Computer Security and Ethics
نویسنده
چکیده
Today there is a great concern among businesses and individuals about privacy and security while using computers and the Internet. The two topics, privacy and security, are closely related in the computer-industry and on the Internet and there are many questions that overlap each other. Secure communication is in many cases a requirement assuring privacy and security for businesses and individuals. One of the security techniques used in communication is data encryption, which prevents unwanted users to gain access of the information that is transmitted between computer networks or on the Internet. We will in this paper, among other things, look on the technique of encrypting data, authentication of users in network systems and on the ethical questions concerning privacy and security in computer networks.
منابع مشابه
The Causal Model of Corporate Identity,Security Leadership, and Work Ethics
This research is based on the investigation of the relations between corporate identity, security leadership, and work ethics among the Shiraz University’s staffs. This research is practical and the data collection was done with descriptive correlative method. The statistical populations are the Shiraz University’s staffs and their numbers are 982. The sample size is 288 and they are chosen ran...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملA Case Study in Malware Research Ethics Education
There is a growing interest in the research of malware in the context of cyber-security. In this paper I will present a case study that will outline the curriculum used to teach malware ethics within the context of a computer science course that teaches students malware programing techniques. Issues from computer and information ethics that apply most closely to ethical malware research will be...
متن کاملMoving Forward, Building an Ethics Community (Panel Statements)
The organizing question around which this panel at WECSR 2011 rallied was how to move toward building a nation-state-agnostic ethics community in computer security research. 1 Ethics As a Three-Legged Stool To jumpstart the discourse, panel moderator Erin Kenneally framed the issue of ethics in computer security research as a metaphorical threelegged stool consisting of principles, the applicat...
متن کاملVulnerabilities and responsibilities: dealing with monsters in computer security
Purpose of this paper In this paper, information security assessment is analysed in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities. Design/methodology/approach Vulnerabilities in information security are compared to the concept ...
متن کاملRole of Principles of Ethics in the Legal Function of Computer
Background: Despite the irreplaceable role of cyberspace in the behaviors of modern society and the importance of observing ethics in it, so far no research has been presented to build a model of practical ethics in this space. The present study examines how ethical laws are enacted in cyberspace. Conclusion: By descriptive analysis of the concept of ethics in cyberspace, the perception is tha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003