{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,14]],"date-time":"2024-07-14T23:31:34Z","timestamp":1720999894573},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T00:00:00Z","timestamp":1498435200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11948-017-9935-x","type":"journal-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T11:11:12Z","timestamp":1498475472000},"page":"1221-1240","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Should Internet Researchers Use Ill-Gotten Information?"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2448-871X","authenticated-orcid":false,"given":"David M.","family":"Douglas","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,26]]},"reference":[{"key":"9935_CR1","unstructured":"AusCERT. (2013). Carna Botnet scanning of all IPv4 addresses. AusCERT Web Log, March 25, 2013. https:\/\/www.auscert.org.au\/render.html?it=17258 . Accessed February 6, 2017."},{"key":"9935_CR75","doi-asserted-by":"crossref","unstructured":"Beecher, H. K. (1966). Ethics and clinical research. The New England Journal of Medicine, 274(24), 1354\u20131360.","DOI":"10.1007\/978-1-4615-6561-1_14"},{"issue":"20","key":"9935_CR2","doi-asserted-by":"crossref","first-page":"1435","DOI":"10.1056\/NEJM199005173222006","volume":"322","author":"RL Berger","year":"1990","unstructured":"Berger, R. L. (1990). Nazi science\u2014The Dachau hypothermia experiments. The New England Journal of Medicine, 322(20), 1435\u20131440.","journal-title":"The New England Journal of Medicine"},{"key":"9935_CR3","volume-title":"Secrets: On the ethics of concealment and revelation","author":"S Bok","year":"1989","unstructured":"Bok, S. (1989). Secrets: On the ethics of concealment and revelation. New York: Vintage Books."},{"key":"9935_CR4","unstructured":"Carna Botnet. (n.d.). Internet Census 2012: Port scanning\/0 using insecure embedded devices. http:\/\/internetcensus2012.bitbucket.org\/paper.html . Accessed February 6, 2017."},{"issue":"2","key":"9935_CR5","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MTS.2015.2425592","volume":"34","author":"D Dittrich","year":"2015","unstructured":"Dittrich, D., Carpenter, K., & Karir, M. (2015). The Internet Census 2012 dataset: An ethical examination. IEEE Technology and Society Magazine, 34(2), 40\u201346.","journal-title":"IEEE Technology and Society Magazine"},{"key":"9935_CR6","unstructured":"Dittrich, D., & Kenneally, E. (2012). The Menlo Report: Ethical principles guiding information and communication technology research. U.S. Department of Homeland Security. http:\/\/www.caida.org\/publications\/papers\/2012\/menlo_report_actual_formatted\/menlo_report_actual_formatted.pdf . Accessed May 29, 2017."},{"key":"9935_CR7","volume-title":"Anonymizing health data","author":"K Eman El","year":"2013","unstructured":"El Eman, K., & Arbuckle, L. (2013). Anonymizing health data. Sebastopol, CA: O\u2019Reilly."},{"issue":"1","key":"9935_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/1468-5930.00035","volume":"14","author":"S Godlovitch","year":"1997","unstructured":"Godlovitch, S. (1997). Forbidding nasty knowledge: On the use of Ill-gotten information. Journal of Applied Philosophy, 14(1), 1\u201317.","journal-title":"Journal of Applied Philosophy"},{"key":"9935_CR9","first-page":"1","volume-title":"Computer Security\u2014ESORICS 2009","author":"T Holz","year":"2009","unstructured":"Holz, T., Engelberth, M., & Freiling, F. (2009). Learning more about the underground economy: A case-study of keyloggers and dropzones. In M. Backes & P. Ning (Eds.), Computer Security\u2014ESORICS 2009 (pp. 1\u201318). Berlin: Springer."},{"key":"9935_CR10","volume-title":"Spam nation","author":"B Krebs","year":"2014","unstructured":"Krebs, B. (2014). Spam nation. Naperville, IL: Sourcebooks."},{"key":"9935_CR11","unstructured":"Krebs, B. (2015). Pharma wars. Krebs on Security. http:\/\/krebsonsecurity.com\/category\/pharma-wars\/ . Accessed February 6, 2017."