Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Science and Engineering Ethics 22 (3):831-850 (2016)
  Copy   BIBTEX

Abstract

Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

Other Versions

No versions found

Links

PhilArchive

    This entry is not archived by us. If you are the author and have permission from the publisher, we recommend that you archive it. Many publishers automatically grant permission to authors to archive pre-prints. By uploading a copy of your work, you will enable us to better index it, making it easier to find.

    Upload a copy of this work     Papers currently archived: 102,283

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Analytics

Added to PP
2015-04-21

Downloads
57 (#385,219)

6 months
32 (#116,158)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Add more citations

References found in this work

The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
Nuclear Energy as a Social Experiment.Ibo van de Poel - 2011 - Ethics, Policy and Environment 14 (3):285 - 290.
Temptations of turnout and modernisation.Wolter Pieters & Robert van Haren - 2007 - Journal of Information, Communication and Ethics in Society 5 (4):276-292.

View all 6 references / Add more references