Preview

Coding Reaction

Good Essays
Open Document
Open Document
778 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Coding Reaction
When one thinks of anthropology, the mind tends to skip to a foreign land with exotic people and customs, yet we often forget to pay attentions to the different cultures that are close to home. Throughout the past few decades, technology has had an increasing impact on our culture. The development in technology is driven by those who have a passion for delving deep into the underlying mechanics to unravel mysteries of the technology and to further develop it for both their own needs and the needs of others. “Coding Freedom” by E. Gabriella Coleman explores and analyzes a new culture that has developed amongst these passionate individuals, known as hackers, who have helped advance new technology in recent years.
Coleman first attempts to provide a solid background and introduction to world of hacking. While doing this, she also attempts to show that hacking is much more than a simple act. It has brought people together to form an entire social formation linked through the thousands of computers and networks throughout the world. She wants to illustrate that the hacking culture is a distinct culture that incorporates many of things that are used to validate other cultures. For example, Coleman shows how the hacker culture has developed and changed throughout time do to development in new technology. “The fact that the BBS period is now over indicates that much of the hacker lifeworld is constituted through technological infrastructures with their own features and histories, and as subject to birth, growth, and decay as any other social formation” (Coleman 2012:31). This shows how the hacking culture is similar to many other cultures that have been studied. They have their own features and their own memories that define who they are and how they act.
Personal computers are a main staple of the hacker culture. They are the main way in which hackers can employ the techniques, though other mediums are becoming more prevalent in recent years. In this sense, personal



Cited: Coleman, E. Gabriella. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton: Princeton UP, 2013. Print.

You May Also Find These Documents Helpful

  • Powerful Essays

    Mgt7019-5 It Challenges

    • 3406 Words
    • 14 Pages

    |Moor, J. H. (2001). The Future of Computer Ethics: You Ain’t Seen No thin’ Yet! Ethics |…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    hacking. In what ways does ethical hacking differ from “black hat” hacking? Put yourself into the…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    CSS350 IP5

    • 6832 Words
    • 19 Pages

    In today’s world it is an indisputable fact that computers and digital devices are a part of our everyday lives. As such they are a part of our society whether they are used for business or for personal reasons. There are many uses for computers. We can use them to track our finances, keep databases of information about our clients, and use them to save pictures and documents. Sometimes computers are used in the commission of a crime like hacking systems for credit card information or launching computer viruses against a target. Sometimes they are used to communicate with others about the details of a crime, plan a crime, or share illegal media like child pornography. Other times computers can be misused and lead to loss or theft of data resulting in system downtime or monetary losses for an organization.…

    • 6832 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    The author adds how a refugee from an undeveloped country was haggard so strongly to computer science. The helplessness he had felt in a childhood where others determined his…

    • 526 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Flawfinder

    • 277 Words
    • 1 Page

    Phillips, S., & Oriyano, G. (2010). Hacker Technique, Tools, and Incident Handling. Jones & Bartlett Learning…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    As technology becomes increasingly available in today’s society, so too are technological users, digitally stored information as well as computer programmers. The more one knows about technology, they more they are can take advantage of its efficiency as well as suffer some of its draw backs or manipulate technology to their own advantage. The invention of the computer brought about a whole new way to transmit and store information. It is still so new, in fact, that users are still muddled about the ethics behind the use of technology. Richard Spinello, author of CyberEthics: Morality and Law in Cyberspace, introduces some varying ideas of ethics and applies them to modern technology. In particular, several ethic models that he uses will be…

    • 1459 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    _______ (1999b). "Computer Ethics Textbooks: A Thirty-Year Retrospective," Computers and Society, Vol. 29, No. 3, September, 26–31.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking. Indianapolis, Indiana: John Wiley and Sons.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Best Essays

    Hacking, I. (2004). Between Michel Foucault and Erving Goffman: between discourse in the abstract and face-to-face interaction. Economy and Society, 33(3), 277-302. doi: 10.1080/0308514042000225671…

    • 4125 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    This book shows the many aspects of social engineering and it goes into detail on how the social engineer thinks, plans, and executes his or her’s attacks. The author, Christopher Hadnagy uses his real knowledge and experiences to take the reader on a long and engaging ride on the subject. The book asserts that human hackers not only scam others because of greed, but in order to stay powerful. One of the important main ideas is the influence and the power of persuasion. The author notes that people are trained from a young age in nearly every culture to listen to and respect authority. When the social engineer takes on that role of authority, it becomes a most powerful tool; far more powerful than any software or piece of technology. This relates to the show, White Collar, because Neal takes on many different identities, so he can manipulate others into thinking he is someone that he’s not. He does this to obtain information, money, or whatever else he wants. Like many criminals, Neal has many aliases, and his most used one is Nick Halden, which he uses when he meets new people, so they don’t judge him based on his past criminal life. This source is useful when research on social engineering is needed to support the thesis and the argument of the research paper. The information and facts from this book correlate with the examples from the T.V. show, White Collar, thus allowing a deeper analysis of the operative word and its definitions.…

    • 2588 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    Hacking, I. 1995. The looping effects of human kinds. In D. Sperber, D. Premack, A.J.…

    • 10224 Words
    • 44 Pages
    Powerful Essays