Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

A Review on Security versus Ethics

by Bisma Bashir, Aqeel Khalique
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 11
Year of Publication: 2016
Authors: Bisma Bashir, Aqeel Khalique
10.5120/ijca2016911937

Bisma Bashir, Aqeel Khalique . A Review on Security versus Ethics. International Journal of Computer Applications. 151, 11 ( Oct 2016), 13-17. DOI=10.5120/ijca2016911937

@article{ 10.5120/ijca2016911937,
author = { Bisma Bashir, Aqeel Khalique },
title = { A Review on Security versus Ethics },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 11 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 13-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number11/26277-2016911937/ },
doi = { 10.5120/ijca2016911937 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:56:49.892660+05:30
%A Bisma Bashir
%A Aqeel Khalique
%T A Review on Security versus Ethics
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 11
%P 13-17
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is of major concern in Information & Communication Technologies (ICT). Valuable data and information must be protected from attackers. In ICT, information is easily accessible and thus efficient security mechanisms are employed to prevent any attack. This paper presents a review about the security and ethics, their relationship with each other. This paper focuses on implementing security mechanism complying ethical best practices. Existing security mechanism and ethical practices in an ICT organization are also discussed in this paper. The paper also covers impact of technologies on the privacy of people due to unawareness of security policies or false ethical practices.

References
  1. "History of ethics", Wikipedia, 2016. [Online] https://en.wikipedia.org/wiki/History_of_ethics.
  2. Stallings, W. 2011 Cryptography And Network Security Principles And Security. Pearson Publication.
  3. "Difference Between Ethics and Integrity", Difference Between, 2015. [Online] http://www.differencebetween.com/difference-between-ethics-and-vs-integrity/.
  4. "Ethics", Wikipedia, 2015. [Online]https://en.wikipedia.org/wiki/Ethics
  5. "Golden Rule", Wikipedia, 2016. [Online]https://simple.wikipedia.org/wiki/Golden_Rule.
  6. "Categorical imperative", Wikipedia, 2016. [Online]https://en.wikipedia.org/wiki/Categorical_imperative.
  7. "Descartes' rule of change", Paginas.fe.up.pt, 2016. [Online] http://paginas.fe.up.pt/~als/mis10e/ch4/descartes.htm.
  8. "Utilitarianism", Wikipedia,2016. [Online]https://en.wikipedia.org/wiki/Utilitarianism.
  9. "Risk aversion", Wikipedia, 2016. [Online] https://en.wikipedia.org/wiki/Risk_aversion.
  10. Safire, W. 2-14-1993 On Language; “Words Left Out in the cold” New York Times.
  11. "Ten Commandments of Computer Ethics", Wikipedia, 2016.[Online] https://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics.
  12. "Computer Security Ethics and Privacy | WebReference", Webreference.com.[Online]http://www.webreference.com/internet/security/index.html.
  13. "What is ethical hacking and an ethical hacker?", Computerhope.com.[Online]http://www.computerhope.com/jargon/e/ethihack.htm.
  14. "Internet Security: Ethics / Mateti", Cecs.wright.edu, 2016.[Online] http://cecs.wright.edu/~pmateti/InternetSecurity/Lectures/Ethics/.
  15. "03. (III) Ethical Issues", Niatec.info, 2016. [Online]http://niatec.info/ViewPage.aspx?id=153.
  16. [Online]http://web.simmons.edu/~chen/nit.NIT’96/96_025_Britz.html.
Index Terms

Computer Science
Information Sciences

Keywords

Security Computer Ethics Ethical Computing Privacy Ethical Hacking Hacking.