The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it. As the advancement of computer technologies and systems of information become increasingly more and more complex in today's fast paced modern world and said technologies become an integral part of our homes and lives with rapid progress, we attempt to assert more and more control over what we consider "information," and "property." "Hacking" then seems to be the flagrant abuse of systems of information, complete and utter "unauthorized access." Yet what is the other side to this debate? Is there any validity to the concept of "free information," of "pure information?" The main ethical issues surrounding hacking seem to concern our definition of property and ownership, and the much more theoretical, abstract view of "control".
Who has control and exactly who should have control? What is information? Can it really be free? Should it be free? What about ownership and property rights? Is that an obsolete concept, stuck in the dark ages before computer technologies were invented and the main concern back then was physical property and damage? First, lets talk about property. Who owns what? The main issue here seems to be the different conceptualizations of property ownership and syst...
... middle of paper ...
Janine Jackson, a media theorist has tried to stress the importance of having people who can "explain and represent online experience accurately," so that the popular press is not in danger of provoking dramatic, paranoiac responses to the "problems caused by poor circulation systems of illicit information on-line." In the March 1990 issue of Harper's, a former "hacker" spoke about his experience and work online. But this is a rare occurrence for a former "hacker" to come forward . There was the Time magazine "Cyber Porn" article, in which academics at Carnegie Mellon University, Vanderbilt University and others were asked to contextualize and analyze the issues involved in understanding the "powerful, and diverse, underground community." Thus in order to begin to understand this diverse community, we must be able to get as much accurate information as possible.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- In this report there are many different implications of hacking which would be discussed, about the social and ethical implication that hacking has on the society, and so through discussing many ‘For’ and ‘Against’ arguments this would allow the reader to finally be able to reach a conclusion. The structuring of the report will be as follows. Firstly, it will cover the aims and points of social implication of hacking, and then the ethical implications of hacking. This would allow being able to meet the aims of the report and identify many different sides of hacking both ethically and socially.... [tags: Ethics, Computer, Computer security, Computing]
1500 words (4.3 pages)
- ... This, according to Johnson (1994) will help make students (future computing professionals) aware of the ethical issues surrounding computers, to sensitise them to ethical issues in the use of computers, and in the practice of the computing professions, convey to students a deep understanding of the ways in which computers change and impact on society, and provide conceptual tools and develop analytic skills for ethical decision making within the computing world. Several authors have defined Computer ethics differently.... [tags: crime, hacking, viruses, privacy, stress]
879 words (2.5 pages)
- Introduction Issues of ethics and professionalism had been touch frequently in our current society lately. Experts from a particular field usually and logically should behave professionally or show their expertise to the civilian. However, in fact they are working oppositely and crime their expertise with their knowledge. This actually brought troubles to the outsider or victim and causes them to loss their property or reputation. In information technology field, issue regarding to ethics and professionalism had been given name as cyber ethics.... [tags: ethics, professionalism, computers]
2190 words (6.3 pages)
- Q. Define computer ethics. A. Ethics is the collection of moral principles that controls the actions of an individual or a group. And managing the use of computers can be done by computer ethics which is set of moral principles that controls the usage of computers. Here in computer ethics we can find some common issues which contains privacy concerns, copyrighted electronic content and how the society is been affected by computers. Let us understand in brief about computer ethics by illustrating with an example that is approaching or entering into someone’s personal details or particulars though it may be attainable on a computer system but, according to computer ethics it would suggest tha... [tags: Personal computer, Computer]
1183 words (3.4 pages)
- As of September 2003, there were approximately 70 million Americans or about 62 percent of the American population had at least one home computer. Another statistic is that about 55% of people also have internet on there home computers. In everyday life it is important for a person to have good ethics; this is also true about computer usage. Due to the fact that more then half of the American population owns computers, computer ethics are a growing concern in a rapidly changing society. Computer ethics can be broken down in to many topics including piracy, hacking, viruses, spam, phishing, and responsibility of use of software, cyber porn, and invasion of privacy and the use of the computer... [tags: Ethics Morals Morality]
885 words (2.5 pages)
- Hacking, as we know, is present in our society. From time to time, we see on the news how a website or a database was hacked and passwords or even some credit cards information have been stolen. All of these events affect our communities and make us wonder how safe we are from a cyber-attack, after all, all of important data like our social security number are stored on databases. Even government agencies have suffered this intrusion from a hacker that has put at risk the safety of its citizens.... [tags: internet, ethics, safety, social media]
904 words (2.6 pages)
- Computer Hacking Precis of 'Who's reading your E-mail" The article exposes the vulnerability of computer data and of corporations with the popularity of the Internet. The Internet can allow hackers access to any computer in the world, with understated ease. Break-ins can go virtually undetected. Major corporations and government security departments have acknowledged that hacker break-ins are out of control. Some companies are too fearful to join networks because of this. Software programs brought out to deal with the growing problem, such as firewalls, are no longer totally effective.... [tags: essays papers]
2133 words (6.1 pages)
- Ethical hacking, in my opinion, is just as much as an oxymoron as ‘constructive criticism’. Before I go on to show that ‘ethical hacking’ is but an oxymoron only in the literal sense, it is essential for one to understand the words ’ethical’ and ‘hacking’ - origin, meaning and the misconception. ‘Ethical’ can be defined as ‘working with high professional morals and principles’. The original hacker was a person who liked to tinker with software and hardware alike, enjoying and exploring the way the things work.... [tags: Ethics]
843 words (2.4 pages)
- Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. In general, hacking or more specifically cracking is not justifiable due to the negative connotations associated with the term. Hackers are generally categorized into three categories, white hat, black or grey hat (Arnone, 2005). White hats are personnel that are often employed to find holes, penetrate or exploit a security system so the company can take corrective actions.... [tags: Technology, White Hat, Back and Grey Hat]
1637 words (4.7 pages)
- Hacking Describe a negative aspect of ICT’s impact on the information society. Describe how ICT has brought this about and what society is has done in response to it. Abstract Hacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects. Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found.... [tags: science]
4248 words (12.1 pages)