<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Exploring the ethics of cyber deception technologies for defensive cyber deception</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Iain</forename><surname>Reid</surname></persName>
							<email>iain.reid@port.ac.uk</email>
							<affiliation key="aff0">
								<orgName type="department">School of Criminology and Criminal Justice</orgName>
								<orgName type="institution">University of Portsmouth</orgName>
								<address>
									<addrLine>High Street</addrLine>
									<settlement>Portsmouth</settlement>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Angela</forename><surname>Okeke-Ramos</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Criminology and Criminal Justice</orgName>
								<orgName type="institution">University of Portsmouth</orgName>
								<address>
									<addrLine>High Street</addrLine>
									<settlement>Portsmouth</settlement>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mikolaj</forename><surname>Serafin</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">School of Criminology and Criminal Justice</orgName>
								<orgName type="institution">University of Portsmouth</orgName>
								<address>
									<addrLine>High Street</addrLine>
									<settlement>Portsmouth</settlement>
									<country key="GB">UK</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Exploring the ethics of cyber deception technologies for defensive cyber deception</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">F988D5E0B90D4300A1300E3A3B892F34</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T17:45+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Defensive Cyber Deception</term>
					<term>Cyber Deception Technologies</term>
					<term>Ethics 1</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Cyber deception technologies are increasingly being deployed for defensive cyber deception, in protecting our computer networks from attack. Typically, these approaches have focused on conducting cyber deception for generating threat intelligence through studying attackers' tactics, techniques and procedures, alongside the potential for covert exfiltration of digital forensics related to the attacker. Some more recent research has sought to develop concepts related to oppositional human factors, which target attacker cognition, perception and decision-making. As cyber deception technologies seek to influence human cognition and behavior, this paper proposes that there are a number of ethical issues that need to be considered in their deployment, alongside a number of potential ethical justifications for the use of such technologies in defending organization's computer networks.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Cyber deception technologies are both increasingly sophisticated and increasingly being integrated into Defensive Cyber Deception (DCD) to defend against computer network intruders. Cyber deception technologies are complex socio-technical systems, whereby software created by individuals and organizations, is used for deceptive reasons to influence computer network intruders, and, potentially the organizations they work for. Fugate and Ferguson-Walter (2019) outline how defenders are required to restrain responses to attackers due to ethical and legal principles, whilst attackers do not face this challenge <ref type="bibr" target="#b0">[1]</ref>. This further exacerbates the asymmetric advantage of attackers against defenders. DCD tools and techniques seek to disrupt this asymmetric advantage held by cyber attackers and intruders through challenging attackers across the cyber to the cognitive battlespace <ref type="bibr" target="#b1">[2]</ref>. Deception itself is defined as "deliberate measures to induce erroneous sensemaking and subsequent behavior within a target audience, to achieve and exploit an advantage" <ref type="bibr" target="#b2">[3]</ref>. The key elements here are erroneous sensemaking, an intentional act to bring the deceiver an advantage, a focus on the process of induction used by the victim, causing a change in behavior, and targeting a specific audience <ref type="bibr" target="#b1">[2]</ref>. Whilst such approaches have begun to address the balance of power between attacker and defender <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5]</ref>, there has been limited research into the ethical implications of DCD <ref type="bibr" target="#b5">[6]</ref>. One of the most common reactions is that it would be unethical to do so, even if it is not always the case <ref type="bibr" target="#b6">[7]</ref>. Furthermore, <ref type="bibr" target="#b1">Ashenden et al. (2021)</ref> found that subject matter expert (SME) participants in their research believed organizations need to discuss the ethics and legalities of using cyber deception technologies to defend against attackers <ref type="bibr" target="#b1">[2]</ref>. The aim of this position paper is to outline DCD, identify the ethical considerations of conducting DCD, alongside exploring potential ethical frameworks for conducting DCD drawing upon research related to the ethics of cybersecurity, military deception and cyberwarfare.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Defensive Cyber Deception</head><p>In using DCD to protect computer networks, cyber deception technologies have traditionally focused on the use of honeypots, simulated computer networks, which seek to attract attackers away from the actual computer network <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b8">9]</ref>. Once inside the honeypots, attacker's tactics, techniques and procedures (TTPs) are monitored to further understand, and potentially attribute, the attacker. The key purpose of honeypots is to generate threat intelligence, whereby network defenses can be further strengthened to increase cyber security. The further development of cyber deception technologies for DCD has moved beyond honeypots, however the premise of such technologies is still focused around studying attacker TTPs for generating threat intelligence. Some cyber deception technologies also enable the covert exfiltration of data regarding the data, moving beyond the studying of TTPs to potentially begin to attribute an attacker. Further research developing approaches to DCD has focused beyond threat intelligence and has sought to actively engage with attackers and to challenge them across the cyber and psychological battlespace <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12,</ref><ref type="bibr" target="#b12">13]</ref>. These approaches aim to cause uncertainty, confusion, surprise, selfdoubt and frustration in attackers, to slow down their attacks, and create surprise in the attackers <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b12">13]</ref>. The unknown here is whether such cyber deception causes any psychological harm to an attacker, or whether it is seen as merely an inconvenience and if the attacker will move on to an easier target. As both public and private organizations implement DCD measures there is a need to understand the ethical implications of these measures <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b13">14]</ref>, particularly where there may be suggestions of the development of more offensive responses <ref type="bibr" target="#b1">[2]</ref>. Such offensive responses, including hack-back, are primarily located within the remit of nationstates and are not available to organizations that deploy DCD.