Database Security and the Problem of Polyinstantiation: a moral scrutiny

In the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinsta...

Full description

Bibliographic Details
Main Author: Mikko Siponen
Format: Article
Language:English
Published: Australasian Association for Information Systems 2002-11-01
Series:Australasian Journal of Information Systems
Subjects:
Online Access:http://journal.acs.org.au/index.php/ajis/article/view/169
id doaj-b9b923ef1d6a4e36aec930ab33e399c2
record_format Article
spelling doaj-b9b923ef1d6a4e36aec930ab33e399c22021-08-02T02:49:37ZengAustralasian Association for Information SystemsAustralasian Journal of Information Systems1449-86181449-86182002-11-0110110.3127/ajis.v10i1.169144Database Security and the Problem of Polyinstantiation: a moral scrutinyMikko SiponenIn the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinstantiation shall be critically analysed from the viewpoint of a moral philosophical framework. The moral philosophical framework used includes 1) Kantian ethics, 2) the universality theses advocated by Hare, Rawls, Gewirth, Jewish-Christian ethics, and Confucian ethics, 3) utilitarianism, and 4) Theory of Information Ethics (IE) by Floridi. The result of this analysis suggests that research and practice on polyinstantiation is morally questionable, at least in the light of the chosen moral philosophical theories. The aim of the paper is not, however, to deem polyinstantiation as morally wrong altogether, but to provide researchers and practitioners with tools and insights for analyzing the morality of polyinstantiation in different cases. Moreover, the results suggest that, as far as polyinstantiation is concerned, traditional ethics theories seem to be at least as adequate as IE.http://journal.acs.org.au/index.php/ajis/article/view/169databasescurityinstantiateethicsphilosophyKantuniversalityutilitarianisminformation ethics
collection DOAJ
language English
format Article
sources DOAJ
author Mikko Siponen
spellingShingle Mikko Siponen
Database Security and the Problem of Polyinstantiation: a moral scrutiny
Australasian Journal of Information Systems
database
scurity
instantiate
ethics
philosophy
Kant
universality
utilitarianism
information ethics
author_facet Mikko Siponen
author_sort Mikko Siponen
title Database Security and the Problem of Polyinstantiation: a moral scrutiny
title_short Database Security and the Problem of Polyinstantiation: a moral scrutiny
title_full Database Security and the Problem of Polyinstantiation: a moral scrutiny
title_fullStr Database Security and the Problem of Polyinstantiation: a moral scrutiny
title_full_unstemmed Database Security and the Problem of Polyinstantiation: a moral scrutiny
title_sort database security and the problem of polyinstantiation: a moral scrutiny
publisher Australasian Association for Information Systems
series Australasian Journal of Information Systems
issn 1449-8618
1449-8618
publishDate 2002-11-01
description In the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinstantiation shall be critically analysed from the viewpoint of a moral philosophical framework. The moral philosophical framework used includes 1) Kantian ethics, 2) the universality theses advocated by Hare, Rawls, Gewirth, Jewish-Christian ethics, and Confucian ethics, 3) utilitarianism, and 4) Theory of Information Ethics (IE) by Floridi. The result of this analysis suggests that research and practice on polyinstantiation is morally questionable, at least in the light of the chosen moral philosophical theories. The aim of the paper is not, however, to deem polyinstantiation as morally wrong altogether, but to provide researchers and practitioners with tools and insights for analyzing the morality of polyinstantiation in different cases. Moreover, the results suggest that, as far as polyinstantiation is concerned, traditional ethics theories seem to be at least as adequate as IE.
topic database
scurity
instantiate
ethics
philosophy
Kant
universality
utilitarianism
information ethics
url http://journal.acs.org.au/index.php/ajis/article/view/169
work_keys_str_mv AT mikkosiponen databasesecurityandtheproblemofpolyinstantiationamoralscrutiny
_version_ 1721243701458501632