To see the other types of publications on this topic, follow the link: Ethical Hacking.

Journal articles on the topic 'Ethical Hacking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ethical Hacking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Farsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (February 25, 2010): 14–20. http://dx.doi.org/10.5120/229-380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Palmer, C. C. "Ethical hacking." IBM Systems Journal 40, no. 3 (2001): 769–80. http://dx.doi.org/10.1147/sj.403.0769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Utomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.

Full text
Abstract:
Ethical Hacking is done by companies in anticipation of system security loopholes. Ethical hacking is done by someone who has the ability like a hacker who is able to attack a system but has the motivation to help companies find security gaps that companies will use to evaluate their systems. This paper explains the importance of information and why it must be maintained and how an ethical hacker does his work.
APA, Harvard, Vancouver, ISO, and other styles
4

Cooper, Martin. "Adventures in Ethical Hacking." ITNOW 58, no. 3 (September 2016): 36–37. http://dx.doi.org/10.1093/itnow/bww074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Wanbil W. "Ethical Computing for Data Protection." International Journal of Technoethics 11, no. 1 (January 2020): 43–58. http://dx.doi.org/10.4018/ijt.2020010104.

Full text
Abstract:
Data protection is a chronic problem. Technology has had a social and ethical impact on our professional, social, and private lives. It is imperative for computing practitioners and researchers to link the ethical dilemmas and the technologies to the relevant ethical theories. This paper argues that the cause is rooted in our indifference to ethics—one doesn't take ethics as seriously into consideration as one should when formulating information security policies and protection standards—and proposes an ethics-based approach that can lessen the incidence of hacking or make hacking exasperate, aiming at mitigation rather than eradication. Central to this approach is ethical computing preconditioned on a sound understanding of the applicable theories of ethics and a shift of view of risk and ethics.
APA, Harvard, Vancouver, ISO, and other styles
6

Bellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (February 12, 2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.

Full text
Abstract:
AbstractIn recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interests of oneself or others. Moreover, it will also argue that just because hackers are outside the state does not automatically discount them as ethical actors and that when the state fails to protect people – whether it is due to a lack of ability, political will or because the state is the source of the threat – hackers can fill the void. In order to achieve this, first it is necessary to highlight the space for hackers to operate; second, guide hacker activity by creating an ethical framework detailing what actions are justified towards what end; third, to offer mechanisms that can aid in reaching these ethically justified decisions; and as a result, inform further ethical debates on how to react to these political hackers. This means that the framework can be used to both justify and condemn hacking depending on the circumstances, allowing those on the outside to distil and evaluate a political hack, both past and present, while guiding hacker collectives by providing clearer ethical tools for determining the appropriate agendas and methods.
APA, Harvard, Vancouver, ISO, and other styles
7

Abu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University." International Journal of Technoethics 7, no. 1 (January 2016): 62–76. http://dx.doi.org/10.4018/ijt.2016010105.

Full text
Abstract:
Business and academic organizations are in a constant pursuit of efficient and ethical technologies and practices to safeguard their information assets from the growing threat of hackers. Ethical hacking is one important information security risk management strategy they use. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This paper addressed a scarcity within the organizational communication literature on ethical hacking. Taking a qualitative exploratory case study approach, the authors explored ethical hacking implementation within a Canadian university as the case study in focus, applying technoethical inquiry theory paired with Karl Weick's sensemaking model as a theoretical framework. In-depth interviews with key stakeholder groups and a document review were conducted. Findings pointed to the need to expand the communicative and sociocultural considerations involved in decision making about ethical hacking organizational practices, and to security awareness training to leverage sensemaking opportunities and reduce equivocality.
APA, Harvard, Vancouver, ISO, and other styles
8

Reddy, P. Harika. "Cyber Security and Ethical Hacking." International Journal for Research in Applied Science and Engineering Technology 6, no. 6 (June 30, 2018): 1770–74. http://dx.doi.org/10.22214/ijraset.2018.6261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Genosko, Gary. "Review of Maurushat’s Ethical Hacking." Surveillance & Society 17, no. 3/4 (September 7, 2019): 574–76. http://dx.doi.org/10.24908/ss.v17i3/4.13495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Tyagi, Virat. "Ethical Hacking and Advance Python." International Journal for Research in Applied Science and Engineering Technology 9, no. 5 (May 31, 2021): 234–39. http://dx.doi.org/10.22214/ijraset.2021.34073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mousa, Shaymaa, and Wejdan Barashi. "Ethical Hacking in the Saudi Government Institutions." International Journal for Innovation Education and Research 3, no. 10 (October 31, 2015): 74–86. http://dx.doi.org/10.31686/ijier.vol3.iss10.448.