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Ethical considerations</head><p>The limited research exploring the ethical considerations of conducting cyber deception has primarily sought to explore entrapment, privacy, and liability <ref type="bibr" target="#b5">[6]</ref>. Predominantly this work has focused on the legal, rather than ethical considerations, and upon US legislation with a smaller amount on European legislation. The general conclusion of this work has argued that cyber deception is acceptable to be conducted by law enforcement and organizations in terms of selfdefense and reducing risk <ref type="bibr" target="#b5">[6]</ref>. However, research exploring the ethical considerations of cyber deception remains limited <ref type="bibr" target="#b5">[6]</ref>.</p><p>The following sections draw upon the limited research into the ethics of cyber deception, alongside ethics of cybersecurity, the ethics of cyberwarfare and the ethics of military deception to explore potential ethical considerations of cyber deception technologies for DCD. Ethical issues in conducting DCD include: 1) issues associated with Internet safety and introducing vulnerabilities to the public; 2) the morality of making users part of an experiment without their awareness and consent; 3) the morality of enticing someone to commit a crime; 4) cyber perfidy; 5) responsibility and automation; and 6) the potential for harm to an attacker. Overall, there is a strong requirement to explore the issues surrounding the ethics of cyber deception, specifically as cyber deception technologies are being increasingly deployed by organizations to actively protect their computer systems from attackers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Internet safety and introducing vulnerabilities to the public</head><p>A major consideration for the use of cyber deception technologies for DCD is that of Internet safety and introducing vulnerabilities to the public, including the potential for third party vulnerabilities <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b13">14]</ref>. Potential vulnerabilities may be introduced to the public that cause unintentional harm to neutral or third parties, and associated with potential cascading effects, which has been a longstanding ethical consideration in cyberwarfare <ref type="bibr" target="#b14">[15]</ref>. Expanding on the concept of cyberwarfare immunity for all third-parties is required <ref type="bibr" target="#b15">[16]</ref>. In applying such considerations to cyber deception technologies for DCD, such ethical considerations may not be required where deceptive assets are deployed within a network where legitimate users would not be accessing them. Furthermore, as the majority of current commercial-off-the-shelf (COTS) DCD solutions are for generating threat intelligence, as opposed to more offensive responses, then this ethical consideration may not need to be considered as in-depth with more potentially offensive responses. Alternatively, if COTS DCD solutions move beyond the current focus on generating threat intelligence and move towards more offensive responses then there will be a need to consider potential harm to neutral and third parties through cascading unintentional effects. Developing an understanding of any potential harms to neutral and third parties from DCD will be need to considered as part of wider DCD planning and lifecycle management.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">The morality of making users part of an experiment without their awareness and consent</head><p>With the deployment of cyber deception technologies for DCD there are potential ethical issues related to the morality of making users of a system part of an experiment without their awareness and consent. For example, there are concerns about privacy when using fake login props, defensive phishing or social engineering <ref type="bibr" target="#b6">[7]</ref>. While there is an argument to be made about ethical issues when collecting attacker's information without their consent <ref type="bibr" target="#b16">[17]</ref>, this is not usually an issue as attackers are typically anonymous when conducting illegal activities <ref type="bibr" target="#b6">[7]</ref>. More recent cyber deception technologies for DCD do make claims for the covert exfiltration of digital forensics related to the attacker that can potentially be used for attribution, however, as these attackers are in breach of the Computer Misuse Act 1990 [18] these actions are arguably ethically justifiable.</p><p>Of more concern is the ethical issue regarding privacy in cyber deception is when a legitimate user encounters a cyber deception <ref type="bibr" target="#b6">[7]</ref>. Since cyber deception should not target legitimate users, their data should be encrypted and deleted as soon as they are verified as legitimate users <ref type="bibr" target="#b6">[7]</ref>. Therefore, there is some argument that cyber deception technologies should be made so that they have limited or no interactions with everyday users <ref type="bibr" target="#b6">[7]</ref>. However, there is still an argument that cyber deception technologies for DCD should have deployment in parts of the network that legitimate users may use, as a specific strategy for targeting potential insider threats. Further, some cyber deception technology vendors have developed capabilities for deploying deception outside of the network (e.g. on GitHub) as a means of an early-warning system that an attack is occurring.