Journal articles on the topic 'Cybersecurity ethics'

To see the other types of publications on this topic, follow the link: Cybersecurity ethics.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity ethics.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rajamäki, Jyri, and Heikki Hämäläinen. "Ethics of Cybersecurity and Biomedical Ethics: Case SHAPES." Information & Security: An International Journal 50 (2021): 103–16. http://dx.doi.org/10.11610/isij.5002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Timmers, Paul. "Ethics of AI and Cybersecurity When Sovereignty is at Stake." Minds and Machines 29, no. 4 (October 11, 2019): 635–45. http://dx.doi.org/10.1007/s11023-019-09508-4.

Full text
Abstract:
Abstract Sovereignty and strategic autonomy are felt to be at risk today, being threatened by the forces of rising international tensions, disruptive digital transformations and explosive growth of cybersecurity incidents. The combination of AI and cybersecurity is at the sharp edge of this development and raises many ethical questions and dilemmas. In this commentary, I analyse how we can understand the ethics of AI and cybersecurity in relation to sovereignty and strategic autonomy. The analysis is followed by policy recommendations, some of which may appear to be controversial, such as the strategic use of ethics. I conclude with a reflection on underlying concepts as an invitation for further research. The goal is to inspire policy-makers, academics and business strategists in their work, and to be an input for public debate.
APA, Harvard, Vancouver, ISO, and other styles
3

Formosa, Paul, Michael Wilson, and Deborah Richards. "A principlist framework for cybersecurity ethics." Computers & Security 109 (October 2021): 102382. http://dx.doi.org/10.1016/j.cose.2021.102382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Macnish, Kevin, and Jeroen van der Ham. "Ethics in cybersecurity research and practice." Technology in Society 63 (November 2020): 101382. http://dx.doi.org/10.1016/j.techsoc.2020.101382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mullahmetova, Diana I., and Andrey A. Kudelin. "Impact of Islamic Ethics on cybersecurity policy in Iran." RUDN Journal of World History 14, no. 1 (February 26, 2022): 33–42. http://dx.doi.org/10.22363/2312-8127-2022-14-1-33-42.

Full text
Abstract:
This article tries to investigate whether there is an influence of Islamic Ethics on cybersecurity policy in Iran. It represents the governments approaches towards formulating cybersecurity policy in the country. Islamic Ethics is vital because it is a backbone of a good society. Every Muslim should conduct in accordance with Islamic law and must remember that all actions have certain consequences and man is in charge of his behavior. Therefore, people will be able to live in peace and there wont be need to be afraid of criminals. Many recent studies have focused on the problem of Islamic ethics and its influence on different aspects of life of Muslims. It seems interesting to explore the relationships between Islamic ethics and IT because IT gets deeper into peoples life becoming the aspect that it is difficult - if not impossible - to imagine life without it nowadays. With the advent of information and communication technologies it is needed to concentrate on ethical foundations that are able to regulate cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
6

Shoemaker, Dan, Anne Kohnke, and Greg Laidlaw. "ETHICS AND CYBERSECURITY ARE NOT MUTUALLY EXCLUSIVE." EDPACS 60, no. 1 (July 3, 2019): 1–10. http://dx.doi.org/10.1080/07366981.2019.1651516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Loi, Michele, Markus Christen, Nadine Kleine, and Karsten Weber. "Cybersecurity in health – disentangling value tensions." Journal of Information, Communication and Ethics in Society 17, no. 2 (May 13, 2019): 229–45. http://dx.doi.org/10.1108/jices-12-2018-0095.

Full text
Abstract:
Purpose Cybersecurity in healthcare has become an urgent matter in recent years due to various malicious attacks on hospitals and other parts of the healthcare infrastructure. The purpose of this paper is to provide an outline of how core values of the health systems, such as the principles of biomedical ethics, are in a supportive or conflicting relation to cybersecurity. Design/methodology/approach This paper claims that it is possible to map the desiderata relevant to cybersecurity onto the four principles of medical ethics, i.e. beneficence, non-maleficence, autonomy and justice, and explore value conflicts in that way. Findings With respect to the question of how these principles should be balanced, there are reasons to think that the priority of autonomy relative to beneficence and non-maleficence in contemporary medical ethics could be extended to value conflicts in health-related cybersecurity. Research limitations/implications However, the tension between autonomy and justice, which relates to the desideratum of usability of information and communication technology systems, cannot be ignored even if one assumes that respect for autonomy should take priority over other moral concerns. Originality/value In terms of value conflicts, most discussions in healthcare deal with the conflict of balancing efficiency and privacy given the sensible nature of health information. In this paper, the authors provide a broader and more detailed outline.
APA, Harvard, Vancouver, ISO, and other styles
8

Weber, Karsten, Michele Loi, Markus Christen, and Nadine Kleine. "Digital Medicine, Cybersecurity, and Ethics: An Uneasy Relationship." American Journal of Bioethics 18, no. 9 (September 2, 2018): 52–53. http://dx.doi.org/10.1080/15265161.2018.1498935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.

Full text
Abstract:
AbstractThe cyber realm is increasingly vital to national security, but much of cybersecurity is provided privately. Private firms provide a range of roles, from purely defensive operations to more controversial ones, such as active-cyber defense (ACD) and ‘hacking back’. As with the outsourcing of traditional military and security services to private military and security companies (PMSCs), the reliance on private firms raises the ethical question of to what extent the private sector should be involved in providing security services. In this article, I consider this question. I argue that a moderately restrictive approach should be adopted, which holds that private firms can justifiably launch some cybersecurity services – defensive measures – but are not permitted to perform others – offensive measures.
APA, Harvard, Vancouver, ISO, and other styles
10

Bhargava, Nimisha, Mani Kumari Madala, and Darrell Norman Burrell. "Emotional Acumen on the Propensity of Graduating Technology Students to Whistle-Blow About Organizational Cyber Security Breaches." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 1–14. http://dx.doi.org/10.4018/ijseus.2018100101.

Full text
Abstract:
Emotional acumen is relatively a new concept compared to the other decision-making variables in the existing literature. Comprehending the procedure in which the individuals captivate themselves in ethical decision-making and the factors stimulating this procedure may be imperative for burgeoning more efficient education for ethics. The U.S. Securities and Exchange Commission issued new guidance calling on public companies to be more forthcoming when disclosing nature and scope of cybersecurity breaches. The statement also warns that corporate insiders must not trade shares when they have information about cybersecurity issues that is not public yet. Understanding the emotional underpinnings is critical to guiding how individuals deal with the complex nature of morally infused predicaments, their awareness of the moral dilemma, judgments about the potential consequences and their intention to act or propensity to whistle-blow related to cybersecurity breaches are significantly affected by the emotional acumen.
APA, Harvard, Vancouver, ISO, and other styles
11

Aripin, Norizah, Sabrina Mohd Rashid, Awan Ismail, and Revathy Amadera Limgam. "ETHICS AND LAW ON FLAMING ON YOUTUBE: A PERCEPTION FROM THE FLAMERS ON YOUTUBE." International Journal of Law, Government and Communication 5, no. 19 (June 10, 2020): 54–67. http://dx.doi.org/10.35631//ijlgc.519004.

