{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:51:51Z","timestamp":1742381511611,"version":"3.37.3"},"reference-count":22,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2017,9,22]],"date-time":"2017-09-22T00:00:00Z","timestamp":1506038400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1237265"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2016,9,22]]},"abstract":"The most important consideration is how the collection of measurements may affect a person's well-being.<\/jats:p>","DOI":"10.1145\/2896816","type":"journal-article","created":{"date-parts":[[2016,9,22]],"date-time":"2016-09-22T17:55:52Z","timestamp":1474566952000},"page":"58-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":98,"title":["Ethical considerations in network measurement papers"],"prefix":"10.1145","volume":"59","author":[{"given":"Craig","family":"Partridge","sequence":"first","affiliation":[{"name":"Raytheon BBN Technologies, Cambridge, MA,"}]},{"given":"Mark","family":"Allman","sequence":"additional","affiliation":[{"name":"International Computer Science Institute"}]}],"member":"320","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Version 5.2","author":"Association for Computing Machinery and IEEE Computer Society.","year":"1999","unstructured":"Association for Computing Machinery and IEEE Computer Society. Software Engineering Code of Ethics and Professional Practice , Version 5.2 , 1999 ; http:\/\/www.acm.org\/about\/se-code Association for Computing Machinery and IEEE Computer Society. Software Engineering Code of Ethics and Professional Practice, Version 5.2, 1999; http:\/\/www.acm.org\/about\/se-code"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.40.3.574"},{"key":"e_1_2_1_3_1","unstructured":"Botnet C. Internet Census 2012; http:\/\/internetcensus2012.bitbucket.org\/paper.html Botnet C. Internet Census 2012 ; http:\/\/internetcensus2012.bitbucket.org\/paper.html"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787485"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 2003 IEEE Aerospace Conference (Big Sky, MT, Mar. 8-15)","author":"Cousins D.","year":"2003","unstructured":"Cousins , D. , Partridge , C. , Bongiovani , K. , Jackson , A.W. , Krishnan , R. , Saxena , T. , and Strayer , W.T . Understanding encrypted networks through signal and systems analysis of traffic timing . In Proceedings of the 2003 IEEE Aerospace Conference (Big Sky, MT, Mar. 8-15) . IEEE Press , Piscataway, NJ , 2003 , 2997--3003. Cousins, D., Partridge, C., Bongiovani, K., Jackson, A.W., Krishnan, R., Saxena, T., and Strayer, W.T. Understanding encrypted networks through signal and systems analysis of traffic timing. In Proceedings of the 2003 IEEE Aerospace Conference (Big Sky, MT, Mar. 8-15). IEEE Press, Piscataway, NJ, 2003, 2997--3003."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298313"},{"key":"e_1_2_1_7_1","volume-title":"Washington, D.C.","author":"Dittrich D.","year":"2012","unstructured":"Dittrich , D. and Kenneally , E . The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security , Washington, D.C. , Aug. 2012 ; https:\/\/www.caida.org\/publications\/papers\/2012\/menlo_report_actual_formatted\/ Dittrich, D. and Kenneally, E. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. U.S. Department of Homeland Security, Washington, D.C., Aug. 2012; https:\/\/www.caida.org\/publications\/papers\/2012\/menlo_report_actual_formatted\/"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/166237.166241"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879173"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2804729.2804733"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.103043"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/1051142"},{"key":"e_1_2_1_14_1","series-title":"Dec. 2007","volume-title":"Why 'anonymous' data sometimes isn't. Wired","author":"Schneier B.","year":"2007","unstructured":"Schneier , B. Why 'anonymous' data sometimes isn't. Wired ( Dec. 2007 ); https:\/\/www.schneier.com\/essays\/archives\/ 2007 \/12\/why_anonymous_data_s.html Schneier, B. Why 'anonymous' data sometimes isn't. Wired (Dec. 2007); https:\/\/www.schneier.com\/essays\/archives\/2007\/12\/why_anonymous_data_s.html"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298307"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 10th<\/sup> USENIX Security Symposium (Washington, D.C.). Usenix Association","author":"Song D.X.","year":"2001","unstructured":"Song , D.X. , Wagner , D. , and Tian , Z . Timing analysis of keystrokes and timing attacks on SSH . In Proceedings of the 10th<\/sup> USENIX Security Symposium (Washington, D.C.). Usenix Association , Berkeley, CA , 2001 . Song, D.X., Wagner, D., and Tian, Z. Timing analysis of keystrokes and timing attacks on SSH. In Proceedings of the 10th<\/sup> USENIX Security Symposium (Washington, D.C.). Usenix Association, Berkeley, CA, 2001."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/800272.810894"},{"key":"e_1_2_1_18_1","volume-title":"D.C.","author":"United States Supreme Court.","year":"1967","unstructured":"United States Supreme Court. Katz v. United States. Washington , D.C. , 1967 ; https:\/\/supreme.justia.com\/cases\/federal\/us\/389\/347\/case.html United States Supreme Court. Katz v. United States. Washington, D.C., 1967; https:\/\/supreme.justia.com\/cases\/federal\/us\/389\/347\/case.html"},{"key":"e_1_2_1_19_1","unstructured":"U.S. Code. 18 Section 3121: General Prohibition on Pen Register and Trap and Trace Device Use; https:\/\/www.law.cornell.edu\/uscode\/text\/18\/3121 U.S. Code. 18 Section 3121: General Prohibition on Pen Register and Trap and Trace Device Use ; https:\/\/www.law.cornell.edu\/uscode\/text\/18\/3121"},{"volume-title":"NC","author":"White House","key":"e_1_2_1_20_1","unstructured":"White House . Press gaggle by Deputy Principal Press Secretary Josh Earnest and Secretary of Education Arne Duncan en route Mooresville , NC , June 6, 2013; https:\/\/www.whitehouse.gov\/the-press-office\/2013\/06\/06\/press-gaggle-deputy-principal-press-secretary-josh-earnest-and-secretary White House. Press gaggle by Deputy Principal Press Secretary Josh Earnest and Secretary of Education Arne Duncan en route Mooresville, NC, June 6, 2013; https:\/\/www.whitehouse.gov\/the-press-office\/2013\/06\/06\/press-gaggle-deputy-principal-press-secretary-josh-earnest-and-secretary"},{"key":"e_1_2_1_21_1","volume-title":"ACM SIGCOMM eBook: Recent Advances in Networking","author":"Willinger W.","year":"2013","unstructured":"Willinger , W. and Roughan , M . Internet topology research redux . In ACM SIGCOMM eBook: Recent Advances in Networking , ACM Press , New York , 2013 ; http:\/\/sigcomm.org\/education\/ebook\/SIGCOMMeBook2013v1_chapter1.pdf Willinger, W. and Roughan, M. Internet topology research redux. In ACM SIGCOMM eBook: Recent Advances in Networking, ACM Press, New York, 2013; http:\/\/sigcomm.org\/education\/ebook\/SIGCOMMeBook2013v1_chapter1.pdf"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880029"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896816","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896816","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,31]],"date-time":"2022-12-31T09:37:33Z","timestamp":1672479453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896816"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,22]]},"references-count":22,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,9,22]]}},"alternative-id":["10.1145\/2896816"],"URL":"https:\/\/doi.org\/10.1145\/2896816","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2016,9,22]]},"assertion":[{"value":"2016-09-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}