{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:39:51Z","timestamp":1777635591518,"version":"3.51.4"},"reference-count":164,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2007,12,1]],"date-time":"2007-12-01T00:00:00Z","timestamp":1196467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci Eng Ethics"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1007\/s11948-007-9043-4","type":"journal-article","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T08:44:56Z","timestamp":1196412296000},"page":"523-580","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":118,"title":["Ethical and Philosophical Consideration of the Dual-use Dilemma in the Biological Sciences"],"prefix":"10.1007","volume":"13","author":[{"given":"Seumas","family":"Miller","sequence":"first","affiliation":[]},{"given":"Michael J.","family":"Selgelid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,12,1]]},"reference":[{"issue":"6925","key":"9043_CR1","doi-asserted-by":"publisher","first-page":"771","DOI":"10.1038\/nature01479","volume":"421","author":"Anonymous","year":"2003","unstructured":"Anonymous (2003). Statement on the consideration of biodefence and biosecurity. Nature, 421(6925), 771.","journal-title":"Nature"},{"issue":"1","key":"9043_CR2","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1089\/bsp.2005.3.51","volume":"3","author":"R. M. Atlas","year":"2005","unstructured":"Atlas, R. M., & Reppy, J. (2005). Globalizing biosecurity. Biosecurity and Bioterrorism, 3(1), 51\u201360.","journal-title":"Biosecurity and Bioterrorism"},{"key":"9043_CR3","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1023\/B:MINE.0000038308.46951.ed","volume":"42","author":"L. Badash","year":"2004","unstructured":"Badash, L. (2004). Science and social responsibility. Minerva, 42, 285\u2013298.","journal-title":"Minerva"},{"issue":"1","key":"9043_CR4","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1023\/A:1015009613250","volume":"40","author":"B. Balmer","year":"2002","unstructured":"Balmer, B. (2002). Killing without the distressing preliminaries: Scientists defence of the British biological warfare programme. Minerva, 40(1), 57\u201375.","journal-title":"Minerva"},{"issue":"3","key":"9043_CR5","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1080\/00963402.2002.11460572","volume":"58","author":"M. Barletta","year":"2002","unstructured":"Barletta, M., Sands, A., & Tucker, J. B. (2002). Keeping track of anthrax: The case for a biosecurity convention. Bulletin of the Atomic Scientists, 58(3), 57\u201362.","journal-title":"Bulletin of the Atomic Scientists"},{"issue":"Special Issue","key":"9043_CR6","doi-asserted-by":"publisher","first-page":"S53","DOI":"10.1038\/sj.embor.embor853","volume":"4","author":"V. Beck","year":"2003","unstructured":"Beck, V. (2003). Advances in life sciences and bioterrorism. EMBO Reports, 4(Special Issue), S53\u2013S56.","journal-title":"EMBO Reports"},{"issue":"1","key":"9043_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1511\/2001.1.28","volume":"89","author":"S. M. Block","year":"2001","unstructured":"Block, S. M. (2001). The growing threat of biological weapons. American Scientist, 89(1), 28\u201338.","journal-title":"American Scientist"},{"key":"9043_CR8","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1126\/science.297.5582.769b","volume":"297","author":"S. M. Block","year":"2002","unstructured":"Block, S. M. (2002). A not-so-cheap stunt. Science, 297, 769.","journal-title":"Science"},{"issue":"5583","key":"9043_CR9","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1126\/science.1072266","volume":"297","author":"J. *Cello","year":"2002","unstructured":"*Cello, J., Paul, A. V., & Wimmer, E. (2002). Chemical synthesis of poliovirus cDNA: Generation of infectious virus in the absence of natural template. Science, 297(5583), 1016\u20131018.","journal-title":"Science"},{"issue":"6942","key":"9043_CR10","doi-asserted-by":"crossref","first-page":"789","DOI":"10.1038\/423789a","volume":"423","author":"E. Check","year":"2003","unstructured":"Check, E. (2003). US army attacked over published patent for bioweapons grenade. Nature, 423(6942), 789.","journal-title":"Nature"},{"issue":"5","key":"9043_CR11","doi-asserted-by":"crossref","first-page":"29","DOI":"10.2968\/058005011","volume":"58","author":"E. Choffnes","year":"2002","unstructured":"Choffnes, E. (2002). Bioweapons: New labs, more terror? Bulletin of the Atomic Scientists, 58(5), 29\u201332.","journal-title":"Bulletin of the Atomic Scientists"},{"key":"9043_CR12","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1126\/science.308.5730.1867c","volume":"308","author":"R. M. Cook-Deegan","year":"2005","unstructured":"Cook-Deegan, R. M., Berkelman, R., Davidson, E. M., Finder, S., Heitman, E., Kelley, M. C., King, N. M. P., Moseley, R., Thomas, J. C., Tilden, S. J., & Vangsnes, N. M. (2005). Issues in biosecurity and biosafety. Science, 308, 1867\u20131868.","journal-title":"Science"},{"key":"9043_CR13","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1126\/science.297.5579.174b","volume":"297","author":"J. Couzin","year":"2002","unstructured":"Couzin, J. (2002). Active poliovirus baked from scratch. Science, 297, 174\u2013175.","journal-title":"Science"},{"issue":"5664","key":"9043_CR14","doi-asserted-by":"publisher","first-page":"1595","DOI":"10.1126\/science.303.5664.1595a","volume":"303","author":"J. Couzin","year":"2004","unstructured":"Couzin, J. (2004). US agencies unveil plan for biosecurity peer review. Science, 303(5664), 1595.","journal-title":"Science"},{"issue":"4","key":"9043_CR15","doi-asserted-by":"publisher","first-page":"1463","DOI":"10.1073\/pnas.1532911100","volume":"100","author":"N. R. Cozzarelli","year":"2003","unstructured":"Cozzarelli, N. R. (2003). PNAS policy on publication of sensitive material in the life sciences. Proceedings of the National Academy of Sciences, 100(4), 1463.","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"9043_CR16","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1017\/S0963180105050437","volume":"14","author":"L. Eckenwiler","year":"2005","unstructured":"Eckenwiler, L. (2005). Ethics and the underpinnings of policy in biodefense and emergency preparedness. Cambridge Quarterly of Healthcare Ethics, 14, 306\u2013315.","journal-title":"Cambridge Quarterly of Healthcare Ethics"},{"issue":"12","key":"9043_CR17","first-page":"1517","volume":"168","author":"Editorial","year":"2003","unstructured":"Editorial (2003). Censoring science. Canadian Medical Association Journal, 168(12), 1517.","journal-title":"Canadian Medical Association Journal"},{"issue":"11","key":"9043_CR18","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1021\/cen-v082n011.p011","volume":"82","author":"L. Ember","year":"2004","unstructured":"Ember, L. (2004). Securing dual-use biology. Chemical and Engineering News, 82(11), 11.","journal-title":"Chemical and Engineering News"},{"issue":"5684","key":"9043_CR19","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1126\/science.305.5684.594","volume":"305","author":"M. Enserink","year":"2004","unstructured":"Enserink, M. (2004). Tiptoeing around pandoras box. Science, 305(5684), 594\u2013595.","journal-title":"Science"},{"issue":"5714","key":"9043_CR20","doi-asserted-by":"publisher","first-page":"1396","DOI":"10.1126\/science.307.5714.1396","volume":"307","author":"M. Enserink","year":"2005","unstructured":"Enserink, M., & Kaiser, J. (2005). Has biodefense gone overboard? Science, 307(5714), 1396\u20131398.","journal-title":"Science"},{"issue":"4","key":"9043_CR21","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1080\/1040841X.2019.12056992","volume":"27","author":"G. L. Epstein","year":"2001","unstructured":"Epstein, G. L. (2001). Controlling biological warfare threats: Resolving potential tensions among the research community, industry, and the National Security Community. Critical Reviews in Microbiology, 27(4), 321\u2013354.","journal-title":"Critical Reviews in Microbiology"},{"issue":"10","key":"9043_CR22","doi-asserted-by":"publisher","first-page":"5575","DOI":"10.1073\/pnas.1232277100","volume":"100","author":"S. Falkow","year":"2003","unstructured":"Falkow, S. (2003). \u201cStatement on Scientific Publication and Security\u201d fails to provide necessary guidelines. Proceedings of the National Academy of Sciences, 100(10), 5575\u20135576.","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"Special Issue","key":"9043_CR23","doi-asserted-by":"publisher","first-page":"S47","DOI":"10.1038\/sj.embor.embor849","volume":"4","author":"F. Frishknecht","year":"2003","unstructured":"Frishknecht, F. (2003). The history of biological warfare. EMBO Reports, 4(Special Issue), S47\u2013S52.","journal-title":"EMBO Reports"},{"issue":"4","key":"9043_CR24","first-page":"432","volume":"15","author":"for the Counceil on Ethical, Judicial Affairs of the American Medical Association)","year":"2006","unstructured":"Green, S. K., Taub, S., Morin, K., & Higginson, D. (for the Counceil on Ethical, Judicial Affairs of the American Medical Association) (2006). Position paper: Guidelines to prevent malevolent use of biomedical research. Cambridge Quarterly of Healthcare Ethics, 15(4), 432\u2013439.","journal-title":"Cambridge Quarterly of Healthcare Ethics"},{"issue":"7","key":"9043_CR25","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1086\/323808","volume":"33","author":"D. A. Henderson","year":"2001","unstructured":"Henderson, D. A., & Fenner, F. (2001). Recent events and observations pertaining to smallpox virus destruction in 2002. Clinical Infectious Diseases, 33(7), 1057\u20131059.","journal-title":"Clinical Infectious Diseases"},{"issue":"3","key":"9043_CR26","doi-asserted-by":"publisher","first-page":"1205","DOI":"10.1128\/JVI.75.3.1205-1210.2001","volume":"75","author":"R. J. *Jackson","year":"2001","unstructured":"*Jackson, R. J., Ramsay, A. J., Christensen, C. D., Beaton, S., Hall, D. F., & Ramshaw, I. A. (2001). Expression of mouse interleukin-4 by a recombinant ectromelia virus suppresses cytolytic lymphocyte responses and overcomes genetic resistance to mousepox. Journal of Virology, 75(3), 1205\u20131210.","journal-title":"Journal of Virology"},{"issue":"1","key":"9043_CR27","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/j.virol.2004.11.030","volume":"332","author":"J. B. *Johnston","year":"2005","unstructured":"*Johnston, J. B., Nazarian, S. H., & McFadden, R. N. (2005). Myxoma virus infection of primary fibroblasts varies with cellular age and is regulated by host interferon responses. Virology, 332(1), 235\u2013248.","journal-title":"Virology"},{"issue":"4","key":"9043_CR28","doi-asserted-by":"publisher","first-page":"1464","DOI":"10.1073\/pnas.0630491100","volume":"100","author":"Journal Editors, Authors Group","year":"2003","unstructured":"Journal Editors, Authors Group (2003). Uncensored exchange of scientific results. PNAS, 100(4), 1464.","journal-title":"PNAS"},{"issue":"5652","key":"9043_CR29","doi-asserted-by":"publisher","first-page":"1894","DOI":"10.1126\/science.302.5652.1894b","volume":"302","author":"L. H. Kahn","year":"2003","unstructured":"Kahn, L. H. (2003). Life scientists and the dual use dilemma. Science, 302(5652), 1894\u20131895.","journal-title":"Science"},{"issue":"5745","key":"9043_CR30","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1126\/science.310.5745.28","volume":"310","author":"J. Kaiser","year":"2005","unstructured":"Kaiser, J. (2005). Resurrected influenza virus yields secrets of deadly 1918 pandemic. Science, 310(5745), 28\u201329.","journal-title":"Science"},{"issue":"4","key":"9043_CR31","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1097\/00001888-200404000-00010","volume":"79","author":"B. A. Keel","year":"2004","unstructured":"Keel, B. A. (2004). Protecting Americas secrets while maintaining academic freedom. Academic Medicine, 79(4), 333\u2013342.","journal-title":"Academic Medicine"},{"issue":"5","key":"9043_CR32","doi-asserted-by":"publisher","first-page":"24","DOI":"10.2968\/059005009","volume":"59","author":"M. Kelley","year":"2003","unstructured":"Kelley, M., & Coghlan, J. (2003). Mixing bugs and bombs. Bulletin of the Atomic Scientists, 59(5), 24\u201331.","journal-title":"Bulletin of the Atomic Scientists"},{"issue":"4","key":"9043_CR33","first-page":"230","volume":"8","author":"M. Kelley","year":"2006","unstructured":"Kelley, M. (2006). Infectious disease research and dual-use risk. Virtual Mentor, 8(4), 230\u2013234.","journal-title":"Virtual Mentor"},{"key":"9043_CR34","first-page":"769","volume":"297","author":"D. Kennedy","year":"2002","unstructured":"Kennedy, D. (2002). Science has received a mixture of praise. Response to Steven M. Blocks A Not-So-Cheap Stunt. Science, 297, 769\u2013770.","journal-title":"Science"},{"key":"9043_CR35","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.1126\/science.299.5610.1148","volume":"299","author":"D. Kennedy","year":"2003","unstructured":"Kennedy, D. (2003). Two cultures. Science, 299, 