Necessity for ethics in social engineering research
dc.contributor.author | Mouton, Francois | |
dc.contributor.author | Malan, Mercia M. | |
dc.contributor.author | Kimppa, Kai K. | |
dc.contributor.author | Venter, H.S. (Hein) | |
dc.date.accessioned | 2015-11-05T07:22:44Z | |
dc.date.issued | 2015-11 | |
dc.description.abstract | Social engineering is deeply entrenched in the fields of both computer science and social psychology. Knowledge is required in both these disciplines to perform social engineering based research. Several ethical concerns and requirements need to be taken into account when social engineering research is conducted to ensure that harm does not befall those who participate in such research. These concerns and requirements have not yet been formalised and most researchers are unaware of the ethical concerns involved in social engineering research. This paper identifies a number of concerns regarding social engineering in public communication, penetration testing and social engineering research. It also discusses the identified concerns with regard to three different normative ethics approaches (virtue ethics, utilitarianism and deontology) and provides their corresponding ethical perspectives as well as practical examples of where these formalised ethical concerns for social engineering research can be beneficial. | en_ZA |
dc.description.embargo | 2016-11-30 | |
dc.description.librarian | hb2015 | en_ZA |
dc.description.uri | http://www.elsevier.com/locate/COSE | en_ZA |
dc.identifier.citation | Mouton, F, Malan, MM, Kimppa, KK & Venter, HS 2015, 'Necessity for ethics in social engineering research', Computers and Security, vol. 55, pp. 114-127. | en_ZA |
dc.identifier.issn | 0167-4048 (print) | |
dc.identifier.issn | 1872-6208 (online) | |
dc.identifier.other | 10.1016/j.cose.2015.09.001 | |
dc.identifier.uri | http://hdl.handle.net/2263/50364 | |
dc.language.iso | en | en_ZA |
dc.publisher | Elsevier | en_ZA |
dc.rights | © 2015 Elsevier Ltd. All rights reserved. Notice : this is the author’s version of a work that was accepted for publication in Computers and Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers and Security, vol. 55, pp.114-127, 2015. doi : 10.1016/j.cose.2015.09.001. | en_ZA |
dc.subject | Consequentialism | en_ZA |
dc.subject | Deontology | en_ZA |
dc.subject | Ethical concerns | en_ZA |
dc.subject | Ethics | en_ZA |
dc.subject | Penetration testing | en_ZA |
dc.subject | Public communication | en_ZA |
dc.subject | Social engineering | en_ZA |
dc.subject | Social engineering research | en_ZA |
dc.subject | Utilitarianism | en_ZA |
dc.subject | Virtue ethics | en_ZA |
dc.title | Necessity for ethics in social engineering research | en_ZA |
dc.type | Postprint Article | en_ZA |