Jurisprudential analysis of hacking information systems
One of the important topics in the field of information technology is hacking information systems, i.e. finding the security vulnerabilities of a system to infiltrate and access its information, which can be done with different motives and can follow desirable or undesirable consequences at both individual and public levels and in different fields. This is why hackers are classified into different types, such as white hats, gray hats, and black hats. The purpose of this descriptive-analytic research is to investigate the legitimacy of hacking in Islamic jurisprudence. The findings of the present study show that hacking does not have the same jurisprudential results and varies based on the intentions and actions of the hackers. White hat hackers are legitimate, but black hat hackers are illegitimate. The most important component in analyzing the legitimacy of a hack is "more expediency" and the most important factor in its illegality is "unauthorized violation of the rights of others". Hence, if for the most important expediency, there is no other way but to hack information systems, action is not forbidden.
- حق عضویت دریافتی صرف حمایت از نشریات عضو و نگهداری، تکمیل و توسعه مگیران میشود.
- پرداخت حق اشتراک و دانلود مقالات اجازه بازنشر آن در سایر رسانههای چاپی و دیجیتال را به کاربر نمیدهد.