Empirical Research and Research Ethics in Information Security

[1]  Yada Zhu,et al.  Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[2]  Stefan Lindskog,et al.  Spoiled Onions: Exposing Malicious Tor Exit Relays , 2014, Privacy Enhancing Technologies.

[3]  M. Bailey,et al.  Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report , 2013 .

[4]  E. Weippl,et al.  Ethics in security research which lines should not be crossed? , 2013, 2013 IEEE Security and Privacy Workshops.

[5]  Stefan Savage,et al.  PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs , 2012, USENIX Security Symposium.

[6]  D. Dittrich,et al.  The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research , 2012 .

[7]  W. Douglas Maughan,et al.  The Menlo Report , 2012, IEEE Security & Privacy.

[8]  S. Athar Principles of Biomedical Ethics , 2011, The Journal of IMA.

[9]  Edgar R. Weippl,et al.  Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites , 2010, SEC.

[10]  Edgar R. Weippl,et al.  Tor HTTP Usage and Information Leakage , 2010, Communications and Multimedia Security.

[11]  Christopher Krügel,et al.  Is the Internet for Porn? An Insight Into the Online Adult Industry , 2010, WEIS.

[12]  A. Dörries The 4-Step Approach - Ethics case discussion in hospitals , 2009 .

[13]  Christopher Krügel,et al.  Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.

[14]  Chris Kanich,et al.  Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.

[15]  Vijay S. Pande,et al.  Folding@home: Lessons from eight years of volunteer distributed computing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.

[16]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[17]  C. Weijer,et al.  Helsinki discords: FDA, ethics, and international drug trials , 2009, The Lancet.

[18]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[19]  A. Dörries Mixed Feelings: Physicians' Concerns About Clinical Ethics Committees in Germany , 2003, HEC forum : an interdisciplinary journal on hospitals' ethical and legal issues.

[20]  B. Gordijn,et al.  Ethical case deliberation on the ward. A comparison of four methods , 2003, Medicine, health care, and philosophy.

[21]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[22]  Norbert Steinkamp,et al.  Die Nimwegener Methode für ethische Fallbesprechungen , 2000 .

[23]  J. Thomson,et al.  Embryonic stem cell lines derived from human blastocysts. , 1998, Science.

[24]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.