{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T07:28:08Z","timestamp":1768030088652,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,7,25]],"date-time":"2016-07-25T00:00:00Z","timestamp":1469404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,7,25]]},"DOI":"10.1145\/2925995.2926016","type":"proceedings-article","created":{"date-parts":[[2016,6,17]],"date-time":"2016-06-17T19:46:49Z","timestamp":1466192809000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Cyber Security &amp; Ethical Hacking For SMEs"],"prefix":"10.1145","author":[{"given":"Hilary","family":"Berger","sequence":"first","affiliation":[{"name":"Cardiff Metropolitan University, Cardiff School of Management, Cardiff CF5 2YB, Tel +44 2920 416320"}]},{"given":"Andrew","family":"Jones","sequence":"additional","affiliation":[{"name":"Cardiff Metropolitan University, Cardiff School of Management, Cardiff CF5 2YB, Tel +44 2920 416320"}]}],"member":"320","published-online":{"date-parts":[[2016,7,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume":"2","author":"Aggarwal P.","year":"2014","unstructured":"Aggarwal , P. , Arora , P. , Neha ., P., Poonam ., S. : Review on Cyber Crime and Security. Int. J. Res in Eng and Allied Scs. 2 , 1 , 48--51 ( 2014 ) Aggarwal, P., Arora, P., Neha., P., Poonam., S.: Review on Cyber Crime and Security. Int. J. Res in Eng and Allied Scs. 2,1, 48--51 (2014)","journal-title":"Review on Cyber Crime and Security. Int. J. Res in Eng and Allied Scs."},{"key":"e_1_3_2_1_2_1","volume-title":"Advanced Penetration Testing for Highly-Secured Environments","author":"Allen L.","year":"2012","unstructured":"Allen , L. : Advanced Penetration Testing for Highly-Secured Environments . Packt Publishing Ltd , Birmingham, UK ( 2012 ) Allen, L.: Advanced Penetration Testing for Highly-Secured Environments. Packt Publishing Ltd, Birmingham, UK (2012)"},{"key":"e_1_3_2_1_3_1","unstructured":"Anti-Phishing Work Group (APWG).: Unifying the Global Response To Cybercrime. Phishing Activity Trends Report. 1--2 (2014) Anti-Phishing Work Group (APWG).: Unifying the Global Response To Cybercrime. Phishing Activity Trends Report. 1--2 (2014)"},{"key":"e_1_3_2_1_4_1","volume-title":"Wallace","author":"Barker K.","year":"2015","unstructured":"Barker , K. , Wallace , K. : CompTIA Network+ N10-006 Cert Guide. Pearson Education, USA ( 2015 ) Barker, K., Wallace, K.: CompTIA Network+ N10-006 Cert Guide. Pearson Education, USA (2015)"},{"key":"e_1_3_2_1_5_1","unstructured":"Beale J.: Nessus Network Auditing. Syngress Publish Burlington (2007) Beale J.: Nessus Network Auditing. Syngress Publish Burlington (2007)"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Calder A.: IT Governance - An International Guide to Data Security and ISO27001\/ISO27002. Kogan Page London (2012) Calder A.: IT Governance - An International Guide to Data Security and ISO27001\/ISO27002. Kogan Page London (2012)","DOI":"10.2307\/j.ctt5hh4qg"},{"key":"e_1_3_2_1_7_1","first-page":"1","volume":"1","author":"Chow E.","year":"2011","unstructured":"Chow , E. : Ethical Hacking & Penetration Testing. ACC 626 : IT Research Paper. 1 , 1 ( 2011 ) Chow, E.: Ethical Hacking & Penetration Testing. ACC 626: IT Research Paper. 1, 1 (2011)","journal-title":"IT Research Paper."