Ethical hacking:
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency mov...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Ottawa]
University of Ottawa Press
2019
|
Schlagworte: | |
Online-Zugang: | 10393/39080 Volltext Volltext |
Zusammenfassung: | How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause-political or otherwise-which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. |
Beschreibung: | 1 Online-Ressource (circa 370 Seiten) Illustrationen |
ISBN: | 9780776627922 9780776627939 9780776627946 |
DOI: | 10.1515/9780776627922 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049414608 | ||
003 | DE-604 | ||
005 | 20240117 | ||
007 | cr|uuu---uuuuu | ||
008 | 231116s2019 xxc|||| o||u| ||||||eng d | ||
020 | |a 9780776627922 |c Online, PDF |9 978-0-7766-2792-2 | ||
020 | |a 9780776627939 |c Online, EPUB |9 9780776627939 | ||
020 | |a 9780776627946 |c Online, MOBI |9 9780776627946 | ||
024 | 7 | |a 10.1515/9780776627922 |2 doi | |
035 | |a (OCoLC)1410704284 | ||
035 | |a (DE-599)KXP1672413591 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxc |c XD-CA | ||
049 | |a DE-B1533 |a DE-M100 |a DE-12 |a DE-634 |a DE-210 |a DE-1052 |a DE-521 |a DE-1102 |a DE-1046 |a DE-1047 |a DE-1028 |a DE-Aug4 |a DE-573 |a DE-M347 |a DE-92 |a DE-1051 |a DE-898 |a DE-859 |a DE-860 |a DE-863 |a DE-862 |a DE-523 |a DE-Re13 |a DE-70 |a DE-2174 |a DE-127 |a DE-155 |a DE-150 |a DE-154 |a DE-91 |a DE-384 |a DE-473 |a DE-19 |a DE-355 |a DE-703 |a DE-20 |a DE-706 |a DE-824 |a DE-29 |a DE-739 | ||
082 | 0 | |a 364.16/8 | |
084 | |a 86.85 |2 bkl | ||
084 | |a 86.02 |2 bkl | ||
084 | |a 86.59 |2 bkl | ||
084 | |a 86.45 |2 bkl | ||
100 | 1 | |a Maurushat, Alana |e Verfasser |0 (DE-588)1034270052 |4 aut | |
245 | 1 | 0 | |a Ethical hacking |c Alana Maurushat |
264 | 1 | |a [Ottawa] |b University of Ottawa Press |c 2019 | |
300 | |a 1 Online-Ressource (circa 370 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause-political or otherwise-which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. | |
650 | 0 | 7 | |a Grundrecht |0 (DE-588)4022344-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechtsethik |0 (DE-588)4177216-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Aktivist |0 (DE-588)4434804-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Menschenrecht |0 (DE-588)4074725-6 |2 gnd |9 rswk-swf |
653 | 0 | |a Datensicherheit / (DE-627)091354447 / (DE-2867)15605-5 | |
653 | 0 | |a Ethik / (DE-627)091358191 / (DE-2867)16709-2 | |
653 | 0 | |a Grundrecht / (DE-627)091364590 / (DE-2867)15998-2 | |
653 | 0 | |a Meinungsfreiheit / (DE-627)091377250 / (DE-2867)13662-3 | |
653 | 0 | |a Whistleblowing / (DE-627)519758153 / (DE-2867)27615-0 | |
653 | 6 | |a Fallstudie | |
689 | 0 | 0 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 1 | |a Aktivist |0 (DE-588)4434804-6 |D s |
689 | 0 | 2 | |a Grundrecht |0 (DE-588)4022344-9 |D s |
689 | 0 | 3 | |a Menschenrecht |0 (DE-588)4074725-6 |D s |
689 | 0 | 4 | |a Rechtsethik |0 (DE-588)4177216-7 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780776627915 |
856 | |u 10393/39080 | ||
856 | 4 | 0 | |u http://hdl.handle.net/10393/39080 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://doi.org/10.1515/9780776627922 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-23-DGG |a ZDB-23-GOA | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034741602 |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1057987 |
---|---|
_version_ | 1806528580719476736 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Maurushat, Alana |
author_GND | (DE-588)1034270052 |
author_facet | Maurushat, Alana |
author_role | aut |
author_sort | Maurushat, Alana |
author_variant | a m am |
building | Verbundindex |
bvnumber | BV049414608 |
collection | ZDB-23-DGG ZDB-23-GOA |
ctrlnum | (OCoLC)1410704284 (DE-599)KXP1672413591 |
dewey-full | 364.16/8 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 364 - Criminology |
dewey-raw | 364.16/8 |
dewey-search | 364.16/8 |
dewey-sort | 3364.16 18 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Rechtswissenschaft |
discipline_str_mv | Rechtswissenschaft |
doi_str_mv | 10.1515/9780776627922 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV049414608</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240117</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231116s2019 xxc|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780776627922</subfield><subfield code="c">Online, PDF</subfield><subfield code="9">978-0-7766-2792-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780776627939</subfield><subfield code="c">Online, EPUB</subfield><subfield code="9">9780776627939</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780776627946</subfield><subfield code="c">Online, MOBI</subfield><subfield code="9">9780776627946</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9780776627922</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1410704284</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1672413591</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxc</subfield><subfield code="c">XD-CA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-B1533</subfield><subfield code="a">DE-M100</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-210</subfield><subfield code="a">DE-1052</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-1102</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-Re13</subfield><subfield