Full text
Abstract:
The Internet has become indispensable to governments by allowing them to conduct E-government, provide better citizen service, improve communications, and access needed information rapidly. While computer networks have revolutionized the way governmental institutions operate, the risks they introduce via interconnectivity can be devastating. Attacks on computer systems via the Internet can lead to lost money, time, reputation, and sensitive information. One reaction to this state of affairs is a behaviour termed “Ethical Hacking” which attempts to proactively increase security protection by indenturing and patching known security vulnerabilities on systems owned by other parties. The main purpose of this study is to address the problems related to the ethical hacking in governmental institutions in Saudi Arabia. The results show that there is a lack of awareness to issues of information security, and ethical hacking, Ethical hacking have a positive impact on the Saudi institutions, and most of ethical hacking problems in Saudi Arabia are related to senior management, staff, society and laws. More researches are needed to consider other measures and include other countries which may show different results.
APA, Harvard, Vancouver, ISO, and other styles
13

Vignesh, R., and K. Rohini. "Analysis to Determine the Scope and Challenging Responsibilities of Ethical Hacking Employed in Cyber Security." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.27.17759.

Full text
Abstract:
This paper analyzes a variety of Challenging Roles of Ethical Hacking employed in Cyber Security. The requirement for more viable requesting data security rehearses is progressively evident with every security encroaches revealed in the media. Ethical hacking set forward a target investigation of an association's data security bearing for associations of numerous phase of security capability. Programmers must output for shortcomings, test section focuses, needs targets, and build up a procedure that best use their assets. The reason for this sort of security appraisal directly affects the estimation of the entire assessment. More finished it is recognized that electronic devices are fundamental to forestall digital culprits hacking into online systems to contain their administrations and access secret information for uncalled for purposes. Ethical Hacking is capably required where approved programmers endeavor to penetrate a business' frameworks/arranges for the benefit of the proprietors with the goal of discovering security shortcomings. It give bits of knowledge into how Ethical Hacking, as Penetration Testing utilizing free open source devices, can be utilized by associations to secure their system's administrations/activities. Utilizing Nmap, Google Hacking, Nessus, Brutus and Acunetix .Thus measures were placed in to determine these vulnerabilities and dodge the delicate information from potential digital threats.
APA, Harvard, Vancouver, ISO, and other styles
14

Trabelsi, Zouheir, and Margaret McCoey. "Ethical Hacking in Information Security Curricula." International Journal of Information and Communication Technology Education 12, no. 1 (January 2016): 1–10. http://dx.doi.org/10.4018/ijicte.2016010101.

Full text
Abstract:
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on lab exercises which focus on attacking systems. The paper includes the ethical implications associated with including such labs. The discussion is informed by analyses of log data on student malicious activities, and student survey results. The examination of student behavior after acquiring these skills demonstrates that there is potentially a high risk of inappropriate and illegal behavior associated with this type learning. While acknowledging these risks and problems, the paper recommends that curricula should opt for a teaching approach that offers students both offensive and defensive hands-on lab exercises in conjunction with lecture material. The authors propose steps to minimize the risk of inappropriate behavior and reduce institutional liability.
APA, Harvard, Vancouver, ISO, and other styles
15

Баджаж, Эмей. "CYBER WARFARE - A POTENTIAL GLOBAL THREAT." Rule-of-law state: theory and practice 16, no. 4-1 (April 1, 2020): 178–84. http://dx.doi.org/10.33184/pravgos-2020.4.17.

Full text
Abstract:
This research article focuses on the concept of cyber warfare becoming a potential global threat. Purpose: to cover the basics of hacking, ethical hacking, cyber warfare, types of threat, cyber-attacks and cyber counter-intelligence. The article explains how hacking is done and what are the requisites for ethical hacking. In 2020, what all cyber threats, we are subjected to and how to counter it. Methods: the research is based on the methods of analysis, synthesis and description. Results: the article describes how cyber warfare could be a medium of war in future and how different nations are using technology to gain power as well as defend themselves from multi-potential threats.
APA, Harvard, Vancouver, ISO, and other styles
16

Georg, Thomas, Burmeister Oliver, and Low Gregory. "Issues of Implied Trust in Ethical Hacking." ORBIT Journal 2, no. 1 (2018): 1–19. http://dx.doi.org/10.29297/orbit.v2i1.77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

NEERAJ, RATHORE. "ETHICAL HACKING AND SECURITY AGAINST CYBER CRIME." i-manager's Journal on Information Technology 5, no. 1 (2016): 7. http://dx.doi.org/10.26634/jit.5.1.4796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Bodhani, A. "Bad... in a good way [ethical hacking]." Engineering & Technology 7, no. 12 (December 1, 2012): 64–68. http://dx.doi.org/10.1049/et.2012.1217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Kelrey, Ahmad Ridha, and Aan Muzaki. "PENGARUH ETHICAL HACKING BAGI KEAMANAN DATA PERUSAHAAN." Cyber Security dan Forensik Digital 2, no. 2 (November 28, 2019): 77–81. http://dx.doi.org/10.14421/csecurity.2019.2.2.1625.

Full text
Abstract:
Melindungi aset digital merupakan perhatian yang penting bagi perusahaan, karena serangan siber memengaruhi kinerja bisnis dan reputasi sebuah perusahaan. Tiga konsep dasar keamanan yang penting untuk informasi di internet adalah kerahasiaan (confidentiality), integritas (integrity), dan ketersediaan (availability). Konsep yang berkaitan dengan orang-orang yang menggunakan informasi itu adalah authentication, authorization, dan nonrepudiation. Keamanan informasi menjadi suatu hal yang mahal pada saat ini, sehingga ethical hacking diperlukan untuk menjamin sebuah sistem informasi perusahaan tersebut cukup handal. Dengan begitu dapat menjaga reputasi perusahaan tersebuat di mata pelangannya.
APA, Harvard, Vancouver, ISO, and other styles
20

Sultan, Nagham A., Karam H. Thanoon, and Omar A. Ibrahim. "Ethical Hacking Implementation for Lime Worm Ransomware Detection." Journal of Physics: Conference Series 1530 (May 2020): 012078. http://dx.doi.org/10.1088/1742-6596/1530/1/012078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Bari, Mohammed Abdul, and Shahanawaj Ahamad. "Study of Ethical Hacking and Management of Associated Risks." International Journal of Engineering and Applied Computer Science 01, no. 01 (November 25, 2016): 07–11. http://dx.doi.org/10.24032/ijeacs/0101/02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Rafee, Dr B. Mahammad, and Shuaib Ahmed Shariff. "GOOD AND BAD ABOUT ETHICAL HACKING IN INDIAN PERSPECTIVE." International Journal of Technical Research & Science 05, no. 02 (February 28, 2020): 12–18. http://dx.doi.org/10.30780/ijtrs.v05.i02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Papp, Dorottya, Kristóf Tamás, and Levente Buttyán. "IoT Hacking – A Primer." Infocommunications journal, no. 2 (2019): 2–13. http://dx.doi.org/10.36244/icj.2019.2.1.

Full text
Abstract:
The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities that, if exploited, can result in highly undesirable conditions, including damage of expensive physical equipment or even loss of human life. In this paper, we give a basic introduction into hacking IoT devices. We give an overview on the methods and tools for hardware hacking, firmware extraction and unpacking, and performing basic firmware analysis. We also provide a survey on recent research on more advanced firmware analysis methods, including static and dynamic analysis of binaries, taint analysis, fuzzing, and symbolic execution techniques. By giving an overview on both practical methods and readily available tools as well as current scientific research efforts, our work can be useful for both practitioners and academic researchers.
APA, Harvard, Vancouver, ISO, and other styles
24

bell, adam patrick, David Bonin, Helen Pethrick, Amanda Antwi-Nsiah, and Brent Matterson. "Hacking, disability, and music education." International Journal of Music Education 38, no. 4 (July 4, 2020): 657–72. http://dx.doi.org/10.1177/0255761420930428.

Full text
Abstract:
The purpose of our study was to examine how hacking – as discussed and displayed by participants of Monthly Music Hackathon NYC – could inform making music education practices more accessible and inclusive, if at all, for people with disabilities. Free and open to the public, Monthly Music Hackathon NYC hosts non-competitive community-based events in which participants – musicians, educators, coders, and software/hardware designers from beginner to expert – work on projects collaboratively over the course of a day to address real-world problems posed by stakeholders in their communities. Our research team consisting of the principal investigator and two research assistants attended and videorecorded the events of Monthly Music Hackathon NYC’s ‘Music AccessAbility’ hackathon. In this article, we detail what constitutes hacking at this event and how participants approached hacking disability. We discuss the potential of hacking in music education to create a more accessible and inclusive field, and the importance of championing a disability-led design model as the ethical way forward.
APA, Harvard, Vancouver, ISO, and other styles
25

Garg, Vanshika, and Riya Ailawadi. "PROPOSED ETHICAL HACKING FRAMEWORK FOR SECURE DELIVERY OF ONLINE EDUCATION." International Journal of Technical Research & Science Special, Issue3 (September 15, 2020): 42–48. http://dx.doi.org/10.30780/specialissue-icaccg2020/031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nicholson, Scott. "How ethical hacking can protect organisations from a greater threat." Computer Fraud & Security 2019, no. 5 (May 2019): 15–19. http://dx.doi.org/10.1016/s1361-3723(19)30054-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Pradeep, I., and G. Sakthivel. "Ethical hacking and penetration testing for securing us form Hackers." Journal of Physics: Conference Series 1831, no. 1 (March 1, 2021): 012004. http://dx.doi.org/10.1088/1742-6596/1831/1/012004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Whitman, Michael E., and Humayun Zafar. "URL Manipulation and the Slippery Slope." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 2 (April 2013): 43–50. http://dx.doi.org/10.4018/jitn.2013040104.

