Verified Document

Deviant Behavior Computer Hackers And Term Paper

(Gunkel, 2001, p. 8) It would seem, that the line that one oversteps to become deviant is the line that demonstrates the outsmarting of another to create chaos in ones system and potentially do real damage to materials and data. Of coarse this would include any hacking that results in crime, and especially theft and fraud.

Hacking in all intense and purpose is deviant behavior, that challenges the current cultural dependence of upon technology, as it challenges the trust of the system as well as many other issues, regardless of its real or potential damage. Yet, the current trend in cyberspace is to create systems that are safe from hacking, and elicit all possible protection for legitimate users and owners of the intellectual properties within. Another interesting trend includes creating hacker sites that require hacking to enter, potentially redirecting hackers to more positive sidelines. (Wible, 2003, p.1577) Such sites are even stressing the legitimacy of their works by barring criminal hackers from competitions...

These measures could be strengthened by a "three strikes" rule. Hackers implicated in a specified number of offenses would not be able to compete. To prevent some hackers from being locked out entirely, a date could be set so that everyone would begin with a blank slate. Alternatively, hackers could take away a strike for each public interest job they do (as long as they do not add any new strikes), such as beefing up a site's security or turning state's evidence to prosecute other crimes. (Wible, 2003)
Though the tactic, does not eliminate the lure of hacking or eliminate it as a deviant behavior it does take the system, that hacking works within and bolster it to create positive deviance rather than…

Sources used in this document:
Hacking in all intense and purpose is deviant behavior, that challenges the current cultural dependence of upon technology, as it challenges the trust of the system as well as many other issues, regardless of its real or potential damage. Yet, the current trend in cyberspace is to create systems that are safe from hacking, and elicit all possible protection for legitimate users and owners of the intellectual properties within. Another interesting trend includes creating hacker sites that require hacking to enter, potentially redirecting hackers to more positive sidelines. (Wible, 2003, p.1577) Such sites are even stressing the legitimacy of their works by barring criminal hackers from competitions and allowing hackers to anonymously offer information to authorities about hacking offenses and potentially helping authorities trace criminal hackers..

Strengthened penalties are meant to enfeeble the "black market" where participants might develop hacking expertise or put their skills to illicit uses. These measures could be strengthened by a "three strikes" rule. Hackers implicated in a specified number of offenses would not be able to compete. To prevent some hackers from being locked out entirely, a date could be set so that everyone would begin with a blank slate. Alternatively, hackers could take away a strike for each public interest job they do (as long as they do not add any new strikes), such as beefing up a site's security or turning state's evidence to prosecute other crimes. (Wible, 2003)

Though the tactic, does not eliminate the lure of hacking or eliminate it as a deviant behavior it does take the system, that hacking works within and bolster it to create positive deviance rather than negative deviance.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Hacker Culture and Subcultures
Words: 1921 Length: 7 Document Type: Term Paper

Peer recognition too plays into many hackers motivation as they work towards being accepted and gaining status within the culture. and, lastly, some hackers are motivated by the thought that their efforts serve a public service (O'Neill, 2006). "Hackers built the Internet, they made the Unix operating system what it is, and they make the World Wide Web work" (Castelluccio, 2003). Forecast 4: Forecast 4 states, "Some computer hacker groups, notably those

Feelings on Technology
Words: 1164 Length: 4 Document Type: Term Paper

Technology, Society & Politics The role of technology in society, politics and economics: Analysis of the works of Kuhn, Rhodes, Christensen, Levy and Toulmin The development of technology with the onset of the Industrial Revolution, capitalism, and modernism created significant changes in the culture and institutions of human societies. Where technology used to be associated with machinery and manufacturing, technology in the 20th century gradually became associated with computer technology. Scientific developments

Cyber Crime and Corporate Security Insights
Words: 5089 Length: 17 Document Type: Research Paper

CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now