StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Activism and Hacktivism - Essay Example

Cite this document
Summary
"Cyber Activism and Hacktivism" paper focuses on cyber activism which is described as the use of the internet to pursue specific agendas. The constituent processes include activity coordination, dialogue, and collection. The process is harmless because it does not affect other internet users…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Cyber Activism and Hacktivism
Read Text Preview

Extract of sample "Cyber Activism and Hacktivism"

Cyber Activism and Hacktivism Cyber Activism and Hacktivism Cyber activism entails the use of internet to undertake ordinary activities while pursuing specific agendas or goals. Cyber activism does not disrupt other processes that other users may be undertaking. Hacktivism refers to a combination of hacking activities and activism. Activism as part of hacktivism refers to the fact that the user undertakes hacking activities with a specified goal in mind. Unlike actual activism, hacktivism seeks to invade a target site and disrupt normal activities (Denning, 1999). Hacktivism harbors ill intent while activism does not intent to cause damage to other users. Activism involves a range of activities from online search for information, creating and feeding data to new or already existing websites, conducting communication via internet publications or emailing of letters, forming online forums to discuss various issues or coordinating certain activities. Hacktivism activities involve virtual blockades, email bombing, hacking web sites or breaking into computers systems, planting computer worms and viruses. The activities of activism are keen on developing the internet as a useful tool for social progress and policymaking. However, hackvists activities stem from anger and seek to destroy what is created by activism. Activities of activism Collection The internet offers a vast body of information that would take one a lot of time and energy to search manually. Business corporations, organizations, governments and teaching institutions avail information on the internet that is easily accessible by the target audience or any other person interested in the data. The offered information extends beyond geographical demarcation. One can access the information necessary to facilitate his mission. Researchers use this collection of information to argue or prove their theses. While an activist will use this information to improve himself or the society, a hacktivist will seek to destroy this collection of information (Denning, 1999). Publication Various humanity groups such as non-governmental organizations, civil boards and self-help groups publish information in the internet for the public to see. Some businesses such as luxury brand companies employ this technique to promote their products to the vast body of potential customers using the internet. Depending on the organization involved, some will post or publish information on public web sites or may develop their own site where they publish information on regular basis (Denning, 1999). Private websites provoke the anger or interest of hackers who hack to phish information they are not supposed to obtain. Dialogue Web has transformed the globe into a “village.” Communication is faster and easier. Geographical distances and barriers no longer mar or slow down conveying of information from one location to another (Denning, 1999). An individual at one end of the globe can chat with another at the opposite end using emails or skype. A person undertaking such activity is an activist. Another person may decide to create programs or undertake certain activities that will cause problems to this form of communication, the hacktivist, by means of blockades, worms and viruses. Activity coordination Advocacy groups or organizations utilize internet services to supervise and manage activities of their groups. The groups act as activists in this context. They may include top management of Multinational Corporation that holds online teleconference meetings, check an individual’s performance, convey orders and directives to lower managers or check progress of their mission. Advocacy groups use these techniques to organize riots and demonstrations on national, regional or global basis (Denning, 1999). These techniques are available in the web. Activists use them in bid to attain certain goals. Hacktivists will resort to web site destruction and information distortion to gain attention. Hacktivism activities Virtual blockades and sit-ins According to Denning (1999), Sit-ins refer to mobilization of multitudes of people to visit a certain web site with intent of causing so much traffic that the usual activities that rely on the web sites paralyze. The intent of lobbying into the web site is not to use it, like activists, but rather to block its use. Blockades operate in a similar manner. Specific programs are designed to log in a computer to the target sites every few seconds to generate the desired traffic in the absence of hacktivist. Email bombs Email bombing is a form of blockade whose interest is specific email accounts instead of web sites. The hacktivists send multiple of email to target accounts on daily basis causing so much traffic such that filtering the useless emails becomes impossible. The usual important communication paralyzes. The targeted user cannot receive emails from clients, friends or partners. Additionally, one cannot send any either (Denning, 1999). Email bombing is achievable in two ways. Several people can each send several emails, or an automated system on several computers can send unrelenting messages to the target email address. Hacking webs and computer break-ins Hacktivists deploy certain software and tricks to gain un-authorized access to target web sites allowing them to distort the information presented. Their intention is to view the classified contents or to alter them mislead other users or to make their presence known. Due to tampering of data in the host site, normal operations halt or appear misguided. The hacktivists may as well hack a site and change the domains address such that visitors to the site are redirected to another alien site (Denning, 1999). Computer break-in refers to the ability of a hacktivist to gain access, download or post data on a distant computer when its user is online. Computer worms and viruses Worms and viruses are software used by hacktivists to propagate angry messages or damage computer systems. Worms spreads on their own accord once introduced to the system whereas viruses come attached on a file that gains access to the target system or computer (Denning, 1999). While an activist would send a clean file copy to a recipient, the hacktivist sends the file accompanied by the corrupting software. Real life hacktivism case On September 12, 2001, Canada authorities charged a 17-years-old boy, famously known as mafiaboy, with unauthorized computer use and mischief with regard to data propagation. Allegedly, the teen had crippled CNN’s, Yahoo’s, Amazon’s, Dell’s and eBay’s web sites from 7 - 15 of February 2002. The attack on Yahoo was the first. The youngster used email-bombs-like attacks on Yahoo numerous communication channels overburdening its servers. As a result, communication via yahoo paralyzed. As a multibillion industry that provided a search engine used across the web by multitudes of people, various processes stopped affecting not only yahoo but also the public and corporate businesses. The boy’s intention was to create awareness of a web site he had opened. The website was shut down. He retaliated by shutting down CNN, eBay, Dell and Amazon intermittently over the following one week. Conclusion Cyber activism is described as the use of the internet to pursue specific agendas or goals. The constituent processes include activity coordination, dialogue, publication and collection. The process is harmless because it does not affect other internet users. However, hacktivism refers to a combination of hacking activities and activism that affects users. The acts include hacking webs, computer break-ins, computer worms, viruses, email bombs, virtual blockades and sit-ins. The mafia boy case is a typical example of hacktivism. References Denning, D. E. (1999). Activism, Hacktivism and cyberterrorism. The Internet as a Tool for influencing Foreign policy , 50. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber activism and hacktivism Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Cyber activism and hacktivism Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1624826-cyber-activism-and-hacktivism
(Cyber Activism and Hacktivism Essay Example | Topics and Well Written Essays - 1000 Words)
Cyber Activism and Hacktivism Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1624826-cyber-activism-and-hacktivism.
“Cyber Activism and Hacktivism Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1624826-cyber-activism-and-hacktivism.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Activism and Hacktivism

