For this Project, I created an Instruction Manual for How to set up Virtual Box
Author: Jing Sheng Zhao
Jing Sheng Zhao’s 750-Word Expanded Definition of Hacker
TO: Prof. Jason Ellis
FROM: Jing Sheng Zhao
DATE: 10/15/19
SUBJECT: Expanded Definition of Hacker
Introduction
By examining the hacking history, most of the hackers had been become cybercrime, and sadly, so far thereâs no absolute solution to stop them. From the history view, according to Richard Darell, hackers were who used hacking technic to illegally gain access into others computer and stole their data for benefits. Along with the increasingly used of network in peopleâs life and work, hackers had more changes to steal others data and would be able to make more money than ever before. Even so, a lot of company, organization or even the government, they couldnât do much about it, because hackers could always get away from it. So, itâs not surprise that itâs a good time for cybercrime, the hackers would probably choose to be cybercrime rather than ethical hacker just for the sake of money.
Definitions
To understand the word âhackerâ, you must know its historical development. At the beginning, hackers were not start off bad, when the term âhackerâ was first used in 1960s, at MIT, an extremely skilled programmer could use hacking skills to increase the efficiency of the computer. Then start in 1971, hackers were getting bad reputation, when John Draper invented the âblue boxâ, itâs a technic that allow making free long distance phone calls. Furthermore, more hackers were using the hacking technic for their own benefits, such as hackers like Robert Morris who create the âMorris Wormâ in 1988, Kevin Mitnick hacked the federal computer network in 1991 and Adrian Lamo hacked the websites of The New York Times in 2002, etc. From the research in 2014, there are more than a million people become victims of cybercrime every day, and 30000 websites are hacked every day. As we know, hacking back then was use to improve the computer system, but unfortunately, these technical had been using in the wrong place and they had been create many chaos around the world (Darell).
Context
The main reason for people to become a cybercrime is because they can get easy money. Some people needed more money from their job, if they couldnât get enough; they were more likely to become a crime. For instance, Clifford Trigo, an ethical hacker, having a difficult to earn a living, he pointed out that sometimes he could work for hours but only get paid 50 or 100 bucks. So some of his colleges will used their skills to hack peopleâs credit-card to make extra gains (Lu 11). Also, Dmitri Alperovitch, chief technology officer at CrowdStrike, he said that hacking is easy, even a first-year computer-science student can do it, thus, itâs not surprising that a broke fresh man would not want the easy money. Another crucial reason for became a hacker is they can always get away from the law, even the FBI agent admit they canât do much about it, the only advise they gave to the victims is to pay the ransom if they wanted the data back. Therefore, when the skilled programmers in a broke situation, itâs hard for them to resist the temptation of money (The New Economics of Cybercrime).The fight between the ethical hackers and hacker had been going on for decades, but for several reasons, the victory always favor on the hacker side. For example, on May 13 2107, there was a global cyberattack on business, universities, and health systems; it affected more than 150 countries (Bendix 1). The U.K. government blamed The Labour Party for failing to protect the system, but The Labour Party said that they fail because of the government underestimate the cost to preventing the security, they also pointed out the government cut their budget, and didnât renew a contract that protected the computer system (Bendix 2). There was a debate shows that companies allow to hack back if they get hacked, the reason was that some company might use this opportunity to attack their enemy, and no one wanted that happen, so they can only passively defense. Some lawmakers point out to attack back against the law; they stated that âsuch activity might well violate foreign laws even if permitted by the U.S.â. Thus, if the hackers were from other country, we got no chance to catch them because the restriction between different nations. In short, hackers can still get away from the laws (When Companies Get Hacked, Should They Be Allowed to Hack Back?).
Working Definition
Overall, hacker had been causing a lot of chaos around the world, and itâs still a problem to be solved in the future. But in fact, hack technology is just a double âedge sword, when youâre using to guard against cyber security breaches, you are ethical hacker. And when youâre using it to attack someone for benefits, then youâre are evil cybercrime. So, it depends on who use it, and use it on what purpose. Thus, to teach a technical to the leaner should to optional, but teach a technic along with the moral have to be mandatory.
