Switch to: References

Add citations

You must login to add citations.
  1. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • A principlist framework for cybersecurity ethics.Paul Formosa, Michael Wilson & Deborah Richards - 2021 - Computers and Security 109.
    The ethical issues raised by cybersecurity practices and technologies are of critical importance. However, there is disagreement about what is the best ethical framework for understanding those issues. In this paper we seek to address this shortcoming through the introduction of a principlist ethical framework for cybersecurity that builds on existing work in adjacent fields of applied ethics, bioethics, and AI ethics. By redeploying the AI4People framework, we develop a domain-relevant specification of five ethical principles in cybersecurity: beneficence, non-maleficence, autonomy, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Responsible research and innovation key performance indicators in industry.Emad Yaghmaei - 2018 - Journal of Information, Communication and Ethics in Society 16 (2):214-234.
    Purpose Responsible research and innovation is taking a role in assisting all types of stakeholders, including industry members, in moving their research and innovation initiatives to tackle grand challenges. The literature on RRI, however, focuses little on how industry can implement RRI principles. To solve this gap, the purpose of this study is to construct a conceptual framework for managing and assessing RRI principles in the industry. Design/methodology/approach Qualitative research was used to build the RRI key performance indicator list; 30 (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  • Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Democratizing cognitive technology: a proactive approach.Marcello Ienca - 2019 - Ethics and Information Technology 21 (4):267-280.
    Cognitive technology is an umbrella term sometimes used to designate the realm of technologies that assist, augment or simulate cognitive processes or that can be used for the achievement of cognitive aims. This technological macro-domain encompasses both devices that directly interface the human brain as well as external systems that use artificial intelligence to simulate or assist (aspects of) human cognition. As they hold the promise of assisting and augmenting human cognitive capabilities both individually and collectively, cognitive technologies could produce, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • Concealment and Discovery: The Role of Information Security in Biomedical Data Re-Use.N. Tempini & Leonelli Sabina - forthcoming - Social Studies of Science.
    This paper analyses the role of information security in shaping the dissemination and re-use of biomedical data, as well as the embedding of such data in the material, social and regulatory landscapes of research. We consider the data management practices adopted by two UK-based data linkage infrastructures: the Secure Anonymised Information Linkage, a Welsh databank that facilitates appropriate re-use of health data derived from research and routine medical practice in the region; and the Medical and Environmental Data Mash-up Infrastructure, a (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations