SlideShare a Scribd company logo
1 of 12
The Infamous Hacker and
Society’s perspective
Randi Lovelett
What is a Hacker?
• A Hacker is a person that “tests the limitations
of information systems out of intellectual
curiosity-to see whether they can gain access and
how far they can go”. (Reynolds, 2014, p. 96)
▫ Contain at least a basic understanding of
information systems and security features.
▫ Motivation comes from desire to learn more.
Hackers and popular culture
• Popular culture has many different views about hackers:
▫ Some people "hail them as the heroes of the computer revolution“
▫ Others see them as the demons that stole their credit card
information
▫ They are referred by Janet Murray as the "one of the great
creative wellsprings of our time, causing the inanimate circuits to
sing with ever more individualized and quirky voices“
• In an article by Svetlana Nikitina, hackers are compared
to tricksters of mythology on a number of levels
▫ Trickers were known to “defy definition”, as do hackers.
▫ They both work to break boundaries.
▫ They both challenge us to be “be prepared for deceit and pranks”
as a part of their creative abilities.
(Nikitina, 2012)
Hackers vs. Crackers
Hackers Crackers
• Desire to test limits of
security systems.
• May also desire to gain
publicity.
• Motivated by desire to
learn more.
• Hack systems for to point
out vulnerabilities.
• Defined as hackers with
the intention of causing
trouble.
• Desire to test limits of
security systems.
• But also desire to steal
data, corrupt systems and
cause other problems.
• Hack systems for
personal gain.
(“What is Hacker?”)
So… what are they?
• Because of the misunderstandings of what hackers are
defined as, no one knows what to think of them.
▫ The mass media portrays them as malevolent rebels, adding to
their negative connotation.
 But really they misuse the term “hacker”. Instead they should be using
the term “cracker”.
▫ The Merriam-Webster Dictionary defines hackers as:
 “a person who is inexperienced or unskilled at a particular activity”
 “an expert at programming and solving problems with a computer.”
 These two very contradictory definitions contribute to the
misconceptions about hackers and their abilities.
(Nikitina, 2012)
Anonymous
• A widely known, loosely organized hacktivist
group created to promote free speech, free
access to information, and transparency of
government activities. (“What is Anonymous?”, 2015)
▫ Known for their hacks against governments world-
wide and against large corporations like Sony.
• Use computer hacking as their main tool
▫ But also use social media and organized street
protests to achieve their goals.
(Goode, 2015)
Anonymous continued…
• Was first known for playing pranks, but has
become more political and serious in recent
years. (“What is Anonymous?”, 2015)
▫ Commonly seen as cyberterrorists by governments
• Became one of the leading forces behind the
hacktivist movement in the 21st century.
▫ But they gave hackers a bad name through their
hypocritical ideals.
 Ex: promoting free speech by taking down websites.
(Goode, 2015)
The Hacker’s Perspective
• Studies have observed hacker’s cultural practices and
perceptions as technology evolves and as the cultural
view of hackers have changed.
▫ Especially after events like the Target hack of 2013.
• Society’s perspective towards hackers has become more
and more negative over time as personal privacy has
become an issue.
• Recently, a man named Steven Levy researched hacker
perspectives on surveillance and privacy and published
his findings in his book: Hackers: Heroes of the
Computer Revolution.
(Steinmetz, 2015)
Hacker Ethics
• The hacker ethic can be viewed as a particular
ontological perspective adopted by members of the
hacking subculture
• According to Steven Levy, hackers believe that:
1. Access to computers should be unlimited and total
 Provides the opportunity to take things apart and
possibly improve them
2. All information should be free
3. Mistrust authority-promote decentralization of
bureaucracies
 Deemed to be flawed systems because of the
boundaries they have to accessing information
(Steinmetz, 2015)
Hacker Ethics Continued
4. Hackers should be judged only by their hacking
abilities
 Not by age, sex, race, or position. Only by skill.
5. You can create art and beauty on a computer
6. Computers can change your life for the better
 They believe that computers have enriched our
lives and granted humans to turn dreams into
reality.
• Essentially, hackers love and promote freedom and
easy access to information.
(Steinmetz, 2015)
Conclusion
• Hackers have developed a negative connotation over the
years as technology and the concern for privacy have
grown.
▫ The group Anonymous and the media have contributed to
that.
• Most hackers are often mistaken for their “cracker”
counterparts, whom are hackers with malicious intent.
• Commonly seen as unethical people, when really hackers
have their own “ethical code” that goes against the
Computer Ethics Institute’s Computer Ethic code.
• Only through the development of technology and
concrete privacy policies can it be determined if hackers
are indeed good or bad to society.
References
Goode, L. (2015). Anonymous and the Political Ethos of Hacktivism. Popular Communication, 13(1),
74-86. doi:10.1080/15405702.2014.978000
NIKITINA, S. (2012). Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture. Journal Of
Popular Culture, 45(1), 133-152. doi:10.1111/j.1540-5931.2011.00915.x
Reynolds, G. (2014). Ethics in Information Technology (5th ed.). Cengage Learning.
Steinmetz, K., & Gerber, J. (2015). "It Doesn't Have to Be This Way": Hacker Perspectives on Privacy.
Social Justice, 41(3), 29-51.
What is Anonymous? - Definition from WhatIs.com. (2015, November). Retrieved July 06, 2016, from
http://whatis.techtarget.com/definition/Anonymous
What is hacker? - Definition from WhatIs.com. (n.d.). Retrieved July 06, 2016, from
http://searchsecurity.techtarget.com/definition/hacker

More Related Content

What's hot

Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
 
Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)Alex Dunedin
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppointatkinsondf
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Securitypenetration Tester
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberIGF Indonesia
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 
Gatekeepers Presentation B I L E T A
Gatekeepers  Presentation B I L E T AGatekeepers  Presentation B I L E T A
Gatekeepers Presentation B I L E T AEmily Laidlaw
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSteven Hatfield
 

What's hot (20)

Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
 
Judgement Day - Slovakia
Judgement Day  - SlovakiaJudgement Day  - Slovakia
Judgement Day - Slovakia
 
Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)Raab festival of ideas presentation 2015+logo(1)
Raab festival of ideas presentation 2015+logo(1)
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppoint
 
Intro
IntroIntro
Intro
 
Introduction of Cyber Security
Introduction of Cyber SecurityIntroduction of Cyber Security
Introduction of Cyber Security
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan SiberID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
ID IGF 2016 - Hukum 3 - Mewujudkan Kedaulatan dan Ketahanan Siber
 
Hacking
HackingHacking
Hacking
 
Ka3118541860
Ka3118541860Ka3118541860
Ka3118541860
 
What is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniquesWhat is a Hacker (part 1): Types, tools and techniques
What is a Hacker (part 1): Types, tools and techniques
 
F2C12: Vint Cerf
F2C12: Vint CerfF2C12: Vint Cerf
F2C12: Vint Cerf
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cs
CsCs
Cs
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Gatekeepers Presentation B I L E T A
Gatekeepers  Presentation B I L E T AGatekeepers  Presentation B I L E T A
Gatekeepers Presentation B I L E T A
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random StrangerSocial engineering 101 or The Art of How You Got Owned by That Random Stranger
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 

Similar to Some Perspective on Hackers

The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxwhittemorelucilla
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxGautam708801
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxshericehewat
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816Nicole Fields
 
Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Roy King
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismUniversity of Sydney
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfarchanaemporium
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 

Similar to Some Perspective on Hackers (20)

The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Cyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docxCyberterrorism can be in the form of Information attacks which a.docx
Cyberterrorism can be in the form of Information attacks which a.docx
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
hacking
hackinghacking
hacking
 
module 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptxmodule 3 Cyber Risks and Incident Management.pptx
module 3 Cyber Risks and Incident Management.pptx
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
HackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docxHackScott Vinger How has the perception of the hacker chan.docx
HackScott Vinger How has the perception of the hacker chan.docx
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Hacking
HackingHacking
Hacking
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
nullcon 2010 - Underground Economy
nullcon 2010 - Underground Economynullcon 2010 - Underground Economy
nullcon 2010 - Underground Economy
 
Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010Democracy2 IPMA Jan 12 2010
Democracy2 IPMA Jan 12 2010
 
hackers
hackershackers
hackers
 
The Rise of Internet Freedom Activism
The Rise of Internet Freedom ActivismThe Rise of Internet Freedom Activism
The Rise of Internet Freedom Activism
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdfBriefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
Briefly define cyberterrorism. Define hacktivism. Illustrate example.pdf
 
Malwares
MalwaresMalwares
Malwares
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 