code="a">DE-70</subfield><subfield code="a">DE-2174</subfield><subfield code="a">DE-127</subfield><subfield code="a">DE-155</subfield><subfield code="a">DE-150</subfield><subfield code="a">DE-154</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">364.16/8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.85</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.02</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.59</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">86.45</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maurushat, Alana</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1034270052</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="c">Alana Maurushat</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Ottawa]</subfield><subfield code="b">University of Ottawa Press</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (circa 370 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto "we open governments" on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause-political or otherwise-which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Grundrecht</subfield><subfield code="0">(DE-588)4022344-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechtsethik</subfield><subfield code="0">(DE-588)4177216-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Aktivist</subfield><subfield code="0">(DE-588)4434804-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Menschenrecht</subfield><subfield code="0">(DE-588)4074725-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Datensicherheit / (DE-627)091354447 / (DE-2867)15605-5</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Ethik / (DE-627)091358191 / (DE-2867)16709-2</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Grundrecht / (DE-627)091364590 / (DE-2867)15998-2</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Meinungsfreiheit / (DE-627)091377250 / (DE-2867)13662-3</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Whistleblowing / (DE-627)519758153 / (DE-2867)27615-0</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Fallstudie</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Aktivist</subfield><subfield code="0">(DE-588)4434804-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Grundrecht</subfield><subfield code="0">(DE-588)4022344-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Menschenrecht</subfield><subfield code="0">(DE-588)4074725-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Rechtsethik</subfield><subfield code="0">(DE-588)4177216-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780776627915</subfield></datafield><datafield tag="856" ind1=" " ind2=" "><subfield code="u">10393/39080</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://hdl.handle.net/10393/39080</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9780776627922</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="a">ZDB-23-GOA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034741602</subfield></datafield></record></collection> |
id | DE-604.BV049414608 |
illustrated | Not Illustrated |
index_date | 2024-07-03T23:06:52Z |
indexdate | 2024-08-05T08:38:29Z |
institution | BVB |
isbn | 9780776627922 9780776627939 9780776627946 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034741602 |
oclc_num | 1410704284 |
open_access_boolean | 1 |
owner | DE-B1533 DE-M100 DE-12 DE-634 DE-210 DE-1052 DE-521 DE-1102 DE-1046 DE-1047 DE-1028 DE-Aug4 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-523 DE-Re13 DE-BY-UBR DE-70 DE-2174 DE-127 DE-155 DE-BY-UBR DE-150 DE-154 DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 |
owner_facet | DE-B1533 DE-M100 DE-12 DE-634 DE-210 DE-1052 DE-521 DE-1102 DE-1046 DE-1047 DE-1028 DE-Aug4 DE-573 DE-M347 DE-92 DE-1051 DE-898 DE-BY-UBR DE-859 DE-860 DE-863 DE-BY-FWS DE-862 DE-BY-FWS DE-523 DE-Re13 DE-BY-UBR DE-70 DE-2174 DE-127 DE-155 DE-BY-UBR DE-150 DE-154 DE-91 DE-BY-TUM DE-384 DE-473 DE-BY-UBG DE-19 DE-BY-UBM DE-355 DE-BY-UBR DE-703 DE-20 DE-706 DE-824 DE-29 DE-739 |
physical | 1 Online-Ressource (circa 370 Seiten) Illustrationen |
psigel | ZDB-23-DGG ZDB-23-GOA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | University of Ottawa Press |
record_format | marc |
spellingShingle | Maurushat, Alana Ethical hacking Grundrecht (DE-588)4022344-9 gnd Rechtsethik (DE-588)4177216-7 gnd Aktivist (DE-588)4434804-6 gnd Hacker (DE-588)4113821-1 gnd Menschenrecht (DE-588)4074725-6 gnd |
subject_GND | (DE-588)4022344-9 (DE-588)4177216-7 (DE-588)4434804-6 (DE-588)4113821-1 (DE-588)4074725-6 |
title | Ethical hacking |
title_auth | Ethical hacking |
title_exact_search | Ethical hacking |
title_exact_search_txtP | Ethical hacking |
title_full | Ethical hacking Alana Maurushat |
title_fullStr | Ethical hacking Alana Maurushat |
title_full_unstemmed | Ethical hacking Alana Maurushat |
title_short | Ethical hacking |
title_sort | ethical hacking |
topic | Grundrecht (DE-588)4022344-9 gnd Rechtsethik (DE-588)4177216-7 gnd Aktivist (DE-588)4434804-6 gnd Hacker (DE-588)4113821-1 gnd Menschenrecht (DE-588)4074725-6 gnd |
topic_facet | Grundrecht Rechtsethik Aktivist Hacker Menschenrecht |
url | 10393/39080 http://hdl.handle.net/10393/39080 https://doi.org/10.1515/9780776627922 |
work_keys_str_mv | AT maurushatalana ethicalhacking |