- ACM. ACM Code of Ethics. 1992; https://www.acm.org/about-acm/code-of-ethics. Accessed 2017 January 9.Google Scholar
- ACM/IEEE Joint Task Force. Software Engineering Code of Ethics and Professional Practice. 1999; http://www.acm.org/about/se-code. Accessed 2017 January 9.Google Scholar
- Computer Ethics Institute. Ten Commandments of Computer Ethics. 1992; http://computerethicsinstitute.org/publications/tencommandments.html. Accessed 2017 January 9.Google Scholar
- ISSA. ISSA Code of Ethics. 2006; http://www.issa.org/?page=CodeofEthicsGoogle Scholar
- Knowles, A. The Hacker Rainbow; https://securityintelligence.com/how-black-hats-and-white-hats-collaborate-to-be-successful/. Accessed 2017 January 9.Google Scholar
- Tull, J. A Snapshot in Cybersecurity Ethics; http://informationassurance.regis.edu/ia-programs/resources/blog/cyber-security-ethics. Accessed 2017 January 9.Google Scholar
Index Terms
- TAKING THE HIGH ROAD
White hat, black hat: the ethics of cybersecurity
Recommendations
Black Hat Trolling, White Hat Trolling, and Hacking the Attention Landscape
WWW '19: Companion Proceedings of The 2019 World Wide Web ConferenceIn this paper, we analogize the practice of trolling to the practice of hacking. Just as hacking often involves the discovery and exploitation of vulnerabilities in a computer security landscape, trolling frequently involves the discovery and ...
The End of Black and White
It's no longer just black hats or white hats in computer security. The more someone has to lose, the less likely they should be to trust the computer. It means that all people, all programs, all transactions are shades of grey. Black and white are just ...
Comments