328
views
0
recommends
+1 Recommend
1 collections
    4
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Ethical Hazards and Safeguards in Penetration Testing

      proceedings-article

        1 , 2 , 3

      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)

      Fusion

      11 - 15 July 2016

      Penetration testing, ethics, Grounded Theory, personas, goal model, CAIRIS, GRL

      Bookmark

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-3
            Affiliations
            [0001]Bournemouth University

            Poole, UK
            [0002]University of Portsmouth

            Portsmouth, UK
            [0003]MWR InfoSecurity

            Basingstoke, UK
            Article
            10.14236/ewic/HCI2016.83
            5da19af2-054e-4699-bdf4-f9e939fc203a
            © Faily et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            REFERENCES

            1. 2008 Basics of qualitative research: techniques and procedures for developing grounded theory 3rd ed. Sage Publications, Inc

            2. 2016 May CAIRIS web site. http://cairis.org

            3. 2011 Persona cases: a technique for grounding personas. In Proceedings of the 29th international conference on Human factors in computing systems, CHI ’11 2267 2270 ACM

            4. 2014 Eliciting and Visualising Trust Expectations using Persona Trust Characteristics and Goal Models. In Proceedings of the 6th International Workshop on Social Software Engineering, SSE 2014 17 24 ACM

            5. 2015 Ben and Matt: Penetration Tester Personas. http://cairis.org/ben_matt

            6. 2015 Ethical Dilemmas and Dimensions in Penetration Testing. In Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance 233 242 University of Plymouth

            7. 2007 Performing a project premortem. Harvard Business Review 85 9 18 19

            8. 2004 April Designing information systems in social context: A goal and scenario modelling approach. Information Systems 29 2 187 203

            9. 2015 Necessity for ethics in social engineering research. Computers & Security 55 114 127

            10. 2009 Modeling and Analysis of URN Goals and Scenarios with jUCMNav. In Proceedings of the 2009 17th IEEE International Requirements Engineering Conference, RE, RE ’09 Washington, DC, USA 383 384 IEEE Computer Society

            11. 2011 Ethical Hazards: A Motive Means, and Opportunity Approach for Curbing Corporate Unethical Behavior Journal of Business Ethics 107 3 265 279

            Comments

            Comment on this article