| Literature DB >> 25896029 |
Wolter Pieters1,2, Dina Hadžiosmanović3, Francien Dechesne4.
Abstract
Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.Entities:
Keywords: Adversarial experiments; Cyber security; Empirical security; Responsible experimentation; Security-by-experiment; Social experiments
Mesh:
Year: 2015 PMID: 25896029 PMCID: PMC4912578 DOI: 10.1007/s11948-015-9648-y
Source DB: PubMed Journal: Sci Eng Ethics ISSN: 1353-3452 Impact factor: 3.525
Responsible deployment methods per adversarial role type
| Adversarial role type | Example method | Example usage |
|---|---|---|
| Users | Beta versions | Software |
| Users | Open source | Software |
| Users | Bug bounties | Software |
| Users | Responsible disclosure | Software, systems |
| Operators | Gaming | Systems, organisations |
| Professional testers | Penetration testing | Systems, organisations |
| Real attackers | Honeypots | Computer networks |