{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T09:26:59Z","timestamp":1767864419302,"version":"3.49.0"},"publisher-location":"Cham","reference-count":54,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031040351","type":"print"},{"value":"9783031040368","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,7]],"date-time":"2022-04-07T00:00:00Z","timestamp":1649289600000},"content-version":"vor","delay-in-days":96,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the field of research, the role of ethics grows more and more every year. One might be surprised but even in the field of technology there is a necessity for experts to understand and to implement ethical principles. Ethics itself could be understood as a code or a moral way by which a person lives and works. But within the field of information technology and cybersecurity research there is a chance that even the most technical appropriate solution does not go in line with the corresponding ethical principles. Experts need to implement fundamental ethical principles in their technical products in order not to cause harm or have any negative effect on their users. To the vast majority of challenges that will be reflected in this chapter are discussed within the EU-funded project GUARD, namely what are the proper actions which need to be taken to ensure ethical compliance. Challenges such as ensuring the privacy of the users, reporting and handling incidental findings, testing the technological product, mitigating biases etc. could have different negative effect on humans if not dealt with properly. The current chapter would explore the questions posed above alongside a description of a methodology resulting in the combined efforts of experts both in the field of cybersecurity and ethics.<\/jats:p>","DOI":"10.1007\/978-3-031-04036-8_9","type":"book-chapter","created":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T12:03:11Z","timestamp":1649246591000},"page":"202-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?"],"prefix":"10.1007","author":[{"given":"Denitsa","family":"Kozhuharova","sequence":"first","affiliation":[]},{"given":"Atanas","family":"Kirov","sequence":"additional","affiliation":[]},{"given":"Zhanin","family":"Al-Shargabi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,7]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.iot.2018.08.005","volume":"1\u20132","author":"F Allhoff","year":"2018","unstructured":"Allhoff, F., Henschke, A.: The Internet of Things: foundational ethical issues. Internet of Things 1\u20132, 55\u201366 (2018)","journal-title":"Internet of Things"},{"key":"9_CR2","unstructured":"Are Bluetooth Headphones Dangerous? Here\u2019s What Experts Think, Healthline. https:\/\/www.healthline.com\/health-news\/are-wireless-headphones-dangerous. Accessed 16 Jan 2022"},{"issue":"2","key":"9_CR3","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(01)02017-6","volume":"2001","author":"R Barber","year":"2001","unstructured":"Barber, R.: Hackers pro-filed\u2014who are they and what are their motivations? Comput. Fraud Secur. 2001(2), 14\u201317 (2001)","journal-title":"Comput. Fraud Secur."},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s10677-021-10166-8","volume":"24","author":"RW Bellaby","year":"2021","unstructured":"Bellaby, R.W.: An ethical framework for hacking operations. Ethical Theory Moral Pract. 24(1), 231\u2013255 (2021). https:\/\/doi.org\/10.1007\/s10677-021-10166-8","journal-title":"Ethical Theory Moral Pract."},{"key":"9_CR5","unstructured":"Bishop, L.: Big data and data sharing: ethical issues. UK Data Service, UK Data Archive (2017)"},{"key":"9_CR6","unstructured":"Burker, H.: Privacy-enhancing technologies: typology, critique, vision. In: Agre, P.E., Rotenberg, M. (eds.) Technol. Privacy New Landscape, pp. 125\u2013142. MIT Press, London (1997)"},{"issue":"2","key":"9_CR7","first-page":"83","volume":"20","author":"Z Cekerevac","year":"2018","unstructured":"Cekerevac, Z., Zdenek, D., Prigoda, L., Cekerevac, P.: Hacking, protection and the consequences of hacking. Komunikacie 20(2), 83\u201387 (2018)","journal-title":"Komunikacie"},{"key":"9_CR8","unstructured":"Chima, R.: Cloud Security \u2013 Who Owns The Data? Blueberry Consultants. https:\/\/www.bbconsult.co.uk\/blog\/cloud-security-who-owns-the-data. Accessed 3 Mar 2022"},{"key":"9_CR9","unstructured":"Cybersecurity ethical obligations. https:\/\/resources.infosecinstitute.com\/topic\/cybersecurity-ethical-obligation\/. Accessed 4 Feb 2022"},{"key":"9_CR10","unstructured":"Dahlqvist, F., Patel, M., Rajko, A., Shulman, J.: Growing opportunities in the Internet of Things, growing opportunities in the Internet of Things. https:\/\/www.mckinsey.com\/industries\/private-equity-and-principal-investors\/our-insights\/growing-opportunities-in-the-internet-of-things. Accessed 8 Feb 2022"},{"issue":"1","key":"9_CR11","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11948-016-9759-0","volume":"23","author":"B De Bruin","year":"2016","unstructured":"De Bruin, B., Floridi, L.: The ethics of cloud computing. Sci. Eng. Ethics 23(1), 21\u201339 (2016). https:\/\/doi.org\/10.1007\/s11948-016-9759-0","journal-title":"Sci. Eng. Ethics"},{"key":"9_CR12","unstructured":"Delgado, R.: The ongoing question of data ownership in the cloud, socPub. https:\/\/socpub.com\/articles\/the-ongoing-question-of-data-ownership-in-the-cloud-13749. Accessed 3 Feb 2022"},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"63","DOI":"10.3917\/rai.069.0063","volume":"69","author":"C Delmas","year":"2018","unstructured":"Delmas, C.: Is Hacktivism the new civil disobedience? Raisons Politiques 69(1), 63\u201381 (2018)","journal-title":"Raisons Politiques"},{"key":"9_CR14","unstructured":"Durant, A.: The Enemy Within. Business XL, pp. 48\u201351 (2007)"},{"key":"9_CR15","unstructured":"Erickson, A.: This pretty blond doll could be spying on your family. https:\/\/www.washingtonpost.com\/news\/worldviews\/wp\/2017\/02\/23\/this-pretty-blond-doll-could-be-spying-on-your-family\/. Accessed 3 Feb 2022"},{"key":"9_CR16","unstructured":"Ertem, A.: Sensitive Data and Receiving Consent according to GDPR. https:\/\/blog.scrintal.com\/sensitive-data-and-receiving-consent-according-to-gdpr-a31c9ee8ea28. Accessed 8 Feb 2022"},{"key":"9_CR17","unstructured":"European Union Agency for Cybersecurity: Privacy by design in big data. An overview of privacy enhancing technologies in the era of big data analytics (2015)"},{"key":"9_CR18","unstructured":"European Union Agency for Fundamental Rights and Council of Europe. In: Handbook on European Data Protection Law, 2018 edn. Publications Office of the European Union, Luxembourg (2018)"},{"key":"9_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/s40537-019-0177-4","volume":"6","author":"M Favaretto","year":"2019","unstructured":"Favaretto, M., De Clercq, E., Elger, B.S.: Big data and discrimination: perils, promises and solutions a systematic review. J Big Data 6, 12 (2019)","journal-title":"J Big Data"},{"issue":"4","key":"9_CR20","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1007\/s13347-016-0220-8","volume":"29","author":"L Floridi","year":"2016","unstructured":"Floridi, L.: On human dignity as a foundation for the right to privacy. Philos. Technol. 29(4), 307\u2013312 (2016). https:\/\/doi.org\/10.1007\/s13347-016-0220-8","journal-title":"Philos. Technol."},{"key":"9_CR21","doi-asserted-by":"publisher","unstructured":"Hartley, R.D.: Ethical Hacking: Teaching Students to Hack, East-Carolina University. https:\/\/doi.org\/10.13140\/RG.2.1.3580.8085. Accessed 16 Jan 2022","DOI":"10.13140\/RG.2.1.3580.8085"},{"key":"9_CR22","unstructured":"Hautala, L.: Smart toy flaws make hacking kids\u2019 info child's play. https:\/\/www.cnet.com\/home\/smart-home\/cloudpets-iot-smart-toy-flaws-hacking-kids-info-children-cybersecurity\/. Accessed 3 Feb 2022"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Henschke, A.: The Internet of Things and dual layers of ethical concern. In: Lin, P., Abney, K., Jenkins, R. (eds.) Robot Ethics 2.0, pp. 229\u2013243. Oxford University Press, New York (2017)","DOI":"10.1093\/oso\/9780190652951.003.0015"},{"key":"9_CR24","unstructured":"How GDPR Stops Discrimination and Protects Equalities. https:\/\/www.openrightsgroup.org\/how-gdpr-stops-discrimination-and-protects-equalities\/. Accessed 