Wednesday, October 30, 2019
Issues in Contemporary media and cultural studies(Journal) Essay
Issues in Contemporary media and cultural studies(Journal) - Essay Example Hacking can be dated back to 1978 in the earlier days of Bell Telephone Companies, where earliest mischiefââ¬â¢s of application of modern community were experienced. However, at the moment it was not known as hacking. This paper aptly examines the theoretical and contextual perspective of hacking. It also examines the comparison of various types of hacking and evaluation with their interpretations. It further examines the social and political hacking of media. Hacking comes with different and conflicting definitions. For the purpose of this paper, Hacking is defined to ââ¬Å"unauthorized access to a computer networkâ⬠(Kumar, 2012, P.1). Hacking can also be defined as the use of various software methodologies using programming experimentation to achieve intended ill gain. According to Kumar (2012), hacking can be stated as unauthorized intrusion; hence the act of gaining access to a computer network with an absence of legal authority. The person who performs the act is a hacker. However, it must be noted that not all hackers are bad (Kumar, 2012), since the government and some huge companies use hackers to maintain their computer network security in order (Rogers 1994).Computer intrusion is regarded as unethical act (Doss, Smith &Yurcik, 2001), and there are laws that have been passed for purposes of prosecuting such acts (Spafford, 1992, p.7), hence it is regarded that once an individual uses his hacking ability to perpetrate a cri me, he is deemed as a criminal (Doss, Smith &Yurcik, 2001). Numerous debates have sparked off in matters regarding to ethical hacking and crime intrusion (Doss, Smith &Yurcik, 2001, p.54). Ethical intrusion is associated with ethical hackers who tend to utilize their knowledge in hacking to improve the system (Doss, Smith &Yurcik, 2001). Conversely, illegal hacking has continued to enjoy triumph celebration from hacking community. According to Leeson, hacking has a long
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.