ARTÍCULO
TITULO

Entrapment behind the firewall: the ethics of internal cyber-stings

Morgan Luck    

Resumen

Internal cyber-attacks (cyber-attacks which occur from within an organization) pose a serious threat to an organization?s security. One tool that organizations can employ to help them detect such threats is the internal cyber-sting. An internal cyber-sting involves an organization enticing its members into performing a (controlled) internal cyber-attack in order to apprehend them.  However, there is (rightly) considerable moral consternation about employing such a tool; for it is deceitful and undermines trust. The aim of this paper is to present four separate actions that might be taken by organizations to strengthen their moral reason for employing internal cyber-stings.

Palabras claves

 Artículos similares

       
 
Muhammad S Ahmed     Pág. 3193 - 3206
The study acts as a pilot research to investigate the influence of organizations internal dynamics on PMM assessment levels and to outline a methodology that can help us to quantify it. It aims to analyze the influence of organizations internal dynamics ... ver más

 
Ahmad Abbaspour,Amir Hussein Amirkhani,Ali Asghar Pour Ezzat,Mohammad Javad Hozori    
ABSTRACT The purpose of this study was to identify and describe the sub-processes of the strategic intelligence process in organizational level analysis. Data were collected by searching the major academic and practitioner books, theses and journals in t... ver más

 
Ville Juhani Teräväinen, Juha-Matti Junnonen, Simo Ali-Löytty     Pág. 48 - 69
Academic literature has long recognized the correlation between a company?s organizational culture and its quality performance. The Finnish construction industry is still a highly human powered industry, and thus, organizational culture is seen to have a... ver más

 
??????? ???????? ??????     Pág. 106 - 113
The subject matter of the article is the commercialization of scientific and technical developments in Ukrainian universities. The goal of the work is to develop the systematic approach to the processes of commercialization of scientific and technical de... ver más

 
Lydia Wijaya,Indra Kharisma Raharjana,Endah Purwanti     Pág. 46 - 56
Information Technology (IT) is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their business processes. In this research, we will design Strategic Management for IT Services for outsourc... ver más