Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Ethical Computing for Data Protection

Ethical Computing for Data Protection
View Sample PDF
Author(s): Wanbil W. Lee (Wanbil and Associates, Hong Kong & Computer Ethics Society, Hong Kong)
Copyright: 2020
Volume: 11
Issue: 1
Pages: 16
Source title: International Journal of Technoethics (IJT)
Editor(s)-in-Chief: Steven Umbrello (Institute for Ethics and Emerging Technologies, University of Turin, Italy)
DOI: 10.4018/IJT.2020010104


View Ethical Computing for Data Protection on the publisher's website for pricing and purchasing information.


Data protection is a chronic problem. Technology has had a social and ethical impact on our professional, social, and private lives. It is imperative for computing practitioners and researchers to link the ethical dilemmas and the technologies to the relevant ethical theories. This paper argues that the cause is rooted in our indifference to ethics—one doesn't take ethics as seriously into consideration as one should when formulating information security policies and protection standards—and proposes an ethics-based approach that can lessen the incidence of hacking or make hacking exasperate, aiming at mitigation rather than eradication. Central to this approach is ethical computing preconditioned on a sound understanding of the applicable theories of ethics and a shift of view of risk and ethics.

Related Content

Keith Wright. © 2021. 20 pages.
Stefano Gualeni. © 2021. 11 pages.
Julien Forbat, Ingrid Vargas. © 2021. 22 pages.
Winfred Yaokumah. © 2021. 21 pages.
Pratap Chandra Mandal. © 2021. 12 pages.
Henrik Skaug Sætra. © 2021. 14 pages.
Christoph Lütge, Franziska Poszler, Aida Joaquin Acosta, David Danks, Gail Gottehrer, Lucian Mihet-Popa, Aisha Naseer. © 2021. 25 pages.
Body Bottom