8 Feb 2022"},{"key":"9_CR25","unstructured":"Internet Society: The Trust Opportunity: Exploring Consumer Attitudes to the Internet of Things. https:\/\/www.internetsociety.org\/resources\/doc\/2019\/trust-opportunity-exploring-consumer-attitudes-to-iot\/. Accessed 3 Feb 2022"},{"key":"9_CR26","unstructured":"Ivanov, I..: What is a Black Hat Hacker? Techjury. https:\/\/techjury.net\/blog\/what-is-a-black-hat-hacker. Accessed 11 Jan 20222"},{"key":"9_CR27","series-title":"The International Library of Ethics, Law and Technology","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/978-3-030-29053-5_9","volume-title":"The Ethics of Cybersecurity","author":"D-O Jaquet-Chiffelle","year":"2020","unstructured":"Jaquet-Chiffelle, D.-O., Loi, M.: Ethical and unethical hacking. In: Christen, M., Gordijn, B., Loi, M. (eds.) The Ethics of Cybersecurity. TILELT, vol. 21, pp. 179\u2013204. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-29053-5_9"},{"key":"9_CR28","unstructured":"Johnson, B., Stephens, D.: Is \u2018hacktivism\u2019 a force for good \u2026 or chaos?, Marketplace. https:\/\/www.marketplace.org\/2017\/04\/28\/hacktivism-force-good-or-chaos\/. Accessed 2 Feb 2022"},{"issue":"4","key":"9_CR29","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1136\/jcp.2005.030957","volume":"59","author":"M Kapp","year":"2006","unstructured":"Kapp, M.: Ethical and legal issues in research involving human subjects: do you want a piece of me? J. Clin. Pathol. 59(4), 335\u2013339 (2006)","journal-title":"J. Clin. Pathol."},{"issue":"4","key":"9_CR30","first-page":"2353","volume":"4","author":"S Kumar","year":"2018","unstructured":"Kumar, S., Agarwal, D.: Hacking attacks, methods, techniques and their protection measures. Int. J. Adv. Res. Comput. Sci. Manag. 4(4), 2353\u20132358 (2018)","journal-title":"Int. J. Adv. Res. Comput. Sci. Manag."},{"key":"9_CR31","unstructured":"Larson, S.: FDA confirms that St. Jude\u2019s cardiac devices can be hacked, CNN. https:\/\/money.cnn.com\/2017\/01\/09\/technology\/fda-st-jude-cardiac-hack\/. Accessed 3 Feb 2022"},{"key":"9_CR32","unstructured":"Legal Frameworks for Hacking by Law Enforcement: Identification, Evaluation and Comparison of Practices, Study for the LIBE Committee, 6 April 2017"},{"key":"9_CR33","unstructured":"Levin, S., Wong, J.: Self-driving Uber kills Arizona woman in first fatal crash involving pedestrian. https:\/\/www.theguardian.com\/technology\/2018\/mar\/19\/uber-self-driving-car-kills-woman-arizona-tempe. Accessed 6 Jan 2022"},{"key":"9_CR34","unstructured":"Marshall, A.: The lose-lose ethics of testing self-driving cars in public, Wired. https:\/\/www.wired.com\/story\/lose-lose-ethics-self-driving-public\/. Accessed 16 Jan 2022"},{"key":"9_CR35","unstructured":"Maurer, T., Hinck, G.: What Is the Cloud? In: Cloud Security: A Primer for Policymakers, Carnegie Endowment for International Peace (2020)"},{"key":"9_CR36","unstructured":"Milin-Ashmore, J.: What Is Ethical Hacking and Why Is It Important? https:\/\/ethical.net\/ethical\/what-is-ethical-hacking. Accessed 5 Jan 2022"},{"key":"9_CR37","unstructured":"O\u2019Leary, A.: Horrified mum hears chilling man\u2019s voice on hacked baby monitor saying child is \u2018cute\u2019, Mirror. https:\/\/www.mirror.co.uk\/news\/world-news\/horrified-mum-hears-chilling-mans-24959669. Accessed 3 Feb 2022"},{"key":"9_CR38","unstructured":"Osborne, C.: Updated Kaseya ransomware attack FAQ: What we know now, ZDNet. https:\/\/www.zdnet.com\/article\/updated-kaseya-ransomware-attack-faq-what-we-know-now\/. Accessed 2 Feb 2022"},{"key":"9_CR39","unstructured":"Palmer, D.: 175,000 IoT cameras can be remotely hacked thanks to flaw, says security re- searcher, ZDNet. https:\/\/www.zdnet.com\/article\/175000-iot-cameras-can-be-remotely-hacked-thanks-to-flaw-says-security-researcher\/. Accessed 3 Feb 2022"},{"key":"9_CR40","unstructured":"Privacy and Information Technology. Stanford Encyclopedia of Philosophy (2019). https:\/\/plato.stanford.edu\/entries\/it-privacy\/. Accessed 4 Feb 2022"},{"key":"9_CR41","unstructured":"Pyman T.:\u2018Creepy hacker used baby monitor to SPY on my