Full text
Abstract:
Flaming activity on YouTube is a part of cyber-bullying in social media. Today, the YouTube website has been labeled as a page that contains a lot of flaming. It is claimed that flamers debate and comment on the issues on YouTube without taking ethics and law into consideration. The design of this research is to study the views and opinions on law and ethics in the use of YouTube from the flamer’s point of view. This study uses a qualitative methodology. Face-to-face interviews are conducted by involving five informants who are the flamers on YouTube. Thematic analysis is used to analyze the data. The findings show that informants have an understanding of certain ethics before flaming on YouTube. However, almost all the informants have a lack of knowledge of the laws implemented on cybersecurity in Malaysia especially on flaming on YouTube. The findings of this study conclude that informants practice a certain type of ethics when accessing YouTube, but lack awareness of the laws implemented on cybersecurity when commenting on the site.
APA, Harvard, Vancouver, ISO, and other styles
12

Dalave, Chetan Vijaykumar, Anushka Alok Lodh, and Tushar Vijaykumar Dalave. "A Study of Cyber Security Challenges and Developing Tendencies in the Latest Technologies." International Journal for Research in Applied Science and Engineering Technology 10, no. 10 (October 31, 2022): 1371–75. http://dx.doi.org/10.22214/ijraset.2022.47183.

Full text
Abstract:
Abstract: Today, with modern lifestyles, people have become involved in the life and use of technology. More technology for financial transactions as well as shopping in their cyberspace.At the same time, the protection of knowledge has become increasingly difficult. In addition, the proliferation of social media has led to an increase in online crime or cybercrime. in the world data security plays an important role in information technology. Information with security become one of the major challenges of today. Whenever we think of cybersecurity, we come first think of the 'cybercrimes' that are spreading every day. Different governments and Businesses take various steps to avoid this form of cybercrime. In addition to numerous cyber security measures, many people are also very worried about it. This paper focuses primarily on cybersecurity concerns related to new technology. It also focuses on the new. Cybersecurity, ethics, and technologies for development that affect cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
13

Morrow, Paul J. "The New Age Of Cybersecurity Privacy, Criminal Procedure And Cyber Corporate Ethics." Journal of Cybersecurity Research (JCR) 3, no. 1 (December 20, 2018): 19–28. http://dx.doi.org/10.19030/jcr.v3i1.10241.

Full text
Abstract:
This paper reviews cybersecurity and the new criminal procedure standards of searches and seizures based on the perspectives of probable cause in the digital age involving cell phones. Also, this paper examines the civil corporate policy perspectives involving data breaches as the topic relates to the consumer using social media and provides guidance for executives to enact proper and responsible corporate policies navigating the new cybersecurity landscape in the post - Carpenter vs. U.S. era. Reading this paper is worth your time because: (1) you will learn the new cybercrimes legal standards involved with cyber-privacy and the criminal process which is necessary to develop director competencies; (2) you will gain knowledge which is the key to proposing ethical systems within the corporation required by law; (3) moving forward, we are at a critical point in America and good guidance is vitally important.
APA, Harvard, Vancouver, ISO, and other styles
14

Farringer, Deborah R. "Maybe If We Turn It Off and Then Turn It Back On Again? Exploring Health Care Reform as a Means to Curb Cyber Attacks." Journal of Law, Medicine & Ethics 47, S4 (2019): 91–102. http://dx.doi.org/10.1177/1073110519898046.

Full text
Abstract:
The health care industry has moved at a rapid pace away from paper records to an electronic platform across almost all sectors — much of it at the encouragement and insistence of the federal government. Such rapid expansion has increased exponentially the risk to individuals in the privacy of their data and, increasingly, to their physical well-being when medical records are inaccessible through ransomware attacks. Recognizing the unique and critical nature of medical records, the United States Congress established the Health Care Industry Cybersecurity Task Force under the Cybersecurity Information Sharing Act of 2015 for the purpose of reviewing cybersecurity risks within the health care industry and identifying who will lead and coordinate efforts to address such risks among the various agencies. The Task Force has since issued a report setting forth six high-level imperatives that the health care industry needs to achieve in order to combat cybersecurity, and, notably, many of the vulnerabilities plaguing the industry identified in the Report as requiring correction are not necessarily related to specific flaws in the current cybersecurity framework, but rather susceptibilities presented by the infrastructure and associated regulatory regime that has evolved over the last few decades over the health care industry generally. That is, the current health care infrastructure by its nature exacerbates cybersecurity risk. Between a lack of information sharing of industry threats, risks, and mitigations, disparate leadership and governance goals for cybersecurity, the confluence and contradiction of existing federal and state laws, fragmentation in the fee-for-service delivery system, lack of care coordination, and disparate resources across and among sectors, the industry suffers from heightened cyber risk. Solutions that are reactive to problems within the current infrastructure will likely have little long term impact toward reducing cybersecurity vulnerabilities because they do not address the underlying system challenges. All of these confluences causes one to wonder whether if in fact the current health care delivery infrastructure is a contributing factor to the incidents of cybersecurity attacks and the exorbitant costs associated with resolving data breaches, should Congress look not just to curb breach incidents, but to address root cause systematic challenges in the health industry infrastructure that create increased exposure of cybersecurity threats? This article argues that cybersecurity risks will continue to be heightened and more costly to the health care industry as compared to other industries unless and until some general system redesign is achieved that allows for (1) greater sharing of resources among industry participants to ensure the same protections are implemented at all levels of the industry, which can be strengthened through greater interoperability of systems across the health care industry; and (2) increased focus and attention on the importance of cybersecurity issues as a priority among system reforms.
APA, Harvard, Vancouver, ISO, and other styles
15

MAROZ, Nataliya. "A Critical Analysis of the Need for a Stronger International Legal Framework for Cyber Ethics in Times of Pandemic." Revista Etică și Deontologie 2021, no. 1 (October 20, 2021): 60–73. http://dx.doi.org/10.52744/red.2021.01.08.

Full text
Abstract:
Cyber technologies have changed both social and international relations dramatically. The influence of information and telecommunication technologies (hereafter – ICTs) extends from daily life to fundamental freedoms, economies, public administration and political relations. Recent changes brought by coronavirus has emphasized the world’s heavy dependence on ICTs. The technologies provide a virtual environment for normal working processes, ensure e-procurement for medical equipment and supplies, raise awareness of coronavirus prevention, maintain people’s life at hospitals etc. However, ICTs not only provide considerable benefits to society as a whole, but also can be used for criminal purposes as well as in manner inconsistent with the Charter of the United Nations to inflict substantial damage to critical infrastructure of a state, interfere in elections, block e-government and bank services etc. The pandemic has led to the introduction of new cyber challenges and risks. At the same time, there is no international treaty on cybersecurity as well as on combating cybercrime concluded under the auspices of the United Nations that could be applicable to cope with these newly emerged threats. In this situation, cybersecurity challenges might be addressed through ethical norms, which are more flexible than international legal norms. Thus, in the absence of comprehensive legal response to cyber risks cyber ethics is particularly important. Therefore, the article analyzes international legal basis for international cyber ethics. It distinguishes the types of international relations that are regulated by ethical norms. The research defines new risks to cyber security that have emerged during the pandemic and discusses possible ways to respond them through cyber ethics. The paper expresses a view that ethical rules concerning friendly and responsible state behaviour in the context of combating cybercrime should be reflected in an international convention on countering the use of information and communications technologies for criminal purposes, which is going to be developed under the auspices of the United Nations.
APA, Harvard, Vancouver, ISO, and other styles
16

Almoughem, Khaled. "The Future of Cybersecurity Workforce Development." Academic Journal of Research and Scientific Publishing 4, no. 45 (January 5, 2023): 37–48. http://dx.doi.org/10.52132/ajrsp.en.2023.45.3.

