Ethics¶
Publications and presentations¶
Hacking Back #IRL, by Dave Dittrich, Medium, July 30, 2019
Thoughts on the Active Cyber Defense Certainty Act 2.0, by Dave Dittrich, Medium, Jun 15, 2017
With great power comes great responsibility: Scaling Responses to DDoS and BotNets Effectively and Safely, by David Dittrich, Coordinating Attack Response at Internet Scale (CARIS) Workshop, April 10, 2015
An Ethical Examination of the Internet Census 2012 Dataset: A Menlo Report Case Study, by David Dittrich, Katherine Carpenter, and Manish Karir, IEEE Ethics Symposium 2014, May 2014. (Best Paper award runner up)
Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report, co-lead editors David Dittrich, Erin Kenneally, and Michael Bailey, Department of Homeland Security, October 2013
The Ethics of Social Honeypots, by David Dittrich, December 4, 2012. [Available at SSRN: http://ssrn.com/abstract=2184997 This paper was listed on SSRN’s Top Ten download list six times between 12/10/2012 and 1/6/2013 for the following eJournals: Information Systems: Behavioral & Social Methods eJournal; Technology & Ethics (Sub-Topic), eBusiness & eCommerce eJournal; Applied Ethics (Topic) and eBusiness & eCommerce eJournal; Ethics eJournal; and ISN Subject Matter eJournals and Information Systems & eBusiness Network.]
So You Want to Take Over a Botnet…, by David Dittrich, LEET ‘12: Fifth USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 2012. (Slides and paper)
The Menlo Report, by Michael Bailey, David Dittrich, Erin Kenneally, and Douglas Maughan, IEEE Security & Privacy, 10(2):71–75, March/April 2012. (Local copy of IEEE article)
The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research, co-lead editors David Dittrich and Erin Kenneally, December 28, 2011
Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research, by Katherine Carpenter and David Dittrich, in 1st International Digital Ethics Symposium, Loyola University Chicago Center for Digital Ethics and Policy, October 28, 2011. [Local copy of Loyola 2011 paper and slides]
Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research, by Katherine Carpenter and David Dittrich, Chapter 3, Digital Ethics: Research and Practice, edited by Don Heider and Adrienne Massanari, Loyola University Chicago Center for Digital Ethics and Policy, Peter Lang Publishing, Inc., ISBN 978-1-4331-1895-1 (2012)
Computer Science Security Research and Human Subjects: Emerging Considerations for Research Ethics Boards, by Elizabeth Buchanan, John Aycock, Scott Dexter, David Dittrich, and Erin Hvidzak, Journal of Empirical Research on Human Research Ethics, 6(2):71-83, June 2011.
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security Research, by John Aycock, Elizabeth Buchanan, Scott Dexter, and David Dittrich, in Workshop on Ethics in Computer Security 2011, St. Lucia, April, 2011 [Local copy of WECSR 2011 paper and slides]
Building An Active Computer Security Ethics Community, by David Dittrich, Michael Bailey, and Sven Dietrich, IEEE Security and Privacy, 9(4):32-40, July/August 2011 (pre-publication December 16, 2010)
The conflicts facing those responding to cyberconflict, David Dittrich, USENIX ;login: vol. 34, no. 6, December 2009, pp. 7-15
Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research, David Dittrich, Michael Bailey, and Sven Dietrich, poster presented at the 16th ACM Conference on Computer and Communication Security, November 2009
Towards Community Standards for Ethical Behavior in Computer Security Research, by David Dittrich, Michael Bailey, and Sven Dietrich, Stevens CS Technical Report 2009-1, April 20, 2009 [Local copy and most recent draft release of tech report]
Active Response to Computer Intrusions, by David Dittrich and Kenneth Einar Himma, Vol. III, Chapter 182, “Handbook on Information Security,” edited by Hossein Bidgoli, John Wiley and Sons, ISBN 0-471-64833-7 (2005)
Integrity¶
“When I refer to integrity, I have something very simple and very specific in mind. Integrity, as I will use the term, requires three steps: (1) discerning what is right and what is wrong; (2) acting on what you have discerned, even at personal cost; and (3) saying openly that you are acting on your understanding of right from wrong.”
