Ethical and Unethical Hacking

21Citations
Citations of this article
73Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The goal of this chapter is to provide a conceptual analysis of ethical hacking, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normatively adequate nomenclature. ‘Ethical hackers’ are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the ‘all things considered’ sense, while society may agree more easily on the determination of who is one in the ‘business-friendly’ limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers’ individual ethics in morally debatable, grey zones.

Cite

CITATION STYLE

APA

Jaquet-Chiffelle, D. O., & Loi, M. (2020). Ethical and Unethical Hacking. In International Library of Ethics, Law and Technology (Vol. 21, pp. 179–204). Springer Science and Business Media B.V. https://doi.org/10.1007/978-3-030-29053-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free