Why hackers win: power and disruption in the network society
"When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of ho...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Oakland, California
University of California Press
[2019]
|
Schlagworte: | |
Online-Zugang: | BSB01 Volltext Inhaltsverzeichnis |
Zusammenfassung: | "When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the 'trusted systems' underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking."-- |
Beschreibung: | 1 Online-Ressource (xix, 197 Seiten) |
ISBN: | 9780520971653 |
DOI: | 10.1525/9780520971653 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047517089 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 211018s2019 xxu|||| o||u| ||||||eng d | ||
020 | |a 9780520971653 |c Online, PDF |9 978-0-520-97165-3 | ||
035 | |a (ZDB-23-SEW)9780520971653 | ||
035 | |a (OCoLC)1284798969 | ||
035 | |a (DE-599)BVBBV047517089 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-12 | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 364.16/8 | |
082 | 0 | |a 300 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Burkart, Patrick |d 1969- |e Verfasser |0 (DE-588)143737325 |4 aut | |
245 | 1 | 0 | |a Why hackers win |b power and disruption in the network society |c Patrick Burkart and Tom McCourt |
264 | 1 | |a Oakland, California |b University of California Press |c [2019] | |
300 | |a 1 Online-Ressource (xix, 197 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a "When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the 'trusted systems' underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking."-- | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Politik |0 (DE-588)4046514-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
653 | 0 | |a Hackers | |
653 | 0 | |a Hacking / Political aspects | |
653 | 0 | |a Hackers | |
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Politik |0 (DE-588)4046514-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a McCourt, Tom |d 1958- |e Verfasser |0 (DE-588)1020592559 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Hardcover |z 978-0-520-30012-5 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-0-520-30013-2 |
856 | 4 | 0 | |u https://doi.org/10.1525/9780520971653 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m V:DE-576;B:DE-Frei85 |q application/pdf |u http://swbplus.bsz-bw.de/bsz1693630346inh.htm |v 20200717153115 |3 Inhaltsverzeichnis |
912 | |a ZDB-23-SEW | ||
940 | 1 | |q ZDB-23-SEW20 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032917830 | ||
966 | e | |u https://doi.org/10.1525/9780520971653 |l BSB01 |p ZDB-23-SEW |q BSB_SEW_UniversityCaliforniaPress |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182859737464832 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Burkart, Patrick 1969- McCourt, Tom 1958- |
author_GND | (DE-588)143737325 (DE-588)1020592559 |
author_facet | Burkart, Patrick 1969- McCourt, Tom 1958- |
author_role | aut aut |
author_sort | Burkart, Patrick 1969- |
author_variant | p b pb t m tm |
building | Verbundindex |
bvnumber | BV047517089 |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773 |
callnumber-search | HV6773 |
callnumber-sort | HV 46773 |
callnumber-subject | HV - Social Pathology, Criminology |
classification_rvk | ST 276 |
collection | ZDB-23-SEW |
ctrlnum | (ZDB-23-SEW)9780520971653 (OCoLC)1284798969 (DE-599)BVBBV047517089 |
dewey-full | 364.16/8 300 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology 300 - Social sciences |
dewey-raw | 364.16/8 300 |
dewey-search | 364.16/8 300 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations 300 - Social sciences |
discipline | Rechtswissenschaft Informatik Soziologie |
discipline_str_mv | Rechtswissenschaft Informatik Soziologie |
doi_str_mv | 10.1525/9780520971653 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03341nmm a2200553 c 4500</leader><controlfield tag="001">BV047517089</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211018s2019 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780520971653</subfield><subfield code="c">Online, PDF</subfield><subfield code="9">978-0-520-97165-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-SEW)9780520971653</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1284798969</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047517089</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HV6773</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">300</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Burkart, Patrick</subfield><subfield code="d">1969-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143737325</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Why hackers win</subfield><subfield code="b">power and disruption in the network society</subfield><subfield code="c">Patrick Burkart and Tom McCourt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oakland, California</subfield><subfield code="b">University of California Press</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 197 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the 'trusted systems' underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking."--</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Politik</subfield><subfield code="0">(DE-588)4046514-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hacking / Political aspects</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Politik</subfield><subfield code="0">(DE-588)4046514-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McCourt, Tom</subfield><subfield code="d">1958-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1020592559</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-520-30012-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-0-520-30013-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1525/9780520971653</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">V:DE-576;B:DE-Frei85</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://swbplus.bsz-bw.de/bsz1693630346inh.htm</subfield><subfield code="v">20200717153115</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-SEW</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-23-SEW20</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032917830</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1525/9780520971653</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-23-SEW</subfield><subfield code="q">BSB_SEW_UniversityCaliforniaPress</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047517089 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:23:27Z |
indexdate | 2024-07-10T09:14:15Z |
institution | BVB |
isbn | 9780520971653 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032917830 |
oclc_num | 1284798969 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | 1 Online-Ressource (xix, 197 Seiten) |
psigel | ZDB-23-SEW ZDB-23-SEW20 ZDB-23-SEW BSB_SEW_UniversityCaliforniaPress |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | University of California Press |
record_format | marc |
spelling | Burkart, Patrick 1969- Verfasser (DE-588)143737325 aut Why hackers win power and disruption in the network society Patrick Burkart and Tom McCourt Oakland, California University of California Press [2019] 1 Online-Ressource (xix, 197 Seiten) txt rdacontent c rdamedia cr rdacarrier "When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the 'trusted systems' underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking."-- Computersicherheit (DE-588)4274324-2 gnd rswk-swf Politik (DE-588)4046514-7 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Hackers Hacking / Political aspects Hacker (DE-588)4113821-1 s Computersicherheit (DE-588)4274324-2 s Politik (DE-588)4046514-7 s DE-604 McCourt, Tom 1958- Verfasser (DE-588)1020592559 aut Erscheint auch als Druck-Ausgabe, Hardcover 978-0-520-30012-5 Erscheint auch als Druck-Ausgabe, Paperback 978-0-520-30013-2 https://doi.org/10.1525/9780520971653 Verlag URL des Erstveröffentlichers Volltext V:DE-576;B:DE-Frei85 application/pdf http://swbplus.bsz-bw.de/bsz1693630346inh.htm 20200717153115 Inhaltsverzeichnis |
spellingShingle | Burkart, Patrick 1969- McCourt, Tom 1958- Why hackers win power and disruption in the network society Computersicherheit (DE-588)4274324-2 gnd Politik (DE-588)4046514-7 gnd Hacker (DE-588)4113821-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4046514-7 (DE-588)4113821-1 |
title | Why hackers win power and disruption in the network society |
title_auth | Why hackers win power and disruption in the network society |
title_exact_search | Why hackers win power and disruption in the network society |
title_exact_search_txtP | Why hackers win power and disruption in the network society |
title_full | Why hackers win power and disruption in the network society Patrick Burkart and Tom McCourt |
title_fullStr | Why hackers win power and disruption in the network society Patrick Burkart and Tom McCourt |
title_full_unstemmed | Why hackers win power and disruption in the network society Patrick Burkart and Tom McCourt |
title_short | Why hackers win |
title_sort | why hackers win power and disruption in the network society |
title_sub | power and disruption in the network society |
topic | Computersicherheit (DE-588)4274324-2 gnd Politik (DE-588)4046514-7 gnd Hacker (DE-588)4113821-1 gnd |
topic_facet | Computersicherheit Politik Hacker |
url | https://doi.org/10.1525/9780520971653 http://swbplus.bsz-bw.de/bsz1693630346inh.htm |
work_keys_str_mv | AT burkartpatrick whyhackerswinpoweranddisruptioninthenetworksociety AT mccourttom whyhackerswinpoweranddisruptioninthenetworksociety |