A Gift of Fire: Social, Legal, and Ethical Issues in Computing
A Gift of Fire: Social, Legal, and Ethical Issues in Computing
Computer Ethics and Professional Responsibility: Introductory Text and Readings
Computer Ethics and Professional Responsibility: Introductory Text and Readings
What ought a program committee to do?
WOWCS'08 Proceedings of the conference on Organizing Workshops, Conferences, and Symposia for Computer Systems
IRBs and security research: myths, facts and mission creep
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Conducting cybersecurity research legally and ethically
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Computer security research with human subjects: risks, benefits and informed consent
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Human subjects, agents, or bots: current issues in ethics and computer security research
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Moving forward, building an ethics community (panel statements)
FC'11 Proceedings of the 2011 international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
Current information and communications technology poses a variety of ethical challenges for researchers. In this paper, we present an intellectual framework for understanding and applying ethical principles in networking and security research rooted in the guidance suggested by an ongoing Department of Homeland Security working group on ethics. By providing this prototype ethical impact assessment, we seek to encourage community feedback on the working group's nascent efforts and spur researchers to concretely evaluate the ethical impact of their work.