Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Science and Engineering Ethics 22 (3):831-850 (2016)
  Copy   BIBTEX

Abstract

Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,349

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Geoengineering as Collective Experimentation.Jack Stilgoe - 2016 - Science and Engineering Ethics 22 (3):851-869.
The Transhuman Security Dilemma.Daniel McIntosh - 2010 - Journal of Evolution and Technology 21 (2):32-48.
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.

Analytics

Added to PP
2015-04-21

Downloads
22 (#688,104)

6 months
4 (#818,853)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

Add more citations

References found in this work

The ontological interpretation of informational privacy.Luciano Floridi - 2005 - Ethics and Information Technology 7 (4):185–200.
Nuclear Energy as a Social Experiment.Ibo van de Poel - 2011 - Ethics, Policy and Environment 14 (3):285 - 290.
Temptations of turnout and modernisation.Wolter Pieters & Robert van Haren - 2007 - Journal of Information, Communication and Ethics in Society 5 (4):276-292.

View all 6 references / Add more references