Full text
Abstract:
This paper will discuss the future of cybersecurity workforce development. Cybersecurity is a field that is increasingly becoming important in today's workplaces. Considering the rapid growth of technology, it is expected that the field of cybersecurity will change significantly in the future. As such, preparedness is needed to ensure that the future cybersecurity workforce is not hindered by a lack of training, resources, or technical expertise. The personality traits of a cybersecurity professional should be evaluated before the assumption of a given occupation to ensure that this professional is the best fit and possesses all skills, values, and values required for that post. Teamwork should be integral in future workforce development because, according to the current trend in different industries, being a team player is essential. Lastly, cybersecurity professionals should be trained to observe ethics and civic duty by being loyal to their employers. They should also prioritize continued learning because the cyber domain is ever-changing and requires flexibility and adjustment. This paper will first explore the cyber environment and highlight some of the challenges currently facing the area. Next, the most fundamental skills needed for the furtherance of this field will be covered. One area that will be the paper's focus will be the importance of social skills. The article will finally provide an overview of some of the anticipated changes that will take place in the area of cybersecurity workforce development.
APA, Harvard, Vancouver, ISO, and other styles
17

Kanu, Ved Prakash Sah, Yusuf Ai Naiem, and Sudha Shanker Prasad. "A Research of Cybersecurity and Threats in Emerging Technologies." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2935–38. http://dx.doi.org/10.22214/ijraset.2022.41858.

Full text
Abstract:
Abstract: Cyber security is crucial in the information technology field in today's world. Because every piece of data is now housed online, securing data has become one of the most challenging responsibilities. The first thing that comes to mind when we think of cyber security is cyber criminals, namely hacking, which is on the rise. To tackle cybercrime, several governments and corporations are pursuing several measures. Aside from spectacular attempts, many people still have concerns about cyber security. This study focuses mostly on the issues that cyber security faces with emerging technology. It also concentrates on the most important aspects of data security, such as methods, ethics, and developments that are transforming the public's belief in cyber security. Keywords: Cyber security, cybercrime, firewall, social media, cloud computing, and hacking
APA, Harvard, Vancouver, ISO, and other styles
18

Giansanti, Daniele, and Rosario Alfio Gulino. "The Cybersecurity and the Care Robots: A Viewpoint on the Open Problems and the Perspectives." Healthcare 9, no. 12 (November 29, 2021): 1653. http://dx.doi.org/10.3390/healthcare9121653.

Full text
Abstract:
Care robots represent an opportunity for the health domain. The use of these robots has important implications. They can be used in surgery, rehabilitation, assistance, therapy, and other medical fields. Therefore, care robots (CR)s, have both important physical and psychological implications during their use. Furthermore, these devices, meet important data in clinical applications. These data must be protected. Therefore, cybersecurity (CS) has become a crucial characteristic that concerns all the involved actors. The study investigated the collocation of CRs in the context of CS studies in the health domain. Problems and peculiarities of these devices, with reference to the CS, were faced, investigating in different scientific databases. Highlights, ranging also from ethics implications up to the regulatory legal framework (ensuring safety and cybersecurity) have been reported. Models and cyber-attacks applicable on the CRs have been identified.
APA, Harvard, Vancouver, ISO, and other styles
19

Burmeister, Oliver, Jackie Phahlamohlaka, and Yeslam Al-Saggaf. "Good Governance and Virtue in South Africa's Cyber Security Policy Implementation." International Journal of Cyber Warfare and Terrorism 5, no. 1 (January 2015): 19–29. http://dx.doi.org/10.4018/ijcwt.2015010102.

Full text
Abstract:
Good governance from an ethical perspective in cyberdefence policy has been seen in terms of duty and consequentialism. Yet the negotiated view of virtue ethics can also address how nation states mitigate the risks of a cyber attack to their national interests and to prepare for a cyber offence in response to an attack. A discourse analysis of the “0x Omar”-Israeli conflict of 2012, as reported in the Arabic and English media and on the Internet, is used to explore ethical issues that this case raises and to examine how the risks posed could be mitigated in relation to relevant elements of the South African cybersecurity policy framework. Questions raised include: At what point does the policy require a nation state to prepare for a cyber offence in response to a cyber attack? Ethically, how are such actions consistent with the principle of good governance?
APA, Harvard, Vancouver, ISO, and other styles
20

Kamerer, Jessica L., and Donna McDermott. "Cybersecurity: Nurses on the Front Line of Prevention and Education." Journal of Nursing Regulation 10, no. 4 (January 2020): 48–53. http://dx.doi.org/10.1016/s2155-8256(20)30014-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lyeonov, Serhiy, Оlha Кuzmenko, Hanna Yarovenko, and Tatiana Dotsenko. "The Innovative Approach to Increasing Cybersecurity of Transactions Through Counteraction to Money Laundering." Marketing and Management of Innovations, no. 3 (2019): 308–26. http://dx.doi.org/10.21272/mmi.2019.3-24.

Full text
Abstract:
A current task is to provide the economic security of any country in the context of creating effective and reliable measures of the banking cybersecurity system against money laundering. First of all, it relates to the fact that the money laundering processes and financing of terrorism negatively influence the economy of any country and reduce the economic security level. Secondly, the high level of money laundering in the country promotes the emergence of such negative processes as corruption, extortion, drug production, people smuggling, gangsterism, terrorism, which leads to an increase of the crime situation in the country and endangers the lives of the population. Thirdly, the existing cybersecurity measures of banks do not affect the security of transactions in a timely manner to identify funds obtained illegally. Therefore, exactly this aspect is required changes and modernization in order to accomplish the task. The aim of the article is to develop the innovative scientific and methodic approach to the country’s attractiveness modelling for proceeds laundering by other countries. This technique is one of the tools of the bank’s cybersecurity system for making further decisions regarding the risk of legalization. In order to solve this problem authors suggest the approach, which is based on gravity modelling. Eight factors: Gross Domestic Product per capita, Claims on the central government, Internally displaced persons, associated with conflict and violence; Automatic Exchange of Information; Corruption Perceptions Index; Global Terrorism Index; Legatum Prosperity Index; Happy Planet Index are proposed to be evaluated using the expert approach to implement the above approach. Then the integral indicator is calculated using the Minkowski metric and taking into account the factors normalization. Using the gravity model, the country’s attractiveness degree considering is defined for proceeds laundering on the part of another country. Data for 105 countries are used for calculation and results for Ukraine, Poland and Germany are represented. As a result, we can see that developed countries with high welfare level are attractive for developing countries for money laundering, countries with low welfare level, low economic development and unstable political situation are attractive for the developed countries. The proposed methodology is recommended to be introduced in the activity of banks' cybersecurity systems. It will allow identifying transactions of those countries for which the risk of legalization is high and introduce additional monitoring to regard the legitimacy of their financial sources. In addition, it is expedient to use the model in the activities of the country’s regulatory authorities, which will promote the introduction of cybersecurity standards and increase the ethics of financial relations between countries. Keywords: cybersecurity, money laundering, gravity modelling, country attractiveness, risk, expert approach, normalization, Minkowski metric.
APA, Harvard, Vancouver, ISO, and other styles
22

Pallangyo, Hakeem. "Cyber Security Challenges, its Emerging Trends on Latest Information and Communication Technology and Cyber Crime in Mobile Money Transaction Services." Tanzania Journal of Engineering and Technology 41, no. 2 (August 5, 2022): 189–204. http://dx.doi.org/10.52339/tjet.v41i2.792.

