{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,16]],"date-time":"2024-07-16T06:30:42Z","timestamp":1721111442516},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T00:00:00Z","timestamp":1502755200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T00:00:00Z","timestamp":1502755200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000066","name":"National Institute of Environmental Health Sciences","doi-asserted-by":"publisher","award":["ZIAES102646-08"],"id":[{"id":"10.13039\/100000066","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11948-017-9952-9","type":"journal-article","created":{"date-parts":[[2017,8,15]],"date-time":"2017-08-15T07:19:48Z","timestamp":1502781588000},"page":"1241-1252","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Ethics and Phishing Experiments"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-5139-9555","authenticated-orcid":false,"given":"David B.","family":"Resnik","sequence":"first","affiliation":[]},{"given":"Peter R.","family":"Finn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,15]]},"reference":[{"issue":"24","key":"9952_CR1","doi-asserted-by":"publisher","first-page":"1830","DOI":"10.1056\/NEJM200006153422412","volume":"342","author":"GJ Annas","year":"2000","unstructured":"Annas, G. J. (2000). Rules for research on human genetic variation\u2014Lessons from Iceland. New England Journal of Medicine, 342(24), 1830\u20131833.","journal-title":"New England Journal of Medicine"},{"key":"9952_CR2","volume-title":"Public health ethics: Theory, policy, and practice","year":"2006","unstructured":"Bayer, R., Gostin, L. O., Jennings, B., & Steinbock, B. (Eds.). (2006). Public health ethics: Theory, policy, and practice. New York, NY: Oxford University Press."},{"key":"9952_CR3","volume-title":"Principles of biomedical ethics","author":"T Beauchamp","year":"2008","unstructured":"Beauchamp, T., & Childress, J. (2008). Principles of biomedical ethics (8th ed.). New York, NY: Oxford University Press.","edition":"8"},{"issue":"3","key":"9952_CR4","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1111\/j.1467-8519.2007.00619.x","volume":"22","author":"B Benham","year":"2008","unstructured":"Benham, B. (2008). The ubiquity of deception and the ethics of deceptive research. Bioethics, 22(3), 147\u2013156.","journal-title":"Bioethics"},{"issue":"2","key":"9952_CR5","first-page":"7","volume":"35","author":"MH Boynton","year":"2013","unstructured":"Boynton, M. H., Portnoy, D. B., & Johnson, B. T. (2013). Exploring the ethics and psychological impact of deception in psychological research. IRB, 35(2), 7\u201313.","journal-title":"IRB"},{"key":"9952_CR6","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1093\/oso\/9780195168655.003.0057","volume-title":"The Oxford textbook of clinical research ethics","author":"DE Brock","year":"2008","unstructured":"Brock, D. E. (2008). Philosophical justifications of informed consent. In E. J. Emanuel, C. Grady, R. A. Crouch, R. K. Lie, F. G. Miller, & D. Wendler (Eds.), The Oxford textbook of clinical research ethics (pp. 606\u2013612). New York, NY: Oxford University Press."},{"issue":"2","key":"9952_CR7","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1525\/jer.2011.6.2.71","volume":"6","author":"E Buchanan","year":"2011","unstructured":"Buchanan, E., Aycock, J., Dexter, S., Dittrich, D., & Hvizdak, E. (2011). Computer science security research and human subjects: Emerging considerations for research ethics boards. Journal of Empirical Research on Human Research Ethics, 6(2), 71\u201383.","journal-title":"Journal of Empirical Research on Human Research Ethics"},{"key":"9952_CR8","unstructured":"Canadian Institutes of Health Research, Natural Sciences and Engineering Research Council of Canada, and Social Sciences and Humanities Research Council of Canada. (2014). Tri-Council policy statement: Ethical conduct for research involving humans. http:\/\/www.pre.ethics.gc.ca\/pdf\/eng\/tcps2-2014\/TCPS_2_FINAL_Web.pdf . Accessed 14 July 2107."},{"issue":"5","key":"9952_CR9","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1136\/jme.28.5.313","volume":"28","author":"J Cassell","year":"2002","unstructured":"Cassell, J., & Young, A. (2002). Why we should not seek individual informed consent for participation in health services research. Journal of Medical Ethics, 28(5), 313\u2013317.","journal-title":"Journal of Medical Ethics"},{"key":"9952_CR10","unstructured":"Council for International Organizations of Medical Sciences. (2016). International ethical guidelines for health-related research involving humans. https:\/\/cioms.ch\/shop\/product\/international-ethical-guidelines-for-health-related-research-involving-humans\/ . Accessed 12 July 2017."},{"key":"9952_CR11","unstructured":"Department of Health and Human Services. (2009). Protection of Human Subjects, 45 Code of Federal Regulations 46."},{"issue":"12","key":"9952_CR12","first-page":"7149","volume":"82","author":"Department of Homeland Security; Department of Agriculture; Department of Energy; National Aeronautics and Space Administration; Department of Commerce; Social Security Administration; Agency for International Development; Department of Housing and Urban Development; Department of Labor; Department of Defense; Department of Education; Department of Veterans Affairs; Environmental Protection Agency; Department of Health and Human Services; National Science Foundation; and Department of Transportation","year":"2017","unstructured":"Department of Homeland Security; Department of Agriculture; Department of Energy; National Aeronautics and Space Administration; Department of Commerce; Social Security Administration; Agency for International Development; Department of Housing and Urban Development; Department of Labor; Department of Defense; Department of Education; Department of Veterans Affairs; Environmental Protection Agency; Department of Health and Human Services; National Science Foundation; and Department of Transportation. (2017). Federal policy for the protection of human subjects. Federal Register, 82(12), 7149\u20137274.","journal-title":"Federal Register"},{"key":"9952_CR13","unstructured":"Dimkov, T., Pieters, W., & Hartel, P. (2010). Two methodologies for physical penetration testing using social engineering. In Proceedings of the annual computer security applications conference (pp. 399\u2013408). New York, NY: American Chemical Society."},{"key":"9952_CR14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625206","volume-title":"The theory and practice of autonomy","author":"G Dworkin","year":"1988","unstructured":"Dworkin, G. (1988). The theory and practice of autonomy. Cambridge, UK: Cambridge University Press."},{"key":"9952_CR15","unstructured":"El-Din, R. S. (2012). To deceive or not to deceive! Ethical questions in phishing research. In Proceedings of the British Computing Society, human\u2013computer interaction 2012 Workshops. http:\/\/ewic.bcs.org\/upload\/pdf\/ewic_hci12_ec_paper2.pdf . Accessed 26 April 2017."},{"issue":"20","key":"9952_CR16","doi-asserted-by":"publisher","first-page":"2701","DOI":"10.1001\/jama.283.20.2701","volume":"283","author":"EJ Emanuel","year":"2000","unstructured":"Emanuel, E. J., Wendler, D., & Grady, C. (2000). What makes clinical research ethical? Journal of the American Medical Association, 283(20), 2701\u20132711.","journal-title":"Journal of the American Medical Association"},{"issue":"7","key":"9952_CR17","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1177\/0146167298247008","volume":"24","author":"N Epley","year":"1998","unstructured":"Epley, N., & Huff, C. (1998). Suspicion, affective response, and educational benefit as a result of deception in psychology research. Personality and Social Psychology Bulletin, 24(7), 759\u2013768.","journal-title":"Personality and Social Psychology Bulletin"},{"key":"9952_CR18","unstructured":"Federal Trade Commission. (2017). Phishing. https:\/\/www.consumer.ftc.gov\/articles\/0003-phishing . Accessed 26 April 2017."},{"key":"9952_CR19","volume-title":"Harm to others","author":"J Feinberg","year":"1987","unstructured":"Feinberg, J. (1987). Harm to others. New York, NY: Oxford University Press."},{"key":"9952_CR20","first-page":"87","volume-title":"Research ethics: Cases and materials","author":"PR Finn","year":"1995","unstructured":"Finn, P. R. (1995). The ethics of deception in research. In R. L. Penslar (Ed.), Research ethics: Cases and materials (pp. 87\u2013118). Bloomington, IN: Indiana University Press."},{"key":"9952_CR21","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MTAS.2007.335565","volume":"26","author":"PR Finn","year":"2007","unstructured":"Finn, P. R., & Jakobsson, M. (2007). Designing ethical phishing experiments. IEEE Technology and Society, 26, 46\u201358.","journal-title":"IEEE Technology and Society"},{"key":"9952_CR22","unstructured":"Gartner Group. (2007). Phishing costs the U.S. economy $3.2 billion. Press release, 17 December 2007. https:\/\/www.finextra.com\/news\/fullstory.aspx?newsitemid=17871 . Accessed 12 July 2017."