2013
DOI: 10.2139/ssrn.2342036
|View full text |Cite
|
Sign up to set email alerts
|

Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(39 citation statements)
references
References 25 publications
0
39
0
Order By: Relevance
“…However, according to established ethical principles and guidelines (for example, the British Society of Criminology's statement on ethics [34]), informed consent may not be required when a) the dataset is collected from the Internet and thus it is publicly accessible, and b) the data will be used for research on collective behaviour, without aiming to identify particular members. Where informed consent is not obtained, the role of the REB is particularly important, as this is the oversight mechanism that protects the interests of the research participants [10,34].…”
Section: Ethical Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, according to established ethical principles and guidelines (for example, the British Society of Criminology's statement on ethics [34]), informed consent may not be required when a) the dataset is collected from the Internet and thus it is publicly accessible, and b) the data will be used for research on collective behaviour, without aiming to identify particular members. Where informed consent is not obtained, the role of the REB is particularly important, as this is the oversight mechanism that protects the interests of the research participants [10,34].…”
Section: Ethical Issuesmentioning
confidence: 99%
“…10 This is not an underground forum, and its primary intent is to cater for researchers and malware analysts. However, it has an active forum for sharing malware binaries and has a special section for malware-related tools like anti-debuggers or crypters, which can be abused by malicious actors.…”
Section: The Crimebb Datasetmentioning
confidence: 99%
“…The purpose of the initiative was to translate the principles of the Belmont Report (which deals with human subject studies in the medical and social sciences) to the ICT Research context, with possible additions. The companion report [17] to the Menlo report describes example cases and explain how ethical analyses of these cases are performed. Partridge and Allman have made the case for an Ethical Considerations paragraph in Network Measurements publications [18].…”
Section: Related Workmentioning
confidence: 99%
“…David and Morley Mao (U. Michigan) designed Mobilyzer with researcher incentives in mind, so it simplifies app development, uses a PlanetLab-like participation model, provides dynamic server-side control of measurement, and has a published privacy policy. 3 Valerio Luconi (U. Pisa) introduced Portolan, a smartphone-based crowd-sourced project to measure wired and wireless infrastructure. The architecture includes a server at the university, proxy devices that act as front ends to handle teams of smartphones, and 300 Android devices running the Portolan app, mostly in the United States and Europe.…”
Section: Collecting Measurements On User Smartphonesmentioning
confidence: 99%
“…Given that the international landscape is fragmented, and perceptions are changing around the word, he suggested an approach that would give researchers and IRBs tools (and time) to talk, with basic changes to current processes such as new forms with assistive questions and links to informative background related to a given guideline. Subsequent discussion explored the risk of disaster-driven progress, and the future benefit the community may gain by being prepared for overreactive policy positions; such preparation could include developing guideline document drafts, e.g., [1,5,3]. There was extensive discussion across multiple sessions of privacy models in mobile data, including whether it was possible to transfer some knowledge or processes from the Census Bureau to control use of privacysensitive data.…”
Section: Economic and Policy Challengesmentioning
confidence: 99%