It's not stealing if you need it

A panel on the ethics of performing research using public data of illicit origin

Serge Egelman, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart Schechter

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In a world where sensitive data can be published to a worldwide audience with the press of a button, researchers are increasingly making use of datasets that were publicized under questionable circumstances. In many cases, such research would otherwise not be possible. For instance, Weir et al. examined over thirty million user-generated passwords in order to observe the effects of entropy on password cracking [10].

Original languageEnglish (US)
Title of host publicationFinancial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers
Pages124-132
Number of pages9
Volume7398 LNCS
DOIs
StatePublished - 2012
Event16th International Conference on Financial Cryptography and Data Security, FC 2012 - Kralendijk, Bonaire, Netherlands
Duration: Mar 2 2012Mar 2 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7398 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th International Conference on Financial Cryptography and Data Security, FC 2012
CountryNetherlands
CityKralendijk, Bonaire
Period3/2/123/2/12

Fingerprint

Password
Entropy
Cracking
Ethics

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Egelman, S., Bonneau, J., Chiasson, S., Dittrich, D., & Schechter, S. (2012). It's not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin. In Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers (Vol. 7398 LNCS, pp. 124-132). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7398 LNCS). https://doi.org/10.1007/978-3-642-34638-5_11

It's not stealing if you need it : A panel on the ethics of performing research using public data of illicit origin. / Egelman, Serge; Bonneau, Joseph; Chiasson, Sonia; Dittrich, David; Schechter, Stuart.

Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers. Vol. 7398 LNCS 2012. p. 124-132 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7398 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Egelman, S, Bonneau, J, Chiasson, S, Dittrich, D & Schechter, S 2012, It's not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin. in Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers. vol. 7398 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7398 LNCS, pp. 124-132, 16th International Conference on Financial Cryptography and Data Security, FC 2012, Kralendijk, Bonaire, Netherlands, 3/2/12. https://doi.org/10.1007/978-3-642-34638-5_11
Egelman S, Bonneau J, Chiasson S, Dittrich D, Schechter S. It's not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin. In Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers. Vol. 7398 LNCS. 2012. p. 124-132. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-34638-5_11
Egelman, Serge ; Bonneau, Joseph ; Chiasson, Sonia ; Dittrich, David ; Schechter, Stuart. / It's not stealing if you need it : A panel on the ethics of performing research using public data of illicit origin. Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers. Vol. 7398 LNCS 2012. pp. 124-132 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{345ddbb8eb764ddd840a937819529962,
title = "It's not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin",
abstract = "In a world where sensitive data can be published to a worldwide audience with the press of a button, researchers are increasingly making use of datasets that were publicized under questionable circumstances. In many cases, such research would otherwise not be possible. For instance, Weir et al. examined over thirty million user-generated passwords in order to observe the effects of entropy on password cracking [10].",
author = "Serge Egelman and Joseph Bonneau and Sonia Chiasson and David Dittrich and Stuart Schechter",
year = "2012",
doi = "10.1007/978-3-642-34638-5_11",
language = "English (US)",
isbn = "9783642346378",
volume = "7398 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "124--132",
booktitle = "Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers",

}

TY - GEN

T1 - It's not stealing if you need it

T2 - A panel on the ethics of performing research using public data of illicit origin

AU - Egelman, Serge

AU - Bonneau, Joseph

AU - Chiasson, Sonia

AU - Dittrich, David

AU - Schechter, Stuart

PY - 2012

Y1 - 2012

N2 - In a world where sensitive data can be published to a worldwide audience with the press of a button, researchers are increasingly making use of datasets that were publicized under questionable circumstances. In many cases, such research would otherwise not be possible. For instance, Weir et al. examined over thirty million user-generated passwords in order to observe the effects of entropy on password cracking [10].

AB - In a world where sensitive data can be published to a worldwide audience with the press of a button, researchers are increasingly making use of datasets that were publicized under questionable circumstances. In many cases, such research would otherwise not be possible. For instance, Weir et al. examined over thirty million user-generated passwords in order to observe the effects of entropy on password cracking [10].

UR - http://www.scopus.com/inward/record.url?scp=84868357566&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84868357566&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-34638-5_11

DO - 10.1007/978-3-642-34638-5_11

M3 - Conference contribution

SN - 9783642346378

VL - 7398 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 124

EP - 132

BT - Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers

ER -