SlideShare a Scribd company logo
1 of 9
Read Case 2.1: Hacking into Harvard, located on page 71 in
your textbook. As applicants began to defend themselves
against the penalties handed out by the business schools, they
appealed to both consequentialist and nonconsequentialist
criteria to support their actions. Some responded by pointing
out that their intentions were never malicious, while others
argued they did not think checking their application statuses
would cause any real harm. Review the case study and analyze
the actions of the students from a Kantian perspective. Consider
whether the actions taken by the hackers were permissible
according the standard of universal acceptability.
CASE 2.1 Hacking into Harvard EVERYONE WHO HAS EVER
APPLIED FOR ADMISSION to a selective college or who has
been interviewed for a highly desired job knows the feeling of
waiting impatiently to learn the result of one’s application. So
it’s not hard to identify with those applicants to some of the
nation’s most prestigious MBA programs who thought they had
a chance to get an early glimpse at whether their ambition was
to be fulfilled. While visiting a Businessweek Online message
board, they found instructions, posted by an anonymous hacker,
explaining how to find out what admission decision the business
schools had made in their case. Doing so wasn’t hard. The
universities in question—Harvard, Dartmouth, Duke, Carnegie
Mellon, MIT, and Stanford—used the same application software
from Apply Yourself, Inc. Essentially, all one had to do was
change the very end of the applicant-specific URL to get to the
supposedly restricted page containing the verdict on one’s
application. In the nine hours it took Apply Yourself
programmers to patch the security flaw after it was posted,
curiosity got the better of about two hundred applicants, who
couldn’t resist the temptation to discover whether they had been
admitted.19 Some of them got only blank screens. But others
learned that they had been tentatively accepted or tentatively
rejected. What they didn’t count on, however, were two things:
first, that it wouldn’t take the business schools long to learn
what had happened and who had done it and, second, that the
schools in question were going to be very unhappy about it.
Harvard was perhaps the most outspoken. Kim B. Clark, dean of
the business school, said, “This behavior is unethical at best—a
serious breach of trust that cannot be countered by
rationalization.” In a similar vein, Steve Nelson, the executive
director of Harvard’s MBA program, stated, “Hacking into a
system in this manner is unethical and also contrary to the
behavior we expect of leaders we aspire to develop.” It didn’t
take Harvard long to make up its mind what to do about it. It
rejected all 119 applicants who had attempted to access the
information. In an official statement, Dean Clark wrote that the
mission of the Harvard Business School “is to educate
principled leaders who make a difference in the world. To
achieve that, a person must have many skills and qualities,
including the highest standards of integrity, sound judgment and
a strong moral compass—an intuitive sense of what is right and
wrong. Those who have hacked into this web site have failed to
pass that test.” Carnegie Mellon and MIT quickly followed suit.
By rejecting the ethically challenged, said Richard L.
Schmalensee, dean of MIT’s Sloan School of Management, the
schools are trying to “send a message to society as a whole that
we are attempting to produce people that when they go out into
the world, they will behave ethically.” Duke and Dartmouth,
where only a handful of students gained access to their files,
said they would take a case-by-case approach and didn’t
publicly announce their individualized determinations. But,
given the competition for places in their MBA programs, it’s a
safe bet that few, if any, offending applicants were sitting in
classrooms the following semester. Forty-two applicants
attempted to learn their results early at Stanford, which took a
different tack. It invited the accused hackers to explain
themselves in writing. “In the best case, what has been
demonstrated here is a lack of judgment; in the worst case, a
lack of integrity,” said Derrick Bolton, Stanford’s director of
MBA admissions. “One of the things we try to teach at business
schools is making good decisions and taking responsibility for
your actions.” Six weeks later, however, the dean of Stanford
Business School, Robert Joss, reported, “None of those who
gained unauthorized access was able to explain his or her
actions to our satisfaction.” He added that he hoped the
applicants “might learn from their experience.” Given the
public’s concern over the wave of corporate scandals in recent
years and its growing interest in corporate social responsibility,
business writers and other media commentators warmly
welcomed Harvard’s decisive response. But soon there was
some sniping at the decision by those claiming that Harvard and
the other business schools had overreacted. Although 70 percent
of Harvard’s MBA students approved the decision, the
undergraduate student newspaper, The Crimson, was skeptical.
“HBS [Harvard Business School] has scored a media victory
with its hard-line stance,” it said in an editorial. “Americans
have been looking for a sign from the business community,
particularly its leading educational institutions, that business
ethics are a priority. HBS’s false bravado has given them one,
leaving 119 victims in angry hands.” As some critics pointed
out, Harvard’s stance overlooked the possibility that the hacker
might have been a spouse or a parent who had access to the
applicant’s password and personal identification number. In
fact, one applicant said that this had happened to him. His wife
found the instructions at Businessweek Online and tried to
check on the success of his application. “I’m really distraught
over this,” he said. “My wife is tearing her hair out.” To this,
Harvard’s Dean Clark responds, “We expect applicants to be
personally responsible for the access to the website, and for the
identification and passwords they receive.” Critics also reject
the idea that the offending applicants were “hackers.” After all,
they used their own personal identification and passwords to log
on legitimately; all they did was to modify the URL to go to a
different page. They couldn’t change anything in their files or
view anyone else’s information. In fact, some critics blamed the
business schools and Apply Yourself more than they did the
applicants. If those pages were supposed to be restricted, then it
shouldn’t have been so easy to find one’s way to them. In an
interview, one of the Harvard applicants said that although he
now sees that what he did was wrong, he wasn’t thinking about
that at the time—he just followed the hacker’s posted
instructions out of curiosity. He didn’t consider what he did to
be “hacking,” because any novice could have done the same
thing. “I’m not an IT person by any stretch of the imagination,”
he said. “I’m not even a great typist.” He wrote the university a
letter of apology. “I admitted that I got curious and had a lapse
in judgment,” he said. “I pointed out that I wasn’t trying to
harm anyone and wasn’t trying to get an advantage over
anyone.” Another applicant said that he knew he had made a
poor judgment but he was offended by having his ethics called
into question. “I had no idea that they would have considered
this a big deal.” And some of those posting messages at
Businessweek Online and other MBA-related sites believe the
offending applicants should be applauded. “Exploiting
weaknesses is what good business is all about. Why would they
ding you?” wrote one anonymous poster. Dean Schmalensee of
MIT, however, defends Harvard and MIT’s automatically
rejecting everyone who peeked “because it wasn’t an impulsive
mistake.” “The instructions are reasonably elaborate,” he said.
“You didn’t need a degree in computer science, but this clearly
involved effort. You couldn’t do this casually without knowing
that you were doing something wrong. We ’ve always taken eth
ics seriously, and this is a serious matter.” To those applicants
who say that they didn’t do any harm, Schmalensee replies, “Is
there nothing wrong with going through files just because you
can?” To him and others, seeking unauthorized access to
restricted pages is as wrong as snooping through your boss’s
desk to see whether you’ve been recommended for a raise. Some
commentators, however, suggest there may be a generation gap
here. Students who grew up with the Internet, they say, tend to
see it as wide-open territory and don’t view this level of web
snooping as indicating a character flaw.
Email Hacking Is A Serious Crime
POSTED IN
PRIVACY LAW
BY LAWYERS.COM
SM
Practically everyone has an email account, and they're used for
personal and business reasons. It's only natural for us to expect
a little
privacy
in our email, and there are all sorts of
federal
and
state laws
protecting that privacy.
A case involving former Governor
Sarah Palin
shows how serious it can be to break these laws and hack into
someone else's email account.
College "Prank?"
In April 2010, David Kernell went on trial for "hacking" into
then-Alaskan Governor Sarah Palin's personal email account.
In 2008, John McCain was the Republican party's candidate for
president. Sarah Palin was the Governor of Alaska and McCain's
vice-presidential running mate.
