You are previewing Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives.
O'Reilly logo
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Book Description

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives offers insight into social and ethical challenges presented by modern technology. Aimed at students and practitioners in the rapidly growing field of information assurance and security, this book address issues of privacy, access, safety, liability and reliability in a manner that asks readers to think about how the social context is shaping technology and how technology is shaping social context and, in so doing, to rethink conceptual boundaries.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Foreword
  7. Preface
  8. Acknowledgment
  9. Section 1: Foundational Concepts and Joining the Conversation
    1. Chapter 1: On the Importance of Framing
      1. Abstract
      2. INTRODUCTION
      3. Berlin on Conceptual Frameworks
      4. Peirce on Transforming Doubt into Belief
      5. On Ortega’s Distinction between Ideas and Beliefs
      6. Bergson on the Role of Ideas
      7. Is this an Ill-Defined or Wicked Problem, or is it Really a “Mess”?
      8. Simon on Programs of Design
      9. CONCLUSION
      10. APPENDIX: DISCUSSION QUESTIONS
    2. Chapter 2: Toward What End?
      1. Abstract
      2. INTRODUCTION
      3. CONCLUSION
      4. APPENDIX: DISCUSSION QUESTIONS
    3. Chapter 3: Balancing Policies, Principles, and Philosophy in Information Assurance
      1. Abstract
      2. INTRODUCTION
      3. Background
      4. An Overview of Policy-Based vs. Principle-Based Ethical Systems
      5. Developing a Focus on Principles
      6. APPENDIX: DISCUSSION QUESTIONS
    4. Chapter 4: International Ethical Attitudes and Behaviors
      1. Abstract
      2. Introduction
      3. Background
      4. RESEARCH QUESTIONS
      5. METHODS AND PROCEDURES
      6. RESULTS
      7. DISCUSSION
      8. Future Research Directions
      9. Conclusion
      10. APPENDIX – Scenario Questions
    5. Chapter 5: Peer-to-Peer Networks
      1. ABSTRACT
      2. Introduction
      3. The Root of the Problem: Conflicting Incentives
      4. A Brief Review of Legal Issues and Remedies in P2P Networks
      5. Conclusion
      6. ACKNOWLEDGMENT
      7. APPENDIX: DISCUSSION QUESTIONS
    6. Chapter 6: Responsibility for the Harm and Risk of Software Security Flaws
      1. abstract
      2. INTRODUCTION
      3. Background
      4. VULNERABILITY DISCLOSURE
      5. CONCLUSION
      6. Acknowledgment
      7. APPENDIX: DISCUSSION QUESTIONS
    7. Chapter 7: Social/Ethical Issues in Predictive Insider Threat Monitoring
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. DATA MONITORING CHALLENGES
      5. CONSIDERATIONS OF PRIVACY LAW AND ETHICS
      6. PSYCHOSOCIAL DATA USED IN A PROTOTYPE PREDICTIVE MODEL
      7. CHALLENGES TO PREDICTIVE MODELING OF INSIDER THREAT
      8. CONCLUSIONS AND FUTURE RESEARCH DIRECTIONS
      9. ACKNOWLEDGMENT
      10. APPENDIX: DISCUSSION QUESTIONS
    8. Chapter 8: Behavioral Advertising Ethics
      1. Abstract
      2. Introduction
      3. Background
      4. Future Research Directions
      5. Conclusion
      6. APPENDIX: DISCUSSION QUESTIONS
    9. Chapter 9: Ethics, Privacy, and the Future of Genetic Information in Healthcare Information Assurance and Security
      1. Abstract
      2. Introduction
      3. BACKGROUND of Pharmacogenomics
      4. EXISTING LAWS
      5. IMPLICATIONS FOR INFORMATION ASSURANCE AND SECURITY
      6. CONCLUSION
      7. APPENDIX: DISCUSSION QUESTIONS
    10. Chapter 10: Privacy and Public Access in the Light of E-Government
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. BENEFITS AND RISKS WITH e-SERVICES
      5. E-GOVERNMENT AND LEGISLATION IN EUROPE
      6. A PHILOSOPHICAL PERSPECTIVE ON PRIVACY
      7. PRIVACY, TRANSPARENCY AND PUBLIC ACCESS TO OFFICIAL DOCUMENTS
      8. SIX SWEDISH GOVERNMENTAL AGENCIES’ VIEW ON e-SERVICES AND PRIVACY
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
      11. APPENDIX: DISCUSSION QUESTIONS
    11. Chapter 11: Data Breach Disclosure
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. POLICY ANALYSIS
      5. CONCLUSION and FUTURE RESEARCH
      6. APPENDIX: DISCUSSION QUESTIONS
  10. Section 2: Private Sector
  11. Section 3: Emerging Issues and the Public Sector
  12. Compilation of References
  13. About the Contributors
  14. Section 1 Introduction
  15. Section 2 Introduction
  16. Section 3 Introduction
  17. Afterword