05089nam 22008055 450 991037278730332120251010080523.010.1007/978-3-030-29053-5(CKB)4100000010163753(OAPEN)1007696(MiAaPQ)EBC6113544(DE-He213)978-3-030-29053-5(Au-PeEL)EBL6113544(OCoLC)1142347100(oapen)https://directory.doabooks.org/handle/20.500.12854/32168(ODN)ODN0010074023(oapen)doab64049(oapen)doab32168(EXLCZ)99410000001016375320200210d2020 u| 0enguuuuu---auuuutxtrdacontentcrdamediacrrdacarrierThe Ethics of Cybersecurity /edited by Markus Christen, Bert Gordijn, Michele Loi1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (384) The International Library of Ethics, Law and Technology,1875-0036 ;213-030-29052-2 3-030-29053-0 Chapter 1. Introduction -- Part 1. Foundations -- Chapter 2. Basic Concepts and Models of Cybersecurity (Endre Bangerter) -- Chapter 3. Core values in Cybersecurity (Ibo van de Poel) -- Chapter 4. Ethical Frameworks for Cybersecurity (Mary Manjikian) -- Chapter 5. Legislative Framework for Cybersecurity (Gloria Gonzalez Fuster, Lina Jasmontaite) -- Part 2 – Problems -- Chapter 6. Cybersecurity in Health (Karsten Weber, Nadine Kleine) -- Chapter 7. Cybersecurity in Business (Gwenyth Morgan, Bert Gordijn) -- Chapter 8. Cybersecurity of Critical Infrastructures (Emad Yaghmaei, TU Delft, Michele Loi) -- Chapter 9. Cybersecurity and Cyberwar (Mariarosario Taddeo) -- Chapter 10. Cybersecurity and the State (Harald Zwingelberg, Eva Schlehahn) -- Chapter 11. Cybersecurity and Democracy -- Chapter 12. Ethical and Unethical Hacking (David-Olivier Jaquet-Chiffelle) -- Chapter 13. Ethical Dilemmas for Cybersecurity Service Providers -- Chapter 14. Cybersecurity and the Individual -- Part 3 – Solutions -- Chapter15. Requirements on the Policy Level to Ensure Cyberpeace -- Chapter 16. Policies for Data Sharing and Data Protection for Security Software Providers (Alexey Kirichenko) -- Chapter 17. A framework for Ethical Cyber-Defence for Companies -- Chapter 18. Privacy-Protecting Cybersecurity Technologies (Josep Domingo-Ferrer) -- Chapter 19. Guidelines for Medical Professionals to Ensure Cybersecurity in Digital Healthcare -- Chapter 20. Conclusion.This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infrastructure whilst respecting fundamental values like equality, fairness, freedom, or privacy. The book has a strong practical focus as it includes case studies outlining ethical issues in cybersecurity and presenting guidelines and other measures to tackle those issues. It is thus not only relevant for academics but also for practitioners in cybersecurity such as providers of security software, governmental CERTs or Chief Security Officers in companies.The International Library of Ethics, Law and Technology,1875-0036 ;21TechnologyMoral and ethical aspectsArtificial intelligenceInformation technologyLaw and legislationMass mediaLaw and legislationComputer crimesData protectionLaw and legislationEthics of TechnologyArtificial IntelligenceIT Law, Media Law, Intellectual PropertyCybercrimePrivacyTechnologyMoral and ethical aspects.Artificial intelligence.Information technologyLaw and legislation.Mass mediaLaw and legislation.Computer crimes.Data protectionLaw and legislation.Ethics of Technology.Artificial Intelligence.IT Law, Media Law, Intellectual Property.Cybercrime.Privacy.601COM060040LAW000000PHI005000SOC004000bisacshChristen Markusedt1244491Christen Markusedthttp://id.loc.gov/vocabulary/relators/edtGordijn Bertedthttp://id.loc.gov/vocabulary/relators/edtLoi Micheleedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910372787303321The Ethics of Cybersecurity4451809UNINA