David Kernell
, the son of a Tennessee
state lawmaker
, was a student at the University of Tennessee.
At this time, it's claimed Kernell wanted to "derail" Palin's
campaign, and he gained access or "hacked" into Palin's
personal
Yahoo
email account. He apparently changed the password and posted
personal information he found in the emails on a website. He
also posted the password so others could access the account.
Kernell was
indicted
- meaning a
grand jury
thought there was enough evidence to put him on trial - on
several federal charges. A jury
convicted him
of only two charges. He was sentenced to one year and one day
in federal prison.
The jury didn't buy Kernell's defense that it was all just a prank.
The Law
Kernell's case shows the types of crimes an email hacker may
face. He was charged with four very serious
felony crimes
:
Wire Fraud
In simple terms,
wire fraud
involves using a computer, radio, television, or telephone to
get money or property from someone else through trickery or
deception. Although taking money is a common example - such
as through various internet
scams
- stealing personal and confidential information qualifies as
wire fraud, too.
One of the keys to wire fraud is that the emails, telephone calls,
or wire transmissions have to pass between two or more states
or countries.
It was claimed that Kernell used an old computer in Tennessee
to hack into Palin's email account, which, presumably, was
based in Alaska. Once in, he took personal information, such as
email addresses and telephone numbers, and posted them online.
Kernell was not convicted of this crime.
Computer Fraud
Computer fraud
isn't much different than wire fraud, except this crime applies
only to computers, as opposed to telephones and radios, and it
also requires some sort of interstate connection. However, the
law applies only to computers used:
1.
By or for financial institutions, like banks, or the US
Government
2.
In such a way that the computer impacts interstate or foreign
commerce or communication of the US
Presumably, Palin's connection to the federal election and
Senator McCain brought the federal computer fraud law into
play. Kernell was convicted of
unauthorized access to a protected computer
, which falls under computer fraud.
Identity Theft
Identity theft
is when someone uses fraud, deception, or trickery to get and
use another person's personal information. Usually, the
information is used by the thief to make money, but money
doesn't have to be involved.
In Kernell's case, once Palin selected the email address, "
[email protected]
," it became her own, unique address and no one else could use
it. When Kernell accessed and used that email account he
gained access to personal information, such as family email
addresses, family pictures, birth dates of Palin and family
members and pictures of Palin's family members.
This information was posted online as part of Kernell's plot to
derail Palin's vice-presidential bid.
Kernnel was not convicted of this crime.
Obstruction of Justice
Obstruction of justice
covers many things, but it typically means interfering with
some legal process or investigation. Kernell was charged with
this crime because it was claimed he tried to erase evidence of
his hacking activities from his computer before federal
investigators could retrieve it.
Kennel was convicted of this crime.
Other Laws
Someone in Kernell's position could face other criminal charges
and non-criminal (or "civil") lawsuits, too. The federal
government doesn't have to get involved, either.
For example, in most states, there are criminal and civil
identity theft laws
. In addition, in some states, like Virginia, it's an invasion of
privacy to look at someone's personal information, and it's a
crime. In many states, like
Maryland
, accessing and telling the world about another person's personal
information is an invasion of privacy that may make the hacker
liable for money damages to the victim.
Even if, as it was claimed Kernell's case, the email hacking was
a "prank," the hacker could still be charged with less serious
crimes (called
misdemeanors
) and face several months in jail, thousands of dollars in fines
or both.
Hacking is indeed a serious crime. If you're thinking about
doing it, even as a joke, you should think again.
Questions for Your Attorney
1.
What's the first thing I should do if I think someone has hacked
into my email account?
2.
Is it a crime if I look at my spouse's email account without
permission?
3.
If my child uses my computer to commit a crime, can the
authorities take my computer and search anything on it,
including my personal files and data?
Retrieved from: communications-media.lawyers.com/.../ email-
hacking-is-a serious crime

More Related Content

Similar to Read Case 2.1 Hacking into Harvard, located on page 71 in your text.docx

Jeffrey powell print DCL 25-April-2012
Jeffrey powell print DCL 25-April-2012Jeffrey powell print DCL 25-April-2012
Jeffrey powell print DCL 25-April-2012
Jeffrey Powell
 
Plagiarism slide
Plagiarism slidePlagiarism slide
Plagiarism slide
dedelgado
 
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions  Melissa Black, .docxDisadvantages of Social Media on Hiring Decisions  Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
lynettearnold46882
 
The Facebook Face-off
The Facebook Face-offThe Facebook Face-off
The Facebook Face-off
Alixandra Porembski, MBA
 
36South African Journal of Science httpwww.sajs.co.zaVol.docx
36South African Journal of Science  httpwww.sajs.co.zaVol.docx36South African Journal of Science  httpwww.sajs.co.zaVol.docx
36South African Journal of Science httpwww.sajs.co.zaVol.docx
lorainedeserre
 

Similar to Read Case 2.1 Hacking into Harvard, located on page 71 in your text.docx (13)

Jeffrey powell print DCL 25-April-2012
Jeffrey powell print DCL 25-April-2012Jeffrey powell print DCL 25-April-2012
Jeffrey powell print DCL 25-April-2012
 
O'Connor & Schmidt (2016) teaching students about personal social media use a...
O'Connor & Schmidt (2016) teaching students about personal social media use a...O'Connor & Schmidt (2016) teaching students about personal social media use a...
O'Connor & Schmidt (2016) teaching students about personal social media use a...
 
2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics2013 (ISC)² Congress: This Curious Thing Called Ethics
2013 (ISC)² Congress: This Curious Thing Called Ethics
 
Riset keperilakuan
Riset keperilakuanRiset keperilakuan
Riset keperilakuan
 
Is social media the new surveillance?
Is social media the new surveillance?Is social media the new surveillance?
Is social media the new surveillance?
 
Plagiarism slide
Plagiarism slidePlagiarism slide
Plagiarism slide
 
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions  Melissa Black, .docxDisadvantages of Social Media on Hiring Decisions  Melissa Black, .docx
Disadvantages of Social Media on Hiring Decisions Melissa Black, .docx
 
The Facebook Face-off
The Facebook Face-offThe Facebook Face-off
The Facebook Face-off
 
PBL Publishing & Sharing with Web Identity in Mind
PBL Publishing & Sharing with Web Identity in MindPBL Publishing & Sharing with Web Identity in Mind
PBL Publishing & Sharing with Web Identity in Mind
 
36South African Journal of Science httpwww.sajs.co.zaVol.docx
36South African Journal of Science  httpwww.sajs.co.zaVol.docx36South African Journal of Science  httpwww.sajs.co.zaVol.docx
36South African Journal of Science httpwww.sajs.co.zaVol.docx
 
How To Write A College Essay Apa Style
How To Write A College Essay Apa StyleHow To Write A College Essay Apa Style
How To Write A College Essay Apa Style
 
Read page and answer.docx
Read page and answer.docxRead page and answer.docx
Read page and answer.docx
 
National Nursing News: Social Responsibility: Social Media Opportunities And ...
National Nursing News: Social Responsibility: Social Media Opportunities And ...National Nursing News: Social Responsibility: Social Media Opportunities And ...
National Nursing News: Social Responsibility: Social Media Opportunities And ...
 

