Ethical Considerations#
Recently, cybersecurity conferences require ethical consideration (sections) as part of submissions. Most noteably USENIX Security with quite an extended guideline for this: TODO
Structure#
This is an example structure for an USENIX Security Ethical Considerations section, addressing the points outlines in their ethics TODO
- In general you want to address as many points as possible
Example: Ethical Considerations#
Stakeholder Analysis and Process Impact#
TODO general overview
“We distinguish between stakeholders impacted by our research methodology and those impacted by the dissemination of our findings.”
Stakeholder Identification#
- Direct stakeholders (including research team)
- Indirect stakeholders
Process Impacts#
Impact of Research#
“We evaluate the ethical implications of publication through the lens of the Menlo Report principles:”
Beneficience#
Respect for Persons#
Justice#
Respect for Law and Public Interest#
Mitigation#
Dual-Use and Adversarial Knowledge#
Implementation and Configuration Risks#
Decision to Conduct and Publish Research#
“We commit to the responsible stewardship of the research, including the maintenance of the public repository and the timely triage of security reports”