11th workshop on privacy in the electronic society
Proceedings of the 2012 ACM conference on Computer and communications security
Spamming for science: active measurement in web 2.0 abuse research
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
A refined ethical impact assessment tool and a case study of its application
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |
The Declaration of Helsinki and Belmont Report motivated the growth of bioethics alongside traditional biomedical research. Unfortunately, no equivalently active ethics discipline has paralleled the growth of computer security research, where serious ethical challenges are regularly raised by studies of increasingly sophisticated security threats (such as worms, botnets, and phishing). In this absence, program committees and funding agencies routinely must judge the acceptability of research studies. Such judgments are often difficult because of a lack of community consensus on ethical standards, disagreement about who should enforce standards and how, and limited experience applying ethical decision-making methods. This article motivates the need for such a community, touching on the extensive field of ethical decision making, examining existing ethical guidelines and enforcement mechanisms used by the computer security research community, and calling the community to joint action to address this broad challenge.