skip to main content
10.1145/2839509.2844580acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article

A Survey of Ethical Agreements in Information Security Courses

Published:17 February 2016Publication History

ABSTRACT

Existing ethical agreements, as applicable in the teaching of information security courses, typically spell out rules on what students should and should not do. The main problem is that the question of what students should or should not do is not a settled issue, because personal stances on questions of morality and ethics fundamentally influence the ethical recommendations that teachers present to their students. In light of the growing level of malice in the computing domain, experts have highlighted the importance of information security ethics by debating the need for a standard code of ethics for information security. Arguably, differences in ethical stance, with the effect of divergent ethical agreements, will not efficiently serve the purpose of effective universal application of ethics in the field of information security education. Examining current ethical policies in information security courses can provide insight about the prevailing ethics within the information security community. Moreover, understanding what the prevailing philosophies on ethics are within the community, in terms of how they actually diverge or converge, will present a good projection of how a standard policy on ethics may be feasibly applicable in a future regulatory environment. This way, we may be able to forecast the nature of ethical norms that future professionals will accept or allow to be imposed on them. Therefore, in our survey, we analyze ethical agreements on information security courses to identify the nature of existing agreements. We determine the commonalities of these agreements and derive an ethical policy prototype that includes the common elements of 329 ethical policies.

References

  1. ACM. Code of Ethics - Association for Computing Machinery. http://www.acm.org/about/code-of-ethics.Google ScholarGoogle Scholar
  2. J. Aycock, E. Buchanan, S. Dexter, and D. Dittrich. Human subjects, agents, or bots: Current issues in ethics and computer security research. In Financial Cryptography and Data Security, pages 138--145. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. freesummarizer.com. Free Summarizer. http://freesummarizer.com/#summarizecontainer.Google ScholarGoogle Scholar
  4. S. J. Greenwald, B. D. Snow, R. Ford, and R. Thieme. Towards an ethical code for information security? In Proceedings of the 2008 workshop on New security paradigms, pages 75--87. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. E. Harris. Applying moral theories. Wadsworth Publishing Company, 1997.Google ScholarGoogle Scholar
  6. IEEE. IEEE Code of Ethics. http://www.ieee.org/about/corporate/governance/p7-8.html.Google ScholarGoogle Scholar
  7. G. Ledin Jr. The growing harm of not teaching malware. Communications of the ACM, 54(2):32--34, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. P. Sullins. A case study in malware research ethics education: When teaching bad is good. In Security and Privacy Workshops (SPW), 2014 IEEE, pages 1--4. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. UofC. University of Calgary : K.1 Statement of Intellectual Honesty. http://www.ucalgary.ca/honesty/.Google ScholarGoogle Scholar
  10. J. Vijayan. Undergrad suspected in massive Univ. of Nebraska breach, 2012.Google ScholarGoogle Scholar

Index Terms

  1. A Survey of Ethical Agreements in Information Security Courses

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  SIGCSE '16: Proceedings of the 47th ACM Technical Symposium on Computing Science Education
                  February 2016
                  768 pages
                  ISBN:9781450336857
                  DOI:10.1145/2839509

                  Copyright © 2016 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 17 February 2016

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • research-article

                  Acceptance Rates

                  SIGCSE '16 Paper Acceptance Rate105of297submissions,35%Overall Acceptance Rate1,595of4,542submissions,35%

                  Upcoming Conference

                  SIGCSE Virtual 2024

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader