@inproceedings{345ddbb8eb764ddd840a937819529962,
title = "It's not stealing if you need it: A panel on the ethics of performing research using public data of illicit origin",
abstract = "In a world where sensitive data can be published to a worldwide audience with the press of a button, researchers are increasingly making use of datasets that were publicized under questionable circumstances. In many cases, such research would otherwise not be possible. For instance, Weir et al. examined over thirty million user-generated passwords in order to observe the effects of entropy on password cracking [10].",
author = "Serge Egelman and Joseph Bonneau and Sonia Chiasson and David Dittrich and Stuart Schechter",
year = "2012",
doi = "10.1007/978-3-642-34638-5_11",
language = "English (US)",
isbn = "9783642346378",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "124--132",
booktitle = "Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Revised Selected Papers",
note = "16th International Conference on Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, FC 2012 Workshops - USEC and WECSR 2012 ; Conference date: 02-03-2012 Through 02-03-2012",
}