Abstract
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By providing this prototype ethical impact assessment, we seek to encourage community feedback on the working group’s nascent efforts and spur researchers to concretely evaluate the ethical impact of their work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Protected repository for the defense of infrastructure against cyber threats (PREDICT), http://www.predict.org
ACM Council. Code of Ethics and Professional Conduct (October 1992), http://www.acm.org/about/code-of-ethics
Allman, M.: What ought a program committee to do? In: WOWCS 2008: Proceedings of the USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems, pp. 1–5 (2008)
Baase, S.: A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Prentice Hall PTR, Upper Saddle River (2002)
Burstein, A.J.: Conducting cybersecurity research legally and ethically. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1–8 (2008)
Bynum, T.W., Rogerson, S.: Computer Ethics and Professional Responsibility: Introductory Text and Readings. Blackwell Publishers, Inc., Cambridge (2003)
Dittrich, D., Bailey, M.D., Dietrich, S.: Towards community standards for ethical behavior in computer security research. Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA (April 2009)
National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The belmont report - ethical principles and guidelines for the protection of human subjects of research, http://ohsr.od.nih.gov/guidelines/belmont.html
Garfinkel, S.L.: IRBs and security research: Myths, facts and mission creep. In: Proceedings of UPSEC 2008 (Usability, Psychology and Security) (April 2008)
IEEE Board of Directors. IEEE Code of Ethics (February 2006), http://www.ieee.org/portal/pages/iportals/aboutus/ethics/code.html
Johnson, D.G., Miller, K.W. (eds.): Computers Ethics. Prentice-Hall, Inc., Upper Saddle River (2009)
Kenneally, E.: What’s belmont got to do with it?, http://blog.caida.org/best_available_data/2009/06/12/whatelmont-got-to-do-with-it/
Kenneally, E., Claffy, K.: An internet sharing framework for balancing privacy and utility. In: Engaging Data: First International Forum on the Application and Management of Personal Electronic Information. MIT, IEEE (October 2009)
DHS Privacy Office. DHS official privacy impact assessment guidance, http://www.dhs.gov/files/publications/gc_1209396374339.shtm
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kenneally, E., Bailey, M., Maughan, D. (2010). A Framework for Understanding and Applying Ethical Principles in Network and Security Research. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-14992-4_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14991-7
Online ISBN: 978-3-642-14992-4
eBook Packages: Computer ScienceComputer Science (R0)