Skip to main content Accessibility help
×
Hostname: page-component-84b7d79bbc-2l2gl Total loading time: 0 Render date: 2024-07-26T02:27:03.124Z Has data issue: false hasContentIssue false

6 - Looking Back, Moving Forward

Published online by Cambridge University Press:  18 January 2024

Ross W. Bellaby
Affiliation:
University of Sheffield
Get access

Summary

Introduction

As outlined in the Introduction, it is not the aim of the ethical framework to inadvertently open the door to all private forms of political violence, nor is it to justify all hacking; the purpose is to highlight the space for hackers to operate as legitimate actors and to guide hacker activity by detailing what actions are justified toward what end. Following the detailing of the ethical framework in Chapters 1 and 2, and the application in Chapters 3, 4 and 5, there are two further tasks. One is to establish some critical mechanisms – both theoretical and practical – to stop abuse and to aid hackers in reaching ethically justified decisions. The second is to widen the perspective to examine what implications this work has on how society should respond and reconceptualize political hacking. This includes a reflection on how existing legal and social frameworks are reacting to political hacking most broadly in order to highlight how they can better reflect the central argument for an (un)ethical hacker, a reconceptualization of ‘security’, and the argument for a more open and engaged set of state actors.

Limiting the abuse

Right intention

One of the key challenges with an ethical framework like the one outlined in this book is the potential for abuse. This can include using the ethical framework to justify one's actions by meeting the criteria superficially in a check-list approach, resulting in unjustified harm or personal gain masquerading as an ethical benefit. Such abuse is an established challenge for all ethical frameworks, especially those that argue for the justification of defensive harm or are seen to work in a ‘box-ticking’ manner. In limiting this potential for abuse it is essential to stress and reflect on both the theoretical underpinning of the ethical framework itself in order to avoid abuse through superficial engagement, as well as some of the practical mechanisms that can be entrenched to aid in a fuller and correct critical reflection and engagement with the theoretical principles. As Candice Delmas argues, such reflective constraints are necessary and useful as they help distinguish between ‘the Ku Klux Klan's vigilante terrorism and self-defence … of the Deacons Defence … or between British feminist street artist Bambi's politically conscious graffiti and swastika vandalism’ (Delmas, 2018b: 48).

Type
Chapter
Information
The Ethics of Hacking , pp. 107 - 122
Publisher: Bristol University Press
Print publication year: 2023

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×