It's not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin

10Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In a world where sensitive data can be published to a worldwide audience with the press of a button, researchers are increasingly making use of datasets that were publicized under questionable circumstances. In many cases, such research would otherwise not be possible. For instance, Weir et al. examined over thirty million user-generated passwords in order to observe the effects of entropy on password cracking [10]. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Egelman, S., Bonneau, J., Chiasson, S., Dittrich, D., & Schechter, S. (2012). It’s not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7398 LNCS, pp. 124–132). Springer Verlag. https://doi.org/10.1007/978-3-642-34638-5_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free