Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace

Wolter Pieters, Dina Hadžiosmanović, Francien Dechesne

    Research output: Contribution to journalArticleAcademicpeer-review

    8 Citations (Scopus)
    349 Downloads (Pure)


    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safetyrelated, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, dversarial agents (attackers)may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.
    Original languageEnglish
    Pages (from-to)831-850
    Number of pages20
    JournalScience and engineering ethics
    Issue number3
    Publication statusPublished - Jun 2016
    EventNSCS One Conference 2015: New Technologies as Social Experiments - The Hague, Netherlands
    Duration: 13 Apr 201514 Apr 2015


    • EWI-26229
    • EC Grant Agreement nr.: FP7/2007-2013
    • EC Grant Agreement nr.: FP7/318003
    • SCS-Cybersecurity
    • Adversarial experiments
    • IR-97133
    • Empirical security
    • Security-by-experiment
    • Responsible experimentation
    • Social experiments
    • METIS-312701
    • Cyber Security


    Dive into the research topics of 'Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace'. Together they form a unique fingerprint.

    Cite this