The hacker theory best describes how the subculture of hacking in the digital environments began and how it has advanced over the years. According to Taylor et al. (2018), the hacker theory is characterized by the hackers defining their actions. The general culture defines hacking as an illegal thing but through hacker theory, criminals attempt to justify their actions. For instance, hacking and technology are firmly tied together because one leads to the other (Taylor et al., 2018). As such, hackers believe that their hacking activities help to advance technology by prompting technology users to come up with more advanced protective measures to data and information. There is also existence of aspect of masterly among hackers. The hacker theory defines hackers with their ability to access highly protected accounts. This has promoted competition between hackers; where each hacker tries to come up with more complex hacking techniques than the others.
However, hacker theory has its own strengths and weaknesses. One of the strengths of hacker theory is that it leaves a room for criminals to defend themselves (Madarie, 2017). Hacker theory is viewed by hackers as a way of promoting technological advancement. Hackers argue that companies and technology developers are growing out of the hacking activities. Whenever a company falls a victim of hacking, then they are able to develop stronger anti-virus protection software to protect their data and information (Madarie, 2017). On the other hand, hacker theory has the weakness of illegality (Davis, 2017). In as much as hacking might be a measure of superiority among the hacking community, victims are vulnerable law enforcement detection. Hacking activities are globally termed as acts against the law and are punishable. Therefore, hackers put their freedom in danger because security agencies are putting all possible measures to try and curb hacking activities.
Delegate your assignment to our experts and they will do the rest.
References
Davis, J. (2017). 10 Biggest Weaknesses and Lessons Learned from Cybersecurity in 2016, Retrieved from https://www.healthcareitnews.com/news/10-biggest-weaknesses-and-lessons-learned-cybersecurity-2016
Madarie, R. (2017). Hackers’ Motivations: Testing Schwartz’s Theory of Motivational Types of Values in a Sample of Hackers, vol. 11(1): 78–97. DOI: 10.5281/zenodo.495773
Taylor, R., Caeti, T., Loper, D., & Fritsch, E. (2014). Digital Crime and Digital Terrorism, Retrieved from https://mail.google.com/mail/u/0/#inbox/FMfcgxwLsmdvccLWpGDPHSLBKlngvdfq?projector=1&messagePartId=0.1