Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and ha ve expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.
A number of issues arise in considering hacking from the educator perspective. First, we need to consider the fact that the public perception of hackers is mixed, and that "hacking" and "being considered a hacker" can be quite appealing to students who are going through developmental periods in which they are defining themselves, as well as challenging authority and rules. There is often a Robin Hood mentality to early actions, though it is unclear exactly who "the poor" are, and how they are "being compensated". Second, the anonymity of actions which hackers perform against others often enhances the severity of actions. For example, an illegal
References: Jamil, D. & Khan, M. (2007). Is Ethical Hacking Ethical? Retrieved from http://www.ijest.info/docs/IJEST11-03-05-186.pdf Livermore, J. (2007). What Are Faculty Attitudes Toward Teaching Ethical Hacking and Penetration Testing? doi: 1-933510-96-7x/9635. Palmer, C. (2001). Systems Journal. Ethical Hacking, 40(3), 769-780. Retrieved from http://pdf.textfiles.com/security/palmer.pdf Spafford, E. (1997). Are Computer Hacker Break-ins Ethical? Retrieved from http://vxheaven.org/lib Farsole, A., Kashikar, A., & Zunzunwala, A., (2010). International Journal of Computing Applications (2009, 02). Computer Hacking. StudyMode.com. Retrieved 02, 2009, from http://www/studymode.com/essays/Computer-hacking-193448.