After the publication of Levy’s book in 1984, numerous technological changes in computers and other hardware devices as well as in hacking practices led to a radical shift from the old hacker ethic, however, the core principles of the hacker ethics, that are access to computers, sharing and community remained the same. These new ethics were documented by Steven Mizrach, a student of Cyber Antropolist studies, in his essay which was titled ” Is there Hacker Ethics for 90s Hackers?”. This essay highlights the following principles which the hackers now abide by.
Do No Harm
This principle emphasizes the point that a hacker must not damage any computer or data if possible at all. It is against the ethics of hackers to change any data apart from the logs that are required to clean their tracks. A hackers should have no desire to destroy data, rather should proceed with the intent of exploring the system and learning. A hacker should have an unlimited thirst for knowledge which intensifies as the hacker makes progress (Mizrach 2010).
This principle highlights the people’s right to privacy. It acknowledges that people have a right to control their personal information. Therefore, the concept of privacy should be very important for a hacker. It is important for a hacker to encourage people to protect their personal data, encrypt their emails and do whatever possible to minimize the leak of their information. A practical implementation of this was seen in 1984, when a group of hackers was able to show how TRW maintained credit files for millions of American, and revealed to the world the concept of credit files which was unheard before. Before, this event, electronic security such as password protection was not taken seriously as well. In fact, the credit reports revealed by the hackers had their password printed on them (Dhillon 2003).
Don’t No Waste Resources
It is crucial for a hacker to realize that computer resource should not lie idle and wasted and it is ethically wrong to keep people out of the system which they could have benefited from it during its idle time. For example, a hacker after finding out that he or she can do something useful with the immense processing power available through the Internet, can go ahead even if he or she is denied a permission but should take extreme care to not to damage any system (Mizrach 2010).
A+ papers are what we do the best, and that’s our promise!
We believe our success is due to countless of satisfied customers who continue to trust us and cherish this professional relationship. Our custom term papers are guaranteed to be original and delivered before the deadline.
- Countless students worldwide are satisfied with our professional writing services.
- Professionally written custom paper according to your specific instructions.
- We offer the most experienced bank of dependable and capable academic writers.
- All assignments are thoroughly researched and 100% guaranteed as original.
- 100% privacy guaranteed – your private information is strictly confidential.
- Dedicated 24/7 friendly support team, always available to assist you.