Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3093338.3104173acmotherconferencesArticle/Chapter ViewAbstractPublication PagespearcConference Proceedingsconference-collections
poster

Ethical Considerations of Doing Research at Scale

Published: 09 July 2017 Publication History

Abstract

Research computing has taken on new life with the rise of user-friendly clusters, clouds, and grids. These range from infrastructure-as-a-service platforms like Amazon EC2, to campus-scale HTCondor pools, to national infrastructure machines like those found in XSEDE. I present the ethical considerations of doing research at scale by posing three questions from the perspective of a researcher: Who can see my data? Who can use my data? Who can take my data? These questions deal with data privacy and intellectual property concerns. I use the IEEE Code of Ethics and the ACM Code of Ethics and Professional Conduct as ethical guides in addressing these three questions as they pertain to developers of research tools such as workflow management systems. The purpose of asking these questions is two-fold: first to ensure that ethical issues are being discussed during software design, and second to start a conversation about rising concerns with data security and privacy on large-scale computing systems. I seek to address issues which users, system administrators, and software developers can work together to solve. I motivate the need for this conversation with a case study of scientific workflow applications which demonstrates potential pitfalls in the high performance computing ecosystem.

References

[1]
1984. IEEE code of ethics. IEEE Transactions on Reliability R-33, 1 (April 1984), 14--14.
[2]
2004. IEEE Code of Ethics. IEEE Potentials 23, 2 (April 2004), 32--33.
[3]
Ronald E. Anderson (Ed.). 1992. ACM Code of Ethics and Professional Conduct. Commun. ACM 35, 5 (May 1992), 94--99.
[4]
Bernard Gert. 1998. Common Morality and Computing. Ethics and Inf. Technol. 1, 1 (Jan. 1998), 53--60.
[5]
Margi Joshi and Sharon S. Krag. 2010. Issues in Data Management. Science and Engineering Ethics 16, 4 (2010), 743--748.
[6]
Jeremy McDaniel. 2009. Developing an Information Security Program for HIPAA Compliance. In 2009 Information Security Curriculum Development Conference (InfoSecCD '09). ACM, New York, NY, USA, 100--106.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PEARC '17: Practice and Experience in Advanced Research Computing 2017: Sustainability, Success and Impact
July 2017
451 pages
ISBN:9781450352727
DOI:10.1145/3093338
  • General Chair:
  • David Hart
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 July 2017

Check for updates

Author Tags

  1. data ethics
  2. data privacy
  3. high performance computing ethics
  4. information ethics
  5. intellectual property

Qualifiers

  • Poster
  • Research
  • Refereed limited

Conference

PEARC17

Acceptance Rates

PEARC '17 Paper Acceptance Rate 54 of 79 submissions, 68%;
Overall Acceptance Rate 133 of 202 submissions, 66%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 110
    Total Downloads
  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media