The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2012 vol.10)
pp: 71-75
Michael Bailey , University of Michigan
David Dittrich , University of Washington
Erin Kenneally , University of California, San Diego
Doug Maughan , Department of Homeland Security
ABSTRACT
On 28 December 2011, the US Department of Homeland Security, Science and Technology, Cyber Security Division released "The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research" to the Federal Register to elicit the public's feedback. In this article, the authors briefly describe the road to this milestone, summarize the report and its companion document, and describe the next steps we should take as a community.
INDEX TERMS
ethics, computer security, computer network security, professional societies, computer crime, technology social factors
CITATION
Michael Bailey, David Dittrich, Erin Kenneally, Doug Maughan, "The Menlo Report", IEEE Security & Privacy, vol.10, no. 2, pp. 71-75, March/April 2012, doi:10.1109/MSP.2012.52
REFERENCES
1. D. Dittrich, M. Bailey, and S. Dietrich, "Building an Active Computer Security Ethics Community," IEEE Security & Privacy, vol. 9, no. 4, 2011, pp. 32–40.
2. "The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research," D. Dittrich and E. Kenneally, eds., US Dept. Homeland Security, 2011; www.cyber.st.dhs.gov/wp-content/uploads/ 2011/12MenloPrinciplesCORE-20110915-r560.pdf .
3. Nat'l Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, "The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research," appendix vol. 1, Dept. Health, Education, and Welfare Publication no. (OS) 78-0013, 1979; http://videocast.nih.gov/pdfohrp_appendix_belmont_report_vol_1.pdf .
4. Nat'l Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, "The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subjects of Research," appendix vol. 2, Dept. Health, Education, and Welfare Publication Publication no. (OS) 78-0014, 1979; http://videocast.nih.gov/pdfohrp_appendix_belmont_report_vol_2.pdf .
5. "Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Department of Homeland Security Menlo Report," D. Dittrich and E. Kenneally, eds., US Dept. Homeland Security, 2011; www.cyber.st.dhs.gov/wp-content/uploads/ 2012/01MenloPrinciplesCOMPANION-20120103-r731.pdf .
6. E. Kenneally, M. Bailey, and D. Maughan, "A Tool for Understanding and Applying Ethical Principles in Network and Security Research," Workshop Ethics in Computer Security Research (WECSR 10), Springer, 2010, pp. 240–246.
7. "The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research," Federal Register, vol. 76, no. 249, 28 Dec. 2011, p. 8 1517.
73 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool