Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Negative effects of hacking on humans and society
Effect of internet hacking
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Negative effects of hacking on humans and society
Hacking, as we know, is present in our society. From time to time, we see on the news how a website or a database was hacked and passwords or even some credit cards information have been stolen. All of these events affect our communities and make us wonder how safe we are from a cyber-attack, after all, all of important data like our social security number are stored on databases. Even government agencies have suffered this intrusion from a hacker that has put at risk the safety of its citizens. How it all did begin and how it affects our society?
Hacking started out of curiosity around the 1970(Bowles). Hackers, who were called “phreak-ers” around that time, were among the brightest people. One of their main goals was to learn how the phone system worked, and try to use it for their benefit. One of the famous phreakers of that era was called “Captain Crunch”, he discovered that he could bypass the normal mechanism of the AT&T phone network and make international phone calls.
With the technology boom that occurred at the beginning of this century, hackers were divided into two groups, white hat and black hat hackers. Black hat hackers “can be characterized as people, groups, criminal organizations, governments and military with malicious intent.” The white hat hackers are the opposite of black hackers, they work in making databases and other penetrable systems secure and not accessible for black hat hackers. What drives hackers to become black hat? Most of the times, the reasons people decide to become black hat hackers are financial gain, trying to damage the image of a certain politician or because they want to be well known by society. Even hacking can be used to fight a war, for example some hackers targeted the Iranian nuc...
... middle of paper ...
... of this events, there have been many discussions wether the government should control the internet in order to prevent protests and riots.
In the example above, the internet was used for an unethical cause. Internet was used to coordinate and motivate people to cause commotion among the citizens. The dilemma now is how we protect the internet from these unethical usages. Social turmoil can be easily dispersed through the internet and it can cause damage to properties or even the physical safety of a citizen. That is why, even governments that are liberal are starting to think about controlling the internet because problems in the society can stir development backwards, specially social meadias.
Works Cited
Bowles, Matt. “The Business Of Hacking And Birth Of An Industry.” Bell Labs Technical Journal 17.3(2012): 5-16. Academic Search Premier. Web. 5 Dec. 2013
Hacking has two primary definitions; the first refers to the enthusiastic and skilful use of computers to solve problems (Techterms, 2013); the second, to “gain unauthorized access to data in a system or computer” (Oxford Dictionaries, 2013). In the context of this essay the second definition is more appropriate and will be the meaning inferred throughout. This definition also more closely aligns with legal terminology used in the UK when describing the hacking of computers. The Computer Misuse Act (1990) introduced three criminal offenses:
In reality, most hackers are ordinary people with a great deal of curiosity, above-average skills with a computer, a good understanding of human nature, and plenty of time to kill. Hackers have no distinguishing characteristics. Your next-door neighbor could be a hacker, as could your niece or nephew, one of your co-workers, or even the kid who serves you coffee in the morning. Not all hackers are dangerous and out to destroy business or damage lives. The view of the general public toward hackers is mixed. A recent CNN-poll shows 33% of respondents labeling hackers as "useful," 17% seeing them "as a menace," and the majority (45%) seeing hackers as "both" useful and a menace (CNN, 1999).
In conclusion Hackers started off as experts in programming and curious intellectuals advancing the limits of technology, but have evolved into a diverse world view. Additionally the shift from hardware onto software to the internet have boosted the increase in number of malicious hackers. With the emergence of new technologies so is the renewed efforts to combat the loopholes and help protect the public.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling is a book that focuses on the events that occurred on and led up to the AT&T long-distance telephone switching system crashing on January 15, 1990. Not only was this event rare and unheard of it took place in a time when few people knew what was exactly going on and how to fix the problem. There were a lot of controversies about the events that led up to this event and the events that followed because not only did it happen on Martin Luther King Day, but few knew what the situation truly entailed. There was fear, skepticism, disbelief and worry surrounding the people that were involved and all of the issues that it incorporated. After these events took place the police began to crackdown on the law enforcement on hackers and other computer based law breakers. The story of the Hacker Crackdown is technological, sub cultural, criminal, and legal. There were many raids that took place and it became a symbolic debate between fighting serious computer crime and protecting the civil liberties of those involved.
