Here is the synopsis of our sample research paper on The Ethics of Computer Hacking. Have the paper e-mailed to you 24/7/365.
                                            
Essay / Research Paper Abstract
This  5  page paper argues that computer hacking is not ethical. However, both sides of the issue are discussed in depth.  Bibliography lists 5 sources. 
                                                
Page Count: 
                                                5 pages (~225 words per page)
                                            
 
                                            
                                                File: RT13_SA311hck.rtf
                                            
                                            Buy This Term Paper »
                                          
                                             
Unformatted sample text from the term paper:
                                                    
                                                
                                                    such a thing. At the same time, there is another side of the story that should be investigated. In looking at the process of computer hacking, one may be able  
                                                
                                                    to determine its ethical potential.  Adams (2000) suggests that the existence of hackers, and the mischief they produce is largely folklore. Whenever computers run into trouble, people blame hackers  
                                                
                                                    (2000). While that is the case, most people do not know what hacking is all about (2000). Adams explains that there are different types of hackers and the community is  
                                                
                                                    divided into white and black hat users (2000). 	 White hats are worn by hackers who are motivated by the desire to pit their knowledge against  professionals  and  
                                                
                                                    might even work for them (Adams, 2000). They do not want to make trouble for anyone. Rather, they just want to test their skill and feel challenged by the idea  
                                                
                                                    of getting into a file that they should not have access to.  If they find a security flaw in  software or a web site, for example, they will  
                                                
                                                    tip off the company that owns the site or make the information public (2000). In some way then, they are somewhat productive. Like having a firewall, these individuals can  
                                                
                                                    help people protect their sites from unscrupulous individuals who want to do damage. Some refer to these other types of people as black hats.  	Black hats, as they are  
                                                
                                                    called, are  malicious hackers  who illegally tamper  with computers and tell other black hatters also how to do the same thing (Adams, 2000). These are the types  
                                                
                                                    of people who commit crimes and this type of hacking is unethical. Interestingly, once per month, a group of such hackers in the United States meet to socialize but much  
                                                
                                                    ...