the ethics of hacking
TRANSCRIPT
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 1/24
Kristine Belknap
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 2/24
Wh at is Hacking?
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 3/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 4/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
Wh at are Hackers?
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 5/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
Wh at are Hackers?³T rue´ Hackers
O th er Hackers (Cyber Criminals)
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 6/24
Wh at is Hacking?T h e computer equivalent of breaking and entering.
Wh at are Hackers?³T rue´ Hackers
Computer geeks w h o see computer systems as anintellectual c h allenge and a tec h nological puzzle to solve.Hack for t h e sake of h acking«
O th er Hackers (Cyber Criminals)T h e ones t h at do it solely for t h e money«
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 7/24
M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 8/24
M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?
W orking on a problem t h at requires lots of computing power«
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 9/24
M ost people barely use t h eir computer¶s processing power«W ould it be wrong to ³ borrow´ t h eir computer systems w h ile t h ey aren¶t using t h em?
W orking on a problem t h at requires lots of computing power«(It could even be for a good cause«)
Ex . Analyzing Human DNA to figure out w h ich genes arelinked to certain diseases«
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 10/24
Consequentialism
Deontological E th ics
V irtue E th ics
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 11/24
ConsequentialismAs long as t h e computers are left e x actly as t h ey
were found«Deontological E th ics
V irtue E th ics
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 12/24
ConsequentialismAs long as t h e computers are left e x actly as t h ey
were found«Deontological E th ics
Breaking and entering is still breaking and enteringeven if you don¶t touc h anyt h ing.
V irtue E th ics
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 13/24
ConsequentialismAs long as t h e computers are left e x actly as t h ey
were found«Deontological E th ics
Breaking and entering is still breaking and enteringeven if you don¶t touc h anyt h ing.
V irtue E th icsIt¶s still t h e computer equivalent of breaking intosomeone¶s h ome«
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 14/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 15/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 16/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.Ex . Hacking into a criminal¶s computer to retrieveand decrypt files t h at can be used as evidence.
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 17/24
Wh at if t h e systems being h acked belong toth e ³ bad guys´?
Ex . Using a Denial-of-Service Attack to cras h aterrorist¶s website.Ex . Hacking into a criminal¶s computer to retrieveand decrypt files t h at can be used as evidence.Ex . Cyber W arfare
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 18/24
Consequentialism
Deontological E th ics
V irtue E th ics
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 19/24
ConsequentialismDoes it count against you if any h armful
consequences are only to bad people?Deontological E th ics
V irtue E th ics
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 20/24
ConsequentialismDoes it count against you if any h armful
consequences are only to bad people?Deontological E th ics
Breaking and entering is still breaking and enteringand in t h ese scenarios damage is being done.
V irtue E th ics
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 21/24
ConsequentialismDoes it count against you if any h armful
consequences are only to bad people?Deontological E th ics
Breaking and entering is still breaking and enteringand in t h ese scenarios damage is being done.
V irtue E th icsIt¶s still like breaking into someone¶s h ome.
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 22/24
Scenario A
Scenario B
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 23/24
Scenario A1 Yes, contingent on everyt h ing being put back
wh ere it was found.2 No.
Scenario B
8/6/2019 The Ethics of Hacking
http://slidepdf.com/reader/full/the-ethics-of-hacking 24/24
Scenario A1 Yes, contingent on everyt h ing being put back
wh ere it was found.2 No.
Scenario B1 Yes, if you count h arm to t h e ³ bad guys´ as a
positive.2 No.