Where are the red lines? towards ethical server-side scans in security and privacy research
Comprehensive and representative measurements are crucial to understand security and
privacy risks on the Web. However, researchers have long been reluctant to investigate …
privacy risks on the Web. However, researchers have long been reluctant to investigate …
Ethical frameworks and computer security trolley problems: Foundations for conversations
The computer security research community regularly tackles ethical questions. The field of
ethics/moral philosophy has for centuries considered what it means to be" morally good" or …
ethics/moral philosophy has for centuries considered what it means to be" morally good" or …
Analyzing cyber security research practices through a meta-research framework
V Le Pochat, W Joosen - Proceedings of the 16th Cyber Security …, 2023 - dl.acm.org
Sound research practices are the foundation of valid, reliable, and trustworthy research
results. The discipline of meta-research critically evaluates research practices and proposes …
results. The discipline of meta-research critically evaluates research practices and proposes …
Operationalizing cybersecurity research ethics review: from principles and guidelines to practice
D Reidsma, J van der Ham… - … Workshop on Ethics in …, 2023 - research.utwente.nl
Cybersecurity research involves ethics risks such as accidental privacy breaches, corruption
of production services, and discovery of weaknesses in networked systems. Although …
of production services, and discovery of weaknesses in networked systems. Although …
Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations
Transparent reporting of research is a crucial aspect of good scientific practice and
contributes to trustworthy science. Transparency helps to understand research processes …
contributes to trustworthy science. Transparency helps to understand research processes …
Natural Language but Omitted? On the Ineffectiveness of Large Language Models' privacy policy from End-users' Perspective
S Zhang, H Xing, X Yi, H Li - arXiv preprint arXiv:2406.18100, 2024 - arxiv.org
LLMs driven products were increasingly prevalent in our daily lives, With a natural language
based interaction style, people may potentially leak their personal private information. Thus …
based interaction style, people may potentially leak their personal private information. Thus …