Computer Security Scenarios A, B, and C
This survey corresponds to scenarios in the paper "Ethical Frameworks and Computer Security Trolley Problems" by Tadayoshi Kohno (University of Washington), Yasemin Acar (George Washington University), and Wulf Loh (Universität Tübingen). The paper and more information are available online at https://securityethics.cs.washington.edu/
FOR SCENARIOS E* AND F: https://forms.gle/hj4mELZoibKkafYa6 

NOTE: This is an anonymous form. Google will require authentication, but we will not see who fills this out.

NOTE: Limit one response per Google account.

NOTE: Once you submit your answers, you won't be able to edit your response.

NOTE: Once you submit your answers, you can see how others respond.

NOTE: Please answer for yourself, without first learning how others respond.

NOTE: It is possible for the answers to be manipulated if someone fills out the form with multiple Google accounts. So, please use discretion when interpreting the responses to the survey.
A Classic Dilemma: The Trolley Problem
Clear selection
Computer Security Scenario A: Medical Device Vulnerability
Clear selection
Computer Security Scenario B: Research with Stolen Data
Clear selection
Computer Security Scenario C: Inadvertent Vulnerability "Disclosure"
Clear selection
Submit
Clear form
This form was created inside of UW Computer Science & Engineering. Report Abuse