Full text
Abstract:
While computer ethics and information security courses try to teach computer misuse and unauthorized access as clear black and white examples, when examining the use and potentially misuse of URLs the discussion becomes less clear. This paper examines a number of computer use ethical scenarios focusing on the modification of URLs within Web browsers. Using the documented case of applicants to several Ivy-league schools as a discussion point, this paper presents a survey of U.S. students enrolled in information security and computer ethics classes, asking at what point does modifying the URL become hacking, and at what point does it become unethical. The findings of this study are discussed.
APA, Harvard, Vancouver, ISO, and other styles
29

Lindgren, Simon. "Hacking Social Science for the Age of Datafication." Journal of Digital Social Research 1, no. 1 (August 30, 2019): 1–9. http://dx.doi.org/10.33621/jdsr.v1i1.6.

Full text
Abstract:
The ongoing and intensifying datafication of our societies poses huge challenges as well as opportunities for social science to rethink core elements of its research enterprise. Prominently, there is a pressing need to move beyond the long-standing qualitative/quantitative divide. This paper is an argument towards developing a critical science of data, by bringing together the interpretive theoretical and ethical sensibilities of social science with the predictive and prognostic powers of data science and computational methods. I argue that the renegotiation of theories and research methods that must be made in order for them to be more relevant and useful, can be fruitfully understood through the metaphor of hacking social science: developing creative ways of exploiting existing tools in alternative and unexpected ways to solve problems
APA, Harvard, Vancouver, ISO, and other styles
30

Khokhlov, A. L., and D. Yu Belousov. "Ethical aspects of the Internet of Bodies." Kachestvennaya Klinicheskaya Praktika = Good Clinical Practice, no. 2 (August 13, 2021): 89–98. http://dx.doi.org/10.37489/2588-0519-2021-2-89-98.

Full text
Abstract:
This article outlines bioethical issues related to the application of the Internet of Body (IoB) technology in health care so-called medical IoB devices. Manufacturers of medical IoB devices promise to provide significant health benefits, improved treatment outcomes and other benefits, but such IoB also carry serious risks to health and life, including the risks of hacking (cyberhacking), malfunctioning, receiving false positive measurements, breaching privacy, deliberate invasion of privacy. In addition, medical IoB products can directly cause physical harm to the human body. As human flesh is intertwined with hardware, software, and algorithms, the IoB will test our social values and ethics. In particular, IoB will challenge notions of human autonomy and self-government as they threaten to undermine the fundamental precondition of human autonomy. Thus, the protection of human autonomy should become the main ethical principle of the use of medical IoB devices.
APA, Harvard, Vancouver, ISO, and other styles
31

Floridi, Luciano, and Mariarosaria Taddeo. "What is data ethics?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, no. 2083 (December 28, 2016): 20160360. http://dx.doi.org/10.1098/rsta.2016.0360.

Full text
Abstract:
This theme issue has the founding ambition of landscaping data ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing and use), algorithms (including artificial intelligence, artificial agents, machine learning and robots) and corresponding practices (including responsible innovation, programming, hacking and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data ethics builds on the foundation provided by computer and information ethics but, at the same time, it refines the approach endorsed so far in this research field, by shifting the level of abstraction of ethical enquiries, from being information-centric to being data-centric. This shift brings into focus the different moral dimensions of all kinds of data, even data that never translate directly into information but can be used to support actions or generate behaviours, for example. It highlights the need for ethical analyses to concentrate on the content and nature of computational operations—the interactions among hardware, software and data—rather than on the variety of digital technologies that enable them. And it emphasizes the complexity of the ethical challenges posed by data science. Because of such complexity, data ethics should be developed from the start as a macroethics, that is, as an overall framework that avoids narrow, ad hoc approaches and addresses the ethical impact and implications of data science and its applications within a consistent, holistic and inclusive framework. Only as a macroethics will data ethics provide solutions that can maximize the value of data science for our societies, for all of us and for our environments. This article is part of the themed issue ‘The ethical impact of data science’.
APA, Harvard, Vancouver, ISO, and other styles
32

M. Skriabin, Oleksii, Dmytro B. Sanakoiev, Natalia D. Sanakoieva, Vita V. Berezenko, and Yuliia V. Liubchenko. "Neurotechnologies in the advertising industry: Legal and ethical aspects." Innovative Marketing 17, no. 2 (June 29, 2021): 189–201. http://dx.doi.org/10.21511/im.17(2).2021.17.

