A diffuse group of people often called "hackers" has been characterised as unethical, irresponsible, and a serious danger to society for actions related to breaking into computer systems. In this essay I try to construct a picture of what is and includes a computer crime as well as a portray of hackers, their concerns, and the way in which hacking takes place. What I intend to argue is that, in their majority, hackers are learners and explorers who want to help rather than cause damage. Furthermore, my research also suggests that the general practice of hacking is a part of larger conflicts that we are experiencing at every level of society and business in an information age in which many people are not computer literate. These conflicts lie on the issue of whether information should be made publicly available or not (centralise or decentralise government) and on issues of law enforcement. Hackers have raised serious issues about values and practices in an information society.
Introduction
It is true that computers and telecommunication networks have become a growing aspect of our society and of course of our lives. This type of technology is used to support unlawful as well as legal activities. Personal computers and especially the Internet consist of a collection of tools, which attract people from all social classes. People like housewives, workers and chief executives. Nowadays criminals are a group of people that are also attracted by today 's technology. The Internet can be used for criminal purposes in different ways: from a simple blackmail ' to the most perplex crime like money laundering.
"Technology can be applied as easily by the criminal and terrorist as it can by the authorities; and very often the criminal has greater desire to profit from that technology than have the authorities themselves" .
Furthermore, companies, institutions and private lives, especially in western countries, are prevalent by computers, Internet and
Bibliography: Barrett N (1996) The state of the cybernation: cultural, political and economic implications of the Internet. Kogan page, London. Barrett N (1997) Digital crime: policing the cybernation. Kogan Page, London. Bequai A (1987) Technocrimes. Lexington Books, Lexington, Mass. Doswell R T and Simons G L (1986) Fraud and abuse of IT systems. Ncc, Manchester. Forester T and Morrison P (1994) Computer ethics: cautionary tales and ethical dilemmas in computing.(2nd) MIT Press, Cambridge, Mass. Guisnel J (1997) Cyberwars: espionage on the Internet. Plenum Press, New York. Lobbecke C Content providers on the Internet: A dicussion paper on opportunities, limits and impacts. Mandell S L (1992) Computers and information processing: concepts and applications.(6th) West Publishing, St Plant S (1997) Zeros + ones: digital women + the new technoculture. Fourth Estate, London. Porter D (1996) Internet culture. Routledge, London. Sieber U (1986) The international handbook on computer crime: computer related economic crime and the infringements of privacy. Wiley, Chichester. Taylor P (1999) Hackers: crime the digital sublime. Routledge, New York. Wasik M (1990) Crime and the computer. Oxford university press, Oxford.