Ethical Computing for Data Protection

Ethical Computing for Data Protection

Wanbil W. Lee
Copyright: © 2020 |Volume: 11 |Issue: 1 |Pages: 16
ISSN: 1947-3451|EISSN: 1947-346X|EISBN13: 9781799806837|DOI: 10.4018/IJT.2020010104
Cite Article Cite Article

MLA

Lee, Wanbil W. "Ethical Computing for Data Protection." IJT vol.11, no.1 2020: pp.43-58. http://doi.org/10.4018/IJT.2020010104

APA

Lee, W. W. (2020). Ethical Computing for Data Protection. International Journal of Technoethics (IJT), 11(1), 43-58. http://doi.org/10.4018/IJT.2020010104

Chicago

Lee, Wanbil W. "Ethical Computing for Data Protection," International Journal of Technoethics (IJT) 11, no.1: 43-58. http://doi.org/10.4018/IJT.2020010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Data protection is a chronic problem. Technology has had a social and ethical impact on our professional, social, and private lives. It is imperative for computing practitioners and researchers to link the ethical dilemmas and the technologies to the relevant ethical theories. This paper argues that the cause is rooted in our indifference to ethics—one doesn't take ethics as seriously into consideration as one should when formulating information security policies and protection standards—and proposes an ethics-based approach that can lessen the incidence of hacking or make hacking exasperate, aiming at mitigation rather than eradication. Central to this approach is ethical computing preconditioned on a sound understanding of the applicable theories of ethics and a shift of view of risk and ethics.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.