{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T15:28:16Z","timestamp":1776698896595,"version":"3.51.2"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030290528","type":"print"},{"value":"9783030290535","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This chapter provides a political and philosophical analysis of the values at stake in ensuring cybersecurity for critical infrastructures. It presents a review of the boundaries of cybersecurity in national security, with a focus on the ethics of surveillance for protecting critical infrastructures and the use of AI. A bibliographic analysis of the literature is applied until 2016 to identify and discuss the cybersecurity value conflicts and ethical issues in national security. This is integrated with an analysis of the most recent literature on cyber-threats to national infrastructure and the role of AI. This chapter demonstrates that the increased connectedness of digital and non-digital infrastructure enhances the trade-offs between values identified in the literature of the past years, and supports this thesis with the analysis of four case studies.<\/jats:p>","DOI":"10.1007\/978-3-030-29053-5_8","type":"book-chapter","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T14:04:09Z","timestamp":1581343449000},"page":"157-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Cybersecurity of Critical Infrastructure"],"prefix":"10.1007","author":[{"given":"Eleonora","family":"Vigan\u00f2","sequence":"first","affiliation":[]},{"given":"Michele","family":"Loi","sequence":"additional","affiliation":[]},{"given":"Emad","family":"Yaghmaei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,11]]},"reference":[{"key":"8_CR1","first-page":"350","volume-title":"Proceedings of 1st international conference on information and communication technology, ICICT 2005","author":"M Adeel","year":"2005","unstructured":"Adeel M, Chaudhry A, Shaikh R et al (2005) Taxonomy of cyber crimes and legislation in Pakistan. In: Proceedings of 1st international conference on information and communication technology, ICICT 2005, p 350"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-319-45300-2_12","volume-title":"Ethics and policies for cyber operations","author":"C Baylon","year":"2017","unstructured":"Baylon C (2017) Lessons from Stuxnet and the realm of cyber and nuclear security: implications for ethics in cyber warfare. In: Taddeo M, Glorioso L (eds) Ethics and policies for cyber operations. Springer, Cham, pp 213\u2013229. https:\/\/doi.org\/10.1007\/978-3-319-45300-2_12"},{"key":"8_CR3","unstructured":"Berk R, Heidari H, Jabbari S et al (2017) A convex framework for fair regression. ArXiv:1706.02409. http:\/\/arxiv.org\/abs\/1706.02409. Last access 7 July 2019"},{"key":"8_CR4","unstructured":"Brundage M, Avin S, Clark J et\u00a0al (2018) The malicious use of artificial intelligence: forecasting, prevention, and mitigation. ArXiv:1802.07228. http:\/\/arxiv.org\/abs\/1802.07228. Last access 7 July 2019"},{"key":"8_CR5","first-page":"57","volume-title":"Cyberspace and national security: threats, opportunities, and power in a virtual world","author":"S Bucci","year":"2012","unstructured":"Bucci S (2012) Joining cybercrime and cyberterrorism: a likely scenario. In: Reveron DS (ed) Cyberspace and national security: threats, opportunities, and power in a virtual world. George Town University Press, Washington, DC, pp 57\u201368"},{"key":"8_CR6","unstructured":"Chouldechova A (2016) Fair prediction with disparate impact: a study of bias in recidivism prediction instruments. ArXiv:1610.07524. http:\/\/arxiv.org\/abs\/1610.07524. Last access 7 July 2019"},{"key":"8_CR7","unstructured":"Chouldechova A, Roth A (2018) The frontiers of fairness in machine learning. ArXiv:1810.08810. http:\/\/arxiv.org\/abs\/1810.08810. Last access 7 July 2019"},{"key":"8_CR8","unstructured":"Commission of the European Communities (2006) Communication from the Commission on a European Programme for Critical Infrastructure Protection. https:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2006:0786:FIN:EN:PDF. Last access 7 July 2019"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Corbett-Davies S, Pierson E, Feller A et al (2017) Algorithmic decision making and the cost of fairness. ArXiv 1701.08230. https:\/\/doi.org\/10.1145\/3097983.309809","DOI":"10.1145\/3097983.309809"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Deibert R (2011) Tracking the emerging arms race in cyberspace. Bull At Sci 67(1):1\u20138. https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0096340210393703","DOI":"10.1177\/0096340210393703"},{"key":"8_CR11","doi-asserted-by":"crossref","DOI":"10.1353\/book2643","volume-title":"Wars of disruption and resilience: cybered conflict, power, and national security","author":"CC Demchak","year":"2011","unstructured":"Demchak CC (2011) Wars of disruption and resilience: cybered conflict, power, and national security. University of Georgia Press, Athens"},{"issue":"3","key":"8_CR12","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11948-014-9551-y","volume":"20","author":"M Dunn Cavelty","year":"2014","unstructured":"Dunn Cavelty M (2014) Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities. Sci Eng Ethics 20(3):701\u2013715","journal-title":"Sci Eng Ethics"},{"issue":"1","key":"8_CR13","first-page":"81","volume":"7","author":"RSA Faqir","year":"2013","unstructured":"Faqir RSA (2013) Cyber crimes in Jordan: a legal assessment on the effectiveness of information system crimes law no (30) of 2010. Int J Cyber Crim 7(1):81\u201390","journal-title":"Int J Cyber Crim"},{"key":"8_CR14","unstructured":"Federal Register (1996) Executive order 13010\u00a0\u2013 critical infrastructure protection. 61(138): 37347\u201337350"},{"issue":"6433","key":"8_CR15","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1126\/science.aaw4399","volume":"363","author":"S Finlayson","year":"2019","unstructured":"Finlayson S, Bowers JD, Ito J et\u00a0al (2019) Adversarial attacks on medical machine learning. Science 363(6433):1287\u20131289. https:\/\/doi.org\/10.1126\/science.aaw4399","journal-title":"Science"},{"key":"8_CR16","unstructured":"Franceschi-Bicchierai, L, Coluccini R (2019, March 29) Researchers find Google Play Store Apps were actually government malware. Vice. https:\/\/www.vice.com\/en_us\/article\/43z93g\/hackers-hid-android-malware-in-google-play-store-exodus-esurv. Last access 7 July 2019"},{"key":"8_CR17","unstructured":"Garvie C, Bedoya AM, Frankle J (2016, October 18) The perpetual line-up. Unregulated police face recognition in America. Georgetown Law Center on Privacy & Technology. https:\/\/www.perpetuallineup.org. Last access 7 July 2019"},{"issue":"3","key":"8_CR18","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1016\/j.clsr.2010.03.003","volume":"26","author":"K Geers","year":"2010","unstructured":"Geers K (2010a) The challenge of cyber attack deterrence. Comput Law Secur Rev 26(3):298\u2013303","journal-title":"Comput Law Secur Rev"},{"issue":"2\/4","key":"8_CR19","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1080\/15567281.2010.536735","volume":"3","author":"K Geers","year":"2010","unstructured":"Geers K (2010b) The cyber threat to national critical infrastructures: beyond theory. J Digit Forensic Pract 3(2\/4):124\u2013130","journal-title":"J Digit Forensic Pract"},{"issue":"3","key":"8_CR20","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.clsr.2013.03.003","volume":"29","author":"JS Hiller","year":"2013","unstructured":"Hiller JS, Russell RS (2013) The challenge and imperative of private sector cybersecurity: an international comparison. Comp Law Secur Rev 29(3):236\u2013245","journal-title":"Comp Law Secur Rev"},{"key":"8_CR21","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-540-72163-5_2","volume-title":"Information security practice and experience, ISPEC 4464","author":"LCK Hui","year":"2007","unstructured":"Hui LCK, Chow KP, Yiu SM (2007) Tools and technology for computer forensics: research and development in Hong Kong. In: Dawson E, Wong DS (eds) Information security practice and experience, ISPEC 4464, pp 11\u201319"},{"issue":"2\/3","key":"8_CR22","first-page":"177","volume":"2","author":"L Introna","year":"2004","unstructured":"Introna L, Wood D (2004) Picturing algorithmic surveillance: the politics of facial recognition systems. Surveill Soc 2(2\/3):177\u2013198","journal-title":"Surveill Soc"},{"issue":"1","key":"8_CR23","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11948-018-00081-0","volume":"26","author":"Thomas C. King","year":"2019","unstructured":"King TC, Aggarwal N, Taddeo M et al (2019) Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions. Sci Eng Ethics:1\u201332. https:\/\/doi.org\/10.1007\/s11948-018-00081-0","journal-title":"Science and Engineering Ethics"},{"issue":"6","key":"8_CR24","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1109\/TIFS.2012.2214212","volume":"7","author":"BF Klare","year":"2012","unstructured":"Klare BF, Burge MJ, Klontz JC et al (2012) Face recognition performance: role of demographic information. IEEE Trans Inf Forensics Secur 7(6):1789\u20131801","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"8_CR25","unstructured":"Kleinberg, J, Mullainathan S, Raghavan M (2016) Inherent trade-offs in the fair determination of risk scores. ArXiv:1609.05807. http:\/\/arxiv.org\/abs\/1609.05807"},{"key":"8_CR26","first-page":"182","volume-title":"Proceedings of the 12th European conference on information warfare and security","author":"M Lehto","year":"2013","unstructured":"Lehto M (2013) The ways, means and ends in cyber security strategies. In: Kuusisto R, Kurkinen E (eds) Proceedings of the 12th European conference on information warfare and security, pp 182\u2013190"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Loi M, Ferrario A, Vigan\u00f2 E (2019) Transparency as design publicity: explaining and justifying inscrutable algorithms. SSRN scholarly paper ID 3404040. https:\/\/doi.org\/10.2139\/ssrn.3404040","DOI":"10.2139\/ssrn.3404040"},{"issue":"1","key":"8_CR28","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.icte.2018.02.001","volume":"4","author":"LA Maglaras","year":"2018","unstructured":"Maglaras LA, Kim K, Janicke H et al (2018) Cyber security of critical infrastructures. ICT Express 4(1):42\u201345. https:\/\/doi.org\/10.1016\/j.icte.2018.02.001","journal-title":"ICT Express"},{"key":"8_CR29","unstructured":"McCullon R (2017, May 17) Facial recognition technology is both biased and understudied. Undark. https:\/\/undark.org\/article\/facial-recognition-technology-biased-understudied\/. Last access 7 July 2019"},{"key":"8_CR30","first-page":"147","volume-title":"Proceedings of the 8th international conference on information warfare and security","author":"J McNally","year":"2013","unstructured":"McNally J (2013) Improving public-private sector cooperation on cyber event reporting. In: Hart D (ed) Proceedings of the 8th international conference on information warfare and security, pp 147\u2013153"},{"key":"8_CR31","unstructured":"Moteff J, Parfomac P (2004) Critical infrastructure and key assets: definition and identification. Congressional report ADA454016. Library of Congress Washington DC Congressional Research Service. https:\/\/apps.dtic.mil\/dtic\/tr\/fulltext\/u2\/a454016.pdf. Last access 7 July 2019"},{"key":"8_CR32","unstructured":"Office of the [US] President (2003) The National strategy for the physical protection of critical infrastructure and key assets, US White House Office. https:\/\/www.hsdl.org\/?view&did=1041. Last access 7 July 2019"},{"key":"8_CR33","unstructured":"Perlroth N, Sanger DE (2013, July 13) Nations buying as hackers sell flaws in computer code. The New York Times. https:\/\/www.nytimes.com\/2013\/07\/14\/world\/europe\/nations-buying-as-hackers-sell-computer-flaws.html. Last access 7 July 2019"},{"key":"8_CR34","series-title":"Social dimensions of information and communication technology policy 282","first-page":"95","volume-title":"IFIP international conference on human choice and computers","author":"J Phahlamohlaka","year":"2008","unstructured":"Phahlamohlaka J (2008) Globalisation and national security issues for the state: implications for national ICT policies. In: Avgerou C, Smith ML, van den Besselaar P (eds) IFIP international conference on human choice and computers, Social dimensions of information and communication technology policy 282, pp 95\u2013107"},{"key":"8_CR35","series-title":"Philosophical studies