1,277
views
0
recommends
+1 Recommend
1 collections
    4
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Ethical Hazards and Safeguards in Penetration Testing

      Published
      proceedings-article
        1 , 2 , 3
      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)
      Fusion
      11 - 15 July 2016
      Penetration testing, ethics, Grounded Theory, personas, goal model, CAIRIS, GRL
      Bookmark

            Abstract

            Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their processes and technology, we need to understand the factors that affect decisions they make with ethical import. This paper presents four ethical hazards faced by penetration testers, and three safeguards that address them. We also present preliminary results validating the hazards and safeguards.

            REFERENCES

            1. 2008 Basics of qualitative research: techniques and procedures for developing grounded theory 3rd ed. Sage Publications, Inc

            2. 2016 May CAIRIS web site. http://cairis.org

            3. 2011 Persona cases: a technique for grounding personas. In Proceedings of the 29th international conference on Human factors in computing systems, CHI ’11 2267 2270 ACM

            4. 2014 Eliciting and Visualising Trust Expectations using Persona Trust Characteristics and Goal Models. In Proceedings of the 6th International Workshop on Social Software Engineering, SSE 2014 17 24 ACM

            5. 2015 Ben and Matt: Penetration Tester Personas. http://cairis.org/ben_matt

            6. 2015 Ethical Dilemmas and Dimensions in Penetration Testing. In Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance 233 242 University of Plymouth

            7. 2007 Performing a project premortem. Harvard Business Review 85 9 18 19

            8. 2004 April Designing information systems in social context: A goal and scenario modelling approach. Information Systems 29 2 187 203

            9. 2015 Necessity for ethics in social engineering research. Computers & Security 55 114 127

            10. 2009 Modeling and Analysis of URN Goals and Scenarios with jUCMNav. In Proceedings of the 2009 17th IEEE International Requirements Engineering Conference, RE, RE ’09 Washington, DC, USA 383 384 IEEE Computer Society

            11. 2011 Ethical Hazards: A Motive Means, and Opportunity Approach for Curbing Corporate Unethical Behavior Journal of Business Ethics 107 3 265 279

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]Bournemouth University

            Poole, UK
            [0002]University of Portsmouth

            Portsmouth, UK
            [0003]MWR InfoSecurity

            Basingstoke, UK
            Article
            10.14236/ewic/HCI2016.83
            5da19af2-054e-4699-bdf4-f9e939fc203a
            © Faily et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2016.83
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Penetration testing,Grounded Theory,CAIRIS,personas,goal model,GRL,ethics

            Comments

            Comment on this article