},{"key":"e_1_3_2_1_8_1","volume-title":"Endler","author":"Collier M.","year":"2014","unstructured":"Collier , M. , Endler , D. : Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions. McGraw Hill , New York ( 2014 ) Collier, M., Endler, D.: Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions. McGraw Hill, New York (2014)"},{"key":"e_1_3_2_1_9_1","volume-title":"Greenblatt","author":"DeFino S.","year":"2013","unstructured":"DeFino , S. , Greenblatt , L. : Official Certified Ethical Hacker Review Guide: For Version 7.1. Cengage Learning, USA ( 2013 ) DeFino, S., Greenblatt, L.: Official Certified Ethical Hacker Review Guide: For Version 7.1. Cengage Learning, USA (2013)"},{"key":"e_1_3_2_1_10_1","first-page":"50","volume":"27","author":"Domini S.","year":"2011","unstructured":"Domini , S. : Staving off cyber criminals: The growing risks organizations face and the questions directors should be asking to counter them. Company Director. 27 , 50 -- 52 ( 2011 ) Domini, S.: Staving off cyber criminals: The growing risks organizations face and the questions directors should be asking to counter them. Company Director. 27, 50--52 (2011)","journal-title":"Company Director."},{"key":"e_1_3_2_1_11_1","volume-title":"The Basics of Hacking and Penetration Testing","author":"Engebretson P.","year":"2013","unstructured":"Engebretson , P. : The Basics of Hacking and Penetration Testing . Elsevier , USA ( 2013 ) Engebretson, P.: The Basics of Hacking and Penetration Testing. Elsevier, USA (2013)"},{"key":"e_1_3_2_1_12_1","unstructured":"GOV.uk Keeping the UK safe in cyber space. http\/\/www.gov.uk GOV.uk Keeping the UK safe in cyber space. http\/\/www.gov.uk"},{"key":"e_1_3_2_1_13_1","unstructured":"Grimes R.: 5 cyber attacks you're most likely to face. http\/\/www.infoworld.com Grimes R.: 5 cyber attacks you're most likely to face. http\/\/www.infoworld.com"},{"key":"e_1_3_2_1_14_1","volume-title":"A Hacker's Life Starter: Security Penetration Anywhere and Anytime","author":"James B.","year":"2014","unstructured":"James , B. : A Hacker's Life Starter: Security Penetration Anywhere and Anytime . CreateSpace Independent Publishing Platform , USA ( 2014 ) James, B.: A Hacker's Life Starter: Security Penetration Anywhere and Anytime. CreateSpace Independent Publishing Platform, USA (2014)"},{"key":"e_1_3_2_1_15_1","volume-title":"Mastering Wireless Penetration Testing for Highly Secured Environments","author":"Johns A.","year":"2015","unstructured":"Johns , A. : Mastering Wireless Penetration Testing for Highly Secured Environments . Packt Publishing Ltd , Birmingham, UK ( 2015 ) Johns, A.: Mastering Wireless Penetration Testing for Highly Secured Environments. Packt Publishing Ltd, Birmingham, UK (2015)"},{"key":"e_1_3_2_1_16_1","volume-title":"Rumens","author":"Keleman M.","year":"2008","unstructured":"Keleman , M. , Rumens , N. : An Introduction to Critical Management Research. Sage, USA ( 2008 ) Keleman, M., Rumens, N.: An Introduction to Critical Management Research. Sage, USA (2008)"},{"key":"e_1_3_2_1_17_1","unstructured":"Kirsch C.: Introduction to Penetration Testing. \/\/.community.rapid7.com Kirsch C.: Introduction to Penetration Testing. \/\/.community.rapid7.com"},{"key":"e_1_3_2_1_18_1","unstructured":"Lawson B.: FBI Recruiting 'Ethical Hackers' To Investigate Cyber Crime. http:\/\/www.newsy.com Lawson B.: FBI Recruiting 'Ethical Hackers' To Investigate Cyber Crime. http:\/\/www.newsy.com"},{"key":"e_1_3_2_1_19_1","volume-title":"Brown","author":"Long