Computer science security research and human subjects: Emerging considerations for research ethics boards

E Buchanan, J Aycock, S Dexter… - Journal of Empirical …, 2011 - journals.sagepub.com
This paper explores the growing concerns with computer science research, and in particular,
computer security research and its relationship with the committees that review human …

Ethical proactive threat research

J Aycock, J Sullins - … Conference on Financial Cryptography and Data …, 2010 - Springer
Through a provocative examination of the positive effects of computer security research on
regular users, we argue that traditional security research is insufficient. Instead, we turn to a …

Making sense of anti-malware comparative testing

D Harley - Information Security Technical Report, 2009 - Elsevier
If there is a single problem illustrating the gulf between the anti-malware industry and the
rest of the online world, it revolves around the difficulties and misunderstandings that plague …

Insider Threat: A Case Study, Recognizing the Early Warnings Signs by Humans

E Voss - 2023 - search.proquest.com
Insider Threats remain one of the riskiest issues that companies face in 2023. The Insider
Threat is the user who is intentionally negligent in the acts to their employer. The cost to …

A distributed computation model for marketable quality and profitability considering unfair relationship

V Barolli, H Fukuda - 16th International Workshop on Database …, 2005 - ieeexplore.ieee.org
In this paper, we provide an evaluation method for both: the quality aspect of corporations
(marketable quality) and the profitability. We define the corporation rate of operation and …

The ethics of coexistence: Can I learn to stop worrying and love the logic bomb?

J Aycock, A Somayaji, J Sullins - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
Computer security attacks are frequent fodder for ethical analyses, but the ethics of computer
security defenses are not often examined. We address this by considering a topical problem …

Sample creation not considered harmful

DMN de Castro, J Aycock - 2013 Workshop on Anti-malware …, 2013 - ieeexplore.ieee.org
Anti-malware testing standards have an inherent bias towards existing malware and
commodity platforms. On the one hand, this bias is understandable; on the other hand, this …

The threat of biologically-inspired self-stopping worms

RA Vogt - 2008 - prism.ucalgary.ca
The threat of biologically-inspired self-stopping worms Repository logo English Català Čeština
Deutsch Español Français Gàidhlig Latviešu Magyar Nederlands Polski Português Português …

[PDF][PDF] Building Babel-Towards a Security System through Co-dependency and Diversity.

DMN de Castro - 2015 - prism.ucalgary.ca
A common misconception in computer security is that a computer is able to evaluate whether
or not it is compromised. However, if we consider a compromised system, the evaluation is …

[PDF][PDF] Anti-Malware Evaluation for the Enterprise

D Harley, A Lee - web-assets.esetstatic.com
Anti-malware software remains an essential defensive component for most enterprises,
understandably anxious to get the right balance of affordability and effectiveness …