{"title":"为什么“没有更糟”是更糟","authors":"John Aycock, John P. Sullins","doi":"10.1109/SPW.2013.6914701","DOIUrl":null,"url":null,"abstract":"We argue that a common ethical justification for computer security research reflects a naively utilitarian bias, and that this justification would be rejected under other ethical theories. By examining this issue, we hope to raise the ethical bar for security research and suggest some ways that this problem might be addressed using ideas from computer and information ethics.","PeriodicalId":383569,"journal":{"name":"2013 IEEE Security and Privacy Workshops","volume":"351 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Why \\\"no worse off\\\" is worse off\",\"authors\":\"John Aycock, John P. Sullins\",\"doi\":\"10.1109/SPW.2013.6914701\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We argue that a common ethical justification for computer security research reflects a naively utilitarian bias, and that this justification would be rejected under other ethical theories. By examining this issue, we hope to raise the ethical bar for security research and suggest some ways that this problem might be addressed using ideas from computer and information ethics.\",\"PeriodicalId\":383569,\"journal\":{\"name\":\"2013 IEEE Security and Privacy Workshops\",\"volume\":\"351 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-05-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE Security and Privacy Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SPW.2013.6914701\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE Security and Privacy Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPW.2013.6914701","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We argue that a common ethical justification for computer security research reflects a naively utilitarian bias, and that this justification would be rejected under other ethical theories. By examining this issue, we hope to raise the ethical bar for security research and suggest some ways that this problem might be addressed using ideas from computer and information ethics.