ORCID Profile
0000-0003-1119-9628
Current Organisations
The University of Canberra
,
University of Newcastle Australia
,
Wanbil & Associates
,
The Computer Ethics Society
,
Henley Management College/Bruel University
,
University of New South Wales
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: IGI Global
Date: 2017
DOI: 10.4018/978-1-5225-2255-3.CH425
Abstract: Cyberspace inhabitants live under threat of a complex data privacy protection problem in a technology-dependent information-intensive phenomenon grown out of a vicious circle. The front-line Information security professionals are among the first to bear the brunt and are in dire need of guidance for enforcing effectively the policies and standards and mitigating the adverse consequences of data privacy breaches since the policy statements are invariably dated due to the rapid advances of the technology, limited to cope with techno-socio threats, inadequate to deal with the well-equipped and cunning cybercriminals, and vague and less than user-friendly, or simply difficult to absorb and follow. A framework that comprises the newly developed hexa-dimension code of practice based on the 6-dimension metric (represented by the LESTEF model) and an operationalization scheme are proposed, where the code in which the gist of the adopted policies is incorporated promises to be a handy reference or a quick guide capable of alleviating the information security staff's burden.
Publisher: IGI Global
Date: 2020
DOI: 10.4018/978-1-7998-3473-1.CH064
Abstract: The advancement in computing technologies raises more complex moral and security issues, thus intensifying the urgency for resolving cyberethical dilemmas. At the same time, we spend a lot on cybersecurity, yet still get hacked whereby, it is argued, a hidden cause transpires - we don't take ethics seriously due to a poor understanding of ethics. Society in general and the computing technology community in particular recognize that ethics is important. However, corporate managers and information security operatives still fall for the fallacious ‘what's legal is ethical' or accept the relativistic ‘if Tom can do it then Dick can do it'. This is no surprise because the concepts of ethics seem plain and simple yet their implications abstruse. A guide for improving our knowledge of ethics and in the same vein discovering and identifying ethical issues and linking the issues to the relevant theories and technologies, and resolving the dilemmas will be desirable.
Publisher: IGI Global
Date: 2020
Abstract: Data protection is a chronic problem. Technology has had a social and ethical impact on our professional, social, and private lives. It is imperative for computing practitioners and researchers to link the ethical dilemmas and the technologies to the relevant ethical theories. This paper argues that the cause is rooted in our indifference to ethics—one doesn't take ethics as seriously into consideration as one should when formulating information security policies and protection standards—and proposes an ethics-based approach that can lessen the incidence of hacking or make hacking exasperate, aiming at mitigation rather than eradication. Central to this approach is ethical computing preconditioned on a sound understanding of the applicable theories of ethics and a shift of view of risk and ethics.
Publisher: IGI Global
Date: 2018
DOI: 10.4018/978-1-5225-2255-3.CH423
Abstract: Ethical Computing is instrumental in identifying and reaching a near-ideal solution to the problems arising from an environment that is technology-driven information-intensive. Many of these problems could have been avoided, occur, because we are either insensitive to or ignorant of their ethical implications. As a result, we could reach only a partial, compromised solution at best. An ideal solution is expected to be technically efficient, financially viable and legal admissible, ethically acceptable, socially desirable, and in many situations environmentally-friendly (the so-called hexa-dimension criteria), and balanced in terms the six criteria or five criteria (in case the problem does not involve ecological concerns). An exposition of an ideal solution in terms of the requisite competence and the additive is presented.
Publisher: IGI Global
Date: 2021
DOI: 10.4018/IJHIOT.2021010102
Abstract: Many of the problems arising from a technology-driven information-intensive environment that could have been avoided occur because we are either insensitive to or ignorant of their ethical implications. Consequently, data protection remains a chronic, expensive nightmare despite the big speeding on cybersecurity. Ethical computing can play a role in identifying the ethical issues, key stakeholders, and reaching a near-ideal solution vis-à-vis an ideal solution. Hyperconnectivity threats that inherit all the IoT threats plus all the vulnerabilities of the physical objects and virtual subsystems that IoT connects (subsumed under the heads of security and privacy) to serve some purposeful objectives change not the environment but intensify the urgency for a remedy. Ethical computing is assistive in reaching that near-ideal solution.
Publisher: IGI Global
Date: 31-07-2014
Publisher: IGI Global
Date: 2021
DOI: 10.4018/978-1-7998-3479-3.CH030
Abstract: Exorbitant spending on cybersecurity continues hacking proliferates and continues with the aftermath getting more and more damaging, yet data protection must helplessly continue. This is attributable to a vicious circle and culminates in something akin to a chronic disease, aptly called a “chronic problem of data protection.” The situation is complicated by a tripartite relationship, called the “Law-Security-Ethics Connection,” and exacerbated by a muddled view of the key concepts, notably ethics, privacy, and risk, which hinders a wholesome appreciation of the problem. Given the status quo, an ethics-based framework was perceived and developed aiming to lessen the incidence of hacking or make hacking exasperate to mitigate rather than eradicate because hacker-free cyberspace is unrealistic and impossible. This chapter aims to introduce a remedy successively through an exposition of the symptom and cause of the problem, clearing the muddle, and an illustration of the tools: Ethical Matrix and Hexa-Dimension Metric using the Octopus Saga.
Publisher: IGI Global
Date: 2018
DOI: 10.4018/978-1-5225-7492-7.CH019
Abstract: Cyberspace inhabitants live under threat of a complex data privacy protection problem in a technology-dependent and information-intensive phenomenon grown out of a vicious circle. The frontline information security professionals are among the first to bear the brunt and are in dire need of guidance for enforcing effectively the policies and standards and mitigating the adverse consequences of data privacy breaches since the policy statements are invariably dated due to the rapid advances of the technology, limited to cope with techno-socio threats, inadequate to deal with the well-equipped and cunning cybercriminals, and vague and less than user-friendly, or simply difficult to absorb and follow. A framework that comprises the newly developed hexa-dimension code of practice based on the six-dimension metric (represented by the LESTEF model) and an operationalization scheme are proposed, where the code in which the gist of the adopted policies is incorporated promises to be a handy reference or a quick guide capable of alleviating the information security staff's burden.
Publisher: IGI Global
Date: 2018
DOI: 10.4018/978-1-5225-7492-7.CH017
Abstract: Ethical computing is instrumental in identifying and reaching a near-ideal solution to the problems arising from an environment that is technology-driven and information-intensive. Many of these problems that could have been avoided occur because we are either insensitive to or ignorant of their ethical implications. As a result, we could reach only a partial, compromised solution at best. An ideal solution is expected to be technically efficient, financially viable, legally admissible, ethically acceptable, socially desirable, and in many situations environmentally friendly (the so-called hexa-dimension criteria), and balanced in terms the six criteria or five criteria (in case the problem does not involve ecological concerns). An exposition of an ideal solution in terms of the requisite competence and the additive is presented.
Location: United Kingdom of Great Britain and Northern Ireland
No related grants have been discovered for Wanbil W. Lee.