2,218
Views
9
CrossRef citations to date
0
Altmetric
Articles

50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers

ORCID Icon

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (3)

Miguel Alberto Gomez. (2021) Overcoming uncertainty in cyberspace: strategic culture and cognitive schemas. Defence Studies 21:1, pages 25-46.
Read now
Myriam Dunn Cavelty & Andreas Wenger. (2020) Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy 41:1, pages 5-32.
Read now

Articles from other publishers (6)

Subhodeep Mukherjee, Manish Mohan Baral, Venkataiah Chittipaka, Ramji Nagariya & Bharat Singh Patel. (2023) Achieving organizational performance by integrating industrial Internet of things in the SMEs: a developing country perspective. The TQM Journal.
Crossref
Koen Schoenmakers, Daniel Greene, Sarah Stutterheim, Herbert Lin & Megan J Palmer. (2023) The security mindset: characteristics, development, and consequences. Journal of Cybersecurity 9:1.
Crossref
T. Walshe & A.C. Simpson. (2022) Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations. Computers & Security 123, pages 102936.
Crossref
Shamoli Roy, Azeezah Sultana Priyota & Rabiul Alam Lokman. 2022. Practices, Challenges, and Prospects of Digital Ethnography as a Multidisciplinary Method. Practices, Challenges, and Prospects of Digital Ethnography as a Multidisciplinary Method 149 163 .
Petar Radanliev, David De Roure, Pete Burnap & Omar Santos. (2021) Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things. The Review of Socionetwork Strategies.
Crossref
Florian J Egloff & Myriam Dunn Cavelty. (2021) Attribution and Knowledge Creation Assemblages in Cybersecurity Politics. Journal of Cybersecurity 7:1.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.