Activists turn 'Hacktivists' on the Web

The idea of ‘hacktivism' seems very interesting and quite predictable in this age of technology and cyberspace.... hacktivism is a very sensitive issue.... No doubt, the idea of hacktivism and civil disobedience online is not objectionable; it follows the same path as Martin Luther King's.... While CCC rules out the cyber-attacks, others associate politically motivated attacks as legal form of civil disobedience which is online, for instance, Anonymous denial of service attacks (DDoS) on Australian government's websites....
2 Pages (500 words) Book Report/Review

Modern Technology - Is Facebook safe from hackers

The recent advancements in modern technology and the emergence of social networking sites have changed the way the world keeps connected.... Today most of the people have account in social networks like Facebook, Twitter, or MySpace.... ... ... ... The recent advancements in modern technology and the emergence of social networking sites have changed the way the world keeps connected....
4 Pages (1000 words) Essay

Hackers are the true defenders of cyberspace

While they are often considered to be criminals, breaking into computer systems to cause damage and engage in personal gain; most hackers are out there for the exact opposite reasons, to help the cyber-environment, and to do something they love.... Hackers, not crackers (people whose primary goal is financial gain), are the true defenders of cyberspace, in that they work to uncover security flaws, attempt to regulate dangerous or immoral content, promote new technology and ideas, and strive to stop crackers from damaging critical cyber technology....
6 Pages (1500 words) Essay

Cyber-Activism and Democracy

Therefore, it will be worthwhile to find out the kind of influence the cyber-activism had on the US democracy.... The run up to the US Presidential elections 2008 was quite high pitched with candidates battling it out in a number of ways and on a variety of issues.... The style of campaign, of both the candidates, was also quite different....
5 Pages (1250 words) Essay

Cybersecurity Vulnerability Faced by IT Managers Today

It is people who are depended on to execute and reinforce security procedures and policies and provide protection and defense against cyber attacks.... If Information Technology and cyber Security personnel are not effectively trained and skilled in their career field, they may lack the competence to prevent, detect, and react when faced with security breaches, and they may be a perfect target for a 'social engineering' attack, which entails discovering and taking advantage of weaknesses in how people interact with IT systems....
12 Pages (3000 words) Term Paper

Media Activism and Cyber Activism

This paper "Media activism and Cyber Activism" analyses internet activists who contributed to promoting good governance in society.... Media activism and cyberactivism are healthy in society because of their major role in exposing vice in society and enhancing democracy.... edia activism and cyberactivism have contributed significantly to the prevention of AIDS.... AIDS activism in art and film uses the arts and films of the affected, promotes website-jamming, or supporting the interest groups through online means....
8 Pages (2000 words) Case Study

Information Warfare and Cyberterrorism

Hacktivism is defined broadly as the blend of activism and hacking.... This report "Information Warfare and Cyberterrorism" discusses cyber-attacks, hacktivism, and malware.... By the year 2008, the anonymous group interest in well-collaborated international hacktivism.... It's likely that convectional crimes will become more like cyber-crimes and verse versa.... We should prep for the growth of Anonymous and the diversity of the ethics of cyber-attacks....
12 Pages (3000 words) Report

Analysis of Hacktivism on Social Change

The paper "Analysis of hacktivism on Social Change" tells that WikiLeaks had to switch its website-hosting provider and sourced bandwidth from Amazon.... hy Is hacktivism a Recent Issue?... This phenomenon gained popularity after a political group called Anonymous engaged in a number of cyber-attacks against companies, which suspended their services to WikiLeaks (Fitri 2011; Yip & Webber 2011)....
9 Pages (2250 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us