Matches in SemOpenAlex for { <https://semopenalex.org/work/W295076203> ?p ?o ?g. }
- W295076203 startingPage "29" @default.
- W295076203 abstract "We face a lot of troubling times ahead with regards to surveillance. Most of the power, for the moment at least, remains in our hands and in our minds, should we choose to use them. It is our acceptance of the elements of a surveillance state which will give it the most strength and solidify its presence for future generations. It doesn't have to be this way. --Emmanuel Goldstein, Whole World's Watching (2008,5) IF A PERSON WERE TO ONLY CONSULT NEWS MEDIA, HE OR SHE WOULD GAIN THE impression that the world is constantly under threat of computer hackers eroding our technological infrastructure, national security, and--perhaps most immediately frightening to many--our personal privacy. Much attention has been directed toward hackers recently, in light of the numerous controversies surrounding the escapades of hacker groups like Anonymous and the disbanded Lulz Security/ LulzSec (Olson 2012); concerns over consumer financial security, as demonstrated in the occasion of the recent breach of credit card data at Target (Newman 2013); and a plethora of other hacking occurrences. (1) Perhaps now more than ever, hackers are perceived as a tremendous threat, to personal privacy. Scholars have spent a great deal of time examining public perceptions towards hackers (Halbert 1997; Holt 2009; Skibell 2002; Thomas 2005). Hacking, however, is often shrouded in a veil of social construction, perhaps as a result of the fact that the public has little direct contact with computer hackers, which makes their image particularly susceptible to shifts in public perception (Skibel 2002, 343; Hollinger 1991; Taylor 1999). In what has been termed the golden age of hacking, hackers were often perceived as ardent (if quirky) programmers, capable of brilliant, unorthodox feats of machine manipulation ... [whose] dedication bordered on fanaticism and [whose] living habits bordered on the unsavory (Nissenbaum 2004, 196). Currently, hackers are often portrayed as young men whose pathological addiction to the internet leads to elaborate deceptions, obsessive quests for knowledge, and bold tournaments of sinister computer break-ins (Coleman and Golub 2008,256). Although the term encompasses a much broader community than just those who commit network intrusions, almost any time a computer-related crime is committed, the media refer to the violator as a hacker (Holt 2009; Turgeman-Goldschmidt 2011). Thus, hackers have been constructed as some sort of digital malcontents capable of causing computerized chaos, including imposing on network privacy. Though certainly no one can argue that at least some hackers pose a threat to privacy, few seem to consider how hackers themselves view privacy and related issues. Hackers are often at the nexus of technology, politics, and control. Surveillance measures have proliferated in what has been referred to as a culture of control (Garland 2002), and demands for security through monitoring encroach on personal privacy--as most controversially demonstrated by recent events concerning the National Security Agency and their PRISM program. Examining hackers' perceptions of privacy may prove fruitful for future studies of hacker culture and behavior, because hackers are: (a) tremendously affected by increases in modern surveillance assemblages, which often encroach on domains hackers work in (computers, the Internet, etc.); (b) scrutinized heavily by media, government, and the public (Hollinger 1991; Skibell 2002; Turgeman-Goldschmidt 2011); and (c) often curious and interested in exploration (thus presenting a potential privacy threat to others) while also being vehement advocates of privacy themselves. As a step toward understanding these perceptions, the current study engages in a qualitative content analysis of 2600: The Hacker Quarterly. The magazine was created by Emmanuel Goldstein (pseudonym of Eric Corley, who adopted his name from the supposed enemy of the state in Orwell's 1984) and began publication in 1984. …" @default.
- W295076203 created "2016-06-24" @default.
- W295076203 creator A5047007277 @default.
- W295076203 creator A5071946548 @default.
- W295076203 date "2015-09-22" @default.
- W295076203 modified "2023-09-26" @default.
- W295076203 title "It Doesn't Have to Be This Way: Hacker Perspectives on Privacy" @default.
- W295076203 cites W1492833693 @default.
- W295076203 cites W1502695408 @default.
- W295076203 cites W1520844251 @default.
- W295076203 cites W1558446426 @default.
- W295076203 cites W1560926429 @default.
- W295076203 cites W1564982826 @default.
- W295076203 cites W1586036900 @default.
- W295076203 cites W1605824561 @default.
- W295076203 cites W1606295343 @default.
- W295076203 cites W1819571450 @default.
