Bruce Sterlingauthor of The Hacker Crackdown In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the 'hacker' as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense.
Each of the issue raised would further be discussed by using the three ethical theories of Consequence-Based, Duty-Based and Character-Based.
Apart from that the general role of a computer professional will also be described later on in this report in terms of using their knowledge and expertise in terms of hacking. Hence this report will be divided into two parts the first part focusing on highlighting the ethical issues and his prosecution and second would deal with the computer professional part.
A detail description of his history of hacking is mentioned in the case scenario which will be described later on in the report. Firstly a brief introduction of ethics and its three theories would be discussed which will make it easy to understand and to implement it on the Kevin Mitnick case.
Ethics has been described in many ways by different people over the history including same great Greek philosophers such as Socrates, Aristotle, and so on.
Greeks mostly defined ethics as the study of what was good for the infidel and the society. The easiest way to describe ethics would be differing and reflecting a human being character in terms of what is good or bad, right or wrong, fair and unfair, responsible or irresponsible.
It will lead a human being moral character to be in good conduct. Ethics can also be referred as to what humans are suppose to do if they follow the prescribe standards of right and wrong, which normally would lead him in terms of rights, his benefit to society, his obligations etc.
Also ethics and can be referred as studying of moral character of human being and developing it to an ethical standard. All of them following the root hub of ethics but the form of ethics which is highlighted and followed in our case study for this report are what is called Cyberethics.
Cyberethics To understand the meaning of cyberethics a person should be aware of the term Cybertechnology. All the devices used in modern era in the field of cyber space such as hand held devices, personal computers, mainframes, networks and mainly the Internet can be termed as a part of Cybertechnology.
Cybertechnology in terms refers to a broad spectrum of technologies that ranges from stand alone computers to the clustered of networked computing, information and communication technologies  Different definitions of cyberethics exists mostly dealing with ethical issues with certain type of online activities for e.
It can be referred as certain types of laws which are not monitored by the judicial or law governing bodies but from and individual himself which go beyond his moral values which would be something different from cyber law which has to governed and monitored by a governing body. Cyberethics can be defined as the field of applied ethics that examines moral, legal and social issues in the development and use of Cybertechnology  Ethical Theories Since this report has to follow certain type of ethical theories in order to identify the ethical issues a brief description of each one of them has been mentioned below.
Consequence-Based As the name suggest consequence based theories produces the most desirable outcomes for it member morally. The providing of ultimate standards for consequence of actions against which the moral decisions were evaluated is highlighted in this theory.
The goodness or right identified by consequence would be something regarded as Consequence-Based ethical theory which gives some outcome for someone. But whose outcome would be the question here that who should benefit from this outcome?
The argument provided by them normally follows the theory that an act of some individual or a whole social policy would be acceptable if it s providing great benefits for a majority of individuals which would be affected with the given policy or from the provided act by the certain individual.
Jeremy Bentham states that People are driven by their interests and their fears, but their interests take precedence over their fears, and their interests are carried out in accordance with how people view the consequences that might be involved with their interests.
They should provide happiness to everyone rather than just one person who would be satisfied when a certain kind of act is performed.
Duty-Based Duty based Ethical theory is something which gives the concept of Deontology derived from the Greek word Deon which means Duty. The concept of Deontology is the approach in which goodness and right would be achieved by studying the act of an individual or social policy rather than the consequence which its leads too.
Immanuel Kant was one of the Deontological thinkers who always criticized Utilitarian thinkers saying that morality must be defined as the duty of an individual to one another rather than consequence which are produced when a certain individual performs a certain type of action.Kevin Mitnick Ethical Issues And Computer Hacking History Philosophy Essay Philosophy This report discounts in figuring out the honest issues of Kevin Mitnick and his computer hacking background and weather the accusations and.
Kevin David Mitnick was born in Los Angeles on august 6, and he attended James Monroe high school in L.A. He was a hacker, phreaker and social engineer, who was the world’s most wanted computer criminal in 90’s, He was charged for many criminal activities forfraud and computer hacking into many top companies and stealing their confidential data.
When he was arrested Mitnick became a martyr and a heron to many teenage computer enthusiasts. These teens would be determined to carry on the symbolic spirit, or what they thought to be, of Kevin Mitnick. Marc Menninger is an IT security manager specializing in corporate information security and risk management.
As an information security professional, Marc has 20+ years of applied security experience. The arrest of Kevin Mitnick by the FBI, aided by Tsutomu Shimomura a renowned computer security expert, has many ethical issues involved which needs to be discussed on a broader scale for thorough understanding of ethical concepts of technology.
Social impact and social context of cybercrime ‘Social impact’ per se is a fickle concept, which can be treated on both a macro scale – for example, the ‘economic and social impact of the arts’ (Reeves, Reeves, M. (). Measuring the economic and social impact of the arts: A review.