Tuesday, July 23, 2019
Cyber activism and hacktivism Essay Example | Topics and Well Written Essays - 1000 words
Cyber activism and hacktivism - Essay Example Activism involves a range of activities from online search for information, creating and feeding data to new or already existing websites, conducting communication via internet publications or emailing of letters, forming online forums to discuss various issues or coordinating certain activities. Hacktivism activities involve virtual blockades, email bombing, hacking web sites or breaking into computers systems, planting computer worms and viruses. The activities of activism are keen on developing the internet as a useful tool for social progress and policymaking. However, hackvists activities stem from anger and seek to destroy what is created by activism. The internet offers a vast body of information that would take one a lot of time and energy to search manually. Business corporations, organizations, governments and teaching institutions avail information on the internet that is easily accessible by the target audience or any other person interested in the data. The offered information extends beyond geographical demarcation. One can access the information necessary to facilitate his mission. Researchers use this collection of information to argue or prove their theses. While an activist will use this information to improve himself or the society, a hacktivist will seek to destroy this collection of information (Denning, 1999). Various humanity groups such as non-governmental organizations, civil boards and self-help groups publish information in the internet for the public to see. Some businesses such as luxury brand companies employ this technique to promote their products to the vast body of potential customers using the internet. Depending on the organization involved, some will post or publish information on public web sites or may develop their own site where they publish information on regular basis (Denning, 1999). Private websites provoke the anger or interest of hackers who hack to phish information
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.