Abstract
Evaluating the arguments for and against using digital data derived from security breaches.
- ACM Code of Ethics and Professional Conduct. Association for Computing Machinery. ACM, New York, NY, USA; 2018; https://www.acm.org/code-of-ethics.Google Scholar
- Douglas, D.M. Should Internet researchers use ill-gotten information? Science and Engineering Ethics 24, 4 (Aug. 2018), 1221--1240 Google ScholarCross Ref
- Metcalf, J. Big data analytics and revision of the common rule. Commun. ACM 59, 7 (July 2016), 31--33 Google ScholarDigital Library
- Metcalf, J. and Crawford, K. Where are human subjects in big data research? The emerging ethics divide. Big Data and Society 3, 1 (June 1, 2016) Google ScholarCross Ref
- Poor, N. and Davidson, R. Case study: The ethics of using hacked data: Patreon's data hack and academic data standards. Council for Big Data, Ethics, and Society (Apr. 6, 2016); http://bit.ly/2NnkscM.Google Scholar
- Rosenbaum, A.S. The use of Nazi medical experimentation data: Memorial or betrayal? International Journal of Applied Philosophy 4, 4 (Apr. 1989), 59--67.Google ScholarCross Ref
- Thomas, D.R. et al. Ethical issues in research using datasets of illicit origin. In Proceedings of the 2017 Internet Measurement Conference, 445--462. IMC '17. ACM, New York, NY, USA Google ScholarDigital Library
- U.S. Department of Health and Human Services. 45 CFR 46. (July 19, 2018); http://bit.ly/2NianOq.Google Scholar
- World Medical Association. Declaration of Helsinki---Ethical Principles for Medical Research Involving Human Subjects. (Oct. 19, 2013); http://bit.ly/2lJFEQw.Google Scholar
Index Terms
- Should researchers use data from security breaches?
Recommendations
Market Price Effects of Data Security Breaches
This study examines the impact of reported breaches in computer security using event study analysis. We use the event-study methodology to measure the magnitude of the effect of data security breach events on the behavior of stock markets. Our data come ...
Information security breaches and IT security investments: Impacts on competitors
AbstractIn current business climate, a firm’s information systems security is no longer independent from the industry’s broader security environment. A question arises, then, whether stock market values reflect the interdependence of security ...
Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time
AbstractData breaches represent a permanent threat to all types of organizations. Although the types of breaches are different, the impacts are always the same. This paper focuses on analyzing over 9000 data breaches made public since 2005 that led to the ...
Comments