Topic > Computer Ethics: Principles for Combating Hacking - 2190

Introduction Lately, issues of ethics and professionalism have been frequently touched upon in our current society. Experts in a particular field are usually and logically expected to behave professionally or display their expertise to civilians. However, in reality they work in the opposite way and criminalize their experience with their knowledge. This actually brought trouble to the stranger or victim and caused the loss of one's property or reputation. In the field of information technology, the issue of ethics and professionalism has been called computer ethics. According to ikeepsafe (nd), computer ethics is the discipline that uses ethical behavior and recognizes moral duties towards the online environment and digital media. This problem includes hacking, phishing, copyright, downloading, cyberbullying, etc. The problem discussed in this article is the most problematic and problematic: Hack. According to Wikipedia (2013b), a hacker is someone who attacks and breaks into a computer system or network. They can be motivated by different types of reasons such as profit, protest, challenging a system, gaining information, etc. There are 3 types of hackers which can be classified into white hat, black hat and gray hat. White hat hackers breach computer security for non-malicious reasons where they actually have to test their security system. The black hat hacker violates computer ethics and hacks the system for his own personal profit. A gray hacker hacks the computer system with the aim of alerting the administrator that the system has a weak security system and providing them with a better solution for a fee (Wikipedia, 2013b). Recall the incident happened 3 years ago, our government websites had been hacked after receiving the message from "Anonymous"...... middle of paper...... how to protect yourself from hackers. Retrieved from http://events.hamptonu.edu/ias/docs/DanielRyan.pdfSembok, TMT (2003). Ethics of information and communication technologies (ICT). Retrieved from http://www2.unescobkk.org/elib/publications/ethic_in_asia_pacific/ 239_325ETHICS.PDFSepior raises a seed round for protecting cloud data from hackers. (2013). Retrieved from http://sepior.com/media/.Veroffentlicht, V. S. (2011). Anonymous – Operation Malaysia. Retrieved from http://serpentsembrace.wordpress.com/2011/06/16/anonymous-function-malaysia/Wikipedia. (2013a). Anonymous(group). Retrieved from http://en.wikipedia.org/wiki/Anonymous_(group)Wikipedia. (2013b). Hacker (cyber security). Retrieved from http://en.wikipedia.org/wiki/Hacker_(computer_security)#1 Anonymous - Operation Malaysia. (2011). Retrieved from http://www.youtube.com/watch?v=wpmMPq6nl4c