Journal articles on the topic 'Ethical Hacking'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ethical Hacking.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Farsole, Ajinkya A., Amruta G. Kashikar, and Apurva Zunzunwala. "Ethical Hacking." International Journal of Computer Applications 1, no. 10 (February 25, 2010): 14–20. http://dx.doi.org/10.5120/229-380.
Full textPalmer, C. C. "Ethical hacking." IBM Systems Journal 40, no. 3 (2001): 769–80. http://dx.doi.org/10.1147/sj.403.0769.
Full textUtomo, Galih Aryo. "ETHICAL HACKING." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 8–15. http://dx.doi.org/10.14421/csecurity.2019.2.1.1418.
Full textCooper, Martin. "Adventures in Ethical Hacking." ITNOW 58, no. 3 (September 2016): 36–37. http://dx.doi.org/10.1093/itnow/bww074.
Full textLee, Wanbil W. "Ethical Computing for Data Protection." International Journal of Technoethics 11, no. 1 (January 2020): 43–58. http://dx.doi.org/10.4018/ijt.2020010104.
Full textBellaby, Ross W. "An Ethical Framework for Hacking Operations." Ethical Theory and Moral Practice 24, no. 1 (February 12, 2021): 231–55. http://dx.doi.org/10.1007/s10677-021-10166-8.
Full textAbu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University." International Journal of Technoethics 7, no. 1 (January 2016): 62–76. http://dx.doi.org/10.4018/ijt.2016010105.
Full textReddy, P. Harika. "Cyber Security and Ethical Hacking." International Journal for Research in Applied Science and Engineering Technology 6, no. 6 (June 30, 2018): 1770–74. http://dx.doi.org/10.22214/ijraset.2018.6261.
Full textYadav, Sarita, Anuj Mahajan, Monika Prasad, and Avinash Kumar. "ADVANCED KEYLOGGER FOR ETHICAL HACKING." International Journal of Engineering Applied Sciences and Technology 5, no. 1 (May 31, 2020): 634–38. http://dx.doi.org/10.33564/ijeast.2020.v05i01.112.
Full textGenosko, Gary. "Review of Maurushat’s Ethical Hacking." Surveillance & Society 17, no. 3/4 (September 7, 2019): 574–76. http://dx.doi.org/10.24908/ss.v17i3/4.13495.
Full textTyagi, Virat. "Ethical Hacking and Advance Python." International Journal for Research in Applied Science and Engineering Technology 9, no. 5 (May 31, 2021): 234–39. http://dx.doi.org/10.22214/ijraset.2021.34073.
Full textMousa, Shaymaa, and Wejdan Barashi. "Ethical Hacking in the Saudi Government Institutions." International Journal for Innovation Education and Research 3, no. 10 (October 31, 2015): 74–86. http://dx.doi.org/10.31686/ijier.vol3.iss10.448.
Full textVignesh, R., and K. Rohini. "Analysis to Determine the Scope and Challenging Responsibilities of Ethical Hacking Employed in Cyber Security." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 196. http://dx.doi.org/10.14419/ijet.v7i3.27.17759.
Full textTrabelsi, Zouheir, and Margaret McCoey. "Ethical Hacking in Information Security Curricula." International Journal of Information and Communication Technology Education 12, no. 1 (January 2016): 1–10. http://dx.doi.org/10.4018/ijicte.2016010101.
Full textБаджаж, Эмей. "CYBER WARFARE - A POTENTIAL GLOBAL THREAT." Rule-of-law state: theory and practice 16, no. 4-1 (April 1, 2020): 178–84. http://dx.doi.org/10.33184/pravgos-2020.4.17.
Full textGeorg, Thomas, Burmeister Oliver, and Low Gregory. "Issues of Implied Trust in Ethical Hacking." ORBIT Journal 2, no. 1 (2018): 1–19. http://dx.doi.org/10.29297/orbit.v2i1.77.
Full textNEERAJ, RATHORE. "ETHICAL HACKING AND SECURITY AGAINST CYBER CRIME." i-manager's Journal on Information Technology 5, no. 1 (2016): 7. http://dx.doi.org/10.26634/jit.5.1.4796.
Full textBodhani, A. "Bad... in a good way [ethical hacking]." Engineering & Technology 7, no. 12 (December 1, 2012): 64–68. http://dx.doi.org/10.1049/et.2012.1217.
