Should researchers use data from security breaches?

Evaluating the arguments for and against using digital data derived from security breaches.