Abstract
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism – we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Winner, L.: The Whale and the Reactor. University of Chicago Press, Chicago (1986)
Martin, C.D., Huff, C.W., Gotterbarn, D., Miller, K.: Implementing a Tenth Strand in the CS Curriculum: The Second Report from Project ImpactCS. Comm. ACM 39, 75–84 (1996)
Fleischmann, K.R.: Frog and Cyberfrog are Friends: Dissection Simulation and Animal Advocacy. Soc. Anim. 11, 123–143 (2003)
Fleischmann, K.R.: Do-It-Yourself Information Technology: Role Hybridization and the Design-Use Interface. J. Am. Soc. Info. Sci. Tech. 57, 87–95 (2006)
Fleischmann, K.R.: Boundary Objects with Agency: A Method for Studying the Design-Use Interface. Info. Soc. 22, 77–87 (2006)
Fleischmann, K.R.: The Evolution of Agency: Spectra of Bioagency and Cyberagency. Info. Soc. 23, 361–371 (2007)
Fleischmann, K.R.: Sociotechnical Interaction and Cyborg-Cyborg Interaction: Transforming the Scale and Convergence of HCI. Info. Soc. 25, 227–235 (2009)
Fleischmann, K.R., Templeton, T.C.: Past Futures and Technoscientific Innovation: The Mutual Shaping of Science Fiction and Science Fact. In: Proceedings of the 71st Annual Meeting of the American Society for Information Science and Technology, Columbus, OH (2008)
Fleischmann, K.R., Templeton, T.C.: Science Fiction in the Lives of Scientists and Engineers. In: Proceedings of Digital Humanities 2009, College Park, MD (2009)
Fleischmann, K.R., Wallace, W.A.: Ethical Implications of Values Embedded in Computational Models: An Exploratory Study. In: Proceedings of the 69th Annual Meeting of the American Society for Information Science and Technology, Austin, TX (2006)
Fleischmann, K.R., Wallace, W.A.: Ensuring Transparency in Computational Modeling. Comm. ACM 52, 131–134 (2009)
Mason, R.O.: Morality and Models. In: Wallace, W.A. (ed.) Ethics in Modeling. Elsevier, Tarrytown (1994)
Fleischmann, K.R., Wallace, W.A.: A Covenant with Transparency: Opening the Black Box of Models. Comm. ACM 48, 93–97 (2005)
Kelton, K., Fleischmann, K.R., Wallace, W.A.: Trust in Digital Information. J. Am. Soc. Info. Sci. Tech. 59, 363–374 (2009)
Cheng, A.-S., Fleischmann, K.R., Wang, P., Oard, D.W.: Advancing Social Science Research by Applying Computational Linguistics. In: Proceedings of the 71st Annual Meeting of the American Society for Information Science and Technology, Columbus, OH (2008)
Fleischmann, K.R., Oard, D.W., Cheng, A.-S., Wang, P., Ishita, E.: Automatic Classification of Human Values: Applying Computational Thinking to Information Ethics. In: Proceedings of the 72nd Annual Meeting of the American Society for Information Science and Technology, Vancouver, BC, Canada (2009)
Cheng, A.-S., Fleischmann, K.R., Wang, P., Ishita, E., Oard, D.W.: Values of Stakeholders in the Net Neutrality Debate: Applying Content Analysis to Telecommunications Policy. In: Proceedings of the 43rd Hawai’i International Conference on System Sciences, Kauai, HI (2010)
Zhou, Y., Fleischmann, K.R., Wallace, W.A.: Automatic Text Analysis of Values from the Enron Email Dataset: Clustering a Social Network Using the Value Patterns of Actors. In: Proceedings of the 43rd Hawai’i International Conference on System Sciences, Kauai, HI (2010)
Fleischmann, K.R., Wallace, W.A., Grimes, J.M.: The Values of Computational Modelers and Professional Codes of Ethics: Results from a Field Study. In: Proceedings of the 43rd Hawai’i International Conference on System Sciences, Kauai, HI (2010)
Gotterbarn, D.: Reconstructing the ACM Code of Ethics and Teaching Computer Ethics. ACM SIGCSE Bull. 30, 9–11 (1998)
Gotterbarn, D.: How the New Software Engineering Code of Ethics Affects You. IEEE Software 16, 58–64 (1999)
Martin, C.D.: What Is Computer Ethics? ACM SIGCSE Bulletin 30, 8–9 (1997)
Martin, C.D., Martin, D.H.: Professional Codes of Conduct and Computer Ethics Education. Soc. Sci. Comp. Rev. 8, 96–108 (1990)
Robbins, R.W., Fleischmann, K.R., Wallace, W.A.: Computing and Information Ethics: Challenges, Education, and Research. In: Luppicini, R., Adell, R. (eds.) Handbook of Research on Technoethics. The Idea Group, New York (2009)
Fleischmann, K.R., Robbins, R.W., Wallace, W.A.: Designing Educational Cases for Intercultural Information Ethics: The Importance of Diversity, Perspectives, Values, and Pluralism. J. Ed. Lib. Info. Sci. 50, 4–14 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fleischmann, K.R. (2010). Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-14992-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14991-7
Online ISBN: 978-3-642-14992-4
eBook Packages: Computer ScienceComputer Science (R0)