{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:37:59Z","timestamp":1773247079983,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["833115"],"award-info":[{"award-number":["833115"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s00779-020-01510-3","type":"journal-article","created":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T13:02:37Z","timestamp":1609592557000},"page":"193-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["First broad and systematic horizon scanning campaign and study to detect societal and ethical dilemmas and emerging issues spanning over cybersecurity solutions"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4380-014X","authenticated-orcid":false,"given":"Aleksandra","family":"Pawlicka","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"key":"1510_CR1","unstructured":"Humphries M (2020) Report: Garmin paid the ransomware demand. PCMagazine"},{"key":"1510_CR2","volume-title":"Web meeting focuses on cyber ethical challenges of COVID-19","author":"World Council of Churches","year":"2020","unstructured":"World Council of Churches (2020) Web meeting focuses on cyber ethical challenges of COVID-19. World Counc, Churches"},{"key":"1510_CR3","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1007\/s11023-019-09508-4","volume":"29","author":"P Timmers","year":"2019","unstructured":"Timmers P (2019) Ethics of AI and cybersecurity when sovereignty is at stake. Minds Mach 29:635\u2013645. https:\/\/doi.org\/10.1007\/s11023-019-09508-4","journal-title":"Minds Mach"},{"key":"1510_CR4","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard J, Nepal S (2014) A survey of emerging threats in cybersecurity. J Comput Syst Sci 80:973\u2013993. https:\/\/doi.org\/10.1016\/j.jcss.2014.02.005","journal-title":"J Comput Syst Sci"},{"key":"1510_CR5","doi-asserted-by":"publisher","unstructured":"P.S S, S N, M S (2018) Overview of cyber security. IJARCCE 7:125\u2013128 . https:\/\/doi.org\/10.17148\/IJARCCE.2018.71127","DOI":"10.17148\/IJARCCE.2018.71127"},{"key":"1510_CR6","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3233\/JCS-2009-0398","volume":"19","author":"LA Gordon","year":"2011","unstructured":"Gordon LA, Loeb MP, Zhou L (2011) The impact of information security breaches: has there been a downward shift in costs? J Comput Secur 19:33\u201356. https:\/\/doi.org\/10.3233\/JCS-2009-0398","journal-title":"J Comput Secur"},{"key":"1510_CR7","doi-asserted-by":"crossref","unstructured":"Chora\u015b M, Pawlicki M, Kozik R (2019) The feasibility of deep learning use for adversarial model extraction in the cybersecurity domain. pp 353\u2013360","DOI":"10.1007\/978-3-030-33617-2_36"},{"key":"1510_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.future.2020.04.013","volume":"110","author":"M Pawlicki","year":"2020","unstructured":"Pawlicki M, Chora\u015b M, Kozik R (2020) Defending network intrusion detection systems against adversarial evasion attacks. Futur Gener Comput Syst 110:148\u2013154. https:\/\/doi.org\/10.1016\/j.future.2020.04.013","journal-title":"Futur Gener Comput Syst"},{"key":"1510_CR9","doi-asserted-by":"crossref","unstructured":"Punitha L, Saravanan T, Varnika N (2016) Impact of an electromagnetic threat on cyberspace and cyber security against EM threat. In: 2016 International Conference on Information Communication and Embedded Systems (ICICES). IEEE, pp 1\u20135","DOI":"10.1109\/ICICES.2016.7518853"},{"key":"1510_CR10","unstructured":"Dean PC, Buck J, Dean P (2014) Identity theft: a situation of worry. J Acad Bus Ethics"},{"key":"1510_CR11","unstructured":"Khanna S (2018) How consumers are changing their behavior to combat ID theft. J Account"},{"key":"1510_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5897\/JLCR11.044","volume":"4","author":"A Hedayati","year":"2012","unstructured":"Hedayati A (2012) An analysis of identity theft: motives, related frauds, techniques and prevention. J Law Confl Resolut 4:1\u201312. https:\/\/doi.org\/10.5897\/JLCR11.044","journal-title":"J Law Confl Resolut"},{"key":"1510_CR13","doi-asserted-by":"crossref","unstructured":"Szczepanski M, Chora\u015b M, Pawlicki M, Kozik R (2020) Achieving explainability of intrusion detection system by hybrid oracle-explainer approach. In: Proc. of International Joint Conference on Neural Networks, IJCNN 