Database Security and the Problem of Polyinstantiation: a moral scrutiny
In the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinsta...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Australasian Association for Information Systems
2002-11-01
|
Series: | Australasian Journal of Information Systems |
Subjects: | |
Online Access: | http://journal.acs.org.au/index.php/ajis/article/view/169 |
id |
doaj-b9b923ef1d6a4e36aec930ab33e399c2 |
---|---|
record_format |
Article |
spelling |
doaj-b9b923ef1d6a4e36aec930ab33e399c22021-08-02T02:49:37ZengAustralasian Association for Information SystemsAustralasian Journal of Information Systems1449-86181449-86182002-11-0110110.3127/ajis.v10i1.169144Database Security and the Problem of Polyinstantiation: a moral scrutinyMikko SiponenIn the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinstantiation shall be critically analysed from the viewpoint of a moral philosophical framework. The moral philosophical framework used includes 1) Kantian ethics, 2) the universality theses advocated by Hare, Rawls, Gewirth, Jewish-Christian ethics, and Confucian ethics, 3) utilitarianism, and 4) Theory of Information Ethics (IE) by Floridi. The result of this analysis suggests that research and practice on polyinstantiation is morally questionable, at least in the light of the chosen moral philosophical theories. The aim of the paper is not, however, to deem polyinstantiation as morally wrong altogether, but to provide researchers and practitioners with tools and insights for analyzing the morality of polyinstantiation in different cases. Moreover, the results suggest that, as far as polyinstantiation is concerned, traditional ethics theories seem to be at least as adequate as IE.http://journal.acs.org.au/index.php/ajis/article/view/169databasescurityinstantiateethicsphilosophyKantuniversalityutilitarianisminformation ethics |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Mikko Siponen |
spellingShingle |
Mikko Siponen Database Security and the Problem of Polyinstantiation: a moral scrutiny Australasian Journal of Information Systems database scurity instantiate ethics philosophy Kant universality utilitarianism information ethics |
author_facet |
Mikko Siponen |
author_sort |
Mikko Siponen |
title |
Database Security and the Problem of Polyinstantiation: a moral scrutiny |
title_short |
Database Security and the Problem of Polyinstantiation: a moral scrutiny |
title_full |
Database Security and the Problem of Polyinstantiation: a moral scrutiny |
title_fullStr |
Database Security and the Problem of Polyinstantiation: a moral scrutiny |
title_full_unstemmed |
Database Security and the Problem of Polyinstantiation: a moral scrutiny |
title_sort |
database security and the problem of polyinstantiation: a moral scrutiny |
publisher |
Australasian Association for Information Systems |
series |
Australasian Journal of Information Systems |
issn |
1449-8618 1449-8618 |
publishDate |
2002-11-01 |
description |
In the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinstantiation shall be critically analysed from the viewpoint of a moral philosophical framework. The moral philosophical framework used includes 1) Kantian ethics, 2) the universality theses advocated by Hare, Rawls, Gewirth, Jewish-Christian ethics, and Confucian ethics, 3) utilitarianism, and 4) Theory of Information Ethics (IE) by Floridi. The result of this analysis suggests that research and practice on polyinstantiation is morally questionable, at least in the light of the chosen moral philosophical theories. The aim of the paper is not, however, to deem polyinstantiation as morally wrong altogether, but to provide researchers and practitioners with tools and insights for analyzing the morality of polyinstantiation in different cases. Moreover, the results suggest that, as far as polyinstantiation is concerned, traditional ethics theories seem to be at least as adequate as IE. |
topic |
database scurity instantiate ethics philosophy Kant universality utilitarianism information ethics |
url |
http://journal.acs.org.au/index.php/ajis/article/view/169 |
work_keys_str_mv |
AT mikkosiponen databasesecurityandtheproblemofpolyinstantiationamoralscrutiny |
_version_ |
1721243701458501632 |