Skip to main content
Log in

Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph

  • Original Research/Scholarship
  • Published:
Science and Engineering Ethics Aims and scope Submit manuscript

Abstract

Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The pervasiveness and democratization of ICTs have allowed people from all backgrounds to access and use them, which has resulted in new information-based assets. At the same time, this phenomenon has brought a new class of problems, in the form of activists, criminals and state actors that target the new assets to achieve their goals, legitimate or not. Cybersecurity includes the research, tools and techniques to protect information assets. However, some cybersecurity measures may clash with the ethical values of citizens. We analyze the synergies and tensions between some of these values, namely security, privacy, fairness and autonomy. From this analysis, we derive a value graph, and then we set out to identify those paths in the graph that lead to satisfying all four aforementioned values in the cybersecurity setting, by taking advantage of their synergies and avoiding their tensions. We illustrate our conceptual discussion with examples of enabling technologies. We also sketch how our methodology can be generalized to any setting where several potentially conflicting values have to be satisfied.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

Notes

  1. Similarly, in their discussion about the principles/values related to artificial intelligence, Floridi and Cowls (2019) mention explicability/transparency as a “new enabling principle” to be added to what they call “traditional bioethics principles”: beneficence, non-maleficence, autonomy and justice/fairness.

  2. In graph theory, a path in a graph G is a sequence of nodes of G such that an edge in G exists that connects each node to the next node in the sequence. A Hamiltonian path in G is a path that visits each node of G exactly once.

References

  • AFP. (2018). German spies can keep monitoring internet hubs, court rules. The Local.de. https://www.thelocal.de/20180531/german-spies-can-keep-monitoring-internet-hubs-court-rules.

  • Bamberger, W. (2010). Interpersonal trust—Attempt of a definition. Scientific Report, Technical University Munich.

  • Bier, E., Chow, R., Golle, P., Holloway King, T., & Staddon, J. (2009). The rules of redaction: Identify, protect, review (and repeat). IEEE Security & Privacy, 7(6), 46–53.

    Article  Google Scholar 

  • Blanco-Justicia, A., & Domingo-Ferrer, J. (2016). Privacy-aware loyalty programs. Computer Communications, 82, 83–94.

    Article  Google Scholar 

  • Blanco-Justicia, A., & Domingo-Ferrer, J. (2018). Efficient privacy-preserving implicit authentication. Computer Communications, 125, 13–23.

    Article  Google Scholar 

  • Brands, S. (1994). Untraceable off-line cash in wallet with observers. In CRYPTO’93 (pp. 302–318). Berlin: Springer.

  • Bundesverfassungsgericht. (1983). BVerfGE 65,1 - Volkszählungsurteil. 15 December. http://www.servat.unibe.ch/dfr/bv065001.html. Retrieved September 22, 2019.

  • Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.-H., Le Métayer, D., Tirtea, R., et al. (2015). Privacy and data protection by design-from policy to engineering. Heraklion: European Union Agency for Network and Information Security.

    Google Scholar 

  • De Pietro, C., & Francetic, I. (2018). E-health in Switzerland: The laborious adoption of the federal law on electronic health records (EHR) and health information exchange (HIE) networks. Health Policy, 122(2), 69–74.

    Article  Google Scholar 

  • Domingo-Ferrer, J., Blanco, A., Parra-Arnau, J., Herrmann, D., Kirichenko, A., Sullivan, S., Patel, A., Bangerter, E., & Inversini, R. (2017). CANVAS white paper 4-technological challenges in cybersecurity. The CANVAS project. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3091942. Retrieved September 22, 2019.

  • Domingo-Ferrer, J., & Mateo-Sanz, J. M. (2002). Practical data-oriented microaggregation for statistical disclosure control. IEEE Transactions on Knowledge and Data Engineering, 14(1), 189–201.

    Article  Google Scholar 

  • Domingo-Ferrer, J., Wu, Q., & Blanco-Justicia, A. (2015). Flexible and robust privacy-preserving implicit authentication. In IFIP SEC 2015 (pp. 18–34). Springer.

  • EU Scientific Advice Mechanism. (2016). Scoping paper: Cybersecurity. High Level Group of Scientific Advisors.

  • EU Scientific Advice Mechanism. (2017). Cybersecurity in the European digital single market. High Level Group of Scientific Advisors, Scientific Opinion No. 2.

  • European Commission. (2013). Cybersecurity strategy of the European Union: An open, safe and secure cyberspace. Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions.

  • European Union. (2016). General data protection regulation. Regulation (EU) 2016/679. https://gdpr-info.eu. Retrieved September 22, 2019.

  • Floridi, L., & Cowls, J. (2019). A unified framework of five principles for AI in society. Harvard Data Science Review, 1. https://hdsr.mitpress.mit.edu/pub/l0jsh9d1.

  • Fung, B. (2018). The FCC’s net neutrality rules are officially repealed today. Here’s what that really means. The Washington Post.

