메뉴 건너뛰기




Volumn 7, Issue 4, 2009, Pages 243-257

Vulnerabilities and responsibilities: Dealing with monsters in computer security

Author keywords

Culture; Data security; Ethics

Indexed keywords


EID: 84993030383     PISSN: 1477996X     EISSN: 17588871     Source Type: Journal    
DOI: 10.1108/14779960911004499     Document Type: Article
Times cited : (6)

References (51)
  • 1
    • 85041145235 scopus 로고
    • UCL Press London
    • Adams, J. (1995), Risk, UCL Press, London.
    • (1995) Risk
    • Adams, J.1
  • 3
    • 84974286205 scopus 로고
    • Modern moral philosophy
    • Anscombe, G.E.M. (1958), “Modern moral philosophy”, Philosophy, Vol. 33, p. 124.
    • (1958) Philosophy , vol.33 , pp. 124
    • Anscombe, G.E.M.1
  • 5
    • 0007049285 scopus 로고    scopus 로고
    • Some human dimensions of computer virus creation and infection
    • Bissett, A. (2000), “Some human dimensions of computer virus creation and infection”, International Journal of Human-computer Studies, Vol. 50 No. 5, pp. 899-913.
    • (2000) International Journal of Human-computer Studies , vol.50 , Issue.5 , pp. 899-913
    • Bissett, A.1
  • 6
    • 0001021434 scopus 로고    scopus 로고
    • The ethics of safety-critical systems
    • Bowen, J. (2000), “The ethics of safety-critical systems”, Communications of the ACM, Vol. 43 No. 4, pp. 91-97.
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 91-97
    • Bowen, J.1
  • 7
    • 84965673680 scopus 로고
    • The policy implications of differing concepts of risk
    • Bradbury, J. (1989), “The policy implications of differing concepts of risk”, Science, Technology, and Human Values, Vol. 14 No. 4, pp. 380-399.
    • (1989) Science, Technology, and Human Values , vol.14 , Issue.4 , pp. 380-399
    • Bradbury, J.1
  • 8
    • 18144411315 scopus 로고    scopus 로고
    • Ethical character and virtue of organizations: an empirical assessment and strategic implications
    • Chun, R. (2005), “Ethical character and virtue of organizations: an empirical assessment and strategic implications”, Journal of Business Ethics, Vol. 57 No. 3, pp. 269-284.
    • (2005) Journal of Business Ethics , vol.57 , Issue.3 , pp. 269-284
    • Chun, R.1
  • 9
    • 57049137849 scopus 로고    scopus 로고
    • The intertwining of ethics and methodology in science and engineering: a virtue-ethical approach
    • Consoli, L. (2008), “The intertwining of ethics and methodology in science and engineering: a virtue-ethical approach”, Interdisciplinary Science Reviews, Vol. 33 No. 3, pp. 233-242.
    • (2008) Interdisciplinary Science Reviews , vol.33 , Issue.3 , pp. 233-242
    • Consoli, L.1
  • 10
    • 0012310737 scopus 로고
    • The risk of reliance on perceived risk
    • Cross, F.B. (1992), “The risk of reliance on perceived risk”, Risk, Vol. 3, pp. 59-70.
    • (1992) Risk , vol.3 , pp. 59-70
    • Cross, F.B.1
  • 11
    • 62449296566 scopus 로고    scopus 로고
    • On the grotesque in science fiction
    • Csicsery-Ronay, I. (2002), “On the grotesque in science fiction”, Science-fiction Studies, Vol. 29, pp. 71-99.
    • (2002) Science-fiction Studies , vol.29 , pp. 71-99
    • Csicsery-Ronay, I.1
  • 13
    • 2342559896 scopus 로고    scopus 로고
    • Election security: perception and reality
    • Evans, D. and Paul, N. (2004), “Election security: perception and reality”, IEEE Security & Privacy, Vol. 2 No. 1, pp. 24-31.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.1 , pp. 24-31
    • Evans, D.1    Paul, N.2
  • 14
    • 12344336018 scopus 로고    scopus 로고
    • Technical options report
    • available at: (accessed March 24, 2009).
    • Fairweather, B. and Rogerson, S. (2009), “Technical options report”, available at: www.communities.gov.uk/documents/localgovernment/pdf/155484.pdf (accessed March 24, 2009).
    • (2009)
    • Fairweather, B.1    Rogerson, S.2
  • 15
    • 0011101139 scopus 로고    scopus 로고
    • Information ethics: on the philosophical foundation of computer ethics
    • Floridi, L. (1999), “Information ethics: on the philosophical foundation of computer ethics”, Ethics and Information Technology, Vol. 1 No. 1, pp. 37-56.
    • (1999) Ethics and Information Technology , vol.1 , Issue.1 , pp. 37-56
    • Floridi, L.1
  • 16
    • 0003622275 scopus 로고    scopus 로고
    • Clarendon Press Oxford
    • Foot, P. (2001), Natural Goodness, Clarendon Press, Oxford.
    • (2001) Natural Goodness
    • Foot, P.1
  • 17
    • 84993034181 scopus 로고    scopus 로고
