The Negative Effects of Computer Hacking

3087 Words Sep 8th, 2011 13 Pages
INTRODUCTION Thesis statement: Computer Hacking satisfies obsession for forbidden information and exploitation of skills. I. General Consideration Hacking has been around for more than a century. At first, the term “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. But because of the exploitation of these knowledge and the obsession to forbidden information, it soon became a threat to computer technology. The root of computer hacking was dated back in the early 1960’s by a group of university students, especially in M.I.T. and Stanford. II. Statement of the Problem The researcher wants to know the answers to …show more content…
Hacking signified the unfettered exploration of computer systems for the sake of the intellectual challenge. It involved both the search for the unknown and forbidden and the joy in the art of programming. (Pipkin : 1997) Computer hacking always involves some degree of infringement on the privacy of others or damage to computer-based property such as files, webpages or software. (“Computer Hacking” : http://www.ed.uiuc.edu/up/crime/hacking.htm) Hackers are obsessed with forbidden information. Their interest and ability to access this forbidden information have surrounded hackers with other people who hunger for this information to use for personal gain or social anarchy. (Pipkin : 1997)
A Hacker can be defined as: 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who enjoys programming rather than just theorizing it. 3. A person capable of appreciating hack value. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work on it. 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming limitations. 8. A malicious meddler who tries to discover sensitive information by poking around.
(“Computer