28 Sep 2022

130

Reconsidering the Hacker Subculture through a Gendered Lens

Format: APA

Academic level: College

Paper type: Assignment

Words: 281

Pages: 1

Downloads: 0

Today, there are many different types of hackers around the world. Some hackers do it for fun, while people have serious ones who hack into the high power grid and crack it down. A subculture is a group of individuals who have the same interest. According to (Steinmetz et al., 2020), a subculture establishes norms, beliefs, and values different from the central culture. They argue that cybercriminals have values and beliefs that are opposite of the dominant philosophy. Mostly, these people have characteristics consistent with their values and beliefs, which goes against the law. Many theories are explaining why hackers end up doing this act as the learning theory. For example, hackers have the value set and know their ability to perform the hack.

Furthermore, each subculture has values that drive them. Mastery, technology, and secrecy are the three essential values that guide hackers. The relationship to technology is the most known element of hacking. Hacking cannot exist without technology (Steinmetz et al., 2020). The book also recognizes secrecy as another significant value in the hacker's subculture because all hackers like living a life full of secrets. From the interviews, it is clear that hackers like playing with people's minds in the world of technology. When they hack into people's computers and access their personal information, hackers always feel in control and end up blackmailing or stealing from the victims. When one leave their computers running, they are always at risk of been hacked.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Lastly, individuals need to protect themselves from hacking by covering tracks when using the internet. Currently, persons have computer programs that protect hackers from accessing files. If the internet's security is improved, the hacker value systems can also undergo deviation. The more advanced the technology, the more skills these hackers learn. It is everyone's responsibility to be watchful when using the internet. Make sure you use genuine antivirus and malware programs on computers.

References 

Steinmetz, K. F., Holt, T. J., & Holt, K. M. (2020). Decoding the binary: Reconsidering the hacker subculture through a gendered lens.  Deviant Behavior 41 (8), 936-948.

Tapes & Transcripts | Hackers | FRONTLINE | PBS . (n.d.). FRONTLINE. https://www.pbs.org/wgbh/pages/frontline/shows/hackers/etc/script.html

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Reconsidering the Hacker Subculture through a Gendered Lens.
https://studybounty.com/reconsidering-the-hacker-subculture-through-a-gendered-lens-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 62

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration