Experiences with Ethics and Computer Security 
We intend to create a repository of past ethics-related experiences within the computer security community (research, industry, government, and more).

Please fill out this form if you have had or know of any experiences that you are comfortable sharing (with attribution).

This form is part of a broader effort related to the paper "Ethical Frameworks and Computer Security Trolley Problems" by Tadayoshi Kohno (University of Washington), Yasemin Acar (George Washington University). The paper and more information are available online at https://securityethics.cs.washington.edu/

NOTE: You can choose to submit this form anonymously or give your name and email address. If you give your name and email address, we will attribute the information you provide to you.

NOTE: Only include in this form information that is okay to be public. For example, you might generalize or anonymize your scenario in some way.

NOTE: You may fill out this form multiple times, once for each experience that you wish to report.

NOTE: When sharing the results of this survey, we may not share all the answers we receive. E.g., if the survey response contains offensive language or appears to be spam, we will not share it. When submissions are not anonymous, we may also contact the submitter for additional information or to propose/request a revision to wording.

NOTE: After you submit the form, you should see a link that says "Edit your response". That should allow you to edit your response. If you save that link, you should be able to edit your response later (we have not extensively tested how long this link remains valid). Once we begin curating a response and preparing it for public sharing, we may miss any subsequent edits (any edits made within a few days of initial submission will likely not be missed).
Sign in to Google to save your progress. Learn more
Your name (optional)
Your institution and department (optional)
Your email address (optional)
Describe the situation that you encountered or that you know about (optional)
In what context did this situation manifest (e.g., academic research, industry research, industry, government, civil society)? (optional)
When did this situation manifest (as best you can remember, e.g., "Spring 2018", "more than five years ago", "last month") (optional)
Describe the outcome / result of the situation (optional)
Describe the process used to come to the above-mentioned outcome / result (optional)
Describe the arguments for the above-mentioned outcome / result (optional)
Describe the arguments against the above-mentioned outcome / result (optional)
Describe any alternatives that were explored prior to coming to the above-mentioned outcome / result (optional)
Knowing what you and the community know now, do you think the same situation today would result in a different outcome / result? (optional)
In retrospect, was the outcome / result the right outcome / result? (optional)
Is there anything else that you would like people reading your answers to know? (optional)
Submit
Clear form
Never submit passwords through Google Forms.
This form was created inside of UW Computer Science & Engineering. Report Abuse