To read this content please select one of the options below:

Vulnerabilities and responsibilities: dealing with monsters in computer security

W. Pieters (Centre for Telematics and Information Technology, University of Twente, Enschede, The Netherlands)
L. Consoli (Institute for Science, Innovation, and Society, Radboud University, Nijmegen, The Netherlands)

Journal of Information, Communication and Ethics in Society

ISSN: 1477-996X

Article publication date: 30 October 2009

860

Abstract

Purpose

The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.

Design/methodology/approach

Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.

Findings

It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.

Research limitations/implications

The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.

Practical implications

The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.

Originality/value

This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk.

Keywords

Citation

Pieters, W. and Consoli, L. (2009), "Vulnerabilities and responsibilities: dealing with monsters in computer security", Journal of Information, Communication and Ethics in Society, Vol. 7 No. 4, pp. 243-257. https://doi.org/10.1108/14779960911004499

Publisher

:

Emerald Group Publishing Limited

Copyright © 2009, Emerald Group Publishing Limited

Related articles