Order Now


Today, hacking is widely-spread. At the same time, the development of hacking is highly controversial. On the one hand, hacking has a negative impact on functioning of organizations. On the other hand, hacking contributes to the enhancement of information and products’ security. Anyway, hacking has its ethics, which defines actions of hackers but still it is only the matter of personal responsibility whether to observe hacking ethics or not.

Obviously, hacking can cause damage because the unauthorized access to information (Bloch, Peigneur and Segev, 195). Hence, organizations may lose important information, while individuals can suffer from identity theft and loss of personal information (Bernstein, 44). Therefore, hacking damages organizations and individuals.

On the other hand, hacking can improve professional skills of hackers. In fact, hackers can improve their skills due to hacking (Lucas and Baroudi, 48). However, hacking is illegal and such “training” is apparently questionable not only from legal but also from ethical point of view.

Hacking stimulates organizations to enhance their information security (Fenton, 48). Being vulnerable to hacking attacks, organizations attempt to enhance their information system to protect their information and databases from unauthorized intrusion. Therefore, hacking attacks stimulate organizations to improve their information system.

However, some hackers argue that hacking is a form of civil disobedience and protest (Fenton, 52). They use their skills to access information and to share this information with other users. In such a way, they believe they struggle against the authorities and organizations that limit access of individuals to important information.

Finally, hacking helps to eliminate barriers and to grants access to information to the entire society. In such a way, hackers pretend to serve to the society as they inform the public about important issues. However, their actions are highly controversial because, in spite hacking ethics, they act illegally.

Works Cited:

Bernstein, J. “I Felt Like a Conspiracy Theorist.” New Statesman, 140(5072), 2011, p.49-53. Retrieved on October 6, 2011 from http://proquest.umi.com.bloomington.libproxy.ivytech.edu.allstate.libproxy.ivytech.edu/pqdweb?index=12&did=2469505651&SrchMode=2&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1317918056&clientId=46116
Bloch, M., Peigneur Y. and Segev, A. (2000). “Leveraging Electronic Commerce for Competitive Advantage: a Business Value Framework.” The Ninth International Conference on EDI-IOS, Bled, Slovenia.
Fenton, B. “Thurlback: Truth Will Out in Hacking Affair.” FT, 2011. Retrieved on October 6, 2011 from http://proquest.umi.com.bloomington.libproxy.ivytech.edu.allstate.libproxy.ivytech.edu/pqdweb?index=5&did=2474134841&SrchMode=2&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1317918056&clientId=46116
Fenton, B. “Murdoch Aide Resigns over Hacking Strategy.” FT, 2011. Retrieved on October 6, 2011 from http://proquest.umi.com.bloomington.libproxy.ivytech.edu.allstate.libproxy.ivytech.edu/pqdweb?index=10&did=2469983271&SrchMode=2&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1317918056&clientId=46116
Lucas, H. and Baroudi, J. (2002). “The role of Information Technology in Organization Design.” Journal of Management Information Systems, 10(4), 45-52.