EthicsHacking

advertisement
Kristine Belknap

What is Hacking?



▪
▪

▪

What is Hacking?
 The computer equivalent of breaking and entering.


▪
▪

▪

What is Hacking?
 The computer equivalent of breaking and entering.

What are Hackers?

▪
▪

▪

What is Hacking?
 The computer equivalent of breaking and entering.

What are Hackers?
 “True” Hackers
▪
▪
 Other Hackers (Cyber Criminals)
▪

What is Hacking?
 The computer equivalent of breaking and entering.

What are Hackers?
 “True” Hackers
▪ Computer geeks who see computer systems as an
intellectual challenge and a technological puzzle to solve.
▪ Hack for the sake of hacking…
 Other Hackers (Cyber Criminals)
▪ The ones that do it solely for the money…

Most people barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?

▪

Most people barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?
 Working on a problem that requires lots of
computing power…
▪

Most people barely use their computer’s
processing power…
Would it be wrong to “borrow” their computer
systems while they aren’t using them?
 Working on a problem that requires lots of
computing power…
(It could even be for a good cause…)
▪ Ex. Analyzing Human DNA to figure out which genes are
linked to certain diseases…

Consequentialism


Deontological Ethics


Virtue Ethics


Consequentialism
 As long as the computers are left exactly as they
were found…

Deontological Ethics


Virtue Ethics


Consequentialism
 As long as the computers are left exactly as they
were found…

Deontological Ethics
 Breaking and entering is still breaking and entering
even if you don’t touch anything.

Virtue Ethics


Consequentialism
 As long as the computers are left exactly as they
were found…

Deontological Ethics
 Breaking and entering is still breaking and entering
even if you don’t touch anything.

Virtue Ethics
 It’s still the computer equivalent of breaking into
someone’s home…

What if the systems being hacked belong to
the “bad guys”?




What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.



What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.
 Ex. Hacking into a criminal’s computer to retrieve
and decrypt files that can be used as evidence.


What if the systems being hacked belong to
the “bad guys”?
 Ex. Using a Denial-of-Service Attack to crash a
terrorist’s website.
 Ex. Hacking into a criminal’s computer to retrieve
and decrypt files that can be used as evidence.
 Ex. Cyber Warfare

Consequentialism


Deontological Ethics


Virtue Ethics


Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?

Deontological Ethics


Virtue Ethics


Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?

Deontological Ethics
 Breaking and entering is still breaking and entering
and in these scenarios damage is being done.

Virtue Ethics


Consequentialism
 Does it count against you if any harmful
consequences are only to bad people?

Deontological Ethics
 Breaking and entering is still breaking and entering
and in these scenarios damage is being done.

Virtue Ethics
 It’s still like breaking into someone’s home.

Scenario A



Scenario B



Scenario A
 1 Yes, contingent on everything being put back
where it was found.
 2 No.

Scenario B



Scenario A
 1 Yes, contingent on everything being put back
where it was found.
 2 No.

Scenario B
 1 Yes, if you count harm to the “bad guys” as a
positive.
 2 No.
Download