Paper
28 August 1984 The Role Of Moral Awareness In Computer Security
Arthur Stawinski
Author Affiliations +
Proceedings Volume 0474, Electro-Culture 1984; (1984) https://doi.org/10.1117/12.942471
Event: 1984 Technical Symposium East, 1984, Arlington, United States
Abstract
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
© (1984) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Arthur Stawinski "The Role Of Moral Awareness In Computer Security", Proc. SPIE 0474, Electro-Culture 1984, (28 August 1984); https://doi.org/10.1117/12.942471
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Computing systems

Databases

Data processing

Standards development

Psychology

Resistance

Back to Top