Skip to main content

It’s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7398)

Introduction

In a world where sensitive data can be published to a worldwide audience with the press of a button, researchers are increasingly making use of datasets that were publicized under questionable circumstances. In many cases, such research would otherwise not be possible. For instance, Weir et al. examined over thirty million user-generated passwords in order to observe the effects of entropy on password cracking [10].

Keywords

  • Computer Security
  • Common Rule
  • Human Subject Protection
  • Institutional Review Board Review
  • Institutional Review Board Committee

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Amitay, D.: Most common iphone passcodes (June 13, 2011), http://amitay.us/blog/files/most_common_iphone_passcodes.php

  2. Bonneau, J., Just, M., Matthews, G.: What’s in a Name? Evaluating Statistical Attacks Against Personal Knowledge Questions. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 98–113. Springer, Heidelberg (2010)

    CrossRef  Google Scholar 

  3. Bonneau, J., Preibusch, S., Anderson, R.: A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 25–40. Springer, Heidelberg (2012), http://www.cl.cam.ac.uk/~jcb82/doc/BPA12-FC-banking_pin_security.pdf

    Google Scholar 

  4. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: WPES 2005: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM, New York (2005)

    CrossRef  Google Scholar 

  5. Komanduri, S., Shay, R., Kelley, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F., Egelman, S.: Of Passwords and People: Measuring the Effect of Password-Composition Policies. In: CHI 2011: Proceeding of the 29th SIGCHI Conference on Human Factors in Computing Systems. ACM Press, New York (2011) (to appear)

    Google Scholar 

  6. Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Proceeding of the 17th ACM Conference on Information and Knowledge Management, CIKM 2008, pp. 289–298. ACM, New York (2008)

    CrossRef  Google Scholar 

  7. Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC 2007, pp. 29–42. ACM, New York (2007)

    CrossRef  Google Scholar 

  8. Skloot, R.: The Immortal Life of Henrietta Lacks. Broadway (2010)

    Google Scholar 

  9. Vance, A.: If your password is 123456, just make it hackme. New York Times, http://www.nytimes.com/2010/01/21/technology/21password.html (January 2010, retrieved September 2010)

  10. Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp. 162–175. ACM, New York (2010), http://doi.acm.org/10.1145/1866307.1866327

    CrossRef  Google Scholar 

  11. Wikipedia: Lenna, http://en.wikipedia.org/wiki/Lenna (accessed: November 2, 2011)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Egelman, S., Bonneau, J., Chiasson, S., Dittrich, D., Schechter, S. (2012). It’s Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. In: Blyth, J., Dietrich, S., Camp, L.J. (eds) Financial Cryptography and Data Security. FC 2012. Lecture Notes in Computer Science, vol 7398. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34638-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34638-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34637-8

  • Online ISBN: 978-3-642-34638-5

  • eBook Packages: Computer ScienceComputer Science (R0)