Computer Hacker Culture and Subcultures Term Paper

Total Length: 1921 words ( 6 double-spaced pages)

Total Sources: 5

Page 1 of 6



Peer recognition too plays into many hackers motivation as they work towards being accepted and gaining status within the culture. and, lastly, some hackers are motivated by the thought that their efforts serve a public service (O'Neill, 2006). "Hackers built the Internet, they made the Unix operating system what it is, and they make the World Wide Web work" (Castelluccio, 2003).

Forecast 4:

Forecast 4 states, "Some computer hacker groups, notably those characterized by the 'offender' and 'predator' categories, will evolve into networked criminal enterprises."

This likely will occur in some instances. Hacker culture's desire to gain power and notoriety, combined with the need to achieve that adrenaline fix, will lead some to ultimately progress from the loosely structured culture of hackers today, to a more formalized, networked criminal group. However, for the most part, the high turnover rate of the culture, along with the desire to maintain secrecy and anonymity, is likely to prevent most from making this evolutionary leap.

It is likely that certain hackers will be recruited by other groups to commit digital crimes and digital terrorism, but again most, due to the secretive nature, will not fall into this trap.

Those vulnerable to this will likely be individuals who are on the societal fringe and are sympathetic to a particular cause or movement.

Stuck Writing Your "Computer Hacker Culture and Subcultures" Term Paper?

In addition, it is likely that members in an established group will be trained as hackers, for the sole purpose of carrying out the wishes of the organization.

Digital terrorism can be used to intimidate mainstream society, or can be utilized to steal sensitive information or money. Law enforcement will have to adjust their investigation and prosecution techniques to meet the new challenges of cyber crimes. With little physical evidence at their disposal, authorities will have to become experts at tracking virtual evidence.

Conclusion:

In the end, the increased use of computing technology and the ever-expanding nature of the Internet has led to new and greater opportunities for hackers. This male-dominated culture is based in secrecy, despite the need to relinquish this secrecy in order to gain community status, anonymity, and a love for technology. Curiosity as well as a desire for power leads many to hacking, and as technology increases, this curiosity sure will only continue to grow......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Hacker Culture And Subcultures" (2008, March 20) Retrieved May 16, 2024, from
https://www.aceyourpaper.com/essays/computer-hacker-culture-subcultures-31344

Latest MLA Format (8th edition)

Copy Reference
"Computer Hacker Culture And Subcultures" 20 March 2008. Web.16 May. 2024. <
https://www.aceyourpaper.com/essays/computer-hacker-culture-subcultures-31344>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Hacker Culture And Subcultures", 20 March 2008, Accessed.16 May. 2024,
https://www.aceyourpaper.com/essays/computer-hacker-culture-subcultures-31344