2020, IEEE. Glasgow","DOI":"10.1109\/IJCNN48605.2020.9207199"},{"key":"1510_CR14","doi-asserted-by":"crossref","unstructured":"Akhgar B, Chora\u015b M, Brewster B, Bosco F, Vermeersch E, Luda V, Puchalski D, Wells D (2016) Consolidated taxonomy and research roadmap for cybercrime and cyberterrorism. pp 295\u2013321","DOI":"10.1007\/978-3-319-38930-1_16"},{"key":"1510_CR15","doi-asserted-by":"crossref","unstructured":"Chora\u015b M, Kozik R, Churchill A, Yautsiukhin A (2016) Are we doing all the right things to counter cybercrime? pp 279\u2013294","DOI":"10.1007\/978-3-319-38930-1_15"},{"key":"1510_CR16","doi-asserted-by":"publisher","unstructured":"Grobler M, Chamikara MAP, Abbott J, Jeong JJ, Nepal S, Paris C (2020) The importance of social identity on password formulations. Pers Ubiquitous Comput. https:\/\/doi.org\/10.1007\/s00779-020-01477-1","DOI":"10.1007\/s00779-020-01477-1"},{"key":"1510_CR17","first-page":"1","volume":"1","author":"I Frank","year":"2013","unstructured":"Frank I, Odunayo E (2013) Approach to cyber security issues in Nigeria: challenges and solution. Int J Cogn Res Sci Eng Educ 1:1","journal-title":"Int J Cogn Res Sci Eng Educ"},{"key":"1510_CR18","unstructured":"Buscher M, Easton C, Kerasidou CX, Escalante MAL, Alter H, Petersen K, Bonnamour MC, Lund D, Baur A, Quinn R, Heesen J, Jasmontaite L, Fuster GG, Boden A, Hofmann B, Stachowicz A, Choras M, Kozik R, Boersma K, Comes M, Clavell GG, F\u00f6ger N (2018) The isitethical? Exchange responsible research and innovation for disaster risk management"},{"key":"1510_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/07366981.2019.1651516","volume":"60","author":"D Shoemaker","year":"2019","unstructured":"Shoemaker D, Kohnke A, Laidlaw G (2019) Ethics and cybersecurity are not mutually exclusive. EDPACS 60:1\u201310. https:\/\/doi.org\/10.1080\/07366981.2019.1651516","journal-title":"EDPACS"},{"key":"1510_CR20","unstructured":"Puddephatt A, Kaspar L (2015) Cybersecurity is the new battleground for human rights. openDemocracy"},{"key":"1510_CR21","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MTS.2020.3031848","volume":"39","author":"A Pawlicka","year":"2020","unstructured":"Pawlicka A, Jaroszewska-Chora\u015b D, Chora\u015b M, Pawlicki M (2020) The guidelines for stego\/malware detection tools achieving GDPR compliance. IEEE Technol Soc Mag 39:60\u201370","journal-title":"IEEE Technol Soc Mag"},{"key":"1510_CR22","unstructured":"Delaney K (2014) A practical guide: introduction to horizon scanning in the public sector"},{"key":"1510_CR23","doi-asserted-by":"publisher","unstructured":"Cuhls KE (2020) Horizon scanning in foresight \u2013 why horizon scanning is only a part of the game. Futur FORESIGHT Sci 2. https:\/\/doi.org\/10.1002\/ffo2.23","DOI":"10.1002\/ffo2.23"},{"key":"1510_CR24","unstructured":"Directorate-General for Research and Innovation (European Commission), Fraunhofer Institute for Systems and Innovation, TNO, VTT Technical Research (2016) Models of horizon scanning. How to integrate horizon scanning into European research and innovation policies"},{"key":"1510_CR25","unstructured":"Bishop P (2009) Horizon scanning why is it so hard?"},{"key":"1510_CR26","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.techfore.2017.08.001","volume":"125","author":"E Rowe","year":"2017","unstructured":"Rowe E, Wright G, Derbyshire J (2017) Enhancing horizon scanning by utilizing pre-developed scenarios: analysis of current practice and specification of a process improvement to aid the identification of important \u2018weak signals\u2019. Technol Forecast Soc Change 125:224\u2013235. https:\/\/doi.org\/10.1016\/j.techfore.2017.08.001","journal-title":"Technol Forecast Soc Change"},{"key":"1510_CR27","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/s10550-007-0022-8","volume":"25","author":"D Brown","year":"2007","unstructured":"Brown D (2007) Horizon scanning and the business environment \u2014 the implications for risk management. BT Technol J 25:208\u2013214. https:\/\/doi.org\/10.1007\/s10550-007-0022-8","journal-title":"BT Technol J"},{"key":"1510_CR28","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1093\/scipol\/scs017","volume":"39","author":"E Amanatidou","year":"2012","unstructured":"Amanatidou E, Butter M, Carabias V, Konnola T, Leis M, Saritas O, Schaper-Rinkel P, van Rij V (2012) On concepts and methods in horizon scanning: Lessons from initiating policy dialogues on emerging issues. Sci Public Policy 39:208\u2013221. https:\/\/doi.org\/10.1093\/scipol\/scs017","journal-title":"Sci Public Policy"},{"key":"1510_CR29","doi-asserted-by":"crossref","unstructured":"Karasalo M, Schubert J (2019) Developing horizon scanning methods for the discovery of scientific trends. In: 2019 International Conference on Document Analysis and Recognition (ICDAR). IEEE, pp 1055\u20131062","DOI":"10.1109\/ICDAR.2019.00172"},{"key":"1510_CR30","unstructured":"M\u00fcller S (2014) Free yet secure on the internet: how can internet security be reconciled with human rights? Alumniportal Deutschl"},{"key":"1510_CR31","unstructured":"Robertson A (2019) Border agents are checking entrants\u2019 Facebook and Twitter profiles \u2014 but we still don\u2019t know how closely. The Verge"},{"key":"1510_CR32","unstructured":"EDRi (2018) New protocol on cybercrime: a recipe for human rights abuse? In: Eur Digit Rights"},{"key":"1510_CR33","unstructured":"Sedgwick S (2019) Ethics in technology & cyber security. In: Linkedin"},{"key":"1510_CR34","unstructured":"(2019) Cybersecurity \u2013 a matter of ethics. In: EC-Council Univ. Blog. https:\/\/blog.eccu.edu\/cybersecurity-a-matter-of-ethics\/"},{"key":"1510_CR35","unstructured":"Team ANP (2017) A closer look at China\u2019s cybersecurity law \u2014 cybersecurity, or something else? Accessnow"},{"key":"1510_CR36","unstructured":"Lindskog D (2017) The top 7 ethical dilemmas reported by IT in 2016. IT World Canada"},{"key":"1510_CR37","unstructured":"Campbell-Dollaghan K (2018) Sorry, your data can still be identified even if it\u2019s anonymized. Fast Co."},{"key":"1510_CR38","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1007\/s00779-017-1045-x","volume":"21","author":"J Lai","year":"2017","unstructured":"Lai J, Mu Y, Guo F, Susilo W, Chen R (2017) Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city. Pers Ubiquitous Comput 21:855\u2013868. https:\/\/doi.org\/10.1007\/s00779-017-1045-x","journal-title":"Pers Ubiquitous Comput"},{"key":"1510_CR39","first-page":"3","volume":"5","author":"D Jamil","year":"2011","unstructured":"Jamil D, Ali Khan MN (2011) Is ethical hacking ethical? Int J Eng Sci Technol 5:3","journal-title":"Int J Eng Sci Technol"},{"key":"1510_CR40","unstructured":"Jackson T (2015) Can Africa fight cybercrime and preserve human rights? BBC News"},{"key":"1510_CR41","unstructured":"(2017) Cybersecurity challenges in healthcare - ethical, legal and social aspects. In: Found. Brocher. https:\/\/www.brocher.ch\/en\/events\/274\/cybersecurity-challenges-in-healthcare-ethical-legal-and-social-aspects\/"},{"key":"1510_CR42","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1017\/S0892679418000576","volume":"32","author":"M Finnemore","year":"2018","unstructured":"Finnemore M (2018) Ethical dilemmas in cyberspace. Ethics Int Aff 32:457\u2013462. https:\/\/doi.org\/10.1017\/S0892679418000576","journal-title":"Ethics Int Aff"},{"key":"1510_CR43","unstructured":"Grinnell R (2019) The ethical use of data. CSO"},{"key":"1510_CR44","unstructured":"Stile EM (2017) Cyber security and data privacy in Argentina. Financ. Worldw"},{"key":"1510_CR45","unstructured":"Gavirneni S (2019) The ethical dilemma of ransomware payouts. Zeguro"},{"key":"1510_CR46","unstructured":"Lee WW (2015) Risk and ethics in cyberspace. ISACA J 6"},{"key":"1510_CR47","unstructured":"Sethfors H (2017) Captchas suck. https:\/\/axesslab.com\/captchas-suck\/"},{"key":"1510_CR48","unstructured":"Pompom R (2018) The ethical and legal dilemmas of threat researchers. HelpNetSecurity"},{"key":"1510_CR49","unstructured":"Burstein A (2009) Legal and ethical issues facing cybersecurity researchers"},{"key":"1510_CR50","unstructured":"Bradbury D (2017) In search of an ethical code for cybersecurity. Infosecurity Mag."