Towards a Safe and Secure Global Information Technology Ecosystem

The Importance of Ethical Approaches and International Cooperation in Addressing Persistent Challenges

Keywords: Cyberspace, Privacy and Security Challenges, Cybersecurity Ethics, Ethical Leadership, International Cooperation in Cyberspace

Abstract

Cyberspace, an expanding and boundless platform created by a vast network of interconnected devices, has caused a fundamental change in communication, work, and information accessibility. The unprecedented potential of this platform, however, also poses major challenges in terms of privacy and security. Due to its multinational nature, cyberspace transcends the sovereignty of any one government and therefore evades exclusive ownership by a nation-state. Although the growth of digitalization has simplified many processes and increased productivity in daily life, this exponential growth has rendered the digital ecosystem more vulnerable to a wide range of cybersecurity threats. The increasing frequency and sophistication of cyberattacks and operations carried out by both state and non-state actors highlight the need for better international cooperation to help protect critical infrastructure from malicious actors. Collective action in response to global cyber threats requires consistency and adherence to ethical principles within the international community. Ethical approaches to leadership and international cooperation can play an important part in resolving global cybersecurity issues by paving the way for the development and adoption of better and more effective cybersecurity policies that can help mitigate the risk more optimally. The purpose of this study is to evaluate the possibilities of bolstering global solidarity via the use of ethical methods to combat the challenges posed by digital technology. The intricate and interconnected nature of cyber issues underscores the cruciality of ethical governance in the identification and implementation of practical solutions. The present study seeks to examine and assess the practicality, applicability, and efficiency of various ethical frameworks in addressing issues pertaining to digital platforms, thereby contributing to a better understanding of the interplay between ethics and cybersecurity. This study would contribute to the development of strategies for inspiring ethical and responsible behavior from public and private sectors regarding cybersecurity, and to the promotion of international solidarity and cooperation in addressing global cyber threats.

Author Biography

Yasin Tokat, University of Szeged, Faculty of Law and Political Sciences, Department of Political Sciences

PhD Student

References

Asllani, A., White, Ch.S. & Ettkin, L., 2013. Viewing Cybersecurity as a Public Good: The Role of Governments, Businesses, and Individuals. Journal of Legal, Ethical, and Regulatory Issues, 16(1), 7-14. Available at: https://www.proquest.com/openview/99d61ac21426edd17a928d278dec115e/1?pq-origsite=gscholar&cbl=38868 (16.06.2023)

Brown, M.E., Treviño, L. K. & Harrison, D.A., 2005. Ethical leadership: A social learning perspective for construct development and testing. Organizational Behavior and Human Decision Processes, 97(2), 117-134. https://doi.org/10.1016/j.obhdp.2005.03.002

Christen, M., Gordijn, B. & Loi, M., 2020. The ethics of cybersecurity. Springer Nature. https://doi.org/10.1007/978-3-030-29053-5

Cleveland, M. & Spangler, T., 2020. Toward a Model for Ethical Cybersecurity Leadership. In: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 294-302). IGI Global.

Collins, S., 2015. The core of care ethics. Springer.

Covahey, V., Ford, S., Porter, G. & Shaffer, S., 1988. 'Guide to NIST'. NIST special publication 858. p.1-5. Available at: https://ia902700.us.archive.org/34/items/guidetonist858cova/guidetonist858cova.pdf (16.06.2023)

Downe, J., Cowell, R. & Morgan, K., 2016. What determines ethical behavior in public organizations: Is it rules or leadership? Public Administration Review, 76(6), 898-909. https://doi.org/10.1111/puar.12562

Formosa, P., Wilson, M. & Richards, D., 2021. A principlist framework for cybersecurity ethics. Computers and Security, 109, 1-15. [102382]. https://doi.org/10.1016/j.cose.2021.102382

Grove, H., Clouse, M. & Schaffner, L.G., 2019. Cybersecurity description and control criteria to strengthen corporate governance. Journal of Leadership. Accountability and Ethics, 16(1), 86-96. https://doi.org/10.33423/jlae.v16i1.1366

Huang, K. & Pearlson, K., 2019. For what technology can’t fix: Building a model of organizational cybersecurity culture. http://hdl.handle.net/10125/60074

Ingram, M., 2017. How Google and Facebook Have Taken Over the Digital Ad Industry. Fortune. Available at: https://fortune.com/2017/01/04/google-facebook-ad-industry/ (16.06.2023)

Keltner, D., Carrie A.L. & Allison, M.L., 2006. Power and Moral Leadership. In: Moral Leadership: The Theory and Practice of Power, Judgment, and Policy, edited by Deborah L. Rhode, 177-194. San Francisco, CA: Jossey-Bass.

