Itrends

Only available on StudyMode
  • Topic: Computer, Black hat, Hacker
  • Pages : 6 (1536 words )
  • Download(s) : 15
  • Published : February 21, 2013
Open Document
Text Preview
HACKTIVIST: HACKING AS AN ETHICAL AND CONSIDER
AS UNETHICAL MOVE IN WORLD WIDE WEB

A Research Paper Presented to
Mr. Dustin Celestino
School of Multimedia Arts
Asia Pacific College
Magallanes, Makati City

In Partial Fulfillment
of the Requirements for the Course
ERESWRT ABMA-123
Term 3, school year 2012-2013

by
Krisleen June B. Rivera
February 2013

Chapter 1
INTRODUCTION

A. Background of the Study

Before the world of computers came up, the word hack is already used a long time ago. From the era of the creative minds, Socrates and Galileo, hack can be a different word to them but it means they have their own theory and techniques on how to manage to run not a system but the mind of others. Having a subject like Information Security, there are some chapters that will be discuss using .PDF files and there will also be a short documentary viewing about hacking. The word hack was already existed since then. It even started on the telephone lines. Some of the hackers are called “phreaks” or “Phone Phreaking”. It is the art and science of cracking the phone network (so as, for example, to make free long-distance calls). By extension, security-cracking in any other context (especially, but not exclusively, on communications networks).

Age does not matter on hackers. Hackers can be around their mid-20s or 30s and above. There are also teens who can hack different kind of system just by using their computers and doing some hacking skills. Many kind of attacks can be executed not just physically but also through the use of systems and computers. There is an article from outspan which is Meaning of Hacking and the Different Kind of Hackers. The author named outspan said that, “When you hear news about hackers penetrating a website, your reaction will typically involve dilating pupils and astonishment -- if the website is your own, symptoms may include a big deal of swearing and deep hate for the hacking community as well. What you probably don't know, though, is that not all hackers are doing this for their pure amusement: some of them may have done it without malicious intentions, some others even with the aim of improving your security system. Despite what you may have heard, the meaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability and desire to understand the inner mechanisms through which different components in the ICT world (typically computer programs) work. For this reason, even regular computer programmers are sometimes referred to as hackers. However, it would be impossible to group all 'hackers' in a single category: the reasons that may bring someone to break a site (or computer program) security can be varied and span from noble intentions (security testing/improving by attack simulation) to not-so-noble ones (testing their programming ability, accessing secret information, or just doing it for the sake of doing it). Or even for political reasons.” (http://outspan.hubpages.com/hub/Meaning-of-Hacking-and-the-Different-Kinds-of-Hackers).

With the aid of mass media, the word “hacking” has developed a negative connotation rather than the positive one it used to have. Defining someone as a good hacker should contain an ethics on how it will be performed using their skills. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks. (http://www.computerworld.com/s/article/91549/Is_hacking_ethical_).

Since this study is in the part of hacktivist, this research paper will focus knowing only who hack in the form of political activism and can be questioned if they can be considered as an ethical or unethical in their actions.

B. Statement of the Problem

This study aims to answer this question:

1. Does the hacktivist can be considered as ethical or unethical in their move or action in the World Wide Web?

C. Significance of the Study...
tracking img