Reference Hub5
Technoethical Inquiry into Ethical Hacking at a Canadian University

Technoethical Inquiry into Ethical Hacking at a Canadian University

Baha Abu-Shaqra, Rocci Luppicini
Copyright: © 2016 |Volume: 7 |Issue: 1 |Pages: 15
ISSN: 1947-3451|EISSN: 1947-346X|EISBN13: 9781466691841|DOI: 10.4018/IJT.2016010105
Cite Article Cite Article

MLA

Abu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University." IJT vol.7, no.1 2016: pp.62-76. http://doi.org/10.4018/IJT.2016010105

APA

Abu-Shaqra, B. & Luppicini, R. (2016). Technoethical Inquiry into Ethical Hacking at a Canadian University. International Journal of Technoethics (IJT), 7(1), 62-76. http://doi.org/10.4018/IJT.2016010105

Chicago

Abu-Shaqra, Baha, and Rocci Luppicini. "Technoethical Inquiry into Ethical Hacking at a Canadian University," International Journal of Technoethics (IJT) 7, no.1: 62-76. http://doi.org/10.4018/IJT.2016010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Business and academic organizations are in a constant pursuit of efficient and ethical technologies and practices to safeguard their information assets from the growing threat of hackers. Ethical hacking is one important information security risk management strategy they use. Most published books on ethical hacking have focused on its technical applications in risk assessment practices. This paper addressed a scarcity within the organizational communication literature on ethical hacking. Taking a qualitative exploratory case study approach, the authors explored ethical hacking implementation within a Canadian university as the case study in focus, applying technoethical inquiry theory paired with Karl Weick's sensemaking model as a theoretical framework. In-depth interviews with key stakeholder groups and a document review were conducted. Findings pointed to the need to expand the communicative and sociocultural considerations involved in decision making about ethical hacking organizational practices, and to security awareness training to leverage sensemaking opportunities and reduce equivocality.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.