Postdigital Anthropology: Hacks, Hackers, and the Human Condition
In: Postdigital science and education, Band 1, Heft 2, S. 525-550
ISSN: 2524-4868
4571 Ergebnisse
Sortierung:
In: Postdigital science and education, Band 1, Heft 2, S. 525-550
ISSN: 2524-4868
In: The journal of popular culture: the official publication of the Popular Culture Association, Band 45, Heft 1, S. 133-152
ISSN: 1540-5931
In: Tanczer, L. (2017). The Terrorist – Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists. In M. Conway, L. Jarvis, O. Lehane, S. Macdonald & L. Nouri (Eds.), Terrorists' Use of the Internet. (pp. 77-92). Amsterdam: IOS Press.
SSRN
In: Theory, culture & society: explorations in critical social science, Band 23, Heft 2-3, S. 320-322
ISSN: 1460-3616
Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous's Fawkes mask to William Tyndale's Bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the "effluorescence of intellectual piracy" in our current moment of political and technological revolutions "cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before….We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.
Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous's Fawkes mask to William Tyndale's Bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the "effluorescence of intellectual piracy" in our current moment of political and technological revolutions "cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before….We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.
BASE
Demonized by governments and the media as criminals, glorified within their own subculture as outlaws, hackers have played a major role in the short history of computers and digital culture-and have continually defied our assumptions about technology and secrecy through both legal and illicit means. In Hacker Culture, Douglas Thomas provides an in-depth history of this important and fascinating subculture, contrasting mainstream images of hackers with a detailed firsthand account of the computer underground. Addressing such issues as the commodification of the hacker ethos by Silicon Valley entrepreneurs, the high-profile arrests of prominent hackers, and conflicting self-images among hackers themselves, Thomas finds that popular hacker stereotypes reflect the public's anxieties about the information age far more than they do the reality of hacking.
In: Schriftenreihe der Peter-Hacks-Gesellschaft
In: The Yale review, Band 100, Heft 4, S. 72-72
ISSN: 1467-9736
We correct here also many details of this literature that has purged the history of modifiers from any political meanings or motivations. We remind of the wider history of systems modifiers.
BASE
In: The information society series
In: Dissent: a quarterly of politics and culture, Band 62, Heft 3, S. 18-22
ISSN: 1946-0910
Different forms of geoengineering have been proposed: spraying sulfates into the upper atmosphere to block a portion of sunlight, fertilizing the ocean with iron to spark carbon-gobbling algal blooms, or covering sea ice with bags of silicon beads to slow its melting. The idea is controversial, to say the least, but, as a new report shows, geoengineering is edging away from the margins and toward the center of discussions about climate change. The polarized debate surrounding geoengineering exemplifies the difficulties of talking about, much less solving, the problem of climate change, an issue where ethical, scientific, and political questions overlap, blend together, and sometimes obscure one another.
In: The world today, Band 71, Heft 1, S. 5
ISSN: 0043-9134