Full textKelrey, Ahmad Ridha, and Aan Muzaki. "PENGARUH ETHICAL HACKING BAGI KEAMANAN DATA PERUSAHAAN." Cyber Security dan Forensik Digital 2, no. 2 (November 28, 2019): 77–81. http://dx.doi.org/10.14421/csecurity.2019.2.2.1625.
Full textSultan, Nagham A., Karam H. Thanoon, and Omar A. Ibrahim. "Ethical Hacking Implementation for Lime Worm Ransomware Detection." Journal of Physics: Conference Series 1530 (May 2020): 012078. http://dx.doi.org/10.1088/1742-6596/1530/1/012078.
Full textBari, Mohammed Abdul, and Shahanawaj Ahamad. "Study of Ethical Hacking and Management of Associated Risks." International Journal of Engineering and Applied Computer Science 01, no. 01 (November 25, 2016): 07–11. http://dx.doi.org/10.24032/ijeacs/0101/02.
Full textRafee, Dr B. Mahammad, and Shuaib Ahmed Shariff. "GOOD AND BAD ABOUT ETHICAL HACKING IN INDIAN PERSPECTIVE." International Journal of Technical Research & Science 05, no. 02 (February 28, 2020): 12–18. http://dx.doi.org/10.30780/ijtrs.v05.i02.002.
Full textPapp, Dorottya, Kristóf Tamás, and Levente Buttyán. "IoT Hacking – A Primer." Infocommunications journal, no. 2 (2019): 2–13. http://dx.doi.org/10.36244/icj.2019.2.1.
Full textbell, adam patrick, David Bonin, Helen Pethrick, Amanda Antwi-Nsiah, and Brent Matterson. "Hacking, disability, and music education." International Journal of Music Education 38, no. 4 (July 4, 2020): 657–72. http://dx.doi.org/10.1177/0255761420930428.
Full textGarg, Vanshika, and Riya Ailawadi. "PROPOSED ETHICAL HACKING FRAMEWORK FOR SECURE DELIVERY OF ONLINE EDUCATION." International Journal of Technical Research & Science Special, Issue3 (September 15, 2020): 42–48. http://dx.doi.org/10.30780/specialissue-icaccg2020/031.
Full textNicholson, Scott. "How ethical hacking can protect organisations from a greater threat." Computer Fraud & Security 2019, no. 5 (May 2019): 15–19. http://dx.doi.org/10.1016/s1361-3723(19)30054-5.
Full textPradeep, I., and G. Sakthivel. "Ethical hacking and penetration testing for securing us form Hackers." Journal of Physics: Conference Series 1831, no. 1 (March 1, 2021): 012004. http://dx.doi.org/10.1088/1742-6596/1831/1/012004.
Full textWhitman, Michael E., and Humayun Zafar. "URL Manipulation and the Slippery Slope." International Journal of Interdisciplinary Telecommunications and Networking 5, no. 2 (April 2013): 43–50. http://dx.doi.org/10.4018/jitn.2013040104.
Full textLindgren, Simon. "Hacking Social Science for the Age of Datafication." Journal of Digital Social Research 1, no. 1 (August 30, 2019): 1–9. http://dx.doi.org/10.33621/jdsr.v1i1.6.
Full textKhokhlov, A. L., and D. Yu Belousov. "Ethical aspects of the Internet of Bodies." Kachestvennaya Klinicheskaya Praktika = Good Clinical Practice, no. 2 (August 13, 2021): 89–98. http://dx.doi.org/10.37489/2588-0519-2021-2-89-98.
Full textFloridi, Luciano, and Mariarosaria Taddeo. "What is data ethics?" Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, no. 2083 (December 28, 2016): 20160360. http://dx.doi.org/10.1098/rsta.2016.0360.
Full textM. Skriabin, Oleksii, Dmytro B. Sanakoiev, Natalia D. Sanakoieva, Vita V. Berezenko, and Yuliia V. Liubchenko. "Neurotechnologies in the advertising industry: Legal and ethical aspects." Innovative Marketing 17, no. 2 (June 29, 2021): 189–201. http://dx.doi.org/10.21511/im.17(2).2021.17.
Full textSample, Matthew, Sebastian Sattler, Stefanie Blain-Moraes, David Rodríguez-Arias, and Eric Racine. "Do Publics Share Experts’ Concerns about Brain–Computer Interfaces? A Trinational Survey on the Ethics of Neural Technology." Science, Technology, & Human Values 45, no. 6 (October 9, 2019): 1242–70. http://dx.doi.org/10.1177/0162243919879220.
Full textEllis, Gavin. "Journalism’s road codes: The enduring nature of common ethical standards." Pacific Journalism Review 18, no. 2 (October 31, 2012): 118. http://dx.doi.org/10.24135/pjr.v18i2.268.
Full textAlwi, Erick Irawadi, Herdianti Herdianti, and Fitriyani Umar. "Analisis Keamanan Website Menggunakan Teknik Footprinting dan Vulnerability Scanning." INFORMAL: Informatics Journal 5, no. 2 (August 30, 2020): 43. http://dx.doi.org/10.19184/isj.v5i2.18941.
Full textPattison, James. "From defence to offence: The ethics of private cybersecurity." European Journal of International Security 5, no. 2 (May 19, 2020): 233–54. http://dx.doi.org/10.1017/eis.2020.6.
Full textAdda, Jérôme, Christian Decker, and Marco Ottaviani. "P-hacking in clinical trials and how incentives shape the distribution of results across phases." Proceedings of the National Academy of Sciences 117, no. 24 (June 2, 2020): 13386–92. http://dx.doi.org/10.1073/pnas.1919906117.
Full textBanda, Raphael, Jackson Phiri, Mayumbo Nyirenda, and Monica M. Kabemba. "Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools." Zambia ICT Journal 3, no. 1 (March 7, 2019): 40–51. http://dx.doi.org/10.33260/zictjournal.v3i1.74.
Full textKammer, Jenna, Kodjo Atiso, and Edward Mensah Borteye. "Student Experiences with Digital Citizenship: A Comparative Cultural Study." Libri 71, no. 3 (April 30, 2021): 279–91. http://dx.doi.org/10.1515/libri-2020-0174.
Full textMcCrow-Young, Ally, and Mette Mortensen. "Countering spectacles of fear: Anonymous’ meme ‘war’ against ISIS." European Journal of Cultural Studies 24, no. 4 (April 3, 2021): 832–49. http://dx.doi.org/10.1177/13675494211005060.
Full textJones, Paul K. "The moment of Leveson: Beyond ‘First Amendment fundamentalism’ in news regulatory policies." Pacific Journalism Review 18, no. 2 (October 31, 2012): 51. http://dx.doi.org/10.24135/pjr.v18i2.264.
Full textGottlieb, Samantha D., and Jonathan Cluck. "“Going Rogue”." Digital Culture & Society 4, no. 2 (December 1, 2018): 137–56. http://dx.doi.org/10.14361/dcs-2018-0208.
Full textState, Radu. "Review of "Gray Hat Hacking: The Ethical Hacker’s Handbook by Shon Harris, Allen Harper, Chris Eagle, Jonathan Ness, and Michael Lester", McGraw-Hill Osborne Media, 2004, $49.99 ISBN: 0072257091." Queue 3, no. 6 (July 2005): 60. http://dx.doi.org/10.1145/1080862.1080879.
Full textLi, Chengcheng. "Penetration Testing Curriculum Development in Practice." Journal of Information Technology Education: Innovations in Practice 14 (2015): 085–99. http://dx.doi.org/10.28945/2189.
Full textGarry, Tony, and Tracy Harwood. "Cyborgs as frontline service employees: a research agenda." Journal of Service Theory and Practice 29, no. 4 (December 2, 2019): 415–37. http://dx.doi.org/10.1108/jstp-11-2018-0241.
Full textHunsinger, Jeremy. "Hacking Together Globally." Digital Culture & Society 3, no. 1 (July 26, 2017): 95–108. http://dx.doi.org/10.14361/dcs-2017-0106.
Full textTeixeira, Pedro M. "p-Hacking – A call for ethics." Pulmonology 24, no. 3 (May 2018): 207–8. http://dx.doi.org/10.1016/j.pulmoe.2018.03.001.
Full textJordan, Tim. "A genealogy of hacking." Convergence: The International Journal of Research into New Media Technologies 23, no. 5 (April 6, 2016): 528–44. http://dx.doi.org/10.1177/1354856516640710.
Full textOnifade, Abdurrahman Bello, Kazeem Abiodun Akinwande, and Habib Shehu. "Information Ethics: Islamic Perspectives on Privacy and Hacking." Journal of Knowledge & Communication Management 9, no. 1 (2019): 29. http://dx.doi.org/10.5958/2277-7946.2019.00004.4.
Full textTen Eyck, Toby A. "Coding Freedom: The Ethics and Aesthetics of Hacking." Contemporary Sociology: A Journal of Reviews 43, no. 4 (June 27, 2014): 518–19. http://dx.doi.org/10.1177/0094306114539455m.
Full text