    • Why viruses will always be a problem
    • April
    • Ford, R. (1996), “Why viruses will always be a problem”, NCSA News, April, pp. 5-7.
    • (1996) NCSA News , pp. 5-7
    • Ford, R.1
  • 19
    • 85008010113 scopus 로고    scopus 로고
    • Melissa virus creates a new type of threat
    • Garber, L. (1999), “Melissa virus creates a new type of threat”, Computer, Vol. 32 No. 6, pp. 16-19.
    • (1999) Computer , vol.32 , Issue.6 , pp. 16-19
    • Garber, L.1
  • 22
    • 33749244928 scopus 로고    scopus 로고
    • Can we teach character? An Aristotelian answer
    • Hartman, E.M. (2006), “Can we teach character? An Aristotelian answer”, Academy of Management Learning and Education, Vol. 5 No. 1, pp. 68-81.
    • (2006) Academy of Management Learning and Education , vol.5 , Issue.1 , pp. 68-81
    • Hartman, E.M.1
  • 23
    • 33746589805 scopus 로고    scopus 로고
    • An AES smart card implementation resistant to power analysis attacks
    • Lecture Notes in Computer Science Springer New York, NY
    • Herbst, C., Oswald, C.E. and Mangard, S. (2006), “An AES smart card implementation resistant to power analysis attacks”, in Ed. Zhou, J., Ed. Yung, M. and Ed. Bao, F. (Eds), Applied Cryptography and Network Security, Lecture Notes in Computer Science, Vol. 3989, Springer, New York, NY, pp. 239-252.
    • (2006) Applied Cryptography and Network Security , vol.3989 , pp. 239-252
    • Herbst, C.1    Oswald, C.E.2    Mangard, S.3    Zhou, J.4    Yung, M.5    Bao, F.6
  • 24
    • 34547357863 scopus 로고    scopus 로고
    • Are virtues the proper starting point for ethical theory
    • Blackwell Oxford
    • Hursthouse, R. (2006), “Are virtues the proper starting point for ethical theory”, in Ed. Dreier, J. (Ed.), Contemporary Debates in Moral Theory, Blackwell, Oxford, pp. 99-112.
    • (2006) Contemporary Debates in Moral Theory , pp. 99-112
    • Hursthouse, R.1    Dreier, J.2
  • 26
    • 0004197846 scopus 로고    scopus 로고
    • Pearson Education Upper Saddle River, NJ
    • Johnson, D. (2003), Computer Ethics, Pearson Education, Upper Saddle River, NJ.
    • (2003) Computer Ethics
    • Johnson, D.1
  • 28
    • 2642540313 scopus 로고    scopus 로고
    • Courage as a virtue
    • Kateb, G. (2004), “Courage as a virtue”, Social Research, Vol. 71 No. 1, pp. 39-72.
    • (2004) Social Research , vol.71 , Issue.1 , pp. 39-72
    • Kateb, G.1
  • 32
    • 0003487794 scopus 로고
    • Stanford University Press Stanford, CA
    • Luhmann, N. (1995), Social Systems, Stanford University Press, Stanford, CA.
    • (1995) Social Systems
    • Luhmann, N.1
  • 33
    • 80054928784 scopus 로고
    • University of Notre Dame Press Notre Dame, IN
    • Mac Intyre, A.C. (1981-2007), After Virtue, University of Notre Dame Press, Notre Dame, IN.
    • (1981) After Virtue
    • Mac Intyre, A.C.1
  • 34
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart-card security under the threat of power analysis attack
    • Messerges, T.S., Dabbish, E.A. and Sloan, R.H. (2002), “Examining smart-card security under the threat of power analysis attack”, IEEE Transactions on Computers, Vol. 51 No. 5, pp. 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3
  • 35
    • 62149084854 scopus 로고    scopus 로고
    • The voluntariness of virtue – and belief
    • Montmarquet, J. (2008), “The voluntariness of virtue – and belief”, Philosophy, Vol. 83, pp. 373-390.
    • (2008) Philosophy , vol.83 , pp. 373-390
    • Montmarquet, J.1
  • 36
    • 84871957390 scopus 로고    scopus 로고
    • Users and trust in cyberspace
    • Cambridge, UK, April 3-5, 2000 revised papers in Vol. 2133 Lecture Notes in Computer Science Springer New York, NY
    • Nikander, P. and Karvonen, K. (2001), “Users and trust in cyberspace”, in Ed. Christianson, B., Ed. Crispo, B., Ed. Malcolm, J.A. and Ed. Roe, M. (Eds), Security Protocols: 8th International Workshop, Cambridge, UK, April 3-5, 2000, revised papers in Vol. 2133 Lecture Notes in Computer Science, Springer, New York, NY, pp. 24-35.
    • (2001) Security Protocols: 8th International Workshop , pp. 24-35
    • Nikander, P.1    Karvonen, K.2    Christianson, B.3    Crispo, B.4    Malcolm, J.A.5    Roe, M.6
  • 37
    • 1842435111 scopus 로고    scopus 로고
    • Hackers and the contested ontology of cyberspace
    • Nissenbaum, H. (2004), “Hackers and the contested ontology of cyberspace”, New Media and Society, Vol. 6 No. 2, pp. 195-217.
    • (2004) New Media and Society , vol.6 , Issue.2 , pp. 195-217
    • Nissenbaum, H.1
  • 38
    • 84992992625 scopus 로고    scopus 로고
    • Computer security: competing concepts
    • paper presented at the 30th Research Conference on Communication, Information and Internet Policy, September 28-30, Washington, DC.
    • Nissenbaum, H. and Felton, E. (2002), “Computer security: competing concepts”, paper presented at the 30th Research Conference on Communication, Information and Internet Policy, September 28-30, Washington, DC.
    • (2002)
    • Nissenbaum, H.1    Felton, E.2
  • 40
    • 85134704265 scopus 로고    scopus 로고
    • Security as belief: user's perceptions on the security of electronic voting systems
    • P-47 Lecture Notes in Informatics Gesellschaft für Informatik Bonn
    • Oostveen, A.M. and van den Besselaar, P. (2004), “Security as belief: user's perceptions on the security of electronic voting systems”, in Ed. Prosser, A. and Ed. Krimmer, R. (Eds), Electronic voting in Europe: Technology, Law, Politics & Society, Lecture Notes in Informatics, Vol. P-47, Gesellschaft für Informatik, Bonn, pp. 73-82.
    • (2004) Electronic voting in Europe: Technology, Law, Politics & Society , pp. 73-82
    • Oostveen, A.M.1    van den Besselaar, P.2    Prosser, A.3    Krimmer, R.4
  • 41
    • 33745894129 scopus 로고    scopus 로고
    • Acceptance of voting technology: between confidence and trust
    • Lecture Notes in Computer Science Springer New York, NY
    • Pieters, W. (2006), “Acceptance of voting technology: between confidence and trust”, Trust Management: 4th International Conference, iTrust 2006, Lecture Notes in Computer Science, Vol. 3986, Springer, New York, NY, pp. 283-297.
    • (2006) Trust Management: 4th International Conference, iTrust 2006 , vol.3986 , pp. 283-297
    • Pieters, W.1
  • 42
    • 84986078210 scopus 로고    scopus 로고
    • Temptations of turnout and modernization: e-voting discourses in the UK and the Netherlands
    • Pieters, W. and van Haren, R. (2007), “Temptations of turnout and modernization: e-voting discourses in the UK and the Netherlands”, Journal of Information, Communication and Ethics in Society, Vol. 5 No. 4, pp. 276-292.
    • (2007) Journal of Information, Communication and Ethics in Society , vol.5 , Issue.4 , pp. 276-292
    • Pieters, W.1    van Haren, R.2
  • 43
    • 84992972174 scopus 로고
    • Belling the cat: a critique of technology assessment
    • Pursell, C. (1979), “Belling the cat: a critique of technology assessment”, Lex en Scientia, Vol. 10, pp. 130-142.
    • (1979) Lex en Scientia , vol.10 , pp. 130-142
    • Pursell, C.1
  • 45
    • 3142657210 scopus 로고    scopus 로고
    • ‘Dreaded’ and ‘dared’: courage as a virtue
    • Schwartz, N.L. (2004), “‘Dreaded’ and ‘dared’: courage as a virtue”, Polity, Vol. 36 No. 3, pp. 341-365.
    • (2004) Polity , vol.36 , Issue.3 , pp. 341-365
    • Schwartz, N.L.1
  • 46
    • 0007434395 scopus 로고
    • Perceived risks versus actual risks: managing hazards through negotiation
    • Shrader-Frechette, K.S. (1990), “Perceived risks versus actual risks: managing hazards through negotiation”, Risk, Vol. 1, pp. 341-363.
    • (1990) Risk , vol.1 , pp. 341-363
    • Shrader-Frechette, K.S.1
  • 47
    • 33749185903 scopus 로고    scopus 로고
    • Monster ethics: a pragmatist approach to risk controversies on new technology
    • paper presented at the Research in Ethics and Engineering Conference, Technical University of Delft, Delft, April 25-27.
    • Smits, M. (2002 a), “Monster ethics: a pragmatist approach to risk controversies on new technology”, paper presented at the Research in Ethics and Engineering Conference, Technical University of Delft, Delft, April 25-27.
    • (2002)
    • Smits, M.1
  • 49
    • 33750865685 scopus 로고    scopus 로고
    • Taming monsters: the cultural domestication of new technology
    • Smits, M. (2006), “Taming monsters: the cultural domestication of new technology”, Technology in Society, Vol. 28 No. 4, pp. 489-504.
    • (2006) Technology in Society , vol.28 , Issue.4 , pp. 489-504
    • Smits, M.1
  • 50
    • 84993060486 scopus 로고
    • Meta-virus: breaking the hardware species barrier
    • Wallich, P. (1995), “Meta-virus: breaking the hardware species barrier”, Scientific American, Vol. 273 No. 5, p. 34.
    • (1995) Scientific American , vol.273 , Issue.5 , pp. 34
    • Wallich, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.