Many discussions about the ethical consequences of hacking have occurred since the issue gained prominence. Some see ethical issues as cut and dry, some consider ethical failings only when laws have been broken and others take into account certain types of certain types of ethical hacking that are strong and ethically debatable. The first layer of this debate usually focuses on the definition of hacking and the motivation of hackers. Piracy definitions
Hacking occurs when someone intentionally accesses a computer without permission. The term is often used to refer to a person with detailed computer knowledge who commits the act to perform criminal acts. The act often damages property, spreads viruses and causes financial loss. The New Hacker’s Dictionary uses several definitions, including someone who “likes to explore the details of programmable systems and how to stretch their abilities,” “enthusiasm programs (even obsessive),” and “loves the intellectual challenge creatively overcome or circumvent the limitations.”
Ethical Considerations by Motive
Computerworld Hacker’s New Dictionary and Marcia J. Wilson both define hackers while distinguishing them from hackers with intent to harm. Such a “cracker” is, according to the “Hacker’s Dictionary”, a touch-to-malicious one that tries to uncover sensitive information by poking. “Wilson contrasts crackers with three other motivations, according to her, are ethically justified.” Hacktivists “infiltrate systems for political purposes; amateur hackers do to learn and share with those in the hacker community and hackers search and security are “those interested in discovering security flaws and writing patches of code. “Wilson and others believe ethical issues arise in hacking when the goals are outside these three categories.” She considers political activism through fair computer hacking to peaceful protests on the streets and points to amendments to first and fourth as justification.
Ethical Issues of Legality
a way that people can interpret the actions of unethical behavior examines the legality. The US Misuse Act fraud credit and forbids intentionally accessing another computer system`s when it threatens the welfare of an individual or a company to reveal state secrets, upset international communications, defraud, cause damage or extortion of financial assistance. States have their own laws as well.
Other Ethical Considerations
Other issues considered in ethical piracy discussions include the costs associated with security checks, even if no changes or damages have occurred. Many consider that the high amount of teenage participants and this factor in ethical judgments, believing the anonymity associated with hacking makes crimes more likely to occur than they would be outside of cyberspace.