Full text
Abstract:
This paper investigates the challenges emerging trends on latest Information and Communication Technology and cybercrime in mobile money transaction services in Tanzania. The objective of this is to evaluate the challenges associated with this rapid growth in ICT and to determine factors influencing Cybersecurity readiness and Cybercrimes in mobile money transaction services. Cyber Security plays a significant role in the field of Information and Communication Technology especially on mobile money transaction services. The study recognizes the provision of mobile money services by both telecommunication companies and local banks, the fact is that whenever we think about the cyber security, the first thing that comes to our mind is “cybercrimes” which are increasing extremely day to day and become a threat. Cybercrimes are mostly practiced through both internet and mobile money services. Securing the information has become one of the major challenges in the present day. Various Governments and companies are taking measures in order to prevent these cybercrimes. Besides cyber security remains concern to many. This paper mainly focuses on challenges faced by cyber security on the latest information and communication technology and cybercrime especially in mobile money transaction services in Tanzania. Its latest techniques, ethics and trends that change the face of cyber security. Relevant data was collected from the Forensic Section of the Tanzania Police Force, Mobile banking mobile money agents and users of the mobile-money services. This study also used the Pearson correlation and analysis of variance (ANOVA) to establish different facts and determine whether the independent variables had a combined effect on the dependent variable. The findings of the study revealed that there is a positive and significant correlation between users’ awareness, mobile money agents training, top management support, technical and logical controls and cybersecurity readiness. The study also concluded that effective training programs aimed to enlighten the users and mobile money agents on cybersecurity issues are an important ingredient for cybersecurity readiness in cybercrime in mobile money transaction services.
APA, Harvard, Vancouver, ISO, and other styles
23

Lim, Hazel Si Min, and Araz Taeihagh. "Algorithmic Decision-Making in AVs: Understanding Ethical and Technical Concerns for Smart Cities." Sustainability 11, no. 20 (October 18, 2019): 5791. http://dx.doi.org/10.3390/su11205791.

Full text
Abstract:
Autonomous Vehicles (AVs) are increasingly embraced around the world to advance smart mobility and more broadly, smart, and sustainable cities. Algorithms form the basis of decision-making in AVs, allowing them to perform driving tasks autonomously, efficiently, and more safely than human drivers and offering various economic, social, and environmental benefits. However, algorithmic decision-making in AVs can also introduce new issues that create new safety risks and perpetuate discrimination. We identify bias, ethics, and perverse incentives as key ethical issues in the AV algorithms’ decision-making that can create new safety risks and discriminatory outcomes. Technical issues in the AVs’ perception, decision-making and control algorithms, limitations of existing AV testing and verification methods, and cybersecurity vulnerabilities can also undermine the performance of the AV system. This article investigates the ethical and technical concerns surrounding algorithmic decision-making in AVs by exploring how driving decisions can perpetuate discrimination and create new safety risks for the public. We discuss steps taken to address these issues, highlight the existing research gaps and the need to mitigate these issues through the design of AV’s algorithms and of policies and regulations to fully realise AVs’ benefits for smart and sustainable cities.
APA, Harvard, Vancouver, ISO, and other styles
24

Domingo-Ferrer, Josep, and Alberto Blanco-Justicia. "Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph." Science and Engineering Ethics 26, no. 3 (September 30, 2019): 1267–85. http://dx.doi.org/10.1007/s11948-019-00138-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Saputra, Afriyan Arya, Muhammad Iqbal Fasa, and Diana Ambarwati. "Islamic-Based Digital Ethics: The Phenomenon of Online Consumer Data Security." Share: Jurnal Ekonomi dan Keuangan Islam 11, no. 1 (June 30, 2022): 105. http://dx.doi.org/10.22373/share.v11i1.11167.

Full text
Abstract:
This paper seeks to explain the problem of widespread consumer data theft and the significance of online consumer data privacy in a review of Islamic values-based digital ethics. This research employs a qualitative approach by reviewing a variety of books, journals, papers, and other reputable sources, which are then examined using content analytic tools. The findings of this research indicate that first and foremost, effective cybersecurity will secure customer data. Second, ethical conduct derived from Islamic beliefs will be able to deter criminal activity and data breaches against consumers. Data privacy is a fundamental right that must be maintained collectively, according to Islam. The key to combating crime and breaches in the digital environment is hence the precautionary principle of stakeholders.==========================================================================================================ABSTRAK – Etika Digital Berbasis Islam: Fenomena Keamanan Data Konsumen Online. Penelitian ini bertujuan untuk menjelaskan fenomena maraknya pencurian data konsumen serta melihat posisi penting privasi data konsumen online dalam tinjauan etika digital berbasis nilai Islam. Penelitian ini menggunakan metode kualitatif, dengan menelaah berbagai literatur baik buku, jurnal, laporan dan sumber reliable lainnya yang kemudian dianalisis menggunakan teknik content analysis. Hasil penelitian ini menemukan bahwa, pertama, keamanan siber yang baik akan mampu melindungi data konsumen. kedua, perilaku etis yang bersumber dari nilai Islam akan mampu mencegah kejahatan dan pelanggaran data konsumen. Ketiga, dalam Islam data privasi merupakan hak dasar yang harus dihormati secara bersama-sama. Untuk itu prinsip kehati-hatian daripara stakeholder menjadi kunci melawan kajahatan dan pelanggaran diruang digital.
APA, Harvard, Vancouver, ISO, and other styles
26

Greenbaum, Dov. "Cyberbiosecurity: An Emerging Field that has Ethical Implications for Clinical Neuroscience." Cambridge Quarterly of Healthcare Ethics 30, no. 4 (October 2021): 662–68. http://dx.doi.org/10.1017/s096318012100013x.

Full text
Abstract:
AbstractCyberbiosecurity is an emerging field that relates to the intersection of cybersecurity and the clinical and research practice in the biosciences. Beyond the concerns that usually arise in the areas of genomics, this paper highlights ethical concerns raised by cyberbiosecurity in clinical neuroscience. These concerns relate not only to the privacy of the data collected by imaging devices, but also the concern that patients using various stimulatory devices can be harmed by a hacker who either obfuscates the outputs or who interferes with the stimulatory process. The paper offers some suggestions as to how to rectify these increasingly dire concerns.
APA, Harvard, Vancouver, ISO, and other styles
27

M. Skriabin, Oleksii, Dmytro B. Sanakoiev, Natalia D. Sanakoieva, Vita V. Berezenko, and Yuliia V. Liubchenko. "Neurotechnologies in the advertising industry: Legal and ethical aspects." Innovative Marketing 17, no. 2 (June 29, 2021): 189–201. http://dx.doi.org/10.21511/im.17(2).2021.17.

Full text
Abstract:
As a result of technological and information development, there is a rapid spread of neurotechnology in the advertising industry, which sparks debate among law and marketing scholars regarding ethics, reasonability and legality of their use. The paper aims to identify possible ways to increase the effectiveness of regulatory and ethical aspects of using neurotechnology in Ukraine’s advertising industry. Based on a systematic analysis of theoretical experience and regulatory legal acts, the main threats to the development of neuromarketing are identified. The lack of a neurotechnology law, the distinguishing between “neuro data” and “personal data”, cyber-hacking risks, the lack of an interaction model between the state and advertisers are deemed to be regulatory shortcomings. Possible ways to optimize the legal regulation of the neurotechnology use are the development of a neurotechnology law, the legislative enshrinement of the neuro data concept, the introduction of restrictions on neuro data use depending on the industry and purpose, increased cybersecurity level. Threats to the ethical use of neurotechnology include low public awareness of neurotechnology and personal rights of citizens, lack of training activities for marketers and advertisers in the field of neuroscience. It is possible to overcome ethical threats through educational and informational work for marketers, advertisers and citizens. A comprehensive solution to the ethical and legal shortcomings of neurotechnology use will increase the neurotechnology development level, the proficiency level of marketers and advertisers, as well as improve the legal system in Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
28

Bistron, Marta, and Zbigniew Piotrowski. "Artificial Intelligence Applications in Military Systems and Their Influence on Sense of Security of Citizens." Electronics 10, no. 7 (April 6, 2021): 871. http://dx.doi.org/10.3390/electronics10070871.

Full text
Abstract:
The paper presents an overview of current and expected prospects for the development of artificial intelligence algorithms, especially in military applications, and conducted research regarding applications in the area of civilian life. Attention was paid mainly to the use of AI algorithms in cybersecurity, object detection, military logistics and robotics. It discusses the problems connected with the present solutions and how artificial intelligence can help solve them. It briefly presents also mathematical structures and descriptions for ART, CNN and SVM networks as well as Expectation–Maximization and Gaussian Mixture Model algorithms that are used in solving of discussed problems. The third chapter discusses the attitude of society towards the use of neural network algorithms in military applications. The basic problems related to ethics in the application of artificial intelligence and issues of responsibility for errors made by autonomous systems are discussed.
APA, Harvard, Vancouver, ISO, and other styles
29

Sini, Jacopo, Antonio Costantino Marceddu, and Massimo Violante. "Automatic Emotion Recognition for the Calibration of Autonomous Driving Functions." Electronics 9, no. 3 (March 21, 2020): 518. http://dx.doi.org/10.3390/electronics9030518.

Full text
Abstract:
The development of autonomous driving cars is a complex activity, which poses challenges about ethics, safety, cybersecurity, and social acceptance. The latter, in particular, poses new problems since passengers are used to manually driven vehicles; hence, they need to move their trust from a person to a computer. To smooth the transition towards autonomous vehicles, a delicate calibration of the driving functions should be performed, making the automation decision closest to the passengers’ expectations. The complexity of this calibration lies in the presence of a person in the loop: different settings of a given algorithm should be evaluated by assessing the human reaction to the vehicle decisions. With this work, we for an objective method to classify the people’s reaction to vehicle decisions. By adopting machine learning techniques, it is possible to analyze the passengers’ emotions while driving with alternative vehicle calibrations. Through the analysis of these emotions, it is possible to obtain an objective metric about the comfort feeling of the passengers. As a result, we developed a proof-of-concept implementation of a simple, yet effective, emotions recognition system. It can be deployed either into real vehicles or simulators, during the driving functions calibration.
APA, Harvard, Vancouver, ISO, and other styles
30

Grishanina, Tat’yana A. "ARTIFICIAL INTELLIGENCE IN INTERNATIONAL RELATIONS: ROLE AND RESEARCH DIMENSIONS." RSUH/RGGU Bulletin. Series Political Sciences. History. International Relations, no. 4 (2021): 10–18. http://dx.doi.org/10.28995/2073-6339-2021-4-10-18.

Full text
Abstract:
The article covers certain aspects of artificial intelligence in international relations. The study aims at identifying the role and key dimensions of AI research and application in international relations. The results of the study reveal paradigmatic differences in the approaches to the research of AI in international relations. Research dimensions include international security and the new types of conflicts, technological competition and sustainable development, ethics and human rights. As far as the application of AI in foreign policy is concerned, the expert discourse was analyzed and three utilitarian functions of AI were identified: 1) AI as a diplomatic tool; 2) AI as a topic for negotiations; 3) AI as a factor of the changes in the international environment. Thus, AI is one of the key technologies for the next decade with the potential to become a core factor in the redistribution of power in the international system. As part of international relations digitalization, AI influences the actors’ perceptions of the changing system. At this point, most research papers deal with AI within the framework of cybersecurity. This article aligns various approaches and presents a comprehensive perspective of AI in international relations.
APA, Harvard, Vancouver, ISO, and other styles
31

Wolter, Stefan, Giancarlo Caccia Dominioni, Sebastian Hergeth, Fabio Tango, Stuart Whitehouse, and Frederik Naujoks. "Human–Vehicle Integration in the Code of Practice for Automated Driving." Information 11, no. 6 (May 27, 2020): 284. http://dx.doi.org/10.3390/info11060284.

Full text
Abstract:
The advancement of SAE Level 3 automated driving systems requires best practices to guide the development process. In the past, the Code of Practice for the Design and Evaluation of ADAS served this role for SAE Level 1 and 2 systems. The challenges of Level 3 automation make it necessary to create a new Code of Practice for automated driving (CoP-AD) as part of the public-funded European project L3Pilot. It provides the developer with a comprehensive guideline on how to design and test automated driving functions, with a focus on highway driving and parking. A variety of areas such as Functional Safety, Cybersecurity, Ethics, and finally the Human–Vehicle Integration are part of it. This paper focuses on the latter, the Human Factors aspects addressed in the CoP-AD. The process of gathering the topics for this category is outlined in the body of the paper. Thorough literature reviews and workshops were part of it. A summary is given on the draft content of the CoP-AD Human–Vehicle Integration topics. This includes general Human Factors related guidelines as well as Mode Awareness, Trust, and Misuse. Driver Monitoring is highlighted as well, together with the topic of Controllability and the execution of Customer Clinics. Furthermore, the Training and Variability of Users is included. Finally, the application of the CoP-AD in the development process for Human-Vehicle Integration is illustrated.
APA, Harvard, Vancouver, ISO, and other styles
32

Marchang, Jims, and Alessandro Di Nuovo. "Assistive Multimodal Robotic System (AMRSys): Security and Privacy Issues, Challenges, and Possible Solutions." Applied Sciences 12, no. 4 (February 19, 2022): 2174. http://dx.doi.org/10.3390/app12042174.

