{"id":1052,"date":"2009-06-11T07:17:27","date_gmt":"2009-06-11T15:17:27","guid":{"rendered":"\/?p=1052"},"modified":"2009-06-11T08:13:37","modified_gmt":"2009-06-11T16:13:37","slug":"ethical-foundations-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1052","title":{"rendered":"Ethical Foundations of Cybersecurity"},"content":{"rendered":"<p>Britian&#39;s\u00a0<a href=\"http:\/\/www.privacygroup.org\/\" class=\"broken_link\">Enterprise Privacy Group <\/a>is starting a new series of workshops that deal squarely with ethics.\u00a0 While specialists in ethics have achieved a signficant role in professions like medicine, this is one of the first\u00a0workshops I&#39;ve seen that takes on equivalent issues in\u00a0our field of work.\u00a0 Perhaps that&#39;s why it is already oversubscribed&#8230;\u00a0<\/p>\n<p style=\"padding-left: 30px;\">&#8216;The continuing openess of the Internet is fundamental to our way of life, promoting the free flow of ideas to strengthen democratic ideals and deliver the economic benefits of globalisation.\u00a0 But a fundamental challenge for any government is to balance measures intended to protect security and the right to life with the impact these may have on the other rights that we cherish and which form the basis of our society.<br \/>\n\u00a0<br \/>\n&#39;The security of cyber space poses particular challenges in meeting tests of necessity and proportionality as its distributed, de-centralised form means that powerful tools may need to be deployed to tackle those who wish to do harm.\u00a0 A clear ethical foundation is essential to ensure that the power of these tools is not abused.<br \/>\n\u00a0<br \/>\n&#39;The first workshop in this series will be hosted at the Cabinet Office on 17 June, and will explore what questions need to be asked and answered to develop this foundation?<\/p>\n<p style=\"padding-left: 30px;\">&#8216;The event is already fully subscribed, but we hope to host further events in the near future with greater opportunities for all EPG Members to participate.&#8217;<\/p>\n<p>Let&#39;s hope EPG eventually turns these deliberations into a document they can share more widely.\u00a0 Meanwhile, <a href=\"http:\/\/www.springerlink.com\/content\/7081457vu3135761\/\" class=\"broken_link\">this article<\/a> seems to offer an introduction to the literature.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Internet and the rights which form the basis of our society<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[17,71,3,11],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1052"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1052"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1052\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}