3,744 research outputs found

    Hacking in the university: contesting the valorisation of academic labour

    Get PDF
    In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers were drawn to and in which they worked. I argue that hacking was originally a form of academic labour that emerged out of the intensification and valorisation of scientific research within the institutional context of the university. The reproduction of hacking as a form of academic labour took place over many decades as academics and their institutions shifted from an ideal of unproductive, communal science to a more productive, entrepreneurial approach to the production of knowledge. As such, I view hacking as a peculiar, historically situated form of labour that arose out of the contradictions of the academy: vocation vs. profession; teaching vs. research; basic vs. applied research; research vs. development; private vs. public; war vs. peace; institutional autonomy vs. state dependence; scientific communalism vs. intellectual property

    Cyberterrorism: the story so far

    Get PDF
    This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same. The contention here is not that cyberterrorism cannot happen or will not happen, but that, contrary to popular perception, it has not happened yet

    Spartan Daily, September 21, 2016

    Get PDF
    Volume 147, Issue 10https://scholarworks.sjsu.edu/spartan_daily_2016/1050/thumbnail.jp

    Startup communities: notes on the sociality of tech-entrepreneurs in Manchester

    Get PDF
    In this contribution I explore the conflicting moralities and practices of technology entrepreneurship through the lenses of Mary Douglas’ Grid-Group Cultural Theory. Starting from the distinction between communitarian, individualistic and hierarchical culture, I explore my empirical material drawn from ethnographic fieldwork in Manchester, UK. In particular, I describe the sociality of young male tech-entrepreneurs at networking events, ‘coffices’ and coworkspaces around an urban ‘creative quarter’. I argue that ‘startup communities’ simultaneously encourage individualistic market-competition, contribute to feelings of local group-belonging and are narrative constructions promoted by entrepreneurs, corporations and the State.Universidad de Sevill

    Planning for the Future of Cyber Attack Attribution : Hearing Before the H. Subcomm. on Technology and Innovation of the H. Comm. on Science and Technology, 111th Cong., July 15, 2010 (Statement by Adjunct Professor Marc Rotenberg, Geo. U. L. Center)

    Get PDF
    Steve Bellovin, another security expert, noted recently that one of risks of the new White House plan for cyber security is that it places too much emphasis on attribution. As Dr. Bellovin explains: The fundamental premise of the proposed strategy is that our serious Internet security problems are due to lack of sufficient authentication. That is demonstrably false. The biggest problem was and is buggy code. All the authentication in the world won\u27t stop a bad guy who goes around the authentication system, either by finding bugs exploitable before authentication is performed, finding bugs in the authentication system itself, or by hijacking your system and abusing the authenticated connection set up by the legitimate user. While I believe the White House, the Cyber Security Advisor, and the various participants in the drafting process have made an important effort to address privacy and security interests, I share Professor Bellovin’s concern that too much emphasis has been placed on promoting identification. I also believe that online identification, promoted by government, will be used for purposes unrelated to cyber security and could ultimately chill political speech and limit the growth of the Internet. Greater public participation in the development of this policy as well as a formal rulemaking on the White House proposal could help address these concerns

    Cyberterrorism: hype and reality

    Get PDF

    The Science of Startups: The Impact of Founder Personalities on Company Success

    Full text link
    Startup companies solve many of today's most complex and challenging scientific, technical and social problems, such as the decarbonisation of the economy, air pollution, and the development of novel life-saving vaccines. Startups are a vital source of social, scientific and economic innovation, yet the most innovative are also the least likely to survive. The probability of success of startups has been shown to relate to several firm-level factors such as industry, location and the economy of the day. Still, attention has increasingly considered internal factors relating to the firm's founding team, including their previous experiences and failures, their centrality in a global network of other founders and investors as well as the team's size. The effects of founders' personalities on the success of new ventures are mainly unknown. Here we show that founder personality traits are a significant feature of a firm's ultimate success. We draw upon detailed data about the success of a large-scale global sample of startups. We found that the Big 5 personality traits of startup founders across 30 dimensions significantly differed from that of the population at large. Key personality facets that distinguish successful entrepreneurs include a preference for variety, novelty and starting new things (openness to adventure), like being the centre of attention (lower levels of modesty) and being exuberant (higher activity levels). However, we do not find one "Founder-type" personality; instead, six different personality types appear, with startups founded by a "Hipster, Hacker and Hustler" being twice as likely to succeed. Our results also demonstrate the benefits of larger, personality-diverse teams in startups, which has the potential to be extended through further research into other team settings within business, government and research

    Network of Tinkerers: A Model of Open-Source Technology Innovation

    Get PDF
    Airplanes were invented by hobbyists and experimenters, and some personal computers were as well. Similarly, many open-source software developers are interested in the software they make, and not focused on profit. Based on these cases, this paper has a model of agents called tinkerers who want to improve a technology for their own reasons, by their own criteria, and who see no way to profit from it. Under these conditions, they would rather share their technology than work alone. The members of the agreement form an information network. The network's members optimally specialize based on their opportunities in particular aspects of the technology or in expanding or managing the network. Endogenously there are incentives to standardize on designs and descriptions of the technology. A tinkerer in the network who sees an opportunity to produce a profitable product may exit the network to create a startup firm and conduct focused research and development. Thus a new industry can arise.Technological Change, Open Source Software, Uncertainty, Innovation, Invention, Collective Invention, Hackers, Hobbyists, Experimenters, Airplane
    • 

    corecore