Core Values and Value Conflicts in Cybersecurity

 

Read Core Values and Value Conflicts in Cybersecurity

Write a 1 page summary of the chapter. Make sure you discuss:

What the author identifies as “ the main values relevant to cybersecurity”.
Value conflicts in cybersecurity (i.e. privacy vs security).
Does the author support his conclusions (provide examples).

 

Sample Solution

The chapter on “Core Values and Value Conflicts in Cybersecurity” by author Thomas J. Holt raises important discussion about the values and value conflicts relevant to cybersecurity. The author identifies four core values that have become essential components of cyber security: privacy, autonomy, accuracy, and usability (Holt 2018). Each of these is further broken down into a set of specific principles that form the foundation for effective cybersecurity practice.

Privacy is valued highly in terms of access control, data retention, authentication methods and data encryption capabilities among other aspects where private information must be safeguarded through strong security measures (Holt 2018). Autonomy involves user control over their own information as well as the systems they use to access it. Accuracy refers to ensuring that correct information is being maintained throughout any given online transaction or exchange with an emphasis on reliable backup procedures or error correction protocols (Holt 2018). Finally, usability pertains to ease-of-use considerations in order for users to gain quick access without sacrificing security levels.

In addition to describing each core value, Holt also addresses potential conflicts between them when balancing different operational requirements such as privacy versus security requirements (Holt 2018). Such tensions arise in a variety of contexts including but not limited to governments monitoring citizens’ activities online; businesses needing extensive customer data in order to provide efficient services while managing customers’ trust; and individuals seeking greater control over personal files while avoiding malicious intrusion attempts from hackers. These various forms of value conflict should be taken into account when developing polices around cybersecurity so that trade-offs are made deliberately rather than haphazardly due to lack proper consideration (Holt 2018).

is leads to question of what qualifies to be a combatant, and whether it is lawful to kill each other as combatants. Combatants are people who are involved directly or indirectly with the war and it is lawful to kill ‘to shelter the innocent from harm…punish evildoers (Begby et al (2006b), Page 290).However, as mentioned above civilian cannot be harmed, showing combatants as the only legitimate targets, another condition of jus in bello, as ‘we may not use the sword against those who have not harmed us (Begby et al (2006b), Page 314).’ In addition, Frowe suggested combatants must be identified as combatants, to avoid the presence of guerrilla warfare which can end up in a higher death count, for example, the Vietnam War. Moreover, he argued they must be part of the army, bear arms and apply to the rules of jus in bello. (Frowe (2011), Page 101-3). This suggests Frowe seeks a fair, just war between two participants avoiding non-combatant deaths, but wouldn’t this lead to higher death rate for combatants, as both sides have relatively equal chance to win since both use similar tactics? Nevertheless, arguably Frowe will argue that combatant can lawfully kill each other, showing this is just, which is also supported by Vittola, who states: ‘it is lawful to draw the sword and use it against malefactors (Begby et al (2006b), Page 309).’
In addition, Vittola expresses the extent of military tactics used, but never reaches a conclusion whether it’s lawful or not to proceed these actions, as he constantly found a middle ground, where it can be lawful to do such things but never always (Begby et al (2006b), Page 326-31). This is supported by Frowe, who measures the legitimate tactics according to proportionality and military necessity. It depends on the magnitude of how much damage done to one another, in order to judge the actions after a war. For example, one cannot simply nuke the terrorist groups throughout the middle-east, because it is not only proportional, it will damage the whole population, an unintended consequence. More importantly, the soldiers must have the right intention in what they are going to achieve, sacrificing the costs to their actions. For example: if soldiers want to execute all prisoners of war, they must do it for the right intention and for a just cause, proportional to the harm done to them. This is supported by Vittola: ‘not always lawful to execute all combatants…we must take account… scale of the injury inflicted by the enemy.’ This is further supported by Frowe approach, which

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.