Some Perspective on Hackers

  • 1. The Infamous Hacker and Society’s perspective Randi Lovelett
  • 2. What is a Hacker? • A Hacker is a person that “tests the limitations of information systems out of intellectual curiosity-to see whether they can gain access and how far they can go”. (Reynolds, 2014, p. 96) ▫ Contain at least a basic understanding of information systems and security features. ▫ Motivation comes from desire to learn more.
  • 3. Hackers and popular culture • Popular culture has many different views about hackers: ▫ Some people "hail them as the heroes of the computer revolution“ ▫ Others see them as the demons that stole their credit card information ▫ They are referred by Janet Murray as the "one of the great creative wellsprings of our time, causing the inanimate circuits to sing with ever more individualized and quirky voices“ • In an article by Svetlana Nikitina, hackers are compared to tricksters of mythology on a number of levels ▫ Trickers were known to “defy definition”, as do hackers. ▫ They both work to break boundaries. ▫ They both challenge us to be “be prepared for deceit and pranks” as a part of their creative abilities. (Nikitina, 2012)
  • 4. Hackers vs. Crackers Hackers Crackers • Desire to test limits of security systems. • May also desire to gain publicity. • Motivated by desire to learn more. • Hack systems for to point out vulnerabilities. • Defined as hackers with the intention of causing trouble. • Desire to test limits of security systems. • But also desire to steal data, corrupt systems and cause other problems. • Hack systems for personal gain. (“What is Hacker?”)
  • 5. So… what are they? • Because of the misunderstandings of what hackers are defined as, no one knows what to think of them. ▫ The mass media portrays them as malevolent rebels, adding to their negative connotation.  But really they misuse the term “hacker”. Instead they should be using the term “cracker”. ▫ The Merriam-Webster Dictionary defines hackers as:  “a person who is inexperienced or unskilled at a particular activity”  “an expert at programming and solving problems with a computer.”  These two very contradictory definitions contribute to the misconceptions about hackers and their abilities. (Nikitina, 2012)
  • 6. Anonymous • A widely known, loosely organized hacktivist group created to promote free speech, free access to information, and transparency of government activities. (“What is Anonymous?”, 2015) ▫ Known for their hacks against governments world- wide and against large corporations like Sony. • Use computer hacking as their main tool ▫ But also use social media and organized street protests to achieve their goals. (Goode, 2015)
  • 7. Anonymous continued… • Was first known for playing pranks, but has become more political and serious in recent years. (“What is Anonymous?”, 2015) ▫ Commonly seen as cyberterrorists by governments • Became one of the leading forces behind the hacktivist movement in the 21st century. ▫ But they gave hackers a bad name through their hypocritical ideals.  Ex: promoting free speech by taking down websites. (Goode, 2015)
  • 8. The Hacker’s Perspective • Studies have observed hacker’s cultural practices and perceptions as technology evolves and as the cultural view of hackers have changed. ▫ Especially after events like the Target hack of 2013. • Society’s perspective towards hackers has become more and more negative over time as personal privacy has become an issue. • Recently, a man named Steven Levy researched hacker perspectives on surveillance and privacy and published his findings in his book: Hackers: Heroes of the Computer Revolution. (Steinmetz, 2015)
  • 9. Hacker Ethics • The hacker ethic can be viewed as a particular ontological perspective adopted by members of the hacking subculture • According to Steven Levy, hackers believe that: 1. Access to computers should be unlimited and total  Provides the opportunity to take things apart and possibly improve them 2. All information should be free 3. Mistrust authority-promote decentralization of bureaucracies  Deemed to be flawed systems because of the boundaries they have to accessing information (Steinmetz, 2015)
  • 10. Hacker Ethics Continued 4. Hackers should be judged only by their hacking abilities  Not by age, sex, race, or position. Only by skill. 5. You can create art and beauty on a computer 6. Computers can change your life for the better  They believe that computers have enriched our lives and granted humans to turn dreams into reality. • Essentially, hackers love and promote freedom and easy access to information. (Steinmetz, 2015)
  • 11. Conclusion • Hackers have developed a negative connotation over the years as technology and the concern for privacy have grown. ▫ The group Anonymous and the media have contributed to that. • Most hackers are often mistaken for their “cracker” counterparts, whom are hackers with malicious intent. • Commonly seen as unethical people, when really hackers have their own “ethical code” that goes against the Computer Ethics Institute’s Computer Ethic code. • Only through the development of technology and concrete privacy policies can it be determined if hackers are indeed good or bad to society.
  • 12. References Goode, L. (2015). Anonymous and the Political Ethos of Hacktivism. Popular Communication, 13(1), 74-86. doi:10.1080/15405702.2014.978000 NIKITINA, S. (2012). Hackers as Tricksters of the Digital Age: Creativity in Hacker Culture. Journal Of Popular Culture, 45(1), 133-152. doi:10.1111/j.1540-5931.2011.00915.x Reynolds, G. (2014). Ethics in Information Technology (5th ed.). Cengage Learning. Steinmetz, K., & Gerber, J. (2015). "It Doesn't Have to Be This Way": Hacker Perspectives on Privacy. Social Justice, 41(3), 29-51. What is Anonymous? - Definition from WhatIs.com. (2015, November). Retrieved July 06, 2016, from http://whatis.techtarget.com/definition/Anonymous What is hacker? - Definition from WhatIs.com. (n.d.). Retrieved July 06, 2016, from http://searchsecurity.techtarget.com/definition/hacker