3,629 research outputs found

    University Hackathons: Managerialism, Gamification, and the Foreclosure of Creativity

    Get PDF
    This research presents a generative critique of hackathon events held in the contemporary research university. Through the analysis of cultural imaginaries and embedded techno-political forms, it works toward an assessment of whether these events support, foreclose, or redirect ideas of the future that might otherwise challenge technocratic, accumulatory, and/or hierarchal organization. Informed by institutional histories and firsthand field research at events, dynamics of entrepreneurialism, gamification, and techno-solutionism are extrapolated and problematized. Ultimately, this research draws on a historical materialist approach to understanding how and why hackathon events have flourished in the university setting. Corroborating recent theories of platform capitalism, vectoralism, and the “hacker class,” this research uses critical genealogy and ethnography to problematize events and caution against the coercive filtering and funneling of creative energies at the hands of capitalist pressures

    Spartan Daily, April 22, 1993

    Get PDF
    Volume 100, Issue 52https://scholarworks.sjsu.edu/spartandaily/8410/thumbnail.jp

    Spartan Daily, April 22, 1993

    Get PDF
    Volume 100, Issue 52https://scholarworks.sjsu.edu/spartandaily/8410/thumbnail.jp

    The Internet of Things Connectivity Binge: What are the Implications?

    Get PDF
    Despite wide concern about cyberattacks, outages and privacy violations, most experts believe the Internet of Things will continue to expand successfully the next few years, tying machines to machines and linking people to valuable resources, services and opportunities

    The Terrorist - Hacker/Hacktivist Distinction: An Investigation of Self-Identified Hackers and Hacktivists

    Get PDF
    The academic literature on terrorism is filled with references to online activities, and the equation of hacking and hacktivism (i.e., politically motivated hacking) with cyberterrorism. This perspective ignores differences in capacities, scope, and motives. Besides, scholarly research is lacking examinations of those perceived as alleged ‘security threats’. This chapter therefore uses interviews with self-identified hackers and hacktivists (N = 35) to address this gap. It examines the distinction between hacking, hacktivism, and cyberterrorism, and studies the discourses and practices of hackers and hacktivists. Building upon the theoretical concept of (in)securitisation and the method of thematic analysis, the findings provide insights into (a) perceptions of hackers and hacktivists by external actors and their (b) self-assessment that stands in contrast to the viewpoints expressed earlier. The results highlight interviewees' objections to the translation of hacking and hacktivism into violent acts of any nature, with participants articulating that the connection of these concepts poses threats to civil liberties and political rights online. The chapter therefore has implications both for academic as well as professional discourse. It seeks to foster a more reflected engagement with these concepts and points to the need for concrete terminological delineations

    Cyber Ethics 4.0 : Serving Humanity with Values

    Get PDF
    Cyber space influences all sectors of life and society: Artificial Intelligence, Robots, Blockchain, Self-Driving Cars and Autonomous Weapons, Cyberbullying, telemedicine and cyber health, new methods in food production, destruction and conservation of the environment, Big Data as a new religion, the role of education and citizens’ rights, the need for legal regulations and international conventions. The 25 articles in this book cover the wide range of hot topics. Authors from many countries and positions of international (UN) organisations look for solutions from an ethical perspective. Cyber Ethics aims to provide orientation on what is right and wrong, good and bad, related to the cyber space. The authors apply and modify fundamental values and virtues to specific, new challenges arising from cyber technology and cyber society. The book serves as reading material for teachers, students, policy makers, politicians, businesses, hospitals, NGOs and religious organisations alike. It is an invitation for dialogue, debate and solution

    Hackers: a case-study of the social shaping of computing

    Get PDF
    The study is an examination of hacking, placing the act in the context of theories of technological change. The account of hacking is used to substantiate those theories that emphasise the societal shaping of technology over the notion of technological determinism. The evolution of hacking is traced, showing how it reflects changing trends in the nature of information: the most vivid of these is the conceptualisation of information known as 'cyberspace'. Instead of simply cataloguing the impact of technical changes within computing, and the effects they have had upon information, the study shows how technical change takes place in a process of negotiation and conflict between groups.The two main groups analysed are those of the Computer Underground (CU) and the Computer Security Industry (CSI). The experiences and views of both groups are recounted in what constitute internalist and externalist accounts of hacking and its significance. The internalist account is the evidence provided by hackers themselves. It addresses such issues as what motivates the act of hacking; whether there is an identifiable hacking culture; and why it is almost an exclusively male activity. The externalist account contains the perceptions of hacking held by those outside the activity.The state of computing's security measures and its vulnerability to hacking is described, and evidence is provided of the extent to which hacking gives rise to technical knowledge that could be of potential use in the fixing of security weaknesses. The division within the CSI between those broadly cooperative with hackers and those largely hostile to them is examined, and the reasons why hacking knowledge is not generally utilised are explored. Hackers are prevented from gaining legitimacy within computing in a process referred to as 'closure'. Examples include hackers being stigmatised through the use of analogies that compare their computing activities to conventional crimes such as burglary and tresspass.Stigmatisation is carried out by the CSI who use it in a process of professional boundary formation to distinguish themselves from hackers. It is also used by other authority figures such as Members of Parliament whose involvement in the process of closure takes the form of the anti-hacking legislation they have passed, an analysis of which concludes this study

    Law Enforcements’ Perceptions and Preparedness to Address Child Exploitation Via Hacking

    Get PDF
    Throughout recorded history, children have been subjected to sexual exploitation. Child predators and pedophiles often take great risk and go to extreme lengths to sexually exploit a child. With technological advancements many individuals became globalized and connected with the invention of the computer, the internet and its attributes. However, child predators quickly took note of the vulnerability of children as they begin to groom them online. The problem quickly evolved as the Deep (Dark) Web and encryption were created. This put great stress upon law enforcement entities as locating and combating these predators became exhausting tasks. It’s most often that these predators evolve quicker than law enforcement. Most recently, the use of hacking has become a successful tool in a child predator’s arsenal. To better understand this new phenomena, this study will focus on interviewing local, state, and federal law enforcement agents on detection, combating, prevention and direction of this problem. The results suggests that child predator hacking is a very rare crime. In fact, only one of the five officers interviewed for this study had experienced child predator hacking. Instead, child predators use easier techniques such as grooming and manipulation as children are naïve and are consensually giving the child predators explicit material. However, there is still a possibility that child predator hackers were successfully able to blackmail the child and there the crime will go unreported

    A Portrait of the Internet as a Young Man

    Get PDF
    In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes maximum stability, which will inhibit or possibly even preclude future technological innovations that rely on open access to the tools and systems that comprise the Internet. To head this off, he calls for a “transition to a networking infrastructure that is more secure yet roughly as dynamic as the current one,” which will be achieved by collaborative efforts, “a 21st century international Manhattan Project which brings together people of good faith in government, academia, and the private sector for the purpose of shoring up the miraculous information technology grid that is too easy to take for granted and whose seeming self-maintenance has led us into an undue complacence.” Zittrain uses brief, informal accounts of past events to build two main theories that dominate the book. First, he claims that open access, which he calls generativity, is under threat by a trend toward closure, which he refers to as tetheredness, which is counterproductively favored by proprietary entities. Though consumers prefer openness and the autonomy it confers, few take advantage of the opportunities it provides, and therefore undervalue it and too readily cede it in favor of the promise of security that tetheredness brings. Second, he argues that if the Internet is to find salvation it will be by the grace of “true netizens,” volunteers acting collectively in good faith to cultivate positive social norms online. Zittrain is a creative thinker and entertaining speaker, and his book is engaging and informative in much the same ways that his talks are, loaded with pop culture references and allegorical tales about technology and the once and future Internet. Zittrain uses numerous anecdotes to support his dual hypotheses, exhaustively affirming that open innovative tools and systems are essential for online life to flourish, and his contention that the Internet is exceedingly vulnerable to bad actors (a proposition I have never seen another cyberlaw scholar seriously question). But he isn’t very clear about the specific attributes of laws or regulations that could effectively foster enhanced security without impairing dynamism. He also seems to have a discomfitingly elitist view about who should be making policy decisions about the Internet’s future: like-minded, self-appointed, and knowledgeable volunteers with the time, interest, and expertise to successfully maneuver sectors of the Internet into the form or direction he thinks best
    • 

    corecore