Friday, February 28, 2020

Computer Hacker Research Paper Example | Topics and Well Written Essays - 1500 words

Computer Hacker - Research Paper Example While some do this for fun and to satisfy their egos, others engage in computer hacking for profit or for knowledge purposes (Levy, 2010). Nonetheless, despite the reasons for engaging in computer hacking, this practice is considered neither wholly good nor bad, since this involves a number of negative outcomes. The practice of computer hacking has existed in the field of Information Technology since the past few decades. Computer hacking involves a high level of intelligence and dedication. Hackers are therefore, highly knowledgeable not only in computer systems, but also in the security systems, which people employ to keep hackers out and to secure their systems (Thomas, 2002). In order to hack into systems, hackers are required to have in-depth knowledge on the systems, and most therefore, have to study the particular systems they want to hack into. According to Sterling (1989), in order to gather knowledge, some hackers attend conferences in order to learn about new techniques an d easier ways of hacking into systems. After hacking a system, hackers gain access to all kind of information in the system. They therefore, can use the information in whatever manner they wish. They are able to download this information, to copy it to their computer, or even delete the information, among other commands. Nonetheless, depending on the kind of system jacked into, as well as the kind of information that is accessed, the actions of a computer hacker might result in negative outcomes, basing on how he or she manipulates and uses the information accessed. For instance, if a hacker hacks into the system of a telephone company, he or she might make calling cards, and change phone numbers, among others (Sterling, 1989). As seen, computer hacking is considered a form of... This paper approves that the question of computer hacking, and computer hacking and ethics remain paramount in the present IT generation. Ethics is an aspect, which individuals develop over time; and ethics involves good behavior, which are mainly aimed at improving, and not harming others. In the world of computers and technology, ethics has become an important aspect. In this light, some computer hackers, who hack for fun, have claimed that they hurt no one by â€Å"just looking around,† and therefore, their practice should be considered ethical, and nor criminal. This report makes a conclusion that with all efforts of governments, computer hacking has not been eliminated. Governments therefore, need to develop more effective strategies, which might help to curb computer hacking. In order to solve the problem of computer hacking, young enthusiasts interested in computers and computer hacking should be taught about ethics and its importance. In addition, these should be supported to develop a user community, instead of becoming isolated computer hackers. Nonetheless, the practice of computer hacking has been rising considerably in the past years. The major problem of computer hacking is that it infringes on other people’s privacy. More so, since technology levels also keep rising steadily, the future of computer hacking seems bright, as computer hackers will learn and evolve with the increasing technology. However, ethical hackers will also use the advanced technology to offer increased system security to organizations. Either way, compu ter hacking affects all countries, therefore, it should be the collective responsibility of countries to adopt strategies that will help to curb computer hacking.

Wednesday, February 12, 2020

CASE 2 ETHICS - Informational Privacy Essay Example | Topics and Well Written Essays - 750 words

CASE 2 ETHICS - Informational Privacy - Essay Example The question is: Should Justin Ellsworth's parents have been given access to his e-mail? Utilitarianism says that this action is right because his parents are worthy stakeholders and their happiness weigh more than a dead person’s privacy and confidentiality rights, while this action is immoral for deontological reasons because Yahoo! has a duty to its users and not their parents and because privacy and confidentiality respect people as ends and must be protected at all times. Utilitarianism says that Justin’s parents deserve access to his e-mail because this action leads to their net good, where the vital people end up being happy. Utilitarianism is a type of consequentialism, where people aim to maximize the utility of their decisions (Brooks & Dunn, 2010, p.183). This ethical theory maintains that an action is good, if it results to a net good to the greatest number of people (Brooks & Dunn, 2010, p.183). The number and nature of consequences rationalize the morality of people’s decisions. Yahoo! did the right thing when it did not release the e-mail contents immediately to Justin’s parents because they did not have the right to it. Confidentiality terms indicate that Yahoo! gives all users the assurance that the latter’s information would not be disclosed without consent from the subject. Justin Ellsworth, although dead, has privacy rights over his e-mail. Privacy is a person’s yearning to control the access of others to themselves. By keeping the e-mail contents confidential, Yahoo! respects the privacy of all users. Users appreciate the protection of their privacy through the confidentiality of their data. Their happiness is considered as a high net good of Yahoo!’s efforts for privacy and confidentiality. Justin has a right to keep his e-mail private. However, his parents’ happiness must be considered too. Using act utilitarianism, this paper evaluates specific actions, instead of the rules that aff ect them, in arriving at moral decisions (Ferrell, Fraedrich, & Ferrell, 2011, p.159). Parents are more important stakeholders than the general public and Yahoo! because the former are the reasons for Justin’s existence. Society should respect their interests and happiness too. If access to Justin’s e-mail content will make them happy, then their happiness is more essential than other people. Furthermore, the user is dead. His interest is not more relevant than his parents, who can gain peace of mind from his e-mail. Utilitarianism justifies the consequences, where direct family members have the right to gain access to the deceased’s information, even if it violates privacy and confidentiality. Deontology, on the contrary, asserts that Justin’s parents should not access his e-mail because of the following reasons: Yahoo! has a duty to its users, not to their families; this action cannot be universalized; and it treats Justin as a means to his parents†™ ends. Deontology is concerned of individual rights and the intentions connected to specific actions, not their consequences (Ferrell et al., 2011, p.159). Obligations and duties that impact actions are decisive elements of deontology (Brooks & Dunn, 2010, p.184). Deontologists believe that there are things that cannot be done, even when they result to the highest utility (Ferrell et al., 2011, p.159). Justin’s parents should not be able to access his e-mail