  • Hajian, S., & Domingo-Ferrer, J. (2013). A methodology for direct and indirect discrimination prevention in data mining. IEEE Transactions on Knowledge and Data Engineering, 25(7), 1445–1459.

    Article  Google Scholar 

  • Hajian, S., Domingo-Ferrer, J., & Farràs, O. (2014). Generalization-based privacy preservation and discrimination prevention in data publishing and mining. Data Mining and Knowledge Discovery, 28(5–6), 1158–1188.

    Article  Google Scholar 

  • Hajian, S., Domingo-Ferrer, J., Monreale, A., Pedreschi, D., & Giannotti, F. (2015). Discrimination and privacy-aware patterns. Data Mining and Knowledge Discovery, 29(6), 1733–1782.

    Article  Google Scholar 

  • Hoepman, J. -H. (2014). Privacy design strategies (extended abstract). In IFIP SEC 2014 (pp. 446–459). Springer.

  • Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Schulte Nordholt, E., Spicer, K., et al. (2012). Statistical disclosure control. Hoboken: Wiley.

    Book  Google Scholar 

  • Koops, B. -J. (2013) Crypto law survey. Version 27.0. February. http://www.cryptolaw.org. Retrieved September 19, 2019.

  • Loi, M., Christen, M., Kleine, N., & Weber, K. (2019). Cybersecurity in health—Disentangling value tensions. Journal of Information, Communication and Ethics in Society, 17(2), 229–245.

    Article  Google Scholar 

  • Ma, A. (2018). China has started ranking citizens with a creepy ’social credit’ system—Here’s what you can do wrong, and the embarrassing, demeaning ways they can punish you. Business Insider. https://www.businessinsider.com/china-social-credit-system-punishments-and-rewards-explained-2018-4.

  • Nakashima, E. (2016). Apple vows to resist FBI demand to crack iPhone linked to San Bernardino attacks. Washington Post.

  • New Oxford American Dictionary. (2015). 3rd edition. Oxford: Oxford University Press.

  • OWASP—Open Web Application Security Project. (2019). https://www.owasp.org/index.php/Main_Page. Retrieved September 19, 2019.

  • Project Shield—Protecting news from digital attacks. (2019). https://projectshield.withgoogle.com/public/. Retrieved September 19, 2019.

  • Riera-Jorba, A., & Castellà-Roca, J. (2007). Secure remote electronic voting system and cryptographic protocols and computer programs employed. U. S. Patent No. 7,260,552.

  • Robinson, S. L. (1996). Trust and breach of the psychological contract. Administrative Science Quarterly, 41(4), 574–599.

    Article  Google Scholar 

  • Rogaway, P. (2015). The moral character of cryptographic work. IACR Cryptology ePrint Archive, Report 2015/1162. https://eprint.iacr.org/2015/1162. Retrieved September 22, 2019.

  • The EU H2020-700540 “CANVAS” project (2016–2019). https://canvas-project.eu.

  • The Spamhaus Project. (2019). https://www.spamhaus.org. Retrieved September 19, 2019.

  • The Tor Project. (2019). https://www.torproject.org. Retrieved September 19, 2019.

  • UN General Assembly. (1948). Universal declaration of human rights. https://www.un.org/en/universal-declaration-human-rights/. Accessed 22 Sept 2019.

  • U.S. Department of Homeland Security. (2009). A roadmap for cybersecurity research. https://www.dhs.gov/sites/default/files/publications/CSD-DHS-Cybersecurity-Roadmap_0.pdf. Retrieved September 22, 2019.

  • Warren, L., & Warren, S. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.

    Article  Google Scholar 

  • Warren, T. (2015) UK government could ban encrypted communications with new surveillance powers. The Verge. https://www.theverge.com/2015/1/12/7533065/whatsapp-imessage-ban-uk-government-encryption.

  • Wassenaar Arrangement. (1995) The Wassenaar Arrangement on export controls for conventional arms and dual-use goods and technologies. https://www.wassenaar.org. Retrieved September 19, 2019.

  • Westin, A. F. (1970). Privacy and freedom. New York: Atheneum.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Josep Domingo-Ferrer.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The following funding sources are gratefully acknowledged: European Commission (Project H2020 700540 “CANVAS”); Government of Catalonia (ICREA Acadèmia Prize to J. Domingo-Ferrer and Grant 2017 SGR 705); Spanish Government (Project RTI2018-095094-B-C21 “CONSENT”). The authors are with the UNESCO Chair in Data Privacy, but the views in this paper are their own and do not necessarily reflect those of UNESCO.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Domingo-Ferrer, J., Blanco-Justicia, A. Ethical Value-Centric Cybersecurity: A Methodology Based on a Value Graph. Sci Eng Ethics 26, 1267–1285 (2020). https://doi.org/10.1007/s11948-019-00138-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11948-019-00138-8

Keywords

Navigation