Preview

Cyber Ethics

Good Essays
Open Document
Open Document
1006 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Ethics
Cyber Ethics
The chapter 12 narrative by Joseph Menn, “Hackers Live by Own Code”, establishes the claim that hackers have several ways to justify their actions. In order to illustrate this claim Menn uses the example of Mary Ann Davidson. It all started when Davison, the chief security officer for Oracle Corp., received a fax from a hacker in the Middle East stating that he was able to pilfer information from corporations such as Boeing Co., Ford Motor Co. and the CIA (Lawrence Hinman, 463). It is no surprise that once Davidson was aware of this she took immediate action and contacted the hacker. However, what was surprising is that after she contacted the hacker, Davidson described him as a “nice guy” (Hinman, 463). The significance of this example is that Menn is emphasizing the point that despite public opinion hackers are just like any ordinary person. Menn continues to elaborate on this idea by highlighting the so-called purpose of a hacker’s actions, which is to help by making “software more secure” (Hinman, 463). In their minds hackers believe they are helping because they are pointing out software’s weaknesses such as loopholes that allow them easy access to private information. Menn describes this concept by describing hackers as “the sort of people who set aside the instruction manual and take a machine apart to see how it works” (463). This description eliminates the negative image one typically associates with hackers, and instead it portrays them as curious individuals who seek a deeper understanding of how things operate. I, for one, disagree with this position because hackers are invading private information whether it is from a corporation or an individual. It is clear that corporations and people do not want an outsider viewing their confidential information. Therefore, the act of finding ways to view this type of data is equal to that of intruding. This notion of intruding proves to be an underlying theme in Oxford scholar, Luciano

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    as well as the ethical dilemmas inherent in hiring a hacker as a security consultant.…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Stereotypical cybercriminals range from unsophisticated “script kiddies,” who lack programming skills, to expert criminals who create custom exploits and attack tools. Many cybercriminals disregard computer crime laws and often rationalize why those laws are invalid or inapplicable, especially when espousing political agendas against corporate practices or national policies.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    ARTICLE SUMMARY

    • 1028 Words
    • 7 Pages

    An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.…

    • 1028 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Allow me to introduce you to Tucker Max. Max is a self-described “celebrity drunk A-hole.” His web site, tuckermax.com, has been twice embroiled in defamation lawsuits. The latest such suit was summarily dismissed by a federal district judge in Philadelphia, but the opinion that accompanied the dismissal holds some interest for college media outlets.…

    • 3144 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    “A simple definition of cyber-crime would be unlawful acts wherein the computer is either a tool or a target or both.”1…

    • 819 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    The Internet doesn't make people unethical; it only enables unethical people to do what they were always going to do - cheat, plagiarize, infringe on copyrights - easier and faster.…

    • 649 Words
    • 3 Pages
    Satisfactory Essays