Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
90 views24 pages

Ethical Dilemmas in Hacking

The document discusses the ethics of hacking and analyzes two scenarios. Hacking is defined as the computer equivalent of breaking and entering. Scenario A involves "borrowing" unused computer processing power, which some argue is acceptable if no changes are made, though others say it is still illegal. Scenario B examines hacking criminal systems, which could be seen as acceptable if only harming criminals, though it remains illegal activity. Overall, the document analyzes hacking from different ethical perspectives but concludes most forms of it cannot be condoned due to their illegal nature.

Uploaded by

TAMBAKI EDMOND
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views24 pages

Ethical Dilemmas in Hacking

The document discusses the ethics of hacking and analyzes two scenarios. Hacking is defined as the computer equivalent of breaking and entering. Scenario A involves "borrowing" unused computer processing power, which some argue is acceptable if no changes are made, though others say it is still illegal. Scenario B examines hacking criminal systems, which could be seen as acceptable if only harming criminals, though it remains illegal activity. Overall, the document analyzes hacking from different ethical perspectives but concludes most forms of it cannot be condoned due to their illegal nature.

Uploaded by

TAMBAKI EDMOND
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Kristine Belknap

The Ethics of Hacking


What is Hacking?
 What is Hacking?





What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.




What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.
 What are Hackers?




What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.
 What are Hackers?
 “True” Hackers


 Other Hackers (Cyber Criminals)

What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.
 What are Hackers?
 “True” Hackers
▪ Computer geeks who see computer systems as an
intellectual challenge and a technological puzzle to solve.
▪ Hack for the sake of hacking…
 Other Hackers (Cyber Criminals)
▪ The ones that do it solely for the money…
Hacking Scenario A…
 Mostpeople barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?


Hacking Scenario A…
 Mostpeople barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?
 Working on a problem that requires lots of
computing power…


Hacking Scenario A…
 Mostpeople barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?
 Working on a problem that requires lots of
computing power…
(It could even be for a good cause…)
▪ Ex. Analyzing Human DNA to figure out which genes are
linked to certain diseases…
Hacking Scenario A…
 Consequentialism

 Deontological Ethics

 Virtue Ethics

Hacking Scenario A…
 Consequentialism
 As long as the computers are left exactly as they
were found…
 Deontological Ethics

 Virtue Ethics

Hacking Scenario A…
 Consequentialism
 As long as the computers are left exactly as they
were found…
 Deontological Ethics
 Breaking and entering is still breaking and entering
even if you don’t touch anything.
 Virtue Ethics

Hacking Scenario A…
 Consequentialism
 As long as the computers are left exactly as they
were found…
 Deontological Ethics
 Breaking and entering is still breaking and entering
even if you don’t touch anything.
 Virtue Ethics
 It’s still the computer equivalent of breaking into
someone’s home…
Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?


Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.


Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.
 Ex. Hacking into a criminal’s computer to retrieve
and decrypt files that can be used as evidence.

Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.
 Ex. Hacking into a criminal’s computer to retrieve
and decrypt files that can be used as evidence.
 Ex. Cyber Warfare
Hacking Scenario B…
 Consequentialism

 Deontological Ethics

 Virtue Ethics

Hacking Scenario B…
 Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?
 Deontological Ethics

 Virtue Ethics

Hacking Scenario B…
 Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?
 Deontological Ethics
 Breaking and entering is still breaking and entering
and in these scenarios damage is being done.
 Virtue Ethics

Hacking Scenario B…
 Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?
 Deontological Ethics
 Breaking and entering is still breaking and entering
and in these scenarios damage is being done.
 Virtue Ethics
 It’s still like breaking into someone’s home.
Conclusion
 Scenario A


 Scenario B


Conclusion
 Scenario A
 1 Yes, contingent on everything being put back
where it was found.
 2 No.
 Scenario B


Conclusion
 Scenario A
 1 Yes, contingent on everything being put back
where it was found.
 2 No.
 Scenario B
 1 Yes, if you count harm to the “bad guys” as a
positive.
 2 No.

You might also like