Abstract

It is the nature of research that knowledge gained from one study is built upon in succeeding studies. The lessons learned – be they good or bad – help future researchers to find their path. At the same time, publication of research results is difficult when publishing imposes page limits that require leaving things out. Such restrictions in what can/can’t be included may leave unstated very important issues regarding risks to avoid, harms that were mitigated, or responsible conduct of research procedures that those who are new to a field would benefit from knowing.This paper considers some of the ethical issues surrounding the study of malicious activity in social networks, specifically using a technique known as social honeypots combined with deception. This is a potentially touchy area of study that is common to social and behavioral research that is well understood to fall within the boundaries of human subjects research that is regulated in the United States and reviewed by Institutional Review Boards, but is not well understood by computer security researchers or those in the private sector.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.