Question

In: Computer Science

Hacktivism is the use of hacking to promote a political cause. Is there an ethical justification...

Hacktivism is the use of hacking to promote a political cause. Is there an ethical justification for such hacking?

Should penalties for 'hacktivists' differ from penalties for other hackers?

Solutions

Expert Solution

The general concept of hacktivism isn’t defined by the need to involve “bad behaviour” or outright law breaking, and can be used to make a positive impact on the world in a justified and ethical way. “Ethical use” of hacktivism often depends on the user’s intentions. An example of hacktivism being used for good involved an incident where a notorious hacktivist, The Jester, helped with the identification and incarceration of several ‘script-kiddies’ (Hacking/programming culture slang for a younger, less experienced hacker who rejects the ethical principles often adopted by professionals and hacks maliciously for the fun of it) who disrupted the United Kingdom’s anti-terrorist hotline, possibly putting people in danger (Armstrong, 2014).

Hacktivism simply involves using rights (like the right to free speech) to effectively protest to a larger audience in a more effective way. It just builds on to the original concept of protest in modern ways and should be judged on ethics in a similar way to any other medium of protest.

Hacktivists claim that they are doing no more and no less than following in the tradition of Gandhi and Martin Luther King, Jr., by attempting to bring about social change through non-violent means (Thomas, 2001).


Related Solutions

project: Ethical Hacking and its measurements , application
project: Ethical Hacking and its measurements , application
explain why ethical hacking is necessary in today's complex business environment.
explain why ethical hacking is necessary in today's complex business environment.
We spent a lot of time discussing and studying the impact of political hacking in elections....
We spent a lot of time discussing and studying the impact of political hacking in elections. What is being done to ensure that its impact does not impact the validity of the 2020 election? What preventions are in place? Being almost a month out from November 3rd election day, are we ready? Research this question and answer it .
Offer an evidence-based justification for a corporate political strategy that is beneficial to society.
Offer an evidence-based justification for a corporate political strategy that is beneficial to society.
Comment on the big-picture cause or justification of poverty in the U.S. and how the current...
Comment on the big-picture cause or justification of poverty in the U.S. and how the current economic system affects it. Are you taking an "individual responsibility" or "collective responsibility" approach?
Write down a detailed report on information gathering phase of ethical hacking and identify some tools...
Write down a detailed report on information gathering phase of ethical hacking and identify some tools that can be used in this phase. *in your words. **please write it by computer typing so it will be easy to copy it. ***Type report sources at the end of the report.
Argue that those regulations are ethical and necessary to promote a free market?
Argue that those regulations are ethical and necessary to promote a free market?
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from...
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from the professional, ethical hacker. In your answer state the extent to which ethical hackers might be the same as or different to white hat hackers. present an introduction (or background) about the case study ; include at least two ethical theories to support your answer (2 x 5 marks); Include examples of professional Codes of Ethics to support your answer ; present a conclusion...
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from...
Penetration testing is also known as ethical hacking. Distinguish white, grey and black hat hackers, from the professional, ethical hacker. In your answer state the extent to which ethical hackers might be the same as or different to white hat hackers.
Cybersecurity: Ethical Hacking 1. Authenticated vs. Unauthenticated Enumeration a. What is the difference? i. Give one...
Cybersecurity: Ethical Hacking 1. Authenticated vs. Unauthenticated Enumeration a. What is the difference? i. Give one example of a service and what additional information would be available once authenticated.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT