Science and Engineering Ethics 25 (2):419-441 (2019)

Björn Lundgren
Umeå University
This article proposes a new definition of information security, the ‘Appropriate Access’ definition. Apart from providing the basic criteria for a definition—correct demarcation and meaning concerning the state of security—it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called ‘soft issues’ of information security and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security—the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
Keywords No keywords specified (fix it)
Categories (categorize this paper)
DOI 10.1007/s11948-017-9992-1
Edit this record
Mark as duplicate
Export citation
Find it on Scholar
Request removal from index
Revision history

Download options

PhilArchive copy

Upload a copy of this paper     Check publisher's policy     Papers currently archived: 58,321
External links

Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
Through your library

References found in this work BETA

Principia Ethica.Evander Bradley McGilvary - 1904 - Philosophical Review 13 (3):351.
New Wave Moral Realism Meets Moral Twin Earth.Terence Horgan & Mark Timmons - 1991 - Journal of Philosophical Research 16:447-465.
Thinking How to Live.Simon Blackburn - 2006 - Philosophy and Phenomenological Research 72 (3):729-744.
Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.

Add more references

Citations of this work BETA

No citations found.

Add more citations

Similar books and articles

Reve{a,I}Ling the Risks: A Phenomenology of Information Security.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
Reve{a,I}Ling the Risks.Wolter Pieters - 2010 - Techne 14 (3):194-206.
An Intelligent Tutoring System for Teaching Advanced Topics in Information Security.Ali O. Mahdi, Mohammed I. Alhabbash & Samy S. Abu Naser - 2016 - World Wide Journal of Multidisciplinary Research and Development 2 (12):1-9.
Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.


Added to PP index

Total views
44 ( #231,589 of 2,419,962 )

Recent downloads (6 months)
6 ( #124,106 of 2,419,962 )

How can I increase my downloads?


My notes