| 000 | 02913cam a22004217i 4500 | ||
|---|---|---|---|
| 001 | 23230177 | ||
| 005 | 20251010104834.0 | ||
| 008 | 230112t20232023enk b 001 0 eng d | ||
| 010 | _a 2023446600 | ||
| 015 |
_aGBC313548 _2bnb |
||
| 020 |
_a9781529231823 _q(paperback) |
||
| 020 | _a1529231825 | ||
| 035 | _a23230177 | ||
| 035 | _a(OCoLC)1368278006 | ||
| 040 |
_aUKMGB _beng _erda _cUKMGB _dBDX _dOCLCQ _dIG$ _dOCLCF _dYDX _dPNC _dDLC |
||
| 042 | _alccopycat | ||
| 082 | 0 | 4 |
_a174/.900587 _223 |
| 100 | 1 |
_aBellaby, Ross, _d1984- _eauthor. _1https://isni.org/isni/0000000420184644 |
|
| 245 | 1 | 4 |
_aThe ethics of hacking / _cRoss W. Bellaby. |
| 264 | 1 |
_aBristol, UK : _bBristol University Press, _c2023. |
|
| 264 | 4 | _c©2023 | |
| 300 |
_av, 155 pages ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 365 | _bRs. 3041.00 | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | _aIntroduction - 1. Hacks, Hackers and Political Hacking - 2. An Ethical Framework for Hacking Operations - 3. Political Autonomy, the Arab Spring and Anonymous - 4. Leaks: From Whistleblowing to Doxxing - 5. Correcting the Failure of the State - 6. Looking Back, Moving Forward - Conclusion. | ||
| 520 | _a"Political hackers, like the infamous Anonymous collective, have demonstrated their willingness to use political violence to further their agendas. However, many of their causes - targeting terrorist groups, fighting for LGBTQ+ rights, and protecting people's freedom of expression, autonomy and privacy - are intuitively good things to fight for. This book will create a new framework that argues that when the state fails to protect people, hackers can intervene and evaluates the hacking based on the political or social circumstances. It highlights the space for hackers to operate as legitimate actors; guides hacker activity by detailing what actions are justified toward what end; outlines mechanisms to aid hackers in reaching ethically justified decisions; and directs the political community on how to react to these political hackers. Applying this framework to the most pivotal hacking operations within the last two decades, including the Arab Spring, police brutality in the USA and the Nigerian and Ugandan governments' announcements of homophobic legislation, it offers a unique contribution to conceptualising hacking as a contemporary political activity."--Publisher marketing. | ||
| 650 | 0 |
_aHacking _xMoral and ethical aspects. |
|
| 650 | 0 |
_aHacking _xPolitical aspects. |
|
| 655 | 7 |
_aInstructional and educational works. _2fast _0(OCoLC)fst01919931 |
|
| 655 | 7 |
_aInstructional and educational works. _2lcgft |
|
| 906 |
_a7 _bcbc _ccopycat _d3 _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||
| 999 |
_c213864 _d213864 |
||