Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

TitleSecurity-by-Experiment: Lessons from Responsible Deployment in Cyberspace
Publication TypeJournal Article
Year of Publication2016
AuthorsPieters, W, Hadžiosmanović, D, Dechesne, F
JournalScience & Engineering Ethics
Date Published2016
Publication Languageeng
ISBN Number13533452
KeywordsAdversarial , cyber , Cyberspace , DEPLOYMENT , EMPIRICAL , experiments , Internet , Responsible , Security-by-experiment , SOCIAL , technology
AbstractConceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies. 
NotesPieters, Wolter; Email Address: Hadžiosmanović, Dina 1; Email Address: Dechesne, Francien 2; Email Address:; Affiliation: 1: Delft University of Technology, CyberSecurity@TUDelft, 2600 GA Delft The Netherlands 2: 3TU.Ethics @ Eindhoven, Eindhoven University of Technology, 5600 MB Eindhoven The Netherlands; Source Info: Jun2016, Vol. 22 Issue 3, p831; Subject Term: CYBERSPACE; Subject Term: EXPERIMENTS; Subject Term: TECHNOLOGY; Subject Term: INTERNET security; Subject Term: DEPLOYMENT (Military strategy); Author-Supplied Keyword: Adversarial experiments; Author-Supplied Keyword: Cyber security; Author-Supplied Keyword: Empirical security; Author-Supplied Keyword: Responsible experimentation; Author-Supplied Keyword: Security-by-experiment; Author-Supplied Keyword: Social experiments; NAICS/Industry Codes: 517110 Wired Telecommunications Carriers; NAICS/Industry Codes: 519130 Internet Publishing and Broadcasting and Web Search Portals; Number of Pages: 20p; Document Type: Article