References
Wolff, Josephine. âWhen Companies Get Hacked, Should They Be Allowed to Hack Back?â The Atlantic, Atlantic Media Company, 14 July 2017, from www.theatlantic.com/business/archive/2017/07/hacking-back-active-defense/533679/.
Lu, Donna. âWhen Ethical Hacking Can’t Compete.â The Atlantic, Atlantic Media Company, 8 Dec. 2015, from www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-  cybersecurity/419355/
Wolff, Josephine. âThe New Economics of Cybercrime.â The Atlantic, Atlantic Media Company, 7 June 2016, from www.theatlantic.com/business/archive/2016/06/ransomware-new-      economics-cybercrime/485888/.
Bendix, Aria. âGlobal Cyberattack Reaches ‘Unprecedented’ Scale.â The Atlantic, Atlantic Media    Company, 13 May 2017, from www.theatlantic.com/news/archive/2017/05/global-cyberattack-reaches-unprecedented-      scale/526647/.
Darell, Richard. âHacking History – A Timeline Of Hack Tactics.â Bit Rebels, 21 May 2014, from www.bitrebels.com/technology/hacking-history-timeline-hack- tactics/utm_source=feedburner&utm_medium=email&utm_campaign=Feed: bitrebels      (Bit Rebels).
Jing Sheng Zhao’s 500-Word Article Summary
TO: Prof. Jason W. Ellis
FROM: Jing Sheng Zhao
DATE: 9/17/19
SUBJECT: 500-Word summary of Webster’s “Philosophy of Technology Assumptions in Educational Technology Leadership”
Mark David Webster talked about how the philosophy of technology assumptions has impact on technology leaderâs decisions on technology, and he argued it with a quality research. Philosophy of technology is a branch of philosophy that involves examining the underlying assumptions of how technologies impact and transform human society in ways that are philosophically relevant (Kaplan, 2009). The research involved 31 participants from Virginia, there are 15 technology directors, and the others are instructional technology specialists.
Participants will be asked some related questions which constructed by a written questionnaire. The purpose of this study was to know what the K-12 technology leaders think of technology in education, and there are three research questions guided which the author focus on. First, Webster wanted to know about was how are the participants view the technology which we are currently using. Result showed three different views from the participants, one is Technology is a tool, they can control it. Another one is Technological change is inevitable, technology is unstoppable. And the last one is Technological optimism, they had positive view on using technology. Also, one category that frequently pointed out by most of the participants was Technology raises questions of human values, which author stated technology was value laden.
The next question Webster focus on was how are participants used the technology, and their opinions about it. Webster pointed out some participantâs ideas, and there were vary. One participant thought we should keep up the technology, and he addressed that we use technology because in order to achieve some objectives, technology is required, he also thought technology can prepare the student to get ahead. Another participant viewed it should consider the reason to use technology, which means we should drive technology rather than technology drive us, he said he wasnât like technology, but if he uses it, he needs to see good reasons for it. Also, one participant pointed out that we should not pursue technology just because the sake of technology.
As Technology Specialist 8 stated that not all the technology is good, and we canât stop it growing, but we have to use it properly. However, some participants found out they felt so many stress by keeping up the technology. One participant mentioned the working condition he was in, he said itâs hard to keep up with the technology with the limited resource, but if he donât, he will have left behind. In another hand, Technology Director 7 stated he will consider ethic while he made the technology decision, he said he has to responsible for it since he will deal with the elementary level. The third points author wanted to know was what technology may change in leaderâs thinking or decision making. Author points out some participantâs view, it stated that since technology is inevitable, we have to use it and keep pace with the change of technology. And they gave an example on the rise of using eBook instead of paper textbooks, itâs to emphasized the technological imperative.
This article focuses on presenting the implications of the study for educational technology, while providing only a summary of the grounded theory methods used, as a full treatment of the research methods was previously published (Webster, 2016). In the end, the author concluded that philosophy of technology assumptions did change decision while education leaderâs approaches to technology, and when they question about it, they are most likely can make a better decision whether or not to use technology within different situations.
References
Webster, M. D. (2017). Philosophy of Technology Assumptions in Educational Technology Leadership. Educational Technology & Society, 20 (1), 25â36.