization (Dong et al 2012;Stahl et al 2014) over lacking some control (Ikonen & Kaasinen 2008;Motti & Caine 2015;Olmsted et al 2015;Olvingson et al 2003) to a complete loss of control with regard to personal information (Barrows & Clayton 1996;Caulfield et al 2008). -The consequence could be unauthorized access by others (Buckovich et al 1999;Greenbaum et al 2011;Myhre et al 2016), e.g.…”
Section: Outlining the Identified Ethical Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Where Kreissl ends, Stahl et al (2013) start. These authors investigate the possibility to use critical theory as ''a critical lens'' to highlight issues that traditional ethical theories tend to overlook.…”
Section: Information Technologies Security and Privacymentioning
confidence: 99%
“…Many of the studies that we reviewed particularly address security and privacy problems regarding EHR (i.e. Barrows and Clayton, 1996;Dong et al, 2012;Ozair et al, 2015;Rahim et al, 2013;Stahl et al, 2014). Different approaches of how to deal with security and privacy could be identified, such as solutions based on technology (for biometric authentication, e.g.…”
Section: Privacymentioning
confidence: 99%