Javascript must be enabled to continue!
Technoethical Inquiry into Ethical Hacking at a Canadian University
View through CrossRef
Business and academic organizations are in a constant pursuit of efficient and ethical technologies and practices to safeguard their information assets from the growing threat of hackers. Ethical hacking is one important information security risk management strategy they use. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This paper addressed a scarcity within the organizational communication literature on ethical hacking. Taking a qualitative exploratory case study approach, the authors explored ethical hacking implementation within a Canadian university as the case study in focus, applying technoethical inquiry theory paired with Karl Weick's sensemaking model as a theoretical framework. In-depth interviews with key stakeholder groups and a document review were conducted. Findings pointed to the need to expand the communicative and sociocultural considerations involved in decision making about ethical hacking organizational practices, and to security awareness training to leverage sensemaking opportunities and reduce equivocality.
Title: Technoethical Inquiry into Ethical Hacking at a Canadian University
Description:
Business and academic organizations are in a constant pursuit of efficient and ethical technologies and practices to safeguard their information assets from the growing threat of hackers.
Ethical hacking is one important information security risk management strategy they use.
Most published books on ethical hacking have focused on its technical applications in risk assessment practices.
This paper addressed a scarcity within the organizational communication literature on ethical hacking.
Taking a qualitative exploratory case study approach, the authors explored ethical hacking implementation within a Canadian university as the case study in focus, applying technoethical inquiry theory paired with Karl Weick's sensemaking model as a theoretical framework.
In-depth interviews with key stakeholder groups and a document review were conducted.
Findings pointed to the need to expand the communicative and sociocultural considerations involved in decision making about ethical hacking organizational practices, and to security awareness training to leverage sensemaking opportunities and reduce equivocality.
Related Results
A Technoethical Study of Ethical Hacking Communication and Management Within a Canadian University
A Technoethical Study of Ethical Hacking Communication and Management Within a Canadian University
Ethical hacking is an important information security risk management strategy within higher education applied against the growing threat of hacking attacks. Confusion regarding the...
Life hacking
Life hacking
<p>This dissertation intervenes in the larger academic and popular discussion of hacking by looking at life hacking. In essence, life hacking presumes that your life is amena...
The Economics of Hacking
The Economics of Hacking
Hacking is becoming more common and dangerous. The challenge of dealing with hacking often comes from the fact that much of our wisdom about conventional crime cannot be directly a...
A Network Defense System for Detecting and Preventing Hacking
A Network Defense System for Detecting and Preventing Hacking
Many computing systems have recently suffered significantly from hacking and preventing hacking is important in protecting business, sensitive information and every day network com...
Materialism and Environmental Knowledge as a Mediator for Relationships between Religiosity and Ethical Consumption
Materialism and Environmental Knowledge as a Mediator for Relationships between Religiosity and Ethical Consumption
ABSTRACTOn a global and regional scale, Indonesia has one of the least environmentally sustainable economies in the Asia-Pacific region. Consumption is one of the key factors contr...
A REVIEW PAPER ON ETHICAL HACKING
A REVIEW PAPER ON ETHICAL HACKING
Ethical Hacking is a proactive approach to cybersecurity that involves authorizing and systematically testing information systems to find vulnerabilities before they can be exploit...
Implementasi Norma Hukum Terhadap Tindak Pidana Peretasan (Hacking) di Indonesia
Implementasi Norma Hukum Terhadap Tindak Pidana Peretasan (Hacking) di Indonesia
AbstractCybercrime is a crime related to technology or cyberspace against public or private interests. Act Number 11 of 2009 concerning Information and Electronic Transactions as a...
Hacking, Ian (1936–2023)
Hacking, Ian (1936–2023)
Ian Hacking (born in 1936, Vancouver, British Columbia) is most well-known for his work in the philosophy of the natural and social sciences, but his contributions to philosophy ar...

