A diffuse group of people often called "hackers" has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause damage. Furthermore, my research also suggests that the general practice of hacking is a part of larger conflicts that we are experiencing at every level of society and business in an information age in which many people are not computer literate. These conflicts lie on the issue of whether information should be made publicly available or not (centralise or decentralise government) and on issues of law enforcement. Hackers have raised serious issues about values and practices in an information society.
It is true that computers and telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today's technology. The Internet can be used for criminal purposes in different ways: from a simple blackmail' to the most perplex crime like money laundering.
"Technology can be applied as easily by the criminal and terrorist as it can by the authorities; and very often the criminal has greater desire to profit from that technology than have the authorities themselves" .
Furthermore, companies, institutions and private lives, especially in western countries, are prevalent by computers, Internet and... [continues]
Cite This Essay
(2005, 04). Computer Crime Hackers and Security Measures from Research Assistance. StudyMode.com. Retrieved 04, 2005, from http://www.studymode.com/essays/Computer-Crime-Hackers-And-Security-Measures-54546.html
"Computer Crime Hackers and Security Measures from Research Assistance" StudyMode.com. 04 2005. 2005. 04 2005 <http://www.studymode.com/essays/Computer-Crime-Hackers-And-Security-Measures-54546.html>.
- MLA 7
"Computer Crime Hackers and Security Measures from Research Assistance." StudyMode.com. StudyMode.com, 04 2005. Web. 04 2005. <http://www.studymode.com/essays/Computer-Crime-Hackers-And-Security-Measures-54546.html>.
"Computer Crime Hackers and Security Measures from Research Assistance." StudyMode.com. 04, 2005. Accessed 04, 2005. http://www.studymode.com/essays/Computer-Crime-Hackers-And-Security-Measures-54546.html.