Proceedings of the Thirty-First Hawaii International Conference on System Sciences
DOI: 10.1109/hicss.1998.654776
|View full text |Cite
|
Sign up to set email alerts
|

An analysis of ethics as foundation of information security in distributed systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 19 publications
(31 citation statements)
references
References 8 publications
0
31
0
Order By: Relevance
“…The socio-anthropological illusion: let's embed technology in a social, moral and legal human context In the area of information systems a perspective is already developing aimed at embedding the information system in a complex socio-cultural environment where there are -on the top of the technical and security layerother layers relative to legal aspects, social interaction, trust, and morality [Har95;Lei96]. For sure this is a correct view.…”
Section: The Illusion Of Control: Security Vs Moralitymentioning
confidence: 99%
“…The socio-anthropological illusion: let's embed technology in a social, moral and legal human context In the area of information systems a perspective is already developing aimed at embedding the information system in a complex socio-cultural environment where there are -on the top of the technical and security layerother layers relative to legal aspects, social interaction, trust, and morality [Har95;Lei96]. For sure this is a correct view.…”
Section: The Illusion Of Control: Security Vs Moralitymentioning
confidence: 99%
“…It may also be useful to describe the process that employees should follow if they foresee that the same deviation of guidelines will become a regular occurrence or when they believe that the same ethical decision may have to be made by other employees as well. This is similar to what Leiwo and Heikkuri (1998) have called ethics negotiation in their paper on security of distributed systems. Ethical decision making is not possible if the acceptable use policy does not clearly state its security objectives.…”
Section: Encouraging Ethical Decision Makingmentioning
confidence: 72%
“…According to Leiwo and Heikkuri (1998), the use of ethics in information systems and information security has two purposes: to identify criteria between good and bad and to promote good desires over bad ones.…”
Section: Ethics and Security Policiesmentioning
confidence: 99%
“…Both grey hats and white hats have the intention to find the vulnerabilities before a black hat (a malicious hacker) finds them. Despite grey hats undertaking their endeavours in the absence of consent, they argue that their actions are warranted as they contribute to a safer cyber environment for all by making it more difficult for black hats to successfully attack businesses for financial, political or other malicious purposes (Leiwo and Heikkuri 1998). A discussion in the ethical literature questions whether grey hats actions are ethical (Leiwo and Heikkuri 1998;Brey 2007;McReynolds 2015).…”
Section: Gaps In the Literature On Ethics And Cybersecuritymentioning
confidence: 99%
“…They tend to use their skills for malicious and illegal purposes (Radziwill et al 2015). Black hats also believe in the more traditional hacker ethic that all information should be free and unlimited (Leiwo and Heikkuri 1998). This notion goes against the very idea of intellectual property as it suggests that individuals could and should not be able to benefit from information considered valuable (Brey 2007).…”
Section: Competitorsmentioning
confidence: 99%