Ethics of Computer Hacking Essay examples
850 Words4 Pages
Hackers: Control and Property
The ethical issues surrounding hacking, stem from several sources mainly dealing with order and control, and information ownership. What is difficult to decipher from all the media hoopla surrounding the terms, "hacker" and "hacking" is both the simultaneous sensationalism and the condemnation of said activities. Of course just recently, even a movie was made and was appropriately called Hackers. The term and all that it implies has truly entered our popular consciousness when Hollywood has made a box office movie on it. As the advancement of computer technologies and systems of information become increasingly more and more complex in today's fast paced modern world and said technologies become an integral…show more content…
"Hackers", on the other hand probably view the system more abstractly, as a resource waiting to be used at the end of a telephone line, a challenge beckoning them, calling to them irresistibly, whispering to them, "There will be no damage done and no one will be the wiser."
On either side of this debate is the concept of free information. What is information anyway? Can it really be free? The Internet is a complex series of systems of information in which the circulation and distribution of these systems can create even more complex institutional relationships among the systems. Information, in and of itself should be available to anyone, in theory. Yet there is the other side, in which a terrorist can hack into the U.S. Defense Department or NASA databases and start a nuclear war. There must be some middle ground that can be reached in which the ideal of free information and the protection of property rights can coexist in harmony. What solution we have so far can only be to protect
Computer Hacking Essay
Hacking is using your knowledge to gain more knowledge. This is one of the best definitions I could find on the net. Hacking is state of mind. Curiosity is the main point; a hacker always wants to know everything. It is the curiosities that which makes them learn more and more quickly than other person at same age. Traditionally hackers were regarded as ?geeks?, who knew everything about computers (hardware & software) & networks. They are very intelligent programmers.
The term hacker was popularized by Steven Levy in his famous book ?Hackers: Heroes of Computer Revolution?. When he said hacker, he meant a brilliant, constructive programmer who led the way to the computer revolution. About's Net Security Portal announces the same verdict while explaining what a hacker is, "A person who is extremely proficient at programming and programming languages. A computer enthusiast. Someone who is obsessive about programming, programming languages or computer systems & networks." Computer hacking can be traced back to the late 1950? and early 1960?s. At that time companies and universities were using mainframe computers with dumb terminals. There was no such thing as the Internet. At this time a hack was ?shortcuts that would modify and improve the performance of a computer?s operating system or applications and allow more tasks to be completed in a shorter time.? as stated by Michael Devitt in A Brief History of Computer Hacking. The hackers in this period were mainly skilled workers who were proud of their work and found joy in doing so. The ?original hacker? at the beginning of computers was a person not looking to harm anyone or anything, but simply looking to apply his special skills to the improvement of the computer field. As they progressed into the 1970?s and 1980?s, the role and sense of computer technology began to change. Computer technology began to be viewed as a tool of power. Many people felt that this tool should be available to all people. In 1984, these individuals began to be referred to as ?second wave hackers.? Second wave hackers (although they did not refer to themselves by this name) were characterized as wanting computers and their computer systems to be designed to be useful and accessible to citizens. In the process, they pioneered public access terminals, computer conference, and personal computers.? As they continued into the mid to late 1980?s, the so-called ?computer underground? emerged. With the emergence of the underground, hacking once again took on another meaning. From that point in time to the present hacking means ?to break into or sabotage a computer system, and a ?hacker? is the perpetrator of such activities.? As time progressed, the definition and societal view of hacking changed...
Loading: Checking Spelling0%