Academic literature on the topic 'Cybersecurity ethics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cybersecurity ethics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cybersecurity ethics"
Rajamäki, Jyri, and Heikki Hämäläinen. "Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES." Information & Security: An International Journal 50 (2021): 103–16. http://dx.doi.org/10.11610/isij.5002.
Full textTimmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake." Minds and Machines 29, no. 4 (October 11, 2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.
Full textFormosa, Paul, Michael Wilson, and Deborah Richards. "A principlist framework for cybersecurity ethics." Computers & Security 109 (October 2021): 102382. http://dx.doi.org/10.1016/j.cose.2021.102382.
Full textMacnish, Kevin, and Jeroen van der Ham. "Ethics in cybersecurity research and practice." Technology in Society 63 (November 2020): 101382. http://dx.doi.org/10.1016/j.techsoc.2020.101382.
Full textMullahmetova, Diana I., and Andrey A. Kudelin. "Impact of Islamic Ethics on cybersecurity policy in Iran." RUDN Journal of World History 14, no. 1 (February 26, 2022): 33–42. http://dx.doi.org/10.22363/2312-8127-2022-14-1-33-42.
Full textShoemaker, Dan, Anne Kohnke, and Greg Laidlaw. "ETHICS AND CYBERSECURITY ARE NOT MUTUALLY EXCLUSIVE." EDPACS 60, no. 1 (July 3, 2019): 1–10. http://dx.doi.org/10.1080/07366981.2019.1651516.
Full textLoi, Michele, Markus Christen, Nadine Kleine, and Karsten Weber. "Cybersecurity in health – disentangling value tensions." Journal of Information, Communication and Ethics in Society 17, no. 2 (May 13, 2019): 229–45. http://dx.doi.org/10.1108/jices-12-2018-0095.
Full textWeber, Karsten, Michele Loi, Markus Christen, and Nadine Kleine. "Digital Medicine, Cybersecurity, and Ethics: An Uneasy Relationship." American Journal of Bioethics 18, no. 9 (September 2, 2018): 52–53. http://dx.doi.org/10.1080/15265161.2018.1498935.
Full textPattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Full textBhargava, Nimisha, Mani Kumari Madala, and Darrell Norman Burrell. "Emotional Acumen on the Propensity of Graduating Technology Students to Whistle-Blow About Organizational Cyber Security Breaches." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 1–14. http://dx.doi.org/10.4018/ijseus.2018100101.
Full textDissertations / Theses on the topic "Cybersecurity ethics"
GARZA, ADRIANA BEATRIZ. "AN ANALYSIS OF THE ETHICS BEHIND CYBERSECURITY MANAGEMENT." Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/618707.
Full textHoskins, Brittany Noel. "The Rhetoric of Commoditized Vulnerabilities: Ethical Discourses in Cybersecurity." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52943.
Full textMaster of Arts
Florez, Cardenas Mateo, and Gabriel Acar. "Ethical Hacking of a Smart Fridge : Evaluating the cybersecurity of an IoT device through gray box hacking." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-302373.
Full textMed den ökande populariteten för IoT-enheter (Internet of Things) blir ett komplett smart hem alltmer verklighet. Säkerheten för dessa enheter blir därför allt viktigare. Osäkrade IoT-enheter kan leda till potentiella konsekvenser av samhällelig omfattning. Därför finns det en hel industri som ägnar sig åt att mildra sådana säkerhetshot och bidra till ett hållbart samhälle. Säkerheten hos ett smart kylskåp från Samsung utvärderades i denna avhandling. Den metod som tillämpades följde en grå box-strategi och bestod av att först skapa en hot modell, ange potentiella sårbarheter och sedan använda nämnda modell för att utforma penetrationstester för att bedöma resultaten. Slutsatsen blev att kylskåpet var säkert inom ramen för denna avhandling. Det upptäcktes dock skäl för ytterligare forskning.
Paučo, Daniel. "Bezpečnostní cvičení pro etický hacking." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413068.
Full textAbu-Shaqra, Baha. "Technoethics and Sensemaking: Risk Assessment and Knowledge Management of Ethical Hacking in a Sociotechnical Society." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40393.
Full textRozsypal, Jakub. "Hlavolam kybernetické bezpečnosti: koncepty, modality a formulace hrozby Evropskou unií." Master's thesis, 2014. http://www.nusl.cz/ntk/nusl-340873.
Full textBooks on the topic "Cybersecurity ethics"
Christen, Markus, Bert Gordijn, and Michele Loi, eds. The Ethics of Cybersecurity. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29053-5.
Full textManjikian, Mary. Cybersecurity Ethics. Routledge, 2017. http://dx.doi.org/10.4324/9781315196275.
