Skip to main content

Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

  • Conference paper
Financial Cryptography and Data Security (FC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6054))

Included in the following conference series:

Abstract

The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism – we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Winner, L.: The Whale and the Reactor. University of Chicago Press, Chicago (1986)

    Google Scholar 

  2. Martin, C.D., Huff, C.W., Gotterbarn, D., Miller, K.: Implementing a Tenth Strand in the CS Curriculum: The Second Report from Project ImpactCS. Comm. ACM 39, 75–84 (1996)

    Article  Google Scholar 

  3. Fleischmann, K.R.: Frog and Cyberfrog are Friends: Dissection Simulation and Animal Advocacy. Soc. Anim. 11, 123–143 (2003)

    Article  Google Scholar 

  4. Fleischmann, K.R.: Do-It-Yourself Information Technology: Role Hybridization and the Design-Use Interface. J. Am. Soc. Info. Sci. Tech. 57, 87–95 (2006)

    Article  Google Scholar 

  5. Fleischmann, K.R.: Boundary Objects with Agency: A Method for Studying the Design-Use Interface. Info. Soc. 22, 77–87 (2006)

    Article  Google Scholar 

  6. Fleischmann, K.R.: The Evolution of Agency: Spectra of Bioagency and Cyberagency. Info. Soc. 23, 361–371 (2007)

    Article  Google Scholar 

  7. Fleischmann, K.R.: Sociotechnical Interaction and Cyborg-Cyborg Interaction: Transforming the Scale and Convergence of HCI. Info. Soc. 25, 227–235 (2009)

    Article  Google Scholar 

  8. Fleischmann, K.R., Templeton, T.C.: Past Futures and Technoscientific Innovation: The Mutual Shaping of Science Fiction and Science Fact. In: Proceedings of the 71st Annual Meeting of the American Society for Information Science and Technology, Columbus, OH (2008)

    Google Scholar 

  9. Fleischmann, K.R., Templeton, T.C.: Science Fiction in the Lives of Scientists and Engineers. In: Proceedings of Digital Humanities 2009, College Park, MD (2009)

    Google Scholar 

  10. Fleischmann, K.R., Wallace, W.A.: Ethical Implications of Values Embedded in Computational Models: An Exploratory Study. In: Proceedings of the 69th Annual Meeting of the American Society for Information Science and Technology, Austin, TX (2006)

    Google Scholar 

  11. Fleischmann, K.R., Wallace, W.A.: Ensuring Transparency in Computational Modeling. Comm. ACM 52, 131–134 (2009)

    Article  Google Scholar 

  12. Mason, R.O.: Morality and Models. In: Wallace, W.A. (ed.) Ethics in Modeling. Elsevier, Tarrytown (1994)

    Google Scholar 

  13. Fleischmann, K.R., Wallace, W.A.: A Covenant with Transparency: Opening the Black Box of Models. Comm. ACM 48, 93–97 (2005)

    Article  Google Scholar 

  14. Kelton, K., Fleischmann, K.R., Wallace, W.A.: Trust in Digital Information. J. Am. Soc. Info. Sci. Tech. 59, 363–374 (2009)

    Article  Google Scholar 

  15. Cheng, A.-S., Fleischmann, K.R., Wang, P., Oard, D.W.: Advancing Social Science Research by Applying Computational Linguistics. In: Proceedings of the 71st Annual Meeting of the American Society for Information Science and Technology, Columbus, OH (2008)

    Google Scholar 

  16. Fleischmann, K.R., Oard, D.W., Cheng, A.-S., Wang, P., Ishita, E.: Automatic Classification of Human Values: Applying Computational Thinking to Information Ethics. In: Proceedings of the 72nd Annual Meeting of the American Society for Information Science and Technology, Vancouver, BC, Canada (2009)

    Google Scholar 

  17. Cheng, A.-S., Fleischmann, K.R., Wang, P., Ishita, E., Oard, D.W.: Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. In: Proceedings of the 43rd Hawai’i International Conference on System Sciences, Kauai, HI (2010)

    Google Scholar 

  18. Zhou, Y., Fleischmann, K.R., Wallace, W.A.: Automatic Text Analysis of Values from the Enron Email Dataset: Clustering a Social Network Using the Value Patterns of Actors. In: Proceedings of the 43rd Hawai’i International Conference on System Sciences, Kauai, HI (2010)

    Google Scholar 

  19. Fleischmann, K.R., Wallace, W.A., Grimes, J.M.: The Values of Computational Modelers and Professional Codes of Ethics: Results from a Field Study. In: Proceedings of the 43rd Hawai’i International Conference on System Sciences, Kauai, HI (2010)

    Google Scholar 

  20. Gotterbarn, D.: Reconstructing the ACM Code of Ethics and Teaching Computer Ethics. ACM SIGCSE Bull. 30, 9–11 (1998)

    Article  Google Scholar 

  21. Gotterbarn, D.: How the New Software Engineering Code of Ethics Affects You. IEEE Software 16, 58–64 (1999)

    Article  Google Scholar 

  22. Martin, C.D.: What Is Computer Ethics? ACM SIGCSE Bulletin 30, 8–9 (1997)

    Article  Google Scholar 

  23. Martin, C.D., Martin, D.H.: Professional Codes of Conduct and Computer Ethics Education. Soc. Sci. Comp. Rev. 8, 96–108 (1990)

    Article  Google Scholar 

  24. Robbins, R.W., Fleischmann, K.R., Wallace, W.A.: Computing and Information Ethics: Challenges, Education, and Research. In: Luppicini, R., Adell, R. (eds.) Handbook of Research on Technoethics. The Idea Group, New York (2009)

    Google Scholar 

  25. Fleischmann, K.R., Robbins, R.W., Wallace, W.A.: Designing Educational Cases for Intercultural Information Ethics: The Importance of Diversity, Perspectives, Values, and Pluralism. J. Ed. Lib. Info. Sci. 50, 4–14 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fleischmann, K.R. (2010). Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14992-4_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14991-7

  • Online ISBN: 978-3-642-14992-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics