Computer hacker culture and subcultures term paper

  • Category: Education
  • Words: 478
  • Published: 12.25.19
  • Views: 537
Download This Paper

Cracking, Computer Viruses, Computer Science, Computer Industry

Excerpt from Term Paper:

Peer acknowledgement too performs into a large number of hackers inspiration as they work towards being accepted and increasing status in the culture. and, lastly, several hackers will be motivated by thought that their particular efforts provide a public service (O’Neill, 2006). “Hackers built the Internet, they produced the Unix operating system what it is, and they make the World Wide Web work” (Castelluccio, 2003).

Forecast 4:

Forecast 5 states, “Some computer hacker groups, remarkably those characterized by the ‘offender’ and ‘predator’ categories, will certainly evolve into networked criminal enterprises. inch

This likely will result from some occasions. Hacker culture’s desire to gain power and notoriety, combined with the need to make that happen adrenaline fix, will business lead some to ultimately progress from the loosely structured lifestyle of hackers today, into a more official, networked felony group. However , for the most part, the high yield rate with the culture, combined with desire to keep secrecy and anonymity, may prevent many from creating this evolutionary start.

It is likely that specific hackers will be recruited by other organizations to commit digital criminal offenses and digital terrorism, however most, as a result of secretive characteristics, will not fall under this pitfall.

Those vulnerable to this will likely always be individuals who are on the societal edge and are sympathetic to a particular cause or movement. Additionally , it is likely that users in an set up group will be trained as hackers, to get the sole reason for carrying out the wishes of the organization.

Digital terrorism may be used to intimidate mainstream society, or perhaps can be utilized to steal sensitive data or cash. Law enforcement must adjust all their investigation and prosecution methods to meet the new challenges of cyber crimes. With small physical proof at their disposal, regulators will have to become experts at tracking digital evidence.

Realization:

In the end, the increased usage of computing technology and the ever-increasing nature with the Internet has led to new and greater possibilities for cyber-terrorist. This male-dominated culture relies in secrecy, despite the ought to relinquish this kind of secrecy in order to gain community position, anonymity, and a love for technology. Curiosity in addition to a desire for electric power leads a large number of to cracking, and as technology increases, this curiosity sure will only carry on and grow.

Recommendations

Best, K. (Dec 2003). The hacker’s challenge. Social Semiotics, 13(3). Retrieved Mar 20, 08, from Educational Search Top database.

Finest, K. (Oct 2006). Visceral hacking or packet wanking? Culture, Theory Critique, 47(2). Retrieved 03 20, 08

Need writing help?

We can write an essay on your own custom topics!