{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:06:22Z","timestamp":1749701182454,"version":"3.41.0"},"reference-count":20,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100010661","name":"European Union\u2019s H2020 Research and Innovation Programme","doi-asserted-by":"publisher","award":["101021797"],"award-info":[{"award-number":["101021797"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IT Prof."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/mitp.2025.3532789","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T17:52:59Z","timestamp":1749577979000},"page":"57-61","source":"Crossref","is-referenced-by-count":0,"title":["White Hats in Blue? The Ethical Issues of Employing Hackers in Law Enforcement Agencies"],"prefix":"10.1109","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4380-014X","authenticated-orcid":false,"given":"Aleksandra","family":"Pawlicka","sequence":"first","affiliation":[{"name":"ITTI, Pozna&#x0144;, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5881-6406","authenticated-orcid":false,"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology (PBS), Bydgoszcz, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7122-3306","authenticated-orcid":false,"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[{"name":"Bydgoszcz University of Science and Technology (PBS), Bydgoszcz, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1405-9911","authenticated-orcid":false,"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[{"name":"ITTI, Pozna&#x0144;, Poland"}]}],"member":"263","reference":[{"volume-title":"Ethical hacking: What it is & examples","year":"2024","key":"ref1"},{"key":"ref2","article-title":"UK police scheme will offer teen hackers white hat career opportunities,","author":"Adams","year":"2019","journal-title":"Digit News"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01177-2_83"},{"key":"ref4","article-title":"MoD pays hackers to uncover network vulnerabilities","author":"Allison","year":"2021","journal-title":"UK Defence Journal"},{"issue":"4","key":"ref5","first-page":"325","article-title":"Ethical hacking: A security technique","volume":"5","author":"Beniwal Sneha","year":"2015","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref6","article-title":"Teaching our police force how to hack like the pros,","author":"Bennett","year":"2017","journal-title":"Wired"},{"key":"ref7","article-title":"Shining a light on federal law enforcements use of computer hacking tools","author":"Betschen","year":"2018","journal-title":"Just Security"},{"volume-title":"What is ethical hacking?","year":"2024","key":"ref8"},{"key":"ref9","article-title":"Police roped in a team of ethical hackers to nab accused,","author":"Deshpande","year":"2022","journal-title":"The Hindu"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.29297\/orbit.v2i1.77"},{"key":"ref11","article-title":"Why ethical hacking is the need of the hour,","author":"Goswami","year":"2021","journal-title":"Express Computer"},{"volume-title":"Ethical hacking, cybersecuritys great ally.","year":"2024","key":"ref12"},{"volume-title":"What is ethical hacking? A comprehensive guide [Updated]","year":"2024","author":"Jena","key":"ref13"},{"key":"ref14","article-title":"Ethical hacking is evolving  Heres how your company can keep up","author":"Kanouse","year":"2019","journal-title":"CPO Magazine"},{"key":"ref15","article-title":"Ethical hacker is a big and growing job","author":"Kim","year":"2019","journal-title":"Marketplace"},{"journal-title":"Maryville University","article-title":"Ethical hacking and morality: The gray area","year":"2017","key":"ref16"},{"key":"ref17","article-title":"Ethical hackers hit the jackpot as tech groups pay for protection","author":"Murphy","year":"2022","journal-title":"Financial Times"},{"volume-title":"How UK cops are becoming ethical hackers","year":"2024","author":"Paul","key":"ref18"},{"key":"ref19","first-page":"69","article-title":"To teach to hack or not: The grey zone of cybersecurity education","author":"Pawlicka","year":"2024","journal-title":"Proc. Inf. Syst. Educ. Conf. (ISECON)"},{"volume-title":"How does hacking help in law enforcement?","year":"2024","author":"West","key":"ref20"}],"container-title":["IT Professional"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6294\/11029587\/11029588.pdf?arnumber=11029588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:41:15Z","timestamp":1749620475000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11029588\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":20,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/mitp.2025.3532789","relation":{},"ISSN":["1520-9202","1941-045X"],"issn-type":[{"type":"print","value":"1520-9202"},{"type":"electronic","value":"1941-045X"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}