2016
DOI: 10.4018/ijt.2016010105
|View full text |Cite
|
Sign up to set email alerts
|

Technoethical Inquiry into Ethical Hacking at a Canadian University

Abstract: Business and academic organizations are in a constant pursuit of efficient and ethical technologies and practices to safeguard their information assets from the growing threat of hackers. Ethical hacking is one important information security risk management strategy they use. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This paper addressed a scarcity within the organizational communication literature on ethical hacking. Taking a qualitative e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The experimental setup is done by taking the dataset from payloads collected from virus share, Github, and Canadian Institute for Cyber security [23]. We collected 1403 samples and used 1100 for training and 303 samples for validation implemented machine algorithm applications using Google Colab as shown in Tab.…”
Section: Dataset Informationmentioning
confidence: 99%
“…The experimental setup is done by taking the dataset from payloads collected from virus share, Github, and Canadian Institute for Cyber security [23]. We collected 1403 samples and used 1100 for training and 303 samples for validation implemented machine algorithm applications using Google Colab as shown in Tab.…”
Section: Dataset Informationmentioning
confidence: 99%
“…What level of security does their system have, and can that security be easily breached? They are also known as ethical hackers [4].…”
Section: Introductionmentioning
confidence: 99%