},{"issue":"3","key":"9935_CR12","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1145\/2656877.2656893","volume":"44","author":"T Krenc","year":"2014","unstructured":"Krenc, T., Hohlfeld, O., & Feldmann, A. (2014). An Internet Census taken by an illegal botnet: A qualitative assessment of published measurements. SIGCOMM Computer Communication Review, 44(3), 103\u2013111.","journal-title":"SIGCOMM Computer Communication Review"},{"key":"9935_CR13","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1007\/978-3-319-13488-8_9","volume-title":"Advances in communication networking","author":"D Maan","year":"2014","unstructured":"Maan, D., Santanna, J. J., Sperotto, A., & de Boer, P.-T. (2014). Towards validation of the Internet Census 2012. In Y. Kermarrec (Ed.), Advances in communication networking (pp. 85\u201396). Berlin: Springer."},{"key":"9935_CR14","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/978-3-319-05302-8_26","volume-title":"Foundations and practice of security","author":"EL Mal\u00e9cot","year":"2014","unstructured":"Mal\u00e9cot, E. L., & Inoue, D. (2014). The Carna Botnet through the lens of a network telescope. In J. L. Danger, M. Debbabi, J.-Y. Marion, J. Garcia-Alfaro, & N. Z. Heywood (Eds.), Foundations and practice of security (pp. 426\u2013441). Berlin: Springer."},{"key":"9935_CR15","unstructured":"Markham, A., & Buchanan, E. (2012). Ethical decision-making and internet research: Recommendations from the AoIR Ethics Working Committee (Version 2.0). Association of Internet Researchers. http:\/\/www.aoir.org\/reports\/ethics2.pdf . Accessed May 17, 2017."},{"issue":"3","key":"9935_CR16","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1017\/S0012217300020850","volume":"25","author":"RM Martin","year":"1986","unstructured":"Martin, R. M. (1986). Using Nazi scientific data. Dialogue: Canadian Philosophical Review\/Revue Canadienne de Philosophie, 25(3), 403\u2013411.","journal-title":"Dialogue: Canadian Philosophical Review\/Revue Canadienne de Philosophie"},{"key":"9935_CR17","unstructured":"McCoy, D., Pitsillidis, A., Grant, J., Weaver, N., Kreibich, C., Krebs, B., Voelker, G., Savage, S., & Levchenko, K. (2012). PharmaLeaks: Understanding the business of online pharmaceutical affiliate programs (pp. 1\u201316). https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/mccoy . Accessed February 6, 2017."},{"key":"9935_CR18","doi-asserted-by":"crossref","unstructured":"Metcalf, J., & Crawford, K. (2016). Where are human subjects in Big Data research? The emerging ethics divide. Big Data & Society, 3(1), 1\u201314.","DOI":"10.1177\/2053951716650211"},{"issue":"6","key":"9935_CR19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.2307\/3561733","volume":"14","author":"K Moe","year":"1984","unstructured":"Moe, K. (1984). Should the Nazi research data be cited? Hastings Center Report, 14(6), 5\u20137.","journal-title":"Hastings Center Report"},{"issue":"2","key":"9935_CR20","doi-asserted-by":"crossref","first-page":"403","DOI":"10.2307\/1051142","volume":"10","author":"P Mostow","year":"1993","unstructured":"Mostow, P. (1993). \u2018Like building on top of Auschwitz\u2019: On the symbolic meaning of using data from the Nazi experiments, and on non-use as a form of memorial. Journal of Law and Religion, 10(2), 403\u2013431.","journal-title":"Journal of Law and Religion"},{"issue":"3","key":"9935_CR21","doi-asserted-by":"crossref","first-page":"W21","DOI":"10.1080\/15265160600686356","volume":"6","author":"J-B Nie","year":"2006","unstructured":"Nie, J.-B. (2006). The United States cover-up of Japanese wartime medical atrocities: Complicity committed in the national interest and two proposals for contemporary action. The American Journal of Bioethics, 6(3), W21\u2013W33.","journal-title":"The American Journal of Bioethics"},{"issue":"10","key":"9935_CR22","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/2896816","volume":"59","author":"C Partridge","year":"2016","unstructured":"Partridge, C., & Allman, M. (2016). Ethical considerations in network measurement papers. Communications of the ACM, 59(10), 58\u201364.","journal-title":"Communications of the ACM"},{"key":"9935_CR23","unstructured":"Poor, N., & Davidson, R. (2016). Case study: The ethics of using hacked data: Patreon\u2019s data hack and academic data standards. Council for Big Data, Ethics, and Society. http:\/\/bdes.datasociety.net\/council-output\/case-study-the-ethics-of-using-hacked-data-patreons-data-hack-and-academic-data-standards\/ . Accessed February 6, 2017."