Access over 20 million homework & study documents

Issc451 Forum

Content type
User Generated
Subject
Programming
School
American Military University
Type
Homework
Rating
Showing Page:
1/3
Q1. What are the "virtues" of hacking as described by hackers? Do these virtues justify
breaking the law? Should police take the "higher" goals pursued by hackers into
consideration when making arrests? Why or why not.
Hackers highly appreciate certain values that include freedom of expression and thought,
independence as well as modesty. Some hackers also describe their acts as sharing, while others
would call it stealing. A hacker is a person who is insistently curious about how different things
work (Raicu, 2012). They are similar to kids who have disassembled toys looking at the parts to
see how they work together. A hacker can describe hacking as teaching people a lot about what
is being hacked. It helps to satisfy their curiosity offering possibilities of awakening new
questions. They describe it as opening doors metaphorically as possibilities or literally as giving
access to something that one would not normally have to access (Raicu, 2012). The only way a
hack can certainly be justified is to bring benefits to the society only when the hacker reveals and
exposes their criminality giving the authorities relevant information.
Notably, the culture of hackers acts as a political statement concerning speech and
information freedom. Coleman (2012) notes that the scan of the hacked website and blogs can
appear as though someone people are against the network or website being taken down. These
actions come up with a culture of fear of speaking one’s mind and fear of reprisals. Although
denying to consider the goals of hackers is unfettered freedom, described as anarchy, the end
product of the process should also be considered.
References
Coleman, E. G. (2012). Coding freedom: The ethics and aesthetics of hacking. Princeton
University Press.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
Raicu, I. (2012, April 1). Unavoidable Ethical Questions About... Hacking. Markkula Center for
Applied Ethics. Retrieved from https://www.scu.edu/ethics/focus-areas/internet-
ethics/resources/unavoidable-ethical-questions-about-hacking/. Accessed on 2020, July 22.
Q2. What is the Bank Secrecy Act of 1970? How has the advent of computer technologies
created avenues around this act?
The Bank Secrecy Act of 1970 ensures that banks and financial institutions file records
concerning suspicious financial transactions over $10, 000 (Office of the Comptroller of the
Currency). It is a Currency and Foreign Transaction Reporting Act approved by the U.S.
Congress requiring institutions to work together with the government on the issues of money
fraud and laundering suspected. Another role played by BSA away from hardening the
propagation of money laundering is preventing banks from being intermediaries of illicit
activities.
Notably, the advent of computers has created avenues around BSA, especially to make
abiding easier. For instance, the United Crimes Elimination Network (UCEN)," which is
computerized, makes use of the Bank Secrecy Act's infrastructure granting permission as part of
creating compliance. Rouse (2009) notes that the anti-money laundering (AML) program is a
satisfactory program to the supervisors in implementing risk-based management of the moving
parts, and thus addressing the AML compliance, tailoring internal controls and dedicating
sufficient resources. The pillars of the AML program also focus on the ongoing customer- based
risks. Jeff & Armen (2017) notes that cognitive computing is another avenue that makes the
computer systems understand more of what the user wants. It helps the digital assistants to

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Q1. What are the "virtues" of hacking as described by hackers? Do these virtues justify breaking the law? Should police take the "higher" goals pursued by hackers into consideration when making arrests? Why or why not. Hackers highly appreciate certain values that include freedom of expression and thought, independence as well as modesty. Some hackers also describe their acts as sharing, while others would call it stealing. A hacker is a person who is insistently curious about how different things work (Raicu, 2012). They are similar to kids who have disassembled toys looking at the parts to see how they work together. A hacker can describe hacking as teaching people a lot about what is being hacked. It helps to satisfy their curiosity offering possibilities of awakening new questions. They describe it as opening doors metaphorically as possibilities or literally as giving access to some ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4