Pros And Cons Of Hacktivism

Decent Essays
Hacktivism - Does It Do More Good or Bad? First of all, what is it? The Cambridge Dictionary website states that: “hacktivism is the activity of using computers to try to achieve political change, for example by attacking websites or illegally entering another computer system.” There are many different kinds of hacktivists with all sorts of different motives. Regardless what the motive may be, the topic in general has been receiving lots of controversy in recent years as it’s becoming more of a common occurrence. Here are some arguable questions: Is hacktivism a serious cybercrime issue or can it be an efficient means of social protest? To a lot of people the topic can get a bit blurry in regards to if it’s acceptable or not. However, I side with the law and consider them criminals committing criminal acts and that is how it should be considered by all. Regardless if some hacktivists have good intentions, not only is it usually still illegal, but I feel that if it were to be considered more acceptable then we would see more hacktivists with nefarious intentions popping up much more often.

I think that there is a fine line between the “cybercrime criminal” and the “social protest” type
…show more content…
A lot of people think that hacktivism is an efficient means of social protest, and even an ethical means. As stated in another Opposing Viewpoints document, Graham Armstrong states that: “I believe that yes, hacktivism is a genuine form of protest.” He talks about how hacktivism should be a last resort after all other options have been exhausted but yes it is a genuine form of protest in the end. I feel like you could compare that mind set to something like bringing a couple aces in your sleeve to a poker game. Then saying “oh, well I’m not going to cheat unless I start losing, then ill pull the aces out as a last resort.” To me it’s a viewpoint that is just trying to justify an act that is

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Moreover, if a hacker attains a patient’s record and adds false information to it, the risk of a medical complication increases. Categorizing Cyber Attackers Cyber attackers are categorized according to who they target, what tactics they use and which techniques they employ. 1. The Hacktivist A hacktivist is politically-motivated and targets institutions that have opposing political beliefs.…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards. They can…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this paper I will be assessing the impact of globalization on the U.S. criminal justice system. Then I will be comparing and contrast international criminal justice systems (Civil Law, Common law, and Islamic Law and Socialist Law traditions).Discuss the impact that cyber crime and technology have had on worldwide justice systems. • Differentiate the policing systems on a worldwide scale. • Identify major crimes and criminal issues that have a global impact on justice systems and processes (e.g., Somalia, Rwanda, Bosnia, Darfur, Congo, etc.).…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Eco Saboteurs

    • 1497 Words
    • 6 Pages

    1. Partridge means that humans have moral responsibilities towards people that they do not know individually and who may not even exist at the present. He uses a metaphor about a campsite to explain his argument: when they have finished camping at a campsite, a person has a moral obligation to clean it for the next person who will use it. While they do not know this person, they still have good reason to believe that someone will eventually come to use the campsite in the future and that by not cleaning the campsite they are wrongfully causing harm to this future person. He is effectively arguing that a person being “nonexistent is, morally speaking, nonrelevant” (59).…

    • 1497 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Anonymouss Are Ethical

    • 871 Words
    • 4 Pages

    Also, that hacking doesn't always mean bad and harm. The position that I endorse says Anonymous aren’t criminals and their actions are ethical from a utilitarian view. The details of this position go as follows. First, Anonymous is a hacker group that promotes free speech, unblocks access to information, and shows corruption in the government.…

    • 871 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Explain some cases in which you would perm-ban/temp-ban people: Spamming Chat Spamming in chat is saying the same word or any other different word 3 times without waiting atleast 1 second. The punishment is a warn then if the player does it the second time it is a mute! /warn , /ban Suspicious Links / IP-Loggers: Posting any links in chat that is none opcrat related could get you banned permanently for Suspicious links or IP-Loggers.…

    • 534 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    To ensure a non-authoritarian state, individuals must be given more freedom to enable each person to have an impact on any event. In the past, freedom promised by democratic governments have been hampered by the government’s own fear of its people. In fact, the FBI has numerous black marks against itself. This is a result of a few individuals that overstepped their boundaries.…

    • 1170 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    The article argues that online activism is more than just signing online petitions and liking things. Each action is significant in the fight for some sort of political change. Critics of it view it as a way for people to fulfil their moral obligations without actually doing anything but click a button. This article goes against this, discussing why social media activism is actually quite effective, no matter the size of an act.…

    • 1018 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Bullying can be traumatizing and the effects can be devastating. As technology today improves, cyberbullying becomes more and more common. Cyberbullying is repeated and hostile, and has “severe intent to threaten, embarrass, or harass”. Now with all of the new technology this harassment is virtually inescapable. Because of the negative effects that cyberbullying creates, it has become a largely debated issue whether an individual’s actions online should be prosecuted.…

    • 981 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Digital Democracy

    • 1113 Words
    • 4 Pages

    Digital democracy: Politics and the Internet LITERATURE REVIEW Peter Van Aelst, Stefaan Wargrave (2002) and Manual Castells (2012) explore the emergence of new media technologies, focusing on the Internet, in relation to it’s role in engaging individuals to perform social movements that are materialized through various forms. This is exemplified in the formation of organized protests, online petitions and campaigns that contribute to a united cause. Within Van Aelst and Walgrave’s article, the establishment of social movements that are based online are dissected through articulating them through 3 aspects: a shared interest that forms a collective identity, actual mobilization and a network of different organizations (Van Aelst & Walgrave…

    • 1113 Words
    • 4 Pages
    Great Essays