Main Article Content
Abstract
In the past decade, quantum technologies have made remarkable progress. Quantum technologies are able to collect and utilize quantum phenomena to facilitate the accomplishment of tasks deemed infeasible by conventional means. Developments of quantum computers and cryptographic protocols have drawn extensive attention of both academia and industry. On one hand, quantum computation facilitates the rapid progress of various tasks/computing. The prime examples are the algorithms for simulating quantum systems, quantum cryptography, and solving the integer factorization and discrete logarithm problems through an algorithm. These advances have important and far-reaching discoveries: the first physical quantum computer was introduced in 2011; quantum cryptography has been used in widely-deployed devices; the first quantum-resistant algorithms were standardized in 2017. Vendors have recently launched their cloud-accessible quantum computers. This is expected to stimulate the rapid development of the quantum industry and its derivative technologies. However, the advantage in the rise of quantum technologies comes concomitant with various new challenges as well. Intractable problems overcome by the conventional methods become vulnerable to their quantum counterparts. New vulnerabilities have been spotted prior to the advent of quantum computers – more sophisticated attacks are underway, and organizations may indeed be breached already but remain unaware of. Furthermore, almost all advanced security technologies rely on the tacit assumption that the computational task required by the adversary is computationally harder than the security-related one. Therefore, the backgrounds of cyber security and quantum technologies call for a thorough rethinking of their avoidances. Under such circumstance, the scientific community should openly discuss the ethical and societal considerations of quantum technologies – what responsible researchers and developers should do to protect the world from their prospective vulnerabilities and harms. This comprehensive survey intends to explore a discussion of these emerging issues.
Keywords
Article Details
Copyright (c) 2025 Wafaa Sallal Abbood, Ali Kahtan Lelo, Nisreen Saad Hadi, Mohammed Abdulhamza Noor (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
- P. Johnson, & Green, M., "Ethical Issues in Quantum Computing and its Application to Cybersecurity," Journal of Information Ethics, vol. 29, no. 2, pp. 105-121, 2021, doi: https://doi.org/10.14738/tecs.1303.18824.
- S. Kim and H. Choi, "Human-Centered Approaches to Quantum Technology in Security," Cybersecurity Review, vol. 7, no. 3, pp. 234-243, 2020.
- M. Lee and T. Anderson, "Quantum Computing and Its Ethical Dilemmas in the Age of Cybersecurity," Quantum Science and Technology, vol. 7, no. 1, pp. 12-24, 2022.
- M. Dery and J. Bohr, "Ethical Considerations in the Implementation of Quantum Cryptography," Cybersecurity and Society, vol. 5, no. 2, pp. 56–71, 2023.
- N. Hoang and P. Dang, "Ethical Governance in Quantum Computing Systems," Cyber Policy Journal, vol. 12, no. 2, pp. 77-88, 2022.
- X. Zhang and J. Lee, "Ensuring Privacy and Security in the Age of Quantum Technologies: An Ethical Framework," Journal of Information Security, vol. 39, no. 1, pp. 17-31, 2021.
- M. Krentel and C. Smith, "The Ethics of Quantum Cryptography for Data Privacy," Journal of Technology Ethics, vol. 9, no. 1, pp. 1-15, 2020.
- E. Grobler and A. Moos, "Societal Impacts of Quantum Computing in Data Privacy," Journal of Cybersecurity, vol. 15, no. 4, pp. 213–227, 2021.
- J. Young and R. Patel, "Challenges in Quantum Computing and the Role of Cybersecurity," Future Computing Journal, vol. 8, no. 1, pp. 56-69, 2022.
- R. Duncan and P. Warren, "A Framework for Ethical Cybersecurity in Quantum Networks," Quantum Information Science, vol. 4, no. 2, pp. 134-148, 2021.
- H. Marshall and A. Thompson, "Trust, Security, and Ethics in Quantum-Based Internet Systems," Quantum Information and Ethics, vol. 3, no. 4, pp. 21–33, 2020.
- A. Singh and X. Zhang, "Cybersecurity as a Human-Centered Concern in Quantum Era," Journal of Quantum Cryptography, vol. 9, no. 4, pp. 341–358, 2021.
- S. Muthukrishnan and M. Reddy, "Privacy Concerns and Ethical Standards in Quantum-Encrypted Communications," International Journal of Cybersecurity, vol. 12, no. 1, pp. 102–115, 2022.
- R. Benitez and D. Fernandez, "Ethical Implications of Quantum Technologies in Cybersecurity Policies," Cyber Policy and Ethics Journal, vol. 5, no. 2, pp. 64-78, 2021.
- H. Yu and Q. Wang, "Social Responsibility in Cybersecurity for Quantum Computing," Computing and Society, vol. 17, no. 3, pp. 189–205, 2020.
- E. Davis and G. Harris, "Human-Centered Design and Ethical Security in the Quantum Age," International Review of Information Ethics, vol. 19, no. 3, pp. 157–169, 2021.
- Z. Wei and D. Liao, "The Future of Quantum Cybersecurity and Ethical Challenges," Journal of Quantum Security, vol. 13, no. 2, pp. 120–135, 2022.
- P. Patel and V. Chawla, "Ethics in Quantum Network Security: A New Approach," Journal of Information Privacy, vol. 11, no. 1, pp. 34–50, 2020.
