Cybersecurity Ethics
This new textbook offers an accessible introduction to the topic of cybersecurity ethics.
The book is split into three parts. concludes by exploring current codes of ethics used in cybersecurity.
The overall aims of the book are to:
- provide ethical frameworks to aid decision making;
- present the key ethical issues in relation to computer security;
- highlight the connection between values and beliefs and the professional code of ethics.
The textbook also includes three different features to aid students: Going Deeper provides background information on key individuals and concepts; Critical Issues features contemporary case studies; and Application examines specific technologies or practices which raise ethical issues.
The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.
Mary Manjikian is the Associate Dean and an Associate Professor in the Robertson School of Government, Regent University, Virginia Beach, Virginia, USA. She is the author of three books, including Threat Talk: Comparative Politics of Internet Addiction (2013).
This book is a bold and innovative synthesis of thinking from diverse yet interlinked disciplines. It is vital reading for scholars, policymakers, security professionals and organizational leaders. Manjikians explication of the ACM Code of Ethics shows why it is a foundational concept for cybersecurity.
Steven Metz, US Army War College, USA
As cyber conflict, espionage and crime increasingly challenge nations and their citizens, Manjikians Cybersecurity Ethics provides a comprehensive and needed addition to the cyber literature cannon. This work constitutes a robust framework for decisions and actions in cyberspace and is essential reading for policymakers, practitioners, and students engaging in the field of cybersecurity.
Aaron F. Brantly, Army Cyber Institute, United States
Military Academy, West Point, USA
Mary Manjikians introduction to cybersecurity ethics nicely links philosophy to practical cyber concerns of students, corporate and government information managers, and even cyber warriors. Complicated concepts are easy to understand and relevant to personal decision-making.
John A. Gentry, Georgetown University, USA
Dr Manjikian has done a masterful job of outlining ethical standards to the constantly evolving cybersecurity domain. This book is a vital reference for those who are concerned with ethics related to hacking, privacy, surveillance, and cyberwarfare in an ever-changing virtual environment that transcends boundaries and cultures and challenges the traditional ways that humans have dealt with each other. Ground-breaking and should be required reading for any serious cybersecurity professional.
Keith Dayton, George C. Marshall European
Center for Security Studies, Germany
A great introductory text to complex conceptual and practical issues in cybersecurity.
Heather Roff, Arizona State University, USA
Cybersecurity Ethics
An Introduction
Mary Manjikian
First published 2018
by Routledge
2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN
and by Routledge
711 Third Avenue, New York, NY 10017
Routledge is an imprint of the Taylor & Francis Group, an informa business
2018 Mary Manjikian
The right of Mary Manjikian to be identified as author of this work has been asserted by her in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.
Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book has been requested
ISBN: 978-1-138-71749-7 (hbk)
ISBN: 978-1-138-71752-7 (pbk)
ISBN: 978-1-315-19627-5 (ebk)
Typeset in Times New Roman
by Apex CoVantage, LLC
To my husband Ara, whose paranoia in relation to social networking teaches us all to be more careful.
Contents
ACM | Association for Computing Machinery |
CAN SPAM Act | United States Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 |
CCTV | Closed Circuit Television |
CFAA | Computer Fraud and Abuse Act of 1986 |
CIA | United States Central Intelligence Agency |
CJEU | Court of Justice of the European Union |
CIPS | Canadian Information Processing Society |
CNA | Computer Network Attack |
DARPA | United States Department of Defense Advanced Research Projects Agency |
DDoS | Dedicated Denial of Service Attack |
DHS | United States Department of Homeland Security |
DOD | United States Department of Defense |
ECPA | Electronic Communications Privacy Act |
EC Council | International Council of e-Commerce Consultants |
FBI | United States Federal Bureau of Investigation |
FCC | United States Federal Communications Commission |
FERPA | United States Family Education Rights and Privacy Act |
GCHQ | United Kingdom Government Communications Headquarters |
GPS | Global Positioning System |
HIPAA | United States Health Insurance Portability and Accountability Act |
IACC | International Anticounterfeiting Coalition |
IACR | International Association for Cryptological Research |
IEEE | Institute of Electrical and Electronic Engineer |
IFPI | International Federation of the Phonographic Industry |
IP | Intellectual Property |
ISACA | Information Systems Audit and Control Association |
ISC | International Information Systems Security Certification Consortium |
ISIS | Islamic State of Iraq and Syria (a.k.a., ISILIslamic State of Iraq and the Levant, or just Islamic State) |
LOAC | International Law of Armed Conflict |
MLAT | Mutual Legal Assistance Treaty |
NATO | North Atlantic Treaty Organization |
NSA | United States National Security Agency |