2020
DOI: 10.1017/s1049096520000323
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing the Ethical Implications of Research Using Leaked Data

Abstract: ABSTRACTAlthough information made public after a data breach can provide insight into difficult research questions, use of these data raises ethical questions not directly addressed by current ethical guidelines. This article develops a framework for identifying and managing risks to human subjects when conducting research involving leaked data. We contend that researchers who seek to use leaked data should identify and address ethical challenges by considering the process thro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…Although there are some publicly available data on cyber policies and outcomes (Federal Bureau of Investigation, 2020; Indiana Attorney General, 2020; National Conference of State Legislatures, 2020), these datasets can be fragmentary, and are few and far between. Data that have become available through less traditional means -such as the leaking of information after a data breach -can provide crucial insights into important, previously unobservable phenomenon, but their use in research raises novel and difficult ethical questions (Boustead & Herr, 2020) projects must rely more heavily on data collection, increasing the time, effort, and resources necessary to conduct research. Data collection in empirical cyber research is further complicated by the range of actors involved in cyber policy, and differences in how these actors document and disclose their cyber decision-making.…”
Section: Cyber Decisions and Outcomes Are Difficult To Observementioning
confidence: 99%
“…Although there are some publicly available data on cyber policies and outcomes (Federal Bureau of Investigation, 2020; Indiana Attorney General, 2020; National Conference of State Legislatures, 2020), these datasets can be fragmentary, and are few and far between. Data that have become available through less traditional means -such as the leaking of information after a data breach -can provide crucial insights into important, previously unobservable phenomenon, but their use in research raises novel and difficult ethical questions (Boustead & Herr, 2020) projects must rely more heavily on data collection, increasing the time, effort, and resources necessary to conduct research. Data collection in empirical cyber research is further complicated by the range of actors involved in cyber policy, and differences in how these actors document and disclose their cyber decision-making.…”
Section: Cyber Decisions and Outcomes Are Difficult To Observementioning
confidence: 99%
“…Documents taken from governments do not only affect the state or amorphous, collective national security; they can also damage real people. Boustead and Herr (2020) suggest that authors handling documentary sources apply the Belmont principles (US Department of Health 1979) that undergird human-subjects research (HSR): respect for persons, beneficence, and justice. For instance, withholding personally identifiable information by anonymizing research participants guards against risks they might face after publication.…”
Section: Human Subjects Protectionmentioning
confidence: 99%
“…A global discipline should advance global and reciprocal standards. APSA (2020, 17–8; likewise Boustead and Herr 2020, 508) guidelines permit research to cross legal lines, given sufficient justification, so legal concerns are not automatically paramount. However, they should be significant ethical considerations regarding leaked sources.…”
Section: Provenance: a Criterial Approachmentioning
confidence: 99%
See 2 more Smart Citations