Sample Essay on:
The Ethics of Hacking

Here is the synopsis of our sample research paper on The Ethics of Hacking. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

An 8 page overview of computer crime related to hacking. This paper explores the ethics and justifications of hacking, dismissing those justifications as simply illogical. Bibliography lists 9 sources.

Page Count:

8 pages (~225 words per page)

File: AM2_PPcmpHackEthics.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

most often it involves unauthorized access to a computer system. The term "hacker" has evolved from a term which originally held great respect, used in reference to those persons who were intimately knowledgeable regarding computers and those which worked with computer programs, to a term which denotes a form of illegal activity. Most agree that there is a definite distinction between "cracking" and "hacking". Although the term "cracking" is more correctly reserved for the illegal activity which gains unauthorized access to computer systems, the term "hacking" is most often used today to describe this type of activity. Todays so-called "hackers" ethically justify their actions by contending that they ultimately make computer systems safer. They contend that their ability to infiltrate systems, access information, and even spread computer viruses is what in reality points out the weaknesses in these systems and prompts other to make them stronger. The obvious flaw in this ethical justification is that if "hackers" stopped trying to wreak their destruction then there would be no need for stronger systems! Regardless of the term we use to describe it, unauthorized access to computer systems can in many cases be quite costly and we have endured this cost for several decades. Roush (1995), for example, provides insight on the historical cost of computer crimes noting that compared to 339,000 incidences of unauthorized intrusions in workplace computer systems that were detected in the U.S. in 1989, there were 684,000 such incidences detected just two years later in 1991. Roush (1995) reports that intruders: "altered or destroyed data or software in 42 percent of the cases the company studied, at a cost ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now