1,314 research outputs found

    Technology ethics

    Get PDF
    Abstract. Technology ethics is a topic at the frontier of the modern day development. Mostly because due to the fact that our our reliance on technology increases as we become more accustomed to the pace of technological development. Hence, it is important for us understand the ethical implications that arise with these advances. Therefore, this article provides an introduction and foundation for technology ethics, data protection and artificial intelligence.Keywords. IT ethics, Data protection, AI, GDPR.JEL. H20, E40, M15

    Cybersecurity in healthcare: A narrative review of trends, threats and ways forward

    Get PDF
    Electronic healthcare technology is prevalent around the world and creates huge potential to improve clinical outcomes and transform care delivery. However, there are increasing concerns relating to the security of healthcare data and devices. Increased connectivity to existing computer networks has exposed medical devices to new cybersecurity vulnerabilities. Healthcare is an attractive target for cybercrime for two fundamental reasons: it is a rich source of valuable data and its defences are weak. Cybersecurity breaches include stealing health information and ransomware attacks on hospitals, and could include attacks on implanted medical devices. Breaches can reduce patient trust, cripple health systems and threaten human life. Ultimately, cybersecurity is critical to patient safety, yet has historically been lax. New legislation and regulations are in place to facilitate change. This requires cybersecurity to become an integral part of patient safety. Changes are required to human behaviour, technology and processes as part of a holistic solution

    Reducing Ransomware Crime: Analysis of Victims' Payment Decisions

    Get PDF
    In this paper, the decision-making processes of victims during ransomware attacks were analysed. Forty-one ransomware attacks using qualitative data collected from organisations and police officers from cybercrime units in the UK were examined. The hypothesis tested in this paper is that victims carefully analyse the situation before deciding whether to pay a ransom. This research confirms that victims often weigh the costs and benefits of interventions before making final decisions, and that their decisions are based on a range of reasons. As ransomware attacks become more prevalent globally, the findings should be highly relevant to those developing guidance and policies to prevent or minimise ransom payments

    Remote Workers, Ever-Present Risk: Employer Liability for Data Breaches in the Era of Hybrid Workplaces

    Get PDF
    The years since the onset of the COVID-19 pandemic have seen explosive growth in the number of remote workers, and companies have struggled to cope with a perceived loss of productivity and establish reliable methods of remote access to cope with this influx. At the same time, the last few years have seen a continued rise in the threat of data breaches, as sophisticated groups of malicious actors have targeted businesses and governments, locking systems with ransomware and exposing sensitive company data and employees\u27 personal information. This article aims to examine the intersection between these two trends, examining how an employer’s policies for enabling remote work and monitoring remote employees can significantly impact the employer’s potential liability in the event of a data breach. After surveying the current state of remote work and data breach law, this article examines the potential interplay between remote work and a data breach in a private company through a series of linked hypotheticals, closing with proposals for legislative reform to ensure greater data security and practical recommendations for employers seeking to mitigate the risks created by a remote workforce

    “The Internet of Buildings”: Insurance of Cyber Risks for Commercial Real Estate

    Get PDF

    Protection of Data in Armed Conflict

    Get PDF
    This article presents a novel way to conceptualize the protection of data in situations of armed conflict. Although the question of the targeting of data through adversarial military cyber operations and its implications for the qualification of such conduct under International Humanitarian Law has been on scholars’ and states’ radar for the last few years, there remain a number of misunderstandings as to how to think about the notion of “data.” Based on a number of fictional scenarios, the article clarifies the pertinent terminology and makes some expedient distinctions between various types of data. It then analyzes how existing international humanitarian and international human rights law applies to cyber operations whose effects have an impact on data. The authors argue that given the persisting ambiguities of traditional concepts such as “object” and “attack” under international humanitarian law, the targeting of content data continues to fall into a legal grey zone, which potentially has wide-ranging ramifications both for the rights of individual civilians and the functioning of civilian societies during situations of conflict. At the same time, much legal uncertainty surrounds the application of human rights law to these contexts, and existing data protection frameworks explicitly exclude taking effect in relation to issues of security. Acknowledging these gaps, the article attempts to advance the debate by proposing a paradigm shift: Instead of taking existing rules on armed conflict and applying them to “data,” we should contemplate applying the principles of data protection, data security, and privacy frameworks to military cyber operations in armed conflict

    Cybersecurity and Data Breach Harms: Theory and Reality

    Get PDF
    • …
    corecore