This chapter explores the fundamental ethical values in cybersecurity, including security, privacy, fairness, and accountability, and how they shape technical and institutional measures. The chapter also examines value conflicts, such as privacy versus security, highlighting the complexity of these tensions and proposing context-sensitive approaches to resolve them.
Overview
Syllabus
Values and Value Clusters
This stage introduces the concept of values in cybersecurity, defining them as evaluative dimensions of goodness and organizing them into four key value clusters—security, privacy, fairness, and accountability—that shape ethical considerations and decision-making in the field.
Chevron 4 steps- instruction
2.1 Introduction
- instruction
2.2.1 What Are Values?
- instruction
2.2.2 Value Clusters
-
Quiz 2.2
5 questions
2.3 Value Clusters in Cybersecurity
This stage identifies four key value clusters in cybersecurity: security, privacy, fairness, and accountability, each representing distinct moral concerns and guiding ethical decision-making. These clusters highlight the need to balance protection from cyber threats, individual rights, equitable treatment, and transparency in cybersecurity policies and practices.
Chevron 6 steps- instruction
Introduction
- instruction
2.3.1 Security
- instruction
2.3.2 Privacy
- instruction
2.3.3 Fairness
- instruction
2.3.4 Accountability
-
Quiz 2.3
5 questions
2.4 Value Conflicts in Cybersecurity
This stage examines practical value conflicts in cybersecurity, such as security versus privacy and accountability, emphasizing the need for context-specific approaches to balance competing ethical concerns.
Chevron 9 steps- instruction
2.4.1 What Are Value Conflicts?
- instruction
2.4.2 Value Conflicts in Cybersecurity
- instruction
2.4.2.1 Privacy Versus Security
- instruction
2.4.2.2 Privacy Versus Fairness
- instruction
2.4.2.3 Privacy Versus Accountability
- instruction
2.4.2.4 Security Versus Accountability
- instruction
2.4.2.5 Security Versus Fairness (and Democracy)
-
Quiz 2.4
5 questions
- instruction
2.5 Conclusions: Beyond Security Versus Privacy