Advertisement

A Refined Ethical Impact Assessment Tool and a Case Study of Its Application

  • Michael Bailey
  • Erin Kenneally
  • David Dittrich
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7398)

Abstract

Research of or involving Information and Communications Technology (ICT) presents a wide variety of ethical challenges and the relative immaturity of ethical decision making in the ICT research community has prompted calls for additional research and guidance. The Menlo report, a revisiting of the seminal Belmont report, seeks to bring clarity to this arena by articulating a basic set of ethical principles for ICT research. However the gap between such principles and actionable guidance for the ethical conduct of ICT research is large. In previous work we sought to bridge this gap through the construction of an ethical impact assessment (EIA) tool that provided a set of guiding questions to help researchers understand how to apply the Menlo principles. While a useful tool, experiences in the intervening years have caused us to rethink and expand the EIA. In this paper we: (i) discuss the various challenges encountered in applying the original EIA, (ii) present a new EIA framework that represents our evolved understanding, and (iii) retrospectively apply this EIA to an ethically challenging, original study in ICTR.

Keywords

Internet Protocol Address Criminal Enterprise Master Server Legitimate Brand Indirect Harm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Carpenter, K., Dittrich, D.: Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research. In: 1st International Digital Ethics Symposium. Loyola University Chicago Center for Digital Ethics and Policy (2011)Google Scholar
  2. 2.
    Denning, P.J.: ACM President’s Letter: What is experimental computer science? Commun. ACM 23, 543–544 (1980)CrossRefGoogle Scholar
  3. 3.
    Dittrich, D., Bailey, M., Dietrich, S.: Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research. In: (Poster at) Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS 2009), Chicago, Illinois, USA (November 2009)Google Scholar
  4. 4.
    Dittrich, D., Bailey, M., Dietrich, S.: Towards Community Standards for Ethical Behavior in Computer Security Research. Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA (April 2009)Google Scholar
  5. 5.
    Dittrich, D., Bailey, M., Dietrich, S.: Building an Active Computer Security Ethics Community. IEEE Security and Privacy 9(4), 32–40 (2011)CrossRefGoogle Scholar
  6. 6.
    Dittrich, D., Kenneally, E. (eds.): The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research, http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560.pdf
  7. 7.
    Dittrich, D., Kenneally, E. (eds.): Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Department of Homeland Security Menlo Report (January 2012)Google Scholar
  8. 8.
    The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research National. The Belmont Report - Ethical Principles and Guidelines for the protection of human subjects of research, 1978. U.S. Government Printing Office. DHEW Publication No. (OS) 78-0008. Reprinted in Federal Register 44, 23192 (April 18, 1979)Google Scholar
  9. 9.
    Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 3–14 (2008)Google Scholar
  10. 10.
    Kenneally, E., Bailey, M., Maughan, D.: A Tool for Understanding and Applying Ethical Principles in Network and Security Research. In: Workshop on Ethics in Computer Security Research (WECSR 2010), Tenerife, Canary Islands, Spain (January 2010)Google Scholar
  11. 11.
    Mascarenhas-Keyes, S.: Ethical Dilemmas in Professional Practice in Anthropology (July 2008), http://www.theasa.org/networks/apply/ethics/analysis/stakeholder.html
  12. 12.
    Vardigan, M., Heus, P., Thomas, W.: Data Documentation Initiative: Toward a Standard for the Social Sciences. International Journal of Digital Curation 3, 107–113 (2008)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Michael Bailey
    • 1
  • Erin Kenneally
    • 2
  • David Dittrich
    • 3
  1. 1.Computer Science and EngineeringUniversity of MichiganUSA
  2. 2.Cooperative Association for Internet Data AnalysisUniv. of CaliforniaSan DiegoUSA
  3. 3.Applied Physics LaboratoryUniversity of WashingtonUSA

Personalised recommendations