Evaluating the Ethical Frameworks of Information Security Professionals: A Comparative Analysis
DOI:
https://doi.org/10.70112/ajcst-2024.13.2.4289Keywords:
Information Security, Ethical Codes, Privacy Violations, Stakeholder Engagement, Information SocietyAbstract
Information Technology (IT) networks have become a cornerstone of business communication, evolving alongside the Internet, which now facilitates the interconnection of independent IT infrastructures. This interconnectedness has increased the risks of information disclosure and privacy violations, presenting ethical challenges for information security professionals. This study aims to evaluate the ethical codes of four major information security professional organizations in computing sciences to identify critical ethical considerations for these professionals and highlight areas for potential improvement. The study analyzes the ethical frameworks and guidelines provided by these organizations, examining their alignment with the multidimensional aspects of security, including technical, organizational, legal, social, and ecological factors. The analysis reveals that information security extends beyond technical measures, encompassing broader organizational and societal dimensions. Ethical concerns cannot be effectively addressed without engaging all stakeholders. While existing codes of ethics and security policies are valuable, they require updates to address the evolving challenges of the information society. For effective information security, professional codes of ethics must integrate comprehensive stakeholder considerations and adapt to meet the growing demands of a connected digital world. Enhancing these ethical frameworks is crucial for fostering trust and resilience in the information society.
References
A. D. Smith, “E-security issues and policy development in an information-sharing and networked environment,” New Information Perspectives, vol. 56, pp. 272-285, 2004.
D. K. Tiwary, “Security and ethical issues in IT: An organization’s perspective,” International Journal of Enterprise Computing and Business Systems, vol. 1, no. 2, pp. 1-13, 2011.
H. Gunarto, “Ethical issues in cyberspace and IT society,” Ritsumeikan Asia Pacific University, pp. 1-8, 2003.
G. T. Gowing, “Cybersecurity from a Christian worldview,” 2020. [Online]. Available: https://www.letu.edu/academics/arts-and-sciences/story-cybersecurity-glyn-gowing.html. [Accessed: Nov. 25, 2024].
P. Brey, “Ethical aspects of information security and privacy,” in Security, Privacy, and Trust in Modern Data Management, Berlin Heidelberg: Springer, 2007, pp. 21-36.
M. C. Loui and K. W. Miller, “Ethics and professional responsibility in computing,” University of Illinois, Springfield, 2008.
S. O. Ogunlere and A. O. Adebayo, “Ethical issues in computing sciences,” International Research Journal of Engineering and Technology (IRJET), pp. 10-16, 2015.
ISSA, “ISSA code of ethics,” Information Systems Security Association, 2005.
S. Vallor and W. J. Rewak, “An introduction to cybersecurity ethics,” Santa Clara University, pp. 1-65, 2018.
S. Wurster, “Ethics and privacy issues of critical infrastructure protection - Risks and possible solutions through standardization,” DE Gruyter, vol. 37, no. 3, pp. 205-210, 2014.
T. Aşuroğlu and C. Gemci, “Role of ethics in information security,” in International Conference on Advanced Technology & Sciences, Konya, Turkey, 2016.
R. Nagahawatta, M. Warren, and W. Yeoh, “Ethical issues relating to cyber security in Australian SMEs,” Deakin University, pp. 71-76, 2020.
K. A. Y. Yaseen, “Importance of cyber security in the higher education sector,” Asian Journal of Computer Science and Technology, vol. 11, no. 2, pp. 20-24, 2022.
K. A. Y. Yaseen, “Digital education: The cybersecurity challenges in the online classroom (2019-2020),” Asian Journal of Computer Science and Technology, vol. 11, no. 2, pp. 33-38, 2022.
AISA, “Code of ethics and conference behaviour rules,” Australian Information Security Association, pp. 1-2, 2018.
ISACA, “Code of professional ethics,” Information Systems Audit and Control Association, 2021.
AiSP, “Association of Information Security Professionals code of conduct,” 2021.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Centre for Research and Innovation
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.