@article{184, author = {Mario Silic}, title = {Dual-use open source security software in organizations – Dilemma: Help or hinder?}, abstract = {This research closes existing gaps by studying the open source dual-use security software challenges that organizations should consider when using this technology. We utilize a triangulation approach with three independent data sources to conduct a detailed analysis of this phenomenon. }, year = {2013}, journal = {Elsevier BV}, month = {2013-11}, issn = {0167-4048}, url = {https://www.sciencedirect.com/science/article/pii/S0167404813001326?casa_token=KtgJvbVeMycAAAAA:-_C_U6sPe3VuwK3elSj0g3EptVhBXlbylDCWxcg1U5MzOCLhAUi5mbc5CFdoFXIGXVk-KENM_6A}, doi = {10.1016/j.cose.2013.09.003}, note = { Our study has found that the dual-use technology has both positive and negative effects on information system security. The ease of use of the dual-use security software facilitates security breaches and enterprises are using vulnerable open source security libraries and frameworks to develop their own in-house applications. On a positive note, open source dual-use security software is used as a powerful defense tool against attackers. Our study also found that security awareness is the key to maintaining the right level of information security risk in the dual-use context. Dual-use can also be of a great help to organizations in leveraging their information system security.}, }