The Computer Underground.


The beginning of the electronic communication revolution that started
with the public use of telephones to the emergence of home computers has
been accompanied by corresponding social problems involving the activities
of so-called "computer hackers," or better referred to as the computer
underground (CU). The CU is composed of computer aficionados who stay on
the fringes of legality. The CU is composed of relatively intelligent
people, in contrast to the media's description of the ultra intelligent and
sophisticated teenage "hacker." The majority have in common the belief
that information should be free and that they have "a right to know." They
often have some amount of dislike for the ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

and the CU themselves, they
all have a different understanding or levels of comprehention, this paper
attempts to show the differences between the views as well as attempt to
correct misunderstandings that may have been propagated by misinformed
sources. The differences between the parties of the CU such as,
"hackers," "crackers," "phreaks," "pirates," and virus writers have rarely
been recognized and some deny that there are differences thus this paper
attempts to give a somewhat clearer view and define exactly what each
party is and does as well as how they relate to one another.
Every individual in the CU has a different level of sophistication
when it comes to computers, from the height of the advanced virus writer
and network hacker to the pirate who can be at the same level as a novice
computer user. The prevalence of the problem has been dramatized by the
media and enforcement agents, and evidenced by the rise of specialized
private security firms to confront the ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

to "hackers."
Everything from embezzlement to computer viruses have, at one time or
another, been attributed to them. Additionally, hackers are often
described as being sociopathic or malicious, creating a media image of the
computer underground that may exaggerate their ability for doing damage.
The labeling of the CU and especially hackers as being "evil" is well
illustrated by these media examples. The first is from Eddie Schwartz, a
WGN-Radio talk show host.

Here Schwartz is addressing "Anna," a self-identified hacker that
has phoned into the show: You know what Anna, you know what disturbs me?
You don't sound like a stupid person but you represent a . . . a . . . a .
. . lack of ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

The Computer Underground.. (2005, July 23). Retrieved July 25, 2017, from http://www.essayworld.com/essays/The-Computer-Underground/30495
"The Computer Underground.." Essayworld.com. Essayworld.com, 23 Jul. 2005. Web. 25 Jul. 2017. <http://www.essayworld.com/essays/The-Computer-Underground/30495>
"The Computer Underground.." Essayworld.com. July 23, 2005. Accessed July 25, 2017. http://www.essayworld.com/essays/The-Computer-Underground/30495.
"The Computer Underground.." Essayworld.com. July 23, 2005. Accessed July 25, 2017. http://www.essayworld.com/essays/The-Computer-Underground/30495.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 7/23/2005 10:17:26 AM
Category: Computers
Words: 4290
Pages: 16

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
The Computer Underground
The Computer Underground
The Future Of Computer Crime In...
Computer Software Piracy And It...
The Computer
America And The Computer Indust...
IBM's Dominance Of The Computer...
History Of The Computer Indust
History Of The Computer Industr...
The Evolution Of The Computer
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved