{"id":"https://openalex.org/W2270658095","doi":"https://doi.org/10.4018/ijt.2016010105","title":"Technoethical Inquiry into Ethical Hacking at a Canadian University","display_name":"Technoethical Inquiry into Ethical Hacking at a Canadian University","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2270658095","doi":"https://doi.org/10.4018/ijt.2016010105","mag":"2270658095"},"language":"en","primary_location":{"id":"doi:10.4018/ijt.2016010105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijt.2016010105","pdf_url":null,"source":{"id":"https://openalex.org/S54269052","display_name":"International Journal of Technoethics","issn_l":"1947-3451","issn":["1947-3451","1947-346X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Technoethics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014437929","display_name":"Baha Abu-Shaqra","orcid":"https://orcid.org/0000-0002-6217-8838"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Baha Abu-Shaqra","raw_affiliation_strings":["University of Ottawa, Ottawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa, Ottawa, Ontario, Canada","institution_ids":["https://openalex.org/I153718931"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055324184","display_name":"Rocci Luppicini","orcid":"https://orcid.org/0000-0003-1962-2697"},"institutions":[{"id":"https://openalex.org/I153718931","display_name":"University of Ottawa","ror":"https://ror.org/03c4mmv16","country_code":"CA","type":"education","lineage":["https://openalex.org/I153718931"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rocci Luppicini","raw_affiliation_strings":["University of Ottawa, Ottawa, Ontario, Canada"],"affiliations":[{"raw_affiliation_string":"University of Ottawa, Ottawa, Ontario, Canada","institution_ids":["https://openalex.org/I153718931"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014437929"],"corresponding_institution_ids":["https://openalex.org/I153718931"],"apc_list":null,"apc_paid":null,"fwci":14.4052,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.98537878,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"7","issue":"1","first_page":"62","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13573","display_name":"Government, Law, and Information Management","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13573","display_name":"Government, Law, and Information Management","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13048","display_name":"Patient Dignity and Privacy","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/2739","display_name":"Public Health, Environmental and Occupational Health"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9592999815940857,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7410833835601807},{"id":"https://openalex.org/keywords/sensemaking","display_name":"Sensemaking","score":0.599429726600647},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.5516366958618164},{"id":"https://openalex.org/keywords/stakeholder","display_name":"Stakeholder","score":0.47540339827537537},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4703051447868347},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.4623248875141144},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4372468590736389},{"id":"https://openalex.org/keywords/ethical-decision","display_name":"Ethical decision","score":0.41775110363960266},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3918915390968323},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3152003288269043},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.1831619143486023},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15792104601860046},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15544983744621277}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7410833835601807},{"id":"https://openalex.org/C2780554381","wikidata":"https://www.wikidata.org/wiki/Q2063340","display_name":"Sensemaking","level":2,"score":0.599429726600647},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.5516366958618164},{"id":"https://openalex.org/C201305675","wikidata":"https://www.wikidata.org/wiki/Q852998","display_name":"Stakeholder","level":2,"score":0.47540339827537537},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4703051447868347},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.4623248875141144},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4372468590736389},{"id":"https://openalex.org/C2776768071","wikidata":"https://www.wikidata.org/wiki/Q5403402","display_name":"Ethical decision","level":2,"score":0.41775110363960266},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3918915390968323},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3152003288269043},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.1831619143486023},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15792104601860046},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15544983744621277}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijt.2016010105","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijt.2016010105","pdf_url":null,"source":{"id":"https://openalex.org/S54269052","display_name":"International Journal of Technoethics","issn_l":"1947-3451","issn":["1947-3451","1947-346X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Technoethics","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jt0000:v:7:y:2016:i:1:p:62-76","is_oa":false,"landing_page_url":"https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJT.2016010105","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W201578715","https://openalex.org/W254444275","https://openalex.org/W1498488428","https://openalex.org/W1564374540","https://openalex.org/W1580704179","https://openalex.org/W1589399253","https://openalex.org/W1592063330","https://openalex.org/W1608426814","https://openalex.org/W1928369515","https://openalex.org/W1962315211","https://openalex.org/W2049292639","https://openalex.org/W2116720807","https://openalex.org/W2137561420","https://openalex.org/W2284558720","https://openalex.org/W2508472307","https://openalex.org/W2911772801"],"related_works":["https://openalex.org/W3002559787","https://openalex.org/W2100609754","https://openalex.org/W2050640900","https://openalex.org/W2795557596","https://openalex.org/W2049050102","https://openalex.org/W2596767525","https://openalex.org/W1886987011","https://openalex.org/W2331546953","https://openalex.org/W2023412717","https://openalex.org/W3045759591"],"abstract_inverted_index":{"Business":[0],"and":[1,11,14,111,126,138,147],"academic":[2],"organizations":[3],"are":[4],"in":[5,51,89,130],"a":[6,58,69,82,102,112],"constant":[7],"pursuit":[8],"of":[9,25],"efficient":[10],"ethical":[12,43,66,78,134],"technologies":[13],"practices":[15],"to":[16,119,122,139,143],"safeguard":[17],"their":[18],"information":[19,32],"assets":[20],"from":[21],"the":[22,61,75,86,120,124],"growing":[23],"threat":[24],"hackers.":[26],"Ethical":[27],"hacking":[28,44,79,135],"is":[29],"one":[30],"important":[31],"security":[33,140],"risk":[34,52],"management":[35],"strategy":[36],"they":[37],"use.":[38],"Most":[39],"published":[40],"books":[41],"on":[42,47,65],"have":[45],"focused":[46],"its":[48],"technical":[49],"applications":[50],"assessment":[53],"practices.":[54],"This":[55],"paper":[56],"addressed":[57],"scarcity":[59],"within":[60,81],"organizational":[62,136],"communication":[63],"literature":[64],"hacking.":[67],"Taking":[68],"qualitative":[70],"exploratory":[71],"case":[72,87],"study":[73,88],"approach,":[74],"authors":[76],"explored":[77],"implementation":[80],"Canadian":[83],"university":[84],"as":[85,101],"focus,":[90],"applying":[91],"technoethical":[92],"inquiry":[93],"theory":[94],"paired":[95],"with":[96,107],"Karl":[97],"Weick's":[98],"sensemaking":[99,145],"model":[100],"theoretical":[103],"framework.":[104],"In-depth":[105],"interviews":[106],"key":[108],"stakeholder":[109],"groups":[110],"document":[113],"review":[114],"were":[115],"conducted.":[116],"Findings":[117],"pointed":[118],"need":[121],"expand":[123],"communicative":[125],"sociocultural":[127],"considerations":[128],"involved":[129],"decision":[131],"making":[132],"about":[133],"practices,":[137],"awareness":[141],"training":[142],"leverage":[144],"opportunities":[146],"reduce":[148],"equivocality.":[149]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
