Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Concept of academic freedom
Concept of academic freedom
Ethical problems with hackers
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Concept of academic freedom
Hacking has historically been associated with shady behavior or criminal connotations. It is very rare that a person condones hacking or thinks of it as anything other than a crime. However, in his article “Academic Freedom and the Hacker Ethic”, Tom Cross challenges us to redefine a hacker and what they actually do. He forces the audience to think as he states that “knowing how to do something that might be harmful is not the same as causing harm” (Cross, 38). Using this powerful statement, Cross uses his article to give the reader a new take on hacking. He proceeds to explain that often times, the information that we receive as a public is a result of hacking into government systems. He provides us with a new perspective as he divulges the …show more content…
Cross encourages his audience to reject the notion that ignorance is bliss, that it makes you safer. He argues against the stereotype that hackers are criminals accessing information that does not belong to them by sharing the fact that “in the 1980’s, as computer networks grew and computer security problems grew with them, vendors, government agencies, and university labs kept software vulnerabilities secret from the general public, even as they quietly shared information with one another” (Cross, 39). Higher up agencies have always kept information from the general public. Why should we be denied the right to access knowledge that is directly relevant to us? Allowing these agencies to have power over what we can and cannot know is “threatening to produce regulations that deeply our personal and professional academic freedom” (Cross, 38) which impedes on our …show more content…
I always believed that hacking was a bad thing done by malicious people. I now realize that thought there are bad hackers, many hackers follow an ethical code when acquiring information and deciding what to make of it. I have been able to pursue a lot of information largely in part because of hackers. As Cross says, “academic freedom should be restricted only as an absolute last resort, not as the fundamental basis of our national strategies for security and technological development in the 21st century” (Cross, 40) and after reading this article, I have both a new definition and appreciation for the term
However, I feel users had a different vision/perspective on security mechanisms and they trusted each other during those times and did not have to worry about protecting their information (this is how exactly, one person’s ignorance becomes another’s person’s - hacker, here bliss). This book helps us to understand the vulnerabilities; its impacts and why it is important to address/ fix those holes.
The use of hacking to identify weaknesses in computer security has become an increasingly controversial issue in recent years. Awareness of this issue is important, because our ever increasing reliance on technology means that breaches in computer security have the potential to have wide-ranging and devastating consequences to society, worldwide. This essay will begin by clearly defining the term ‘hacking’ and will examine the type of people who hack and for what reasons. There will then follow a discussion of the moral argument on hacking before examining a few brief examples. The essay will then conclude by arguing against the use of hacking as a means of identifying weaknesses in computer security.
According to Webster's Revised Unabridged Dictionary, theft is, "The act of stealing; specifically, the felonious taking and removing of personal property, with an intent to deprive the rightful owner of the same" (Webster's 2). Before the advent of moveable type, no one had cause to apply this concept to information rather than physical property. If one were to steal a book, the act was easily recognized as of the same moral color as stealing a horse, a nugget of gold, or any other physical object. The thief?s possession of the stolen item constituted the rightful owner?s lack of it, a loss both real and measurable. Today, theft seems a hazier concept, due to the popularization and codification of Intellectual Property (IP) rights. IP rights differ from standard property rights in that they signify an individual's right of ownership over "intangible things" (Kinsella 3). Arguably, the most important such things are patents and copyrights. Patents protect inventions, and copyrights protect "original forms of expression" (Fisher 1). In both cases, the right to ownership amounts to ownership of an idea, not a physical object.
In reality, most hackers are ordinary people with a great deal of curiosity, above-average skills with a computer, a good understanding of human nature, and plenty of time to kill. Hackers have no distinguishing characteristics. Your next-door neighbor could be a hacker, as could your niece or nephew, one of your co-workers, or even the kid who serves you coffee in the morning. Not all hackers are dangerous and out to destroy business or damage lives. The view of the general public toward hackers is mixed. A recent CNN-poll shows 33% of respondents labeling hackers as "useful," 17% seeing them "as a menace," and the majority (45%) seeing hackers as "both" useful and a menace (CNN, 1999).