},{"issue":"3","key":"9935_CR24","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1111\/0047-2786.00049","volume":"31","author":"C Quinn","year":"2000","unstructured":"Quinn, C. (2000). Taking seriously victims of unethical experiments: Susan Brison\u2019s conception of the self and its relevance to bioethics. Journal of Social Philosophy, 31(3), 316\u2013325.","journal-title":"Journal of Social Philosophy"},{"key":"9935_CR25","volume-title":"The ethics of science: An introduction","author":"DB Resnik","year":"1998","unstructured":"Resnik, D. B. (1998). The ethics of science: An introduction. London: Routledge."},{"issue":"4","key":"9935_CR26","doi-asserted-by":"crossref","first-page":"59","DOI":"10.5840\/ijap1989448","volume":"4","author":"AS Rosenbaum","year":"1989","unstructured":"Rosenbaum, A. S. (1989). The use of Nazi medical experimentation data: Memorial or betrayal? International Journal of Applied Philosophy, 4(4), 59\u201367.","journal-title":"International Journal of Applied Philosophy"},{"issue":"3","key":"9935_CR27","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1017\/S0012217300020862","volume":"25","author":"A Schafer","year":"1986","unstructured":"Schafer, A. (1986). On using Nazi data: The case against. Dialogue Canadian Philosophical Review\/Revue Canadienne de Philosophie, 25(3), 413\u2013419.","journal-title":"Dialogue Canadian Philosophical Review\/Revue Canadienne de Philosophie"},{"key":"9935_CR28","volume-title":"Data and Goliath: The hidden battles to collect your data and control your world","author":"B Schneier","year":"2015","unstructured":"Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and control your world. New York: W. W. Norton & Company."},{"key":"9935_CR29","volume-title":"Responsible conduct of research","author":"AE Shamoo","year":"2015","unstructured":"Shamoo, A. E., & Resnik, D. B. (2015). Responsible conduct of research (3rd ed.). Oxford: Oxford University Press.","edition":"3"},{"key":"9935_CR30","doi-asserted-by":"crossref","DOI":"10.4135\/9781506335162","volume-title":"Planning ethically responsible research","author":"JE Sieber","year":"2013","unstructured":"Sieber, J. E., & Tolich, M. B. (2013). Planning ethically responsible research (2nd ed.). Los Angeles: Sage Publications.","edition":"2"},{"key":"9935_CR31","unstructured":"Snoke, T. (2013). Working with the Internet Census 2012. CERT\/CC Blog. http:\/\/www.cert.org\/blogs\/certcc\/post.cfm?EntryID=183 . Accessed February 6, 2017."},{"key":"9935_CR32","unstructured":"Townsend, L., & Wallace, C. (2016). Social media research: A guide to ethics. http:\/\/www.dotrural.ac.uk\/socialmediaresearchethics.pdf . Accessed May 29, 2017."},{"key":"9935_CR33","unstructured":"US Department of Health & Human Services. (2009). 45 CFR 46 Subpart A\u2014Basic HHS policy for protection of human research subjects. HHS.gov. http:\/\/www.hhs.gov\/ohrp\/regulations-and-policy\/regulations\/45-cfr-46\/index.html . Accessed February 6, 2017."},{"key":"9935_CR34","unstructured":"Zevenbergen, B. et al. (2016). Networked systems ethics. http:\/\/www.networkedsystemsethics.net\/ . Accessed February 6, 2017."},{"issue":"4","key":"9935_CR35","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/s10676-010-9227-5","volume":"12","author":"M Zimmer","year":"2010","unstructured":"Zimmer, M. (2010). \u2018But the data is already public\u2019: On the ethics of research in Facebook. Ethics and Information Technology, 12(4), 313\u2013325.","journal-title":"Ethics and Information Technology"}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9935-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9935-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9935-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T23:16:29Z","timestamp":1569539789000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9935-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,26]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["9935"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9935-x","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,26]]}}}