Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Grey Hat Hackers

Web 2.0 and Cloud Technologies for Implementing Connected Government
These hackers, by definition, fall in between White and Black Hat hackers variety as they intrude a system without authorization but their intentions of doing so are certainly not totally as bad as “Black Hat” hackers intentions.
Published in Chapter:
Digital Ecosystem Security Issues for Organizations and Governments: Digital Ethics and Privacy
Heru Susanto (The Indonesian Institute of Sciences, Indonesia and Brunei University of Technology, Indonesia), Leu Fang Yie (Computer Science Department, Tunghai University, Taiwan), Desi Setiana (Universiti Brunei Darussalam, Brunei), Yani Asih (The Indonesian Institute of Sciences, Indonesia), Ambar Yoganingrum (The Indonesian Institute of Sciences, Indonesia), Slamet Riyanto (The Indonesian Institute of Sciences, Indonesia), and Fadly Akbar Saputra (The Indonesia Institute of Sciences, Indonesia)
DOI: 10.4018/978-1-7998-4570-6.ch010
Abstract
The growth of the digital ecosystem has given a sense that the rise of security implementations must be considered by every organization including governments in terms of adopting the best digital ethical approaches and awareness on the importance of ensuring privacy. Increased use of the internet has also increased matters of cyber threats and unethical behaviors. Therefore, implementation of digital ethics has become crucial to prevent or minimize the impacts of cybercrime, and so, securing sensitive information from unauthorized access has become extremely important. This study analyses and describes the future trends regarding security in digital ethics and privacy within the digital ecosystem. The results point to a relative correlation between the government and business sector and the types of attacks and that digital ethics and privacy makes up the core elements of security. Implementing cautionary steps are also necessary to prevent from any form of cyber-attack.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR