Redirigiendo al acceso original de articulo en 18 segundos...
ARTÍCULO
TITULO

Database Security and the Problem of Polyinstantiation: a moral scrutiny

Mikko Siponen    

Resumen

In the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinstantiation shall be critically analysed from the viewpoint of a moral philosophical framework. The moral philosophical framework used includes 1) Kantian ethics, 2) the universality theses advocated by Hare, Rawls, Gewirth, Jewish-Christian ethics, and Confucian ethics, 3) utilitarianism, and 4) Theory of Information Ethics (IE) by Floridi. The result of this analysis suggests that research and practice on polyinstantiation is morally questionable, at least in the light of the chosen moral philosophical theories. The aim of the paper is not, however, to deem polyinstantiation as morally wrong altogether, but to provide researchers and practitioners with tools and insights for analyzing the morality of polyinstantiation in different cases. Moreover, the results suggest that, as far as polyinstantiation is concerned, traditional ethics theories seem to be at least as adequate as IE.

 Artículos similares

       
 
Khaled Almiani, Mutaz Abu Alrub, Young Choon Lee, Taha H. Rashidi and Amirmohammad Pasdar    
As a critical factor in ensuring the growth of the electronic auction (e-auction) domain, the privacy and security of the participants (sellers and buyers) must always be guaranteed. Traditionally, auction data, including participant details, are stored ... ver más
Revista: Algorithms

 
Felipe Orellana, Peppe J. V. D?Aranno, Silvia Scifoni and Maria Marsella    
Monitoring structural stability in urban areas and infrastructure networks is emerging as one of the dominant socio-economic issues for population security. The problem is accentuated by the age of the infrastructure because of increasing risks due to ma... ver más
Revista: Infrastructures

 
César Augusto Terán-Chaves, Julio Martín Duarte-Carvajalino, Claudia Ipaz-Cuastumal, Alexander Vega-Amante and Sonia Mercedes Polo-Murcia    
Climate variability is a major threat to maize (Zea mays) crops in Colombia, posing a risk to food security and compliance with Sustainable Development Goals. Therefore, this study aimed to assess the physical vulnerability of maize crops to climate vari... ver más
Revista: Water

 
Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu and Sutao Zhang    
Traditional mechanical parts have been increasingly replaced by in-vehicle electronic control units (ECUs) that communicate via control area networks (CAN). For security reasons, the Database CAN (DBC) file, which defines the contents of CAN messages, is... ver más
Revista: Applied Sciences

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information