For this Project, I created an Instruction Manual for How to set up Virtual Box
TO: Prof. Jason Ellis
FROM: Jing Sheng Zhao
SUBJECT: Expanded Definition of Hacker
By examining the hacking history, most of the hackers had been become cybercrime, and sadly, so far there’s no absolute solution to stop them. From the history view, according to Richard Darell, hackers were who used hacking technic to illegally gain access into others computer and stole their data for benefits. Along with the increasingly used of network in people’s life and work, hackers had more changes to steal others data and would be able to make more money than ever before. Even so, a lot of company, organization or even the government, they couldn’t do much about it, because hackers could always get away from it. So, it’s not surprise that it’s a good time for cybercrime, the hackers would probably choose to be cybercrime rather than ethical hacker just for the sake of money.
To understand the word “hacker”, you must know its historical development. At the beginning, hackers were not start off bad, when the term “hacker” was first used in 1960s, at MIT, an extremely skilled programmer could use hacking skills to increase the efficiency of the computer. Then start in 1971, hackers were getting bad reputation, when John Draper invented the “blue box”, it’s a technic that allow making free long distance phone calls. Furthermore, more hackers were using the hacking technic for their own benefits, such as hackers like Robert Morris who create the “Morris Worm” in 1988, Kevin Mitnick hacked the federal computer network in 1991 and Adrian Lamo hacked the websites of The New York Times in 2002, etc. From the research in 2014, there are more than a million people become victims of cybercrime every day, and 30000 websites are hacked every day. As we know, hacking back then was use to improve the computer system, but unfortunately, these technical had been using in the wrong place and they had been create many chaos around the world (Darell).
The main reason for people to become a cybercrime is because they can get easy money. Some people needed more money from their job, if they couldn’t get enough; they were more likely to become a crime. For instance, Clifford Trigo, an ethical hacker, having a difficult to earn a living, he pointed out that sometimes he could work for hours but only get paid 50 or 100 bucks. So some of his colleges will used their skills to hack people’s credit-card to make extra gains (Lu 11). Also, Dmitri Alperovitch, chief technology officer at CrowdStrike, he said that hacking is easy, even a first-year computer-science student can do it, thus, it’s not surprising that a broke fresh man would not want the easy money. Another crucial reason for became a hacker is they can always get away from the law, even the FBI agent admit they can’t do much about it, the only advise they gave to the victims is to pay the ransom if they wanted the data back. Therefore, when the skilled programmers in a broke situation, it’s hard for them to resist the temptation of money (The New Economics of Cybercrime).The fight between the ethical hackers and hacker had been going on for decades, but for several reasons, the victory always favor on the hacker side. For example, on May 13 2107, there was a global cyberattack on business, universities, and health systems; it affected more than 150 countries (Bendix 1). The U.K. government blamed The Labour Party for failing to protect the system, but The Labour Party said that they fail because of the government underestimate the cost to preventing the security, they also pointed out the government cut their budget, and didn’t renew a contract that protected the computer system (Bendix 2). There was a debate shows that companies allow to hack back if they get hacked, the reason was that some company might use this opportunity to attack their enemy, and no one wanted that happen, so they can only passively defense. Some lawmakers point out to attack back against the law; they stated that “such activity might well violate foreign laws even if permitted by the U.S.”. Thus, if the hackers were from other country, we got no chance to catch them because the restriction between different nations. In short, hackers can still get away from the laws (When Companies Get Hacked, Should They Be Allowed to Hack Back?).
Overall, hacker had been causing a lot of chaos around the world, and it’s still a problem to be solved in the future. But in fact, hack technology is just a double –edge sword, when you’re using to guard against cyber security breaches, you are ethical hacker. And when you’re using it to attack someone for benefits, then you’re are evil cybercrime. So, it depends on who use it, and use it on what purpose. Thus, to teach a technical to the leaner should to optional, but teach a technic along with the moral have to be mandatory.
