Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Commercial Information Technology

The impact of hackers on the internet commerce

Title: The impact of hackers on the internet commerce

Seminar Paper , 2000 , 28 Pages , Grade: 1,7 (A-)

Autor:in: Thomas Kramer (Author)

Computer Science - Commercial Information Technology
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

The assignment is divided into four main parts. It will start with highlighting several definitions of the term `hacker′, explained by referring to a few examples. At the same time different interpretations of those definitions will be provided and should give the reader an overview over the distinct views towards hackers.
The following section comprises the history as well as the development of the hackers′ scene. It is important to stress how it has changed over the time. Thus one can learn more about the hackers′ intentions and attitudes.

Chapter four is about the motivation of hacking. It should emphasize the different justifications of their activities.
The next section uses the results of the previous sections to highlight the impact of the hacking activity on the internet. From the point of view of companies and governments it is to determine to what extend hackers threaten their ongoing operations.
The assignment will end with a summary and a conclusion of the issues discussed before. Furthermore there will also be an outlook of how the situation could develop in the future as well as the discussion whether or not legislation will be able to solve the threats imposed by hackers.

Excerpt


Table of Contents

1 INTRODUCTION

1.1 THE ISSUE OF THE ASSIGNMENT

1.2 THE STRUCTURE OF THE ASSIGNMENT

2 THE TERM ‘HACKER’

2.1 DEFINITION

2.2 THE TERM HACKER IN A BROADER SENSE

2.2.1 Phone Phreaking

2.2.2 Sport intruders

2.2.3 Computer sabotage

2.2.4 Computer espionage

2.2.5 Computer deceit

3 THE HISTORY AND DEVELOPMENT OF THE HACKING SCENE

3.1 THE BEGINNING

3.1.1 The telephone people

3.1.2 The computer people

3.2 THE FURTHER DEVELOPMENT OF THE HACKING SCENE

3.3 THE IMPACT OF TECHNOLOGY ON THE HACKERDOM

4 THE MOTIVATION AND ETHICS OF HACKING

4.1 THE HACKER’S ETHIC

4.2 THE IMPROVEMENT OF SECURITY

4.3 THE ACADEMIC MOTIVATION

4.4 THE PROTECTORS OF THE SOCIETY

4.5 SOCIAL AND POLITICAL REASONS

4.6 CRIMINAL ENERGY

5 IMPENDING THE INTERNET COMMERCE

5.1 THE GENERAL PUBLIC

5.1.1 The direct impact

5.1.2 The indirect impact

5.2 BUSINESS AND GOVERNMENT AGENCIES

5.3 DEFENCE ACTIONS

6 CONCLUSIONS

6.1 SUMMARY

6.2 OUTLOOK

6.3 FINAL STATEMENT

Research Objectives and Core Themes

The primary objective of this assignment is to examine the influence of hackers on internet commerce, exploring the phenomenon, motivations, historical development, and the resulting societal impacts. The research focuses on the challenges posed to businesses and governments by unauthorized system access.

  • Definitions and classifications of the term 'hacker'
  • Historical progression of the hacking subculture
  • Ethical motivations vs. criminal intentions of hackers
  • Impact on internet security and commercial transactions
  • Defense strategies employed by corporate and governmental entities

Excerpt from the Book

2.2.2 Sport intruders

“Sport intruders are the stereotypical Internet hackers” (Moyer, 1997). Their motivation is based mainly on the incentive to detect weaknesses in security systems and to break into the system behind them. They want to show their computer skills and make people aware of existing security lacks – there is no evil purpose behind it. Therefore there is no modification or corruption of particular data intended.