Full text
Abstract:
As a result of technological and information development, there is a rapid spread of neurotechnology in the advertising industry, which sparks debate among law and marketing scholars regarding ethics, reasonability and legality of their use. The paper aims to identify possible ways to increase the effectiveness of regulatory and ethical aspects of using neurotechnology in Ukraine’s advertising industry. Based on a systematic analysis of theoretical experience and regulatory legal acts, the main threats to the development of neuromarketing are identified. The lack of a neurotechnology law, the distinguishing between “neuro data” and “personal data”, cyber-hacking risks, the lack of an interaction model between the state and advertisers are deemed to be regulatory shortcomings. Possible ways to optimize the legal regulation of the neurotechnology use are the development of a neurotechnology law, the legislative enshrinement of the neuro data concept, the introduction of restrictions on neuro data use depending on the industry and purpose, increased cybersecurity level. Threats to the ethical use of neurotechnology include low public awareness of neurotechnology and personal rights of citizens, lack of training activities for marketers and advertisers in the field of neuroscience. It is possible to overcome ethical threats through educational and informational work for marketers, advertisers and citizens. A comprehensive solution to the ethical and legal shortcomings of neurotechnology use will increase the neurotechnology development level, the proficiency level of marketers and advertisers, as well as improve the legal system in Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
33

Sample, Matthew, Sebastian Sattler, Stefanie Blain-Moraes, David Rodríguez-Arias, and Eric Racine. "Do Publics Share Experts’ Concerns about Brain–Computer Interfaces? A Trinational Survey on the Ethics of Neural Technology." Science, Technology, & Human Values 45, no. 6 (October 9, 2019): 1242–70. http://dx.doi.org/10.1177/0162243919879220.

Full text
Abstract:
Since the 1960s, scientists, engineers, and healthcare professionals have developed brain–computer interface (BCI) technologies, connecting the user’s brain activity to communication or motor devices. This new technology has also captured the imagination of publics, industry, and ethicists. Academic ethics has highlighted the ethical challenges of BCIs, although these conclusions often rely on speculative or conceptual methods rather than empirical evidence or public engagement. From a social science or empirical ethics perspective, this tendency could be considered problematic and even technocratic because of its disconnect from publics. In response, our trinational survey (Germany, Canada, and Spain) reports public attitudes toward BCIs ( N = 1,403) on ethical issues that were carefully derived from academic ethics literature. The results show moderately high levels of concern toward agent-related issues (e.g., changing the user’s self) and consequence-related issues (e.g., new forms of hacking). Both facets of concern were higher among respondents who reported as female or as religious, while education, age, own and peer disability, and country of residence were associated with either agent-related or consequence-related concerns. These findings provide a first look at BCI attitudes across three national contexts, suggesting that the language and content of academic BCI ethics may resonate with some publics and their values.
APA, Harvard, Vancouver, ISO, and other styles
34

Ellis, Gavin. "Journalism’s road codes: The enduring nature of common ethical standards." Pacific Journalism Review 18, no. 2 (October 31, 2012): 118. http://dx.doi.org/10.24135/pjr.v18i2.268.

Full text
Abstract:
Journalistic principles and codes of practice are manifestations of a desire to be seen as socially responsible. Their significance has never been in doubt but the failure to adhere to them has been brought into sharp public focus by the News International phone hacking scandal and subsequent investigations in to news media regulation in Britain, Australia and New Zealand. This article compares codes of practice across the English-speaking world and finds significant similarities in what is expected of professional journalists by their employers and professional bodies, although there are variations in the extent to which the principles of responsible journalism are followed. The means by which journalists and media companies are held accountable is challenging various jurisdictions. However, the principles to be followed are likely to remain unchanged because they are based on a pragmatic approach to shielding individuals from harm at the hands of journalists.
APA, Harvard, Vancouver, ISO, and other styles
35

Alwi, Erick Irawadi, Herdianti Herdianti, and Fitriyani Umar. "Analisis Keamanan Website Menggunakan Teknik Footprinting dan Vulnerability Scanning." INFORMAL: Informatics Journal 5, no. 2 (August 30, 2020): 43. http://dx.doi.org/10.19184/isj.v5i2.18941.

Full text
Abstract:
Website security is an effort to protect websites from hacker attacks connected through a network. Website security needs to be a concern in the midst of many cases of website hacking from irresponsible people, including websites at Indonesian tertiary institutions that provide information and services to the public, students, and alumni of tertiary institutions. Higher education institution websites that can be accessed widely online can create vulnerabilities against threats from hacker attacks. To minimize this vulnerability, it is necessary to test the website of the higher education institution to assess and evaluate the security system of the university's website. The research method used in this study is the Ethical Hacking method which focuses on footprinting techniques and vulnerability scanning by only testing passive attacks. The results of this study have found information related to the target website (the website of an educational institution in one of the cities in Indonesia) and several vulnerability alerts after testing vulnerability scanning with high to low risk levels so that researchers recommend improving vulnerability to minimize security holes exploited by hackers .
APA, Harvard, Vancouver, ISO, and other styles
36

Pattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.

Full text
Abstract:
AbstractThe cyber realm is increasingly vital to national security, but much of cybersecurity is provided privately. Private firms provide a range of roles, from purely defensive operations to more controversial ones, such as active-cyber defense (ACD) and ‘hacking back’. As with the outsourcing of traditional military and security services to private military and security companies (PMSCs), the reliance on private firms raises the ethical question of to what extent the private sector should be involved in providing security services. In this article, I consider this question. I argue that a moderately restrictive approach should be adopted, which holds that private firms can justifiably launch some cybersecurity services – defensive measures – but are not permitted to perform others – offensive measures.
APA, Harvard, Vancouver, ISO, and other styles
37

Adda, Jérôme, Christian Decker, and Marco Ottaviani. "P-hacking in clinical trials and how incentives shape the distribution of results across phases." Proceedings of the National Academy of Sciences 117, no. 24 (June 2, 2020): 13386–92. http://dx.doi.org/10.1073/pnas.1919906117.

Full text
Abstract:
Clinical research should conform to high standards of ethical and scientific integrity, given that human lives are at stake. However, economic incentives can generate conflicts of interest for investigators, who may be inclined to withhold unfavorable results or even tamper with data in order to achieve desired outcomes. To shed light on the integrity of clinical trial results, this paper systematically analyzes the distribution ofPvalues of primary outcomes for phase II and phase III drug trials reported to the ClinicalTrials.gov registry. First, we detect no bunching of results just above the classical 5% threshold for statistical significance. Second, a density-discontinuity test reveals an upward jump at the 5% threshold for phase III results by small industry sponsors. Third, we document a larger fraction of significant results in phase III compared to phase II. Linking trials across phases, we find that early favorable results increase the likelihood of continuing into the next phase. Once we take into account this selective continuation, we can explain almost completely the excess of significant results in phase III for trials conducted by large industry sponsors. For small industry sponsors, instead, part of the excess remains unexplained.
APA, Harvard, Vancouver, ISO, and other styles
38

Banda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.

Full text
Abstract:
Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers.We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers.We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?
APA, Harvard, Vancouver, ISO, and other styles
39

Kammer, Jenna, Kodjo Atiso, and Edward Mensah Borteye. "Student Experiences with Digital Citizenship: A Comparative Cultural Study." Libri 71, no. 3 (April 30, 2021): 279–91. http://dx.doi.org/10.1515/libri-2020-0174.

Full text
Abstract:
Abstract This comparative cultural study examines differences in digital citizenship between undergraduate information literacy students at two different, but similar, universities across the globe from each other. Under the notion that the internet and prevalence of mobile devices allow students to participate online as digital citizens in ways that were impossible before, we use mixed methods to compare the attitudes and experiences of undergraduate students at a university in the midwestern United States (U.S.), with a university on the southwestern coast of Ghana. We also examine the policies related to technology use at these schools. The findings indicate that Ghanaian students had higher levels of digital citizenship. Other findings suggest that network issues are a problem for students in both schools, especially for Ghana, and ethical aspects of internet use, like cyberbullying, hacking, and fake news, deter students from participating online as much as they would like.
APA, Harvard, Vancouver, ISO, and other styles
40

McCrow-Young, Ally, and Mette Mortensen. "Countering spectacles of fear: Anonymous’ meme ‘war’ against ISIS." European Journal of Cultural Studies 24, no. 4 (April 3, 2021): 832–49. http://dx.doi.org/10.1177/13675494211005060.

Full text
Abstract:
In recent years, the terrorist network Islamic State of Iraq and Syria has generated what might be referred to as a ‘spectacle of fear’ through strategic dissemination of execution videos and other graphic material. In response, social media users, activists and others circulate ‘counter-spectacles’, attempting to circumvent Islamic State of Iraq and Syria’s spectacle of fear. An important case in point is the global hacking network Anonymous declaring ‘war’ against Islamic State of Iraq and Syria, including a global call for a ‘Troll ISIS Day’. This article develops a theoretical framework for understanding the spectacle of fear generated by Islamic State of Iraq and Syria and the counter-spectacle created through Anonymous’ trolling practices and explores empirically how Anonymous uses humor to combat fear through the memes produced on ‘Troll ISIS Day’. Bottom-up, cultural forms such as memes are increasingly woven into strategies for countering the fear associated with terrorism, and they represent the potential for humor to generate public engagement. However, as these memetic counter-spectacles draw on the incongruent humor characteristic of meme culture, they both contest and adopt strategies of fear, pointing to ethical challenges inherent in the counter-spectacle.
APA, Harvard, Vancouver, ISO, and other styles
41

Jones, Paul K. "The moment of Leveson: Beyond ‘First Amendment fundamentalism’ in news regulatory policies." Pacific Journalism Review 18, no. 2 (October 31, 2012): 51. http://dx.doi.org/10.24135/pjr.v18i2.264.

