Abstract
Computers are foundations of every facet in human life for many years to come. However, Hacking is a sole activity of entering into computer systems without permission, but it eventually became an accepted business practice. Moral and ethical implications should be put in mind if universities and professors will require hacking as part of the curriculum. Technology aims to improve lives, but its usage may be abused – which can lead people to show self-centered acts towards benefits. In some cases, one can potentially abuse the benefit of convenience – based from the morals embodying ethical egoism. One can use the glaring mistakes and to cover the loopholes present in the system, and it could be subjective from a moral and ethical standpoint.
Keywords: hacking, ethical hacking, ethical egoism, subjective relativism
Computer architecture interconnects different logical algorithms, input/output devices and networking platforms in order to create a system. In any computer architecture, mechanical and logical flaws are present, and could have a negative impact upon the user. However, those same flaws can serve as a working idea on upgrading the backbone and functionality of computer systems. Computer hacking and improvisation of high-end materials have implications on both moral and ethical issues. Computer hacking is generally accepted as an act, but rightfulness depends on the resulting action and desired goal. An upgraded technological device should help any user, but its flaws and use could have a negative effect on the user.
The meaning of “hacking” in computer science has changed over time. Hacking used to be an act of exploring the mechanism of computer systems for a useful purpose. In present times, many people view hacking as a criminal act carried out through electronic means. The term “ethical hacking” was coined (Palmer, 2001) in order to offset negative perceptions surrounding hacking. Ethical hacking became a widely accepted practice in modern business operations. Since ethical hacking became an accepted practice, sharing information specific to hacking procedures in the form of a tutorial became a norm in knowledge-skill acquisition.
The creation of ethical hacking as a working concept raises the issue of teaching the concepts of hacking in universities and computer science curriculums. Students are supposed to learn new theories and concepts required in order to develop a full understanding of a specific module. More importantly, the role of teachers and university superiors is to ensure that students imbibe good moral and ethical values. However, the integrity and morality of universities are questioned when students are unintentionally taught different techniques in breaking civil laws.
It is normal and acceptable beyond standards to teach the standards and concepts involving hacking. However, there must be consideration of limitations that affect the decision-making stigma of instructors and students. The situation involving instructional processes on teaching the student how to hack into other systems lies on the ethical issue of subjective relativism. Subjective relativism entails the differences on how human perceives a morally right or a morally wrong action (Quinn, 2005). Companies and computer programmers could resort to hacking if some circumstances allow attainment of the main objective. Therefore, teaching students how to hack is a legitimate way to identify computer network weaknesses and prevention of malicious attacks (Pashel, 2006). Hacking is not morally wrong. It is up to the hacking professionals on how will they apply the moral principles in ethical hacking, such as knowing when to infiltrate a computer network system and to aim towards the positive goal of knowledge acquisition.
The Case for Self-Driven Automobile
Automation helps a lot in one’s daily tasks but does not always guarantee positive results. In fact, automation could even be the source of errors. Automatic cars could greatly help for land navigation purposes, and the driver is just behind the wheels to prevent a potential accident. The main purpose of upgrading a certain unit is to produce more benefits and reduce risks. However, automated cars also put the driver in risk compared to driving an old car with manual gears. Any occurrence such as driving error or a technical failure while on the road could be fatal, and it does not matter what kind of automobile the driver has his wheels on.
In the issue of introducing automated cars as a replacement for existing automobiles, car manufacturers and scientists must consider how it can potentially affect human behavior negatively. In this case, the issue of ethical egoism applies. Ethical egoism involves a person doing what is morally right for long-term self-interests (Quinn, 2005). At first, making use of the system’s feature could produce benefits. However, repeated tendencies can cause a person to use the product excessively, and abuse its benefits to achieve something. Such repetitive instances could bring a mindset to a user and could potentially abuse the features to no end. In this case, the driver would enjoy driving an automated car while not considering other drivers from outside lanes. It is an instance of lacking courtesy, which directly affects one's treatment of others. Cars are a product of technology, and using it too much can cause obsession, stress, and affect information communication in a negative way (Cadet, 2013). In any technological device, reliability and risks go hand in hand – in a way that it creates a positive or negative influence in one’s personal life.
Conclusion
Hacking and upgrading an existing technology are not separate issues in addressing the ethical implications behind computer reliability. Rather, these issues correlate one another to create or to maintain the existing computer software’s stable state. The structure of computer systems may vary according to user preference and specific requirements. No matter the specific computer system setup, it is possible to alter the algorithmic instructions in order to exploit the fatal errors within a computer. More importantly, outside features of a computer system such as circuit design, power, ventilation, and network security play an important role in ensuring a well-functioning computer system. Hacking does not only involve alteration of syntax codes, and impairing the tangible features of a computer system. Upgrading a specific technology into its much high-powered and more robust state could create its foundation. The perceived benefits of a technology can be misused, in a way that it can affect the psychological mind of a person.
References
Cadet, H. (2013, August 13). Excessive Use of Technology Affects Our Lives. Retrieved November 20, 2014, from http://www.hernandocadett.com/content/excessive-use- technology-affects-our-lives
Palmer, C. C. (2001). Ethical hacking. IBM Systems Journal, 40(3), 769-780.
Pashel, B. A. (2006, September). Teaching students to hack: ethical implications in teaching students to hack at the university level. In Proceedings of the 3rd annual conference on Information security curriculum development(pp. 197-200). ACM.
Quinn, M. (2005). Introduction to Ethics. In Ethics for the information age (5th ed., pp. 51-105). Boston: Pearson/Addison-Wesley.