Thursday, December 12, 2019

Topics in I.T. Ethics Hacking

Question: Discuss about the Topics in I.T. Ethics for Hacking. Answer: Introduction Hacking is a well-known profession all over the world in this phase of the era. It is a profession of a highly skilled computer expert who can unlock any computer program of the gateway. Hackers are a group of highly skilled computer programmers who are experts in the field of compute (Lee, 2014). At one go calling them a person of cyber crime would not be justified. But, yes, there are some people who really exploit this talent of theirs in a very bad way. Hacking is not an offensive crime, in fact, it is a very talented art, obviously if used in a proper way. Any art, when misused, becomes a crime. Same goes for this art of hacking. Moreover, nowadays hacking is a full-fledged business over the world. People over the world hire hackers for their business profit purpose (Covaleski, 2013). Some people use it to decipher the secrets of their rival companies whereas others also use it for personal use like in a recent article in Australia it had been seen that a wife had hired a hacker to know the secrets of her husband. Rent-a-hacker site leaks Australian buyers' names and addresses In a recent article, it has been found that there are professional hackers who are maintaining registered or unregistered website for hiring hackers. It has been found that many people are contacting hackers for their personal use. It has been found that an Australian wife had contacted them for wanting to figure out what her husband was up in his life, specifically to know whether he was cheating on her or not (Guo, 2016). Once, a college student contacted them to change his grades in college by hacking college's result programs. In another case, a businessman in NSW contacted them to reveal the customer database from his rival's computer system. So, hackers cannot be blamed for their notorious activities. Practically the negative needs of the people are giving rise to the exploitation of these talented peoples profession. As it is said "As you sow, so you reap", so now new technologies have come up which can record the name, address, and motive of the people who are contacting those hacking websites and hiring people for their dirty motives. So these people whose illegal needs have brought the exploitation up to this level can be literally exposed to the world for their so called legal action (Kubitschko, 2015). But again where there are rules there are rule breakers also. Nowadays we also find websites which confirm their client safe and secure working which will hide the identity of the person who is hiring the hackers. Only the person who is hiring and the person who is hacking will know each other. Others will never ever come to know about those people. In one of the recent articles of A New York Times published in January, it has been seen that from Sweden to Australia people are anonymously hiring hackers for their needs. The jobs for which they were being hired, amongst them, some were legal works that are good for them while others were drastically against the law (Marks, 2012). The buyers are freely thinking that their identities are safe and secure but recently a security researcher Jonathan Mayer recently discovered that the companies who were ensuring safe and secured work to their clients without any revealing were actually leaking the information in the market. Not only were they exposing their identity but also their motivation behind the total hiring procedure. Moreover, it was also noticed that amongst thousands of job requests near about dozens were from Australia itself (Hamacher, 2012). And the requests were either regarding change of grades or spying on the spouse or knowing confidential information about business rivals. But there were also clients with good motives like there were some who really wanted to know about their own forgotten email information so that they could access their accounts. These works were obviously not done for free of course. The hackers are well paid. Once, a woman was even ready to pay $300 to $500 for spying on her husband. And that womans identity was later revealed to be from NSW in Australia. There was an enterprising present in Western Australia named Jarmaa" rented a "semi-ethical hacker" for knowing the customer database behind the Tertiary Institutions Service Centre's websitetisc.edu.au. This buyer was even ready to dollars from $100 to $1000 to get his job done. The Jarmaa owner declared that "The hacking itself is not at the cost of anyone else and thus should be determined as ethical. It is simply to help someone beat a flawed system to advance in higher education". But till today it is not cleared whether this job was done or not (Spafford, 1992). The police had done a great job to find out but it is not yet deciphered yet. Another person from NSW also tried to hire one of the hackers to know the database of his rival company. He, later on, justified his deed by saying that he actually wanted to know that how much his competitor was charging the customers regarding the pricing of the products. Mayer was desperately searching for the culprits when Charles Tendell who declared himself to be an ethical hacker who was handling the marketing place for this kind of works. NSW Police'sCommander of the Fraud Cybercrime Squad, Detective SuperintendentArthur Katsogiannis told that if this kind of offensive works are seen by anybody and complained then the police shall surely investigate those matters. It is also warned by the police that if this kind of incident come across the knowledge of the police then they shall take legal actions against those offenses (Hacker-Wright, 2009). In all these cases both the client and the hacker are equally blamed and worthy of legal punishment. It has also been declared by the court that the punishment shall be whether put into jail for the imprisonment of nearly two to ten years in jail and if then high fines needed shall be imposed on them. Conclusion So, we see that both the hacker and the clients are involved in the introduction of such a crime in the world. Obviously, if the need arises then, of course, the crime will also be done to give effect to the need. And the best way to remove this kind of crime is to inflict the moral value in the minds of the people so that they do not exploit the art of hacking in such a crime. References Covaleski, J. (2013).Hacking. San Diego, CA: ReferencePoint Press. Guo, B. (2016). Why Hackers Become Crackers An Analysis of Conflicts Faced by Hackers.PAR,5(1), 29. https://dx.doi.org/10.5539/par.v5n1p29 Hacker-Wright, J. (2009). Human Nature, Personhood, and Ethical Naturalism1.Philosophy,84(03), 413. https://dx.doi.org/10.1017/s0031819109000394 Hamacher, K. (2012). Resilience to Leaking Dynamic Systems Modeling of Information Security.Plos ONE,7(12), e49804. https://dx.doi.org/10.1371/journal.pone.0049804 Kubitschko, S. (2015). Hackers' media practices: Demonstrating and articulating expertise as interlocking arrangements.Convergence: The International Journal Of Research Into New Media Technologies,21(3), 388-402. https://dx.doi.org/10.1177/1354856515579847 Lee, M. (2014). History of Hacking.Engineering Technology Reference. https://dx.doi.org/10.1049/etr.2014.0011 Marks, L. (2012). Winn Schwartau, Cybershock: Surviving hackers, phreakers, identity thieves, internet terrorists and weapons of mass disruption.EDPACS,46(1), 13-14. https://dx.doi.org/10.1080/07366981.2012.687559 Spafford, E. (1992). Are computer hacker break-ins ethical?.Journal Of Systems And Software,17(1), 41-47. https://dx.doi.org/10.1016/0164-1212(92)90079-y.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.