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Entrapment</head><p>One potential ethical issue that may occur in the use of cyber deception technologies for DCD is entrapment <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b8">9]</ref>. Specifically, the use of honeytokens, honeyfiles, and honeypots can be potentially seen as entrapment <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b8">9]</ref>. This is an ethical issue as entrapment can be considered as an encouragement for committing crimes that would not be committed otherwise <ref type="bibr" target="#b6">[7]</ref>. On the other hand, entrapment can be considered as being passive and the attacker is the one that takes the active role in committing crime <ref type="bibr" target="#b6">[7]</ref>. This demonstrates that it can be difficult to determine what is and is not ethical when using cyber deception techniques. Entrapment as an ethical issue for cyber deception technologies for DCD may not be applicable for all cyber deception tactics and strategies, as not all approaches utilize honey technologies to attract users into deceptive environments, for example, the use of deceptive signaling <ref type="bibr" target="#b17">[19,</ref><ref type="bibr" target="#b18">20]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Cyber perfidy</head><p>One potential ethical issue that has application from the physical world to the virtual world, is that of cyber perfidy. Perfidy itself is taken from physical warfare whereby combatants are required to act in good faith <ref type="bibr" target="#b19">[21]</ref>. For example, when an adversary surrenders they are not then harmed; or the use of false insignia to suggest they are actors from another nation, or to hide who they really are whilst harming others <ref type="bibr" target="#b20">[22]</ref>. Perfidy as an ethical issue may have challenges in its application to cyberspace. In relation to cyber perfidy there is some discussion over using a neutral domain name or adversary insignia or signatures in pretending to be the enemy during a visible cyberattack, however, if an adversary is not killed, wounded or captured then this should not be considered as perfidy <ref type="bibr" target="#b21">[23]</ref>. Further issues raised as to what happens if this attack is autonomous, or whether a system can recognize the emblems of an adversary in cyberspace <ref type="bibr" target="#b21">[23]</ref>. Although using false credentials in a military cyberattack may be considered perfidious <ref type="bibr" target="#b21">[23]</ref>, of note is that the deception here is only considered in the arguments as part of an offensive cyber operation, rather than as part of DCD.</p><p>There are further assumptions that it is only military networks that are being targeted rather than civilian networks. <ref type="bibr" target="#b21">[23]</ref> refers to use by the NSA and GCHQ of a deception technique where users were redirected to a honeypot before malicious code was then injected onto the user's computer. Although this may parallel similar approaches to DCD the aim here was to target specific users, and it is unclear whether this may be considered perfidious unless it causes death, injury or capture of an enemy. The focus on perfidy and the physical harm that may result from perfidious actions ignores any harms that may be considered psychological. <ref type="bibr" target="#b21">[23]</ref> argues that the use of cyberweapons which damages physical or virtual infrastructure or corrupts data belonging to the military may be considered as a morally permissible cyberattack, even when using a trusted certificate, software exploit or unauthorized credential. However, even though such capabilities may be considered as permissible they are moving beyond the capabilities of COTS cyber deception technologies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.5.">Responsibility and automation</head><p>With the use of cyber deception technologies for DCD there are ethical issues related as to who holds overall responsibility for the deception deployed, and how this may be impacted by the automation of responses. One argument suggests that the ethical responsibility for cyber deception lies with the software developers who create the deception technology itself <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b8">9]</ref>. This is opposed to those who may actually plan the DCD, or those who order the procurement or deployment of COTS cyber deception technology across a system or network.</p><p>In assessing the ethical responsibility for DCD through applying concepts from cyberwarfare there is further support that those who create actions (whether attacks or exploits) should be those who are held ethically responsible for the outcomes of these <ref type="bibr" target="#b22">[24]</ref>. However, due to limitations or biases in decision-making humans may not know the outcomes of such actions suggests that cyberattacks or exploits may have uncertain moral legitimacy <ref type="bibr" target="#b22">[24]</ref>. Although there is an assumption here that a response to a cyberattack is being conducted by the 'human in the loop' rather than an autonomous response guided by AI and/or ML, as is the case with COTS cyber deception technologies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.6.">The potential for harm to an attacker</head><p>One interesting ethical consideration for cyber deception technologies for DCD is to whether deceptive assets have the potential to cause harm to an attacker. Applying concepts from cyberwarfare it is not clear how an attack on a computer system or network may be conceptualized as leading to 'damage' or whether this has a psychological or physical impact on the target, or how they may perceive such 'damage' <ref type="bibr" target="#b22">[24,</ref><ref type="bibr" target="#b23">25,</ref><ref type="bibr" target="#b24">26]</ref>. <ref type="bibr" target="#b23">Dipert (2016)</ref> further argues that deception in cyberspace is not substantive compared to deception in warfare, and that ethical comparisons are difficult to justify where there are no intentional or negligent deaths or permanent destruction <ref type="bibr" target="#b23">[25]</ref>. More recent research utilizing concepts from oppositional human factors (OHF) has found that some approached to DCD are able to cause confusion and surprise in attackers <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b12">13]</ref>, however, it is again unclear as to whether this may translate into actual physical or psychological harm to an attacker.