Why Hackers Win: Power and Disruption in the Network Society
Univ of California Press, Nov 26, 2019 - Language Arts & Disciplines - 224 pages
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Hacking and Risk to Systems
Security software and vendor revenue worldwide
Tiers of commodification in cyber markets
The Political Economy of the Hack
Data breaches and records exposure
Antihacking Law and Policy
Other editions - View all
accounts action activities addition agencies allow attack authorities become bill breaches campaigns CFAA chapter charges Citizen claimed collective communication companies concerns Convention corporate countries created criminal customers cyber cybercrime cybersecurity data breaches defense Department economic effects European example exploits export federal firms fraud global Group hackers hacking Hacking Team identifying increasingly individuals industry intellectual property intelligence Italy July law and policy malware March markets ment military million National Security norms notes offensive offer operations organizations political potential protections records regulation require response risk secrets share social Society spyware surveillance theft theory threat tion trade trusted systems United users vulnerabilities World York