Dartmouth internet security testbed (DIST: building a campus-wide wireless testbed
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
Dartmouth internet security testbed (DIST: building a campus-wide wireless testbed
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
A framework for understanding and applying ethical principles in network and security research
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Bringing science to digital forensics with standardized forensic corpora
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Computer security research with human subjects: risks, benefits and informed consent
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Enforced community standards for research on users of the tor anonymity network
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
Having decided to focus attention on the "weak link" of human fallibility, a growing number of security researchers are discovering the US Government's regulations that govern human subject research. This paper discusses those regulations, their application to research on security and usability, and presents strategies for negotiating the Institutional Review Board (IRB) approval process. It argues that a strict interpretation of regulations has the potential to stymie security research.