Deviant Behavior Computer Hackers And Term Paper

PAGES
2
WORDS
673
Cite

(Gunkel, 2001, p. 8) It would seem, that the line that one oversteps to become deviant is the line that demonstrates the outsmarting of another to create chaos in ones system and potentially do real damage to materials and data. Of coarse this would include any hacking that results in crime, and especially theft and fraud.

Hacking in all intense and purpose is deviant behavior, that challenges the current cultural dependence of upon technology, as it challenges the trust of the system as well as many other issues, regardless of its real or potential damage. Yet, the current trend in cyberspace is to create systems that are safe from hacking, and elicit all possible protection for legitimate users and owners of the intellectual properties within. Another interesting trend includes creating hacker sites that require hacking to enter, potentially redirecting hackers to more positive sidelines. (Wible, 2003, p.1577) Such sites are even stressing the legitimacy of their works by barring criminal hackers from competitions...

...

These measures could be strengthened by a "three strikes" rule. Hackers implicated in a specified number of offenses would not be able to compete. To prevent some hackers from being locked out entirely, a date could be set so that everyone would begin with a blank slate. Alternatively, hackers could take away a strike for each public interest job they do (as long as they do not add any new strikes), such as beefing up a site's security or turning state's evidence to prosecute other crimes. (Wible, 2003)
Though the tactic, does not eliminate the lure of hacking or eliminate it as a deviant behavior it does take the system, that hacking works within and bolster it to create positive deviance rather than…

Sources Used in Documents:

Hacking in all intense and purpose is deviant behavior, that challenges the current cultural dependence of upon technology, as it challenges the trust of the system as well as many other issues, regardless of its real or potential damage. Yet, the current trend in cyberspace is to create systems that are safe from hacking, and elicit all possible protection for legitimate users and owners of the intellectual properties within. Another interesting trend includes creating hacker sites that require hacking to enter, potentially redirecting hackers to more positive sidelines. (Wible, 2003, p.1577) Such sites are even stressing the legitimacy of their works by barring criminal hackers from competitions and allowing hackers to anonymously offer information to authorities about hacking offenses and potentially helping authorities trace criminal hackers..

Strengthened penalties are meant to enfeeble the "black market" where participants might develop hacking expertise or put their skills to illicit uses. These measures could be strengthened by a "three strikes" rule. Hackers implicated in a specified number of offenses would not be able to compete. To prevent some hackers from being locked out entirely, a date could be set so that everyone would begin with a blank slate. Alternatively, hackers could take away a strike for each public interest job they do (as long as they do not add any new strikes), such as beefing up a site's security or turning state's evidence to prosecute other crimes. (Wible, 2003)

Though the tactic, does not eliminate the lure of hacking or eliminate it as a deviant behavior it does take the system, that hacking works within and bolster it to create positive deviance rather than negative deviance.


Cite this Document:

"Deviant Behavior Computer Hackers And" (2007, January 30) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/deviant-behavior-computer-hackers-and-40342

"Deviant Behavior Computer Hackers And" 30 January 2007. Web.26 April. 2024. <
https://www.paperdue.com/essay/deviant-behavior-computer-hackers-and-40342>

"Deviant Behavior Computer Hackers And", 30 January 2007, Accessed.26 April. 2024,
https://www.paperdue.com/essay/deviant-behavior-computer-hackers-and-40342

Related Documents

Peer recognition too plays into many hackers motivation as they work towards being accepted and gaining status within the culture. and, lastly, some hackers are motivated by the thought that their efforts serve a public service (O'Neill, 2006). "Hackers built the Internet, they made the Unix operating system what it is, and they make the World Wide Web work" (Castelluccio, 2003). Forecast 4: Forecast 4 states, "Some computer hacker groups, notably those

Feelings on Technology
PAGES 4 WORDS 1164

Technology, Society & Politics The role of technology in society, politics and economics: Analysis of the works of Kuhn, Rhodes, Christensen, Levy and Toulmin The development of technology with the onset of the Industrial Revolution, capitalism, and modernism created significant changes in the culture and institutions of human societies. Where technology used to be associated with machinery and manufacturing, technology in the 20th century gradually became associated with computer technology. Scientific developments

CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past