Knowledge-Base Practicality for Cybersecurity Research Ethics Evaluation

11/05/2020
by   Robert B. Ramirez, et al.
0

Research ethics in Information and Communications Technology has seen a resurgence in popularity in recent years. Although a number of general ethics standards have been issued, cyber security specifically has yet to see one. Furthermore, such standards are often abstract, lacking in guidance on specific practices. In this paper we compare peer-reviewed ethical analyses of condemned research papers to analyses derived from a knowledge base (KB) of concrete cyber security research ethics best practices. The KB we employ was compiled in prior work from a large random survey of research papers. We demonstrate preliminary evidence that such a KB can be used to yield comparable or more extensive ethical analyses of published cyber security research than expert application of standards like the Menlo Report. We extend the ethical analyses of the reviewed manuscripts, and calculate measures of the efficiency with which the expert versus KB methods yield ethical insights.

READ FULL TEXT

page 1

page 2

page 3

page 4

page 5

page 6

page 8

research
11/26/2020

Investigation on Research Ethics and Building a Benchmark

When dealing with leading edge cyber security research, especially when ...
research
10/17/2018

Certified Ethical Hacker v.10 Online Course - a Case Study

CEH v.10 Certification Self-study Course is an online course preparing l...
research
05/16/2019

Using Camouflaged Cyber Simulations as a Model to Ensure Validity in Cybersecurity Experimentation

Experimental research methods describe standards to safeguard scientific...
research
06/06/2023

Applying Standards to Advance Upstream Downstream Ethics in Large Language Models

This paper explores how AI-owners can develop safeguards for AI-generate...
research
12/16/2021

It was hard to find the words: Using an Autoethnographic Diary Study to Understand the Difficulties of Smart Home Cyber Security Practices

This study considers how well an autoethnographic diary study helps as a...
research
01/19/2022

Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges

Advances of emerging Information and Communications Technology (ICT) tec...

Please sign up or login with your details

Forgot password? Click here to reset