Rebels for the System? Virus Writers, General Intellect, Cyberpunk and Criminal Capitalism

  title={Rebels for the System? Virus Writers, General Intellect, Cyberpunk and Criminal Capitalism},
  author={Mathieu O’Neil},
  pages={225 - 241}
In recent years there have been numerous reports of attacks against computer systems around the world by viruses created by ‘computer hackers’. It is asserted in the media that the time and energy required to assess and repair the damage caused by this malicious software, sometimes known as ‘malware’, is proving increasingly costly to corporations. The seriousness of the threat posed by rogue computer programmers to the economic system seems to be borne out by actions such as that undertaken by… 
The results suggest that online-hacker-forum discussion may exhibit the dual-use characteristic, that is, it can be used for both good and bad purposes, and draw related managerial implications.
Bad Networks: From Virus to Cancer in Post-Cyberpunk Narrative
Abstract: Since the 1990s, post-cyberpunk narratives from the US and the UK have reworked the trope of the computer virus so that it looks less like a biological virus, and more like the contemporary
From cybercrime to cyborg crime: botnets as hybrid criminal actor-networks
It is concluded that an ANT lens is particularly suitable for shedding light on the hybrid and intertwined offending, victimization and defending processes, leading to the new concept of ‘cyborg crime'.
The Ethic of the Code: Values, Networks and Narrative Among the Civic Hacking Community
This research project explores hacking as a non-technologically specific social practice based around a collection of Hacker Ethics, and argues that Civic Hacking is indicative of the influence of the Hacker Ethic in wider areas of society.
Governance responses to hacking in the banking sector of South Africa : an exploratory study
It is argued that ethical hacking is an effective response to the threat of hacking, and argued that business risks are increased by IT risks, which implies that, by indirect association, business risks were increased by hacking.
Hacker Definitions in Information Systems Research
This paper reviewed the leading IS journals to identify previously-used hacker definitions and yields a more comprehensive definition of the term hacker to help advance hacker-related IS research efforts.
Labour out of Control: The Political Economy of Capitalist and Ethical Organizations
Digitally networked voluntary associations such as free software projects and Wikipedia can be distinguished from capitalist firms in two respects. First, their predominant logic is ‘ethical’.
The sociology of critique in Wikipedia
Summary This paper presents a new conceptual framework for the analysis of authority in anti­authoritarian environments. Legitimate domination in commons­based peer production projects such as
Online Field Theory
Though massive amounts of digital trace data can be collected about how people and information connect online, the question ofwhy they do so has been given less attention. This chapter addresses the
Peer Production and Social Change


The Hacker Crackdown: Law and Disorder on the Electronic Frontier
From the Publisher: The ATT it exists only in the networks that bind together its population. Like any frontier, it is home to a wide range of personalities, from legitimate computer professionals
Flexible Infections: Computer Viruses, Human Bodies, Nation-States, Evolutionary Capitalism
This article analyzes computer security rhetoric, particularly in the United States, arguing that dominant cultural understandings of immunology, sexuality, legality, citizenship, and capitalism
Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy
Editors’ abstract. Netwar is not mainly about technology—but good information technology sure makes a difference. In this chapter, Denning (Georgetown University) examines how activists, hacktivists,
Cheating the ELF Subversive Dynamic Linking to Libraries the grugq
  • Computer Science, Biology
  • 2001
It is demonstrated that it is not only possible, but also relatively simple, to load libraries and resolve symbols using a methodology developed within this paper, which can be utilized on any modern Unix supporting both the ELF and the /proc file system.
A Sociology of Hackers
This article outlines this community to establish the nature of hacking within ‘information societies’ and rejects any pathologisation of hackers.
Hackers and the contested ontology of cyberspace
This article analyzes the transformation in our conception of hacking over the past few decades to the current point where hackers are conceived as miscreants, vandals, criminals, and even
Discourses of Danger and the Computer Hacker
This article argues that the hacker is constructed as an information deviant and that this image is helpful in providing rules for appropriate behavior in an information society. The hacker accounts
How To Become A Hacker
Revision History Revision 1.40 3 Nov 2008 esr Link fixes. Revision 1.39 14 Aug Jan 2008 esr Link fixes. Revision 1.38 8 Jan 2008 esr Deprecate Java as a language to learn early. Revision 1.37 4 Oct
Digital Capitalism: Networking the Global Market System
From the Publisher: Cyberspace not only exemplifies but spearheads the greater political economy of which it has become such a critical part. The networks that comprise cyberspace were originally