Ko, C., Ma, J., Bartnik, R., Haney, M.H. & Kang, M., 2017. Ethical Leadership: An Integrative Review and Future Research Agenda. Ethics & Behavior, 28(2), 104–132. https://doi.org/10.1080/10508422.2017.1318069.

Kuenzi, M., Mayer, D.M. & Greenbaum, R.L., 2020. Creating an ethical organizational environment: The relationship between ethical leadership, ethical organizational climate, and unethical behavior. Personnel Psychology, 73(1), 43-71. https://doi.org/10.1111/peps.12356

Manjikian, M., 2017. Cybersecurity Ethics: An Introduction (1st ed.). Routledge. https://doi.org/10.4324/9781315196275

Massinger, P. 1624. The Bondman. Act I, scene iii.

Meyer, D., 2019. Google and the Ad Industry Accused of “Massive” Abuse of Intimate Personal Data. Fortune. Available at: https://fortune.com/2019/01/28/google-iab-sensitive-profiles/ (16.06.2023)

Morgan, G. & Gordijn, B., 2020. A care-based stakeholder approach to ethics of cybersecurity in business. The Ethics of Cybersecurity, 21, 119-138.

NIST SP 800-66 Rev. 1 under Security from 44 U.S.C., Sec. 3542. Available at: https://csrc.nist.gov/glossary/term/security (16.06.2023)

Paul, K., 2020. Washington's crackdown on Google is the greatest threat yet to big tech. The Guardian. Available at: https://www.theguardian.com/technology/2020/oct/20/google-antitrust-charges-threat-big-tech (16.06.2023)

Prentice, R., 2014. Ethical Leadership, Part 1: Perilous at the Top. The University of Texas at Austin. Available at: https://docplayer.net/60911681-Ethical-leadership-part-1-perilous-at-the-top-questions-for-classroom-discussions.html (16.06.2023)

Romm, T., 2020. Amazon, Apple, Facebook, and Google grilled on Capitol Hill over their market power. The Washington Post. Available at: https://www.washingtonpost.com/technology/2020/07/29/apple-google-facebook-amazon-congress-hearing/ (16.06.2023)

Rosenberg, M. & Dance, G., 2018. You Are the Product’: Targeted by Cambridge Analytica on Facebook. The New York Times. Available at: https://www.nytimes.com/2018/04/08/us/facebook-users-data-harvested-cambridge-analytica.html (16.06.2023)

Shoemaker, D., Kohnke, A., & Laidlaw, G. 2019. Ethics and cybersecurity are not mutually exclusive. EDPACS, 60(1), 1-10. https://doi.org/10.1080/07366981.2019.1651516

Stach, C., 2023. Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration. Future Internet, 15(2), 71. https://doi.org/10.3390/fi15020071

Treviño, L.K., Hartman, L.P. & Brown, M., 2000. Moral person and moral manager: How executives develop a reputation for ethical leadership. California management review, 42(4), 128-142. https://doi.org/10.2307/41166057

Tokat, Y. 2022. The Big Tech versus the Nation-States: Clash of Economic Interests and Struggle to Compete on a Global Scale. In Eurasian Conferences on Language & Social Sciences. Retrieved from https://publicatio.bibl.u-szeged.hu/26368/1/Mypart.pdf (16.06.2023)

Tokat, Y. 2022. Are Internet Regulation and Freedom of Speech at odds? How can the Balkanization of the Internet Affect Users' Freedoms on the Internet? Gondolat Kiadó. Retrieved from http://publicatio.bibl.u-szeged.hu/26379/1/DoctoralWorkingPapers-UniversityofGyor.pdf (16.06.2023)

Published
2023-12-20
How to Cite
TokatY. (2023). Towards a Safe and Secure Global Information Technology Ecosystem: The Importance of Ethical Approaches and International Cooperation in Addressing Persistent Challenges. Multidisciplinary Challenges, Diverse Responses - Journal of Management and Business Administration, (2), 239-269. https://doi.org/10.33565/MKSV.2023.02.09
Section
Paper