1 / 7

Hacktivism

Hacktivism. Social Informatics Chris Mahon 3037266. Introduction. Hacking + Activism = Hacktivism Use of computer or internet networks to express an opinion of protest Aims to bring about change Examples: Hacking (or Cracking) DDoS. Methodology. Literature Review

afya
Download Presentation

Hacktivism

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacktivism Social Informatics Chris Mahon 3037266

  2. Introduction • Hacking + Activism = Hacktivism • Use of computer or internet networks to express an opinion of protest • Aims to bring about change • Examples: • Hacking (or Cracking) • DDoS

  3. Methodology • Literature Review • Qualitative Research • Analysing motivations of those parties involved in Hacktivism cases

  4. Framework • Social Construction of Technology (SCOT)

  5. Examples • Hackers vs. Steven Conroy • Proposal of Internet Filter back in 2008 • Hoped to gain media attention to protest censorship • “Leto” on SBS Insight • No real hacking ability, but empowered people with free-flow of information via social media

  6. Findings • Rights & Free Speech • Difficulty of Policing the Internet • Motivations of Hacktivists

  7. References • Shorter, C. (2000), “Understanding Activism: A holistic look at activism, and activist techniques”, Cameron Shorter.net, viewed online 8/11/2011 <http://cameron.shorter.net/writings/activism.html> • “Definition of white hat hacker” (n.d.), PC Magazine, viewed online 8/11/2011 <http://www.pcmag.com/encyclopedia_term/0,2542,t=white+hat+hacker > • SearchSecurity.com (2001), “What is black hat?”, TechTarget, viewed online 8/11/2011 <http://searchsecurity.techtarget.com/definition/black-hat > • “What is qualitative research?” (n.d.), QSR International, DTDigital, viewed online 8/11/2011 <http://www.qsrinternational.com/what-is-qualitative-research.aspx> • Moses, A. (2009), “Internet Censorship plan gets the green light”, The Sunday Morning Herald, viewed online 8/11/2011 <http://www.smh.com.au/technology/technology-news/internet-censorship-plan-gets-the-green-light-20091215-ktzc.html> • Whyte, S. (2011) “Meet the hacktivist who tried to take down the government”, The Sydney Morning Herald, viewed online 9/11/2011 <http://www.smh.com.au/technology/security/meet-the-hacktivist-who-tried-to-take-down-the-government-20110314-1btkt.html> • “Hacktivism” (2011), Insight, Television transcript, first aired on SBS on 27/9/2011, retrieved online 9/11/2011 <http://www.sbs.com.au/insight/episode/index/id/431/Hacktivism#transcript>

More Related