In the film Hackers computer hackers are portrayed as peculiar super-heroes in an attempt to both obliterate old stereotypes and to elevate their status. The first scene commences with F.B.I. agents equipped with large firearms who break into a house to arrest David Murphy, who is eleven years of age at the time. The negative perception of a hacker is challenged when the viewer is shown the computer nerds side of the account. By the time the motion picture ends, several stereotypes become evident relative to the portrayal of a hacker. These stereotypes are refuted in various ways, including an attempt to portray the hacker in ways that I did not expect. The point taken is that the traditional stereotypical perceptions of the hacker need to be abandoned, and the director makes that view clear by creating his own unusual visualizations. When I imagine a hacker, I assume that the computer savvy individual is a teenage male with little or no social life, lacking an understanding of fashion and the ability to communicate with other not-so-computer-savvy teenagers. Not only does this film refute many of my preexisting notions about hackers, but the picture also tends to go to the opposite extreme. The focal characters dress as if they belong more to a biker gang than to a company of hackers. Sporting pungent leather outfits, hackers apparently party more than most college students. Attending rave-like gatherings, dancing and video game playing frequently occurs. Several women, including the lead female character, attend these parties, thus altering my original assumptions about the hackers social life. The point is that stereotyping is inaccurate, because many members of a group are different fr...
... middle of paper ...
...empt to eliminate all stereotypes. The way the hackers dress, act, socialize, interrelate, and appear larger than life are all attempts to change their image through exaggeration. Their uniqueness proves they cannot accurately be categorized and described in any one particular way. According to the movie, hackers can be male or female, they have the same needs and desires as any other community of people, they often strive for a common good, and they are not necessarily nerds. Having viewed the film in its entirety, I feel that the premise the movie makes can be applied to other segments of the general population, as well. It appears that stereotyping on the whole is wrong whether it is of hackers or of any other group. We must view people as individuals and realize that there is both good and bad in everyone regardless of the group to which they may be affiliated.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- It is held by many people today that the World seems to be a small global village because of internet and use of ICT and computers. There are many different issues and cases in Information and Communication Technology as well as in other fields that need proper analysis leading to correct decisions for solutions. Because of the brevity of the assignment, I would like to talk about security in cyberspace to deal with hacktivism and hacker ethics. Security in cyberspace or computer laboratory nowadays is risen an issue that needs solutions among computer users who always like to interact with computers.... [tags: computer systems, attacks, harm]
1097 words (3.1 pages)
- The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling is a book that focuses on the events that occurred on and led up to the AT&T long-distance telephone switching system crashing on January 15, 1990. Not only was this event rare and unheard of it took place in a time when few people knew what was exactly going on and how to fix the problem. There were a lot of controversies about the events that led up to this event and the events that followed because not only did it happen on Martin Luther King Day, but few knew what the situation truly entailed.... [tags: essays research papers]
1754 words (5 pages)
- Cyber Security It seems like everyone in today’s society has access to a computer, a cell phone, or some other type of technology that allows information to be passed from one person to another through space. With your private information out there in cyberspace, clever thieves are finding ways to access your personal informational and to steal from you without you even knowing about it until it is too late. The thieves are taking your personal data and using it to gain access to your accounts. In fact, there are many different ways thieves are threatening your safety in cyberspace.... [tags: security, computer, hackers]
1034 words (3 pages)
- The Kevin Mitnick case was a very interesting case from the late 1900’s. According to CNN, “Kevin David Mitnick -- the most wanted computer hacker in the world, the inspiration for two Hollywood movies and a cyberspace cult hero -- had been scheduled to stand trial April 20 in Los Angeles in one of the most celebrated computer-related cases in history” (Christensen, 1999). The big question in Mitnick’s case was does Mitnick really have a case.... [tags: Kevin Mitnick, Computer Hacker]
2116 words (6 pages)
- Privacy in Cyberspace Computers and the Internet have changed many things in the world today. People surf the web on a daily bases for information and entertainment. The Internet is making things like paying your bills from home a possibility. This was something that you had to leave the house to do, even if it was just dropping a check in the mail. Now you can pay your bills and buy your groceries, with every thing being just a point and a click away. Other things that can be done on the Internet is E-mail and stock trading.... [tags: Internet Essays]
986 words (2.8 pages)
- ... Core rule number one states that one should “remember the human” (Shea, 1994). This means that one should take into account the other persons thoughts and feelings. Not everyone is going to agree on the same topic, food, or ideas. Core rule number eight states that one should “respect other people’s privacy” (Shea, 1994). One can assume that people prefer privacy but many tend to invade each others privacy quite often. There are ways to help keep invasion of privacy at bay. For example, if a colleague gets up from their desk and leaves, ask them to turn their computer screen off.... [tags: privacy, hacker, technology]
764 words (2.2 pages)
- Cyber Security as an International Security Threat National and International Security is a sum of the actions taken by countries and other organizations that can guarantee the safety and well being of their population. It is vital for a nation to pre-emptively discover what issues could affect their security, and take action to prevent any detrimental or harmful events from happening. With the development of technology and the transition into a more technologically savvy society, cyber security has become one of the most prevalent and important economic and national security issues that the United States will come to face.... [tags: cyber terrorists, cyberspace]
2186 words (6.2 pages)
- Hackers, a lot of people think of the same thing once they hear that word the first thing that pops in to your mind is of person with no life trying so hard to break into your home computer or into a federal website. A hacker can mean more than that it can a person that is trying to crack a game and make it better or it can just be a person who wants to know the in an outs of how a computer works. The term hacker first originated in Massachusetts Institute of Technology “MIT” in the early 1960’s.... [tags: Black hat, Hacker, Grey hat, Hacker]
1345 words (3.8 pages)
- ... You can make up to $90,000 a year but all of a sudden your bank account was $0.00 along with all your coworkers, bosses and the company stock dropped to zero. There would be panic, chaos and disorder due to everyone losing their money. The culprit of such a chaotic situation was a result of a cyber-attack by a hacker. The cyber attacker hacked into the system and caused the databases to transfer all of the money into some bank accounts elsewhere. This is just one example of cyber terrorism and all the damage it is can do to people lives.... [tags: information, cyberspace, access, internet]
1109 words (3.2 pages)
- In 1984, Neuromancer, the debut novel of a largely unambitious American-Canadian named William Ford Gibson was published. Opening with the line, “The sky above the port was the color of television, tuned to a dead channel,” Gibson unwittingly tapped into the emerging literary and artistic aesthetic known as cyberpunk, realized previously in the form of films such as Blade Runner and in the works of fellow science fiction writers such as Bruce Sterling. In Neuromancer, a disgraced ex-hacker named Henry Dorsett Case, who has been literally drained of his talents after attempting to double-cross his last employer, is hired by a mysterious benefactor willing to restore his talents for the ultima... [tags: Cyberpunk Hacker Hacking]
1774 words (5.1 pages)