Preview

Hacktivism Ethics

Powerful Essays
Open Document
Open Document
7214 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacktivism Ethics
A Practical Ethical Assessment of Hacktivism

Sergio Caltagirone
The University of Idaho scaltagi@acm.org Abstract

Hacktivism is the very recent adaptation of computer hacking by political activists to achieve their goals. It presents society with a new problem because of the current fear of cyber terrorism, and the difficulty of telling them apart. This work attempts to ethically assess hacktivism using the classical consequential and deontological theories as well as to address hacktivist claims of civil disobedience. In the end, the classical theories present may problems while attempting to translate them to the informational and virtual real. A new framework is developed so that it may be possible to tell the difference between ethical and unethical acts of hacktivism so that they are no longer dangerously confused with cyber terrorism.

Introduction

It is very difficult to argue with the statement that ethics and morals are an important facet of our individual person as well as our collective society. Individuals as well as organizations, such as companies and governments, are faced with decisions that require an ethical analysis everyday. Because of the importance and regularity of these decisions, it is not surprising that philosophers have spent millennia attempting to formulate useful and consistent ethical theories.

However, even with the existence of some very successful theories, the theories cannot be static. They must be continually revised and updated (or new ones developed) so that we can act consistent with our morals in new situations. This becomes especially true when rapid changes occur to our environment such as the growth and ubiquity of information technology in the past decades. The technology we now use everyday has created wholly new ethical challenges that must be considered.

Several of these ethical challenges can be addressed using some of the well-developed classical theories, while others require an



References: [1] M. Manion and A. Goodrum, "Terrorism or Civil Disobedience: Toward a Hacktivist Ethic," in ACM SIGCAS, vol. 30, 2000, pp. 14-19. [2] T. Forester and P. Morrison, Computer Ethics, First ed. Oxford, England: MIT Press, 1990. [3] N. McKay, "The Golden Age of Hacktivism," vol. 2003: http://www.wired.com/news/politics/0,1283,15129,00.html, 1998. [4] B. Stalbaum, "The Zapatista Tactical FloodNet," vol. 2003: http://www.thing.net/~rdom/ecd/ZapTact.html. [6] J. Glave, "Crackers: We Stole Nuke Data," vol. 2003: http://www.wired.com/news/technology/0,1282,12717,00.html, 1998. [7] Staff, "Webjackers Do It to Nike," vol. 2003: http://www.wired.com/news/business/0,1367,37146,00.html, 2000. [8] R. M. Hare, "Universal Prescriptivism," in A Companion to Ethics, P. Singer, Ed. Oxford, England: Basil Blackwell, 1991, pp. 451-463. [9] P. E. Davis, "Introduction to Moral Philosophy." Columbus, Ohio: Bell & Howell Company, 1973, pp. 620. [10] P. Singer, "A Companion to Ethics." Oxford, England: Blackwell, 1991, pp. 565. [11] J. Rawls, A Theory of Justice, Revised ed. Cambridge, Massachusetts: Harvard University Press, 1999. [12] N. Davis, "Contemporary Deontology," in A Companion to Ethics, P. Singer, Ed. Cambridge, Massachusetts: Basil Blackwell, 1991, pp. 205-218. [13] D. McNaughton, "Consequentialism," in Routledge Encyclopedia of Philosophy, vol. 2, E. Craig, Ed. Cornwall, England: Routledge, 1998, pp. 603-606. [14] P. Pettit, "Consequentialism," in A Companion to Ethics, P. Singer, Ed. Oxford, England: Basil Blackwell, 1991, pp. 230-240. [15] E. Spafford, "Are Computer Hacker Break-ins Ethical?," in Computers and Ethics in the Cyberage, D. M. Hester and P. J. Ford, Eds. Upper Saddle River, New Jersey: Prentice Hall, 2001, pp. 332-344. [16] S. Wray, "On Electronic Civil Disobedience," presented at Socialist Scholars Conference, New York, NY, 1998. [17] J. Rawls, "The Justification of Civil Disobedience," in Civil Disobedience, H. A. Bedau, Ed. New York: Pegasus, 1969, pp. 240-255. [18] P. Singer, Democracy and Disobedience. Oxford, England: Oxford University Press, 1973. [19] R. Konrad, "Diebold Issues Threat to Publishers of Leaked Documents," vol. 2003: http://www.usatoday.com, 2003.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Introduction: Below I will present an argument that that shows the computer hacking by Max Butler, the main character, demonstrated in the book Kingpin by Kevin Poulsen, was unethical in nature. Max’s actions illustrate computer crime defined as, “any incident involving an intentional act where a victim suffered or could have suffered a loss, and a perpetrator made or could have made a gain and is associated with computers” (Parker, 1976). Max utilized his hacking skills in a malicious manner to victimize individuals by taking their personal property.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    References: 1.Marquis. Don, in 'Ethics ', Exploring Philosophy, Author, Barber. Alex, The Open University, Milton Keynes.…

    • 2254 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Bus 832

    • 16899 Words
    • 68 Pages

    35. James Weber, “Exploring the Relationship Between Personal Values and Moral Reasoning,” Human Relations 46, no. 4 (April 1993), pp. 435–463.…

    • 16899 Words
    • 68 Pages
    Good Essays
  • Better Essays

    PHI2000 The Good Life

    • 1319 Words
    • 6 Pages

    References: Rachels, J. & Rachels, S. (2010). The elements of moral philosophy (6th ed.). New York,…

    • 1319 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Ethics 316

    • 632 Words
    • 3 Pages

    In comparing the similarities and differences in ethical theories, the goals of each theory and the morals and values that can be observed in the process. While the following ethical theories appear similar on the surface virtue theory, utilitarianism, and deontological ethical will be discussed and their differences will be defined.…

    • 632 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sometimes, the same conclusion to an ethical dilemma can be reached using several different ethical systems, but sometimes using different ethical…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Phi 160

    • 998 Words
    • 4 Pages

    Polman, L.P., & Fieser, J. (2012). Ethics: Discovering Right and Wrong (7th ed.). Boston, MA: Wadsworth.…

    • 998 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Rtyn

    • 5264 Words
    • 22 Pages

    Gotterbarn, Don (1991). "Computer Ethics: Responsibility Regained," National Forum: The Phi Kappa Phi Journal, Vol. 71, No. 3, Summer, 26–31.…

    • 5264 Words
    • 22 Pages
    Better Essays
  • Powerful Essays

    Rachels, R., & Rachels, S. (2010). The Elements of Moral Philosophy (6th ed.). New York: McGraw-Hill Higher…

    • 1816 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Ursury Laws

    • 681 Words
    • 3 Pages

    Shafer-Landau, R. (2012). The fundamentals of ethics. (2nd ed., p. G-6). New York: Oxford University Press.…

    • 681 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Rachels, James and Stuart Rachels. The Elements of Moral Philosophy. New York: Mcgraw-Hill, 2010. Print…

    • 1969 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Anonymous hackers

    • 892 Words
    • 3 Pages

    “After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ensuing cyber-attacks waged by all sides in the controversy brought the phenomenon of hacktivism into popular focus” (Noah 2012). After WikiLeaks many forms of hacktivism exploit illegal.…

    • 892 Words
    • 3 Pages
    Good Essays

Related Topics