Advertisement

Social and Ethical Aspects

  • Ganna PogrebnaEmail author
  • Mark Skilton
Chapter

Abstract

Even though this book does not intend to concentrate on social and ethical aspects of cybersecurity, in this chapter we provide a brief overview of the cyber-ethical landscape and discuss most important and relevant issues, which may be of interest to businesses. We pay particular attention to the link between human culture, human values, and cyberdefense systems. We also discuss several topical aspects related to how social systems influence users’ propensity to become victims of cybercrime.

References

  1. 1.
  2. 2.
    Dredge, R., Gleeson, J. F. M., & de la Piedad Garcia, X. (2014). Risk factors associated with impact severity of cyberbullying victimization: A qualitative study of adolescent online social networking. Cyberpsychology, Behavior, and Social Networking, 17(5), 287–291.  https://doi.org/10.1089/cyber.2013.0541.CrossRefGoogle Scholar
  3. 3.
    Boyd, D., & Ellison, N. B. (2007, October 1). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.Google Scholar
  4. 4.
    Brandtzæg, P. B., Lüders, M., & Skjetne, J. H. (2010). Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. International Journal of Human–Computer Interaction, 26(11–12), 1006–1030.  https://doi.org/10.1080/10447318.2010.516719.CrossRefGoogle Scholar
  5. 5.
    Staksrud, E., ILafsson, K., & Livingstone, S. (2013). Does the use of social networking sites increase children’s risk of harm? Computers in Human Behavior, 29(1), 40–50.  https://doi.org/10.1016/j.chb.2012.05.026.CrossRefGoogle Scholar
  6. 6.
    Przybylski, A. K., Murayama, K., DeHaan, C. R., & Gladwell, V. (2013). Motivational, emotional, and behavioral correlates of fear of missing out. Computers in Human Behavior, 29(4), 1841–1848.  https://doi.org/10.1016/j.chb.2013.02.014.CrossRefGoogle Scholar
  7. 7.
    Buglass, S. L., Binder, J. F., Betts, L. R., & Underwood, J. D. M. (2016). When ‘friends’ collide: Social heterogeneity and user vulnerability on social network sites. Computers in Human Behavior, 54, 62–72.  https://doi.org/10.1016/j.chb.2015.07.039.CrossRefGoogle Scholar
  8. 8.
    Livingstone, S., & Smith, P. K. (2014). Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry, 55(6), 635–654.Google Scholar
  9. 9.
    Hawdon, J., Oksanen, A., & Räsänen, P. (2015). Online extremism and online hate: Exposure among adolescents and young adults in four nations. Nordicom Information, 37(3–4), 29–37.Google Scholar
  10. 10.
    Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and self‐esteem. Journal of School Health, 80(12), 614–621.Google Scholar
  11. 11.
    Buglass, S. L., Binder, J. F., Betts, L. R., & Underwood, J. D. M. (2017). Motivators of online vulnerability: The impact of social network site use and FOMO. Computers in Human Behavior, 66, 248–255.Google Scholar
  12. 12.
    Kharlamov, A., & Pogrebna, G. (2018). Using human values-based approach to understand cross-cultural commitment towards regulation and governance of cybersecurity (Working Paper).Google Scholar

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.University of BirminghamBirminghamUK
  2. 2.The Alan Turing InstituteLondonUK
  3. 3.Warwick Business SchoolUniversity of WarwickCoventryUK

Personalised recommendations