Sciweavers

26496 search results - page 11 / 5300
» An Approach to Computing Ethics
Sort
View
CHI
2009
ACM
15 years 10 months ago
Research ethics in the facebook era: privacy, anonymity, and oversight
Nathan Bos, Karrie Karahalios, Marcela Musgrove-Ch...
IEEESP
2010
92views more  IEEESP 2010»
14 years 6 months ago
Ethics in Security Vulnerability Research
Andrea M. Matwyshyn, Ang Cui, Angelos D. Keromytis...
ACSC
2004
IEEE
15 years 1 months ago
Detecting Privacy and Ethical Sensitivity in Data Mining Results
Knowledge discovery allows considerable insight into data. This brings with it the inherent risk that what is inferred may be private or ethically sensitive. The process of genera...
Peter Fule, John F. Roddick
FC
2010
Springer
150views Cryptology» more  FC 2010»
14 years 10 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
79
Voted
NPAR
2010
ACM
15 years 2 months ago
Stylized depiction of images based on depth perception
Recent works in image editing are opening up new possibilities to manipulate and enhance input images. Within this context, we leverage well-known characteristics of human percept...
Jorge Lopez-Moreno, Jorge Jimenez, Sunil Hadap, Er...