{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:27:19Z","timestamp":1759091239267,"version":"3.41.0"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,3,1]],"date-time":"2008-03-01T00:00:00Z","timestamp":1204329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCAS Comput. Soc."],"published-print":{"date-parts":[[2008,3]]},"abstract":"<jats:p>The extent of Internet censorship in countries like China is regularly tested, but the testing methods used from within a censored country can entail risk for humans. A benevolent worm can be used for testing instead: the worm's self-replication, long the bane of suggested benevolent viruses and worms, is shown to be essential here. We describe the design of this benevolent worm, along with some other related applications for it. A technical, ethical, and legal analysis is provided.<\/jats:p>","DOI":"10.1145\/1361255.1361256","type":"journal-article","created":{"date-parts":[[2008,4,15]],"date-time":"2008-04-15T12:52:10Z","timestamp":1208263930000},"page":"28-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["\"Good\" worms and human rights"],"prefix":"10.1145","volume":"38","author":[{"given":"John","family":"Aycock","sequence":"first","affiliation":[]},{"given":"Alana","family":"Maurushat","sequence":"additional","affiliation":[]}],"member":"320","published-online":{"date-parts":[[2008,3]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Aitel D. (2006) 'Nematodes - beneficial worms' http:\/\/www.immunityinc.com\/downloads\/nematodes.pdf. Aitel D. (2006) 'Nematodes - beneficial worms' http:\/\/www.immunityinc.com\/downloads\/nematodes.pdf."},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Aycock J. (2006) Computer Viruses and Malware Springer. Aycock J. (2006) Computer Viruses and Malware Springer.","DOI":"10.1145\/1047344.1047404"},{"key":"e_1_2_1_3_1","unstructured":"Bontchev V. (1994) Are \"good\" computer viruses still a bad idea? in 'Proceedings of the EICAR '94 Conference' pp. 25--47. Bontchev V. (1994) Are \"good\" computer viruses still a bad idea? in 'Proceedings of the EICAR '94 Conference' pp. 25--47."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029618.1029631"},{"key":"e_1_2_1_5_1","unstructured":"Chase M. S. (2002) You've Got Dissent!: Chinese Dissident Use of the Internet and Beijing's Counter-Strategies RAND National Security Research Division Center for Asia Pacific Policy. Chase M. S. (2002) You've Got Dissent!: Chinese Dissident Use of the Internet and Beijing's Counter-Strategies RAND National Security Research Division Center for Asia Pacific Policy."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_2"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90122-2"},{"key":"e_1_2_1_8_1","unstructured":"Cohen F. B. (1994) A Short Course on Computer Viruses second edn Wiley. Cohen F. B. (1994) A Short Course on Computer Viruses second edn Wiley."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315290"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"issue":"1","key":"e_1_2_1_11_1","first-page":"3","article-title":"Big brother learns to surf","volume":"29","author":"Economist Intelligence Unit","year":"2003","journal-title":"Business China"},{"key":"e_1_2_1_12_1","unstructured":"Evers J. (10 March 2006) 'McAfee update terminates Excel' CNET News.com. Evers J. (10 March 2006) 'McAfee update terminates Excel' CNET News.com."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.47"},{"key":"e_1_2_1_14_1","first-page":"2","volume-title":"'15th Virus Bulletin International Conference'","author":"Hirt A.","year":"2005"},{"key":"e_1_2_1_15_1","first-page":"63","volume-title":"Law and Policy'","author":"Hom S.","year":"2005"},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Howe D. &amp; Nissenbaum H. (2008) TRACKMENOT: Resisting surveillance in Web search. On the Identity Trail: Privacy Anonymity and Identity in a Networked Society (Oxford Press) publication forthcoming. Howe D. &amp; Nissenbaum H. (2008) TRACKMENOT: Resisting surveillance in Web search. On the Identity Trail: Privacy Anonymity and Identity in a Networked Society (Oxford Press) publication forthcoming .","DOI":"10.1093\/oso\/9780195372472.003.0023"},{"key":"e_1_2_1_17_1","unstructured":"Hualing F. (2005) Counter-revolutionaries subversives and terrorists: China's evolving national security law in 'National Security and Fundamental Freedoms: Hong Kong's Article 23 Under Scrutiny' Hong Kong University Press pp. 63--91. Hualing F. (2005) Counter-revolutionaries subversives and terrorists: China's evolving national security law in 'National Security and Fundamental Freedoms: Hong Kong's Article 23 Under Scrutiny' Hong Kong University Press pp. 63--91."},{"key":"e_1_2_1_18_1","unstructured":"Human Rights Watch (2006) 'Race to the bottom: Corporate complicity in Chinese Internet censorship'. Human Rights Watch (2006) 'Race to the bottom: Corporate complicity in Chinese Internet censorship'."},{"key":"e_1_2_1_19_1","unstructured":"Japan Times (24 April 2005) 'Bug in antivirus software hits LANs at JR East some media'. Japan Times (24 April 2005) 'Bug in antivirus software hits LANs at JR East some media'."