An Ethical Framework for Hacking Operations

Ethical Theory and Moral Practice 24 (1):231-255 (2021)
  Copy   BIBTEX

Abstract

In recent years the power and reach of prominent hacker groups such as Anonymous and LulzSec has been clearly demonstrated. However, in a world where hackers are able to wield significant online power, can they do so ethically as legitimate agents? To answer this question this paper will develop an ethical framework based on the premise that hackers have exhibited instances where they have acted to protect people from harm at a time when there was no one else to do so. At its core this paper will argue that political hacking can be justified when it is done to protect the vital interests of oneself or others. Moreover, it will also argue that just because hackers are outside the state does not automatically discount them as ethical actors and that when the state fails to protect people – whether it is due to a lack of ability, political will or because the state is the source of the threat – hackers can fill the void. In order to achieve this, first it is necessary to highlight the space for hackers to operate; second, guide hacker activity by creating an ethical framework detailing what actions are justified towards what end; third, to offer mechanisms that can aid in reaching these ethically justified decisions; and as a result, inform further ethical debates on how to react to these political hackers. This means that the framework can be used to both justify and condemn hacking depending on the circumstances, allowing those on the outside to distil and evaluate a political hack, both past and present, while guiding hacker collectives by providing clearer ethical tools for determining the appropriate agendas and methods.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 91,122

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Hunting Hackers. A gift from the ‘mute guest’.María Dolors Martínez-Cazalla - 2018 - Humanities Journal of Valparaiso 12:115-140.
Characterizing Hacking: Mundane Engagement in US Hacker and Makerspaces.Sarah R. Davies - 2018 - Science, Technology, and Human Values 43 (2):171-197.
Developing a Framework for Ethical Leadership.Alan Lawton & Iliana Páez - 2015 - Journal of Business Ethics 130 (3):639-649.
A framework for the ethical impact assessment of information technology.David Wright - 2011 - Ethics and Information Technology 13 (3):199-226.

Analytics

Added to PP
2021-02-13

Downloads
42 (#352,484)

6 months
10 (#187,567)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

Anarchy, State, and Utopia.Robert Nozick - 1974 - New York: Basic Books.
The View From Nowhere.Thomas Nagel - 1986 - New York: Oxford University Press.
Freedom of the will and the concept of a person.Harry G. Frankfurt - 1971 - Journal of Philosophy 68 (1):5-20.

View all 52 references / Add more references