Difference between revisions of "Hacker Ethics and Morals"
From Hacker Innovation: Redefinition and Examination of Outlaw Sources of Generativity for Future Product Development Strategies (2014) by Mike Pinder
Mikepinder (Talk | contribs) (Created page with "== Common hacker ethics ==") |
Mikepinder (Talk | contribs) (→Common hacker ethics) |
||
Line 1: | Line 1: | ||
== Common hacker ethics == | == Common hacker ethics == | ||
+ | |||
+ | Within the typology of hacking explored in this paper, a common set of underlying ethical foundations is prevalent across all hacker classes. They span across all forms of hacking along the illegal-to-legal dimension, even within the aforementioned and defined Computer Security Cracker class. According to Levy [Levy, 1984], the cornerstones of the common hacker ethic are: |
Revision as of 16:44, 30 August 2014
Common hacker ethics
Within the typology of hacking explored in this paper, a common set of underlying ethical foundations is prevalent across all hacker classes. They span across all forms of hacking along the illegal-to-legal dimension, even within the aforementioned and defined Computer Security Cracker class. According to Levy [Levy, 1984], the cornerstones of the common hacker ethic are: