Today, there are many different types of hackers around the world. Some hackers do it for fun, while people have serious ones who hack into the high power grid and crack it down. A subculture is a group of individuals who have the same interest. According to (Steinmetz et al., 2020), a subculture establishes norms, beliefs, and values different from the central culture. They argue that cybercriminals have values and beliefs that are opposite of the dominant philosophy. Mostly, these people have characteristics consistent with their values and beliefs, which goes against the law. Many theories are explaining why hackers end up doing this act as the learning theory. For example, hackers have the value set and know their ability to perform the hack.
Furthermore, each subculture has values that drive them. Mastery, technology, and secrecy are the three essential values that guide hackers. The relationship to technology is the most known element of hacking. Hacking cannot exist without technology (Steinmetz et al., 2020). The book also recognizes secrecy as another significant value in the hacker's subculture because all hackers like living a life full of secrets. From the interviews, it is clear that hackers like playing with people's minds in the world of technology. When they hack into people's computers and access their personal information, hackers always feel in control and end up blackmailing or stealing from the victims. When one leave their computers running, they are always at risk of been hacked.
Delegate your assignment to our experts and they will do the rest.
Lastly, individuals need to protect themselves from hacking by covering tracks when using the internet. Currently, persons have computer programs that protect hackers from accessing files. If the internet's security is improved, the hacker value systems can also undergo deviation. The more advanced the technology, the more skills these hackers learn. It is everyone's responsibility to be watchful when using the internet. Make sure you use genuine antivirus and malware programs on computers.
References
Steinmetz, K. F., Holt, T. J., & Holt, K. M. (2020). Decoding the binary: Reconsidering the hacker subculture through a gendered lens. Deviant Behavior , 41 (8), 936-948.
Tapes & Transcripts | Hackers | FRONTLINE | PBS . (n.d.). FRONTLINE. https://www.pbs.org/wgbh/pages/frontline/shows/hackers/etc/script.html