Why Hackers Win: Power and Disruption in the Network SocietyWhen people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking. |
Other editions - View all
Why Hackers Win: Power and Disruption in the Network Society Patrick Burkart,Tom McCourt Limited preview - 2019 |
Why Hackers Win: Power and Disruption in the Network Society Patrick Burkart,Tom McCourt Limited preview - 2019 |
Common terms and phrases
Aaron Swartz activities agencies antipiracy attack vectors botnets Budapest Convention campaigns CFAA CISPA Citizen Lab claimed clients communication companies corporate criminal customers cyber insurance cyber weapons cyberattacks cybercrime data breaches deep hacks developed Equifax European Union exfiltration export Facebook federal firms fraud global growth hacks hack back hackers hacking and cybersecurity Hacking Team Hacktivism identity theft increasingly industry intellectual property intellectual-property intelligence intercept intrusion software iPhone law and policy legal system malware markets mass surveillance ment military million National Security norms offensive operations passwords Perlroth phishing piracy political potential programs protections ransomware regulations risk rootkits sector servers share social systems Sony spyware stolen surveillance targets threat tion trade trusted systems Uber United users vendors vulnerabilities Wassenaar Arrangement WikiLeaks wiretapping zero-day exploits


