Hacking, but Legal

Hacking, but Legal

Share this post

Hacking, but Legal
Hacking, but Legal
The Chutzpah of an Information Security Plagiarist
Copy link
Facebook
Email
Notes
More

The Chutzpah of an Information Security Plagiarist

A tenured academic fights back against the theft of her team’s work.

Jackie Singh
Apr 05, 2022
∙ Paid

Share this post

Hacking, but Legal
Hacking, but Legal
The Chutzpah of an Information Security Plagiarist
Copy link
Facebook
Email
Notes
More
Share
The Chutzpah of an Information Security Plagiarist

A tenured academic fights back against the theft of her team’s work.

Many in the world of cybersecurity have a deep respect for the work of others and know we stand on the shoulders of giants. Advancing an entire discipline, especially one as young as this, requires extensive cross-collaboration and the ability to regularly rely on the work of others.

Professionals in this space know that work product which did not originate with them, academic or otherwise, must be appropriately attributed in their own works.

However, not all colleagues share the same respect for one another.

Plagiarism, for which most claimants have no recourse, runs rampant throughout the cybersecurity industry and anecdotally seems to impact women and minorities disproportionately.

So what happened?

SecurityWeek (and various other outlets, such as Bleeping Computer, Dark Reading, The Washington Post, Bloomberg, USA Today, Business Insider, and Financial Times) have directly written about or cited exhaustive research per…

Keep reading with a 7-day free trial

Subscribe to Hacking, but Legal to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Jackie Singh
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More