Ethical Guidelines for Computer Security Researchers: "Be Reasonable"

نویسنده

  • Len Sassaman
چکیده

For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers. The computer security researcher can do well to take a cue from the Hippocratic oath: first, do no harm. Of course, were the matter as simple as that, we would not as a community have discussed these issues for the past twenty-five years.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Conducting Cybersecurity Research Legally and Ethically

The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regulate a given research project. Privacy, computer abuse, tort, and contract law are all potentially applicable. Moreover, even when the law permits a research activity, researchers may wonder whether it is ethically perm...

متن کامل

Ethical Considerations when Employing Fake Identities in OSN for Research

Online Social Networks (OSNs) have rapidly become a prominent and widely used service, offering a wealth of personal and sensitive information with significant security and privacy implications. Hence, OSNs are also an important and popular subject for research. To perform research based on real-life evidence, however, researchers may need to access OSN data, such as texts and files uploaded by...

متن کامل

ملاحظات اخلاقی

Background: Global distribution of diseases in recent years has shown that health problems are no longer limited to the geographical borders of a country but are a global. Establishing international research collaboration has been highlighted as an appropriate strategy for confronting health problems. The possibility of exploitation of human subjects and also research capacity in developing c...

متن کامل

اخلاق در پژوهش های

Background: In current medical practice and medical research, most prophylactic, diagnostic and therapeutic procedures involve risks and burdens, ethical standards protect and promote health and rights of human subjects. It is required for researchers and as well as research providers and users of research results to be aware of these standards. Methods: In this article, international re...

متن کامل

Towards Community Standards for Ethical Behavior in Computer Security Research

Since the first distributed attack networks were seen in 1999, computer misuse enabled by botnets, worms, and other vectors has steadily grown. This rapid growth has given rise to a variety of ethical challenges for researchers seeking to combat these threats. For example, if someone has the ability to take control of a botnet, can they just clean up all the infected hosts? Can we deceive users...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010