Information and Communication Technology (ICT) has helped libraries make all their electronic resources accessible to their users. Securing library-subscribed resources from scammers or unauthorized users is a big challenge in the present era. Cyber security is an area that needs to be studied in the present scenario, and the library is no exception. Institutions, including libraries, are one of the targeted areas of ransomware attacks. Library computers, library patrons’ data, and library-subscribed resources are the target of cybercriminals. To overcome this, there is a need for cyber security in academic libraries. With the advance of Information Technology, new threats and unauthorized actions arise each day. To be able to protect information assets against these threats and actions is one of the most important issues nowadays. But sometimes technical and technological measures are not enough to protect an information asset. Additional measures must be employed because there are a lot of parameters when it comes to information security. One of these parameters is people. These people can be system administrators, security professionals, employees, and users. These are the people that interact with the information system. In order to secure the people parameter in an information system, a measure that employs moral judgment must be introduced. Information is power. Nowadays, the main concern of the cyber community is to protect this valuable asset. Technical and technological security measures are sometimes insufficient to protect an information system. Because there is a human factor in an information system. Ethics are a set of moral rules that guide people. With the help of ethics, better and more robust security can be achieved. In this paper, the role of ethics in information security is discussed. First of all, law, ethics, and information security concepts are briefly introduced. Later, some ethical concerns and perspectives in information security are given.
Building similarity graph...
Analyzing shared references across papers
Loading...
Raghavendra Inganal
Building similarity graph...
Analyzing shared references across papers
Loading...
Raghavendra Inganal (Sat,) studied this question.
www.synapsesocial.com/papers/69db37774fe01fead37c56e3 — DOI: https://doi.org/10.5281/zenodo.19478821