The Ethics of Hacking:
Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Bristol
Bristol University Press
[2023]
|
Schlagworte: | |
Online-Zugang: | DE-12 DE-1043 DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-739 Volltext |
Zusammenfassung: | Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and privacy - are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments' announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity |
Beschreibung: | Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023) |
Beschreibung: | 1 Online-Ressource (176 Seiten) |
ISBN: | 9781529231847 |
DOI: | 10.56687/9781529231847 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV048929925 | ||
003 | DE-604 | ||
005 | 20240605 | ||
007 | cr|uuu---uuuuu | ||
008 | 230505s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781529231847 |9 978-1-5292-3184-7 | ||
024 | 7 | |a 10.56687/9781529231847 |2 doi | |
035 | |a (ZDB-23-DGG)9781529231847 | ||
035 | |a (OCoLC)1378496070 | ||
035 | |a (DE-599)BVBBV048929925 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1043 |a DE-1046 |a DE-858 |a DE-Aug4 |a DE-859 |a DE-860 |a DE-739 |a DE-12 | ||
082 | 0 | |a 174/.900587 |2 23 | |
100 | 1 | |a Bellaby, Ross |d 1984- |e Verfasser |0 (DE-588)1051601819 |4 aut | |
245 | 1 | 0 | |a The Ethics of Hacking |c Ross W. Bellaby |
264 | 1 | |a Bristol |b Bristol University Press |c [2023] | |
264 | 4 | |c © 2023 | |
300 | |a 1 Online-Ressource (176 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023) | ||
520 | |a Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and privacy - are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments' announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity | ||
546 | |a In English | ||
650 | 7 | |a POLITICAL SCIENCE / Privacy & Surveillance (see also SOCIAL SCIENCE / Privacy & Surveillance) |2 bisacsh | |
650 | 4 | |a Hacking |x Moral and ethical aspects | |
650 | 4 | |a Hacking |x Political aspects | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781529231823 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-5292-3181-6 |
856 | 4 | 0 | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-23-DGG | ||
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-12 |p ZDB-23-DGG |q BSB_PDA_DGG_Kauf23 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-1043 |p ZDB-23-DGG |q FAB_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-1046 |p ZDB-23-DGG |q FAW_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-858 |p ZDB-23-DGG |q FCO_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-Aug4 |p ZDB-23-DGG |q FHA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-859 |p ZDB-23-DGG |q FKE_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-860 |p ZDB-23-DGG |q FLA_PDA_DGG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.56687/9781529231847?locatt=mode:legacy |l DE-739 |p ZDB-23-DGG |q UPA_PDA_DGG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805075858689359872 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bellaby, Ross 1984- |
author_GND | (DE-588)1051601819 |
author_facet | Bellaby, Ross 1984- |
author_role | aut |
author_sort | Bellaby, Ross 1984- |
author_variant | r b rb |
building | Verbundindex |
bvnumber | BV048929925 |
collection | ZDB-23-DGG |
ctrlnum | (ZDB-23-DGG)9781529231847 (OCoLC)1378496070 (DE-599)BVBBV048929925 |
dewey-full | 174/.900587 |
dewey-hundreds | 100 - Philosophy & psychology |
dewey-ones | 174 - Occupational ethics |
dewey-raw | 174/.900587 |
dewey-search | 174/.900587 |
dewey-sort | 3174 6900587 |
dewey-tens | 170 - Ethics (Moral philosophy) |
discipline | Philosophie |
discipline_str_mv | Philosophie |
doi_str_mv | 10.56687/9781529231847 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000zc 4500</leader><controlfield tag="001">BV048929925</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240605</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230505s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781529231847</subfield><subfield code="9">978-1-5292-3184-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.56687/9781529231847</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-23-DGG)9781529231847</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1378496070</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048929925</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">174/.900587</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bellaby, Ross</subfield><subfield code="d">1984-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1051601819</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Ethics of Hacking</subfield><subfield code="c">Ross W. Bellaby</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bristol</subfield><subfield code="b">Bristol University Press</subfield><subfield code="c">[2023]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (176 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and privacy - are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments' announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Privacy & Surveillance (see also SOCIAL SCIENCE / Privacy & Surveillance)</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="x">Moral and ethical aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781529231823</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-5292-3181-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-12</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">BSB_PDA_DGG_Kauf23</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAB_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FAW_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-858</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FCO_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FHA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FKE_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">FLA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.56687/9781529231847?locatt=mode:legacy</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-23-DGG</subfield><subfield code="q">UPA_PDA_DGG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048929925 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:56:59Z |
indexdate | 2024-07-20T05:48:05Z |
institution | BVB |
isbn | 9781529231847 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034193891 |
oclc_num | 1378496070 |
open_access_boolean | |
owner | DE-1043 DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-739 DE-12 |
owner_facet | DE-1043 DE-1046 DE-858 DE-Aug4 DE-859 DE-860 DE-739 DE-12 |
physical | 1 Online-Ressource (176 Seiten) |
psigel | ZDB-23-DGG ZDB-23-DGG BSB_PDA_DGG_Kauf23 ZDB-23-DGG FAB_PDA_DGG ZDB-23-DGG FAW_PDA_DGG ZDB-23-DGG FCO_PDA_DGG ZDB-23-DGG FHA_PDA_DGG ZDB-23-DGG FKE_PDA_DGG ZDB-23-DGG FLA_PDA_DGG ZDB-23-DGG UPA_PDA_DGG |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Bristol University Press |
record_format | marc |
spelling | Bellaby, Ross 1984- Verfasser (DE-588)1051601819 aut The Ethics of Hacking Ross W. Bellaby Bristol Bristol University Press [2023] © 2023 1 Online-Ressource (176 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mai 2023) Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and privacy - are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments' announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity In English POLITICAL SCIENCE / Privacy & Surveillance (see also SOCIAL SCIENCE / Privacy & Surveillance) bisacsh Hacking Moral and ethical aspects Hacking Political aspects Erscheint auch als Druck-Ausgabe 9781529231823 Erscheint auch als Druck-Ausgabe 978-1-5292-3181-6 https://doi.org/10.56687/9781529231847?locatt=mode:legacy Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Bellaby, Ross 1984- The Ethics of Hacking POLITICAL SCIENCE / Privacy & Surveillance (see also SOCIAL SCIENCE / Privacy & Surveillance) bisacsh Hacking Moral and ethical aspects Hacking Political aspects |
title | The Ethics of Hacking |
title_auth | The Ethics of Hacking |
title_exact_search | The Ethics of Hacking |
title_exact_search_txtP | The Ethics of Hacking |
title_full | The Ethics of Hacking Ross W. Bellaby |
title_fullStr | The Ethics of Hacking Ross W. Bellaby |
title_full_unstemmed | The Ethics of Hacking Ross W. Bellaby |
title_short | The Ethics of Hacking |
title_sort | the ethics of hacking |
topic | POLITICAL SCIENCE / Privacy & Surveillance (see also SOCIAL SCIENCE / Privacy & Surveillance) bisacsh Hacking Moral and ethical aspects Hacking Political aspects |
topic_facet | POLITICAL SCIENCE / Privacy & Surveillance (see also SOCIAL SCIENCE / Privacy & Surveillance) Hacking Moral and ethical aspects Hacking Political aspects |
url | https://doi.org/10.56687/9781529231847?locatt=mode:legacy |
work_keys_str_mv | AT bellabyross theethicsofhacking |