Skip to main content

A Framework for Understanding and Applying Ethical Principles in Network and Security Research

  • Conference paper
Book cover Financial Cryptography and Data Security (FC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6054))

Included in the following conference series:

Abstract

Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By providing this prototype ethical impact assessment, we seek to encourage community feedback on the working group’s nascent efforts and spur researchers to concretely evaluate the ethical impact of their work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Protected repository for the defense of infrastructure against cyber threats (PREDICT), http://www.predict.org

  2. ACM Council. Code of Ethics and Professional Conduct (October 1992), http://www.acm.org/about/code-of-ethics

  3. Allman, M.: What ought a program committee to do? In: WOWCS 2008: Proceedings of the USENIX Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems, pp. 1–5 (2008)

    Google Scholar 

  4. Baase, S.: A Gift of Fire: Social, Legal, and Ethical Issues in Computing. Prentice Hall PTR, Upper Saddle River (2002)

    Google Scholar 

  5. Burstein, A.J.: Conducting cybersecurity research legally and ethically. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1–8 (2008)

    Google Scholar 

  6. Bynum, T.W., Rogerson, S.: Computer Ethics and Professional Responsibility: Introductory Text and Readings. Blackwell Publishers, Inc., Cambridge (2003)

    Google Scholar 

  7. Dittrich, D., Bailey, M.D., Dietrich, S.: Towards community standards for ethical behavior in computer security research. Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA (April 2009)

    Google Scholar 

  8. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. The belmont report - ethical principles and guidelines for the protection of human subjects of research, http://ohsr.od.nih.gov/guidelines/belmont.html

  9. Garfinkel, S.L.: IRBs and security research: Myths, facts and mission creep. In: Proceedings of UPSEC 2008 (Usability, Psychology and Security) (April 2008)

    Google Scholar 

  10. IEEE Board of Directors. IEEE Code of Ethics (February 2006), http://www.ieee.org/portal/pages/iportals/aboutus/ethics/code.html

  11. Johnson, D.G., Miller, K.W. (eds.): Computers Ethics. Prentice-Hall, Inc., Upper Saddle River (2009)

    Google Scholar 

  12. Kenneally, E.: What’s belmont got to do with it?, http://blog.caida.org/best_available_data/2009/06/12/whatelmont-got-to-do-with-it/

  13. Kenneally, E., Claffy, K.: An internet sharing framework for balancing privacy and utility. In: Engaging Data: First International Forum on the Application and Management of Personal Electronic Information. MIT, IEEE (October 2009)

    Google Scholar 

  14. DHS Privacy Office. DHS official privacy impact assessment guidance, http://www.dhs.gov/files/publications/gc_1209396374339.shtm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kenneally, E., Bailey, M., Maughan, D. (2010). A Framework for Understanding and Applying Ethical Principles in Network and Security Research. In: Sion, R., et al. Financial Cryptography and Data Security. FC 2010. Lecture Notes in Computer Science, vol 6054. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14992-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14992-4_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14991-7

  • Online ISBN: 978-3-642-14992-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics