A Refined Ethical Impact Assessment Tool and a Case Study of Its Application
- 986 Downloads
Research of or involving Information and Communications Technology (ICT) presents a wide variety of ethical challenges and the relative immaturity of ethical decision making in the ICT research community has prompted calls for additional research and guidance. The Menlo report, a revisiting of the seminal Belmont report, seeks to bring clarity to this arena by articulating a basic set of ethical principles for ICT research. However the gap between such principles and actionable guidance for the ethical conduct of ICT research is large. In previous work we sought to bridge this gap through the construction of an ethical impact assessment (EIA) tool that provided a set of guiding questions to help researchers understand how to apply the Menlo principles. While a useful tool, experiences in the intervening years have caused us to rethink and expand the EIA. In this paper we: (i) discuss the various challenges encountered in applying the original EIA, (ii) present a new EIA framework that represents our evolved understanding, and (iii) retrospectively apply this EIA to an ethically challenging, original study in ICTR.
KeywordsInternet Protocol Address Criminal Enterprise Master Server Legitimate Brand Indirect Harm
Unable to display preview. Download preview PDF.
- 1.Carpenter, K., Dittrich, D.: Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research. In: 1st International Digital Ethics Symposium. Loyola University Chicago Center for Digital Ethics and Policy (2011)Google Scholar
- 3.Dittrich, D., Bailey, M., Dietrich, S.: Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research. In: (Poster at) Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS 2009), Chicago, Illinois, USA (November 2009)Google Scholar
- 4.Dittrich, D., Bailey, M., Dietrich, S.: Towards Community Standards for Ethical Behavior in Computer Security Research. Technical Report 2009-01, Stevens Institute of Technology, Hoboken, NJ, USA (April 2009)Google Scholar
- 6.Dittrich, D., Kenneally, E. (eds.): The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research, http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560.pdf
- 7.Dittrich, D., Kenneally, E. (eds.): Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Department of Homeland Security Menlo Report (January 2012)Google Scholar
- 8.The National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research National. The Belmont Report - Ethical Principles and Guidelines for the protection of human subjects of research, 1978. U.S. Government Printing Office. DHEW Publication No. (OS) 78-0008. Reprinted in Federal Register 44, 23192 (April 18, 1979)Google Scholar
- 9.Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G.M., Paxson, V., Savage, S.: Spamalytics: an empirical analysis of spam marketing conversion. In: CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 3–14 (2008)Google Scholar
- 10.Kenneally, E., Bailey, M., Maughan, D.: A Tool for Understanding and Applying Ethical Principles in Network and Security Research. In: Workshop on Ethics in Computer Security Research (WECSR 2010), Tenerife, Canary Islands, Spain (January 2010)Google Scholar
- 11.Mascarenhas-Keyes, S.: Ethical Dilemmas in Professional Practice in Anthropology (July 2008), http://www.theasa.org/networks/apply/ethics/analysis/stakeholder.html