International library of ethics, law and technology. 1875-0044 ; 21.
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.
Formatted Contents Note
Chapter 1. Introduction Part 1. Foundations Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) Chapter 3. Core values in Cybersecurity (Ibo van de Poel) Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) Part 2 - Problems Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) Chapter 11. Cybersecurity and Democracy Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers Chapter 14. Cybersecurity and the Individual Part 3 - Solutions Chapter 15. Requirements on the Policy Level to Ensure Cyberpeace Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) Chapter 17. A framework for Ethical Cyber-Defence for Companies Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare Chapter 20. Conclusion.
Digital File Characteristics
text file PDF
Springer Nature eBook
Available in Other Form
Printed edition: Printed edition: Printed edition: