Preview

Hacking Into Harvard

Good Essays
Open Document
Open Document
589 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking Into Harvard
By hacking into the universities’ system to acquire their result, the applicants have made an unethical action which caused them to be rejected from entering the universities. They could have been able to enter the universities successfully if they had not done so. Not only they have lost their chances of studying in reputable universities, they have also gained a bad reputation or image for themselves. This might make it difficult for them to enter other universities too due to their record of being unethical.
As described by Harvard Dean Kim B.Clark, the applicants who hacked were said to be unethical and lack of integrity. Harvard also concluded that these potential students are not tomorrow’s leaders and Harvard only wants to educate honorable leaders with sense of righteousness and morality which they do not possess. (Gloeckler.G and Merritt.J, 2005) Due to their unethical actions, they have lost the trust that people used to have on them and it would be very difficult to gain back them again. For example, other universities that the applicants might doubt whether the applicants would repeat their actions again or companies which these applicants apply jobs to might also worry if they would hack into their system to acquire confidential documents.
Besides that, these applicants have also disappointed their families which put a lot of hope in them to enter prestigious universities. Not only would their family members have to learn the fact that their child has been rejected from entering the university not because of their qualifications but their unethical behavior, they would also have to face criticisms about their child’s action from the public.

Reasons that may have caused the applicants to hack into the system to acquire their results could be because they were too impatient to wait for the official announcement that is weeks away. So out of curiosity, they clicked the link that the original anonymous hacker provided on some websites. The



References: Gloeckler.G and Merritt.J (2005) An Ethics Lesson for MBA Wannabes [Online]. America: businessweek.com. Retrieved from: http://www.businessweek.com/bschools/content/mar2005/bs2005039_7827_bs001.htm [Accessed 15th June 2012]. Weisman.R (2005) Harvard rejects 119 accused of hacking [Online]. America: The Boston Globe. Retrieved from: http://www.boston.com/business/articles/2005/03/08/harvard_rejects_119_accused_of_hacking_1110274403/[Accessed 16th June 2012].

You May Also Find These Documents Helpful

  • Good Essays

    Never allow any type of attack, successful or otherwise to go undocumented or wasted. “If you experience an attack, learn from it,” For example, let us analyze an information security breach case of a financial corporation that caught an employee trying to steal very private company trading algorithms. Accountability and authenticity must immediately be exercised to ensure…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Fieser, J. & Moseley, A. (2012). Introduction to business ethics. San Diego, CA: Bridgepoint Education, Inc. Retrieved from https://content.ashford.edu/books/AUPHI445.12.1/sections/sec1.3…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fieser, J. & Moseley, A. (2012). Introduction to business ethics. San Diego, CA: Bridgepoint Education, Inc. Retrieved…

    • 357 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fieser, J. & Moseley, A. (2012). Introduction to business ethics. San Diego, CA: Bridgepoint Education, Inc. Retrieved from…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fieser, J. & Moseley, A. (2012). Introduction to business ethics. San Diego, CA: Bridgepoint Education, Inc. Retrieved from https://content.ashford.edu/books/AUPHI445.12.1/sections/sec9.7…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Max finds any ‘loop-holes’ in websites and uses unauthorized access to gain data. Hackers utilized carefully planned strategies to commit their crime such as, “Take advantage of the enemy’s unreadiness, make your way by unexpected routes, and attack unguarded spots” (Poulsen, p. 159). Max obtained unauthorized access to vulnerable websites, and used this as an advantage to easily increase his gain in stolen information.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Fieser, J. & Moseley, A. (2012). Introduction to business ethics. San Diego, CA: Bridgepoint Education, Inc. Retrieved from…

    • 370 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    of reasons that one might participate in hacking the memory of a computer system. One reason…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Bayview

    • 481 Words
    • 2 Pages

    According to the statistical analysis, given Figure 1, it shows that 53% of the sample have answered “Yes” to at least one of the questions and were considered as cheaters and in which more than half are males. It seems that most of the male cheaters copy their work off the internet, whereas the female cheaters often collaborate work together.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Ethics Reflection Paper

    • 474 Words
    • 2 Pages

    The act of conducting oneself in an ethical manner comes down to knowing the difference between what is right and what is wrong, and working to do the right thing. According to Mintzberg, Ghoshal, Lampel, & Quinn, 2003, ethics is a question of values and goals, not of methods. Making ethical decisions and working to be socially responsible for a company should be one and the same when conducting business. During the development of a strategic plan ethics and social responsibility should be a priority from the shareholders to the entry-level hourly employee. This paper will highlight ethics and social responsibility during the development of a strategic plan. The paper will also examine how my ethical perspective throughout the MBA program.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Best Essays

    3. Pullen, J. (2013). How to Protect Your Small Business Against a Cyber Attack. Available: http://www.entrepreneur.com/article/225468. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Good Essays

    Some students will do anything it takes to achieve a higher grade, to achieve a grade point average sufficient for graduate school, or to achieve special awards or honors, even if it includes cheating (Kolanko, et al., 2006, p. 35). Methods of cheating have become increasingly high tech over the last several years, with all of the increased technology available to students. Students have been known to text answers to other students, use micro recorders to tape test questions for students in later classes, and use ultraviolet pens to write test questions out so that the questions cannot be detected to the naked eye, but can be viewed under a special ultraviolet light (Kolanko, et al., 2006, p. 36). In addition to all of these fancy, high tech methods of cheating, the old fashioned cheating methods still do exist. Students are still known to use cheat sheets, copy off other students’ tests, and use textbooks when not allowed (Schmidt, 2006, p.…

    • 936 Words
    • 4 Pages
    Good Essays

Related Topics