</p><p>In seeking to understand the psychological harms of cyberwarfare <ref type="bibr" target="#b25">Canetti et al. (2016)</ref> extrapolate findings from research exploring the impact of more common online and offline harms <ref type="bibr" target="#b25">[27]</ref>. Cyberoperations that target individuals, networks or facilities may not result in any suffering to an individual, and if non-combatants were targeted this would still not equate to cyberterrorism <ref type="bibr" target="#b25">[27]</ref>. Victims of cyber-attacks in the form of identity theft have experienced psychological harm that is argued to be akin to that of burglary and home invasion, whilst being a victim of cyberbullying results in psychological trauma <ref type="bibr" target="#b25">[27]</ref>. In an experimentational simulation of a cyberattack (an intrusive breach of privacy), <ref type="bibr" target="#b26">Canetti et al. (2017)</ref> found that there was an increase in cortisol levels, which are indicative of a physiological response to stress <ref type="bibr" target="#b26">[28]</ref>. Whilst Canetti et al. ( <ref type="formula">2016</ref>) argue that as cyberattacks may cause such psychological and physiological harms then they should not be used against non-combatants as it is not morally acceptable <ref type="bibr" target="#b25">[27]</ref>. However, if such attacks may be deployed against those who attack our computer networks then this would be considered acceptable. Further investigation is required to explore whether the use of cyber deception technologies for DCD, can lead to potential psychological or physiological harm to an attacker.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Ethical Frameworks</head><p>In seeking to establish ethical justifications for the deployment of cyber deception technologies for DCD this work again draws upon the existing research exploring the ethics of cyber deception, alongside that of the ethics of cyber security, cyberwarfare and military deception. This work proposes that there are a number of potential ethical justifications that can be used for the support of the use of cyber deception technologies in DCD, considering cyber deception for threat intelligence, and the move to potential approaches for disrupting attacker cognition and decisionmaking. As Loi and Christen (2020) <ref type="bibr" target="#b27">[29]</ref> highlight cyber security explicitly states its ethical goal of being free from harm or danger in cyberspace, however, the challenge is whether the means to ensure this security are ethical or not.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Principlist</head><p>The principlist framework of ethics is argued to be grounded in reality and professional ethical practice that enables flexibility in making decisions <ref type="bibr" target="#b27">[29]</ref>. Principlism itself is a deontological perspective to moral rightness, whereby the ethics are through fulfilling the prima facie act even if this produces negative consequences <ref type="bibr" target="#b27">[29]</ref>. There may be three or four moral principles that are regarded to as prima facie duties in the deployment of cyber deception technologies for DCD in defending organizations against attackers. These should be identified by the organization itself as the ethical principles that they wish to adhere to, with the acknowledgement that such principles may sometimes clash with one another.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Human Rights</head><p>There needs to be a balance of human rights and security in cyberspace, the challenge is in which context one or the other becomes the priority <ref type="bibr" target="#b27">[29]</ref>. For example, as individuals we have the right to privacy, and cyber deception technologies for DCD may seek to enhance this through the use of the deployment of deceptive assets seeking to prevent cyberespionage or ransomware attacks that breach an individual's right to privacy. Rights associated with profiling and cyber security may not be applicable in the case of cyber deception, as if individuals are already intruding in our computer networks then they are already in breach of the Computer Misuse Act 1990 <ref type="bibr">[18]</ref>. However, as cyber deception technologies for DCD may covertly extract digital forensics for threat intelligence then the potential for misattribution of an attacker also needs to be considered as an ethical issue.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">Proportionality</head><p>Across the existing literature on the ethics of cyberwarfare and cyberdefense for organizations there is a consensus that a response to a cyberattack must be proportionate to the magnitude and scope of the provocation <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b22">24]</ref>. This includes the fact that there should be no overreaction of acts of vigilantism <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b15">16]</ref> or impact on third parties <ref type="bibr" target="#b24">[26]</ref>, or on privacy <ref type="bibr" target="#b28">[30]</ref>. The principle of proportionality may be applied to cyber deception technologies for DCD, for example, delays or tarpits are considered a cyber deception technique that is used to slow down an attacker, it has low impact on the legitimate users as attackers are usually in a more of a hurry <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b16">17]</ref>. The main ethical issue regarding the use of tarpits is if the network decides to delay the network long after the attacker is gone in anticipation of another attack. <ref type="bibr" target="#b13">Stevens (2020)</ref> argues that measures by organizations should be viewed in terms of subsidiarity and proportionality <ref type="bibr" target="#b13">[14]</ref>. With the case of subsidiarity, the measures used to avert a cyberattack may be considered ethically justified when the threat could not have been averted or minimized using a less invasive measure, or applied in a less invasive measure <ref type="bibr" target="#b13">[14]</ref>. In terms of proportionality, this would be argued to maintain a balance between the imminent harm avoided by an organization against harm to an innocent third party or even potentially an attacker <ref type="bibr" target="#b13">[14]</ref>. <ref type="bibr" target="#b13">Stevens (2020)</ref> argues that in calculating the parameters of a defensive measure than there is a need to foresee the consequences of our actions alongside the harms averted to a degree of reasonable certainty <ref type="bibr" target="#b13">[14]</ref>.