Computer Criminal Case Study

859 Words2 Pages

When it comes to determining whether to hire a person who has committed a criminal act, it is not always an easy dilemma to be confronted with. However, when it comes to a business determining whether to hire a person who has committed a criminal act and pay them to continue committing that criminal act, this opens up a whole new realm of ethical questions. Conversely, this scenario is not as bad a one may conclude. In fact, in today’s growth in the use of technology, especially for business, it would not be a surprise if a business could use a computer criminal to test and identify a business’s potential security weakness. This, indeed, can be beneficial to both the business and the computer criminal. When taking into account on to whether …show more content…

There is a multitude of levels when it comes to the severity of the computer criminal. For example, George Reynolds, author of Ethics in Information Technology, explains that at one end of the computer criminal spectrum there are criminals called cyberterrorist. George Reynolds explains cyberterrorists as one who will “destroy infrastructure components of financial institutions, utilities, and emergency response units” (Reynolds 65). In reality, however, most computer criminals are not this ruthless. Most computer criminals are known as hackers. A hacker is simply someone who will “test the limitations of information systems out of intellectual curiosity to see whether they can gain access and how far they can go” (Reynolds 96). Therefore, if the company uses public records when looking to hire a computer criminal, they can look for a background in which a computer criminal was caught for merely testing the limits of a system, which would be specifically what the company would be looking for anyhow, versus someone who was terminating organizations. Nonetheless, hacker or cyberterrorists are both serious crimes where jail time has been faced. However, this does not mean that a business should turn a blind eye to hiring a computer …show more content…

Yet, the point being is that these computer criminals have done their time and plenty of it. According to David Twomey, Marianne Jennings, Stephanie M. Greene, and Ronald A. Anderson, authors of the book Business Law and the legal Environment, explain that “the penalties for [Economic Espionage Act] violations are up to 500,000 and 15 years for individuals” (Twomey et al. 122). The Economic Espionage Act covers a multitude of computer crimes; including hackers. Now that these computer criminals, specifically hackers, have done their time, it is important that they have an opportunity to be integrated back into society. According to Nathan James, author of “Offender Reentry: Correctional Statistics, Reintegration into the Community, and Recidivism”, states that “released prisoners frequently identify employment as one of the most important factors in their efforts to stay crime free after incarceration” (James 14). If business were to hire former computer criminals, it would allow such opportunity to be a reality. Yet, these are still criminals with potential access to business important information. This, nevertheless, should not be a situation to fear

Open Document