Full text
Abstract:
Australian discussion of the Leveson Inquiry has started and finished at asking whether ‘we’ suffer from precisely the same ethical malaise that led to phone-hacking in the United Kingdom. Yet as Leveson has unfolded it has become clear that its report will have international significance as a watershed moment in content regulation in a multi-platform future. A 30-year-old neoliberal orthodoxy has promulgated the view that digital convergence would mean the expansion of newspaper models of self-regulation to all future platforms. Broadcast models of structural and content regulation would disappear along with spectrum scarcity and other ‘old media’ trappings. All that is now at serious risk. Instead, for the UK at least, the public service obligations placed on commercial broadcasters now appear a more evident success story in maintaining journalistic integrity. Convergence might mean instead that public service obligations should be applied to newspaper publishers. However, making sense of all this from Australia is rendered difficult by the failure of our regulatory regimes to set such standards for commercial broadcast journalism at even levels achieved in the US at its broadcast regulatory high watermark. This article thus weighs up recommendations of the Finklestein and Boreham reviews in this context.
APA, Harvard, Vancouver, ISO, and other styles
42

Gottlieb, Samantha D., and Jonathan Cluck. "“Going Rogue”." Digital Culture & Society 4, no. 2 (December 1, 2018): 137–56. http://dx.doi.org/10.14361/dcs-2018-0208.

Full text
Abstract:
Abstract This paper explores our collaborative STS and anthropological project with type 1 diabetes (T1D) hardware “hacking” communities, whose work focuses on reverse-engineering and extracting data from medical devices such as insulin pumps and continuous glucose monitoring systems (CGMS) to create do-it-yourself artificial pancreas systems (APS). Rather than using these devices within their prescriptive and prescribed purposes (surveillance and treatment monitoring), these “hackers” repurpose, reinterpret, and redirect of the possibilities of medical surveillance data in order to reshape their own treatment. Through “deliberate non-compliance” (Scibilia 2017) with cliniciandeveloped treatment guidelines, T1D device hackers deliberatively engage with clinicians’ conceptions and formulations of what constitutes “good treatment” and empower themselves in discussions about the effectiveness of treatment guidelines. Their non-compliance is, however, neither negligence, as implied by the medical category of patients who fail to comply with clinical orders, nor ignorance, but a productive and creative response to their embodied expertise, living with a chronic and potentially deadly condition. Our interlocutors’ explicit connections with the free and open source software principles suggests the formation of a “recursive public” (Kelty 2008) in diabetes research and care practices, from a patient-centered “medical model” to a diverse and divergent patient-led model. The philosophical and ethical underpinnings of the open source and collaborative strategies these patients draw upon radically reshape the principles that drive the commercial health industry and government regulatory structures.
APA, Harvard, Vancouver, ISO, and other styles
43

State, Radu. "Review of "Gray Hat Hacking: The Ethical Hacker’s Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester", McGraw-Hill Osborne Media, 2004, $49.99 ISBN: 0072257091." Queue 3, no. 6 (July 2005): 60. http://dx.doi.org/10.1145/1080862.1080879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Li, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.

Full text
Abstract:
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity professionals nationwide throughout the next decade. To fill this job shortage we need a workforce with strong hands-on experience in the latest technologies and software tools to catch up with the rapid evolution of network technologies. It is vital that the IT professionals possess up-to-date technical skills and think and act one step ahead of the cyber criminals who are constantly probing and exploring system vulnerabilities. There is no perfect security mechanism that can defeat all the cyber-attacks; the traditional defensive security mechanism will eventually fail to the pervasive zero-day attacks. However, there are steps to follow to reduce an organization’s vulnerability to cyber-attacks and to mitigate damages. Active security tests of the network from a cyber-criminal’s perspective can identify system vulnerabilities that may lead to future breaches. “If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. But if you know the enemy and know yourself, you need not fear the result of hundred battles” (Sun, 2013). Penetration testing is a discipline within cybersecurity that focuses on identifying and exploiting the vulnerabilities of a network, eventually obtaining access to the critical business information. The pentesters, the security professionals who perform penetration testing, or ethical hackers, break the triad of information security - Confidentiality, Integrity, and Accountability (CIA) - as if they were a cyber-criminal. The purpose of ethical hacking or penetration testing is to know what the “enemy” can do and then generate a report for the management team to aid in strengthening the system, never to cause any real damages. This paper introduces the development of a penetration testing curriculum as a core class in an undergraduate cybersecurity track in Information Technology. The teaching modules are developed based on the professional penetration testing life cycle. The concepts taught in the class are enforced by hands-on lab exercises. This paper also shares the resources that are available to institutions looking for teaching materials and grant opportunities to support efforts when creating a similar curriculum in cybersecurity.
APA, Harvard, Vancouver, ISO, and other styles
45

Garry, Tony, and Tracy Harwood. "Cyborgs as frontline service employees: a research agenda." Journal of Service Theory and Practice 29, no. 4 (December 2, 2019): 415–37. http://dx.doi.org/10.1108/jstp-11-2018-0241.

