Ethical and Unethical Hacking

Fiche du document

Périmètre
Langue
Identifiant
Relations

Ce document est lié à :
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-030-29053-5_9

Ce document est lié à :
info:eu-repo/semantics/altIdentifier/isbn/9783030290528

Ce document est lié à :
info:eu-repo/semantics/altIdentifier/isbn/9783030290535

Ce document est lié à :
info:eu-repo/semantics/altIdentifier/pissn/1875-0044

Ce document est lié à :
info:eu-repo/semantics/altIdentifier/pissn/1875-0036

Ce document est lié à :
info:eu-repo/grantAgreement/EC/H2020/CANVAS///

Ce document est lié à :
info:eu-repo/semantics/altIdentifier/urn/urn:nbn:ch:serval-BIB_CB652A6CE0EC3

Licences

info:eu-repo/semantics/openAccess , CC BY 4.0 , https://creativecommons.org/licenses/by/4.0/



Sujets proches En

Computer hackers

Citer ce document

David-Olivier Jaquet-Chiffelle et al., « Ethical and Unethical Hacking », Serveur académique Lausannois, ID : 10.1007/978-3-030-29053-5_9


Métriques


Partage / Export

Résumé 0

The goal of this chapter is to provide a conceptual analysis of ethical, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normativelyadequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones.

document thumbnail

Par les mêmes auteurs

Sur les mêmes sujets

Exporter en