Ethical Considerations

Draft Page: This page is in docs/drafts/ and is considered a draft. It may be incomplete or subject to change. If you have feedback, feel free to open a pull request or issue on GitHub.

Ethical Considerations#

Recently, cybersecurity conferences require ethical consideration (sections) as part of submissions. Most noteably USENIX Security with quite an extended guideline for this: TODO

Structure#

This is an example structure for an USENIX Security Ethical Considerations section, addressing the points outlines in their ethics TODO

  • In general you want to address as many points as possible

Example: Ethical Considerations#

Stakeholder Analysis and Process Impact#

TODO general overview

“We distinguish between stakeholders impacted by our research methodology and those impacted by the dissemination of our findings.”

Stakeholder Identification#

  • Direct stakeholders (including research team)
  • Indirect stakeholders

Process Impacts#

Impact of Research#

“We evaluate the ethical implications of publication through the lens of the Menlo Report principles:”

Beneficience#

Respect for Persons#

Justice#

Respect for Law and Public Interest#

Mitigation#

Dual-Use and Adversarial Knowledge#

Implementation and Configuration Risks#

Decision to Conduct and Publish Research#

“We commit to the responsible stewardship of the research, including the maintenance of the public repository and the timely triage of security reports”