</p><p>As the key of focus of currently available COTS cyber deception technologies for DCD is on generating threat intelligence, then the use of deceptive assets overall may be considered as a proportional response to a cyberattack. The potential harm posed by the use of cyber deception assets is beneath that of the harm posed by an attacker to an organization, whether they are conducting cyberespionage, or seeking to inject ransomware into a network.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Self-defense</head><p>Expanding on the ethics of cybersecurity to how organizations may ethically conduct DCD, Stevens (2020) explores the right to self-defense in cyberspace as ethical justification for specific cy-berdefense measures <ref type="bibr" target="#b13">[14]</ref>. <ref type="bibr" target="#b13">Stevens (2020)</ref> classifies measures that includes deception as potentially ethically problematic depending on their application <ref type="bibr" target="#b13">[14]</ref>. Some measures may be considered as acts of cybervigilantism if an attack has finished and the action may be considered as punishment or having a retaliatory nature then they may not be ethically justified if conducted by a private organization as opposed to a law enforcement agency <ref type="bibr" target="#b13">[14]</ref>. However, such arguments may not be applicable to DCD, whereby deceptive assets are utilized during an attack, whilst covert exfiltration of digital forensics may not be considered as an act of cybervigilantism.</p><p>In warfare self-defense is linked to liability to harm an attacker, where there is a necessity to harm an attacker to achieve a justifiable goal, and such responses should never knowingly inflict disproportionate harm to an attacker <ref type="bibr" target="#b29">[31]</ref>. Adapting <ref type="bibr" target="#b29">Jenkins (2016)</ref>  <ref type="bibr" target="#b29">[31]</ref> discussion of cyberwarfare as ideal war, if defenders incorporate cyberweapons into cyber deception technologies against attackers then this could be considered as ethically justified if the response is proportionate and there is no risk to non-combatants, although such an argument is currently theoretical. A point to consider here is that DCD efforts, to date, have sought to generate threat intelligence and disrupt attacker decision-making rather than, for example, encourage them to download a document that may include malware. The debate here is how harm to the attacker may be considered, and what ethics may relate to causing changes in an attacker's cognition through cyber deception. A further point Jenkins (2016) raises with offensive cyber operations is how far operations should be aimed downstream to focus on targets that will enable the desired effects to be achieved <ref type="bibr" target="#b29">[31]</ref>. Applying this concept to DCD it brings about the question of who the defender wishes to deceive, an attacker who may be conducting the attack on behalf of others, or whoever may have given the orders and instructions for an attack. The desired effects of the cyber deception may wish to focus on the decision-making beyond the initial attacker, and instead seek to disrupt those who may be running cyber-attacks.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Implications for Research and Practice</head><p>Whilst there has been limited research into the ethics of conducting cyber deception for DCD there are a number of potential areas that need to be further researched, particularly in relation to practice, and how organizations may ethically deploy cyber deception technologies. Firstly, research is needed to establish whether and how organizations, both public and private, consider ethical issues related to conducting DCD, and how they may justify the use or non-use of cyber deception technologies. It is anticipated here that there may be differences between private organizations who may primarily be utilizing DCD for threat intelligence, as opposed to public organizations who may wish to deploy OHF approaches to affect attacker decision-making, cognition and behavior. Secondly, it is important to establish whether OHF approaches may actually cause harm to an attacker, or if they are merely seen as an inconvenience or annoyance through their attempts to disrupt attacker decision-making, cognition and behavior. Establishing whether harm does occur or not may address the ethical issues of causing harm to an attacker, and resultantly the need for proportionality, and subsidiarity in responses against an attacker. Thirdly, if organizations are choosing to deploy cyber deception technologies for DCD, then there is a need to understand where and how they consider ethical issues and justifications as part of the cyber deception planning process and associated lifecycle management <ref type="bibr" target="#b30">[32]</ref>. A potential overall outcome for practice of this work combined would be organizational guidelines and polices for the ethical implementation of cyber deception technology for DCD.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Discussion and Conclusion</head><p>Deception is itself is considered neutral [33], it is the manner in which cyber deception technologies for DCD are deployed and utilized which gives rise to potential ethical issues. Adapting ethical positions from cybersecurity and cyberwarfare has enabled an examination of the justifications for cyber deception to be conducted, focusing on both the principlist and human rights ethics frameworks are considered as non-utilitarian as they do not require acts to be defined as for the greater good, rather they take a more risk-based and pragmatic approach in seeking to conduct ethical behavior in using cyber deception technologies for DCD. It may be best left to an organization to define what their key principles of ethics are, and how they may best ethically deploy deceptive assets in the defense of their organization against attackers. Developing further the ethical justifications of cyber deception technologies for DCD it can be considered that the use of deceptive assets is justified according to both proportionality and subsidiarity of the responses against computer network attackers. As current deceptive assets are primarily focused on conducting cyber deception for threat intelligence rather than more offensive measures, such deception may be considered as following the principles of proportionality and subsidiarity. In particular when following principles of self-defense, the use of cyber deception technologies for DCD by organizations is considered as ethically justified, as such deceptive assets are only designed to be only interacted by with computer network attackers</p><p>In conclusion, as deception is considered neutral, it may be