Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Treehouse

(UPI) Chapter 2: Core Values and Value Conflicts in Cybersecurity Course (How To)

via Treehouse

Overview

This chapter explores the fundamental ethical values in cybersecurity, including security, privacy, fairness, and accountability, and how they shape technical and institutional measures. The chapter also examines value conflicts, such as privacy versus security, highlighting the complexity of these tensions and proposing context-sensitive approaches to resolve them.

Syllabus

Values and Value Clusters

This stage introduces the concept of values in cybersecurity, defining them as evaluative dimensions of goodness and organizing them into four key value clusters—security, privacy, fairness, and accountability—that shape ethical considerations and decision-making in the field.

Chevron 4 steps
  • instruction

    2.1 Introduction

  • instruction

    2.2.1 What Are Values?

  • instruction

    2.2.2 Value Clusters

  • Quiz 2.2

    5 questions

2.3 Value Clusters in Cybersecurity

This stage identifies four key value clusters in cybersecurity: security, privacy, fairness, and accountability, each representing distinct moral concerns and guiding ethical decision-making. These clusters highlight the need to balance protection from cyber threats, individual rights, equitable treatment, and transparency in cybersecurity policies and practices.

Chevron 6 steps
  • instruction

    Introduction

  • instruction

    2.3.1 Security

  • instruction

    2.3.2 Privacy

  • instruction

    2.3.3 Fairness

  • instruction

    2.3.4 Accountability

  • Quiz 2.3

    5 questions

2.4 Value Conflicts in Cybersecurity

This stage examines practical value conflicts in cybersecurity, such as security versus privacy and accountability, emphasizing the need for context-specific approaches to balance competing ethical concerns.

Chevron 9 steps
  • instruction

    2.4.1 What Are Value Conflicts?

  • instruction

    2.4.2 Value Conflicts in Cybersecurity

  • instruction

    2.4.2.1 Privacy Versus Security

  • instruction

    2.4.2.2 Privacy Versus Fairness

  • instruction

    2.4.2.3 Privacy Versus Accountability

  • instruction

    2.4.2.4 Security Versus Accountability

  • instruction

    2.4.2.5 Security Versus Fairness (and Democracy)

  • Quiz 2.4

    5 questions

  • instruction

    2.5 Conclusions: Beyond Security Versus Privacy

Reviews

Start your review of (UPI) Chapter 2: Core Values and Value Conflicts in Cybersecurity Course (How To)

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.