Conducting Cybersecurity Research Legally and Ethically

@inproceedings{Burstein2008ConductingCR,
  title={Conducting Cybersecurity Research Legally and Ethically},
  author={Aaron J. Burstein},
  booktitle={LEET},
  year={2008}
}
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regulate a given research project. Privacy, computer abuse, tort, and contract law are all potentially applicable. Moreover, even when the law permits a research activity, researchers may wonder whether it is ethically permissible. This paper seeks to clarify these issues by explaining the areas of law that are most… CONTINUE READING

From This Paper

Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 14 REFERENCES

Toward a culture of cybersecurity research

  • Aaron J. Burstein
  • Harvard Journal of Law and Technology,
  • 2008
1 Excerpt

A model regime of privacy protection

  • Daniel J. Solove, Chris Jay Hoofnagle
  • University of Illinois Law Review,
  • 2006
1 Excerpt

Deworming the internet

  • Douglas A. Barnes
  • Texas Law Review,
  • 2004
1 Excerpt

Know Your Enemy, chapter Legal Issues, pages 228–252

  • Richard Salgado
  • Addison-Wesley Professional,
  • 2004
1 Excerpt

Similar Papers

Loading similar papers…