Full textEthics of Cybersecurity. Springer International Publishing AG, 2020.
Find full textCybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.
Find full textChristen, Markus, Bert Gordijn, and Michele Loi. The Ethics of Cybersecurity. Springer, 2020.
Find full textManjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2022.
Find full textManjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.
Find full textManjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.
Find full textManjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2017.
Find full textManjikian, Mary. Cybersecurity Ethics: An Introduction. Taylor & Francis Group, 2022.
Find full textBook chapters on the topic "Cybersecurity ethics"
Manjikian, Mary. "What Is Ethics?" In Cybersecurity Ethics, 3–22. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-2.
Full textManjikian, Mary. "Ethics of Artificial Intelligence." In Cybersecurity Ethics, 153–75. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-10.
Full textManjikian, Mary. "Military Aspects of Cybersecurity Ethics." In Cybersecurity Ethics, 219–42. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-13.
Full textManjikian, Mary. "The Problem of Intellectual Property." In Cybersecurity Ethics, 126–50. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-8.
Full textManjikian, Mary. "Big Data and the Ethics of Cybersecurity." In Cybersecurity Ethics, 197–218. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-12.
Full textManjikian, Mary. "Cybersecurity, Diversity, Equity, and Inclusion." In Cybersecurity Ethics, 176–96. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-11.
Full textManjikian, Mary. "The Problem of Surveillance." In Cybersecurity Ethics, 100–125. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-7.
Full textManjikian, Mary. "Three Ethical Frameworks." In Cybersecurity Ethics, 23–42. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-3.
Full textManjikian, Mary. "The Problem of Privacy." In Cybersecurity Ethics, 69–99. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-6.
Full textManjikian, Mary. "The Ethical Hacker." In Cybersecurity Ethics, 43–65. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003248828-4.
Full textConference papers on the topic "Cybersecurity ethics"
Domingo-Ferrer, Josep. "Ethics by Design in Decentralized Computing." In EICC 2022: European Interdisciplinary Cybersecurity Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3528580.3535331.
Full textHappa, J., J. R. C. Nurse, M. Goldsmith, S. Creese, and R. Williams. "An Ethics Framework for Research into Heterogeneous Systems." In Living in the Internet of Things: Cybersecurity of the IoT - 2018. Institution of Engineering and Technology, 2018. http://dx.doi.org/10.1049/cp.2018.0026.
Full textSimon, Theo, and Bertrand Venard. "Technical codes’potentialities in cybersecurity. A contextual approach on the ethics of small digital organizations in France." In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 2020. http://dx.doi.org/10.1109/cybersecurity49315.2020.9138895.
Full textSteinke, Gerhard, Ryan LaBrie, and Satadipa Sarkar. "Recommendation for Continuous Ethical Analysis of AI Algorithms." In EICC 2022: European Interdisciplinary Cybersecurity Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3528580.3532996.
Full textDavis, Brittany, Christopher Whitfield, and Mohd Anwar. "Extended Abstract: Ethical and Privacy Considerations in Cybersecurity." In 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018. http://dx.doi.org/10.1109/pst.2018.8514188.
Full textJoseph, Anthony, Tega Ileleji, and Mary Joseph. "CYBERSECURITY TALENT SHORTAGE: GENDER AND ETHNIC/RACIAL DIVERSITY." In 13th International Conference on Education and New Learning Technologies. IATED, 2021. http://dx.doi.org/10.21125/edulearn.2021.1936.
Full textWachter, S. "Ethical and normative challenges of identification in the Internet of Things." In Living in the Internet of Things: Cybersecurity of the IoT - 2018. Institution of Engineering and Technology, 2018. http://dx.doi.org/10.1049/cp.2018.0013.
Full textLorenz, Birgy, and Kaido Kikkas. "Pedagogical Challenges and Ethical Considerations in Developing Critical Thinking in Cybersecurity." In 2020 IEEE 20th International Conference on Advanced Learning Technologies (ICALT). IEEE, 2020. http://dx.doi.org/10.1109/icalt49669.2020.00085.
Full textPawlicka, Aleksandra, Marek Pawlicki, Rafał Renk, Rafał Kozik, and Michał Choraś. "The cybersecurity-related ethical issues of cloud technology and how to avoid them." In ARES 2022: The 17th International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3538969.3544456.
Full textPartadiredja, Reza Arkan, Carlos Entrena Serrano, and Davor Ljubenkov. "AI or Human: The Socio-ethical Implications of AI-Generated Media Content." In 2020 13th CMI Conference on Cybersecurity and Privacy (CMI) - Digital Transformation - Potentials and Challenges. IEEE, 2020. http://dx.doi.org/10.1109/cmi51275.2020.9322673.
Full text