NLSUI OPAC header image

The ethics of hacking / (Record no. 213864)

MARC details
000 -LEADER
fixed length control field 02913cam a22004217i 4500
001 - CONTROL NUMBER
control field 23230177
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251010104834.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230112t20232023enk b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2023446600
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBC313548
Source bnb
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781529231823
Qualifying information (paperback)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1529231825
035 ## - SYSTEM CONTROL NUMBER
System control number 23230177
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1368278006
040 ## - CATALOGING SOURCE
Original cataloging agency UKMGB
Language of cataloging eng
Description conventions rda
Transcribing agency UKMGB
Modifying agency BDX
-- OCLCQ
-- IG$
-- OCLCF
-- YDX
-- PNC
-- DLC
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 174/.900587
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Bellaby, Ross,
Dates associated with a name 1984-
Relator term author.
Real World Object URI https://isni.org/isni/0000000420184644
245 14 - TITLE STATEMENT
Title The ethics of hacking /
Statement of responsibility, etc. Ross W. Bellaby.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Bristol, UK :
Name of producer, publisher, distributor, manufacturer Bristol University Press,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2023
300 ## - PHYSICAL DESCRIPTION
Extent v, 155 pages ;
Dimensions 24 cm
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
365 ## - TRADE PRICE
Price amount Rs. 3041.00
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -<br/>1. Hacks, Hackers and Political Hacking -<br/>2. An Ethical Framework for Hacking Operations -<br/>3. Political Autonomy, the Arab Spring and Anonymous -<br/>4. Leaks: From Whistleblowing to Doxxing -<br/>5. Correcting the Failure of the State -<br/>6. Looking Back, Moving Forward -<br/>Conclusion.
520 ## - SUMMARY, ETC.
Summary, etc. "Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and privacy - are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments' announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity."--Publisher marketing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking
General subdivision Moral and ethical aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking
General subdivision Political aspects.
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Instructional and educational works.
Source of term fast
Authority record control number or standard number (OCoLC)fst01919931
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Instructional and educational works.
Source of term lcgft
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 3
e ncip
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type BOOKs
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
    Dewey Decimal Classification PB     . . General Stacks 10.10.2025 Purchased - Feel Books 2915.00   174.900587 WOL 40459 23.01.2026 10.10.2025 BOOKs Recommended by Dr. Siddharth Narrain