2010
DOI: 10.1007/978-3-642-14992-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Ethical Guidelines for Computer Security Researchers: “Be Reasonable”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…However, for the sake of consistency the results were filtered for sources that were published before November 2015 discuss particular methodologies for conducting foresight studies, which could be integrated in an approach for practising ethics (such as the Delphi method, anticipatory technology ethics and sociotechnical transition analysis). Sassaman (2010) discusses specific ethical issues for computer security research, but without applying a distinct methodology.…”
Section: Practising Ethics In Different Fields Of Randimentioning
confidence: 99%
“…However, for the sake of consistency the results were filtered for sources that were published before November 2015 discuss particular methodologies for conducting foresight studies, which could be integrated in an approach for practising ethics (such as the Delphi method, anticipatory technology ethics and sociotechnical transition analysis). Sassaman (2010) discusses specific ethical issues for computer security research, but without applying a distinct methodology.…”
Section: Practising Ethics In Different Fields Of Randimentioning
confidence: 99%
“…The field of cybersecurity research sometimes involves ethical choices, legal restrictions, liability concerns, as well as challenging political questions . During the last few years, there have been several studies that discussed ethical considerations and restrictions in cybersecurity and more precisely in botnets research …”
Section: Design Of An Intra‐csp Botnetmentioning
confidence: 99%
“…In this section, we briefly discuss some of the ethical considerations of the botnet research work we have conducted in this paper. We do so by focusing on two questions that are directly related to the different considerations that have been discussed in the context of ethical issues involved in cybersecurity research Was there any harm on the CSP side or on the target side?…”
Section: Design Of An Intra‐csp Botnetmentioning
confidence: 99%
See 2 more Smart Citations