This new textbook offers an accessible introduction to the topic of cybersecurity ethics.
The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks – virtue ethics, utilitarian ethics and communitarian ethics – and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, intellectual property and piracy, surveillance, and cyberethics in relation to military affairs. The third part concludes by exploring current codes of ethics used in cybersecurity.
The overall aims of the book are to:
- provide ethical frameworks to aid decision making;
- present the key ethical issues in relation to computer security;
- highlight the connection between values and beliefs and the professional code of ethics.
The textbook also includes three different features to aid students: ‘Going Deeper’ provides background information on key individuals and concepts; ‘Critical Issues’ features contemporary case studies; and ‘Applications’ examine specific technologies or practices which raise ethical issues.
The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.
Table of Contents
1. Introducing Ethics
2. The Ethical Frameworks
3. The Ethical Hacker
4. The Problem of Privacy
5. The Problem of Surveillance
6. The Problem of Piracy
7. Problem of Cyberwarfare
8. The Way Forward
Mary Manjikian is the Associate Dean and an Associate Professor in the Robertson School of Government, Regent University, Virginia Beach, Virginia, USA. She is the author of three books, including Threat Talk: Comparative Politics of Internet Addiction (2013).
'This book is a bold and innovative synthesis of thinking from diverse yet interlinked disciplines. It is vital reading for scholars, policymakers, security professionals and organizational leaders. Manjikian's explication of the ACM Code of Ethics shows why it is a foundational concept for cybersecurity.' -- Steven Metz, U.S. Army War College, USA
‘As cyber conflict, espionage and crime increasingly challenge nations and their citizens, Manjikian's Cybersecurity Ethics provides a comprehensive and needed addition to the cyber literature cannon. This work constitutes a robust framework for decisions and actions in cyberspace and is essential reading for policymakers, practitioners, and students engaging the field of cybersecurity.’ -- Aaron F. Brantly, Army Cyber Institute, United States Military Academy, West Point
'Mary Manjikian’s introduction to cybersecurity ethics nicely links philosophy to practical cyber concerns of students, corporate and government information managers, and even cyber warriors. Complicated concepts are easy to understand and relevant to personal decision-making.' -- John A. Gentry, Georgetown University, USA
'Dr Manjikian has done a masterful job of outlining ethical standards to the constantly evolving cybersecurity domain. This book is a vital reference for those who are concerned with ethics related to hacking, privacy, surveillance, and cyberwarfare in an ever changing virtual environment that transcends boundaries and cultures and challenges the traditional ways that humans have dealt with each other. Ground-breaking and should be required reading for any serious cybersecurity professional.' -- Keith Dayton, George C. Marshall European Center for Security Studies, Germany
'A great introductory text to complex conceptual and practical issues in cybersecurity.' -- Heather Roff, Arizona State University, USA
'Mary Manjikian's excellent textbook, Cybersecurity Ethics, delivers an eminently readable perspective for the experienced professional as well as a casual cyberspace consumer. ...Overall, Cybersecurity Ethics excellently fulfills the stated goal to provide an ethical framework and illustrate several current issues regarding cybersecurity through a new textbook. The construction was splendid, material assembled coherently, and sources presented thoroughly and accurately. This book is an excellent introduction to ethical processes associated with cyberspace.'---Mark Peters, Strategic Studies Quarterly