Skip to end of metadata
Go to start of metadata


Hacking

          See Also: Hackers In Taiwan Compromised 50 Million Personal, Government And Firms Records

Computer hacking subculture is often referred to as the network hacker subculture or simply the computer underground.

The issue of hacking has been a constant obstacle to the spreading the usage of ICT in our daily lives. While we read about new virus attacks and threats everyday, the presence of the common viruses is not as shocking as knowing millions of personal and government data can be stolen by hackers.

While encryption and protection technologies have greatly improved over the past decades, hackers are still able to work their way around or even through these defense systems. Taiwan's recent failure in protecting their data reveals many crucial aspect when using ICT as a communication medium. Firstly, a poorly protected system is a time bomb waiting to explode. Sooner or later it will crumble under the attack of even a novice hacker if its not well protected. Also, this case study highlights the amount of security and privacy breach that can happen under a coordinated hacking and data mining effort.

In a society where personal information is highly valued, these hackers are the modern thieves that we have to deal with. Appropriate government actions must be taken to twart these hacking efforts.

Frauds and Scams

          See Also: Taiwan computer engineer loses millions on Internet dating

The term "Internet fraud" generally refers to any type of fraud scheme that uses one or more online services - such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.

Before the digital era, we have often heard of stories of the "magical healing stones" and "get rich quick" scams. The proliferation of ICT has made the spread of such scams and hoaxes even easier. Despite its different form, the underlying principles are similar. These scams usually prey on people who are greedy or fearful and easily trusting.

In this case study of the Taiwan computer engineer, it is also evident that anyone can fall prey to such scams regardless of their ICT background. Common sense should be applied when dealing with such frauds and scams.

Piracy

          See Also: Net piracy is killing local music industry

Intellectual property was presented with a new threat when ICT became popular. The ease of communications and transfer of information has brought piracy to an almost uncontrollable level.

In the past, pirates had to relay on selling copyrighted softwares on a physical medium in order to profit from it. Nowadays, these pirates have been put out of job. While there is still demand for softwares and entertainment media on DVDs or VCDs, broadband and unlimited bandwidth of internet connections made it so much more convenient to obtain these from the internet and file sharing websites.

In a way, modern day piracy has managed to eliminate some of the pirates of the previous generation. In addition, it has allowed many to hhave access to softwares which they may otherwise not be able to afford.

Despite these perceived benefits of piracy, we cannot deny the fact that distributing and using pirated softwares are both illegal and unethical.

Back to Taiwan ICT: Abuses of ICT


Back to News Library

Back to Taiwan ICT page