Confidentiality, Loyalty, and Responsibility: The Ethical Triad in Information Systems Management in the Field of National Security
DOI:
https://doi.org/10.53477/2065-8281-25-30Keywords:
Intelligent Information Systems, National Security, Ethical Governance, Strategic Decision-Making, Confidentiality.Abstract
With the intensification of hybrid threats, strategic organizations are faced with a fundamental challenge: ensuring a sustainable balance between process transparency, information confidentiality, and decision-making responsibility. This article analyzes the ethical triad of confidentiality, loyalty, and responsibility in the management of information systems in the field of national security, highlighting the need for information governance adapted to the current complexity. At the heart of the analysis is the role of intelligent information systems (IIS), which, by integrating artificial intelligence, machine learning, and behavioral analysis technologies, provide decisive support in modernizing security architectures and strengthening an ethical organizational culture. Intelligent information systems not only optimize threat detection and response processes but also actively contribute to the professionalization of strategic decisions by generating predictive assessments, automatic traceability, and alignment with legal regulations and ethical standards. They allow the transition from a reactive security model to a proactive one, oriented towards anticipation, compliance, and distributed responsibility. In this sense, the article argues that the integration of IIS is no longer an optional technological choice, but a strategic necessity for organizations that manage classified information and critical resources. Through its multidisciplinary approach and theoretically and normatively grounded arguments, the study contributes to the delimitation of a robust conceptual framework regarding the ethical governance of information in national security institutions.
References
Almomani, Iman, Aala Alkhayer, and Walid El-Shafai. 2023. “E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches” Sensors 23 (9): 4467. https://doi.org/10.3390/s23094467
Bell, David Elliott, and Leonard LaPadula. 1973. “Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547”, Vol. I. Bedford, MA: The MITRE Corporation. https://websites.umich.edu/~cja/LPS12b/refs/belllapadula1.pdf
Dignum, Virginia. 2019. “Responsible Artificial Intelligence: How to Develop and Use AI in a Responsible Way”. Springer. https://link.springer.com/book/10.1007/978-3-030-30371-6
Dragomir, Florentina-Loredana, and Gelu Alexandrescu. 2017a. “Applications of Artificial Intelligence in Decision-Making Process”. Bulletin of Carol I National Defense University 4(2): 56–61. https://cssas.unap.ro/en/pdf_periodicals/si63.pdf
___. 2017b. “The Axiomatic Character of Decision”. Bulletin of ”Carol I” National Defense University 6 (1): 16–22. https://www.ceeol.com/search/article-detail?id=548274
Dragomir, Florentina-Loredana., Gelu Alexandrescu, and Florin Postolache. 2018” Tools for hierarchical security “. The 14 the International Scientific Conference “eLearning and Software for Education”, Bucharest, Carol I” National Defence University, April 19 - 20, Advanced Distributed Learning Association, vol. 4, pp. 34–38.
Dragomir-Constantin, Florentina-Loredana. 2025a. “Information System for Macroprudential Policies. “Acta Universitatis Danubius. OEconomica 21 (1): 48–57. https://dj.univ-danubius.ro/index.php/AUDOE/article/view/3254
___. 2025b. “Thinking Patterns in Decision-Making in Information Systems”. New Trends in Psychology 7 (1): 89–98. https://dj.univ-danubius.ro/index.php/NTP/article/view/3255
___. 2025c. “Thinking Traps: How High-Performance Information Systems Correct Cognitive Biases in Decision-Making”. New Trends in Psychology 7 (1) 99–108. https://dj.univ-danubius.ro/index.php/NTP/article/view/3257.
Grigaliūnas, Šarūnas, Michael Schmidt, Rita Brūzgienė, and Smyrli Panagiota. 2024. “Holistic Information Security Management and Compliance Framework”. Kaunas University of Technology. https://epubl.ktu.edu/object/elaba:209322117/
Kent, Karen, and Murugiah Souppaya. 2006. “Guide to Computer Security Log Management. NIST Special Publication 800-92. National Institute of Standards and Technology”. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-92.pdf
Metin, Bilgin, Fatma Gözde Özhan, and Martin Wynn. 2024. “Digitalisation and Cybersecurity: Towards an Operational Framework.” Electronics 13 (21): 4226. https://www.mdpi.com/2079-9292/13/21/4226
Sulaiman, Nur Shafinas, Mohd Azlan Fauzi, Wendy Wider, and Jasmine Rajadurai. 2022. “Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review.” Social Sciences 11 (9): 386. https://www.mdpi.com/2076-0760/11/9/386
Tache, Florentina-Loredana, Postolache Florin, Nachila Cătălin, and Ivan Maria Alexandra. 2010.” Consulting in Electronic Commerce.” Acta Universitatis Danubius. OEconomica 6 (3): 162–169. https://journals.univ-danubius.ro/index.php/oeconomica/article/view/707
Tounsi, Wassim, and Hassen Rais. 2018. “A Survey on Technical Threat Intelligence in the Age of Sophisticated Cyber Attack”. Computers & Security 72. https://www.sciencedirect.com/science/article/abs/pii/S0167404817301839?via%3Dihub
Xu, Yao, Jixin Wei, Ting Mi, and Zhihua Chen. 2024 “Data Security in Autonomous Driving: Multifaceted Challenges of Technology, Law, and Social Ethics.” World Electric Vehicle Journal 16 (1): 6. https://doi.org/10.3390/wevj16010006
Downloads
Published
How to Cite
Issue
Section
License
The published articles are subject to copyright law. All rights are reserved to the “Carol I” National Defense University, regardless of whether all or part of the material are considered, especially the rights to translation, reprinting, re-use of illustrations, quotations, broadcasting through the media, reproduction on microfilms or any other way and storage in data banks. Any replicas without the associated fees are authorized provided the source is acknowledged.
BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY