Justification of computer hacking study