Full text
Abstract:
Purpose The purpose of this paper is to identify and explore potential applications of cyborgian technologies within service contexts and how service providers may leverage the integration of cyborgian service actors into their service proposition. In doing so, the paper proposes a new category of “melded” frontline employees (FLEs), where advanced technologies become embodied within human actors. The paper presents potential opportunities and challenges that may arise through cyborg technological advancements and proposes a future research agenda related to these. Design/methodology/approach This study draws on literature in the fields of services management, artificial intelligence, robotics, intelligence augmentation (IA) and human intelligence to conceptualise potential cyborgian applications. Findings The paper examines how cyborg bio- and psychophysical characteristics may significantly differentiate the nature of service interactions from traditional “unenhanced” service interactions. In doing so, the authors propose “melding” as a conceptual category of technological impact on FLEs. This category reflects the embodiment of emergent technologies not previously captured within existing literature on cyborgs. The authors examine how traditional roles of FLEs will be potentially impacted by the integration of emergent cyborg technologies, such as neural interfaces and implants, into service contexts before outlining future research directions related to these, specifically highlighting the range of ethical considerations. Originality/value Service interactions with cyborg FLEs represent a new context for examining the potential impact of cyborgs. This paper explores how technological advancements will alter the individual capacities of humans to enable such employees to intuitively and empathetically create solutions to complex service challenges. In doing so, the authors augment the extant literature on cyborgs, such as the body hacking movement. The paper also outlines a research agenda to address the potential consequences of cyborgian integration.
APA, Harvard, Vancouver, ISO, and other styles
46

Hunsinger, Jeremy. "Hacking Together Globally." Digital Culture & Society 3, no. 1 (July 26, 2017): 95–108. http://dx.doi.org/10.14361/dcs-2017-0106.

Full text
Abstract:
Abstract This paper examines events that occur synchronously around the globe at hackerspaces: during Global Synchronous Hackathons, participants use video streams to share experiences, work and interact in real time. This paper analyses synchronous hackathons through video repositories of these events. It aims at discerning what norms are enacted in presented hacking experiences and how those norms are communicated across the video streams. Hacking in these cases should be thought of as the creative activity of using technology to build something that solves a problem or challenge. Hackerspaces are social workshops and communities renting a physical space and usually interacting in digital spaces. In these environments, individuals are involved in hacking as combined social as well as solitary activities which, to some extent, embody certain norms. Individuals also create the “technological drama”; that is they create the discourse around the objects that inform their use and embed them in cultures. These cultures and their discourses possess norms which flow through them and exist around the objects. Members of hackerspaces commonly participate in the aforementioned “Synchronous Hackathons.” By comparing videos of these hackathons, I stress the relevance of norms which are not usually listed in reflections on hacker ethics such as those of Steven Levy or Pekka Himmanen: the awareness of the global other or the awareness of what might be termed “the cosmopolitical.” These norms seek to care for and attend to the people who exist at a distance. This transformation of local to global “hacker ethics” demonstrates the growth of the recognition, at least internally, that hackerspaces embody more than their local concerns: they are part of global movements with global interests and globalising norms. The video analysis is used to demonstrate the globalising norms of these communities as the norms surrounding cosmopolitics become more prevalent in their discourses.
APA, Harvard, Vancouver, ISO, and other styles
47

Teixeira, Pedro M. "p-Hacking – A call for ethics." Pulmonology 24, no. 3 (May 2018): 207–8. http://dx.doi.org/10.1016/j.pulmoe.2018.03.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Jordan, Tim. "A genealogy of hacking." Convergence: The International Journal of Research into New Media Technologies 23, no. 5 (April 6, 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.

Full text
Abstract:
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This article proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame, a history of hacking will be proposed in four phases. The first phase is the ‘prehistory’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion, it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information technocultures enacted by each hacker practice situating itself within a particular technoculture and then using that technoculture to change itself, both in changing potential actions that can be taken and changing the nature of the technoculture itself.
APA, Harvard, Vancouver, ISO, and other styles
49

Onifade, Abdurrahman Bello, Kazeem Abiodun Akinwande, and Habib Shehu. "Information Ethics: Islamic Perspectives on Privacy and Hacking." Journal of Knowledge & Communication Management 9, no. 1 (2019): 29. http://dx.doi.org/10.5958/2277-7946.2019.00004.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Ten Eyck, Toby A. "Coding Freedom: The Ethics and Aesthetics of Hacking." Contemporary Sociology: A Journal of Reviews 43, no. 4 (June 27, 2014): 518–19. http://dx.doi.org/10.1177/0094306114539455m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography