Preview

Cyber Ethics

Good Essays
Open Document
Open Document
1006 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Ethics
Cyber Ethics
The chapter 12 narrative by Joseph Menn, “Hackers Live by Own Code”, establishes the claim that hackers have several ways to justify their actions. In order to illustrate this claim Menn uses the example of Mary Ann Davidson. It all started when Davison, the chief security officer for Oracle Corp., received a fax from a hacker in the Middle East stating that he was able to pilfer information from corporations such as Boeing Co., Ford Motor Co. and the CIA (Lawrence Hinman, 463). It is no surprise that once Davidson was aware of this she took immediate action and contacted the hacker. However, what was surprising is that after she contacted the hacker, Davidson described him as a “nice guy” (Hinman, 463). The significance of this example is that Menn is emphasizing the point that despite public opinion hackers are just like any ordinary person. Menn continues to elaborate on this idea by highlighting the so-called purpose of a hacker’s actions, which is to help by making “software more secure” (Hinman, 463). In their minds hackers believe they are helping because they are pointing out software’s weaknesses such as loopholes that allow them easy access to private information. Menn describes this concept by describing hackers as “the sort of people who set aside the instruction manual and take a machine apart to see how it works” (463). This description eliminates the negative image one typically associates with hackers, and instead it portrays them as curious individuals who seek a deeper understanding of how things operate. I, for one, disagree with this position because hackers are invading private information whether it is from a corporation or an individual. It is clear that corporations and people do not want an outsider viewing their confidential information. Therefore, the act of finding ways to view this type of data is equal to that of intruding. This notion of intruding proves to be an underlying theme in Oxford scholar, Luciano

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It530

    • 681 Words
    • 3 Pages

    as well as the ethical dilemmas inherent in hiring a hacker as a security consultant.…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Good Essays

    -A Cartesian coordinate system specifies each point uniquely in a plane by a pair of numerical coordinates, which are the signed distances from the point to two fixed perpendicular directed lines, measured in the same unit of length. Cartesian coordinate system is a way of locating objects in either two- or three-dimensional space by specifying their X(horizontal) position, Y (vertical) position and Z (through) position. It is used in graphics and in positioning text on documents.…

    • 669 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    that they are capable of doing so. By demonstrating this skill, the hacker (the person gaining…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Slavery began in America when the first African slaves were brought to Virginia in the 16th century. Slavery assisted in the formation, growth, and development of the United States both the north and the south. It had a huge impact on the growth of an emerging nation, increasing economic growth, urbanization, and industrialization of the United States. During the first half of the 19th century, criticism and defenses of slavery evolved, but many slave owners disagreed that slaves should be freed and given the same rights of white men. The disagreements about whether slaves should be considered equal to white men created more conflict between the North and South in the 19th century, causing the Civil war to be an irrepressible conflict.…

    • 858 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Allow me to introduce you to Tucker Max. Max is a self-described “celebrity drunk A-hole.” His web site, tuckermax.com, has been twice embroiled in defamation lawsuits. The latest such suit was summarily dismissed by a federal district judge in Philadelphia, but the opinion that accompanied the dismissal holds some interest for college media outlets.…

    • 3144 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Woman's Suffrage

    • 976 Words
    • 4 Pages

    Now days when you turn eighteen in the United States. you can vote in the election but that was not always true for woman. Before 1920 woman were not allowed to vote only men could. It all began in 1848, at the first woman’s rights convention in New York, and didn’t end until 1920 when the 19th amendment, which gave women the right to vote, was finally ratified and became a law on August 26, 1920. Many brave woman and organizations fought for the right to be considered equal to men. Organizations such as NWSA, founded by Susan B. Anthony and Elizabeth Cady Stanton, and AWSA, founded by Lucy Stone and Henry Blackwell. These people, as well as many others, took a stand so that woman could have the rights that they do today, the right to vote. Woman’s suffrage was one of the most influential things in history because it allowed men and woman to be treated as equals, and without it, America would not be where it is today.…

    • 976 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The Internet doesn't make people unethical; it only enables unethical people to do what they were always going to do - cheat, plagiarize, infringe on copyrights - easier and faster.…

    • 649 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for…

    • 1094 Words
    • 5 Pages
    Good Essays