In this book Sterling discusses three cyberspace subcultures known as the hacker underworld, the realm of the cyber cops, and the idealistic culture for the cyber civil libertarians. At the beginning of the story Sterling starts out with discussing the birth of cyberspace and how it came about. The Hacker Crackdown informs the readers of the issues surrounding computer crime and the people on all sides of those problems. Sterling gives a brief summary of what cyberspace meant back then and how it impacted society, and he investigates the past, present and future of computer crimes. For instance he explains how the invention of the telephone led to a world that people were scared of because the telephone was something that was able to let people talk to one another without actually being in the same area. People thought that it was so strange and so different because they didn’t understand all of the information behind it. Back then people thought of the telephone as a tool that allowed others to talk to them in a way that was so personal yet impersonal. Sterling then goes on to explain how “phone phreaks” played such an important part in relating the telephones to computer crimes and how they were so closely related back then.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
...difficult to try and tell someone that ethics and moral are important for an individual or our society. Hacktivism being a recent adaptation of computer hacking has spread through out the world consistently from years ago. Some are political activists trying to make a point and achieve some goals and getting through tot the people. Hacktivist show society what the new problems are in the world without permission of the law. Some show what could happen if there was a full on cyber terrorism placed against us. In the end, these actions that were used to only show what could happen have turned into being a message that shows us they are just as dangerous as anyone else. The fear people have of hackers is about the same as criminals on the street.
Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003). Kevin Mitnick believes he falls into this realm of hackers. Hackers in today's era are now looked upon as criminals who invade the privacy rights of individuals and have the ability to deliver worms/viruses. The differences are that hackers today have full intentions of delivering terrible viruses and worms. Mitnick was one of the most infamous hackers during the 1980's. He molded his hacking style around the stupidity of humans and his quest for intellectual knowledge. The ways in which he wiggled his way into computer systems extenuates many of the issues surrounding computer security and privacy.
Mr. Swartz’s actions in the cyber world proved that hacking could be attributed to a greatercause beyond personal gains despite the legal ramifications. In this case, to provide many peoplewith the same resources and knowledge as privileged people. Mr. Swartz’s is seen as a vigilante by his supporters. The FBI’s position on prosecuting Swartz was justified legally because he did,in fact, manage to download thousands of protected journal articles. However, it was seen by Swartz’s supporters that the charges against him were extreme and did not fit the crime.
Hacking was a term established in the 1960s. This word is the concept of unauthorised intrusion of a computer or network with malicious intentions behind them. This includes any technical effort of manipulating or damaging the normal behaviour of network connections/systems or stealing information. In this generation, hacking has become evidently significant and the debate of hacking being considered ethical or unethical arises. Therefore, will hacking ever be justified? The justification (reasonableness) of hacking has become a disputation of mixed opinions and emotions amongst society. These opinions range from hacking being considered immoral due to it being illegal activity and the vast negative impact it has on people. This includes the affirmative opinions on hacking; such as hacking being considered ethical due to the “white hat” hackers.
Since the role of legal institutions in legitimate states are to act as state organs for justice, and ideally, the promotion of ethics, several concerns have been raised in the last decade over how hacktivism might be punished by the law. Manion and Goodrum note that in the eyes of U.S. law, no distinction is made between hacking by itself a criminal activity and hacktivism which may be criminal, the case could be made that they should be protected under the First Amendment. Both are penalized under the same directives, which some experts have decried as unethical. The opponents of the currentday legal framework for morally justified hacktivism include Peter Ludlow, a philosophy professor at Northwestern University.
The issue with tackling the ethical hacker scenario is that the event is almost entirely action based. There is no end to give meaning to the action and there is no finalized result or indication that it impacted happiness, which many ethical theories depend on. Namely consequentialism, utilitarianism and ethical egotism require an end result in one form or another. There is also no purpose in committing the hackings which makes applying moral theories that deal with motivation and intent, ethical egotism and aspects of virtue ethics, increasingly more difficult to do effectively. Therefore moral theories that apply almost exclusively to the action itself will be utilized in this argument.
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
Since the creation and development of the Internet, hackers and intelligent software developers have been able to spread viruses that cause great harm to corporations and households. The Internet has been the gateway for hackers into their journey of obstruction. For example, through the loopholes of Microsoft’s IIS services on its server operating system packages, hackers have been able to open “backdoors” into some of the most complex intranet firewall protected networks of the world. Once the access has been made available, hackers have the opportunity to manipulate data, retrieve confidential data, and destroy systems containing critical data with the help of their developed viruses. The fact of the matter is, hackers and other cyber criminals cause great amounts of financial damage to corporations and other smaller scaled victims. The ethical question to consider when dealing with virus control is: Is it unethical to take extreme measures to avoid hacker attacks, even when we are taking away people’s autonomy and obstructing their privacy?
“Academic freedom is the freedom of a teacher to state personal opinions openly without censorship, or without the fear of professional disadvantage or the freedom of students to choose their courses or influence the content of courses” (academic). It has been questioned for years on just about how much academic freedom are teachers and students granted. Academic freedom should be more recognized for students and teachers in schools, it is similar to freedom of speech, it allows faculty and staff to teach what they wish and is supposed to allow students the choice of what courses they would like to take.