An example for this approach of hacking is the famous ‘Chaos Computer Club e.V.’ in Germany, which once detected an error in a software tool that established an internet connection to a former interactive videotext provider in Germany. The club found out, that due to this error the login and password of a user for entering the service were readable within a very short period of time when the user was changing sites quickly. So they got to know the password of a leading bank. They set up their own videotext site, which charged DM 10 (exchange rate is almost DM1 = NZ$1) for accessing the page. A hacker of the club faked his identity by using the bank’s access password and entered this particular website repeatedly until costs of almost DM 135,000 were created. At that time they stopped their activity and let both the bank and the public know about the lack in the internet provider’s security system. Later the hacker club paid the money back to the bank.

The question is, whether one can convict this activity in terms of morale and ethics, since (apart from the loss of the image to the bank) nothing was damaged during the hacker’s activity and the public benefited from it because a very dangerous error had been detected and could be fixed. (Moyer, 1997; Steinhauer, 1998)

Summary of Chapters

1 INTRODUCTION: This chapter outlines the scope of the assignment, the rising risks of technology, and the structure of the investigation into hacker influence.

2 THE TERM ‘HACKER’: Provides various definitions and distinguishes between constructive programming skills, malicious intent, and specific categories like phreaking or sabotage.

3 THE HISTORY AND DEVELOPMENT OF THE HACKING SCENE: Details the emergence of hackers from phone phreakers and university computer wizards to the networked tribe of the ARPANET and USENET eras.

4 THE MOTIVATION AND ETHICS OF HACKING: Analyzes the diverse reasons behind hacking, ranging from claims of altruistic security research to criminal exploitation and social status.

5 IMPENDING THE INTERNET COMMERCE: Examines the tangible impact on e-commerce, the threats to public security, and the defensive measures adopted by institutions.

6 CONCLUSIONS: Summarizes the study’s findings, arguing that while e-commerce will develop, the persistent threat of hackers will hinder its rapid growth.

Keywords

Hacking, Internet Commerce, Computer Security, Cyber-crime, Phreaking, Crackers, Ethics, Motivation, ARPANET, UNIX, Information Security, Data Protection, Hacktivism, Electronic Frontier, Internet Vulnerability.

Frequently Asked Questions

What is the core focus of this assignment?

The assignment investigates the impact of hackers on internet commerce, analyzing how unauthorized access to systems affects businesses, governments, and society at large.

What are the primary themes discussed in the work?

Key themes include the evolution of hacker identity, ethical justifications versus criminal behavior, the impact of technological progress on the hacking scene, and the economic threats posed to e-commerce.

What is the ultimate goal of the research?

The goal is to provide an overview of how hacking activities developed and to assess the extent to which these activities currently impede the growth and security of internet-based commerce.

Which methodology is employed in this analysis?

The study uses a historical and analytical approach, synthesizing findings from security studies, media reports, and academic literature regarding hacker behavior and organizational security.

What does the main body cover?

The main body is divided into sections covering definitions of hacking, historical developments, motivational ethics, impacts on public/corporate sectors, and strategies for defense.

Which keywords best characterize this work?

The primary keywords include Hacking, Internet Commerce, Security, Ethics, Cyber-crime, and Data Protection.

How does the author distinguish between hackers and crackers?

The author distinguishes them based on intent: hackers are portrayed as being driven by curiosity and building systems, whereas crackers are characterized by the desire to destroy and perform malicious acts.

What is the significance of the 'gift culture' within the hacking scene?

The 'gift culture' refers to the social structure among hackers where status is not earned through control but through the contribution of high-quality code and open-source information to the community.

Excerpt out of 28 pages  - scroll top

Details

Title
The impact of hackers on the internet commerce
College
UNITEC New Zealand  (Information Systems)
Course
Course The Impact of IT on Society
Grade
1,7 (A-)
Author
Thomas Kramer (Author)
Publication Year
2000
Pages
28
Catalog Number
V1893
ISBN (eBook)
9783638111584
Language
English
Tags
Course Impact Society
Product Safety
GRIN Publishing GmbH
Quote paper
Thomas Kramer (Author), 2000, The impact of hackers on the internet commerce, Munich, GRIN Verlag, https://www.grin.com/document/1893
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  28  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint