Ce document est lié à :
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-030-29053-5_9
Ce document est lié à :
info:eu-repo/semantics/altIdentifier/isbn/9783030290528
Ce document est lié à :
info:eu-repo/semantics/altIdentifier/isbn/9783030290535
Ce document est lié à :
info:eu-repo/semantics/altIdentifier/pissn/1875-0044
Ce document est lié à :
info:eu-repo/semantics/altIdentifier/pissn/1875-0036
Ce document est lié à :
info:eu-repo/grantAgreement/EC/H2020/CANVAS///
Ce document est lié à :
info:eu-repo/semantics/altIdentifier/urn/urn:nbn:ch:serval-BIB_CB652A6CE0EC3
info:eu-repo/semantics/openAccess , CC BY 4.0 , https://creativecommons.org/licenses/by/4.0/
David-Olivier Jaquet-Chiffelle et al., « Ethical and Unethical Hacking », Serveur académique Lausannois, ID : 10.1007/978-3-030-29053-5_9
The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones.