Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking information systems to find security vulnerabilities and fixing them. The purpose of this paper is to understand whether and to what extent penetration testing can reveal various socio-organisational factors of information security in organisations. In doing so, the paper innovates theory by using Routine Activity Theory together with phenomenology of information systems concepts. Design/methodology/approach: The articulation of Routine Activity Theory and phenomenology emerged inductively from the data analysis. The data consists of 24 qualitative interviews conducted with penetration testers, analysed with thematic analysis. Findings: The st...
In an environment where commercial software is continually patched to correct security flaws, penetr...
In an environment where commercial software is continually patched to correct security flaws, penetr...
Penetration testing of networks is a process that is overused when demonstrating or evaluating the c...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
A developing organization need information technology in its operational activity. However what is o...
A developing organization need information technology in its operational activity. However what is o...
The dependence of organizations on networks/Internet for efficient operations and services to custom...
In this paper Authors will be discussing the penetration testing in system administration and challe...
This paper describes a planned program of investigation designed to determine what characteristics a...
With growing reliance on the Internet, E-commerce and network-based services organizations, companie...
In an environment where commercial software is continually patched to correct security flaws, penetr...
In an environment where commercial software is continually patched to correct security flaws, penetr...
Penetration testing of networks is a process that is overused when demonstrating or evaluating the c...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
Purpose: This paper presents a qualitative study of penetration testing, the practice of attacking i...
A developing organization need information technology in its operational activity. However what is o...
A developing organization need information technology in its operational activity. However what is o...
The dependence of organizations on networks/Internet for efficient operations and services to custom...
In this paper Authors will be discussing the penetration testing in system administration and challe...
This paper describes a planned program of investigation designed to determine what characteristics a...
With growing reliance on the Internet, E-commerce and network-based services organizations, companie...
In an environment where commercial software is continually patched to correct security flaws, penetr...
In an environment where commercial software is continually patched to correct security flaws, penetr...
Penetration testing of networks is a process that is overused when demonstrating or evaluating the c...