considered acceptable to deceive in crisis situations, to an adversary, or when deception has been used against us <ref type="bibr" target="#b32">[34]</ref>. A number of ethical theories have sought to be applied to cyberspace <ref type="bibr" target="#b8">[9]</ref>, however, these theories may have limited application regarding the ethics of DCD in general <ref type="bibr" target="#b5">[6]</ref>. <ref type="bibr" target="#b8">Rowe (2008)</ref> states that the most appropriate ethical theory to follow regarding the ethics of cyber deception is utilitarianism where the benefits are assessed according to the overall benefit to society <ref type="bibr" target="#b8">[9]</ref>. This further develops the arguments of <ref type="bibr" target="#b33">Rowe (2004)</ref> where deception may be considered ethical when the costs of no deception are dearer than the cost of using deception, and where our own deception rarely catches legitimate users <ref type="bibr" target="#b33">[35]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>References</head></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Artificial intelligence and game theory models for defending critical networks with cyber deception</title>
		<author>
			<persName><forename type="first">S</forename><surname>Fugate</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ferguson-Walter</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">AI Magazine</title>
		<imprint>
			<biblScope unit="volume">40</biblScope>
			<biblScope unit="page" from="49" to="62" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Design thinking for cyber deception</title>
		<author>
			<persName><forename type="first">D</forename><surname>Ashenden</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Black</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">D</forename><surname>Reid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Henderson</surname></persName>
		</author>
		<ptr target="https://hdl.handle.net/10125/70853" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 54 th Hawaii International Conference on System Sciences</title>
				<meeting>the 54 th Hawaii International Conference on System Sciences</meeting>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="1958" to="1967" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Deceptive Thinking</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Henderson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">1st MilDec Military Deception Symposium</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Friend or Faux: Deception for cyber defense</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Ferguson-Walter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Lafon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Shade</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Information Warfare</title>
		<imprint>
			<biblScope unit="volume">16</biblScope>
			<biblScope unit="page" from="28" to="42" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A task analysis towards characterizing cyber-cognitive situation awareness (CCSA) in cyber defense analysts</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Gutzwiller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Hunt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Lange</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="14" to="20" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Fraunholz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">D</forename><surname>Anton</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lipps</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Reti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Krohmer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Pohl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tammen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">D</forename><surname>Schotten</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/1804.06196" />
		<title level="m">Demystifying deception technology: A survey</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">C</forename><surname>Rowe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Rrushi</surname></persName>
		</author>
		<title level="m">Introduction to Cyberdeception</title>
				<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The deception toolkit</title>
		<author>
			<persName><forename type="first">F</forename><surname>Cohen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Risks Digest</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<date type="published" when="1998">1998</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">The ethics of deception in cyberspace</title>
		<author>
			<persName><forename type="first">N</forename><surname>Rowe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Handbook of Research on Technoethics</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Luppicini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">R</forename><surname>Adell</surname></persName>
		</editor>
		<imprint>
			<publisher>IGI Global</publisher>
			<date type="published" when="2008">2008</date>
			<biblScope unit="page" from="529" to="541" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The world (of CTF) is not enough data: Lessons learned from a cyber deception experiment</title>
		<author>
			<persName><forename type="first">K</forename><surname>Ferguson-Walter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Major</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Van Bruggen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fugate</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gutzwiller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 5th International Conference on Collaboration and Internet Computing (CIC), IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="346" to="353" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Oppositional Human Factors in Cybersecurity: A Preliminary Analysis of Affective States</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Ferguson-Walter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Gutzwiller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">D</forename><surname>Scott</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">J</forename><surname>Johnson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">36th IEEE/ACM International Conference on Automated Software Engineering Workshops (ASEW), IEEE/ACM</title>