Full text
Abstract:
Assistive robotic systems could be a suitable solution to support a variety of health and care services, help independent living, and even simulate affection, to reduce loneliness. However, adoption is limited by several issues, as well as user concerns about ethics, data security, and privacy. Other than the common threats related to internet connectivity, personal robotic systems have advanced interaction possibilities, such as audio, video, touch, and gestures, which could be exploited to gain access to private data that are stored in the robot. Therefore, novel, safer methods of interaction should be designed to safeguard users’ privacy. To solicit further research on secure and private multimodal interaction, this article presents a thorough study of the state-of-the-art literature on data security and user privacy in interactive social robotic systems for health and care. In our study, we focus on social robotics to assist older people, which is a global challenge that is receiving a great deal of attention from the robotics and social care communities. This application will have a significant positive impact on the economy and society, but poses various security and privacy issues. This article analyses the key vulnerable areas where data leakage could occur during a multimodal interaction with a personal assistive robotic system. Thus, blockchain with a resource-aware framework, along with a continuous multifactor authentication mechanism, are envisaged as a potential solution for making such systems secure by design; therefore, increasing trust, acceptability, and adoption. Among the key cybersecurity research challenges, it is crucial to create an intelligent mechanism that autonomously determines the right trade-off between continuous user prompts and system usability, according to data types and personal preferences.
APA, Harvard, Vancouver, ISO, and other styles
33

BILOBROV, O. "CONTENT AND STRUCTURE OF THE CONCEPTUAL CONSTRUCT «INFORMATION AND DIGITAL COMPETENCE OF STUDENTS»." Scientific papers of Berdiansk State Pedagogical University Series Pedagogical sciences 1, no. 2 (October 6, 2022): 62–73. http://dx.doi.org/10.31494/2412-9208-2022-1-2-62-73.

Full text
Abstract:
The article substantiates the content and structure of the conceptual construct of «information and digital competence of students» of secondary schools. It is noted that there is no single approach to determining the information and digital competence of students in the use of information and digital technologies in their educational activities, and those that exist are typologically related, with different component structure. Based on the analysis of modern understanding of the pedagogical phenomenon of «information and digital competence» the definition of «information and digital competence of the student», which involves confident and critical use of information and communication technologies to create, search, process, exchange information in the learning process. public school space and private communication. It is noted that in the Concept «New Ukrainian School» competence is interpreted as a dynamic combination of knowledge, ways of thinking, views, values, skills, abilities, and other personal qualities that determine a person's ability to successfully conduct educational and further professional activities. It is shown that the training of a highly qualified and competent person in modern society is one of the priority areas in reforming the current educational space of Ukraine. The reform of the New Ukrainian School is aimed at the development and mastery of key competencies by students, in particular-information and digital. The structure of information and digital competence of students is offered, which includes information and media literacy, basics of programming, algorithmic thinking, ability to work with databases, skills of Internet security and cybersecurity, as well as understanding of ethics of information (copyright, intellectual property etc). The combination of knowledge, skills and abilities opens up opportunities for students such as the ability to carry out web design, develop presentations, use graphics programs, the availability of information from online libraries, web browsers, Word, etc. Key words: competence, information competence, digital competence, information-digital competence, structure of information-digital competence, competence approach.
APA, Harvard, Vancouver, ISO, and other styles
34

Cleveland, Marisa, and Tonia Spangler. "Toward a Model for Ethical Cybersecurity Leadership." International Journal of Smart Education and Urban Society 9, no. 4 (October 2018): 29–36. http://dx.doi.org/10.4018/ijseus.2018100103.

Full text
Abstract:
With no clear model for ethical cybersecurity leadership, the field of cybersecurity is largely unregulated. The advances in technology and the Internet of Things come at a price—security. Since there is a lack of regulation, no clear guidelines exist. Furthermore, there is a gap in the literature to identify a set of global ethical standards for cybersecurity leaders. This article proposes an international model of ethical standards with three ethical propositions to ensure the users of technology in today's global industry remain confident in the corporations entrusted with the users' information.
APA, Harvard, Vancouver, ISO, and other styles
35

Oruc, Aybars. "Ethical Considerations in Maritime Cybersecurity Research." TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation 16, no. 2 (2022): 309–18. http://dx.doi.org/10.12716/1001.16.02.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Rangarajan (Ray) Parthasarathy, David K. Wyant, Prasad Bingi, James R. Knight, and Anuradha Rangarajan. "DeTER Framework." International Journal of Intelligent Information Technologies 17, no. 2 (April 2021): 1–24. http://dx.doi.org/10.4018/ijiit.2021040101.

Full text
Abstract:
The use of health apps on mobile devices by healthcare providers and receivers (patients) is proliferating. This has elevated cybersecurity concerns owing to the transmittal of personal health information through the apps. Research literature has mostly focused on the technology aspects of cybersecurity in mobile healthcare. It is equally important to focus on the ethical and regulatory perspectives. This article discusses cybersecurity concerns in mobile healthcare from the ethical perspective, the regulatory/compliance perspective, and the technology perspective. The authors present a comprehensive framework (DeTER) that integrates all three perspectives through which cybersecurity concerns in mobile healthcare could be viewed, understood, and acted upon. Guidance is provided with respect to leveraging the framework in the decision-making process that occurs during the system development life cycle (SDLC). Finally, the authors discuss a case applying the framework to a situation involving the development of a contact tracing mobile health app for pandemics such as COVID-19.
APA, Harvard, Vancouver, ISO, and other styles
37

Onwubiko, Cyril, and Karim Ouazzane. "Multidimensional Cybersecurity Framework for Strategic Foresight." International Journal on Cyber Situational Awareness 6, no. 1 (February 4, 2022): 46–77. http://dx.doi.org/10.22619/ijcsa.2021.100137.

Full text
Abstract:
Cybersecurity is now at the forefront of most organisations’ digital transformative agendas and National economic, social and political programmes. Hence its impact to society can no longer be seen to be one dimensional. The rise in National cybersecurity laws and regulations is a good indicator of its perceived importance to nations. And the recent awakening for social and ethical transparency in society and coupled with sustainability issues demonstrate the need for a paradigm shift in how cybersecurity discourses can now happen. In response to this shift, a multidimensional cybersecurity framework for strategic foresight underpinned on situational awareness is proposed. The conceptual cybersecurity framework comprising six domains – Physical, Cultural, Economic, Social, Political and Cyber – is discussed. The guiding principles underpinning the framework are outlined, followed by in-depth reflection on the Business, Operational, Technological and Human (BOTH) factors and their implications for strategic foresight for cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
38

Hu, Yen-Hung (Frank). "Providing A Hands-on Advanced Persistent Threat Learning Experience Through Ethical Hacking Labs." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (March 8, 2022): 13. http://dx.doi.org/10.53735/cisse.v9i1.153.

Full text
Abstract:
Advanced persistent threats are causing several serious cybersecurity events due to their highly stealthy characteristics, advanced technology and tools, and complicated attacking strategies, making them an imminent challenge to cybersecurity professionals. To conquer such a challenge, a thorough and dedicated defense plan must be addressed, and we believe engaging advanced persistent threat learning experiences to computer science and cybersecurity students in the early stages of their college education will be the most important part of the plan. Since there is a lack of promising approaches for engaging students in learning of advanced persistent threats, it is now an emerging issue for cybersecurity educators and researchers to investigate and develop doable and affordable advanced persistent threat learning platforms. Hands-on learning has been adopted by several fields and demonstrated promising performance improvements in the learners. Therefore, integrating hands-on learning knowledge and experiences in advanced persistent threat training for computer science and cybersecurity students will be a potential solution for mitigating such an issue. In this research, we recognize the importance of improving students’ learning of advanced persistent threats. To develop a learning platform for students to learn the knowledge, skills, and abilities of advanced persistent threats, we adopt the NDG ethical hacking lab series with appropriate supplemental lectures to each stage of the lifecycle of an advanced persistent threat. We ensure our model could comply with the required knowledge units listed on NICE Cybersecurity Workforce Framework. Students are expected to connect their advanced persistent threat learning experiences to real world cybercrime cases once they have successfully completed the learning process.
APA, Harvard, Vancouver, ISO, and other styles
39

Popova, Anna V. "CYBERSECURITY OF THE BANKING SYSTEM AND ETHICAL RULES OF THE INTERACTION BETWEEN A MAN AND ARTIFICIAL INTELLIGENCE: ON THE NEED FOR CO-EXISTENCE." Banking law 1 (February 4, 2021): 47–62. http://dx.doi.org/10.18572/1812-3945-2021-1-47-62.

