The main question Cross addresses throughout his thesis is whether or not it is right for information to be withheld from us as people with basic rights. When speaking of hacking, one often thinks of a person going into forbidden files and retrieving information that is not meant for their eyes. Through this question of whether or not we have a right to pursue knowledge, Cross designates hacking as a means of accessing information that is necessary to our awareness as citizens. Information that is withheld from us by members of the government who wish to keep it secret. Despite what people may thin...
... middle of paper ...
... apply the knowledge they acquire.
Tom Cross’s article “Academic Freedom and the Academic Ethic” was a great read because it truly changed my perception of hackers and provided me with a new perspective of what hacking can actually bring to the table. I always believed that hacking was a bad thing done by malicious people. I now realize that thought there are bad hackers, many hackers follow an ethical code when acquiring information and deciding what to make of it. I have been able to pursue a lot of information largely in part because of hackers. As Cross says, “academic freedom should be restricted only as an absolute last resort, not as the fundamental basis of our national strategies for security and technological development in the 21st century” (Cross, 40) and after reading this article, I have both a new definition and appreciation for the term hacking.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Hacking has been in existence for more than a century. It all began when a group of teenage boys who were interested in knowing how the telephone worked than in making proper connections and directing calls to the correct place. Originally, hacking was not even seen as a negative connotation with which we associate the term with in today’s world. The term "hack" is a shortcut that would modify and improve the performance of a computer's operating system that would take less time to complete. (http://findarticles.com) This all started way back in 1971 where people began to hack into everything from phones, to bank accounts and then to computers.... [tags: Hacking Technology]
2488 words (7.1 pages)
- For much of the new millennia, computer network and security administrators have faced an ever-growing generation of evil, “Hackers.” Hackers wreak havoc on computer networks that do not have proper protection in place. They steal your information and sell it to the highest bidder, not thinking about what it would do to the person or company that they hacked. Let us take for instance, Edward Snowden, who is currently in Russia seeking asylum from the United States. Mr. Snowden illegally hacked the CIA network, stole classified documents, and sold them to the highest bidder.... [tags: inside, outside, hacking, ethical]
819 words (2.3 pages)
- Electronic hacking - a silent perpetrator, breaking through our defenses unnoticed. These silent criminals are way more dangerous than they seem. It is one of the most easiest, yet most treacherous types of offenses. This can be done through the Internet, electronic devices, and even personal personal accounts can get hacked. There are numerous threats that hacking brings to our world today. Despite this appalling fact, there are measures we can take to prevent it. Electronic hacking can be a deadly in many ways, but there are ways to prevent being affected.... [tags: Electronic Hacking Essays]
1073 words (3.1 pages)
- The Shady History of Sugar Industry Sugar has been around for centuries. In fact it can be dated as far back as 510 B.C. It was said that man first used sugar in Polynesia then spread to India then Persia, and Arab invaded Persia, and they studied how sugar was conducted. As a result of this sugar start to expands to different parts of the globe. Around the time Columbus sailed to the “New world” it was also recorded that in 1493 he took sugar cane plants to grow in the Caribbean. The soil there was so enriched that mass production was established quickly.... [tags: Sugar, Nutrition, Sucrose, History of sugar]
929 words (2.7 pages)
- Abstract Society relies heavily on technology for many things, but our use of technology opens us up to become victims of cybercrimes, like computer hacking. Hackers can be divided into three main categories: novice, intermediate, and elite. Hacking has been in the information technology (IT) field for a while. The first hackers appeared in the nineteen sixties and hackers have continued to make progress since then. People hack for a variety of reasons including ego, fun, knowledge, and profit. The first major hacking program, SATAN, caused controversy in 1995, and numerous hacking programs exist today.... [tags: Computer Network Security hacking]
1857 words (5.3 pages)
- Hackers: Control and Property The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it.... [tags: Hacker Hacking Computer Technology Internet]
857 words (2.4 pages)
- Have you ever been a victim of a cyber crime. Something as simple as a weird pop up that won't go away. Or maybe something a little bit more serious like your personal web page gets hi-jacked. All this "malicious" damage that causes you much grief isn't so much the work of a hacker, per se, but more the work of a "cracker" or a "script kiddie". Now you're confused right. Well let's just say everyone who knows how manipulate a computer isn't doing it on bad and evil terms, like writing a virus to deploy on a certain date to permanently delete certain file extensions.... [tags: Hacking Computer Security]
980 words (2.8 pages)
- Determine if hacking into a Web site is ever justifiable, applying your theory to a real-world case in which someone hacked into a system, including the name of the company and details. In general, hacking or more specifically cracking is not justifiable due to the negative connotations associated with the term. Hackers are generally categorized into three categories, white hat, black or grey hat (Arnone, 2005). White hats are personnel that are often employed to find holes, penetrate or exploit a security system so the company can take corrective actions.... [tags: Technology, White Hat, Back and Grey Hat]
1637 words (4.7 pages)
- Hacking Truths Manual Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap this Manual you need to have a basic understanding of the Windows Registry, as almost all the Tricks and Tips involve this file. Important Note: **************** Before you read on, you need to keep one thing in mind.... [tags: Hacking Hackers Computers Software Essays]
5247 words (15 pages)
- Hacking Computer Crime It's the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: Hacking, Phreaking, & Software Piracy.... [tags: Essays Papers]
1504 words (4.3 pages)