1148.","journal-title":"Science"},{"issue":"1","key":"9043_CR36","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1089\/15387130360514805","volume":"1","author":"G. Kwik","year":"2003","unstructured":"Kwik, G., Fitzgerald, J., Inglesby, T. V., & OToole, T. (2003). Biosecurity: Responsible stewardship of bioscience in an age of catastrophic terrorism. Biosecurity and Bioterrorism, 1(1), 27\u201335.","journal-title":"Biosecurity and Bioterrorism"},{"issue":"13","key":"9043_CR37","doi-asserted-by":"publisher","first-page":"8461","DOI":"10.1073\/pnas.132284499","volume":"99","author":"P. J. Lachmann","year":"2005","unstructured":"Lachmann, P. J. (2005). Microbial subversion of the immune response. Proceedings of the National Academy of Sciences, 99(13), 8461\u20138462.","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"3","key":"9043_CR38","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1080\/713610450","volume":"29","author":"M. Leitenberg","year":"2003","unstructured":"Leitenberg, M. (2003). Distinguishing offensive from defensive biological weapons research. Critical Reviews in Microbiology, 29(3), 223\u2013257.","journal-title":"Critical Reviews in Microbiology"},{"issue":"2","key":"9043_CR39","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1017\/S0730938400006602","volume":"22","author":"M. Leitenberg","year":"2003","unstructured":"Leitenberg, M., Leonard, J., & Spertzel, R. (2003). Biodefense crossing the line. Politics and the Life Sciences, 22(2), 2\u20133.","journal-title":"Politics and the Life Sciences"},{"issue":"1","key":"9043_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1023\/A:1015060525546","volume":"40","author":"R. MacLeod","year":"2002","unstructured":"MacLeod, R. (2002). Preface. Minerva, 40(1), 1\u20132.","journal-title":"Minerva"},{"issue":"18","key":"9043_CR41","doi-asserted-by":"publisher","first-page":"8353","DOI":"10.1128\/JVI.75.18.8353-8355.2001","volume":"75","author":"A. M\u00fcllbacher","year":"2001","unstructured":"M\u00fcllbacher, A., & Lobigs, M. (2001). Creation of killer poxvirus could have been predicted. Journal of Virology, 75(18), 8353\u20138455.","journal-title":"Journal of Virology"},{"issue":"1","key":"9043_CR42","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1023\/A:1015045127363","volume":"40","author":"K. Nixdorff","year":"2002","unstructured":"Nixdorff, K., & Bender, W. (2002). Ethics of university research, biotechnology and potential military spin-off. Minerva, 40(1), 15\u201335.","journal-title":"Minerva"},{"key":"9043_CR43","doi-asserted-by":"publisher","first-page":"1898","DOI":"10.1126\/science.1092493","volume":"302","author":"J. B. Petro","year":"2003","unstructured":"Petro, J. B., & Relman, D. A. (2003). Understanding threats to scientific openness. Science, 302, 1898.","journal-title":"Science"},{"issue":"17\/18","key":"9043_CR44","doi-asserted-by":"publisher","first-page":"1846","DOI":"10.1016\/S0264-410X(97)00132-1","volume":"15","author":"A. P. *Pomerantsev","year":"1997","unstructured":"*Pomerantsev, A. P., Staritsin, N. A., Mockov, Yu. V., & Marinin, L. I. (1997). Expression of cereolysine AB genes in Bacillus anthracis vaccine strain ensures protection against experimental hemolytic anthrax infection. Vaccine, 15(17\/18), 1846\u20131850.","journal-title":"Vaccine"},{"key":"9043_CR45","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1111\/1528-3577.00016","volume":"1","author":"G. H. Quester","year":"2000","unstructured":"Quester, G. H. (2000). Mismatched deterrents: preventing the use of nuclear, biological, and chemical weapons. International Studies Perspectives, 1, 165\u2013176.","journal-title":"International Studies Perspectives"},{"issue":"2","key":"9043_CR46","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1017\/S0730938400006663","volume":"22","author":"A. Rabodzey","year":"2003","unstructured":"Rabodzey, A. (2003). Biosecurity implications of the synthesis of pathogenic viruses. Politics and the Life Sciences, 22(2), 44\u201349.","journal-title":"Politics and the Life Sciences"},{"key":"9043_CR47","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1126\/science.6272391","volume":"214","author":"V. R. Racaniello","year":"1981","unstructured":"Racaniello, V. R., & Baltimore, D. (1981). Cloned poliovirus complementary DNA is infectious in mammalian cells. Science, 214, 916\u2013919.","journal-title":"Science"},{"issue":"7017","key":"9043_CR48","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1038\/432549d","volume":"432","author":"J. Rath","year":"2004","unstructured":"Rath, J., Bernhard, J., & Doblhoff-Dier, O. (2004). Journals must cooperate to defend biosecurity. Nature, 432(7017), 549.","journal-title":"Nature"},{"issue":"6935","key":"9043_CR49","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1038\/nature01586","volume":"423","author":"T. D. *Read","year":"2003","unstructured":"*Read, T. D., et al. (2003). The genome sequence of Bacillus anthracis ames and comparison to closely related bacteria. Nature, 423(6935), 81\u201386.","journal-title":"Nature"},{"issue":"1","key":"9043_CR50","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1353\/hcr.2005.0013","volume":"35","author":"D. B. Resnik","year":"2005","unstructured":"Resnik, D. B. (2005). Conflicts of interest at the NIH: No easy solution. Hastings Center Report, 35(1), 18\u201320.","journal-title":"Hastings Center Report"},{"key":"9043_CR51","doi-asserted-by":"crossref","unstructured":"*Richman, D. D. (2006, preprint), Antiviral drug resistance. Antiviral Research Available at: http:\/\/www.elsevier.com\/locate\/antiviral.","DOI":"10.1016\/j.antiviral.2006.03.004"},{"issue":"1","key":"9043_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.antiviral.2004.12.003","volume":"66","author":"S. J. *Robbins","year":"2005","unstructured":"*Robbins, S. J., Jackson, R. J., Fenner, F., Beaton, S., Medveczky, J., Ramshaw, I. A., & Ramsay, A. J. (2005). The efficacy of cidofovir treatment of mice infected with ectromelia (Mousepox) virus encoding interleukin-4. Antiviral Research, 66(1), 1\u20137.","journal-title":"Antiviral Research"},{"issue":"13","key":"9043_CR53","doi-asserted-by":"crossref","first-page":"8808","DOI":"10.1073\/pnas.112220499","volume":"99","author":"A. M. *Rosengard","year":"2002","unstructured":"*Rosengard, A. M., Liu, Y., Nie, Z., & Jimenez, R. (2002). Variola virus immune evasion design: Expression of a highly efficient inhibitor of human complement. Proceedings of the National Academy of Science, 99(13), 8808\u20138813.","journal-title":"Proceedings of the National Academy of