BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:Ethical Issues in Network Measurement - Shehar Bano\, Dept. of Com
 puter Science\, University College London (UCL)
DTSTART:20180515T130000Z
DTEND:20180515T140000Z
UID:TALK103960@talks.cam.ac.uk
CONTACT:Alexander Vetterl
DESCRIPTION:Sound science and evidence-based decision making hinge on empi
 ricism - insights derived from rigorous measurements. As our lives increas
 ingly depend on digital devices and online communication\, a diverse set o
 f domains ranging from human behaviour studies\, through malware analysis\
 , to characterisation of information controls make use of data collected v
 ia network measurements. Such measurements introduce new challenges for et
 hical research due to their scale\, speed of information dissemination\, i
 ndirect interaction and complex dependencies between entities\, opacity\, 
 and so forth. The research community has made efforts such as the Menlo Re
 port to re-contextualise and extend existing ethical guidelines (e.g.\, th
 e 1979 Belmont Report widely used in the biomedical and behavioural scienc
 es). However\, apt interpretation of these guidelines against the backdrop
  of an evolving technical\, legal and social landscape is far from simple.
 \n\nIn this talk\, I will walk the audience through a selection of network
  measurement case studies\, with the goal to highlight ethical challenges\
 , the choices made\, and possible alternatives. This will mostly be an int
 eractive discussion\, and will include (at least some of) the following to
 pics:\n\n* Is approval from Institutional Review Board (IRB) / Research Et
 hics Board (REB) enough?\n* Do users with different technical abilities sh
 are similar interpretation of risks?\n* Do the same ethical guidelines app
 ly to measurement process\, and the results generated?\n* Do ethical guide
 lines apply to pre-existing data?\n* What about pre-existing data that was
  obtained by illicit means?\n* What about co-opted measurements (getting t
 hird-parties to indirectly generate measurements towards the targets)?\n* 
 When to obtain consent (when is post facto consent ok)?\n* Is what’s dee
 med legal also ethical?\n* Does legality of method imply safety for implic
 ated subjects?\n* Should academia use higher standards for performing meas
 urement research?\n\n===\nBio\n===\n\n(Shehar) Bano is a postdoctoral rese
 archer in the Information Security Research Group at University College Lo
 ndon. Her research interests centre on networked systems\, particularly in
  the context of security and measurement. Currently\, she is working on th
 e design\, scalability and applications of blockchains with George Danezis
  and Sarah Meiklejohn as part of the EU DECODE and EPSRC Glass Houses proj
 ects. She is a member of IC3 (Initiative for Cryptocurrency and Contract) 
 and UCL Centre for Blockchain Technologies (CBT).\n\nNetwork measurements 
 form a key part of Bano’s research work---ranging from low-layer network
  phenomena such as characterization of IP liveness via active Internet sca
 ns\, to understanding online ecosystems in the context of security and inf
 ormation control. She received her Ph.D. degree ("Characterization of Inte
 rnet Censorship from Multiple Perspectives") from the University of Cambri
 dge in 2017 under the supervision of Prof. Jon Crowcroft (and co-supervise
 d by Dr. Steven Murdoch\, Prof. Vern Paxson\, and Prof. Ross Anderson) whe
 re she was an Honorary Cambridge Trust Scholar\, and was awarded the Mary 
 Bradburn Scholarship by the British Federation of Women Graduates for her 
 research work. Previously she worked on Intrusion Detection Systems (Bro)\
 , and wrote an open-source software for botnet detection (BotFlex). She in
 terned at ICSI\, UC Berkeley in 2012 and 2013. She received her Master's d
 egree in Computer and Communication Security from National University of S
 cience and Technology\, Pakistan in 2013 for which she was awarded the Pre
 sident's Gold Medal. Her work has been published in the Network and Distri
 buted System Security Symposium\, the ACM Internet Measurement Conference\
 , the Symposium on Privacy Enhancing Technologies\, SIGCOMM CCR\, WWW\, an
 d other well-respected venues.\n
LOCATION:LT2\, Computer Laboratory\, William Gates Building
END:VEVENT
END:VCALENDAR
