Hackers In Pop Culture

Superior Essays
Pop culture and mainstream media influences must be explored in order for people to fully understand how society’s perception of hackers has changed over the last 50 years. Before the 1980s, hacking was nothing more than computer enthusiasts modifying computers and phone phreaks exploiting phone networks to make free calls. Many people did not know what a hacker was until the 1980s when hacker groups began to form and engage in illegal activities. Personal computers were becoming more popular in the 1980s and many people were just learning how to use them. Some hackers took advantage of this and would access systems illegally for personal gain. At this point, many people began to realize what hackers were and what they were capable of. In …show more content…
Many people fear what they do not understand and hacking is a skill that many people do not possess nor understand. According to a Gallup survey, 69% of Americans worry about hackers stealing their credit card information from stores and 62% of Americans worry that their personal information will be hacked from their phone or computer (Stuart). This survey states that over half of Americans worry about hackers stealing something from them, which means that majority of society is fearful of hackers and their capabilities. Black hat hackers could be to blame for stolen credit card numbers or personal information in some cases, but the human element is more dangerous to a person’s secure information. For instance, anyone can acquire personal or financial information from documents that have been thrown away and not properly shredded. Cash register attendants could easily steal credit card information when they are ringing up a sale. In today’s society, people can gather a lot of information about a person on the Internet, but hackers should not always be blamed for identity theft or stolen personal information. Society feels that hackers are a bigger risk to their privacy than their personal security. A Pew study found that 86% of Internet and smartphone users have removed or masked their digital footprints for privacy and that Americans are more concerned with hackers violating their privacy than the government (Dredge). This study is astounding, especially considering that the government has been accused of spying on Americans. Hackers have the skillset and capabilities to invade a person’s privacy, but why would they and what would their motivation be? Black hat hackers are only motivated by financial incentives and they usually target big organizations that have valuable data. Society has every right to fear hackers, but for every

Related Documents

  • Improved Essays

    Response Essay Rewrite In recent times, Apple and the FBI have been arguing over the creation of software that would be able to reveal encrypted information. The author of the article Biting Apple Bruises Privacy Rights, argues the idea that by forcing Apple to hack their product will result in future violations of security and privacy. Personally, I strongly agree with the writer’s belief that forcing companies to reveal secured information is completely unwarranted and should not be allowed under any circumstance.…

    • 1482 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The 21st century has added a new weapon to the arsenal of persecutors. Credit card companies can lower a customer 's credit limit based solely on where they’ve shopped. An employer can make his or her decision on hiring an employee using just social media footprints. Lori Andrews presents frightening information in her essay “Facebook Is Using You”. Through the use of statistics, anecdotal evidence, and appeals to the audience 's sense of fear, she successfully convinces the reader that there is a need for a Do-Not-Track law.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Code 2600 Film Analysis

    • 391 Words
    • 2 Pages

    Technology is always constantly evolving and there are many people who play a big part in this. One of these people are known as hackers, they are usually viewed negatively in society, but despite that they have a huge part in the evolution of technology. Code 2600, directed and produced by Jeremy Zerechak is about the advancing world of technology and how ‘hackers’ are playing a big part in the advancement of technology as they push company’s to be constantly advancing and help technology become more secure. One of the prevalent themes in the documentary is that many individuals or groups that have a negative stereotype in society can play a positive role in the advancement of society. The documentary used many historical clips and news clips…

    • 391 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Marisa Bugarin Professor Bivona ENG 102 3:00-4:15 3/16/15 Annotated Bibliography Annotated Bibliography 1) Chemaly, Soraya. " A Million Peeping Toms: When Hacking Is Also A Hate Crime." Time. Com (2014): 1.…

    • 1953 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Some ‘hackers’ are just regular individuals trying to improve any computer systems or explore the wonders of the technological world. But unfortunately, most hackers are here to mortify others and take advantage of them. The pre-Christmas 2013 attack at Target…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    The question is, “How we control to how far the next hacker goes and for what reason. This is why to media will be an eternal source for this subculture. The federal government has done a good job with catching there ethical hacker and turning them into White Hats for the great good of the country, but there still a lot of them out…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Anonymous: The Generation of Hacktivists “We are not hackers. We are not terrorists. We are not violent. We are citizens of the world who bear witness to tyranny, oppression and censorship.” “We resist those who seek to violate our rights as human beings.”…

    • 1851 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Privacy In Australia

    • 919 Words
    • 4 Pages

    Laws and privacy There have been various laws that were established in order to protect privacy. One of these laws are Australia’s privacy principles ( APPs) which according to the Australian government these principles ‘regulate the handling of personal information by Australian government agencies and some private sector organizations’. The privacy act 1988 includes these privacy principles and the (APPs) consist of the gathering as well as the use of people’s personal information (Office of the Australian information commissioner n.d.). The government established these policies to provide and ensure the protection of people’s privacy and information. They were also created to regulate how agencies can gather and release private information…

    • 919 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The Cult Of The Dead Cow

    • 855 Words
    • 4 Pages

    The benefactors of the world’s next generation are sitting behind computer screens. Ready to create change worldwide, they are the activists of a new age; an age where technology is king among other platforms of information. Indifferent and disillusioned by careless claims made in the media, internet activist are revolutionizing the world through internet hacking. Internet activist known as Hacktivists, work to target injustice in politics and corrupt societal ideals. The world’s posterity relies upon Hacktivists groups, and the single click of a computer mouse.…

    • 855 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Background: Recently, Apple was required to unlock a work-issued iPhone-5C to cooperate with FBI in a terrorist attack. However, Apple declined the request. Apple’s attitude on encryption: Law enforcement agents around the country have already said they have hundreds of iPhones they want Apple to unlock if the FBI wins this case. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks. Of course, Apple would do our best to protect that key, but in a world where all of our data is under constant threat, it would be relentlessly attacked by hackers and cybercriminals.…

    • 947 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Cybercriminals

    • 1476 Words
    • 6 Pages

    A group of teenage boys hired by Bell Telephone to run the switchboards misdirected or disconnected phone calls. They were not called hackers, but their actions were considered a practical joke. They were, obviously, fired (Trigaux, 2000). The earliest instance of genuine computer hacking occurred in the 1960s. The next instances of cybercrime could be traced back to the practice of ‘phreaking’, which was hacking into telecommunication systems for the purpose of getting free phone calls.…

    • 1476 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays