{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T10:13:22Z","timestamp":1777371202451,"version":"3.51.4"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030290528","type":"print"},{"value":"9783030290535","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The goal of this chapter is to provide a conceptual analysis of ethical hacking, comprising history, common usage and the attempt to provide a systematic classification that is both compatible with common usage and normatively adequate. Subsequently, the article identifies a tension between common usage and a normatively adequate nomenclature. \u2018Ethical hackers\u2019 are often identified with hackers that abide to a code of ethics privileging business-friendly values. However, there is no guarantee that respecting such values is always compatible with the all-things-considered morally best act. It is recognised, however, that in terms of assessment, it may be quite difficult to determine who is an ethical hacker in the \u2018all things considered\u2019 sense, while society may agree more easily on the determination of who is one in the \u2018business-friendly\u2019 limited sense. The article concludes by suggesting a pragmatic best-practice approach for characterising ethical hacking, which reaches beyond business-friendly values and helps in the taking of decisions that are respectful of the hackers\u2019 individual ethics in morally debatable, grey zones.<\/jats:p>","DOI":"10.1007\/978-3-030-29053-5_9","type":"book-chapter","created":{"date-parts":[[2020,2,10]],"date-time":"2020-02-10T14:04:09Z","timestamp":1581343449000},"page":"179-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Ethical and Unethical Hacking"],"prefix":"10.1007","author":[{"given":"David-Olivier","family":"Jaquet-Chiffelle","sequence":"first","affiliation":[]},{"given":"Michele","family":"Loi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,11]]},"reference":[{"key":"9_CR1","unstructured":"American Heritage Dictionary Entry: Hacker (n.d.) https:\/\/www.ahdictionary.com\/word\/search.html?q=hacker. Last access 7 July 2019"},{"issue":"2","key":"9_CR2","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/S1361-3723(01)02017-6","volume":"2001","author":"R Barber","year":"2001","unstructured":"Barber R (2001) Hackers profiled\u2014who are they and what are their motivations? Comput Fraud Secur 2001(2):14\u201317","journal-title":"Comput Fraud Secur"},{"issue":"1","key":"9_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1086\/233696","volume":"107","author":"LC Becker","year":"1996","unstructured":"Becker LC (1996) Trust as noncognitive security about motives. Ethics 107(1):43\u201361","journal-title":"Ethics"},{"key":"9_CR4","unstructured":"Berlin I (1991) The crooked timber of humanity: chapters in the history of ideas. In: Hardy H (ed) Knopf: distributed by Random House, New York"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSP.2007.101","volume":"5","author":"S Bratus","year":"2007","unstructured":"Bratus S (2007) What hackers learn that the rest of us don\u2019t: notes on hacker curriculum. IEEE Secur Priv 5(4):72\u201375","journal-title":"IEEE Secur Priv"},{"key":"9_CR9","doi-asserted-by":"crossref","DOI":"10.14375\/NP.9782072559891","volume-title":"Des Valeurs. Une Approche Sociologique","author":"N Heinich","year":"2017","unstructured":"Heinich N (2017) Des Valeurs. Une Approche Sociologique. Editions Gallimard, Paris"},{"key":"9_CR10","unstructured":"Lichstein H (1963) Telephone hackers active. The Tech, MIT. http:\/\/tech.mit.edu\/V83\/PDF\/V83-N24.pdf. Last access 7 July 2019"},{"key":"9_CR11","volume-title":"Digital forensics: digital evidence in criminal investigations","author":"AK Marshall","year":"2008","unstructured":"Marshall AK (2008) Digital forensics: digital evidence in criminal investigations. Wiley-Blackwell, London"},{"key":"9_CR12","unstructured":"Mohurle S, Manisha Patil (2017) A brief study of Wannacry threat: Ransomware At-tack 2017. Int J Adv Res Com Sci Udaipur 8(5). https:\/\/search.proquest.com\/docview\/1912631307\/abstract\/DEF9AE2FF2924E35PQ\/1. Last access 7 July 2019"},{"key":"9_CR13","unstructured":"Mr. Robot (n.d.). http:\/\/www.imdb.com\/title\/tt4158110\/. Last access 7 July 2019"},{"key":"9_CR14","volume-title":"Mortal questions","author":"T Nagel","year":"1991","unstructured":"Nagel T (1991) Mortal questions. Cambridge University Press, Cambridge"},{"key":"9_CR15","volume-title":"We are anonymous: inside the hacker world of LulzSec, anonymous, and the global cyber insurgency","author":"P Olson","year":"2013","unstructured":"Olson P (2013) We are anonymous: inside the hacker world of LulzSec, anonymous, and the global cyber insurgency. Back Bay Books, New York"},{"issue":"3","key":"9_CR16","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1147\/sj.403.0769","volume":"40","author":"CC Palmer","year":"2001","unstructured":"Palmer CC (2001) Ethical hacking. IBM Syst J 40(3):769\u2013780. https:\/\/doi.org\/10.1147\/sj.403.0769","journal-title":"IBM Syst J"},{"issue":"3","key":"9_CR17","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1111\/j.1088-4963.1995.tb00029.x","volume":"24","author":"P Pettit","year":"1995","unstructured":"Pettit P (1995) The cunning of trust. Philos Public Aff 24(3):202\u2013225. https:\/\/doi.org\/10.1111\/j.1088-4963.1995.tb00029.x","journal-title":"Philos Public Aff"},{"key":"9_CR18","doi-asserted-by":"publisher","unstructured":"Pollitt M, Casey E, Jaquet-Chiffelle D-O, Gladyshev P (2018) A framework for harmonizing forensic science practices and digital\/multimedia evidence. OSAC.TS.0002. OSAC Task Group on Digital\/Multimedia Science. OSAC\/NIST. https:\/\/doi.org\/10.29325\/OSAC.TS.0002","DOI":"10.29325\/OSAC.TS.0002"},{"key":"9_CR19","volume-title":"The morality of freedom","author":"J Raz","year":"1986","unstructured":"Raz J (1986) The morality of freedom. Oxford University Press, Oxford"},{"key":"9_CR20","volume-title":"What we owe to each other","author":"T Scanlon","year":"1998","unstructured":"Scanlon T (1998) What we owe to each other. Belknap Press of Harvard University Press, Cambridge, MA"},{"key":"9_CR22","unstructured":"Techopedia.Com (n.d.) What is a black hat hacker?\u00a0\u2013 definition from Techopedia. https:\/\/www.techopedia.com\/definition\/26342\/black-hat-hacker. Last access 7 July 2019"},{"key":"9_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165860","volume-title":"Moral luck: philosophical papers 1973\u20131980","author":"B Williams","year":"1981","unstructured":"Williams B (1981) Moral luck: philosophical papers 1973\u20131980, 1st edn. Cambridge University Press, Cambridge","edition":"1"}],"container-title":["The International Library of Ethics, Law and Technology","The Ethics of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29053-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T11:08:16Z","timestamp":1722424096000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29053-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030290528","9783030290535"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29053-5_9","relation":{},"ISSN":["1875-0044","1875-0036"],"issn-type":[{"value":"1875-0044","type":"print"},{"value":"1875-0036","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"11 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}