Full text
Abstract:
The author of the article, based on comparative analysis legal regulations and scientific literature in the field of cybersecurity, comes to the conclusion that at the present stage of development of economic relations, there is an urgent need to establish ethical standards for human interaction and automated intelligent systems based on artificial intelligence. The article analyzes the concept of cybersecurity in its difference from information security; positive and negative features of the use of AI in the banking sector of the economy. The article focuses on social engineering in preventing cyber threats and offers a list of ethical principles in their content constant.
APA, Harvard, Vancouver, ISO, and other styles
40

Abbas, Hafiz Syed Mohsin, Zahid Hussain Qaisar, Ghulam Ali, Fahad Alturise, and Tamim Alkhalifah. "Impact of cybersecurity measures on improving institutional governance and digitalization for sustainable healthcare." PLOS ONE 17, no. 11 (November 15, 2022): e0274550. http://dx.doi.org/10.1371/journal.pone.0274550.

Full text
Abstract:
Digitalization in healthcare through advanced methods, tools, and the Internet are prominent social development factors. However, hackers and malpractices through cybercrimes made this digitalization worrisome for policymakers. In this study, the role of E-Government Development as a proxy for digitalization and corruption prevalence has been analyzed in Healthcare sustainability in developing and underdeveloped countries of Asia from 2015 to 2021. Moreover, a moderator role of Cybersecurity measures has also been estimated on EGDI, CRP, and HS through the two-step system GMM estimation. The results show that EGDI and CRP control measures significantly improved HS in Asia. Furthermore, by deploying strong and effective Cybersecurity measures, Asia’s digitalization and institutional practices are considerably enhanced, which also has an incremental impact on HS and ethical values. This present study added a novel contribution to existing digitalization and public health services literature and empirical analysis by comprehensively applying advanced econometric estimation. The study concludes that cybersecurity measures significantly improved healthcare digitalization and controlled the institutional malfunctioning in Asia. This study gives insight into how cybersecurity measures enhance the service quality and promote institutional quality of the health sector in Asia, which will help draft sustainable policy decisions and ethical values in the coming years.
APA, Harvard, Vancouver, ISO, and other styles
41

Umam, Sulkhanul. "Is the Cyber Security Awareness Perspective Different?" Journal of Business Management Review 1, no. 6 (December 28, 2020): 425–35. http://dx.doi.org/10.47153/jbmr16.772020.

Full text
Abstract:
Everybody needs internet, so does SMEs, but the internet likes a knife. If wrong, can be injure users. so users must care about security in using the internet. This is called the cybersecurity awareness. a person's actions are influenced by perceptions and perceptions appear to be motivated by an ethical orientation. so it is important to examine whether there are differences in cybersecurity awareness that are motivated by ethical orientations. This study conducted in Bantul, Yogyakarta with study subjects were 59 SMEs. The test results to see differences in awareness using the Mann Whitney test show that there is no difference regarding cyber security awareness, both in individuals with an ethical orientation of idealism and relativism. Cyber ​​security awareness is absolutely necessary so that users avoid every crime that exists.
APA, Harvard, Vancouver, ISO, and other styles
42

Benchekroune, Lamiae. "English for IT purposes: Moroccan Ethical Hackers as a Case Study." International Journal of English Language Studies 2, no. 5 (December 31, 2020): 39–43. http://dx.doi.org/10.32996/ijels.2020.2.5.5.

Full text
Abstract:
This paper seeks to discuss the theme of English for IT purposes. In particular, this research article aims to highlight the role that English language might play for the cybersecurity experts. Two research objectives were fixed. First, to explore Moroccan cybersecurity specialists' attitudes towards learning English; and second, to sift the learning strategies Moroccan ethical hackers use in order to learn English. In terms of the angle from which the topic was addressed, a mixed design approach was deployed. A questionnaire was designed and administered among 55 participants. The results of the study revealed that Moroccan ethical hackers reflected that they are alert towards the necessity of learning English via both their convictions as well as the learning strategies that they use. In light of the findings, some implications are given.
APA, Harvard, Vancouver, ISO, and other styles
43

Diffee, Erica, and Pratim Datta. "Cybersecurity: The Three-headed Janus." Journal of Information Technology Teaching Cases 8, no. 2 (November 2018): 161–71. http://dx.doi.org/10.1057/s41266-018-0037-7.

Full text
Abstract:
Multiple entities define the stage: Ayn, an accomplished CIO; James, an idealistic CEO; Kira, an unscrupulous hacker; Randcom, a rail company; and Zuidia, a country reinventing itself. These entities intersect in a tense cybersecurity gameplay. A cyber-attack rages across multiple fronts, targeting Randcom's technology, processes, and people, suddenly delivering a staggering blow to the company. Ayn stands in the eye of the storm, figuring a path forward. This cybersecurity case study offers an active learning and role-playing experience for students. Immersing the student in the anatomy of a cybersecurity attack, this case converges various perspectives: the hacker, the company, and the macro environment (e.g., country culture). In the process, this case highlights conflicting strategic choices and opportunity costs of decisions in an environment that requires a company to be both competitive and yet secure across three cybersecurity facets: technology, processes, and people. This case could be used as a class discussion and exercise as well as a role play with multiple protagonists. Specific roles include the CEO, the CIO, the hacker, and the CFO. This case brings together multiple viewpoints, often conflicting, representative of real-life decisional and ethical dilemmas in the context of a company. This case, further contextualized using a developing country as the backdrop, adds an additional layer of decisional trade-offs. Nonetheless, this case is representative of IS and cybersecurity decision making in a company, regardless of the type of country.
APA, Harvard, Vancouver, ISO, and other styles
44

Taddeo, Mariarosaria. "Three Ethical Challenges of Applications of Artificial Intelligence in Cybersecurity." Minds and Machines 29, no. 2 (June 2019): 187–91. http://dx.doi.org/10.1007/s11023-019-09504-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Крилова-Грек, Юлія. "Psycholinguistic Aspects of Humanitarian Component of Cybersecurity." PSYCHOLINGUISTICS 26, no. 1 (November 12, 2019): 199–215. http://dx.doi.org/10.31470/2309-1797-2019-26-1-199-215.

