Topic > Social Implications of Hacking Essay - 1500

In this report there are many different implications of hacking that would be discussed, about the social and ethical implications that hacking has on society, and so through the discussion of many" For" and "Against arguments this would allow the reader to finally be able to come to a conclusion. The structure of the report will be as follows. First, it will cover the purposes and social implication points of hacking, then the ethical implications of hacking This would help achieve the objectives of the report and identify many different aspects of hacking both ethically and socially. Social Implications of HackingMany social implications can be the cause of hacking in today's world, for example a person can manipulate the system. . An article about ethical hacking talks about how it can affect a person ethically. For example, an article talks about “Is hacking ethical?” (Wilson,2004) This shows how hackers have decided to pursue a career in the computer industry so that they can professionally hack into a system without getting arrested; order regarding hacking, which may lead to an ethical concern. As people may not find it morally acceptable to be able to accept many ICT consultancy agencies this may lead to customers not believing in the company, which may impact the company, as they consider it morally/ethically wrong. Likewise they might also feel the same about genuine ICT consultancy firms, who do not engage in such “Ethical Hacking: Understanding the Benefits, Objectives and Disadvantages” (Kitchen). , 2010), how hacking can be ethically positive and improve the lives of many in this society. “Ethical Hackers” explains how computer experts can look at hacking in a positive way and find ways to protect an individual. It is the customers or the owner of that network who can consider and report anything they find unusual. This would allow them to track hackers attempting to hack into an organization's system and exploit their information. Company hackers can use it in a positive way and prevent the system from being hacked or create a strong defense mechanism (security system) to prevent hackers. Since they would know that other "bad" hackers wouldn't be able to get in, this could potentially help protect the