{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:27:49Z","timestamp":1730276869570,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/istas.2002.1013840","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T21:52:33Z","timestamp":1056577953000},"page":"374-379","source":"Crossref","is-referenced-by-count":4,"title":["Ethical hacking: the security justification redux"],"prefix":"10.1109","author":[{"given":"B.","family":"Smith","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"W.","family":"Yurcik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Doss","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/0164-1212(92)90079-Y"},{"key":"ref11","article-title":"DRAFT Guideline on Network Security Testing: Recommendations of the National Institute of Standards and Technology","author":"wack","year":"2001","journal-title":"NIST Special Publication"},{"key":"ref12","article-title":"It Takes a Hacker","author":"wingfield","year":"2002","journal-title":"Wall Street Journal"},{"key":"ref13","first-page":"112","article-title":"Red Teaming of Advanced Information Assurance Concepts","volume":"ii","author":"wood","year":"2000","journal-title":"Proc DARPA Information Survivability Conf Exposition (DISCEX)"},{"key":"ref14","article-title":"Palse Impressions: Contrasting Perceptions of Security as a Major Impediment to Achieving Survivable Systems","author":"yurcik","year":"2002","journal-title":"IEEE\/CERT\/SEI 4th Information Survivability Workshop (ISW-2002)"},{"key":"ref4","article-title":"Hacking","author":"lee","year":"1991","journal-title":"MacMillan Encyclopedia of Computers"},{"key":"ref3","first-page":"6","article-title":"Information Assurance Red Teaming","volume":"2","author":"guissanie","year":"1999","journal-title":"IAnewsletter"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1147\/sj.403.0769"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/1499949.1500018"},{"key":"ref8","first-page":"43","article-title":"The State of Software: Quality","author":"ricadela","year":"2001","journal-title":"InformationWeek"},{"key":"ref7","first-page":"21","article-title":"The Network Police Blotter","author":"ranum","year":"2000","journal-title":"USENIX login"},{"key":"ref2","article-title":"Port Scanning","author":"bishop","year":"2000","journal-title":"Information Security Awareness Forum"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/0167-4048(87)90028-9"},{"key":"ref9","article-title":"Ethical Hacking: The Security Justification","author":"smith","year":"2001","journal-title":"Proceedings of the Ethics of Electronic Information in the 21st Century Symposium (EE121)"}],"event":{"acronym":"ISTAS-02","name":"2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology","location":"Raleigh, NC, USA"},"container-title":["IEEE 2002 International Symposium on Technology and Society (ISTAS'02). Social Implications of Information and Communication Technology. Proceedings (Cat. No.02CH37293)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7915\/21825\/01013840.pdf?arnumber=1013840","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T16:31:54Z","timestamp":1489163514000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1013840\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/istas.2002.1013840","relation":{},"subject":[]}}