Hacker practice

@article{Coleman2008HackerP,
  title={Hacker practice},
  author={E. Gabriella Coleman and Alexander N. Golub},
  journal={Anthropological Theory},
  year={2008},
  volume={8},
  pages={255 - 277}
}
Past literature tends towards dichotomous representations of computer hackers as either unhealthy young men engaged in bold tournaments of sinister hacking or visionaries whose utopian technological lifestyle has the potential to disrupt the pathologies of capitalism and modernity more generally. In contrast, this article examines the heterogeneous nature of hacker sociality in order to more adequately portray the complex topography of hacker morality and liberalism. We distinguish between and… 

50 shades of hacking: How IT and cybersecurity industry actors perceive good, bad, and former hackers

  • L. Tanczer
  • Computer Science
    Contemporary Security Policy
  • 2019
TLDR
An international political sociology framework is applied and a conceptual framework (the Möbius strip) is proposed to situate the moral valence of hackers on a flexible model to provide insight into the ontological and normative complexities that define the study of hackers, as well as the perception of IT and cybersecurity professionals.

Repurposing the Hacker. Three Temporalities of Recuperation

TLDR
A framework drawing on the idea of recuperation is sketched out and used to situate an emerging body of works on hackers, highlighting how hacker practices and innovations are adopted, adapted and repurposed by corporate and political institutions.

'Do not hack'. Rules, values, and communal practices in hacker- and makerspaces

This paper explores which rules, norms, and values are relevant to contemporary practices of hacking. It examines how civic developers in _hackerspaces_ conceptualise their use of digital technology,

Cybercrime is (often) Boring: Infrastructure and Alienation in a Deviant Subculture

The boredom and alienation produced by capitalist societies and countervailing forces of attraction and excitement are at the heart of the subcultural account of crime. The underground hacker

The Power to Selectively Reveal Oneself: Privacy Protection among Hacker-activists

ABSTRACT Privacy advocates and hacker activists (‘hacktivists’) oppose biometric technologies, such as electronic fingerprinting and facial recognition, that are increasingly used to sort and

The power to structure: exploring social worlds of privacy, technology and power in the Tor Project

  • Ben Collier
  • Sociology
    Information, Communication & Society
  • 2020
TLDR
It is argued that Tor has in the past accommodated its internal clashing perspectives through an ambiguity around politics and a shared construction of the users of Tor, which allow individuals to bridge and translate between these worlds.

Anonymous and the Political Ethos of Hacktivism

This article examines the ethos of the hacktivist movement Anonymous. It considers the subcultural roots of Anonymous and the political and ethical values articulated by the movement. The article

The General Theory of Crime and Computer Hacking: Low Self-control Hackers?

The evolution of computer technology and the growth of the Internet have both positively and negatively impacted modern life. Although newer technology makes communication and business transactions

Cyber-noir: Cybersecurity and popular culture

  • James Shires
  • Computer Science
    Contemporary Security Policy
  • 2019
TLDR
It is argued that the concept of cyber-noir helps explain the persistence of practices that blur legal, moral, and professional lines between legitimate and malicious activity in cyberspace.

Digital Surveillance/Militant Resistance: Categorizing the “Proto-state Hacker”

Rapid developments in digital infrastructure have made all-encompassing surveillance all too possible. However, the same infrastructure has simultaneously enabled the use of new possibility spaces
...

References

SHOWING 1-10 OF 108 REFERENCES

Hackers and the contested ontology of cyberspace

This article analyzes the transformation in our conception of hacking over the past few decades to the current point where hackers are conceived as miscreants, vandals, criminals, and even

The hacker's challenge: active access to information, visceral democracy and discursive practice

TLDR
It is suggested that hacking is becoming increasingly dissociated from its founding cultures and their ethics, as computer technology and technological skill sets become more widely available, networked and encoded.

Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

TLDR
Winn Schwartau takes the reader from the basics of hacking; through actual hacking tools and techniques; to corporate, law enforcement, and military hacking policies; to how to become a successful antihacker.

The Hacker Ethic and the Spirit of the Information Age

TLDR
The Hacker Ethic takes us on a journey through fundamental questions about life in the information age-a trip of constant surprises, after which the authors' time and their lives can be seen from unexpected perspectives.

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

From the Publisher: The ATT it exists only in the networks that bind together its population. Like any frontier, it is home to a wide range of personalities, from legitimate computer professionals

Reflections on liberalism, policulturalism, and ID-ology: citizenship and difference in South Africa

How do nation-states in the twenty-first century, nation-states increasingly forced to come to terms with the ethnic heterogeneity of their citizens, deal with the problem of cultural difference?

The Cunning of Recognition: Indigenous Alterities and the Making of Australian Multiculturalism

The Cunning of Recognition is an exploration of liberal multiculturalism from the perspective of Australian indigenous social life. Elizabeth A. Povinelli argues that the multicultural legacy of

Liberals and Communitarians.

Over the past decade, one of the most controversial and influential challenges to liberal political theory has been mounted by a number of writers usually labelled "communitarian". Focusing primarily

Geeks, Social Imaginaries, and Recursive Publics

This article investigates the social, technical, and legal affiliations among “geeks” (hackers, lawyers, activists, and IT entrepreneurs) on the Internet. The mode of association specific to this

Sanctioned identities: Legal constructions of modern personhood

Studies of identity politics have often overlooked the role of bourgeois law in eliciting and confirming people's experience of themselves as persons with inherent qualities that they have a right to
...