Erin Kenneally

Elchemy

CEO

OR 97238

United States

http://www.elchemy.io

SCHOLARLY PAPERS

23

DOWNLOADS

4,332

SSRN CITATIONS

6

CROSSREF CITATIONS

13

Ideas:
“  Data risk and trust; ethical, legal, and social risk-sensitive tech innovation; cyber risk economics; trusted data infrastructure  ”

Scholarly Papers (23)

1.

Artificial Intelligence and the Weaponization of Genetic Data

Number of pages: 22 Posted: 17 Jul 2020
GeneInfoSec Inc, Elchemy, GeneInfoSec Inc. and GeneInfoSec Inc.
Downloads 565 (84,838)
Citation 2

Abstract:

Loading...

Security, InfoSec, Bio-weapons, Cyber-bio-security, Genomics

2.

The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research

Number of pages: 14 Posted: 04 Jun 2014
Erin Kenneally and David Dittrich
Elchemy and University of Washington
Downloads 511 (96,318)
Citation 68

Abstract:

Loading...

research ethics, ethics, law, ICT risk

3.

Applying Ethical Principles to Information and Communication Technology Research: A Companion to the Menlo Report

Number of pages: 33 Posted: 25 Oct 2013 Last Revised: 30 Mar 2014
David Dittrich, Erin Kenneally and Michael Bailey
University of Washington, Elchemy and University of Michigan at Ann Arbor - College of Engineering
Downloads 468 (106,823)
Citation 6

Abstract:

Loading...

ethics, ICT, computer crime, law, computer network security, computer security, professional societies, technology social factors

4.

Privacy and the Internet of Things: Emerging Frameworks for Policy and Design

Rosner, Gilad and Kenneally, Erin, Privacy and the Internet of Things: Emerging Frameworks for Policy and Design (June 7, 2018). UC Berkeley Center for Long-Term Cybersecurity/Internet of Things Privacy Forum
Number of pages: 28 Posted: 04 Mar 2019
Gilad Rosner, Gilad Rosner and Erin Kenneally
Internet of Things Privacy ForumUniversity of Nottingham - Horizon Digital Economy Research Institute and Elchemy
Downloads 386 (133,683)

Abstract:

Loading...

5.

Confluence of Digital Evidence and the Law: On the Forensic Soundness of Live-Remote Digital Evidence Collection.

2005 UCLA J.L. & Tech. 5
Number of pages: 27 Posted: 13 Sep 2012
Erin Kenneally
Elchemy
Downloads 294 (179,138)

Abstract:

Loading...

computer forensics, digital evidence, electronic forensics, computer law, technology law

6.

Clearly Opaque: Privacy Risks of the Internet of Things

Rosner, Gilad and Kenneally, Erin, Clearly Opaque: Privacy Risks of the Internet of Things (May 1, 2018). IoT Privacy Forum
Number of pages: 151 Posted: 04 Mar 2019
Gilad Rosner, Gilad Rosner and Erin Kenneally
Internet of Things Privacy ForumUniversity of Nottingham - Horizon Digital Economy Research Institute and Elchemy
Downloads 285 (184,996)

Abstract:

Loading...

internet of things, privacy, IOT, notification, governance, technology policy

7.

A Qualitative Risk Assessment Framework for Sharing Computer Network Data

2012 TRPC
Number of pages: 23 Posted: 02 Apr 2012 Last Revised: 14 Oct 2019
Scott Coull and Erin Kenneally
RedJack LLC and Elchemy
Downloads 276 (191,104)
Citation 4

Abstract:

Loading...

data sharing, privacy, computer networks, anonymization, risk assessment

8.

Ransomware: A Darwinian Opportunity for Cyber Insurance

Kenneally, Erin. "Ransomware: A Darwinian Opportunity for Cyber Insurance." Connecticut Insurance Law Journal Fall Symposium Edition. Vol. 28. 2021. , Connecticut Insurance Law Journal, Vol. 28, No. 1, 2021
Number of pages: 31 Posted: 24 May 2021 Last Revised: 18 Apr 2022
Erin Kenneally
Elchemy
Downloads 274 (192,595)
Citation 1

Abstract:

Loading...

cyber risk, cyber insurance, ransomware, cyber security

9.

