Ethical and legal issues of the use of computational intelligence techniques in computer security and computer forensics

Computational Intelligence (CI) techniques have been widely used in the domains of computer security and computer forensics. One problem that normative discussions of technologies face is that the technical capabilities under investigation tend to be unclear and that the experts in normative questions don't tend to be experts in technical developments and vice versa. The present paper therefore sets out to chart the ethical and legal problems arising from a new and fast moving field, namely that of computational intelligence and its application to computer security and forensics. Using artificial neural networks as an example of computational intelligence, the paper's main aim is to create a link between what can now be perceived as technical developments and established discourses in ethics and the law. It aims to chart the territory to highlight likely problems and point in the direction of future research.

[1]  John Gardner,et al.  Nearly Natural Law , 2007 .

[2]  Alfredo De Santis,et al.  Neural Network Techniques for Proactive Password Checking , 2006, IEEE Transactions on Dependable and Secure Computing.

[3]  B. Stahl FORENSIC COMPUTING IN THE WORKPLACE: HEGEMONY, IDEOLOGY, AND THE PERFECT PANOPTICON? , 2008 .

[4]  R L Simpson,et al.  Ethics in the information age. , 1995, Nursing management.

[5]  W. Kissick,et al.  ON THE HUMAN USE OF HUMAN BEINGS , 1969, Annals of the New York Academy of Sciences.

[6]  Robert Behrman,et al.  Social Network Influences on Strategic Choices , 2004 .

[7]  Jeroen van den Hoven,et al.  Information Technology and Moral Philosophy , 2008 .

[8]  G. Lăzăroiu The Cambridge Handbook of Information and Computer Ethics , 2012 .

[9]  Shouhong Wang,et al.  Password Authentication Using Hopfield Neural Networks , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[10]  Shaio Yan Huang,et al.  Using the artificial neural network to predict fraud litigation: Some empirical evidence from emerging markets , 2009, Expert Syst. Appl..

[11]  Bernd Carsten Stahl,et al.  CCTV identity management and implications for criminal justice: some considerations. , 2002 .

[12]  William H. Allen Computer Forensics , 2005, IEEE Secur. Priv..

[13]  Tero Vartiainen,et al.  What levels of moral reasoning and values explain adherence to information security rules? An empirical study , 2009, Eur. J. Inf. Syst..

[14]  Naomi Miller,et al.  Risk-adjusted probability measures in portfolio optimization with coherent measures of risk , 2008, Eur. J. Oper. Res..

[15]  James L. McClelland,et al.  Parallel distributed processing: explorations in the microstructure of cognition, vol. 1: foundations , 1986 .

[16]  B. K. L. Feia,et al.  The use of self-organising maps for anomalous behaviour detection in a digital investigation , 2006 .

[17]  Benjamin Kuipers,et al.  Computer power and human reason , 1976, SGAR.

[18]  Sue Conger,et al.  The Intersection of Privacy and Security , 2009 .

[19]  K. Himma The Handbook of Information and Computer Ethics , 2007 .

[20]  Paulo Salvador,et al.  Framework for Zombie Detection Using Neural Networks , 2009, 2009 Fourth International Conference on Internet Monitoring and Protection.

[21]  Keith Marzullo,et al.  Computer Forensics in Forensis , 2008, 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering.

[22]  Erin Kenneally Gatekeeping Out of the Box: Open Source Software as a Mechanism to Assess Reliability for Digital Evidence , 2001 .

[23]  Patricia A. Lafferty,et al.  Texture-based steganalysis: results for color images , 2004, SPIE Optics + Photonics.

[24]  Sylvie Delacroix,et al.  You'd Better Be Committed: Legal Norms and Normativity , 2009 .

[25]  Kirstie Ball,et al.  Surveillance Society: Monitoring Everyday Life , 2001 .

[26]  William S. Brown Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .

[27]  Lucas D. Introna,et al.  Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems , 2002, Surveillance & Society.

[28]  Nicole Beebe,et al.  Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results , 2007, Digit. Investig..

[29]  Parag Kulkarni,et al.  Intrusion Detection System using Self Organizing Maps , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.

[30]  Tshilidzi Marwala,et al.  State of the Art Review for Applying Computational Intelligence and Machine Learning Techniques to Portfolio Optimisation , 2009, ArXiv.

[31]  James L. McClelland,et al.  Parallel Distributed Processing: Explorations in the Microstructure of Cognition : Psychological and Biological Models , 1986 .

[32]  Lucas D. Introna Workplace surveillance is unethical and unfair , 2002 .