9781138717527-1138717525-Cybersecurity Ethics: An Introduction

Cybersecurity Ethics: An Introduction

FREE US shipping
Rent
35 days
from $8.97 USD
FREE shipping on RENTAL RETURNS
Buy

From $20.38

Rent

From $8.97

Summary

Cybersecurity Ethics: An Introduction (ISBN-13: 9781138717527 and ISBN-10: 1138717525), written by authors Mary Manjikian, was published by Routledge in 2017. With an overall rating of 4.1 stars, it's a notable title among other Business Ethics (Management & Leadership, Computer Science, Security & Encryption, Intelligence & Espionage, Military History, Law Enforcement, Criminal Law, Ethics & Morality, Philosophy, Criminology, Social Sciences, Privacy & Surveillance, Business Culture) books. You can easily purchase or rent Cybersecurity Ethics: An Introduction (Paperback, Used) from BooksRun, along with many other new and used Business Ethics books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $7.65.

Description

This new textbook offers an accessible introduction to the topic of cybersecurity ethics.

The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks – virtue ethics, utilitarian ethics and communitarian ethics – and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, intellectual property and piracy, surveillance, and cyberethics in relation to military affairs. The third part concludes by exploring current codes of ethics used in cybersecurity.

The overall aims of the book are to:

  • provide ethical frameworks to aid decision making;
  • present the key ethical issues in relation to computer security;
  • highlight the connection between values and beliefs and the professional code of ethics.

The textbook also includes three different features to aid students: ‘Going Deeper’ provides background information on key individuals and concepts; ‘Critical Issues’ features contemporary case studies; and ‘Applications’ examine specific technologies or practices which raise ethical issues.

The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book