Vulnerabilities and responsibilities: dealing with monsters in computer security


Pieters, W. and Consoli, L. (2009) Vulnerabilities and responsibilities: dealing with monsters in computer security. Journal of Information, Communication and Ethics in Society, 7 (4). pp. 243-257. ISSN 1477-996X

open access
Abstract:Purpose – The purpose of this paper is to analyze information security assessment in terms of cultural categories and virtue ethics, in order to explain the cultural origin of certain types of security vulnerabilities, as well as to enable a proactive attitude towards preventing such vulnerabilities.

Design/methodology/approach – Vulnerabilities in information security are compared to the concept of “monster” introduced by Martijntje Smits in philosophy of technology. The applicability of different strategies for dealing with monsters to information security is discussed, and the strategies are linked to attitudes in virtue ethics.

Findings – It is concluded that the present approach can form the basis for dealing proactively with unknown future vulnerabilities in information security.

Research limitations/implications – The research presented here does not define a stepwise approach for implementation of the recommended strategy in practice. This is future work.

Practical implications – The results of this paper enable computer experts to rethink their attitude towards security threats, thereby reshaping their practices.

Originality/value – This paper provides an alternative anthropological framework for descriptive and normative analysis of information security problems, which does not rely on the objectivity of risk.
Item Type:Article
Copyright:© 2009 Emerald
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:
Official URL:
Export this item as:BibTeX
HTML Citation
Reference Manager


Repository Staff Only: item control page