},{"issue":"2","key":"9952_CR23","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1002\/hast.548","volume":"46","author":"L Gelinas","year":"2016","unstructured":"Gelinas, L., Wertheimer, A., & Miller, F. G. (2016). When and why is research without consent permissible? Hastings Center Report, 46(2), 35\u201343.","journal-title":"Hastings Center Report"},{"issue":"11","key":"9952_CR24","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1016\/j.puhe.2007.07.013","volume":"121","author":"LO Gostin","year":"2007","unstructured":"Gostin, L. O. (2007). General justifications for public health regulation. Public Health, 121(11), 829\u2013834.","journal-title":"Public Health"},{"issue":"3","key":"9952_CR25","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1177\/019027250807100304","volume":"71","author":"R Hertwig","year":"2008","unstructured":"Hertwig, R., & Ortmann, A. (2008). Deception in social psychological experiments: Two misconceptions and a research agenda. Social Psychology Quarterly, 71(3), 222\u2013227.","journal-title":"Social Psychology Quarterly"},{"issue":"10","key":"9952_CR26","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2006","unstructured":"Jagatic, T. N., Johnson, N. A., Jakobsson, M., & Menczer, F. (2006). Social phishing. Communications of the ACM, 50(10), 94\u2013100.","journal-title":"Communications of the ACM"},{"issue":"7522","key":"9952_CR27","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1136\/bmj.38583.625613.AE","volume":"331","author":"C Junghans","year":"2005","unstructured":"Junghans, C., Feder, G., Hemingway, H., Timmis, A., & Jones, M. (2005). Recruiting patients to medical research: Double blind randomised trial of \u201copt-in\u201d versus \u201copt-out\u201d strategies. British Medical Journal, 331(7522), 940.","journal-title":"British Medical Journal"},{"issue":"10","key":"9952_CR28","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1136\/medethics-2015-102775","volume":"41","author":"D MacKay","year":"2015","unstructured":"MacKay, D. (2015). Opt-out and consent. Journal of Medical Ethics, 41(10), 832\u2013835.","journal-title":"Journal of Medical Ethics"},{"key":"9952_CR29","volume-title":"Obedience to authority","author":"S Milgram","year":"1974","unstructured":"Milgram, S. (1974). Obedience to authority. New York, NY: Harper and Rowe."},{"issue":"3","key":"9952_CR30","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1111\/j.1748-720X.2008.304.x","volume":"36","author":"FG Miller","year":"2008","unstructured":"Miller, F. G. (2008). Research on medical records without informed consent. Journal of Law, Medicine & Ethics, 36(3), 560\u2013566.","journal-title":"Journal of Law, Medicine & Ethics"},{"issue":"8","key":"9952_CR31","doi-asserted-by":"publisher","first-page":"765","DOI":"10.1056\/NEJMp0800136","volume":"358","author":"FG Miller","year":"2008","unstructured":"Miller, F. G., & Emanuel, E. J. (2008). Quality-improvement research and informed consent. New England Journal of Medicine, 358(8), 765\u2013767.","journal-title":"New England Journal of Medicine"},{"issue":"3","key":"9952_CR32","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1353\/ken.0.0196","volume":"18","author":"FG Miller","year":"2008","unstructured":"Miller, F. G., Gluck, J. P., Jr., & Wendler, D. (2008). Debriefing and accountability in deceptive research. Kennedy Institute of Ethics Journal, 18(3), 235\u2013251.","journal-title":"Kennedy Institute of Ethics Journal"},{"key":"9952_CR33","volume-title":"The Belmont report: Ethical principles and guidelines for the protection of human subjects of research","author":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research","year":"1979","unstructured":"National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research. (1979). The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. Washington, DC: Department of Health, Education, and Welfare."