IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Ethical Computing for Data Protection

Ethical Computing for Data Protection
View Sample PDF
Author(s): Wanbil W. Lee (Wanbil and Associates, Hong Kong & Computer Ethics Society, Hong Kong)
Copyright: 2020
Volume: 11
Issue: 1
Pages: 16
Source title: International Journal of Technoethics (IJT)
Editor(s)-in-Chief: Steven Umbrello (Institute for Ethics and Emerging Technologies, University of Turin, Italy)
DOI: 10.4018/IJT.2020010104

Purchase

View Ethical Computing for Data Protection on the publisher's website for pricing and purchasing information.

Abstract

Data protection is a chronic problem. Technology has had a social and ethical impact on our professional, social, and private lives. It is imperative for computing practitioners and researchers to link the ethical dilemmas and the technologies to the relevant ethical theories. This paper argues that the cause is rooted in our indifference to ethics—one doesn't take ethics as seriously into consideration as one should when formulating information security policies and protection standards—and proposes an ethics-based approach that can lessen the incidence of hacking or make hacking exasperate, aiming at mitigation rather than eradication. Central to this approach is ethical computing preconditioned on a sound understanding of the applicable theories of ethics and a shift of view of risk and ethics.

Related Content

Robert Keefer, Nadav Zohar, Lisa J. Douglas. © 2024. 13 pages.
. © 2024.
Roxanne van der Puil, Andreas Spahn, Lambèr Royakkers. © 2023. 20 pages.
Charlene Hinton. © 2023. 15 pages.
Alice Watanabe. © 2023. 15 pages.
Fabio Fossa, Stefano Arrigoni, Giandomenico Caruso, Hafeez Husain Cholakkal, Pragyan Dahal, Matteo Matteucci, Federico Cheli. © 2022. 20 pages.
Raphael Cohen-Almagor. © 2022. 17 pages.
Body Bottom