You've got vulnerability: Exploring effective vulnerability notifications

F Li, Z Durumeric, J Czyz, M Karami, M Bailey… - 25th USENIX Security …, 2016 - usenix.org
Security researchers can send vulnerability notifications to take proactive measures in
securing systems at scale. However, the factors affecting a notification's efficacy have not …

Ethics in cryptomarket research

J Martin, N Christin - International Journal of Drug Policy, 2016 - Elsevier
Background The recent proliferation of cryptomarkets and the associated emergence of a
sub-field of research on the anonymous web have outpaced the development of an ethical …

The underground economy of fake antivirus software

B Stone-Gross, R Abman, RA Kemmerer… - … of information security …, 2013 - Springer
Fake antivirus (AV) programs have been utilized to defraud millions of computer users into
paying as much as one hundred dollars for a phony software license. As a result, fake AV …

Ethics governance development: The case of the Menlo Report

M Finn, K Shilton - Social Studies of Science, 2023 - journals.sagepub.com
The 2012 Menlo Report was an effort in which a group of computer scientists, US
government funders, and lawyers produced ethics guidelines for research in information and …

Cybercrime is whose responsibility? A case study of an online behaviour system in crime

M Paquet-Clouston, D Décary-Hétu, O Bilodeau - Global Crime, 2018 - Taylor & Francis
Drawing on Sutherland's theory of behaviour systems in crime, this study investigates social
media fraud (SMF) facilitated by botnets to understand the onset and maturation of this new …

[HTML][HTML] Guiding principles for ethical cryptocurrency, blockchain, and DLT research

Q DuPont - 2021 - cryptoeconomicsystems.pubpub.org
Guiding Principles for Ethical Cryptocurrency, Blockchain, and DLT Research · Volume 1,
Issue 1 Skip to main content Cryptoeconomic Systems Search Dashboard caret-down LoginLogin …

Building an active computer security ethics community

D Dittrich, M Bailey, S Dietrich - IEEE Security & Privacy, 2010 - ieeexplore.ieee.org
In spite of significant ethical challenges faced by researchers evaluating modern threats, the
computer security field has yet to grow its own active ethics community to describe and …

[PDF][PDF] Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.

S Sinha, MD Bailey, F Jahanian - NDSS, 2010 - researchgate.net
Unsolicited bulk e-mail (UBE) or spam constitutes a significant fraction of all e-mail
connection attempts and routinely frustrates users, consumes resources, and serves as an …

Enforced community standards for research on users of the Tor anonymity network

C Soghoian - … Conference on Financial Cryptography and Data …, 2011 - Springer
Security and privacy researchers are increasingly taking an interest in the Tor network, and
have even performed studies that involved intercepting the network communications of Tor …

A framework for understanding and applying ethical principles in network and security research

E Kenneally, M Bailey, D Maughan - International Conference on Financial …, 2010 - Springer
Current information and communications technology poses a variety of ethical challenges
for researchers. In this paper, we present an intellectual framework for understanding and …