},{"issue":"3","key":"9952_CR34","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1525\/jer.2007.2.3.49","volume":"2","author":"M Oczak","year":"2007","unstructured":"Oczak, M., & Nied\u017awie\u0144ska, A. (2007). Debriefing in deceptive research: A proposed new procedure. Journal of Empirical Research on Human Research Ethics, 2(3), 49\u201359.","journal-title":"Journal of Empirical Research on Human Research Ethics"},{"issue":"3","key":"9952_CR35","doi-asserted-by":"publisher","first-page":"927","DOI":"10.2466\/pr0.1981.48.3.927","volume":"48","author":"R Pihl","year":"1981","unstructured":"Pihl, R., Zacchia, C., & Zeichner, A. (1981). Follow-up analysis of the use of deception and aversive contingencies in psychological experiments. Psychological Reports, 48(3), 927\u2013930.","journal-title":"Psychological Reports"},{"key":"9952_CR36","unstructured":"Ponemon Institute. (2015). The costs of phishing & value of employee training. https:\/\/info.wombatsecurity.com\/hubfs\/Ponemon_Institute_Cost_of_Phishing.pdf?t=1499361243887 . Accessed 6 July 2017."},{"issue":"3","key":"9952_CR37","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1111\/j.1467-8519.2005.00441.x","volume":"19","author":"MJ Selgelid","year":"2005","unstructured":"Selgelid, M. J. (2005). Ethics and infectious disease. Bioethics, 19(3), 272\u2013289.","journal-title":"Bioethics"},{"issue":"5","key":"9952_CR38","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1037\/0022-3514.44.5.1075","volume":"44","author":"SS Smith","year":"1983","unstructured":"Smith, S. S., & Richardson, D. (1983). Amelioration of deception and harm in psychological research: The important role of debriefing. Journal of Personality and Social Psychology, 44(5), 1075\u20131082.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"5","key":"9952_CR39","doi-asserted-by":"publisher","first-page":"40","DOI":"10.2307\/3561449","volume":"8","author":"A Sobel","year":"1978","unstructured":"Sobel, A. (1978). Deception in social science research: Is informed consent possible? Hastings Center Report, 8(5), 40\u201345.","journal-title":"Hastings Center Report"},{"issue":"1","key":"9952_CR40","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1207\/s15327019eb0501_6","volume":"5","author":"E Soliday","year":"1995","unstructured":"Soliday, E., & Stanton, A. L. (1995). Deceived versus nondeceived participants\u2019 perceptions of scientific and applied psychology. Ethics and Behavior, 5(1), 87\u2013104.","journal-title":"Ethics and Behavior"},{"key":"9952_CR41","unstructured":"United Kingdom, Department of Health. (2005). Research governance framework for health and social care. https:\/\/www.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/139565\/dh_4122427.pdf . Accessed 14 July 2017."},{"key":"9952_CR42","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1186\/1471-2288-11-40","volume":"11","author":"A Vellinga","year":"2011","unstructured":"Vellinga, A., Cormican, M., Hanahoe, B., Bennett, K., & Murphy, A. W. (2011). Opt-out as an acceptable method of obtaining consent in medical research: A short report. BMC Medical Research Methodology, 11, 40.","journal-title":"BMC Medical Research Methodology"},{"key":"9952_CR43","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1093\/oso\/9780195168655.003.0031","volume-title":"The Oxford textbook of clinical research ethics","author":"D Wendler","year":"2008","unstructured":"Wendler, D., & Miller, F. G. (2008). Deception in research. In E. J. Emanuel, C. Grady, R. A. Crouch, R. K. Lie, F. G. Miller, & D. Wendler (Eds.), The Oxford textbook of clinical research ethics (pp. 315\u2013324). New York, NY: Oxford University Press."},{"key":"9952_CR44","unstructured":"World Medical Association. (2013). Declaration of Helsinki: Ethical principles for medical research involving human subjects. https:\/\/www.wma.net\/policies-post\/wma-declaration-of-helsinki-ethical-principles-for-medical-research-involving-human-subjects\/ . Accessed 12 July 2017."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11948-017-9952-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9952-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-017-9952-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T08:25:12Z","timestamp":1719390312000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11948-017-9952-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,15]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["9952"],"URL":"https:\/\/doi.org\/10.1007\/s11948-017-9952-9","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,15]]},"assertion":[{"value":"26 April 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors have no conflicts of interest to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}