-
2
-
-
79959444635
-
The problem of proliferation: Guidelines for improving the security of qualitative data in a digital age
-
Aldrige, J., Medina, J., & Ralphs, R. (2009). The problem of proliferation: Guidelines for improving the security of qualitative data in a digital age. Research Ethics Review, 6(1), 3-9.
-
(2009)
Research Ethics Review
, vol.6
, Issue.1
, pp. 3-9
-
-
Aldrige, J.1
Medina, J.2
Ralphs, R.3
-
3
-
-
79959464543
-
-
Anti-Phishing Working Group
-
Anti-Phishing Working Group. (2010). Phishing activity trends report. Retrieved from http://www.antiphishing.org/reports/ apwg-report-q2-2010.pdf.
-
(2010)
Phishing Activity Trends Report
-
-
-
4
-
-
0242591926
-
-
Association for Computing Machinery
-
Association for Computing Machinery. (1998). The 1998 ACM Computing Classification System. Retrieved rom http://www. acm.org/about/class/1998.
-
(1998)
The 1998 ACM Computing Classification System
-
-
-
5
-
-
79959417981
-
Human subjects, agents, or bots: Current issues in ethics and computer security research
-
St. Lucia, February 28- March 4, 2011. Lecture Notes in Computer Science. New York: Springer
-
Aycock, J., Buchanan, E., Dexter, S., & Dittrich, D. (2011). Human subjects, agents, or bots: Current issues in ethics and computer security research. In Proceedings from 2nd workshop on ethics in computer security research, St. Lucia, February 28- March 4, 2011. Lecture Notes in Computer Science. New York: Springer.
-
(2011)
Proceedings from 2nd Workshop on Ethics in Computer Security Research
-
-
Aycock, J.1
Buchanan, E.2
Dexter, S.3
Dittrich, D.4
-
9
-
-
77956405137
-
Human non-subjects research ": Privacy and compliance
-
Brothers, K. & Clayton, E. W. (2010). "Human non-subjects research ": Privacy and compliance. The American Journal of Bioethics, 10(9), 15-17.
-
(2010)
The American Journal of Bioethics
, vol.10
, Issue.9
, pp. 15-17
-
-
Brothers, K.1
Clayton, E.W.2
-
10
-
-
79959423508
-
Internet research ethics: Past, present, future
-
C. Ess and M. Consalvo (Eds) Oxford: Blackwell
-
Buchanan, E. (2010). Internet research ethics: Past, present, future. In C. Ess and M. Consalvo (Eds.), The Handbook of Internet Studies (pp. 82-108). Oxford: Blackwell.
-
(2010)
The Handbook of Internet Studies
, pp. 82-108
-
-
Buchanan, E.1
-
11
-
-
79959426822
-
E-research and e-planning: Emerging considerations for transformative research
-
(forthcoming)
-
Buchanan, E. (forthcoming). E-research and e-planning: Emerging considerations for transformative research. International Journal of E-Planning Research 1(1).
-
International Journal of E-Planning Research
, vol.1
, pp. 1
-
-
Buchanan, E.1
-
12
-
-
79959466691
-
Internet research ethics and the institutional review board: Current practices and issues
-
Buchanan, E. & Ess, C. (2009). Internet research ethics and the institutional review board: Current practices and issues. ACM SIGCAS Computers and Society, 39(3), 43-49.
-
(2009)
ACM SIGCAS Computers and Society
, vol.39
, Issue.3
, pp. 43-49
-
-
Buchanan, E.1
Ess, C.2
-
13
-
-
79959420300
-
-
PRIM&R Annual Conference Presentation. San Diego, CA
-
Buchanan, E., Gallant, D., Odwazny, L. & Miller, M. (2011). Internet research ethics. PRIM&R Annual Conference Presentation. San Diego, CA.
-
(2011)
Internet Research Ethics
-
-
Buchanan, E.1
Gallant, D.2
Odwazny, L.3
Miller, M.4
-
14
-
-
68849130653
-
Online survey tools: Ethical and methodological concerns of human research ethics committees
-
Buchanan, E. & Hvizdak, E. (2009). Online survey tools: Ethical and methodological concerns of human research ethics committees. Journal of Empirical Research on Human Research Ethics, 4(2), 37-48.
