841
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Celebrating 65 years of The Computer Journal - free-to-read perspectives - bcs.org/tcj65

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      To Deceive or Not to Deceive! Ethical Questions in Phishing Research

      proceedings-article
      The 26th BCS Conference on Human Computer Interaction (HCI)
      Human Computer Interaction
      12 - 14 September 2012
      Ethics, HCI, Research methodologies, Security, Phishing
      Bookmark

            Abstract

            Interest in Human factors in phishing has been growing both in HCI and security communities in the past few years. Despite this interest, conducting covert user studies is associated with a number of ethical and legal challenges for phishing researchers. This paper discusses the need for deception, the implications of deceiving and the legal restrictions in terms of phishing study in the UK. We thematically analyzed these implications from the viewpoints of three stakeholders; ethics committees, researchers and professional bodies. Then we provide a roadmap for researchers to get balanced and timely ethical assessment of their proposed research.

            Content

            Author and article information

            Contributors
            Conference
            September 2012
            September 2012
            : 1-4
            Affiliations
            [0001]University of York

            York, UK
            Article
            10.14236/ewic/HCI2012.72
            28a14cf4-f9d2-4d07-aa56-e998f9ff0abc
            © Rasha Salah El-Din. Published by BCS Learning and Development Ltd. The 26th BCS Conference on Human Computer Interaction, Birmingham, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            The 26th BCS Conference on Human Computer Interaction
            HCI
            26
            Birmingham, UK
            12 - 14 September 2012
            Electronic Workshops in Computing (eWiC)
            Human Computer Interaction
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2012.72
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Ethics,Security,HCI,Phishing,Research methodologies

            Comments

            Comment on this article