Research Article

A Review on Security versus Ethics

by  Bisma Bashir, Aqeel Khalique
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Issue 11
Published: Oct 2016
Authors: Bisma Bashir, Aqeel Khalique
10.5120/ijca2016911937
PDF

Bisma Bashir, Aqeel Khalique . A Review on Security versus Ethics. International Journal of Computer Applications. 151, 11 (Oct 2016), 13-17. DOI=10.5120/ijca2016911937

                        @article{ 10.5120/ijca2016911937,
                        author  = { Bisma Bashir,Aqeel Khalique },
                        title   = { A Review on Security versus Ethics },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 151 },
                        number  = { 11 },
                        pages   = { 13-17 },
                        doi     = { 10.5120/ijca2016911937 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Bisma Bashir
                        %A Aqeel Khalique
                        %T A Review on Security versus Ethics%T 
                        %J International Journal of Computer Applications
                        %V 151
                        %N 11
                        %P 13-17
                        %R 10.5120/ijca2016911937
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is of major concern in Information & Communication Technologies (ICT). Valuable data and information must be protected from attackers. In ICT, information is easily accessible and thus efficient security mechanisms are employed to prevent any attack. This paper presents a review about the security and ethics, their relationship with each other. This paper focuses on implementing security mechanism complying ethical best practices. Existing security mechanism and ethical practices in an ICT organization are also discussed in this paper. The paper also covers impact of technologies on the privacy of people due to unawareness of security policies or false ethical practices.

References
  • "History of ethics", Wikipedia, 2016. [Online] https://en.wikipedia.org/wiki/History_of_ethics.
  • Stallings, W. 2011 Cryptography And Network Security Principles And Security. Pearson Publication.
  • "Difference Between Ethics and Integrity", Difference Between, 2015. [Online] http://www.differencebetween.com/difference-between-ethics-and-vs-integrity/.
  • "Ethics", Wikipedia, 2015. [Online]https://en.wikipedia.org/wiki/Ethics
  • "Golden Rule", Wikipedia, 2016. [Online]https://simple.wikipedia.org/wiki/Golden_Rule.
  • "Categorical imperative", Wikipedia, 2016. [Online]https://en.wikipedia.org/wiki/Categorical_imperative.
  • "Descartes' rule of change", Paginas.fe.up.pt, 2016. [Online] http://paginas.fe.up.pt/~als/mis10e/ch4/descartes.htm.
  • "Utilitarianism", Wikipedia,2016. [Online]https://en.wikipedia.org/wiki/Utilitarianism.
  • "Risk aversion", Wikipedia, 2016. [Online] https://en.wikipedia.org/wiki/Risk_aversion.
  • Safire, W. 2-14-1993 On Language; “Words Left Out in the cold” New York Times.
  • "Ten Commandments of Computer Ethics", Wikipedia, 2016.[Online] https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics.
  • "Computer Security Ethics and Privacy | WebReference", Webreference.com.[Online]http://www.webreference.com/internet/security/index.html.
  • "What is ethical hacking and an ethical hacker?", Computerhope.com.[Online]http://www.computerhope.com/jargon/e/ethihack.htm.
  • "Internet Security: Ethics / Mateti", Cecs.wright.edu, 2016.[Online] http://cecs.wright.edu/~pmateti/InternetSecurity/Lectures/Ethics/.
  • "03. (III) Ethical Issues", Niatec.info, 2016. [Online]http://niatec.info/ViewPage.aspx?id=153.
  • [Online]http://web.simmons.edu/~chen/nit.NIT’96/96_025_Britz.html.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Security Computer Ethics Ethical Computing Privacy Ethical Hacking Hacking.

Powered by PhDFocusTM