series","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-319-45300-2_7","volume-title":"Ethics and policies for cyber operations: a NATO cooperative cyber defence centre of excellence initiative","author":"M Roscini","year":"2017","unstructured":"Roscini M (2017) Military objectives in cyber warfare. In: Taddeo M, Glorioso L (eds) Ethics and policies for cyber operations: a NATO cooperative cyber defence centre of excellence initiative, Philosophical studies series. Springer, Cham, pp 99\u2013114. https:\/\/doi.org\/10.1007\/978-3-319-45300-2_7"},{"key":"8_CR36","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139169288","volume-title":"Tallinn manual on the international law applicable to cyber warfare","author":"MN Schmitt","year":"2013","unstructured":"Schmitt MN (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, Cambridge"},{"key":"8_CR37","first-page":"171","volume-title":"e-Technologies and networks for development, Communications in Computer and Information Science, ICeND 2011 171","author":"V Sekgwathe","year":"2011","unstructured":"Sekgwathe V, Talib M (2011) Cyber crime detection and protection: third world still to cope-up. In: Yonazi JJ, Sedoyeka E, Ariwa E, El Qawasmeh E (eds) e-Technologies and networks for development, Communications in Computer and Information Science, ICeND 2011 171, pp 171\u2013181. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-642-22729-5_15"},{"issue":"3","key":"8_CR38","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s13347-018-0328-0","volume":"31","author":"M Taddeo","year":"2018","unstructured":"Taddeo M (2018) Deterrence and norms to foster stability in cyberspace. Philos Technol 31(3):323\u2013329. https:\/\/doi.org\/10.1007\/s13347-018-0328-0","journal-title":"Philos Technol"},{"issue":"2","key":"8_CR39","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11023-019-09504-8","volume":"29","author":"M Taddeo","year":"2019","unstructured":"Taddeo M (2019) Three ethical challenges of applications of artificial intelligence in cybersecurity. Mind Mach 29(2):187\u2013191. https:\/\/doi.org\/10.1007\/s11023-019-09504-8","journal-title":"Mind Mach"},{"issue":"7701","key":"8_CR40","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1038\/d41586-018-04602-6","volume":"556","author":"M Taddeo","year":"2018","unstructured":"Taddeo M, Floridi L (2018) Regulate artificial intelligence to avert cyber arms race. Nature 556(7701):296\u2013298. https:\/\/doi.org\/10.1038\/d41586-018-04602-6","journal-title":"Nature"},{"key":"8_CR41","unstructured":"Thompson M (2016, March 26) Iranian Cyber Attack on New York Dam shows future of war. Time. https:\/\/time.com\/4270728\/iran-cyber-attack-dam-fbi\/. Last access 7 July 2019"},{"key":"8_CR42","series-title":"SSRN scholarly paper ID 3091909","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3091909","volume-title":"Canvas white paper 1\u00a0\u2013 cybersecurity and ethics","author":"E Yaghmaei","year":"2017","unstructured":"Yaghmaei E, Van de Poel I, Christen M (2017) Canvas white paper 1\u00a0\u2013 cybersecurity and ethics, SSRN scholarly paper ID 3091909. Social Science Research Network, Rochester. https:\/\/papers.ssrn.com\/abstract=3091909"},{"key":"8_CR43","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1145\/3038912.3052660","volume":"1610.08452","author":"M Zafar","year":"2017","unstructured":"Zafar M, Bilal H, Valera I et al (2017) Fairness beyond disparate treatment & disparate impact: learning classification without disparate mistreatment. ArXiv 1610.08452:1171\u20131180. https:\/\/doi.org\/10.1145\/3038912.3052660","journal-title":"ArXiv"}],"container-title":["The International Library of Ethics, Law and Technology","The Ethics of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29053-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T16:02:29Z","timestamp":1695744149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29053-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030290528","9783030290535"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29053-5_8","relation":{},"ISSN":["1875-0044","1875-0036"],"issn-type":[{"value":"1875-0044","type":"print"},{"value":"1875-0036","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}