Share Email Print

Proceedings Paper

The Role Of Moral Awareness In Computer Security
Author(s): Arthur Stawinski
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.

Paper Details

Date Published: 28 August 1984
PDF: 5 pages
Proc. SPIE 0474, Electro-Culture 1984, (28 August 1984); doi: 10.1117/12.942471
Show Author Affiliations
Arthur Stawinski, Oakton Community College (United States)

Published in SPIE Proceedings Vol. 0474:
Electro-Culture 1984
Jeff Bogumil, Editor(s)

© SPIE. Terms of Use
Back to Top