Wolff, Josephine. “When Companies Get Hacked, Should They Be Allowed to Hack Back?” The Atlantic, Atlantic Media Company, 14 July 2017, from www.theatlantic.com/business/archive/2017/07/hacking-back-active-defense/533679/.
Lu, Donna. “When Ethical Hacking Can’t Compete.” The Atlantic, Atlantic Media Company, 8 Dec. 2015, from www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking- cybersecurity/419355/
Wolff, Josephine. “The New Economics of Cybercrime.” The Atlantic, Atlantic Media Company, 7 June 2016, from www.theatlantic.com/business/archive/2016/06/ransomware-new- economics-cybercrime/485888/.
Bendix, Aria. “Global Cyberattack Reaches ‘Unprecedented’ Scale.” The Atlantic, Atlantic Media Company, 13 May 2017, from www.theatlantic.com/news/archive/2017/05/global-cyberattack-reaches-unprecedented- scale/526647/.
Darell, Richard. “Hacking History – A Timeline Of Hack Tactics.” Bit Rebels, 21 May 2014, from www.bitrebels.com/technology/hacking-history-timeline-hack- tactics/utm_source=feedburner&utm_medium=email&utm_campaign=Feed: bitrebels (Bit Rebels).
TO: Prof. Jason W. Ellis
FROM: Jing Sheng Zhao
SUBJECT: 500-Word summary of Webster’s “Philosophy of Technology Assumptions in Educational Technology Leadership”
Mark David Webster talked about how the philosophy of technology assumptions has impact on technology leader’s decisions on technology, and he argued it with a quality research. Philosophy of technology is a branch of philosophy that involves examining the underlying assumptions of how technologies impact and transform human society in ways that are philosophically relevant (Kaplan, 2009). The research involved 31 participants from Virginia, there are 15 technology directors, and the others are instructional technology specialists.
Participants will be asked some related questions which constructed by a written questionnaire. The purpose of this study was to know what the K-12 technology leaders think of technology in education, and there are three research questions guided which the author focus on. First, Webster wanted to know about was how are the participants view the technology which we are currently using. Result showed three different views from the participants, one is Technology is a tool, they can control it. Another one is Technological change is inevitable, technology is unstoppable. And the last one is Technological optimism, they had positive view on using technology. Also, one category that frequently pointed out by most of the participants was Technology raises questions of human values, which author stated technology was value laden.
The next question Webster focus on was how are participants used the technology, and their opinions about it. Webster pointed out some participant’s ideas, and there were vary. One participant thought we should keep up the technology, and he addressed that we use technology because in order to achieve some objectives, technology is required, he also thought technology can prepare the student to get ahead. Another participant viewed it should consider the reason to use technology, which means we should drive technology rather than technology drive us, he said he wasn’t like technology, but if he uses it, he needs to see good reasons for it. Also, one participant pointed out that we should not pursue technology just because the sake of technology.
As Technology Specialist 8 stated that not all the technology is good, and we can’t stop it growing, but we have to use it properly. However, some participants found out they felt so many stress by keeping up the technology. One participant mentioned the working condition he was in, he said it’s hard to keep up with the technology with the limited resource, but if he don’t, he will have left behind. In another hand, Technology Director 7 stated he will consider ethic while he made the technology decision, he said he has to responsible for it since he will deal with the elementary level. The third points author wanted to know was what technology may change in leader’s thinking or decision making. Author points out some participant’s view, it stated that since technology is inevitable, we have to use it and keep pace with the change of technology. And they gave an example on the rise of using eBook instead of paper textbooks, it’s to emphasized the technological imperative.
This article focuses on presenting the implications of the study for educational technology, while providing only a summary of the grounded theory methods used, as a full treatment of the research methods was previously published (Webster, 2016). In the end, the author concluded that philosophy of technology assumptions did change decision while education leader’s approaches to technology, and when they question about it, they are most likely can make a better decision whether or not to use technology within different situations.
Webster, M. D. (2017). Philosophy of Technology Assumptions in Educational Technology Leadership. Educational Technology & Society, 20 (1), 25–36.