Blog
About

152
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Ethical Hazards and Safeguards in Penetration Testing

        1 , 2 , 3

      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)

      Fusion

      11 - 15 July 2016

      Penetration testing, ethics, Grounded Theory, personas, goal model, CAIRIS, GRL

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Penetration testing entails attacking a system to identify and report insecurity, but doing so without harming the system nor encroaching on the dignity of those affected by it. To improve the interaction between penetration testers and their processes and technology, we need to understand the factors that affect decisions they make with ethical import. This paper presents four ethical hazards faced by penetration testers, and three safeguards that address them. We also present preliminary results validating the hazards and safeguards.

          Related collections

          Most cited references 10

          • Record: found
          • Abstract: not found
          • Article: not found

          Designing information systems in social context: a goal and scenario modelling approach

           Lin Liu,  Eric A. Yu,  L Liu (2004)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Performing a project premortem.

             G. Klein,  G KLEIN (2007)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Modeling and Analysis of URN Goals and Scenarios with jUCMNav.

                Bookmark

                Author and article information

                Contributors
                Conference
                July 2016
                July 2016
                : 1-3
                Affiliations
                Bournemouth University

                Poole, UK
                University of Portsmouth

                Portsmouth, UK
                MWR InfoSecurity

                Basingstoke, UK
                Article
                10.14236/ewic/HCI2016.83
                © Faily et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                Proceedings of the 30th International BCS Human Computer Interaction Conference
                HCI
                30
                Bournemouth University, Poole, UK
                11 - 15 July 2016
                Electronic Workshops in Computing (eWiC)
                Fusion
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article