The Ethics of Hacking

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

Kristine Belknap

The Ethics of Hacking


What is Hacking?
 What is Hacking?





What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.




What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.
 What are Hackers?




What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.
 What are Hackers?
 “True” Hackers


 Other Hackers (Cyber Criminals)

What is Hacking?
 What is Hacking?
 The computer equivalent of breaking and entering.
 What are Hackers?
 “True” Hackers
▪ Computer geeks who see computer systems as an
intellectual challenge and a technological puzzle to solve.
▪ Hack for the sake of hacking…
 Other Hackers (Cyber Criminals)
▪ The ones that do it solely for the money…
Hacking Scenario A…
 Mostpeople barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?


Hacking Scenario A…
 Mostpeople barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?
 Working on a problem that requires lots of
computing power…


Hacking Scenario A…
 Mostpeople barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?
 Working on a problem that requires lots of
computing power…
(It could even be for a good cause…)
▪ Ex. Analyzing Human DNA to figure out which genes are
linked to certain diseases…
Hacking Scenario A…
 Consequentialism

 Deontological Ethics

 Virtue Ethics

Hacking Scenario A…
 Consequentialism
 As long as the computers are left exactly as they
were found…
 Deontological Ethics

 Virtue Ethics

Hacking Scenario A…
 Consequentialism
 As long as the computers are left exactly as they
were found…
 Deontological Ethics
 Breaking and entering is still breaking and entering
even if you don’t touch anything.
 Virtue Ethics

Hacking Scenario A…
 Consequentialism
 As long as the computers are left exactly as they
were found…
 Deontological Ethics
 Breaking and entering is still breaking and entering
even if you don’t touch anything.
 Virtue Ethics
 It’s still the computer equivalent of breaking into
someone’s home…
Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?


Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.


Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.
 Ex. Hacking into a criminal’s computer to retrieve
and decrypt files that can be used as evidence.

Hacking Scenario B…
 What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.
 Ex. Hacking into a criminal’s computer to retrieve
and decrypt files that can be used as evidence.
 Ex. Cyber Warfare
Hacking Scenario B…
 Consequentialism

 Deontological Ethics

 Virtue Ethics

Hacking Scenario B…
 Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?
 Deontological Ethics

 Virtue Ethics

Hacking Scenario B…
 Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?
 Deontological Ethics
 Breaking and entering is still breaking and entering
and in these scenarios damage is being done.
 Virtue Ethics

Hacking Scenario B…
 Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?
 Deontological Ethics
 Breaking and entering is still breaking and entering
and in these scenarios damage is being done.
 Virtue Ethics
 It’s still like breaking into someone’s home.
Conclusion
 Scenario A


 Scenario B


Conclusion
 Scenario A
 1 Yes, contingent on everything being put back
where it was found.
 2 No.
 Scenario B


Conclusion
 Scenario A
 1 Yes, contingent on everything being put back
where it was found.
 2 No.
 Scenario B
 1 Yes, if you count harm to the “bad guys” as a
positive.
 2 No.

You might also like