Social and ethical solutions to defeat cyber attacks in edge computing

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Edge computing has revolutionized modern computing systems by enhancing efficiency and accessibility through its decentralized architecture. However, this same decentralization introduces critical challenges in cybersecurity and ethical governance. This chapter explores innovative social and ethical approaches to counter cyber attacks in edge computing environments, focusing on the integration of trust, transparency, and accountability into system design. Key ethical dilemmas in edge computing, such as data privacy breaches and algorithmic bias, require robust frameworks for identification and resolution. This study emphasizes the importance of ethical compliance, user empowerment, and cross-stakeholder collaboration in addressing these issues. This section delves into frameworks for recognizing and addressing ethical issues, highlighting the value of openness, accountability, and user empowerment. Trust and ethical compliance are essential for successful and sustainable edge computing systems. Strategies for fostering trust, supporting ethical behavior, and negotiating regulatory frameworks are reviewed, emphasizing the importance of stakeholder collaboration and incorporating ethical concepts into technological design and implementation. Organizations that implement these social and ethical solutions can strengthen cybersecurity safeguards and maintain ethical standards in the fast-changing ecosystem of edge computing.

Original languageEnglish
Title of host publicationCybersecurity Defensive Walls in Edge Computing
PublisherElsevier
Pages431-466
Number of pages36
ISBN (Electronic)9780443341090
ISBN (Print)9780443341106
DOIs
Publication statusPublished - 1 Jan 2025

Keywords

  • algorithmic transparency
  • and community-driven security models
  • cybersecurity threat mitigation
  • data privacy
  • Edge computing security
  • ethical governance

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Social and ethical solutions to defeat cyber attacks in edge computing'. Together they form a unique fingerprint.

Cite this