Stephen L. Carter
Integrity (book), by Stephen L. Carter
‘We Cannot Know What Is Right Unless We Think About It First’ : NONFICTION : INTEGRITY, By Stephen L. Carter, review in LA Times by Chris Goodrich, March 17, 1996
Carter’s Three Steps, Grand View University
Integrity: Why we need a transfusion, a conversation with Stephen Carter, by David L. Miller
See also the Academics and Research section.
Responsible Conduct of Research¶
Integrity in Scientific Research, American Association for the Advancement of Science web site
What to Do with Illicit Information, The Ethicist, by Randy Cohen
Self-Plagiarism in Computer Science, by Christian Collberg and Stephen Kobourov, University of Arizona, Communications of the ACM, Vol. 48, Issue 4, April 2005
An ethical framework for information security research, by Michael Barrett, October 23, 2009
A Framework for Understanding and Applying Ethical Principles in Network and Security Research, by Erin Kenneally, Michael Bailey, and Douglas Maughan, Proceedings of the Workshop on Ethics in Computer Security Research (WECSR) 2010, January, 2010
Damon Horowitz calls for a “moral operating system”, TED talk
Special Report: Ethics in Engineering, IEEE, May 18, 2017
Learn More About Ethics and Technology With New IEEE Resources, by Kathy Pretz, May 15, 2017
Presentation Resources¶
DEFCON Ethics Village (August 11, 2019)¶
Special thanks to the Menlo Working Group members and other co-authors on publications about ethics in ICT Research and Operations (in alphabetic order): John Aycock, Michael Bailey, Elizabeth Buchanan, Aaron Burstein, Katherine Carpenter, KC Claffy, Shari Clayman, Scott Dexter, Sven Dietrich, John Heidemann, Erin Kenneally, Felix Leder, Douglas Maughan, Jenny McNeill, Peter Neumann, Christos Papadopoulos, Charlotte Scheper, Lee Tien, Tillmann Werner, Jody Westby, and Wendy Visscher.
My home page
Hacking Back #IRL, by Dave Dittrich, Medium, July 30, 2019
- Integrity (book), by Stephen L. Carter
Carter’s Three Steps, Grand View University
Integrity: Why we need a transfusion, a conversation with Stephen Carter, by David L. Miller
Able, Allowed, Should; Navigating Modern Tech Ethics, by Margaret Gould Stewart, Medium, May 7, 2018
The Digital Vigilantes Who Hack Back, by Nicholas Schmidle, The New Yorker, April 30, 2018
Thoughts on the Active Cyber Defense Certainty Act 2.0, by Dave Dittrich, Medium, Jun 15, 2017
The Menlo Report, by Michael Bailey, David Dittrich, Erin Kenneally, and Douglas Maughan, IEEE Security & Privacy, 10(2):71–75, March/April 2012. (Local copy of IEEE article)
The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research, co-lead editors David Dittrich and Erin Kenneally, December 28, 2011
Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report, co-lead editors David Dittrich, Erin Kenneally, and Michael Bailey, Department of Homeland Security, October 2013
Active Response to Computer Intrusions, by David Dittrich and Kenneth Einar Himma, Vol. III, Chapter 182, “Handbook on Information Security,” edited by Hossein Bidgoli, John Wiley and Sons, ISBN 0-471-64833-7 (2005)
Bridging the Distance: Removing the Technology Buffer and Seeking Consistent Ethical Analysis in Computer Security Research, by Katherine Carpenter and David Dittrich, in 1st International Digital Ethics Symposium, Loyola University Chicago Center for Digital Ethics and Policy, October 28, 2011. [Local copy of Loyola 2011 paper and slides]
In Search of an Ethical Code for Cybersecurity, by Danny Bradbury, InfoSecurity Magazine, August 6, 2017
Ethical dilemmas in professional practice in anthropology: Stakeholder analysis and stakeholder participation, by The Association of Social Anthropoligist of the United Kingdom
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets, David Dittrich, Felix Leder and Tillmann Werner, in Workshop on Ethics in Computer Security (WECSR) 2010, Tenerife, Spain, January, 2010 [Local copy of WECSR 2010 paper]
Breaking news, Radiolab, WNYC Radio, July 27, 2017
The Ethics of Social Honeypots, by David Dittrich, Research Ethics 11, no. 4 (December 2015): 192–210. https://doi.org/10.1177/1747016115583380 (also available at SSRN: http://ssrn.com/abstract=2184997).