EXAMPLES: Since calling someone a 'hacker' was originally meant as a compliment, computer security professionals prefer to use the term '<cracker>' or 'intruder' for those hackers who turn to the dark side of hacking.
For example, it is the physical integrity of a person that is a stake, if a <'black hat' hacker> – a hacker moved by malicious intent–aims to access the software in a pacemaker in order to disrupt it and kill or harm the person who has it (Newman 2017).