StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Why computer talents become computer hackers - Article Example

Cite this document
Summary
The attacks have not only damaged their credibility but also undermined the rise of e-commerce. As a result, it is important to determine how to deal with hackers. Although a lot of attention has been…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.1% of users find it useful
Why computer talents become computer hackers
Read Text Preview

Extract of sample "Why computer talents become computer hackers"

Why computer talents become computer hackers In the recent past, many corporations have fallen victim to cyber-attacks. The attacks have not only damaged their credibility but also undermined the rise of e-commerce. As a result, it is important to determine how to deal with hackers. Although a lot of attention has been given to the middle stage of the evolution of talented and skilled people engaging in hacking, people have failed to focus on the factors that influence them to follow this illegal path.

In the beginning, people who have computer talents are driven by curiosity to hack into systems. They perceive it as a challenge. In addition, the lack of moral values plays a role in encouraging them to engage in destructive activities. Young people are rebellious in nature. For those with computer talents, hacking provides an effective channel for demonstrating their rebellion. However, an individual’s judgment determines if they will engage in hacking. Many students who have an inclination to use their computer skills for illegal activities tend to attack school systems.

The failure of high schools and colleges to punish these activities appropriately misses a significant opportunity to correct this behavior (Xu, Hu & Zhang 69). As a result, the young men and women perceive themselves to be invisible. In conclusion, it is possible to prevent young people having computer skills from engaging in hacking. They are driven to the activity out of curiosity (Xu, Hu & Zhang 69). A few young hackers engage in the activity for material or financial gain. Consequently, any effort to combat the rise of hacking in the modern society must involve effective measures to channel the curiosity among young people into a productive endeavor.

Works CitedXu, Zhengchuan., Hu, Qing & Zhang, Chenghong. “Why computer talents become computer hackers”. Communications of the ACM. 56.4 (2013): 69-74.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Why computer talents become computer hackers Article”, n.d.)
Why computer talents become computer hackers Article. Retrieved from https://studentshare.org/information-technology/1674866-why-computer-talents-become-computer-hackers
(Why Computer Talents Become Computer Hackers Article)
Why Computer Talents Become Computer Hackers Article. https://studentshare.org/information-technology/1674866-why-computer-talents-become-computer-hackers.
“Why Computer Talents Become Computer Hackers Article”, n.d. https://studentshare.org/information-technology/1674866-why-computer-talents-become-computer-hackers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Why computer talents become computer hackers

Role of Software Security in Maintaining Cyber Safety

The modern technique of intranet is also not working because the hackers have devised methods that can locate and identify the networks.... Once the network is located then the hackers use the information to hack the central computer and therefore, the entire network starts to play in the hands of evil geniuses.... The antivirus programs are famous for providing the hackers a plain ground.... The hackers managed to follow the technique of the Aids virus....
10 Pages (2500 words) Essay

Hackers are the true defenders of cyberspace

There is a great divergence in the understanding of the role of hackers in modern cyberspace.... While they are often considered to be criminals, breaking into computer systems to cause damage and engage in personal gain; most hackers are out there for the exact opposite reasons, to help the cyber-environment, and to do something they love.... hackers, then, strive to improve the internet for all users, and not damage or deface what currently exists....
6 Pages (1500 words) Essay

Information and System Security

he dictionary defines hackers as, "a talented amateur user of computers, specifically one who attempts to gain unauthorized access to files on various systems.... Thanks to Hollywood and the young group of kids that crowd the Internet; hackers have almost been made out to be artist-like.... The movie "hackers" make its characters seem like misunderstood geniuses looking to express themselves.... hackers play on people's fear of viruses to cause damage to their PC's....
2 Pages (500 words) Essay

The Security of the Computer Network and Computer System

nbsp;In order to avoid becoming victims of cybercrime, an individual is expected to take the necessary steps to protect one against hackers, online scam artists.... Both the computer and the home network need to be protected from viruses, hackers, and malware.... It is this information that hackers seek access to, in order to attempt to steal a person's identity and use their credit card information or bank details, for example, to access the victim's finances....
10 Pages (2500 words) Assignment

Risks of Using the Internet

hellip; Internet users must be vigilant enough to keep their computer's anti-virus software updated with the latest improvements.... "Risks of Using the Internet" paper takes into consideration the myriad risks internet users face from cybercriminal activity around the world, and by examining what governments and internet builders are doing to get rid of or alleviate these problems....
5 Pages (1250 words) Coursework

Data and Information in a Company - Essential Facilities That Should Be Properly Maintained and Protected

Another danger that comes with telecommuting is the possibility of losing information to hackers.... Teleworking or telecommuting is a terminology used to define the aspect of working from a remote location using a personal computer or a work station connected to the company's network than sending the information through the network (Fisher 2005 p 5).... This means that one does not necessarily have to have an office in the company but rather he can work from the comfort of his computer at home....
8 Pages (2000 words) Essay

The Use of Hacking

Knittel and Soto (2003) disagree with the media's description of hacking as attacking other people's computers with the intention of causing harm (6) and instead describe hackers as overly talented persons who use their talents to explore innovative ways of improving how the computers operate by improving the software and hardware of the computers (8).... It is such people that Knittel and Soto point out that media refers to as hackers while in the computer world they are referred to as crackers and are not highly regarded (8)....
10 Pages (2500 words) Essay

Wi-Fi Protected Setup Vulnerabilities

hellip; These flaws hinder the intended use of WPS and its acceptance3 among computer users.... It would then be replaced by Wi-Fi protected access (WPA2) which just like WEP was developed to provide security for computer users operating through a private wireless network (Bosworth 2012, p.... This meant that it was impossible to guarantee the protection of information on one's computer through a private wireless connection.... WPS is designed to provide various methods through which a computer user can authenticate his or her wireless network connection (Stajano et al 2007, p....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us