Ethical principles shaping values-based cybersecurity decision-making

被引:6
作者
Fenech, Joseph [1 ]
Richards, Deborah [1 ]
Formosa, Paul [2 ]
机构
[1] Macquarie Univ, Sch Comp, Sydney, Australia
[2] Macquarie Univ, Dept Philosophy, Sydney, Australia
关键词
Cybersecurity sensitive decision -making; Ethical principles; Ethics training; Profiling; Human agency; STUDENTS; TRAITS;
D O I
10.1016/j.cose.2024.103795
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The human factor in information systems is a large vulnerability when implementing cybersecurity, and many approaches, including technical and policy driven solutions, seek to mitigate this vulnerability. Decisions to apply technical or policy solutions must consider how an individual's values and moral stance influence their responses to these implementations. Our research aims to evaluate how individuals prioritise different ethical principles when making cybersecurity sensitive decisions and how much perceived choice they have when doing so. Further, we sought to use participants' responses to cybersecurity scenarios to create profiles that describe their values and individual factors including personality. Participants (n = 193) in our study responded to five different ethically sensitive cybersecurity scenarios in random order, selecting their action in that scenario and rating and ranking of the ethical principles (i.e., Beneficence, Non-Maleficence, Justice, Autonomy, Explicability) behind that action. Using participants' demographics, personality, values, and cyber hygiene practices, we created profiles using machine learning to predict participants' choices and the principle of most importance to them across scenarios. Further, we found that, generalising, for our participants Autonomy was the most important ethical principle in our scenarios, followed by Justice. Our study also suggests that participants felt they had some agency in their decision making and they were able to weigh up different ethical principles.
引用
收藏
页数:17
相关论文
共 56 条
[1]  
Abomhara M, 2015, J CYBER SECUR MOBIL, V4, P65, DOI [10.13052/jcsm2245-1439.414, 10.13052/jcsm2245-1439.414]
[2]  
ABS, 2019, Australian standard classification of cultural and ethnic groups (ASCCEG)
[3]   Best Practice Recommendations for Designing and Implementing Experimental Vignette Methodology Studies [J].
Aguinis, Herman ;
Bradley, Kyle J. .
ORGANIZATIONAL RESEARCH METHODS, 2014, 17 (04) :351-371
[4]  
Anderson R., 1993, Proceedings of the 1st ACM Confer- ence on Computer and Communications Security, P215, DOI [10.1145/168588.168615, DOI 10.1145/168588.168615]
[5]  
[Anonymous], 2018, ACM code of ethics and professional conduct
[6]   Islamophobia and Twitter: A Typology of Online Hate Against Muslims on Social Media [J].
Awan, Imran .
POLICY AND INTERNET, 2014, 6 (02) :133-150
[7]   Toward a Psychology of Human Agency [J].
Bandura, Albert .
PERSPECTIVES ON PSYCHOLOGICAL SCIENCE, 2006, 1 (02) :164-180
[8]  
Beauchamp TomL., 2001, PRINCIPLES BIOMEDICA, VFifth
[9]  
Brey P., 2007, Security, Privacy, and Trust in Modern Data Management, DOI DOI 10.1007/978-3-540-69861-6_3
[10]   Employee Age Alters the Effects of Justice on Emotional Exhaustion and Organizational Deviance [J].
Brienza, Justin P. ;
Bobocel, D. Ramona .
FRONTIERS IN PSYCHOLOGY, 2017, 8