- W295076203 cites W1964575593 @default.
- W295076203 cites W1974717118 @default.
- W295076203 cites W1982503058 @default.
- W295076203 cites W2000117884 @default.
- W295076203 cites W2000185786 @default.
- W295076203 cites W2038784320 @default.
- W295076203 cites W2041733456 @default.
- W295076203 cites W2055422171 @default.
- W295076203 cites W2067689948 @default.
- W295076203 cites W2076228232 @default.
- W295076203 cites W2093515605 @default.
- W295076203 cites W2093833192 @default.
- W295076203 cites W2105285600 @default.
- W295076203 cites W2142593135 @default.
- W295076203 cites W2149797079 @default.
- W295076203 cites W2168394269 @default.
- W295076203 cites W2476702718 @default.
- W295076203 cites W2479080637 @default.
- W295076203 cites W2479158174 @default.
- W295076203 cites W2481536158 @default.
- W295076203 cites W2485569971 @default.
- W295076203 cites W2506528515 @default.
- W295076203 cites W2534391395 @default.
- W295076203 cites W2611840437 @default.
- W295076203 cites W3164409544 @default.
- W295076203 cites W348385169 @default.
- W295076203 cites W654546135 @default.
- W295076203 cites W2411982267 @default.
- W295076203 hasPublicationYear "2015" @default.
- W295076203 type Work @default.
- W295076203 sameAs 295076203 @default.
- W295076203 citedByCount "3" @default.
- W295076203 countsByYear W2950762032015 @default.
- W295076203 countsByYear W2950762032018 @default.
- W295076203 countsByYear W2950762032020 @default.
- W295076203 crossrefType "journal-article" @default.
- W295076203 hasAuthorship W295076203A5047007277 @default.
- W295076203 hasAuthorship W295076203A5071946548 @default.
- W295076203 hasConcept C108827166 @default.
- W295076203 hasConcept C144024400 @default.
- W295076203 hasConcept C144133560 @default.
- W295076203 hasConcept C17744445 @default.
- W295076203 hasConcept C199539241 @default.
- W295076203 hasConcept C2779304628 @default.
- W295076203 hasConcept C36289849 @default.
- W295076203 hasConcept C38652104 @default.
- W295076203 hasConcept C41008148 @default.
- W295076203 hasConcept C86844869 @default.
- W295076203 hasConceptScore W295076203C108827166 @default.
- W295076203 hasConceptScore W295076203C144024400 @default.
- W295076203 hasConceptScore W295076203C144133560 @default.
- W295076203 hasConceptScore W295076203C17744445 @default.
- W295076203 hasConceptScore W295076203C199539241 @default.
- W295076203 hasConceptScore W295076203C2779304628 @default.
- W295076203 hasConceptScore W295076203C36289849 @default.
- W295076203 hasConceptScore W295076203C38652104 @default.
- W295076203 hasConceptScore W295076203C41008148 @default.
- W295076203 hasConceptScore W295076203C86844869 @default.
- W295076203 hasIssue "3" @default.
- W295076203 hasLocation W2950762031 @default.
- W295076203 hasOpenAccess W295076203 @default.
- W295076203 hasPrimaryLocation W2950762031 @default.
- W295076203 hasRelatedWork W12300170 @default.
- W295076203 hasRelatedWork W1433584409 @default.
- W295076203 hasRelatedWork W153910249 @default.
- W295076203 hasRelatedWork W1558193820 @default.
- W295076203 hasRelatedWork W1561281328 @default.
- W295076203 hasRelatedWork W1986650371 @default.
- W295076203 hasRelatedWork W2006857211 @default.
- W295076203 hasRelatedWork W2047736117 @default.
- W295076203 hasRelatedWork W220027390 @default.
- W295076203 hasRelatedWork W2242937136 @default.
- W295076203 hasRelatedWork W2342852936 @default.
- W295076203 hasRelatedWork W2488326947 @default.
- W295076203 hasRelatedWork W2547538822 @default.
- W295076203 hasRelatedWork W2610551288 @default.
- W295076203 hasRelatedWork W2611804538 @default.
- W295076203 hasRelatedWork W2776304344 @default.
- W295076203 hasRelatedWork W3023890292 @default.
- W295076203 hasRelatedWork W3150290444 @default.
- W295076203 hasRelatedWork W3183385633 @default.
- W295076203 hasRelatedWork W2284465734 @default.