Enabling Hackers to do Good

1770 Words4 Pages

Introduction Life is zeroes and ones. To some, this may not be intuitive. To some, it may go against their religious or moral values. To a hacker, however, zeroes and ones represent your identity, your medical records, your financial status, and the human condition—life. Even the human genome can be sequenced into nothing more than zeroes and ones. Life is binary. For those who speak it, binary is the language that controls our very existence. With so much power at stake, it is not surprising that there are those who seek it. Mankind has always been enthralled with power. With so much at stake, however, it also stands to reason that society must protect itself. In order to do so, we must better understand these enigmatic people. To understand these shadowy people and what motivates them, we need to appreciate them as a whole. Unfortunately, scientists often attempt to break problems into lesser factors to better understand the larger problem through research of the smaller components. One such research study performed by Peter Leeson, an economics professor at George Mason University, postulates that hackers can be grouped into three classes: (1) good hackers, (2) fame-driven hackers, and (3) greedy hackers, based on their motivation (Coyne, Leeson 3). While this approach of separating the components may be appropriate for understanding many complex problems, it can be detrimental to grasping the multifaceted aspects of a hacker. To understand hackers, what motivates them, and how to stop them, we must understand that they exist on a continuum through a lifecycle in which they traverse from one class to the next. A Hacker Kevin Mitnick, one of our nation’s most notorious hackers, is the quintessential example of ho... ... middle of paper ... ...n Systems 29.2 (2012): 77-108. Computers & Applied Sciences Complete. Web. 13 Apr. 2014. Kelley, Brian M., John J. Graybeal, and James J. Mahoney. Substance Abuse Across the Lifespan: A Biopsycosocial Approach. 4th ed. Redding: BVT, n.d. 2013. Print. Mitnick, Kevin. Ghost in the Wires: My Adventures as the World's Most Wanted Hacker. New York: Hachette Book Group, 2011. Print. Sharma, Raghav. Peeping into a Hacker's Mind: Can Criminological Theories Explain Hacking? SSRN Working Paper Series. Rochester: Social Science Research Network, March 2008. Thomas, Douglas. Hacker Culture. Minneapolis: University of Minnesota Press, 2002. 5-46. Print. Wible, Brent. "A Site Where Hackers Are Welcome: Using Hack-In Contests to Shape Preferences and Deter Computer Crime."The Yale Law Journal 112.6 (2003): 1577-623. JSTOR. Web. 13 Apr. 2014. .

More about Enabling Hackers to do Good

Open Document