Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • chapterNo Access

    Chapter 12: Ethical Considerations and a Proposed Support Process When Employing People With Autistic Spectrum Disorder in Cyber Security Roles

    There is an acknowledged global shortage in qualified and skilled cyber security practitioners, so much so that governments, employers and educational establishments are developing new routes and opportunities to encourage interest and applications from demographics that would not normally apply for cyber security roles. These demographics include women, young children and people on the autistic spectrum. The potential employment of people from this last demographic — people on the Autistic Spectrum — in cyber security roles will be the focus of this research. Two areas are of interest, the ethical considerations in employing people on the Autistic Spectrum and the identification of a strategy to support the employee and employer relationship. Both are discussed here. In Europe the shortfall is expected to be in the region of 350,000 employees by the year 2020 and in the United States the number is expected to be 1.2 million by the same date. This research looks at how specific autistic traits and strengths can be matched to cyber security vacancies and discusses ethical considerations and a potential support process. A qualitative research methodology was used to identify suitable traits and potential cyber security vacancies. Ethical principles and a proposed support process are put forward to allow potential employers and autistic employees to engage in equitable employment opportunities. The autistic demographic does indeed offer skilled and capable resources to help fill cyber security vacancies; however, work is needed to allow both sides to benefit from the opportunities.

  • chapterNo Access

    Chapter 13: An Ethical Approach to Understanding Cyber Security

    The study of ethics in cyber security often raises more questions than it answers. A student may ask the question, “Why should I study ethics in cyber security?” As research becomes specialized and technical skill sets appreciate in value, ethical questions become more important to ask.

    This chapter reviews the ethical aspects of cyber security. Ethics, in general, underscores various studies in which right is distinct from wrong. The understanding of these delineations evokes various ethical issues in cyber security, such as the morality of human behavior, policies, laws, and social structures. Considering theories of consequentialism and deontology, ethical analyses of cyber security, information privacy and ethics, and privacy issues in the digital age are performed through the use of relevant ethically-driven cyber security case studies.