Describe a negative aspect of ICT’s impact on the information society. Describe how ICT has brought this about and what society is has done in response to it.
Hacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects.
Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found.
The society response to hacking attacks lacks till
…show more content…
While Marotta (in Taylor, 1993) has a negative view of the hacker as a data lord, a barbarian who takes what he wants. Himanen (2001) defines hacker as any person who performs illegal actions whether they were related to computer or not which means the usage of a device apart from its functionality. Seems hacking according to Himanen is related to any illegal or unauthorized action. Seebach (1999) finds hacker as a person who feels delighted and full of joy when being able to access a system and break the security utilities but Himanen (2001) doesn’t consider hacker as a thief. This definition looks at the hacker as a normal person who is only practicing his knowledge and ability to access what he wants. Williams (2002) goes in the same direction and finds hacker as a knowledgeable person who never stops reading and exploring new technology for the sake of improving himself and might perform illegal actions but his first priority is to look and search for more knowledge. Digital Guards data base (2001) gives the hacker a definition of “a person who enjoys exploring the details of computers and how to stretch their capabilities”.
Clear from the definitions mentioned above that there is a controversy that encounters the judgment and definition of hacking, controversy aroused because it’s hard to decide exactly what the aim is behind hacking or how to know the