TY - BOOK AU - Loi, Michele AU - Gordijn, Bert AU - Christen, Markus TI - Ethics of cybersecurity SN - 9781013276774 AV - TK5105 .M36 2020 U1 - 005.8 23/eng/20221017 PY - 2020/// CY - [USA] PB - Saint Philip Street Press KW - Internet KW - Moral and ethical aspects KW - Computer networks KW - Security measures KW - Computer crimes KW - fast N1 - Includes bibliographical references and index; Preface to the Second Edition -- Part I -- 1. What Is Ethics? -- 2. Three Ethical Frameworks -- 3. The Ethical Hacker -- Part II -- 4. The Problem of Privacy -- 5. The Problem of Surveillance -- 6. The Problem of Intellectual Property -- Part III -- 7. Ethics of Artificial Intelligence -- 8. Cybersecurity, Diversity, Equity, and Inclusion -- 9. Big Data and the Ethics of Cybersecurity -- 10. Military Aspects of Cybersecurity Ethics N2 - "This textbook offers an accessible introduction to the topic of cybersecurity ethics. The second edition has been revised and updated, and contains new chapters on social justice, AI and big data. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, surveillance and intellectual property. The third part concludes by exploring current codes of ethics used in cybersecurity, with chapters on artificial intelligence, social diversity, big data and cyberwarfare. The overall aims of the book are to: - provide ethical frameworks to aid decision making; - present the key ethical issues in relation to computer security; - highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: 'Going Deeper' features provide background on individuals, events, and institutions in cybersecurity; 'Critical Issues' features contemporary case studies; and 'Tech Talks', which contain features that assume some familiarity with technological developments. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science"-- ER -