Listing 1 - 5 of 5 |
Sort by
|
Choose an application
Christian Identity Movement --- Scriptural Israel Identity Movement --- the 'Lone Wolf' strategy --- the modern Phinehas Priesthood --- anti-abortion --- Eric Rudolph --- Nantahala --- Clayton Lee Wagner --- James Charles Kopp --- Paul Ross Evans
Choose an application
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the "trusted systems" underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.
Hackers --- Hacking --- Political aspects --- Social problems --- Human rights --- Computer. Automation --- Hackers. --- Political aspects. --- Hacking - Political aspects --- Hacking. --- case studies. --- commodity development. --- communication law. --- competitive advantage. --- corporations. --- critical communication. --- cybersecurity. --- digital capitalism. --- european union. --- everyday use of technology. --- fraud. --- government agencies. --- government entities. --- governments. --- hackers. --- identity theft. --- invasive software. --- lone wolf. --- managing risk. --- media studies. --- political economic model. --- social change. --- trusted systems. --- united states.
Choose an application
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.
Hackers. --- Hacking. --- case studies. --- commodity development. --- communication law. --- competitive advantage. --- corporations. --- critical communication. --- cybersecurity. --- digital capitalism. --- european union. --- everyday use of technology. --- fraud. --- government agencies. --- government entities. --- governments. --- hackers. --- identity theft. --- invasive software. --- lone wolf. --- managing risk. --- media studies. --- political economic model. --- social change. --- trusted systems. --- united states.
Choose an application
""Technologies of Speculation" explores the limits of knowledge in a data-driven society"--
Technology --- Artificial intelligence --- Algorithms --- Social aspects --- Philosophy and psychology of culture --- Artificial intelligence. Robotics. Simulation. Graphics --- Artificial intelligence. --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Social aspects. --- Foundations --- Care of the self. --- Data sense. --- Futures. --- Internet of Things. --- Interpassivity. --- Lone Wolf. --- Machine learning. --- Media phenomenology. --- NSA. --- Nonconscious. --- Paranoia. --- Philosophy of technology. --- Posthumanism. --- Purity. --- Raw data. --- Risk. --- Smart machine. --- Snowden. --- Speculation. --- Sting operation. --- Subjunctivity. --- Surveillance capitalism. --- Technology criticism. --- Technology ethics. --- Technoscience. --- Transparency. --- War on terror. --- Zero tolerance. --- big data. --- knowledge. --- objectivity. --- quantified self. --- self-tracking. --- smart machines. --- surveillance. --- technological fantasy. --- Technology - Social aspects
Choose an application
anarchisme --- les droites radicales --- La Cagoule --- l'Action Française --- AF --- GUD --- Bastion Social --- BS --- les formations néo-nazies --- suprémacistes blanches --- groupes radicaux --- musique --- RAC --- RIF --- NSBM --- mai 68 --- conflits internationaux --- la France --- Action Directe --- AD --- la lutte armée --- Groupes d'Action Révolutionnaires Internationalistes --- GARI --- les Brigades Internationales --- BI --- les Noyaux Armés pour l'Autonomie Populaire --- NAPAP --- Maoïstes --- la Gauche Prolétarienne --- GP --- CCC --- OCML-VP --- ultra-gauche --- antifascisme --- Clément Méric --- Serge Ayoub --- militantisme --- guérilla en Amérique latine --- Amérique du Nord --- le Front du Libération du Québec --- FLQ --- suprémacisme blanc --- le Ku Klux Klan --- KKK --- les Weather Underground --- l'Armée de la Libération Symbionaise --- ALS --- la militance noire --- le Black Panther Party --- Japon et Philippines --- Europe --- Allemagne --- Autriche --- Belgique --- les Cellules communistes combattantes --- extrême-droite et néo-nazisme --- Grande-Bretagne --- droites radicales --- extrême-gauche radicalisée --- Espagne --- droites ultras --- Grèce --- Aube dorée --- Italie --- situationnisme italien --- mouvement autonome italien --- néo-fascisme --- coup d'Etat --- Inde --- Népal --- Turquie --- les Loups gris --- la cause Kurde --- organisations révolutionnaires --- le Parti Communiste de Turquie --- TKP-ML-TIKKO --- Parti Communiste marxiste-léniniste --- MLKP --- Parti communiste révolutionnaire de Turquie --- TDKP --- Part-Front de libération des peuples de Turquie --- THKP-C --- TKEP --- Parti communiste du travail de Turquie --- TIIKP --- Parti révolutionnaire ouvrier et paysan de Turquie --- violence politique --- armée --- police --- mercenariat --- trafics d'armes --- le SAC --- l'Action des Forces Opérationnelles --- AFO --- Démocratie participative --- DP --- Front de Défense de la France --- FDF --- Réseau Libre --- RL --- Réseaux Rémora --- lone Wolf --- Henri Curiel --- Pierre Goldman --- François Duprat --- Jean-Louis Lin --- le cocktail Molotov --- services d'ordre --- Ligue communiste et Ordre nouveau --- les gilets jaunes --- le courant solidariste --- U-Xul-klUb --- Jean-Claude Monet --- Le club des surhommes
Listing 1 - 5 of 5 |
Sort by
|