the ethics of hacking

24
Kristine Belknap

Upload: tambaki-edmond

Post on 07-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 1/24

Kristine Belknap

Page 2: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 2/24

Wh at is Hacking?

Page 3: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 3/24

Wh at is Hacking?T h e computer equivalent of breaking and entering.

Page 4: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 4/24

Wh at is Hacking?T h e computer equivalent of breaking and entering.

Wh at are Hackers?

Page 5: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 5/24

Wh at is Hacking?T h e computer equivalent of breaking and entering.

Wh at are Hackers?³T rue´ Hackers

O th er Hackers (Cyber Criminals)

Page 6: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 6/24

Wh at is Hacking?T h e computer equivalent of breaking and entering.

Wh at are Hackers?³T rue´ Hackers

Computer geeks w h o see computer systems as anintellectual c h allenge and a tec h nological puzzle to solve.Hack for t h e sake of h acking«

O th er Hackers (Cyber Criminals)T h e ones t h at do it solely for t h e money«

Page 7: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 7/24

M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?

Page 8: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 8/24

M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?

W orking on a problem t h at requires lots of computing power«

Page 9: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 9/24

M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?

W orking on a problem t h at requires lots of computing power«(It could even be for a good cause«)

Ex . Analyzing Human DNA to figure out w h ich genes arelinked to certain diseases«

Page 10: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 10/24

Consequentialism

Deontological E th ics

V irtue E th ics

Page 11: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 11/24

ConsequentialismAs long as t h e computers are left e x actly as t h ey

were found«Deontological E th ics

V irtue E th ics

Page 12: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 12/24

ConsequentialismAs long as t h e computers are left e x actly as t h ey

were found«Deontological E th ics

Breaking and entering is still breaking and enteringeven if you don¶t touc h anyt h ing.

V irtue E th ics

Page 13: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 13/24

ConsequentialismAs long as t h e computers are left e x actly as t h ey

were found«Deontological E th ics

Breaking and entering is still breaking and enteringeven if you don¶t touc h anyt h ing.

V irtue E th icsIt¶s still t h e computer equivalent of breaking intosomeone¶s h ome«

Page 14: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 14/24

Wh at if t h e systems being h acked belong toth e ³ bad guys´?

Page 15: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 15/24

Wh at if t h e systems being h acked belong toth e ³ bad guys´?

Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.

Page 16: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 16/24

Wh at if t h e systems being h acked belong toth e ³ bad guys´?

Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.Ex . Hacking into a criminal¶s computer to retrieveand decrypt files t h at can be used as evidence.

Page 17: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 17/24

Wh at if t h e systems being h acked belong toth e ³ bad guys´?

Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.Ex . Hacking into a criminal¶s computer to retrieveand decrypt files t h at can be used as evidence.Ex . Cyber W arfare

Page 18: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 18/24

Consequentialism

Deontological E th ics

V irtue E th ics

Page 19: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 19/24

ConsequentialismDoes it count against you if any h armful

consequences are only to bad people?Deontological E th ics

V irtue E th ics

Page 20: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 20/24

ConsequentialismDoes it count against you if any h armful

consequences are only to bad people?Deontological E th ics

Breaking and entering is still breaking and enteringand in t h ese scenarios damage is being done.

V irtue E th ics

Page 21: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 21/24

ConsequentialismDoes it count against you if any h armful

consequences are only to bad people?Deontological E th ics

Breaking and entering is still breaking and enteringand in t h ese scenarios damage is being done.

V irtue E th icsIt¶s still like breaking into someone¶s h ome.

Page 22: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 22/24

Scenario A

Scenario B

Page 23: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 23/24

Scenario A1 Yes, contingent on everyt h ing being put back

wh ere it was found.2 No.

Scenario B

Page 24: The Ethics of Hacking

8/6/2019 The Ethics of Hacking

http://slidepdf.com/reader/full/the-ethics-of-hacking 24/24

Scenario A1 Yes, contingent on everyt h ing being put back

wh ere it was found.2 No.

Scenario B1 Yes, if you count h arm to t h e ³ bad guys´ as a

positive.2 No.