Hacking and Intrusion into Computers Systems of Moral Perspective

Document Type : The Quarterly Jornal

Authors

1 Assistant Professor at Islamic Sciences and Culture Academy.

2 Master of Science in Computer Engineering (Software) and Researcher at Jami'a al-Zahra.

Abstract

The use of computer systems and connect them via network and internet, leading to the creation of a real storm of problems in the computer's security. The increasing development of technology and the growing dependence of humans on a computer to do their vital work imply that future security problems may have more serious consequences than events have occurred to date.One of the most effective skills to establish security in cyberspace is hacking skills and break-in. Hack have various kinds that seem some of them are ethical and some are unethical.Some people say that as long as hack has not no serious damage, break-in can lead to development of system’s security. But many people disagree with this idea and believe that break-in is almost always damaging and wrong. Due to the impact of cyber security in everyday life on the one hand and on the other hand the importance of bioethics, in this paper we investigate the ethics of hacking.

Keywords


1. “2015 Costs of Cyber Crime Study: United States,” http://www8.hp.com/us/en/ software-solutions/ponemon-cyber-security-report, Hewlett Packard Enterprise, October, 2015.
2. Baird, Bruce J; Baird Jr, Lindsay L; Ranauro, Ronald P. (1987), “The moral cracker”, Computers & Security, Vol 6, Issue 6, 471 - 478.
3. Brey, Philip (2007), Ethical Aspects of Information Security and Privacy, Security, Privacy, and Trust in Modern Data Management, New York: Springer Berlin Heidelberg.
4. Denning, Dorothy E. (1990), “Concerning Hackers Who Break into Computer Systems,” 13th National Computer Security Conference, Washington, D.C, Oct. 1-4.
5. Ethical hacking, Student Guide, Internet Security Systems, Inc., 2000.
6. Falk, Courtney (2004), “Gray Hat Hacking Morally Black And White”, Cyber Security Group (CSG), Training Conference.
7. Fötinger, Christian S. (2004), Ziegler, Wolfgang; Understanding a hacker’s mind – A psychological insight into the hijacking of identities, Krems, Austria: Donau-University Krems.
8. Graves, Kimberly (2010), CEH: Certified Ethical Hacker Study Guide, Indiana: Wiley Publishing, Inc.
9. Himma, Ken (2005), “Information and Intellectual Property Protection: Evaluating the Claim that Information Should be Free”, APA Newsletter on Philosophy and Law, 4, 3–9.
10. Himma, Kenneth Einar (2007), Internet security: hacking, counterhacking, and Society, United States of America: Jones & Bartlett Publishers, Inc.
11. Himma, Kenneth Einar Tavani, Herman T. (2008), The handbook of computer ethic, Canada: John Wiley & Sons, Inc.
12. http://www.ashiyane.ir/archive.php?id=2
14. http://www.usatoday.com/story/news/nation/2015/08/06/russia-reportedly-hacks-pentagon-email-system/31228625/
15. Jennings, Richard C. (2010), “Professional Practice & Ethics”, Computer Science Tripos Part IA, Department of History and Philosophy of Science University of Cambridge.
16. Levy, Steven (1994), HackersHeroes of the Computer Revolution, New York: Dell Publishing a division of Bantam Doubleday Dell Publishing Group.
17.  Martin, Mike W. (2005), Schinzinger, Roland; Ethics in Engineering, Fourth Edition, Mc-Graw Hill.
18. Spafford, Eugene H. (1992), “Are computer break-ins ethical?” Journal of Systems Software, 17.
19. Stallman, Richard M. (1992), “Against User Interface Copyright,” 92 Proceedings of the conference on TRI-Ada.
20. Tavani, Herman T. (2004), Ethics and Technology: Ethical Issues in an Age of information and Communication Technology, New York: John Wiley & Sons, Inc.
21. Young, Susan; Aitel, Dave (2004), the hackers handbook: The Strategy behind Breaking into and Defending Networks, United States of America: Auerbach Publications.
22. سعیدی، سینا، حجت اله حاجی‌حسینی و صبا سعیدی (1392)، «بررسی عوامل مؤثر بر نقض قانون حق نشر توسط کاربران اینترنت»، اخلاق در علوم و فنّاوری، سال هشتم، ش2.