logo

Hacktivism and Hacking

8 Pages2043 Words355 Views
   

Added on  2022-11-14

About This Document

This article discusses the differences between hacktivism and hacking, their impact on society, and their legal and ethical implications. It also explores the motivations behind hacktivism and the potential risks associated with it. The article includes a bibliography of relevant sources.

Hacktivism and Hacking

   Added on 2022-11-14

ShareRelated Documents
Running head: HACKTIVISM AND HACKING
Hacktivism and Hacking
[Name of the Student]
[Name of the University]
[Author Note]
Hacktivism and Hacking_1
1
HACKTIVISM AND HACKING
Any kind of actions related to hacking is considered to be highly queried as well as
misconstrued aspect of the systems culture. The term hacker is generally associated with
representing an infatuated commitment towards inventive as well as innovative computer system
programming, which are associated with allowing the innovations of the computer to shift
towards new areas which has not been anticipated by people1. However because of the different
kind of issues which is surrounded around the concept of hacking, people have came to identify
the fact that the word is associated with network invasions and cybercrimes. In this way the
hackers have been identified to be a treat for the network as well as to the security of the internet.
Followed by identification of the hackers another breed of people known as hacktivists have
been identified who have been associated with re-engineering the portentous appurtenance of the
hackers into of potent fusion of innovations of the computers along with including involvements
socially2. For this reason the activity assessment which the hacktivists are having is seen to be
requiring a judgment in an extensive manner so as to comprehend the aspects which the activities
are having.
Hacking activities are associated with including the access to the computer systems
without any kind of permission and is done with an aim of stealing money or damaging an
individual’s property and for many purposes. Contrarily the hacktivism is associated with
entailing the activities related to hacking for purposes which are socially or politically driven.
Despite of usage of same methods, hacktivism is aimed at disrupting the services so as to attract
attention towards a political of social cause3. There is another form of hacking which is
associated with including the intruding of a computer system for security purpose. There exist
1 Tanczer, Leonie Maria. "Hacktivism and the male-only stereotype." New Media & Society 18, no. 8 (2016): 1599-1615.
2 Bodford, Jessica E., and Virginia SY Kwan. "A Game Theoretical Approach to Hacktivism: Is Attack Likelihood a Product of Risks and
Payoffs?." Cyberpsychology, Behavior, and Social Networking 21, no. 2 (2018): 73-77.
3 Goode, Luke. "Anonymous and the political ethos of hacktivism." Popular Communication 13, no. 1 (2015): 74-86.
Hacktivism and Hacking_2
2
HACKTIVISM AND HACKING
some firms associated with employing the hackers by means of a framework known as ethical
hacking so as to provide authentication to the hackers for infiltrating the network by usage of
similar techniques so as to understand and fix any kind of loopholes.
Hacktivism is associated with including some of forms of detached organization such as
small group of people or persons, who are associated with getting connected, synchronize and
conduct the operations which are an interacted routine in a regular manner without any kind of
details or significant commands4. The process of hacktivism is associated with the usage of
networked forms of strategy along with innovation and organization which turns out as a uniting
factor between the hacktivists. In regards to this the hacktivism is associated with including an
engagement which is associated with establishing itself in a secret form in the a computer system
access or in a broadcasting of a possibly disrupted software which initially leads to leaving of no
difference between the two terms.
Despite of the fact that hacktivism is associated with offering solutions for the social
aspects and providing of public answers, the enforcement officers of law are associated with
viewing this as a vulnerability aspect for the peoples security5. There exist few people who are
associated with considering this as an ethical and responsible process associated with protecting
peoples from different kind of conspiracies of the government and secrets. But still most of the
hacktivism operations are not having any borne beneficial elements dedicated for the public.
Some of the hacktivists activities which have been witnessed by the world are often seen to be
coming to the mind of the most law enforcements which notably includes the Sony Saga, wiki
leak and many more6. For example the incident of wiki leak had been associated with exposing
4 Woods, Patrick J. "Hacktivism and Law Enforcement: A Qualitative Delphi Study on United States Law Enforcement Technology Dependency,
Hacktivist Cyber-Attacks, and Agency Defensive Tactics." PhD diss., Capella University, 2018.
5 Milan, Stefania. "Hacktivism as a radical media practice." (2015).
6 George, Jordana J., and Dorothy E. Leidner. "From clicktivism to hacktivism: Understanding digital activism." Information and
Organization (2019).
Hacktivism and Hacking_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Hacktivism: A New Form of Hacking with Political Motives
|9
|2963
|30

Cybercrime, Cyberterrorism and Cyber Activism: Hacktivism
|11
|2479
|372

ITNET305A – Emerging Technologies Security
|9
|2728
|73

Ethics of Hacking | Is Hacktivism White, Black or Gray Hat?
|4
|1095
|26

ITNET305A Emerging Technologies Security
|9
|2542
|115

Hacktivism: Morally Justified or Virtual Vigilantism?
|20
|1041
|340