{"id":"https://openalex.org/W4411172029","doi":"https://doi.org/10.1109/mitp.2025.3532789","title":"White Hats in Blue? The Ethical Issues of Employing Hackers in Law Enforcement Agencies","display_name":"White Hats in Blue? The Ethical Issues of Employing Hackers in Law Enforcement Agencies","publication_year":2025,"publication_date":"2025-05-01","ids":{"openalex":"https://openalex.org/W4411172029","doi":"https://doi.org/10.1109/mitp.2025.3532789"},"language":"en","primary_location":{"id":"doi:10.1109/mitp.2025.3532789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2025.3532789","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/MITP.2025.3532789","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047739580","display_name":"Aleksandra Pawlicka","orcid":"https://orcid.org/0000-0003-4380-014X"},"institutions":[{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]}],"countries":["PL"],"is_corresponding":true,"raw_author_name":"Aleksandra Pawlicka","raw_affiliation_strings":["ITTI, Pozna&#x0144;, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI, Pozna&#x0144;, Poland","institution_ids":["https://openalex.org/I4210118437"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088536972","display_name":"Marek Pawlicki","orcid":"https://orcid.org/0000-0001-5881-6406"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Marek Pawlicki","raw_affiliation_strings":["Bydgoszcz University of Science and Technology (PBS), Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"Bydgoszcz University of Science and Technology (PBS), Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042632349","display_name":"Rafa\u0142 Kozik","orcid":"https://orcid.org/0000-0001-7122-3306"},"institutions":[{"id":"https://openalex.org/I1300393620","display_name":"Bydgoszcz University of Science and Technology","ror":"https://ror.org/049eq0c58","country_code":"PL","type":"education","lineage":["https://openalex.org/I1300393620"]},{"id":"https://openalex.org/I686019","display_name":"AGH University of Krakow","ror":"https://ror.org/00bas1c41","country_code":"PL","type":"education","lineage":["https://openalex.org/I686019"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Rafa\u0142 Kozik","raw_affiliation_strings":["Bydgoszcz University of Science and Technology (PBS), Bydgoszcz, Poland"],"affiliations":[{"raw_affiliation_string":"Bydgoszcz University of Science and Technology (PBS), Bydgoszcz, Poland","institution_ids":["https://openalex.org/I686019","https://openalex.org/I1300393620"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009283476","display_name":"Micha\u0142 Chora\u015b","orcid":"https://orcid.org/0000-0003-1405-9911"},"institutions":[{"id":"https://openalex.org/I4210118437","display_name":"Instytut Technik Telekomunikacyjnych i Informatycznych (Poland)","ror":"https://ror.org/02r65gs06","country_code":"PL","type":"company","lineage":["https://openalex.org/I4210118437"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Micha\u0142 Chora\u015b","raw_affiliation_strings":["ITTI, Pozna&#x0144;, Poland"],"affiliations":[{"raw_affiliation_string":"ITTI, Pozna&#x0144;, Poland","institution_ids":["https://openalex.org/I4210118437"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5047739580"],"corresponding_institution_ids":["https://openalex.org/I4210118437"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.1846268,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"27","issue":"3","first_page":"57","last_page":"61"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11076","display_name":"Policing Practices and Perceptions","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8357138633728027},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.7542329430580139},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.48998895287513733},{"id":"https://openalex.org/keywords/white","display_name":"White (mutation)","score":0.4875478148460388},{"id":"https://openalex.org/keywords/ethical-issues","display_name":"Ethical issues","score":0.43665581941604614},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43560582399368286},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4089028835296631},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.3459234833717346},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2881103754043579},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.27887243032455444},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21998482942581177},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.20676857233047485}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8357138633728027},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.7542329430580139},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.48998895287513733},{"id":"https://openalex.org/C56273599","wikidata":"https://www.wikidata.org/wiki/Q3122841","display_name":"White (mutation)","level":3,"score":0.4875478148460388},{"id":"https://openalex.org/C2986663376","wikidata":"https://www.wikidata.org/wiki/Q9465","display_name":"Ethical issues","level":2,"score":0.43665581941604614},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43560582399368286},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4089028835296631},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3459234833717346},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2881103754043579},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.27887243032455444},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21998482942581177},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.20676857233047485},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/mitp.2025.3532789","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mitp.2025.3532789","pdf_url":null,"source":{"id":"https://openalex.org/S86192639","display_name":"IT Professional","issn_l":"1520-9202","issn":["1520-9202","1941-045X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional","raw_type":"journal-article"},{"id":"pmh:oai:zenodo.org:18756119","is_oa":true,"landing_page_url":"https://doi.org/10.1109/MITP.2025.3532789","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional, (2025-06-10)","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:18756119","is_oa":true,"landing_page_url":"https://doi.org/10.1109/MITP.2025.3532789","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IT Professional, (2025-06-10)","raw_type":"info:eu-repo/semantics/article"},"sustainable_development_goals":[{"score":0.699999988079071,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3758062707","display_name":null,"funder_award_id":"101021797","funder_id":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme"}],"funders":[{"id":"https://openalex.org/F4320332999","display_name":"Horizon 2020 Framework Programme","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2898924418","https://openalex.org/W2899231235"],"related_works":["https://openalex.org/W2921504876","https://openalex.org/W2183730421","https://openalex.org/W1982580243","https://openalex.org/W2551868243","https://openalex.org/W2348153269","https://openalex.org/W4205613068","https://openalex.org/W3112956360","https://openalex.org/W2004781009","https://openalex.org/W4286284259","https://openalex.org/W1507118973"],"abstract_inverted_index":{"This":[0],"article":[1,39,76],"examines":[2],"the":[3,50,53,58,68],"critical":[4],"role":[5],"of":[6,43,52,61,92],"ethical":[7,24,44,62,80,93],"hacking":[8,25,63,81],"in":[9,64],"cybersecurity,":[10,85],"with":[11],"a":[12,29,41],"focus":[13],"on":[14,102],"law":[15],"enforcement":[16],"agencies":[17],"(LEAs).":[18],"As":[19],"cybercrime":[20],"rates":[21],"rise":[22],"dramatically,":[23],"has":[26],"emerged":[27],"as":[28],"proactive":[30],"approach":[31],"to":[32,49,97],"identify":[33],"and":[34,46,66,72,94],"address":[35],"potential":[36],"vulnerabilities.":[37],"The":[38,75],"highlights":[40],"number":[42],"dilemmas":[45],"challenges":[47],"related":[48],"employing":[51],"\u201cwhite-hat\u201d":[54],"hackers.":[55],"It":[56],"discusses":[57],"unique":[59],"application":[60],"LEAs":[65],"addresses":[67],"privacy,":[69],"governance,":[70],"financial,":[71],"psychological":[73],"implications.":[74],"underscores":[77],"that":[78],"although":[79],"is":[82],"essential":[83],"for":[84],"its":[86,99],"effective":[87],"integration":[88],"demands":[89],"careful":[90],"navigation":[91],"legal":[95],"landscapes":[96],"ensure":[98],"beneficial":[100],"impact":[101],"digital":[103],"security.":[104]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
