Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

The Ethics of Deception in Cyberspace

The Ethics of Deception in Cyberspace
View Sample PDF
Author(s): Neil C. Rowe (U.S. Naval Postgraduate School, USA)
Copyright: 2009
Pages: 13
Source title: Handbook of Research on Technoethics
Source Author(s)/Editor(s): Rocci Luppicini (University of Ottawa, Canada) and Rebecca Adell (University of Ottawa, Canada)
DOI: 10.4018/978-1-60566-022-6.ch034


View The Ethics of Deception in Cyberspace on the publisher's website for pricing and purchasing information.


We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as spam, phishing, spyware, deceptive commercial software, and dishonest games. We next examine deception used in attacks on computer systems, including identity deception, Trojan horses, denial of service, eavesdropping, record manipulation, and social engineering. We then consider several types of deception for defensive purposes, less well known, including honeypots, honeytokens, defensive obstructionism, false excuses, deceptive intelligence collection, and strategic deception. In each case we assess the ethical issues pro and con for the use of deception. We argue that sometimes deception in cyberspace is unethical and sometimes it is ethical.

Related Content

Ben van Lier. © 2018. 21 pages.
Jose-Luis Perez-Trivino. © 2018. 18 pages.
Gabriel R. Ricci. © 2018. 20 pages.
Tommaso Bertolotti, Selene Arfini, Lorenzo Magnani. © 2018. 14 pages.
Francesco Albert Bosco Cortese. © 2018. 31 pages.
Lambèr Royakkers, Peter Olsthoorn. © 2018. 18 pages.
John Forge. © 2018. 11 pages.
Body Bottom