2,075
10
Essay, 2 pages (250 words)

Another computer essay 15256

The Computer Underground.

The beginning of the electronic communication revolution

that started with the public use of telephones to the emergence

of home computers has been accompanied by corresponding social

problems involving the activities of so-called ” computer

hackers,” or better referred to as the computer underground (CU).

The CU is composed of computer aficionados who stay on the

fringes of legality. The CU is composed of relatively intelligent

people, in contrast to the media’s description of the ultra

intelligent and sophisticated teenage ” hacker.” The majority have

in common the belief that information should be free and that

they have ” a right to know.” They often have some amount of

dislike for the government and the industries who try to

control and commercialize information of any sort. This paper

attempts to expose what the CU truly is and dispel some of the

myths propagated by the media and other organizations. This paper

also tries to show the processes and reasons behind the

criminalization of the CU and how the CU is viewed by different

organizations, as well as some of the processes by which it came

into being. What the CU is has been addressed by the media,

criminologists, secuity firms, and the CU themselves, they all

have a different understanding or levels of comprehention, this

paper attempts to show the differences between the views as well

as attempt to correct misunderstandings that may have been

propagated by misinformed sources. The differences between the

parties of the CU such as, ” hackers,” ” crackers,” ” phreaks,”

” pirates,” and virus writers have rarely been recognized and some

deny that there are differences thus this paper attempts to give

a somewhat clearer view and define exactly what each party is

and does as well as how they relate to one another.

Thank's for Your Vote!
Another computer essay 15256. Page 1
Another computer essay 15256. Page 2
Another computer essay 15256. Page 3

This work, titled "Another computer essay 15256" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Another computer essay 15256'. 15 November.

Reference

AssignBuster. (2021, November 15). Another computer essay 15256. Retrieved from https://assignbuster.com/another-computer-essay-15256/

References

AssignBuster. 2021. "Another computer essay 15256." November 15, 2021. https://assignbuster.com/another-computer-essay-15256/.

1. AssignBuster. "Another computer essay 15256." November 15, 2021. https://assignbuster.com/another-computer-essay-15256/.


Bibliography


AssignBuster. "Another computer essay 15256." November 15, 2021. https://assignbuster.com/another-computer-essay-15256/.

Work Cited

"Another computer essay 15256." AssignBuster, 15 Nov. 2021, assignbuster.com/another-computer-essay-15256/.

Get in Touch

Please, let us know if you have any ideas on improving Another computer essay 15256, or our service. We will be happy to hear what you think: [email protected]