skip to main content
column

TAKING THE HIGH ROAD

White hat, black hat: the ethics of cybersecurity

Published:17 February 2017Publication History
First page image

References

  1. ACM. ACM Code of Ethics. 1992; https://www.acm.org/about-acm/code-of-ethics. Accessed 2017 January 9.Google ScholarGoogle Scholar
  2. ACM/IEEE Joint Task Force. Software Engineering Code of Ethics and Professional Practice. 1999; http://www.acm.org/about/se-code. Accessed 2017 January 9.Google ScholarGoogle Scholar
  3. Computer Ethics Institute. Ten Commandments of Computer Ethics. 1992; http://computerethicsinstitute.org/publications/tencommandments.html. Accessed 2017 January 9.Google ScholarGoogle Scholar
  4. ISSA. ISSA Code of Ethics. 2006; http://www.issa.org/?page=CodeofEthicsGoogle ScholarGoogle Scholar
  5. Knowles, A. The Hacker Rainbow; https://securityintelligence.com/how-black-hats-and-white-hats-collaborate-to-be-successful/. Accessed 2017 January 9.Google ScholarGoogle Scholar
  6. Tull, J. A Snapshot in Cybersecurity Ethics; http://informationassurance.regis.edu/ia-programs/resources/blog/cyber-security-ethics. Accessed 2017 January 9.Google ScholarGoogle Scholar

Index Terms

  1. TAKING THE HIGH ROAD

    White hat, black hat: the ethics of cybersecurity
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Inroads
          ACM Inroads  Volume 8, Issue 1
          March 2017
          48 pages
          ISSN:2153-2184
          EISSN:2153-2192
          DOI:10.1145/3054937
          Issue’s Table of Contents

          Copyright © 2017 Copyright is held by the owner/author(s)

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 February 2017

          Check for updates

          Qualifiers

          • column
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format