S. Dietrich, J. V. D. Ham, A. Pras, R. V. Rijswijk-Deij, Darren Shou, A. Sperotto, A. Wynsberghe, L. Zuck
{"title":"Ethics in Data Sharing: Developing a Model for Best Practice","authors":"S. Dietrich, J. V. D. Ham, A. Pras, R. V. Rijswijk-Deij, Darren Shou, A. Sperotto, A. Wynsberghe, L. Zuck","doi":"10.1109/SPW.2014.43","DOIUrl":null,"url":null,"abstract":"As an outcome of a seminar on the 'Ethics in Data Sharing', we sketch a model of best practice for sharing data in research. We illustrate this model with two current and timely real-life cases from the context of computer and network security.","PeriodicalId":142224,"journal":{"name":"2014 IEEE Security and Privacy Workshops","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Security and Privacy Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SPW.2014.43","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
As an outcome of a seminar on the 'Ethics in Data Sharing', we sketch a model of best practice for sharing data in research. We illustrate this model with two current and timely real-life cases from the context of computer and network security.