ABSTRACT
Ethics is an important criterion for security research. This work presents the current status and trends that security researchers have taken to address ethical concerns in their studies from a data perspective. In particular, we created a dataset of 3,756 papers published in three top-tier conferences between 2010 and 2022, among which 963 papers were identified with ethical concerns. With this dataset, we provided answers to three questions regarding the current practices and trends: (1) What is the landscape of ethical considerations in security research? For example, how many security research projects have raised ethical concerns in their studies, and which research areas are likely to cause ethical risks and concerns? (2) What are the current practices to address these ethical risks? And (3) What are the important factors impacting the ethical awareness of researchers?
- Michael Bailey, David Dittrich, Erin Kenneally, and Doug Maughan. 2012. The menlo report. IEEE Security & Privacy, Vol. 10, 2 (2012), 71--75.Google ScholarDigital Library
- ACM CCS. 2018. ACM CCS 2018 Call for papers. https://www.sigsac.org/ccs/CCS2018/papers/Google Scholar
- Leonard Richardson. 2007. Beautiful soup documentation.Google Scholar
- IEEE S&P. 2017. 38th IEEE Symposium on Security and Privacy Call for papers. https://www.ieee-security.org/TC/SP2017/cfpapers.htmlGoogle Scholar
- IEEE S&P. 2023. 44th IEEE Symposium on Security and Privacy Call for papers. https://sp2023.ieee-security.org/cfpapers.htmlGoogle Scholar
- USENIX. 2012. 22nd USENIX Security Symposium Call for papers. https://www.usenix.org/conference/usenixsecurity13/call-for-papersGoogle Scholar
Index Terms
- Poster: Ethics of Computer Security and Privacy Research - Trends and Standards from a Data Perspective
Recommendations
Moral luck and computer ethics: Gauguin in cyberspace
I argue that the problem of `moral luck' is an unjustly neglected topic within Computer Ethics. This is unfortunate given that the very nature of computer technology, its `logical malleability', leads to ever greater levels of complexity, unreliability ...
Computer Ethics and Neoplatonic Virtue: A Reconsideration of Cyberethics in the Light of Plotinus' Ethical Theory
In normative ethical theory, computer ethics belongs to the area of applied ethics dealing with practical and everyday moral problems arising from the use of computers and computer networks in the information society. Modern scholarship usually approves ...
Flourishing Ethics
This essay describes a new ethical theory that has begun to coalesce from the works of several scholars in the international computer ethics community. I call the new theory Flourishing Ethics' because of its Aristotelian roots, though it also includes ...
Comments