Switch to: References

Add citations

You must login to add citations.
  1. Software vulnerability due to practical drift.Christian V. Lundestad & Anique Hommels - 2007 - Ethics and Information Technology 9 (2):89-100.
    The proliferation of information and communication technologies (ICTs) into all aspects of life poses unique ethical challenges as our modern societies become increasingly dependent on the flawless operation of these technologies. As we increasingly entrust our privacy, our well-being and our lives to an ever greater number of computers we need to look more closely at the risks and ethical implications of these developments. By emphasising the vulnerability of software and the practice of professional software developers, we want to make (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Defining Information Security.Lundgren Björn & Möller Niklas - 2019 - Science and Engineering Ethics 25 (2):419-441.
    This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • Ethical EU eJustice: elusive or illusionary?Juliet Lodge - 2006 - Journal of Information, Communication and Ethics in Society 4 (3):131-144.
    eJudicial cooperation is a goal of EU policy. It appears to offer procedural and technical ICT solutions to enhancing EU security. This paper outlines particular dilemmas posed by operationalising ejudicial cooperation within the EU and its member states, and assesses how political weakness is reconfigured as a problem of technical ethics. The application of biometrics and ICT based ejustice potentially bring the EU closer to the citizen without closing the confidence and trust deficit. The paper first outlines three political dilemmas (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation