Science and Engineering Ethics 20 (3):675-699 (2014)
Abstract |
Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security
|
Keywords | Information security Critical theory Information security policy Medical records |
Categories | (categorize this paper) |
ISBN(s) | |
DOI | 10.1007/s11948-013-9496-6 |
Options |
![]() ![]() ![]() ![]() |
Download options
References found in this work BETA
After Virtue: A Study in Moral Theory.Alasdair C. MacIntyre - 1983 - University of Notre Dame Press.
An Introduction to the Principles of Morals and Legislation.Jeremy Bentham - 1780 - Dover Publications.
An Enquiry Concerning Human Understanding.David Hume - 1955 - In Steven M. Cahn (ed.), Exploring Philosophy: An Introductory Anthology. Oxford University Press. pp. 112.
View all 16 references / Add more references
Citations of this work BETA
Cybersecurity in Health – Disentangling Value Tensions.Michele Loi, Markus Christen, Nadine Kleine & Karsten Weber - 2019 - Journal of Information, Communication and Ethics in Society 17 (2):229-245.
Examination and Diagnosis of Electronic Patient Records and Their Associated Ethics: A Scoping Literature Review.Tim Jacquemard, Colin P. Doherty & Mary B. Fitzsimons - 2020 - BMC Medical Ethics 21 (1):1-13.
The Anatomy of Electronic Patient Record Ethics: A Framework to Guide Design, Development, Implementation, and Use.Tim Jacquemard, Colin P. Doherty & Mary B. Fitzsimons - 2021 - BMC Medical Ethics 22 (1):1-14.
Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
Similar books and articles
CSR and the Corporate Cyborg: Ethical Corporate Information Security Practices.Andrea M. Matwyshyn - 2009 - Journal of Business Ethics 88 (S4):579 - 594.
My Critique is Bigger Than Yours: Constituting Exclusions in Critical Security Studies.David Roger Mutimer - 2009 - Studies in Social Justice 3 (1):9-22.
Explanation and Trust: What to Tell the User in Security and AI? [REVIEW]Wolter Pieters - 2011 - Ethics and Information Technology 13 (1):53-64.
Dynamics of Crimes Against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
Information Security Culture in Russian ICT Small and Medium Size Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2013 - Iris 34.
Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Organizational Repertoires and Rites in Health Information Security.Ted Cooper, Jeff Collmann & Henry Neidermeier - 2008 - Cambridge Quarterly of Healthcare Ethics 17 (4):441-452.
Managers' Information Security Awareness in Russian ICT Small and Medium Sized Enterprises.Hannakaisa Isomäki and Oleksandr Bilozerov - 2014 - Iris 35.
Privacy, Secrecy and Security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Information Systems for National Security in Thailand: Ethical Issues and Policy Implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
Epistemic Value Theory and Information Ethics.Don Fallis - 2004 - Minds and Machines 14 (1):101-117.
Application of IT Examination in Investigation of Crimes on Safety of Electronic Data and Information Systems.Lina Novikoviene & Egle Bileviciute - 2010 - Jurisprudencija: Mokslo darbu žurnalas 119 (1):317-329.
Analytics
Added to PP index
2013-11-30
Total views
38 ( #270,936 of 2,419,814 )
Recent downloads (6 months)
5 ( #152,336 of 2,419,814 )
2013-11-30
Total views
38 ( #270,936 of 2,419,814 )
Recent downloads (6 months)
5 ( #152,336 of 2,419,814 )
How can I increase my downloads?
Downloads