102 ◾ Ethical IT Innovation
formulate security requirements for systems. e security
requirements are then used to analyze and congure sys-
tems’ security levels. One of these criteria is the use of audit
trails for all security-relevant activities.
8.3.2.1 Security Audits versus Privacy Efforts
In earlier chapters I regularly commented on people’s privacy
concerns. Privacy often comes to mind when we talk about
security engineering. For ordinary people, security-relevant
activities seem to be those that equally help to protect their per-
sonal information. However, end-user data protection or pri-
vacy is not really in the spotlight when systems are audited for
security goals. Only those personal information databases that
are also nancia