Preview

Demerits of Multilingualism to National Development in Africa

Powerful Essays
Open Document
Open Document
1932 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Demerits of Multilingualism to National Development in Africa
10373948
HACKING AND CRACKING ARE BOTH UNETHICAL A CASE TO SUPPORT OR DISAGREE Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic content, computer ethics would suggest that it is wrong to do so without the author 's approval. And while it may be possible to access someone 's personal information on a computer system, computer ethics would advise that such an action is unethical.
As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Hacking is unauthorized use of computer and network resources are the words used by Wikipedia in describing hacking. In recent years though, with easier access to multiple systems, it now has negative implications. In view of this I support the notion that hacking and cracking of computer software are both unethical.

Hacking is a felony in most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it 's ok. The key difference is that the ethical hacker has authorization to probe the target. A Worldwide Problem Software piracy is defined as the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers



Bibliography: 1. Banks, Michael A. (1997), Web psychos, stalkers, and pranksters: How to protect yourself online, Arizona (USA), The Coriolis group. 2. Chakrabati, Anirban and Manimaran, G. (2002), Internet infrastructure security: A Taxonomy, IEEE Network, November/December 2002, P.13. 3. CNET (2001), FBI “hack” raises global security concerns [online]. Available from: http://news.com.com/FBI+%22hack%22+raises+global+security+concerns/2100-1001_3-256811.html [Accessed 14th December 2004]. 4. Crucial paradigm (2003), Hacking attacks-How and Why [online], Crucial paradigm. Available from: http://www.crucialparadigm.com/resources/tutorials/website-web-page-site-optimization/hacking-attacks-how-and-why.php [Accessed 7th December 2004]. 5. Darlington, Roger. (2001) Crime on the net [online], United Kingdom, Darlington, Roger. Available from: http://www.rogerdarlington.co.uk/crimeonthenet.html [Accessed 4th December 2004]. 6. Digital Guards data base (2001), Glossary [online]. Available from: http://www.digitalguards.com/Glossary.htm [Accessed 10th December 2004]. 7. Furnell, Steven. (2002), Cybercrime: Vandalizing the information society, Boston; London: Addison-Wesley. 8. Himanen, Pekka. (2001), The hacker ethic and the spirit of information age, Great Britain, Secker & Warburg. 9. Levy, S. (1984), Hacker: Heroes of the computer revolution, New York: Bantam Doubleday dell. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge. 10. Marotta, M.E. (1993), ‘online with the super hacker’. Available from: http://www.kzsu.stanford.edu.uwi/post/mercury.html. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking Exposed 6: Network Security Secrets & Solutions. New York, NY: McGraw-Hill.…

    • 2643 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______ (1997). "Towards a Theory of Privacy in the Information Age," Computers and Society, Vol. 27, No. 3, September, 27–32.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Making Strong Passwords

    • 1119 Words
    • 5 Pages

    Nemati, H. R. (2008). Information security and ethics: Concepts, methodologies, tools, and applications (Vols. 1-6). Hershey, PA: IGI Global.…

    • 1119 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Digital Privacy

    • 2212 Words
    • 9 Pages

    Kuzu, A. (2009). Problems Related to Computer Ethics: Origins of the Problems and Suggested Solutions. Online Submission,…

    • 2212 Words
    • 9 Pages
    Best Essays
  • Good Essays

    The Web's Dark Side

    • 835 Words
    • 4 Pages

    This article by Mannix, Locy, Clark, Smith, Perry, McCoy…Kaplan (2000) titled The Web’s Dark Side discusses the not-so-popular side of surfing the internet, referred to as cyberspace–a rather outdated nickname–and plays out a week online with examples various crimes and misdemeanors, swindles, thefts, perils and problems of the internet. The types of crimes and wrongdoings is vast, and many various types of crimes are detailed with accounts of individuals, what crimes were committed, how it came about, and sometimes the outcome. The material demonstrates how fast the world of the Internet has developed: written thirteen years ago, it already hints of a day long ago, and therefore is enjoyable reading for the comparison of matters today. At the time it was breakthrough technology. If re-written, it could apply to today as well.…

    • 835 Words
    • 4 Pages
    Good Essays