MARC보기
LDR03281cmm u2200493Ki 4500
001000000321299
003OCoLC
00520230613110515
006m d
007cr cnu|||unuuu
008191211s2020 mau o 000 0 eng d
020 ▼a 9780262357258 ▼q (electronic bk.)
020 ▼a 0262357259 ▼q (electronic bk.)
020 ▼z 9780262043601
035 ▼a 2392673 ▼b (N$T)
035 ▼a (OCoLC)1130310518
037 ▼a 11844 ▼b MIT Press
037 ▼a 9780262357258 ▼b MIT Press
040 ▼a MITPR ▼b eng ▼e rda ▼e pn ▼c MITPR ▼d OCLCF ▼d YDX ▼d N$T ▼d 248032
049 ▼a MAIN
050 4 ▼a HV6773 ▼b .F65 2020eb
08204 ▼a 364.16/8 ▼2 23
1001 ▼a Follis, Luca, ▼e author.
24510 ▼a Hacker states / ▼c Luca Follis, Adam Fish. ▼h [electronic resource]
260 ▼a Cambridge : ▼b The MIT Press, ▼c [2020]
300 ▼a 1 online resource (264 pages).
336 ▼a text ▼b txt ▼2 rdacontent
337 ▼a computer ▼b c ▼2 rdamedia
338 ▼a online resource ▼b cr ▼2 rdacarrier
4901 ▼a Information Society Series
520 ▼a How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake "ethical hacking" for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel "boundary work" theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news and algorithmic opacity, they describe the political impact of leaks and hacks, partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.
5880 ▼a Title details screen.
590 ▼a Added to collection customer.56279.3
650 0 ▼a Hacktivism.
650 0 ▼a Cyberspace ▼x Political aspects.
650 7 ▼a Cyberspace ▼x Political aspects. ▼2 fast ▼0 (OCoLC)fst00885798
650 7 ▼a Hacktivism. ▼2 fast ▼0 (OCoLC)fst01763882
655 4 ▼a Electronic books.
7001 ▼a Fish, Adam, ▼c (Senior lecturer in Sociology), ▼e author.
830 0 ▼a Information society series.
85640 ▼3 EBSCOhost ▼u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2392673
938 ▼a YBP Library Services ▼b YANK ▼n 301156751
938 ▼a EBSCOhost ▼b EBSC ▼n 2392673
990 ▼a 관리자
994 ▼a 92 ▼b N$T