Matches in SemOpenAlex for { <https://semopenalex.org/work/W4240654660> ?p ?o ?g. }
Showing items 1 to 70 of
70
with 100 items per page.
- W4240654660 endingPage "1" @default.
- W4240654660 startingPage "1" @default.
- W4240654660 abstract "Imagine this scenario: a bank customer walks up to an ATM to withdraw cash from her account. While entering her PIN, she accidentally presses the '3' key at the same time as the 'Clear' key. Instantly $100 comes out of the cash dispenser! Curious, she checks the receipt and seeing that the money did not from her account, she tries the same operation. Again, $100 comes out of the cash dispenser. At this point she has two options, A: she can continue to take advantage of this obvious flaw and tell her friends, or B: she can report this problem to the bank, telling no one else. While Kantian ethics might require the latter, the issue becomes much grayer when it comes to computer software vulnerabilities. Many variables exist to cloud the ethical judgment of a software flaw's discoverer. The question becomes: is it better to report any vulnerability that could cause catastrophic problems (as in the ATM example) or to make the vulnerability information public in order to simultaneously compel the software vendor to address the problem while giving the vendor's customers a chance to prepare for potential exploitation? Software companies are facing this dilemma on a regular basis. There are dozens of websites, newsgroups, and e-mail lists dedicated to the task of sharing vulnerability information, whether condoned by the software company or not. The issue increases in severity as vulnerable software becomes ubiquitous across global networks. The public release of vulnerability information is often the first drop of the monsoon that is the malicious network worm. How this information is controlled and disseminated is critical to the stable operation of millions of computer systems and networks across the globe.Modern software with network capability is fundamentally complex and can span thousands of lines of source code for one small part of the package. Without proper testing and quality assurance, many bugs and errors slip through. Software development requires these iterations of coding and bug fixing to produce stable and polished final products. Larger and more complex software gives a greater chance for a bug to remain undiscovered. Yet, since major vulnerabilities have appeared in relatively smaller projects, proper code audit and testing are critical regardless of the size of a software package or the amount of source code required to produce it. If bugs or security vulnerabilities are not discovered and fixed by the software manufacturers, it is inevitable that they will be discovered by outside researchers.This breeds the ethical conundrum of what the researchers do with the information once it has been discovered. Foundational to disclosure, regardless of the ideology, is the notion of providing useful protective information to the most appropriate audience. Many suggest that disclosure is about doing the 'greatest good' for the greatest number of people, which is an obvious adherence to the ethical principle of Utilitarianism. There are numerous parties involved in the network security process such as software vendor, security researcher, system administrator, and even malicious attacker: all whose intentions reflect on the ethical principles behind their actions." @default.
- W4240654660 created "2022-05-12" @default.
- W4240654660 creator A9999999999 @default.
- W4240654660 date "2005-12-01" @default.
- W4240654660 modified "2023-09-23" @default.
- W4240654660 title "Economies of Disclosure" @default.
- W4240654660 doi "https://doi.org/10.1145/1103936.1103938" @default.
- W4240654660 hasPublicationYear "2005" @default.
- W4240654660 type Work @default.
- W4240654660 citedByCount "0" @default.
- W4240654660 crossrefType "journal-article" @default.
- W4240654660 hasAuthorship W4240654660A9999999999 @default.
- W4240654660 hasConcept C10138342 @default.
- W4240654660 hasConcept C108827166 @default.
- W4240654660 hasConcept C111472728 @default.
- W4240654660 hasConcept C136764020 @default.
- W4240654660 hasConcept C138885662 @default.
- W4240654660 hasConcept C144133560 @default.
- W4240654660 hasConcept C145097563 @default.
- W4240654660 hasConcept C162853370 @default.
- W4240654660 hasConcept C198140048 @default.
- W4240654660 hasConcept C199360897 @default.
- W4240654660 hasConcept C26517878 @default.
- W4240654660 hasConcept C2777338717 @default.
- W4240654660 hasConcept C2777904410 @default.
- W4240654660 hasConcept C2778083465 @default.
- W4240654660 hasConcept C2778496695 @default.
- W4240654660 hasConcept C2778979077 @default.
- W4240654660 hasConcept C38652104 @default.
- W4240654660 hasConcept C41008148 @default.
- W4240654660 hasConcept C95713431 @default.
- W4240654660 hasConceptScore W4240654660C10138342 @default.
- W4240654660 hasConceptScore W4240654660C108827166 @default.
- W4240654660 hasConceptScore W4240654660C111472728 @default.
- W4240654660 hasConceptScore W4240654660C136764020 @default.
- W4240654660 hasConceptScore W4240654660C138885662 @default.
- W4240654660 hasConceptScore W4240654660C144133560 @default.
- W4240654660 hasConceptScore W4240654660C145097563 @default.
- W4240654660 hasConceptScore W4240654660C162853370 @default.
- W4240654660 hasConceptScore W4240654660C198140048 @default.
- W4240654660 hasConceptScore W4240654660C199360897 @default.
- W4240654660 hasConceptScore W4240654660C26517878 @default.
- W4240654660 hasConceptScore W4240654660C2777338717 @default.
- W4240654660 hasConceptScore W4240654660C2777904410 @default.
- W4240654660 hasConceptScore W4240654660C2778083465 @default.
- W4240654660 hasConceptScore W4240654660C2778496695 @default.
- W4240654660 hasConceptScore W4240654660C2778979077 @default.
- W4240654660 hasConceptScore W4240654660C38652104 @default.
- W4240654660 hasConceptScore W4240654660C41008148 @default.
- W4240654660 hasConceptScore W4240654660C95713431 @default.
- W4240654660 hasIssue "3" @default.
- W4240654660 hasLocation W42406546601 @default.
- W4240654660 hasOpenAccess W4240654660 @default.
- W4240654660 hasPrimaryLocation W42406546601 @default.
- W4240654660 hasRelatedWork W1992681057 @default.
- W4240654660 hasRelatedWork W2047413569 @default.
- W4240654660 hasRelatedWork W2088813341 @default.
- W4240654660 hasRelatedWork W2091016783 @default.
- W4240654660 hasRelatedWork W2169402599 @default.
- W4240654660 hasRelatedWork W2370662802 @default.
- W4240654660 hasRelatedWork W2379779674 @default.
- W4240654660 hasRelatedWork W3115665754 @default.
- W4240654660 hasRelatedWork W4205200885 @default.
- W4240654660 hasRelatedWork W4321178750 @default.
- W4240654660 hasVolume "34" @default.
- W4240654660 isParatext "false" @default.
- W4240654660 isRetracted "false" @default.
- W4240654660 workType "article" @default.