• Complain

Mary Manjikian - Cybersecurity Ethics: An Introduction

Here you can read online Mary Manjikian - Cybersecurity Ethics: An Introduction full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Routledge/Taylor & Francis, genre: Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Mary Manjikian Cybersecurity Ethics: An Introduction
  • Book:
    Cybersecurity Ethics: An Introduction
  • Author:
  • Publisher:
    Routledge/Taylor & Francis
  • Genre:
  • Year:
    2017
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Cybersecurity Ethics: An Introduction: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity Ethics: An Introduction" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This new textbook offers an accessible introduction to the topic of cybersecurity ethics. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks virtue ethics, utilitarian ethics and communitarian ethics and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, intellectual property and piracy, surveillance, and cyberethics in relation to military affairs. The third part concludes by exploring current codes of ethics used in cybersecurity. The overall aims of the book are to: provide ethical frameworks to aid decision making; present the key ethical issues in relation to computer security; highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: Going Deeper provides background information on key individuals and concepts; Critical Issues features contemporary case studies; and Applications examine specific technologies or practices which raise ethical issues. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.

Mary Manjikian: author's other books


Who wrote Cybersecurity Ethics: An Introduction? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybersecurity Ethics: An Introduction — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity Ethics: An Introduction" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Cybersecurity Ethics

This new textbook offers an accessible introduction to the topic of cybersecurity ethics.

The book is split into three parts. concludes by exploring current codes of ethics used in cybersecurity.

The overall aims of the book are to:

  • provide ethical frameworks to aid decision making;
  • present the key ethical issues in relation to computer security;
  • highlight the connection between values and beliefs and the professional code of ethics.

The textbook also includes three different features to aid students: Going Deeper provides background information on key individuals and concepts; Critical Issues features contemporary case studies; and Application examines specific technologies or practices which raise ethical issues.

The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.

Mary Manjikian is the Associate Dean and an Associate Professor in the Robertson School of Government, Regent University, Virginia Beach, Virginia, USA. She is the author of three books, including Threat Talk: Comparative Politics of Internet Addiction (2013).

This book is a bold and innovative synthesis of thinking from diverse yet interlinked disciplines. It is vital reading for scholars, policymakers, security professionals and organizational leaders. Manjikians explication of the ACM Code of Ethics shows why it is a foundational concept for cybersecurity.

Steven Metz, US Army War College, USA

As cyber conflict, espionage and crime increasingly challenge nations and their citizens, Manjikians Cybersecurity Ethics provides a comprehensive and needed addition to the cyber literature cannon. This work constitutes a robust framework for decisions and actions in cyberspace and is essential reading for policymakers, practitioners, and students engaging in the field of cybersecurity.

Aaron F. Brantly, Army Cyber Institute, United States
Military Academy, West Point, USA

Mary Manjikians introduction to cybersecurity ethics nicely links philosophy to practical cyber concerns of students, corporate and government information managers, and even cyber warriors. Complicated concepts are easy to understand and relevant to personal decision-making.

John A. Gentry, Georgetown University, USA

Dr Manjikian has done a masterful job of outlining ethical standards to the constantly evolving cybersecurity domain. This book is a vital reference for those who are concerned with ethics related to hacking, privacy, surveillance, and cyberwarfare in an ever-changing virtual environment that transcends boundaries and cultures and challenges the traditional ways that humans have dealt with each other. Ground-breaking and should be required reading for any serious cybersecurity professional.

Keith Dayton, George C. Marshall European
Center for Security Studies, Germany

A great introductory text to complex conceptual and practical issues in cybersecurity.

Heather Roff, Arizona State University, USA

Cybersecurity Ethics
An Introduction
Mary Manjikian

First published 2018 by Routledge 2 Park Square Milton Park Abingdon Oxon - photo 1

First published 2018

by Routledge

2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN

and by Routledge

711 Third Avenue, New York, NY 10017

Routledge is an imprint of the Taylor & Francis Group, an informa business

2018 Mary Manjikian

The right of Mary Manjikian to be identified as author of this work has been asserted by her in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this book may be reprinted or reproduced or utilized in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.

Trademark notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library

Library of Congress Cataloging-in-Publication Data
A catalog record for this book has been requested

ISBN: 978-1-138-71749-7 (hbk)
ISBN: 978-1-138-71752-7 (pbk)
ISBN: 978-1-315-19627-5 (ebk)

Typeset in Times New Roman
by Apex CoVantage, LLC

To my husband Ara, whose paranoia in relation to social networking teaches us all to be more careful.

Contents

ACM

Association for Computing Machinery

CAN SPAM Act

United States Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003

CCTV

Closed Circuit Television

CFAA

Computer Fraud and Abuse Act of 1986

CIA

United States Central Intelligence Agency

CJEU

Court of Justice of the European Union

CIPS

Canadian Information Processing Society

CNA

Computer Network Attack

DARPA

United States Department of Defense Advanced Research Projects Agency

DDoS

Dedicated Denial of Service Attack

DHS

United States Department of Homeland Security

DOD

United States Department of Defense

ECPA

Electronic Communications Privacy Act

EC Council

International Council of e-Commerce Consultants

FBI

United States Federal Bureau of Investigation

FCC

United States Federal Communications Commission

FERPA

United States Family Education Rights and Privacy Act

GCHQ

United Kingdom Government Communications Headquarters

GPS

Global Positioning System

HIPAA

United States Health Insurance Portability and Accountability Act

IACC

International Anticounterfeiting Coalition

IACR

International Association for Cryptological Research

IEEE

Institute of Electrical and Electronic Engineer

IFPI

International Federation of the Phonographic Industry

IP

Intellectual Property

ISACA

Information Systems Audit and Control Association

ISC

International Information Systems Security Certification Consortium

ISIS

Islamic State of Iraq and Syria (a.k.a., ISILIslamic State of Iraq and the Levant, or just Islamic State)

LOAC

International Law of Armed Conflict

MLAT

Mutual Legal Assistance Treaty

NATO

North Atlantic Treaty Organization

NSA

United States National Security Agency

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybersecurity Ethics: An Introduction»

Look at similar books to Cybersecurity Ethics: An Introduction. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybersecurity Ethics: An Introduction»

Discussion, reviews of the book Cybersecurity Ethics: An Introduction and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.