-
(2009)
Journal of Empirical Research on Human Research Ethics
, vol.4
, Issue.2
, pp. 37-48
-
-
Buchanan, E.1
Hvizdak, E.2
-
15
-
-
0003641378
-
-
Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, Social Sciences and Humanities Research Council of Canada
-
Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, Social Sciences and Humanities Research Council of Canada. (1998). Tri-Council policy statement: Ethical conduct for research involving humans. Retrieved from http://pre.ethics. gc.ca/eng/archives/tcps-eptc/Default.
-
(1998)
Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans
-
-
-
16
-
-
84859517950
-
-
Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, and Social Sciences and Humanities Research Council of Canada
-
Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, and Social Sciences and Humanities Research Council of Canada. (2010). Tri-Council policy statement: Ethical conduct for research involving humans. Retrieved from http://pre.ethics.0020 gc.ca/eng/policy-politique/initiatives/tcps2-eptc2/Default/.
-
(2010)
Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans.
-
-
-
17
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
New York: Association for Computing Machinery
-
Chow, R., Golle, P., Jakobsson, M., Shi, E., Staddon, J., Masuoka, R., & Molina, J. (2009). Controlling data in the cloud: Outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security (pp. 85-90). New York: Association for Computing Machinery.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
18
-
-
0024305420
-
Computing as a discipline
-
Denning, P., Corner, D., Gries, D., Mulder, M., Tucker, A., Turner, A., & Young, P. (1989). Computing as a discipline. Communications of the Association for Computing Machinery, 32(1), 9-23.
-
(1989)
Communications of the Association for Computing Machinery
, vol.32
, Issue.1
, pp. 9-23
-
-
Denning, P.1
Corner, D.2
Gries, D.3
Mulder, M.4
Tucker, A.5
Turner, A.6
Young, P.7
-
19
-
-
18444382016
-
The Ana sanctuary: Women's pro-anorexia narratives in cyberspace
-
Dias, K. (2003). The ana sanctuary: Women's pro-anorexia narratives in cyberspace. Journal of International Women's Studies, 4(2), 31-45. (Pubitemid 40652603)
-
(2003)
Journal of International Women's Studies
, vol.4
, Issue.2
, pp. 31-45
-
-
Dias, K.1
-
20
-
-
84855927160
-
-
(Stevens CS Technical Report 2009-1). Hoboken, NJ: Stevens Institute of Technology
-
Dittrich, D., Bailey, M., & Dietrich, S. (2009). Have we crossed the line? The growing ethical debate in modern computer security research (Stevens CS Technical Report 2009-1). Hoboken, NJ: Stevens Institute of Technology. Retrieved from http://staff.washington.edu/dittrich/papers/dbd2009tr1/.
-
(2009)
Have We Crossed the Line? the Growing Ethical Debate in Modern Computer Security Research
-
-
Dittrich, D.1
Bailey, M.2
Dietrich, S.3
-
21
-
-
79959421312
-
Building an active computer security ethics community
-
Dittrich, D., Bailey, M., & Dietrich, S. (2011). Building an active computer security ethics community. IEEE Security and Privacy, 9(3), 1-9.
-
(2011)
IEEE Security and Privacy
, vol.9
, Issue.3
, pp. 1-9
-
-
Dittrich, D.1
Bailey, M.2
Dietrich, S.3
-
23
-
-
84855925641
-
-
European Commission European Union Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Commission, Directorate of General Justice. (2010). European Union Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Retrieved from http://ec.europa.eu/justice-home/fsj/privacy/ law/index-en.htm.
-
(2010)
Directorate of General Justice
-
-
-
24
-
-
84855925641
-
-
European European Commission Union Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC
-
European Commission, Directorate of General Justice. (2010). European Union Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Retrieved from http://ec.europa. eu/justice-home/fsj/privacy/law/index-en.htm.
-
(2010)
Directorate of General Justice
-
-
-
25
-
-
34147139319
-
Designing ethical phishing experiments
-
DOI 10.1109/MTAS.2007.335565, Special Issue on Security and Usability
-
Finn, P. & Jakobsson, M. (2007). Designing ethical phishing experiments. IEEE Technology and Society Magazine, 26(1), 46-58. (Pubitemid 46563123)
-
(2007)
IEEE Technology and Society Magazine
, vol.26
, Issue.1
, pp. 46-58
-
-
Finn, P.1
Jakobsson, M.2
-
26
-
-
3242774495
-
On the morality of artificial agents
-
Floridi, L. (2004). On the morality of artificial agents. Minds and Machines, 14(3), 349-379.
-
(2004)
Minds and Machines
, vol.14
, Issue.3
, pp. 349-379
-
-
Floridi, L.1
-
29
-
-
84864582498
-
IRBs and security research: Myths, facts and mission creep
-
Berkeley, CA: USENIX Association
-
Garfinkel, S. (2008). IRBs and security research: Myths, facts and mission creep. In UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security. Berkeley, CA: USENIX Association.
-
(2008)
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
-
-
Garfinkel, S.1
-
30
-
-
84998708540
-
Software engineering code of ethics is approved
-
Gotterbarn, D., Miller, K., & Rogerson, S. (1999). Software engineering code of ethics is approved. Communications of the Association for Computing Machinery, 42(10), 102-107.
-
(1999)
Communications of the Association for Computing Machinery
, vol.42
, Issue.10
, pp. 102-107
-
-
Gotterbarn, D.1
Miller, K.2
Rogerson, S.3
-
31
-
-
0035575508
-
Ethical issues in software engineering research: A survey of current practice
-
DOI 10.1023/A:1011922615502
-
Hall, T. & Flynn, V. (2001). Ethical issues in software engineering research: A survey of current practice. Empirical Software Engineering: An International Journal, 6(4), 305-317. (Pubitemid 33067820)
-
(2001)
Empirical Software Engineering
, vol.6
, Issue.4
, pp. 305-317
-
-
Hall, T.1
Flynn, V.2
-
32
-
-
84855953127
-
-
Harvard University
-
Harvard University. (2010). Harvard research data security policy. Retrieved from http://security.harvard.edu/research-data security- policy.
-
(2010)
Harvard Research Data Security Policy
-
-
-
33
-
-
69949171348
-
Cloud computing and information policy: Computing in a policy cloud
-
Jaeger, P. T., Lin, J., & Grimes, J. M. (2008). Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology & Politics, 5(3), 269-283.
-
(2008)
Journal of Information Technology & Politics
, vol.5
, Issue.3
, pp. 269-283
-
-
Jaeger, P.T.1
Lin, J.2
Grimes, J.M.3
-
34
-
-
41949126461
-
Why and how to perform fraud experiments
-
DOI 10.1109/MSP.2008.52, 4480466
-
Jakobsson, M., Finn, P., & Johnson, N. (2008). Why and how to perform fraud experiments. IEEE Security & Privacy, 6(2), 66-68. (Pubitemid 351506258)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Johnson, N.2
Finn, P.3
-
35
-
-
0004197846
-
-
Englewood Cliffs, NJ: Prentice Hall
-
Johnson, D. (2009). Computer ethics. Englewood Cliffs, NJ: Prentice Hall.
-
(2009)
Computer Ethics
-
-
Johnson, D.1
-
36
-
-
77956150836
-
A framework for understanding and applying ethical principles in network and security research
-
R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, & F. Sebé (Eds) New York: Springer
-
Kenneally, E., Bailey, M., & Maughan, D. (2010). A framework for understanding and applying ethical principles in network and security research. In R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, & F. Sebé (Eds.), Financial Cryptography and Data Security (pp. 240-246). New York: Springer.
-
(2010)
Financial Cryptography and Data Security
, pp. 240-246
-
-
Kenneally, E.1
Bailey, M.2
Maughan, D.3
-
37
-
-
13144249147
-
Painting a truer picture of US socioeconomic and racial/ethnic health inequalities: The public health disparities geocoding project
-
DOI 10.2105/AJPH.2003.032482
-
Krieger, N., Chen, J., Waterman, P., Rehkopf, D., & Subramanian, S. V. (2005). Painting a truer picture of U.S. socioeconomic and racial/ethnic health inequalities: The Public Health Disparities Geocoding Project. American Journal of Public Health, 95(2), 312-323. (Pubitemid 40179832)
-
(2005)
American Journal of Public Health
, vol.95
, Issue.2
, pp. 312-323
-
-
Krieger, N.1
Chen, J.T.2
Waterman, P.D.3
Rehkopf, D.H.4
Subramanian, S.V.5
-
38
-
-
0035575597
-
Mixing software engineering research and development - What needs ethical review and what does not?
-
DOI 10.1023/A:1011974632340
-
Lethbridge, T. C. (2001). Mixing software engineering research and development: What needs ethical review and does not? Empirical Software Engineering: An International Journal, 6(4), 319-321. (Pubitemid 33067821)
-
(2001)
Empirical Software Engineering
, vol.6
, Issue.4
, pp. 319-321
-
-
Lethbridge, T.C.1
-
39
-
-
57349192830
-
On the difficulty of replicating human subjects studies in software engineering
-
Leipzig, Germany, May 10-18, 2008. New York Association for Computing Machinery
-
Lung, J., Aranda, J., Easterbrook, S., & Wilson, G. (2008). On the difficulty of replicating human subjects studies in software engineering. In Proceedings of the 30th International Conference on Software Engineering (ICSE'08), Leipzig, Germany, May 10-18, 2008. New York: Association for Computing Machinery. Retrieved from http://www.cs.toronto.edu/~sme/papers/2008/ Lung- ICSE2008.pdf.
-
(2008)
Proceedings of the 30th International Conference on Software Engineering (ICSE'08)
-
-
Lung, J.1
Aranda, J.2
Easterbrook, S.3
Wilson, G.4
-
40
-
-
84976659185
-
Artificial life meets entertainment: Life like autonomous agents
-
Maes, P. (1995). Artificial life meets entertainment: Life like autonomous agents. Communications of the Association for Computing Machinery, 38(11), 108-114.
-
(1995)
Communications of the Association for Computing Machinery
, vol.38
, Issue.11
, pp. 108-114
-
-
Maes, P.1
-
43
-
-
79956068984
-
Fieldwork in the age of digital reproduction: A review of the potentials and limitations of Google Earth for archaeologists
-
New Brunswick NJ: IEEE Publications. Myers, A
-
New Brunswick, NJ: IEEE Publications. Myers, A. (2010). Fieldwork in the age of digital reproduction: A review of the potentials and limitations of Google Earth for archaeologists. SAA Archaeological Record, 10(4), 7-11.
-
(2010)
SAA Archaeological Record
, vol.10
, Issue.4
, pp. 7-11
-
-
-
44
-
-
84874479631
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology. (2010). NIST cloud computing program. Retrieved from http://www.nist. gov/itl/cloud/.
-
(2010)
NIST Cloud Computing Program
-
-
-
46
-
-
77949860273
-
Human subjects protections in communityengaged research: A research ethics framework
-
Ross, L, Loup, A., Nelson, R., Botkin, J., Kost, R., Smith, G., & Gehlert, S . (2010). Human subjects protections in communityengaged research: A research ethics framework. Journal of Empirical Research on Human Research Ethics, 5(1), 5-17.
-
(2010)
Journal of Empirical Research on Human Research Ethics
, vol.5
, Issue.1
, pp. 5-17
-
-
Ross, L.1
Loup, A.2
Nelson, R.3
Botkin, J.4
Kost, R.5
Smith, G.6
Gehlert, S.7
-
47
-
-
79959405213
-
Relationships between community-based processes for research ethics review and institution-based IRBs: A national study
-
Shore, N., Drew, E., Brazauskas, R., & Seifer, S. D. (2011). Relationships between community-based processes for research ethics review and institution-based IRBs: A national study. Journal of Empirical Research on Human Research Ethics, 6(2), 13-21.
-
(2011)
Journal of Empirical Research on Human Research Ethics
, vol.6
, Issue.2
, pp. 13-21
-
-
Shore, N.1
Drew, E.2
Brazauskas, R.3
Seifer, S.D.4
-
48
-
-
0035575507
-
Why and how research ethics matters to you. Yes, You!
-
DOI 10.1023/A:1011998412776
-
Singer, J. & Vinson, N. (2001). Why and how research ethics matters to you. Yes, you! Empirical Software Engineering: An International Journal, 6(4), 287-290. (Pubitemid 33067815)
-
(2001)
Empirical Software Engineering
, vol.6
, Issue.4
, pp. 287-290
-
-
Singer, J.1
Vinson, N.2
|