Full text
Abstract:
Introduction. The paper focuses on language means exploited by social engineers in their activities in terms of humanitarian aspects of cybersecurity. The goal of this research is to analyze the methods and techniques employed by social engineers in their malicious activity and its features from a psycholinguistic point of view for further development of counteraction mechanisms. Methods. To obtain results we used the following methods: primary source analysis, analysis of spoken and written speech and speech products, and intent analysis. Results. The activity theory has been successfully applied to consider the key features of social engineers’ work. On the base of AT we presented a three-component model which we may consider only in the case of a social engineer’s successful attack (action). Based on the analysis of the sources, we distinguished the types of spoken and written communication actions (these types correspond to direct and indirect actions), used by social engineers to affect the cognitive processes for retrieving “sensitive data” and confidential information. Besides, we also categorized psychological and language means, which social engineers evidently apply in their activities. We stress that in most cases social engineers’ activities are aimed at a) affecting the person’s emotions and feelings; b) blocking rational and critical thinking; c) manipulating moral and ethic values, and d) using positive incentives that have an interest to a user. Taking into account the abovementioned types of communication, psychological and language means, we systematized and described the general techniques of using oral and written forms of language and technologies: 1) techniques related to the use of spoken speech; 2) techniques related to the use of written speech; 3) techniques related to the use of USB flash drives, applications, and program software. The findings are applicable for developing a mechanism to counter social engineers’ attacks and contribute to improving the level of cyber literacy.
APA, Harvard, Vancouver, ISO, and other styles
46

Essien, Essien D. "Ethical Implications of the Techno-Social Dilemma in Contemporary Cyber-Security Phenomenon in Africa." International Journal of Information Communication Technologies and Human Development 10, no. 1 (January 2018): 17–30. http://dx.doi.org/10.4018/ijicthd.2018010102.

Full text
Abstract:
This article examines the cyber security dimension of the global information Infrastructure which has resulted in the attainment of remarkable milestones and unlimited opportunities. However, these benefits notwithstanding, the cyberspace is increasingly under attack by cybercriminals, and the cost and damages from such attacks are increasing alarming. This article therefore, sets out to examine the ethical implications of cybersecurity phenomenon. Relying upon an extensive contemporary literature on cyber security, this study examines the phenomenon using the protection motivation theory. The article employs qualitative analysis of the current cybersecurity landscape in Nigeria. With an insight provided into understanding the independent layers of cyber security in Nigeria, a criterion on what should constitute appropriate procedure for cyber security is thus supplied. Findings posit that with the vulnerability of cyberspace, cyber security phenomenon in Africa, mirrors the existing social inequalities and widens the social division that is more apparent with the expansion of the ICTs.
APA, Harvard, Vancouver, ISO, and other styles
47

Domarkienė, Ingrida, Laima Ambrozaitytė, Linas Bukauskas, Tautvydas Rančelis, Stefan Sütterlin, Benjamin James Knox, Kaie Maennel, et al. "CyberGenomics: Application of Behavioral Genetics in Cybersecurity." Behavioral Sciences 11, no. 11 (November 1, 2021): 152. http://dx.doi.org/10.3390/bs11110152.

Full text
Abstract:
Cybersecurity (CS) is a contemporary field for research and applied study of a range of aspects from across multiple disciplines. A cybersecurity expert has an in-depth knowledge of technology but is often also recognized for the ability to view technology in a non-standard way. This paper explores how CS specialists are both a combination of professional computing-based skills and genetically encoded traits. Almost every human behavioral trait is a result of many genome variants in action altogether with environmental factors. The review focuses on contextualizing the behavior genetics aspects in the application of cybersecurity. It reconsiders methods that help to identify aspects of human behavior from the genetic information. And stress is an illustrative factor to start the discussion within the community on what methodology should be used in an ethical way to approach those questions. CS positions are considered stressful due to the complexity of the domain and the social impact it can have in cases of failure. An individual risk profile could be created combining known genome variants linked to a trait of particular behavior using a special biostatistical approach such as a polygenic score. These revised advancements bring challenging possibilities in the applications of human behavior genetics and CS.
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital that the IT professionals possess up-to-date technical skills and think and act one step ahead of the cyber criminals who are constantly probing and exploring system vulnerabilities. There is no perfect security mechanism that can defeat all the cyber-attacks; the traditional defensive security mechanism will eventually fail to the pervasive zero-day attacks. However, there are steps to follow to reduce an organization’s vulnerability to cyber-attacks and to mitigate damages. Active security tests of the network from a cyber-criminal’s perspective can identify system vulnerabilities that may lead to future breaches. “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. But if you know the enemy and know yourself, you need not fear the result of hundred battles” (Sun, 2013). Penetration testing is a discipline within cybersecurity that focuses on identifying and exploiting the vulnerabilities of a network, eventually obtaining access to the critical business information. The pentesters, the security professionals who perform penetration testing, or ethical hackers, break the triad of information security - Confidentiality, Integrity, and Accountability (CIA) - as if they were a cyber-criminal. The purpose of ethical hacking or penetration testing is to know what the “enemy” can do and then generate a report for the management team to aid in strengthening the system, never to cause any real damages. This paper introduces the development of a penetration testing curriculum as a core class in an undergraduate cybersecurity track in Information Technology. The teaching modules are developed based on the professional penetration testing life cycle. The concepts taught in the class are enforced by hands-on lab exercises. This paper also shares the resources that are available to institutions looking for teaching materials and grant opportunities to support efforts when creating a similar curriculum in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
49

Ináncsi, Mátyás. "Cybersecurity Challenges of the Civilian Unmanned Aircraft Systems." Hadmérnök 17, no. 2 (September 19, 2022): 205–16. http://dx.doi.org/10.32567/hm.2022.2.14.

Full text
Abstract:
Nowadays unmanned aircrafts are widely available at a reasonable price for civilians. This change in the market raises cybersecurity related concerns. In this paper we arefocusing on three aspects of the cybersecurity challenges: data protection element, cyberattack element and general concerns over drones from the Asian market. The first element is extremely important when it comes to ethical and rightful drone use. A drone fitted with a camera or a video recording device can easily violate personal data. The cyberattack element aims to make sure the user understands that their device can be hacked, and not just simply the drone itself but various devices connected to them. Lastly, we are focusing on raising awareness of using drones from the Asian market. These types of products sometimes get into the spotlight due to built-in cyberissues. This part is aimed to raise general awareness over data protection coming from third party device use.
APA, Harvard, Vancouver, ISO, and other styles
50

Maon, Siti Noorsuriani, Naffisah Mohd Hassan, Noorain Mohammad Yunus, Sri Fatiany Abdul Kader Jailani, and Erne Suzila Kassim. "GENDER DIFFERENCES IN DIGITAL COMPETENCE AMONG SECONDARY SCHOOL STUDENT." Asia Proceedings of Social Sciences 6, no. 3 (June 4, 2020): 235–39. http://dx.doi.org/10.31580/apss.v6i3.1373.

Full text
Abstract:
Digital technologies have become powerful tools in today society in many aspects. However, without proper knowledge and guidance, youth is being challenged with potential hazards of cybercrimes. Hence, the purpose of this study was to compare who is at a greater risk of cybercrimes, and to assess whether there is a significant difference in the digital competency between girls and boys at rural areas. Digital competence was measured as technology, cognitive, ethical knowledge and communication, and cybersecurity was measured as intellectual property, privacy, accuracy and accessibility. Questionnaires were distributed to selected secondary schools. Based on the t-test analyses of 211 responses, the findings indicate there is a significant difference in the attitude toward ICT usage between male and female students, as well as significant differences in the behavior of troubleshooting, staying safe online and being credible and in the ethical knowledge. Comparing the cybersecurity traits, gender differentiates the privacy concerns, accuracy and accessibility behavior. As the results are alarming, specific concerns and focus must be placed on youth digital technology usage and education for ensuring they are not neglected, and exposed as cyber victims, but also to raise a responsible e-society with excellent digital citizenship attributes.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography