메뉴 건너뛰기




Volumn 6, Issue 2, 2011, Pages 71-83

Computer science security research and human subjects: Emerging considerations for research ethics boards

Author keywords

Computer ethics; Computer science research; Computer security; Data security; Human subjects review; Internet research; IRB; Research ethics; Research ethics boards; Research regulation

Indexed keywords

ARTICLE; COMPUTER SECURITY; ETHICS; HUMAN; HUMAN EXPERIMENT; PROFESSIONAL STANDARD; RESEARCH ETHICS; RESEARCH SUBJECT;

EID: 79959417340     PISSN: 15562646     EISSN: 15562654     Source Type: Journal    
DOI: 10.1525/jer.2011.6.2.71     Document Type: Article
Times cited : (25)

References (52)
  • 2
    • 79959444635 scopus 로고    scopus 로고
    • The problem of proliferation: Guidelines for improving the security of qualitative data in a digital age
    • Aldrige, J., Medina, J., & Ralphs, R. (2009). The problem of proliferation: Guidelines for improving the security of qualitative data in a digital age. Research Ethics Review, 6(1), 3-9.
    • (2009) Research Ethics Review , vol.6 , Issue.1 , pp. 3-9
    • Aldrige, J.1    Medina, J.2    Ralphs, R.3
  • 3
    • 79959464543 scopus 로고    scopus 로고
    • Anti-Phishing Working Group
    • Anti-Phishing Working Group. (2010). Phishing activity trends report. Retrieved from http://www.antiphishing.org/reports/ apwg-report-q2-2010.pdf.
    • (2010) Phishing Activity Trends Report
  • 4
    • 0242591926 scopus 로고    scopus 로고
    • Association for Computing Machinery
    • Association for Computing Machinery. (1998). The 1998 ACM Computing Classification System. Retrieved rom http://www. acm.org/about/class/1998.
    • (1998) The 1998 ACM Computing Classification System
  • 5
    • 79959417981 scopus 로고    scopus 로고
    • Human subjects, agents, or bots: Current issues in ethics and computer security research
    • St. Lucia, February 28- March 4, 2011. Lecture Notes in Computer Science. New York: Springer
    • Aycock, J., Buchanan, E., Dexter, S., & Dittrich, D. (2011). Human subjects, agents, or bots: Current issues in ethics and computer security research. In Proceedings from 2nd workshop on ethics in computer security research, St. Lucia, February 28- March 4, 2011. Lecture Notes in Computer Science. New York: Springer.
    • (2011) Proceedings from 2nd Workshop on Ethics in Computer Security Research
    • Aycock, J.1    Buchanan, E.2    Dexter, S.3    Dittrich, D.4
  • 9
    • 77956405137 scopus 로고    scopus 로고
    • Human non-subjects research ": Privacy and compliance
    • Brothers, K. & Clayton, E. W. (2010). "Human non-subjects research ": Privacy and compliance. The American Journal of Bioethics, 10(9), 15-17.
    • (2010) The American Journal of Bioethics , vol.10 , Issue.9 , pp. 15-17
    • Brothers, K.1    Clayton, E.W.2
  • 10
    • 79959423508 scopus 로고    scopus 로고
    • Internet research ethics: Past, present, future
    • C. Ess and M. Consalvo (Eds) Oxford: Blackwell
    • Buchanan, E. (2010). Internet research ethics: Past, present, future. In C. Ess and M. Consalvo (Eds.), The Handbook of Internet Studies (pp. 82-108). Oxford: Blackwell.
    • (2010) The Handbook of Internet Studies , pp. 82-108
    • Buchanan, E.1
  • 11
    • 79959426822 scopus 로고    scopus 로고
    • E-research and e-planning: Emerging considerations for transformative research
    • (forthcoming)
    • Buchanan, E. (forthcoming). E-research and e-planning: Emerging considerations for transformative research. International Journal of E-Planning Research 1(1).
    • International Journal of E-Planning Research , vol.1 , pp. 1
    • Buchanan, E.1
  • 12
    • 79959466691 scopus 로고    scopus 로고
    • Internet research ethics and the institutional review board: Current practices and issues
    • Buchanan, E. & Ess, C. (2009). Internet research ethics and the institutional review board: Current practices and issues. ACM SIGCAS Computers and Society, 39(3), 43-49.
    • (2009) ACM SIGCAS Computers and Society , vol.39 , Issue.3 , pp. 43-49
    • Buchanan, E.1    Ess, C.2
  • 14
    • 68849130653 scopus 로고    scopus 로고
    • Online survey tools: Ethical and methodological concerns of human research ethics committees
    • Buchanan, E. & Hvizdak, E. (2009). Online survey tools: Ethical and methodological concerns of human research ethics committees. Journal of Empirical Research on Human Research Ethics, 4(2), 37-48.
    • (2009) Journal of Empirical Research on Human Research Ethics , vol.4 , Issue.2 , pp. 37-48
    • Buchanan, E.1    Hvizdak, E.2
  • 15
    • 0003641378 scopus 로고    scopus 로고
    • Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, Social Sciences and Humanities Research Council of Canada
    • Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, Social Sciences and Humanities Research Council of Canada. (1998). Tri-Council policy statement: Ethical conduct for research involving humans. Retrieved from http://pre.ethics. gc.ca/eng/archives/tcps-eptc/Default.
    • (1998) Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans
  • 16
    • 84859517950 scopus 로고    scopus 로고
    • Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, and Social Sciences and Humanities Research Council of Canada
    • Canadian Institutes of Health Research (CIHR), Natural Sciences and Engineering Research Council of Canada, and Social Sciences and Humanities Research Council of Canada. (2010). Tri-Council policy statement: Ethical conduct for research involving humans. Retrieved from http://pre.ethics.0020 gc.ca/eng/policy-politique/initiatives/tcps2-eptc2/Default/.
    • (2010) Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans.
  • 19
    • 18444382016 scopus 로고    scopus 로고
    • The Ana sanctuary: Women's pro-anorexia narratives in cyberspace
    • Dias, K. (2003). The ana sanctuary: Women's pro-anorexia narratives in cyberspace. Journal of International Women's Studies, 4(2), 31-45. (Pubitemid 40652603)
    • (2003) Journal of International Women's Studies , vol.4 , Issue.2 , pp. 31-45
    • Dias, K.1
  • 21
    • 79959421312 scopus 로고    scopus 로고
    • Building an active computer security ethics community
    • Dittrich, D., Bailey, M., & Dietrich, S. (2011). Building an active computer security ethics community. IEEE Security and Privacy, 9(3), 1-9.
    • (2011) IEEE Security and Privacy , vol.9 , Issue.3 , pp. 1-9
    • Dittrich, D.1    Bailey, M.2    Dietrich, S.3
  • 23
    • 84855925641 scopus 로고    scopus 로고
    • European Commission European Union Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • European Commission, Directorate of General Justice. (2010). European Union Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Retrieved from http://ec.europa.eu/justice-home/fsj/privacy/ law/index-en.htm.
    • (2010) Directorate of General Justice
  • 24
    • 84855925641 scopus 로고    scopus 로고
    • European European Commission Union Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC
    • European Commission, Directorate of General Justice. (2010). European Union Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Retrieved from http://ec.europa. eu/justice-home/fsj/privacy/law/index-en.htm.
    • (2010) Directorate of General Justice
  • 25
    • 34147139319 scopus 로고    scopus 로고
    • Designing ethical phishing experiments
    • DOI 10.1109/MTAS.2007.335565, Special Issue on Security and Usability
    • Finn, P. & Jakobsson, M. (2007). Designing ethical phishing experiments. IEEE Technology and Society Magazine, 26(1), 46-58. (Pubitemid 46563123)
    • (2007) IEEE Technology and Society Magazine , vol.26 , Issue.1 , pp. 46-58
    • Finn, P.1    Jakobsson, M.2
  • 26
    • 3242774495 scopus 로고    scopus 로고
    • On the morality of artificial agents
    • Floridi, L. (2004). On the morality of artificial agents. Minds and Machines, 14(3), 349-379.
    • (2004) Minds and Machines , vol.14 , Issue.3 , pp. 349-379
    • Floridi, L.1
  • 31
    • 0035575508 scopus 로고    scopus 로고
    • Ethical issues in software engineering research: A survey of current practice
    • DOI 10.1023/A:1011922615502
    • Hall, T. & Flynn, V. (2001). Ethical issues in software engineering research: A survey of current practice. Empirical Software Engineering: An International Journal, 6(4), 305-317. (Pubitemid 33067820)
    • (2001) Empirical Software Engineering , vol.6 , Issue.4 , pp. 305-317
    • Hall, T.1    Flynn, V.2
  • 32
    • 84855953127 scopus 로고    scopus 로고
    • Harvard University
    • Harvard University. (2010). Harvard research data security policy. Retrieved from http://security.harvard.edu/research-data security- policy.
    • (2010) Harvard Research Data Security Policy
  • 34
    • 41949126461 scopus 로고    scopus 로고
    • Why and how to perform fraud experiments
    • DOI 10.1109/MSP.2008.52, 4480466
    • Jakobsson, M., Finn, P., & Johnson, N. (2008). Why and how to perform fraud experiments. IEEE Security & Privacy, 6(2), 66-68. (Pubitemid 351506258)
    • (2008) IEEE Security and Privacy , vol.6 , Issue.2 , pp. 66-68
    • Jakobsson, M.1    Johnson, N.2    Finn, P.3
  • 35
    • 0004197846 scopus 로고    scopus 로고
    • Englewood Cliffs, NJ: Prentice Hall
    • Johnson, D. (2009). Computer ethics. Englewood Cliffs, NJ: Prentice Hall.
    • (2009) Computer Ethics
    • Johnson, D.1
  • 36
    • 77956150836 scopus 로고    scopus 로고
    • A framework for understanding and applying ethical principles in network and security research
    • R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, & F. Sebé (Eds) New York: Springer
    • Kenneally, E., Bailey, M., & Maughan, D. (2010). A framework for understanding and applying ethical principles in network and security research. In R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, & F. Sebé (Eds.), Financial Cryptography and Data Security (pp. 240-246). New York: Springer.
    • (2010) Financial Cryptography and Data Security , pp. 240-246
    • Kenneally, E.1    Bailey, M.2    Maughan, D.3
  • 37
    • 13144249147 scopus 로고    scopus 로고
    • Painting a truer picture of US socioeconomic and racial/ethnic health inequalities: The public health disparities geocoding project
    • DOI 10.2105/AJPH.2003.032482
    • Krieger, N., Chen, J., Waterman, P., Rehkopf, D., & Subramanian, S. V. (2005). Painting a truer picture of U.S. socioeconomic and racial/ethnic health inequalities: The Public Health Disparities Geocoding Project. American Journal of Public Health, 95(2), 312-323. (Pubitemid 40179832)
    • (2005) American Journal of Public Health , vol.95 , Issue.2 , pp. 312-323
    • Krieger, N.1    Chen, J.T.2    Waterman, P.D.3    Rehkopf, D.H.4    Subramanian, S.V.5
  • 38
    • 0035575597 scopus 로고    scopus 로고
    • Mixing software engineering research and development - What needs ethical review and what does not?
    • DOI 10.1023/A:1011974632340
    • Lethbridge, T. C. (2001). Mixing software engineering research and development: What needs ethical review and does not? Empirical Software Engineering: An International Journal, 6(4), 319-321. (Pubitemid 33067821)
    • (2001) Empirical Software Engineering , vol.6 , Issue.4 , pp. 319-321
    • Lethbridge, T.C.1
  • 39
    • 57349192830 scopus 로고    scopus 로고
    • On the difficulty of replicating human subjects studies in software engineering
    • Leipzig, Germany, May 10-18, 2008. New York Association for Computing Machinery
    • Lung, J., Aranda, J., Easterbrook, S., & Wilson, G. (2008). On the difficulty of replicating human subjects studies in software engineering. In Proceedings of the 30th International Conference on Software Engineering (ICSE'08), Leipzig, Germany, May 10-18, 2008. New York: Association for Computing Machinery. Retrieved from http://www.cs.toronto.edu/~sme/papers/2008/ Lung- ICSE2008.pdf.
    • (2008) Proceedings of the 30th International Conference on Software Engineering (ICSE'08)
    • Lung, J.1    Aranda, J.2    Easterbrook, S.3    Wilson, G.4
  • 40
    • 84976659185 scopus 로고
    • Artificial life meets entertainment: Life like autonomous agents
    • Maes, P. (1995). Artificial life meets entertainment: Life like autonomous agents. Communications of the Association for Computing Machinery, 38(11), 108-114.
    • (1995) Communications of the Association for Computing Machinery , vol.38 , Issue.11 , pp. 108-114
    • Maes, P.1
  • 43
    • 79956068984 scopus 로고    scopus 로고
    • Fieldwork in the age of digital reproduction: A review of the potentials and limitations of Google Earth for archaeologists
    • New Brunswick NJ: IEEE Publications. Myers, A
    • New Brunswick, NJ: IEEE Publications. Myers, A. (2010). Fieldwork in the age of digital reproduction: A review of the potentials and limitations of Google Earth for archaeologists. SAA Archaeological Record, 10(4), 7-11.
    • (2010) SAA Archaeological Record , vol.10 , Issue.4 , pp. 7-11
  • 44
    • 84874479631 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology. (2010). NIST cloud computing program. Retrieved from http://www.nist. gov/itl/cloud/.
    • (2010) NIST Cloud Computing Program
  • 47
    • 79959405213 scopus 로고    scopus 로고
    • Relationships between community-based processes for research ethics review and institution-based IRBs: A national study
    • Shore, N., Drew, E., Brazauskas, R., & Seifer, S. D. (2011). Relationships between community-based processes for research ethics review and institution-based IRBs: A national study. Journal of Empirical Research on Human Research Ethics, 6(2), 13-21.
    • (2011) Journal of Empirical Research on Human Research Ethics , vol.6 , Issue.2 , pp. 13-21
    • Shore, N.1    Drew, E.2    Brazauskas, R.3    Seifer, S.D.4
  • 48
    • 0035575507 scopus 로고    scopus 로고
    • Why and how research ethics matters to you. Yes, You!
    • DOI 10.1023/A:1011998412776
    • Singer, J. & Vinson, N. (2001). Why and how research ethics matters to you. Yes, you! Empirical Software Engineering: An International Journal, 6(4), 287-290. (Pubitemid 33067815)
    • (2001) Empirical Software Engineering , vol.6 , Issue.4 , pp. 287-290
    • Singer, J.1    Vinson, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.