},{"key":"1510_CR51","unstructured":"Martin CD (2019) EES perspective when white hats wear black hats: The Ethics of Cybersecurity. Fall Issue Bridg Cybersecurity"},{"key":"1510_CR52","doi-asserted-by":"crossref","unstructured":"Shou D (2012) Ethical considerations of sharing data for cybersecurity research. pp 169\u2013177","DOI":"10.1007\/978-3-642-29889-9_15"},{"key":"1510_CR53","unstructured":"Flake H (2020) Why I [love] offensive work Why I [hate] offensive work. https:\/\/docs.google.com\/presentation\/d\/1YcBqgccBcdn5-v80OX8NTYdu_-qRmrwfejlEx6eq-4E\/edit#slide=id.g7dd52a5bec_0_1028"},{"key":"1510_CR54","doi-asserted-by":"crossref","unstructured":"Faily S, McAlaney J, Claudia I (2015) Ethical dilemmas and dimensions in penetration testing","DOI":"10.14236\/ewic\/HCI2016.83"},{"key":"1510_CR55","first-page":"922","volume":"7","author":"M Munjal","year":"2014","unstructured":"Munjal M (2014) Ethical hacking: an impact on society. Cyber Times Int J Technol Manag 7:922\u2013931","journal-title":"Cyber Times Int J Technol Manag"},{"key":"1510_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.29297\/orbit.v2i1.77","volume":"2","author":"T Georg","year":"2018","unstructured":"Georg T, Oliver B, Gregory L (2018) Issues of implied trust in ethical hacking. ORBIT J 2:1\u201319. https:\/\/doi.org\/10.29297\/orbit.v2i1.77","journal-title":"ORBIT J"},{"key":"1510_CR57","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.cose.2019.02.012","volume":"83","author":"JM Hatfield","year":"2019","unstructured":"Hatfield JM (2019) Virtuous human hacking: the ethics of social engineering in penetration-testing. Comput Secur 83:354\u2013366. https:\/\/doi.org\/10.1016\/j.cose.2019.02.012","journal-title":"Comput Secur"},{"key":"1510_CR58","unstructured":"Shinder D (2005) Ethical issues for IT security professionals. Computerworld"},{"key":"1510_CR59","unstructured":"Ministry of Electronics and Information Technology REPORT OF COMMITTEE \u2013 D ON CYBER SECURITY, SAFETY, LEGAL AND ETHICAL ISSUES"},{"key":"1510_CR60","doi-asserted-by":"publisher","unstructured":"(2017) Ethics in information security. IEEE Secur Priv 15:3\u20134. https:\/\/doi.org\/10.1109\/MSP.2017.75","DOI":"10.1109\/MSP.2017.75"},{"key":"1510_CR61","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s11023-019-09504-8","volume":"29","author":"M Taddeo","year":"2019","unstructured":"Taddeo M (2019) Three ethical challenges of applications of artificial intelligence in cybersecurity. Minds Mach 29:187\u2013191. https:\/\/doi.org\/10.1007\/s11023-019-09504-8","journal-title":"Minds Mach"},{"key":"1510_CR62","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1093\/jigpal\/jzu038","volume":"23","author":"M Chora\u015b","year":"2015","unstructured":"Chora\u015b M, Kozik R (2015) Machine learning techniques applied to detect cyber attacks on web applications. Log J IGPL 23:45\u201346","journal-title":"Log J IGPL"},{"key":"1510_CR63","first-page":"615","volume":"4","author":"M Chora\u015b","year":"2020","unstructured":"Chora\u015b M, Pawlicki M, Puchalski D, Kozik R (2020) Machine learning - the results are not the only thing that matters! What about security, explainability and fairness? ICCS 4:615\u2013628","journal-title":"ICCS"},{"key":"1510_CR64","unstructured":"Dobrygowski D, Hoffman W (2019) We need to build up \u2018digital trust\u2019 in tech. In: Wired. https:\/\/www.wired.com\/preview\/story\/5ce82fe9b256981c3b6b2bd5"},{"key":"1510_CR65","unstructured":"Walma M Four common myths about human rights and security in cyberspace. Free Online Coalition"},{"key":"1510_CR66","unstructured":"Jay J (2020) AI and big data could introduce fresh cyber security challenges: Europol"},{"key":"1510_CR67","unstructured":"Brown D, Esterhuysen A (2019) Why cybersecurity is a human rights issue, and it is time to start treating it like one. In: APCNews. https:\/\/www.apc.org\/en\/news\/why-cybersecurity-human-rights-issue-and-it-time-start-treating-it-one"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-020-01510-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-020-01510-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-020-01510-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T10:09:17Z","timestamp":1681898957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-020-01510-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["1510"],"URL":"https:\/\/doi.org\/10.1007\/s00779-020-01510-3","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"7 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"There are neither any conflicts of interest nor competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"This paper reflects only the authors view, and the European Commission is not liable to any use that may be made of the information contained therein.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimer"}}]}}