MARC details
| 000 -LEADER |
| fixed length control field |
02913cam a22004217i 4500 |
| 001 - CONTROL NUMBER |
| control field |
23230177 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20251010104834.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
230112t20232023enk b 001 0 eng d |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2023446600 |
| 015 ## - NATIONAL BIBLIOGRAPHY NUMBER |
| National bibliography number |
GBC313548 |
| Source |
bnb |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781529231823 |
| Qualifying information |
(paperback) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
1529231825 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
23230177 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)1368278006 |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
UKMGB |
| Language of cataloging |
eng |
| Description conventions |
rda |
| Transcribing agency |
UKMGB |
| Modifying agency |
BDX |
| -- |
OCLCQ |
| -- |
IG$ |
| -- |
OCLCF |
| -- |
YDX |
| -- |
PNC |
| -- |
DLC |
| 042 ## - AUTHENTICATION CODE |
| Authentication code |
lccopycat |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
174/.900587 |
| Edition number |
23 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Personal name |
Bellaby, Ross, |
| Dates associated with a name |
1984- |
| Relator term |
author. |
| Real World Object URI |
https://isni.org/isni/0000000420184644 |
| 245 14 - TITLE STATEMENT |
| Title |
The ethics of hacking / |
| Statement of responsibility, etc. |
Ross W. Bellaby. |
| 264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Place of production, publication, distribution, manufacture |
Bristol, UK : |
| Name of producer, publisher, distributor, manufacturer |
Bristol University Press, |
| Date of production, publication, distribution, manufacture, or copyright notice |
2023. |
| 264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
| Date of production, publication, distribution, manufacture, or copyright notice |
©2023 |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
v, 155 pages ; |
| Dimensions |
24 cm |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
unmediated |
| Media type code |
n |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
volume |
| Carrier type code |
nc |
| Source |
rdacarrier |
| 365 ## - TRADE PRICE |
| Price amount |
Rs. 3041.00 |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc. note |
Includes bibliographical references and index. |
| 505 ## - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Introduction -<br/>1. Hacks, Hackers and Political Hacking -<br/>2. An Ethical Framework for Hacking Operations -<br/>3. Political Autonomy, the Arab Spring and Anonymous -<br/>4. Leaks: From Whistleblowing to Doxxing -<br/>5. Correcting the Failure of the State -<br/>6. Looking Back, Moving Forward -<br/>Conclusion. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
"Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and privacy - are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments' announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity."--Publisher marketing. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Hacking |
| General subdivision |
Moral and ethical aspects. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name entry element |
Hacking |
| General subdivision |
Political aspects. |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Instructional and educational works. |
| Source of term |
fast |
| Authority record control number or standard number |
(OCoLC)fst01919931 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Instructional and educational works. |
| Source of term |
lcgft |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
| a |
7 |
| b |
cbc |
| c |
copycat |
| d |
3 |
| e |
ncip |
| f |
20 |
| g |
y-gencatlg |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Source of classification or shelving scheme |
Dewey Decimal Classification |
| Koha item type |
BOOKs |