},{"key":"e_1_2_1_20_1","unstructured":"Kalathil S. (3 April 2003) 'Battling SARS: China's silence costs lives' originally appeared in the International Herald Tribune. Kalathil S. (3 April 2003) 'Battling SARS: China's silence costs lives' originally appeared in the International Herald Tribune ."},{"key":"e_1_2_1_21_1","unstructured":"Kaspersky E. (1993) 'Cruncher - the first beneficial virus?' Virus Bulletin pp. 8--9. Kaspersky E. (1993) 'Cruncher - the first beneficial virus?' Virus Bulletin pp. 8--9."},{"key":"e_1_2_1_22_1","unstructured":"Keizer G. (18 May 2007) 'Symantec false positive cripples thousands of Chinese PCs' Computerworld. Keizer G. (18 May 2007) 'Symantec false positive cripples thousands of Chinese PCs' Computerworld."},{"key":"e_1_2_1_23_1","unstructured":"Liang G. (2005) 'The CASS Internet report 2005: Surveying Internet usage and impact in five Chinese cities'. Liang G. (2005) 'The CASS Internet report 2005: Surveying Internet usage and impact in five Chinese cities'."},{"key":"e_1_2_1_24_1","unstructured":"Ludwig M. (1998) The Giant Black Book of Computer Viruses second edn American Eagle. Ludwig M. (1998) The Giant Black Book of Computer Viruses second edn American Eagle."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-008-9150-1"},{"key":"e_1_2_1_26_1","unstructured":"MidNyte (1999) 'Argument for a 'good' virus'. MidNyte (1999) 'Argument for a 'good' virus'."},{"key":"e_1_2_1_28_1","unstructured":"Nazario J. (2004) Defense and Detection Strategies against Internet Worms Artech House. Nazario J. (2004) Defense and Detection Strategies against Internet Worms Artech House."},{"key":"e_1_2_1_29_1","unstructured":"OpenNet Initiative (2005a) 'Internet filtering in China in 2004--2005: A country study' http:\/\/www.opennet.net\/china. OpenNet Initiative (2005 a ) 'Internet filtering in China in 2004--2005: A country study' http:\/\/www.opennet.net\/china."},{"key":"e_1_2_1_30_1","unstructured":"OpenNet Initiative (2005b) 'Internet filtering in the United Arab Emirates in 2004--2005: A country study' http:\/\/www.opennet.net\/uae. OpenNet Initiative (2005 b ) 'Internet filtering in the United Arab Emirates in 2004--2005: A country study' http:\/\/www.opennet.net\/uae."},{"key":"e_1_2_1_31_1","unstructured":"OpenNet Initiative (2006) 'Internet filtering in Vietnam in 2005--2006: A country study' http:\/\/www.opennet.net\/vietnam. OpenNet Initiative (2006) 'Internet filtering in Vietnam in 2005--2006: A country study' http:\/\/www.opennet.net\/vietnam."},{"key":"e_1_2_1_32_1","unstructured":"Perriot F. &amp; Knowles D. (28 July 2004) 'W32.Welchia.Worm' Symantec Security Response. Perriot F. &amp; Knowles D. (28 July 2004) 'W32.Welchia.Worm' Symantec Security Response."},{"key":"e_1_2_1_33_1","unstructured":"Qiang X. (30 August 2004) 'The words you never see in Chinese cyberspace' China Digital Times. Qiang X. (30 August 2004) 'The words you never see in Chinese cyberspace' China Digital Times."},{"issue":"2","key":"e_1_2_1_34_1","first-page":"451","article-title":"From the great firewall of China to the Berlin firewall: The cost of content regulation on Internet commerce","volume":"13","author":"Reed K. M.","year":"2000","journal-title":"The Transnational Lawyer"},{"key":"e_1_2_1_35_1","unstructured":"Settle E. (2003) 'AIDS in China: An annotated chronology 1985--2003' http:\/\/www.casy.org\/chron\/AIDSchron 111603.pdf. Settle E. (2003) 'AIDS in China: An annotated chronology 1985--2003' http:\/\/www.casy.org\/chron\/AIDSchron 111603.pdf."},{"key":"e_1_2_1_36_1","unstructured":"Schneier B. (2003) Benevolent Worms Crypto-Gram Newsletter available at http:\/\/www.schneier.com\/crypto-gram-0309.html#8. Schneier B. (2003) Benevolent Worms Crypto-Gram Newsletter available at http:\/\/www.schneier.com\/crypto-gram-0309.html#8."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/358453.358455"},{"key":"e_1_2_1_38_1","unstructured":"Tor (2006) 'Tor directory protocol version 2' http:\/\/tor.eff.org\/svn\/trunk\/doc\/dirspec.txt. Tor (2006) 'Tor directory protocol version 2' http:\/\/tor.eff.org\/svn\/trunk\/doc\/dirspec.txt."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844105"},{"key":"e_1_2_1_40_1","unstructured":"Wong B. (2004) 'The tug-of-war for control of China's Internet' China Rights Forum (1) 32--34. Wong B. (2004) 'The tug-of-war for control of China's Internet' China Rights Forum (1) 32--34."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1189191"}],"container-title":["ACM SIGCAS Computers and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1361255.1361256","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1361255.1361256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:58:03Z","timestamp":1750255083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1361255.1361256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,3]]}},"alternative-id":["10.1145\/1361255.1361256"],"URL":"https:\/\/doi.org\/10.1145\/1361255.1361256","relation":{},"ISSN":["0095-2737"],"issn-type":[{"type":"print","value":"0095-2737"}],"subject":[],"published":{"date-parts":[[2008,3]]},"assertion":[{"value":"2008-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}