				<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="page" from="153" to="158" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Oh, Look, A Butterfly!&quot; A Framework For Distracting Attackers To Improve Cyber Defense</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Gutzwiller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Ferguson-Walter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fugate</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rogers</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Human Factors and Ergonomics Society Annual Meeting</title>
				<meeting>the Human Factors and Ergonomics Society Annual Meeting</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="272" to="276" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">The Moonraker Study: An experimental evaluation of host-based deception</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">B</forename><surname>Shade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Rogers</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Ferguson-Walter</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">B</forename><surname>Elson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Fayette</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">E</forename><surname>Heckman</surname></persName>
		</author>
		<ptr target="https://hdl.handle.net/10125/63970" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 53rd Hawaii International Conference on System Sciences</title>
				<meeting>the 53rd Hawaii International Conference on System Sciences</meeting>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1875" to="1884" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A framework for ethical cyber-defence for companies</title>
		<author>
			<persName><forename type="first">S</forename><surname>Stevens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Ethics of Cybersecurity</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Christen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Gordjin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Loi</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer Open</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="317" to="330" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Binary Bullets: The Ethics of Cyberwarfare</title>
		<author>
			<persName><forename type="first">P</forename><surname>Lushenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jay</forename><surname>Bradley</surname></persName>
		</author>
		<author>
			<persName><surname>Strawser</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Military Ethics</title>
		<editor>Fitz Allhoff, Adam Henschke and</editor>
		<imprint>
			<biblScope unit="volume">15</biblScope>
			<biblScope unit="page" from="69" to="73" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Twenty years of cyberwar</title>
		<author>
			<persName><forename type="first">J</forename><surname>Arquilla</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Military Ethics</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="80" to="87" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Current state of honeypots and deception strategies in cybersecurity</title>
		<author>
			<persName><forename type="first">L</forename><surname>Zobal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kolář</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Fujdiak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="1" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Deceptive signalling: Understanding human behaviour against signalling algorithms</title>
		<author>
			<persName><forename type="first">P</forename><surname>Aggarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Cranford</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tambe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Lebiere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gonzalez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cyber Deception: Techniques, Strategies and Human Aspects</title>
				<editor>
			<persName><forename type="first">T</forename><surname>Bao</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Tambe</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham, Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="83" to="96" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Cognitive modelling for personalized, adaptive signalling for cyber deception</title>
		<author>
			<persName><forename type="first">C</forename><surname>Lebiere</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><forename type="middle">A</forename><surname>Cranford</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Aggarwal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Cooney</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tambe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Gonzalez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Cyber Deception: Techniques, Strategies and Human Aspects</title>
				<editor>
			<persName><forename type="first">T</forename><surname>Bao</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Tambe</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham, Switzerland</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="59" to="82" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Law-of-War Perfidy</title>
		<author>
			<persName><forename type="first">S</forename><surname>Watts</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Military Law Review</title>
		<imprint>
			<biblScope unit="volume">219</biblScope>
			<biblScope unit="page" from="106" to="175" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Cyber warfare: Issues and challenges</title>
		<author>
			<persName><forename type="first">M</forename><surname>Robinson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Jones</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Janicke</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">49</biblScope>
			<biblScope unit="page" from="70" to="94" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Cyber perfidy, ruse, and deception</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">M</forename><surname>Roff</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Binary Bullets: The Ethics of Cyberwarfare</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Allhoff</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Henschke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Strawser</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="201" to="227" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Beyond machines: Humans in cyberoperations, espionage, and conflict</title>
		<author>
			<persName><forename type="first">D</forename><surname>Danks</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">H</forename><surname>Danks</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Binary Bullets: The Ethics of Cyberwarfare</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Allhoff</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Henschke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Strawser</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="177" to="197" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Distinctive ethical issues of cyberwarfare</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Dipert</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Binary Bullets: The Ethics of Cyberwarfare</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Allhoff</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Henschke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Strawser</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="56" to="72" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">Cyberattacks and &quot;Dirty Hands&quot;: Cyberwar, cybercrime, or covert political action?</title>
		<author>
			<persName><forename type="first">S</forename><surname>Miller</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Binary Bulletts: The Ethics of Cyberwarfare</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Allhoff</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Henschke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Strawser</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="228" to="250" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Immune from cyberfire? The psychological and physiological effects of cyberwarfare</title>
		<author>
			<persName><forename type="first">D</forename><surname>Canetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Gross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Waismel-Manor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Binary Bullets: The Ethics of Cyberwarfare</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Allhoff</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Henschke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Strawser</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="157" to="176" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<analytic>
		<title level="a" type="main">How cyberattacks terrorize: Cortisol and personal insecurity jump in the wake of cyberattacks</title>
		<author>
			<persName><forename type="first">D</forename><surname>Canetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gross</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Waismel-Manor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Levanon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Cohen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cyberpsychology, Behavior and Social Networking</title>
		<imprint>
			<biblScope unit="volume">20</biblScope>
			<biblScope unit="page" from="72" to="77" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Ethical frameworks for cybersecurity</title>
		<author>
			<persName><forename type="first">M</forename><surname>Loi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Christen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">The Ethics of Cybersecurity</title>
				<editor>
			<persName><forename type="first">M</forename><surname>Christen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><surname>Gordjin</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Loi</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer Open</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="73" to="95" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">The ethics of online military information activities</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">S</forename><surname>Hempson-Jones</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Military Ethics</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="page" from="211" to="223" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Cyberwarfare as ideal war</title>
		<author>
			<persName><forename type="first">R</forename><surname>Jenkins</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Binary Bullets: The Ethics of Cyberwarfare</title>
				<editor>
			<persName><forename type="first">F</forename><surname>Allhoff</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">A</forename><surname>Henschke</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">B</forename><forename type="middle">J</forename><surname>Strawser</surname></persName>
		</editor>
		<imprint>
			<publisher>Oxford University Press</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="89" to="114" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyberdefense</title>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">E</forename><surname>Heckman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>Stech</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Thomas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Schmoker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">W</forename><surname>Tsow</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2015">2015</date>
			<publisher>Springer</publisher>
			<biblScope unit="page">33</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b31">
	<analytic>
		<title level="a" type="main">Creativity and morality in deception</title>
		<author>
			<persName><forename type="first">S</forename><surname>Henderson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Creativity and Morality</title>
				<editor>
			<persName><forename type="first">H</forename><surname>Kapoor</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">C</forename><surname>Kaufman</surname></persName>
		</editor>
		<imprint>
			<publisher>Academic Press</publisher>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="101" to="124" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b32">
	<analytic>
		<title level="a" type="main">Counterplanning deceptions to foil cyber-attack plans</title>
		<author>
			<persName><forename type="first">N</forename><surname>Rowe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Systems, Man and Cybernetics Society Information Assurance Workshop</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="203" to="210" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b33">
	<analytic>
		<title level="a" type="main">A model of deception during cyber-attacks on information systems</title>
		<author>
			<persName><forename type="first">N</forename><surname>Rowe</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE First Symposium on Multi-Agent Security and Survivability</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page" from="21" to="30" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