J.","year":"2007","unstructured":"Long , J. , Gardener , B. , Brown , J. : Google Hacking for Penetration Testers. Syngress Publishing , USA ( 2007 ) Long, J., Gardener, B., Brown, J.: Google Hacking for Penetration Testers. Syngress Publishing, USA (2007)"},{"key":"e_1_3_2_1_20_1","unstructured":"Loquist J.: How to Use Brutus Password Cracker. http:\/\/www.ehow.com Loquist J.: How to Use Brutus Password Cracker. http:\/\/www.ehow.com"},{"key":"e_1_3_2_1_21_1","unstructured":"Lyne J. 30 000 Web Sites Hacked A Day. http:\/\/www.forbes.com Lyne J. 30 000 Web Sites Hacked A Day. http:\/\/www.forbes.com"},{"key":"e_1_3_2_1_22_1","unstructured":"Lyon G.: Nmap Network Scanning. Insecure USA (2009) Lyon G.: Nmap Network Scanning. Insecure USA (2009)"},{"key":"e_1_3_2_1_23_1","volume-title":"M.: Best Practices in Automation Security. In 53rd IEEE-IAS\/PCA Industry Technical Conference, 1--15 (2012)","author":"McKay","unstructured":"McKay , M.: Best Practices in Automation Security. In 53rd IEEE-IAS\/PCA Industry Technical Conference, 1--15 (2012) McKay, M.: Best Practices in Automation Security. In 53rd IEEE-IAS\/PCA Industry Technical Conference, 1--15 (2012)"},{"key":"e_1_3_2_1_24_1","unstructured":"Office of Cyber Security and Information Assurance: https:\/\/www.gov.uk Office of Cyber Security and Information Assurance: https:\/\/www.gov.uk"},{"key":"e_1_3_2_1_25_1","unstructured":"O'Donnell A.: LinkedIn Privacy & Security Tips. http:\/\/netsecurity. about.com O'Donnell A.: LinkedIn Privacy & Security Tips. http:\/\/netsecurity. about.com"},{"key":"e_1_3_2_1_26_1","first-page":"1","volume":"1","author":"O'Gorman G.","year":"2012","unstructured":"O'Gorman , G. , McDonald , G. : Ransomware : A Growing Menace. Symantec Security Response. 1 , 1 ( 2012 ) O'Gorman, G., McDonald, G.: Ransomware: A Growing Menace. Symantec Security Response. 1,1 (2012)","journal-title":"A Growing Menace. Symantec Security Response."},{"key":"e_1_3_2_1_27_1","volume-title":"Ceh: Certified Ethical Hacker Study Guide","author":"Oriyano S.","year":"2014","unstructured":"Oriyano , S. : Ceh: Certified Ethical Hacker Study Guide . John Wiley , Indianapolis ( 2014 ) Oriyano, S.: Ceh: Certified Ethical Hacker Study Guide. John Wiley, Indianapolis (2014)"},{"key":"e_1_3_2_1_28_1","first-page":"33","volume":"11","author":"Prasad M.","year":"2014","unstructured":"Prasad , M. , Manjula , B. : Ethical Hacking Tools: A Situational Awareness. Int J. Emerging Tec. Comp. Sc. & Elec. 11 , 33 -- 38 ( 2014 ) Prasad, M., Manjula, B.: Ethical Hacking Tools: A Situational Awareness. Int J. Emerging Tec. Comp. Sc. & Elec. 11, 33--38 (2014)","journal-title":"Ethical Hacking Tools: A Situational Awareness. Int J. Emerging Tec. Comp. Sc. & Elec."},{"key":"e_1_3_2_1_29_1","first-page":"2","volume":"4","author":"Rainey L.","year":"2012","unstructured":"Rainey , L. , Shau , M. : Securing IP Address to Control IP Spoofing. Net. and Comms. Eng. 4 , 2 ( 2012 ) Rainey, L., Shau, M.: Securing IP Address to Control IP Spoofing. Net. and Comms. Eng. 4,2 (2012)","journal-title":"Control IP Spoofing. Net. and Comms. Eng."},{"key":"e_1_3_2_1_30_1","volume-title":"Backtrack 5 Wireless Penetration Testing Beginner's Guide","author":"Ramachandran V.","year":"2011","unstructured":"Ramachandran , V. : Backtrack 5 Wireless Penetration Testing Beginner's Guide . Packt Publishing Ltd , Birmingham, UK ( 2011 ) Ramachandran, V.: Backtrack 5 Wireless Penetration Testing Beginner's Guide. Packt Publishing Ltd, Birmingham, UK (2011)"},{"key":"e_1_3_2_1_31_1","first-page":"439","volume":"19","author":"Raza M.","year":"2012","unstructured":"Raza , M. , Iqbal , M. , Sharif , M. , Haider , W. : A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication. World Allied Sciences J. 19 , 439 ( 2012 ) Raza, M., Iqbal, M., Sharif, M., Haider, W.: A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication. World Allied Sciences J. 19, 439 (2012)","journal-title":"World Allied Sciences J."},{"key":"e_1_3_2_1_32_1","unstructured":"Rogers R.: Nessus Network Auditing. Syngress Burlington (2008) Rogers R.: Nessus Network Auditing. Syngress Burlington (2008)"},{"key":"e_1_3_2_1_33_1","unstructured":"Rouse M.: IP spoofing (IP address forgery or a host file hijack) http:\/\/searchsecurity.techtarget.com Rouse M.: IP spoofing (IP address forgery or a host file hijack) http:\/\/searchsecurity.techtarget.com"},{"key":"e_1_3_2_1_34_1","volume-title":"Thornhill","author":"Saunders M.","year":"2012","unstructured":"Saunders , M. , Lewis , P. , Thornhill , A. : Research Methods for Business Students. Pitman Publishing , UK ( 2012 ) Saunders, M., Lewis, P., Thornhill, A.: Research Methods for Business Students. Pitman Publishing, UK (2012)"},{"key":"e_1_3_2_1_35_1","volume-title":"Honig","author":"Sikorski M.","year":"2012","unstructured":"Sikorski , M. , Honig , A. : Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, USA ( 2012 ) Sikorski, M., Honig, A.: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. No Starch Press, USA (2012)"},{"key":"e_1_3_2_1_36_1","volume-title":"Corley","author":"Simpson M.","year":"2011","unstructured":"Simpson , M. , Backman , K. , Corley , J. : Hands-On Ethical Hacking and Network Defense. Cengage Learning, USA ( 2011 ) Simpson, M., Backman, K., Corley, J.: Hands-On Ethical Hacking and Network Defense. Cengage Learning, USA (2011)"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.04.004"},{"key":"e_1_3_2_1_38_1","volume-title":"Pinto","author":"Stuttard D.","year":"2011","unstructured":"Stuttard , D. , Pinto , M. : The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws. John Wiley , Indianapolis ( 2011 ) Stuttard, D., Pinto, M.: The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws. John Wiley, Indianapolis (2011)"},{"key":"e_1_3_2_1_39_1","first-page":"5149","volume":"5","author":"Tewani R.","year":"2014","unstructured":"Tewani , R. , Singh , S. , Dubey , A. : A Novel Methodology for Implementing a DDoS Attack and Prevention. Int. J. Comp. Sc. and Information. Technologies. 5 , 5149 -- 5150 ( 2014 ) Tewani, R., Singh, S., Dubey, A.: A Novel Methodology for Implementing a DDoS Attack and Prevention. Int. J. Comp. Sc. and Information. Technologies. 5, 5149--5150 (2014)","journal-title":"DDoS Attack and Prevention. Int. J. Comp. Sc. and Information. Technologies."},{"key":"e_1_3_2_1_40_1","volume-title":"Encyclopedia of Cryptography and Security. 2 (2011)","author":"Tilborg H.","unstructured":"Tilborg , H. , Jajodia , S. Man -in-the-Middle Attack. Encyclopedia of Cryptography and Security. 2 (2011) Tilborg, H., Jajodia, S. Man-in-the-Middle Attack. Encyclopedia of Cryptography and Security. 2 (2011)"},{"key":"e_1_3_2_1_41_1","volume-title":"Cyber Security and IT Infrastructure Protection. Syngress Media","author":"Vacca J.","year":"2013","unstructured":"Vacca , J. : Cyber Security and IT Infrastructure Protection. Syngress Media , Rockland, MA : U.S. ( 2013 ) Vacca, J.: Cyber Security and IT Infrastructure Protection. Syngress Media, Rockland, MA: U.S. (2013)"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.99"},{"key":"e_1_3_2_1_43_1","unstructured":"Warwick A.: Survey reveals true global cost of cyber attacks. http:\/\/www.computerweekly.com Warwick A.: Survey reveals true global cost of cyber attacks. http:\/\/www.computerweekly.com"},{"key":"e_1_3_2_1_44_1","volume-title":"An Introduction to Information Security and ISO 27001","author":"Watkins S.","year":"2013","unstructured":"Watkins , S. : An Introduction to Information Security and ISO 27001 . IT Governance Publishing , Cambridge ( 2013 ) Watkins, S.: An Introduction to Information Security and ISO 27001. IT Governance Publishing, Cambridge (2013)"},{"key":"e_1_3_2_1_45_1","volume-title":"Ackroyd","author":"Watson G.","year":"2014","unstructured":"Watson , G. , Mason , A. , Ackroyd , R. : Social Engineering Pen Testing: Executing Social Engineering Pen Tests, Assessments and Defence. Elsevier , USA ( 2014 ) Watson, G., Mason, A., Ackroyd, R.: Social Engineering Pen Testing: Executing Social Engineering Pen Tests, Assessments and Defence. Elsevier, USA (2014)"},{"key":"e_1_3_2_1_46_1","volume-title":"Penetration Testing: A Hands-On Introduction to Hacking","author":"Weidman G.","year":"2014","unstructured":"Weidman , G. : Penetration Testing: A Hands-On Introduction to Hacking . No Starch Press Inc., USA ( 2014 ) Weidman, G.: Penetration Testing: A Hands-On Introduction to Hacking. No Starch Press Inc., USA (2014)"},{"key":"e_1_3_2_1_47_1","volume-title":"Professional Penetration Testing","author":"Wilhelm T.","year":"2010","unstructured":"Wilhelm , T. : Professional Penetration Testing . Elsevier , USA ( 2010 ) Wilhelm, T.: Professional Penetration Testing. Elsevier, USA (2010)"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70039-3"},{"key":"e_1_3_2_1_49_1","unstructured":"Yerrid K.: Instant Netcat Starter. Insecure org Birmingham UK (2013) Yerrid K.: Instant Netcat Starter. Insecure org Birmingham UK (2013)"},{"key":"e_1_3_2_1_50_1","volume-title":"Case Study Research: Design and Methods","author":"Yin R.","year":"2012","unstructured":"Yin , R. : Case Study Research: Design and Methods . Sage , CA ( 2012 ) Yin, R.: Case Study Research: Design and Methods. Sage, CA (2012)"}],"event":{"name":"KMO '16: The 11th International Knowledge Management in Organizations Conference","location":"Hagen Germany","acronym":"KMO '16"},"container-title":["Proceedings of the The 11th International Knowledge Management in Organizations Conference on The changing face of Knowledge Management Impacting Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2925995.2926016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2925995.2926016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:26Z","timestamp":1750273466000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2925995.2926016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,25]]},"references-count":50,"alternative-id":["10.1145\/2925995.2926016","10.1145\/2925995"],"URL":"https:\/\/doi.org\/10.1145\/2925995.2926016","relation":{},"subject":[],"published":{"date-parts":[[2016,7,25]]},"assertion":[{"value":"2016-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}