More from niraj57

Need help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docxNeed help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docx
niraj57
 
need help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docxneed help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docx
niraj57
 
Need discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docxNeed discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docx
niraj57
 
Need at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docxNeed at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docx
niraj57
 
Need as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docxNeed as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docx
niraj57
 
Need Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docxNeed Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docx
niraj57
 
Need Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docxNeed Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docx
niraj57
 
Need a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docxNeed a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docx
niraj57
 
Need all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docxNeed all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docx
niraj57
 

More from niraj57 (20)

Need help in doing two assignment, first one the topic will be Soci.docx
Need help in doing two assignment, first one the topic will be Soci.docxNeed help in doing two assignment, first one the topic will be Soci.docx
Need help in doing two assignment, first one the topic will be Soci.docx
 
Need for Cultural Competence Use this Discussion to practice as a .docx
Need for Cultural Competence Use this Discussion to practice as a .docxNeed for Cultural Competence Use this Discussion to practice as a .docx
Need for Cultural Competence Use this Discussion to practice as a .docx
 
need help in finance report,I already have report with all the b.docx
need help in finance report,I already have report with all the b.docxneed help in finance report,I already have report with all the b.docx
need help in finance report,I already have report with all the b.docx
 
Need help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docxNeed help creating a very simple mobile game using Flash builder and.docx
Need help creating a very simple mobile game using Flash builder and.docx
 
Need help finsishing a potery explication esssay that i started,.docx
Need help finsishing a potery explication esssay that i started,.docxNeed help finsishing a potery explication esssay that i started,.docx
Need help finsishing a potery explication esssay that i started,.docx
 
need help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docxneed help completing week 6 ilab.. i will upload what I currently ha.docx
need help completing week 6 ilab.. i will upload what I currently ha.docx
 
Need discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docxNeed discussion board type answers to the following questions. No wo.docx
Need discussion board type answers to the following questions. No wo.docx
 
Need at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docxNeed at least a 200 min word response with a cited sourceI do .docx
Need at least a 200 min word response with a cited sourceI do .docx
 
Need by tomorrow 3pm estUse the Internet to research the various m.docx
Need by tomorrow 3pm estUse the Internet to research the various m.docxNeed by tomorrow 3pm estUse the Internet to research the various m.docx
Need by tomorrow 3pm estUse the Internet to research the various m.docx
 
Need assignment ASAP well written no plagiarism and own work= 1050 t.docx
Need assignment ASAP well written no plagiarism and own work= 1050 t.docxNeed assignment ASAP well written no plagiarism and own work= 1050 t.docx
Need assignment ASAP well written no plagiarism and own work= 1050 t.docx
 
Need as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docxNeed as soon as possible1)Which of the following represent .docx
Need as soon as possible1)Which of the following represent .docx
 
Need Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docxNeed Argumentative essay of minimum of 2000 words over sources below.docx
Need Argumentative essay of minimum of 2000 words over sources below.docx
 
Need Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docxNeed Argumentative essay of minimum over sources below.  Essay needs.docx
Need Argumentative essay of minimum over sources below.  Essay needs.docx
 
Need a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docxNeed a job description for the Miami Police Department. It was one o.docx
Need a job description for the Miami Police Department. It was one o.docx
 
Need answers ASAP!!1.Explain how the project manager measure.docx
Need answers ASAP!!1.Explain how the project manager measure.docxNeed answers ASAP!!1.Explain how the project manager measure.docx
Need answers ASAP!!1.Explain how the project manager measure.docx
 
Need a cost management plan that includes the followingCost Estim.docx
Need a cost management plan that includes the followingCost Estim.docxNeed a cost management plan that includes the followingCost Estim.docx
Need a cost management plan that includes the followingCost Estim.docx
 
Need all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docxNeed all of this answeredPart IDefine the following term.docx
Need all of this answeredPart IDefine the following term.docx
 
Need an Essay in Humanites about .docx
Need an Essay in Humanites about .docxNeed an Essay in Humanites about .docx
Need an Essay in Humanites about .docx
 
need a paper written, no particular ampunt of words as long as the.docx
need a paper written, no particular ampunt of words as long as the.docxneed a paper written, no particular ampunt of words as long as the.docx
need a paper written, no particular ampunt of words as long as the.docx
 