Science"},{"issue":"41","key":"9043_CR54","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1021\/cen-v081n041.p015","volume":"81","author":"W Schulz","year":"2003","unstructured":"Schulz, W (2003). Biotechnology research reviews. Chemical and Engineering News, 81(41), 15.","journal-title":"Chemical and Engineering News"},{"issue":"3","key":"9043_CR55","doi-asserted-by":"publisher","first-page":"14","DOI":"10.2968\/061003004","volume":"61","author":"N. Schwellenbach","year":"2005","unstructured":"Schwellenbach, N. (2005). Biodefense: A plague of researchers. Bulletin of the Atomic Scientists, 61(3), 14\u201316.","journal-title":"Bulletin of the Atomic Scientists"},{"issue":"1","key":"9043_CR56","doi-asserted-by":"publisher","first-page":"W5","DOI":"10.1162\/152651603322781620","volume":"3","author":"M. J. Selgelid","year":"2003","unstructured":"Selgelid, M. J. (2003). Smallpox revisited? The American Journal of Bioethics, 3(1): W5\u2013W11.","journal-title":"The American Journal of Bioethics"},{"key":"9043_CR57","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1136\/jme.2003.004176","volume":"30","author":"M. J. Selgelid","year":"2004","unstructured":"Selgelid, M. J. (2004). Bioterrorism and smallpox planning: Information and voluntary vaccination. Journal of Medical Ethics, 30, 558\u2013560.","journal-title":"Journal of Medical Ethics"},{"issue":"4","key":"9043_CR58","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1017\/S0963180106240568","volume":"15","author":"M. J. Selgelid","year":"2006","unstructured":"Selgelid, M. J. (2006). The ethics of dangerous discovery. Cambridge Quarterly of Healthcare Ethics, 15(4): 444\u2013447.","journal-title":"Cambridge Quarterly of Healthcare Ethics"},{"issue":"3","key":"9043_CR59","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1353\/hcr.2007.0046","volume":"37","author":"M. J. Selgelid","year":"2007","unstructured":"Selgelid, M. J. (2007). A tale of two studies: Ethics, bioterrorism, and the censorship of science. The Hastings Center Report, 37(3), 35\u201343.","journal-title":"The Hastings Center Report"},{"issue":"26","key":"9043_CR60","doi-asserted-by":"publisher","first-page":"15918","DOI":"10.1073\/pnas.2433882100","volume":"100","author":"N. *Shimono","year":"2003","unstructured":"*Shimono, N., Morici, L., Casali, N., Cantrell, S., Sidders, B., Ehrt, S., & Riley, L. W. (2003). Hypervirulent mutant of mycobacterium tuberculosis resulting from disruption of the mce1 operon. Proceedings of the National Academy of Sciences, 100(26), 15918\u201315923.","journal-title":"Proceedings of the National Academy of Sciences"},{"issue":"1","key":"9043_CR61","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1023\/A:1015001429180","volume":"40","author":"J. Simon","year":"2002","unstructured":"Simon, J., & Hersh, M. (2002). An educational imperative: The role of ethical codes and normative prohibitions in CBW-applicable research. Minerva, 40(1), 37\u201355.","journal-title":"Minerva"},{"issue":"5717","key":"9043_CR62","doi-asserted-by":"publisher","first-page":"1881","DOI":"10.1126\/science.1109279","volume":"307","author":"M. A. Somerville","year":"2005","unstructured":"Somerville, M. A., & Atlas, R. M. (2005). Ethics: A weapon to counter bioterrorism. Science, 307(5717), 1881\u20131882.","journal-title":"Science"},{"issue":"7060","key":"9043_CR63","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1038\/nature04230","volume":"437","author":"J. K. Taubenberger","year":"2005","unstructured":"Taubenberger, J. K., Reid, A. H., Lourens, R. M., Wang, R., Jin, G., & Fanning, T. G. (2005). Characterization of the 1918 influenza virus polymerase genes. Nature, 437(7060), 889\u2013893.","journal-title":"Nature"},{"issue":"7020","key":"9043_CR64","doi-asserted-by":"publisher","first-page":"1050","DOI":"10.1038\/nature03151","volume":"432","author":"J. Tian","year":"2004","unstructured":"Tian, J., Gong, H., Sheng, N., Zhou, X., Gulari, E., Gao, X., & Church, G. (2004). Accurate multiplex gene synthesis from programmable DNA microchips. Nature, 432(7020), 1050\u20131054.","journal-title":"Nature"},{"issue":"5745","key":"9043_CR65","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1126\/science.1119392","volume":"310","author":"T. M. *Tumpey","year":"2005","unstructured":"*Tumpey, T. M., Basler, C. F., Aguilar, P. V., Zeng, H., Solorzano, A., Swayne, D. E., Cox, N. J., Katz, J. M., Taubenberger, J. K., Palese, P., & Garcia-Sastre, A. (2005). Characterization of the reconstructed 1918 Spanish influenza pandemic virus. Science, 310(5745), 77\u201380.","journal-title":"Science"},{"issue":"Special Issue","key":"9043_CR66","doi-asserted-by":"publisher","first-page":"S57","DOI":"10.1038\/sj.embor.embor860","volume":"4","author":"J. van Aken","year":"2003","unstructured":"van Aken, J., & Hammond, E. (2003). Genetic engineering and biological weapons. EMBO Reports, 4(Special Issue), S57\u2013S60.","journal-title":"EMBO Reports"},{"issue":"3","key":"9043_CR67","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1111\/1467-9973.00053","volume":"28","author":"J. van den Hoven","year":"1997","unstructured":"van den Hoven, J. (1997). Computer ethics and moral methodology. Metaphilosophy, 28(3), 234\u2013249.","journal-title":"Metaphilosophy"},{"issue":"2","key":"9043_CR68","doi-asserted-by":"crossref","first-page":"191","DOI":"10.5840\/ijap200620214","volume":"20","author":"J. Weckert","year":"2006","unstructured":"Weckert, J., & Moor, J. (2006). The precautionary principle in nanotechnology. International Journal of Applied Philosophy, 20(2), 191\u2013204.","journal-title":"International Journal of Applied Philosophy"},{"issue":"1","key":"9043_CR69","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1080\/00963402.2003.11460645","volume":"59","author":"M. Wheelis","year":"2003","unstructured":"Wheelis, M., & Dando, M. (2003). Back to Bioweapons? Bulletin of the Atomic Scientists, 59(1), 41\u201346.","journal-title":"Bulletin of the Atomic Scientists"},{"issue":"1","key":"9043_CR70","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1023\/A:1015093009616","volume":"40","author":"J.-P. Zanders","year":"2002","unstructured":"Zanders, J.-P. (2002). Introduction. Minerva, 40(1), 3\u201313.","journal-title":"Minerva"},{"key":"9043_CR71","volume-title":"Encyclopedia of science, technology, & ethics","author":"A. Briggle","year":"2005","unstructured":"Briggle, A. (2005). Double effect and dual use. In C. Mitcham (Ed.), Encyclopedia of science, technology, & ethics (Vol. 2). Detroit, MI: Macmillan Reference USA."},{"key":"9043_CR72","volume-title":"Preventing a biological arms race","author":"J. King","year":"1990","unstructured":"King, J., & Strauss, H. (1990). The hazards of defensive biological warfare programs. In S. Wright (Ed.), Preventing a biological arms race. Cambridge, MA: MIT Press."},{"key":"9043_CR73","volume-title":"Preventing a biological arms race","author":"M. Lappe","year":"1990","unstructured":"Lappe, M. (1990). Ethics in biological warfare research. In S. Wright (Ed.), Preventing a biological arms race. Cambridge, MA: MIT Press."},{"key":"9043_CR74","volume-title":"Biological warfare: Opposing viewpoints","author":"J. M. Marshall","year":"2004","unstructured":"Marshall, J. M. (2004). Known stocks of the smallpox virus should be retained for research. In W. Dudley (Ed.), Biological warfare: Opposing viewpoints. Farmington Hills, MI: Greenhaven Press."},{"key":"9043_CR75","volume-title":"Biological warfare and disarmament: New problems, new perspectives","author":"L. Reed","year":"2002","unstructured":"Reed, L., & Shulman, S. (2002). A perilous path to security? Weighing US \u201cBiodefense\u201d against qualitative proliferation. In S. Wright (Ed.), Biological warfare and disarmament: New problems, new perspectives. Lanham, Maryland: Rowman and Littlefield."},{"key":"9043_CR76","volume-title":"Biohazard","author":"K. Alibek","year":"1999","unstructured":"Alibek, K., & Handelman, S. (1999). Biohazard. Broadway, NY: Dell Publishing."},{"key":"9043_CR77","unstructured":"Enemark, C. (2004). Disease security in Northeast Asia: Biological weapons and natural plagues. Strategic and Defence Studies Centre \u2013 Canberra Papers on Strategy and Defence No.156, Canberra: Australian National University."},{"key":"9043_CR78","volume-title":"Smallpox and its eradication","author":"F. Fenner","year":"1988","unstructured":"Fenner, F., Henderson, D. A., Arita, I., Je\u017eek, Z., & Ladnyi, I. D. (1988). Smallpox and its eradication. Geneva: World Health Organization."},{"key":"9043_CR79","volume-title":"Bioethics and armed conflict: Moral dilemmas of medicine and war","author":"M. L. Gross","year":"2006","unstructured":"Gross, M. L. (2006). Bioethics and armed conflict: Moral dilemmas of medicine and war. Cambridge, MA: MIT Press."},{"key":"9043_CR80","unstructured":"Henderson, D. A., Inglesby, T. V., & O\u2019Toole, T. (Eds.) (2002). Bioterrorism: Guidelines for medical and public health management. USA: JAMA and Archives Journals."},{"key":"9043_CR81","doi-asserted-by":"crossref","DOI":"10.1093\/0195145836.001.0001","volume-title":"Science, truth, and democracy","author":"P. Kitcher","year":"2001","unstructured":"Kitcher, P. (2001). Science, truth, and democracy. New York: Oxford University Press."},{"key":"9043_CR82","volume-title":"Federal security controls on scientific and technical information: History and current controversy","author":"G. J. Knezo","year":"2003","unstructured":"Knezo, G. J. (2003). Federal security controls on scientific and technical information: History and current controversy. New York: Novinka Books."},{"key":"9043_CR83","unstructured":"Kolata, G. (2001, First published 1999). Flu: The story of the great influenza pandemic of 1918 and the search for the virus that caused it. London: Pan Books."},{"key":"9043_CR84","unstructured":"Layne, S. P., Beugelsdijk, T. J., Kumar, C., & Patel, N. (Eds.) (2001). Fire power in the lab. Washington, DC: Joseph Henry Press."},{"key":"9043_CR85","volume-title":"Germs: The ultimate weapon","author":"J. Miller","year":"2001","unstructured":"Miller, J., Engelberg, S., & Broad, W. (2001). Germs: The ultimate weapon. London: Simon & Schuster."},{"key":"9043_CR86","doi-asserted-by":"crossref","DOI":"10.1002\/9781444302837","volume-title":"Terrorism and counter-terrorism: Ethics and liberal democracy","author":"S. Miller","year":"2008","unstructured":"Miller, S. (2008). Terrorism and counter-terrorism: Ethics and liberal democracy. Oxford: Blackwell Publishing."},{"key":"9043_CR87","unstructured":"Moreno, J. D. (Ed.) (2003). In the wake of terror. Cambridge, MA: The MIT Press."},{"key":"9043_CR88","volume-title":"The demon in the freezer: The terrifying truth about the threat from bioterrorism","author":"R. Preston","year":"2003","unstructured":"Preston, R. (2003). The demon in the freezer: The terrifying truth about the threat from bioterrorism. London: Headline."},{"key":"9043_CR89","volume-title":"The biology of doom","author":"Ed Regis","year":"2000","unstructured":"Regis, Ed (2000). The biology of doom. New York: First Owl Books."},{"key":"9043_CR90","volume-title":"In the shadow of the bomb: Bethe, oppenheimer, and the moral responsibility of the scientist","author":"S. S. Schweber","year":"2000","unstructured":"Schweber, S. S. (2000). In the shadow of the bomb: Bethe, oppenheimer, and the moral responsibility of the scientist. Princeton, New Jersey: Princeton University Press."},{"key":"9043_CR91","volume-title":"Perilous times","author":"G. R. Stone","year":"2004","unstructured":"Stone, G. R. (2004). Perilous times. London: W. W. Norton & Company."},{"key":"9043_CR92","volume-title":"Scourge: The once and future threat of smallpox","author":"J. B. Tucker","year":"2001","unstructured":"Tucker, J. B. (2001). Scourge: The once and future threat of smallpox. New York: Atlantic Monthly Press."},{"key":"9043_CR93","volume-title":"An international perspective on advancing technologies and strategies for managing dual-use risks: Report of a workshop","author":"Committee on Advances in Technology, the Prevention of their Application to Next Generation Biowarfare Threats, National Research Council","year":"2005","unstructured":"Committee on Advances in Technology, the Prevention of their Application to Next Generation Biowarfare Threats, National Research Council (2005). An international perspective on advancing technologies and strategies for managing dual-use risks: Report of a workshop. Washington, DC: National Academies Press."},{"key":"9043_CR94","volume-title":"Globalization, biosecurity, and the future of the life sciences","author":"Committee on Advances in Technology, the Prevention of their Application to Next Generation Biowarfare Threats, National Research Council","year":"2006","unstructured":"Committee on Advances in Technology, the Prevention of their Application to Next Generation Biowarfare Threats, National Research Council (2006). Globalization, biosecurity, and the future of the life sciences. Washington, DC: National Academies Press."},{"key":"9043_CR95","volume-title":"Balancing scientific openness and national security controls at the nation\u2019s nuclear weapons laboratories","author":"Committee on Balancing Scientific Openness, National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine","year":"2000","unstructured":"Committee on Balancing Scientific Openness, National Security, National Academy of Sciences, National Academy of Engineering, Institute of Medicine (2000). Balancing scientific openness and national security controls at the nation\u2019s nuclear weapons laboratories. Washington, DC: National Academies Press."},{"key":"9043_CR96","volume-title":"Seeking security: Pathogens, open access, and genome databases","author":"Committee on Genomics Databases for Bioterrorism Threat Agents, National Research Council","year":"2004","unstructured":"Committee on Genomics Databases for Bioterrorism Threat Agents, National Research Council (2004). Seeking security: Pathogens, open access, and genome databases. Washington, DC: National Academies Press."},{"key":"9043_CR97","volume-title":"Biotechnology research in the age of terrorism","author":"Committee on Research Standards, Practices to Prevent the Destructive Application of Biotechnology, National Research Council","year":"2004","unstructured":"Committee on Research Standards, Practices to Prevent the Destructive Application of Biotechnology, National Research Council (2004). Biotechnology research in the age of terrorism. Washington, DC: National Academies Press."},{"key":"9043_CR98","volume-title":"Making the nation safer: The role of science and technology in countering terrorism","author":"Committee on Science, Technology for Countering Terrorism, National Research Council","year":"2002","unstructured":"Committee on Science, Technology for Countering Terrorism, National Research Council (2002). Making the nation safer: The role of science and technology in countering terrorism. Washington, DC: National Academies Press."},{"key":"9043_CR99","volume-title":"Chemical and biological terrorism: Research and development to improve civilian medical response","author":"Institute of Medicine, & National Research Council","year":"1999","unstructured":"Institute of Medicine, & National Research Council (1999). Chemical and biological terrorism: Research and development to improve civilian medical response. Washington, DC: National Academies Press."},{"key":"9043_CR100","volume-title":"Scientific communication and national security: A report prepared by the panel on scientific communication and national security, committee on science, engineering, and public policy","author":"National Academy of Sciences, National Academy of Engineering, Institute of Medicine","year":"1982","unstructured":"National Academy of Sciences, National Academy of Engineering, Institute of Medicine (1982). Scientific communication and national security: A report prepared by the panel on scientific communication and national security, committee on science, engineering, and public policy. Washington, DC: National Academies Press."},{"key":"9043_CR101","volume-title":"Countering agricultural bioterrorism","author":"National Research Council","year":"2003","unstructured":"National Research Council (2003). Countering agricultural bioterrorism. Washington, DC: National Academies Press."},{"key":"9043_CR102","volume-title":"Biotechnology research in an age of terrorism","author":"National Research Council","year":"2004","unstructured":"National Research Council (2004). Biotechnology research in an age of terrorism. Washington, DC: National Academies of Sciences."},{"key":"9043_CR103","unstructured":"ABC Radio National (4 September 2005). BioWar \u2013 Background Briefing http:\/\/www.abc.net.au\/rn\/talks\/bbing\/stories\/s1450124.htm Accessed 8 September 2005."},{"key":"9043_CR104","unstructured":"Alberts, B., Wulf, Wm. A., & Fineberg, H. (13 June 2003). Current visa restrictions interfere with US science and engineering contributions to important national needs, The National Academies http:\/\/www4.nationalacademies.org\/news.nsf\/isbn\/s12132002?OpenDocument Accessed 10 June 2005."},{"key":"9043_CR105","unstructured":"American Medical Association (December 2004). Guidelines to prevent malevolent use of biomedical research http:\/\/www.biosecuritycodes.org\/docs\/AMA%20Code.pdf Accessed 11 May 2006."},{"key":"9043_CR106","unstructured":"BBC News (19 April 2004). Caution urged over bio research http:\/\/newsvote.bbc.co.uk\/mpapps\/pagetools\/print\/news.bbc.co.uk\/2\/hi\/health\/3632349.stm Accessed 2 November 2004."},{"key":"9043_CR107","unstructured":"Biological and Toxin Weapons Convention (10 April 1972). Convention on the prohibition of the development, production and stockpiling of bacteriological (Biological) and toxin weapons and on their destruction http:\/\/www.opbw.org\/convention\/documents\/btwctext.pdf Accessed 11 May 2006."},{"key":"9043_CR108","unstructured":"Central Intelligence Agency (3 November 2003). The darker bioweapons future http:\/\/www.fas.org\/irp\/cia\/product\/bw1103.pdf Accessed 11 May 2006."},{"key":"9043_CR109","unstructured":"Chamberlain, A. (August 2004). Select agent rules (updated), American Association for the Advancement of Science http:\/\/www.aaas.org\/spp\/post911\/agents\/ Accessed 3 December 2004."},{"key":"9043_CR110","unstructured":"CNN (6 June 2005). Feds: Science paper a terrorist\u2019s road map http:\/\/www.cnn.com\/2005\/US\/06\/06\/milk.terror\/index.html Accessed 17 July 2005."},{"key":"9043_CR111","unstructured":"Cohen, P. (18 January 2003). Recipes for bioterror: Censoring science, NewScientist.com http:\/\/www.newscientist.com\/news\/print.jsp?id=ns99993266 Accessed 2 November 2004."},{"key":"9043_CR112","unstructured":"Dayton, L. (27 October 2004). Scientists warn of \u2018Ethnic Weapons\u2019, The Australian http:\/\/www.theaustralian.news.com.au (generic URL) Accessed 27 October 2004."},{"key":"9043_CR113","unstructured":"Federation of American Scientists (November 2002). Draft recommendations for a code of conduct for biodefense programs http:\/\/www.fas.org\/bwc\/papers\/code.pdf Accessed 30 May 2005."},{"key":"9043_CR114","unstructured":"Gammell, C. (25 October 2004). Biological weapons threat \u2018Greater Than Nuclear or Chemical\u2019, \u201cPA\u201d News, The Scotsman http:\/\/news.scotsman.com\/ (generic URL) Accessed 27 October 2004."