Gatekeeping Out of the Box: Open Source Software as a Mechanism to Assess Reliability for Digital Evidence

Virginia Journal of Law and Technology, Vol. 6, No. 13, 2001
Number of pages: 19 Posted: 13 Sep 2012
Erin Kenneally
Elchemy
Downloads 250 (210,938)

Abstract:

Loading...

10.

Cyber-security Research Ethics Dialogue & Strategy Workshop

ACM SIGCOMM Computer Communication Review (CCR), vol. 4, no. 2, Apr 2014.
Number of pages: 4 Posted: 19 Oct 2013 Last Revised: 30 Mar 2014
Erin Kenneally and Michael Bailey
Elchemy and University of Michigan at Ann Arbor - College of Engineering
Downloads 201 (259,344)

Abstract:

Loading...

ethics, trust, cyber security research, law

11.

Valuing Cybersecurity Research Datasets

Tyler Moore, Erin Kenneally, Michael Collett, and Prakash Thapa. Valuing cybersecurity research datasets. In 18th Workshop on the Economics of Information Security (WEIS), 2019.
Number of pages: 27 Posted: 23 Oct 2019
University of Tulsa - Tandy School of Computer Science, Elchemy, University of Tulsa - Tandy School of Computer Science and affiliation not provided to SSRN
Downloads 169 (303,710)
Citation 1

Abstract:

Loading...

cybersecurity, research & development, law, data sharing, security economics, incentives

12.

The Menlo Report

Security & Privacy, IEEE , Vol.10, No.2, pp.71-75, March-April 2012, doi: 10.1109/MSP.2012.52
Number of pages: 4 Posted: 13 Sep 2012 Last Revised: 30 Mar 2014
University of Michigan at Ann Arbor - College of Engineering, Elchemy, University of Washington and Government of the United States of America - Department of Homeland Security
Downloads 125 (385,033)

Abstract:

Loading...

computer crime, law, computer network security, computer security, ethics, professional societies, technology social factors

13.

The Road to an Open Internet is Paved with Pragmatic Disclosure & Transparency Policies

TPRC 43: The 43rd Research Conference on Communication, Information and Internet Policy Paper
Number of pages: 31 Posted: 31 Mar 2015 Last Revised: 20 Sep 2015
William Lehr, Erin Kenneally and Steven Bauer
Massachusetts Institute of Technology (MIT) - Computer Science and Artificial Intelligence Laboratory (CSAIL), Elchemy and Massachusetts Institute of Technology (MIT) - Laboratory for Computer Science (LCS)
Downloads 105 (437,250)
Citation 6

Abstract:

Loading...

internet measurement, network management, disclosure, transparency

14.

Toward a Comprehensive Disclosure Control Framework for Shared Data

Coull, Scott E. and Kenneally, Erin E., "Toward a Comprehensive Disclosure Control Framework for Shared Data", IEEE International Conference on Technologies for Homeland Security (November 2013, Boston, MA).
Number of pages: 7 Posted: 16 Sep 2013 Last Revised: 03 Jun 2014
Scott Coull and Erin Kenneally
RedJack LLC and Elchemy
Downloads 95 (467,992)
Citation 1

Abstract:

Loading...

data sharing, data disclosure, information risk management, information sharing, disclosure control, information technology policy, legal compliance, sharing framework

15.

Cyber Risk Economics Capability Gaps Research Strategy

E. Kenneally, L. Randazzese and D. Balenson, "Cyber Risk Economics Capability Gaps Research Strategy," 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), Glasgow, 2018, pp. 1-6. DOI/10.1109/CyberSA.2018.8551399
Number of pages: 6 Posted: 24 Feb 2019
Erin Kenneally, Lucien Randazzese and Dave Balenson
Elchemy, SRI and SRI
Downloads 53 (644,146)

Abstract:

Loading...

risk, economics, cyber security, insurance, data sharing, incentives

16.

A Framework for Understanding and Applying Ethical Principles in Network and Security Research

In Workshop on Ethics in Computer Security Research (WECSR '10), Tenerife, Canary Islands, Spain, (January 2010)
Number of pages: 7 Posted: 13 Sep 2012
Erin Kenneally, Michael Bailey and Douglas Maughan
Elchemy, affiliation not provided to SSRN and Government of the United States of America - Department of Homeland Security
Downloads 47 (678,561)
Citation 1

Abstract:

Loading...

research ethics, computer security ethics, ethical impact assessment, information and communications technology research, technology policy

17.

