Where are the red lines? towards ethical server-side scans in security and privacy research

F Hantke, S Roth, R Mrowczynski… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Comprehensive and representative measurements are crucial to understand security and
privacy risks on the Web. However, researchers have long been reluctant to investigate …

Ethical frameworks and computer security trolley problems: Foundations for conversations

T Kohno, Y Acar, W Loh - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The computer security research community regularly tackles ethical questions. The field of
ethics/moral philosophy has for centuries considered what it means to be" morally good" or …

Analyzing cyber security research practices through a meta-research framework

V Le Pochat, W Joosen - Proceedings of the 16th Cyber Security …, 2023 - dl.acm.org
Sound research practices are the foundation of valid, reliable, and trustworthy research
results. The discipline of meta-research critically evaluates research practices and proposes …

Operationalizing cybersecurity research ethics review: from principles and guidelines to practice

D Reidsma, J van der Ham… - … Workshop on Ethics in …, 2023 - research.utwente.nl
Cybersecurity research involves ethics risks such as accidental privacy breaches, corruption
of production services, and discovery of weaknesses in networked systems. Although …

Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations

JH Klemmer, J Schmüser, BM Lowens… - 2025 IEEE Symposium …, 2024 - computer.org
Transparent reporting of research is a crucial aspect of good scientific practice and
contributes to trustworthy science. Transparency helps to understand research processes …

Natural Language but Omitted? On the Ineffectiveness of Large Language Models' privacy policy from End-users' Perspective

S Zhang, H Xing, X Yi, H Li - arXiv preprint arXiv:2406.18100, 2024 - arxiv.org
LLMs driven products were increasingly prevalent in our daily lives, With a natural language
based interaction style, people may potentially leak their personal private information. Thus …