},{"key":"9043_CR115","unstructured":"Korch, G. (9 February 2004). Leading edge of biodefense: The national biodefense analysis and countermeasures center, Lecture to the Department of Defense Pest Management Workshop, Jacksonville Naval Air Station, Bioweapons and Biodefense Freedom of Information Fund http:\/\/www.cbwtransparency.org\/archive\/nbacc.pdf Accessed 26 May 2005."},{"key":"9043_CR116","unstructured":"MacKenzie, D. (29 October 2003). US develops lethal new viruses, New Scientist http:\/\/www.newscientist.com\/hottopics\/bioterrorism\/bioterrorism.jsp?id=ns99994318 Accessed 2 November 2004."},{"key":"9043_CR117","unstructured":"McDonough, T. (23 February 2006). Just testing: Is the US government making anthrax bombs in Utah? Salt Lake City Weekly http:\/\/www.slweekly.com\/editorial\/2006\/feat_2006-02-23.cfm Accessed 16 May 2006."},{"key":"9043_CR118","unstructured":"Nixdorff, K., & Bender, W. (2005). Biotechnology, ethics of research and potential military spin-off, Bioterror and Bioweapons Control, Bulletin 19, International Network of Engineers and Scientists Against Proliferation http:\/\/www.inesap.org\/bulletin19\/bul19art05.htm Accessed 28 November 2005."},{"key":"9043_CR119","unstructured":"Office of Biotechnology Activities (2005). National Institutes of Health, Frequently Asked Questions, National Science Advisory Board for Biosecurity http:\/\/www.biosecurityboard.gov\/faq.asp Accessed 28 November 2005."},{"key":"9043_CR120","unstructured":"Petro, J. B. (2005). Intelligence support to the life science community: Mitigating threats from bioterrorism\u2019, Central Intelligence Agency http:\/\/www.cia.gov.csi\/studies\/vol48no3\/article06.html Accessed 12 August 2005."},{"key":"9043_CR121","unstructured":"Roos, R. (6 November 2003). Scientists research antidotes to super mousepox virus, University of Minnesota http:\/\/www.cidrap.umn.edu\/cidrap\/content\/bt\/smallpox\/news\/nov0603mousepox.html Accessed 8 November 2003."},{"key":"9043_CR122","unstructured":"Ruppe, D. (3 February 2006). US army grenade patent changed, Global Security Newswire http:\/\/www.nti.org\/d_newswire\/issues\/2006\/1\/31\/76D99711-ECA8-4EA9-A2C2-278FCBD1159D.html Accessed 30 April 2006."},{"key":"9043_CR123","unstructured":"Select Agent Program (2005). The centers for disease control and prevention http:\/\/www.cdc.gov\/od\/sap\/overview.htm Accessed 17 July 2005."},{"key":"9043_CR124","unstructured":"Shane, S. (27 June 2004). Bioterror fight may spawn new risks, Baltimore Sun http:\/\/www.baltimoresun.com\/news\/nationworld\/bal-te.biodefense27jun27,0,6098679.story Accessed 29 June 2004."},{"key":"9043_CR125","unstructured":"Sydney Morning Herald (12 July 2002). Scientists make polio virus using net recipe http:\/\/www.smh.com.au\/articles\/2002\/07\/12\/1026185100298.htm Accessed 12 July 2002."},{"key":"9043_CR126","unstructured":"The Associated Press (10 September 2004). Panel: Germ data benefits exceed risk, Newsday.com http:\/\/www.newsday.com (generic URL) Accessed 13 September 2004."},{"key":"9043_CR127","unstructured":"The InterAcademy Panel on International Issues (7 November 2005). IAP statement on biosecurity http:\/\/www.royalsoc.ac.uk\/displaypagedoc.asp?id=17463 Accessed 11 May 2006."},{"key":"9043_CR128","unstructured":"The Royal Society \u2013 Media Release (19 April 2004). Research should be vetted to prevent biological weapons development http:\/\/www.royalsoc.ac.uk\/templates\/press\/releasedetails.cfm?file=521.txt Accessed 2 November 2004."},{"key":"9043_CR129","unstructured":"The Royal Society \u2013 Policy Statement (13 December 2004). Do no harm: Reducing the potential for the misuse of life science research http:\/\/www.royalsoc.ac.uk\/document.asp?tip=0&id=2830 Accessed 2 June 2005."},{"key":"9043_CR130","unstructured":"The Royal Society \u2013 Press Release (1 December 2005). International scientists call to do no harm http:\/\/www.royalsoc.ac.uk\/news.asp?id=3949&printer=1 Accessed 20 April 2006."},{"key":"9043_CR131","unstructured":"The Sunshine Project (October 2004). Mandate for failure: The state of institutional biosafety committees in an age of biological weapons research http:\/\/www.sunshine-project.org\/biodefense\/tspibc.pdf Accessed 10 June 2005."},{"key":"9043_CR132","unstructured":"The Sunshine Project (4 November 2004). High containment and other facilities of the US biodefense program http:\/\/www.sunshine-project.org\/biodefense\/ Accessed 5 July 2005."},{"key":"9043_CR133","unstructured":"US Department of Health and Human Services \u2013 News Release (4 March 2004). HHS will lead government-wide effort to enhance biosecurity in \u201cDual Use\u201d research\u2019 http:\/\/www.hhs.gov\/news\/press\/2004pres\/20040304.html Accessed 27 May 2005."},{"key":"9043_CR134","unstructured":"US Department of Health and Human Services \u2013 Fact Sheet (21 July 2004). HHS fact sheet\u2014project bioshield http:\/\/www.hhs.gov\/news\/press\/2004pres\/20040721b.html Accessed 27 June 2006."},{"key":"9043_CR135","unstructured":"US Department of Homeland Security (24 February 2005). Fact sheet: National biodefense analysis and countermeasures center http:\/\/www.dhs.gov\/dhspublic\/display?content=4336 Accessed 13 April 2005."},{"key":"9043_CR136","unstructured":"US Department of State (30 August 2005). Adherence to and compliance with arms control, nonproliferation, and disarmament agreements and commitments http:\/\/www.state.gov\/t\/vci\/rls\/rpt\/51977.htm#chapter6 Accessed 22 December 2005."},{"key":"9043_CR137","unstructured":"Westphal, S. P. (17 July 2002). Ebola virus could be synthesised, New Scientist http:\/\/www.newscientist.com\/article.ns?id=dn2555 Accessed 8 June 2005."},{"key":"9043_CR138","unstructured":"Wilson, J. (22 April 2004). Preventing test-tube terrorism, The Guardian Review http:\/\/education.guardian.co.uk\/print\/0,3858,4906769\u2013110865,00.html Accessed 28 April 2004."},{"key":"9043_CR139","unstructured":"World Health Organization \u2013 Media Release (20 May 2005). Establishing smallpox vaccine reserve http:\/\/www.who.int\/mediacentre\/news\/notes\/2005\/np_wha02\/en\/index.html Accessed 10 June 2005."},{"key":"9043_CR140","unstructured":"Wright, S. (November\/December 2004). Taking biodefense too far, Bulletin of the Atomic Scientists http:\/\/www.thebulletin.org\/issues\/2004\/nd04\/nd04wright.html Accessed 1 November 2004."},{"key":"9043_CR141","unstructured":"Altman, L. (21 May 2005). WHO moves toward allowing smallpox gene experiment, New York Times, A6."