PrivTech for Data Risk & Value: It's Time to Cross the Valley of Death

Number of pages: 10 Posted: 13 Dec 2019 Last Revised: 19 Dec 2019
Erin Kenneally and David Archer
Elchemy and Galois
Downloads 46 (684,647)

Abstract:

Loading...

privacy technology, governance, data trust, privacy, security, technology transition

18.

How to Throw the Race to the Bottom: Revisiting Signals for Ethical and Legal Research Using Online Data

Erin Kenneally. 2015. How to throw the race to the bottom: revisiting signals for ethical and legal research using online data. SIGCAS Comput. Soc. 45, 1 (February 2015), 4-10. Doi.org/10.1145/2738210.2738211
Number of pages: 7 Posted: 31 Jan 2015 Last Revised: 20 Aug 2019
Erin Kenneally
Elchemy
Downloads 45 (690,925)

Abstract:

Loading...

Security research ethics, law, ethics, research risk, privacy, technology policy

19.

Enabling the Enablers: An Identity Fraud Solution for Law Enforcement

Journal of Digital Forensic Practice, 1:3, 157-164 (2006)
Number of pages: 8 Posted: 13 Sep 2012
Erin Kenneally
Elchemy
Downloads 45 (690,925)

Abstract:

Loading...

identity theft, identity fraud, information forensics, investigation, decision management, law enforcement, electronic crime, identity crime, data correlation

20.

Beyond Whiffle-Ball Bats: Addressing Identity Crime in an Information Economy

John Marshall Journal of Computer & Information Law, Vol. 26, No. 47, Fall 2008
Number of pages: 96 Posted: 13 Sep 2012
Erin Kenneally
Elchemy
Downloads 42 (710,110)

Abstract:

Loading...

identity theft, identity crime, cybercrime, e-crime, law enforcement

21.

Can Network Science Help Re-Write the Privacy Playbook?

American Bar Association Information Security and Privacy Journal, Vol 1: 21-31 (Fall 2010)
Number of pages: 11 Posted: 13 Sep 2012
Erin Kenneally
Elchemy
Downloads 28 (813,764)

Abstract:

Loading...

reasonable expectation of privacy, network science, privacy law

22.

Dialing Privacy and Utility: A Proposed Data-Sharing Framework to Advance Internet Research

IEEE Security & Privacy, Vol. 8, No. 4, pp. 31-39, July-Aug. 2010, doi:10.1109/MSP.2010.57
Number of pages: 9 Posted: 05 Oct 2009 Last Revised: 01 Feb 2014
Erin Kenneally and KC Claffy
Elchemy and University of California, San Diego (UCSD)
Downloads 22 (865,836)

Abstract:

Loading...

privacy, policy, data sharing, trust, legal risk, utility

23.

Encrypted Dataset Collaboration: Intelligent Privacy for Smart Cities

Potozcny-Jones, Isaac, Kenneally, Erin and Ruffing, John, Encrypted Dataset Collaboration: Intelligent Privacy for Smart Cities, 2019. Proceedings of the 2nd ACM/EIGSCC Symposium on Smart Cities and Communities. ACM, New York, NY, USA.
Posted: 23 Oct 2019
Isaac Potozcny-Jones, Erin Kenneally and John Ruffing
Tozny, Elchemy and affiliation not provided to SSRN

Abstract:

Loading...

data privacy, privacy technology, data security, smart cities, data sharing

Other Papers (1)

Total Downloads: 53
1.

Internet Infrastructure Risk Economics Research Issue Brief

Kenneallly, Erin, David Balenson, Ashley Begley, Christina Davis, and Lucien Randazzese. "Internet Infrastructure Risk Economics Research Issue Brief". U.S. Department of Homeland Security, Science & Technology Directorate, 2019-9 doi: 10.23721/150
Number of pages: 8 Posted: 23 Oct 2019
Elchemy, SRI, SRI International, SRI International and SRI
Downloads 53

Abstract:

Loading...

cyber risk, internet infrastructure, data sharing, cyber economics, critical infrastructure, R&D