#6293. Ethical requirements for responsible research with hacked data

August 2026publication date
Proposal available till 20-05-2025
4 total number of authors per manuscript0 $

The title of the journal is available only for the authors who have already paid for
Journal’s subject area:
Computer Networks and Communications;
Human-Computer Interaction;
Software;
Artificial Intelligence;
Computer Vision and Pattern Recognition;
Places in the authors’ list:
place 1place 2place 3place 4
FreeFreeFreeFree
2350 $1200 $1050 $900 $
Contract6293.1 Contract6293.2 Contract6293.3 Contract6293.4
1 place - free (for sale)
2 place - free (for sale)
3 place - free (for sale)
4 place - free (for sale)

More details about the manuscript: Science Citation Index Expanded or/and Social Sciences Citation Index
Abstract:
Hacked data—data obtained in an unauthorized manner through illicit access to a computer or computer network—are increasingly being used in scientific research. Examples include conflict modelling studies based on WikiLeaks datasets, and studies on sexual behaviour based on data leaked from Ashley Madison, a dating website hacked in 20XX. Studies of this kind are prima facie lawful because the researchers who processed the data had no involvement in the data breach itself, and the hacked datasets were made publicly available. However, research integrity is not simply reducible to lawfulness. We contend that the ethical acceptability of using datasets of illicit origin cannot simply be presumed, but requires ethical justification. Therefore, the scientific community is urged to address a fundamental ethical question: whether, and under which conditions, conducting research using hacked data can be considered morally justifiable behaviour. This contribution will discuss and critically evaluate the ethical boundaries of research involving hacked data. This emerging ethical dilemma will be examined by analogy with previous debates on the ethics of research using data of unethical origin, such as research with data from Nazi medical experiments. Furthermore, we discuss the compatibility of research involving hacked data with current research ethics instruments such as the Belmont Report and the Oviedo Convention. We posit that research using hacked data should be deemed ethically problematic. However, exceptions may be acknowledged, depending on how the data are processed and the overall value of the study to society. To this end, we propose six ethical and procedural requirements for conducting research with hacked data in an ethically responsible manner.
Keywords:
+

Contacts :
0