{"id":"https://openalex.org/W4226331971","doi":"https://doi.org/10.1007/978-3-031-04036-8_9","title":"Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?","display_name":"Ethics in Cybersecurity. What Are the Challenges We Need to Be Aware of and How to Handle Them?","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4226331971","doi":"https://doi.org/10.1007/978-3-031-04036-8_9"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-031-04036-8_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-04036-8_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-04036-8_9.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-04036-8_9.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016732483","display_name":"Denitsa Kozhuharova","orcid":"https://orcid.org/0009-0006-1290-1502"},"institutions":[{"id":"https://openalex.org/I4210093630","display_name":"Law and Internet Foundation","ror":"https://ror.org/00jccxv75","country_code":"BG","type":"nonprofit","lineage":["https://openalex.org/I4210093630"]}],"countries":["BG"],"is_corresponding":true,"raw_author_name":"Denitsa Kozhuharova","raw_affiliation_strings":["Law and Internet Foundation, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Law and Internet Foundation, Sofia, Bulgaria","institution_ids":["https://openalex.org/I4210093630"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056182267","display_name":"Atanas Kirov","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093630","display_name":"Law and Internet Foundation","ror":"https://ror.org/00jccxv75","country_code":"BG","type":"nonprofit","lineage":["https://openalex.org/I4210093630"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Atanas Kirov","raw_affiliation_strings":["Law and Internet Foundation, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Law and Internet Foundation, Sofia, Bulgaria","institution_ids":["https://openalex.org/I4210093630"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036038198","display_name":"Zhanin Al-Shargabi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210093630","display_name":"Law and Internet Foundation","ror":"https://ror.org/00jccxv75","country_code":"BG","type":"nonprofit","lineage":["https://openalex.org/I4210093630"]}],"countries":["BG"],"is_corresponding":false,"raw_author_name":"Zhanin Al-Shargabi","raw_affiliation_strings":["Law and Internet Foundation, Sofia, Bulgaria"],"affiliations":[{"raw_affiliation_string":"Law and Internet Foundation, Sofia, Bulgaria","institution_ids":["https://openalex.org/I4210093630"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016732483"],"corresponding_institution_ids":["https://openalex.org/I4210093630"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":{"value":5000,"currency":"EUR","value_usd":5392},"fwci":5.8306,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.95927458,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"202","last_page":"221"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.7649304866790771},{"id":"https://openalex.org/keywords/harm","display_name":"Harm","score":0.7297132015228271},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.6371126174926758},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5787627696990967},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.5747395157814026},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4468534588813782},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.43207627534866333},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3484238386154175},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2755167484283447},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.17845603823661804},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13612374663352966}],"concepts":[{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.7649304866790771},{"id":"https://openalex.org/C2777363581","wikidata":"https://www.wikidata.org/wiki/Q15098235","display_name":"Harm","level":2,"score":0.7297132015228271},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.6371126174926758},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5787627696990967},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.5747395157814026},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4468534588813782},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.43207627534866333},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3484238386154175},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2755167484283447},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.17845603823661804},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13612374663352966},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-031-04036-8_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-04036-8_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-04036-8_9.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.1007/978-3-031-04036-8_9","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-031-04036-8_9","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-031-04036-8_9.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4226331971.pdf","grobid_xml":"https://content.openalex.org/works/W4226331971.grobid-xml"},"referenced_works_count":13,"referenced_works":["https://openalex.org/W2028217834","https://openalex.org/W2130956545","https://openalex.org/W2288062722","https://openalex.org/W2344608465","https://openalex.org/W2796460964","https://openalex.org/W2892596952","https://openalex.org/W2918300080","https://openalex.org/W3005940512","https://openalex.org/W3101140866","https://openalex.org/W3131631990","https://openalex.org/W3207831878","https://openalex.org/W4237379470","https://openalex.org/W6941052140"],"related_works":["https://openalex.org/W4254637722","https://openalex.org/W2980401999","https://openalex.org/W3016483420","https://openalex.org/W2331628363","https://openalex.org/W2393030234","https://openalex.org/W3198851420","https://openalex.org/W2379730136","https://openalex.org/W3015194596","https://openalex.org/W2088149615","https://openalex.org/W4293140739"],"abstract_inverted_index":{"Abstract":[0],"In":[1],"the":[2,6,23,61,75,86,116,131,138,154,157,165,188,200,207],"field":[3,24,62,208],"of":[4,8,25,63,119,156,195,203,209],"research,":[5],"role":[7],"ethics":[9],"grows":[10],"more":[11,13],"and":[12,35,57,66,160,211],"every":[14],"year.":[15],"One":[16],"might":[17],"be":[18,43,123,144],"surprised":[19],"but":[20],"even":[21,74],"in":[22,83,97,101,125,199,206],"technology":[26,65],"there":[27,69],"is":[28,70],"a":[29,46,49,54,71,193,196],"necessity":[30],"for":[31],"experts":[32,204],"to":[33,36,92,104,143,146],"understand":[34],"implement":[37,93],"ethical":[38,88,95,148],"principles.":[39,89],"Ethics":[40],"itself":[41],"could":[42,171],"understood":[44],"as":[45,152],"code":[47],"or":[48,107],"moral":[50],"way":[51],"by":[52],"which":[53,141],"person":[55],"lives":[56],"works.":[58],"But":[59],"within":[60,130],"information":[64],"cybersecurity":[67,210],"research":[68],"chance":[72],"that":[73,121],"most":[76],"technical":[77,99],"appropriate":[78],"solution":[79],"does":[80],"not":[81,103,179],"go":[82],"line":[84],"with":[85,181],"corresponding":[87],"Experts":[90],"need":[91,142],"fundamental":[94],"principles":[96],"their":[98,113],"products":[100],"order":[102],"cause":[105],"harm":[106],"have":[108,172],"any":[109],"negative":[110,174],"effect":[111,175],"on":[112,176],"users.":[114],"To":[115],"vast":[117],"majority":[118],"challenges":[120],"will":[122],"reflected":[124],"this":[126],"chapter":[127,185],"are":[128,137],"discussed":[129],"EU-funded":[132],"project":[133],"GUARD,":[134],"namely":[135],"what":[136],"proper":[139],"actions":[140],"taken":[145],"ensure":[147],"compliance.":[149],"Challenges":[150],"such":[151],"ensuring":[153],"privacy":[155],"users,":[158],"reporting":[159],"handling":[161],"incidental":[162],"findings,":[163],"testing":[164],"technological":[166],"product,":[167],"mitigating":[168],"biases":[169],"etc.":[170],"different":[173],"humans":[177],"if":[178],"dealt":[180],"properly.":[182],"The":[183],"current":[184],"would":[186],"explore":[187],"questions":[189],"posed":[190],"above":[191],"alongside":[192],"description":[194],"methodology":[197],"resulting":[198],"combined":[201],"efforts":[202],"both":[205],"ethics.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
