Search for Free 150,000+ Essays

Find more results for this search now!

Need a Brand New Custom Essay Now?  click here

Hacking Research Paper


Describe a negative aspect of ICT’s impact on the information society. Describe how ICT has brought this about and what society is has done in response to it.


Hacking has been and still disease different societies suffer from. The essay aims to provide the reader with knowledge regarding the effects hacking caused to our society, and how the society responded and tried to solve or minimize those effects.

Different issues regarding hacking are discussed, such as the motivations that were behind guiding hackers who were at first computer professional to perform unauthorized activities, at the same time a discussion about the types of attacks can be found.

The society response to hacking attacks lacks till this moment the ability to stop or completely prevent attacks from happening because as long as security tools are developed, more sophisticated hacking attacks are invented. That’s why we should start to think about hacker’s psychology as the main way to prevent and stop attacks by understanding their needs or desires.


The Oxford English Dictionary defines hacking as “cut or chop roughly; mangle: cut (one’s way)”… to its present definition as “gain unauthorized access (to data in a computer)”. Banks (1997:11) defines hacking as “something that boring mainframe computer operators did to improve performance and battle boredom.” Here banks focuses on boredom as the reason of hacking. A more technical definition of hacking according to Digital Guards data base (2001) is “unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network.” Darlington (2001) believes hacking is not limited to accessing data or information but also includes an attack on the privacy of all people. Almost all different opinions agree on the illegality of hacking.

On the other hand the word hacker is the agent of hack or hacking and it was defined as a person who enjoys accessing files whether for fun, imposing power or the interest related to the accessed files or data according to Taylor (1999). While Marotta (in Taylor, 1993) has a negative view of the hacker as a data lord, a barbarian who takes what he wants. Himanen (2001) defines hacker as any person who performs illegal actions whether they were related to computer or not which means the usage of a device apart from its functionality. Seems hacking according to Himanen is related to any illegal or unauthorized action. Seebach (1999)...

Sign In Now to Read Entire Essay

Not a Member?   Create Your FREE Account »

Comments / Reviews

read full essay >>

Already a Member?   Login Now >

This essay and THOUSANDS of
other essays are FREE at eCheat.

Uploaded by:  


Category:   Technology

Length:   19 pages (4,182 words)

Views:   34524

Report this Essay Save Essay
Professionally written essays on this topic:

Hacking Research Paper

  • Computer Hacking's Impact

    in most instances it is the intellectual challenge that drives hackers (Kotze, 2004). However, there are those hackers for...

  • Some Theoretical Content of a HRM Research Paper

    adopted appears to have its basis in an analytical deductive approach. A case study approach is very useful where a researcher wis...

  • Hackers and Hacking

    Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

  • SQL Injection Attacks

    forum which ensured that users would know that the network had been compromised by a hacker. The first indication that the syste...

  • Self and MPD

    In eight pages this research paper considers the self with relation to multiple personality disorder and includes an examination o...

  • Crimes Committed by Computers

    The Comprehensive Crime Control Act was created as a means by which to provide Secret Service with legal influence over both compu...

  • The Ethics of Hacking

    be quite costly and we have endured this cost for several decades. Roush (1995), for example, provides insight on the historical ...

  • E-Voting and a Compromised Democracy

    is, is rather frightening. Yet, e-voting has received much acclaim throughout the world. French MP Andr? Santini claims that E-dem...

  • Overview of Computer Security

    In ten pages this research paper focuses on computer security and its breaches with statistics covering its type, incidences, and ...

  • Computer Hacking and How It Has Evolved

    In twelve pages this paper discusses computer hacking in a consideration of its history and evolution with legal issues and preven...

View more professionally written essays on this topic »