Download - The Ethics of Hacking
![Page 1: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/1.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 1/24
Kristine Belknap
![Page 2: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/2.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 2/24
Wh at is Hacking?
![Page 3: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/3.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 3/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
![Page 4: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/4.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 4/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
Wh at are Hackers?
![Page 5: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/5.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 5/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
Wh at are Hackers?³T rue´ Hackers
O th er Hackers (Cyber Criminals)
![Page 6: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/6.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 6/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
Wh at are Hackers?³T rue´ Hackers
Computer geeks w h o see computer systems as anintellectual c h allenge and a tec h nological puzzle to solve.Hack for t h e sake of h acking«
O th er Hackers (Cyber Criminals)T h e ones t h at do it solely for t h e money«
![Page 7: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/7.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 7/24
M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?
![Page 8: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/8.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 8/24
M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?
W orking on a problem t h at requires lots of computing power«
![Page 9: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/9.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 9/24
M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?
W orking on a problem t h at requires lots of computing power«(It could even be for a good cause«)
Ex . Analyzing Human DNA to figure out w h ich genes arelinked to certain diseases«
![Page 10: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/10.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 10/24
Consequentialism
Deontological E th ics
V irtue E th ics
![Page 11: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/11.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 11/24
ConsequentialismAs long as t h e computers are left e x actly as t h ey
were found«Deontological E th ics
V irtue E th ics
![Page 12: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/12.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 12/24
ConsequentialismAs long as t h e computers are left e x actly as t h ey
were found«Deontological E th ics
Breaking and entering is still breaking and enteringeven if you don¶t touc h anyt h ing.
V irtue E th ics
![Page 13: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/13.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 13/24
ConsequentialismAs long as t h e computers are left e x actly as t h ey
were found«Deontological E th ics
Breaking and entering is still breaking and enteringeven if you don¶t touc h anyt h ing.
V irtue E th icsIt¶s still t h e computer equivalent of breaking intosomeone¶s h ome«
![Page 14: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/14.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 14/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
![Page 15: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/15.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 15/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.
![Page 16: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/16.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 16/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.Ex . Hacking into a criminal¶s computer to retrieveand decrypt files t h at can be used as evidence.
![Page 17: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/17.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 17/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.Ex . Hacking into a criminal¶s computer to retrieveand decrypt files t h at can be used as evidence.Ex . Cyber W arfare
![Page 18: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/18.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 18/24
Consequentialism
Deontological E th ics
V irtue E th ics
![Page 19: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/19.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 19/24
ConsequentialismDoes it count against you if any h armful
consequences are only to bad people?Deontological E th ics
V irtue E th ics
![Page 20: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/20.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 20/24
ConsequentialismDoes it count against you if any h armful
consequences are only to bad people?Deontological E th ics
Breaking and entering is still breaking and enteringand in t h ese scenarios damage is being done.
V irtue E th ics
![Page 21: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/21.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 21/24
ConsequentialismDoes it count against you if any h armful
consequences are only to bad people?Deontological E th ics
Breaking and entering is still breaking and enteringand in t h ese scenarios damage is being done.
V irtue E th icsIt¶s still like breaking into someone¶s h ome.
![Page 22: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/22.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 22/24
Scenario A
Scenario B
![Page 23: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/23.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 23/24
Scenario A1 Yes, contingent on everyt h ing being put back
wh ere it was found.2 No.
Scenario B
![Page 24: The Ethics of Hacking](https://reader031.vdocument.in/reader031/viewer/2022021213/577d29801a28ab4e1ea6f592/html5/thumbnails/24.jpg)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 24/24
Scenario A1 Yes, contingent on everyt h ing being put back
wh ere it was found.2 No.
Scenario B1 Yes, if you count h arm to t h e ³ bad guys´ as a
positive.2 No.