Please login to be able to save your searches and receive alerts for new content matching your search criteria.
There is an acknowledged global shortage in qualified and skilled cyber security practitioners, so much so that governments, employers and educational establishments are developing new routes and opportunities to encourage interest and applications from demographics that would not normally apply for cyber security roles. These demographics include women, young children and people on the autistic spectrum. The potential employment of people from this last demographic — people on the Autistic Spectrum — in cyber security roles will be the focus of this research. Two areas are of interest, the ethical considerations in employing people on the Autistic Spectrum and the identification of a strategy to support the employee and employer relationship. Both are discussed here. In Europe the shortfall is expected to be in the region of 350,000 employees by the year 2020 and in the United States the number is expected to be 1.2 million by the same date. This research looks at how specific autistic traits and strengths can be matched to cyber security vacancies and discusses ethical considerations and a potential support process. A qualitative research methodology was used to identify suitable traits and potential cyber security vacancies. Ethical principles and a proposed support process are put forward to allow potential employers and autistic employees to engage in equitable employment opportunities. The autistic demographic does indeed offer skilled and capable resources to help fill cyber security vacancies; however, work is needed to allow both sides to benefit from the opportunities.
The study of ethics in cyber security often raises more questions than it answers. A student may ask the question, “Why should I study ethics in cyber security?” As research becomes specialized and technical skill sets appreciate in value, ethical questions become more important to ask.
This chapter reviews the ethical aspects of cyber security. Ethics, in general, underscores various studies in which right is distinct from wrong. The understanding of these delineations evokes various ethical issues in cyber security, such as the morality of human behavior, policies, laws, and social structures. Considering theories of consequentialism and deontology, ethical analyses of cyber security, information privacy and ethics, and privacy issues in the digital age are performed through the use of relevant ethically-driven cyber security case studies.