Bibliography Details
A. Burstein, "Conducting Cybersecurity Research Legally and Ethically", in LEET '08, 2008.
Conducting Cybersecurity Research Legally and Ethically | |
Authors: | A. Burstein |
Published: | LEET, 2008 |
URL: | http://www.usenix.org/events/leet08/tech/full_papers/burstein/burstein_html/ |
ENTRY DATE: | 2008-09-16 |
ABSTRACT: | The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regulate a given research project. Privacy, computer abuse, tort, and contract law are all potentially applicable. Moreover, even when the law permits a research activity, researchers may wonder whether it is ethically permissible. This paper seeks to clarify these issues by explaining the areas of law that are most generally applicable to cybersecurity researchers and offering guidelines for evaluating ethical issues that arise in this area of research. |