Difference between revisions of "Hacker Ethics and Morals"

From Hacker Innovation: Redefinition and Examination of Outlaw Sources of Generativity for Future Product Development Strategies (2014) by Mike Pinder
Jump to: navigation, search
(Created page with "== Common hacker ethics ==")
 
(Common hacker ethics)
Line 1: Line 1:
 
== Common hacker ethics ==
 
== Common hacker ethics ==
 +
 +
Within the typology of hacking explored in this paper, a common set of underlying ethical foundations is prevalent across all hacker classes. They span across all forms of hacking along the illegal-to-legal dimension, even within the aforementioned and defined Computer Security Cracker class. According to Levy [Levy, 1984], the cornerstones of the common hacker ethic are:

Revision as of 16:44, 30 August 2014

Common hacker ethics

Within the typology of hacking explored in this paper, a common set of underlying ethical foundations is prevalent across all hacker classes. They span across all forms of hacking along the illegal-to-legal dimension, even within the aforementioned and defined Computer Security Cracker class. According to Levy [Levy, 1984], the cornerstones of the common hacker ethic are: