Social relationships in electronic communities
Computerization and controversy
Management guidelines for PC security
SAC '92 Proceedings of the 1992 ACM/SIGAPP symposium on Applied computing: technological challenges of the 1990's
Information technology and ethics: an exploratory factor analysis
ECA '94 Proceedings of the conference on Ethics in the computer age
Moral distancing and the use of information technologies: the seven temptations
ECA '94 Proceedings of the conference on Ethics in the computer age
Fighting computer crime: a new framework for protecting information
Fighting computer crime: a new framework for protecting information
Inside risks: risks of insiders
Communications of the ACM
Technical opinion: Information system security management in the new millennium
Communications of the ACM
The relevance of software rights: an anthology of the divergence of sociopolitical doctrines
AI & Society - Special issue on work organisation
Principles of Informational Ethics
Principles of Informational Ethics
Management Strategies for Computer Security
Management Strategies for Computer Security
Information ethics: On the philosophical foundation ofcomputer ethics
Ethics and Information Technology
Information Security Awareness - Selling the Cause
IFIP/Sec '92 Proceedings of the IFIP TC11, Eigth International Conference on Information Security: IT Security: The Need for International Cooperation
An Analysis of Ethics as Foundation of Information Security in Distributed Systems
HICSS '98 Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences-Volume 6 - Volume 6
End-User Ethics Teaching: Issues and a Solution based on Universalization
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 8 - Volume 8
Modifying smartphone user locking behavior
Proceedings of the Ninth Symposium on Usable Privacy and Security
Hi-index | 0.00 |
The question of whether ethical theories appealing to human morality can serve as a means of protection against information system security breaches has been recognized by several authors. The existing views concerning the role of ethics in information systems security can be divided into two categories. These are (1) expressions about the use of human morality and (2) arguments claiming that the use of ethics is useless or, at best, extremely restricted. However, the former views are general statements lacking concrete guidance and the latter viewpoint is based on cultural relativism, and can be thus classified as descriptivism. This paper claims that the use of ethical theories and human morality is useful for security, particularly given that Hare's Overriding thesis has validity--though it has its limitations, too. This paper further argues that descriptivism (including the doctrine of cultural relativism) leads to several problems, contradictions and causes detrimental effects to our well-being (and security). Therefore, an alternative approach to using ethics in minimizing security breaches that is based on nondescriptive theories is proposed. The use of non-descriptivism will be demonstrated using Rawls' concept of the "veil of ignorance." The limitations of non-descriptivism, and appealing to human morality in a general sense, will also be discussed. Finally, suggestions for future research directions are outlined.