The documentary Rise of the Hackers, focuses on the rising criminal use of hacking and how it is effecting multiple areas of technology. The documentary describes simple and complicated situations concerning hacking, but there still questions that must be answered when it comes to hacking and crime. The main question is in trying to determine why a person would choose to commit computer hacking. There are various theories already present within the criminal justice system that may explain at a micro-level and macro-level. These theories would explain why offenders would commit the crimes, but it may not answer the full scope of the question. The Routine Activities Theory would help to explain why offenders offend, why victims are victimized,
Hacking has been around since the birth of computers. When the term hacking was first used, its meaning was not that of how we think of it today. At the origins of computing, a hacker was considered to be just a "creative programmer (Baase, 2003)." Early forms of computer games as well as the beginnings of operating systems were discovered and created by these original hackers. These hackers plunged into systems as a way of an intellectual challenge and to aspire to gain knowledge (Baase, 2003). Kevin Mitnick believes he falls into this realm of hackers. Hackers in today's era are now looked upon as criminals who invade the privacy rights of individuals and have the ability to deliver worms/viruses. The differences are that hackers today have full intentions of delivering terrible viruses and worms. Mitnick was one of the most infamous hackers during the 1980's. He molded his hacking style around the stupidity of humans and his quest for intellectual knowledge. The ways in which he wiggled his way into computer systems extenuates many of the issues surrounding computer security and privacy.
Goals: Black hat hacker goal is to bypass the internet security or a breach. their goal is to creating a computer virus and sent to a person or large organization to exploit sensitive data from their purposes.
While the liberty of speech on Internet strengthens the democratization, it also provides political dissidents with channels and arranges to undermine. McLaughlin (2007) reveals that in Middle East, the Internet offers non-state dissident actors a potentially potent tool to accomplish their political objectives. Consequently, without the nation-imposed constraint... ... middle of paper ... ... ool, the public even the nation might suffer inestimable disasters.
According to Wikipedia (2013b), hacker is someone who attack and seek into a computer system or network. They may motivated by different kinds of reason such as profit, to protest, to challenge a system, to grab information, etc. There are 3 types of hacker which can be classified into white hat, black hat, and grey hat. White hat hacker breaks the computer security for non-malicious reasons where they are actually to test their own security system. Black hat hacker violates the computer ethics and hacks system for their personal profit. Grey hacker hacks the computer system with the purpose of notifying the administrative of that system has a weak security system and provide them a better solution with a charge (Wikipedia, 2013b).
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
Harvey, Brian. A. Computer Hacking and Ethics. Ed. Paul Goodman, P.G., a.k.a. Electrical Engineering and Computer Science.
Internet is a vast network and it is the main cause and consequence of convergence of media. Internet is very distinctive as an electronic computer based strong interactive range. Internet is used for many functions such as emails for private conversations and transferring documents, chatting with family and friends anywhere in the world, Live Video Chats, gaming, browsing, shopping and watch live television shows. There are many benefits of internet but that doesn’t mean that it won’t harm the public or government. Sometimes government and many multinational companies store their information on internet which is later on hacked by different people from different parts of world and they leak that information which harms the country economically. In recent time Panama case harmed many countries but nobody found the hacker. Mobiles and tablets are also trending which means your privacy is in danger, you store something on cloud and later on it can be hacked and it can harm your private life , On 31st August hacker leaked the pictures of many celebrity from the strongest cloud service called Icloud. You cannot completely regulate the internet because everything comes from all over the world. Internet can be controlled by
The Internet provides a gateway for an individual to speak freely and anonymously without being targeted to what he or she said. With this said, one of the biggest issues concerning the Internet today is freedom of speech. The issue of free speech on the Internet has been a topic of discussion around the world within the past years. It is a unique communication medium and is powerful than the traditional media[2]. Because the Internet can not be compared equally to other mediums of communication, it deserves the utmost freedom of speech protection from the government. The restriction of speech on the Internet takes away from individual's rights and freedom from experiencing the Internet's benefits and uses. Information found on the Internet is endless and boundless and this poses the question, "should the government be allowed to regulate the information and content being transmitted or posted online?"
In 2012 the United Nations released a report declaring the internet access as a human right (United Nations, 2012). The way people use the internet today across the world makes it an extraordinary force. We can see its
The Internet along with other technologies has opened channels of communication. Not only has the Internet played a great role in forming international public opinions regarding the United States throughout the Middle East, Asia, and Western Europe, but it has also helped to democratize the rest of the world by allowing them to voice their own opinions. However, sometimes the incited cyber public opinions would lead to some extremely negative behaviors and cause serious problems like cyber bullying, real life crimes, and even a long time social unrest.