You've got vulnerability: Exploring effective vulnerability notifications
Security researchers can send vulnerability notifications to take proactive measures in
securing systems at scale. However, the factors affecting a notification's efficacy have not …
securing systems at scale. However, the factors affecting a notification's efficacy have not …
Ethics in cryptomarket research
Background The recent proliferation of cryptomarkets and the associated emergence of a
sub-field of research on the anonymous web have outpaced the development of an ethical …
sub-field of research on the anonymous web have outpaced the development of an ethical …
The underground economy of fake antivirus software
Fake antivirus (AV) programs have been utilized to defraud millions of computer users into
paying as much as one hundred dollars for a phony software license. As a result, fake AV …
paying as much as one hundred dollars for a phony software license. As a result, fake AV …
Ethics governance development: The case of the Menlo Report
M Finn, K Shilton - Social Studies of Science, 2023 - journals.sagepub.com
The 2012 Menlo Report was an effort in which a group of computer scientists, US
government funders, and lawyers produced ethics guidelines for research in information and …
government funders, and lawyers produced ethics guidelines for research in information and …
Cybercrime is whose responsibility? A case study of an online behaviour system in crime
Drawing on Sutherland's theory of behaviour systems in crime, this study investigates social
media fraud (SMF) facilitated by botnets to understand the onset and maturation of this new …
media fraud (SMF) facilitated by botnets to understand the onset and maturation of this new …
[HTML][HTML] Guiding principles for ethical cryptocurrency, blockchain, and DLT research
Q DuPont - 2021 - cryptoeconomicsystems.pubpub.org
Guiding Principles for Ethical Cryptocurrency, Blockchain, and DLT Research · Volume 1,
Issue 1 Skip to main content Cryptoeconomic Systems Search Dashboard caret-down LoginLogin …
Issue 1 Skip to main content Cryptoeconomic Systems Search Dashboard caret-down LoginLogin …
Building an active computer security ethics community
In spite of significant ethical challenges faced by researchers evaluating modern threats, the
computer security field has yet to grow its own active ethics community to describe and …
computer security field has yet to grow its own active ethics community to describe and …
[PDF][PDF] Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.
Unsolicited bulk e-mail (UBE) or spam constitutes a significant fraction of all e-mail
connection attempts and routinely frustrates users, consumes resources, and serves as an …
connection attempts and routinely frustrates users, consumes resources, and serves as an …
Enforced community standards for research on users of the Tor anonymity network
C Soghoian - … Conference on Financial Cryptography and Data …, 2011 - Springer
Security and privacy researchers are increasingly taking an interest in the Tor network, and
have even performed studies that involved intercepting the network communications of Tor …
have even performed studies that involved intercepting the network communications of Tor …
A framework for understanding and applying ethical principles in network and security research
E Kenneally, M Bailey, D Maughan - International Conference on Financial …, 2010 - Springer
Current information and communications technology poses a variety of ethical challenges
for researchers. In this paper, we present an intellectual framework for understanding and …
for researchers. In this paper, we present an intellectual framework for understanding and …