},{"issue":"9","key":"9043_CR142","first-page":"26","volume":"31","author":"Anonymous","year":"2001","unstructured":"Anonymous (2001). US approves development of enhanced anthrax. Arms Control Today, 31(9), 26.","journal-title":"Arms Control Today"},{"key":"9043_CR143","volume-title":"Weapons of mass destruction: Australia\u2019s role in fighting proliferation","author":"Australian Government","year":"2005","unstructured":"Australian Government (2005). Weapons of mass destruction: Australia\u2019s role in fighting proliferation. Canberra: Commonwealth of Australia."},{"key":"9043_CR144","volume-title":"Annual report 2004\u20132005","author":"Australian Safeguards, Non-Proliferation Office","year":"2005","unstructured":"Australian Safeguards, Non-Proliferation Office (2005). Annual report 2004\u20132005. Canberra: Commonwealth of Australia."},{"key":"9043_CR145","unstructured":"Borrie, J. (February 2005). The dual-use dilemma in life science research: The approach of the international committee of the Red Cross, United Nations Institute for Disarmament Research (UNIDIR) \u2018for comment\u2019 paper."},{"key":"9043_CR146","volume-title":"Biotechnology, weapons and humanity","author":"British Medical Association","year":"1999","unstructured":"British Medical Association (1999). Biotechnology, weapons and humanity. Amsterdam: Harwood Academic Publishers."},{"key":"9043_CR147","volume-title":"Biotechnology, weapons and humanity II","author":"British Medical Association","year":"2004","unstructured":"British Medical Association (2004). Biotechnology, weapons and humanity II. London: British Medical Association."},{"key":"9043_CR148","unstructured":"Cohen, P. (April 2004). The individual and collective roles scientists can play in strengthening international treaties. The Royal Society \u2013 Policy Document."},{"key":"9043_CR149","unstructured":"Convention on the Prohibition of the Development (1975). Production and stockpiling of bacteriological (Biological) and toxin weapons and on their destruction (entered into force 26 March 1975) (Available at: http:\/\/www.nuclearthreatinitiative.org\/e_research\/official_docs\/inventory\/pdfs\/btwc.pdf.)."},{"key":"9043_CR150","unstructured":"Guidance for the Operation of Biological Resource Centres (BRCs) Part 3: Institutional Biosecurity Programme for BRCs \u2013 Discussion Paper (17 November 2005). Paris: Organisation for Economic Co-operation and Development."},{"key":"9043_CR151","unstructured":"McLeish, C. A. (2003). Reactions to self-censorship, Working Paper given at the 20th Pugwash workshop study group on the implementation of the CBW conventions: The BWC intersessional process towards the sixth review conference and beyond, Geneva, Switzerland, 8\u20139 November 2003."},{"key":"9043_CR152","unstructured":"Miller, J., Engelberg, S., & Broad, W. (4 September 2001). US germ warfare research pushes treaty limits, New York Times, A1."},{"key":"9043_CR153","doi-asserted-by":"crossref","unstructured":"Mordini, E. (April 2004). Conclusions of the international conference on ethical implications of research into the prevention of bioterrorism, Bioethical implications of globalisation processes \u2013 Policy Paper No 1, Conference organised by European Commission, DG Research, Directorate E: Biotechnology, Agriculture and Food.","DOI":"10.1515\/jibl.2005.2.2.83"},{"key":"9043_CR154","unstructured":"Pearson, G. S., & Dando, M. R. (Eds.) (September 2004). Towards a life sciences code: Countering the threats from biological weapons, Strengthening the biological weapons convention \u2013 briefing paper No 13 (Second Series), Bradford: Department of Peace Studies, University of Bradford."},{"key":"9043_CR155","unstructured":"Pearson, G. S., & Dando, M. R. (Eds.) (November 2004). A code of conduct for the life sciences: A practical approach, Strengthening the biological weapons convention \u2013 briefing paper No 15 (Second Series), Bradford: Department of Peace Studies, University of Bradford."},{"key":"9043_CR156","unstructured":"Pollack, A. (12 July 2002). Scientists create a live polio virus, New York Times, A1."},{"key":"9043_CR157","unstructured":"Smith, D. (29 December 2003). Call to stop deadly viruses getting into wrong hands, Sydney Morning Herald, 5."},{"key":"9043_CR158","unstructured":"Stockholm International Peace Research Institute \u2013 Fact Sheet (November 2001). Biotechnology and the future of the biological and toxin weapons convention."},{"key":"9043_CR159","unstructured":"The Royal Society \u2013 Policy Document (2005). The role of codes of conduct in preventing the misuse of scientific research."},{"key":"9043_CR160","unstructured":"Tucker, J. B., & Zilinskas, R. A. (Eds.) (2002). The 1971 Smallpox epidemic in Aralsk, Kazakhstan, and the Soviet Biological Warfare Program, Center for Nonproliferation Studies, Occasional Paper No. 9, Monterey, California: Monterey Institute of International Studies."},{"key":"9043_CR161","unstructured":"US Department of Health and Human Services (January 2003). NIAID Biodefense Research Agenda for Category B and C Priority Pathogens, NIH Publication No. 03\u20135313."},{"key":"9043_CR162","unstructured":"US Department of Health and Human Services (4 March 2004). National Science Advisory Board for Biosecurity Charter."},{"key":"9043_CR163","unstructured":"US Office of the Under Secretary of Defense for Acquisition and Technology (1998). Militarily Critical Technologies List (MCTL), Part 2: Weapons of mass destruction technologies."},{"key":"9043_CR164","unstructured":"WHO Advisory Committee on Variola Virus Research (2006). Report of the seventh meeting, 10\u201311 November 2005, Geneva: WHO."}],"container-title":["Science and Engineering Ethics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-007-9043-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11948-007-9043-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-007-9043-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11948-007-9043-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T02:19:24Z","timestamp":1744165164000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11948-007-9043-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12]]},"references-count":164,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["9043"],"URL":"https:\/\/doi.org\/10.1007\/s11948-007-9043-4","relation":{},"ISSN":["1353-3452","1471-5546"],"issn-type":[{"value":"1353-3452","type":"print"},{"value":"1471-5546","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,12]]},"assertion":[{"value":"4 October 2007","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2007","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2007","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}