The Computer Underground.
The beginning of the electronic communication revolution that started
with the public use of telephones to the emergence of home computers has
been accompanied by corresponding social problems involving the activities
of so-called "computer hackers," or better referred to as the computer
underground (CU). The CU is composed of computer aficionados who stay on
the fringes of legality. The CU is composed of relatively intelligent
people, in contrast to the media's description of the ultra intelligent and
sophisticated teenage "hacker." The majority have in common the belief
that information should be free and that they have "a right to know." They
often have some amount of dislike for the ...
Want to read the rest of this paper? Join Essayworld today to view this entire essay and over 50,000 other term papers
|
and the CU themselves, they
all have a different understanding or levels of comprehention, this paper
attempts to show the differences between the views as well as attempt to
correct misunderstandings that may have been propagated by misinformed
sources. The differences between the parties of the CU such as,
"hackers," "crackers," "phreaks," "pirates," and virus writers have rarely
been recognized and some deny that there are differences thus this paper
attempts to give a somewhat clearer view and define exactly what each
party is and does as well as how they relate to one another.
Every individual in the CU has a different level of sophistication
when it comes to computers, from the height of the advanced virus writer
and network hacker to the pirate who can be at the same level as a novice
computer user. The prevalence of the problem has been dramatized by the
media and enforcement agents, and evidenced by the rise of specialized
private security firms to confront the ...
Get instant access to over 50,000 essays. Write better papers. Get better grades.
Already a member? Login
|
to "hackers."
Everything from embezzlement to computer viruses have, at one time or
another, been attributed to them. Additionally, hackers are often
described as being sociopathic or malicious, creating a media image of the
computer underground that may exaggerate their ability for doing damage.
The labeling of the CU and especially hackers as being "evil" is well
illustrated by these media examples. The first is from Eddie Schwartz, a
WGN-Radio talk show host.
Here Schwartz is addressing "Anna," a self-identified hacker that
has phoned into the show: You know what Anna, you know what disturbs me?
You don't sound like a stupid person but you represent a . . . a . . . a .
. . lack of ...
Succeed in your coursework without stepping into a library. Get access to a growing library of notes, book reports, and research papers in 2 minutes or less.
|
CITE THIS PAGE:
The Computer Underground.. (2005, July 23). Retrieved April 23, 2025, from http://www.essayworld.com/essays/The-Computer-Underground/30495
"The Computer Underground.." Essayworld.com. Essayworld.com, 23 Jul. 2005. Web. 23 Apr. 2025. <http://www.essayworld.com/essays/The-Computer-Underground/30495>
"The Computer Underground.." Essayworld.com. July 23, 2005. Accessed April 23, 2025. http://www.essayworld.com/essays/The-Computer-Underground/30495.
"The Computer Underground.." Essayworld.com. July 23, 2005. Accessed April 23, 2025. http://www.essayworld.com/essays/The-Computer-Underground/30495.
|