Need 3 people to do assignment; Independent Challenge 1, Independent.docx
Need 3 people to do assignment; Independent Challenge 1, Independent.docxNeed 3 people to do assignment; Independent Challenge 1, Independent.docx
Need 3 people to do assignment; Independent Challenge 1, Independent.docx
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
fonyou31
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 

Read Case 2.1 Hacking into Harvard, located on page 71 in your text.docx

  • 1. Read Case 2.1: Hacking into Harvard, located on page 71 in your textbook. As applicants began to defend themselves against the penalties handed out by the business schools, they appealed to both consequentialist and nonconsequentialist criteria to support their actions. Some responded by pointing out that their intentions were never malicious, while others argued they did not think checking their application statuses would cause any real harm. Review the case study and analyze the actions of the students from a Kantian perspective. Consider whether the actions taken by the hackers were permissible according the standard of universal acceptability. CASE 2.1 Hacking into Harvard EVERYONE WHO HAS EVER APPLIED FOR ADMISSION to a selective college or who has been interviewed for a highly desired job knows the feeling of waiting impatiently to learn the result of one’s application. So it’s not hard to identify with those applicants to some of the nation’s most prestigious MBA programs who thought they had a chance to get an early glimpse at whether their ambition was to be fulfilled. While visiting a Businessweek Online message board, they found instructions, posted by an anonymous hacker, explaining how to find out what admission decision the business schools had made in their case. Doing so wasn’t hard. The universities in question—Harvard, Dartmouth, Duke, Carnegie Mellon, MIT, and Stanford—used the same application software from Apply Yourself, Inc. Essentially, all one had to do was change the very end of the applicant-specific URL to get to the supposedly restricted page containing the verdict on one’s application. In the nine hours it took Apply Yourself programmers to patch the security flaw after it was posted, curiosity got the better of about two hundred applicants, who couldn’t resist the temptation to discover whether they had been admitted.19 Some of them got only blank screens. But others learned that they had been tentatively accepted or tentatively rejected. What they didn’t count on, however, were two things:
  • 2. first, that it wouldn’t take the business schools long to learn what had happened and who had done it and, second, that the schools in question were going to be very unhappy about it. Harvard was perhaps the most outspoken. Kim B. Clark, dean of the business school, said, “This behavior is unethical at best—a serious breach of trust that cannot be countered by rationalization.” In a similar vein, Steve Nelson, the executive director of Harvard’s MBA program, stated, “Hacking into a system in this manner is unethical and also contrary to the behavior we expect of leaders we aspire to develop.” It didn’t take Harvard long to make up its mind what to do about it. It rejected all 119 applicants who had attempted to access the information. In an official statement, Dean Clark wrote that the mission of the Harvard Business School “is to educate principled leaders who make a difference in the world. To achieve that, a person must have many skills and qualities, including the highest standards of integrity, sound judgment and a strong moral compass—an intuitive sense of what is right and wrong. Those who have hacked into this web site have failed to pass that test.” Carnegie Mellon and MIT quickly followed suit. By rejecting the ethically challenged, said Richard L. Schmalensee, dean of MIT’s Sloan School of Management, the schools are trying to “send a message to society as a whole that we are attempting to produce people that when they go out into the world, they will behave ethically.” Duke and Dartmouth, where only a handful of students gained access to their files, said they would take a case-by-case approach and didn’t publicly announce their individualized determinations. But, given the competition for places in their MBA programs, it’s a safe bet that few, if any, offending applicants were sitting in classrooms the following semester. Forty-two applicants attempted to learn their results early at Stanford, which took a different tack. It invited the accused hackers to explain themselves in writing. “In the best case, what has been demonstrated here is a lack of judgment; in the worst case, a lack of integrity,” said Derrick Bolton, Stanford’s director of
  • 3. MBA admissions. “One of the things we try to teach at business schools is making good decisions and taking responsibility for your actions.” Six weeks later, however, the dean of Stanford Business School, Robert Joss, reported, “None of those who gained unauthorized access was able to explain his or her actions to our satisfaction.” He added that he hoped the applicants “might learn from their experience.” Given the public’s concern over the wave of corporate scandals in recent years and its growing interest in corporate social responsibility, business writers and other media commentators warmly welcomed Harvard’s decisive response. But soon there was some sniping at the decision by those claiming that Harvard and the other business schools had overreacted. Although 70 percent of Harvard’s MBA students approved the decision, the undergraduate student newspaper, The Crimson, was skeptical. “HBS [Harvard Business School] has scored a media victory with its hard-line stance,” it said in an editorial. “Americans have been looking for a sign from the business community, particularly its leading educational institutions, that business ethics are a priority. HBS’s false bravado has given them one, leaving 119 victims in angry hands.” As some critics pointed out, Harvard’s stance overlooked the possibility that the hacker might have been a spouse or a parent who had access to the applicant’s password and personal identification number. In fact, one applicant said that this had happened to him. His wife found the instructions at Businessweek Online and tried to check on the success of his application. “I’m really distraught over this,” he said. “My wife is tearing her hair out.” To this, Harvard’s Dean Clark responds, “We expect applicants to be personally responsible for the access to the website, and for the identification and passwords they receive.” Critics also reject the idea that the offending applicants were “hackers.” After all, they used their own personal identification and passwords to log on legitimately; all they did was to modify the URL to go to a different page. They couldn’t change anything in their files or view anyone else’s information. In fact, some critics blamed the
  • 4. business schools and Apply Yourself more than they did the applicants. If those pages were supposed to be restricted, then it shouldn’t have been so easy to find one’s way to them. In an interview, one of the Harvard applicants said that although he now sees that what he did was wrong, he wasn’t thinking about that at the time—he just followed the hacker’s posted instructions out of curiosity. He didn’t consider what he did to be “hacking,” because any novice could have done the same thing. “I’m not an IT person by any stretch of the imagination,” he said. “I’m not even a great typist.” He wrote the university a letter of apology. “I admitted that I got curious and had a lapse in judgment,” he said. “I pointed out that I wasn’t trying to harm anyone and wasn’t trying to get an advantage over anyone.” Another applicant said that he knew he had made a poor judgment but he was offended by having his ethics called into question. “I had no idea that they would have considered this a big deal.” And some of those posting messages at Businessweek Online and other MBA-related sites believe the offending applicants should be applauded. “Exploiting weaknesses is what good business is all about. Why would they ding you?” wrote one anonymous poster. Dean Schmalensee of MIT, however, defends Harvard and MIT’s automatically rejecting everyone who peeked “because it wasn’t an impulsive mistake.” “The instructions are reasonably elaborate,” he said. “You didn’t need a degree in computer science, but this clearly involved effort. You couldn’t do this casually without knowing that you were doing something wrong. We ’ve always taken eth ics seriously, and this is a serious matter.” To those applicants who say that they didn’t do any harm, Schmalensee replies, “Is there nothing wrong with going through files just because you can?” To him and others, seeking unauthorized access to restricted pages is as wrong as snooping through your boss’s desk to see whether you’ve been recommended for a raise. Some commentators, however, suggest there may be a generation gap here. Students who grew up with the Internet, they say, tend to see it as wide-open territory and don’t view this level of web
  • 5. snooping as indicating a character flaw. Email Hacking Is A Serious Crime POSTED IN PRIVACY LAW BY LAWYERS.COM SM Practically everyone has an email account, and they're used for personal and business reasons. It's only natural for us to expect a little privacy in our email, and there are all sorts of federal and state laws protecting that privacy. A case involving former Governor Sarah Palin shows how serious it can be to break these laws and hack into someone else's email account. College "Prank?" In April 2010, David Kernell went on trial for "hacking" into then-Alaskan Governor Sarah Palin's personal email account. In 2008, John McCain was the Republican party's candidate for president. Sarah Palin was the Governor of Alaska and McCain's vice-presidential running mate. David Kernell , the son of a Tennessee state lawmaker , was a student at the University of Tennessee. At this time, it's claimed Kernell wanted to "derail" Palin's campaign, and he gained access or "hacked" into Palin's personal Yahoo email account. He apparently changed the password and posted