- G. Ross and K. Sharma, "Legal and Ethical Implications of Quantum Technologies in Cyber Defense," International Journal of Legal Informatics, vol. 13, no. 3, pp. 212-228, 2022.
- J. Langley and R. Schmidt, "Ethical Governance of Quantum Technology in Cybersecurity," Quantum Computing Ethics, vol. 6, no. 4, pp. 149-162, 2021.
- B. Kitchenham, "Procedures for performing systematic reviews," Keele University, Keele, UK, 2004.
- J. Webster and R. T. Watson, "Analyzing the past to prepare for the future: Writing a literature review," MIS Quarterly, vol. 26, no. 2, pp. xiii-xxiii, 2002.
- H. Snyder, "Literature review as a research methodology: An overview and guidelines," Journal of business research, vol. 104, pp. 333-339, 2019, doi: https://doi.org/10.1016/j.jbusres.2019.07.039.
References
P. Johnson, & Green, M., "Ethical Issues in Quantum Computing and its Application to Cybersecurity," Journal of Information Ethics, vol. 29, no. 2, pp. 105-121, 2021, doi: https://doi.org/10.14738/tecs.1303.18824.
S. Kim and H. Choi, "Human-Centered Approaches to Quantum Technology in Security," Cybersecurity Review, vol. 7, no. 3, pp. 234-243, 2020.
M. Lee and T. Anderson, "Quantum Computing and Its Ethical Dilemmas in the Age of Cybersecurity," Quantum Science and Technology, vol. 7, no. 1, pp. 12-24, 2022.
M. Dery and J. Bohr, "Ethical Considerations in the Implementation of Quantum Cryptography," Cybersecurity and Society, vol. 5, no. 2, pp. 56–71, 2023.
N. Hoang and P. Dang, "Ethical Governance in Quantum Computing Systems," Cyber Policy Journal, vol. 12, no. 2, pp. 77-88, 2022.
X. Zhang and J. Lee, "Ensuring Privacy and Security in the Age of Quantum Technologies: An Ethical Framework," Journal of Information Security, vol. 39, no. 1, pp. 17-31, 2021.
M. Krentel and C. Smith, "The Ethics of Quantum Cryptography for Data Privacy," Journal of Technology Ethics, vol. 9, no. 1, pp. 1-15, 2020.
E. Grobler and A. Moos, "Societal Impacts of Quantum Computing in Data Privacy," Journal of Cybersecurity, vol. 15, no. 4, pp. 213–227, 2021.
J. Young and R. Patel, "Challenges in Quantum Computing and the Role of Cybersecurity," Future Computing Journal, vol. 8, no. 1, pp. 56-69, 2022.
R. Duncan and P. Warren, "A Framework for Ethical Cybersecurity in Quantum Networks," Quantum Information Science, vol. 4, no. 2, pp. 134-148, 2021.
H. Marshall and A. Thompson, "Trust, Security, and Ethics in Quantum-Based Internet Systems," Quantum Information and Ethics, vol. 3, no. 4, pp. 21–33, 2020.
A. Singh and X. Zhang, "Cybersecurity as a Human-Centered Concern in Quantum Era," Journal of Quantum Cryptography, vol. 9, no. 4, pp. 341–358, 2021.
S. Muthukrishnan and M. Reddy, "Privacy Concerns and Ethical Standards in Quantum-Encrypted Communications," International Journal of Cybersecurity, vol. 12, no. 1, pp. 102–115, 2022.
R. Benitez and D. Fernandez, "Ethical Implications of Quantum Technologies in Cybersecurity Policies," Cyber Policy and Ethics Journal, vol. 5, no. 2, pp. 64-78, 2021.
H. Yu and Q. Wang, "Social Responsibility in Cybersecurity for Quantum Computing," Computing and Society, vol. 17, no. 3, pp. 189–205, 2020.
E. Davis and G. Harris, "Human-Centered Design and Ethical Security in the Quantum Age," International Review of Information Ethics, vol. 19, no. 3, pp. 157–169, 2021.
Z. Wei and D. Liao, "The Future of Quantum Cybersecurity and Ethical Challenges," Journal of Quantum Security, vol. 13, no. 2, pp. 120–135, 2022.
P. Patel and V. Chawla, "Ethics in Quantum Network Security: A New Approach," Journal of Information Privacy, vol. 11, no. 1, pp. 34–50, 2020.
G. Ross and K. Sharma, "Legal and Ethical Implications of Quantum Technologies in Cyber Defense," International Journal of Legal Informatics, vol. 13, no. 3, pp. 212-228, 2022.
J. Langley and R. Schmidt, "Ethical Governance of Quantum Technology in Cybersecurity," Quantum Computing Ethics, vol. 6, no. 4, pp. 149-162, 2021.
B. Kitchenham, "Procedures for performing systematic reviews," Keele University, Keele, UK, 2004.
J. Webster and R. T. Watson, "Analyzing the past to prepare for the future: Writing a literature review," MIS Quarterly, vol. 26, no. 2, pp. xiii-xxiii, 2002.
H. Snyder, "Literature review as a research methodology: An overview and guidelines," Journal of business research, vol. 104, pp. 333-339, 2019, doi: https://doi.org/10.1016/j.jbusres.2019.07.039.
