1 / 5

Ethical principles & practice

Ethical principles & practice. [Bai12] M. Bailey, D. Dittrich , E. Kenneally , and D. Maughan . The Menlo report. IEEE Security and Privacy, 10(2):71-75, Mar 2012. http ://dx.doi.org/10.1109/MSP.2012.52. ICT complicates matters. Technology mediated relations Proliferation of data sources

Download Presentation

Ethical principles & practice

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ethical principles & practice [Bai12] M. Bailey, D. Dittrich, E. Kenneally, and D. Maughan. The Menlo report. IEEE Security and Privacy, 10(2):71-75, Mar 2012. http://dx.doi.org/10.1109/MSP.2012.52

  2. ICT complicates matters • Technology mediated relations • Proliferation of data sources • Overlap research and operations Cyber-crime Science

  3. Principles • Respect for Persons • Individuals participate voluntarily • Treat individuals as autonomous agents • Individuals determine their own best interest • Respect individuals not involved • Protect individuals with diminished autonomy • Respect for law • Engage in legal due diligence • Transparency • Accountability Cyber-crime Science

  4. Principles (contd.) • Beneficence • Do not harm • Maximize probable benefits • Minimize probable harms • Systematically assess both risk of harm and benefit • Justice • Equal consideration in how individuals are treated • Fair distribution benefits • Fair selection of subjects • Equitable allocation of burdens Cyber-crime Science

  5. What next? • Anonymise your data • Complete the checklist • Sign the PII form • Draft informed consent • Draft Information brochure • http://wwwhome.ewi.utwente.nl/~pieter/CCS/#ethical Cyber-crime Science

More Related