Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Should researchers use data from security breaches?
Douglas D.  Communications of the ACM 62 (12): 22-24, 2019. Type: Article
Date Reviewed: Jul 30 2020

The use of data derived from publicly exposed and security loophole databases will continue to be a controversial subject of debate for legal scholars and information technology (IT) computing ethics specialists. Should computing research practitioners be more concerned about data originating from security infringements to lessen litigation against businesses? Without a doubt, this article compellingly argues in favor of new kinds of computing practices to balance the theory between practice and ethics.

Douglas clearly echoes the need for computing researchers to become more cognizant of the authenticity of data obtained from third parties, including whistleblowers and political advocates. But how should computing researchers, devoid of training in politics, become proficient in identifying whistleblowers and biased (politically motivated) data?

The author stunningly asserts that “computing researchers are not usually concerned with using data obtained by inflicting physical or psychological harm on human subjects.” Is this claim true at many research centers and academic research institutions worldwide? If so, what are research funding agencies such as the National Science Foundation (NSF) and the National Institutes of Health (NIH) doing to help eliminate this claimed defect? What are our academic research centers and institutions teaching students in computer ethics courses, to help resolve this crucial issue?

Douglas provides legal evidence, alerting computing researchers to forgo the use of illegal data in all scientific research. Clearly, computing researchers ought to be careful in handling and using potentially compromised data in scientific research. The author certainly alludes to the need to assess the risks of using data breaches, to help minimize the actual unforeseen security disasters. Statisticians must implement more reliable algorithms that will allow computing researchers to examine security risks based on reliable and unreliable qualitative and nonquantitative data.

Reviewer:  Amos Olagunju Review #: CR147027 (2012-0303)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Ethics (K.4.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Ethics": Date
Defining through expansion: conducting asynchronous remote communities (ARC) research with stigmatized groups
Maestre J., MacLeod H., Connelly C., Dunbar J., Beck J., Siek K., Shih P.  CHI 2018 (Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, Montreal QC, Canada,  Apr 21-26, 2018) 1-13, 2018. Type: Proceedings
Aug 26 2021
 Data transparency with blockchain and AI ethics
Bertino E., Kundu A., Sura Z.  Journal of Data and Information Quality 11(4): 1-8, 2019. Type: Article
Apr 14 2021
Patiency is not a virtue: the design of intelligent systems and systems of ethics
Bryson J.  Ethics and Information Technology 20(1): 15-26, 2018. Type: Article
Oct 10 2019
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2021 ThinkLoud, Inc.
Terms of Use
| Privacy Policy