Abu-Shaqra, Baha; Luppicini, Rocci - In: International Journal of Technoethics (IJT) 7 (2016) 1, pp. 62-76
safeguard their information assets from the growing threat of hackers. Ethical hacking is one important information security … risk management strategy they use. Most published books on ethical hacking have focused on its technical applications in … hacking. Taking a qualitative exploratory case study approach, the authors explored ethical hacking implementation within a …