Even though this book does not intend to concentrate on social and ethical aspects of cybersecurity, in this chapter we provide a brief overview of the cyber-ethical landscape and discuss most important and relevant issues, which may be of interest to businesses. We pay particular attention to the link between human culture, human values, and cyberdefense systems. We also discuss several topical aspects related to how social systems influence users’ propensity to become victims of cybercrime.
- 1.Allen, C. The path to self-sovereign identity. http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html.
- 2.Dredge, R., Gleeson, J. F. M., & de la Piedad Garcia, X. (2014). Risk factors associated with impact severity of cyberbullying victimization: A qualitative study of adolescent online social networking. Cyberpsychology, Behavior, and Social Networking, 17(5), 287–291. https://doi.org/10.1089/cyber.2013.0541.CrossRefGoogle Scholar
- 3.Boyd, D., & Ellison, N. B. (2007, October 1). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.Google Scholar
- 4.Brandtzæg, P. B., Lüders, M., & Skjetne, J. H. (2010). Too many Facebook “friends”? Content sharing and sociability versus the need for privacy in social network sites. International Journal of Human–Computer Interaction, 26(11–12), 1006–1030. https://doi.org/10.1080/10447318.2010.516719.CrossRefGoogle Scholar
- 8.Livingstone, S., & Smith, P. K. (2014). Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry, 55(6), 635–654.Google Scholar
- 9.Hawdon, J., Oksanen, A., & Räsänen, P. (2015). Online extremism and online hate: Exposure among adolescents and young adults in four nations. Nordicom Information, 37(3–4), 29–37.Google Scholar
- 10.Patchin, J. W., & Hinduja, S. (2010). Cyberbullying and self‐esteem. Journal of School Health, 80(12), 614–621.Google Scholar
- 11.Buglass, S. L., Binder, J. F., Betts, L. R., & Underwood, J. D. M. (2017). Motivators of online vulnerability: The impact of social network site use and FOMO. Computers in Human Behavior, 66, 248–255.Google Scholar
- 12.Kharlamov, A., & Pogrebna, G. (2018). Using human values-based approach to understand cross-cultural commitment towards regulation and governance of cybersecurity (Working Paper).Google Scholar