Hacker states / (Record no. 73645)

000 -LEADER
fixed length control field 03463nam a2200481 i 4500
001 - CONTROL NUMBER
control field 9072251
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220712204952.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 200505s2020 mau ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9780262357258
-- electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- electronic bk.
082 04 - CLASSIFICATION NUMBER
Call Number 364.16/8
100 1# - AUTHOR NAME
Author Follis, Luca,
245 10 - TITLE STATEMENT
Title Hacker states /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 PDF (264 pages).
490 1# - SERIES STATEMENT
Series statement Information Society Series
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Intro -- Contents -- Acknowledgments -- 1 Hacker States -- 2 Hacking the State Boundary -- 3 When to Hack -- 4 Prosecuting a Hacker -- 5 Hacking for Profit -- 6 High Breach Societies -- Notes -- References -- Index
520 ## - SUMMARY, ETC.
Summary, etc How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power. In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake "ethical hacking" for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel "boundary work" theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news and algorithmic opacity, they describe the political impact of leaks and hacks, partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Political aspects.
700 1# - AUTHOR 2
Author 2 Fish, Adam
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=9072251
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Cambridge :
-- The MIT Press,
-- [2020]
264 #2 -
-- [Piscataqay, New Jersey] :
-- IEEE Xplore,
-- [2020]
336 ## -
-- text
-- rdacontent
337 ## -
-- electronic
-- isbdmedia
338 ## -
-- online resource
-- rdacarrier
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Hacktivism.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cyberspace

No items available.