Hackers and Security Measures

Powerful Essays
Hackers and Security Measures

A diffuse group of people often called “hackers” has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause damage. Furthermore, my research also suggests that the general practice of hacking is a part of larger conflicts that we are experiencing at every level of society and business in an information age in which many people are not computer literate. These conflicts lie on the issue of whether information should be made publicly available or not (centralise or decentralise government) and on issues of law enforcement. Hackers have raised serious issues about values and practices in an information society.


It is true that computers and telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today’s technology. The Internet can be used for criminal purposes in different ways: from a simple ‘blackmail’ to the most perplex crime like money laundering.

“Technology can be applied as easily by the criminal and terrorist as it can by the authorities; and very often the criminal has greater desire to profit from that technology than have the authorities themselves” .

Furthermore, companies, institutions and private lives, especially in western countries, are prevalent by computers, Internet and other relevant technologies. Business operations without the support of digital technology do not exist. For instance, banks distribute funds through computer networks. Banks and credit card companies are quickly adopting automated payment systems. The computers are the essential basis of this cashless society. Millions of computers are needed to operate these automated paymen...

... middle of paper ...

...economic implications of the Internet. Kogan page, London.

Barrett N (1997) Digital crime: policing the cybernation. Kogan Page, London.

Bequai A (1987) Technocrimes. Lexington Books, Lexington, Mass.

Doswell R T and Simons G L (1986) Fraud and abuse of IT systems. Ncc, Manchester.

Forester T and Morrison P (1994) Computer ethics: cautionary tales and ethical dilemmas in computing.(2nd) MIT Press, Cambridge, Mass.

Guisnel J (1997) Cyberwars: espionage on the Internet. Plenum Press, New York.

Lobbecke C Content providers on the Internet: A dicussion paper on opportunities, limits and impacts.

Mandell S L (1992) Computers and information processing: concepts and applications.(6th) West Publishing, St. Paul, Minnesota.

Plant S (1997) Zeros + ones: digital women + the new technoculture. Fourth Estate, London.

Porter D (1996) Internet culture. Routledge, London.

Sieber U (1986) The international handbook on computer crime: computer related economic crime and the infringements of privacy. Wiley, Chichester.

Taylor P (1999) Hackers: crime the digital sublime. Routledge, New York.

Wasik M (1990) Crime and the computer. Oxford university press, Oxford.
Get Access