Skip to main content

A Refined Ethical Impact Assessment Tool and a Case Study of Its Application

  • Conference paper
Financial Cryptography and Data Security (FC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7398))

Included in the following conference series:

Abstract

Research of or involving Information and Communications Technology (ICT) presents a wide variety of ethical challenges and the relative immaturity of ethical decision making in the ICT research community has prompted calls for additional research and guidance. The Menlo report, a revisiting of the seminal Belmont report, seeks to bring clarity to this arena by articulating a basic set of ethical principles for ICT research. However the gap between such principles and actionable guidance for the ethical conduct of ICT research is large. In previous work we sought to bridge this gap through the construction of an ethical impact assessment (EIA) tool that provided a set of guiding questions to help researchers understand how to apply the Menlo principles. While a useful tool, experiences in the intervening years have caused us to rethink and expand the EIA. In this paper we: (i) discuss the various challenges encountered in applying the original EIA, (ii) present a new EIA framework that represents our evolved understanding, and (iii) retrospectively apply this EIA to an ethically challenging, original study in ICTR.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carpenter, K., Dittrich, D.: Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research. In: 1st International Digital Ethics Symposium. Loyola University Chicago Center for Digital Ethics and Policy (2011)

    Google Scholar 

  2. Denning, P.J.: ACM President’s Letter: What is experimental computer science? Commun. ACM 23, 543–544 (1980)

    Article  Google Scholar 

  3. Dittrich, D., Bailey, M., Dietrich, S.: Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research. In: (Poster at) Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS 2009), Chicago, Illinois, USA (November 2009)

    Google Scholar 

  4. Dittrich, D., Bailey, M., Dietrich, S.: Towards Community Standards for Ethical Behavior in Computer Security Research. Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA (April 2009)

    Google Scholar 

  5. Dittrich, D., Bailey, M., Dietrich, S.: Building an Active Computer Security Ethics Community. IEEE Security and Privacy 9(4), 32–40 (2011)

    Article  Google Scholar 

  6. Dittrich, D., Kenneally, E. (eds.): The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research, http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560.pdf

  7. Dittrich, D., Kenneally, E. (eds.): Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Department of Homeland Security Menlo Report (January 2012)

    Google Scholar 

  8. The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research National. The Belmont Report - Ethical Principles and Guidelines for the protection of human subjects of research, 1978. U.S. Government Printing Office. DHEW Publication No. (OS) 78-0008. Reprinted in Federal Register 44, 23192 (April 18, 1979)

    Google Scholar 

  9. Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 3–14 (2008)

    Google Scholar 

  10. Kenneally, E., Bailey, M., Maughan, D.: A Tool for Understanding and Applying Ethical Principles in Network and Security Research. In: Workshop on Ethics in Computer Security Research (WECSR 2010), Tenerife, Canary Islands, Spain (January 2010)

    Google Scholar 

  11. Mascarenhas-Keyes, S.: Ethical Dilemmas in Professional Practice in Anthropology (July 2008), http://www.theasa.org/networks/apply/ethics/analysis/stakeholder.html

  12. Vardigan, M., Heus, P., Thomas, W.: Data Documentation Initiative: Toward a Standard for the Social Sciences. International Journal of Digital Curation 3, 107–113 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bailey, M., Kenneally, E., Dittrich, D. (2012). A Refined Ethical Impact Assessment Tool and a Case Study of Its Application. In: Blyth, J., Dietrich, S., Camp, L.J. (eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol 7398. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34638-5_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34638-5_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34637-8

  • Online ISBN: 978-3-642-34638-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics