HACKING AND CRACKING ARE BOTH UNETHICAL A CASE TO SUPPORT OR DISAGREE Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic content, computer ethics would suggest that it is wrong to do so without the author 's approval. And while it may be possible to access someone 's personal information on a computer system, computer ethics would advise that such an action is unethical.
As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Hacking is unauthorized use of computer and network resources are the words used by Wikipedia in describing hacking. In recent years though, with easier access to multiple systems, it now has negative implications. In view of this I support the notion that hacking and cracking of computer software are both unethical.
Hacking is a felony in most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it 's ok. The key difference is that the ethical hacker has authorization to probe the target. A Worldwide Problem Software piracy is defined as the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers
Bibliography: 1. Banks, Michael A. (1997), Web psychos, stalkers, and pranksters: How to protect yourself online, Arizona (USA), The Coriolis group. 2. Chakrabati, Anirban and Manimaran, G. (2002), Internet infrastructure security: A Taxonomy, IEEE Network, November/December 2002, P.13. 3. CNET (2001), FBI “hack” raises global security concerns [online]. Available from: http://news.com.com/FBI+%22hack%22+raises+global+security+concerns/2100-1001_3-256811.html [Accessed 14th December 2004]. 4. Crucial paradigm (2003), Hacking attacks-How and Why [online], Crucial paradigm. Available from: http://www.crucialparadigm.com/resources/tutorials/website-web-page-site-optimization/hacking-attacks-how-and-why.php [Accessed 7th December 2004]. 5. Darlington, Roger. (2001) Crime on the net [online], United Kingdom, Darlington, Roger. Available from: http://www.rogerdarlington.co.uk/crimeonthenet.html [Accessed 4th December 2004]. 6. Digital Guards data base (2001), Glossary [online]. Available from: http://www.digitalguards.com/Glossary.htm [Accessed 10th December 2004]. 7. Furnell, Steven. (2002), Cybercrime: Vandalizing the information society, Boston; London: Addison-Wesley. 8. Himanen, Pekka. (2001), The hacker ethic and the spirit of information age, Great Britain, Secker & Warburg. 9. Levy, S. (1984), Hacker: Heroes of the computer revolution, New York: Bantam Doubleday dell. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge. 10. Marotta, M.E. (1993), ‘online with the super hacker’. Available from: http://www.kzsu.stanford.edu.uwi/post/mercury.html. Cited in: Taylor, Paul A. (1999), Hackers: Crime in the digital sublime, London, Routledge.