Redirigiendo al acceso original de articulo en 21 segundos...
ARTÍCULO
TITULO

Database Security and the Problem of Polyinstantiation: a moral scrutiny

Mikko Siponen    

Resumen

In the area of computer security the problem of polyinstantiation is widely recognized. The research on polyinstantiation can be considered morally questionable, since it involves lying. This being the case, a moral scrutiny on the problem of polyinstantiation is warranted. The morality of polyinstantiation shall be critically analysed from the viewpoint of a moral philosophical framework. The moral philosophical framework used includes 1) Kantian ethics, 2) the universality theses advocated by Hare, Rawls, Gewirth, Jewish-Christian ethics, and Confucian ethics, 3) utilitarianism, and 4) Theory of Information Ethics (IE) by Floridi. The result of this analysis suggests that research and practice on polyinstantiation is morally questionable, at least in the light of the chosen moral philosophical theories. The aim of the paper is not, however, to deem polyinstantiation as morally wrong altogether, but to provide researchers and practitioners with tools and insights for analyzing the morality of polyinstantiation in different cases. Moreover, the results suggest that, as far as polyinstantiation is concerned, traditional ethics theories seem to be at least as adequate as IE.

 Artículos similares

       
 
Khaled Almiani, Mutaz Abu Alrub, Young Choon Lee, Taha H. Rashidi and Amirmohammad Pasdar    
As a critical factor in ensuring the growth of the electronic auction (e-auction) domain, the privacy and security of the participants (sellers and buyers) must always be guaranteed. Traditionally, auction data, including participant details, are stored ... ver más
Revista: Algorithms

 
César Augusto Terán-Chaves, Julio Martín Duarte-Carvajalino, Claudia Ipaz-Cuastumal, Alexander Vega-Amante and Sonia Mercedes Polo-Murcia    
Climate variability is a major threat to maize (Zea mays) crops in Colombia, posing a risk to food security and compliance with Sustainable Development Goals. Therefore, this study aimed to assess the physical vulnerability of maize crops to climate vari... ver más
Revista: Water

 
Samia Masood Awan, Muhammad Ajmal Azad, Junaid Arshad, Urooj Waheed and Tahir Sharif    
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and... ver más
Revista: Information

 
Allam Jaya Prakash, Kiran Kumar Patro, Saunak Samantray, Pawel Plawiak and Mohamed Hammad    
An electrocardiogram (ECG) is a unique representation of a person?s identity, similar to fingerprints, and its rhythm and shape are completely different from person to person. Cloning and tampering with ECG-based biometric systems are very difficult. So,... ver más
Revista: Information

 
Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu and Sutao Zhang    
Traditional mechanical parts have been increasingly replaced by in-vehicle electronic control units (ECUs) that communicate via control area networks (CAN). For security reasons, the Database CAN (DBC) file, which defines the contents of CAN messages, is... ver más
Revista: Applied Sciences