Computer Security Ethics Scenarios D*
This survey corresponds to scenarios in the paper "Ethical Frameworks and Computer Security Trolley Problems" by Tadayoshi Kohno (University of Washington), Yasemin Acar (George Washington University), and Wulf Loh (Universität Tübingen). The paper and more information are available online at https://securityethics.cs.washington.edu/

FOR SCENARIOS A, B, AND C: https://forms.gle/GYyXqUvXHbd8sUbZ9 

FOR SCENARIOS E* AND F: https://forms.gle/hj4mELZoibKkafYa6 

NOTE: 
This is an anonymous form. Google will require authentication, but we will not see who fills this out.

NOTE: Limit one response per Google account.

NOTE: Once you submit your answers, you won't be able to edit your response.

NOTE: Once you submit your answers, you can see how others respond.

NOTE: Please answer for yourself, without first learning how others respond.

NOTE: It is possible for the answers to be manipulated if someone fills out the form with multiple Google accounts. So, please use discretion when interpreting the responses to the survey.
A Classic Dilemma: The Trolley Problem
Clear selection
Computer Security Scenario D1: Vulnerability Disclosure (Base Case)
Clear selection
Computer Security Scenario D2: Vulnerability Disclosure (Legal Threat)
Clear selection
Computer Security Scenario D3: Vulnerability Disclosure (Legal Threat with Uncertainty)
Clear selection
Computer Security Scenario D4: Vulnerability Disclosure (Legal Threat with Uncertainty and Uncertain Adversaries)
Clear selection
Computer Security Scenario D5: Vulnerability Disclosure (Legal Threat, Security Responsible)
Clear selection
Computer Security Scenario D6: Vulnerability Disclosure (Legal Threat, Security Responsible, Career-critical Research)
Clear selection
Computer Security Scenario D7: Vulnerability Disclosure (Legal Company, Law-breaking Users)
Clear selection
Submit
Clear form
This form was created inside of UW Computer Science & Engineering. Report Abuse