Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1595676.1595689acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
panel

Towards an ethical code for information security?

Published: 22 September 2008 Publication History

Abstract

Most computer scientists reflexively reject the idea of a malicious universe due to its conflict with the dominant scientific paradigm of a non-teleological impartially disinterested universe. While computer scientists might not view the universe as benign, neither do they view the universe as actively hostile. In addition, most scientist would take the view that a teleological universe equals paradigmatic heresy.
To this we say: feh!.
Outsiders call us "paranoid," but any sensible member of our field knows for a fact that the information security universe does act maliciously.
Our universe really does try to cause us harm.
Two of us (Snow and Greenwald) have recently given some thought to ethical notions in a somewhat related field; we realized that due to the paradigm-conflicting presence of a malicious universe, we may need a specialized code of ethics for the computer security field. We therefore assembled a group of experts with different viewpoints on this subject for a New Security Paradigms Workshop panel. We felt that NSPWwould provide the perfect venue to discuss this radical concept.
We gave the panel the charge of considering the mere notion of a specialized code of ethics for the field of cybersecurity. Do we really need or want a specialized code of ethics? We therefore had no interest, at least for the purposes of this panel, with the possible contents of such a specialized ethical code.
Our panelist positions run the gamut from "We desperately need a strong code of ethics" to "A specialized ethical code would cause great harm." Along with our positions, we report on the feedback we received from the NSPWprocess and what we learned.

References

[1]
ACM Council. ACM code of ethics and professional conduct, October 1992. http://www.acm.org/about/code-of-ethics.
[2]
AMS Council's Special Advisory Committee on Professional Ethics. Ethical guidelines of the american mathematical society, January 2005. http://www.ams.org/secretary/ethics.html.
[3]
S.M. Bellovin, M. Blaze, W. Diffie, S. Landau, P.G. Neumann, and J. Rexford. Risking communications security: Potential hazards of the protect america act. IEEE Security&Privacy, 6(1):24--33, January/February 2008. Available at http://www.crypto.com/papers/paa-ieee.pdf.
[4]
T. Bynum. A very short history of computer ethics. In J. Dorbolo, editor, American Philosophical Association's Newsletter on Philosophy and Computing, volume 99, pages 163--165, Newark, Delaware, USA, Spring 2000. The American Philosophical Association, University of Delaware. Available at http://www.apaonline.org/publications/newsletters/v99n2_Computers_05.aspx.
[5]
H. Celine. Celine's laws of chaos, discord, and confusion. In R. Wilson, editor, The Illuminati Papers, pages 118--125, Berkeley, California, 1997.
[6]
P. Davis. Codes of ethics and their limitations. SIAM News, 40(9), November 2007. Book Review of Computer Ethics: A Global Perspective by Stamatellos, G.
[7]
J. Diamond. Collapse : How Societies Choose to Fail or Succeed. Penguin, December 2005.
[8]
K. Dukier. Ensuring (and insuring?) critical information infrastructure protection. In 2005 Rueschlikon Conference on Information Policy. The Rueschlikon Conference, September 2005.
[9]
R. Ford and S. Gordon. Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. In NSPW '06: Proceedings of the 2006 workshop on New security paradigms, pages 3--10, New York, NY, USA, 2007. ACM.
[10]
S. Greenwald, K. Olthoff, V. Raskin, and W. Ruch. The user non-acceptance paradigm: Infosec's dirty little secret. In Proceedings of the 2004 New Security Paradigms Workshop, pages 35--43, Nova Scotia, Canada, September 2004.
[11]
K. Górniak-Kocikowska. The computer revolution and the problem of global ethics. Science and Engineering Ethics, 2(2):177--190, June 1996.
[12]
D. Halperin, T.S. Heydt-Benjamin, B. Ransford, S.S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W.H. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In Proceedings of the 29th Annual IEEE Symposium on Security and Privacy, May 2008. Outstanding Paper Award.
[13]
IEEE Board of Directors. IEEE Code of Ethics, February 2006. http://www.ieee.org/portal/pages/iportals/aboutus/ethics/code.html.
[14]
(ISC)2. Code of Ethics, 1998-2008. https://www.isc2.org/cgi-bin/content.cgi?category=12l.
[15]
T. Kuhn. The Structure of Scientific Revolutions. University of Chicago Press, 1970.
[16]
N. Machiavelli. The Prince. 1515.
[17]
Marquis de Sade. Justine (Les infortunes de la vertu). 1791.
[18]
Rabbi Yosef Karo of Safed. Shulchan Aruch. Yoreh De'ah, Chapter 6, Mixing Meat With Milk, ca. 1560. Available from http://www.torah.org/advanced/shulchan-aruch/classes/chapter6.html.
[19]
G. Shaw. Annajanska, the Bolshevik Empress. 1917.
[20]
N. Weiner. Cybernetics: or Control and Communication in the Animal and the Machine. Technology Press, New York, New York, 1948.
[21]
N. Weiner. The Human Use of Human Beings: Cybernetics and Society, Second Edition Revised. Doubleday Anchor, Garden City, New York, 1954. This later edition appears better and more complete from a computer ethics point of view.
[22]
A. Whitehead. Symbolism: Its Meaning and Effect. Fordham University Press, 1927.
[23]
L. Winner. Who will we be in cyberspace? The Network Observer, 2(9), September 1995.

Cited By

View all
  • (2016)A Survey of Ethical Agreements in Information Security CoursesProceedings of the 47th ACM Technical Symposium on Computing Science Education10.1145/2839509.2844580(479-484)Online publication date: 17-Feb-2016
  • (2009)High Assurance Digital ForensicsProceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering10.1109/SADFE.2009.17(54-61)Online publication date: 21-May-2009

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '08: Proceedings of the 2008 New Security Paradigms Workshop
August 2009
144 pages
ISBN:9781605583419
DOI:10.1145/1595676
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Kuhn
  2. NSPW
  3. code of ethics
  4. command and control
  5. computer security
  6. cybersecurity
  7. ethical code
  8. ethics
  9. information security
  10. new security paradigms workshop
  11. paradigm
  12. professional ethics
  13. regulation

Qualifiers

  • Panel

Conference

NSPW '08
Sponsor:
NSPW '08: 2008 New Security Paradigms Workshop
September 22 - 25, 2008
California, Lake Tahoe, USA

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)3
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2016)A Survey of Ethical Agreements in Information Security CoursesProceedings of the 47th ACM Technical Symposium on Computing Science Education10.1145/2839509.2844580(479-484)Online publication date: 17-Feb-2016
  • (2009)High Assurance Digital ForensicsProceedings of the 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering10.1109/SADFE.2009.17(54-61)Online publication date: 21-May-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media