  • 6. personal information he found in the emails on a website. He also posted the password so others could access the account. Kernell was indicted - meaning a grand jury thought there was enough evidence to put him on trial - on several federal charges. A jury convicted him of only two charges. He was sentenced to one year and one day in federal prison. The jury didn't buy Kernell's defense that it was all just a prank. The Law Kernell's case shows the types of crimes an email hacker may face. He was charged with four very serious felony crimes : Wire Fraud In simple terms, wire fraud involves using a computer, radio, television, or telephone to get money or property from someone else through trickery or deception. Although taking money is a common example - such as through various internet scams - stealing personal and confidential information qualifies as wire fraud, too. One of the keys to wire fraud is that the emails, telephone calls, or wire transmissions have to pass between two or more states or countries. It was claimed that Kernell used an old computer in Tennessee to hack into Palin's email account, which, presumably, was based in Alaska. Once in, he took personal information, such as email addresses and telephone numbers, and posted them online. Kernell was not convicted of this crime. Computer Fraud
  • 7. Computer fraud isn't much different than wire fraud, except this crime applies only to computers, as opposed to telephones and radios, and it also requires some sort of interstate connection. However, the law applies only to computers used: 1. By or for financial institutions, like banks, or the US Government 2. In such a way that the computer impacts interstate or foreign commerce or communication of the US Presumably, Palin's connection to the federal election and Senator McCain brought the federal computer fraud law into play. Kernell was convicted of unauthorized access to a protected computer , which falls under computer fraud. Identity Theft Identity theft is when someone uses fraud, deception, or trickery to get and use another person's personal information. Usually, the information is used by the thief to make money, but money doesn't have to be involved. In Kernell's case, once Palin selected the email address, " [email protected] ," it became her own, unique address and no one else could use it. When Kernell accessed and used that email account he gained access to personal information, such as family email addresses, family pictures, birth dates of Palin and family members and pictures of Palin's family members. This information was posted online as part of Kernell's plot to derail Palin's vice-presidential bid. Kernnel was not convicted of this crime.
  • 8. Obstruction of Justice Obstruction of justice covers many things, but it typically means interfering with some legal process or investigation. Kernell was charged with this crime because it was claimed he tried to erase evidence of his hacking activities from his computer before federal investigators could retrieve it. Kennel was convicted of this crime. Other Laws Someone in Kernell's position could face other criminal charges and non-criminal (or "civil") lawsuits, too. The federal government doesn't have to get involved, either. For example, in most states, there are criminal and civil identity theft laws . In addition, in some states, like Virginia, it's an invasion of privacy to look at someone's personal information, and it's a crime. In many states, like Maryland , accessing and telling the world about another person's personal information is an invasion of privacy that may make the hacker liable for money damages to the victim. Even if, as it was claimed Kernell's case, the email hacking was a "prank," the hacker could still be charged with less serious crimes (called misdemeanors ) and face several months in jail, thousands of dollars in fines or both. Hacking is indeed a serious crime. If you're thinking about doing it, even as a joke, you should think again. Questions for Your Attorney 1. What's the first thing I should do if I think someone has hacked into my email account? 2.
  • 9. Is it a crime if I look at my spouse's email account without permission? 3. If my child uses my computer to commit a crime, can the authorities take my computer and search anything on it, including my personal files and data? Retrieved from: communications-media.lawyers.com/.../ email- hacking-is-a serious crime