Verified Document

Computer Hacker Culture And Subcultures Term Paper

"Hackers built the Internet, they made the Unix operating system what it is, and they make the World Wide Web work" (Castelluccio, 2003). Forecast 4:

Forecast 4 states, "Some computer hacker groups, notably those characterized by the 'offender' and 'predator' categories, will evolve into networked criminal enterprises."

This likely will occur in some instances. Hacker culture's desire to gain power and notoriety, combined with the need to achieve that adrenaline fix, will lead some to ultimately progress from the loosely structured culture of hackers today, to a more formalized, networked criminal group. However, for the most part, the high turnover rate of the culture, along with the desire to maintain secrecy and anonymity, is likely to prevent most from making this evolutionary leap.

It is likely that certain hackers will be recruited by other groups to commit digital crimes and digital terrorism, but again most, due to the secretive nature, will not fall into this trap.

Those vulnerable to this will likely be individuals who are on the societal fringe and are sympathetic to a particular cause or movement. In addition, it is likely that members in an established group will be trained as hackers, for the sole purpose of carrying out the wishes of the organization.

Digital terrorism can be used to intimidate mainstream society, or can be utilized to steal sensitive information...

Law enforcement will have to adjust their investigation and prosecution techniques to meet the new challenges of cyber crimes. With little physical evidence at their disposal, authorities will have to become experts at tracking virtual evidence.
Conclusion:

In the end, the increased use of computing technology and the ever-expanding nature of the Internet has led to new and greater opportunities for hackers. This male-dominated culture is based in secrecy, despite the need to relinquish this secrecy in order to gain community status, anonymity, and a love for technology. Curiosity as well as a desire for power leads many to hacking, and as technology increases, this curiosity sure will only continue to grow.

References

Best, K. (Dec 2003). The hacker's challenge. Social Semiotics, 13(3). Retrieved March 20, 2008, from Academic Search Premier database.

Best, K. (Oct 2006). Visceral hacking or packet wanking? Culture, Theory & Critique, 47(2). Retrieved March 20, 2008, from Academic Search Premier database.

Castellucio, M. (Oct 2003). Co-opting the hacker culture. Strategic Finance, 85(4). Retrieved March 20, 2008, from Business Source Complete database.

Holt, T. (Mar/Apr 2007). Subcultural evolution? Deviant Behavior, 28(2). Retrieved March 20, 2008, from socINDEX database.

O'Neill, M. (Jun 2006). Rebels for the system?…

Sources used in this document:
References

Best, K. (Dec 2003). The hacker's challenge. Social Semiotics, 13(3). Retrieved March 20, 2008, from Academic Search Premier database.

Best, K. (Oct 2006). Visceral hacking or packet wanking? Culture, Theory & Critique, 47(2). Retrieved March 20, 2008, from Academic Search Premier database.

Castellucio, M. (Oct 2003). Co-opting the hacker culture. Strategic Finance, 85(4). Retrieved March 20, 2008, from Business Source Complete database.

Holt, T. (Mar/Apr 2007). Subcultural evolution? Deviant Behavior, 28(2). Retrieved March 20, 2008, from socINDEX database.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Anderson, Rw & Chantal K. 1998, Transition
Words: 1083 Length: 3 Document Type: Essay

Anderson, RW & Chantal K. 1998, Transition banking: financial development of central and eastern Europe, Clarendon Press, Oxford. Barley, S 1983, Semiotics and the study of occupational and organizational cultures, Administrative Science Quarterly, Vol.28, pp.393-413. Blount, E 2004, Bad rap on Russian banking? ABA Banking Journal, no.12, pp.47-52. Brown, J 1987, A review of meta-analyses conducted on psychotherapy outcome research, Clinical Psychology Review, Vol. 7, Issue. 1, pp. 1-23. Bullis, CA & Tompkins, PK

Soft Systems Techniques in the Preparation of
Words: 20187 Length: 73 Document Type: Dissertation

Soft Systems Techniques in the Preparation of Information Technology as a Systems Manager Company Systems Consulting process and model Systems approach, client relationships Company Culture Client defenses, attachments to existing systems Interaction with the company culture in order to facilitate change System and Culture working together Dependancy issues Lewin Company Systems Consulting process and model Systems approach, client relationships Company Culture Client defenses, attachments to existing systems Interaction with the company culture in order to facilitate change System and Culture working together Dependency issues Lewin's model of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now