son\u2019: Parents fear restless 15 month-old boy was being woken by \u2018local man\u2019 accessing cot camera after hearing \u2018deep male voice\u2019 at 2.30 am, Mailonline. https:\/\/www.dailymail.co.uk\/news\/article-10287527\/Parents-fear-creepy-hacker-used-baby-monitor-spy-son.html. Accessed 3 Feb 2022"},{"key":"9_CR42","unstructured":"Redden, M.: Tech company accused of collecting details of how customers use sex toys. The Guardian. https:\/\/www.theguardian.com\/us-news\/2016\/sep\/14\/wevibe-sex-toy-data-collection-chicago-lawsuit. Accessed 16 Jan 2022"},{"key":"9_CR43","unstructured":"Right to be informed. https:\/\/www.dataprotection.ie\/en\/individuals\/know-your-rights\/right-be-informed-transparency-article-13-14-gdpr. Accessed 31 Jan 2022"},{"key":"9_CR44","unstructured":"Roberts, P.: Pretty much all consumer internet of things vulnerabilities are avoidable. The Security Ledger. https:\/\/securityledger.com\/2016\/09\/pretty-much-all-consumer-internet-of-things-vulnerabilities-are-avoidable\/. Accessed 16 Jan 2022"},{"key":"9_CR45","doi-asserted-by":"crossref","unstructured":"Rocchi, M., Murphy, B.: Ethics and cloud computing, data privacy and trust. In: Cloud Computing, pp. 105\u2013128. Palgrave Macmillan, Cham (2020)","DOI":"10.1007\/978-3-030-54660-1_6"},{"key":"9_CR46","unstructured":"Ryan, Y.: Anonymousand the Arab uprisings, Al Jazeera. https:\/\/www.aljazeera.com\/news\/2011\/5\/19\/anonymous-and-the-arab-uprisings. Accessed 02 Feb 2022"},{"key":"9_CR47","doi-asserted-by":"crossref","unstructured":"Turilli, M., Floridi, L.: Cloud computing and its ethical challenges. https:\/\/dx.doi.org\/10.2139\/ssrn.3850031. Accessed 24 Feb 2022","DOI":"10.2139\/ssrn.3850031"},{"key":"9_CR48","unstructured":"Turton, W., Mehrotra, K.: Hackers breached colonial pipeline using compromised password, Bloomberg. https:\/\/www.bloomberg.com\/news\/articles\/2021-06-04\/hackers-breached-colonial-pipeline-using-compromised-password. Accessed 2 Feb 2022"},{"key":"9_CR49","unstructured":"Uganda Government websites hacked by anonymous in defense of gay pride: LGBT Rights, Huffpost. https:\/\/www.huffpost.com\/entry\/uganda-government-websites-hacked-anonymous-gay-rights_n_1789623. Accessed 2 Feb 2022"},{"key":"9_CR50","unstructured":"Vida, M.: Anonymous group hack reveals hidden government data about COVID-19 cases in Nicaragua. https:\/\/globalvoices.org\/2020\/08\/31\/anonymous-group-hack-reveals-hidden-government-data-about-covid-19-cases-in-nicaragua\/. Accessed 22 Feb 2022"},{"key":"9_CR51","unstructured":"Western Governors University: Ethical hacking and how it fits with cybersecurity. https:\/\/www.wgu.edu\/blog\/ethical-hacking-how-fits-with-cybersecurity1908.html#close. Accessed 4 Feb 2022"},{"key":"9_CR52","unstructured":"White, T., Gutierrez, B.: Protest or Criminal Activities?. The Ethics of Hacktivism. https:\/\/tawhite88.wordpress.com\/2014\/03\/24\/protest-or-criminal-activities-the-ethics-of-hacktivism\/. Accessed 24 Feb 2022"},{"key":"9_CR53","unstructured":"Yoo, C.: Centre for international governance, the emerging internet of things: opportunities and challenges for privacy and security. In: Governing Cyberspace During a Crisis in Trust: An Essay Series on the Economic Potential \u2014 and Vulnerability \u2014 of Transformative Technologies and Cyber Security, Center for International Governance (2019)"},{"key":"9_CR54","unstructured":"Zarley, B.: \u2018White hat hackers are defending hospitals from rising cyber attacks\u2019. Freethink. https:\/\/www.freethink.com\/technology\/cyber-attacks. Accessed 22 Feb 2022"}],"container-title":["Lecture Notes in Computer Science","Cybersecurity of Digital Service Chains"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04036-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T12:05:03Z","timestamp":1649246703000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04036-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031040351","9783031040368"],"references-count":54,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04036-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"7 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}