Acknowledgments |
|
x | |
|
|
1 | (12) |
|
Hackers and governance of the networked society |
|
|
1 | (1) |
|
|
2 | (3) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (3) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
8 | (5) |
|
|
13 | (52) |
|
History and typology of hacking |
|
|
13 | (1) |
|
Of minicomputers and laboratories --- computer scientists and programmers |
|
|
14 | (3) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Of microcomputers, garages and computer clubs --- computer hobbyists |
|
|
17 | (9) |
|
|
17 | (2) |
|
The Homebrew Computer Club |
|
|
19 | (1) |
|
|
20 | (2) |
|
Blue boxes and paper tapes |
|
|
22 | (2) |
|
Free and open versus proprietary and closed |
|
|
24 | (2) |
|
Of personal computers, modems and bedrooms --- underground hackers |
|
|
26 | (4) |
|
|
26 | (1) |
|
|
27 | (3) |
|
Of free and open source software, licenses and movements --- FOSS developers |
|
|
30 | (7) |
|
|
30 | (2) |
|
|
32 | (2) |
|
|
34 | (2) |
|
|
36 | (1) |
|
Of the world wide web of computers and communities --- hacktivists |
|
|
37 | (4) |
|
Hacklabs, hackmeets and hacker cons |
|
|
37 | (2) |
|
Taking to the streets and the information superhighways |
|
|
39 | (2) |
|
Of open technologies, projects and spaces --- makers |
|
|
41 | (7) |
|
|
41 | (1) |
|
|
42 | (3) |
|
|
45 | (3) |
|
Makers and hacktivists in context |
|
|
48 | (17) |
|
3 Hacker norms and values |
|
|
65 | (30) |
|
Norms and values of makers and hacktivists |
|
|
65 | (15) |
|
Creativity and innovation |
|
|
66 | (1) |
|
|
67 | (1) |
|
Individual autonomy and liberty |
|
|
68 | (2) |
|
|
70 | (2) |
|
|
72 | (1) |
|
Other prominent norms and values |
|
|
73 | (1) |
|
Openness and freedom of access |
|
|
73 | (2) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (7) |
|
|
81 | (1) |
|
The conscience of a hacker |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (1) |
|
This is the maker manifesto |
|
|
86 | (1) |
|
Norms and values in conflict |
|
|
87 | (8) |
|
|
95 | (73) |
|
|
95 | (22) |
|
Brief history and development |
|
|
95 | (2) |
|
Computer crime and hacking |
|
|
97 | (1) |
|
|
97 | (1) |
|
Access or entry without right |
|
|
97 | (2) |
|
Objectives and justifications |
|
|
99 | (1) |
|
Conflicts with acts, norms and values of hacking |
|
|
100 | (3) |
|
Problem of excessive breadth and vagueness |
|
|
103 | (1) |
|
Unintended consequences and negative effects |
|
|
104 | (1) |
|
Exploitable gaps, loopholes and contradictions |
|
|
105 | (1) |
|
|
106 | (1) |
|
Capture data transmissions and emissions |
|
|
106 | (1) |
|
Legal and social justification |
|
|
107 | (1) |
|
Data interference and system interference |
|
|
108 | (1) |
|
Damage or hinder computer data and systems |
|
|
108 | (2) |
|
Cyber attacks as a form of system interference |
|
|
110 | (1) |
|
Lawful versus unlawful interference |
|
|
111 | (5) |
|
|
116 | (1) |
|
Intellectual property laws |
|
|
117 | (14) |
|
Fraught history of intellectual property and socio-technical innovation |
|
|
117 | (1) |
|
Intellectual property balance |
|
|
118 | (3) |
|
Broad exclusive rights yet narrow limitations and exceptions |
|
|
121 | (1) |
|
Reverse engineering, decompilation and use of software |
|
|
122 | (2) |
|
Temporary acts of reproduction |
|
|
124 | (1) |
|
Private and non-commercial copying and use |
|
|
125 | (1) |
|
Scientific research and teaching |
|
|
126 | (2) |
|
|
128 | (1) |
|
Fair use and the three-step test |
|
|
128 | (3) |
|
Contract and anti-circumvention laws |
|
|
131 | (10) |
|
|
131 | (1) |
|
Contractual terms and conditions |
|
|
131 | (1) |
|
Freedom and restraints of contract |
|
|
132 | (1) |
|
Contracts and computer crime |
|
|
133 | (2) |
|
|
135 | (1) |
|
Technological protection measures |
|
|
135 | (3) |
|
|
138 | (3) |
|
Conflicts and correspondences between hacking and law |
|
|
141 | (27) |
|
5 Hacking's interactions with law |
|
|
168 | (39) |
|
Perceptions and attitudes of hackers toward law and authority |
|
|
168 | (11) |
|
|
168 | (2) |
|
|
170 | (3) |
|
Legal and extra-legal means |
|
|
173 | (2) |
|
Presence rather than the absence of law |
|
|
175 | (1) |
|
|
176 | (2) |
|
Greater access to law and legal assistance |
|
|
178 | (1) |
|
Hackers' responses to law |
|
|
179 | (17) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Legal change through hacking |
|
|
181 | (2) |
|
Hacking electronic voting computers |
|
|
183 | (3) |
|
|
186 | (1) |
|
|
187 | (4) |
|
|
191 | (1) |
|
|
191 | (3) |
|
|
194 | (2) |
|
Complex relations and reactions |
|
|
196 | (11) |
|
6 Normative conclusions and areas of law reform |
|
|
207 | (40) |
|
|
207 | (2) |
|
Hackers as technical, social and legal actors |
|
|
207 | (1) |
|
Resolving conflicts by building on commonalities |
|
|
208 | (1) |
|
Support and reach out to hackers |
|
|
209 | (11) |
|
|
209 | (1) |
|
Responsible disclosure rules |
|
|
209 | (3) |
|
|
212 | (2) |
|
Changing attitudes, changing laws |
|
|
214 | (2) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (3) |
|
Change and improve the law |
|
|
220 | (15) |
|
|
220 | (1) |
|
Hacking as a legitimate and common activity |
|
|
220 | (1) |
|
Essential requirement of criminal intent |
|
|
221 | (3) |
|
Intellectual property laws |
|
|
224 | (1) |
|
Three-step test as akin to fair use |
|
|
224 | (3) |
|
|
227 | (2) |
|
Anti-circumvention and contract laws |
|
|
229 | (1) |
|
More limitations and exceptions to anti-circumvention |
|
|
229 | (1) |
|
Necessary nexus between circumvention and copyright infringement |
|
|
230 | (2) |
|
No contractual waivers of limitations and exceptions |
|
|
232 | (1) |
|
|
233 | (2) |
|
Hacking can be change for good |
|
|
235 | (12) |
Appendix: research methods |
|
247 | (3) |
Bibliography |
|
250 | (23) |
Index |
|
273 | |