Pros And Cons Of Hacktivism

Decent Essays
Hacktivism - Does It Do More Good or Bad? First of all, what is it? The Cambridge Dictionary website states that: “hacktivism is the activity of using computers to try to achieve political change, for example by attacking websites or illegally entering another computer system.” There are many different kinds of hacktivists with all sorts of different motives. Regardless what the motive may be, the topic in general has been receiving lots of controversy in recent years as it’s becoming more of a common occurrence. Here are some arguable questions: Is hacktivism a serious cybercrime issue or can it be an efficient means of social protest? To a lot of people the topic can get a bit blurry in regards to if it’s acceptable or not. However, I side with the law and consider them criminals committing criminal acts and that is how it should be considered by all. Regardless if some hacktivists have good intentions, not only is it usually still illegal, but I feel that if it were to be considered more acceptable then we would see more hacktivists with nefarious intentions popping up much more often.

I think that there is a fine line between the “cybercrime criminal” and the “social protest” type
…show more content…
A lot of people think that hacktivism is an efficient means of social protest, and even an ethical means. As stated in another Opposing Viewpoints document, Graham Armstrong states that: “I believe that yes, hacktivism is a genuine form of protest.” He talks about how hacktivism should be a last resort after all other options have been exhausted but yes it is a genuine form of protest in the end. I feel like you could compare that mind set to something like bringing a couple aces in your sleeve to a poker game. Then saying “oh, well I’m not going to cheat unless I start losing, then ill pull the aces out as a last resort.” To me it’s a viewpoint that is just trying to justify an act that is

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Pros And Cons Of Hacking

    • 434 Words
    • 2 Pages

    I am going to take about how apple had wanted to refuse to unlock a app phone. But the FBI says that they need to unlock the phos so that they can know of there is going to be a fucher attack. But App says they will not because they had already unlock about nine phone. But the FbI had say “that there can be a fucher russon attack”.…

    • 434 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations. 6. What sorts of Hackers are there? White-cap programmers: hacks to test your framework unprotected against demonstrate a point Dark cap programmers: hacks your framework to for illicit purposes Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations 7.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hacking computers and defending against hacks is like something out of a movie, to me it's something that people would be like "wow, that's really cool." The skills I possess for this job aren't many. I know a little about computers and some commands to navigate the system and fix some things. I also know some simple commands and how some functions on Kali Linux work also. To be…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hactivism as a process has a dual-edged character. The organised activity exposes the “transparency and accountability” (Diamond 71) of global power exploitation. However, such methods are seen questionable in the accountability and transparency of their practice(s). The main concern with hactivism is the preconceived notions of its values are translated offline as vigilantism. However, the whole concept of vigilantism is based on the idea of not condoning individual action to exercise authority if there is an immediate presence enforcing it.…

    • 609 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    What is right or wrong is whether or not they get punished and their needs were satisfied (Taylor, Fritsch, & Liederbach, 2015). Ex: Hacking is a digital crime, whether it be for status quo, pleasure or criminal intent, all aspects of hacking is considered a digital crime. Most hackers, hack for status quo or pleasure, and feel as if they are not committing a crime as no harm is done. While some computer and of digital communication intrusion is caught, there are much that goes un-noticed, and unpunished. Leaving Hackers in the mindset that their criminal acts are acceptable and correct, as their needs are satisfied, and their criminal acts go unpunished.…

    • 1361 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    The article argues that online activism is more than just signing online petitions and liking things. Each action is significant in the fight for some sort of political change. Critics of it view it as a way for people to fulfil their moral obligations without actually doing anything but click a button. This article goes against this, discussing why social media activism is actually quite effective, no matter the size of an act.…

    • 1018 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Explain some cases in which you would perm-ban/temp-ban people: Spamming Chat Spamming in chat is saying the same word or any other different word 3 times without waiting atleast 1 second. The punishment is a warn then if the player does it the second time it is a mute! /warn , /ban Suspicious Links / IP-Loggers: Posting any links in chat that is none opcrat related could get you banned permanently for Suspicious links or IP-Loggers.…

    • 534 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Eco Saboteurs

    • 1497 Words
    • 6 Pages

    1. Partridge means that humans have moral responsibilities towards people that they do not know individually and who may not even exist at the present. He uses a metaphor about a campsite to explain his argument: when they have finished camping at a campsite, a person has a moral obligation to clean it for the next person who will use it. While they do not know this person, they still have good reason to believe that someone will eventually come to use the campsite in the future and that by not cleaning the campsite they are wrongfully causing harm to this future person. He is effectively arguing that a person being “nonexistent is, morally speaking, nonrelevant” (59).…

    • 1497 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Anonymous Court Case Study

    • 1946 Words
    • 8 Pages

    Not long ago it would have been unimaginable that a group of random people working remotely from anywhere in the world would be able to band together to electronically fight common enemies. However, recently a hacktivist group identifying as Anonymous has risen in power and size with the goal of fighting anyone they deem threatening to innocent people. Their operations and tactics range from gathering and leaking sensitive and/or restricted information from large corporations, to hacking Google Search in order to produce skewed (and negative) results when people searched topics related to their enemies. This type of hacktivist group is a relatively new idea and there is no set precedent for how the American government should deal with such…

    • 1946 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    To ensure a non-authoritarian state, individuals must be given more freedom to enable each person to have an impact on any event. In the past, freedom promised by democratic governments have been hampered by the government’s own fear of its people. In fact, the FBI has numerous black marks against itself. This is a result of a few individuals that overstepped their boundaries.…

    • 1170 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    The question is, “How we control to how far the next hacker goes and for what reason. This is why to media will be an eternal source for this subculture. The federal government has done a good job with catching there ethical hacker and turning them into White Hats for the great good of the country, but there still a lot of them out…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Bullying can be traumatizing and the effects can be devastating. As technology today improves, cyberbullying becomes more and more common. Cyberbullying is repeated and hostile, and has “severe intent to threaten, embarrass, or harass”. Now with all of the new technology this harassment is virtually inescapable. Because of the negative effects that cyberbullying creates, it has become a largely debated issue whether an individual’s actions online should be prosecuted.…

    • 981 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Digital Democracy

    • 1113 Words
    • 4 Pages

    Digital democracy: Politics and the Internet LITERATURE REVIEW Peter Van Aelst, Stefaan Wargrave (2002) and Manual Castells (2012) explore the emergence of new media technologies, focusing on the Internet, in relation to it’s role in engaging individuals to perform social movements that are materialized through various forms. This is exemplified in the formation of organized protests, online petitions and campaigns that contribute to a united cause. Within Van Aelst and Walgrave’s article, the establishment of social movements that are based online are dissected through articulating them through 3 aspects: a shared interest that forms a collective identity, actual mobilization and a network of different organizations (Van Aelst & Walgrave…

    • 1113 Words
    • 4 Pages
    Great Essays